SlideShare a Scribd company logo
1© 2017 Billtrust. All Rights Reserved. Billtrust and the Billtrust Logo are registered trademarks of Billtrust.
CYBER SECURITY
Laura Whitt-Winyard, CISSP, CISA,
CISM, CRISC, RSA-ACA
Director, Cyber Security
Moving past “best practices”
2
Experience
● Over 16 years in Cyber Security
● Joined Billtrust in 2015
● Comcast, Bloomberg, LP, Allstate
Awards
● Eight time ISE Award Nominee/Finalist
● Four time RSA Archer Award Winner
● Two-time CSO 50 Award Winner
Personal
● Likes to stay nerdy – attends annual hacking conference and cyber security events
LAURA WHITT-WINYARD, CISSP, CISA, CISM,
CRISC, RSA-ACA
3
AGENDA
I. The Cyber Security
Stats
II. Cyber Security at
Billtrust
III. What can you do?
IV. Q&A
4
THE
STATS &
CYBER
SECURITY
TODAY
5
LEADING CAUSES OF SECURITY INCIDENTS
Source: BakerHostetler: Data Privacy Monitor
6Source: BakerHostetler: Data Privacy Monitor
CYBER SECURITY INCIDENTS
Company Breakdown
7
OLD WAY:
• He who has the most knowledge wins
• Collaboration is bad
• Keep security challenges close to the vest
NEW WAY:
• Share knowledge
• Don’t reinvent the wheel
• Engage with security partners
• Security is an enabler of
business
• Threats evolve, so should we
• Explore new ideas together
HOW HAS CYBER SECURITY CHANGED
8
System Security
Patches, Anti-Virus, Malware,
File Integrity Monitoring, Host-
based Intrusion Detection,
Rogue Applications,
Vulnerability Scanning
Network Security
Firewalls, Network Intrusion
Detection, Web Filtering, Virtual
Private Network (VPN), Cloud
Security, 24x7 Monitoring
Governance
PCI-DSS 3.2, HIPAA, NACHA, SOC
1 & 2 Type II, National Institute of
Standards & Technology (NIST),
Computer Security Incident
Response Team (CSIRT), Source
Code Scanning
SECURITY BEST PRACTICES
Data Protection
Data Loss Prevention
(Endpoint, Storage &
Network), Encryption,
Tokenization
9
SECURITY MEASURES
• Considered the most security
stringent of all auditable regulations
• Is it enough? No.
• Threat landscape moves too fast
• Compliant is not secure enough
• Just a check-box?
10
USING CHECKLISTS
Checklists are great if…
• The data is being monitored
by a human as well as a
machine
• If the data is optimized
• If you have/can afford the staff
• If your team is highly efficient
and effective
11
CYBER
SECURITY
AT
BILLTRUST
12
Artificial Intelligence
Machine Learning, Anomalous
Detection, Bayesian’s Theory of
Probability
Containment
Zero Day, Contains the
unknown, runs in a
virtual machine
Authentication
Two-Factor Authentication on
everything that contains
sensitive/confidential data
NEXT-GEN
Automation & Orchestration
Removes human error,
Automates the repetitive
so security can focus on
the hard stuff
13
• Unsupervised self-learning intelligence
• Detects subtle, stealthy threats
• What is normal & abnormal on an evolving basis
• Old school: humans told machines what to look for
• New school: Machines show us what we never
knew was there
• All done in real time
• Improves security by reducing Mean Time
to Detection (MTTD)
ARTIFICIAL INTELLIGENCE
Thomas Bayes
14
CONTAINMENT
The problem: Antivirus cannot cope
with today’s threats
For thirty years, most of us have relied
on signature based antivirus products for
protection that use their signature file
(blacklist) to identify and respond to
threats. Unfortunately, that means
“legacy antivirus” must first detect the
threat before it can be addressed.
Legacy antivirus systems simply cannot
cope with the volume and sophistication
of today’s threats.
Our solution: Intelligent Threat
Containment
Our threat containment solutions provide
total protection against zero-day threats
while having no impact on end-user
experience or workflows. All untrusted
processes and applications are
automatically contained in a secure
environment, allowing safe applications
the freedom to run while denying malware
the system access they require to deliver
their payloads.
Unknown files: The Good, The Bad,
and The Ugly
Known Good: The file is known to be
valid and not a risk.
Known Bad: The file is a known threat
and must be dealt with accordingly.
Unknown: The file is not on our lists of
good or bad. It may be safe or it could
be malicious. We just do not know.
15
• Work Smarter
• Respond Faster
• Strengthen Defenses
• Execute actions in seconds instead of
minutes, hours or more done manually
AUTOMATION & ORCHESTRATION
• Automates repetitive tasks
• More efficient staff
• Improves security by reducing Mean
Time to Resolution (MTTR)
16
• Complete device visibility
• Identify Corp owned vs. Personal devices
• Block Untrusted Endpoints
• Visibility into security hygiene of each device
• Policies to prevent vulnerable devices
• Secure Single Sign on experience
• Two-Factor Authentication
• Geolocation
AUTHENTICATION
17
WHAT CAN
YOU DO?
18
EASY FIXES
Manage User Accounts
• Bad Ideas: Shared accounts, accounts with the
same password
• Create strong but easy to remember passwords
• Keep your devices updated
• Phones, tablets, laptops
• Learn to spot spoofed emails & phishing emails
• Be leery of pop-ups & phone calls
19
STRONG PASSWORDS
Come up with a phrase and use a
character from each word. Use capitals
where appropriate
Example:
• “I met Susan Morris at Lincoln High School
in 1991”
• Password could be: ImSMaLHS#91
20
STRONG PASSWORDS
An easy way to make each
password unique
Add a letter or two to the password based on
the name of the site you’re logging into.
For example:
• Amazon: almSMaLHSi#91z (added an
A to the beginning and a z at the end)
• Google: glmSMaLHSi#91
• Twitter: tlmSMaLHSi#91r
Change your passwords if and when:
• There has been any type of security breach
on the site or your system
• You have lost a device that has the password
stored
• Someone else gets hold of your password
• And even if none of this happens, change
them every few months
21
SPOOFING & PHISHING EMAILS
22
POP-UP & PHONE SCAMS
23
WANT TO LEARN MORE?
Free Cyber Security Learning
https://www.cybrary.it/
National Institute of Standards & Technology
https://www.nist.gov/topics/cybersecurity
Report Phishing
https://www.consumer.ftc.gov/articles/0003-phishing
PCI-DSS documentation
https://www.pcisecuritystandards.org/document_library?category=pcidss&d
ocument=pci_dss
Annual Hackers Convention
https://defcon.org/
24
WANT TO LEARN MORE?
Want to learn how Billtrust solutions can help your accounts
receivable team protect and secure your data?
Visit www.billtrust.com to find out more and request a free
demo.

