SlideShare a Scribd company logo
1 of 16
Confidential. Not to be copied, distributed, or reproduced without prior approval.
BEINFORMED.BESTRATEGIC.BESECURE.
June 29, 2018 1
SECURITY BREACHES HAPPEN
Make Sure Your Organization Knows How to Respond
It’s 8am.
You’ve arrived at work for
business as usual, only to
discover your company’s client
database has been
compromised.
June 29, 2018 2
You and your team begin
responding to the attack,
when suddenly your
internet access is denied
and the attacker begins
posting sensitive information
to your company’s social
media account.
June 29, 2018 3
What you do next
depends on one
important question:
Have you been through
it before?
June 29, 2018 4
BREACHES HAPPEN EVERY DAY
More than 50% of businesses experienced a
cyberattack in 2017, resulting in nearly 2 billion lost or
stolen records.
On average, data breaches in the U.S. set companies
back $7.35 million, which includes costs for loss of
customer, detection and escalation, and notification.
Companies in the financial, technology and services
industries experience the highest loss of customers
following a data breach.
June 29, 2018 5
2,000,000,000
Lost or stolen records - 2017
EVERY COMPANY IS A SECURITY COMPANY
Cyber attacks will remain a significant threat until
companies commit to the security technology, policies
and solutions necessary to be safe.
Nearly 90% of small business owners don’t feel they’re
at risk of a breach. Couple that with 81% of hacking-
related breaches being caused by weak or stolen
passwords, and there’s a recipe for disaster.
DON’T BECOME A STATISTIC.
June 29, 2018 6
BE READY WITH SIMULATED
SECURITY EVENTS
DirectDefense offers simulated real-world cyber and
physical security events to train your staff and leadership,
and test your organization’s incident response and disaster
recovery plans.
June 29, 2018 7
WHAT ARE THE OBJECTIVES?
Mimic real-world events, including practice calls or
contact with legal counsel, media or emergency services
Engage staff and leadership to work together and
establish who needs to be involved at what points during
the response
Facilitate and guide post-remediation activities and
additional training if necessary
June 29, 2018 8
WHAT CAN YOU EXPECT?
Our security event simulations are two- to
three-week engagements with both your
technical staff and leadership.
June 29, 2018 9
We create purposely overwhelming
security events, which allows us to find
vulnerabilities in your response plans and
identify room for improvement.
Confidential. Not to be copied, distributed, or reproduced without prior approval.
WEEK 1:
PREPARATION
DirectDefense facilitators will conduct information-gathering
and consult with staff and leadership to help design
the simulation.
June 29, 2018 10
Confidential. Not to be copied, distributed, or reproduced without prior approval.
WEEK 2:
SIMULATED EXERCISE
For two-to-three days, DirectDefense facilitators will
lead the simulation in a tabletop exercise format,
working with both technical staff and leadership to
ensure each group knows their role and understands
how the different scenarios affect the opposite group.
June 29, 2018 11
Confidential. Not to be copied, distributed, or reproduced without prior approval.
WEEK 3:
POST-REMEDIATION
With the information learned during the tabletop
exercise, DirectDefense facilitators will:
- Review “parking lot” items brought up during
the simulation
- Determine what is working well, what needs
improvement and if there is more training needed
- Establish a plan for conducting the exercise again
if needed
June 29, 2018 12
June 29, 2018 13
HELPING YOUR COMPANY IMPROVE
01
Identification of gaps
and vulnerabilities in
your response plans
02
Alignment of all technical
staff and leadership
within your company
in their roles and
responsibilities during
a security incident
03
Awareness of the size
and severity of a
security incident, and
the importance of
being prepared
04
Application of our
expert knowledge
to help you be fully
prepared in an actual
security event
We conduct a comprehensive security event simulation with one goal in mind: improve your
organization’s overall security posture. Benefits include:
Confidential. Not to be copied, distributed, or reproduced without prior approval.
A security incident
may be inevitable.
But being
prepared isn’t.
June 29, 2018 14
Confidential. Not to be copied, distributed, or reproduced without prior approval. June 29, 2018 15
BE CONFIDENT IN
YOUR ORGANIZATION’S
INCIDENT RESPONSE
PLAN AND READINESS
Set up a security event simulation today.
www.directdefense.com
1-888-720-4633
Confidential. Not to be copied, distributed, or reproduced without prior approval.
www.directdefense.comwww.directdefense.com
June 29, 2018 16

