{"id":25,"date":"2023-10-21T16:14:38","date_gmt":"2023-10-21T16:14:38","guid":{"rendered":"https:\/\/cybermike.io\/?page_id=25"},"modified":"2023-12-04T21:02:48","modified_gmt":"2023-12-05T02:02:48","slug":"home","status":"publish","type":"page","link":"https:\/\/cybermike.io\/","title":{"rendered":"Home"},"content":{"rendered":"\n<div class=\"wp-block-cover alignfull\" style=\"padding-top:15vw;padding-bottom:15vw;min-height:672px;aspect-ratio:unset;\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-background-dim-70 has-background-dim\"><\/span><img loading=\"lazy\" decoding=\"async\" width=\"2400\" height=\"1074\" class=\"wp-block-cover__image-background wp-image-71\" alt=\"\" src=\"https:\/\/cybermike.io\/wp-content\/uploads\/2023\/10\/laptopnew.jpg\" data-object-fit=\"cover\" srcset=\"https:\/\/cybermike.io\/wp-content\/uploads\/2023\/10\/laptopnew.jpg 2400w, https:\/\/cybermike.io\/wp-content\/uploads\/2023\/10\/laptopnew-300x134.jpg 300w, https:\/\/cybermike.io\/wp-content\/uploads\/2023\/10\/laptopnew-1024x458.jpg 1024w, https:\/\/cybermike.io\/wp-content\/uploads\/2023\/10\/laptopnew-768x344.jpg 768w, https:\/\/cybermike.io\/wp-content\/uploads\/2023\/10\/laptopnew-1536x687.jpg 1536w, https:\/\/cybermike.io\/wp-content\/uploads\/2023\/10\/laptopnew-2048x916.jpg 2048w, https:\/\/cybermike.io\/wp-content\/uploads\/2023\/10\/laptopnew-1140x510.jpg 1140w\" sizes=\"auto, (max-width: 2400px) 100vw, 2400px\" \/><div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\">\n<p class=\"has-text-align-right is-style-small-text mb-05\"><\/p>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-right has-xxl-font-size\" style=\"margin-top:0em;margin-bottom:1em\">Welcome to <strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-main-color\">Cyber Mike&#8217;s<\/mark><\/strong><br>Cybersecurity Homepage<\/h2>\n\n\n\n<p class=\"has-text-align-right\">Thank you for visiting my Cybersecurity vision.<br>Please feel free to contact me with any questions.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-right is-layout-flex wp-container-core-buttons-is-layout-83917372 wp-block-buttons-is-layout-flex\" style=\"margin-top:80px;margin-bottom:0px\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/cybermike.io\/?page_id=26\">About Me<\/a><\/div>\n\n\n\n<div class=\"wp-block-button is-style-arrow-transparent\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.linkedin.com\/in\/michael-brangwynne\/\">Add me to your LinkedIn<\/a><\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<hr class=\"wp-block-separator aligncenter has-alpha-channel-opacity center mb-2 mt-1\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">Cybersecurity Principles &#8211; CIA Triad+<\/h2>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p><\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-columns is-not-stacked-on-mobile gap-15 is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:40px\">\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/cybermike.io\/wp-content\/themes\/exs\/assets\/img\/icon-color.png\" alt=\"\" class=\"wp-image-198\"\/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h6 class=\"wp-block-heading\" style=\"margin-bottom:0.5em\">Confidentiality<\/h6>\n\n\n\n<p>Prevent sensitive information from unauthorized access attempts.<\/p>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-columns is-not-stacked-on-mobile gap-15 is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:40px\">\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/cybermike.io\/wp-content\/themes\/exs\/assets\/img\/icon-color.png\" alt=\"\" class=\"wp-image-198\"\/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h6 class=\"wp-block-heading\" style=\"margin-bottom:0.5em\">Integrity<\/h6>\n\n\n\n<p>Maintain the consistency, accuracy and trustworthiness of data over its entire lifecycle.<\/p>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-columns is-not-stacked-on-mobile gap-15 is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:40px\">\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/cybermike.io\/wp-content\/themes\/exs\/assets\/img\/icon-color.png\" alt=\"\" class=\"wp-image-198\"\/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h6 class=\"wp-block-heading\" style=\"margin-bottom:0.5em\">Availability<\/h6>\n\n\n\n<p>Information should be consistently and readily accessible for authorized parties.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns pt-1 is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-columns is-not-stacked-on-mobile gap-15 is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:40px\">\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/cybermike.io\/wp-content\/themes\/exs\/assets\/img\/icon-color.png\" alt=\"\" class=\"wp-image-198\"\/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h6 class=\"wp-block-heading\" style=\"margin-bottom:0.5em\">Training &amp; Awareness<\/h6>\n\n\n\n<p>Educate employees about cybersecurity threats, risks and best practices.