The document discusses cybersecurity crisis management and preparedness. It provides examples of data breaches that occurred in early 2018 exposing millions of consumer records. It outlines key steps organizations can take to prepare for a cybersecurity crisis including: 1) Involving executive leadership and creating a crisis management plan; 2) Conducting breach simulations; 3) Engaging a third-party forensics firm; and 4) Educating executives on their roles and responsibilities. Templates for a response team matrix, breach scenarios, and notification letters are also provided.
Crisis Management Techniques for Cyber AttacksPECB
The discussion focuses specifically on how to prevent and be best prepared for cyber-attacks in a situation of a crisis.
Main points covered:
• What is a crisis and what are its common features?
• Business Continuity threats: How likely is that a cyber-attack will occur?
• Statistics: What industries are attacked the most?
• How do we prepare/prevent for a cyber-attack?
Presenter:
Our distinguished presenter for this webinar was Ms. Stella Simiyu. She is the Head Operational Risk and Compliance at Bharti Airtel Money Africa. Ms. Stella has over 10 years of work experience in Enterprise-wide Risk Management.
Link of the recorded session published on YouTube: https://youtu.be/AOufbUMXKb0
Cyber crisis management refers to the plan that includes steps to recover IT Services from an emergency disruption. It is crucial to have a cyber crisis management plan to minimize the impact of incidents while quickly restoring security, operations, and credibility.
Secrets to managing your Duty of Care in an ever- changing world.
How well do you know your risks?
Are you keeping up with your responsibilities to provide Duty of Care?
How well are you prioritising Cybersecurity initiatives?
Liability for Cybersecurity attacks sits with Executives and Board members who may not have the right level of technical security knowledge. This session will outline what practical steps executives can take to implement a Cybersecurity Roadmap that is aligned with its strategic objectives.
Led by Krist Davood, who has spent over 28 years implementing secure mission critical systems for executives. Krist is an expert in protecting the interconnectedness of technology, intellectual property and information systems, as evidenced through his roles at The Good Guys, Court Services Victoria and Schiavello.
The seminar will cover:
• Fiduciary responsibility
• How to efficiently deal with personal liability and the threat of court action
• The role of a Cybersecurity Executive Dashboard and its ability to simplify risk and amplify informed decision making
• How to identify and bridge the gap between your Cybersecurity Compliance Rating and the threat of court action
Cyber Security Trends
Business Concerns
Cyber Threats
The Solutions
Security Operation Center
requirement
SOC Architecture model
SOC Implementation
SOC & NOC
SOC & CSIRT
SIEM & Correlation
-----------------------------------------------------------
Definition
Gartner defines a SOC as both a team, often operating in shifts around the clock, and a facility dedicated to and organized to prevent, detect, assess and respond to cybersecurity threats and incidents, and to fulfill and assess regulatory compliance. The term "cybersecurity operation center "is often used synonymously for SOC.
A network operations center (NOC) is not a SOC, which focuses on network device management rather than detecting and responding to cybersecurity incidents. Coordination between the two is common, however.
A managed security service is not the same as having a SOC — although a service provider may offer services from a SOC. A managed service is a shared resource and not solely dedicated to a single organization or entity. Similarly, there is no such thing as a managed SOC.
Most of the technologies, processes and best practices that are used in a SOC are not specific to a SOC. Incident response or vulnerability management remain the same, whether delivered from a SOC or not. It is a meta-topic, involving many security domains and disciplines, and depending on the services and functions that are delivered by the SOC.
