products:

Sorry,

there are no posts to show...


Helpful Resources

News:

RSA-Charge-N&E-Image

CyberSheath, a Veteran-Owned Small Business, is a proud Gold Sponsor of RSA Charge 2015, an exclusive user event that brings together and harnesses the innovative power of RSA customers, partners, practitioners and employees. We eagerly await the gathering of industry thought-leaders, experts, and security professionals, where together we can Recharge, Retool, and Reignite the security world.

RSA Charge 2015  |  October 21st to October 23rd

CYBERSHEATH EVENT DETAILS

 

Location-Icon-Small   WHERE WILL WE BE?


CyberSheath will be located at booth G5, be sure to stop by!

* The floor plan highlights the CyberSheath booth location as you will enter the RSA conference, as well as the location of the second stage where we will be presenting on Wednesday, October 21st 12:30PM – 12:45PM – remember to drop by after lunch!

RSA-Charge-FloorPlan-Image

Speaker-Icon-Small    WHEN ARE WE SPEAKING?


Second Stage Presentation  |  Wednesday, October 21st 12:30PM – 12:45PM

Session   |  Thursday, October 22nd 11:15AM – 12:00PM – Room E256

Session Topic  |  Compliance as an Outcome of a Mature Security Program

Speakers  | Eric Noonan and Mark Walsh

Calendar-Icon-Small    WANT TO MEET WITH US?


RSA Charge is approaching fast and will be an exciting time, so make sure to mark your calendars with the sessions and presentations you don’t want to miss.  Be sure to check out the RSA Charge agenda to get the most out of your experience! http://charge.rsa.com/agenda

 

Connect with CyberSheath on social media to get updates leading up to the event, as well as live tweets during the conference. We can’t wait to see you there!

Facebook-ImageTwitter-ImageLinkedIn-Image

 

 

cyberark CyberArk (NASDAQ: CYBR), the company that protects organizations from cyber attacks that have made their way inside the network perimeter, today announced that it has achieved Common Criteria EvaluationAssurance Level EAL 2+for its comprehensive CyberArk Privileged Account Security Solution.  The certification underscores CyberArk’s commitment to helping federal organizations and global enterprises secure privileged accounts – the “keys to the IT kingdom” – before cyber attackers can steal and exploit them to gain access to sensitive data and systems.

Read the full article here.

*Expired

Make regulatory compliance a natural outcome of effective security operations, do not miss this event! Come join us on February 5, 2015 at 6pm to 8pm* for an evening with CyberSheath CEO, Eric Noonan, to hear “the how” behind bringing geographically dispersed IT infrastructures into a single focus that produces actionable metrics.

 

By Ambili Sasidharan in CIO Review

eric_CIO_ReivewWith the recent cyber attacks at eBay, Paypal, Target, Sony Picture, and JP Morgan Chase, the cyber security seems to be losing in the game of whac-a-mole. The game has been a costly one for businesses that spend billions of dollars to address new threats every day. It’s getting increasingly difficult and costly to protect even the most basic technology from a growing throng of hacking tools. In an exclusive interview with CIO Review, Eric D. Noonan, CEO at CyberSheath discusses the current landscape of cyber security and CyberSheath’s methodology for delivering security services that provide demonstrable business value.

Read the full article here.

Expired*

If your company provides products or services to the Department of Defense, this is an important event. The DFARS final ruling was one year ago, mandating the protection of unclassified information. Join us to discuss what we have learned, what compliance means, and how it will affect your business moving forward. You’ll hear from Eric Noonan, the former CISO of BAE Systems and engage with peers over dinner.*

 

Measure, Manage, and Win – How a Global Enterprise insourced security in under 6 months.

Information security must become the responsibility of an entire business ecosystem in today’s highly interconnected environment. Too often in today’s business climate, the security functions are siloed which result in a lack of transparency, accountability and increased cost, all of which is making you less secure in the process. Security investments should enable business and support objectives. And like other investments, measured to ensure such alignment.

 

By Fahmida Rashid in SECURITY WEEK

Malware and attackers are increasingly targeting privileged accounts as part of multi-stage operations where they breach networks, gather information, and exfiltrate sensitive data, according to a recent report from security firm CyberSheath.

