SlideShare a Scribd company logo
1 of 29
Download to read offline
Cyber Defence Strategies
Attention Attendees:
Remember to type your messages to all panellists and attendees
Welcome!
• Module 1 – Introduction & Identifying Cyber Risk
• Module 2 – Administrative & Technical Controls
• Module 3 – Administrative & Technical Controls (continued)
• Module 4 – Implementation, Budgets, Funding, and ROI
• Assessment
Agenda – Week 1
• Current cyber threat landscape
• Taking a risk-based approach to cyber defence
• Building a cyber defence strategy
Current Cyber Threat Landscape
Overview
• Data breaches rising year by year
• Continued increased requirements in legislation and regulations around
the globe related to information/cyber security and privacy
OAIC (2023). Notifiable Data Breaches Report Jul-Dec 2022
Overview (continued)
• Organised crime
• State sponsored
• Hacktivists
• Terrorists
• Individual hackers
• Malicious insiders
• Accidental insiders
Verizon (2022). Data Breach Incident Report
82%
Human Element
Overview (continued)
Mandiant (2023). M-Trends
Global Average Dwell Time
Taking a risk-based approach to cyber defence
What is risk?
Risk is:
• (the) “effect of uncertainty on objectives”. – ISO 31000
• “The possibility that the occurrence of an event will adversely affect
the achievement of the organization's objectives.” – Stanford University
• “The possibility of something bad happening” - Cambridge
Risk can be positive too!
Positive versus Negative risk.
• A positive risk has a positive impact on your objectives.
Positive versus Negative Risk
• A data breach occurs, which results in reputational damage
• Outsourcing a critical service, which results in improved uptime
Assessing & Calculating Risk
• Qualitative vs quantitative risk
• High, Medium, Low, etc.
• ALE = SLE * ARO
• SLE = AV * EF
Risk Appetite, Risk Tolerance, Risk Threshold
• Risk Appetite – used to describe the level of risk taking that is
acceptable
• Risk Tolerance – set of boundaries and variation
• Risk Threshold – limit where risk will not be accepted if exceeded
Risk Frameworks (Examples)
• ISO 31000
• ISO 27005
• NIST 800-37
ISO 31000:2018
• Risk management - guidelines
• Broad and can be used to manage applied across any organisation
• Provides both framework and guidance on processes to manage risk
ISO 27005:2022
• Information security, cybersecurity and privacy protection —
Guidance on managing information security risks
• Follow the same structure as other ISO standards/documents
• Provides guidance on managing risk in the context of information
security
NIST 800-37 r2
• Risk management framework for Information systems and
organisations
• Describes the NIST risk management framework (RMF)
• Used to manage security and privacy risk
• Free!
Building a cyber defence strategy
Treating risk…
• You’ve done the risk assessment – now what?
Scope…
• Identify the scope of the cyber defence program
• What are the high value assets? (the risk assessment should help with
that and the one below!)
• What is likely to be exploited?
Key Elements of a Cyber Defence Strategy
• Gap Analysis
• Security Controls
• Awareness & Culture
• Data Management
• Monitoring & Measurement
• Continual Improvement
Security Controls
• Technical & Administrative controls
• Designed to mitigate (and reduce) identified risk
• Can be costly, so it’s important to ensure that the most appropriate
controls have been selected that provide the greatest benefit
Awareness & Culture
• 82% of data breaches involved a human element (Verizon, 2022)
• Security controls can only go so far, people are the last line of defence
Data Management
• Do you know where your data is?
• Do you know what your data is?
• Is it subject to any legal, regulatory, or contractual obligations?
• How is it currently protected?
Monitoring & Measurement
• Are you monitoring your environment?
• Is your monitoring centralised and adequately protected?
• Are you monitoring your security posture?
• What measures are needed to demonstrate effectiveness and ROI?
Continual Improvement
• It’s not over…
About Me
• 20+ years industry experience
• DInfoTech, MMgmt(InfoTech), BInfoTech(SysAdmin)
• CCISO, CDPSE, CISM, CISSP, GRCA, GRCP, ISO27001
Lead Auditor/ Implementer, MACS Snr. CP (Cyber
Security)
• ACS Profession Advisory Board Member
linkedin.com/in/georgthomas
scholar.google.com/citations?user=z72s_9MAAAAJ
Questions?
References
• Cambridge Dictionary (2023). Risk. Retrieved from:
https://dictionary.cambridge.org/dictionary/english/risk
• Mandiant (2023). M-Trends 2023 – Cyber Security Insights from the Frontlines.
Retrieved from: https://www.mandiant.com/resources/blog/m-trends-2023
• OAIC (2023). Notifiable Data Breaches Report Jul-Dec 2022. Retrieved from:
https://www.oaic.gov.au/privacy/notifiable-data-breaches/notifiable-data-
breaches-publications/notifiable-data-breaches-report-july-to-december-2022
• Stanford University (n.d.). Definition of Risk. Retrieved from:
https://ocro.stanford.edu/erm/key-definitions/definition-risk
• Verizon (2022). Data Breach Incident Report. Retrieved from:
https://www.verizon.com/business/resources/reports/dbir/

