IT and Business Insights for SMB Solution Providers

Jay Ferron

I am a self proclaimed geek who has authored, may technical training courses. As a speaker Jay has presented at many events including, user groups, Computer trade shows, DOD and federal conferences, ISPCON, TechEd, and WPC. Jay is on the global board member of GITCA. Past President of ISACA-CT, Past president APCUG and is a Microsoft MVP Enterprise Security. Jay has been a MVP in in Windows, HPC, and Azure.

My information Resource
September 8th, 2021 | Jay Ferron | My information Resource
 Curriculum  This training program includes 16 modules. The post includes a presentation for each module, preferably recorded (when still not, we are working on the recording) and supporting information: relevant product documentation, blog posts, and other resources.The modules listed below are - Read More
 
September 8th, 2021 | Jay Ferron | My information Resource
 In an ongoing effort to provide practical and actionable guidance to help organizations manage growing cybersecurity risks, NIST has released a draft ransomware risk management profile. The Cybersecurity Framework Profile for Ransomware Risk Management, Draft NISTIR 8374, is now open for comment - Read More
 
September 8th, 2021 | Jay Ferron | My information Resource
 Registration is OPEN for the 8th annual New York Metro Joint Cyber Security Conference & Workshop (Oct. 14/15). Find out more at https://infosecurity.nycDAY 1 OCT 14, 2021 Conference Agenda DAY 2 OCT 14, 2021 Workshop - Read More
 
August 18th, 2021 | Jay Ferron | My information Resource
How to Gain More from your Connection to an OT Network One of the most productive and non-intrusive tools in the Cyber Security Engineer’s bag is passive Network Traffic Analysis (NTA).  Providing network maps, inventory, and firmware information among other benefits provides insights that are not - Read More
 
August 18th, 2021 | Jay Ferron | My information Resource
As we know, each organization is unique and have different use cases and scenarios in mind when it come to security operations. Nevertheless we've identified several use cases that are common across many SOC teams. Azure Sentinel now provides built-in watchlist templates, which you can customize - Read More
 
August 18th, 2021 | Jay Ferron | My information Resource
In collaboration with the Microsoft Threat Intelligence Center (MSTIC), we are excited to announce Fusion detection for ransomware is now publicly available!   These Fusion detections correlate alerts that are potentially associated with ransomware activities that are observed at defense evasion - Read More
 
August 18th, 2021 | Jay Ferron | My information Resource
 Recent reports show the high extent to which information workers are utilizing cloud apps while doing their everyday tasks. In an average enterprise, there are more than 1500 different cloud services used, where less than 12% of them are sanctioned or managed by the IT teams. Considering that more - Read More
 
August 18th, 2021 | Jay Ferron | My information Resource
 With the massive volume of emails sent each day, coupled with the many methods that attackers use to blend in, identifying the unusual and malicious is more challenging than ever. An obscure Unicode character in a few emails is innocuous enough, but when a pattern of emails containing this obscure - Read More
 
August 18th, 2021 | Jay Ferron | My information Resource
You are subscribed to National Cyber Awareness System Current Activity for Cybersecurity and Infrastructure Security Agency. This information has recently been updated, and is now available. CISA Provides Recommendations for Protecting Information from Ransomware-Caused Data Breaches 08/18/2021 12 - Read More
 
August 5th, 2021 | Jay Ferron | My information Resource
Control assessments are not about checklists, simple pass/fail results, or generating paperwork to pass inspections or audits. The testing and evaluation of controls in a system or organization to determine the extent to which the controls are implemented correctly, operating as intended, and - Read More
 

Pages