Next Generation of Cyber Crime Prevention Unveiled

Lazarus Alliance unveils the next generation of cyber crime prevention.

Lazarus Alliance released the next generation weapon in the corporate arsenal to fight cyber crime, corporate fraud and criminal cyber-misconduct with the IT Audit Machine (ITAM).

Next Generation of Cyber Crime Prevention Unveiled

Considered to be the best assessment tool for governance, risk and compliance (GRC) in the global business community, this next generation of ITAM ups the ante by managing big data and frameworks with virtually endless possibilities. These new enterprise capabilities coupled with the already powerful analytic and logic features are a technological force to be reckoned with.

Michael Peters, CEO of Lazarus Alliance said “The IT Audit Machine is just one of the many innovations from Lazarus Alliance that really sets us apart from other cyberspace security, governance, risk and compliance firms.”

Gone are the days where audits, assessments and compliance work was overshadowed by endless spreadsheets, version control madness, escalating costs and audit anarchy. The IT Audit Machine puts the power of technology, collaboration and simplicity to work for the entire enterprise and does it in a progressive, proactive way.

Cyber crime prevention is of paramount concern to organizations of all sizes, all industries and on all parts of the world. Lazarus Alliance put its extensive experience in cyber crime and fraud prevention in the governance, risk and compliance (GRC) spaces to work for the global business community.

“We have for the first time in history seen the CEO of major global brands lose their jobs because of cyber crime. These criminal acts could have been prevented through a proactive cyber security position. Lazarus Alliance is proactive cyber security.” said Peters.

Lazarus Alliance’s primary purpose is to help organizations attain, maintain, and demonstrate compliance and information security excellence, in any jurisdiction. Lazarus Alliance specializes in IT security, risk, privacy, governance, cyberspace law and compliance leadership solutions and is fully dedicated to global success in these disciplines.

Learn more about Lazarus Alliance and why Lazarus Alliance is Proactive Cyber Security™!

Proactive vs Reactive Cyber Security on Money Radio

Recently Michael Peters, CEO of Lazarus Alliance, spent time with David Cogan of Money Radio and eLiances discussing the differences between proactive cyber security and reactive cyber security. You can replay the broadcast as heard on money radio.

Michael Peters and David Cogan as heard on Money Radio

An overview of the discussion was when you think cyber security, what comes to your mind first?

I’ve posed that question to many an audience over the years and most frequently the response is what folks see on the nightly news or through some new source. Recently people will respond with examples such as Home Depot, Target, Sony, JP Morgan and the European Central Bank which of course are just a few of the most notable instances of breaches we seen in the news over the last twelve months.

I point out to these same groups that in reality, there are only two forms of cyber security and its Proactive Cyber Security and Reactive Cyber Security. I’ll explain what that means and let’s see if you agree.

Reactive Cyber Security situations are going to be in the news because something bad has happened. Reactive security companies help you clean up the mess. When you become aware of a cyber security breach at some company, it’s probably because you are watching the business catastrophe unfolding through some syndication source. You eventually get a notification by the company, your bank or credit card provider informing you that your private and personal information has been stolen which leaves you to worry and watch hoping that nothing bad happens to you.

From a business standpoint, it has become painfully obvious at all levels including shareholders that cyber breaches have a really negative impact on business value not to mention careers of everyone involved especially at the highest levels of the company. We have all seen for the first time in 2014 CEOs, CIOs and CISOs losing their jobs as a direct result of culpability or negligence on their part.

No doubt about it, cyber security breaches have a hugely negative impact on the financial health and reputation of the victim company.

So this brings me to the second form of cyber security which is proactive cyber security. Proactive Cyber Security is all about keeping you out of the news by implementing the right controls and countermeasures. We know it’s not enough for the government or the private sector to have rules and regulations. PCI DSS certification did not save Target, Home Depot or other retailers. The FFIEC or the NIST Framework for Improving Critical Infrastructure Cybersecurity did not save JP Morgan or other financial institutions from their breaches.

You need qualified assistance to make it effective. It’s tough when there are not enough talented cyber security professionals to go around. Businesses are short-staffed. Academia is not training and educating enough to keep up with the demand.

The best possible course of action to avoid being the latest corporate cyber security breach is to take a proactive approach. I’m the CEO and Lazarus Alliance is Proactive Cyber Security™.

Be sure to check out the dynamic group of hybrid entrepreneurs who spend time together at eLiances where entrepreneurs align hosted by David Cogan.

Michael Peters and David Cogan of eLiances

Thank you to Money Radio for inviting me to discuss the differences between Proactive and Reactive Cyber Security.

Michael Peters and David Cogan as heard on Money Radio

The Security Trifecta™: an introduction.

I was reading a news article this morning about another security debacle at NASA involving the theft of a laptop containing the command and control codes for some high-tech toys like the International Space Station. The thing that amazed me the most was not that NASA would be a high value target, but that this laptop apparently was not encrypted. Seriously? Something that is considered entry level to security professionals is apparently only deployed to about 1% of all NASA computing devices, including mobile devices.

The Security Trifecta only from Lazarus AllianceFirst off, I do have sympathy for NASA and it’s dwindling congressional budget, however, two things are painfully evident and not excusable. First, there is great open source disk encryption available so budgetary excuses do not hold water. Second, this is not cutting edge technology and a few years ago, when the economy was good and the budgets were fat, this was never accomplished. The current, and at a minimum, the preceding NASA CISO’s should be dismissed in shame and given Darwin awards for incompetence. I don’t need to name you two boobs (no offense to actual breasts meant) because everyone can just Google NASA CISO to find out who you are, where you came from and where you went. This would not have happened on my watch.

In my second book, Governance Documentation and Information Technology Security Policies Demystified, I introduce you to a concept I call The Security Trifecta™. Security does not have to be complicated. I have spent my career within information security demystifying what for some is a like understanding a foreign language. The fact of the matter is that by taking three well defined pragmatic steps, we raise the bar and achieve success; governance documentation, technological enforcement and vigilant teamwork working together to promote security.

The Security Trifecta in brief:

  • Governance Documentation: The foundation for what we do is based upon the written word. We collectively, collaboratively, cooperatively establish standards that are based upon philosophy, legal requirements, best practices, and regulatory demands.
  • Technological Enforcement: When governance documentation has been established, we set about implementing and enforcing those standards as much as possible through the usage of technology. Some technology implementations allow for the end user to exercise greater choice and control, whereas others strictly enforce our standards taking the human choice element out of the mixture.
  • Vigilant Teamwork: The reality is that nothing works very well without teamwork. Controls and standards break down without careful tending just like weeds take over our gardens without vigilance. We must regularly review our security standards validating their relevancy and we will remain agile to adapt to the changing business landscape putting into practice carefully considered revisions to our ongoing security program.

The Security Trifecta is an effective and logical approach to information security I developed over the course of my career. The interesting thing is that the conceptual approach may also be applied to any other business process making it formidable to say the least.

Lazarus Alliance is Proactive Cyber Security™

Click to access the login or register cheese