Cloud Security
How to monitor and track failed logins for your AWS Managed Microsoft AD🤪
https://aws.amazon.com/ru/blogs/security/how-to-monitor-and-track-failed-logins-for-your-aws-managed-microsoft-ad
Offensive security
1. Understanding & Detecting C2 Frameworks - DarkFinger-C2👍🏽
https://nasbench.medium.com/understanding-detecting-c2-frameworks-darkfinger-c2-539c79282a1c
2. Heap-based AMSI bypass for MS Excel VBA and others
https://codewhitesec.blogspot.com/2019/07/heap-based-amsi-bypass-in-vba.html?m=1
exploit
CVE-2021-26892:
An Authorization Bypass on the Microsoft Windows EFI System Partition
https://www.zerodayinitiative.com/blog/2021/6/30/cve-2021-26892-an-authorization-bypass-on-the-microsoft-windows-efi-system-partition
Cloud Security
Cloudquery transforms cloud infrastructure into SQL database for easy monitoring, governance and security
https://github.com/cloudquery/cloudquery?rdt_cid=3165982334197510857
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.14
How to monitor and track failed logins for your AWS Managed Microsoft AD🤪
https://aws.amazon.com/ru/blogs/security/how-to-monitor-and-track-failed-logins-for-your-aws-managed-microsoft-ad
Offensive security
1. Understanding & Detecting C2 Frameworks - DarkFinger-C2👍🏽
https://nasbench.medium.com/understanding-detecting-c2-frameworks-darkfinger-c2-539c79282a1c
2. Heap-based AMSI bypass for MS Excel VBA and others
https://codewhitesec.blogspot.com/2019/07/heap-based-amsi-bypass-in-vba.html?m=1
exploit
CVE-2021-26892:
An Authorization Bypass on the Microsoft Windows EFI System Partition
https://www.zerodayinitiative.com/blog/2021/6/30/cve-2021-26892-an-authorization-bypass-on-the-microsoft-windows-efi-system-partition
Cloud Security
Cloudquery transforms cloud infrastructure into SQL database for easy monitoring, governance and security
https://github.com/cloudquery/cloudquery?rdt_cid=3165982334197510857
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.14
Amazon
How to monitor and track failed logins for your AWS Managed Microsoft AD | Amazon Web Services
AWS Directory Service for Microsoft Active Directory provides customers with the ability to review security logs on their AWS Managed Microsoft AD domain controllers by either using a domain management Amazon Elastic Compute Cloud (Amazon EC2) instance or…
Threat Hunting using DNS logs – Soc Incident Response Procedure
Read Here:
https://www-socinvestigation-com.cdn.ampproject.org/c/s/www.socinvestigation.com/threat-hunting-using-dns-logs-soc-incident-response-procedure/amp/
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.14
Read Here:
https://www-socinvestigation-com.cdn.ampproject.org/c/s/www.socinvestigation.com/threat-hunting-using-dns-logs-soc-incident-response-procedure/amp/
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.14
Application development teams need to ensure no sensitive material like encryption keys or credentials are stored in definition files, on systems that are exposed or in code that could be exposed.
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.14
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.14
بخشی از خاطرات محمود ضرابی، خلبان جنگ هشتساله
«داریوش عبدالعظیمی یکی از خلبانان جنگنده F-4 و از بچههای خالص و مخلص بود که در یکی از پروازها دچار حادثه میشود و بسیاری از نقاط بدنش میشکند و در بیمارستان نیروی هوایی بستری میشود. من نیز به حکم وظیفه برای احوالپرسی رفتم، دیدم که بدنش از گردن تا پا داخل گچ است و اتاق هم پر است از دوستانی که همگی اظهار لطف داشتند. وقتی اتاق خالی شد به من گفت: «میتوانم چیزی بپرسم؟»
او در آن موقع سروان بود و من سرگرد بودم و مانند یاسینی و دوران خیلی به من اظهار لطف میکرد؛ در واقع انسانهای مؤدبی بودند. گفت:
«من هر موقع وارد خاک عراق میشوم، متوجه میشوم.»
