March 2017

March 2017

Mar 242017

Words of Wisdom: A True Campaign Goes Well Beyond Holding a Single Event

The number one thing I hear from partners when I ask them about their marketing campaign strategy is that they have an upcoming event planned. I cringe a little upon hearing this because there is a simple truth I’ve learned over the years – an event is not a campaign! While events are often seen […]

Mar 222017

The Battle for Cloud Security: Taking Back Access and Time

| Chief Information Security Officer

Learn how the battle for your cloud security hinges on two factors: access and time to your network. Controlling both can block cyber threat actors.

Kurt Hagerman

Chief Information Security Officer

Kurt Hagerman has over twenty-five years in the field of information technology, including over 6 years as Chief Information Security Officer at Armor. He is responsible for the governance, risk and compliance side of the security mission for customer facing products. He regularly consults with Armor prospects and customers on PCI, HIPAA and financial services regulations and helps them understand how these regulations impact their business and how Armor can help them meet their regulatory responsibilities. Kurt regularly speaks and writes on information security topics in the payments and health care spaces as well as on cloud security. He holds CISA and CISSP certifications and is an active participant with local chapters of ISACA, CSA and ISSA.

Prior to joining Armor, he was a Managing Director and national PCI Practice Director for Coalfire Systems, Inc., a leading IT Security GRC company. Kurt has conducted hundreds of security reviews and audits across a number of industries including the payment space, healthcare, financial services and higher education. During his twenty-five plus years in the field of information technology, he has held a wide number of positions encompassing many IT and security disciplines including: network engineering; systems engineering; security engineering; and IT/Security auditing and compliance.

Mar 142017

Data Classification and You: How to Improve Organizational Efficiencies and Security

| Head of the Threat Resistance Unit

In the era of big data and analytics, organizations are inundated with information, from business critical intellectual property, to routine employee memos. The diversity of this data makes effective management and classification essential to avoid being overwhelmed under a mountain of ones and zeroes. Data classification is a system of identifying and tagging data so […]

Troy Dearing

Head of the Threat Resistance Unit

Troy Dearing is the Head of the Threat Resistance Unit and oversees all cyber threat intelligence & threat hunting initiatives. He initially joined Armor’s TRU as a Senior Ethical Hacker leveraging 22 years of expertise in IT and cyber security.

Before joining Armor, Troy was a Computer Network Operator for the NSA, where he was tasked with performing Computer Network Exploitation operations. He retired from the Marine Corps after 20 years of service with distinction serving as a network intelligence subject matter expert, instrumental in the creation of a service level course on network exploitation and analysis. Early in his career he was selected for an internship at the NSA’s Red Team which established his foundation in cyber security expertise. He graduated magna cum laude from the University of Maryland University College attaining his Bachelor of Science in Cybersecurity. Troy is a Certified Information Systems Security Professional (CISSP).

Mar 92017

Best Practices For Lowering Ransomware Risk

Jeff Schilling discusses how to lower your ransomware risk. The first step is to avoid falling prey in the first place. That means teaching your entire organization – from IT staff to executive management – how not to be a victim.

Mar 12017

Armor Analysis – Cloudbleed: Lessons learned

About two weeks ago, the Google Project Zero team found a buffer overflow problem with a Cloudflare product that helps its customers protect against content scraping programs that pulls copyrighted material to aggregators. According to published reports, a line of code should have had an “=<” instead of an “==.” While seemingly innocuous, this single […]