SlideShare a Scribd company logo
1 of 6
Download to read offline
PARTNER
SPOTLIGHT
PAGE 02
NEWSLETTER 20 APRIL, 2022
DIGITAL RISK COST RECOVERY
RANSOM(A)WARE-NESS
TRENDING THREATS
PAGE 03
INSIDE INTIGROW TOPIC
PAGE 05
MANUAL VS AUTOMATED PEN
TESTING
info@intiGrow.com | www.intiGrow.com
DIGITAL
RISK COST
RECOVERY
SAVE MONEY ON YOUR
OVERALL SECURITY
POLICY AND CYBER
INSURANCE PREMIUM
What if you had the right data
that helped you identify the
costliest vulnerabilities within
your organization?
What if this cyber risk assessment
helped pave a clear path towards
maturity and minimizing risk?
The patented Thrivaca Risk Profile© brings the first
financially-literate value analysis of cyber risk at the
microeconomic level, enabling enterprise to
accomplish digital risk cost recovery; for insurance
and insuretech applications; and for advancement of
cybersecurity risk.
We have worked with NIST, Amerisource Bergen, US Air
Force, Nestle and many other category leading
companies. We are happy to perform a
complimentary Impact Valuation using Arx Nimbus'
platform to see if we could save you money on your
overall security policy and cyber insurance premium.
Our partnership with Arx Nimbus has yielded
results that bring financial understanding to all
members of the board and C-suite.
Business Relevant Cybersecurity
an interactive discussion
Stuart Richman, CTO at Arx Nimbus, and
Jim Skidmore, VP of Solutions Group at intiGrow
Perform an objective Cybersec Risk Assessment
Prioritize & budget plan overall security initiatives
Associate a dollar value to your risks
Discussion focused on how to:
info@intiGrow.com | www.intiGrow.com 02
Business Relevant
Cybersecurity
Thrivaca From Arx Nimbus
Data-Driven Risk Mgmt
T R E N D I N G T H R E A T S – A P R I L T O P I C
RANSOM(A)WARE-NESS
NOW, MORE THAN
EVER, IT RISK
CONCERNS HAVE
WOVEN
THEMSELVES INTO
BOARDROOM
CONVERSATIONS.
Are we prepared if we are hit with ransomware?
How much will our cybersecurity insurance plan cover?
Do we have the right products or services in place that
provide a multilevel security approach aligned with a zero
trust strategy?
You’ve heard it before, it isn’t will you get hit with a
ransomware attack, but when you will?
TRENDING THREATS
April Topic
info@intiGrow.com | www.intiGrow.com 03
As our work environments have shifted from office to remote,
the cyber threats have increased exponentially. According to
the Institute for Security and Technology, ransomware victims
paid out $350M in 2020 – a 311% increase over 2019.
With remote working continuing to remain a forefront for
organizations, employees are no longer confined within the
corporate networks’ perimeter. Ransomware gangs and
criminals are leveraging this vulnerability. With current foreign
relations, Russia is focused on leveraging cyber warfare if
anyone dares to interfere with their mission.
Secure internet routers with
unique passwords.
Firewalls that monitor
incoming traffic and keep out
threats.
Company devices with
additional security in place.
Increase visibility across the
enterprise.
Reduce time to breach
detection.
Reduce the complexity of your
security stack.
Avoid reputational damage
and significant financial
losses.
As a remote employee, here are
some measures you can
implement to minimize risks:
From a corporate perspective,
reducing your risks starts with
impactful conversations with the
boardroom and other key
stakeholders.
Have you had conversations
about zero trust? A zero trust
strategy contains these
benefits/outcomes:
We are happy to assist
you if you would like a
critical assessment of
your business
capabilities and a gap
analysis to plan out
your zero-trust journey.
Review of the existing topology or architecture
Prioritize initial areas for zero trust on-ramp
Develop target topology
Identity access management strategy
Privileged access management strategy
Password management strategy
Guidance on your organization's insurance renewal
At intiGrow, we pride ourselves in understanding your
organization’s specific challenges and working with key
stakeholders to implement a zero trust strategy that addresses
all your concerns and identifies the areas where your
organization needs to focus, including:
info@intiGrow.com | www.intiGrow.com 04
Inside IntiGrow Topic:
Manual vs Automated Pen Testing
While most companies are familiar with and conduct manual
pen tests, automated pen testing has become an option to
consider in recent years.
Let's explore the pros and cons of each.
How does automated pen
testing compare to manual?
Is one better than the other?
M A N U A L P E N T E S T I N G P R O S A N D C O N S
The top benefits of manual pen testing are that it offers flexibility and a higher likelihood of
discovering and mitigating vulnerabilities within the tested systems. Manual pen testing can find
cleverer vulnerabilities and attacks that automated tests may miss, such as blind SQL injection
attacks, logic flaws and access control vulnerabilities. A trained professional can examine the
responses of an application to such an attack in a manual pen test, potentially catching responses
that may appear legitimate to automated software but, in reality, are a problem.
Some pen tests can also only be performed manually. If a company wants to examine social
engineering preparedness, for example, manual pen testing is needed, especially when testing for
issues such as vishing. (voice phishing)
Manual pen testing can also enable more creativity when looking for flaws. A good penetration
tester will use their instincts and, based on the results, may opt to go into testing further in an
unexpected direction.
Another benefit of manual pen testing is having an expert on hand to review reports. While
automated pen testing tools also generate reports, security analysts still have to review and
remediate many of the issues detected.
The top cons of manual pen testing are cost and time. Depending on a pen test's thoroughness, it
could take weeks to get results, which isn't always ideal -- especially if major vulnerabilities exist.
Manual pen testing can also be expensive, which is why many companies do it only to fulfill
compliance and regulatory requirements. When companies can't afford an internal red team or pen
testing team, third-party service providers are normally used for testing needs -- another cost.
info@intiGrow.com | www.intiGrow.com 05
A U T O M A T E D P E N T E S T I N G P R O S A N D C O N S
Pen testing is complicated and expensive, so many companies
conduct tests infrequently. The benefits of less expensive and
easier access to testing via automation could change that.
Frequent automated pen testing also helps companies evaluate
their entire systems, which may get updated for example, during
rapid release cycles more often than testing occurs.
Another benefit of automated pen testing is it frees up security
analysts' time so they can focus their attention on other tasks
that may get put on hold during testing periods. Automation can
also handle repetitious tasks that aren't necessarily complicated
but are time-consuming for humans to complete. Analysts can
also now test cloud focused applications in run-time.
Another downside of automation is testing results depend on
how good the penetration tool itself is, as well as how
knowledgeable the person using it is. If the pen testing software
developer didn't do their job well, for example, then the
automated pen test is flawed and could miss critical issues.
Additionally, automated pen testing remains limited in function
and cannot be deployed for every testing scenario. Pen tests on
wireless networks, web apps and social engineering, for example,
aren't supported by most tools.
C O M B I N I N G M A N U A L A N D A U T O M A T E D P E N T E S T I N G
When it comes to choosing manual vs. automated pen
testing, it's often not a question of either/or. Rather,
automated pen testing tools should augment manual
pen testing efforts.
Another option automation has also enabled is
penetration testing as a service (PTaaS). Some
services are already available from vendors such as
NetSPI, Cobalt and Pentest People. PTaaS offerings
are a mix of manual and automated pen testing that
make it easier for companies to fulfill specific pen
testing needs, such as to satisfy compliance or
regulatory requirements.
info@intiGrow.com | www.intiGrow.com 06

