Agile Project Management for Cybersecurity

In our recent webinar, “Agile Project Management for Cybersecurity,” Myriad’s PMP and CSM-certified project manager Emma Sally presented an overview of agile project planning, its benefits and effects, terminology, how it compares to traditional practices, and how an IT department can implement this methodology today.

Sally starts by providing a comparison of project management styles teams typically use: waterfall, Scrum, Kanban, and “other,” as unique project management styles can be created by handpicking aspects of each methodology based upon a team’s needs. Afterwards, Sally explains the origins of agile project management, its manifesto, and the four values and twelve principles of the methodology.

The specifics surrounding the two most popular agile methodologies—Scrum and Kanban—are listed, including the use of a development board so work can be visualized, timeframes, designated roles, and rules. The project lifecycles of agile and waterfall are compared. Waterfall, a traditional process, results in roadblocks; a project can’t move forward until it has been completed and approved. In contrast, agile is iterative and teams arrive at their minimum viable product sooner.

Sally walks attendees through Myriad’s agile project management framework: PDCA (Plan, Do, Check Adjust) and demonstrates how it enhances readiness, visibility, and adaptability, all vital components of a strong cybersecurity posture. She goes over Myriad’s security reference model, which breaks down everything to be considered while evaluating the security strength of an IT infrastructure into 4 domains and 24 categories. This simplifies the products and services into easy to digest items, which makes the security landscape easier to navigate.

By addressing each category and creating a list of projects organized by priority (and then reprioritizing as team members finish projects and adjust), a project road map is created to bring a security posture from its current state to its ideal state. This zooming in to specific pieces of infrastructure and then zooming out to evaluate the infrastructure as a whole is crucial to maintaining the safety and a competitive edge of any organization.

In all, as the threat and risk profile continue to evolve, it forces IT departments to reflect at regular intervals and rapidly adapt, making agile project management a great tool to support an organization in this endeavor. The ability to catch defects and course correct more quickly increases productivity, efficiency, and quality while continuously arming stakeholders with information that move the ROI needle.

To view the entire “Agile Project Management for Cybersecurity” webinar, please click here:

Myriad Supply Named One of Inc. Magazine’s Best Workplaces of 2018

New York, NY, May 23, 2018 – Myriad Supply, a cybersecurity consultancy and integrator, has been named one of Inc. magazine’s Best Workplaces of 2018, the publication’s third annual ranking in the fast-growing private company sector.  

“We are honored to receive this recognition that represents what we believe is a critical element to the success of our company: team culture,” said Andrew Fisher, CEO and Founder of Myriad Supply. “We are constantly working towards becoming a more diverse, inclusive, and equitable organization that attracts and supports top performers.”  

The award is the result of a comprehensive assessment of private American companies who have created exceptional workplaces beyond good pay and good perks by providing vibrant cultures, deep employee engagement, exceptional benefits, and leadership that inspires collaboration and teamwork. Out of thousands of applicants, Inc. recognized just under 300 winning companies. This is Myriad Supply’s second year receiving this recognition.  

“By including an employee survey into this year’s Best Workplaces selection process, we’ve really raised the bar. Companies that don’t score at the very top of their peer group don’t make the cut. So, our hats are off to the winners. They all excelled at engaging their workers, making them feel appreciated, and aligning them behind a mission. And remember, that’s not just our opinion: The employees told us that themselves.” says James Ledbetter, Inc. editor-in-chief.  

In the last year, Myriad Supply has implemented Equity, Diversity, and Inclusion (EDI) training, a company-wide coaching platform called 15Five, monthly “Ask Me Anything” sessions with executive leadership members, employee resource groups, and CEO Dine Arounds that provide an opportunity for the CEO to share his vision with small, rotating groups of employees and listen to their thoughts, feedback and ideas over lunch. This recognition from Inc. highlights both Myriad’s rich company culture and its commitment to ensuring employees feel heard, understood, and valued. 

