edgefi Wins Emerging Award at the 40th Annual Oregon Tech Awards

edgefi (formally Edge Networks) Wins “Emerging Award” at Oregon Tech Awards

Portland, OR, May 7, 2024 – edgefi, formally Edge Networks, is proud to announce that we hav been awarded the “Emerging Company of the Year” at the 40th Annual Oregon Tech Awards, hosted by the Technology Association of Oregon! This award celebrates and acknowledges our commitment to innovation and marks a significant milestone in our journey. 

For forty years Oregon Technology Awards (OTAs) has celebrated excellence and achievement in the region’s technology industry. This year’s awards were particularly competitive, showcasing not only companies but also outstanding educators and students who are shaping the future of technology in the Pacific Northwest. Being named amongst such inspiring peers — eight remarkable companies, three innovative teachers, and an exceptional student of the year — makes this recognition even more special.

Winning this award is a testament to our team’s hard work, dedication, and innovation in the cybersecurity sector, and would not have been possible with them. A massive thank you to the Technology Association of Oregon for acknowledging our efforts, and a huge shout out to our fellow nominees. We are so grateful for the support of our team, partners, and community members who have been with us on this journey. 

 

“I am just in awe of our team. They work so hard and do so much for our customers and each other. This award is really a testament to them. I’d also like to thank our clients and our partners; we wouldn’t be here if you hadn’t put your trust in us, and we are so thankful for you.” 

– Mark Tishenko, Founder and CEO of edgefi (formally Edge Networks)

We remain committed to driving growth and prosperity in our region through technical innovation and leadership. As we celebrate this achievement, we are excited to continue advancing our mission to enhance our customers’ business resiliency through simplified cybersecurity.  

Partner With edgefi

edgefi is a leading managed cybersecurity company based in Vancouver, Washington with a mission to enhance our customers’ business resiliency through simplified cybersecurity. We accomplish our mission by serving as a trusted partner to our customers, delivering valued solutions to mitigate and remediate their critical cybersecurity pains in leadership & strategy, operational efficiency, and governance, risk & compliance.

Sip and Secure: May Happy Hour Recap

Sip and Secure Recap

Last week, our local cybersecurity community gathered at the Teardrop Lounge in Portland, Oregon, for our quarterly cybersecurity happy hour.  

The idea is simple: gather local cybersecurity experts and enthusiasts together in a laid-back but engaging environment to spark conversations, learning, and connections. We believe these events are key to building a strong, local cybersecurity community and sharing valuable insights, all while empowering everyone who joins us. Our mission is to cultivate a community where better awareness and teamwork make us all safer and more secure. We’re thrilled to keep our Sip & Secure series going and we can’t for the next one! 

See photos from this event and download them here.

The Teardrop Lounge is among one of the unique and beautiful venues we have had the privilege of hosting at, and it provided the perfect backdrop for this event.  

 

Attendees enjoyed a selection of beverages and light bites catered by the venue, and the warm atmosphere made it easy to meet new people and mingle with familiar faces.  

 

We’re already on the lookout for other fantastic venues like the Teardrop Lounge for our upcoming events. We aim to create memorable evenings that not only provide valuable networking opportunities but also showcase the best of what our local scene has to offer.  

Stay tuned for more exciting locations where we can gather, share, and grow together in the spirit of cybersecurity. 

A Heartfelt Thank You

A special thank you to our sponsors for helping make this event happen: Sumo Logic, Gage Technologies, and the Technology Association of Oregon. Your generous sponsorships played a critical role in the success of our May Sip & Secure event, as well as past events. We want to express our sincere thanks to each of these organizations for their commitment to improving cybersecurity, and we look forward to future collaborations that continue to foster growth and innovation in the tech community. 

A massive thanks also goes to our team, whose dedication and hard work made this event—and previous ones—a success. Their careful planning and execution made this event memorable and reflected our passion for cybersecurity. We are proud to work with such a talented and motivated group of people. We look forward to seeing you all again at our next event soon!  

 

Join Us for Our Next Happy Hour!

If you’re interested in getting notified about our future events, we invite you to sign up for our monthly newsletter below and follow us on LinkedIn to stay updated on upcoming events and what’s happening at edgefi. 

Meet Noah: Edge Welcomes a New Help Desk Analyst

We’re excited to share that Edge Networks is growing! This has been propelled not just by scaling our operations, but by our unwavering commitment to enhancing our customers’ business resiliency through simplified cybersecurity.  

We’re thrilled to introduce a new addition to our team: our new help desk analyst, Noah Miller! He is bringing with him a fresh perspective, passion for cybersecurity, an eagerness to learn, and a diverse set of hobbies and interests that enrich our team culture. 


 

Get to Know Noah:

When you’re not at work, how do you enjoy spending your time?  

When I’m not working, I enjoy watching movies, practicing piano and guitar, going to Blazer games, snowboarding, wake surfing, Golfing, spending time with family, and hanging out with my cat, Marie.  

 

What’s your favorite movie or book, and why? 

I have many favorites, so it is hard to pick one. Right now, I would have to say my favorite movie would be No Country for Old Men. 

  

What are two truths and a lie about you?  

  1. I have lived in southwest Washington my whole life 
  2. I cut my sister’s hair 
  3. I have my scuba diving certification 

  

Who has been a significant influence in your career?  

I had a close group of peers in tech school; we would all do a great job pushing each other to get better and to solve difficult problems.  

 What made you get into IT and cybersecurity?  

Computers and tech have always been a big part of my life. I built my first computer in middle school and have never looked back. I enjoy tinkering and learning how computers and software work.  

  

What’s on your professional bucket list, specifically related to IT goals or achievements?  

Here at Edge, my role is in IT and helpdesk. Looking into the future, I really want to dive into Cybersecurity and be able to protect clients and their information.  

  

If you could enhance your IT skills overnight in one area, what would it be and why?  

