VIDEO: Incident Response: Trade-offs Under Pressure. John Allspaw provides a glimpse into how other fields handle incident response, including active steps companies can take to support engineers in those uncertain and ambiguous scenarios. Examples include fields such as military, surgical trauma units, space transportation, aviation and air traffic control, and wildland firefighting. Read more

LISTEN: HSAC Wants DHS Cross-Sector Cybersecurity Plan. The Homeland Security Department and Homeland Security Advisory Council are exchanging summer homework, respectively asking for recommendations for the presidential transition and a plan for coordinating cross-sector cybersecurity responses. Read the rest

COLLABORATION: Technology Gives Police and Public Safety Agencies the Upper Hand. Cities put common IT infrastructure to work in the ongoing effort to prevent and reduce criminal activity. When a suspicious person or activity happens at Newburgh, N.Y.’s City Hall, police are notified directly. City employees can push a button to silently page the nearby police department in an emergency, one of many new features available since the city ­upgraded its communications infrastructure, adding new IP phones, paging and emergency notification software on top of a new Cisco Systems phone system. Read more

HAVE A PLAN: The Importance of a Cyber Incident Response Plan and the Steps Needed to Avoid Disaster. With two-thirds of the UK’s big businesses being hit with a cyber-attack in the past year, it’s absolutely crucial for businesses to know how to respond and deal with the aftermath. A study conducted last year revealed that more than half of organizations lack the capability to gather data from across their environment, or coordinate centralized alerts to the business about suspicious activity. Read the rest


NOW ON SLIDESHARE: Tech Update Summary from Blue Mountain Data Systems June 2016

IT SECURITY SUPPORT: Blue Mountain Data Systems is actively involved in implementing FISMA and NIST standards with Federal Civilian Agencies. Due to our extensive experience in this area, Blue Mountain has developed processes and organizational techniques to help ensure security deliverables are completed on time, and performed in the most efficient manner possible. We ensure that NIST-800-53 control requirements are treated consistently during definition, analysis, implementation, auditing, and reporting phases of a system. Find out more about Blue Mountain Data Systems IT Security Support Services. Call us at 703-502-3416.

BLUE MOUNTAIN DATA SYSTEMS HAS THE EXPERIENCE: 1994 to Present – U.S. Dept. of Labor, Employee Benefits Security Administration. Responsible to the Office of Technology and Information Systems for information systems architecture, planning, applications development, networking, administration and IT security, supporting the enforcement of Title I of the Employee Retirement Income Security Act — ERISA. Within the EBSA, Blue Mountain is responsible for design, development and support for its various enforcement database management systems, as well as all case tracking and customer service inquiry systems. Blue Mountain also provides IT security services to the EBSA, in the form of FISMA Assessment and Authorization, System Security Plans, Risk and vulnerability assessments, monitoring and investigation support. Read more.


Incident Response – Daily Tech Update – July 25, 2016

Leave a Reply