Avatar

Gavin Reid

CyberCzar/Director

Public Sector

With over 25 years of experience in the field, Gavin Reid is an expert in cyber threat intelligence. Reid has created numerous threat intelligence programs over the years including Cisco’s Security Incident Response Team (CSIRT), which is a global network of information security professionals responsible for monitoring, investigating, and responding to cyber security incidents.

Articles

November 21, 2016

SECURITY

What do Mirai & IoT botnets mean to the public sector?

3 min read

5 First Steps to Defending against IoT Driven DDoS Attacks In honor of October’s National Cybersecurity Awareness Month, users of Twitter, Netflix, Reddit and the New York Times were treated to a special treat – and just in time for Halloween. Unfortunately it was more of a trick as users of these and other major […]

November 7, 2016

SECURITY

Is Your Race to SOC Headed for an Epic Crash?

4 min read

Before You Take Off, Get Up To Speed on These Six Precursors to Incident Response It seems most advice on setting up a Security Operations Center (SOC), or creating a Computer Security Incident Response Team (CSIRT), focuses on people, technology or processes. Unfortunately, such advice may also include doing so at full speed, from the […]

October 18, 2016

SECURITY

On or Off the Clock, Staying Cyber Secure is a New Fact of Life

4 min read

On or Off the Clock, Staying Cyber Secure is a New Fact of Life  Cybersecurity has always been a major concern for workplace networks. But, increasingly, it is top of...

July 25, 2016

SECURITY

Cognitive Bias in Incident Response

5 min read

This blog is a co-authored by Jeff Bollinger & Gavin Reid Are You Too Confident in Your Incident Response? When Charles Darwin stated “Ignorance more frequently begets confidence than does knowledge,” civilization’s evolution from Industrial Age to Information Age was nearly a century away. Yet, when it comes to many aspects of IT, he nailed […]

June 9, 2016

SECURITY

Detection in Depth

2 min read

Defense in depth is a well understood and widely implemented approach that can better secure your organization’s network. It works by placing multiple layers of defense throughout the network to create a series of overlapping and redundant defenses. If one layer fails, there will still be other defenses that remain intact. However, a lesser known […]

July 6, 2016

SECURITY

NetFlow AND PCAP (not or)

2 min read

As digital transformation sweeps across the world, there is a driving need for more effective logging and data recording for incident response. In today’s IT world, your agency’s Computer Incident Response Team (CIRT) must have the capability to quickly determine the source and scope of an attack on its network in order to effectively mitigate […]

February 19, 2014

SECURITY

Cisco Hosting Amsterdam 2014 FIRST Technical Colloquium

1 min read

The registration is now open and there is still time left to respond to the call for papers for the upcoming FIRST Technical Colloquium April 7-8, 2014. Please contact us at amsterdam-tc@first.org for speaker engagements. The event already has an exciting preliminary program covering: Savvy Attribution in the DNS – Using DNS to Geo-locate Malicious […]

January 20, 2014

SECURITY

Cisco 2014 Annual Security Report: Cybercriminals Applying “Old” Techniques in New Ways

2 min read

We know that as time goes on, the cybercrime network’s operations will only more closely resemble those of any legitimate, sophisticated business network. And like all enterprising businesspeople, those who are part of the “cybercriminal hierarchy”—which is discussed in the Cisco 2014 Annual Security Report and illustrated below—look to increase their profits by continually innovating […]

May 6, 2013

SECURITY

Security Logging in an Enterprise, Part 2 of 2

5 min read

We first logged IDS, some syslog from some UNIX hosts, and firewall logs (circa 1999). We went from there to dropping firewall logging as it introduced some overhead and we didn’t have any really good uses for it. (We still don’t.) Where did we go next?

  • 1
  • 2