SlideShare a Scribd company logo
1 of 20
CYBERSECURITY FOR C-LEVEL EXECUTIVES
July 13, 2022, 12:00PM – 1:00PM
Our Presenters
Kevin Rubin, CIO,
Stratosphere Networks
LinkedIn & Bio
Joel Bruckman, Partner,
Freeborn & Peters
LinkedIn & Bio
Jesse Miller, vCISO,
Ascend Technologies
LinkedIn & Bio
• Ransomware
• Business Email Compromises
• Fraudulent Wire Transfers
• Cryptominers a/k/a
Cryptojacking
• Trojans
• Remote Desktop Protocol
Intrusions
• DDoS attacks
• And More…
Cybersecurity Attack Vectors
3
Evolution of Attack Vectors
4
What are security professionals
seeing these days?
5
Illinois’ Data Breach Statute
6
Illinois’ data breach
statute is known as
the Personal
Information
Protection Act 815
ILCS 530
A Breach is defined as
“unauthorized acquisition
of computerized data that
compromises the security,
confidentiality, or integrity
of personal information
maintained by the data
collector.”
IL PIPA
7
Access v. Acquisition of
Data
• What is the difference?
• What legal Obligations may be
triggered?
IL’s Definition of Personal
Information
"Personal information" means either of the following:
(1) An individual's first name or first initial and last name in
combination with any one or more of the following data elements:
(A) Social Security number.
(B) Driver's license number or State identification card number.
(C) Account number or credit or debit card number, or an account
number or credit card number in combination with any required
security code, access code, or password that would permit access
to an individual's financial account.
(D) Medical information.
(E) Health insurance information.
(F) Unique biometric data.
(2) User name or email address, in combination with a password or
security question and answer that would permit access to an online
account.
Notification Obligations
Under PIPA
• Any data collector that owns or licenses personal
information concerning an Illinois resident shall
notify the resident at no charge that there has been a
breach of the security of the system data following
discovery or notification of the breach.
• The disclosure notification shall be made in the most
expedient time possible and without unreasonable
delay, consistent with any measures necessary to
determine the scope of the breach and restore the
reasonable integrity, security, and confidentiality of
the data system.
Attorney Specific
Obligations
• IL.S.Ct.R. 1.6
–(a) A lawyer shall not reveal information relating
to the representation of a client unless the client
gives informed consent, the disclosure is impliedly
authorized in order to carry out the
representation…
–(e) A lawyer shall make reasonable efforts to
prevent the inadvertent or unauthorized
disclosure of, or unauthorized access to,
information relating to the representation of a
client.
What can you do to
protect your org?
•Incident Response Plan
•Cyber Liability Insurance
•Safeguards
–Technical
–Administrative
–Physical
Incident Response Plans
• What is the purpose?
• What information should be included?
• Why is it important to have an IRP in place?
• How will an IRP assist you in responding to a
cybersecurity event?
• Who can prepare an IRP for you?
Cyber Liability Insurance
• Most malpractice policies will not cover a data security
incident, as an exclusion not related to rendering
professional services but rather the operation of a
business.
• Coverage needs to be adequate.
• Make sure that coverage includes ransomware
payments.
• Look for whether the insurer provides legal and forensic
panel vendors as well as 24/7 hotline to report
incidents.
• Consult with an insurance broker and inquire as to the
aggressiveness of the insurer in coverage of data
security incidents.
Technical Safeguards and Best
Practices
15
Technical Safeguards &
Practices
•Email Protection
•End-point Security
•Remote Connectivity
•External device protection
•Scanning systems and
network(s)
•Network segregation
•Active monitoring
Administrative Safeguards & Best
Practices
17
Administrative Safeguards &
Best Practices
•Training
•Policies & procedures
•Ensure compliance
•Data mapping
•Implementation of Incident
Response Plan
•Independent verification of
financial transactions
Questions or
Comments?
Contact Information
• Kevin Rubin
• Email: krubin@stratnet.com
• Tel: (847) 440-8622
• Joel Bruckman
• Email: jbruckman@freeborn.com
• Tel: (847) 997-3475
• Jesse Miller
• Email: JMiller@stratnet.com
• Tel: (763) 270-1821

More Related Content

Similar to example

Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...Chris Hails
 
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security ProsPrivacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security ProsNicholas Van Exan
 
- Social Engineering Unit- II Part- I.pdf
- Social Engineering Unit- II Part- I.pdf- Social Engineering Unit- II Part- I.pdf
- Social Engineering Unit- II Part- I.pdfRamya Nellutla
 
Siskinds | Incident Response Plan
Siskinds | Incident Response PlanSiskinds | Incident Response Plan
Siskinds | Incident Response PlanNext Dimension Inc.
 
Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...
Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...
Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...Shawn Tuma
 
New York Department of Financial Services Cybersecurity Regulations
New York Department of Financial Services Cybersecurity RegulationsNew York Department of Financial Services Cybersecurity Regulations
New York Department of Financial Services Cybersecurity RegulationsShawn Tuma
 
CYBER SECURITY FOR LAW FIRMS
CYBER SECURITY FOR LAW FIRMSCYBER SECURITY FOR LAW FIRMS
CYBER SECURITY FOR LAW FIRMSScott Suhy
 
Deconstructing Data Breach Cost
Deconstructing Data Breach CostDeconstructing Data Breach Cost
Deconstructing Data Breach CostResilient Systems
 
Next Dimension and Siskinds PIPEDA Legislation Updates as of November 1 2018
Next Dimension and Siskinds PIPEDA Legislation Updates as of November 1 2018Next Dimension and Siskinds PIPEDA Legislation Updates as of November 1 2018
Next Dimension and Siskinds PIPEDA Legislation Updates as of November 1 2018Next Dimension Inc.
 
Cloud Computing Legal for Pennsylvania Bar Association
Cloud Computing Legal for Pennsylvania Bar AssociationCloud Computing Legal for Pennsylvania Bar Association
Cloud Computing Legal for Pennsylvania Bar AssociationAmy Larrimore
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfCareerera
 
Do You Wannacry: Your Ethical and Legal Duties Regarding Cybersecurity & Privacy
Do You Wannacry: Your Ethical and Legal Duties Regarding Cybersecurity & PrivacyDo You Wannacry: Your Ethical and Legal Duties Regarding Cybersecurity & Privacy
Do You Wannacry: Your Ethical and Legal Duties Regarding Cybersecurity & PrivacyButlerRubin
 
Introduction to cyber security.pptx
Introduction to cyber security.pptxIntroduction to cyber security.pptx
Introduction to cyber security.pptxSharmaAnirudh2
 
Top 10 Cybersecurity Predictions for 2015
Top 10 Cybersecurity Predictions for 2015Top 10 Cybersecurity Predictions for 2015
Top 10 Cybersecurity Predictions for 2015Matthew Rosenquist
 
2011 hildebrandt institute cio forum data privacy and security presentation...
2011 hildebrandt institute cio forum   data privacy and security presentation...2011 hildebrandt institute cio forum   data privacy and security presentation...
2011 hildebrandt institute cio forum data privacy and security presentation...David Cunningham
 
Protecting Your Business From Cyber Risks
Protecting Your Business From Cyber RisksProtecting Your Business From Cyber Risks
Protecting Your Business From Cyber RisksThis account is closed
 
2014 ota databreach3
2014 ota databreach32014 ota databreach3
2014 ota databreach3Meg Weber
 

Similar to example (20)

Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...
 
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security ProsPrivacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
 
- Social Engineering Unit- II Part- I.pdf
- Social Engineering Unit- II Part- I.pdf- Social Engineering Unit- II Part- I.pdf
- Social Engineering Unit- II Part- I.pdf
 
Siskinds | Incident Response Plan
Siskinds | Incident Response PlanSiskinds | Incident Response Plan
Siskinds | Incident Response Plan
 
The Basics of Cyber Insurance
The Basics of Cyber InsuranceThe Basics of Cyber Insurance
The Basics of Cyber Insurance
 
Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...
Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...
Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...
 
