CyberFlow Analytics Lends Expertise to New Report Calling for Revolutionary Approach to Cyber Security

Share Article

2017 TAG Cyber Security Annual Names CyberFlow Analytics a Distinguished Vendor

Today CyberFlow Analytics announced the joint release of the first-annual 2017 TAG Cyber Security Annual -- Practical Handbook and Reference Guide for the Working Cyber Security Professional. CyberFlow Analytics was part of an industry collective of 48 of the nation’s foremost cyber security vendors that participated in the report, which was published by The Amoroso Group (TAG Cyber) following in-depth industry research and analysis.

“We are so pleased to have contributed to the report with advice and guidance on advanced analytics,” said Tom Caldwell, co-founder of CyberFlow Analytics.

The report details a new urgency for how America’s commercial, financial and utility sectors respond to escalating and increasingly complex cyber attacks. It includes a comprehensive analysis of the cyber security industry with specific insights from C-level executives and thought leaders. Dr. Edward G. Amoroso, former chief security officer of AT&T and author of six books on cyber security, spearheaded writing and researching the report.

“Enterprise teams need to reload their approaches to analytics,” said Ed Amoroso. “And few companies understand this process and the required technical tools as CyberFlow Analytics.”

The 2017 TAG Cyber Security Annual has been written for information security and technology professionals in all industries with a special focus on U.S. infrastructure companies, including energy, telecommunications, manufacturing, health care and utilities. The report will be available at no cost to all users as a free download on CyberFlow Analytics’ website and TAG Cyber’s website

The handbook is centered around a revolutionary new approach to cyber security that calls on tech leaders of the largest and most important American enterprises to explode existing infrastructure to disperse data across multiple platforms, offload sensitive information into secure cloud-based solutions and reload systems, policies and personnel to better position them to effectively defend against cyber attacks that are not only likely, but occurring at an increasing rate.

It includes three volumes:

  • Volume 1: TAG Cyber Security Fifty Controls details the fifty primary control areas required for CISO teams to be effective in this new era of cybersecurity. These areas include traditional controls such as firewall platforms and two-factor authentication along with non-traditional controls such as security recruiting and security R&D. For each control area, an extensive list of supporting vendors is included to help jumpstart local source selection.
  • Volume 2: Interviews with Distinguished Vendor Principals includes in-depth conversations with the thought leaders and distinguished vendor principals. It offers a brief digest of the expert guidance and cyber security insights offered by these industry authorities during the research stages of this report.    
  • Volume 3: TAG Cyber Security Vendor Listings serves as a reference guide to the cyber security industry. This comprehensive review includes nearly 1,400 vendors this year, with an additional 500 vendors to be incorporated into the 2018 report.

About CyberFlow Analytics and FlowScape™
CyberFlow Analytics developed FlowScape, which detects Advanced Persistent Threats (APTs) and cyber breaches for the enterprise security market and Industrial Internet of Things (IoT) using unsupervised machine learning and behavioral analytics. CyberFlow was the first place winner of the Cisco Innovation Grand Challenge award at the IoT World Forum in December 2015. For more information, please visit

About TAG Cyber, LLC
The Amoroso Group (TAG Cyber) is a global cyber security advisory, training, consulting and media services company. Led by Edward Amoroso, industry veteran and former chief security officer for AT&T, TAG Cyber supports hundreds of companies around the world by providing a roadmap for identifying, preventing and eliminating cyber attacks on their systems and data.

Share article on social media or email:

View article via:

Pdf Print

Contact Author

Tom Caldwell
Follow >
Visit website