CISO as a Service
5.17K subscribers
4.74K photos
771 videos
1.89K files
7.02K links
Founder @ DiyakoSecureBow | CISO as a Service (vCISO)
About Me
https://about.iss.one/Alirezaghahrood

Follow Me on
🔵LinkedIn
https://www.linkedin.com/in/AlirezaGhahrood
🔴YouTube
https://www.youtube.com/AlirezaGhahrood
X
https://twitter.com/AlirezaGhahrood
Download Telegram
PurpleTeam Exercises
EDR Silencing

EDR Silencing is a technique that enables threat actors with elevated privileges on the asset to restrict endpoint detection and response visibility in order to execute less opsec oriented techniques.
https://ipurple.team/2026/01/12/edr-silencing

— CISO as a Service —
Strategic Cyber Defense & GRC
Resilient Through Knowledge
2026.03.15

https://www.linkedin.com/posts/alirezaghahrood_purpleteam-exercises-edr-silencing-edr-silencing-activity-7439191925951340544-6iIt
👍1
#DiyakoSecureBow
————————————
CISO as a Service (vCISO)

Security Reviews Shouldn’t Be Slowed Down
by Manual Processes

Security questionnaires have become a standard part of vendor assessments, compliance reviews, and third party risk management. Yet in many organizations, they are still handled manually creating delays, inconsistencies, and unnecessary operational risk.

Automation can significantly improve this process by making responses consistent, traceable, and scalable.

This 5 Step Security Automation Readiness Checklist highlights the foundational steps that GRC and Information Security teams should consider before implementing automated security review workflows.

Key focus areas include:
• Establishing a reliable security knowledge base
• Structuring standardized response frameworks
• Aligning security controls with compliance requirements
• Improving response consistency and audit defensibility
• Preparing teams and processes for scalable automation

Organizations that prepare these foundations early can significantly reduce the operational burden of security questionnaires while improving accuracy, transparency, and governance maturity.

Special Thanks🙏♥️😇
Optro

Read the checklist:
https://thn.news/automated-sec-checklist

2026.03.16
——————————————————
#CyberSecurity #SecurityAutomation #GRC #ThirdPartyRisk #InformationSecurity #DigitalTrust #SecurityGovernance

https://www.linkedin.com/posts/diyako-secure-bow_diyakosecurebow-cybersecurity-securityautomation-activity-7439201190623686656-ITHA
👍1
The Real Bottleneck in Many SOCs Isn’t Technology
It’s Tier 1 Operations

Over the years working with SOC teams, I’ve seen a recurring pattern. Most organizations invest heavily in tools: SIEM, SOAR, EDR, threat intelligence feeds, and automated detection platforms , els.

Yet the actual bottleneck often sits at Tier 1.
Why?

Because Tier 1 analysts operate under the most difficult conditions:
• highest alert volume
• least operational experience
• constant pressure for fast triage

This combination often leads to:
•alert fatigue
•high false positive handling time
•missed contextual signals
•delayed escalation to Tier 2 and Tier 3

In practice, the challenge is rarely just detection capability
it’s decision capability at the first layer of defense. That’s where contextual threat intelligence and sandbox analysis become critical. When integrated properly into SOC workflows, they help transform raw alerts into actionable decisions, enabling Tier 1 analysts to validate indicators faster, reduce false positives, prioritize real threats earlier in the kill chain, and escalate incidents with stronger context.

A mature SOC is not defined only by the tools it deploys.
It is defined by how effectively analysts at every tier can make confident decisions under pressure. And strengthening Tier 1 is often one of the highest-ROI improvements a SOC can make.

https://thehackernews.com/2026/03/building-high-impact-tier-1-3-steps.html

— CISO as a Service —
Strategic Cyber Defense & GRC
Resilient Through Knowledge
2026.03.16

#CyberSecurity #SOC #ThreatIntelligence #SecurityOperations #BlueTeam

https://www.linkedin.com/posts/alirezaghahrood_cybersecurity-soc-threatintelligence-share-7439240266861068288-G0t-
👍1
In the Middle of Pain and Chaos, A Small Sign of Life