More Related Content

What's hot

Ast 0079872 1505924-esg_wp_rsa_big_data_and_security_analytics_jan_2013
Ast 0079872 1505924-esg_wp_rsa_big_data_and_security_analytics_jan_2013Ast 0079872 1505924-esg_wp_rsa_big_data_and_security_analytics_jan_2013
Ast 0079872 1505924-esg_wp_rsa_big_data_and_security_analytics_jan_2013
drewz lin
 
Tech Talent Meetup Hacking Security Event Recap
Tech Talent Meetup Hacking Security Event RecapTech Talent Meetup Hacking Security Event Recap
Tech Talent Meetup Hacking Security Event Recap
Dominic Vogel
 
E 060 oil gas cyber security north america
E 060 oil gas cyber security north americaE 060 oil gas cyber security north america
E 060 oil gas cyber security north america
Alia Malick
 

What's hot (20)

12 Top Talks from the 2017 R-CISC Summit
12 Top Talks from the 2017 R-CISC Summit12 Top Talks from the 2017 R-CISC Summit
12 Top Talks from the 2017 R-CISC Summit
 
2017 in Review: Infosec Pros Look Back on the Year
2017 in Review: Infosec Pros Look Back on the Year2017 in Review: Infosec Pros Look Back on the Year
2017 in Review: Infosec Pros Look Back on the Year
 
GIAC: Build Your Force
GIAC: Build Your ForceGIAC: Build Your Force
GIAC: Build Your Force
 
Cyber security: Five leadership issues worthy of board and executive attention
Cyber security: Five leadership issues worthy of board and executive attentionCyber security: Five leadership issues worthy of board and executive attention
Cyber security: Five leadership issues worthy of board and executive attention
 
7 Experts on Implementing Microsoft 365 Defender
7 Experts on Implementing Microsoft 365 Defender7 Experts on Implementing Microsoft 365 Defender
7 Experts on Implementing Microsoft 365 Defender
 
Gamification & Ratings
Gamification & RatingsGamification & Ratings
Gamification & Ratings
 
What CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber SecurityWhat CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber Security
 
Information Security
Information SecurityInformation Security
Information Security
 
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
 
Ast 0079872 1505924-esg_wp_rsa_big_data_and_security_analytics_jan_2013
Ast 0079872 1505924-esg_wp_rsa_big_data_and_security_analytics_jan_2013Ast 0079872 1505924-esg_wp_rsa_big_data_and_security_analytics_jan_2013
Ast 0079872 1505924-esg_wp_rsa_big_data_and_security_analytics_jan_2013
 
Security Leaders: Manage the Forest, Not the Trees
Security Leaders: Manage the Forest, Not the TreesSecurity Leaders: Manage the Forest, Not the Trees
Security Leaders: Manage the Forest, Not the Trees
 
Tech Talent Meetup Hacking Security Event Recap
Tech Talent Meetup Hacking Security Event RecapTech Talent Meetup Hacking Security Event Recap
Tech Talent Meetup Hacking Security Event Recap
 
Before the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracksBefore the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracks
 
Security Best Practices for Small Business
Security Best Practices for Small BusinessSecurity Best Practices for Small Business
Security Best Practices for Small Business
 
Windstream Cloud Security Checklist
Windstream Cloud Security Checklist Windstream Cloud Security Checklist
Windstream Cloud Security Checklist
 
5 ways erp can boost your company’s security
5 ways erp can boost your company’s security5 ways erp can boost your company’s security
5 ways erp can boost your company’s security
 
Enterprise Strategy Group: The Big Data Security Analytics Era is Here
Enterprise Strategy Group: The Big Data Security Analytics Era is HereEnterprise Strategy Group: The Big Data Security Analytics Era is Here
Enterprise Strategy Group: The Big Data Security Analytics Era is Here
 
Social Engineering the CEO
Social Engineering the CEOSocial Engineering the CEO
Social Engineering the CEO
 
Security, Audit and Compliance: course overview
Security, Audit and Compliance: course overviewSecurity, Audit and Compliance: course overview
Security, Audit and Compliance: course overview
 
E 060 oil gas cyber security north america
E 060 oil gas cyber security north americaE 060 oil gas cyber security north america
E 060 oil gas cyber security north america
 

Similar to Simulated Security Events

Team 20 Threat Attack AI Cyber Security Company Decision makin.docx
Team 20 Threat Attack AI Cyber Security Company Decision makin.docxTeam 20 Threat Attack AI Cyber Security Company Decision makin.docx
Team 20 Threat Attack AI Cyber Security Company Decision makin.docx
erlindaw
 

Similar to Simulated Security Events (20)