More Related Content

What's hot

CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
harsh arora
 
Cyber security by Gaurav Singh
Cyber security by Gaurav SinghCyber security by Gaurav Singh
Cyber security by Gaurav Singh
Gaurav Singh
 
Cyber security
Cyber securityCyber security
Cyber security
manoj duli
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
Parab Mishra
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Bhandari Hìmáñßhü
 
Cyber security by Anushka Jha
Cyber security by Anushka JhaCyber security by Anushka Jha
Cyber security by Anushka Jha
Anushka Jha
 
Cyber security
Cyber securityCyber security
Cyber security
Harsh verma
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentation
A.S. Sabuj
 
Cyber security & awareness
Cyber security & awarenessCyber security & awareness
Cyber security & awareness
Rishab garg
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber security
Self-employed
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amos
Amos Oyoo
 
Cyber security
Cyber securityCyber security
Cyber security
Rishav Sadhu
 
Cyber Security Awareness (Reduce Personal & Business Risk)
Cyber Security Awareness (Reduce Personal & Business Risk)Cyber Security Awareness (Reduce Personal & Business Risk)
Cyber Security Awareness (Reduce Personal & Business Risk)
Gian Gentile
 
Cyber security
Cyber securityCyber security
Cyber security
vishakha bhagwat
 
cyber security presentation.pptx
cyber security presentation.pptxcyber security presentation.pptx
cyber security presentation.pptx
kishore golla
 
Cyber security Information security
Cyber security Information securityCyber security Information security
Cyber security Information security
AYESHA JAVED
 
Cyber Security Presentation
Cyber Security PresentationCyber Security Presentation
Cyber Security Presentation
HaniyaMaha
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
Bijay Bhandari
 
Pranavi verma-cyber-security-ppt
Pranavi verma-cyber-security-pptPranavi verma-cyber-security-ppt
Pranavi verma-cyber-security-ppt
PranaviVerma
 
Cyber security
Cyber securityCyber security
Cyber security
Dr. Kishor Nikam
 

What's hot (20)

CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cyber security by Gaurav Singh
Cyber security by Gaurav SinghCyber security by Gaurav Singh
Cyber security by Gaurav Singh
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber security by Anushka Jha
Cyber security by Anushka JhaCyber security by Anushka Jha
Cyber security by Anushka Jha
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentation
 
Cyber security & awareness
Cyber security & awarenessCyber security & awareness
Cyber security & awareness
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber security
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amos
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security Awareness (Reduce Personal & Business Risk)
Cyber Security Awareness (Reduce Personal & Business Risk)Cyber Security Awareness (Reduce Personal & Business Risk)
Cyber Security Awareness (Reduce Personal & Business Risk)
 