In other words
Even in the Darkest Days, Life Finds a Way to Bloom

در روزهایی که بسیاری از ما زیر فشار غم‌ها، فشارهای اقتصادی، بی‌عدالتی‌ها و نابرابری‌ها نفس می‌کشیم‌در روزهایی که دیدن دود و ویرانی در گوشه‌هایی از جهان عادی شده‌و این روزها نیز جنگ، به جفای زورگویی بر سر مردم سایه انداخته است…

و دردناک‌تر از همه، کشته شدن هم‌وطنانمان‌دردی که قلب هر انسان آزاده‌ای را سنگین می‌کند.‌ از طرفی، برای بسیاری از ما کار هم متوقف نشده.‌ ساعت‌ها درگیر تغییر و تنظیم مجدد کانفیگ‌های VPN برای برقراری اتصال هستیم، حداقل های که نداریم! آن هم با سرعت اینترنتی که گاهی حس می‌داد دوباره برگشته‌ایم به کارت‌های اینترنتی دهه ۷۰ و ۸۰ و پر از استرس ابلاغ و پیامک…!

امروز سری کوتاه به شرکت زدم دلم برای همکاران تنگ‌ شد در سکوت دفتر، چیزی توجهم را جلب کرد‌گل سانسوریا شکوفه داده بود.

راستش تا امروز ندیده بودم سانسوریا گل بدهد.
همان‌جا یاد این بیت سعدی افتادم:
برگ درختان سبز در نظر هوشیار
هر ورقش دفتری است معرفت کردگار

گاهی طبیعت، در ساده‌ترین شکلش
پیامی می‌دهد که هیچ خبر و تحلیلی نمی‌تواند منتقل کند. در آستانه سال ۱۴۰۵ هستیم.‌شاید این شکوفه کوچک یادآوری باشد که حتی در سخت‌ترین روزها هم زندگی راه خودش را پیدا می‌کند.‌به فال نیک می‌گیرمش.

امیدوارم سال پیش رو برای همه ما
سال آرامش، انسانیت و زندگی باشد. 🌱✌️

— CISO as a Service —
Strategic Cyber Defense & GRC
Resilient Through Knowledge
2026.03.16

https://www.linkedin.com/posts/alirezaghahrood_in-the-middle-of-pain-and-chaos-a-small-share-7439342251224326144-Te_X
2
When a 10.0 CVSS Isn’t Just a Number
It’s a Governance Failure

The recent case of Interlock ransomware exploiting a Cisco firewall zero day is not just another vulnerability story. It’s a reminder of something deeper:
Security failures rarely start at the technical layer they start at the governance layer.☺️

What Actually Happened (Technical View)
•A critical (CVSS 10.0) vulnerability in Cisco FMC
•Exploited as a zero-day before public disclosure
•Attack vector: Insecure deserialization
•Impact:
•Root level access
•Deployment of RATs, proxies, persistence mechanisms
•Full attacker foothold inside the network

This is not exploitation. This is full compromise of control plane security.

Strategic Insight (What Most Miss)
This incident highlights three systemic gaps:
1. Over reliance on “Trusted Infrastructure”
Firewalls are supposed to be trust anchors. But when the security control itself becomes the entry point:
You are no longer defending you are blind.

2. Patch-Based Security is Too Late
If attackers are exploiting weeks before disclosure:
•Your patch cycle = irrelevant
•Your vulnerability management = reactive

👉 This is where most organizations fail:
They defend against known threats, not active adversaries.

3. Lack of Detection Depth (Post-Exploitation)
The attacker didn’t just get access. They:
•Established persistence
•Deployed lateral movement tools
•Blended into the environment

Which means:
Detection capabilities were either weak, delayed, or absent.
What This Means for Mature Organizations If your strategy is still:
•“We have NGFW”
•“We patch regularly”
•“We are compliant”

You are not secure you are optimistically exposed.

What Should Change (Real Recommendations)
1. Move from Perimeter Security → Assumed Breach
•Treat every control as potentially compromised
•Validate continuously (Zero Trust enforcement)

2. Invest in Detection Engineering
•Behavioral analytics (not just signatures)
•SOC rules aligned with post exploitation TTPs
•Map to MITRE ATT&CK (Persistence, Privilege Escalation)

3. Secure the Security Stack
•Harden management planes (FMC, SIEM, EDR consoles)
•Isolate and monitor admin interfaces
•Apply out of band monitoring

4. Threat Led Validation
•Red Team / Adversary Simulation
•Attack Surface Management (ASM)
•Continuous breach & attack simulation (BAS)

Final Thought
Cybercrime has industrialized. And attackers no longer break in through the weakest point they break in through the most trusted one. If your architecture cannot survive the compromise of its own security controls,
it was never resilient only layered.

