SlideShare a Scribd company logo
1 of 38
1
Cybersecurity Health Checks:
Safeguarding Your Organisation
Dr. Malcolm Shore
2
Quick Facts about Lynda.com
Government
ā€¢ Major government agencies
ā€¢ Branches of military
Corporations
ā€¢ More than half of the Fortune 50 across
all key industry sectors
Education
ā€¢ 60% of all US colleges and universities
40% of Australian universities
4M+
Members
ā€¦with 350k paying
out of pocket
20
Years
Lynda.com was founded
in 1995
12,000+
Enterprise Clients
ā€¦located across
52 countries
6,000+
Courses
ā€¦available in
5 languages (German, Spanish,
French, Japanese)
The Global Leader in Online Skills Instruction
INTRODUCTION
3
Dr. Malcolm Shore
Lynda.com author
Technical Director,
BAE Systems Applied Intelligence,
Australia
INTRODUCTION
4
ā€¢ 1983 - US DoD rainbow series
ā€¢ 1993 ā€“ UK PD0003
ā€¢ 1998 ā€“ BS 7799ā€¦ā€¦ISO 27000
ā€¢ 2005 ā€“ NIST Special Publication 800-53
ā€¢ ā€¦ but too difficult and costly
Information Security Standards
BACKGROUND
Cybersecurity Health Checks
5
ā€¢ From Bulletin Boards to the Web
ā€¢ Ubiquitous connectivity across the globe
ā€¢ Clouds arenā€™t just in the skyā€¦
ā€¢ From email to social mediaā€¦
ā€¢ From telephone to smartphone
ā€¢ Cyber kill chain ā€¦ the world has changed
Information Security Standards
BACKGROUND
Cybersecurity Health Checks
6
ā€¢ Evolution of information security standards lagging
ā€¢ Information security policies ineffective*
New Approach
BACKGROUND
Cybersecurity Health Checks
*Doherty, NF and Fulford H. Do Information Security Policies Reduce the Incidence of Security Breaches? 2005
7
ā€¢ UK Cybersecurity Strategy
ā€¢ Cyber Governance Health Check
ā€¢ top 350 listed companies
ā€¢ only15% of Boards manage cyber risk
ā€¢ only 30% use threat intelligence
ā€¢ Majority of attacks exploit basic weaknesses
Information Security Policies
BACKGROUND
Cybersecurity Health Checks
8
ā€¢ Term used in audit community
ā€¢ Now used in cybersecurity consulting
ā€¢ Various interpretations
ā€¦ is simply cyber fitness
Cybersecurity Health Check
DEFINITION
Cybersecurity Health Checks
9
ā€¢ Check-up ā€“ unauthorised users, malware
ā€¢ Health test - check network traffic for infections
ā€¢ Full examination - rules, patches, access and privileges
- operational defences
ā€¢ Fitness test - external penetration exercise
ā€¢ Cyber insurance
Cybersecurity Health Check
DEFINITION
Cybersecurity Health Checks
10
ā€¢ Baseline security
ā€¢ Operational focus
ā€¢ Affordable, manageable
Cyber Essentials
CYBER ESSENTIALS
Cybersecurity Health Checks
11
CYBER ESSENTIALS
Cybersecurity Health Checks
12
ā€¢ Prevents low grade technical attacks on
ā€¢ desktop PCs, laptops
ā€¢ tablets, smartphones
ā€¢ email
ā€¢ web applications
Cyber Essentials
CYBER ESSENTIALS
Cybersecurity Health Checks
13
ā€¢ Boundary devices
ā€¢ Secure configuration
ā€¢ User access control
ā€¢ Malware protection
ā€¢ Patch management
Cyber Essentials
CYBER ESSENTIALS
Cybersecurity Health Checks
14
Boundary Firewalls and Internet Gateways
CYBER ESSENTIALS
Cybersecurity health Checks
15
ā€¢ administrative password must be changed
ā€¢ documented and authorised rules
ā€¢ obsolete rules removed
ā€¢ unnecessary services blocked
ā€¢ administrative interface accessible only internally
Boundary Firewalls and Internet Gateways
CYBER ESSENTIALS
Cybersecurity health Checks
16
Secure Configuration
CYBER ESSENTIALS
Cybersecurity health Checks
17
ā€¢ Issues:
ā€¢ easy to install
ā€¢ no security configured
ā€¢ default administrator accounts and
passwords
Secure Configuration
CYBER ESSENTIALS
Cybersecurity health Checks
18
Secure Configuration
CYBER ESSENTIALS
Cybersecurity health Checks
ā€¢ remove unnecessary default accounts
ā€¢ change default passwords
ā€¢ remove or disable unnecessary applications and services
ā€¢ install personal firewalls on all PCs
19 Cybersecurity Health Checks
20 Cybersecurity Health Checks
21
ā€¢ Issues:
ā€¢ legacy access
ā€¢ excess privileges
User Access Control
CYBER ESSENTIALS
Cybersecurity health Checks
22
User Access Control
CYBER ESSENTIALS
Cybersecurity health Checks
ā€¢ minimum privileges
ā€¢ userid and strong passwords
ā€¢ ensure privileged accounts are not used for internet activity
ā€¢ disable or remove accounts when no longer required
23
User Access Control
CYBER ESSENTIALS
Cybersecurity health Checks
24
ā€¢ Install anti-virus software
ā€¢ up to date signatures
ā€¢ Use real-time protection
ā€¢ Scan the filebase
ā€¢ Blacklisting known malicious sites
Malware Protection
CYBER ESSENTIALS
Cybersecurity Health Checks
25
ā€¢ Flaws found by developers, researchers, hackers
ā€¢ Often exploited within 24 hours
ā€¢ Timely patching
ā€¢ Licenced software
Patching
CYBER ESSENTIALS
Cybersecurity Health Checks
26
ā€¢ Good routine check-up and examination
ā€¢ Does not propose a full cyber fitness test
Cyber Essentials ā€“ Health Check?
CYBER ESSENTIALS
Cybersecurity Health Checks
27
ā€¢ Published March 2015
ā€¢ Improve cyber resilience
ā€¢ Cyber defence posture
ā€¢ Incident management
ASIC Report 429
ASIC REPORT 429
Cybersecurity Health Checks
28
ā€¢ Adopted in ASIC Report 429
ā€¢ 26 prompts
ā€¢ 2 governance
ā€¢ 24 across the five Framework areas
US Cybersecurity Framework
ASIC REPORT 429
Cybersecurity Health Checks
29
ā€¢ Board and Executive awareness of cyber risk
ā€¢ Assessment against the Cybersecurity Framework
Governance
ASIC REPORT 429
Cybersecurity Health Checks
30
ā€¢ What are the essential information and assets?
ā€¢ What are the cyber risks?
ā€¢ Are third party risks considered?
ā€¢ Does enterprise risk management include cyber risks?
ā€¢ Are staff aware of cyber risks?
Identify
ASIC REPORT 429
Cybersecurity Health Checks
31
ā€¢ Are security policies and standards up to date?
ā€¢ Have IT systems and processes been tested?
ā€¢ Are there sufficient resources in place?
Protect
ASIC REPORT 429
Cybersecurity Health Checks
32
ā€¢ Monitoring for cyber attacks
ā€¢ External engagement
Detect
ASIC REPORT 429
Cybersecurity Health Checks
33
ā€¢ Is response planning adequate?
ā€¢ Notifying law enforcement of an attack
ā€¢ Notifying customers of a breach
Respond
ASIC REPORT 429
Cybersecurity Health Checks
34
ā€¢ Does the organisation have a recovery plan?
Recover
ASIC REPORT 429
Cybersecurity Health Checks
35
ā€¢ Full set of controls
ā€¢ Cyber health checks lost in the noise
ā€¢ A through life fitness programme
ASIC Report 429 ā€“ Cyber Health Check?
ASIC REPORT 429
Cybersecurity Health Checks
36
ā€¢ Security standards are evolving
ā€¢ Traditional approach is having limited success
ā€¢ Cyber health checks are a more manageable approach
ā€¢ Cyber Essentials provides a health check
Conclusion
CONCLUSION
Cybersecurity Health Checks
37
Resources
CONCLUSION
Cybersecurity Health Checks
38
Q&A
CONCLUSION
Cybersecurity Health Checks