New York Department of Financial Services Cybersecurity Regulations
New York Department of Financial Services Cybersecurity RegulationsNew York Department of Financial Services Cybersecurity Regulations
New York Department of Financial Services Cybersecurity Regulations
 
CYBER SECURITY FOR LAW FIRMS
CYBER SECURITY FOR LAW FIRMSCYBER SECURITY FOR LAW FIRMS
CYBER SECURITY FOR LAW FIRMS
 
Deconstructing Data Breach Cost
Deconstructing Data Breach CostDeconstructing Data Breach Cost
Deconstructing Data Breach Cost
 
Co3 rsc r5
Co3 rsc r5Co3 rsc r5
Co3 rsc r5
 
Next Dimension and Siskinds PIPEDA Legislation Updates as of November 1 2018
Next Dimension and Siskinds PIPEDA Legislation Updates as of November 1 2018Next Dimension and Siskinds PIPEDA Legislation Updates as of November 1 2018
Next Dimension and Siskinds PIPEDA Legislation Updates as of November 1 2018
 
Cloud Computing Legal for Pennsylvania Bar Association
Cloud Computing Legal for Pennsylvania Bar AssociationCloud Computing Legal for Pennsylvania Bar Association
Cloud Computing Legal for Pennsylvania Bar Association
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdf
 
Do You Wannacry: Your Ethical and Legal Duties Regarding Cybersecurity & Privacy
Do You Wannacry: Your Ethical and Legal Duties Regarding Cybersecurity & PrivacyDo You Wannacry: Your Ethical and Legal Duties Regarding Cybersecurity & Privacy
Do You Wannacry: Your Ethical and Legal Duties Regarding Cybersecurity & Privacy
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 
Introduction to cyber security.pptx
Introduction to cyber security.pptxIntroduction to cyber security.pptx
Introduction to cyber security.pptx
 
Top 10 Cybersecurity Predictions for 2015
Top 10 Cybersecurity Predictions for 2015Top 10 Cybersecurity Predictions for 2015
Top 10 Cybersecurity Predictions for 2015
 
2011 hildebrandt institute cio forum data privacy and security presentation...
2011 hildebrandt institute cio forum   data privacy and security presentation...2011 hildebrandt institute cio forum   data privacy and security presentation...
2011 hildebrandt institute cio forum data privacy and security presentation...
 
Protecting Your Business From Cyber Risks
Protecting Your Business From Cyber RisksProtecting Your Business From Cyber Risks
Protecting Your Business From Cyber Risks
 
2014 ota databreach3
2014 ota databreach32014 ota databreach3
2014 ota databreach3
 

Recently uploaded

FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756dollysharma2066
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Serviceritikaroy0888
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Neil Kimberley
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...amitlee9823
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒anilsa9823
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdfRenandantas16
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMRavindra Nath Shukla
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLSeo
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfPaul Menig
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...lizamodels9
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Delhi Call girls
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Roland Driesen
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageMatteo Carbone
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMANIlamathiKannappan
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Roland Driesen
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Lviv Startup Club
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...anilsa9823
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayNZSG
 

Recently uploaded (20)

FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Service
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSM
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdf
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMAN
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
 