Cyber security
Cyber securityCyber security
Cyber security
 
cyber security presentation.pptx
cyber security presentation.pptxcyber security presentation.pptx
cyber security presentation.pptx
 
Cyber security Information security
Cyber security Information securityCyber security Information security
Cyber security Information security
 
Cyber Security Presentation
Cyber Security PresentationCyber Security Presentation
Cyber Security Presentation
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Pranavi verma-cyber-security-ppt
Pranavi verma-cyber-security-pptPranavi verma-cyber-security-ppt
Pranavi verma-cyber-security-ppt
 
Cyber security
Cyber securityCyber security
Cyber security
 

Similar to Cyber Security - Moving Past "Best Practices"

Pci compliance training agents
Pci compliance training  agentsPci compliance training  agents
Pci compliance training agentsocinc
 
Stopping Breaches at the Perimeter: Strategies for Secure Access Control
Stopping Breaches at the Perimeter: Strategies for Secure Access ControlStopping Breaches at the Perimeter: Strategies for Secure Access Control
Stopping Breaches at the Perimeter: Strategies for Secure Access Control
SecureAuth
 
Peter Allor - The New Era of Cognitive Security
Peter Allor - The New Era of Cognitive SecurityPeter Allor - The New Era of Cognitive Security
Peter Allor - The New Era of Cognitive Security
scoopnewsgroup
 
Security and the Service Desk
Security and the Service DeskSecurity and the Service Desk
Security and the Service Desk
NorthCoastHDI
 
Event Presentation: Cyber Security for Industrial Control Systems
Event Presentation: Cyber Security for Industrial Control SystemsEvent Presentation: Cyber Security for Industrial Control Systems
Event Presentation: Cyber Security for Industrial Control Systems
Infonaligy
 
Social Networking Security For OCRI - Scott Wright - Condensed July 9, 2009
Social Networking Security For OCRI - Scott Wright - Condensed July 9, 2009Social Networking Security For OCRI - Scott Wright - Condensed July 9, 2009
Social Networking Security For OCRI - Scott Wright - Condensed July 9, 2009
Scott Wright
 
Mark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
Mark Villinski - Top 10 Tips for Educating Employees about CybersecurityMark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
Mark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
centralohioissa
 
IT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.ppt
OoXair
 
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdfitsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
MansoorAhmed57263
 
Protecting Your Business From Cybercrime
Protecting Your Business From CybercrimeProtecting Your Business From Cybercrime
Protecting Your Business From Cybercrime
David J Rosenthal
 
Kaspersky 2017 Thailand Launch
Kaspersky 2017 Thailand LaunchKaspersky 2017 Thailand Launch
Kaspersky 2017 Thailand Launch
Worapol Limsiriwong (Nex)
 
An Introduction To IT Security And Privacy In Libraries
 An Introduction To IT Security And Privacy In Libraries An Introduction To IT Security And Privacy In Libraries
An Introduction To IT Security And Privacy In Libraries
Blake Carver
 
Ten security product categories you've (probably) never heard of
Ten security product categories you've (probably) never heard ofTen security product categories you've (probably) never heard of
Ten security product categories you've (probably) never heard of
Adrian Sanabria
 
Intro to INFOSEC
Intro to INFOSECIntro to INFOSEC
Intro to INFOSEC
Sean Whalen
 
Protecting Your IP: Data Security for Software Technology
Protecting Your IP: Data Security for Software TechnologyProtecting Your IP: Data Security for Software Technology
Protecting Your IP: Data Security for Software Technology
Shawn Tuma
 
Getting users to care about security
Getting users to care about securityGetting users to care about security
Getting users to care about securityAlison Gianotto
 
Persentation
PersentationPersentation
Persentation
Mehar Tayyab
 
PCM Vision 2019 Breakout: IBM | Red Hat
PCM Vision 2019 Breakout: IBM | Red HatPCM Vision 2019 Breakout: IBM | Red Hat
PCM Vision 2019 Breakout: IBM | Red Hat
PCM
 
Managing Frequently Overlooked Risks & Threats (FORTS) in Corporations
Managing Frequently Overlooked Risks & Threats (FORTS) in CorporationsManaging Frequently Overlooked Risks & Threats (FORTS) in Corporations
Managing Frequently Overlooked Risks & Threats (FORTS) in Corporations
Dinesh O Bareja
 
Information security for business majors
Information security for business majorsInformation security for business majors
Information security for business majorsPaul Melson
 

Similar to Cyber Security - Moving Past "Best Practices" (20)

