Last week I had the pleasure of presenting three times, at two conferences, in two different countries: SOURCE in Boston, MA and at the Atlantic Security Conference (AtlSecCon) in Halifax, NS, Canada. The first event of my week was SOURCE Boston. This year marked the tenth anniversary of SOURCE Conference and it continues to pride … Continue reading Diving into the Issues: Observations from SOURCE and AtlSecCon READ MORE >
By: Glenn Sweeney Day by day within our cyber security world, we ask ourselves, “Will I own the day or will the day own me?” Well, if you have a proven incident response management plan, then the day should be yours. If not, we all know what can happen when that dreaded breach occurs — … Continue reading NIST Incident Management: A Condensed Version READ MORE >
Today’s business landscape is at a crossroads from a technology standpoint. The advent of cloud, virtualized and hybrid platforms has created tremendous advantages and opportunities, for businesses across industries, but with these benefits come serious potential vulnerabilities. A new philosophy must be adopted from the boardroom to the data center to survive in this new … Continue reading “Plenty of Tools, Not Enough Talent: The Inspiration for LEO” READ MORE >
LEO Cyber Security provides the content on this blog as commentary on current issues. Your review of this content does not establish an attorney-client relationship, nor should the content be considered legal advice, which depends on the facts of each situation. LEO makes NO WARRANTIES OR REPRESENTATIONS OF ANY SORT with respect to the content of the blog, including any warranties or representations as to the accuracy or completeness of any of the information, facts, or opinions contained herein.