PODCAST: Gain an Edge Over BEC and Account Compromise With Intelligent Incident Response. As Black Hat heats up in Las Vegas, host Lorielle Paulk, product marketing manager at IBM X-Force Incident Response and Intelligence Services (IRIS), sits down with Nick Rossmann, research and operations lead at X-Force IRIS, and Jordan Rogers, principal consultant at X-Force IRIS, to discuss the hottest threats in today’s security landscape and the critical advantage of intelligent incident response. Read more
ENDPOINT: 4 Reasons Why Companies Are Failing at Incident Response. When it comes to containing the business impacts of a security breach, proper planning is often the difference between success and failure. Read more
GDPR: Incident Response Under GDPR – What to Do Before, During and After a Data Breach. The European Union (EU)’s General Data Protection Regulation (GDPR) is in full effect, but many organizations still don’t have the processes in place to be compliant. According to an IBM survey, only 36 percent of executives said they expect to be GDPR-compliant by the enforcement date. For many organizations, one of the top challenges is complying with the GDPR’s tight 72-hour data breach notification window. To help organizations accelerate their incident response times and meet this deadline, we’ve outlined steps privacy teams can take before, during and after a data breach to help them comply with the GDPR and improve their overall privacy and security processes. Read more
CIRP: Ten Considerations for a Cybersecurity Incident Response Plan. If you ask a group of cybersecurity experts what should be included in a Cybersecurity Incident Response Plan (“CIRP”), you will get a wide variety of answers. Happily, many of those answers contain similar themes including these ten important considerations your organization should be aware of when creating and managing a CIRP. Read more
NOW ON SLIDESHARE: Tech Update Summary from Blue Mountain Data Systems July 2018 https://www.slideshare.net/BMDS3416/tech-update-summary-from-blue-mountain-data-systems-july-2018.
IT SECURITY SUPPORT: Blue Mountain Data Systems is actively involved in implementing FISMA and NIST standards with Federal Civilian Agencies. Due to our extensive experience in this area, Blue Mountain has developed processes and organizational techniques to help ensure security deliverables are completed on time, and performed in the most efficient manner possible. We ensure that NIST-800-53 control requirements are treated consistently during definition, analysis, implementation, auditing, and reporting phases of a system. Find out more about Blue Mountain Data Systems IT Security Support Services. Call us at 703-502-3416.
BLUE MOUNTAIN DATA SYSTEMS HAS THE EXPERIENCE: 1994 to Present – U.S. Dept. of Labor, Employee Benefits Security Administration. Responsible to the Office of Technology and Information Systems for information systems architecture, planning, applications development, networking, administration and IT security, supporting the enforcement of Title I of the Employee Retirement Income Security Act — ERISA. Within the EBSA, Blue Mountain is responsible for design, development and support for its various enforcement database management systems, as well as all case tracking and customer service inquiry systems. Blue Mountain also provides IT security services to the EBSA, in the form of FISMA Assessment and Authorization, System Security Plans, Risk and vulnerability assessments, monitoring and investigation support. Read more.