Blog

Are You Looking For Historical Security Reporting or Real Time Threat Management?

When discussing the value that SIEMs provide, it comes down to being proactive vs reactive to security threats and whether you’re looking for historical reporting or real-time threat management.

James Crifasi, CTO at RedZone Technologies, spoke to this in our recent security talk show where he explained why SIEMs may not be as useful as they once were.

James says, “And this, to me, is why SIEMs have been going downhill- is it’s one thing to say you collect the logs, but then can you read the logs, and then can you do something useful with the logs? The more and more we go to a SIEM vendor and really pin them out, you end up with the scope of, ‘Okay, here’s all the logs we collect.’ This many we can do something really cool and useful and AI-driven with. This level, we can let you search but we can’t really do any of the AI stuff.”

🛡️Top Strategies of the Week for IT Business Leaders

Having a strong sense of self-awareness will carry you far in business and in life. Here are a few thought-provoking themes from the previous week.

Weekly Summary

IT Business Leadership, Strategy & Innovation

Offense & Defense Innovation

1.    “The Importance of Personal Branding As A CIO And Business IT Leader.”- Sarah Angel-Johnson, former CIO at Year Up, current CIO at Save the Children, describes how she found her personal brand- being a change agent.

2.    70% of Internet Traffic is Encrypted. What are you Doing to Inspect and Secure it?”- James Crifasi, CTO at RedZone Technologies, on why you need strong SSL security.

3.    “From CIO to Chief Strategy Officer.”- Bill Murphy on the power of CIOs.

4.    “#172: You Are in the Driver’s Seat of Your Own Career.”- Full podcast conversation with Sarah Angel-Johnson, former CIO at Year Up, current CIO at Save the Children.

5.    “ATO Must be Integrated with SSO, MFA, and Conditional Access.” – James Crifasi, CTO at RedZone Technologies, on why you need security in layers.

6.    “#173: Hacking Multifactor Authentication.” – Full podcast conversation with Roger Grimes, Data-Driven Defense Evangelist at KnowBe4.

7.    “Early is on time, on time is late, late is unacceptable.” – Jon Santee, Vice President of IT, on his superpower- time management.

RedZone Technologies specializes in:

•      RedZone MSP and MSSP: ‘On-Demand’ security and trusted advisor programs

•      Co-MITS – Co-Managed IT Security (‘Hands on’ Managed Services)

•      Cloud Security and Secure IT Infrastructure Support

•      Virtual Information Security Operations Programs (IT SecOps and VISO)

Contact us at 410-897-9494 or myteam@redzonetech.net with any questions.

What is Your Superpower As a CIO?

In my conversation with Jon Santee, Vice President of IT, I asked him what his favorite elements of teamwork were.

He answered, “Watching a group of people come together to work on something and be successful is one of the most exciting aspects of my day-to-day job. I love bringing highly skilled people together. One of the things I always say is, to build a team, it’s my job to hire really good people, and then get out of their way.”

 

How do CIOS and CISOS Focus on Risk Mitigation with Security?

Roger Grimes, Data-Driven Defense Evangelist at KnowBe4, is perhaps the world’s foremost expert when it comes to computer security defense. He really knows his stuff. But what’s the biggest area of concern Roger has on behalf of most companies? Risk.

In our conversation, Roger made a passionate plea to businesses to wise up fast and compared being repeatedly hacked to having your house broken into. Roger says, “Let me tell you how bad it is. They learned that the thief is coming through the window. Every time they’ve broken in and it’s been through a window, I’m going to go out and buy a door with more locks. We have this entire industry that seems like it’s matured with the most immature risk model I’ve ever seen in my life.”

To avoid falling into these common pitfalls and actually do risk right, Roger recommends patching your software, and not getting tricked into doing something bad.

Where do MSPs and MSSPs Fail Most Often With Security?

There is so much confusion in the security space surrounding MSPs and MSSPs and what they can provide.

James Crifasi, CTO at RedZone Technologies, explained this very well when he said, “So where we see the biggest struggle is that designation. Is this person providing you a product? In which case, they are not doing the mental effort to make sure you’re safe. They’re doing low-cost effort to make sure they don’t get calls because their margin is very thin. That’s why their cost is going down. Versus an MSSP where they are providing a service, and the goal is to make sure those products work right… They’re calling it a managed service, but it’s really a managed service product, not a program.”

Contrast that to a co-managed IT security provider, like RedZone Technologies, who will work with your organization to achieve your desired security outcome.