<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[BlueDragon Insights]]></title><description><![CDATA[Strengthen Your Cybersecurity Management, Compliance, and Resilience]]></description><link>https://insights.bluedragonsecurity.com</link><image><url>https://substackcdn.com/image/fetch/$s_!8wBk!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F467567c2-6aec-493e-8cc8-1eeda01142cd_1280x1280.png</url><title>BlueDragon Insights</title><link>https://insights.bluedragonsecurity.com</link></image><generator>Substack</generator><lastBuildDate>Thu, 09 Apr 2026 15:05:46 GMT</lastBuildDate><atom:link href="https://insights.bluedragonsecurity.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Jetro WILS]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[bluedragoninsights@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[bluedragoninsights@substack.com]]></itunes:email><itunes:name><![CDATA[Jetro]]></itunes:name></itunes:owner><itunes:author><![CDATA[Jetro]]></itunes:author><googleplay:owner><![CDATA[bluedragoninsights@substack.com]]></googleplay:owner><googleplay:email><![CDATA[bluedragoninsights@substack.com]]></googleplay:email><googleplay:author><![CDATA[Jetro]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[How I Learned Backups Carry Risk]]></title><description><![CDATA[Data is the lifeblood of our organizations.]]></description><link>https://insights.bluedragonsecurity.com/p/how-i-learned-backups-carry-risk</link><guid isPermaLink="false">https://insights.bluedragonsecurity.com/p/how-i-learned-backups-carry-risk</guid><dc:creator><![CDATA[Jetro]]></dc:creator><pubDate>Mon, 25 Aug 2025 06:01:18 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/170966227/d3f2422525e1286d7747ae804cdf1053.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p>Imagine this: you arrive at the office only to discover that ransomware has locked up your systems. You think you're safe because you have your backups, only to find out that your backups are also encrypted &#8212; or even worse, deleted.</p><h3>HOW IS THIS POSSIBLE?</h3><p>Attackers deliberately target your backups to render them unusable. They do this in three ways:</p><p>&#128312; by deleting your backup<br>&#128312; by encrypting your backup<br>&#128312; by modifying your backup so that when you restore it, you have the wrong data</p><h3>WORM AS PROTECTION</h3><p>So how do we protect ourselves from this threat? Enter WORM. WORM stands for "Write Once, Read Many." It's the concept of immutable storage. Immutable means you cannot change it.</p><p>The idea behind it is that if you take your backup and place it in immutable storage &#8212; meaning you write it once, and then it can no longer be touched, changed, or altered in any way, shape, or form &#8212; your data remains protected. Modifying your backup would result in a new version, while your original remains intact.</p><p>WORM is a very important part of any data protection strategy. Having immutable backup is not just about compliance. It's also about &#120295;&#120293;&#120296;&#120294;&#120295;:</p><p>Can you really trust your backups? Can you really trust that data &#8212; such as sensitive customer information, financial information, and intellectual property &#8212; remains intact, so that when the time comes and you have to restore your backup, the data is still the same?</p><p>Or do you run the risk that it has been tampered with?</p><h3>SO WHAT?</h3><p>So having WORM and immutable storage is not just about security and compliance, but also about trusting the authenticity and the veracity of the data. And so here's the real challenge: is WORM part of your data protection strategy today? Has it been implemented in a way that actually does the job? Are your backups stored immutably? Are they protected from accidental deletion?</p><p>&#128073; If not, make WORM part of your data protection strategy today. Implement immutable storage to ensure your backups remain safe and secure.</p><p>Stay sharp, <br>Jetro</p><p>PS: Here's the NIST CSF 2.0 reference to this topic: PR.DS-11 (PROTECT: Data Security). And CyFun: PR.IP-4 (PROTECT: Information Protection Processes and Procedures).</p><div><hr></div><p>&#128276; My goal is to help as many European organizations as possible turn their fragmented cybersecurity into well-governed cyber resilience.<br><br>Here&#8217;s how I usually help:<br><br>&#128312; Fractional CISO services<br>&#128312; Cyber risk assessments<br>&#128312; Certified training<br>&#128312; Keynotes<br><br>&#128073; Want to talk? Reach me at: <strong><a href="mailto:ciso@bluedragonsecurity.com">ciso@bluedragonsecurity.com</a></strong> :: +32 495 81 47 41 (WhatsApp OK)</p><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://insights.bluedragonsecurity.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading BlueDragon Insights! Subscribe for free to receive new posts.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[Why Regulations Can’t Protect Us]]></title><description><![CDATA[In Europe, we're proud of our strong regulations, such as GDPR and NIS2.]]></description><link>https://insights.bluedragonsecurity.com/p/why-regulations-cant-protect-us</link><guid isPermaLink="false">https://insights.bluedragonsecurity.com/p/why-regulations-cant-protect-us</guid><dc:creator><![CDATA[Jetro]]></dc:creator><pubDate>Mon, 18 Aug 2025 06:01:24 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/170965703/a502bedcd3a8cf3c0dd5e94e10ba3140.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p>In Europe, we're proud of our strong regulations, such as GDPR and NIS2. They set important standards for organizations and hold them accountable.</p><h3>THE REALITY</h3><p>But here's the reality: legislation doesn't protect us.</p><p>You might say, "Jetro, what do you mean?" Well, legislation doesn't protect us because it cannot stop a threat from being carried out. Legislation serves as a deterrent, scaring off potential bad actors. And it's also good as a punitive measure after the fact.</p><p>But in the heat of the battle, there's no protection of the law, because the attack is actually happening.</p><p>Let me give you an example. The law says: "You shall not steal." That's all great. But if I park my car in the middle of the city, leave it unlocked for a whole day and night, and come back the next day, I&#8217;ll probably find it broken into or even stolen. So even though the law says "you shall not steal," there's no real protection in that moment. The law alone won't stop someone from taking it.</p><h3>TECHNICAL CONTROLS</h3><p>What we need are technical controls. Technical controls really implement security. They're the real protection. In the car example, I can lock the doors, install an alarm, use reinforced windows, or even leave my bulldog inside the car to welcome those thieves. Those are real protective measures. And the law? It&#8217;s good before and after the fact.</p><p>The same idea applies to cybersecurity. A company can have a policy that says: "No USB drives allowed." That sounds great. But if the USB ports are not disabled, a bad actor can still use their USB drive to copy sensitive information.</p><p>Or a company might have a rule that says: "No unauthorized access behind this door." Again, sounds good. However, if the company fails to enforce it with badges, scanners, guards, cameras, or biometric scanners, anyone can walk in and gain access.</p><p>You need technical controls to keep you safe. Laws and regulations are great before and after. In cybersecurity, technical controls include measures such as:</p><p>&#128312; Encryption<br>&#128312; Multi-factor authentication<br>&#128312; Real-time monitoring<br>&#128312; Identity and access management<br>&#128312; And much more</p><h3>SO WHAT?</h3><p>Laws and regulations are good and have their place, but they can't stop an attack when it&#8217;s happening. For that, you need technical controls.</p><p>My challenge to you is the following: Are you relying too much on policies and regulations? In which areas do you still need to deploy technical controls for real protection?</p><p>&#128073; Remember, modern cybersecurity management is Documentation (policies) &#120276;&#120289;&#120279; Implementation (controls).</p><p>Stay sharp,<br>Jetro</p><div><hr></div><p>&#128276; My goal is to help as many European organizations as possible turn their fragmented cybersecurity into well-governed cyber resilience.<br><br>Here&#8217;s how I usually help:<br><br>&#128312; Fractional CISO services<br>&#128312; Cyber risk assessments<br>&#128312; Certified training<br>&#128312; Keynotes<br><br>&#128073; Want to talk? Reach me at: <strong><a href="mailto:ciso@bluedragonsecurity.com">ciso@bluedragonsecurity.com</a></strong> :: +32 495 81 47 41 (WhatsApp OK)</p><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://insights.bluedragonsecurity.