Services that often reside in a SOC are:
• Cyber security incident response
• Malware analysis
• Forensic analysis
• Threat intelligence analysis
• Risk analytics and attack path modeling
• Countermeasure implementation
• Vulnerability assessment
• Vulnerability analysis
• Penetration testing
• Remediation prioritization and coordination
• Security intelligence collection and fusion
• Security architecture design
• Security consulting
• Security awareness training
• Security audit data collection and distribution
Alternative names for SOC :
Security defense center (SDC)
Security intelligence center
Cyber security center
Threat defense center
security intelligence and operations center (SIOC)
Infrastructure Protection Centre (IPC)
مرکز عملیات امنیت
In today’s business environment, organizations have a responsibility to their employees, clients, and customers to ensure the confidentiality, integrity and availability of the critical data that is entrusted to them. Every network is vulnerable to some form of attack. However it is not enough to simply confirm that a technical vulnerability exists and implement countermeasures; it is critical to repeatedly verify that the countermeasures are in place and working properly throughout the secured network. During this webinar, David Hammarberg, Principal, IT Director, and leader of McKonly & Asbury’s Cybersecurity Practice will be joined by Partner, Michael Hoffner and they will lead a discussion on a Cybersecurity Risk Management Program including what it is and how it can prepare your organization for the future.
Talking about Next-Gen Security Operation Center for IDNIC+APJII as representative from IDSECCONF. People-Centric SOC requires lot of investment on human in terms of quantity and quality, unfortunately, (good) IT security people are getting rare these days. Organisation need to put their investments more on technology, as in Industry 4.0, machines are getting more advanced to support Human on doing continuous and repetitive task.
Moving from “traditional” to next-gen SOC require proper plan, thats what this talk was about.
Crisis Management Techniques for Cyber AttacksPECB
The discussion focuses specifically on how to prevent and be best prepared for cyber-attacks in a situation of a crisis.
Main points covered:
• What is a crisis and what are its common features?
• Business Continuity threats: How likely is that a cyber-attack will occur?
• Statistics: What industries are attacked the most?
• How do we prepare/prevent for a cyber-attack?
Presenter:
Our distinguished presenter for this webinar was Ms. Stella Simiyu. She is the Head Operational Risk and Compliance at Bharti Airtel Money Africa. Ms. Stella has over 10 years of work experience in Enterprise-wide Risk Management.
Link of the recorded session published on YouTube: https://youtu.be/AOufbUMXKb0
Cyber crisis management refers to the plan that includes steps to recover IT Services from an emergency disruption. It is crucial to have a cyber crisis management plan to minimize the impact of incidents while quickly restoring security, operations, and credibility.
Secrets to managing your Duty of Care in an ever- changing world.
How well do you know your risks?
Are you keeping up with your responsibilities to provide Duty of Care?
How well are you prioritising Cybersecurity initiatives?
Liability for Cybersecurity attacks sits with Executives and Board members who may not have the right level of technical security knowledge. This session will outline what practical steps executives can take to implement a Cybersecurity Roadmap that is aligned with its strategic objectives.
Led by Krist Davood, who has spent over 28 years implementing secure mission critical systems for executives. Krist is an expert in protecting the interconnectedness of technology, intellectual property and information systems, as evidenced through his roles at The Good Guys, Court Services Victoria and Schiavello.
The seminar will cover:
• Fiduciary responsibility
• How to efficiently deal with personal liability and the threat of court action
• The role of a Cybersecurity Executive Dashboard and its ability to simplify risk and amplify informed decision making
• How to identify and bridge the gap between your Cybersecurity Compliance Rating and the threat of court action
Cyber Security Trends
Business Concerns
Cyber Threats
The Solutions
Security Operation Center
requirement
SOC Architecture model
SOC Implementation
SOC & NOC
SOC & CSIRT
SIEM & Correlation
-----------------------------------------------------------
Definition
Gartner defines a SOC as both a team, often operating in shifts around the clock, and a facility dedicated to and organized to prevent, detect, assess and respond to cybersecurity threats and incidents, and to fulfill and assess regulatory compliance. The term "cybersecurity operation center "is often used synonymously for SOC.
A network operations center (NOC) is not a SOC, which focuses on network device management rather than detecting and responding to cybersecurity incidents. Coordination between the two is common, however.