More Related Content

What's hot

All you wanted to know about iso 27000
All you wanted to know about iso 27000All you wanted to know about iso 27000
All you wanted to know about iso 27000Ramana K V
Ā 
Securing Industrial Control Systems
Securing Industrial Control SystemsSecuring Industrial Control Systems
Securing Industrial Control SystemsEric Andresen
Ā 
ISO 27001 Training | ISO 27001 Internal Auditor Training | ISMS Internal Audi...
ISO 27001 Training | ISO 27001 Internal Auditor Training | ISMS Internal Audi...ISO 27001 Training | ISO 27001 Internal Auditor Training | ISMS Internal Audi...
ISO 27001 Training | ISO 27001 Internal Auditor Training | ISMS Internal Audi...himalya sharma
Ā 
Nist 800 82
Nist 800 82Nist 800 82
Nist 800 82majolic
Ā 
ISO 27001 - IMPLEMENTATION CONSULTING
ISO 27001 - IMPLEMENTATION CONSULTINGISO 27001 - IMPLEMENTATION CONSULTING
ISO 27001 - IMPLEMENTATION CONSULTINGArul Nambi
Ā 
Industrial Control Security USA Sacramento California Oct 13/14
Industrial Control Security USA Sacramento California Oct 13/14Industrial Control Security USA Sacramento California Oct 13/14
Industrial Control Security USA Sacramento California Oct 13/14James Nesbitt
Ā 
Get iso 27000 certification in 7 steps
Get iso 27000 certification in 7 stepsGet iso 27000 certification in 7 steps
Get iso 27000 certification in 7 stepsBen Pournader
Ā 
7 Key Problems to Avoid in ISO 27001 Implementation
7 Key Problems to Avoid in ISO 27001 Implementation7 Key Problems to Avoid in ISO 27001 Implementation
7 Key Problems to Avoid in ISO 27001 ImplementationPECB
Ā 
we45 ISO-27001 Case Study
we45 ISO-27001 Case Studywe45 ISO-27001 Case Study
we45 ISO-27001 Case Studywe45
Ā 
Deep secure holistic protection for ICS
Deep secure holistic protection for ICSDeep secure holistic protection for ICS
Deep secure holistic protection for ICSjohnsdeepsecure
Ā 
ISO 27001 Training | ISO 27001 Implementation
ISO 27001 Training | ISO 27001 ImplementationISO 27001 Training | ISO 27001 Implementation
ISO 27001 Training | ISO 27001 Implementationhimalya sharma
Ā 
Iso27001 Isaca Seminar (23 May 08)
Iso27001  Isaca Seminar (23 May 08)Iso27001  Isaca Seminar (23 May 08)
Iso27001 Isaca Seminar (23 May 08)samsontamwaiho
Ā 
It security iso 27001
It security iso 27001It security iso 27001
It security iso 27001Iris MaaƟ
Ā 
Basic introduction to iso27001
Basic introduction to iso27001Basic introduction to iso27001
Basic introduction to iso27001Imran Ahmed
Ā 
ISO 27001 Awareness IGN Mantra 2nd Day, 2nd Session.
ISO 27001 Awareness IGN Mantra 2nd Day, 2nd Session.ISO 27001 Awareness IGN Mantra 2nd Day, 2nd Session.
ISO 27001 Awareness IGN Mantra 2nd Day, 2nd Session.IGN MANTRA
Ā 
CMMC, ISO/IEC 27001, ISO/IEC 27032, and NIST ā€“ What You Need to Know
CMMC, ISO/IEC 27001, ISO/IEC 27032, and NIST ā€“ What You Need to KnowCMMC, ISO/IEC 27001, ISO/IEC 27032, and NIST ā€“ What You Need to Know
CMMC, ISO/IEC 27001, ISO/IEC 27032, and NIST ā€“ What You Need to KnowPECB
Ā 
ISO/IEC 27001 as a Starting Point for GRC
ISO/IEC 27001 as a Starting Point for GRCISO/IEC 27001 as a Starting Point for GRC
ISO/IEC 27001 as a Starting Point for GRCPECB
Ā 
ISO 27001 - three years of lessons learned
ISO 27001 - three years of lessons learnedISO 27001 - three years of lessons learned
ISO 27001 - three years of lessons learnedJisc
Ā 