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 

example

  • 1. CYBERSECURITY FOR C-LEVEL EXECUTIVES July 13, 2022, 12:00PM – 1:00PM
  • 2. Our Presenters Kevin Rubin, CIO, Stratosphere Networks LinkedIn & Bio Joel Bruckman, Partner, Freeborn & Peters LinkedIn & Bio Jesse Miller, vCISO, Ascend Technologies LinkedIn & Bio
  • 3. • Ransomware • Business Email Compromises • Fraudulent Wire Transfers • Cryptominers a/k/a Cryptojacking • Trojans • Remote Desktop Protocol Intrusions • DDoS attacks • And More… Cybersecurity Attack Vectors 3
  • 5. What are security professionals seeing these days? 5
  • 7. Illinois’ data breach statute is known as the Personal Information Protection Act 815 ILCS 530 A Breach is defined as “unauthorized acquisition of computerized data that compromises the security, confidentiality, or integrity of personal information maintained by the data collector.” IL PIPA 7
  • 8. Access v. Acquisition of Data • What is the difference? • What legal Obligations may be triggered?
  • 9. IL’s Definition of Personal Information "Personal information" means either of the following: (1) An individual's first name or first initial and last name in combination with any one or more of the following data elements: (A) Social Security number. (B) Driver's license number or State identification card number. (C) Account number or credit or debit card number, or an account number or credit card number in combination with any required security code, access code, or password that would permit access to an individual's financial account. (D) Medical information. (E) Health insurance information. (F) Unique biometric data. (2) User name or email address, in combination with a password or security question and answer that would permit access to an online account.
  • 10. Notification Obligations Under PIPA • Any data collector that owns or licenses personal information concerning an Illinois resident shall notify the resident at no charge that there has been a breach of the security of the system data following discovery or notification of the breach. • The disclosure notification shall be made in the most expedient time possible and without unreasonable delay, consistent with any measures necessary to determine the scope of the breach and restore the reasonable integrity, security, and confidentiality of the data system.
  • 11. Attorney Specific Obligations • IL.S.Ct.R. 1.6 –(a) A lawyer shall not reveal information relating to the representation of a client unless the client gives informed consent, the disclosure is impliedly authorized in order to carry out the representation… –(e) A lawyer shall make reasonable efforts to prevent the inadvertent or unauthorized disclosure of, or unauthorized access to, information relating to the representation of a client.
  • 12. What can you do to protect your org? •Incident Response Plan •Cyber Liability Insurance •Safeguards –Technical –Administrative –Physical
  • 13. Incident Response Plans • What is the purpose? • What information should be included? • Why is it important to have an IRP in place? • How will an IRP assist you in responding to a cybersecurity event? • Who can prepare an IRP for you?
  • 14. Cyber Liability Insurance • Most malpractice policies will not cover a data security incident, as an exclusion not related to rendering professional services but rather the operation of a business. • Coverage needs to be adequate. • Make sure that coverage includes ransomware payments. • Look for whether the insurer provides legal and forensic panel vendors as well as 24/7 hotline to report incidents. • Consult with an insurance broker and inquire as to the aggressiveness of the insurer in coverage of data security incidents.
  • 15. Technical Safeguards and Best Practices 15
  • 16. Technical Safeguards & Practices •Email Protection •End-point Security •Remote Connectivity •External device protection •Scanning systems and network(s) •Network segregation •Active monitoring
  • 17. Administrative Safeguards & Best Practices 17
  • 18. Administrative Safeguards & Best Practices •Training •Policies & procedures •Ensure compliance •Data mapping •Implementation of Incident Response Plan •Independent verification of financial transactions
  • 20. Contact Information • Kevin Rubin • Email: krubin@stratnet.com • Tel: (847) 440-8622 • Joel Bruckman • Email: jbruckman@freeborn.com • Tel: (847) 997-3475 • Jesse Miller • Email: JMiller@stratnet.com • Tel: (763) 270-1821

