Cybersecurity Blog: The Cyber Scene is evolving, are you?

Please see links below to Case Studies in Financial Services Cybersecurity:


Critical infrastructure is not limited to just the energy and utilities sectors. The Financial Services sector is just as critical to a country's security as any nuclear power plant or energy delivery system. It is a hard to imagine our lives with an impaired or disrupted financial commerce system. To address this threat the Financial Services Information Sharing and Analysis Center (FS-ISAC) was launched in 1999. It is the global financial industry's go to resource for cyber and physical threat intelligence analysis and sharing. FS-ISAC is unique in that it was created by and for members and operates as a member-owned non-profit entity. Leidos Cyber, Inc. is proud to be an “Affiliate Member” of FS-ISAC.

Read more

Spear Phishing

The fraudulent practice of sending emails ostensibly from a known or trusted sender in order to induce targeted individuals to reveal confidential information.
"spear phishing represents a serious threat for every industry"

How does this serious threat effect your organization? We’ve built a detailed analysis of how one adversary takes a very personal approach to the classic supply chain attack. It analyzes the attack end to end, using the Cyber Kill Chain® analysis framework, including review of how a targeted email was delivered and weaponized.

Note: All names are fictional, and any resemblance to real people or companies is unintentional.

Read more

“You will never reach your destination if you stop and throw stones at every dog that barks.” – Sir Winston Churchill

This summer our team has been traveling the globe with our message of cyber enlightenment. Through real-world accounts of how we’ve helped some of the world’s most prominent companies mature their cybersecurity posture, our analysts have inspired hope and doled out practical steps both practitioners and leadership can take to shore up their networks.

Read more

How to assemble a team with the skills and qualities needed to outpace today’s evolving threat landscape

We are defenders. It’s in our DNA. While defending cyber interests globally we’ve developed a skilled team, advanced capabilities and a proven framework to proactively protect what matters most. Our solutions promote a mature cybersecurity posture.

Read more

2016 is well under way and this time of year it can be tough to justify training budgets. As an instructor for our Experiential Cyber Immersion Training and Exercises® (EXCITE®) course here at Lockheed Martin, I interface with a lot of computer network defense teams. Over the years I've noticed organizations fall into the trend of allowing the newest tools to drive their analyst training program. Others let their employees self-select training they feel would be the best fit for their role. But these routes can lead to over-reliance on technology, skill set gaps, and disjointed teams. I'd like to take a slightly different approach and suggest three things to add to your in-house training program that you won’t find in traditional classroom curriculums.

Read more