— CISO as a Service —
Strategic Cyber Defense & GRC
Resilient Through Knowledge
2026.03.19

#CyberSecurity #ZeroTrust #Ransomware #Cisco #SOC #ThreatDetection #vCISO #SecurityArchitecture #DSB

https://www.linkedin.com/posts/alirezaghahrood_cybersecurity-zerotrust-ransomware-share-7440268439258243072-V2Pn
👍1
When AI Security Becomes a National Security Discipline

The release of SL5 Standard for AI Security (v0.1, Mar 2026) structured as an OSCALbased overlay on NIST SP 800-53 signals a critical shift:

👉 We are no longer securing systems.
👉 We are securing decision making infrastructure.

What makes SL5 different?
• It targets frontier AI environments (not traditional IT)
• It aligns with nation state threat models (not enterprise baselines)
• It treats AI as critical infrastructure, not just software

Key Strategic Signals:

1.Control Framework Evolution
Extending NIST SP 800-53 via OSCAL means:
→ Machine readable, automatable compliance
→ Continuous assurance instead of periodic audits

2.AI Specific Threat Surface
SL5 implicitly addresses risks beyond classic cyber:
• Model poisoning
• Data lineage compromise
• Inference manipulation
• Supply chain integrity of models

3.Security = Governance of Intelligence
This is the real shift:
→ Security is no longer about protecting assets
→ It’s about ensuring trustworthy cognition at scale

4.Timeline Matters (2028/2029)
This isn’t theoretical. It’s a roadmap toward:
→ Sovereign AI security posture
→ Strategic resilience against AIdriven adversaries

If your security architecture is still built around:
• Networks
• Endpoints
• Applications

You are already behind.🤓🥸
The next battlefield is:
👉 Models
👉 Data pipelines
👉 Decision integrity

Special Thanks to 🙏♥️😇
Lisa Thiergart
Yoav Tzfati
Peter Wagstaff
Luis Cosio
Philip Reiner
Security Level 5 Task Force

— CISO as a Service —
Strategic Cyber Defense & GRC
Resilient Through Knowledge
2026.03.19

#AI_Security #CyberSecurity #NIST #OSCAL #ZeroTrust #AI #Governance #RiskManagement #Infosec #FutureOfSecurity

https://www.linkedin.com/posts/alirezaghahrood_ai-security-standard-2026-ugcPost-7440425257913470976-joPp
1👍1
#DiyakoSecureBow
————————————
CISO as a Service (vCISO)

When Fixing a Vulnerability Becomes a Forensic Problem

In modern software ecosystems, identifying vulnerabilities is no longer the hard part. Understanding how they were actually fixed is where complexity begins.

Introducing FAVIA (Forensic Agent for Vulnerability fix Identification and Analysis) a 2026 researchdriven framework that reframes vulnerability remediation as a forensic and reasoningintensive process, not just pattern matching.

What Makes FAVIA Different?
Unlike traditional approaches that rely on:
•single pass analysis
•commit similarity
•or shallow heuristics

FAVIA adopts an evidence driven, multi step reasoning model:
✔️ Agent based forensic analysis of code changes
✔️ Iterative semantic reasoning across commits and contexts
✔️ Scalable candidate ranking for potential fixes
✔️ Identification of indirect, distributed, and multi file remediation patterns

👉 This is critical because real world fixes are rarely isolated or obvious.

⚠️ Why This Matters (From a Security Engineering Perspective)

Most organizations still assume:
“Fix = the commit that mentions the vulnerability”

But in practice:
•Fixes are often implicit
•Spread across multiple components
•Embedded in refactoring or architectural shifts

This leads to:
False assumptions in patch validation
Weak root cause analysis
Incomplete remediation tracking

FAVIA addresses this gap by treating vulnerability fixing as a traceable, explainable chain of evidence.