Pci compliance training agents
Pci compliance training  agentsPci compliance training  agents
Pci compliance training agents
 
Stopping Breaches at the Perimeter: Strategies for Secure Access Control
Stopping Breaches at the Perimeter: Strategies for Secure Access ControlStopping Breaches at the Perimeter: Strategies for Secure Access Control
Stopping Breaches at the Perimeter: Strategies for Secure Access Control
 
Peter Allor - The New Era of Cognitive Security
Peter Allor - The New Era of Cognitive SecurityPeter Allor - The New Era of Cognitive Security
Peter Allor - The New Era of Cognitive Security
 
Security and the Service Desk
Security and the Service DeskSecurity and the Service Desk
Security and the Service Desk
 
Event Presentation: Cyber Security for Industrial Control Systems
Event Presentation: Cyber Security for Industrial Control SystemsEvent Presentation: Cyber Security for Industrial Control Systems
Event Presentation: Cyber Security for Industrial Control Systems
 
Social Networking Security For OCRI - Scott Wright - Condensed July 9, 2009
Social Networking Security For OCRI - Scott Wright - Condensed July 9, 2009Social Networking Security For OCRI - Scott Wright - Condensed July 9, 2009
Social Networking Security For OCRI - Scott Wright - Condensed July 9, 2009
 
Mark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
Mark Villinski - Top 10 Tips for Educating Employees about CybersecurityMark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
Mark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
 
IT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.ppt
 
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdfitsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
 
Protecting Your Business From Cybercrime
Protecting Your Business From CybercrimeProtecting Your Business From Cybercrime
Protecting Your Business From Cybercrime
 
Kaspersky 2017 Thailand Launch
Kaspersky 2017 Thailand LaunchKaspersky 2017 Thailand Launch
Kaspersky 2017 Thailand Launch
 
An Introduction To IT Security And Privacy In Libraries
 An Introduction To IT Security And Privacy In Libraries An Introduction To IT Security And Privacy In Libraries
An Introduction To IT Security And Privacy In Libraries
 
Ten security product categories you've (probably) never heard of
Ten security product categories you've (probably) never heard ofTen security product categories you've (probably) never heard of
Ten security product categories you've (probably) never heard of
 
Intro to INFOSEC
Intro to INFOSECIntro to INFOSEC
Intro to INFOSEC
 
Protecting Your IP: Data Security for Software Technology
Protecting Your IP: Data Security for Software TechnologyProtecting Your IP: Data Security for Software Technology
Protecting Your IP: Data Security for Software Technology
 
Getting users to care about security
Getting users to care about securityGetting users to care about security
Getting users to care about security
 
Persentation
PersentationPersentation
Persentation
 
PCM Vision 2019 Breakout: IBM | Red Hat
PCM Vision 2019 Breakout: IBM | Red HatPCM Vision 2019 Breakout: IBM | Red Hat
PCM Vision 2019 Breakout: IBM | Red Hat
 
Managing Frequently Overlooked Risks & Threats (FORTS) in Corporations
Managing Frequently Overlooked Risks & Threats (FORTS) in CorporationsManaging Frequently Overlooked Risks & Threats (FORTS) in Corporations
Managing Frequently Overlooked Risks & Threats (FORTS) in Corporations
 
Information security for business majors
Information security for business majorsInformation security for business majors
Information security for business majors
 

More from Billtrust

Customer Portal Automation
Customer Portal AutomationCustomer Portal Automation
Customer Portal Automation
Billtrust
 
Billtrust Business Directory - The Next Generation of eAdoption
Billtrust Business Directory - The Next Generation of eAdoptionBilltrust Business Directory - The Next Generation of eAdoption
Billtrust Business Directory - The Next Generation of eAdoption
Billtrust
 
Virtual Card Capture
Virtual Card Capture Virtual Card Capture
Virtual Card Capture
Billtrust
 
Quantum Cash Application
Quantum Cash Application Quantum Cash Application
Quantum Cash Application
Billtrust
 
Billing Best Practices
Billing Best PracticesBilling Best Practices
Billing Best Practices
Billtrust
 
How to Mitigate the Impact of the USPS
How to Mitigate the Impact of the USPSHow to Mitigate the Impact of the USPS
How to Mitigate the Impact of the USPS
Billtrust
 
Paperless Billing Strategy for B2C
Paperless Billing Strategy for B2CPaperless Billing Strategy for B2C
Paperless Billing Strategy for B2C
Billtrust
 
Paperless Billing Strategy for B2B
Paperless Billing Strategy for B2BPaperless Billing Strategy for B2B
Paperless Billing Strategy for B2BBilltrust
 

More from Billtrust (8)

Customer Portal Automation
Customer Portal AutomationCustomer Portal Automation
Customer Portal Automation
 