What's hot (20)

All you wanted to know about iso 27000
All you wanted to know about iso 27000All you wanted to know about iso 27000
All you wanted to know about iso 27000
Ā 
Securing Industrial Control Systems
Securing Industrial Control SystemsSecuring Industrial Control Systems
Securing Industrial Control Systems
Ā 
ISO 27001 - Information Security Management System
ISO 27001 - Information Security Management SystemISO 27001 - Information Security Management System
ISO 27001 - Information Security Management System
Ā 
ISO 27001 Training | ISO 27001 Internal Auditor Training | ISMS Internal Audi...
ISO 27001 Training | ISO 27001 Internal Auditor Training | ISMS Internal Audi...ISO 27001 Training | ISO 27001 Internal Auditor Training | ISMS Internal Audi...
ISO 27001 Training | ISO 27001 Internal Auditor Training | ISMS Internal Audi...
Ā 
Nist 800 82
Nist 800 82Nist 800 82
Nist 800 82
Ā 
ISO 27001 - IMPLEMENTATION CONSULTING
ISO 27001 - IMPLEMENTATION CONSULTINGISO 27001 - IMPLEMENTATION CONSULTING
ISO 27001 - IMPLEMENTATION CONSULTING
Ā 
Industrial Control Security USA Sacramento California Oct 13/14
Industrial Control Security USA Sacramento California Oct 13/14Industrial Control Security USA Sacramento California Oct 13/14
Industrial Control Security USA Sacramento California Oct 13/14
Ā 
Get iso 27000 certification in 7 steps
Get iso 27000 certification in 7 stepsGet iso 27000 certification in 7 steps
Get iso 27000 certification in 7 steps
Ā 
27001 awareness Training
27001 awareness Training27001 awareness Training
27001 awareness Training
Ā 
7 Key Problems to Avoid in ISO 27001 Implementation
7 Key Problems to Avoid in ISO 27001 Implementation7 Key Problems to Avoid in ISO 27001 Implementation
7 Key Problems to Avoid in ISO 27001 Implementation
Ā 
we45 ISO-27001 Case Study
we45 ISO-27001 Case Studywe45 ISO-27001 Case Study
we45 ISO-27001 Case Study
Ā 
Deep secure holistic protection for ICS
Deep secure holistic protection for ICSDeep secure holistic protection for ICS
Deep secure holistic protection for ICS
Ā 
ISO 27001 Training | ISO 27001 Implementation
ISO 27001 Training | ISO 27001 ImplementationISO 27001 Training | ISO 27001 Implementation
ISO 27001 Training | ISO 27001 Implementation
Ā 
Iso27001 Isaca Seminar (23 May 08)
Iso27001  Isaca Seminar (23 May 08)Iso27001  Isaca Seminar (23 May 08)
Iso27001 Isaca Seminar (23 May 08)
Ā 
It security iso 27001
It security iso 27001It security iso 27001
It security iso 27001
Ā 
Basic introduction to iso27001
Basic introduction to iso27001Basic introduction to iso27001
Basic introduction to iso27001
Ā 
ISO 27001 Awareness IGN Mantra 2nd Day, 2nd Session.
ISO 27001 Awareness IGN Mantra 2nd Day, 2nd Session.ISO 27001 Awareness IGN Mantra 2nd Day, 2nd Session.
ISO 27001 Awareness IGN Mantra 2nd Day, 2nd Session.
Ā 
CMMC, ISO/IEC 27001, ISO/IEC 27032, and NIST ā€“ What You Need to Know
CMMC, ISO/IEC 27001, ISO/IEC 27032, and NIST ā€“ What You Need to KnowCMMC, ISO/IEC 27001, ISO/IEC 27032, and NIST ā€“ What You Need to Know
CMMC, ISO/IEC 27001, ISO/IEC 27032, and NIST ā€“ What You Need to Know
Ā 
ISO/IEC 27001 as a Starting Point for GRC
ISO/IEC 27001 as a Starting Point for GRCISO/IEC 27001 as a Starting Point for GRC
ISO/IEC 27001 as a Starting Point for GRC
Ā 
ISO 27001 - three years of lessons learned
ISO 27001 - three years of lessons learnedISO 27001 - three years of lessons learned
ISO 27001 - three years of lessons learned
Ā 