Strategic Implication for DevSecOps
This is more than a research artifact. It signals a shift:
➡️ From Detection centric security
➡️ To Evidence based remediation intelligence

In mature DevSecOps environments, this enables:
•Accurate fix attribution
•Better secure code review workflows
•Stronger auditability and compliance (e.g., ISO 27001, SSDLC)
•Integration with AI assisted code review and SAST/DAST pipelines

Where It Fits in a Modern Security Stack
At Diyako Secure Bow (DSB), we see this approach aligning with:
•Secure SDLC (SSDLC) maturity models
•Advanced Code Review (Manual + AI-assisted)
•Threat informed remediation (MITRE aligned)
•SOC & Detection Engineering feedback loops

Special Thans to 🙏✌️😇
Kudos to the authors for advancing evidence driven vulnerability remediation and pushing the boundaries of secure code analysis.

💬 Final Thought
Security is not just about finding vulnerabilities.
It’s about understanding the truth of how they are fixed.

And that requires moving from:
Tools that scan code
to
Systems that reason about change

2026.03.19
——————————————————
#DevSecOps #AppSec #SecureCoding #CodeReview #VulnerabilityManagement #AIinSecurity #CyberSecurity #DSB #SecureBusinessContinuity

https://www.linkedin.com/posts/diyako-secure-bow_forensic-agent-2026-activity-7440428066952146945-c-J6?
👍1
#DiyakoSecureBow
————————————
CISO as a Service (vCISO)

Hardening Windows 11 Beyond Defaults Measured, Automated, Repeatable

In our latest research, we explored how far Windows 11 security can be pushed using PowerShell Desired State Configuration (DSC) aligned with CIS Windows 11 Level 1 and BitLocker baseline recommendations.

Whitepaper
“Configuring Windows 11 Workgroup Computers to CIS L1 and BitLocker Baselines Using PowerShell DSC”

What we tested
Using three Azure Virtual Desktop instances (Windows 11 25H2), we evaluated three distinct security states:
1.Default Configuration
Baseline OS security with no hardening
2.Basic Hardening
Using in box PowerShell DSC resources
3.Enhanced Hardening
Leveraging:
•SecurityPolicyDsc
•AuditPolicyDsc
(PowerShell Gallery DSC Resource Kit)

📊 Key Insights
• Default Windows configurations still leave significant attack surface exposure
• Native DSC provides structured, repeatable baseline enforcement
• Community DSC modules enable granular control over security & audit policies
• Alignment with CIS benchmarks is achievable in an automated and scalable way
• BitLocker enforcement plays a critical role in data-at-rest protection maturity

Why this matters
Hardening is not a one time checklist it’s a continuous, codified process.

Using DSC transforms security from:
➡️ Manual & inconsistent
to
➡️ Policy as Code, auditable, and enforceable at scale

This is especially critical in:
•Distributed environments (AVD / Remote workforce)
•Workgroup based systems lacking domain controls
•Organizations aiming for baseline compliance (CIS, ISO 27001, NIST)

🛡️ DSB Perspective
At Diyako Secure Bow, we see endpoint hardening as part of a broader control system:

Security = Architecture + Governance + Continuous Enforcement

DSC based hardening is not just technical optimization
it is a governance enabler for measurable cyber resilience.

📌 If you’re working on:
•Windows hardening at scale
•CIS benchmark alignment
•Secure endpoint baselines in hybrid environments

Special Thanks to 🙏✌️😇
SANS Institute
SANS Technology Institute
SANS Cyber Defense

Let’s exchange insights.

2026.03.20
——————————————————
#CyberSecurity #Windows11 #Hardening #PowerShell #DSC #BitLocker #CISBenchmark #EndpointSecurity #ZeroTrust #SecurityArchitecture #DiyakoSecureBow

https://www.linkedin.com/posts/cis-win-11-hardening-configuration-2026-ugcPost-7440564764008792064-E4Ws
👍1
“Many cloud services are insecure by default and require proper configuration to reduce attack surface.”

Secure by Default? Not Really.
One of the most dangerous assumptions in modern IT:
“Systems are secure out of the box.”

According to SANS cloud security guidance,
many services across AWS, Azure, and GCP are not secure by default and require explicit configuration to reduce attack surface

This is not just a Cloud problem
The same pattern exists across endpoints.