Billtrust Business Directory - The Next Generation of eAdoption
Billtrust Business Directory - The Next Generation of eAdoptionBilltrust Business Directory - The Next Generation of eAdoption
Billtrust Business Directory - The Next Generation of eAdoption
 
Virtual Card Capture
Virtual Card Capture Virtual Card Capture
Virtual Card Capture
 
Quantum Cash Application
Quantum Cash Application Quantum Cash Application
Quantum Cash Application
 
Billing Best Practices
Billing Best PracticesBilling Best Practices
Billing Best Practices
 
How to Mitigate the Impact of the USPS
How to Mitigate the Impact of the USPSHow to Mitigate the Impact of the USPS
How to Mitigate the Impact of the USPS
 
Paperless Billing Strategy for B2C
Paperless Billing Strategy for B2CPaperless Billing Strategy for B2C
Paperless Billing Strategy for B2C
 
Paperless Billing Strategy for B2B
Paperless Billing Strategy for B2BPaperless Billing Strategy for B2B
Paperless Billing Strategy for B2B
 

Recently uploaded

Intro_Economics_ GPresentation Week 4.pptx
Intro_Economics_ GPresentation Week 4.pptxIntro_Economics_ GPresentation Week 4.pptx
Intro_Economics_ GPresentation Week 4.pptx
shetivia
 
The WhatsPump Pseudonym Problem and the Hilarious Downfall of Artificial Enga...
The WhatsPump Pseudonym Problem and the Hilarious Downfall of Artificial Enga...The WhatsPump Pseudonym Problem and the Hilarious Downfall of Artificial Enga...
The WhatsPump Pseudonym Problem and the Hilarious Downfall of Artificial Enga...
muslimdavidovich670
 
Abhay Bhutada Leads Poonawalla Fincorp To Record Low NPA And Unprecedented Gr...
Abhay Bhutada Leads Poonawalla Fincorp To Record Low NPA And Unprecedented Gr...Abhay Bhutada Leads Poonawalla Fincorp To Record Low NPA And Unprecedented Gr...
Abhay Bhutada Leads Poonawalla Fincorp To Record Low NPA And Unprecedented Gr...
Vighnesh Shashtri
 
BYD SWOT Analysis and In-Depth Insights 2024.pptx
BYD SWOT Analysis and In-Depth Insights 2024.pptxBYD SWOT Analysis and In-Depth Insights 2024.pptx
BYD SWOT Analysis and In-Depth Insights 2024.pptx
mikemetalprod
 
Instant Issue Debit Cards - School Designs
Instant Issue Debit Cards - School DesignsInstant Issue Debit Cards - School Designs
Instant Issue Debit Cards - School Designs
egoetzinger
 
Instant Issue Debit Cards - High School Spirit
Instant Issue Debit Cards - High School SpiritInstant Issue Debit Cards - High School Spirit
Instant Issue Debit Cards - High School Spirit
egoetzinger
 
innovative-invoice-discounting-platforms-in-india-empowering-retail-investors...
innovative-invoice-discounting-platforms-in-india-empowering-retail-investors...innovative-invoice-discounting-platforms-in-india-empowering-retail-investors...
innovative-invoice-discounting-platforms-in-india-empowering-retail-investors...
Falcon Invoice Discounting
 
Tax System, Behaviour, Justice, and Voluntary Compliance Culture in Nigeria -...
Tax System, Behaviour, Justice, and Voluntary Compliance Culture in Nigeria -...Tax System, Behaviour, Justice, and Voluntary Compliance Culture in Nigeria -...
Tax System, Behaviour, Justice, and Voluntary Compliance Culture in Nigeria -...
Godwin Emmanuel Oyedokun MBA MSc PhD FCA FCTI FCNA CFE FFAR
 
An Overview of the Prosocial dHEDGE Vault works
An Overview of the Prosocial dHEDGE Vault worksAn Overview of the Prosocial dHEDGE Vault works
An Overview of the Prosocial dHEDGE Vault works
Colin R. Turner
 
The Role of Non-Banking Financial Companies (NBFCs)
The Role of Non-Banking Financial Companies (NBFCs)The Role of Non-Banking Financial Companies (NBFCs)
The Role of Non-Banking Financial Companies (NBFCs)
nickysharmasucks
 
when will pi network coin be available on crypto exchange.
when will pi network coin be available on crypto exchange.when will pi network coin be available on crypto exchange.
when will pi network coin be available on crypto exchange.
DOT TECH
 
