security

Tribe of Hackers: Red Team Edition

Tribe of Hackers: Red Team Edition 353 499 Christopher Nickerson

At the beginning of the year, I was approached by the infamous Marcus J Carey (@marcusjcarey) to help create content for a Red Team focused book. The format was something…

read more

Branch Network Transformation: 5 Questions For Credit Unions

Branch Network Transformation: 5 Questions For Credit Unions 4288 2848 Andrew Hay

Danielle Havlicek from the La Macchia Group published a detailed blog post over at CUInsight entitled the 5 Steps to Tackling a Branch Network Transformation. The one step that caught our…

read more
ISC2 Secure Summit Denver 2019

Come Visit Lares at (ISC)² Secure Summit Denver 2019

Come Visit Lares at (ISC)² Secure Summit Denver 2019 608 512 Andrew Hay

Join Lares® at (ISC)² Secure Summit Denver 2019 this Friday, June 28 at the Hyatt Regency Aurora/Denver Conference Center to take advantage of educational sessions, keynotes and networking with cybersecurity…

read more

Most Firms Rely on Trust Alone for Supply Chain Security. Don’t be Most Firms.

Most Firms Rely on Trust Alone for Supply Chain Security. Don’t be Most Firms. 1024 581 Andrew Hay

Around 70% of global organizations could be at risk from supply chain attacks because they don’t have enough visibility into their partners’ security posture, according to a new Accenture Tech…

read more

Where There is Unity, There is Victory

[Ubi concordia, ibi victoria]

– Publius Syrus

Contact Lares Consulting logo (image)

Continuous defensive improvement through adversarial simulation and collaboration.

©2019 Lares, LLC | All rights reserved.