پرسیدم: «چهجوری؟»
گفت: «بلافاصله دهنم تلخ میشود. این موضوع را از سعید فریدونی پرسیدم، او هم همینطور است.»
گفتم: «داریوش من هم همینطور هستم.»
بعدها از یک پزشک این موضوع را پرسیدم، او گفت که این مسئله کاملا طبیعی است و وقتی آدرنالین خون شما بالا میرود، یک سری فعل و انفعالات در بدن رخ میدهد که در واقع میخواهد به شما هشدار بدهد که در منطقه غریبه هستید.»
:) داشتم برای کناردستیم این رو تعریف میکردم و بهش میگفتم یه وقتهایی هست هرجور خودت رو جمع میکنی که نترسی، بههم نریزی، واهمه نداشته باشی، بازم دهنت تلخه.
بازم فیزیولوژی این حقیقت رو به روت میاره که:
«این موقعیت واقعاً ترسناکه، واقعاً خطر داره، حق نداری نترسی!»
-🤲🏻-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.14
«داریوش عبدالعظیمی یکی از خلبانان جنگنده F-4 و از بچههای خالص و مخلص بود که در یکی از پروازها دچار حادثه میشود و بسیاری از نقاط بدنش میشکند و در بیمارستان نیروی هوایی بستری میشود. من نیز به حکم وظیفه برای احوالپرسی رفتم، دیدم که بدنش از گردن تا پا داخل گچ است و اتاق هم پر است از دوستانی که همگی اظهار لطف داشتند. وقتی اتاق خالی شد به من گفت: «میتوانم چیزی بپرسم؟»
او در آن موقع سروان بود و من سرگرد بودم و مانند یاسینی و دوران خیلی به من اظهار لطف میکرد؛ در واقع انسانهای مؤدبی بودند. گفت:
«من هر موقع وارد خاک عراق میشوم، متوجه میشوم.»
پرسیدم: «چهجوری؟»
گفت: «بلافاصله دهنم تلخ میشود. این موضوع را از سعید فریدونی پرسیدم، او هم همینطور است.»
گفتم: «داریوش من هم همینطور هستم.»
بعدها از یک پزشک این موضوع را پرسیدم، او گفت که این مسئله کاملا طبیعی است و وقتی آدرنالین خون شما بالا میرود، یک سری فعل و انفعالات در بدن رخ میدهد که در واقع میخواهد به شما هشدار بدهد که در منطقه غریبه هستید.»
:) داشتم برای کناردستیم این رو تعریف میکردم و بهش میگفتم یه وقتهایی هست هرجور خودت رو جمع میکنی که نترسی، بههم نریزی، واهمه نداشته باشی، بازم دهنت تلخه.
بازم فیزیولوژی این حقیقت رو به روت میاره که:
«این موقعیت واقعاً ترسناکه، واقعاً خطر داره، حق نداری نترسی!»
-🤲🏻-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.14
Udemy Reverse Engineering, Debugging and Malware Analysis - 2021
ثبت نام رايگان تا ١٦ ساعت
Free Enroll Link - https://ssup.co/udemy/com/f7xZ
The analysis provides information about how the malware was able to compromise the system. With this information, network administrators are able to impose policies to mitigate the attack. If the malware was able to enter the system because of a user opening an email attachment that contains JavaScript code, the network administrator would implement the blocking of emails that contain a JavaScript attachment.
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.14
ثبت نام رايگان تا ١٦ ساعت
Free Enroll Link - https://ssup.co/udemy/com/f7xZ
The analysis provides information about how the malware was able to compromise the system. With this information, network administrators are able to impose policies to mitigate the attack. If the malware was able to enter the system because of a user opening an email attachment that contains JavaScript code, the network administrator would implement the blocking of emails that contain a JavaScript attachment.
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.14
Udemy Digital Forensics - Complete Digital Forensics Masterclass
ثبت نام محدود و رايگان
Free Enroll Link - https://ssup.co/udemy/com/Pizf
Digital Forensics is defined as the process of preservation, identification, extraction, and documentation of computer evidence which can be used by the court of law. It is a science of finding evidence from digital media like a computer, mobile phone, server, or network. It provides the forensic team with the best techniques and tools to solve complicated digital-related cases. Digital Forensics helps the forensic team to analyzes, inspect, identifies, and preserve the digital evidence residing on various types of electronic devices.