More Related Content

Similar to intiGrow newsletter-april2022.pdf

Website Security Statistics Report 2013
Website Security Statistics Report 2013Website Security Statistics Report 2013
Website Security Statistics Report 2013Bee_Ware
 
Demand for Penetration Testing Services.docx
Demand for Penetration Testing Services.docxDemand for Penetration Testing Services.docx
Demand for Penetration Testing Services.docxAardwolf Security
 
Penetration testing services
Penetration testing servicesPenetration testing services
Penetration testing servicesAlisha Henderson
 
200606_NWC_Strategic Security
200606_NWC_Strategic Security200606_NWC_Strategic Security
200606_NWC_Strategic SecurityChad Korosec
 
Review on 3rd-party Cyber Risk Assessment and Scoring Tools
Review on 3rd-party Cyber Risk Assessment and Scoring ToolsReview on 3rd-party Cyber Risk Assessment and Scoring Tools
Review on 3rd-party Cyber Risk Assessment and Scoring ToolsNormShield
 
Asset Discovery in India – Redhunt Labs
Asset Discovery in India – Redhunt LabsAsset Discovery in India – Redhunt Labs
Asset Discovery in India – Redhunt LabsRedhuntLabs2
 
How to assess your Cybersecurity Vulnerability_.pdf
How to assess your Cybersecurity Vulnerability_.pdfHow to assess your Cybersecurity Vulnerability_.pdf
How to assess your Cybersecurity Vulnerability_.pdfMetaorange
 
