We use cookies to deliver you the best experience on our website. By continuing to use our website, you consent to our cookie usage and revised Privacy Statement.

Filter By:

Type

Topic

Recent Blogs & Podcasts

35 Results for: "Bill Dean"

 



May 30, 2018 | Incident Investigations, Handling and Tracking
By Bill Dean, IANS Faculty

 Incident Cheat Sheet: When to Contact Law Enforcement

In the heat of an incident, it can be difficult to determine if/when law enforcement notification is required. This cheat sheet provides a list of common security incident types along with the required/suggested external party that should be involved with each. 

Read More »


April 23, 2018 | Endpoints
By Bill Dean, IANS Faculty

 Endpoint Detection and Response (EDR): A Market Overview

With more than 60 options to choose from, determining the best EDR solution for your environment can become overwhelming fast. In this Ask-an-Expert written response, IANS Faculty Bill Dean details the decision factors and suggests considering offerings in both the "security trinity" and standalone categories. 

Read More »


April 11, 2018 | Threat Intelligence and Modeling
By Bill Dean, IANS Faculty

 Threat Intelligence Checklist

The ability to obtain and effectively leverage quality threat intelligence is no longer optional for today’s information security teams. This checklist steps  through the process of choosing the right feeds, integrating the data and ensuring you successfully leverage threat intel to proactively detect/prevent attacks.

Read More »


April 11, 2018 | Threat Intelligence and Modeling
By Bill Dean, IANS Faculty

 Make Sense of Your Threat Intel

With all the threat feeds and intelligence sources out there, how can you choose – and use – the right ones for your specific infosec program and use cases? In this report, IANS Faculty Bill Dean offers practical tips for choosing the right feeds, integrating the data and ensuring you successfully leverage threat intel to proactively detect/prevent attacks.

Read More »


June 14, 2017 | IT Forensics
By Bill Dean, IANS Faculty

 Use the Right Process – and Tools – to Investigate Potentially Compromised Machines

Getting a secure process in place to remotely investigate potentially compromised devices - one that can't be used as a pivot point for further attack - is tricky. In this Ask-an-Expert written response, IANS Faculty Bill Dean validates a client's current process but also recommends installing a temporary forensics agent to improve the analysis.

Read More »


January 26, 2017 | Threat Intelligence and Modeling
By Bill Dean, IANS Faculty

 Pros and Cons of CISA’s Threat-Sharing Program

With the passage of CISA and with DHS’ Automated Indicator Sharing (AIS) program getting up and running, organizations interested in sharing threat intelligence can now consider automating the process. How can they ensure their automated feed is scrubbed of PII and won’t leave them open to liability or privacy concerns? In this report, IANS Faculty Bill Dean offers tips for sharing threat indicators both automatically and safely.

Read More »


September 21, 2016 | Insider Threats
By Bill Dean, IANS Faculty

 Insider Threats: Understanding the Risks

Insider threats can often pose a greater risk to an organization than external actors. In this Ask-an-Expert written response, IANS Faculty Bill Dean offers some key statistics regarding insider threats and provides a number of steps organizations can take to anticipate and prepare for the risks posed by insiders.

Read More »


August 15, 2016 | Incident Response Planning
By Bill Dean, IANS Faculty

 Creating Effective Tabletop Exercises

Designed correctly, tabletop exercises can help you determine how well your people, processes and technologies are prepared for an incident – and improve that preparation over time. In this report, IANS Faculty Bill Dean steps you through the process of designing, planning and executing effective tabletop exercises. 

Read More »


July 21, 2016 | Penetration Testing and Red Teaming
By Bill Dean, IANS Faculty

 Examining Top Penetration Testing Tools

As the features and functionality of vulnerability assessment and penetration tools continue to evolve, a number of vendors have begun to enter the spaces. In this Ask-an-Expert written response, IANS Faculty Bill Dean details the various open-source and commercial tools available and offers factors to consider for choosing the most effective solutions. 

Read More »


May 26, 2016 | IT Forensics
By Bill Dean, IANS Faculty

 Mobile Device Forensics: A Tools Overview

Mobile device forensics tools in the marketplace today vary greatly in both capability and price. In this Ask-an-Expert written response, IANS Faculty Bill Dean assesses a number of these solutions and explains that budget and the types of mobile phones in your environment are the two main factors for selecting the right forensics tool.

Read More »