Team 20 Threat Attack AI Cyber Security Company Decision makin.docx
Team 20 Threat Attack AI Cyber Security Company Decision makin.docxTeam 20 Threat Attack AI Cyber Security Company Decision makin.docx
Team 20 Threat Attack AI Cyber Security Company Decision makin.docx
 
Challenges & Opportunities the Data Privacy Act Brings
Challenges & Opportunities the Data Privacy Act BringsChallenges & Opportunities the Data Privacy Act Brings
Challenges & Opportunities the Data Privacy Act Brings
 
To Be Great Enterprise Risk Managers, CISOs Need to Be Great Collaborators
To Be Great Enterprise Risk Managers, CISOs Need to Be Great CollaboratorsTo Be Great Enterprise Risk Managers, CISOs Need to Be Great Collaborators
To Be Great Enterprise Risk Managers, CISOs Need to Be Great Collaborators
 
5 Questions Executives Should Be Asking Their Security Teams
5 Questions Executives Should Be Asking Their Security Teams 5 Questions Executives Should Be Asking Their Security Teams
5 Questions Executives Should Be Asking Their Security Teams
 
GDPR Complaince: Don't Let SIEM BE Your Downfall
GDPR Complaince: Don't Let SIEM BE Your DownfallGDPR Complaince: Don't Let SIEM BE Your Downfall
GDPR Complaince: Don't Let SIEM BE Your Downfall
 
Cultivate a stronger corporate culture to enhance cybersecurity
Cultivate a stronger corporate culture to enhance cybersecurityCultivate a stronger corporate culture to enhance cybersecurity
Cultivate a stronger corporate culture to enhance cybersecurity
 
Protecting the Core of Your Network
Protecting the Core of Your Network Protecting the Core of Your Network
Protecting the Core of Your Network
 
Towards a Digital teammate to support sensemaking in Cyber Security teams
Towards a Digital teammate to support sensemaking in Cyber Security teamsTowards a Digital teammate to support sensemaking in Cyber Security teams
Towards a Digital teammate to support sensemaking in Cyber Security teams
 
Cybersecurity report-vol-8
Cybersecurity report-vol-8Cybersecurity report-vol-8
Cybersecurity report-vol-8
 
Using Threat Intelligence to Improve Your Company.pdf
Using Threat Intelligence to Improve Your Company.pdfUsing Threat Intelligence to Improve Your Company.pdf
Using Threat Intelligence to Improve Your Company.pdf
 
MP_OneSheet_VulnThreat
MP_OneSheet_VulnThreatMP_OneSheet_VulnThreat
MP_OneSheet_VulnThreat
 
A Look at Cyber Insurance -- A Corporate Perspective
A Look at Cyber Insurance -- A Corporate  PerspectiveA Look at Cyber Insurance -- A Corporate  Perspective
A Look at Cyber Insurance -- A Corporate Perspective
 
CompTIA CySA Domain 5 Compliance and Assessment.pptx
CompTIA CySA Domain 5 Compliance and Assessment.pptxCompTIA CySA Domain 5 Compliance and Assessment.pptx
CompTIA CySA Domain 5 Compliance and Assessment.pptx
 
Healthcare Providers: 2018 State of Cyber Resilience
Healthcare Providers: 2018 State of Cyber ResilienceHealthcare Providers: 2018 State of Cyber Resilience
Healthcare Providers: 2018 State of Cyber Resilience
 
Prevent & Protect
Prevent & ProtectPrevent & Protect
Prevent & Protect
 
2018 State of Cyber Resilience - New York
2018 State of Cyber Resilience - New York2018 State of Cyber Resilience - New York
2018 State of Cyber Resilience - New York
 
Metrics & Reporting - A Failure in Communication
Metrics & Reporting - A Failure in CommunicationMetrics & Reporting - A Failure in Communication
Metrics & Reporting - A Failure in Communication
 
Risksense: 7 Experts on Threat and Vulnerability Management
Risksense: 7 Experts on Threat and Vulnerability ManagementRisksense: 7 Experts on Threat and Vulnerability Management
Risksense: 7 Experts on Threat and Vulnerability Management
 
Module 2 - Cybersecurity On the Defense.pdf
Module 2 - Cybersecurity On the Defense.pdfModule 2 - Cybersecurity On the Defense.pdf
Module 2 - Cybersecurity On the Defense.pdf
 
10 Most Important Strategies for Cybersecurity Risk Mitigation.pdf
10 Most Important Strategies for Cybersecurity Risk Mitigation.pdf10 Most Important Strategies for Cybersecurity Risk Mitigation.pdf
10 Most Important Strategies for Cybersecurity Risk Mitigation.pdf
 