What became clear
Default configurations prioritize usability not security
Manual hardening introduces inconsistency and drift
Only policy driven, automated enforcement provides:
Repeatability
Measurability
Auditability

The real issue is deeper than tools
Across both Cloud and Endpoint environments,
we consistently see the same gaps:
• Over reliance on vendor defaults
• Lack of defined security baselines
• No automated enforcement
• Limited visibility into configuration drift

Lessons from Cloud Security (SANS perspective)
From the SEC510 guidance:
• Default networks and overly permissive access must be removed
• Logging and monitoring must be explicitly enabled
• Encryption should be enforced for data at rest and in transit
• IAM must follow strict least privilege principles

These are not advanced controls
they are baseline requirements.🤙🏾

💡 So what actually works?
Security becomes effective when:
👉 Configuration becomes codified (Policy as Code)
👉 Enforcement becomes continuous, not manual
👉 Governance aligns security with business risk

🧩 DSB Perspective
Diyako Secure Bow
Hardening is not a checklist
it is a control system

Security = Baseline + Enforcement + Visibility + Governance

📌 If your organization still relies on manual hardening,
you are not managing security
you are managing its illusion.

Special Thanks To 🙏😇✌️
SANS Institute
SANS Technology Institute
SANS Security Leadership

— CISO as a Service —
Strategic Cyber Defense & GRC
Resilient Through Knowledge
2026.03.20

#CyberSecurity #CloudSecurity #Windows11 #Hardening #DSC #CISBenchmark #BitLocker #SecurityArchitecture #ZeroTrust #DiyakoSecureBow

https://www.linkedin.com/posts/alirezaghahrood_sans-sec510-wall-poster-2026-ugcPost-7440568792520396801-eH4c
1👍1
Nowruz 1405 — Between Fire and Hope

مرگ، برای من همیشه مفهومی آرامش‌بخش بوده. فکر اینکه زندگی‌ام می‌تواند هر لحظه به پایان برسد، مرا آزاد می‌کند تا بتوانم
زیبایی، هنر و حتی تمام وحشت‌های این دنیا را عمیق‌تر درک و تجربه کنم.‌ نوروز ۱۴۰۵ را در حالی آغاز می‌کنیم که پشت سرمان تنها یک سال نیست، بلکه سال‌هایی‌ست پر از زخم‌های انباشته.

از جنگ‌هایی که هنوز صدایشان خاموش نشده،‌ تا انسان‌هایی که جانشان را از دست دادند چه در میدان‌های جنگ‌ و چه در خیابان‌هایی که باید محل زندگی می‌بودند، نه مرگ.‌ از اعتراضات به حقی که بهایش را انسان‌ها پرداختند،‌ تا خانواده‌هایی که هنوز در سکوت، داغدارند.
از تورمی که فقط اقتصاد را تحت فشار نگذاشت، بلکه کیفیت و کرامت زندگی را فرسوده کرد، تا نابرابری‌هایی که در سال‌های اخیر عمیق‌تر شدند
و شکاف عدالت را بیشتر نمایان کردند.

این‌ها صرفا رویداد نبودند
این‌ها بخشی از تجربه زیسته ما بودند.
اما در دل همین تاریکی
چیزی هنوز باقی مانده است:
توان ایستادن
توان ساختن
و امیدی که با وجود همه فشارها، هنوز خاموش نشده.

نوروز، فقط تغییر تقویم نیست یادآوری این است که حتی پس از سخت‌ترین زمستان‌ها، زندگی راهی برای ادامه پیدا می‌کند.

برای سال ۱۴۰۵،‌ بیش از هر آرزوی ساده
آرزوی آگاهی، مسئولیت‌پذیری و انسانیت دارم برای خودمان، برای جامعه‌مان
و برای تصمیم‌هایی که آینده را شکل می‌دهند.

امیدوارم امسال،‌ کمتر شاهد از دست دادن باشیم و بیشتر شاهد بازسازی نه فقط در ظاهر بلکه در اعتماد، عدالت و کرامت انسانی.