The 2018 Best Places to Work list will be featured in the June issue of Inc. magazine hitting newsstands today and online at   

About Myriad Supply
Myriad Supply is a cybersecurity consultancy and integrator focused on providing complete, secure IT infrastructure solutions to enterprises. Using industry-specific knowledge and a security first approach, Myriad helps clients define, design, and implement their technology vision within the areas of security, SDN, mobility, and cloud. Myriad, located in New York City, has been serving clients since 2003. To learn more, visit or email 

About Inc. Media 
Founded in 1979 and acquired in 2005 by Mansueto Ventures, Inc. is the only major brand dedicated exclusively to owners and managers of growing private companies, with the aim to deliver real solutions for today’s innovative company builders.  Winner of Advertising Age’s “The A-List” in January 2015, and the National Magazine Award for General Excellence in both 2014 and 2012. Total monthly audience reach for the brand has grown significantly from 2,000,000 in 2010 to over 20,000,000 today.  For more information, visit 

About Quantum Workplace 
Quantum Workplace is an HR technology company that serves organizations through employee engagement surveys, action-planning tools, exit surveys, peer-to-peer recognition, performance evaluations, goal tracking, and leadership assessment. For more information, visit 

Myriad Supply Media Contact:
Kirsten Gonzalez 
Myriad Supply 

Stacey Solomon of Myriad Supply Recognized as One of CRN’s 2018 Women of the Channel

New York, NY, May 17, 2018 – Myriad Supply, a leading IT consultancy and integrator, announced today CRN®, a brand of The Channel Company, has named Stacey Solomon, Vice President of Purchasing at Myriad Supply, to its prestigious 2018 Women of the Channel list.

“It’s a great honor to be recognized amongst this group of extraordinary women,” said Stacey Solomon, Vice President of Purchasing at Myriad Supply. “I have had many great opportunities with Myriad and am excited and encouraged to continue this journey in the channel, helping Myriad achieve greatness within the area of cybersecurity.” 

The executives who comprise this annual list span the IT channel, representing vendors, distributors, solution providers and other organizations that figure prominently in the channel ecosystem. CRN editors select the Women of the Channel honorees based on their professional accomplishments, demonstrated expertise and ongoing dedication to the IT channel. 

“This accomplished group of leaders is steadily guiding the IT channel into a prosperous new era of services-led business models and deep, strategic partnerships,” said Bob Skelley, CEO of The Channel Company. “CRN’s 2018 Women of the Channel list honors executives who are driving channel progress through a number of achievements—exemplary partner programs, innovative product development and marketing, effective team-building, visionary leadership and accelerated sales growth—as well as advocacy for the next generation of women channel executives.”   

Solomon joined Myriad in 2010. Over the past 8 years, she has played a critical role in the development of the purchasing department and fostering relationships with a number of distributors. As an integrator and consultancy, the function of the purchasing department is crucial to supporting Myriad’s client offerings. Under Solomon’s lead, the purchasing department has earned the trust of Myriad’s clients and sales team alike through hard work, attention to detail, and their dedication to ensuring purchase orders meet the deadline set forth in client agreements. 

The 2018 Women of the Channel list will be featured in the June issue of CRN Magazine and online at 

About Myriad Supply
Myriad is an IT consultancy and integrator focused on providing complete, secure IT infrastructure solutions to enterprises. Using industry-specific knowledge and a security first approach, Myriad helps clients define, design, and implement their technology vision within the areas of security, SDN, mobility, and cloud. Myriad, located in New York City, has been serving clients since 2003. To learn more, visit us at or email 

About the Channel Company 
The Channel Company enables breakthrough IT channel performance with our dominant media, engaging events, expert consulting and education, and innovative marketing services and platforms. As the channel catalyst, we connect and empower technology suppliers, solution providers and end users. Backed by more than 30 years of unequaled channel experience, we draw from our deep knowledge to envision innovative new solutions for ever-evolving challenges in the technology marketplace.  

CRN is a registered trademark of The Channel Company, LLC. All rights reserved.  