Editor's Notes

  1. In early 2018 the company saw a hole in the cybersecurity landscape where most products and services were geared and priced toward the enterprise but compelling solutions for the SMB market were lacking Stratosphere had long partnered with leading security firms such as Trustwave and Dell SecureWorks, but those solutions did not fit the needs we saw in our customer base So a decision was made to develop our own managed security services practice or MSSP The team spent the better part of 2018 and early 2019 selecting the tools and developing the services around a managed security offering In 2019 the business was launched and we began offering risk assessments to our existing customers and some external clients Those assessments produce a detailed risk score based on a combination of the NIST and CIS control frameworks as well as a cyber security roadmap tailored to each client Since launching in 2019, Stratosphere has onboarded several clients to the fully managed security platform and now manages over 1,000 endpoints on our platforms We have carried out over 50 Quarterly Risk Reviews and continue to refine our practice as we learn and grow
  2. Brand loyalty not what is used to be, clients more likely to make a change after a breach Clients will see value in your firm’s investment in cyber and view that as an investment in keeping their data secure One breach is all it takes, but money/tools alone not enough, need the expertise and processes behind it (InfoSec & SOC services)
  3. Brand loyalty not what is used to be, clients more likely to make a change after a breach Clients will see value in your firm’s investment in cyber and view that as an investment in keeping their data secure One breach is all it takes, but money/tools alone not enough, need the expertise and processes behind it (InfoSec & SOC services)
  4. Brand loyalty not what is used to be, clients more likely to make a change after a breach Clients will see value in your firm’s investment in cyber and view that as an investment in keeping their data secure One breach is all it takes, but money/tools alone not enough, need the expertise and processes behind it (InfoSec & SOC services)
  5. Brand loyalty not what is used to be, clients more likely to make a change after a breach Clients will see value in your firm’s investment in cyber and view that as an investment in keeping their data secure One breach is all it takes, but money/tools alone not enough, need the expertise and processes behind it (InfoSec & SOC services)
  6. From the initial security assessment, we get our baseline and then as we implement solutions based on your roadmap we continuously reevaluate your level of risk Previously main targets were healthcare – data stolen and sold; now any company is a target because all companies value their own data (ransomware) Not here to recommend one silver bullet solution – recommending a set of solutions AND services Reputation damage Halt operations Malware spreads E.G. Outlook contact breach
  7. The less obvious risks exist below the surface in the many GBs of log files and other data points generated each day on each PC, server, Office 365 account, etc. Our tools collect all of that data, run it through AI engines, and correlate different events and data points to more quickly identify indicators of compromise Bu tools alone, no matter how good, are not sufficient. Effective cyber security requires dedicated trained professionals utilizing proven processes to drive down cyber risk.
  8. The less obvious risks exist below the surface in the many GBs of log files and other data points generated each day on each PC, server, Office 365 account, etc. Our tools collect all of that data, run it through AI engines, and correlate different events and data points to more quickly identify indicators of compromise Bu tools alone, no matter how good, are not sufficient. Effective cyber security requires dedicated trained professionals utilizing proven processes to drive down cyber risk.
  9. The less obvious risks exist below the surface in the many GBs of log files and other data points generated each day on each PC, server, Office 365 account, etc. Our tools collect all of that data, run it through AI engines, and correlate different events and data points to more quickly identify indicators of compromise Bu tools alone, no matter how good, are not sufficient. Effective cyber security requires dedicated trained professionals utilizing proven processes to drive down cyber risk.
  10. The less obvious risks exist below the surface in the many GBs of log files and other data points generated each day on each PC, server, Office 365 account, etc. Our tools collect all of that data, run it through AI engines, and correlate different events and data points to more quickly identify indicators of compromise Bu tools alone, no matter how good, are not sufficient. Effective cyber security requires dedicated trained professionals utilizing proven processes to drive down cyber risk.
  11. The less obvious risks exist below the surface in the many GBs of log files and other data points generated each day on each PC, server, Office 365 account, etc. Our tools collect all of that data, run it through AI engines, and correlate different events and data points to more quickly identify indicators of compromise Bu tools alone, no matter how good, are not sufficient. Effective cyber security requires dedicated trained professionals utilizing proven processes to drive down cyber risk.
  12. The less obvious risks exist below the surface in the many GBs of log files and other data points generated each day on each PC, server, Office 365 account, etc. Our tools collect all of that data, run it through AI engines, and correlate different events and data points to more quickly identify indicators of compromise Bu tools alone, no matter how good, are not sufficient. Effective cyber security requires dedicated trained professionals utilizing proven processes to drive down cyber risk.
  13. The less obvious risks exist below the surface in the many GBs of log files and other data points generated each day on each PC, server, Office 365 account, etc. Our tools collect all of that data, run it through AI engines, and correlate different events and data points to more quickly identify indicators of compromise Bu tools alone, no matter how good, are not sufficient. Effective cyber security requires dedicated trained professionals utilizing proven processes to drive down cyber risk.
  14. Brand loyalty not what is used to be, clients more likely to make a change after a breach Clients will see value in your firm’s investment in cyber and view that as an investment in keeping their data secure One breach is all it takes, but money/tools alone not enough, need the expertise and processes behind it (InfoSec & SOC services)
  15. The less obvious risks exist below the surface in the many GBs of log files and other data points generated each day on each PC, server, Office 365 account, etc. Our tools collect all of that data, run it through AI engines, and correlate different events and data points to more quickly identify indicators of compromise Bu tools alone, no matter how good, are not sufficient. Effective cyber security requires dedicated trained professionals utilizing proven processes to drive down cyber risk.
  16. Brand loyalty not what is used to be, clients more likely to make a change after a breach Clients will see value in your firm’s investment in cyber and view that as an investment in keeping their data secure One breach is all it takes, but money/tools alone not enough, need the expertise and processes behind it (InfoSec & SOC services)
  17. The less obvious risks exist below the surface in the many GBs of log files and other data points generated each day on each PC, server, Office 365 account, etc. Our tools collect all of that data, run it through AI engines, and correlate different events and data points to more quickly identify indicators of compromise Bu tools alone, no matter how good, are not sufficient. Effective cyber security requires dedicated trained professionals utilizing proven processes to drive down cyber risk.