A managed security service is not the same as having a SOC — although a service provider may offer services from a SOC. A managed service is a shared resource and not solely dedicated to a single organization or entity. Similarly, there is no such thing as a managed SOC.
Most of the technologies, processes and best practices that are used in a SOC are not specific to a SOC. Incident response or vulnerability management remain the same, whether delivered from a SOC or not. It is a meta-topic, involving many security domains and disciplines, and depending on the services and functions that are delivered by the SOC.
Services that often reside in a SOC are:
• Cyber security incident response
• Malware analysis
• Forensic analysis
• Threat intelligence analysis
• Risk analytics and attack path modeling
• Countermeasure implementation
• Vulnerability assessment
• Vulnerability analysis
• Penetration testing
• Remediation prioritization and coordination
• Security intelligence collection and fusion
• Security architecture design
• Security consulting
• Security awareness training
• Security audit data collection and distribution
Alternative names for SOC :
Security defense center (SDC)
Security intelligence center
Cyber security center
Threat defense center
security intelligence and operations center (SIOC)
Infrastructure Protection Centre (IPC)
مرکز عملیات امنیت
In today’s business environment, organizations have a responsibility to their employees, clients, and customers to ensure the confidentiality, integrity and availability of the critical data that is entrusted to them. Every network is vulnerable to some form of attack. However it is not enough to simply confirm that a technical vulnerability exists and implement countermeasures; it is critical to repeatedly verify that the countermeasures are in place and working properly throughout the secured network. During this webinar, David Hammarberg, Principal, IT Director, and leader of McKonly & Asbury’s Cybersecurity Practice will be joined by Partner, Michael Hoffner and they will lead a discussion on a Cybersecurity Risk Management Program including what it is and how it can prepare your organization for the future.
Talking about Next-Gen Security Operation Center for IDNIC+APJII as representative from IDSECCONF. People-Centric SOC requires lot of investment on human in terms of quantity and quality, unfortunately, (good) IT security people are getting rare these days. Organisation need to put their investments more on technology, as in Industry 4.0, machines are getting more advanced to support Human on doing continuous and repetitive task.
Moving from “traditional” to next-gen SOC require proper plan, thats what this talk was about.
Most organizations have good enterprise-level security policies that define their approach to maintaining, improving, and securing their information and information systems. However, once the policies are signed by senior leadership and distributed throughout the organization, significant cybersecurity governance challenges remain. In this workshop I will explain the transforming organizational security to strengthen defenses and integrate cybersecurity with the overall approach toward security governance, risk management and compliance.
An in-depth look at:
1. Disruptive Technology and its impact on organizations.
2. Need for a Security Operations Center (SOC) for the 21st century businesses
3. Designing and operating an effective SOC - what it takes to run a successful SOC starting from how we should prepare our minds in terms of approach to the actual implementation and operation.
4. Qualities any SOC Analyst should possess
5. Measuring the success of a SOC - We discuss critical factors to consider when determining the success of a SOC.
How To Handle Cybersecurity Risk PowerPoint Presentation SlidesSlideTeam
Information technology experts can now take advantage of How To Handle Cybersecurity Risk PowerPoint Presentation Slides. This information security PPT theme infuses top-quality design with data obtained by industry experts. Explain the present situation of the target firm’s information security management employing this PowerPoint layout. The data visualizations featured here simplify the elucidation of complex data such as the analysis of the current IT department. Showcase the cybersecurity framework roadmap and risks of the internet using our PPT presentation. Elaborate on the cybersecurity risk management action plan using the tabular format via this PowerPoint slideshow. Demonstrate the cybersecurity contingency plan with appreciable ease. Our information security management system PPT templates deck assists you in assigning risk handling responsibilities to the staff. Explain the duties of the management in successful information security governance. This PowerPoint presentation also addresses the cost of cybersecurity management and staff training. Hit the download icon and start personalization. Our How To Handle Cybersecurity Risk PowerPoint Presentation Slides are explicit and effective. They combine clarity and concise expression. https://bit.ly/3o0xDkR
Building a Next-Generation Security Operations Center (SOC)Sqrrl
So, you need to build a Security Operations Center (SOC)? What does that mean? What does the modern SOC need to do? Learn from Dr. Terry Brugger, who has been doing information security work for over 15 years, including building out a SOC for a large Federal agency and consulting for numerous large enterprises on their security operations.