I would want to improve my Python and scripting skills. There are so many tasks in the IT space that can be streamlined and automated with scripting.  

  

How do you face difficult challenges? Technical or otherwise?  

I like to face challenges head on and learn as much as a can about a problem, and about how other people have handled it before me.  

  

What are you most excited about with your new role at Edge?  

I am most excited for the opportunity to really dive into the IT world and to be able to work alongside and learn from the great team here! 

  

Any parting thoughts or favorite quotes?  

“Experience is merely the name men gave to their mistakes.” – Oscar Wilde  

I think this is a great idea to keep in mind as I take my first dive into the world of IT and will undoubtedly have many opportunities to gain experience from mistakes.  

  

Okay, what was the lie?  

I do not have my scuba diving certification, however one of my goals is to go through the SCUBA classes this year to get my certification.  

 

Bonus question: What’s your cyber hot take?  

I think that generative AI is not the beginning of the robot revolution and opens up some cool opportunities and accessibility to the tech space!  

 


 

Noah’s journey from building his first computer to stepping into the world of IT and cybersecurity reflects a passion for technology and a desire to make a significant impact in the tech world. We’re excited to have him on board and look forward to the fresh ideas, perspectives, and contributions he will bring to our team. 

As we continue to grow and navigate the complexities of cybersecurity, we remain focused on our core mission: to enhance our customers’ business resiliency through simplified cybersecurity. By focusing on simplifying the intricacies of cybersecurity, we’ve made it more accessible and manageable for businesses of all sizes, helping them to navigate the daunting world of cyber threats with ease and confidence. We believe that by making cybersecurity less complex, we also enable our clients to focus on what they do best: growing their businesses and achieving their goals. 

Welcome to the team, Noah—we can’t wait to see all that we will achieve together. 

 

Edge Networks: Celebrating Our Nomination for the Technology Company of the Year Award

Edge Networks Announced as a Finalist for Emerging Company of the Year by Technology Association of Oregon

Vancouver, WA, April 9, 2024 – Edge Networks, a leading innovator in the cybersecurity industry, is honored to announce its nomination as a finalist for the Emerging Company of the Year award by the Technology Association of Oregon (TAO). This nomination places Edge among the top contenders in the 40th Annual Oregon Tech Awards, recognizing the company’s significant contributions to the region’s technology industry.

The Emerging Company of the Year award is part of the Oregon Technology Awards, which celebrates excellence and achievement within Oregon and Southwest Washington’s technology community. This year, finalists were selected based on their financial performance, employment growth, and community contribution to the PNW.

“We are incredibly honored to be recognized by TAO as a finalist for the Emerging Company of the Year award. This nomination is a testament to our team’s hard work, dedication, and focus. We are committed to continuing to contribute to our region’s growth and prosperity through technical innovation and advancement. We look forward to celebrating with our peers at the awards ceremony and further collaboration with our vibrant tech community. “

– Mark Tishenko, Founder and CEO of Edge Networks

The nomination highlights Edge’s role as a key player in the technology sector, showcasing the company’s commitment to innovation, leadership, and community involvement. As the Pacific Northwest’s tech community continues to thrive, Edge remains dedicated to developing solutions that address the needs of the region and beyond, fostering growth and sustainability within the technology ecosystem.

Partners, supporters, and members of the technology community are invited to join in celebrating this significant achievement at the Oregon Tech Awards ceremony on May 6th, 2024 at OMSI. The event promises to be an evening of recognition, networking, and inspiration, reflecting the strength and diversity of the region’s technology industry.

For more information about TAO visit their website, and for tickets to the Oregon Tech Awards, please click here.

Partner With Edge

Edge Networks is a leading managed cybersecurity company based in Vancouver, Washington with a mission to enhance our customers’ business resiliency through simplified cybersecurity. We accomplish our mission by serving as a trusted partner to our customers, delivering valued solutions to mitigate and remediate their critical cybersecurity pains in leadership & strategy, operational efficiency, and governance, risk & compliance.

Meet Michael: Edge Networks Welcomes a New CISO

At Edge, our journey since 2006 has been about more than just growth—it’s been about innovation, trust, and above all, simplified cybersecurity. Our mission has been clear: to enhance our customers’ business resiliency through simplified cybersecurity. This solution-driven approach has not only driven our growth but has also forged strong relationships with our clients rooted in trust and reliability. 

We are thrilled to share that we’re taking our commitment to enhanced business resiliency a step further by welcoming our new Chief Information Security Officer (CISO), Michael Weaver. He brings a dynamic blend of expertise, vision, and a track record of skillfully tackling cybersecurity challenges.

Let’s dive into our conversation with Michael and discover his insights and aspirations for Edge:

 


 

Get to Know Michael:

When you’re not at work, how do you enjoy spending your time?  

Hiking, axe throwing, camping, concerts, art galleries, museums, comedy shows, motorcycle riding, kayaking, DIY home improvements, reading, and traveling.  

What’s your favorite movie or book, and why?  

Groundhog Day. “This is one time where television really fails to capture the true excitement of a large squirrel predicting the weather.”  

  

What are two truths and a lie about you?  

  • I’ve completed two half-marathons and numerous 10k runs.  
  • Out of the 11 certification exams I’ve taken the only one I didn’t pass on the first try was the CompTIA A+.  
  • The first time I flew in a plane I jumped out of it.  

  

Who has been a significant influence in your career?  

A life-long friend I met at my first tech job. He has been an excellent mentor and supportive friend through the years.

  

What recent cybersecurity trend or innovation has captured your interest, and why?  

 The double-edged sword that is AI. It is a wonderful tool and possibly more, but it also introduces many security challenges. It will be interesting to see how it all plays out.   

  

In your opinion, what’s an overrated cybersecurity measure that people put too much faith in? Why?  