<\/p>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-columns is-not-stacked-on-mobile gap-15 is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:40px\">\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/cybermike.io\/wp-content\/themes\/exs\/assets\/img\/icon-color.png\" alt=\"\" class=\"wp-image-198\"\/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h6 class=\"wp-block-heading\" style=\"margin-bottom:0.5em\">Incident Response<\/h6>\n\n\n\n<p>Organized approach to addressing and managing the aftermath of a cyber event.<\/p>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-columns is-not-stacked-on-mobile gap-15 is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:40px\"><\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h6 class=\"wp-block-heading\" style=\"margin-bottom:0.5em\"><\/h6>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<hr class=\"wp-block-separator alignfull has-alpha-channel-opacity mt-3\"\/>\n\n\n\n<div class=\"wp-block-media-text has-media-on-the-right is-stacked-on-mobile\" style=\"grid-template-columns:auto 49%\"><div class=\"wp-block-media-text__content\">\n<h4 class=\"wp-block-heading mt-2\" id=\"block-b841bda5-c108-45d3-a127-4c8d8b33a394\">NIST Cybersecurity Framework<\/h4>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity mt-2 mb-2\"\/>\n\n\n\n<p><strong>IDENTIFY<\/strong><br>Develop the organizational understanding to manage cybersecurity risk to systems, assets, data, and capabilities.<\/p>\n\n\n\n<p><strong>PROTECT<\/strong><br>Develop and implement the appropriate safeguards to ensure delivery of critical infrastructure services.<\/p>\n\n\n\n<p><strong>DETECT<\/strong><br>Develop and implement the appropriate activities to identify the occurrence of a cybersecurity event.<\/p>\n\n\n\n<p><strong>RESPOND<\/strong><br>Develop and implement the appropriate activities to take action regarding a detected cybersecurity event.<\/p>\n\n\n\n<p><strong>RECOVER<\/strong><br>Develop and implement the appropriate activities to maintain plans for resilience and to restore any capabilities or services that were impaired due to a cybersecurity event.<\/p>\n<\/div><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"731\" height=\"732\" src=\"https:\/\/cybermike.io\/wp-content\/uploads\/2023\/11\/NIST-Framework.jpg\" alt=\"\" class=\"wp-image-359 size-full\" srcset=\"https:\/\/cybermike.io\/wp-content\/uploads\/2023\/11\/NIST-Framework.jpg 731w, https:\/\/cybermike.io\/wp-content\/uploads\/2023\/11\/NIST-Framework-300x300.jpg 300w, https:\/\/cybermike.io\/wp-content\/uploads\/2023\/11\/NIST-Framework-150x150.jpg 150w\" sizes=\"auto, (max-width: 731px) 100vw, 731px\" \/><\/figure><\/div>\n\n\n\n<hr class=\"wp-block-separator alignfull has-alpha-channel-opacity mt-3\"\/>\n\n\n\n<div class=\"wp-block-media-text has-media-on-the-right is-stacked-on-mobile\" style=\"grid-template-columns:auto 48%\"><div class=\"wp-block-media-text__content\">\n<h4 class=\"wp-block-heading mt-2 has-huge-font-size\">INCIDENT RESPONSE &#8211; PICERL<\/h4>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity mt-2 mb-2\"\/>\n\n\n\n<div class=\"wp-block-columns is-not-stacked-on-mobile gap-15 is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p><strong>PREPARE<\/strong><br>Fail to Prepare, Prepare to Fail. When not actively responding to an incident, you are in this phase. Strive to get better with continuous improvement and attack surface reduction. System hardening, vulnerability management, patching, monitoring, documentation, training and practice are some things you should focus on.<\/p>\n\n\n\n<p><strong>IDENTIFY<\/strong><br>Something has happened, act quickly and accurately to assess the situation and properly determine if it really is in incident. Make sure to categorize the incident and prioritize the incident based on severity, risk and impact. Make sure to escalate if needed to ensure the proper incident responders are working any confirmed incidents.<\/p>\n\n\n\n<p><strong>CONTAIN<\/strong><br>The goal here is to stop the attack from spreading. Do not rush into this to ensure there are no holes in your containment. You need to prevent things from getting worse by being decisive with your actions.<\/p>\n\n\n\n<p><strong>ERADICATE<\/strong><br>Get the attacker completely out and keep them out in the future. This should be the more permanent fix that happens after the threat has been contained. Complete any hardening, patching and additional configuration required. Make sure to continue monitoring.<\/p>\n\n\n\n<p><strong>RECOVER<\/strong><br>Restore affected systems back to their previous state with additional measures in place to ensure the incident or a similar incident cannot happen again. Test monitor and validate your systems as they are restored. Get things back to normal. <\/p>\n\n\n\n<p><strong>LESSONS LEARNED<\/strong><br>Document and Learn. What happened in the incident? How did the incident happen? How was the incident dealt with? What went well with the incident response? What went bad with the incident response? What needs to be changed in the incident response plan?