Turin Startup Ecosystem 2024 - Ricerca sulle Startup e il Sistema dell'Innov...
Turin Startup Ecosystem 2024  - Ricerca sulle Startup e il Sistema dell'Innov...Turin Startup Ecosystem 2024  - Ricerca sulle Startup e il Sistema dell'Innov...
Turin Startup Ecosystem 2024 - Ricerca sulle Startup e il Sistema dell'Innov...
Quotidiano Piemontese
 
where can I find a legit pi merchant online
where can I find a legit pi merchant onlinewhere can I find a legit pi merchant online
where can I find a legit pi merchant online
DOT TECH
 
how to sell pi coins effectively (from 50 - 100k pi)
how to sell pi coins effectively (from 50 - 100k  pi)how to sell pi coins effectively (from 50 - 100k  pi)
how to sell pi coins effectively (from 50 - 100k pi)
DOT TECH
 
US Economic Outlook - Being Decided - M Capital Group August 2021.pdf
US Economic Outlook - Being Decided - M Capital Group August 2021.pdfUS Economic Outlook - Being Decided - M Capital Group August 2021.pdf
US Economic Outlook - Being Decided - M Capital Group August 2021.pdf
pchutichetpong
 
The secret way to sell pi coins effortlessly.
The secret way to sell pi coins effortlessly.The secret way to sell pi coins effortlessly.
The secret way to sell pi coins effortlessly.
DOT TECH
 
The European Unemployment Puzzle: implications from population aging
The European Unemployment Puzzle: implications from population agingThe European Unemployment Puzzle: implications from population aging
The European Unemployment Puzzle: implications from population aging
GRAPE
 
USDA Loans in California: A Comprehensive Overview.pptx
USDA Loans in California: A Comprehensive Overview.pptxUSDA Loans in California: A Comprehensive Overview.pptx
USDA Loans in California: A Comprehensive Overview.pptx
marketing367770
 
Which Crypto to Buy Today for Short-Term in May-June 2024.pdf
Which Crypto to Buy Today for Short-Term in May-June 2024.pdfWhich Crypto to Buy Today for Short-Term in May-June 2024.pdf
Which Crypto to Buy Today for Short-Term in May-June 2024.pdf
Kezex (KZX)
 
2. Elemental Economics - Mineral demand.pdf
2. Elemental Economics - Mineral demand.pdf2. Elemental Economics - Mineral demand.pdf
2. Elemental Economics - Mineral demand.pdf
Neal Brewster
 

Recently uploaded (20)

Intro_Economics_ GPresentation Week 4.pptx
Intro_Economics_ GPresentation Week 4.pptxIntro_Economics_ GPresentation Week 4.pptx
Intro_Economics_ GPresentation Week 4.pptx
 
The WhatsPump Pseudonym Problem and the Hilarious Downfall of Artificial Enga...
The WhatsPump Pseudonym Problem and the Hilarious Downfall of Artificial Enga...The WhatsPump Pseudonym Problem and the Hilarious Downfall of Artificial Enga...
The WhatsPump Pseudonym Problem and the Hilarious Downfall of Artificial Enga...
 
Abhay Bhutada Leads Poonawalla Fincorp To Record Low NPA And Unprecedented Gr...
Abhay Bhutada Leads Poonawalla Fincorp To Record Low NPA And Unprecedented Gr...Abhay Bhutada Leads Poonawalla Fincorp To Record Low NPA And Unprecedented Gr...
Abhay Bhutada Leads Poonawalla Fincorp To Record Low NPA And Unprecedented Gr...
 
BYD SWOT Analysis and In-Depth Insights 2024.pptx
BYD SWOT Analysis and In-Depth Insights 2024.pptxBYD SWOT Analysis and In-Depth Insights 2024.pptx
BYD SWOT Analysis and In-Depth Insights 2024.pptx
 
Instant Issue Debit Cards - School Designs
Instant Issue Debit Cards - School DesignsInstant Issue Debit Cards - School Designs
Instant Issue Debit Cards - School Designs
 
Instant Issue Debit Cards - High School Spirit
Instant Issue Debit Cards - High School SpiritInstant Issue Debit Cards - High School Spirit
Instant Issue Debit Cards - High School Spirit
 
innovative-invoice-discounting-platforms-in-india-empowering-retail-investors...
innovative-invoice-discounting-platforms-in-india-empowering-retail-investors...innovative-invoice-discounting-platforms-in-india-empowering-retail-investors...
innovative-invoice-discounting-platforms-in-india-empowering-retail-investors...
 
Tax System, Behaviour, Justice, and Voluntary Compliance Culture in Nigeria -...
Tax System, Behaviour, Justice, and Voluntary Compliance Culture in Nigeria -...Tax System, Behaviour, Justice, and Voluntary Compliance Culture in Nigeria -...
Tax System, Behaviour, Justice, and Voluntary Compliance Culture in Nigeria -...
 
