Articles by 'Steve Gold'

Blog Author - Steve Gold

Steve Gold is the Cybersecurity Practice Director at Gotham Technology Group (Gotham). He is responsible for providing the vision and thought leadership to expand Gotham’s legacy of success and build a world-class cybersecurity practice. He works closely with Gotham’s customers, industry partners, and subject matter experts to develop relevant solutions for Gotham’s clients and prospects.

Prior to joining Gotham, Steve worked with the Center for Internet Security (CIS), where he expanded the global reach, revenue, and impact of the CIS Benchmarks, CIS Controls, and CIS Hardened Images. He led the efforts to promote the CIS portfolio of low-cost and no-cost cybersecurity products and services that help private and public organizations stay secure in the connected world. He grew a team of security specialists from 12 to over 40 to assist organizations with implementing security best practices in their continual journey of cybersecurity maturity.

During his more than 20-year career, Steve led teams responsible for developing and implementing technology solutions at some of the industry’s most recognized companies such as Varonis, VMware, Dell & Wyse Technology

Steve is a frequent speaker/moderator at industry conferences and webinars, covering a wide array of information security topics. He resides and works remotely in Baltimore, MD.

By Steve Gold, Posted in Security

Well, that’s a wrap! Bryon Singh and I published a blog on all 56 cyber defense safeguards from CIS Critical Security Controls Implementation Group 1. These 56 safeguards are considered “essential cyber hygiene” for every organization. CIS recommends these safeguards as what every enterprise should apply to defend against the most common attacks. Transitioning from CIS Controls IG1 to IG2 Building a strong foundation with CIS Controls Implementation Group 1 (IG1) is just the beginning of... read more.

  • December 10, 2024

By Steve Gold, Posted in Security

Written with contributions from Bryon Singh, Director of Security Operations, RailWorks Corporation In today’s digital age, where cyberthreats are constantly evolving, establishing and maintaining an enterprise process for the workforce to report security incidents is crucial. A streamlined and well-publicized process ensures that incidents are reported promptly and accurately, allowing the organization to respond swiftly and mitigate potential damage. This blog outlines the key components of an effe... read more.

  • September 24, 2024

By Steve Gold, Posted in Security

Written with contributions from Bryon Singh, Director of Security Operations, RailWorks Corporation In the world of cybersecurity, a swift and coordinated response to security incidents is crucial. Central to this response is having up-to-date contact information for all parties that need to be informed. From internal staff to third-party vendors, law enforcement, and beyond, knowing whom to contact and how to reach them can make a significant difference in mitigating the impact of a security breach. This... read more.

  • September 17, 2024

By Steve Gold, Posted in Security

Written with contributions from Bryon Singh, Director of Security Operations, RailWorks Corporation In the realm of cybersecurity, incidents are inevitable. The key to minimizing their impact lies in having a well-coordinated incident handling process. Central to this process is designating one key person and at least one backup who will manage the enterprise’s incident handling. This ensures that incident response and recovery efforts are coordinated and documented efficiently. Whether you rely on i... read more.

  • September 10, 2024

By Steve Gold, Posted in Security

In an increasingly interconnected world, enterprises rely on numerous service providers to support their operations, from cloud storage solutions to specialized consulting services. Managing these relationships effectively requires a comprehensive and up-to-date inventory of service providers. This blog explores the importance of establishing and maintaining such an inventory, complete with classifications and designated enterprise contacts, and highlights the necessity of regular reviews and updates. To ma... read more.

  • August 13, 2024

By Steve Gold, Posted in Security

In our increasingly interconnected world, the importance of secure network practices cannot be overstated. As more enterprises embrace remote work, it is crucial to train workforce members on the dangers of connecting to and transmitting data over insecure networks for enterprise activities. This training should also extend to securely configuring home network infrastructure. To make these concepts engaging and memorable, we will use references from popular culture to illustrate the importance of secure net... read more.

  • August 06, 2024

By Steve Gold, Posted in Security

In the fast-paced world of cybersecurity, keeping software up-to-date is a critical defense against vulnerabilities and threats. Ensuring that workforce members can verify and report out-of-date software patches or any failures in automated processes and tools is essential. This blog post explores best practices for this training, using engaging references from popular culture to make these concepts more relatable and memorable. The Importance of Software Updates Imagine if the Avengers didn’t upgra... read more.

  • July 30, 2024

By Steve Gold, Posted in Security

In the battle against cyber threats, the ability to recognize and report potential security incidents is crucial. Just as heroes in pop culture stories must identify and respond to danger, your workforce needs to be equipped with the knowledge and skills to spot and report cybersecurity incidents. This blog post explores the importance of training employees to recognize potential incidents and outlines best practices for reporting them, using references from popular culture to make these concepts engaging a... read more.

  • July 23, 2024

By Steve Gold, Posted in Security

In an era where data breaches and cybersecurity incidents dominate headlines, unintentional data exposure remains a significant threat to organizational security. Training workforce members to be aware of the causes for unintentional data exposure is essential. I’m going to cover common causes using factual pop culture references to highlight the importance of these practices. Mis-Delivery of Sensitive Data Imagine the chaos that ensues in "Harry Potter and the Chamber of Secrets" when Harry receive... read more.

  • July 16, 2024

By Steve Gold, Posted in Security

In “The Lord of the Rings: The Fellowship of the Ring”, the fellowship travels to Mordor to destroy the One Ring of the Dark Lord Sauron. In one scene, the fellowship come face to face with a Balrog. Knowing they cannot all escape, Gandalf stands on a bridge and yells “You Cannot Pass” and fights the Balrog to the death. What Gandalf did on the bridge relates to how we should handle our data. Gandalf recognized the threat of the Balrog to both his fellow travelers (colleagues) and t... read more.

  • July 09, 2024