
-
- Home
>
-
- Blog
>
-
- InfoSec Trends
Shields Up: Bolstering Your Security Posture Following Ukraine Invasion
- Feb 25, 2022
- Tyler Farrar
- 3 minutes to read
Table of Contents
As we all watch the Ukraine invasion unfold on both physical and cyber warfare levels, we want to provide guidance to ensure all of our customers and partners remain as safe and secure as possible at all times.
The importance of CISA
We also want to underscore the importance of the U.S. Cybersecurity and Infrastructure Security Agency (CISA) Shields Up initiative and guidelines and highlight the top five critical actions — aligned to these guidelines — that we recommend all organizations do immediately.
- Implement MFA on all user accounts. It is absolutely critical that all user accounts in your organization have multifactor authentication (MFA). Every single employee, workforce and administrator account should absolutely have MFA in place at this time. This especially includes every remote user access account in your organization. Don’t think just because you mostly have MFA you are safe — you need to have strong MFA on every single user account.
- Check your device trust standards. Go back and assess your device posture. Have you documented your own trusted device standard yet? Do you trust every single entity within your environment? Are devices configured in a manner that you are comfortable with allowing them on your network? Devices that fail to comply with your standard should absolutely not be allowed on your network or have access to corporate data. Know what that standard is from top to bottom.
- Take advantage of free CISA services. Sign up for CISA’s Cyber Hygiene Vulnerability Scanning. They can scan your network perimeter and tell you exactly what potential attackers can see. They will let you know if they see any vulnerabilities you may have missed. Consider them a second pair of extremely strong eyes. You can register for this service by emailing [email protected]. More free CISA tools and services are available here.
- Create a Crisis Management Team (CMT) now. It’s critical that you have a group of leaders in your company assigned to a crisis management team (CMT) across functions. Ensure leader representation from E-staff, Product, Engineering, Security, Research, Customer Success, Legal, Finance, Comms, etc., so that all leaders can discuss their knowledge and critical updates. This allows for greater efficiency towards threat mitigation and company unity. It should go without saying that you want to be well organized and ready should attackers — whether nation-states like Russia or China — or rogue actors, decide to attack your organization or any organization with whom you are connected. No organization is immune.
- Validate your security Incident Response (IR) plan. In light of geopolitical tensions and the CISA alerts and guidelines shared over the last many months, Exabeam has already been revalidating our IR plan and is continuing to do so alongside our CMT. It is critical that all leaders at your organizations are aligned in your IR plans and methodology.
At Exabeam, we are also using our own Fusion SIEM and Fusion XDR products to ensure we can immediately catch any anomalous activities in our environment on a 24/7 basis. We know exactly the normal behavior of every single user and entity on our network, as well as their risk scores. We are immediately alerted to anything that is out of the ordinary, abnormal, and possibly adversarial, so that we can rapidly investigate and respond swiftly if needed.
For our customers
For customers using our Fusion SIEM and Fusion XDR products, please see the latest brief from Exabeam Research regarding the recently reported destructive malware that has been identified impacting computer systems in Ukraine, Latvia, and Lithuania. To date, this malware has targeted financial institutions and government contractors in these countries. In the brief, we offer additional steps for creating watchlists and more easily adding rule tags to threat hunter searches.
We will continue to monitor the situation and keep our customers and partners informed on what we know and how we can help.
If you have any questions, please open a support ticket or reach out to your Customer Success Manager.

Tyler Farrar
Chief Information Security Officer | Exabeam | Tyler Farrar is the Chief Information Security Officer (CISO) at Exabeam. In this role, he is responsible for protecting Exabeam – its employees, customers, and data assets – against present and future digital threats. Tyler also leads efforts in supporting current and prospective customers’ move to the Exabeam cloud security operations platform by helping them to address cloud security compliance barriers. With over 15 years of broad and diversified technical experience, Tyler is recognized as a business-focused and results-oriented leader with a proven track record of advancing organizational security programs. Prior to Exabeam, Tyler was responsible for the strategy and execution of the information security program at Maxar Technologies, which included security operations, infrastructure governance, cyber assurance, and USG program protection functions. As a former Naval Officer, he managed multiple projects and cyber operations for a multimillion-dollar Department of Defense program. He earned an MBA from the University of Maryland and a Bachelor of Science in Aerospace Engineering from the United States Naval Academy. He also holds a variety of technical and professional certifications, including the Certified Information Systems Security Professional (CISSP) certification.
More posts by Tyler FarrarLearn More About Exabeam
Learn about the Exabeam platform and expand your knowledge of information security with our collection of white papers, podcasts, webinars, and more.
-
White Paper
Breaking the Rules: When Static Detection Logic Reaches Its Limits, What’s Next?
-
Blog
What’s New with New-Scale in October 2025: Measurable, Automated, Everywhere Security Operations
- Show More