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.14
ثبت نام محدود و رايگان
Free Enroll Link - https://ssup.co/udemy/com/Pizf
Digital Forensics is defined as the process of preservation, identification, extraction, and documentation of computer evidence which can be used by the court of law. It is a science of finding evidence from digital media like a computer, mobile phone, server, or network. It provides the forensic team with the best techniques and tools to solve complicated digital-related cases. Digital Forensics helps the forensic team to analyzes, inspect, identifies, and preserve the digital evidence residing on various types of electronic devices.
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.14
Udemy Practical Ethical Hacking for Beginners
رايگان و محدود👍🏽
Free Enroll Link - https://ssup.co/udemy/com/m9OY
This course is for anyone interested in becoming an ethical hacker, no matter your current skill level. The curriculum is designed for absolute beginners interested in a career as a security professional, beginning with the absolute basics of penetration testing, and progressing to advanced topics and techniques. Get started today in your Ethical Hacking career.
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.15
رايگان و محدود👍🏽
Free Enroll Link - https://ssup.co/udemy/com/m9OY
This course is for anyone interested in becoming an ethical hacker, no matter your current skill level. The curriculum is designed for absolute beginners interested in a career as a security professional, beginning with the absolute basics of penetration testing, and progressing to advanced topics and techniques. Get started today in your Ethical Hacking career.
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.15
Udemy Process And Threads in Linux
رايگان😁
Free Enroll Link - https://ssup.co/udemy/com/TYoO
This course covers the basics of Process management to the expert level of Process management.Each chapter has lots of programming Practice, tricks, and Interview question discussion.This Course is based on the practical approach with lots of Programming.Lots of hidden and rarely known concepts are explained which you can find very rarely in any online platform or book.
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.15
رايگان😁
Free Enroll Link - https://ssup.co/udemy/com/TYoO
This course covers the basics of Process management to the expert level of Process management.Each chapter has lots of programming Practice, tricks, and Interview question discussion.This Course is based on the practical approach with lots of Programming.Lots of hidden and rarely known concepts are explained which you can find very rarely in any online platform or book.
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.15
Udemy IT Networking Fundamentals with Lab Practicals
رايگان
Free Enroll Link - https://ssup.co/udemy/com/W6Nf
In this 5 Days course, I'll show you step-by-step, the fundamentals of computer networking, teaching you essential computer networking core principles you need to know.If you’re looking to advance or begin your career in Information Technology (IT), this course is a must!
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.15
رايگان
Free Enroll Link - https://ssup.co/udemy/com/W6Nf
In this 5 Days course, I'll show you step-by-step, the fundamentals of computer networking, teaching you essential computer networking core principles you need to know.If you’re looking to advance or begin your career in Information Technology (IT), this course is a must!
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.15
Udemy System Call in Linux
رايگان👍🏽
Free Enroll Link - https://ssup.co/udemy/com/iKrq
The Course is based on the practical approach The course is aimed to teach System Call for beginners, intermediates and even advanced system admins who wish to develop their skills in Linux. Starting all the way from the Linux basics up to how to manage an entire platform.
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.15
رايگان👍🏽
Free Enroll Link - https://ssup.co/udemy/com/iKrq
The Course is based on the practical approach The course is aimed to teach System Call for beginners, intermediates and even advanced system admins who wish to develop their skills in Linux. Starting all the way from the Linux basics up to how to manage an entire platform.
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.15
Udemy CCNA Interview Questions | Get a Job
Free Enroll Link - https://ssup.co/udemy/com/SPMv
Welcome to CCNA Interview Questions. Even after doing CCNA with local institutes its hard to crack network engineer Interviews.
