Cybersecurity Awareness Month 2022

Welcome to our cybersecurity awareness resource page. Throughout the month of October, our elite team of security veterans will be providing you with educational content you can use to make better risk decisions. 

#BeCyberSmart

Cybersecurity Tips

Cyber Tip #1: Video

In support of Cybersecurity Awareness Month, our skilled DFIR team offers up their best tips to keep your security environment safe from threat actors and their malicious attacks. Watch this video to find out tip #1 from Mark Lance, Sr. Director, Cyber Defense.

Cyber Tip #2: Video

In this video you’ll learn about the importance of making sure you have visibility into your environment, retaining logs and using typical things that most organizations should have at this point like MFA.

Cyber Tip #3: Video

In this video, Tony Cook, Head of Threat Intelligence with our DFIR team, talks about the value of knowing where your critical assets are, what your critical assets are and what they’re running on.

Cyber Tip #4: Video

In this video you’ll discover the importance of having a well-documented incident response plan and scheduling table top exercises to ensure readiness when an attack occurs.

Cyber Tip #5: Video

Find out what you should do after you have an incident response plan in place and understand your environment.

Cyber Tip #6: Video

In this video, Drew Schmitt addresses the importance of establishing relationships with law enforcement before an attack occurs.

Cyber Tip #7: Video

Knowing the roles and responsibilities of your external vendors and partners is a critical component to your incident response plan.

Through the Front Door for the Price of a Box of Donuts: Video

Learn how a box of donuts and a smile helped GuidePoint Security’s Victor Wieczorek socially engineer his way into a restricted area.

Under the Radar for Two Years: Video

How security savvy are you? The business wasn’t necessarily aware of anything specific going on in their environment, but wanted to validate whether there was more brewing that was potentially going unidentified or unseen.

Security Strategy

From Passwords to Passwordless

What exactly does ‘passwordless’ mean? Read our blog to find out the answer + more.

Ransomware Attacks: Preparing Your Organization

With a history that spans forty years, ransomware has made the rounds and evolved into something that has become a weapon for targeted attacks and business disruption. Read more to learn how to improve your incident response plan.

Countering The Threat
Of Spear-Phishing

Explore the four phases of a spear-phishing attack and what steps to take to defend each step of the way.

Simplifying Your Zero Trust Journey

No one solution will address the entirety of use cases for Zero Trust, and so any steps taken towards implementing Zero Trust must be able to operate and co-exist with other solution providers. Discover how to simplify your Zero Trust journey.

Security Program Management

In this white paper, we will look at traditional cybersecurity program approaches as well as the challenges they create or fail to address, and also examine strategies for implementing and maintaining cohesive programs that deliver consistent results.

Identity Access Governance

This white paper explores how IAM programs can deliver value and help meet business objectives through an attribute-based approach. This paper also discusses the necessary framework for identity governance programs and how to create a governance structure for delivering expected outcomes to the business.

Cyber Resilience

What is at stake for not having a plan? Organizations – even those that have been around for decades – can fail in a matter of weeks or months depending on the type of event.

GPVUE Infographic

The Never-ending Game: 6 Steps to Building a Better Security Program.

Six Steps to Strong Cohesive Cybersecurity

In this blog, we’ll look at how challenges in the current cybersecurity environment contribute to problems that make organizations ripe for attack. We’ll also explore what your organization can do to improve the functionality of your security environment.

Spear Phishing: Reeling in the Big Corporate Catch

Get a better understanding of how spear phishing works and what your business can do to defend against it.

How to Build Cyber Resilience for Your Business

Learn how to prepare for an incident and ensure operational by building a strategic cyber resilience plan. Find out more. 

Zero Trust Infographic:
Just the Facts Ma’am

Learn how to prepare for an incident and ensure you get your facts straight. About Zero Trust that is.

Delivering Business Value Through a Well-Governed Digital Identity Program

This white paper explores how IAM programs can deliver value and help meet business objectives through an attribute-based approach.

More Cyber Awareness Content

Tips for Drafting Cyber Resilience Plan for Your Business

Examine the components that should encompass a cyber resilience plan and the preparation steps to protect information.

Minding Behavior in the Cloud: Video

Watch this video as Principal Consultant, Cloud Solutions at GuidePoint Security, Romke de Haan, describes one of his first complex projects advising federal agencies dealing with technical debt legacy systems and organizational debt.

A Guide to Spear Phishing

Phishing remains a tried-and-true attack vector for threat actors and a dangerous and insidious threat to businesses. According to the 2021 Verizon Data Breach Report, phishing rates are on the rise, “being present in 36% of breaches, up from 25% last year.” In particular, spear phishing continues to be a challenge for organizations, as threat actors increasingly target specific enterprises and the people that work for them.

Reckoning with Ransomware

This paper presents the process of handling a ransomware incident from a narrative perspective, walking through the timeline of response and the people and teams involved. These best practices can be broadly applied to any organization of any size and will help you begin building the framework of your incident response plan.

Events

Using the Behavioral Science Model to Influence Employee Security Behaviors

On-demand

Be sure to listen in to a conversation with the Executive Director of the National Cybersecurity Alliance, Lisa Plaggemier  and Joe Leonard, CTO at GuidePoint Security, for insights on employee attitudes around cybersecurity.

GPS Live
Guest: Amber DeVilbiss, Technical Account Manager, GuidePoint Security

October 14, 2022 | 1:30pm EDT

Hosts Jonathan Singer, SIEM & SOAR Practice Lead, Southeast + Tristan Morris, Cybersecurity Solutions Marketer interview Amber DeVilbiss about her children’s book, The Little Cyber Engineer.

The Brick House: Cybersecurity Awareness | Securing the Human Element

October 18, 2022 | 12:00pm EDT

Gary Brickhouse, CISO and VP, GRC Services + panelists will discuss cybersecurity awareness topics and real-world attack vectors across a variety of security disciplines.

GPS Live
Guest: Curtis Brazzell, Managing Security Consultant, GuidePoint Security

October 21, 2022 | 1:30pm EDT

Hosts Jonathan Singer, SIEM & SOAR Practice Lead, Southeast + Tristan Morris, Cybersecurity Solutions Marketer interview Curtis Brazzell about his children’s book, M is for Malware.

Capture the Flag Competition

October 27-30, 2022

Test your knowledge and sharpen your skills by solving a variety of “hacking” challenges. Square off against your peers and test your skills at our October Capture the Flag challenge.

Chuckles