Twitter | Search | |
stefan voss
Head of Help customers recover from destructive cyber attacks.
1,773
Tweets
1,382
Following
1,219
Followers
Tweets
stefan voss retweeted
Sherry Davenport Jan 16
As the number of successful cyber-attacks grows, organizations need to consider their recovery solution to deal with today’s cyber threat landscape. Learn how and can provide your environments on premise and in the with and .
Reply Retweet Like
stefan voss Jan 16
look at these handsome studs! Well one of them. Always a great day meeting my friend at the
Reply Retweet Like
stefan voss Jan 1
Replying to @sakacc
Well said Chad. Happy New Year!
Reply Retweet Like
stefan voss Nov 27
Replying to @chriso59 @devo_Inc
Wow look at
Reply Retweet Like
stefan voss Nov 7
Reply Retweet Like
stefan voss Nov 2
Replying to @gtvansiclen
I think you should go for it. Great hair you have after all!
Reply Retweet Like
stefan voss Nov 1
Replying to @CGrantMA
Nice! I figured you’d know
Reply Retweet Like
stefan voss Oct 31
Happy Halloween
Reply Retweet Like
stefan voss Oct 31
what’s next? is critical but in addition to understanding data patterns we need to understand motives of the attacks.
Reply Retweet Like
stefan voss Oct 31
When designing an based system we are not designing for Spock...we are designing for Homer Simpson
Reply Retweet Like
stefan voss Oct 31
“When dealing with security you are dealing with a complex adaptive system” will shape the landscape
Reply Retweet Like
stefan voss Oct 31
Bad guys are already in the network. We just need to minimize their impact. Organizations deploy crisis teams focused on what’s your runbook?
Reply Retweet Like
stefan voss Oct 31
Is cyber insurance useful? Yes but it is not prophylactic. “you can’t use insurance to prevent the flu. You can use it for treatment of the symptoms”
Reply Retweet Like
stefan voss Oct 31
How useful are risk maturity models? They help provoke and initiate the conversation. But people spend too much time trying to quantify risk in $$ terms. Rather focus on an order of magnitude discussion (S, M, L, XL)
Reply Retweet Like
stefan voss Oct 31
What are Crown Jewels for you? Two areas: 1) data related and 2) critical infrastructure. Ex: if your domain controller is attacked you may lose your ability to do business.
Reply Retweet Like
stefan voss Oct 31
Reply Retweet Like
stefan voss Oct 31
How to have a board level conversation about ? Start with education. Many do not bring a technology background
Reply Retweet Like
stefan voss Oct 31
Thank you for a great conference on securing the enterprise
Reply Retweet Like
stefan voss Oct 31
Great blog post In the face of today's cyberthreats, resiliency trumps prevention
Reply Retweet Like
stefan voss Oct 29
So if the previous song didn’t convince you that is the best band ever does this help? - Since I've Been Loving You Live (HD)
Reply Retweet Like