How to assess your Cybersecurity Vulnerability_.pptx
How to assess your Cybersecurity Vulnerability_.pptxHow to assess your Cybersecurity Vulnerability_.pptx
How to assess your Cybersecurity Vulnerability_.pptxMetaorange
 
Fraud App Detection using Machine Learning
Fraud App Detection using Machine LearningFraud App Detection using Machine Learning
Fraud App Detection using Machine LearningIRJET Journal
 
Pen Testing Services.pptx
Pen Testing Services.pptxPen Testing Services.pptx
Pen Testing Services.pptxMaqwareCorp
 
Ten Top Tips on Keeping Your Business Secure
Ten Top Tips on Keeping Your Business SecureTen Top Tips on Keeping Your Business Secure
Ten Top Tips on Keeping Your Business SecureBurCom Consulting Ltd.
 
Ten top tips on keeping your business secure
Ten top tips on keeping your business secureTen top tips on keeping your business secure
Ten top tips on keeping your business secureBurCom Consulting Ltd.
 
mastering_web_testing_how_to_make_the_most_of_frameworks.pptx
mastering_web_testing_how_to_make_the_most_of_frameworks.pptxmastering_web_testing_how_to_make_the_most_of_frameworks.pptx
mastering_web_testing_how_to_make_the_most_of_frameworks.pptxsarah david
 
Building an AppSec Team Extended Cut
Building an AppSec Team Extended CutBuilding an AppSec Team Extended Cut
Building an AppSec Team Extended CutMike Spaulding
 
Mike Spaulding - Building an Application Security Program
Mike Spaulding - Building an Application Security ProgramMike Spaulding - Building an Application Security Program
Mike Spaulding - Building an Application Security Programcentralohioissa
 
Overcoming Challenges in Dynamic Application Security Testing (DAST)
Overcoming Challenges in Dynamic Application Security Testing (DAST)Overcoming Challenges in Dynamic Application Security Testing (DAST)
Overcoming Challenges in Dynamic Application Security Testing (DAST)Dev Software
 
Five Mistakes of Vulnerability Management
Five Mistakes of Vulnerability ManagementFive Mistakes of Vulnerability Management
Five Mistakes of Vulnerability ManagementAnton Chuvakin
 
COVID-19 free penetration tests by Pentest-Tools.com
COVID-19 free penetration tests by Pentest-Tools.comCOVID-19 free penetration tests by Pentest-Tools.com
COVID-19 free penetration tests by Pentest-Tools.comPentest-Tools.com
 
5 must haves - cloud confidence
5 must haves - cloud confidence5 must haves - cloud confidence
5 must haves - cloud confidenceSean Dickson
 

Similar to intiGrow newsletter-april2022.pdf (20)

Website Security Statistics Report 2013
Website Security Statistics Report 2013Website Security Statistics Report 2013
Website Security Statistics Report 2013
 
Demand for Penetration Testing Services.docx
Demand for Penetration Testing Services.docxDemand for Penetration Testing Services.docx
Demand for Penetration Testing Services.docx
 
Penetration testing services
Penetration testing servicesPenetration testing services
Penetration testing services
 
200606_NWC_Strategic Security
200606_NWC_Strategic Security200606_NWC_Strategic Security
200606_NWC_Strategic Security
 
Review on 3rd-party Cyber Risk Assessment and Scoring Tools
Review on 3rd-party Cyber Risk Assessment and Scoring ToolsReview on 3rd-party Cyber Risk Assessment and Scoring Tools
Review on 3rd-party Cyber Risk Assessment and Scoring Tools
 
Asset Discovery in India – Redhunt Labs
Asset Discovery in India – Redhunt LabsAsset Discovery in India – Redhunt Labs
Asset Discovery in India – Redhunt Labs
 
How to assess your Cybersecurity Vulnerability_.pdf
How to assess your Cybersecurity Vulnerability_.pdfHow to assess your Cybersecurity Vulnerability_.pdf
How to assess your Cybersecurity Vulnerability_.pdf
 
How to assess your Cybersecurity Vulnerability_.pptx
How to assess your Cybersecurity Vulnerability_.pptxHow to assess your Cybersecurity Vulnerability_.pptx
How to assess your Cybersecurity Vulnerability_.pptx
 
Fraud App Detection using Machine Learning
Fraud App Detection using Machine LearningFraud App Detection using Machine Learning
Fraud App Detection using Machine Learning
 
Pen Testing Services.pptx
Pen Testing Services.pptxPen Testing Services.pptx
Pen Testing Services.pptx
 
