Cyber Risk Management Solutions
Byron DeLoach Selected to Speak at 2019 National Cyber Summit

Byron DeLoach Selected to Speak at 2019 National Cyber Summit

Byron DeLoach will speak at the 2019 National Cyber Summit in Huntsville, AL. 

Conference Dates: June 4-6, 2019
Location: Von Braun Center – Huntsville, AL

2019 National Cyber SummitByron DeLoach, Cybriant’s Director of Adaptive Services, was recently selected to speak at the upcoming National Cyber Summit in Huntsville, AL.

Mr. DeLoach’s session, “True Cyber Crime Story: Blocking a Nation-State Attack” will be held on Wednesday, June 5, 2019 1:15 p.m. – 2:00 p.m.

Join us to find how we used CylancePROTECT and CylanceOPTICS to stop a persistent advanced web shell attack conducted by Nation-State Attackers that prevented an organization from becoming the focus of a lengthy FBI investigation.

2019 National Cyber Summit

The 2019 National Cyber Summit is the nation’s most innovative cyber security-technology event, offering unique educational, collaborative and workforce development opportunities for industry visionaries and rising leaders. Our core focus is on two things: accessibility and connectivity.

Held in Huntsville, Alabama, one of the nation’s largest technological hubs, the Summit attracts commercial companies including healthcare, automotive and energy; academia; Department of Defense organizations; and civilian departments and agencies including DHS, NIST, U.S. Army, NASA, TVA, NSF and DOE.

Event Background

Since its inception in 2008, the Summit offers numerous benefits to attendees. Some of the benefits include a diverse offering of educational training sessions, technical and management presentations and keynotes from world-class speakers. The Summit also offers the unique opportunity to networks, showcase solutions and learn new skills.

The Summit is hosted by the North Alabama Chapter of the Information Systems Security Association (NAC-ISSA), Cyber Huntsville Corporation (CHC), Auburn University Research, and University of Alabama in Huntsville.

About Byron DeLoach

A member of Cybriant’s Management team, Mr. DeLoach has 30 years of experience in the areas of IT security, IT infrastructure, and Managed IT Services. As Cybriant’s Director of Adaptive Services, he oversees the delivery of the company’s managed and professional services.

Relating to his current responsibilities at Cybriant, Mr. DeLoach is a certified AlienVault engineer who has personally completed over 200 engagements assisting end-users and

MSSPS in the implementation and tuning of AlienVault technology. He has also taught over 20 classes as an AlienVault instructor. These services have been performed for companies all over the world across a variety of industry verticals including Finance, Retail, Legal, Education, Manufacturing, and Healthcare.

Mr. DeLoach is also an accomplished provider of security risk assessments having completed over 30 assessments for an array of organization ranging from Mid-Market companies to the Fortune 500. He possesses knowledge and expertise with the most accepted security control frameworks such as NIST-CSF, SANs CIS, and ISO 27001.

Prior to Cybriant Mr. DeLoach held a success of leadership and engineering roles responsible for the design, implementation and management of IT infrastructure and security architecture.

Protect Your Endpoints

How a Cyber Risk Assessment can Prevent Data Breaches

How a Cyber Risk Assessment can Prevent Data Breaches

At Cybriant, we recommend every new client begin with a cyber risk assessment so your organization will have a full assessment of your current state of security, any gap analysis, and recommendations. Many compliance regulations stipulate the need for an annual risk assessment. Here are three ways a cyber risk assessment can help prevent data breaches.

cyber risk assessmentWhen companies focus on protecting their assets from hackers, they may overlook threat detection. As a result, threats to the network often go undetected for weeks, leaving the organization vulnerable to data theft. Learn how a security risk assessment can show your organization where it is vulnerable to a cyber attack so you can plug holes in your defenses before your organization suffers a breach.

#1 Identify Loopholes in Your Threat Protection

A security risk assessment shows where your system is strong and where it is weak. Using the data, you can hone in on loopholes that represent easy access points for hackers and come up with an action plan to fix things.

