CyberRiskManagementAV

JohnsTek and AlienVault® A Winning Team!

JohnsTek is pleased to announce that we are expanding our Cyber Risk Management service offering by teaming with AlienVault®! AlienVault gives their customers the very best threat detection and response through their unified platform, AlienVault Unified Security Management™ (USM™) the Open Threat Exchange™ (OTX™), analysis of an immense amount of data submitted to OTX by more than 47,000…

CyberSecurity

Taking Steps Towards Cyber Resilience

The President is in the process of defining the Cyber Security Policy for the United States.  This follows on from the previous administration’s efforts to improve cyber security throughout the US.  While we expect to see more emphasis on public-private cooperation as well as potentially refining and defining what the roles of the Department of…

Industrial

ICS, SCADA and Ransomware, coming 2017

Palo Alto networks has a frightening prediction for 2017.  Ransomware successfully penetrates and attacks Critical Infrastructure systems.   In the Palo Alto publication, they describe what a successful attack would look like, as well potential pay out for the criminals.  This is a disturbing development, and should not be taken lightly.   Kaspersky in  December highlights ransomware…

CyberSecurity

5 Steps To Secure Your Small Business

According to Symantec, the last 5 years have shown a steady increase in attacks targeting businesses with less than 250 employees.  The US Cyber Security Alliance reports 60% of Small business that suffer an attack are unable to recover.  Additionally, the Ponemon institute reports indicated the average cost for small business to recover and respond…

CyberSecurity

Design Thinking and Cyber Security, using Operational Design and Design Thinking Concepts to Develop a CyberSecurity Program

While I was in the military, dealing with complex international crises was the order of the day.  We used a planning technique developed by the Israeli Defense Force and championed by the U.S. Special Operations Command, Operational Design.  The concept of Operational Design uses the skills and techniques of design thinking to plan complex operations. These…

S.A. Client Fusion Center Systems Design

JOHNSTEK, Inc. was selected to design a high end system-of-systems for a large Latin American organization that optimize the reporting and visualization of data using advanced technologies. Information is made available for correlation and reporting by employing standardized methodologies of data extracting, semantic tagging and indexing critical information, index of geo-references, and enabling web services…

Thunderstorm Group LLC Vulnerability Study

JOHNSTEK, Inc. supported Thunderstorm Group in a study of Carlos Alibizu University security vulnerabilities. The analysis of Information Technology risk management included an evaluation of the university’s posture in the areas of Computer Security, Information Assurance, and Disaster Planning. The current Information Technology risks were evaluated under the categories detailed in the JOHNSTEK Vulnerability Assessment…