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading BlueDragon Insights! Subscribe for free to receive new posts.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[How I Explain Cloud Risk to CEOs]]></title><description><![CDATA[Most organizations believe that moving to the public cloud automatically makes them secure.]]></description><link>https://insights.bluedragonsecurity.com/p/how-i-explain-cloud-risk-to-ceos</link><guid isPermaLink="false">https://insights.bluedragonsecurity.com/p/how-i-explain-cloud-risk-to-ceos</guid><dc:creator><![CDATA[Jetro]]></dc:creator><pubDate>Thu, 14 Aug 2025 07:39:58 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/170954326/8b1c1f9c8fe525dfa1c4b7f330834e5a.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p>Most organizations believe that moving to the public cloud automatically makes them secure. That's not the case. Why? Because, even while the hyperscale cloud provider is responsible for building the most secure platform worldwide, you also have a responsibility.</p><p>In cloud security, we call this the shared responsibility model. There's a responsibility for the cloud provider and the cloud consumer. That&#8217;s you.</p><p>Now you may ask, "Jetro, what am I always responsible for?" Three things.</p><h2>Information &amp; Data</h2><p>You're always responsible for your information and data. So whatever you put into the cloud, you have to make sure that you back it up, for example. There's no default backup. Yes, hyperscale cloud providers often have these nice features that automatically back up your data, but you have to activate and configure them. That's the whole point.</p><p>When I give training, I often ask people: "How many of you are using OneDrive or Google Drive?" All the hands go up. And then I ask, "How many of you backup their data from OneDrive and Google Drive?" And they&#8217;re like, "Wait, I have to backup OneDrive?" Yes, because the cloud provider is responsible for having a secure platform available, but you're responsible for the data you put there. So yes, you need to back up your OneDrive, Google Drive, and cloud storage.</p><h2>Devices (Endpoints)</h2><p>The second thing you're always responsible for is devices, all the endpoints. Think of smartphones, laptops, and servers; they all connect to the cloud. You have to keep them up to date, patched, and secured. If not, your endpoint is at risk, and therefore your data in the cloud is at risk. Keeping your devices and assets up to date is very important.</p><h3>Accounts &amp; Identities</h3><p>The third thing you're always responsible for is accounts and identities. Remember, in the cloud, identity is your first line of defense. It's a public cloud, meaning everybody could theoretically connect to your environment. But who manages the identities? You. Who's responsible for keeping those identities up to date? You.</p><p>Remember, identities are not just people &#8212; they include devices, APIs, applications, and of course, natural people. They all have an identity, and with an identity comes access privileges. So you're responsible for keeping your identities up to date and well privileged &#8212; not overprivileged.</p><p>In summary, yes, public cloud is more secure than on-premise if configured well. But you're always responsible for three things:</p><p>&#128312; Information &amp; Data <br>&#128312; Devices or Endpoints<br>&#128312; Accounts &amp; Identities</p><p>Stay sharp, <br>Jetro</p><div><hr></div><p>&#128276; My goal is to help as many European organizations as possible turn their fragmented cybersecurity into well-governed cyber resilience.<br><br>Here&#8217;s how I usually help:<br><br>&#128312; Fractional CISO services<br>&#128312; Cyber risk assessments<br>&#128312; Certified training<br>&#128312; Keynotes<br><br>&#128073; Want to talk? Reach me at: <strong><a href="mailto:ciso@bluedragonsecurity.com">ciso@bluedragonsecurity.com</a></strong> :: +32 495 81 47 41 (WhatsApp OK)</p><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://insights.bluedragonsecurity.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading BlueDragon Insights! Subscribe for free to receive new posts.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[Case Study: KBC’s Data Leak and the Unseen Threat in European Supply Chains]]></title><description><![CDATA[How a human error at a third-party vendor exposed 5,000 customers &#8212; and why it&#8217;s a wake-up call for every European organisation.]]></description><link>https://insights.bluedragonsecurity.com/p/case-study-kbcs-data-leak-and-the</link><guid isPermaLink="false">https://insights.bluedragonsecurity.com/p/case-study-kbcs-data-leak-and-the</guid><dc:creator><![CDATA[Jetro]]></dc:creator><pubDate>Sun, 25 May 2025 11:39:34 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!fPMH!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf1c566d-4bb1-46e1-a9eb-4a329d2b52ab_2000x1125.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!fPMH!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf1c566d-4bb1-46e1-a9eb-4a329d2b52ab_2000x1125.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!fPMH!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf1c566d-4bb1-46e1-a9eb-4a329d2b52ab_2000x1125.png 424w, https://substackcdn.com/image/fetch/$s_!fPMH!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf1c566d-4bb1-46e1-a9eb-4a329d2b52ab_2000x1125.png 848w, https://substackcdn.com/image/fetch/$s_!fPMH!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf1c566d-4bb1-46e1-a9eb-4a329d2b52ab_2000x1125.png 1272w, https://substackcdn.com/image/fetch/$s_!fPMH!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf1c566d-4bb1-46e1-a9eb-4a329d2b52ab_2000x1125.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!fPMH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf1c566d-4bb1-46e1-a9eb-4a329d2b52ab_2000x1125.png" width="1456" height="819" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/cf1c566d-4bb1-46e1-a9eb-4a329d2b52ab_2000x1125.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2057097,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://insights.bluedragonsecurity.com/i/164401143?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf1c566d-4bb1-46e1-a9eb-4a329d2b52ab_2000x1125.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!fPMH!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf1c566d-4bb1-46e1-a9eb-4a329d2b52ab_2000x1125.png 424w, https://substackcdn.com/image/fetch/$s_!fPMH!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf1c566d-4bb1-46e1-a9eb-4a329d2b52ab_2000x1125.png 848w, https://substackcdn.com/image/fetch/$s_!fPMH!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf1c566d-4bb1-46e1-a9eb-4a329d2b52ab_2000x1125.png 1272w, https://substackcdn.com/image/fetch/$s_!fPMH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf1c566d-4bb1-46e1-a9eb-4a329d2b52ab_2000x1125.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><em>(Based on information published in De Tijd, 22&#8211;23 May 2025)</em></p><p>In May 2025, KBC Securities Services &#8212; a subsidiary of the Belgian financial group KBC &#8212; confirmed a major data incident involving <strong>approximately 5,000 clients</strong>. Due to a human error at an <strong>external service provider</strong>, clients received documents intended for other individuals. These included portfolio positions, internal service rates, and other sensitive financial information.</p><p>This was not a breach caused by malware or a cyberattack. It was a <strong>supply chain failure</strong>, and a deeply human one &#8212; with <strong>trust, confidentiality, and reputational risk</strong> on the line.</p><p>Some affected clients could easily identify other investors based on the leaked data. One customer even noted that he recognised a peer as a shareholder of a well-known company and that the portfolio in question was &#8220;not small.&#8221;</p><p>KBC apologised and immediately launched an internal investigation. As of now, no compensation has been announced, and the name of the external service provider involved has not been disclosed publicly.</p><div><hr></div><h2>A Familiar Pattern: Data Exposure Without Hacking</h2><p>KBC Securities Services provides custody and securities-related services to asset managers, private banks, institutional investors, and family offices. During the annual dispatch of fee statements, a <strong>misconfiguration or mislabeling of client records</strong> by a third-party vendor caused documents to be sent to unintended recipients.