Since cyber risk assessments show the broader spectrum of your company’s cybersecurity system, they are useful when key stakeholders need to be talked into making additional investments in cybersecurity. The assessment provides demonstrated proof of vulnerabilities. When confronted with such compelling evidence, many naysayers often change their tune and finally fund the infrastructure that is needed to prevent a data breach.

#2 Fill Gaps in Cybersecurity Coverage

The typical company has several network protection systems in place. These often act as a patchwork, because the systems may be cobbled together from a variety of vendors. The cyber risk assessment will show you where gaps in coverage exist–which hackers can exploit to gain access to your system. Once you’re aware of these gaps, you can identify vendors that offer solutions to fill coverage gaps and fully protect your valuable data.

#3 Comprehensive Cybersecurity Protection

It can be easy to wonder if you are doing enough when it comes to cybersecurity. With a cyber risk assessment, you can stop asking this question because you will have a personalized road map to comprehensive protection. All your organization needs to do is follow the specific actions suggested by your organization’s threat assessment to know that you are protected to best-in-class capabilities.

Cybersecurity is something of a cat-and-mouse game. As companies arm themselves with better protection, hackers either search for easier targets or get more creative in their attacks. By prioritizing your data safety through periodic threat assessments, you can fine-tune your defenses and reduce the likelihood of suffering a devastating data breach.

Cyber Risk Assessment

Our Cyber Risk Assessment is a required step when determining the needs or success of your security program. Following NIST guidelines our risk experts perform interviews, documentation analysis, and walkthrough of physical areas to determine the state of the security program of the client. Our Cyber Risk Assessment is a useful tool at any phase of implementing a security program.

Take a look and get started today:

Anthony Curlo Joins Cybriant as Vice President Sales

Anthony Curlo Joins Cybriant as Vice President Sales

anthony curloCybriant, an award-winning leader in cybersecurity services, announced today that Anthony Curlo has joined its leadership team as Vice President Sales.

With over two decades of experience selling and delivering services in the Information Technology industry, Curlo has built an unparalleled reputation as an executive leader and trusted advisor to C-level executives in corporations ranging from the Mid-Market to the Fortune 500. Anthony will continue to accelerate the company’s rapid growth through the sale its of strategic and managed services that aid in the creation and management of framework-based security programs. 

 “We are extremely pleased to have Anthony on the team,” said Jeff Uhlich, CEO of Cybriant. “Anthony is a driven, entrepreneurial sales leader with demonstrated success deploying enterprise technology solutions to win new business, grow existing accounts, and achieve profitable revenue growth. He is a problem solver who leverages his technical background to construct innovative solutions that meet and exceed client expectations for business value.”

He has been quoted and recognized in numerous publications, and he has been a featured speaker and panelist at a variety of key industry events and conferences.  Curlo holds a Bachelor of Science degree in Electrical Engineering from Syracuse University where he serves as a member of the Dean’s Leadership Council, and he possesses a Master’s degree in Business Management with highest honors and distinction from Fairleigh Dickinson University.

About Cybriant

Cybriant assists companies in making informed business decisions and sustaining effectiveness in the design, implementation, and operation of their cyber risk management programs. We deliver a comprehensive and customizable set of strategic and managed cybersecurity services. These services include Risk Assessments and vCISO, 24/7 Managed SIEM with LIVE Monitoring and Analysis, 24/7 Managed EDR, 24/7 Real-Time Vulnerability Scanning, and Patch Management. We make enterprise-grade cyber security strategy and tactics accessible to the Mid-Market and beyond. Find out more at

3 Amazing NIST 800-171 Facts That You Can’t Afford to Miss

3 Amazing NIST 800-171 Facts That You Can’t Afford to Miss

Big changes are coming around NIST 800-171 requirements for government contractors. Be prepared!

nist 800-171

NIST 800-171

Many external vendors today work with the federal government to help carry out a wide range of business functions. Because of all the sensitive information transferred from the government to these vendors, the government is cracking down on the compliance and security regulations for these vendors – and any companies that work with those vendors or service providers.

Since these services provided by outside vendors and contracts are essential to the federal government, we have provided a list of 3 requirements necessary for any and all government-related contractor and the importance of understanding the specifications of NIST 800-171.