Viewers also liked

3 Ways Online Learning Boosts Employee Engagement
3 Ways Online Learning Boosts Employee Engagement3 Ways Online Learning Boosts Employee Engagement
3 Ways Online Learning Boosts Employee EngagementLinkedIn Learning Solutions
Ā 
Case Study: Rebuilding an Admissions Web Presence
Case Study: Rebuilding an Admissions Web PresenceCase Study: Rebuilding an Admissions Web Presence
Case Study: Rebuilding an Admissions Web PresenceDave Olsen
Ā 
How to Use Photography for Great Presentations
How to Use Photography for Great PresentationsHow to Use Photography for Great Presentations
How to Use Photography for Great PresentationsLinkedIn Learning Solutions
Ā 
3 Things Every Sales Team Needs to Be Thinking About in 2017
3 Things Every Sales Team Needs to Be Thinking About in 20173 Things Every Sales Team Needs to Be Thinking About in 2017
3 Things Every Sales Team Needs to Be Thinking About in 2017Drift
Ā 
Apple SSL Vulnerability Explained
Apple SSL Vulnerability ExplainedApple SSL Vulnerability Explained
Apple SSL Vulnerability ExplainedMike Chapple
Ā 
Libraries and Privacy: PechaKucha Seattle: Watch Me Now, Notes on a Surveilla...
Libraries and Privacy: PechaKucha Seattle: Watch Me Now, Notes on a Surveilla...Libraries and Privacy: PechaKucha Seattle: Watch Me Now, Notes on a Surveilla...
Libraries and Privacy: PechaKucha Seattle: Watch Me Now, Notes on a Surveilla...Jim Loter
Ā 
Openness in HE: Choosing our paths
Openness in HE: Choosing our pathsOpenness in HE: Choosing our paths
Openness in HE: Choosing our pathsCatherine Cronin
Ā 
Dynamics Of Gdp
Dynamics  Of GdpDynamics  Of Gdp
Dynamics Of GdpRahul Mahawer
Ā 
#SXSWedu Quotes: Creating Opportunities
#SXSWedu Quotes: Creating Opportunities#SXSWedu Quotes: Creating Opportunities
#SXSWedu Quotes: Creating OpportunitiesHaiku Deck
Ā 
The 'Knowledge Turn' in the UK National Curriculum
The 'Knowledge Turn' in the UK National CurriculumThe 'Knowledge Turn' in the UK National Curriculum
The 'Knowledge Turn' in the UK National CurriculumMr Cornish
Ā 
ImobSync - Seja um executivo - Maio 2014
ImobSync - Seja um executivo - Maio 2014ImobSync - Seja um executivo - Maio 2014
ImobSync - Seja um executivo - Maio 2014Victor Imobsync
Ā 
RSA: CSA GRC Stack Update for the CSA Atlanta Chapter
RSA: CSA GRC Stack Update for the CSA Atlanta ChapterRSA: CSA GRC Stack Update for the CSA Atlanta Chapter
RSA: CSA GRC Stack Update for the CSA Atlanta ChapterPhil Agcaoili
Ā 
Return of Video eLearning as DIY (Do It Yourself)
Return of Video eLearning as DIY (Do It Yourself)Return of Video eLearning as DIY (Do It Yourself)
Return of Video eLearning as DIY (Do It Yourself)Upside Learning Solutions
Ā 
Collateral damage in cyberwarfare
Collateral damage in cyberwarfareCollateral damage in cyberwarfare
Collateral damage in cyberwarfareMike Chapple
Ā 
Top 13 Qualities of an Ideal Instructional Designer
Top 13 Qualities of an Ideal Instructional DesignerTop 13 Qualities of an Ideal Instructional Designer
Top 13 Qualities of an Ideal Instructional DesignerUpside Learning Solutions
Ā 
Venezuela Technology Integration 2015
Venezuela Technology Integration 2015Venezuela Technology Integration 2015
Venezuela Technology Integration 2015Shelly Sanchez Terrell
Ā 
The Other Advanced Attacks: DNS/NTP Amplification and Careto
The Other Advanced Attacks: DNS/NTP Amplification and CaretoThe Other Advanced Attacks: DNS/NTP Amplification and Careto
The Other Advanced Attacks: DNS/NTP Amplification and CaretoMike Chapple
Ā 
Pedagogy and School Leadership
Pedagogy  and School LeadershipPedagogy  and School Leadership
Pedagogy and School LeadershipJudy O'Connell
Ā 

Viewers also liked (20)

3 Ways Online Learning Boosts Employee Engagement
3 Ways Online Learning Boosts Employee Engagement3 Ways Online Learning Boosts Employee Engagement
3 Ways Online Learning Boosts Employee Engagement
Ā 
Case Study: Rebuilding an Admissions Web Presence
Case Study: Rebuilding an Admissions Web PresenceCase Study: Rebuilding an Admissions Web Presence
Case Study: Rebuilding an Admissions Web Presence
Ā 
Develop Better People Managers
Develop Better People ManagersDevelop Better People Managers
Develop Better People Managers
Ā 
How to Use Photography for Great Presentations
How to Use Photography for Great PresentationsHow to Use Photography for Great Presentations
How to Use Photography for Great Presentations
Ā 
3 Things Every Sales Team Needs to Be Thinking About in 2017
3 Things Every Sales Team Needs to Be Thinking About in 20173 Things Every Sales Team Needs to Be Thinking About in 2017
3 Things Every Sales Team Needs to Be Thinking About in 2017
Ā 
Apple SSL Vulnerability Explained
Apple SSL Vulnerability ExplainedApple SSL Vulnerability Explained
Apple SSL Vulnerability Explained
Ā 
Libraries and Privacy: PechaKucha Seattle: Watch Me Now, Notes on a Surveilla...
Libraries and Privacy: PechaKucha Seattle: Watch Me Now, Notes on a Surveilla...Libraries and Privacy: PechaKucha Seattle: Watch Me Now, Notes on a Surveilla...
Libraries and Privacy: PechaKucha Seattle: Watch Me Now, Notes on a Surveilla...
Ā 
Openness in HE: Choosing our paths
Openness in HE: Choosing our pathsOpenness in HE: Choosing our paths
Openness in HE: Choosing our paths
Ā 
Dynamics Of Gdp
Dynamics  Of GdpDynamics  Of Gdp
Dynamics Of Gdp
Ā 
#SXSWedu Quotes: Creating Opportunities
#SXSWedu Quotes: Creating Opportunities#SXSWedu Quotes: Creating Opportunities
#SXSWedu Quotes: Creating Opportunities
Ā 
The 'Knowledge Turn' in the UK National Curriculum
The 'Knowledge Turn' in the UK National CurriculumThe 'Knowledge Turn' in the UK National Curriculum
The 'Knowledge Turn' in the UK National Curriculum
Ā 
ImobSync - Seja um executivo - Maio 2014
ImobSync - Seja um executivo - Maio 2014ImobSync - Seja um executivo - Maio 2014
ImobSync - Seja um executivo - Maio 2014
Ā 
RSA: CSA GRC Stack Update for the CSA Atlanta Chapter
RSA: CSA GRC Stack Update for the CSA Atlanta ChapterRSA: CSA GRC Stack Update for the CSA Atlanta Chapter
RSA: CSA GRC Stack Update for the CSA Atlanta Chapter
Ā 
Return of Video eLearning as DIY (Do It Yourself)
Return of Video eLearning as DIY (Do It Yourself)Return of Video eLearning as DIY (Do It Yourself)
Return of Video eLearning as DIY (Do It Yourself)
Ā 
Collateral damage in cyberwarfare
Collateral damage in cyberwarfareCollateral damage in cyberwarfare
Collateral damage in cyberwarfare
Ā 
Top 13 Qualities of an Ideal Instructional Designer
Top 13 Qualities of an Ideal Instructional DesignerTop 13 Qualities of an Ideal Instructional Designer
Top 13 Qualities of an Ideal Instructional Designer
Ā 
Venezuela Technology Integration 2015
Venezuela Technology Integration 2015Venezuela Technology Integration 2015
Venezuela Technology Integration 2015
Ā 
The Other Advanced Attacks: DNS/NTP Amplification and Careto
The Other Advanced Attacks: DNS/NTP Amplification and CaretoThe Other Advanced Attacks: DNS/NTP Amplification and Careto
The Other Advanced Attacks: DNS/NTP Amplification and Careto
Ā 
MOOCs: still a viable business model?
MOOCs: still a viable business model?MOOCs: still a viable business model?
MOOCs: still a viable business model?
Ā 
Pedagogy and School Leadership
Pedagogy  and School LeadershipPedagogy  and School Leadership
Pedagogy and School Leadership
Ā 