</p><p>According to <em>De Tijd</em>, this means:</p><ul><li><p>Specific clients <strong>gained insight into competitors&#8217; portfolios</strong></p></li><li><p>Some documents contained <strong>commercially sensitive data</strong></p></li><li><p>The incident impacted a &#8220;limited number of clients&#8221; &#8212; but <strong>5,000 in total were affected</strong></p></li></ul><div><hr></div><h2>The Hidden Risk: Third-Party Supplier Security</h2><p>This case highlights a well-known yet still underappreciated reality: <strong>most modern breaches don&#8217;t stem from firewall breaches but from weak processes and poor supplier governance</strong>.</p><p>Two European regulations put this into sharp focus:</p><h3><strong>NIS2</strong> (for essential &amp; important entities):</h3><ul><li><p>Requires organisations to <strong>identify and manage supply chain cyber risks</strong></p></li><li><p>Demands <strong>oversight of ICT service providers</strong>, especially in critical services</p></li><li><p>Emphasises <strong>incident reporting</strong>, including for vendor-related events</p></li></ul><h3><strong>DORA</strong> (for financial entities):</h3><ul><li><p>Imposes strict rules on <strong>third-party ICT risk management</strong></p></li><li><p>Classifies vendors as &#8220;critical&#8221; or &#8220;non-critical&#8221; with different oversight duties</p></li><li><p>Requires notification of <strong>major ICT incidents within 4 hours</strong></p></li><li><p>Mandates <strong>exit strategies, audit rights, and resilience testing</strong></p></li></ul><p>In this case:</p><ul><li><p>A third-party contractor linked documents to the wrong recipients</p></li><li><p>KBC was still held accountable, despite the error occurring externally</p></li><li><p>Regulators may investigate under <strong>GDPR</strong>, <strong>NIS2</strong>, and <strong>DORA</strong></p></li></ul><div><hr></div><h2>What the Law Requires &#8212; and Reality Often Ignores</h2><p>It&#8217;s not enough to sign contracts or fill in due diligence checklists. Under modern EU legislation, organisations are expected to:</p><ul><li><p>Understand how data flows across their extended digital supply chain</p></li><li><p>Proactively <strong>govern</strong>, <strong>monitor</strong>, and <strong>audit</strong> key ICT suppliers</p></li><li><p>Include <strong>data protection and breach clauses</strong> in vendor agreements</p></li><li><p>Run <strong>simulations and tabletop exercises</strong> that include vendor-related failures</p></li></ul><p>KBC is now facing the real-world consequence of what happens when this isn&#8217;t watertight &#8212; even if the organisation&#8217;s internal systems remained uncompromised.</p><div><hr></div><h2>Leadership Actions to Take Now</h2><p>This incident can &#8212; and should &#8212; be seen as a <strong>learning opportunity</strong> for every European organisation that handles sensitive data or outsources digital services.</p><p>Here&#8217;s what leaders should focus on:</p><ol><li><p><strong>Map Your Supplier Ecosystem</strong></p><p>Identify all ICT, SaaS, and data-related service providers &#8212; not just Tier 1.</p></li><li><p><strong>Conduct Real Due Diligence</strong></p><p>Ask for evidence of security practices, audits, breach logs, and recovery processes.</p></li><li><p><strong>Strengthen Contracts</strong></p><p>Add clauses for breach reporting, data segregation, audit rights, and minimum standards.</p></li><li><p><strong>Include Vendors in Incident Response Exercises</strong></p><p>Don&#8217;t stop at phishing drills &#8212; simulate a vendor error with client impact.</p></li><li><p><strong>Link This to Board-Level Risk</strong></p><p>Supplier risk is now board-level accountability under both NIS2 and DORA.</p></li></ol><div><hr></div><h2>Final Thought: The Next Mistake May Be Invisible Until It&#8217;s Too Late</h2><p>KBC&#8217;s fast response and transparency are commendable. But even with compliance training, automated checks, and layered controls, <strong>one human error at one vendor</strong> triggered a <strong>regulatory, reputational, and operational crisis</strong>.</p><p>This wasn&#8217;t about firewalls. It was about <strong>governance</strong>.</p><p>The lesson?</p><p><strong>Third-party security is not a back-office issue. It is a core part of your business resilience.</strong></p><div><hr></div><h2>What You Can Do Next</h2><p>Based on recent assessments, most European organizations still lack sufficient visibility and control over their ICT service providers.</p><p>To help you get started, we&#8217;ve developed a concise <strong>Third-Party Security Maturity Checklist</strong> to assess your readiness for NIS2 and DORA.</p><p>&#9989; Want to benchmark your practices?<br>&#9989; Need support with vendor governance or contract clauses?<br>&#9989; Curious about real-world resilience planning?</p><p>&#128073; Call us or reach out via WhatsApp: +32495814741</p><div><hr></div><p><strong>About the Author</strong><br>I&#8217;m Jetro WILS. I help mid-sized organisations and critical sectors build real cyber resilience &#8212; not just checkboxes &#8212; by aligning security governance with NIS2, DORA, and modern cloud environments.</p><p>As a Chief Information Security Officer, I Strengthen Cybersecurity Management, Compliance, and Resilience for European Organizations.</p><div><hr></div><p><strong>Disclaimer</strong></p><p><em>This article is based on publicly available information from De Tijd (22&#8211;23 May 2025) and does not represent an official investigation or legal conclusion.</em></p><p><em>Sources: </em></p><ul><li><p><em><a href="https://www.tijd.be/ondernemen/banken/kbc-riskeert-stevige-reputatieschade-na-datalek/10608733.html">https://www.tijd.be/ondernemen/banken/kbc-riskeert-stevige-reputatieschade-na-datalek/10608733.html</a></em></p></li><li><p><em><a href="https://www.tijd.be/ondernemen/banken/data-van-duizenden-klanten-gelekt-bij-effectendochter-kbc-bank/10608636.html">https://www.tijd.be/ondernemen/banken/data-van-duizenden-klanten-gelekt-bij-effectendochter-kbc-bank/10608636.html</a></em></p></li></ul><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://insights.bluedragonsecurity.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading BlueDragon Insights! Subscribe for free to receive new insights.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[My Answer to the Cloud Security Debate]]></title><description><![CDATA[Many organizations still believe that on-premise is more secure than cloud.]]></description><link>https://insights.bluedragonsecurity.com/p/cloud-or-on-prem-the-shocking-truth</link><guid isPermaLink="false">https://insights.bluedragonsecurity.com/p/cloud-or-on-prem-the-shocking-truth</guid><dc:creator><![CDATA[Jetro]]></dc:creator><pubDate>Wed, 30 Apr 2025 16:06:43 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/162543954/1f2f2e13f7bddd0e100888918c18ea8b.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p>Many organizations still believe that on-premise is more secure than cloud. The reason for that thinking is that they can walk into their server room, see all the equipment, see the lights blinking, touch the cables, and say: "My data is here!" </p><p>Now, they're moving to the cloud, and suddenly, the equipment fades away, their data is somewhere in the cloud, and they're thinking, "Is public cloud secure enough to store my data?" And that&#8217;s because they have less control. </p><h2>It's a fair question to ask.</h2><p>But here is what I always say to those clients: Public cloud, if configured well, is more secure than on-premises. But if misconfigured, your data is on the street.</p><p>So why is that? These hyperscale cloud providers are intrinsically motivated to build the most secure and scalable platform available. They want to host many customers worldwide, so if their platform is not secure, it will kill their business case. They are invested in having the most secure platform.</p><p>The second reason a public cloud is more secure than on-premises is the security teams that monitor it 24/7 at these hyperscale cloud providers. They can quickly locate and respond to security incidents and then roll out these security improvements worldwide.</p><p>Let me give you an example. If something's happening in Azure Australia, here in Europe, we're sleeping; it's the middle of the night, but in Australia, something's going on with Azure. They will remediate that incident. They will even push out an update across Azure worldwide. So here in Azure West-Europe, we get these security benefits as well, while even sleeping.</p><p><strong>So by joining a hyperscale cloud provider, we are falling under the protective umbrella of their cybersecurity teams. </strong></p><p>So, first, they have a vested interest in building the most secure platform available. It&#8217;s their core business. Second, they have 24/7 SOC teams that are always up-to-date, keeping track of what's happening and publishing these updates worldwide.</p><p><strong>So, a local security incident triggers an update for the whole global ecosystem.