Additionally, federal information is frequently provided to or shared with entities such as State and local governments, colleges and universities, and independent research organizations. The protection of sensitive federal information while residing in nonfederal information systems and organizations is of paramount importance to federal agencies and can directly impact the ability of the federal government to successfully carry out its designated missions and business operations, including those missions and functions related to the critical infrastructure.


#1 Your Federal Funding Is at Risk If You Are Not Compliant!

Originally, this was the rule for any Department of Defense contractor that stored or transmitted Controlled Unclassified Information (CUI). Known as DFARS Compliance, this regulation went into effect at the end of 2017.

Today, this is being extended to any vendor, service provider, or contractor that is contracted by any entity that work with the federal government.

Here’s the original DFARS wording:

All Department of Defense (DoD) contractors that process, store or transmit Controlled Unclassified Information (CUI) must meet the Defense Federal Acquisition Regulation Supplement (DFARS) minimum security standards by December 31, 2017 or risk losing their DoD contracts.

DFARS Safeguarding rules and clauses, for the basic safeguarding of contractor information systems that process, store or transmit Federal contract information. DFARS provides a set of “basic” security controls for contractor information systems upon which this information resides. These security controls must be implemented at both the contractor and subcontractor levels based on the information security guidance in NIST Special Publication 800-171 “Protecting Controlled Unclassified Information in Non-Federal Information Systems and Organizations.” The DFARS cybersecurity rule and clauses and be found at


#2 NIST 800-171 is for ALL Government Contractors – not just those with a DoD contract

If you work with a large government contractor, you may have heard some buzz that all contractors must comply with the NIST framework, specifically NIST 800-171. And not only the contractors but any vendors or service providers that are outsourced by those contractors must also comply as well.

If your organization falls in this category, it’s important to understand what is involved in the specifications of NIST 800-171.

Start with a security assessment to help understand your current state of security. Be sure to work with a company like Cybriant that understands the NIST framework, especially the specifications around NIST 800-171 regulations and can bring you to a state of compliance, so you aren’t at risk of losing business.

Your organization may need to upgrade security policy and procedures as well as ensure your network, email, endpoints, etc. are secure according to the specifications of NIST 800-171.

#3 An Outside Organization Is Your Best Resource

There are more than 100 security requirements in NIST 800-171. While it may seem an easy task to undertake, think about the consequences of not getting it right. Your team needs to understand the language that will be used by federal auditors like controlled information, controlled technical information, controlled unclassified information, etc.

An outside organization will not only help translate any government lingo that your team may not be used to, but they will also help put in real-world terms the tasks that are required to be completed.

Work with an organization like Cybriant to take a high-level look of your organization through a security assessment, and then use our services, technology, and experts to give you granular detail on the steps to become compliant.

If your organization wants to continue receiving grants from the federal government or continue to win government contracts, then it’s important to become compliant with NIST framework early and understand the specifications of NIST 800-171.

Start With an Assessment

5 Building Blocks for a Solid Cybersecurity Foundation

5 Building Blocks for a Solid Cybersecurity Foundation

The cybersecurity sector is constantly growing and is already a part of the strategy of many organizations. This article will give you complete information on How to Build a Solid Cybersecurity Foundation.

cybersecurity foundationWhat is the current state of cybersecurity?

Technology has evolved and innovated making our lives easier and our jobs more productive. Today, technology is controlling critical aspects of our society such as financial markets, electricity networks, air routes, hospitals, etc.

In addition, we increasingly rely on smart devices (telephones, cars, televisions, and refrigerators). This overwhelming pace of innovation and adoption of technology, in times of digital transformation and therefore increased the complexity of systems, requires global awareness of the security, fraud and privacy risks that are increasing even more rapidly.

These risks of which senior management must be aware must be continuously measured and monitored, forming part of the organization’s strategy and establishing a culture of cybersecurity.

Here we will learn about the main 5 building blocks for a solid cybersecurity foundation.

#1. SIEM (Security Information and Event Management):

There are many abnormal attitudes, tendencies, and patterns that are not in the ordinary. This is achieved by SIEM (Security Information and Event Management).