Ten Top Tips on Keeping Your Business Secure
Ten Top Tips on Keeping Your Business SecureTen Top Tips on Keeping Your Business Secure
Ten Top Tips on Keeping Your Business Secure
 
Ten top tips on keeping your business secure
Ten top tips on keeping your business secureTen top tips on keeping your business secure
Ten top tips on keeping your business secure
 
mastering_web_testing_how_to_make_the_most_of_frameworks.pptx
mastering_web_testing_how_to_make_the_most_of_frameworks.pptxmastering_web_testing_how_to_make_the_most_of_frameworks.pptx
mastering_web_testing_how_to_make_the_most_of_frameworks.pptx
 
Building an AppSec Team Extended Cut
Building an AppSec Team Extended CutBuilding an AppSec Team Extended Cut
Building an AppSec Team Extended Cut
 
Mike Spaulding - Building an Application Security Program
Mike Spaulding - Building an Application Security ProgramMike Spaulding - Building an Application Security Program
Mike Spaulding - Building an Application Security Program
 
Overcoming Challenges in Dynamic Application Security Testing (DAST)
Overcoming Challenges in Dynamic Application Security Testing (DAST)Overcoming Challenges in Dynamic Application Security Testing (DAST)
Overcoming Challenges in Dynamic Application Security Testing (DAST)
 
Five Mistakes of Vulnerability Management
Five Mistakes of Vulnerability ManagementFive Mistakes of Vulnerability Management
Five Mistakes of Vulnerability Management
 
COVID-19 free penetration tests by Pentest-Tools.com
COVID-19 free penetration tests by Pentest-Tools.comCOVID-19 free penetration tests by Pentest-Tools.com
COVID-19 free penetration tests by Pentest-Tools.com
 
5 must haves - cloud confidence
5 must haves - cloud confidence5 must haves - cloud confidence
5 must haves - cloud confidence
 
network-host-reconciliation
network-host-reconciliationnetwork-host-reconciliation
network-host-reconciliation
 