</strong> That&#8217;s one of the benefits.</p><h2>Conclusion</h2><p>So, to wrap up, why is a public cloud by default more secure than on-premises? </p><ol><li><p>Because these hyperscale cloud providers are vested in building the most secure platform, it&#8217;s their economic engine and whole business. </p></li><li><p>They monitor what's going on 24/7 worldwide. You can benefit from the updates from the other side of the world. So that is the protective umbrella of a hyperscale cloud provider.</p></li></ol><h2>All I just said is one half of the story. </h2><p>Yes, the hyperscale cloud provider is responsible for building the most secure platform they can. But on the other hand, you are responsible for configuring that platform as securely as possible. So with a misconfiguration, your data is on the streets. But if you configure it well, it is more secure than on-premises.</p><p><strong>How do misconfigurations happen?</strong> Well, that is something for another video. </p><p>Stay sharp,<br>Jetro</p><div><hr></div><p>&#128276; My goal is to help as many European organizations as possible turn their fragmented cybersecurity into well-governed cyber resilience.<br><br>Here&#8217;s how I usually help:<br><br>&#128312; Fractional CISO services<br>&#128312; Cyber risk assessments<br>&#128312; Certified training<br>&#128312; Keynotes<br><br>&#128073; Want to talk? Reach me at: <strong><a href="mailto:ciso@bluedragonsecurity.com">ciso@bluedragonsecurity.com</a></strong> :: +32 495 81 47 41 (WhatsApp OK)</p><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://insights.bluedragonsecurity.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading BlueDragon Insights! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[S02E04 Azure Integration fo Business - Josh Garverick]]></title><description><![CDATA[Joshua Garverink, co-author of the Azure Integration Guide for Business, discusses journey into the tech industry, his experiences with Azure, and the importance of cloud integration for IT leaders.]]></description><link>https://insights.bluedragonsecurity.com/p/s02e04-azure-integration-fo-business-99c</link><guid isPermaLink="false">https://insights.bluedragonsecurity.com/p/s02e04-azure-integration-fo-business-99c</guid><dc:creator><![CDATA[Jetro]]></dc:creator><pubDate>Tue, 29 Apr 2025 05:00:00 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/162544852/f7f83e0c9a5424b1f07e2d1a84808547.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p>Joshua Garverink, co-author of the Azure Integration Guide for Business, discusses journey into the tech industry, his experiences with Azure, and the importance of cloud integration for IT leaders.</p><p>The conversation covers various themes including the benefits of moving to Azure, the cultural shifts required for cloud adoption, architectural considerations for cloud migration, the significance of network design, and the financial implications of cloud services through FinOps.</p><p>In this conversation, Jetro and Josh discuss the critical aspects of cloud operations, focusing on Cloud FinOps, automation, cybersecurity, and the Azure ecosystem.</p><p>They emphasize the importance of investing in skills for IT operations, the role of automation in enhancing security, and best practices for OLTP systems in Azure.</p><p>The discussion also covers the significance of governance and security in cloud operations, the reality of serverless computing, and the future of Azure with technological innovations.</p><p>CHAPTERS</p><p>(00:00:00) INTRO</p><p>(00:00:42) Introduction to Azure Integration and Author Background</p><p>(00:05:33) Unlocking Opportunities with Azure for IT Leaders</p><p>(00:10:09) Cultural Shifts in Cloud Adoption</p><p>(00:12:04) Architectural Considerations for Cloud Migration</p><p>(00:16:39) The Importance of Network Design in Azure</p><p>(00:21:50) Understanding Cloud Costs and FinOps</p><p>(00:25:12) Understanding Cloud FinOps and Cost Management</p><p>(00:25:45) The Importance of Automation in Cloud Operations</p><p>(00:30:33) Investing in Skills for IT Operations</p><p>(00:31:38) The Role of Automation in Cybersecurity</p><p>(00:32:09) Best Practices for OLTP Systems in Azure</p><p>(00:35:07) Exploring the Azure Ecosystem for Data Analytics</p><p>(00:37:33) Serverless Computing: Hype or Reality?</p><p>(00:43:28) Governance and Security in Cloud Operations</p><p>(00:45:47) The Future of Azure and Technological Innovations</p>]]></content:encoded></item><item><title><![CDATA[S02E03 Cybersecurity Architecture in Azure - Graham Gold]]></title><description><![CDATA[SUMMARY]]></description><link>https://insights.bluedragonsecurity.com/p/s02e03-cybersecurity-architecture-b37</link><guid isPermaLink="false">https://insights.bluedragonsecurity.com/p/s02e03-cybersecurity-architecture-b37</guid><dc:creator><![CDATA[Jetro]]></dc:creator><pubDate>Tue, 15 Apr 2025 05:00:00 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/162544853/96395844fbeb2f1d0ed9181dc2ab858d.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p><strong>SUMMARY</strong></p><p>Graham Gold, co-author of the Microsoft Cybersecurity Architect Exam, discusses extensive background in IT, the relevance of cybersecurity architecture in cloud environments, and the evolving landscape of cybersecurity practices.</p><p>Key topics include the importance of identity management, the challenges of hybrid cloud environments, and strategies for assessing and improving security in cloud applications.</p><p>The conversation emphasizes the need for visibility, risk management, and a proactive approach to cybersecurity. Moreover Graham Gold discusses critical aspects of modern security architecture, emphasizing the importance of least privilege, segregation of duties, and the roles of SIEM and SOAR in enhancing security operations.</p><p>He highlights the necessity of automation in security processes to keep pace with the rapid changes in cloud environments.</p><p>The discussion also covers the state of security awareness in financial services, navigating compliance in the cloud, budgeting for security investments, and the shared responsibility model in cloud security.</p><p>Finally, Graham provides insights on preparing for the SC-100 exam and his future endeavors in the field of security.</p><p><strong>CHAPTERS</strong></p><p>(00:00:00) INTRO</p><p>(00:00:40) Introduction to Cybersecurity Architecture</p><p>(00:03:57) Understanding Microsoft Certification Levels</p><p>(00:05:52) The Relevance of Cybersecurity in Cloud</p><p>(00:08:03) Shifts in Cybersecurity Architecture with Cloud</p><p>(00:11:11) Identity as the New Perimeter</p><p>(00:15:59) Challenges in Hybrid Cloud Environments</p><p>(00:20:05) Making Sense of Data in the Cloud</p><p>(00:24:57) Assessing Security in Cloud Environments</p><p>(00:31:36) Implementing Defense in Depth Strategies</p><p>(00:33:10) Understanding Least Privilege and Segregation of Duties</p><p>(00:33:38) The Role of SIEM and SOAR in Security Architecture</p><p>(00:36:01) Automation in Security Operations</p><p>(00:38:36) The State of Security Awareness in Financial Services</p><p>(00:40:39) Navigating Compliance in the Cloud</p><p>(00:43:22) Budgeting for Security: Prioritizing Investments</p><p>(00:50:38) The Shared Responsibility Model in Cloud Security</p><p>(00:53:35) Preparing for the SC-100 Exam and Future Insights</p>]]></content:encoded></item><item><title><![CDATA[S02E02 The rise of Cloud Security in 2025 - Eyal Estrin]]></title><description><![CDATA[SUMMARY]]></description><link>https://insights.bluedragonsecurity.com/p/s02e02-the-rise-of-cloud-security-32c</link><guid isPermaLink="false">https://insights.bluedragonsecurity.com/p/s02e02-the-rise-of-cloud-security-32c</guid><dc:creator><![CDATA[Jetro]]></dc:creator><pubDate>Tue, 01 Apr 2025 05:00:00 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/162544854/655c069b9b2985f71639749b641b2ada.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p><strong>SUMMARY</strong></p><p>Eyal Estrin discusses his background in cloud security and the importance of adapting to new security challenges in cloud environments.</p><p>He emphasizes the shared responsibility model, the critical nature of identity and access management, and the risks associated with neglecting cloud security.</p><p>Also he shares insights on budgeting for security investments, balancing agility with security, and common pitfalls organizations face in cloud security.</p><p>In this conversation, Eyal Estrin discusses various aspects of cloud security, focusing on identity and access management, data protection strategies, and the importance of knowledge in cybersecurity.</p><p>We emphasize the need for organizations to adopt best practices in managing identities, implementing encryption, and preparing for future threats in the cloud landscape.