I recently contributed a chapter titled “Advanced Technologies/Tactics Techniques, Procedures (TTPs): Closing the Attack Window, and Thresholds for Reporting and Containment” that was published in an anthology Best Practices in Computer Network Defense: Incident Detection and Response, published by the IOS press. In the chapter, I recommend a number of TTPs that can move the cybersecurity balance of power away from adversaries to infrastructure defenders. Acting on the TTPs I propose—including focusing hard work and clear thinking on network security basics—will pay maximum dividends for the cybersecurity defender.
The book’s publishers have graciously granted me permission to reproduce the chapter on the Cisco website, and you are welcome to read it here. Please take a moment to read it and let me know what you think in the form of comments on this blog post.
Thanks in advance for your thoughts and reasonably well considered opinions!
Tags: best practices, network security, security, TTPs
In a world where we are increasingly connected, and other’s opinions or reviews are more accessible than ever, marketing must evolve to keep up. Consumers want, and expect, ‘on-demand’ marketing –customized marketing that caters to what they need, when they want it, and is extremely responsive. 59% of consumers who have experienced personalization believe it has a noticeable influence on their spending. That percentage cannot be ignored –and with all the data available from connected devices and social media –there is no reason it should be.
Social media interactions are a part of many customers’ routine. For marketing, these interactions provide valuable insights and data. Companies like Julep Beauty leverage social media to interact with their customers, discover what they want, and quickly create, test, and sell new products. When negative reviews or comments come up, they promptly address the issue. This allows customers to feel like their voices are being heard and helps position the brand as a company that cares and is responsive to its customers.
Read More »
Tags: best practices, Big Data, Internet of Everything, marketing, optimization, personalized marketing, social media
A Short Trip Down Memory Lane…
On the quest of becoming a truly social-minded culture, about a year and a half ago, we rolled up our sleeves and created a multi-level, multi-track social media training program that used game principles and integrated with our Education Management System to encourage and reward participation. We augmented our on-demand courses with a vibrant community filled with self-service resources, online discussions (we call them “social chats”), team challenges, and recognitions and testimonials.
What I’m most proud of is that we did this in house and on a shoestring budget (imagine toddler-sized shoes and shoestrings). The original team was very small, namely the wonderful Elizabeth Houston (please give it up for @elhoust) and yours truly (@petra1400). Having seen great success with our internal program and inspired by the possibilities of growing and even bringing it to our customers, partners and general public, we have added some resources and upgraded to kid-sized shoestrings. Soon, the external-facing training program pilot, a scaled down version of our internal program was born. (For the record, the current team is still really small and also includes @kmgibbs and some of @nrrivas07 and our fun intern, @efannie’s time).
We knew it was just a matter of time before we wanted to expand the customer-facing program and mirror it after our internal program as much as possible.
Driving in the Fast (and Furious) Lane
Over the past few months, we have been working furiously on making this dream become a reality. While we have a little longer to go before you can test drive our new social media training center, we want to share some screen shots of this new environment. Read More »
Tags: best practices, classes, curriculum, education, online classes, social media, training
Employees of every organization use a variety of computing devices such as desktops, servers, laptops, security appliances, and mobile devices to increase productivity in this ever-changing world of Information Technology. The confidentiality, integrity, and availability (CIA) of information has become essential to success and often a competitive advantage. A comprehensive patch management process should be a major component to protecting CIA on computing devices and the data they store or transmit. Patch management is not always a simple task, as organizations may have a variety of platforms and configurations, along with other challenges that make patching these components very difficult. However, there are recommendations and best practices to minimize the complexity of this much-needed task.
Read More »
Tags: best practices, Cisco IOS Software Checker, ncsam-2013, patch management
Last week, I shared basic enablement, intelligence, engagement and measurement practices. This week’s presentation focuses on some advanced practices in the areas of intelligence, engagement, advocacy and measurement. By no means is this list complete so please feel free to add your two cents in the Comment box below. The more we share, the more we can influence how companies and even industries are viewing and adopting social media. Collectively, we can shape its evolution. So please, share away!
And without further ado, here’s another chapter from my unwritten book in slide deck format: Read More »
Tags: advanced, advocacy, best practices, community, crm, data, engagement, how to, Intelligence, Listening, measurement, Plan, ROI, social media, strategy