Theft, misuse, and exploitation of privileged accounts is a “key tactic” in each phase of advanced persistent threat and other targeted attack campaigns, CyberSheath wrote in its APT Privileged Account Exploitation report released Wednesday. CyberSheath’s “descriptive benchmark study” interviewed ten “leaders in the cyber community” heading security efforts at major U.S.-based corporations, along with former government executives.

Read the full article here.

CyberSheath Services International, LLC., the leader in delivering pragmatic, measurable security solutions, is pleased to announce that John Gannon, former Deputy Director for Intelligence (DDI) at CIA, has joined the company as a strategic advisor.

“John brings decades of expertise and strategic insights that our company and customers are fortunate to have behind them,” said Eric Noonan, chief executive officer at CyberSheath. “ His unique experience and understanding of cybersecurity as an issue of national security are unmatched.”

John Gannon, who retired in 2012 as President of BAE Systems’ Intelligence and Security Sector, has resumed teaching as an adjunct professor in the National Security Studies program at Georgetown University, where he taught previously for six years.

Mr. Gannon joined BAE in 2005 as the first Vice President for Global Analysis, a business area in BAE Systems’ Information Solutions line of business, supporting U.S. Government and corporate analysis. In 2010, he became President of the Intelligence and Security Sector, a $2 billion global business with 7,000 employees.

Prior to 2005, Mr. Gannon served in the most senior analytical positions at CIA and in the Intelligence Community, including Deputy Director for Intelligence (DDI) at CIA, Chairman of the National Intelligence Council and Assistant Director of Central Intelligence for Analysis and Production. He headed the White House team in the Department of Homeland Security Transition Planning office standing up the Information Analysis and Infrastructure Protection Directorate, and was the first Staff Director of the House of Representatives  Committee on Homeland Security.

Strategic Partnership Introduces Comprehensive Cyber Security and Compliance Solutions to Enterprise and Government Organizations

WALTHAM, MA–(Marketwire – Oct 16, 2012) – CounterTack, the industry’s first and only provider of in-progress cyber attack intelligence and response solutions, today announced a strategic partnership with CyberSheath Services International, a new company that bridges the gap between business and IT risk with innovative risk management solutions. Read more here.

CyberSheath Services International, LLC (CyberSheath) launched simultaneously in Shrewsbury, MA and Reston, VA this month with a mission of “Protecting Your Vital Assets” the company believes that there is a gap between most corporations’ security compliance efforts and any material impact on actually reducing threats to the company. “The companies we talk with tend to treat security compliance as a paperwork exercise done by auditors and threat detection and mitigation as the work done by the men and women on the security operations center floor. The two groups don’t talk to one another and seldom, if ever, does a company get the force multiplier effect that exists when compliance and defense efforts are integrated in a way that meets common objectives.” CyberSheath Chief Executive Officer Eric D. Noonan.

“We are here to change the game. We don’t sell silver bullets; rather, we teach companies to integrate resources they already have in a measurable way to reduce threats to their networks and data.”

FAQs:

Cybersheath Blog

3 Reasons Why You Need a Privileged Access Risk Assessment

A privileged account is one used by administrators to log in to servers, networks, firewalls, databases, applications, cloud services and other systems used by your organization. These accounts give enhanced permissions that allow the privileged user to access sensitive data or modify key system functions, among other things. You can…

Incident Response – Learning the Lesson of Lessons Learned

“Those who do not learn from history are condemned to repeat it.” Over the years, variations of this famous quote have been spoken by everyone from philosophers to world leaders. The message — that we must learn from our mistakes or continue to repeat them — is also highly relevant…

What is DFARS 252.204-7012 and NIST SP 800-171?

With the Department of Defense (DoD) promising the release of an update to NIST Special Publication 800-171, it is imperative defense contractors understand what DFARS 252.204-7012 and NIST SP 800-171 Clause is and how noncompliance with the Clause will impact their business.  Compliance is mandatory for contractors doing business with…

Our Trusted Partners

Cyberark McAfee Thycotic RSA Tenable Alien Vault Alert Logic Trace Security