</p><p>The discussion also highlights the significance of privileged identity management and the role of training in bridging knowledge gaps among IT professionals.</p><p><strong>CHAPTERS</strong></p><p>(00:00:00) INTRO</p><p>(00:00:36) Introduction to Cloud Security and Eyal's Background</p><p>(00:02:46) Understanding Cloud Security Challenges</p><p>(00:04:25) The Importance of Cloud Security Today</p><p>(00:06:15) Shared Responsibility Model in Cloud Security</p><p>(00:08:18) Key Risks of Neglecting Cloud Security</p><p>(00:10:49) Changing Mindsets in Cloud Security</p><p>(00:13:04) Layered Security Approach in Cloud</p><p>(00:15:23) Budgeting for Cloud Security Investments</p><p>(00:18:31) Balancing Agility and Security in Cloud Deployments</p><p>(00:26:26) The Cornerstone of Identity and Access Management</p><p>(00:28:37) Common Pitfalls in Identity and Access Management</p><p>(00:29:57) Enhancing Identity and Access Management</p><p>(00:31:00) Break-Glass Scenarios in Production Environments</p><p>(00:32:48) Privileged Identity Management (PIM) Insights</p><p>(00:34:46) Data Protection and Encryption Strategies</p><p>(00:39:10) Future Threat Landscape in Cloud Security</p><p>(00:43:09) Bridging the Knowledge Gap in Cybersecurity</p><p>(00:45:29) Final Thoughts on Cloud Security Best Practices</p>]]></content:encoded></item><item><title><![CDATA[S02E01 AI and Privacy: A New Era - Krishna Kathala]]></title><description><![CDATA[&#10145;&#65039; Link to Krishna Kathala's book: https://dub.sh/YengVh6]]></description><link>https://insights.bluedragonsecurity.com/p/s02e01-ai-and-privacy-a-new-era-krishna-164</link><guid isPermaLink="false">https://insights.bluedragonsecurity.com/p/s02e01-ai-and-privacy-a-new-era-krishna-164</guid><dc:creator><![CDATA[Jetro]]></dc:creator><pubDate>Tue, 18 Mar 2025 06:00:00 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/162544855/161b7d7cd345db14eaf59ec579c7a3b4.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p>&#10145;&#65039; Link to Krishna Kathala's book: https://dub.sh/YengVh6</p><p>In this episode of the Blue Dragon podcast, Krishna Chaitanya Rao Kathala, author of 'Privacy in the Age of Innovation' discusses the importance of privacy in the context of AI, the role of Privacy Enhancing Technologies (PETs), and how organizations can implement these technologies to ensure compliance with regulations like GDPR.</p><p>Krishna explains various techniques such as differential privacy, federated learning, and homomorphic encryption, and emphasizes the need for a structured approach to data governance and security in AI applications.</p><p><strong>CHAPTERS</strong></p><p>(06:11) The Rise of AI and Privacy Concerns</p><p>(09:00) Key Techniques of Privacy Enhancing Technologies</p><p>(12:00) Implementing PETs in AI Lifecycle</p><p>(18:01) Choosing the Right PET for Your Organization</p><p>(24:50) Building Secure AI Solutions</p><p>(29:49) Best Practices for Cloud Security in AI</p><p>(34:50) Measuring Effectiveness of PETs</p><p>(45:02) Conclusion and Future Directions</p>]]></content:encoded></item><item><title><![CDATA[My Favorite Way to Justify a SOC]]></title><description><![CDATA[One of the questions I often get from clients is: "Jetro, why do we need a SOC, a Security Operations Center?" My answer is you don't need a SOC if you have a great team in-house that is available 24/7, always up-to-date, knows the latest tactics, and keeps a good eye on everything that's going on in your security real estate.]]></description><link>https://insights.bluedragonsecurity.com/p/most-ict-teams-cant-handle-this</link><guid isPermaLink="false">https://insights.bluedragonsecurity.com/p/most-ict-teams-cant-handle-this</guid><dc:creator><![CDATA[Jetro]]></dc:creator><pubDate>Thu, 06 Mar 2025 09:52:12 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/158503070/28ad5f8db085d681018e0bebcfc8839c.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p>One of the questions I often get from clients is: "Jetro, why do we need a SOC, a Security Operations Center?" My answer is you don't need a SOC if you have a great team in-house that is available 24/7, always up-to-date, knows the latest tactics, and keeps a good eye on everything that's going on in your security real estate.</p><h3>In reality</h3><p>Of course, in reality, that doesn't happen that often. Typically, an organization has 5 or 10 IT people, and they do everything. They onboard new colleagues, they keep the printers and the WiFi working, they have to test new applications and roll them out. And then you're going to ask them to, on top of that, do a 24/7 monitoring of their entire security events and respond on time? That is tricky.</p><p>So what I typically say is a SOC costs between 1 and 1.5 FTE. </p><ol><li><p>But this FTE never goes to sleep because it's the whole team behind it. So it's available 24/7. </p></li><li><p>This FTE never falls ill because there's a whole team behind it. </p></li><li><p>And this FTE is always up-to-date on the latest cyber threats, trends, technologies, and practices because we get trained all the time.</p></li></ol><p>Basically, you can offload or delegate that responsibility to a Managed Security Service Provider (MSSP), <strong>which means that your people are now free to work on real valuable things for your organization</strong>. Things that only they can do because it's something really internal.</p><p>Now, the beauty of this is that if you have a good external SOC, they also have a lot of automation, and so a lot of things will get handled automatically. In this way, you can unburden your team and keep them focused on the things that really matter and bring business value.</p><h3>Conclusion</h3><p>So why do you need a SOC? You don't always need one, but typically, especially in the SMB market where you only have 5 or 10 IT folks doing everything, it is wise to have an external SOC.</p><p>Stay sharp,<br>Jetro</p><div><hr></div><p>&#128276; My goal is to help as many European organizations as possible turn their fragmented cybersecurity into well-governed cyber resilience.<br><br>Here&#8217;s how I usually help:<br><br>&#128312; Fractional CISO services<br>&#128312; Cyber risk assessments<br>&#128312; Certified training<br>&#128312; Keynotes<br><br>&#128073; Want to talk? Reach me at: <strong><a href="mailto:ciso@bluedragonsecurity.com">ciso@bluedragonsecurity.com</a></strong> :: +32 495 81 47 41 (WhatsApp OK)</p><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://insights.bluedragonsecurity.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading BlueDragon Insights! Subscribe for free to receive new posts.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[My Approach to Crisis Without Chaos]]></title><description><![CDATA[Having conducted NIS 2 assessments across various sectors, including governments in Belgium, financial industry organizations, and international companies, one of the top findings is the lack of a documented Incident Response procedure.]]></description><link>https://insights.bluedragonsecurity.com/p/the-nis-2-question-everyone-dreads</link><guid isPermaLink="false">https://insights.bluedragonsecurity.com/p/the-nis-2-question-everyone-dreads</guid><dc:creator><![CDATA[Jetro]]></dc:creator><pubDate>Tue, 25 Feb 2025 08:31:01 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/157641818/3eec241bba209924b60de19ba36ec912.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p>Having conducted NIS 2 assessments across various sectors, including governments in Belgium, financial industry organizations, and international companies, one of the top findings is <strong>the lack of a documented Incident Response procedure</strong>.</p><h3>Now, what is that? </h3><p>Imagine your organization one day gets a cyber attack. Ransomware is installed, everything is encrypted, systems are down, sensitive documentation and information are stolen, and basically, the whole organization is shut down. We've seen this with hospitals and governments as well. What do you do? How do you respond? That&#8217;s your Incident Response plan or procedure.</p><p>Now, when I ask this question to clients, typically, they say, very honestly, "Well, Jetro, that's a great question. If this would happen, all hell would break loose, and we would panic." And that is the reality. So, what NIS 2 mandates is that we prepare for such an event and have our Incident Response plan documented.