Encryption and MFA. They are essential measures to include, but they are often misunderstood. Not all implementations are correctly designed. Many factors must be considered for encryption and MFA to be fully effective.  

  

Conversely, what cybersecurity aspect do you believe is severely underrated or overlooked?  

Limiting access and privileges to only what is needed aka, “the principle of least privilege.” It takes work and expertise to implement well, but it can significantly reduce cyber-related risks. People can be just as effective and productive if the principle of least privilege is correctly applied. Zero trust technology has helped to enhance and facilitate this practice without impeding business operations.  

  

What’s on your professional bucket list, specifically related to cybersecurity goals or achievements?  

I want to help move the industry in the right direction. I’ve talked to too many business leaders who think of security incidents and breaches as natural disasters. I want to change the mindset from “I hope it doesn’t happen to us” to “We are confident that we have protected ourselves and are prepared if the cyber storm hits us.”  

  

If you could enhance your cybersecurity skills overnight in one area, what would it be and why?  

 Social engineering. It is the key that unlocks everything.  

  

What’s the most unusual or creative cybersecurity challenge you’ve faced, and how did you address it?  

I had to quickly discover the root cause of a security incident after multiple security professionals had investigated for days. I was able to determine the cause of the incident within a few hours. I have a talent for breaking down complex situations into smaller, simple parts. Turns out it wasn’t a threat actor, but a fancy new monitor driver was being installed that caused the TCP/IP stack to reset on machines and break trust on the PKI network.    

  

What are you most excited about with your new role at Edge?  

Working with and helping the team grow!  

  

From your perspective, what is the key to building a strong and resilient cybersecurity team?  

Ensuring that everyone has what they need to be successful, setting clear and achievable expectations, seeing people for the individuals they are, and making sure that everyone knows that when the water inevitably gets rough, you are in the boat with them and will do everything in your power to get them through it.  

Edge has a tremendous amount of potential. I really wanted to be a part of Edge after observing genuine integrity and vision from the CEO, Mark. It was further bolstered when I met other team members who are passionate about the service they deliver and supporting each other. I’m here to help guide and support the team to the next level and beyond. 

  

Any parting thoughts or favorite quotes that inspire your approach to cybersecurity?  

“I’ll stop being paranoid when it stops paying off.”  

  

Okay, what was the lie?  

I’ve only completed two 5k runs. My partner, Melissa, is the runner in the household, but I do enjoy hiking with her.   

  

Bonus question: What’s your cyber hot take?  

Cybersecurity in a business is only effective when strong partnerships with all senior leaders have been established and maintained.  

 


 

Michael’s creative problem-solving skills and passion for cybersecurity have already made a mark at Edge. His leadership philosophy is inclusive and supportive, ensuring each team member is equipped for success.

Mark Tishenko, the Founder and CEO of Edge Networks, shares a warm welcome to Michael on the team: 

“I’m thrilled to share some great news! We’ve recently expanded our team, and I’m particularly excited to welcome Michael as our new CISO.

Michael brings a wealth of knowledge and expertise to our team, especially from his deep experience in both the banking and fintech sectors. His impressive background and leadership skills are set to greatly benefit not only our team but, most importantly, our customers as well.

I personally am looking forward to closely working with Michael. Together, we’ll be committed to ensuring the highest level of security for all our stakeholders. It’s a privilege to have him on board, and I’m confident that his contributions will play a pivotal role in our ongoing growth and success.

Welcome to the team, Michael! We’re all eager to see the positive changes and advancements we will achieve with your guidance.”

 

We’re excited and eager to tread new paths, break barriers, and continue to enhance our clients’ business resiliency and security. Welcome to Edge, Michael! We’re so glad you’re here. 

 

How to Remediate the Cybersecurity Leadership & Strategy Resource Pain Through a vCISO Program

Mission Possible: How to Remediate the Cybersecurity Leadership & Strategy Resource Pain Through a vCISO Program

This is a continuation of our series about the value and importance of aligning your company’s cybersecurity program with your corporate mission. In the previous blog, I addressed the meaning of aligning a company’s cybersecurity program with your mission, along with its value and importance. Additionally, high-level practical strategies and tactics were provided to make the alignment possible.    

In this blog, I will explore one of those key tactics, implementing a vCISO (Virtual Chief Information Security Officer) program – and how it helps Edge Networks’ customers remediate one of their key business pains today – a lack of cybersecurity leadership and strategy resources. In doing so, I will share how our corporate mission statement, “to enhance our customers’ business resiliency through simplified cybersecurity,” originated and how it applies to helping our customers remediate their cybersecurity pains.  

When Mark Tishenko, Edge Networks’ Founder and CEO, and I decided to work together to lead the company, one of our first priorities was to evaluate Edge’s corporate mission and determine how to best move the company forward through it. We both recognized the importance of the company’s mission statement and why it sits on top of our strategic pyramid – to provide a clear, unifying purpose and direction for the organization. We agreed that our mission statement serves as a constant reminder of why our company exists and ensures that all strategic initiatives and decisions are aligned with this overarching mission. 

With that in mind, we thoughtfully selected this mission statement for Edge Networks: “to enhance our customers’ business resiliency through simplified cybersecurity.” We were unified in our belief that this communicates the essence of what we do well and concisely defines who we are and why we exist. It also clearly articulates the importance of cybersecurity – simplified cybersecurity – to our customers’ long-term success.  

A significant part of the process of establishing our mission statement was answering this question, “how will we accomplish our mission?”  Answering that question required focusing on the most important elements of our customers’ decision criteria and processes regarding their organizations’ well-being and cybersecurity’s role in it. What drives our customers’ decisions on their approach to cybersecurity and its impact on organizational resiliency? What cybersecurity challenges do our customers need to address? What cybersecurity problems do they need to solve? What keeps them up at night? Ultimately, it boils down to this question – what are our customers’ key business and cybersecurity pains?   