نوروزتان آگاهانه، انسانی و امیدوار. 🙏♥️😇✌️
1405.01.01

— CISO as a Service —
Strategic Cyber Defense & GRC
Resilient Through Knowledge
2026.03.20

https://www.linkedin.com/posts/alirezaghahrood_nowruz-1405-between-fire-and-hope-%D9%85%D8%B1%DA%AF-share-7440759929877172224-y8P0
1
Forwarded from cissp (CISO as a Service)
#DiyakoSecureBow
————————————
CISO as a Service (vCISO)

🔍 Trojans in Artificial Intelligence

What the TrojAI Program Really Revealed
The IARPA TrojAI Final Report (2026) surfaces a critical reality for modern cybersecurity:
AI models are no longer just assets they are attack surfaces.

🎯 Core Insight
AI Trojans (backdoors) are intentionally embedded manipulations within models that remain dormant under normal conditions but activate via specific triggers — enabling adversarial control without degrading baseline performance.

Key Technical Findings
1. Detection is Possible But Not Reliable Yet
TrojAI advanced two primary detection paradigms:
•Weight space analysis → identifying statistical anomalies inside model parameters
•Trigger inversion → reconstructing hidden triggers via model probing

However:
Detection performance is highly variable and context dependent.

Meaning:
•No universal detector exists
•Generalization across architectures remains weak

2. “Natural Trojans” Change the Game
One of the most important findings:
Some models exhibit Trojanlike behaviors without intentional poisoning.

Implication:
•Security cannot rely solely on provenance or trust in training pipelines
•Emergent behavior = new attack surface category

3. Model Integrity ≠ Data Integrity
Traditional security assumes:
“If data is clean, model is safe.”
TrojAI disproves this.
Attack vectors include:
•Training time poisoning
•Model supply chain compromise
•Third party pretrained model risks

4. Trojan Removal is Still an Open Problem
The report is explicit:
Removing Trojans from a trained model is not reliably solvable today.

So practically:
•Detection ≠ remediation
•In many cases → replace, not repair

Strategic Implications (What Leaders Should Understand)
1. AI Must Be Treated as Critical Infrastructure
AI systems in:
•Banking
•Defense
•Autonomous systems

are now mission critical AND adversary controllable.

2. MLSecOps is No Longer Optional
Organizations need:
•Model validation pipelines
•Pre deployment security testing
•Continuous behavioral monitoring

Equivalent of:
•DevSecOps → now MLSecOps

3. Zero Trust Must Extend to AI Models

4. Supply Chain Risk is the Biggest Blind Spot
Pretrained / third party models introduce:
•Hidden backdoors
•Undetectable triggers
•Long term persistence risk
_ _ _
Organizations that fail to:
•validate AI behavior
•control model supply chains
•and integrate MLSecOps

will be operating blind inside their own intelligent systems.

Special Thanks to 🙏😇✌️
Office of the Director of National Intelligence

“In the era of AI, the question is no longer ‘Is your system secure?’ but ‘Can you trust the decisions your AI makes under adversarial conditions?’”

2026.03.21
——————————————————
#CyberSecurity #AISecurity #MLSecOps #ArtificialIntelligence #AITrust #ZeroTrust #CyberResilience #AdversarialAI #ModelSecurity #SupplyChainSecurity #SecurityGovernance

https://www.linkedin.com/posts/trojan-ai-final-report-2026-cti-ugcPost-7440909471280816128-XuZF
👍1
CIS Controls v8.1
Still the Most Practical Baseline for Cyber Defense?

The latest reference to CIS Critical Security Controls (v8.1) reinforces something many organizations still underestimate:
Cybersecurity maturity does not start with advanced tools it starts with disciplined fundamentals.🤙🏾 CIS Controls remain one of the most operationally actionable frameworks for defending against today’s most common and impactful threats. Not because they are complex, but precisely because they are prioritized, measurable, and implementation driven.

From a practical standpoint, what makes CIS Controls powerful:
• They translate high level frameworks (like NIST CSF or ISO 27001) into concrete technical and operational actions
• They provide a prioritized roadmap (IG1 → IG3) aligned with organizational maturity
• They directly map to real world attack patterns (aligned with MITRE ATT&CK)
• They enable faster baseline hardening before advanced investments

However, a critical point often overlooked:
CIS Controls are not a strategy they are a control baseline. Without governance, risk context, and continuous validation, even well implemented controls can become ineffective over time.