</p><h3>What does that mean? </h3><p>Document the roles and responsibilities: </p><ul><li><p>Who is responsible for what? </p></li><li><p>Who is responsible for cloud systems and on-premise systems? </p></li><li><p>Who is the Data Protection Officer? </p></li><li><p>Who will communicate with the press or the outside world in case of such an incident? </p></li></ul><p>All these roles and responsibilities need to be documented. </p><p>But also:</p><ul><li><p>Which authorities will we contact or inform of such an event? </p></li><li><p>Who will do the contact and outreach to the government and the authorities? </p></li><li><p>What are the communication channels? </p></li></ul><h3>Panic mode</h3><p>During a crisis, everybody is in panic mode. How do we communicate? Some organizations have all this information on SharePoint, but if SharePoint is unavailable, well, good luck finding out who to contact and when.</p><p>So, what I always recommend is to have a backup communication channel, such as a WhatsApp group, for emergency purposes only. That is all about documenting all the steps we need to take in case of a crisis or an incident.</p><h3>Practice</h3><p>The second thing is we need to practice. Just like with fire drills, where we physically sound the fire alarm, evacuate to the designated spot, and perform headcounts, we need to do the same in the cyber world. Cyber incidents must be drilled and simulated throughout the year.</p><h3>Lessons learned</h3><p>The third thing we have to do is a lesson-learned exercise. While doing these exercises, you will find some bottlenecks or things that didn&#8217;t go well. That's perfectly fine. We learn from them and use that knowledge to update documentation and procedures, drill again, and continue improving.</p><p>NIS 2 is not about achieving perfection. It is about increasing your cyber resilience through continuous improvement.</p><h3>Conclusion</h3><p>So three key takeaways:</p><ol><li><p>Document your Incident Response procedure and have a backup communication channel.</p></li><li><p>Conduct exercises, drills, and simulations&#8212;practice, practice, practice.</p></li><li><p>Learn from mistakes, refine processes, and apply that knowledge to improve.</p></li></ol><p>By following these steps, you will increase your organization's <strong>cyber resilience</strong>. </p><p></p><p>Stay sharp,<br>Jetro</p><div><hr></div><p>&#128276; My goal is to help as many European organizations as possible turn their fragmented cybersecurity into well-governed cyber resilience.<br><br>Here&#8217;s how I usually help:<br><br>&#128312; Fractional CISO services<br>&#128312; Cyber risk assessments<br>&#128312; Certified training<br>&#128312; Keynotes<br><br>&#128073; Want to talk? Reach me at: <strong><a href="mailto:ciso@bluedragonsecurity.com">ciso@bluedragonsecurity.com</a></strong> :: +32 495 81 47 41 (WhatsApp OK)</p><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://insights.bluedragonsecurity.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading BlueDragon Insights! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[My Four NIS 2 Personas Framework]]></title><description><![CDATA[After conducting several NIS 2 assessments, I've discovered that NIS 2 scores an organization based on two dimensions: Documentation and Implementation.]]></description><link>https://insights.bluedragonsecurity.com/p/nis2-the-two-dimensions-you-must</link><guid isPermaLink="false">https://insights.bluedragonsecurity.com/p/nis2-the-two-dimensions-you-must</guid><dc:creator><![CDATA[Jetro]]></dc:creator><pubDate>Thu, 13 Feb 2025 08:01:35 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/156844610/b0ac36a0bf583f977c61f8091b7aa687.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p>After conducting several NIS 2 assessments, I've discovered that NIS 2 scores an organization based on two dimensions: <strong>Documentation</strong> and <strong>Implementation</strong>.</p><h2>Two Dimensions</h2><p><strong>Documentation</strong> is all about how well you have written down your information security policies and governance. Think of, for example:</p><ul><li><p>How do we deal with USB drives?</p></li><li><p>How do we deal with third-party software, and how do we download and install it on your system? </p></li><li><p>How often should we do backups?</p></li></ul><p>That's all documentation. </p><p>On the other hand, there&#8217;s <strong>Implementation</strong>. That is effectively installing, enabling, and activating controls to keep your environment safe. So, effectively installing anti-malware, doing effective training on anti-phishing, and blocking USB drives.</p><h2>Four Quadrants</h2><p>Now, NIS2 looks at both dimensions. And that&#8217;s interesting because then you can combine them and have four different personas or profiles of a company. </p><p>If you have a lot of Documentation but not a lot of Implementation, you are a <strong>PAPER TIGER</strong>. There&#8217;s a lot of stuff in the cabinets and on paper, but not much has been implemented.</p><p>On the other hand, if your team is doing a lot of Implementation and really putting up controls, but they lack the legal framework or the governance around them, I call them <strong>ACTION HEROES</strong>. They are in the field doing the work, but there is no legal backup.</p><p>If your organization is doing both Documentation and Implementation, hey, you are the <strong>ROLE MODEL</strong>. Congratulations! Keep going.</p><p>And if your organization is low on Documentation and low on Implementation, you are a <strong>GHOST</strong>. You really don't exist according to the NIS2 security standards.</p><h2>And you?</h2><p>So, with that said, comes an interesting question: What type of organization are you working in? Are you the Action Hero? Are you the Paper Tiger? Are you the Role Model? Or are you the Ghost? </p><p>Think about that. </p><p>You need both <strong>Documentation</strong> and <strong>Implementation</strong>.</p><p>Stay sharp,<br>Jetro</p><div><hr></div><p>&#128276; My goal is to help as many European organizations as possible turn their fragmented cybersecurity into well-governed cyber resilience.<br><br>Here&#8217;s how I usually help:<br><br>&#128312; Fractional CISO services<br>&#128312; Cyber risk assessments<br>&#128312; Certified training<br>&#128312; Keynotes<br><br>&#128073; Want to talk? Reach me at: <strong><a href="mailto:ciso@bluedragonsecurity.com">ciso@bluedragonsecurity.com</a></strong> :: +32 495 81 47 41 (WhatsApp OK)</p><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://insights.bluedragonsecurity.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading BlueDragon Insights! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[How I Realized Logging Wasn’t Security]]></title><description><![CDATA[Are your security logs a goldmine or dead weight?]]></description><link>https://insights.bluedragonsecurity.com/p/why-your-logs-are-failing-you</link><guid isPermaLink="false">https://insights.bluedragonsecurity.com/p/why-your-logs-are-failing-you</guid><dc:creator><![CDATA[Jetro]]></dc:creator><pubDate>Thu, 06 Feb 2025 11:24:51 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/156592481/069e38f8e6efbeb3e8b6bd58db8f93f8.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p>In the previous video, I explained that the number one finding that always comes back is <strong>the lack of centralized logging or leveraging the available logs</strong>. So, in this video, I want to explain a bit more about that second part.</p><p>Imagine you&#8217;re an organization that really did its best to log as much as possible, keeping everything centralized, baselining the timestamps, and actually keeping the log files for three to six months. Great! But now what?</p><h2>Sitting on a digital shelf</h2><p>Let's be honest. You're going to have log files of thousands of events. Nobody is going to sift through all those events looking for potentially suspicious activities. So, typically, the log files are just sitting there on a digital shelf. </p><p>Nobody's doing anything with them. </p><p>That is not leveraging the log files.</p><h2>Machine Learning</h2><p>In a modern security architecture, you want to <strong>apply machine learning to those log files</strong>. AI is built for pattern recognition. It can detect the normal pattern of your organization's flow and then identify anomalies, weird events, and risky activities. Once detected, it triggers an alert.</p><p>Then, a human security operator will review these preselected events flagged by AI. That is the way forward. This whole system is called a SIEM&#8212;Security Information and Event Management system. <strong>A SIEM helps process logs efficiently.</strong></p><h2>Conclusion</h2><p>You need three things: </p><p>&#128312; First, centralize your log files, as mentioned in the previous video;</p><p>&#128312; Second, apply machine learning to analyze those logs;</p><p>&#128312; Third, respond to the anomalies.</p><p>This way, your security team is <strong>not overwhelmed</strong> by manual work and <strong>can focus</strong> on critical threats.