Recently uploaded

Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 

intiGrow newsletter-april2022.pdf

  • 1. PARTNER SPOTLIGHT PAGE 02 NEWSLETTER 20 APRIL, 2022 DIGITAL RISK COST RECOVERY RANSOM(A)WARE-NESS TRENDING THREATS PAGE 03 INSIDE INTIGROW TOPIC PAGE 05 MANUAL VS AUTOMATED PEN TESTING info@intiGrow.com | www.intiGrow.com
  • 2. DIGITAL RISK COST RECOVERY SAVE MONEY ON YOUR OVERALL SECURITY POLICY AND CYBER INSURANCE PREMIUM What if you had the right data that helped you identify the costliest vulnerabilities within your organization? What if this cyber risk assessment helped pave a clear path towards maturity and minimizing risk? The patented Thrivaca Risk Profile© brings the first financially-literate value analysis of cyber risk at the microeconomic level, enabling enterprise to accomplish digital risk cost recovery; for insurance and insuretech applications; and for advancement of cybersecurity risk. We have worked with NIST, Amerisource Bergen, US Air Force, Nestle and many other category leading companies. We are happy to perform a complimentary Impact Valuation using Arx Nimbus' platform to see if we could save you money on your overall security policy and cyber insurance premium. Our partnership with Arx Nimbus has yielded results that bring financial understanding to all members of the board and C-suite. Business Relevant Cybersecurity an interactive discussion Stuart Richman, CTO at Arx Nimbus, and Jim Skidmore, VP of Solutions Group at intiGrow Perform an objective Cybersec Risk Assessment Prioritize & budget plan overall security initiatives Associate a dollar value to your risks Discussion focused on how to: info@intiGrow.com | www.intiGrow.com 02 Business Relevant Cybersecurity Thrivaca From Arx Nimbus Data-Driven Risk Mgmt
  • 3. T R E N D I N G T H R E A T S – A P R I L T O P I C RANSOM(A)WARE-NESS NOW, MORE THAN EVER, IT RISK CONCERNS HAVE WOVEN THEMSELVES INTO BOARDROOM CONVERSATIONS. Are we prepared if we are hit with ransomware? How much will our cybersecurity insurance plan cover? Do we have the right products or services in place that provide a multilevel security approach aligned with a zero trust strategy? You’ve heard it before, it isn’t will you get hit with a ransomware attack, but when you will? TRENDING THREATS April Topic info@intiGrow.com | www.intiGrow.com 03
  • 4. As our work environments have shifted from office to remote, the cyber threats have increased exponentially. According to the Institute for Security and Technology, ransomware victims paid out $350M in 2020 – a 311% increase over 2019. With remote working continuing to remain a forefront for organizations, employees are no longer confined within the corporate networks’ perimeter. Ransomware gangs and criminals are leveraging this vulnerability. With current foreign relations, Russia is focused on leveraging cyber warfare if anyone dares to interfere with their mission. Secure internet routers with unique passwords. Firewalls that monitor incoming traffic and keep out threats. Company devices with additional security in place. Increase visibility across the enterprise. Reduce time to breach detection. Reduce the complexity of your security stack. Avoid reputational damage and significant financial losses. As a remote employee, here are some measures you can implement to minimize risks: From a corporate perspective, reducing your risks starts with impactful conversations with the boardroom and other key stakeholders. Have you had conversations about zero trust? A zero trust strategy contains these benefits/outcomes: We are happy to assist you if you would like a critical assessment of your business capabilities and a gap analysis to plan out your zero-trust journey. Review of the existing topology or architecture Prioritize initial areas for zero trust on-ramp Develop target topology Identity access management strategy Privileged access management strategy Password management strategy Guidance on your organization's insurance renewal At intiGrow, we pride ourselves in understanding your organization’s specific challenges and working with key stakeholders to implement a zero trust strategy that addresses all your concerns and identifies the areas where your organization needs to focus, including: info@intiGrow.com | www.intiGrow.com 04
  • 5. Inside IntiGrow Topic: Manual vs Automated Pen Testing While most companies are familiar with and conduct manual pen tests, automated pen testing has become an option to consider in recent years. Let's explore the pros and cons of each. How does automated pen testing compare to manual? Is one better than the other? M A N U A L P E N T E S T I N G P R O S A N D C O N S The top benefits of manual pen testing are that it offers flexibility and a higher likelihood of discovering and mitigating vulnerabilities within the tested systems. Manual pen testing can find cleverer vulnerabilities and attacks that automated tests may miss, such as blind SQL injection attacks, logic flaws and access control vulnerabilities. A trained professional can examine the responses of an application to such an attack in a manual pen test, potentially catching responses that may appear legitimate to automated software but, in reality, are a problem. Some pen tests can also only be performed manually. If a company wants to examine social engineering preparedness, for example, manual pen testing is needed, especially when testing for issues such as vishing. (voice phishing) Manual pen testing can also enable more creativity when looking for flaws. A good penetration tester will use their instincts and, based on the results, may opt to go into testing further in an unexpected direction. Another benefit of manual pen testing is having an expert on hand to review reports. While automated pen testing tools also generate reports, security analysts still have to review and remediate many of the issues detected. The top cons of manual pen testing are cost and time. Depending on a pen test's thoroughness, it could take weeks to get results, which isn't always ideal -- especially if major vulnerabilities exist. Manual pen testing can also be expensive, which is why many companies do it only to fulfill compliance and regulatory requirements. When companies can't afford an internal red team or pen testing team, third-party service providers are normally used for testing needs -- another cost. info@intiGrow.com | www.intiGrow.com 05
  • 6. A U T O M A T E D P E N T E S T I N G P R O S A N D C O N S Pen testing is complicated and expensive, so many companies conduct tests infrequently. The benefits of less expensive and easier access to testing via automation could change that. Frequent automated pen testing also helps companies evaluate their entire systems, which may get updated for example, during rapid release cycles more often than testing occurs. Another benefit of automated pen testing is it frees up security analysts' time so they can focus their attention on other tasks that may get put on hold during testing periods. Automation can also handle repetitious tasks that aren't necessarily complicated but are time-consuming for humans to complete. Analysts can also now test cloud focused applications in run-time. Another downside of automation is testing results depend on how good the penetration tool itself is, as well as how knowledgeable the person using it is. If the pen testing software developer didn't do their job well, for example, then the automated pen test is flawed and could miss critical issues. Additionally, automated pen testing remains limited in function and cannot be deployed for every testing scenario. Pen tests on wireless networks, web apps and social engineering, for example, aren't supported by most tools. C O M B I N I N G M A N U A L A N D A U T O M A T E D P E N T E S T I N G When it comes to choosing manual vs. automated pen testing, it's often not a question of either/or. Rather, automated pen testing tools should augment manual pen testing efforts. Another option automation has also enabled is penetration testing as a service (PTaaS). Some services are already available from vendors such as NetSPI, Cobalt and Pentest People. PTaaS offerings are a mix of manual and automated pen testing that make it easier for companies to fulfill specific pen testing needs, such as to satisfy compliance or regulatory requirements. info@intiGrow.com | www.intiGrow.com 06