————////////
Udemy DevSecOps : Jenkins CI / CD on AWS from Scratch
Free Enroll Link - https://ssup.co/udemy/com/zDVj
Jenkins is a powerful and flexible automation tool; It is used to automate almost anything.Go faster and learn how to build strong automated processes like Pipelines, CI/CD Workflows and more!Jenkins is the most popular tool to do Continuous Integration and Continuous Delivery of your software
————////////
Udemy IP Addressing and Subnetting - The Easy Way !
Free Enroll Link - https://ssup.co/udemy/com/T9wJ
This course is taught using real world examples and a Blackboard with Color Pens. This class will not use slides to teach, it is a very interactive class with actual examples and ways to implement them. You will actually see how to implement IP addresses and subnets.
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.15
Free Enroll Link - https://ssup.co/udemy/com/SPMv
Welcome to CCNA Interview Questions. Even after doing CCNA with local institutes its hard to crack network engineer Interviews.
————////////
Udemy DevSecOps : Jenkins CI / CD on AWS from Scratch
Free Enroll Link - https://ssup.co/udemy/com/zDVj
Jenkins is a powerful and flexible automation tool; It is used to automate almost anything.Go faster and learn how to build strong automated processes like Pipelines, CI/CD Workflows and more!Jenkins is the most popular tool to do Continuous Integration and Continuous Delivery of your software
————////////
Udemy IP Addressing and Subnetting - The Easy Way !
Free Enroll Link - https://ssup.co/udemy/com/T9wJ
This course is taught using real world examples and a Blackboard with Color Pens. This class will not use slides to teach, it is a very interactive class with actual examples and ways to implement them. You will actually see how to implement IP addresses and subnets.
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.15
https://dfircheatsheet.github.io/
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.15
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.15
dfircheatsheet.github.io
DFIR Cheat Sheet
collection of tools, tips, and resources in an organized way to provide a one-stop place for DFIR folks." />
A framework for secure and scalable network traffic analysis
https://github.com/dreadl0ck/netcap
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.15
https://github.com/dreadl0ck/netcap
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.15
GitHub
GitHub - dreadl0ck/netcap: A framework for secure and scalable network traffic analysis - https://netcap.io
A framework for secure and scalable network traffic analysis - https://netcap.io - dreadl0ck/netcap
Red Team Tactics
Leveraging a 0-day vulnerability in Zoom😁
https://medium.com/manomano-tech/a-red-team-operation-leveraging-a-zero-day-vulnerability-in-zoom-80f57fb0822e
exploit
CVE-2021-37152:
https://github.com/lhashashinl/CVE-2021-37152
// Exploit Accsess network clients by sending packets in wirless TP-LINK and preparing for a mitm attack
Threat Research
1. CVE-2021-35523:
LPE in Securepoint SSL VPN Client 2.0.3
https://bogner.sh/2021/06/local-privilege-escalation-in-securepoint-ssl-vpn-client-2-0-30
2. Detailed overview of tactics, techniques and procedures (TTPs) of the most active REvil partners
https://blog.group-ib.com/revil_raas
WLAN Security
Realtek WiFi Firmware and a Fully 8051-based Keylogger Using RealWOW Technology
https://8051enthusiast.github.io/2021/07/05/002-wifi_fun.html
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.15
Leveraging a 0-day vulnerability in Zoom😁
https://medium.com/manomano-tech/a-red-team-operation-leveraging-a-zero-day-vulnerability-in-zoom-80f57fb0822e
exploit
CVE-2021-37152:
https://github.com/lhashashinl/CVE-2021-37152
// Exploit Accsess network clients by sending packets in wirless TP-LINK and preparing for a mitm attack
Threat Research
1. CVE-2021-35523:
LPE in Securepoint SSL VPN Client 2.0.3
https://bogner.sh/2021/06/local-privilege-escalation-in-securepoint-ssl-vpn-client-2-0-30
2. Detailed overview of tactics, techniques and procedures (TTPs) of the most active REvil partners
https://blog.group-ib.com/revil_raas
WLAN Security
Realtek WiFi Firmware and a Fully 8051-based Keylogger Using RealWOW Technology
https://8051enthusiast.github.io/2021/07/05/002-wifi_fun.html
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.15
Medium
A Red Team Operation Leveraging a zero-day vulnerability in Zoom
ManoMano’s employees — Manas & Manos — play a key role in the protection of the organization and constitute our first barrier. At ManoMano…
دنیا در پنج سال آینده خطرناکتر خواهد شد
خطر حملات سایبری «در مدت ۱۰ سال گذشته شدیدا افزایش داشته است»
آدام فارست
مشاور امنیت ملی بوریس جانسون گفت در پنج سال آینده «احتمالا» جهان خطرناکتر خواهد شد.
