cybersecurity audit

cybersecurity audit

Jan 102019

Effective Internal Audit Procedures Strengthen Your Cybersecurity – Embark Partner Blog

Are you haunted by all the need-to-be-checked boxes that come with an audit? Internal auditors know that not meeting compliance equals more than just a hefty fine, it also opens doors for hackers to infiltrate your environment. We recently teamed up with our partners at Embark to bring you a blog filled with guidelines on […]

Guest Author Image

Guest Author

Guest authors comprise of Armor's strategic partners, technology partners, clients and experts in the cybersecurity industry.

Feb 222018

The Forgotten Cybersecurity Threat: Insider Misuse

| Head of the Threat Resistance Unit

An old proverb states, “the road to hell is paved with good intentions.” We’re willing to bet this proverb wasn’t referring to cybersecurity when it originally came to be. When you think about it, though, it’s highly applicable to one of the biggest threats facing businesses today: insider misuse. Over-trusting and unaware employees act with […]

Troy Dearing

Head of the Threat Resistance Unit

Troy Dearing is the Head of the Threat Resistance Unit and oversees all cyber threat intelligence & threat hunting initiatives. He initially joined Armor’s TRU as a Senior Ethical Hacker leveraging 22 years of expertise in IT and cyber security.

Before joining Armor, Troy was a Computer Network Operator for the NSA, where he was tasked with performing Computer Network Exploitation operations. He retired from the Marine Corps after 20 years of service with distinction serving as a network intelligence subject matter expert, instrumental in the creation of a service level course on network exploitation and analysis. Early in his career he was selected for an internship at the NSA’s Red Team which established his foundation in cyber security expertise. He graduated magna cum laude from the University of Maryland University College attaining his Bachelor of Science in Cybersecurity. Troy is a Certified Information Systems Security Professional (CISSP).

Dec 52017

S.O.S. – Why Shiny Object Syndrome Is the Enemy of Security, Part 1

| Chief Information Security Officer

What is Shiny Object Syndrome and What Does It Have to Do with Information Security? There are many descriptions for S.O.S. out there, but the following may be the most concise I’ve seen: “Shiny Object Syndrome (Objectivius Shinium Syndromus) is defined as the attraction to objects that exhibit a glassy, polished, gleaming or otherwise shiny […]

Kurt Hagerman

Chief Information Security Officer

Kurt Hagerman has over twenty-five years in the field of information technology, including over 6 years as Chief Information Security Officer at Armor. He is responsible for the governance, risk and compliance side of the security mission for customer facing products. He regularly consults with Armor prospects and customers on PCI, HIPAA and financial services regulations and helps them understand how these regulations impact their business and how Armor can help them meet their regulatory responsibilities. Kurt regularly speaks and writes on information security topics in the payments and health care spaces as well as on cloud security. He holds CISA and CISSP certifications and is an active participant with local chapters of ISACA, CSA and ISSA.

Prior to joining Armor, he was a Managing Director and national PCI Practice Director for Coalfire Systems, Inc., a leading IT Security GRC company. Kurt has conducted hundreds of security reviews and audits across a number of industries including the payment space, healthcare, financial services and higher education. During his twenty-five plus years in the field of information technology, he has held a wide number of positions encompassing many IT and security disciplines including: network engineering; systems engineering; security engineering; and IT/Security auditing and compliance.

Apr 242017

Staying Safe on the Homefront: How to Protect Connected Devices

While most organized criminal gangs and botnets are now targeting businesses and online servers, your home still presents a lucrative target for cyber threat actors.  Criminals continue to pursue your bank credentials and have even resorted to orchestrating socially engineered attacks to deceive victims over the phone while posing as Microsoft technical support, tricking victims […]

Oct 132015

National Cyber Security Awareness Month: Connected Communities & Families

Can you believe we’re already into Week 3 of National Cyber Security Awareness Month? Per our amazing friends at the National Cyber Security Alliance, the week’s topic focuses on protecting connected communities and families online. “Wherever we are and however we access the digital world, every step we take to be safer will make ourselves, […]