k12tech Web Logov2

Information from MS-ISAC

Anthony Essmaker Regional Engagement Manager
This email address is being protected from spambots. You need JavaScript enabled to view it.
Office: 518-516-6112
Mobile: 810-488-9379

Quick recap

Anthony from Msisac discussed the importance of conducting assessments to understand an organization's environment and identify potential issues, emphasizing the benefits of the Nationwide Cyber Security Review (NCSR) and the Cyber Security Assistance service program. He also highlighted the importance of implementing the Cis controls and conducting tabletop exercises to practice and improve cyber security. The team also discussed the benefits and costs of conducting penetration tests and vulnerability scanning for their cyber security, with plans for future discussions and updates on various projects.

 

. Security Operations Center (SOC) and Cyber Incident Response Team (CIRT):

  • In case you ever need to report an incident or request assistance from either our SOC or CIRT, feel free to reach out to them 24x7x365 at:
    • Phone: 1-866-787-4722
    • Email: This email address is being protected from spambots. You need JavaScript enabled to view it.

2. IP & Domain Monitoring

  • To add your IPs and update your domains and subdomains, please send them to This email address is being protected from spambots. You need JavaScript enabled to view it. and let them know you would like to add them to the list for your IP and Domain Monitoring service
  • Looks for signs of account compromise and malicious activity by monitoring sink holed websites and publicly dumped credentials

3. Nationwide Cybersecurity Review (NCSR) and Foundational Assessment:

  • NCSR
    • Larger self-assessment with more detailed results. Open from October-February
    • Register for participation at https://www.cisecurity.org/ms-isac/services/ncsr and take a look at available resources!
    • For any questions, reach out to This email address is being protected from spambots. You need JavaScript enabled to view it.:
  • Foundational Assessment
    • This 32 question assessment addresses foundational cybersecurity questions to get you started with evaluating your organization’s current cyber posture.
    • To sign-up, email This email address is being protected from spambots. You need JavaScript enabled to view it. with your organization details.

4. Indicator Sharing/Real-Time Indicator Feeds

  • Automated feed that can be ingested into your firewall ruleset

  

5. Malicious Domain Blocking and Reporting Service (MDBR):

6. Workbench and Free SecureSuite

  • Houses our configuration guidelines, CIS Controls, Benchmarks and a variety of tools.
  • Contact Jody Tarshis, This email address is being protected from spambots. You need JavaScript enabled to view it. to learn more.

7. Malware Next Generation (CISA Service)

8. CISA’s Cyber Hygiene (“CYHY”) Program

  • CISA (DHS’s Cybersecurity and Infrastructure Security Agency) offers several free scanning and testing services, including vulnerability scans, phishing campaigns and remote penetration tests, to help organizations reduce their exposure to threats. 
  • To sign up for their CYHY Program, or request your initial assessment, please reach out to them atThis email address is being protected from spambots. You need JavaScript enabled to view it.

9. Cybersecurity Advisory Services Program (CASP)

  • Community Advisory: A cyber advisor provides a community of members with an overview of a cyber topic and facilitates a peer-to-peer discussion.
  • Member Advisory: A cyber advisor answers a member’s questions to help the member make decisions or take actions to enhance their cyber posture.
  • To sign up, please contact This email address is being protected from spambots. You need JavaScript enabled to view it.

10. Additional Low-Cost services from MS-ISAC

  • Crowdstrike ESS
  • MDBR Plus
  • Albert Intrusion Detection System
  • To learn more about pricing and these services, please contact our services team at This email address is being protected from spambots. You need JavaScript enabled to view it.

11. Resources and Training

12. CIS Critical Security Controls