Heath Renfrow, co-founder of Fenix24 and CISO of Conversant, shares his thoughts with Dice about the insufficient focus on both, security and IT specialization, in a rapidly evolving industry. Read more 👇 #security #CybersecurityCareers #jobsintech
Conversant Group
IT Services and IT Consulting
Chattanooga, Tennessee 13,700 followers
The world's first civilian cybersecurity force: optimizing the efficiency of your IT operations with security above all.
About us
Conversant Group is changing the IT services paradigm with our relentless focus on "Secure First" managed services, IT infrastructure and consulting. Conversant has been a thought leader for over 14 years helping over 500 customers and entire industries get answers to the security questions they may not even know to ask. We are the world's first civilian cybersecurity force, with three time-tested battalions: Fenix24™ / Ransomware rapid response, remediation and recovery Athena7™ / IT security assessments, strategy and planning Grypho5™ / Ongoing, security-based management
- Website
-
https://www.conversantgroup.com
External link for Conversant Group
- Industry
- IT Services and IT Consulting
- Company size
- 51-200 employees
- Headquarters
- Chattanooga, Tennessee
- Type
- Privately Held
- Founded
- 2009
- Specialties
- Microsoft Exchange, Virtualization - Desktop/Server, Storage Area Networks, Infrastructure Management, Switching/Routing, Wireless, Firewalls, Cyber Security, Citrix, Assessments, and Penetration Testing
Locations
-
Primary
1513 Cowart St
Chattanooga, Tennessee 37408, US
Employees at Conversant Group
Updates
-
Only 1 WEEK left until our exciting webinar! Don't miss out on the chance to gain valuable insight from Conversant Founder/CSO & Cybersecurity Expert John A. S. on June 18th at 1 PM EST. Get ready for eye-opening revelations! 👀💡 Register here: https://okt.to/UGpcta From helping hundreds of companies recover from some of the highest profile breaches in the world, we've learned a few unique things about backup protection! Backups need to be DECOUPLED from the identity plane and key infrastructure. Having multiple copies isn’t enough if they aren’t separated. Active directory or even backup software itself can allow threat actors access to multiple copies.🔒 Our client – a major law firm in the Northeast – had 3 copies of their backup. But the threat actors destroyed them all through a single access point – their own backup software! Interested in learning more? Join our webinar to find out how to avoid such risks. 🖥️ Register here: https://okt.to/8OxXj4 #CyberSecurity #Backups #WebinarSignUp
-
There is an obvious overdependence on securing the user (the human). Users are not the problem; we can work to remove user risk from the equation by blocking access by default. We need to shift the solution paradigm away from users and toward IT empowerment – it must take a more active role. Take the 2024 joint survey with International Legal Technology Association (ILTA) so we can continue sharing tips for defending firms and their data: https://okt.to/AdeYRM #CyberSecurity #legaltech #ILTA
-
Conversant Group reposted this
Partnering with VC’s to build out their cyber portfolio companies. Sourcing talent, people strategy, hiring plans, and budgeting | USA
Thinking about your next career move? Check out Conversant Group and its sister companies Fenix24, Athena7, and Grypho5! John A. S. Mark Grazman Brandon Williams Mike Webb walk you through why we are the world’s first Civilian Cybersecurity Force, dedicated to defeating cyber terrorists. Conversant Group
Why Conversant Group and Its Battalions
https://www.youtube.com/
-
Heath said it best! Join Conversant Founder, CSO, and cyber expert John Anthony Smith on June 18th to learn how to defend your MOST important security controls, your backups, and how to safeguard them against different attack stages. Register for our FREE WEBINAR here: https://lnkd.in/epsN_Qzt
I was asked today by security executive in the industry I have known for years on what the top security control was I would recommend to the security industry and my response surprised him. Backups! We have worked hundreds of ransomware events where Fenix24 is called in to help clients restore, and on 95% of those events the backups are wiped or encrypted completely. For the other 5% that survive, less than 1% actually had full copies of all critical data. This makes recovery quite challenging without a decryption key, and it is exactly why the threat actors are targeting the backups every time they get into a victim's environment. If they compromise the backups, their chances of getting a pay day SKYROCKET! I have held several CISO or CSO roles in my career, and I never thought once that my backups would not be available, and fast forward to my role now, and I realize how wrong I was. I was also blind to what it takes to recover from backups. Our Tabletop scenarios make "assumptions" that you can just move data back into production environment quickly. However, with a ransomware event, you have your entire infrastructure encrypted, eating up valuable storage space, how quickly can you transfer Terabytes of data? What is the pipeline to move it? You can't just wipe out the encrypted data as you need forensics evidence, but also you might need that data later on when you realize your missing certain data from backups, and then have to get a decryption key. I could go on, and on about the challenges with recovering from a ransomware event, but the point I want you all to focus on is this. If you think your backups will survive, I can almost 100% guarantee you that they will not. Fenix24 has taken all our lessons on the devastation of ransomware events and helped our sister company Grypho5 build an incredible managed backup capability and sister battalion Athena7 has built the most comprehensive and technical assessments around hardening and backups that I have seen in my entire career. I would encourage anyone who worries about a ransomware attack to heavily focus on their backups, and if you need help reach out to me and I can talk you through it. I truly mean it when I say I would make truly immutable backups, several copies, and truly tested (not just paper) my number 1 security control each and every time!
