We use cookies to deliver you the best experience on our website. By continuing to use our website, you consent to our cookie usage and revised Privacy Statement.

Filter By:

Type

Topic

Recent Blogs & Podcasts

12 Results for: "Jake Williams"

 



August 13, 2018 | Threat Detection and Hunt Teaming
By John Strand, IANS Faculty,
     Jake Williams, IANS Faculty

 Hacking Back: A Double-Edged Sword

As online attacks continue to grow in frequency and ferocity, some in the security community are making the argument that the bad guys deserve a taste of their own medicine. Enter the notion of hacking back. The concept raises ethical questions, but some experts believe there are valid techniques that can and should be used to defend organizations. In this webinar, IANS Faculty John Strand and Jake Williams explore those techniques, address the ethical questions and help the audience find a happy medium.

Read More »


July 24, 2018 | Malware and Advanced Threats
By Jake Williams, IANS Faculty

 Take a Clear-Eyed Approach to Ransomware

As ransomware incidents become increasingly common, most organizations realize they need to better tailor their incident response strategies. In this Ask-an-Expert live interaction, IANS Faculty Jake Williams offers tips on buying cryptocurrency, engaging a middleman for negotiations, setting up an optimal backup strategy and countering the "CSI Effect."

Read More »


June 25, 2018 | Security Policies and Strategy
By Jake Williams, IANS Faculty

 Create an Acceptable Use Policy for a Culture of Trust

Security needs to walk a fine line when creating acceptable use policies that both outline consequences and foster a culture of trust. In this Ask-an-Expert written response, IANS Faculty Jake Williams provides a policy roadmap, and stresses the importance of being clear about what is and isn't being monitored, and why.

Read More »


May 21, 2018 | Security Information and Event Management (SIEM) and Log Management
By Jake Williams, IANS Faculty

 Train the Team on the SIEM Basics

Bringing SIEM duties in-house after an outsourcing arrangement requires in-house staff be brought up to speed quickly. In this Ask-an-Expert written response, IANS Faculty Jake Williams suggests focusing training on three areas: configuration/maintenance, log management and alert management.

Read More »


May 17, 2018 | Threat Intelligence and Modeling
By Jake Williams, IANS Faculty

 Threat Modeling: Three Basic Approaches to Consider

With so many threat modeling approaches available, how do you choose the right one for your particular environment? In this Ask-an-Expert written response, IANS Faculty Jake Williams recommends three approaches designed to help model threats against PaaS and IaaS cloud assets, in addition to a range of other attacks.

Read More »


April 17, 2018 | Penetration Testing and Red Teaming
By Jake Williams, IANS Faculty

 Avoid Common Issues with Live Red Team Exercises

Red team exercises provide valuable insight into an organization's defenses, but running them against live environments can be dicey. In this Ask-an-Expert live interaction, IANS Faculty Jake Williams details how to get a red team program up and running, and offers tips for conducting live exercises without adversely affecting the business.

Read More »


April 9, 2018 | Intrusion Prevention/Detection (IPS/IDS)
By Jake Williams, IANS Faculty

 Choose the Best IDS/IPS for a New Wide-Area Network

An IDS/IPS is a critical WAN security control, but choosing the right one for your environment requires some research. In this Ask-an-Expert written response, IANS Faculty Jake Williams details the key criteria to consider and suggests evaluating solutions from four main vendors: Check Point, Cisco, McAfee and WatchGuard.

Read More »


April 2, 2018 | Threat Intelligence and Modeling
By Jake Williams, IANS Faculty

 Build a More Formal, Automated CTI Program

Moving from an ad hoc, manual cyber threat intelligence (CTI) program to one that is more formal and automated is not complicated, as long as you follow the right steps. In this Ask-an-Expert written response, IANS Faculty Jake Williams explains the five-step CTI lifecycle and details key pitfalls to avoid.

Read More »