Similar to Cybersecurity Health Checks: An SEO-Optimized Approach

The 5 ws of Cyber Security
The 5 ws of Cyber SecurityThe 5 ws of Cyber Security
The 5 ws of Cyber SecurityMisha Hanin
Ā 
Colorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptx
Colorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptxColorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptx
Colorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptxAkramAlqadasi1
Ā 
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #2
SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #2SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #2
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #2Lisa Niles
Ā 
What is the UK Cyber Essentials scheme?
What is the  UK Cyber Essentials scheme?What is the  UK Cyber Essentials scheme?
What is the UK Cyber Essentials scheme?IT Governance Ltd
Ā 
Starting your Career in Information Security
Starting your Career in Information SecurityStarting your Career in Information Security
Starting your Career in Information SecurityAhmed Sayed-
Ā 
Himss 2011 securing health information in the cloud -- feisal nanji
Himss 2011    securing health information in the cloud -- feisal nanjiHimss 2011    securing health information in the cloud -- feisal nanji
Himss 2011 securing health information in the cloud -- feisal nanjiFeisal Nanji
Ā 
20CS024 Ethics in Information Technology
20CS024 Ethics in Information Technology20CS024 Ethics in Information Technology
20CS024 Ethics in Information TechnologyKathirvel Ayyaswamy
Ā 
5 Things Your Security Administrator Should Tell You
5 Things Your Security Administrator Should Tell You5 Things Your Security Administrator Should Tell You
5 Things Your Security Administrator Should Tell YouHelpSystems
Ā 
Cybersecurity Assurance at CloudSec 2015 Kuala Lumpur
Cybersecurity Assurance  at CloudSec 2015 Kuala LumpurCybersecurity Assurance  at CloudSec 2015 Kuala Lumpur
Cybersecurity Assurance at CloudSec 2015 Kuala LumpurAlan Yau Ti Dun
Ā 
Accelerating Regulatory Compliance for IBM i Systems
Accelerating Regulatory Compliance for IBM i SystemsAccelerating Regulatory Compliance for IBM i Systems
Accelerating Regulatory Compliance for IBM i SystemsPrecisely
Ā 
Taking the Pulse of IBM i Security for 2020
Taking the Pulse of IBM i Security for 2020Taking the Pulse of IBM i Security for 2020
Taking the Pulse of IBM i Security for 2020Precisely
Ā 
Cybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your OrganizationCybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your OrganizationMcKonly & Asbury, LLP
Ā 
5 Steps to Reduce Your Window of Vulnerability
5 Steps to Reduce Your Window of Vulnerability5 Steps to Reduce Your Window of Vulnerability
5 Steps to Reduce Your Window of VulnerabilitySkybox Security
Ā 
SurfWatch Labs Threat Intelligence Solution Demo
SurfWatch Labs Threat Intelligence Solution DemoSurfWatch Labs Threat Intelligence Solution Demo
SurfWatch Labs Threat Intelligence Solution DemoSurfWatch Labs
Ā 
Cyber Threat Intelligence Solution Demonstration
Cyber Threat Intelligence Solution DemonstrationCyber Threat Intelligence Solution Demonstration
Cyber Threat Intelligence Solution DemonstrationSurfWatch Labs
Ā 
Cyber Threat Intelligence Solution Demonstration
Cyber Threat Intelligence Solution DemonstrationCyber Threat Intelligence Solution Demonstration
Cyber Threat Intelligence Solution DemonstrationSurfWatch Labs
Ā 
Monitoring and Reporting on IBM i Compliance and Security
Monitoring and Reporting on IBM i Compliance and SecurityMonitoring and Reporting on IBM i Compliance and Security
Monitoring and Reporting on IBM i Compliance and SecurityPrecisely
Ā 

Similar to Cybersecurity Health Checks: An SEO-Optimized Approach (20)