What the SIEM system does is to centralize the storage and interpretation of records, so that it offers almost real-time analysis to the digital security team which can thus act much faster.

For its part, the SIEM system is collecting data in a central database to trace trends and achieve patterns of behavior that can serve to detect others that are not common.

This system, of course, also provides central reports. From the union of both the acronyms we are trying, SIEM, that can unite in a single system all the virtues of its two origins.

Undoubtedly, what is achieved by working with SIEM is not only better management of the working time of the security team and a greater facility to carry out their tasks but it also shortens the times of action, something fundamental for a company in case of threat urgent.

Learn more about Managed SIEM here.

#2. EDR (Endpoint Detection and Response):

The traditional protection systems which we all know as antivirus has until now pretty well-controlled viruses that have historically infected millions of computers. These types of viruses are executable files that aim to contaminate as many computers as possible so that they can be controlled and used for illicit purposes.

Unfortunately, cybercriminals have managed to find different ways to get control of computers, mobile devices, and web servers as they have great ability to recycle their methods.

The EDR (Endpoint Detection & Response) technology promises to be the missing piece to complete that shield against the computer crime we need.

EDR produces a specific list for each client since their executables are analyzed and their behavior is ensured that they do not change. So if one of them gets out of the mold, an alert is activated.

EDR serves to detect new threats and avoid the need to block all malware by working specifically. EDR platforms monitor all executable programs by performing more thorough control.

Learn more about Managed EDR here.

#3. Patch Management:

Patch Management is also one of the parts of a Cybersecurity Foundation. Many large companies want to reduce the vulnerability of their systems. Mostly they make use of a security patch. As cybercriminals intensify their attacks, it is essential to maintain the pace for defense to these attacks.

A security patch is definitely a cybersecurity solution for an organization and although no application is perfect, they are highly effective, even years after a program has been launched.

Its application depends not on the business sector but on the type of vulnerability that is had within the organization.

Types of patches according to their codes:

Patches to binary files: They constitute an update of the executable file of a program.

Patches to the source code: Includes a text file that details modifications to be made in the source code of the program in question.

Benefits of Patch Management:

  • Designed to work in On-Premise and Cloud environments.
  • Highly scalable.
  • Easy to install.
  • Fully automated and highly customizable.

Learn more about Managed Patch Management.

#4. Vulnerability Management:

Vulnerability Management is also one of the essential blocks for a solid Cybersecurity Foundation.

Vulnerability management is a continuous IT process consisting of the identification, evaluation, and correction of vulnerabilities in the information systems and applications of an organization.

Faced with sophisticated IT environments and the growing list of possible problems in the database and network security, IT departments with budgetary constraints find it impossible to deal with all known vulnerabilities at the present time.

Due to the high number of distributed update reviews and the difficulty in quantifying the value of security repairs for business managers, mitigating the weakness of critical networks and applications is a constant challenge.

Without a vulnerability management process that helps to prioritize correction tasks, companies can neglect to take the necessary measures to prevent harmful network attacks. In addition, vulnerability management not only helps the company to proactively solve urgent security problems but also contributes to compliance with industry standards.

Learn more about Real-Time Vulnerability Management. 

#5. Experienced Team:

An experienced team recognizes the high level of experience, specialization, professional quality and the demonstrated and accredited training of its cybersecurity solutions.

Our experienced team offers cutting-edge technology to offer various services such as secure web browsing and protecting its clients’ access to services and applications hosted in the cloud.

We prevent the accidental download of malware that can cause information leaks or interrupt the activity in the company or organization. More than half of cybersecurity clashes registered are related to this type of attacks which causes high economic damage and losses the esteem of the institution or company.

In addition to offering secure navigation services and protection of cloud services, we provide a comprehensive security service from its network that manages all the companies’ environments to reduce the exposure of their resources to an attack and the risk of suffering a security incident.

If your organization lacks the resources required building a solid Cybersecurity Foundation, do not hesitate to contact us. We are very well experienced and will help you to put the right solutions in the right place and manage them suitably.

Build a Cybersecurity Foundation