More Related Content

Similar to 2023 ITM Short Course - Week 1.pdf

Kmicro Cybersecurity Offerings 2020
Kmicro Cybersecurity Offerings 2020Kmicro Cybersecurity Offerings 2020
Kmicro Cybersecurity Offerings 2020Manuel Guillen
 
Risk Based Security and Self Protection Powerpoint
Risk Based Security and Self Protection PowerpointRisk Based Security and Self Protection Powerpoint
Risk Based Security and Self Protection Powerpointrandalje86
 
Cervone uof t - nist framework (1)
Cervone   uof t - nist framework (1)Cervone   uof t - nist framework (1)
Cervone uof t - nist framework (1)Stephen Abram
 
A Major Revision of the CISRCP Program
A Major Revision of the CISRCP ProgramA Major Revision of the CISRCP Program
A Major Revision of the CISRCP ProgramGoogleNewsSubmit
 
Meeting the cyber risk challenge
Meeting the cyber risk challengeMeeting the cyber risk challenge
Meeting the cyber risk challengeFERMA
 
framework-version-1.1-overview-20180427-for-web-002.pptx
framework-version-1.1-overview-20180427-for-web-002.pptxframework-version-1.1-overview-20180427-for-web-002.pptx
framework-version-1.1-overview-20180427-for-web-002.pptxAshishRanjan546644
 
Know more about exin unique information security program
Know more about exin unique information security programKnow more about exin unique information security program
Know more about exin unique information security programElke Couto Morgado
 
Introduction to Cybersecurity.pdf
Introduction to Cybersecurity.pdfIntroduction to Cybersecurity.pdf
Introduction to Cybersecurity.pdfssuserf98dd4
 
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAEIT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE360 BSI
 
Solve the exercise in security management.pdf
Solve the exercise in security management.pdfSolve the exercise in security management.pdf
Solve the exercise in security management.pdfsdfghj21
 
Introduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security FrameworkIntroduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security FrameworkPECB
 
MCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationMCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationWilliam McBorrough
 
Super CISO 2020: How to Keep Your Job
Super CISO 2020: How to Keep Your JobSuper CISO 2020: How to Keep Your Job
Super CISO 2020: How to Keep Your JobPriyanka Aash
 
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...360 BSI
 
Selling security to the C-level
Selling security to the C-levelSelling security to the C-level
Selling security to the C-levelDonald Tabone
 
NIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewNIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewTandhy Simanjuntak
 
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...PECB
 
Business cases internet 30 use cases
Business cases internet 30 use casesBusiness cases internet 30 use cases
Business cases internet 30 use casesPriyanka Aash
 
ISO/IEC 27032 vs. ISO 31000 – How do they help towards Cybersecurity Risk Man...
ISO/IEC 27032 vs. ISO 31000 – How do they help towards Cybersecurity Risk Man...ISO/IEC 27032 vs. ISO 31000 – How do they help towards Cybersecurity Risk Man...
ISO/IEC 27032 vs. ISO 31000 – How do they help towards Cybersecurity Risk Man...PECB
 
Dealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber ResilienceDealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber ResilienceDonald Tabone
 

Similar to 2023 ITM Short Course - Week 1.pdf (20)

Kmicro Cybersecurity Offerings 2020
Kmicro Cybersecurity Offerings 2020Kmicro Cybersecurity Offerings 2020
Kmicro Cybersecurity Offerings 2020
 
