James Robinson

Director, Risk and Threat Management

James Robinson is responsible for our internal information risk management and threat management programs within information security and is a member of the Office of the CISO for Optiv. Robinson uses real world experiences to help enterprise-level organizations to solve their security and related business issues. He also develops and delivers a comprehensive suite of strategic services and solutions that help CXO executives change their security strategies through innovation.

 

Three Steps to Enhancing Your Third-Party Risk Program

· By Peter Gregory, James Robinson · 0 Comments

In the world of third-party and vendor risk management, many new practices are being adopted. Over the past few weeks, members of Optiv’s third-party risk team have initiated conversations with key industry leaders through a series of roundtable discussions. These thought leaders own or participate in their organizations’ third-party strategies. During these sessions, we shared leading practices and principles, and identified a number of common trends.

Continue reading 0 Shares

Ransomware Kill Chain and Controls – Part 1

· By James Robinson · 0 Comments

With the rising threat of ransomware, we continue to see more and more coverage of the topic in the news and in marketing campaigns. I guess about half of all marketing emails I get are ransomware-oriented. It could be the lists I am on, but I think ransomware is shaping up to be the top marketed threat in 2016.

Continue reading 0 Shares

Reducing Your Personal Attack Surface

· By James Robinson · 0 Comments

Many of us are consumers of technology, I would consider myself in the upper echelon of this group. I own multiple laptops, desktops, servers, cloud-based workstations, tablets, mobile devices, smart fashionware and social media accounts, to name a few. But, with this enthusiasm and love for the newest gadget or tool to stay connected comes a new risk – one that organizations have been fighting for years, and the consumer is starting to face. This is the risk of your personal attack surface.

Continue reading 0 Shares

Financially Motivated Whaling Attacks

· By James Robinson, Ping Look · 0 Comments

On any given day, many people receive hundreds of emails. But when an employee receives an email from their CEO, CFO or another senior executive, they are more likely to notice and respond. Unfortunately, this natural human behavior is exactly what malicious actors are exploiting in the latest “whaling” attack.

Continue reading 0 Shares

Preparing for a Boardroom Discussion - Expect the Expected

· By Renee Guttmann, James Robinson · 0 Comments

Organizations must focus on many areas within the business to ensure corporate data and assets are secure. Even though there are competing priorities, application security must be an important component of a successful information risk management program.

Continue reading 0 Shares

Mapping Cyber Attacks to Maslow's Hierarchy of Needs

· By James Robinson · 0 Comments

Maslow’s hierarchy of needs is basically a theory that aims to understand what motivates people, represented as a pyramid that maps the different levels of needs. At the lowest level are the basic human needs that are required to function. As those needs are met, individuals move up the hierarchy to fulfill deeper and more complex needs.

Continue reading 0 Shares

Protecting Personal Devices

· By James Robinson · 0 Comments

The holiday season has come and gone, and 2015 is officially upon us. Many of us are back at work toting a shiny new tablet, phone or laptop we were fortune enough to receive as a gift. But before you start surfing the Internet or installing applications (apps), an important first step to take is to enhance your security by “hardening” your device.

Continue reading 0 Shares

Protecting Against the Inevitable

· By James Robinson, Jeff Horne · 0 Comments

Imagine this situation: you are sitting in your office, all is going well, when you receive an urgent invite for a due diligence committee meeting to potentially acquire another business. This isn’t the first time your company is evaluating acquisition targets; and then it hits you – the last time this happened your organization came under attack.

Continue reading 0 Shares

'Tis the Season for Phishing

· By James Robinson · 0 Comments

It’s that time of year again, the holiday season. A time filled with friends, family, good food, and celebration. But of course it has its downsides as well; stress, debt, long lines and crowds. Many of us try to make the holiday shopping season a little easier by purchasing our gifts online in the safety and comfort of our homes.

Continue reading 0 Shares

How to Reduce Attack Surface

· By James Robinson · 0 Comments

An effective strategy to help protect your organization is to reduce the noise, allowing for easier detection of an exploit; while at the same time increasing the difficulty to compromise. This, in effect, reduces the adversaries operating surface

Continue reading 0 Shares
(20 Results)