An organization’s business pains can refer to the specific challenges, problems, or issues that it faces in its day-to-day operations or strategic goals. These pains can vary widely depending on the nature of the business, industry, and external factors. Identifying and addressing these business pains is essential for an organization’s growth, efficiency, and overall success.  

One of the most prominent pains that every organization faces today is cybersecurity. Specifically, cybersecurity pains refer to challenges, vulnerabilities, and issues that an organization faces in safeguarding its digital assets. These challenges can vary widely depending on the organization’s size, industry, technology infrastructure, and the evolving nature of cyber threats. Identifying and addressing cybersecurity pains is essential for maintaining operational continuity and safeguarding the organization’s reputation.  

By understanding our customers’ business and cybersecurity pains and focusing on delivering solutions that remediate those pains in the most effective, efficient, and simplest way possible, Mark and I were confident that Edge Networks will be very successful in accomplishing our mission.    

What that in mind, we developed a list of the most common cybersecurity pains that many organizations are dealing with today. Our list included the following pains:  

  • Data Breaches: Incidents where unauthorized individuals gain access to sensitive data, such as customer information, financial records, or intellectual property, can result in significant damage.
  • Malware and Ransomware: Dealing with the constant threat of malware, including ransomware attacks that can encrypt data and demand a ransom for decryption.
  • Phishing and Social Engineering: Employees falling victim to phishing emails and social engineering scams can lead to data breaches and compromise security. 
  • Insider Threats: Concerns related to employees or contractors intentionally or unintentionally compromising security by leaking sensitive data or engaging in malicious activities. 
  • Patch Management: Ensuring that all software and systems are up-to-date with the latest security patches to mitigate vulnerabilities is an ongoing challenge. 
  • Limited Resources: Resource constraints and lack of qualified cybersecurity personnel and technologies. 
  • Third-Party Risk: Managing and assessing the cybersecurity risks associated with third-party vendors, suppliers, and partners.  
  • Incident Response: Developing and maintaining an effective incident response plan to address cyber incidents promptly.  
  • Security Awareness Training: Ensuring that employees are educated about cybersecurity best practices and threats requires ongoing effort. 
  • Shadow IT: Managing the use of unauthorized or unapproved software and services within the organization’s network. 
  • Mobile Device Security: Securing mobile devices used by employees and ensuring they don’t become entry points. 
  • Scalability: Adapting cybersecurity measures to accommodate the organization’s growth and changing technology landscape.  

Since simplicity – specifically, simplified cybersecurity – is a core component of our mission, we recognized the need to break down, consolidate, and integrate the above list. In other words, we needed to simplify it.

This exercise resulted in our decision to classify our target customers’ pains into three core categories: 

Cybersecurity Operations: Remove operational resource constraints and improve outcomes. 

Governance, Risk, & Compliance:  Eliminate inefficient GRC processes – and spreadsheets.

Leadership & Strategy: Increase leadership resources, and align cybersecurity with your company’s mission and strategy. 

The next step is to identify the tactical solutions that Edge Networks offers to remediate the pains within those three pillars. While there are a lot of solutions that we can offer to customers for each of the pain pillars, we determined that we should focus on the core solutions that will deliver the most value to our customers, and where we will excel at delivering the most. Once again, we endeavored to simplify, which resulted in selecting and organizing our service menu this way:  

Leadership & Strategy

Cybersecurity Operations

Governance, Risk, & Compliance:   

The top pain pillar is Leadership & Strategy, and vCISO is the first tactical solution listed. This is intentional. Effective leadership in cybersecurity and the development of a comprehensive cybersecurity strategy are a priority because they protect an organization’s assets, reputation, and financial well-being while identifying, managing, and minimizing business pains associated with cyber threats and challenges. Taking a proactive leadership stance by integrating cybersecurity into the fabric of the organization increases the protection of the company’s assets, reputation, and long-term success. Proactive cybersecurity leadership is an investment in an organization’s long-term success and resilience. As the saying goes, “it starts with leadership”, and cybersecurity is no different.  

Up to this point, Mark and I – with a lot of help from our outstanding Go to Market team – could check these items off  our list:  

  • Established our corporate mission statement.  
  • Addressed how we will accomplish our mission (by relieving our customers of their most critical cybersecurity pains).  
  • Identified how to classify and categorize our solutions to address our customers’ pains in the most meaningful, easy-to-understand, and simplest way possible. 

The next important step was to ensure that the description and details about our services were comprehensive, meaningful, and applicable to our customers. This is a big project, and we needed a lot of assistance and collaboration from our Go-To-Market team to complete it well. Once again, the team came through, above and beyond expectations.  

With respect to vCISO, we determined that the key components of the program were the following:  

  • It is a service that provides our customers with access to experienced cybersecurity professionals who act as virtual or outsourced CISOs.   
  • It is a strategic cybersecurity initiative that assists our customers in enhancing their security posture, aligning cybersecurity with their mission and strategy, and leveraging external expertise to address the complexities of today’s cybersecurity landscape.  
  • It provides a flexible and scalable solution to our customers to bolster their cybersecurity leadership and capabilities. 