Risk Based Security and Self Protection Powerpoint
Risk Based Security and Self Protection PowerpointRisk Based Security and Self Protection Powerpoint
Risk Based Security and Self Protection Powerpoint
 
Cervone uof t - nist framework (1)
Cervone   uof t - nist framework (1)Cervone   uof t - nist framework (1)
Cervone uof t - nist framework (1)
 
A Major Revision of the CISRCP Program
A Major Revision of the CISRCP ProgramA Major Revision of the CISRCP Program
A Major Revision of the CISRCP Program
 
Meeting the cyber risk challenge
Meeting the cyber risk challengeMeeting the cyber risk challenge
Meeting the cyber risk challenge
 
framework-version-1.1-overview-20180427-for-web-002.pptx
framework-version-1.1-overview-20180427-for-web-002.pptxframework-version-1.1-overview-20180427-for-web-002.pptx
framework-version-1.1-overview-20180427-for-web-002.pptx
 
Know more about exin unique information security program
Know more about exin unique information security programKnow more about exin unique information security program
Know more about exin unique information security program
 
Introduction to Cybersecurity.pdf
Introduction to Cybersecurity.pdfIntroduction to Cybersecurity.pdf
Introduction to Cybersecurity.pdf
 
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAEIT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
 
Solve the exercise in security management.pdf
Solve the exercise in security management.pdfSolve the exercise in security management.pdf
Solve the exercise in security management.pdf
 
Introduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security FrameworkIntroduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security Framework
 
MCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationMCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service Presentation
 
Super CISO 2020: How to Keep Your Job
Super CISO 2020: How to Keep Your JobSuper CISO 2020: How to Keep Your Job
Super CISO 2020: How to Keep Your Job
 
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
 
Selling security to the C-level
Selling security to the C-levelSelling security to the C-level
Selling security to the C-level
 
NIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewNIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An Overview
 
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
 
Business cases internet 30 use cases
Business cases internet 30 use casesBusiness cases internet 30 use cases
Business cases internet 30 use cases
 
ISO/IEC 27032 vs. ISO 31000 – How do they help towards Cybersecurity Risk Man...
ISO/IEC 27032 vs. ISO 31000 – How do they help towards Cybersecurity Risk Man...ISO/IEC 27032 vs. ISO 31000 – How do they help towards Cybersecurity Risk Man...
ISO/IEC 27032 vs. ISO 31000 – How do they help towards Cybersecurity Risk Man...
 
Dealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber ResilienceDealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber Resilience
 

Recently uploaded

Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMartaLoveguard
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Paul Calvano
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhimiss dipika
 
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Lucknow
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一Fs
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts servicesonalikaur4
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012rehmti665
 
Denver Web Design brochure for public viewing
Denver Web Design brochure for public viewingDenver Web Design brochure for public viewing
Denver Web Design brochure for public viewingbigorange77
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作ys8omjxb
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一Fs
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITMgdsc13
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsThierry TROUIN ☁
 
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...akbard9823
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一Fs
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一z xss
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Roomdivyansh0kumar0
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 

Recently uploaded (20)

Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptx
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhi
 
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
 
Denver Web Design brochure for public viewing
Denver Web Design brochure for public viewingDenver Web Design brochure for public viewing
Denver Web Design brochure for public viewing
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITM
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with Flows
 
