Innovative Minds - On Point - One Group  

Risk Management

This is the blog for MindPoint Group's Information Security & Privacy (ISP) division. We hope to use this to contribute to and debate ideas among the ISP community.
20
Sep
2018

Insider Threat Mitigation – Just Players in a Risk Management Game

By:

Let’s meet some actors in this game, shall we?  First, we have Roger, who is angry that his peers have gotten promoted over him and he received a paltry bonus this year.  Roger decided to reset production server accounts to a password only he knows, cover his tracks, and proclaim ignorance when a severe incident

Read More

15
Aug
2018

Social Engineering Part 2: Open-Source Intelligence (OSINT)

By:

“Most scams work because victims are successfully convinced the scam is real. Thus, victims give criminals their information more often than it is maliciously stolen. A scammer’s main goal is to convince you to hand over your information voluntarily, as opposed to using forceful intimidation or threats.” “While hostility is one social engineering methodology, expert

Read More

18
Jul
2018

A Tale Of Two Tools: When Splunk met SecurityCenter

By:

Co-Authors:  Keith Rhea and Alex Nanthavong It was the best of times, it was the worst of times, it was the age of technological advancements, it was the age of attack, it was the epoch of cybercrime, it was the epoch of opportunity, it was the season of Remediation, it was the season of Exploitation,

Read More

26
Jun
2018

Guide to Creating a Cybersecurity Challenge for Kids

By:

By:  Stephanie Carruthers and Nolan Kennedy “Right now, we’ve got about 300,000 unfilled cybersecurity positions as a nation,” said Rick Driggers, from DHS at the Cyberthreat Intelligence Forum, reported on FedScoop. Driggers goes onto ask “So what are we doing to engage K-12”? As a Cybersecurity consulting firm, MindPoint Group (MPG) deals with this industry

Read More

10
Jun
2018

Inherent Risk Tiering for Third-Party Vendor Assessments

By:

It can be a challenging and overwhelming task to adequately manage the risk associated with outsourcing technology or business processes, no matter the size or sector of the organization. This is supported by a study sponsored by the Ponemon Institute, which gathered responses from hundreds of respondents across both public and private sectors to present

Read More