In today’s threat landscape, the winning approach is:
Controls (CIS) + Governance (GRC) + Continuous Validation (Red/Purple Teaming & SOC maturity)

That’s where real resilience is built.😁

Special Thanks to😇♥️✌️
Center for Internet Security

— CISO as a Service —
Strategic Cyber Defense & GRC
Resilient Through Knowledge
2026.03.22

#CyberSecurity #CISControls #BlueTeam #SecurityFrameworks #GRC #SOC #CyberDefense #vCISO

https://www.linkedin.com/posts/alirezaghahrood_cis-controls-v81-2026-ugcPost-7441333811197534208-fU7f
1
#DiyakoSecureBow
————————————
CISO as a Service (vCISO)

The Hidden OT Attack Surface
No One Talks About

Most OT security programs still focus on core systems PLCs, SCADA servers, network segmentation. But this research highlights a far more exposed and underestimated layer:
BAS front end systems with legacy SQL dependencies

These components are often:
•Internet exposed (via Shodan)
•Weakly authenticated
•Poorly patched
•Deeply interconnected with both IT and OT layers

What makes this study valuable is not just the problem but the approach:
•Building an OT focused SBOM
•Mapping real world exposure
•Translating findings into risk heatmaps
•Mitigating based on the SANS ICS Critical Controls

📌 The takeaway:
OT security is no longer just about isolation.
It’s about visibility, context, and defensible architecture.
If you’re not analyzing your OT front end exposure,
you’re likely missing your most accessible attack path.

Special Thanks to 🙏♥️✌️
Authors 😁
SANS ICS

2026.03.22
——————————————————
#OTSecurity #SCADA #ICS #CyberSecurity #AttackSurface #SBOM #RiskManagement #SANS #BAS

https://www.linkedin.com/posts/protecting-ots-2026-ugcPost-7441368811645255680-4q3m
👍1
Over the years working in cybersecurity, I’ve realized that the role of a Chief Information Security Officer (CISO) goes far beyond tools and technologies it’s fundamentally about decision making, risk management, and building trust at the organizational level.

To structure these insights, I created a CISO MindMap (2026) a consolidated view combining:
•Real world field experience
•Industry frameworks (ISO 27001, NIST, Zero Trust)
•Practical challenges organizations face in their security maturity journey

This is not just a diagram; it’s a mental model for better decision making, security architecture design, and maturity development.I hope it can serve as a useful baseline for CISOs, SOC teams, GRC professionals, and business leaders.

Would love to hear your thoughts and perspectives.

طی سال‌ها فعالیت در حوزه امنیت سایبری به این نتیجه رسیدم که نقش Chief Information Security Officer (CISO) فراتر از ابزار، تکنولوژی و حتی فرآیندهاست این نقش در اصل درباره تصمیم‌سازی، مدیریت ریسک و ایجاد اعتماد در سطح سازمان است.

برای ساختاردهی به این تجربیات تلاش کردم نگاه عملیاتی، راهبردی و حاکمیتی خودم را در قالب یک MindMap از CISO در سال 2026 جمع‌بندی کنم. این مایندمپ ترکیبی است از:
• تجربیات میدانی در پروژه‌های واقعی
• چارچوب‌های بین‌المللی (مانند ISO 27001، NIST، Zero Trust)
• و چالش‌هایی که سازمان‌ها در مسیر بلوغ امنیتی با آن مواجه هستند

این خروجی صرفا یک نمودار نیست بلکه یک نقشه ذهنی برای تصمیم‌گیری بهتر، طراحی معماری امن‌تر و ارتقای بلوغ امنیتی سازمان‌ها است. امیدوارم این ساختار برای:
• مدیران امنیت (CISO/CIO)
• تیم‌های SOC و GRC
• و حتی مدیران کسب‌وکار
مفید باشد و بتواند به عنوان یک بیس لاین برای گفتگو، طراحی و بهبود امنیت سازمانی مورد استفاده قرار گیرد.

خوشحال می‌شوم نظرات، تجربیات و دیدگاه‌های شما را هم در این مسیر بشنوم

— CISO as a Service —
Strategic Cyber Defense & GRC
Resilient Through Knowledge
2026.03.22

https://www.linkedin.com/posts/alirezaghahrood_over-the-years-working-in-cybersecurity-share-7441390692670627840-QVGP
😍1