Recently uploaded

Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
FIDO Alliance
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
FIDO Alliance
 
CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)
Wonjun Hwang
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
panagenda
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
FIDO Alliance
 

Recently uploaded (20)

Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps Productivity
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxCyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptx
 
How to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in PakistanHow to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in Pakistan
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdf
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 

Simulated Security Events

  • 1. Confidential. Not to be copied, distributed, or reproduced without prior approval. BEINFORMED.BESTRATEGIC.BESECURE. June 29, 2018 1 SECURITY BREACHES HAPPEN Make Sure Your Organization Knows How to Respond
  • 2. It’s 8am. You’ve arrived at work for business as usual, only to discover your company’s client database has been compromised. June 29, 2018 2
  • 3. You and your team begin responding to the attack, when suddenly your internet access is denied and the attacker begins posting sensitive information to your company’s social media account. June 29, 2018 3
  • 4. What you do next depends on one important question: Have you been through it before? June 29, 2018 4
  • 5. BREACHES HAPPEN EVERY DAY More than 50% of businesses experienced a cyberattack in 2017, resulting in nearly 2 billion lost or stolen records. On average, data breaches in the U.S. set companies back $7.35 million, which includes costs for loss of customer, detection and escalation, and notification. Companies in the financial, technology and services industries experience the highest loss of customers following a data breach. June 29, 2018 5 2,000,000,000 Lost or stolen records - 2017
  • 6. EVERY COMPANY IS A SECURITY COMPANY Cyber attacks will remain a significant threat until companies commit to the security technology, policies and solutions necessary to be safe. Nearly 90% of small business owners don’t feel they’re at risk of a breach. Couple that with 81% of hacking- related breaches being caused by weak or stolen passwords, and there’s a recipe for disaster. DON’T BECOME A STATISTIC. June 29, 2018 6
  • 7. BE READY WITH SIMULATED SECURITY EVENTS DirectDefense offers simulated real-world cyber and physical security events to train your staff and leadership, and test your organization’s incident response and disaster recovery plans. June 29, 2018 7
  • 8. WHAT ARE THE OBJECTIVES? Mimic real-world events, including practice calls or contact with legal counsel, media or emergency services Engage staff and leadership to work together and establish who needs to be involved at what points during the response Facilitate and guide post-remediation activities and additional training if necessary June 29, 2018 8
  • 9. WHAT CAN YOU EXPECT? Our security event simulations are two- to three-week engagements with both your technical staff and leadership. June 29, 2018 9 We create purposely overwhelming security events, which allows us to find vulnerabilities in your response plans and identify room for improvement.
  • 10. Confidential. Not to be copied, distributed, or reproduced without prior approval. WEEK 1: PREPARATION DirectDefense facilitators will conduct information-gathering and consult with staff and leadership to help design the simulation. June 29, 2018 10
  • 11. Confidential. Not to be copied, distributed, or reproduced without prior approval. WEEK 2: SIMULATED EXERCISE For two-to-three days, DirectDefense facilitators will lead the simulation in a tabletop exercise format, working with both technical staff and leadership to ensure each group knows their role and understands how the different scenarios affect the opposite group. June 29, 2018 11
  • 12. Confidential. Not to be copied, distributed, or reproduced without prior approval. WEEK 3: POST-REMEDIATION With the information learned during the tabletop exercise, DirectDefense facilitators will: - Review “parking lot” items brought up during the simulation - Determine what is working well, what needs improvement and if there is more training needed - Establish a plan for conducting the exercise again if needed June 29, 2018 12
  • 13. June 29, 2018 13 HELPING YOUR COMPANY IMPROVE 01 Identification of gaps and vulnerabilities in your response plans 02 Alignment of all technical staff and leadership within your company in their roles and responsibilities during a security incident 03 Awareness of the size and severity of a security incident, and the importance of being prepared 04 Application of our expert knowledge to help you be fully prepared in an actual security event We conduct a comprehensive security event simulation with one goal in mind: improve your organization’s overall security posture. Benefits include:
  • 14. Confidential. Not to be copied, distributed, or reproduced without prior approval. A security incident may be inevitable. But being prepared isn’t. June 29, 2018 14
  • 15. Confidential. Not to be copied, distributed, or reproduced without prior approval. June 29, 2018 15 BE CONFIDENT IN YOUR ORGANIZATION’S INCIDENT RESPONSE PLAN AND READINESS Set up a security event simulation today. www.directdefense.com 1-888-720-4633
  • 16. Confidential. Not to be copied, distributed, or reproduced without prior approval. www.directdefense.comwww.directdefense.com June 29, 2018 16