Furthermore, we concluded that the primary goal of our vCISO program is to enhance our customers’ cybersecurity posture and strategy by offering specialized expertise and leadership in the following ways: 

  • Increased Leadership Resources. Organizations often struggle to find and retain qualified cybersecurity professionals, especially for executive-level roles like CISO. Our program addresses this challenge by providing access to a virtual CISO who brings a wealth of experience and expertise to the table. This augments our customers’ leadership resources without the need for a full-time, in-house CISO. Employing a full-time CISO can be expensive. A vCISO program offers a cost-effective alternative, allowing our customers access to top-tier cybersecurity leadership without the high overhead costs associated with a full-time executive.
  • Alignment with Mission and Strategy. We work closely with our customers’ leadership team to understand its mission, goals, and strategic objectives. By aligning cybersecurity efforts with the broader mission and strategy of the organization, the vCISO helps ensure that security initiatives are in sync with the company’s overarching priorities. 
  • Cybersecurity Expertise. Our vCISO is an experienced cybersecurity professional who can assess our customers’ current security posture, identify vulnerabilities and threats, and recommend appropriate security measures. We bring best practices and industry knowledge to our customers, helping them stay ahead of emerging threats.
  • Risk Management. Our vCISO plays a crucial role in risk management. We assist in identifying and quantifying cybersecurity risks, developing risk mitigation strategies, and helping our customers prioritize security investments based on the potential impact on the mission and strategy. 
  • Compliance and Regulation. Many industries are subject to specific cybersecurity regulations and compliance requirements. Our vCISO helps ensure that our customers adhere to these regulations and maintain compliance, reducing the risk of penalties and reputational damage. 
  • Cybersecurity Program Development. We assist in developing a comprehensive cybersecurity program tailored to our customers’ needs. This includes policies, procedures, incident response plans, and security awareness training.
  • Incident Response. In the event of a cybersecurity incident or breach, our vCISO provides guidance and expertise in managing the incident effectively, minimizing damage, and facilitating recovery.

To further establish credibility and confidence with our current and prospective customers, backing up our service claims with evidence through real customer use cases is important. Fortunately, Edge was in a good position in this area. For example, we were already delivering services to customers in a very similar manner as described in the vCISO service description above.  

One of those customers is a food service company that employs more than 1,000 employees. This customer needed a vCISO to help remediate several pain points, including: 

  • Insufficient cybersecurity leadership and strategic resources  
  • Lack of a centralized GRC management platform and integrated operational processes 
  • Insufficient incident response program 
  • Misalignment between cybersecurity mission and strategy 
  • Immature cyber risk management program
  • Gaps in communication with executive leadership and board members regarding cybersecurity strategy and initiatives
  • Ineffective cybersecurity maturity program

To remediate those pains, we are delivering a comprehensive vCISO solution to this customer, which includes the following components:

  • Comprehensive vCISO services for proactive cybersecurity leadership and resilience 
  • Strategic leadership 
  • GRC leadership w/ EdgeGRC platform 
  • Cybersecurity maturity roadmap 
  • Vendor & third-party risk management 
  • Security technology evaluation 
  • 25 hours per month of Edge vCISO time 

As part of the vCISO program, Edge’s vCISO is delivering EdgeGRC as an integrated solution for streamlined compliance management. This solution includes: 

  • Turnkey NIST CSF framework alignment 
  • Unified dashboard and reporting 
  • Automated workflow and task management 
  • External collaboration and sharing 
  • Up to 1 additional custom framework alignment 

The results have been spectacular. Our customer’s engagement with our vCISO program has led to a substantial improvement in their cybersecurity posture and strategy. By leveraging the expertise of virtual cybersecurity leadership, our customer not only enhanced their security measures but also benefited from cost savings, compliance adherence, and improved relationships with stakeholders. Edge’s vCISO program has become a valuable asset in strengthening our customer’s overall cybersecurity resilience and success. 

Our customer featured in the above use case is experiencing improved alignment of their company’s cybersecurity program with their corporate mission. This is happening because of increased awareness within their organization about the meaning of aligning their cybersecurity program with their mission, along with its value and importance.   

Additionally, they have benefited from partnering with us to receive practical strategies and tactics to make the alignment more possible. One of those strategic key tactics is implementing Edge’s vCISO program, which has helped remediate one of their key business pains – a lack of cybersecurity leadership and strategy resources. In doing so, they are helping Edge Networks fulfill our corporate mission statement, “to enhance our customers’ business resiliency through simplified cybersecurity”.

The vCISO program is one of several remediation solutions that Edge offers to our customers for the leadership and strategy pain pillar. The other two pain pillars, Cybersecurity Operations & Governance and Risk & Compliance, have several remediation solutions within each of them as well. I look forward to examining all the pain pillars and remediation solutions in future blogs.
 

 

Sip and Secure: January Happy Hour Recap

Sip and Secure Recap

Last week, we had the pleasure of hosting our Sip and Secure cybersecurity happy hour at the iconic Steeplejack Brewing Co. This event combined the fun atmosphere of a local brewery with our incredible cybersecurity community, offering a unique twist to traditional networking.

As the evening unfolded, the venue transformed into a vibrant hub of knowledge and networking. Each conversation seemed to spark a new idea or perspective, highlighting the diverse expertise present in the room. Seasoned cybersecurity professionals exchanged insights with budding enthusiasts, creating an environment rich with learning and mentorship. 

Steeplejack Brewing Co. provided a perfect backdrop for the event. The brewery, known for its craft beers and impressive architecture, fostered a casual yet vibrant setting. The clinking of glasses and the buzz of conversation added to the event’s charm, making it a welcoming space for both cybersecurity novices and experts.

 

A Heartfelt Thank-You

A special thank you to Sumo Logic, Gage Technologies, and the Technology Association of Oregon for their generous sponsorship of our event. Their collective support played a pivotal role in the success of Sip and Secure. Each of these organizations has shown a remarkable commitment to advancing the field of cybersecurity, and their contributions have significantly enriched the experience for all attendees. We are truly thankful for their partnership and look forward to future collaborations that continue to foster growth and innovation in the tech community.

Additionally, we’d like to thank our incredible team for their dedication and hard work for this event and events past. Each member’s contribution, from planning and coordination to execution, was invaluable. Their efforts not only made this event memorable but also reflected our company’s passion for cybersecurity. We are incredibly proud to work alongside such a talented and driven group of individuals. Here’s to many more successful events in the future!

Our event is founded on the principle that bringing together local experts and enthusiasts in a casual yet engaging atmosphere fosters open communication and learning. By creating a space where knowledge flows freely and connections are made effortlessly, we aim to empower each attendee. 

