2. Cyber security breaches of large and small companies continue to
make headlines, and it is an area LTG Mary Legere, Senior
Intelligence Office for the United States Army is interested in
exploring.
Yet, despite all of the new technology and vigilance companies use,
many are still not prepared to fully protect their data from a
variety of security threats. Here is a list of the more common
security threats businesses face and what they can do to protect
against them.
LTG Mary Legere
3. LTG Mary Legere
LTG
M
A
R
R
Y
L
E
G
E
R
E
Insider attacks are one of the largest threats facing
company data and systems. Disgruntled and careless
employees have the potential to cause serious damage
for a company.
To eliminate the threat of disgruntled employees causing
damage, it is important for companies to identify and
limit privileged user accounts and terminate them
immediately upon the employee’s departure from the
company.
4. Privileged users should be vetted for their reliability and cyber
security awareness, and their activities actively monitored to
ensure good practice and strong security.
To reduce the risk from careless employees, all employees must
be educated on the basics of cyber security as well as best
practices, and held accountable for good cyber hygiene.
As an extra step to securing your company data, you should
deploy validated encryption to your server.
LTG Mary Legere
5. Another risk that has seen an increase lately is mobile
devices. When employees use their own mobile devices to
share data, access company information, or neglect to
change their mobile passwords, there is an increased risk of
data theft.
To help decrease this risk, companies should have a
carefully spelled out policy regarding the use of personal
cell phones.
LTG Mary Legere
6. Third-party services providers can also pose a huge threat to
company data and systems. As technology becomes more
specialized and complex, companies are turning to third-
party providers to help them maintain and support their
systems.
Many third party service providers use remote access tools
to connect to company networks, but they don’t always
follow security best practices.
LTG Mary Legere
7. Many times the contractor’s login credentials are stolen,
allowing anyone to access your system.
In order to decrease your risk of a data breach as a result of a
third-party service provider not following security best
practices, it is important to properly validate that any third-
party provider follows security best practices.
It is also important to disable any accounts as soon as they are
no longer needed.
LTG Mary Legere
8. In this day and age, cyber security breaches are inevitable, as
LTG Mary Legere knows. To minimize the impact of a
cybersecurity, leak and breach, you should be performing a
risk assessment regularly.
This will help you to identify where your valuable data is
housed and what procedures and controls you need to put in
place to protect it. Taking the proper measures now will save
you later. .
LTG Mary Legere
9. Follow us
• http://www.theatlantic.com/video/archive/2012/07/the-future-of-x-lieutenant-g
• http://www.army.mil/article/64363/MG_Mary_A__Legere/
• https://ltgmarylegere.wordpress.com/
• https://ltgmarylegere.wordpress.com/2015/12/23/lt-gen-mary-legere-career-arm
• http://www.businessinsider.com/Congressman-Trashes-Lieutenant-
General-Who-Could-Become-Militarys-Top-Spy/articleshow/34501103.cms
• https://www.crunchbase.com/person/ltg-mary-legere
• http://belfercenter.ksg.harvard.edu/events/6403/intelligence_seminar_ltg
_mary_legere.html
Discover the power of custom layouts
Editor's Notes
Before you begin:
This course assumes that students have some familiarity with PowerPoint. If they haven’t created a PowerPoint presentation before, it’s recommended that they start with the PowerPoint training presentation titled, “Create your first presentation.”
[Notes to trainer:
For detailed help in customizing this template, see the very last slide. Also, look for additional lesson text in the notes pane of some slides.
Adobe Flash animations: This template contains Flash animations. These will play in PowerPoint 2000 and later. However: If you want to save this template in PowerPoint 2007, save it in the earlier PowerPoint file format: PowerPoint 97-2003 Presentation (*.ppt) or PowerPoint 97-2003 Template (*.pot). (You’ll see the file types in the Save As dialog box, next to Save as type.) Warning: If you save it in a PowerPoint 2007 file format, such as PowerPoint Presentation (*.pptx) or PowerPoint Template (*.potx), the animations won’t be retained in the saved file.
Also: Because this presentation contains Flash animations, saving the template may cause a warning message to appear regarding personal information. Unless you add information to the properties of the Flash file itself, this warning does not apply to this presentation. Click OK on the message.]