سر استیون لاوگروو، مشاور ارشد نخستوزیر بریتانیا در امور امنیتی، هنگام حضور مقابل نمایندگان مجلس در روز دوشنبه، ۵ ژوئیه، از خطرات رو به رشد از طرف قدرتهای خارجی و حملات سایبری سخن گفت.
وقتی توبیاس الوود، نماینده حزب محافظهکار از او پرسید آیا جهان در پنج سال آینده به جایی خطرناکتر تبدیل خواهد شد، سر استیون پاسخ داد: «بسیاری از اتفاقاتی که در حال حاضر شاهد وقوع آنها هستیم روندی منفی دارند.»
مشاور امنیت ملی افزود: «بنابراین میتوانم بگویم که احتمالا خطرناکتر خواهد شد.»
نظرات او همزمان با اظهارات ایالات متحده است که میگوید هکرهای روسی مسئول حمله باجافزاری «عظیم» روز جمعهاند که صدها تجارت در سراسر آمریکا و گوشه و کنار دنیا را هدف قرار داده است.
مایکل گوو، وزیر کابینه، نیز به نمایندگان گفت خطر حملات سایبری «در مدت ۱۰ سال گذشته شدیدا افزایش داشته است» و وعده داد دولت «زمان و انرژی و تمهیدات بیشتری را به امنیت سایبری اختصاص خواهد داد».
آقای گوو که در کمیته راهبرد امنیت ملی مجلس مورد انتقاد نمایندگان قرار گرفت، اعتراف کرد بریتانیا و متحدانش نسبت به حملات سایبری «از دول متخاصم و سایر بازیگران بد این عرصه، چه سازمانهای تروریستی و چه گروههای هرجومرجگرا یا گروههای دیگر، آسیبپذیر»اند.
https://b2n.ir/q10952
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.15
خطر حملات سایبری «در مدت ۱۰ سال گذشته شدیدا افزایش داشته است»
آدام فارست
مشاور امنیت ملی بوریس جانسون گفت در پنج سال آینده «احتمالا» جهان خطرناکتر خواهد شد.
سر استیون لاوگروو، مشاور ارشد نخستوزیر بریتانیا در امور امنیتی، هنگام حضور مقابل نمایندگان مجلس در روز دوشنبه، ۵ ژوئیه، از خطرات رو به رشد از طرف قدرتهای خارجی و حملات سایبری سخن گفت.
وقتی توبیاس الوود، نماینده حزب محافظهکار از او پرسید آیا جهان در پنج سال آینده به جایی خطرناکتر تبدیل خواهد شد، سر استیون پاسخ داد: «بسیاری از اتفاقاتی که در حال حاضر شاهد وقوع آنها هستیم روندی منفی دارند.»
مشاور امنیت ملی افزود: «بنابراین میتوانم بگویم که احتمالا خطرناکتر خواهد شد.»
نظرات او همزمان با اظهارات ایالات متحده است که میگوید هکرهای روسی مسئول حمله باجافزاری «عظیم» روز جمعهاند که صدها تجارت در سراسر آمریکا و گوشه و کنار دنیا را هدف قرار داده است.
مایکل گوو، وزیر کابینه، نیز به نمایندگان گفت خطر حملات سایبری «در مدت ۱۰ سال گذشته شدیدا افزایش داشته است» و وعده داد دولت «زمان و انرژی و تمهیدات بیشتری را به امنیت سایبری اختصاص خواهد داد».