Myriad Supply Media Contact:
Kirsten Gonzalez
Myriad Supply

The Channel Company Contact:
Kim Sparks
The Channel Company
(508) 416-1193  

Network Visibility is A Security Must-Have 

Given the trends of massive growth in bandwidth, deployment of large enterprise data centers, and significant adoption of cloud-based applications, enterprise networks have become more challenging to secure and manage. Organizations now have a reliance on the network for critical business functions, including remote access to data center and cloud-based applications. This increased reliance on the network has opened new avenues for cyberattacks. 

Hackers and cybercriminals are exploiting this increased network reliance to threaten most (if not all) organizations with operational disruption and data loss. The exponential growth in the network footprint, the shift in traffic patterns within the data center and the sophistication of cyberattacks are breaking traditional network security designs – making it impossible to secure the network perimeter. Worse, many security breaches are hard to detect, making remediation problematic. Security products (e.g. firewalls) are increasingly burdened with too many connections and too much traffic, resulting in significant impacts on performance. Visibility into who is accessing the network and the ability to identify anomalous traffic is essential to detecting cyberattacks and addressing security problems. 

If, Not When? Think Again 

The resulting growth in the frequency of malicious attacks has shifted the security landscape. The requirement must be to design IT security to defend systems when you are attacked, not if you will be attacked. The ramifications of successful attacks and the related adverse commercial impact have never been greater, so this shift in thinking is critical. The emphasis of security is now geared toward detection, containment, and fast remediation. 

As a transit point for all information exchange, the network is the critical point for identifying cyberattacks. Network monitoring systems are key to detecting anomalies and variances compared to normal traffic flows. As networks grow, the amount of traffic can quickly exceed the capabilities of security devices and related management tools. High performance, intelligent network monitoring systems capture packets (the building blocks of information), apply pattern matching, and can then send relevant traffic or metadata to the appropriate security appliances. Thus, monitoring can help match (limited) security performance with rapidly growing network performance. The visibility provided by network monitoring enables rapid decision-making in real time in response to threats, before they have time to affect the entire infrastructure. 

How Network Monitoring Tools Can Benefit Your Organization 

Using real-time network traffic is the best way to gain visibility into your IT infrastructure. To meet the monitoring and security needs of a modern network, a modern Network Packet Broker (NPB) is required. 

Monitoring throughout the network is critical to enable network visibility and dynamically mitigate security threats. Network monitoring tools must filter and aggregate huge traffic flows, isolate bad traffic on-demand to improve security, and ensure compliance. The specific benefits of enhanced network-wide visibility include: 

  • Rapid detection and resolution of application and network security breaches 
  • Improved network performance and reduced latency 
  • Ability to dynamically isolate bad traffic 
  • Improved tool utilization and performance  

The introduction of low-cost white box switches combined with SDN software have significantly improved performance, management, and lowered the cost of pervasive network monitoring. IT organizations can benefit from advances in network monitoring performance and capacity to improve application performance, end-user satisfaction, and to identify security challenges. 

Secure Email Gateways: Perimeter Security for the Mailbox

In the business world, 90 trillion emails are being sent each year. According to Kaspersky research, over 57% of those emails were classified as spam and malware. This makes email a very real threat vector that can infiltrate a user’s endpoint, branch offices, and even the data center. It’s important as ever to secure employee and user inboxes, and there have been continual advancements in security surrounding products that identify threats and safeguard users against them. 

Security Email Gateways are one of the many sets of products used to mitigate email threats. SEGs act as perimeter security for both incoming and outgoing email to ensure that threats from outside an organization can be flagged and quarantined from a user’s mailbox, as well as preventing the spreading of malicious content from a compromised endpoint. 

For personal accounts, many popular email providers have some form of SEG implemented that will safeguard individual mailboxes. The business world, however, looks to specialized solutions that will provide a higher level of flexibility and effectiveness to meet the needs of an organization while safeguarding employee mailboxes from compromising attacks. 

SEGs for inbound email security work by positioning themselves as an organization’s email server. The system then scans each email that comes in before making the determination to either block a message as spam or send it to an employee’s mailbox as legitimate email. This helps defend against threats outside of the organization such as compromised employees at an organization that has normal communication with the protected business or botnets that are utilized to send out spam. 