Institute of Internal Auditors Presentation 2014
Institute of Internal Auditors Presentation 2014Institute of Internal Auditors Presentation 2014
Institute of Internal Auditors Presentation 2014
Ā 
The 5 ws of Cyber Security
The 5 ws of Cyber SecurityThe 5 ws of Cyber Security
The 5 ws of Cyber Security
Ā 
Robert Nichols: Cybersecurity for Government Contractors
Robert Nichols: Cybersecurity for Government ContractorsRobert Nichols: Cybersecurity for Government Contractors
Robert Nichols: Cybersecurity for Government Contractors
Ā 
Colorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptx
Colorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptxColorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptx
Colorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptx
Ā 
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #2
SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #2SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #2
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #2
Ā 
What is the UK Cyber Essentials scheme?
What is the  UK Cyber Essentials scheme?What is the  UK Cyber Essentials scheme?
What is the UK Cyber Essentials scheme?
Ā 
Info.ppt
Info.pptInfo.ppt
Info.ppt
Ā 
Starting your Career in Information Security
Starting your Career in Information SecurityStarting your Career in Information Security
Starting your Career in Information Security
Ā 
Himss 2011 securing health information in the cloud -- feisal nanji
Himss 2011    securing health information in the cloud -- feisal nanjiHimss 2011    securing health information in the cloud -- feisal nanji
Himss 2011 securing health information in the cloud -- feisal nanji
Ā 
20CS024 Ethics in Information Technology
20CS024 Ethics in Information Technology20CS024 Ethics in Information Technology
20CS024 Ethics in Information Technology
Ā 
5 Things Your Security Administrator Should Tell You
5 Things Your Security Administrator Should Tell You5 Things Your Security Administrator Should Tell You
5 Things Your Security Administrator Should Tell You
Ā 
Cybersecurity Assurance at CloudSec 2015 Kuala Lumpur
Cybersecurity Assurance  at CloudSec 2015 Kuala LumpurCybersecurity Assurance  at CloudSec 2015 Kuala Lumpur
Cybersecurity Assurance at CloudSec 2015 Kuala Lumpur
Ā 
Accelerating Regulatory Compliance for IBM i Systems
Accelerating Regulatory Compliance for IBM i SystemsAccelerating Regulatory Compliance for IBM i Systems
Accelerating Regulatory Compliance for IBM i Systems
Ā 
Taking the Pulse of IBM i Security for 2020
Taking the Pulse of IBM i Security for 2020Taking the Pulse of IBM i Security for 2020
Taking the Pulse of IBM i Security for 2020
Ā 
Cybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your OrganizationCybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your Organization
Ā 
5 Steps to Reduce Your Window of Vulnerability
5 Steps to Reduce Your Window of Vulnerability5 Steps to Reduce Your Window of Vulnerability
5 Steps to Reduce Your Window of Vulnerability
Ā 
SurfWatch Labs Threat Intelligence Solution Demo
SurfWatch Labs Threat Intelligence Solution DemoSurfWatch Labs Threat Intelligence Solution Demo
SurfWatch Labs Threat Intelligence Solution Demo
Ā 
Cyber Threat Intelligence Solution Demonstration
Cyber Threat Intelligence Solution DemonstrationCyber Threat Intelligence Solution Demonstration
Cyber Threat Intelligence Solution Demonstration
Ā 
Cyber Threat Intelligence Solution Demonstration
Cyber Threat Intelligence Solution DemonstrationCyber Threat Intelligence Solution Demonstration
Cyber Threat Intelligence Solution Demonstration
Ā 
Monitoring and Reporting on IBM i Compliance and Security
Monitoring and Reporting on IBM i Compliance and SecurityMonitoring and Reporting on IBM i Compliance and Security
Monitoring and Reporting on IBM i Compliance and Security
Ā 

More from LinkedIn Learning Solutions

Mobile devices: the new learning platform for Higher Education
Mobile devices: the new learning platform for Higher EducationMobile devices: the new learning platform for Higher Education
Mobile devices: the new learning platform for Higher EducationLinkedIn Learning Solutions
Ā 
Fostering innovation to achieve mission critical goals
Fostering innovation to achieve mission critical goalsFostering innovation to achieve mission critical goals
Fostering innovation to achieve mission critical goalsLinkedIn Learning Solutions
Ā 
Insights from our Workplace Learning Report
Insights from our Workplace Learning Report Insights from our Workplace Learning Report
Insights from our Workplace Learning Report LinkedIn Learning Solutions
Ā 
LinkedIn Learning | What We're Learning About Learning
LinkedIn Learning | What We're Learning About LearningLinkedIn Learning | What We're Learning About Learning
LinkedIn Learning | What We're Learning About LearningLinkedIn Learning Solutions
Ā 
Creating a Culture of Learning in the New Year
Creating a Culture of Learning in the New YearCreating a Culture of Learning in the New Year
Creating a Culture of Learning in the New YearLinkedIn Learning Solutions
Ā 
Project-Based Instruction and the Importance of Self-Directed Learning
Project-Based Instruction and the Importance of Self-Directed LearningProject-Based Instruction and the Importance of Self-Directed Learning
Project-Based Instruction and the Importance of Self-Directed LearningLinkedIn Learning Solutions
Ā 
9 Learning Strategies from Knowledge to Know-How
9 Learning Strategies from Knowledge to Know-How9 Learning Strategies from Knowledge to Know-How
9 Learning Strategies from Knowledge to Know-HowLinkedIn Learning Solutions
Ā 
Online Video: How It Changes & Enhances The Way We Learn
Online Video: How It Changes & Enhances The Way We LearnOnline Video: How It Changes & Enhances The Way We Learn
Online Video: How It Changes & Enhances The Way We LearnLinkedIn Learning Solutions
Ā 
Ten Tips to Make You More Productive in Excel
Ten Tips to Make You More Productive in ExcelTen Tips to Make You More Productive in Excel
Ten Tips to Make You More Productive in ExcelLinkedIn Learning Solutions
Ā 

More from LinkedIn Learning Solutions (20)