This empowerment is not just limited to personal or organizational growth; it extends to strengthening the security fabric of our entire community. We envision a community where enhanced awareness and collaboration lead to a safer and more secure environment for all. We look forward to hosting more cybersecurity happy hours in the future! 

 

Stay Tuned for Future Events!

In the next few months, you can expect even more engaging, interactive, and informative events from us at Edge Networks that will further strengthen the cybersecurity community in the Portland-metro area. 

If you’re interested in getting notified about our future events, we invite you to sign up for our monthly newsletter below and follow us on LinkedIn to stay updated on upcoming events and what’s happening at Edge.

Edge Networks Honored as a Top 10% Clutch Champion for 2023

Edge Networks Honored as a Top 10% Clutch Champion for 2023

Edge Networks has been recognized a 2023 Clutch Champion by Clutch, the leading global marketplace of B2B service providers. Clutch Champions is the company’s newest award given to the top 10% of Clutch Global winners, a designation that recognizes business service providers across the world for their industry expertise and ability to deliver exceptional results compared to other companies in their line of service. 

Edge Networks was included among the 2023 Fall Clutch Champions due to our commitment to providing the best cybersecurity service. This award recognizes Edge as a top-rated leader in the Cybersecurity space based on our clients’ satisfaction and high-quality service ratings. We want to extend our gratitude to our incredible clients for their kind reviews and support which helped us in receiving this award! 

Past Awards

Earlier this month, Edge was also recognized by Clutch as a 2023 Global Award Winner for Cybersecurity Services. This year we also celebrated our success with the UpCity Best of Washington Award for the second year in a row, highlighting our commitment to enhancing our customers’ business resiliency. In addition to our 2023 recognitions, we’ve received awards in years past from Clutch and Expertise 

We’re honored to be recognized once again for our industry expertise. Receiving this award given to the top 10% of Clutch Global winners is a reminder of how incredible our clients are and how dedicated our team is. None of this would have been possible without our team and the support and trust of our clients and partners.   

A Note from the Clutch CEO:

Sonny Ganguly, Clutch CEO, shared a statement about the Clutch Champion award winners: “The Clutch Champion designation is the newest award providers can earn on Clutch. This year’s honorees represent the best of the best on our platform, and I am thrilled to celebrate and commend these champions for their ongoing achievements and dedication to consistently exceeding their clients’ expectations. The companies named to this list continue to set the bar high. Their devotion has not only enriched our platform but has also inspired others to strive for similar levels of distinction. We are grateful for their partnership and look forward to witnessing their continued success in the future.” 

Being named a Clutch Champion is not just a testament to the hard work our team has put in, but also a reflection of the commitment to consistently exceed the expectations of our clients. We are proud to be among this year’s honorees, who, in the words of Sonny Ganguly, represent companies that continue to set the bar high.  

Partner With Edge

Ganguly’s words acknowledging the dedication and ongoing achievements of the Clutch Champion award winners resonate deeply with us. We believe in not only meeting but surpassing the needs of our clients, and this recognition reinforces that our efforts are making an impact. If you’re looking for a cybersecurity partner that goes above and beyond, contact us today. 

The CISO’s Guide to Cybersecurity Maturity

The Journey to Cybersecurity Maturity

From executive boardrooms to the heart of server room operations, the call for strong cybersecurity measures saturates every level and function within modern organizations. But, as cybersecurity experts, we understand that cybersecurity maturity involves more than just strengthening defenses and applying security patches.  

The journey towards cybersecurity maturity is a multifaceted endeavor, one that seamlessly blends leadership, governance, risk management, compliance, and strategic partnerships. Through these strategies, Chief Information Security Officers (CISOs) and cybersecurity leaders can start their journey to cybersecurity maturity that ensures compliance and promotes a state of resilience, growth, and long-term success. 

Characteristics of Effective Leadership 

As organizations navigate the complexities of cybersecurity maturity, the role of the CISO becomes increasingly vital. The work of CISOs goes beyond just managing security; it requires visionary leadership, advocating at the board level, empowering teams, and having a strategic outlook.  

The objective is straightforward: guide the company towards cybersecurity maturity with visionary leadership, board-level advocation, empowering teams and cultivating a culture of vigilance, strategic planning, and communicating with transparency. 

Visionary Leadership 

Guiding the company towards cybersecurity maturity requires visionary leadership. A visionary CISO doesn’t merely react to threats; they proactively shape the organization’s security landscape. They chart a course toward a future where cybersecurity is not a limitation but a powerful motivation for achieving business objectives. Their foresight anticipates challenges, positioning the organization ahead of potential risks. 

Advocating at the Board Level 

The modern CISO serves as a crucial bridge between cybersecurity’s technical intricacies and the boardroom’s strategic objectives. They are experienced at translating complex security concepts into tangible business impacts, garnering support and resources from board members. By highlighting how critical it is to invest in cybersecurity, they ensure that the organization remains resilient in the face of threats and grows toward cybersecurity maturity. 

Team training on how to use a password manager

Empowering Teams and Cultivating a Culture of Vigilance 

A proactive CISO recognizes that cybersecurity maturity is a collective effort. They empower their teams with security awareness programs, knowledge, resources, and a culture of vigilance. By fostering an environment of continuous learning and skill development, they can cultivate a workforce that is proactive in identifying and mitigating risks. 

 Strategic Planning to Align Objectives with Business Goals 

The journey to cybersecurity maturity requires a strategic CISO who is familiar with the intricacies of the business. They should align every cybersecurity initiative with the broader organizational strategy. By setting clear, actionable goals, they can ensure that cybersecurity efforts are not isolated but seamlessly integrated into the heart of the organization. 