SEGs for outbound email security work similarly to inbound security except they mitigate email threats from within the organization. An IT administrator can set up their SEG to route all outbound email, to people both inside and outside the organization through its system to apply the same email security scanning and block potential threats. 

Security vendors have leveraged solutions that work both with a business’s on-premise email infrastructure as well as enterprise cloud email solutions such as Microsoft Office 365. At Myriad, we focus on leveraging vendors that have moved beyond the standard scanning of emails and use more efficient pattern matching and hashing to balance security and speed to the mailbox. We also look to make sure there have also been improvements on granularity based on an organization’s needs, placing enhanced security and safeguards on more at-risk departments or users, such as an organization’s finance department. 

While SEGs are not the only solution in the realm of email security, it is a very effective one, allowing security from the perimeter of an organization’s email infrastructure. As new and inventive ways are being developed to compromise users through their mailboxes, SEGs are constantly evolving to take on these changing threats and will continue to help provide a layer of security on the de-facto standard of electronic communication between business and users on the Internet in general. At Myriad, we’ll work for you to find, evaluate, recommend, and implement the best SEG to secure the perimeter in your business to help keep you ahead of the curve. 

Myriad Celebrates December & January Work Anniversaries

It’s the most wonderful time of the year… for anniversaries! Big congrats are due to those celebrating in December and January: 

Guthrie Jones – 4 years 

Guthrie started as an Account Executive in 2014, was promoted to Senior Account Executive in 2015, and then promoted to Senior Professional Services Specialist in 2017. He attributes his success to “the diverse, enthusiastic, and intelligent people who work here.” 

Best Myriad memory: “The support from everyone at Myriad when I became a first-time dad.” 

Caleb Lunsford – 4 years 

Right around the time of his work anniversary two years ago, Caleb was promoted to Senior Account Executive (what a way to celebrate!). “I love the company culture here. Everyone that is here believes in our brand and what we are trying to accomplish. I also think we have some of the absolute best sales management in the business.” 

Best Myriad memory: “My favorite memory was my first winter party. Andy and Mark went the extra mile to let me sing my favorite Enrique Iglesias song, ‘Hero.’ Mark was running around getting the audio set up. I thought it was really cool of a CEO/CFO to set that up for a fairly new employee.”  

Kyle Fahey – 4 years 

Over the course of his career at Myriad, Kyle was promoted from Account Executive to Senior Account Executive and earned many certifications from Cisco, Arista, Palo, Dell Storage, F5, and Fortinet. He enjoys “being given a chance to be a part of something great, and seeing direct results of [his] efforts as Myriad’s growth continues.”  

Best Myriad memory: “Margaritas pre-summer party being served up by none other than the CEO himself! (If I remember correctly, with an old network switch as the serving tray!)” 

Derek Diaz – 4 years 

After starting as an IT dispatcher, Derek completed training to earn his PMP certification in 2015 and was promoted to project manager. “I love the freedom and trust. As long you’ve demonstrated being dependable and a hard worker, your daily tasks are up to you. No micromanaging.” 

Best Myriad memory: “I’d have to go with my first winter party in 2013. Everyone was super welcoming and we had a blast!” 

Amanda McCall – 2 years 

Amanda has certainly been busy during her time at Myriad. Last year, she earned a certification in Data Analytics for Business and has been involved in organizing office 5k teams for many charitable causes, including “Heroes and Villains” for Memorial Sloan Kettering, “Santa Hat Dash” for Covenant House, and “Tunnel 2 Towers” for The Stephen Siller Foundation. 

Best Myriad memory: “The many volunteer opportunities that have been facilitated by Myriad, especially with SAGE (Advocacy & Services for LGBT Elders).” 

Alex Ho – 1 year 

Alex is celebrating his first year at Myriad! So how did it go? “My favorite thing about working at Myriad is the people. Really fun bunch everyone is.” 

Best Myriad memory: “Winning the ping pong tournament with Nick W. The competition was epic!” 

Many thanks to Guthrie, Caleb, Kyle, Derek, Amanda, and Alex for their dedication, passion, and impressive business acumen. Happy anniversary!