My WebLink
|
Help
|
About
|
Sign Out
Home
Browse
Search
2025-04-28-minutes-it-study-session
>
Meetings
>
2025
>
10. October
>
2025-10-07 10:00 AM - Commissioners' Agenda
>
2025-04-28-minutes-it-study-session
Metadata
Thumbnails
Annotations
Entry Properties
Last modified
10/2/2025 3:46:23 PM
Creation date
10/2/2025 3:44:53 PM
Metadata
Fields
Template:
Meeting
Date
10/7/2025
Meeting title
Commissioners' Agenda
Location
Commissioners' Auditorium
Address
205 West 5th Room 109 - Ellensburg
Meeting type
Regular
Meeting document type
Supporting documentation
Supplemental fields
Item
Approve Minutes
Order
1
Placement
Consent Agenda
Row ID
136417
Type
Minutes
There are no annotations on this page.
Document management portal powered by Laserfiche WebLink 9 © 1998-2015
Laserfiche.
All rights reserved.
/
85
PDF
Print
Pages to print
Enter page numbers and/or page ranges separated by commas. For example, 1,3,5-12.
After downloading, print the document using a PDF reader (e.g. Adobe Reader).
View images
View plain text
<br />©2025 Lumifi Cyber, Inc. All rights reserved. <br />PRIVATE - Controlled by Lumifi Cyber <br /> <br />14/18 <br />PRIVATE - Controlled by Lumifi Cyber <br />SERVICE <br />REVIEWS <br />(CI-MDR) <br />LUMIFI will coordinate with Customer during onboarding and schedule a cadence <br />and duration for periodic service reviews. LUMIFI and Customer will use these <br />scheduled meetings to discuss the service LUMIFI is providing, including discussing <br />Customer’s environment, the risks and trends LUMIFI has seen both in Customer’s <br />network and the wider threat landscape, and any Customer environment or contact <br />changes. <br />XDR <br />ALERTS <br />(CI-MDR) <br /> <br />LUMIFI utilizes proprietary detections over log or alert streams to provide a better <br />service that identifies and focuses on threats. These detections will show up as <br />investigations or alerts alongside Customer’s security product integrations. <br /> <br />Customers can request custom detections. LUMIFI will prioritize these and <br />undertake good faith efforts to complete them in a timely manner. LUMIFI may not <br />complete all requests depending on circumstances such as Customer product <br />licensing, data limitations, or other limitations, but will make commercially <br />reasonable, good faith efforts to identify Customer risk while balancing false <br />positives & negatives. Customer may escalate these by purchasing additional <br />professional services, charged and governed in a separate Scope of Work. <br />DASHBOARDS & <br />PORTALS <br />LUMIFI Customers have access to the Lumifi Cyber Customer Portal. The Customer <br />Portal provides a central place to review information about the services provided <br />and access 3rd party tooling. Information available across the Customer Portal and <br />3rd party tooling includes: <br />• Details on SOC investigations <br />• Ability to search through alerts and data for in scope log sources <br />• Data ingest dashboards <br />• CVI data and dashboards if CVI is part of Customer’s service subscription <br />• Routine reporting <br />• Customer has the ability to download and save monthly reports to support <br />reporting and auditing as needed <br />SUPPORT <br />REQUEST <br />Customer can submit a support request through approved LUMIFI communication <br />channels inquiring about a support or cybersecurity concern. Example requests <br />include: <br />• A question about an alert or concerning activity seen in Customer’s <br />environment <br />• Secure environment configurations <br />• Security product recommendations based on LUMIFI’s experience <br />• Assistance in working with other security providers, such as an EDR vendor <br /> <br />LUMIFI will make commercially reasonable, good faith efforts to provide the <br />information requested. Requests will be prioritized and worked as LUMIFI resources <br />allow, and complex or urgent requests may require a separate Scope of Work that <br />may carry an additional fee. <br />CONTINUOUS <br />VULNERABILITY <br />IDENTIFICATION <br />(CI-CVI) <br />LUMIFI will configure scans to automatically conduct internal network vulnerability <br />scans at Customer-defined frequencies and scan targets. <br /> <br />The scans will identify insecure configurations, open ports and services, vulnerable <br />software/service versions, and missing patches that could lead to network <br />exploitation. <br /> <br />Reports and dashboards are made available via the Customer Portal. Reports <br />include: <br />• Steps to eliminate each vulnerability <br />• Risk via CVSS scores to allow prioritization of remediation efforts
The URL can be used to link to this page
Your browser does not support the video tag.