</p><p>And that is the way forward. </p><p>Stay sharp,<br>Jetro</p><div><hr></div><p>&#128276; My goal is to help as many European organizations as possible turn their fragmented cybersecurity into well-governed cyber resilience.<br><br>Here&#8217;s how I usually help:<br><br>&#128312; Fractional CISO services<br>&#128312; Cyber risk assessments<br>&#128312; Certified training<br>&#128312; Keynotes<br><br>&#128073; Want to talk? Reach me at: <strong><a href="mailto:ciso@bluedragonsecurity.com">ciso@bluedragonsecurity.com</a></strong> :: +32 495 81 47 41 (WhatsApp OK)</p><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://insights.bluedragonsecurity.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading BlueDragon Insights! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[How I Keep Catching This in Every Security Audit]]></title><description><![CDATA[Whether I&#8217;m doing NIS2 assessments or Azure Cloud Security assessments, one of the findings always comes back:]]></description><link>https://insights.bluedragonsecurity.com/p/this-nis2-finding-haunts-everyone</link><guid isPermaLink="false">https://insights.bluedragonsecurity.com/p/this-nis2-finding-haunts-everyone</guid><dc:creator><![CDATA[Jetro]]></dc:creator><pubDate>Fri, 31 Jan 2025 09:26:31 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/156156738/6dcdc3e582c8041778d49c53b1d57d7e.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p>Whether I&#8217;m doing NIS2 assessments or Azure Cloud Security assessments, one of the findings always comes back:</p><p><strong>The lack of centralized logging or leveraging logs.</strong></p><p>Let me explain.</p><p>Imagine you have to secure a building because inside are very valuable crown jewels. It's in the middle of the night; it's pitch black outside.</p><p>You know there are gates and fences, and you may even have some security guards patrolling, but there are no cameras, sensors, or communication between the guards.</p><p>How will you efficiently detect an attack?</p><p>You're blind.</p><p>That's the equivalent of an organization that does not log its events.</p><h2>Digital Real Estate</h2><p>In the digital real estate, events or activities happen all the time:</p><p>&#128312; Users log in from all over the place</p><p>&#128312; New devices connect to your environment</p><p>&#128312; Data flows in and out of your network</p><p>If you're not logging these things, you're blind.</p><p>So, rule number one is to log these events.</p><p>Rule number two is to centralize these logs.</p><p>I still see too many organizations with these log files scattered everywhere, which is inefficient when performing post-processing and analysis. So, centralize, normalize, and baseline the timestamps to apply post-processing.</p><p>The third rule is to store these logs for a long enough time.</p><p>I recommend three to six months.</p><p>Why?</p><p>Because most breaches are only discovered after weeks or even months. If you only log in for one month, you're still basically blind to how the attacker accessed your environment.</p><p>So, three to six months.</p><h2>Conclusion</h2><p>To summarize, one of the top findings is the lack of centralized logging and the application of the logs for analysis.</p><p>Three rules:</p><p>&#128312; Log as much as you can</p><p>&#128312; Centralize the logs and normalize the timestamps</p><p>&#128312; Keep these logs for three to six months</p><p>Now, that, of course, is just <strong>step one</strong>.</p><p><strong>Step two</strong>, well, that's for another time.</p><p>Stay sharp,<br>Jetro</p><div><hr></div><p>&#128276; My goal is to help as many European organizations as possible turn their fragmented cybersecurity into well-governed cyber resilience.<br><br>Here&#8217;s how I usually help:<br><br>&#128312; Fractional CISO services<br>&#128312; Cyber risk assessments<br>&#128312; Certified training<br>&#128312; Keynotes<br><br>&#128073; Want to talk? Reach me at: <strong><a href="mailto:ciso@bluedragonsecurity.com">ciso@bluedragonsecurity.com</a></strong> :: +32 495 81 47 41 (WhatsApp OK)</p><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://insights.bluedragonsecurity.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading BlueDragon Insights! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[S01E10 From On-Premise to Cloud: Evolving Your Security Posture - Dwayne Natwick]]></title><description><![CDATA[In this season's finale, Dwayne Natwick and I we dive into cybersecurity with Dwayne Natwick, a seasoned expert with over 30 years of IT experience.]]></description><link>https://insights.bluedragonsecurity.com/p/s01e10-from-on-premise-to-cloud-evolving-d9e</link><guid isPermaLink="false">https://insights.bluedragonsecurity.com/p/s01e10-from-on-premise-to-cloud-evolving-d9e</guid><dc:creator><![CDATA[Jetro]]></dc:creator><pubDate>Sun, 22 Sep 2024 15:16:50 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/162544856/339282607c57e749d8571910561b5be3.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p>In this season's finale, Dwayne Natwick and I we dive into cybersecurity with Dwayne Natwick, a seasoned expert with over 30 years of IT experience. Dwayne shares his journey from running Token Ring cables as a teenager to becoming a global cloud security lead. Discover the evolution of cloud security, the importance of risk awareness, and the critical role of identity in modern cybersecurity. Learn about the latest trends in cloud security architecture, the significance of data classification, and the future of cybersecurity in the age of AI. Dwayne also discusses the challenges of keeping up with rapid technological changes and offers insights into building a risk-aware organization. This episode is packed with valuable insights for IT and business decision-makers looking to enhance their security posture and stay ahead in the ever-evolving tech landscape. Enjoy! <strong>CHAPTERS</strong></p><p>(00:00) Introduction and Background</p><p>(06:47) The Evolution of Cloud Security</p><p>(10:40) Data Classification and User Awareness</p><p>(13:44) Privacy Regulations: Europe vs. US</p><p>(23:59) Assessing Risk Culture and Tolerance</p><p>(26:24) The Importance of Planning and Preparedness</p><p>(30:11) Building a Risk-Aware Organization</p><p>(34:16) Allocating Budget for Security Initiatives</p><p>(38:54) The Critique of 'DevSecOps'</p><p>(44:15) The Future Outlook: Expanding Training Services and Mentoring Initiatives</p>]]></content:encoded></item><item><title><![CDATA[S01E09 Mastering Hybrid Cloud Management for Enhanced Business Agility - Ahilan Ponnusamy]]></title><description><![CDATA[Ahilan Ponnusamy, author of the book 'Technology Operating Models for Cloud and Edge,' discusses the concept of operating models and their importance in the IT ecosystem.]]></description><link>https://insights.bluedragonsecurity.com/p/s01e09-mastering-hybrid-cloud-management-d0e</link><guid isPermaLink="false">https://insights.bluedragonsecurity.com/p/s01e09-mastering-hybrid-cloud-management-d0e</guid><dc:creator><![CDATA[Jetro]]></dc:creator><pubDate>Fri, 20 Sep 2024 09:58:56 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/162544857/531a30d03abf50420f3a72363515e0b9.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p>Ahilan Ponnusamy, author of the book 'Technology Operating Models for Cloud and Edge,' discusses the concept of operating models and their importance in the IT ecosystem. He explains how cloud and edge technologies impact the technology operating model and emphasizes the prevalence of hybrid cloud as the standard deployment option for most organizations. Ponnusamy also critiques the bimodal IT approach, stating that it has failed due to its combative nature and lack of compatibility. He highlights the evolving IT landscape with the rise of AI, 5G, 6G, IoT, and edge computing, and advises IT decision-makers to build a flexible, resilient, secure, and extendable operating model. Ponnusamy also shares insights into the success and feedback of his book and discusses plans for a second edition that incorporates AI perspectives.</p><p><strong>CHAPTERS</strong></p><p>(00:00) Understanding Operating Models</p><p>(08:02) The Impact of Cloud and Edge Technologies</p><p>(12:58) The Failure of Bimodal IT</p><p>(23:44) Building a Foundation for Future-Proof IT</p>]]></content:encoded></item><item><title><![CDATA[S01E08 Harnessing AI for Operational Excellence: Transforming Industrial Environments - Benny Lauwers]]></title><description><![CDATA[Benny Lauwers, author of 'The Good, The Bad and the Practical: AI for doeners', discusses his background and how he got into writing a book on practical AI.]]></description><link>https://insights.bluedragonsecurity.com/p/s01e08-harnessing-ai-for-operational-ae7</link><guid isPermaLink="false">https://insights.bluedragonsecurity.com/p/s01e08-harnessing-ai-for-operational-ae7</guid><dc:creator><![CDATA[Jetro]]></dc:creator><pubDate>Mon, 09 Sep 2024 07:29:51 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/162544858/858aef78fd9f82a3ccc157bdfb7670cc.