🏅 Who's excited for the Olympic games kicking off this week in Paris? 🏅 Cybercriminals! Discover why major sporting events like the Olympics present prime opportunities for cyberattacks. Even if your organization isn't directly involved, in the games, you could still be at risk. Former CISO and Cyber Risk Expert Shay Zandani explains the threat and gives advice on how to protect your organization. https://lnkd.in/dJPfAmNr #CyberSecurity #Olympics #CISO #CyberThreats
Holistic Cyber (HolistiCyber)
Computer and Network Security
New York, NY 2,185 followers
Defend What Matters.
About us
HolistiCyber’s mission is to assist corporations in defending themselves from the new phase of evolution in Cyber threats - not only in volume, but in the level of sophistication. Hackers, backed by Nation-States in many cases, use tools that were developed by the NSA and other Nation-State agencies that have leaked into the Darknet. HolistiCyber’s holistic approach includes a comprehensive understanding of business processes and identification of organizations’ critical and strategic assets - all from the view point of potential highly sophisticated attackers. We help organizations manage cybersecurity risks and demonstrate the impact a cyber-attack will have on your business, i.e. (Financial, Legal, Brand, Reputation). Our experts are cybersecurity veterans of the intelligence branch of the Israel Defense Forces (IDF). They are world-class experts who have served on the front-lines of critical nation-state cybersecurity offensive and defensive operations.
- Website
-
http://www.holisticyber.com
External link for Holistic Cyber (HolistiCyber)
- Industry
- Computer and Network Security
- Company size
- 51-200 employees
- Headquarters
- New York, NY
- Type
- Privately Held
- Specialties
- Cybersecurity advisory, Risk Assessment, Penetration test, Cybersecurity strategic planing, Tabletop, Incident response, GDPR, Network Security, Network Topology, Application Security, Cyber Security Defense Design, Security Monitoring, Response Team, Red Teams, ransomware defense, and vulnerability assessment
Locations
-
Primary
405 Lexington Avenue
New York, NY 10174-0002, US
-
125 Cambridge Park Dr
Cambridge, Massachusetts 02140, US
-
Menachem Begin 121
Tel Aviv, Israel 6701203, IL
-
11 Bressenden Place
Victoria, England SW1E 5BY, GB
Employees at Holistic Cyber (HolistiCyber)
-
Jim Robidoux
Vice President Account and Partner Management at HolistiCyber
-
Alon Yavin
-
🎤Joan Weiner Levin
Laughter Influencer * Marketing Storyteller * I Write Content That Attracts Attention and Drives Revenue* I've read NIST CSF 2.0! * I never use the…
-
Shimon Sheves
Founder and Chairman at HolistiCyber
Updates
-
Congrats to our CMO Michael Yehoshua. Keep doing what you do & make us proud! Thank you to the G-CMO forum!
🚀 Welcome to our new member of the G-CMO Community! 🚀 Today, we are happy to spotlight Michael Yehoshua. Although he has only been in Israel for seven years only, he is already recognized as a great leader in our marketing industry. Michael Yehoshua is not one to do things halfway. As the current CMO of both SAGE Cyber and Holistic Cyber (HolistiCyber), he is a top-ranked Chief Marketing Officer known for driving record-setting sales figures. Michael's career is marked by leading marketing teams to impressive milestones, including two successful M&A exits and securing multi-million dollar revenue gains. Before his current roles, Michael served as the VP of Global Marketing at SCADAfence, where his leadership fueled substantial growth in customer acquisitions and ROI, culminating in an exit to Honeywell. At TrapX Security, Michael transformed a declining startup into a profitable industry leader, leading to an exit to Commvault. As VP of Marketing at AMC, he revitalized the company's marketing architecture, achieving revenue figures unseen for decades. Beyond his remarkable professional journey, did you know Michael was a heavy metal band's lead singer and guitarist for 5 years? He's a heavy-metal enthusiast! 🎸🤘 Join us in welcoming Michael Yehoshua to the G-CMO community! His blend of professional prowess and unique musical taste makes him a valuable addition to our network. Orit Cohen Shiri Grosbard Sophie Melnik Amitay #MarketingLeader #CMO #Membersportrait #GCMOCommunity
-
Holistic Cyber's Co-Founder and CTO Moshe Ishai will be featured on a webinar hosted by Interfor International. Happening next Wednesday June 26th, at noon EST. Moshe, along with privacy expert, attorney Reena Bajowala will be interviewed by noted author Jeremy Hurewitz. To request an invitation, register here: https://lnkd.in/dNQEUJbz #cybersecurity #cyberthreats #defendwhatmatters
-
🎉 Holistic Cyber is growing! Welcome to Shay Zandani our newest Cyber Account Executive.🎉 Shay comes to us with a wealth of experience in #cybersecurity and #riskmanagement in both the public and private sector. He was previously a at KPMG US. We're thrilled to have you Shay! Welcome aboard!