Transparent Communication 

Guiding an organization toward cybersecurity maturity needs a CISO who can communicate with clarity, honesty, and inspiration. They should foster a culture of open dialogue where every member of the organization understands their role in safeguarding critical assets. This transparency builds trust, enabling a collective commitment to cybersecurity excellence. 

We know a holistic cybersecurity strategy demands time and deep expertise. If you’re not sure where to begin, let Edge Networks simplify your cybersecurity journey. Our vCISO is here to streamline the process for you. Partner with us and tap into top-tier security leadership, turning challenges into collaborative solutions.  

 

Nist CSF

The Role of Cybersecurity Frameworks 

When it comes to cybersecurity maturity, having a structured framework to rely on ensures that organizations can navigate the complex realm of security with clarity and confidence. A skilled CISO recognizes the significance of aligning security efforts with broader business goals, using frameworks as a guide to harmonize security measures with the overall organizational strategy. The National Institute of Standards and Technology’s Cybersecurity Framework (NIST CSF) serves as a great guide in establishing a solid cybersecurity program. This framework provides a comprehensive structure for managing and mitigating cybersecurity risks and can help meet various compliance requirements, including SOC2 and ISO frameworks. 

From NIST CSF to Compliance and Beyond 

What sets the NIST CSF apart is its versatility. Beyond its primary function of setting up a cybersecurity program, it seamlessly aligns with other compliance requirements.   

By emphasizing the core functions of Identify, Protect, Detect, Respond, Recover, and Govern, the NIST CSF serves as a roadmap for developing a comprehensive cybersecurity strategy. Its flexibility ensures that it can be tailored to meet the unique needs of any organization. Whether you’re navigating the complexities of regulatory compliance or safeguarding against emerging threats, the NIST CSF provides a solid foundation to build on. 

 

Governance, Risk Management, and Compliance Platforms 

Governance, Risk Management, and Compliance (GRC) play a pivotal role in improving cybersecurity maturity by providing a structured framework and holistic approach to managing and mitigating cybersecurity risks. 

Transitioning from traditional, spreadsheet-based cybersecurity management to a Governance, Risk Management, and Compliance (GRC) model marks a significant leap forward in how organizations safeguard critical assets. GRC empowers them with a centralized, automated, and real-time monitoring solution that effectively enhances their ability to manage cybersecurity risks and compliance requirements. 

GRC serves as a strategic toolset that contributes to the overall cybersecurity posture of an organization in several key ways: 

  • Centralization and Consolidation: GRC activities are brought under one roof, streamlining operations and ensuring a cohesive approach to cybersecurity. This shift from scattered spreadsheets to a unified platform offers a holistic view of an organization’s cybersecurity posture. It streamlines operations, reduces redundancy, and seamlessly integrates all aspects of governance, risk, and compliance. 
  • Automation for Efficiency: Routine tasks are automated and more efficient, which frees up valuable resources for strategic initiatives. It minimizes the potential for human error, significantly improving the overall effectiveness of cybersecurity management efforts. 
  • Scalability: As organizations grow, so do their cybersecurity needs. A GRC platform is designed to scale alongside the organization’s expansion. This growth inevitably leads to increased complexity and volume of digital assets to protect. 
  • Real-time Monitoring: Immediate insights into the health of your cybersecurity posture enable timely responses to potential threats or vulnerabilities. This heightened responsiveness ensures potential risks are identified and addressed swiftly, minimizing potential damage and safeguarding critical assets. 
  • Advanced Reporting and Metrics: Clear, concise reporting provides a comprehensive view of progress and areas that may require additional attention. This enables stakeholders at all levels of the organization to grasp the current situation from the overall risk landscape to the effectiveness of specific security measures. 

Incorporating GRC into your cybersecurity strategy strengthens your compliance efforts and equips you with a dynamic toolset to effectively manage risks and level up your cybersecurity maturity.  

 

Strategic MSSP Partnerships for Enhanced Security 

As organizations strive to protect their digital assets and advance toward cybersecurity maturity, partnering with a Managed Security Service Provider (MSSP) is a strategic move. MSSPs offer a wealth of resources and expertise, and their collaborative approach can be a game-changer in strengthening an organization’s defenses. There are many benefits of an MSSP partnership, such as: 

Industry Insights 

Partnering with a Managed Security Service Provider (MSSP) can propel an organization toward establishing a strong cybersecurity program. Their industry insights, cultivated through years of hands-on experience, give organizations a crucial edge. They’re familiar with emerging attack vectors, tactics, and vulnerabilities that may not be apparent to others within the organization. 

Cutting-Edge Technologies 

MSSPs are at the forefront of adopting and deploying cutting-edge cybersecurity technologies. They’re on top of the latest advancements in threat detection, incident response, and security infrastructure, which ensures organizations benefit from the most up-to-date and effective tools in the fight against cyber threats. 

Incident Response  

MSSPs are equipped with reliable incident response plans and protocols. These established procedures, enhanced through real-world experiences, enable organizations to react promptly and decisively in the event of a cyber incident. This readiness significantly reduces a security breach’s potential impact and associated costs. 

Threat Detection 

MSSPs also excel in the realm of threat detection. Leveraging advanced tools, analytics, and threat intelligence, they continuously monitor for indicators of compromise and suspicious activities. This proactive approach allows for the early identification of potential threats, often intercepting attacks before they can inflict substantial harm. 

Customized Risk Assessments and Mitigation Strategies 

Every organization has its unique risk profile, influenced by factors such as industry, regulatory environment, and technology stack. MSSPs recognize this diversity and employ tailored risk assessments to pinpoint vulnerabilities specific to each organization. These assessments serve as the foundation for developing customized threat mitigation strategies. By addressing vulnerabilities in a targeted manner, organizations can maximize the effectiveness of their cybersecurity efforts. 

