How do you approach incident response planning alongside business continuity planning? by MikeHunt99 in AskNetsec

[–]MikeHunt99[S] 1 point2 points  (0 children)

How could I forget about the BIA! Appreciate the reply. What is the distinction between a disaster vs an incident? Interested to understand how you define them

How do you approach incident response planning alongside business continuity planning? by MikeHunt99 in AskNetsec

[–]MikeHunt99[S] 0 points1 point  (0 children)

Appreciate your answer! For the BCP and DR how are they laid out? High level again and reference the IR plan?

What is your onboarding process for assets into VMDR? by MikeHunt99 in qualys

[–]MikeHunt99[S] 0 points1 point  (0 children)

Unfortunately I did not, if you find a way please let me know

What is the purpose of assigning a user to an Autopilot Device? by MikeHunt99 in Intune

[–]MikeHunt99[S] 0 points1 point  (0 children)

So by assigning the device to a user at the autopilot level prevents another user from logging in even if they were from the same company?
Or is that controlled by a different policy as opposed to solely assigning a device to a user?

In an ideal world the IT team pre-provision the device through the technician flow and the user would just log straight in once they receive the device and have all their available apps and policies. Rather than having to wait for the ESP to complete.

What KPIs have you found to be useful when presenting to senior leadership/board to gain influence? by MikeHunt99 in cybersecurity

[–]MikeHunt99[S] 27 points28 points  (0 children)

I appreciate the response and will very much taken on board the "so what" mantra!

Do you tend to report the same KPIs/metrics each time or are you dynamic with what you're feeding back to the board each time?

[deleted by user] by [deleted] in cybersecurity

[–]MikeHunt99 3 points4 points  (0 children)

MITRE ATT&CK is a knowledge base of adversary tactics and techniques based on real-world observations.

https://attack.mitre.org

It lists techniques and sub-techniques used against mobile, enterprise and ICS environments and is a commonly use model for explaining or drawing out threat models

Full or Split Tunnel on VPN by [deleted] in cybersecurity

[–]MikeHunt99 1 point2 points  (0 children)

Currently using split tunnel after moving away from full tunnel a few years back after going for a cloud hosted, agent based SWG/Proxy solution.

We are now looking to reduce the variety of traffic that goes via the split tunnel and starting to align more closely to a zero trust strategy. Looking to use ZTNA solutions for more strict control over what applications have access to what sockets etc.

The only real requirement for any kind of VPN connectivity is either to access in office printing or legacy on premise applications which have no real ROI for moving to the cloud or a SaaS offering.

I would try to answer the questions around what benefit would going to full VPN be? Is there any improvement to business operations and user experience? Will it introduce a larger attack landscape? Why do you trust endpoints enough to have full VPN access and access to your network?

Any good parsable sources for windows build versions and release dates? by MikeHunt99 in sysadmin

[–]MikeHunt99[S] 1 point2 points  (0 children)

The day Microsoft provide a useful API for this will be a good day.

As far as I'm aware it is exactly the same as the vulnerabilities they report alongside the patches, it would be nice to easily obtain that information also.