آقای گوو که در کمیته راهبرد امنیت ملی مجلس مورد انتقاد نمایندگان قرار گرفت، اعتراف کرد بریتانیا و متحدانش نسبت به حملات سایبری «از دول متخاصم و سایر بازیگران بد این عرصه، چه سازمانهای تروریستی و چه گروههای هرجومرجگرا یا گروههای دیگر، آسیبپذیر»اند.
https://b2n.ir/q10952
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.15
Why use the RACI Matrix?
RACI Matrix is in the service operation section of ITIL, it’s something you need to map out from the beginning.
If an organization has a low maturity level in ITIL it’s more difficult; equally, the organization might be using different terminology. For example, 'programme manager' might mean something different in different organizations. That person might have oversight but no operational control.
Adopting the RACI Matrix ensures that people know what they’re responsible for and that it’s documented. Assigning responsibility by job role rather than a named person means you have greater consistency after company mergers or when people leave the company.
Achieving this level of clarity isn’t as simple as it sounds and it can be problematic to pin people down about what they do. However, you can educate them on the importance of doing this; if they understand the “why?”, people can be more receptive.
https://lnkd.in/diQpx2A
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.15
RACI Matrix is in the service operation section of ITIL, it’s something you need to map out from the beginning.
If an organization has a low maturity level in ITIL it’s more difficult; equally, the organization might be using different terminology. For example, 'programme manager' might mean something different in different organizations. That person might have oversight but no operational control.
Adopting the RACI Matrix ensures that people know what they’re responsible for and that it’s documented. Assigning responsibility by job role rather than a named person means you have greater consistency after company mergers or when people leave the company.
Achieving this level of clarity isn’t as simple as it sounds and it can be problematic to pin people down about what they do. However, you can educate them on the importance of doing this; if they understand the “why?”, people can be more receptive.
https://lnkd.in/diQpx2A
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.15
lnkd.in
LinkedIn
This link will take you to a page that’s not on LinkedIn
5 Reasons You Should Automate Cyber Security Incident Response
https://www.linkedin.com/posts/alirezaghahrood_5-reasons-you-should-cs-activity-6818103541752725505-7T80
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.15
https://www.linkedin.com/posts/alirezaghahrood_5-reasons-you-should-cs-activity-6818103541752725505-7T80
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.15
Linkedin
5 Reasons You Should cs | Alireza Ghahrood
5 Reasons You Should Automate Cyber Security Incident Response
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.15
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.15
Top Security
Orchestration Use Cases
https://www.linkedin.com/posts/alirezaghahrood_top-security-orchestration-use-cases-activity-6818103763560087552-ceBJ
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.15
Orchestration Use Cases
https://www.linkedin.com/posts/alirezaghahrood_top-security-orchestration-use-cases-activity-6818103763560087552-ceBJ
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.15
Linkedin
Top Security Orchestration Use Cases | Alireza Ghahrood
Top Security
Orchestration Use Cases
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.15
Orchestration Use Cases
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.15
Detection , Respose Planning Best Practices
https://www.linkedin.com/posts/alirezaghahrood_detection-respose-planning-best-practices-activity-6818104136492449792-P_38
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.15
https://www.linkedin.com/posts/alirezaghahrood_detection-respose-planning-best-practices-activity-6818104136492449792-P_38
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.15
Linkedin
Detection , Respose Planning Best Practices | Alireza Ghahrood
Detection , Respose Planning Best Practices
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.15
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.15
What is the ITIL service value system? The ITIL SVS describes how all the components and activities of the organization work together as a system to enable value creation. The SVS is made up of specific inputs, elements, and outputs relevant to service management. The key inputs to the SVS are opportunity and demand.
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.15
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.15
CPE,Certificates (Webinar online)
https://www.linkedin.com/posts/alirezaghahrood_brighttalk-cpe-certificates-activity-6818124056617852928-cXmb
-on edge-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.15
https://www.linkedin.com/posts/alirezaghahrood_brighttalk-cpe-certificates-activity-6818124056617852928-cXmb
-on edge-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.15
Linkedin
Brighttalk-CPE -Certificates | Alireza Ghahrood
CPE,Certificates (Webinar online)
-on edge-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.15
-on edge-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.15