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p>Benny Lauwers, author of 'The Good, The Bad and the Practical: AI for doeners', discusses his background and how he got into writing a book on practical AI. He shares his experience in implementing AI in industrial environments, particularly in manufacturing. Lauwers emphasizes the challenges and benefits of applying AI in the industrial setting, including improving quality and safety. He also discusses a case study on using AI to detect and predict bad quality in a tile manufacturing company. The conversation highlights the importance of having people who believe in AI and are willing to take risks in implementing AI projects. The conversation explores the practical implementation of AI in organizations and the challenges that come with it. It emphasizes the importance of taking action based on AI signals and the need to consider the next steps after detection. The discussion also touches on the impact of AI on organizational culture and processes, the importance of data quality and preparation, and the need for companies to invest in IT infrastructure and data connectivity. The conversation concludes with insights on best practices for implementing AI, including considering alternative technologies, starting from the desired output, and the importance of continuous training and retraining of AI models.</p><p><strong>CHAPTERS</strong></p><p>(00:00) Introduction and Background</p><p>(08:32) Practical AI in Industrial Environments</p><p>(13:09) Case Study: Using AI in Manufacturing</p><p>(21:58) Taking Action Based on AI Signals</p><p>(24:02) The Impact of AI on Organizational Culture and Processes</p><p>(26:04) The Importance of Data Quality and Preparation</p><p>(28:47) Considering Alternative Technologies and Starting from the Desired Output</p><p>(32:00) Continuous Training and Retraining of AI Models</p>]]></content:encoded></item><item><title><![CDATA[S01E07 Mastering Cloud Security: Essential Strategies for IT Leaders - Qamar Nomani]]></title><description><![CDATA[In this conversation with Qamar Nomani, we discuss cloud security posture management (CSPM) and its benefits.]]></description><link>https://insights.bluedragonsecurity.com/p/s01e07-mastering-cloud-security-essential-6d0</link><guid isPermaLink="false">https://insights.bluedragonsecurity.com/p/s01e07-mastering-cloud-security-essential-6d0</guid><dc:creator><![CDATA[Jetro]]></dc:creator><pubDate>Mon, 02 Sep 2024 14:19:03 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/162544859/36feb915cd4a0c386a775d782fb74cf6.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p>In this conversation with Qamar Nomani, we discuss cloud security posture management (CSPM) and its benefits. Qamar shares his professional background and how he ended up writing a book on cloud security. They discuss the design and length of the book, as well as the key question of what CSPM is and its benefits. They also explore how CSPM fits into the broader cloud security ecosystem and the importance of cloud asset inventory in cybersecurity. They address the perception that cloud is less secure than on-premises and emphasize the shared responsibility model. Finally, they touch on compliance management and governance in the context of European directives. Cloud Security Posture Management (CSPM) tools help with compliance management by automating the process of checking and maintaining compliance with various standards and regulations. CSPM tools bring pre-built compliance benchmarks and engines, saving time and effort for engineers. They provide a dashboard and reports that show the organization's compliance score and highlight areas where improvements are needed. CSPM tools also assist in audits by allowing auditors to access masked assets and review controls and policies. Some major CSPM tools and vendors include Microsoft Defender for Cloud, Prisma Cloud, Orca, Sophos Optix, Wiz, Lacework, and Symantec CloudSOC.</p><p><strong>CHAPTERS</strong></p><p>(00:00) Introduction and Background</p><p>(03:03) Understanding Cloud Security Posture Management (CSPM)</p><p>(05:18) The Benefits of Cloud Security Posture Management</p><p>(09:17) Integrating CSPM into the Cloud Security Ecosystem</p><p>(19:04) The Importance of Cloud Asset Inventory in Cybersecurity</p><p>(25:05) Addressing the Perception of Cloud Insecurity</p><p>(29:02) Compliance Management and Governance in the Cloud</p><p>(32:06) Introduction to CSPM and Compliance Management</p><p>(36:42) CSPM Tools for Hybrid Cloud Environments</p><p>(39:53) Expanding Compliance Beyond IT Infrastructure</p><p>(48:49) DevSecOps and the Shift Left Approach</p><p>(54:29) The Future of Qamar Nomani</p>]]></content:encoded></item><item><title><![CDATA[S01E06 Cloud Data Governance: Ensuring Data Integrity and Security - Marcelo Leite]]></title><description><![CDATA[In this episode, I talk with technology executive and author Marcelo Leite.]]></description><link>https://insights.bluedragonsecurity.com/p/s01e06-cloud-data-governance-ensuring-339</link><guid isPermaLink="false">https://insights.bluedragonsecurity.com/p/s01e06-cloud-data-governance-ensuring-339</guid><dc:creator><![CDATA[Jetro]]></dc:creator><pubDate>Tue, 27 Aug 2024 06:38:18 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/162544860/1d280558ec511376bd69ce0734946fa1.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p>In this episode, I talk with technology executive and author Marcelo Leite. We discuss the concepts of a database, data warehouse, data lake, and data lake house. He explains how these concepts have evolved and are used in modern data management. We also discuss the importance of data classification and data loss prevention (DLP) in ensuring data security, introduce the concept of data mesh and its relevance for CTOs and CIOs and covering two main themes: data mesh and the impact of cloud-based data platforms on security. We end with the Kusto Query Language (KQL) and the trend of SaaS solutions for data platforms. Enjoy!</p><p><strong>CHAPTERS</strong></p><p>(00:00) Introduction and Background of Marcelo Leite</p><p>(07:40) Understanding the Concepts of Database, Data Warehouse, Data Lake, and Data Lake House</p><p>(19:14) The Importance of Data Classification and DLP in Data Security</p><p>(26:55) Exploring the Concept of Data Mesh</p><p>(32:02) Why CTOs and CIOs Should Consider Data Mesh</p><p>(33:09) Managing Complex Data Environments with Data Mesh</p><p>(41:00) Ensuring Security in Cloud-Based Data Platforms</p><p>(49:53) Analyzing Logs and Telemetry with Kusto Query Language (KQL)</p><p>(53:23) Simplifying Data Analytics with SaaS Solutions</p><p>(58:37) The Future of Data: Serving AI and Automation</p>]]></content:encoded></item><item><title><![CDATA[S01E05 Enhancing Cybersecurity: Writing Strategies for Effective Risk Management - Vincent van Dijk]]></title><description><![CDATA[Vincent van Dijk, an information security specialist, discusses his journey from software development to data science to cybersecurity.]]></description><link>https://insights.bluedragonsecurity.com/p/s01e05-enhancing-cybersecurity-writing-925</link><guid isPermaLink="false">https://insights.bluedragonsecurity.com/p/s01e05-enhancing-cybersecurity-writing-925</guid><dc:creator><![CDATA[Jetro]]></dc:creator><pubDate>Sun, 18 Aug 2024 17:26:10 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/162544861/9291ee40f718a325bb73dd565ba1843d.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p>Vincent van Dijk, an information security specialist, discusses his journey from software development to data science to cybersecurity. He emphasizes the importance of writing in cybersecurity and the need for clear and effective policies. Vincent also shares his thoughts on the impact of cloud computing and the rise of managed security service providers. He predicts that compliance will continue to increase and that the cybersecurity industry will face challenges related to stress and burnout. Vincent is currently working on two books, one about making choices and another about becoming the best cybersecurity expert.</p><p><strong>CHAPTERS</strong></p><p>(00:00:00) Introduction and Background</p><p>(00:06:15) The Importance of Writing in Cybersecurity</p><p>(00:11:10) Marker 7</p><p>(00:13:19) The Impact of Cloud Computing on Information Security</p><p>(00:25:33) Data-Driven Decision-Making in Cybersecurity</p><p>(00:34:21) Challenges in the Cybersecurity Industry: Stress and Burnout</p><p>(00:41:18) Upcoming Books: Making Choices and Becoming the Best Cybersecurity Expert</p>]]></content:encoded></item></channel></rss>