Enabling Growth and Adaptation 

As organizations grow and evolve, so do their cybersecurity needs. MSSPs have the flexibility and scalability to evolve alongside their clients. Whether expanding operations, integrating new technologies, or entering new markets, MSSPs ensure that the cybersecurity program remains aligned with organizational objectives. 

 By leveraging the MSSP’s industry insights, technological expertise, incident response capabilities, and customized risk assessments, organizations can strengthen their defenses and proactively navigate the complex cybersecurity landscape. 

Ensuring an Effective MSSP Collaboration 

Collaborating with a Managed Security Service Provider (MSSP) is a strategic move, but its success hinges on careful planning and execution. To maximize the benefits of this partnership, organizations should adhere to a set of best practices: 

  1. Clearly Outline Objectives and Expected Outcomes: Transparency is essential in any successful collaboration. Clearly defining the objectives and expected outcomes of the MSSP partnership sets the stage for a unified vision. This clarity ensures that both parties are aligned and working towards a common goal. It also provides a clear benchmark against which progress can be measured. 
  1. Set Up Structured Communication Protocols: Establishing structured communication protocols ensures that information flows seamlessly between the organization and the MSSP. This includes regular status updates, incident reports, and strategic discussions. Clear lines of communication foster trust, enable quick decision-making and enhance the overall effectiveness of the cybersecurity program. 
  1. Regularly Review Performance Against SLAs: Service Level Agreements (SLAs) serve as the contractual framework for the MSSP partnership. They outline the expected level of service, response times, and performance metrics. Regularly reviewing performance against these agreed-upon benchmarks is crucial. It allows organizations to assess whether the MSSP is meeting expectations and provides an opportunity to address any areas for improvement. 
  1. Develop a Future-Focused Plan for Building In-House Capabilities: While an MSSP provides invaluable expertise and resources, organizations should also have a long-term strategy for building in-house cybersecurity capabilities. This forward-looking plan ensures that the organization progressively enhances its internal cybersecurity proficiency. It may involve hiring and training internal security personnel or gradually transitioning specific security functions in-house.

Organizations can optimize their collaboration with an MSSP by adhering to these best practices. This approach ensures that the partnership remains productive and aligned with organizational objectives and lays the groundwork for a cybersecurity program that can evolve and adapt alongside the organization’s growth. 

 

Transitioning to a Dedicated Security Team 

Recognizing when the time is right to establish an in-house security team is a critical milestone in an organization’s cybersecurity journey. Edge Networks is dedicated to guiding companies through this transition. We help identify key indicators that signal readiness, such as the complexity of security needs, the scale of operations, and the increasing volume of sensitive data being managed. These signs serve as clear markers that an internal security team is not only beneficial but essential for safeguarding the organization’s digital assets effectively.  

Building a cybersecurity team in-house requires a strategic roadmap. Just hiring someone and telling them you are now on the security team isn’t enough in 2023. Edge Networks will guide you through the process of identifying who to hire first, how to manage them, how to provide vision to them, and what they will be doing clearly with our “day in the life of” examples and standard operation procedures. 

 

Take the Next Step in Your Journey 

Achieving cybersecurity maturity takes effort and a strategic approach that goes beyond technical measures. From visionary leadership and strategic planning to adopting frameworks like NIST CSF and embracing GRC solutions, each step propels the journey. Collaborating with MSSPs unlocks industry insights and advanced technologies, strengthening defenses. Effective partnerships, guided by transparency and structured communication, pave the way for success.

As organizations evolve, so should their cybersecurity capabilities, whether through optimized MSSP collaborations or the establishment of a dedicated in-house security team, Edge Networks stands ready to navigate this shift strategically. Your organization’s cybersecurity maturity is our shared goal. Contact us today to learn more.

Edge Networks Named 2023 Global Award Winner by Clutch

Edge Networks Named 2023 Global Award Winner for Cybersecurity Services by Clutch

We are delighted to share the great news that Edge has been named a 2023 Global Award winner for Cybersecurity services by Clutch! Companies are selected based on their industry expertise and ability to deliver exceptional results. Clutch scores are calculated based on client feedback from comprehensive interviews and reviews published on Clutch. 

Our journey in cybersecurity has been one of continuous growth and dedication to simplifying cybersecurity for our clients. Our founder and CEO, Mark Tishenko, expressed his gratitude for the award: “We’re honored to be recognized by Clutch and our incredible clients for outstanding cybersecurity services. I’m extremely proud of our team for their hard work in earning us this award.”

A Note from the Clutch CEO:

Clutch CEO, Sonny Ganguly, shared a few thoughts on the award: “We are thrilled to showcase the incredible success of leading companies worldwide on our platform. Their dedication to delivering outstanding services has not only contributed to their own success but has also empowered countless clients to thrive. We aim to highlight this year’s industry frontrunners and facilitate connections for Clutch users seeking top-notch services tailored to their specific needs.”

Past Awards

This isn’t the first time Edge has been recognized. For the second year in a row, we celebrated our success with the UpCity Best of Washington Award, highlighting our commitment to enhancing our customers’ business resiliency. We’ve also been featured on Expertise.com and by Clutch as a top Cybersecurity Company.  

Thank You to Our Clients, Team, and Partners 

We extend our deepest gratitude to our clients for your trust and collaboration. Your feedback has been critical in earning these awards, and we look forward to continuing to enhance your cybersecurity posture in the face of evolving challenges. 

Equally deserving of recognition is the team at Edge. This achievement is a testament to our entire team’s hard work and commitment, from cybersecurity experts to administrative staff. 

To our partners, your trust and collaborative spirit have been vital in our growth and success. Together, we have strengthened our ability to navigate the complex cybersecurity landscape and provide innovative solutions that drive success. 

Partner With Edge

Are you looking for a cybersecurity partner that goes above and beyond? When you choose Edge, you gain access to a team of industry-leading professionals dedicated to swiftly resolving issues and providing tailored solutions. Contact us today to book a consultation.