An Overview of the Prosocial dHEDGE Vault works
An Overview of the Prosocial dHEDGE Vault worksAn Overview of the Prosocial dHEDGE Vault works
An Overview of the Prosocial dHEDGE Vault works
 
The Role of Non-Banking Financial Companies (NBFCs)
The Role of Non-Banking Financial Companies (NBFCs)The Role of Non-Banking Financial Companies (NBFCs)
The Role of Non-Banking Financial Companies (NBFCs)
 
when will pi network coin be available on crypto exchange.
when will pi network coin be available on crypto exchange.when will pi network coin be available on crypto exchange.
when will pi network coin be available on crypto exchange.
 
Turin Startup Ecosystem 2024 - Ricerca sulle Startup e il Sistema dell'Innov...
Turin Startup Ecosystem 2024  - Ricerca sulle Startup e il Sistema dell'Innov...Turin Startup Ecosystem 2024  - Ricerca sulle Startup e il Sistema dell'Innov...
Turin Startup Ecosystem 2024 - Ricerca sulle Startup e il Sistema dell'Innov...
 
where can I find a legit pi merchant online
where can I find a legit pi merchant onlinewhere can I find a legit pi merchant online
where can I find a legit pi merchant online
 
how to sell pi coins effectively (from 50 - 100k pi)
how to sell pi coins effectively (from 50 - 100k  pi)how to sell pi coins effectively (from 50 - 100k  pi)
how to sell pi coins effectively (from 50 - 100k pi)
 
US Economic Outlook - Being Decided - M Capital Group August 2021.pdf
US Economic Outlook - Being Decided - M Capital Group August 2021.pdfUS Economic Outlook - Being Decided - M Capital Group August 2021.pdf
US Economic Outlook - Being Decided - M Capital Group August 2021.pdf
 
The secret way to sell pi coins effortlessly.
The secret way to sell pi coins effortlessly.The secret way to sell pi coins effortlessly.
The secret way to sell pi coins effortlessly.
 
The European Unemployment Puzzle: implications from population aging
The European Unemployment Puzzle: implications from population agingThe European Unemployment Puzzle: implications from population aging
The European Unemployment Puzzle: implications from population aging
 
USDA Loans in California: A Comprehensive Overview.pptx
USDA Loans in California: A Comprehensive Overview.pptxUSDA Loans in California: A Comprehensive Overview.pptx
USDA Loans in California: A Comprehensive Overview.pptx
 
Which Crypto to Buy Today for Short-Term in May-June 2024.pdf
Which Crypto to Buy Today for Short-Term in May-June 2024.pdfWhich Crypto to Buy Today for Short-Term in May-June 2024.pdf
Which Crypto to Buy Today for Short-Term in May-June 2024.pdf
 
2. Elemental Economics - Mineral demand.pdf
2. Elemental Economics - Mineral demand.pdf2. Elemental Economics - Mineral demand.pdf
2. Elemental Economics - Mineral demand.pdf
 

Cyber Security - Moving Past "Best Practices"