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
 

2023 ITM Short Course - Week 1.pdf

  • 1. Cyber Defence Strategies Attention Attendees: Remember to type your messages to all panellists and attendees
  • 2. Welcome! • Module 1 – Introduction & Identifying Cyber Risk • Module 2 – Administrative & Technical Controls • Module 3 – Administrative & Technical Controls (continued) • Module 4 – Implementation, Budgets, Funding, and ROI • Assessment
  • 3. Agenda – Week 1 • Current cyber threat landscape • Taking a risk-based approach to cyber defence • Building a cyber defence strategy
  • 5. Overview • Data breaches rising year by year • Continued increased requirements in legislation and regulations around the globe related to information/cyber security and privacy OAIC (2023). Notifiable Data Breaches Report Jul-Dec 2022
  • 6. Overview (continued) • Organised crime • State sponsored • Hacktivists • Terrorists • Individual hackers • Malicious insiders • Accidental insiders Verizon (2022). Data Breach Incident Report 82% Human Element
  • 7. Overview (continued) Mandiant (2023). M-Trends Global Average Dwell Time
  • 8. Taking a risk-based approach to cyber defence
  • 9. What is risk? Risk is: • (the) “effect of uncertainty on objectives”. – ISO 31000 • “The possibility that the occurrence of an event will adversely affect the achievement of the organization's objectives.” – Stanford University • “The possibility of something bad happening” - Cambridge
  • 10. Risk can be positive too! Positive versus Negative risk. • A positive risk has a positive impact on your objectives.
  • 11. Positive versus Negative Risk • A data breach occurs, which results in reputational damage • Outsourcing a critical service, which results in improved uptime
  • 12. Assessing & Calculating Risk • Qualitative vs quantitative risk • High, Medium, Low, etc. • ALE = SLE * ARO • SLE = AV * EF
  • 13. Risk Appetite, Risk Tolerance, Risk Threshold • Risk Appetite – used to describe the level of risk taking that is acceptable • Risk Tolerance – set of boundaries and variation • Risk Threshold – limit where risk will not be accepted if exceeded
  • 14. Risk Frameworks (Examples) • ISO 31000 • ISO 27005 • NIST 800-37
  • 15. ISO 31000:2018 • Risk management - guidelines • Broad and can be used to manage applied across any organisation • Provides both framework and guidance on processes to manage risk
  • 16. ISO 27005:2022 • Information security, cybersecurity and privacy protection — Guidance on managing information security risks • Follow the same structure as other ISO standards/documents • Provides guidance on managing risk in the context of information security
  • 17. NIST 800-37 r2 • Risk management framework for Information systems and organisations • Describes the NIST risk management framework (RMF) • Used to manage security and privacy risk • Free!
  • 18. Building a cyber defence strategy
  • 19. Treating risk… • You’ve done the risk assessment – now what?
  • 20. Scope… • Identify the scope of the cyber defence program • What are the high value assets? (the risk assessment should help with that and the one below!) • What is likely to be exploited?
  • 21. Key Elements of a Cyber Defence Strategy • Gap Analysis • Security Controls • Awareness & Culture • Data Management • Monitoring & Measurement • Continual Improvement
  • 22. Security Controls • Technical & Administrative controls • Designed to mitigate (and reduce) identified risk • Can be costly, so it’s important to ensure that the most appropriate controls have been selected that provide the greatest benefit
  • 23. Awareness & Culture • 82% of data breaches involved a human element (Verizon, 2022) • Security controls can only go so far, people are the last line of defence
  • 24. Data Management • Do you know where your data is? • Do you know what your data is? • Is it subject to any legal, regulatory, or contractual obligations? • How is it currently protected?
  • 25. Monitoring & Measurement • Are you monitoring your environment? • Is your monitoring centralised and adequately protected? • Are you monitoring your security posture? • What measures are needed to demonstrate effectiveness and ROI?
  • 27. About Me • 20+ years industry experience • DInfoTech, MMgmt(InfoTech), BInfoTech(SysAdmin) • CCISO, CDPSE, CISM, CISSP, GRCA, GRCP, ISO27001 Lead Auditor/ Implementer, MACS Snr. CP (Cyber Security) • ACS Profession Advisory Board Member linkedin.com/in/georgthomas scholar.google.com/citations?user=z72s_9MAAAAJ
  • 29. References • Cambridge Dictionary (2023). Risk. Retrieved from: https://dictionary.cambridge.org/dictionary/english/risk • Mandiant (2023). M-Trends 2023 – Cyber Security Insights from the Frontlines. Retrieved from: https://www.mandiant.com/resources/blog/m-trends-2023 • OAIC (2023). Notifiable Data Breaches Report Jul-Dec 2022. Retrieved from: https://www.oaic.gov.au/privacy/notifiable-data-breaches/notifiable-data- breaches-publications/notifiable-data-breaches-report-july-to-december-2022 • Stanford University (n.d.). Definition of Risk. Retrieved from: https://ocro.stanford.edu/erm/key-definitions/definition-risk • Verizon (2022). Data Breach Incident Report. Retrieved from: https://www.verizon.com/business/resources/reports/dbir/