-
Holistic Cyber (HolistiCyber) reposted this
With all the things I have going on, it's time for a collaboration! I'm very honored that we had a full-house attendance yesterday at the #FBI InfraGard NJ event featuring Alon Yavin from Holistic Cyber (HolistiCyber). Alon spoke about #Cloud #Cybersecurity and why it's so hard to get started. "Cloudy with a Chance of Cybersecurity" is what I named the session - for those of us who loved the book / movie. The rest of the program discussed Business Continuity Planning #BCP and Disaster Plan Recovery #DPR covered by expert Fred Stuck from Cantor Fitzgerald. Huge thanks to Lowenstein Sandler LLP for hosting us and to the InfraGard team out of New Jersey for helping put this all together. Here's to many more collaborations!
Information Security and Privacy Evangelist | ISC2 Chapter President | Student Mentor | InfraGard Advisory Board Member
It was great to see a packed room at last night’s InfraGard NJ meeting, hosted at Lowenstein Sandler LLP! For this month’s meeting, we had Fred Stuck from Cantor Fitzgerald discuss the key elements for successful Business Continuity and Disaster Recovery planning and Alon Yavin from Holistic Cyber (HolistiCyber) walked us through the challenges and solutions for securing cloud applications. Special thanks to Lauren Guillen from 24By7Security, Inc. for sponsoring this memorable event! It is an honor to be an Advisory Board Member of this fast growing InfraGard chapter and we are planning to have another in-person event soon.
-
April Fools' Day is all about pranks, but falling for a cyber scam isn't funny! Watch where you click! Think twice before clicking anything from an unrecognized source! Don't let cyber criminals pull a prank on you! #AprilFools #CyberSafety
-
We have another exciting addition to the Holistic Cyber (HolistiCyber) team to announce. Lia Loshakove has joined us as Sage Product Manager. She comes to us straight from Fiverr Enterprise, and has hit the ground running and has already made a noticeable difference to our company. Welcome Lia! #cybersecurity #CDPO #productmanagement
-
[New Blog] 🛡️ A Risk Register is a necessary first step for rock-solid cybersecurity defense. Our latest blog explains why it's a vital tool for #CISOs, how to build one, and how to integrate it with your #CDPO. #Cybersecurity #RiskManagement https://lnkd.in/d6aHbcn6
-
🥊 Law enforcement delivered a blow to #lockbit, but the notorious gang is already starting a comeback. The lesson is that no takedown of #ransomware is permanent. #CISOs need to stay vigilant and have a rock solid #cyberdefense plan. Learn more, and stay tuned for further updates: https://lnkd.in/eQv8_y2d
-
Great post by Brian Levine. #TPRM is difficult as is. The rise in #AI technologies opens up a whole Pandora's Box of threats for organizations. #ConstantVigilance
EY Cybersecurity & Data Privacy Leader • Speaker • Former DOJ Cybercrime Prosecutor • NYAG Regulator • Civil Litigator. POSTS REFLECT MY OWN VIEWS AND ARE NOT NECESSARILY THE VIEWS OF MY EMPLOYER.
After an AI company terminated an employee, it allegedly learned the employee had been transcribing work meetings using an automated transcription service which sent all of the transcribed information to the employee. See https://lnkd.in/eUFV2Ur4. The employer promptly brought a federal trade secret theft case and the Court issued a preliminary injunction requiring the former employee to return what he had allegedly taken, including the meeting minutes. https://lnkd.in/e4vS457g. It is important for organizations to minimize the use of "Shadow Vendors"--vendors that are not being centrally managed by the organization. Why? It's hard enough to do effective third-party risk management (TPRM) with respect to the vendors you know about. It's not realistic to do TPRM on "shadow vendors" that you don't know about. Unapproved technology and vendors may be insecure and my lead to breaches, trade secret theft, and other cyber or compliance incidents. Here are five tips for minimizing the use of "shadow vendors": 1. PROHIBIT THE USE OF SHADOW VENDORS: Consider having a clear written policy precluding the use of unapproved technology. Train employees on the policy upon onboarding and at least annually thereafter. 2. MINIMIZE ADMINISTRATIVE RIGHTS: If an employee's job function does not actually require the employee to have administrative rights over the employee's laptop or desktop, do not grant such rights. This will prevent employees from downloading unauthorized and unmanaged software. 3. SEARCH FOR THE BIGGEST OFFENDERS: If you are particularly concerned about employee use of particular tools, consider forensic monitoring or searching for evidence that employees may be using these tools. For example, employees may be using a transcribing tool on a personal device, but they may store some of the transcripts on a work computer. Thus, even if you cannot detect the use of the tool directly, you may be able to detect indicia of the use on a personal device. 4. VET YOUR BIGGEST OFFENDERS: Consider conducting TPRM on your biggest offenders in this area. You may determine that a particular vendor is not as risky as you thought and you may decide to make it permissible (perhaps with certain use limitations). Alternatively, you might find that you become better able to understand and/or articulate the risk of using these vendors, which may help you convince employees to stay away. 5. PROVIDE FLEXIBLE SOLUTIONS: Today employees are very tech savvy, so if they are aware of a helpful technology solution for doing their job and the organization prohibits them from using it, they may just use it on a personal device, which may be equally problematic but harder for the organization to detect. Thus, create a simple channel for employees to openly request access to certain technology. This will give the organization the opportunity to either fully vet potentially new and helpful technology or to offer employees acceptable alternative solutions.