  • 1. 1© 2017 Billtrust. All Rights Reserved. Billtrust and the Billtrust Logo are registered trademarks of Billtrust. CYBER SECURITY Laura Whitt-Winyard, CISSP, CISA, CISM, CRISC, RSA-ACA Director, Cyber Security Moving past “best practices”
  • 2. 2 Experience ● Over 16 years in Cyber Security ● Joined Billtrust in 2015 ● Comcast, Bloomberg, LP, Allstate Awards ● Eight time ISE Award Nominee/Finalist ● Four time RSA Archer Award Winner ● Two-time CSO 50 Award Winner Personal ● Likes to stay nerdy – attends annual hacking conference and cyber security events LAURA WHITT-WINYARD, CISSP, CISA, CISM, CRISC, RSA-ACA
  • 3. 3 AGENDA I. The Cyber Security Stats II. Cyber Security at Billtrust III. What can you do? IV. Q&A
  • 5. 5 LEADING CAUSES OF SECURITY INCIDENTS Source: BakerHostetler: Data Privacy Monitor
  • 6. 6Source: BakerHostetler: Data Privacy Monitor CYBER SECURITY INCIDENTS Company Breakdown
  • 7. 7 OLD WAY: • He who has the most knowledge wins • Collaboration is bad • Keep security challenges close to the vest NEW WAY: • Share knowledge • Don’t reinvent the wheel • Engage with security partners • Security is an enabler of business • Threats evolve, so should we • Explore new ideas together HOW HAS CYBER SECURITY CHANGED
  • 8. 8 System Security Patches, Anti-Virus, Malware, File Integrity Monitoring, Host- based Intrusion Detection, Rogue Applications, Vulnerability Scanning Network Security Firewalls, Network Intrusion Detection, Web Filtering, Virtual Private Network (VPN), Cloud Security, 24x7 Monitoring Governance PCI-DSS 3.2, HIPAA, NACHA, SOC 1 & 2 Type II, National Institute of Standards & Technology (NIST), Computer Security Incident Response Team (CSIRT), Source Code Scanning SECURITY BEST PRACTICES Data Protection Data Loss Prevention (Endpoint, Storage & Network), Encryption, Tokenization
  • 9. 9 SECURITY MEASURES • Considered the most security stringent of all auditable regulations • Is it enough? No. • Threat landscape moves too fast • Compliant is not secure enough • Just a check-box?
  • 10. 10 USING CHECKLISTS Checklists are great if… • The data is being monitored by a human as well as a machine • If the data is optimized • If you have/can afford the staff • If your team is highly efficient and effective
  • 12. 12 Artificial Intelligence Machine Learning, Anomalous Detection, Bayesian’s Theory of Probability Containment Zero Day, Contains the unknown, runs in a virtual machine Authentication Two-Factor Authentication on everything that contains sensitive/confidential data NEXT-GEN Automation & Orchestration Removes human error, Automates the repetitive so security can focus on the hard stuff
  • 13. 13 • Unsupervised self-learning intelligence • Detects subtle, stealthy threats • What is normal & abnormal on an evolving basis • Old school: humans told machines what to look for • New school: Machines show us what we never knew was there • All done in real time • Improves security by reducing Mean Time to Detection (MTTD) ARTIFICIAL INTELLIGENCE Thomas Bayes
  • 14. 14 CONTAINMENT The problem: Antivirus cannot cope with today’s threats For thirty years, most of us have relied on signature based antivirus products for protection that use their signature file (blacklist) to identify and respond to threats. Unfortunately, that means “legacy antivirus” must first detect the threat before it can be addressed. Legacy antivirus systems simply cannot cope with the volume and sophistication of today’s threats. Our solution: Intelligent Threat Containment Our threat containment solutions provide total protection against zero-day threats while having no impact on end-user experience or workflows. All untrusted processes and applications are automatically contained in a secure environment, allowing safe applications the freedom to run while denying malware the system access they require to deliver their payloads. Unknown files: The Good, The Bad, and The Ugly Known Good: The file is known to be valid and not a risk. Known Bad: The file is a known threat and must be dealt with accordingly. Unknown: The file is not on our lists of good or bad. It may be safe or it could be malicious. We just do not know.
  • 15. 15 • Work Smarter • Respond Faster • Strengthen Defenses • Execute actions in seconds instead of minutes, hours or more done manually AUTOMATION & ORCHESTRATION • Automates repetitive tasks • More efficient staff • Improves security by reducing Mean Time to Resolution (MTTR)
  • 16. 16 • Complete device visibility • Identify Corp owned vs. Personal devices • Block Untrusted Endpoints • Visibility into security hygiene of each device • Policies to prevent vulnerable devices • Secure Single Sign on experience • Two-Factor Authentication • Geolocation AUTHENTICATION
  • 18. 18 EASY FIXES Manage User Accounts • Bad Ideas: Shared accounts, accounts with the same password • Create strong but easy to remember passwords • Keep your devices updated • Phones, tablets, laptops • Learn to spot spoofed emails & phishing emails • Be leery of pop-ups & phone calls
  • 19. 19 STRONG PASSWORDS Come up with a phrase and use a character from each word. Use capitals where appropriate Example: • “I met Susan Morris at Lincoln High School in 1991” • Password could be: ImSMaLHS#91
  • 20. 20 STRONG PASSWORDS An easy way to make each password unique Add a letter or two to the password based on the name of the site you’re logging into. For example: • Amazon: almSMaLHSi#91z (added an A to the beginning and a z at the end) • Google: glmSMaLHSi#91 • Twitter: tlmSMaLHSi#91r Change your passwords if and when: • There has been any type of security breach on the site or your system • You have lost a device that has the password stored • Someone else gets hold of your password • And even if none of this happens, change them every few months
  • 23. 23 WANT TO LEARN MORE? Free Cyber Security Learning https://www.cybrary.it/ National Institute of Standards & Technology https://www.nist.gov/topics/cybersecurity Report Phishing https://www.consumer.ftc.gov/articles/0003-phishing PCI-DSS documentation https://www.pcisecuritystandards.org/document_library?category=pcidss&d ocument=pci_dss Annual Hackers Convention https://defcon.org/
  • 24. 24 WANT TO LEARN MORE? Want to learn how Billtrust solutions can help your accounts receivable team protect and secure your data? Visit www.billtrust.com to find out more and request a free demo.