www.busterCyber.com


Cybersecurity Domains


  • Executive Summary
  • Cybersecurity Events
  • Deep-Dive Research
  • Qualifications
  • CyberSec Education
  • CyberSec Framework
  • Project/Program Mgmt

Research Focus Areas



Layered Security
Considerations



Full-Stack cybersecurity - know your vectors





Risk/Threat Vector: User Security



Insider Threats - Gaps in security policy, business processes, operational procedures, user and administration training, etc. can increase your risks.



Risk/Threat Vector: Application & Browser Security



Design flaws in your code, tools, and scripts, etc. can increase your risks.



Risk/Threat Vector: Storage & Database Security



Outdated storage systems or lax database security can increase your risks. This includes decentralized systems within business units.





Risk, Threat, or Attack Vector: Operating Systems



Unpatched or outdated operating systems, code, tools, and utilities within your system's operating environment. including cloud computing can increase your risks.



Risk, Threat, or Attack Vector: Communication Protocols



Insecure protocols can increase your risks.



Risk, Threat, or Attack Vector: Wires, Wireless, and Signals



Unsecured wires, insecure WiFi access points, and insecure servers (physical access) can increase your risks.





Risk, Threat, or Attack Vector: Reprogrammable Firmware



Design flaws within a system's chips.



Risk, Threat, or Attack Vector: Silicon



Who made the chips in your system?.



Risk, Threat, or Attack Vector: Third-Party Areas



What else is connected to your network and systems? What processes are depending on that other businesses have in place? What risks are you agreeing to in your contracts with suppliers and business partners (or connected customers)?



GET THAT DEEPER
UNDERSTANDING.



A fast talking analyst, engineer, or sales person is not always the best answer to your risk management...






bustercyber