Posts

Showing posts from March, 2023

Hardening Salesforce: A Comprehensive Guide to Securing Your CRM Kindle Edition

Image
  Salesforce, the world's leading CRM platform, is trusted by thousands of businesses to manage their sales, marketing, and customer service operations. Recognizing the critical importance of security, Salesforce has built an extensive array of security features into its platform. These features span various aspects of security, including user authentication and authorization, data encryption and privacy, network security, and secure development practices. Salesforce also invests heavily in continuous security improvements, regularly releasing updates and enhancements to help organizations protect their data and stay compliant with industry regulations. The primary goal of this book is to provide a comprehensive guide to securing your Salesforce environment, leveraging both the platform's built-in security features and industry best practices. The objectives of the book are as follows: To demystify Salesforce security concepts and provide clear, actionable guidance...

The CISO's Guide to Surviving Machiavellian Politics

Image
  In "The CISO's guide to Surviving Machiavellian Politics", Russell D. Nomer, CISSP draws upon the combination of academic lessons and his own unique experiences and observations to share lessons learned from: Over three decades of technology and security consulting spanning multiple industries Studying Political Communications, Political Science and Politics & Values at The George Washington University Completing Morton Blackwell Leadership Institute Training Obtaining a Bachelor of Science Degree with honors in Security Systems from SUNY Farmingdale Obtaining a CISSP Obtaining ITIL Certification Finding the right mentors Learning how to grow through pain

The Cybersecurity Professionals Guide for Maintaining Mental Health

Image
 In today's fast-paced, technology-driven world, cybersecurity has emerged as a critical domain that is continuously evolving to protect individuals, organizations, and nations from the ever-growing threat of cyber-attacks. As the guardians of our digital lives, cybersecurity professionals are tasked with a tremendous responsibility that demands constant vigilance, technical expertise, and adaptability. While these professionals play a vital role in maintaining the safety of our digital ecosystem, the demands of their profession can take a significant toll on their mental health and overall well-being. The importance of mental health in the cybersecurity field cannot be overstated. The nature of the job often involves high-stress situations, tight deadlines, and the knowledge that a single mistake could have far-reaching consequences. In such an environment, it is crucial to prioritize mental health and emotional well-being not only to ensure personal happiness and fu...

Preparing The Board for Information Warfare: A Cyberwar Survival Guide

Image
      In the rapidly evolving digital landscape, the threat of information warfare has become an ever-present reality for organizations worldwide. "Preparing the Board for Information Warfare: A Cyberwar Survival Guide" is a comprehensive resource designed to help corporate boards navigate the complex world of cybersecurity and protect their organizations from a wide range of cyber threats. This essential guide covers everything from understanding the scope and impact of information warfare to building a cyber-resilient organization. It offers practical advice and expert insights on topics such as: The role of corporate boards in managing cyber risks Assessing and strengthening an organization's cybersecurity posture Developing proactive strategies for cyber defense Navigating the regulatory landscape and ensuring compliance Embracing innovation and technology while maintaining security Preparing for the future of information warfare and staying ahead of the cur...

Hardening AWS

Image
  Hardening AWS" is a comprehensive guidebook that provides AWS customers with practical advice and best practices for securing their cloud infrastructure. The book covers various topics related to AWS security, including identity and access management, network security, instance security, data security, application security, incident response, disaster recovery, compliance, and governance.        

Hardening MacOS

Image
  Hardening MacOS provides pragmatic guidance for mitigating the risk of your Mac getting hacked. The book covers MacOS security features, account management, system configuration, network security, data protection, application security, security monitoring, incident response and hardening techniques.  

Hardening Windows 11

Image
  "Hardening Windows 11" is a comprehensive guide to securing the latest operating system from Microsoft. This book is ideal for IT professionals, cybersecurity experts, system administrators, and anyone who wants to learn how to protect Windows 11 from cyber threats. The book covers a range of topics, including user accounts and privileges, data protection, network security, application security, remote access security, auditing and monitoring, and more. Readers will learn how to configure Windows 11 settings, use built-in security features, and follow security best practices to protect against common threats such as malware, phishing attacks, ransomware, social engineering, and network attacks. The book includes step-by-step instructions, tips, and best practices to help readers effectively harden their Windows 11 systems. Written by cybersecurity expert and CISSP-certified professional Russell D. Nomer, "Hardening Windows 11" provides readers with...

Cyberfusion Team Building

Image
  "Cyberfusion Team Building" is a comprehensive guide to establishing and maintaining a successful cyberfusion team within an organization. The book delves into key aspects of information security, such as understanding various threats, creating a security culture, and identifying roles and responsibilities. It provides a roadmap for setting team goals and objectives, developing effective communication strategies, and offering training and development opportunities for team members. The book emphasizes the importance of collaboration and coordination, both internally and externally, as well as planning for incident response and managing cybersecurity risks. It offers insights into selecting and implementing appropriate security tools and technologies and emphasizes the significance of ethics and compliance in information security. Throughout the book, readers will find practical advice, examples, and templates designed to help organizations build robust cyberf...

"Information Security and Cybersecurity Frameworks 101" by Russell D. Nomer, CISSP

Image
  "Information Security and Cybersecurity Frameworks 101", provides a comprehensive guide to understanding and implementing information security and cybersecurity frameworks. The book covers popular frameworks, such as ISO/IEC 27001, NIST Cybersecurity Framework, and Center for Internet Security (CIS) Critical Security Controls, and provides guidance on selecting and implementing the appropriate framework for an organization's specific needs and challenges. The book also includes case studies and lessons learned, as well as a section on emerging trends and technologies. With a focus on the importance of continual monitoring and assessment, this book is an essential resource for organizations looking to build and maintain effective security programs.

Unlock Unshakable Security: Empower Your Business with Russell Nomer's Elite InfoSec Consulting & Advisory Services

Image
        Preparing The Board for Information Warfare Information Security & Cybersecurity Frameworks 101 Cyberfusion Team Building  Hardening AWS Hardening Windows 11 Hardening MacOS CISO's Guide to Surviving Machiavellian Politics Hardening Salesforce: A Comprehensive Guide to Securing Your CRM The Cybersecurity Professionals Guide for Maintaining Mental Health: Strengthening Resilience and Fostering Emotional Well-being in the Digital Age   Russell D. Nomer, CISSP is an Information Security Management Consultant, Coach and Advisor with over three decades of experience transforming information risks into valued outcomes, tangible learning experiences, and improved cultural team structures.   Russell can be reached via his website or through Linkedin   In addition, Russell moderates the New York Cybersecurity Professional Meetup Group and The Cybersecurity Soup Meetup Group .  To get in touch with Russell for a more urgent matter, c...