-
We are excited and proud to be a platinum sponsor for this event!
Who's excited? #ILTACON2024 is just around the corner! Join us in Nashville from 11-15 August for 4.5 days of educational sessions, networking, and amazing keynote speakers. Don't forget to register now for the legal tech event of the year, spots are filling up quickly: https://zurl.co/wiJn See y'all in Music City!
-
This, unfortunately, does not track with our experience from our assessments, nor what we know from other legal statistics, the number of firms suffering breaches annually (increased 117% between 2020 and 2022), or security gaps uncovered throughout the survey. 1/3 of firms admitted a breach and 1/3 admitted malware. We believe this is a definitional problem by what is meant by “secure” and what achieving true defensibility looks like. We need to work together to improve firm security—participating in the 2024 joint survey with International Legal Technology Association (ILTA) is an important step! Click here to make a difference: https://okt.to/3p76Ht #legaltech #lawfirm #CyberSecurity
-
Exciting news! International Legal Technology Association (ILTA) has invited us to London! If you are in London, join us next Tuesday, June 4th, for an eye-opening discussion with Conversant's Founder & CSO, John A. S., and Conversant's Director of Business Development, Michael Williams, on cybersecurity breaches and how they affect tech leaders in law firms. Discover top security measures to safeguard your firm.🔒💼⚖ For more information and to register for this event, click here: https://lnkd.in/eAXQPEHv #legaltech #lawfirms #cybersecurity #london #ILTA
-
Hackers know your weak spots. Do you? Register for our webinar featuring Conversant Founder, CSO, and cyber expert John Anthony Smith to learn how to defend your MOST important security controls, your backups, and how to safeguard them against different attack stages. 🔒👇 #CyberSecurity #WebinarSignUp #Backups
Why True Cybersecurity Must Begin with Your Attacker's Endgame - Conversant Group
https://conversantgroup.com
-
You don't want to miss this panel discussion! Conversant CISO and Fenix24 Co-Founder, Heath Renfrow, will be giving his insight for BCP/DR plans that withstand real-world cyber attacks from his front-line experiences!
Are you a technology or cybersecurity leader looking to enhance your business continuity and disaster recovery (BCP/DR) plans? Are you confident in your current approach, or could expert insights challenge your assumptions and lead to more resilient strategies? Join TechCompass for an exclusive live webinar featuring a panel of three distinguished security leaders from diverse backgrounds. Gain valuable perspectives from professionals who handle real incidents daily and understand what makes BCP/DR strategies truly effective. Panelists: Peter Starland - Managing Director, Digital Forensics, and Incident Response. With over 20 years of experience in incident response, Peter began his career as an engineer and has since led numerous managed incident response and forensics engagements. Heath Renfrow - Co-Founder of Fenix24, awarded Best Overall Cybersecurity and Ransomware Recovery Company in the Cybersecurity Excellence Awards. Heath's expertise in ransomware recovery offers invaluable insights into crafting BCP/DR plans that withstand real-world attacks. Brandt King - Director of Incident Response Engagements at Stroz Friedberg, an Aon company in Toronto, Canada. With over 10 years of experience in forensics and cybersecurity incident response, Brandt brings a wealth of knowledge from client-facing roles similar to Peter's. What You'll Learn: -How to evaluate and enhance your current BCP/DR strategies. -Insights from professionals who investigate breaches and assess the effectiveness of BCP/DR plans. -Real-world examples and lessons from data recovery and incident response experts. -New perspectives that challenge your current assumptions about cyber resilience. -Come prepared to rethink your approach and discover actionable strategies for achieving true cyber resilience. Don't miss this opportunity to learn from the best in the industry! Ramin Lamei Jesse Meadors #BCP #DR #BusinessContinuity #DisasterRecovery #Cybersecurity #TechLeaders #CyberResilience #Webinar #IncidentResponse #Forensics #RansomwareRecovery #DataRecovery #ExpertInsights #CybersecurityLeaders #CybersecurityWebinar #SecurityStrategies #DigitalForensics #CybersecurityExperts #TechInsights #CybersecurityPanel #BCPDRStrategies #CybersecurityIncidents #CyberResilienceStrategies #DataProtection #CybersecurityAwareness
Resilience Redefined: Business Continuity & Disaster Recovery
www.linkedin.com