<\/p>\n<\/div>\n<\/div>\n<\/div><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"719\" height=\"718\" src=\"https:\/\/cybermike.io\/wp-content\/uploads\/2023\/11\/PICERL.webp\" alt=\"\" class=\"wp-image-362 size-full\" srcset=\"https:\/\/cybermike.io\/wp-content\/uploads\/2023\/11\/PICERL.webp 719w, https:\/\/cybermike.io\/wp-content\/uploads\/2023\/11\/PICERL-300x300.webp 300w, https:\/\/cybermike.io\/wp-content\/uploads\/2023\/11\/PICERL-150x150.webp 150w\" sizes=\"auto, (max-width: 719px) 100vw, 719px\" \/><\/figure><\/div>\n\n\n\n<div class=\"wp-block-group alignfull is-layout-constrained wp-block-group-is-layout-constrained\">\n<hr class=\"wp-block-separator alignfull has-alpha-channel-opacity mt-3\"\/>\n<\/div>\n\n\n\n<div class=\"wp-block-media-text has-media-on-the-right is-stacked-on-mobile\"><div class=\"wp-block-media-text__content\">\n<p><\/p>\n\n\n\n<h4 class=\"wp-block-heading\">DEFENSE IN DEPTH<\/h4>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p><\/p>\n\n\n\n<p><strong>PERIMETER SECURITY<\/strong><br>Firewall, Penetration Testing, IDS\/IPS, DDoS Protection<\/p>\n\n\n\n<p><strong>NETWORKING SECURITY<\/strong><br>VPN, Wi-Fi Security, Secure DMZ, MDR, Continuous Monitoring<\/p>\n\n\n\n<p><strong>ENDPOINT SECURITY<\/strong><br>NGAV\/EDR, Asset Tracking, Rogue Device Monitoring, Patch Management, MFA, Endpoint Encryption<\/p>\n\n\n\n<p><strong>DATA SECURITY<\/strong><br>PAM, MFA, Email Encryption, Data Backups, Database Monitoring, SIEM<\/p>\n\n\n\n<p><strong>BUSINESS OPERATIONS<\/strong><br>Service Desk, SOC, Business Continuity, Disaster Recovery, Policies &amp; Procedures, Governance, User Training, Vulnerability Management<\/p>\n\n\n\n<p><strong>PHYSICAL SECURITY<\/strong><br>CCTV Security System, Access Control System, Guest Management, Alarm System, Power Backup, Fire Suppression<\/p>\n<\/div><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"620\" height=\"644\" src=\"https:\/\/cybermike.io\/wp-content\/uploads\/2023\/11\/Defense-in-Depth.jpg\" alt=\"\" class=\"wp-image-369 size-full\" srcset=\"https:\/\/cybermike.io\/wp-content\/uploads\/2023\/11\/Defense-in-Depth.jpg 620w, https:\/\/cybermike.io\/wp-content\/uploads\/2023\/11\/Defense-in-Depth-289x300.jpg 289w\" sizes=\"auto, (max-width: 620px) 100vw, 620px\" \/><\/figure><\/div>\n\n\n\n<p><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-wide\"\/>\n\n\n\n<h4 class=\"wp-block-heading\">CYBERSECURITY MESH ARCHITECTURE<\/h4>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-default\"\/>\n<\/div>\n<\/div>\n\n\n\n<p><\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<p><strong>Securing our devices and data <\/strong>regardless of location, device or data state (at rest, in transit) by leveraging <strong>various technologies and processes <\/strong>(both automated and human-based processes).<\/p>\n\n\n\n<p><strong>Extending Cybersecurity controls <\/strong>everywhere needed by ensuring our platforms are scalable, flexible and resilient.<\/p>\n\n\n\n<p><strong>Standardizes our incident response<\/strong>, threat mitigation and event recovery strategy. (our responses become consistent, rehearsed and efficient).<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity Principles &#8211; CIA Triad+ Confidentiality Prevent sensitive information from unauthorized access attempts. Integrity Maintain the consistency, accuracy and trustworthiness of data over its entire lifecycle. Availability Information should be consistently and readily accessible for authorized parties. Training &amp; Awareness Educate employees about cybersecurity threats, risks and best practices. Incident Response Organized approach to addressing and managing the aftermath of a cyber event. CYBERSECURITY MESH ARCHITECTURE Securing our devices and data regardless of location, device or data state (at rest, in transit) by leveraging various technologies and processes (both automated and human-based processes). Extending Cybersecurity controls everywhere needed by ensuring<span class=\"more-dots\">&#8230;<\/span><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-templates\/no-sidebar-no-title.php","meta":{"footnotes":""},"class_list":["post-25","page","type-page","status-publish","hentry","no-post-thumbnail"],"_links":{"self":[{"href":"https:\/\/cybermike.io\/index.php?rest_route=\/wp\/v2\/pages\/25","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cybermike.io\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cybermike.io\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cybermike.io\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cybermike.io\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=25"}],"version-history":[{"count":24,"href":"https:\/\/cybermike.io\/index.php?rest_route=\/wp\/v2\/pages\/25\/revisions"}],"predecessor-version":[{"id":660,"href":"https:\/\/cybermike.io\/index.php?rest_route=\/wp\/v2\/pages\/25\/revisions\/660"}],"wp:attachment":[{"href":"https:\/\/cybermike.io\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=25"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}