Mobile devices: the new learning platform for Higher Education
Mobile devices: the new learning platform for Higher EducationMobile devices: the new learning platform for Higher Education
Mobile devices: the new learning platform for Higher Education
Ā 
Fostering innovation to achieve mission critical goals
Fostering innovation to achieve mission critical goalsFostering innovation to achieve mission critical goals
Fostering innovation to achieve mission critical goals
Ā 
Insights from our Workplace Learning Report
Insights from our Workplace Learning Report Insights from our Workplace Learning Report
Insights from our Workplace Learning Report
Ā 
LinkedIn Learning | What We're Learning About Learning
LinkedIn Learning | What We're Learning About LearningLinkedIn Learning | What We're Learning About Learning
LinkedIn Learning | What We're Learning About Learning
Ā 
Creating a Culture of Learning in the New Year
Creating a Culture of Learning in the New YearCreating a Culture of Learning in the New Year
Creating a Culture of Learning in the New Year
Ā 
A New Year, New Look for Lynda.com
A New Year, New Look for Lynda.comA New Year, New Look for Lynda.com
A New Year, New Look for Lynda.com
Ā 
Project-Based Instruction and the Importance of Self-Directed Learning
Project-Based Instruction and the Importance of Self-Directed LearningProject-Based Instruction and the Importance of Self-Directed Learning
Project-Based Instruction and the Importance of Self-Directed Learning
Ā 
9 Learning Strategies from Knowledge to Know-How
9 Learning Strategies from Knowledge to Know-How9 Learning Strategies from Knowledge to Know-How
9 Learning Strategies from Knowledge to Know-How
Ā 
Online Video: How It Changes & Enhances The Way We Learn
Online Video: How It Changes & Enhances The Way We LearnOnline Video: How It Changes & Enhances The Way We Learn
Online Video: How It Changes & Enhances The Way We Learn
Ā 
8 Key Ways to Rock SEO
8 Key Ways to Rock SEO8 Key Ways to Rock SEO
8 Key Ways to Rock SEO
Ā 
Top 5 Skills for Project Managers
Top 5 Skills for Project ManagersTop 5 Skills for Project Managers
Top 5 Skills for Project Managers
Ā 
Creating a Culture of Learning in 6 Steps
Creating a Culture of Learning in 6 StepsCreating a Culture of Learning in 6 Steps
Creating a Culture of Learning in 6 Steps
Ā 
Fred Kofman on Managing Conflict
Fred Kofman on Managing ConflictFred Kofman on Managing Conflict
Fred Kofman on Managing Conflict
Ā 
Ten Tips to Make You More Productive in Excel
Ten Tips to Make You More Productive in ExcelTen Tips to Make You More Productive in Excel
Ten Tips to Make You More Productive in Excel
Ā 
What's New in Office 2016
What's New in Office 2016What's New in Office 2016
What's New in Office 2016
Ā 
Evolution of the iPhone Camera
Evolution of the iPhone CameraEvolution of the iPhone Camera
Evolution of the iPhone Camera
Ā 
Demonstrating Positive Elearning ROI
Demonstrating Positive Elearning ROI Demonstrating Positive Elearning ROI
Demonstrating Positive Elearning ROI
Ā 
A Look Back Through Windows
A Look Back Through WindowsA Look Back Through Windows
A Look Back Through Windows
Ā 
Happiness at Work
Happiness at WorkHappiness at Work
Happiness at Work
Ā 
Mastering Excel Formulas and Functions
Mastering Excel Formulas and FunctionsMastering Excel Formulas and Functions
Mastering Excel Formulas and Functions
Ā 

Recently uploaded

Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
Ā 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
Ā 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
Ā 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
Ā 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
Ā 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
Ā 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
Ā 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
Ā 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
Ā 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
Ā 
šŸ¬ The future of MySQL is Postgres šŸ˜
šŸ¬  The future of MySQL is Postgres   šŸ˜šŸ¬  The future of MySQL is Postgres   šŸ˜
šŸ¬ The future of MySQL is Postgres šŸ˜RTylerCroy
Ā 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
Ā 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
Ā 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
Ā 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
Ā 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
Ā 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
Ā 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
Ā 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
Ā 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
Ā 

Recently uploaded (20)

Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
Ā 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
Ā 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
Ā 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
Ā 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Ā 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
Ā 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
Ā 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
Ā 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Ā 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Ā 
šŸ¬ The future of MySQL is Postgres šŸ˜
šŸ¬  The future of MySQL is Postgres   šŸ˜šŸ¬  The future of MySQL is Postgres   šŸ˜
šŸ¬ The future of MySQL is Postgres šŸ˜
Ā 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
Ā 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
Ā 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
Ā 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
Ā 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Ā 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Ā 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
Ā 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
Ā 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
Ā 

