Resources

RSA Charge Session | Compliance as an Outcome of a Mature Security Program
RSA Charge Session | Compliance as an Outcome of a Mature Security Program

Eric Noonan and Mark Walsh's RSA Charge Session, Compliance as an Outcome of a Mature Security Program, describes how today's regulatory obligations often produce a company focus on showing compliance with audits. But a well-designed security program builds on a foundation of carefully planned and tested controls that address real risks, stop attacks, and protects company data. In this model CyberSheath demonstrates how audit and regulatory compliance can be an outcome of an effective security program. Read More

RSA Charge Presentation | Key Factors for Federal A&A Success
RSA Charge Presentation | Key Factors for Federal A&A Success

Mark Walsh's RSA Charge Presentation on Key Factors for Federal A&A Success, presenting real use cases and lessons learned from successful implementations of the Archer Assessment and Authorization module for federal customers. Learn the critical factors to consider during Archer A&A deployment to realize a significant reduction in time, money, and effort for federal compliance efforts, all while maintaining strict, documented accountability. Read More

Bridging the HIPAA Compliance Gap

The HITECH Act was signed into law in 2009 and increases the use of Electronic Health Records (EHR) by physicians and hospitals. The Medicare EHR Incentive Program began in 2011... Read More

CyberSheath Privileged Breaches

As we examine a cross-section of recent high-profile, targeted, advanced cyber attacks, all indicators demonstrate that our patient and persistent adversaries have recycled many of the same tactics that they have successfully leveraged in years past... Read More

CyberSheath APT Privileged Exploit

Looking closely at the Advanced Persistent Threat (APT) attack pattern reveals that the theft, misuse, and exploitation of privileged accounts is a key tactic in each phase of the APT’s methodology... Read More

CyberSheath’s Security Forecast Report for 2015

The past 12 months have seen extraordinary levels of threat actor activity. High profile data breaches, like those at Target, Staples, and most recently, Sony Pictures Entertainment, have dominated the newsroom floor and occupied boardroom conversations... Read More