Cybersecurity Health Checks: An SEO-Optimized Approach

  • 1. 1 Cybersecurity Health Checks: Safeguarding Your Organisation Dr. Malcolm Shore
  • 2. 2 Quick Facts about Lynda.com Government ā€¢ Major government agencies ā€¢ Branches of military Corporations ā€¢ More than half of the Fortune 50 across all key industry sectors Education ā€¢ 60% of all US colleges and universities 40% of Australian universities 4M+ Members ā€¦with 350k paying out of pocket 20 Years Lynda.com was founded in 1995 12,000+ Enterprise Clients ā€¦located across 52 countries 6,000+ Courses ā€¦available in 5 languages (German, Spanish, French, Japanese) The Global Leader in Online Skills Instruction INTRODUCTION
  • 3. 3 Dr. Malcolm Shore Lynda.com author Technical Director, BAE Systems Applied Intelligence, Australia INTRODUCTION
  • 4. 4 ā€¢ 1983 - US DoD rainbow series ā€¢ 1993 ā€“ UK PD0003 ā€¢ 1998 ā€“ BS 7799ā€¦ā€¦ISO 27000 ā€¢ 2005 ā€“ NIST Special Publication 800-53 ā€¢ ā€¦ but too difficult and costly Information Security Standards BACKGROUND Cybersecurity Health Checks
  • 5. 5 ā€¢ From Bulletin Boards to the Web ā€¢ Ubiquitous connectivity across the globe ā€¢ Clouds arenā€™t just in the skyā€¦ ā€¢ From email to social mediaā€¦ ā€¢ From telephone to smartphone ā€¢ Cyber kill chain ā€¦ the world has changed Information Security Standards BACKGROUND Cybersecurity Health Checks
  • 6. 6 ā€¢ Evolution of information security standards lagging ā€¢ Information security policies ineffective* New Approach BACKGROUND Cybersecurity Health Checks *Doherty, NF and Fulford H. Do Information Security Policies Reduce the Incidence of Security Breaches? 2005
  • 7. 7 ā€¢ UK Cybersecurity Strategy ā€¢ Cyber Governance Health Check ā€¢ top 350 listed companies ā€¢ only15% of Boards manage cyber risk ā€¢ only 30% use threat intelligence ā€¢ Majority of attacks exploit basic weaknesses Information Security Policies BACKGROUND Cybersecurity Health Checks
  • 8. 8 ā€¢ Term used in audit community ā€¢ Now used in cybersecurity consulting ā€¢ Various interpretations ā€¦ is simply cyber fitness Cybersecurity Health Check DEFINITION Cybersecurity Health Checks
  • 9. 9 ā€¢ Check-up ā€“ unauthorised users, malware ā€¢ Health test - check network traffic for infections ā€¢ Full examination - rules, patches, access and privileges - operational defences ā€¢ Fitness test - external penetration exercise ā€¢ Cyber insurance Cybersecurity Health Check DEFINITION Cybersecurity Health Checks
  • 10. 10 ā€¢ Baseline security ā€¢ Operational focus ā€¢ Affordable, manageable Cyber Essentials CYBER ESSENTIALS Cybersecurity Health Checks
  • 12. 12 ā€¢ Prevents low grade technical attacks on ā€¢ desktop PCs, laptops ā€¢ tablets, smartphones ā€¢ email ā€¢ web applications Cyber Essentials CYBER ESSENTIALS Cybersecurity Health Checks
  • 13. 13 ā€¢ Boundary devices ā€¢ Secure configuration ā€¢ User access control ā€¢ Malware protection ā€¢ Patch management Cyber Essentials CYBER ESSENTIALS Cybersecurity Health Checks
  • 14. 14 Boundary Firewalls and Internet Gateways CYBER ESSENTIALS Cybersecurity health Checks
  • 15. 15 ā€¢ administrative password must be changed ā€¢ documented and authorised rules ā€¢ obsolete rules removed ā€¢ unnecessary services blocked ā€¢ administrative interface accessible only internally Boundary Firewalls and Internet Gateways CYBER ESSENTIALS Cybersecurity health Checks
  • 17. 17 ā€¢ Issues: ā€¢ easy to install ā€¢ no security configured ā€¢ default administrator accounts and passwords Secure Configuration CYBER ESSENTIALS Cybersecurity health Checks
  • 18. 18 Secure Configuration CYBER ESSENTIALS Cybersecurity health Checks ā€¢ remove unnecessary default accounts ā€¢ change default passwords ā€¢ remove or disable unnecessary applications and services ā€¢ install personal firewalls on all PCs
  • 21. 21 ā€¢ Issues: ā€¢ legacy access ā€¢ excess privileges User Access Control CYBER ESSENTIALS Cybersecurity health Checks
  • 22. 22 User Access Control CYBER ESSENTIALS Cybersecurity health Checks ā€¢ minimum privileges ā€¢ userid and strong passwords ā€¢ ensure privileged accounts are not used for internet activity ā€¢ disable or remove accounts when no longer required
  • 23. 23 User Access Control CYBER ESSENTIALS Cybersecurity health Checks
  • 24. 24 ā€¢ Install anti-virus software ā€¢ up to date signatures ā€¢ Use real-time protection ā€¢ Scan the filebase ā€¢ Blacklisting known malicious sites Malware Protection CYBER ESSENTIALS Cybersecurity Health Checks
  • 25. 25 ā€¢ Flaws found by developers, researchers, hackers ā€¢ Often exploited within 24 hours ā€¢ Timely patching ā€¢ Licenced software Patching CYBER ESSENTIALS Cybersecurity Health Checks
  • 26. 26 ā€¢ Good routine check-up and examination ā€¢ Does not propose a full cyber fitness test Cyber Essentials ā€“ Health Check? CYBER ESSENTIALS Cybersecurity Health Checks
  • 27. 27 ā€¢ Published March 2015 ā€¢ Improve cyber resilience ā€¢ Cyber defence posture ā€¢ Incident management ASIC Report 429 ASIC REPORT 429 Cybersecurity Health Checks
  • 28. 28 ā€¢ Adopted in ASIC Report 429 ā€¢ 26 prompts ā€¢ 2 governance ā€¢ 24 across the five Framework areas US Cybersecurity Framework ASIC REPORT 429 Cybersecurity Health Checks
  • 29. 29 ā€¢ Board and Executive awareness of cyber risk ā€¢ Assessment against the Cybersecurity Framework Governance ASIC REPORT 429 Cybersecurity Health Checks
  • 30. 30 ā€¢ What are the essential information and assets? ā€¢ What are the cyber risks? ā€¢ Are third party risks considered? ā€¢ Does enterprise risk management include cyber risks? ā€¢ Are staff aware of cyber risks? Identify ASIC REPORT 429 Cybersecurity Health Checks
  • 31. 31 ā€¢ Are security policies and standards up to date? ā€¢ Have IT systems and processes been tested? ā€¢ Are there sufficient resources in place? Protect ASIC REPORT 429 Cybersecurity Health Checks
  • 32. 32 ā€¢ Monitoring for cyber attacks ā€¢ External engagement Detect ASIC REPORT 429 Cybersecurity Health Checks
  • 33. 33 ā€¢ Is response planning adequate? ā€¢ Notifying law enforcement of an attack ā€¢ Notifying customers of a breach Respond ASIC REPORT 429 Cybersecurity Health Checks
  • 34. 34 ā€¢ Does the organisation have a recovery plan? Recover ASIC REPORT 429 Cybersecurity Health Checks
  • 35. 35 ā€¢ Full set of controls ā€¢ Cyber health checks lost in the noise ā€¢ A through life fitness programme ASIC Report 429 ā€“ Cyber Health Check? ASIC REPORT 429 Cybersecurity Health Checks
  • 36. 36 ā€¢ Security standards are evolving ā€¢ Traditional approach is having limited success ā€¢ Cyber health checks are a more manageable approach ā€¢ Cyber Essentials provides a health check Conclusion CONCLUSION Cybersecurity Health Checks

Editor's Notes

  1. Item number:459514297
  2. Item number:486763822
  3. Item number:486763822
  4. Item number:486763822
  5. Item number:458040107
  6. Item number:458040107
  7. Item number:458040107