Watch the presentation with audio here: http://info.sqrrl.com/sqrrl-october-webinar-next-generation-soc
Presentation for March 2017 webcast by NIST.
www.nist.gov/cyberframework
Webcast video: https://www.nist.gov/news-events/events/2017/03/cybersecurity-framework-virtual-events
This presentation introduces the audience to the Framework for Improving Critical Infrastructure Cybersecurity (“The Framework”). It provides a brief history about why and how the Framework was developed, and an understanding of each of the three primary Framework components (the Core, Implementation Tiers, and Profiles). It covers potential benefits of Framework, and how the Framework can be used. It highlights industry resources, progress in Roadmap areas, and future direction of the Framework program.
Insight is one of the best security operation center that influences all the necessary things that reduce the advanced threats and security risk all over your company and protects your network infrastructure across the organization. https://insightmsp.co.in/soc-as-service.php
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...IBM Security
Learn about Sogeti’s journey of creating a new Security Operation Center, and how and why we leveraged QRadar solutions. We explore the full program lifecycle, from strategic choices to technical analysis and benchmarking on the product. We explain how QRadar accelerates the go-to-market of the SOC, and how we embed IBM Security Intelligence offerings in our solution. Having a strong collaboration between different IBM stakeholders such as Software Group, Global Technology Services, as well as the Labs, was key to client satisfaction and operational effectiveness. We also show the value of integrating new QRadar features in our SOC roadmap, in order to constantly stay ahead in the cyber security game.
NIST Cybersecurity Framework is voluntary framework to support the emerging needs for having robust and effective cyber security practices across an enterprise. This presentation recaps the Framework 6 months into implementation and along with changes. Also, discusses the capabilities of TrustedAgent GRC to accelerate and strengthen the implementation of an effective cybersecurity program by automating or addressing many of the practices required by the framework.
Most organizations have good enterprise-level security policies that define their approach to maintaining, improving, and securing their information and information systems. However, once the policies are signed by senior leadership and distributed throughout the organization, significant cybersecurity governance challenges remain. In this workshop I will explain the transforming organizational security to strengthen defenses and integrate cybersecurity with the overall approach toward security governance, risk management and compliance.
An in-depth look at:
1. Disruptive Technology and its impact on organizations.
2. Need for a Security Operations Center (SOC) for the 21st century businesses
3. Designing and operating an effective SOC - what it takes to run a successful SOC starting from how we should prepare our minds in terms of approach to the actual implementation and operation.
4. Qualities any SOC Analyst should possess
5. Measuring the success of a SOC - We discuss critical factors to consider when determining the success of a SOC.
How To Handle Cybersecurity Risk PowerPoint Presentation SlidesSlideTeam
Information technology experts can now take advantage of How To Handle Cybersecurity Risk PowerPoint Presentation Slides. This information security PPT theme infuses top-quality design with data obtained by industry experts. Explain the present situation of the target firm’s information security management employing this PowerPoint layout. The data visualizations featured here simplify the elucidation of complex data such as the analysis of the current IT department. Showcase the cybersecurity framework roadmap and risks of the internet using our PPT presentation. Elaborate on the cybersecurity risk management action plan using the tabular format via this PowerPoint slideshow. Demonstrate the cybersecurity contingency plan with appreciable ease. Our information security management system PPT templates deck assists you in assigning risk handling responsibilities to the staff. Explain the duties of the management in successful information security governance. This PowerPoint presentation also addresses the cost of cybersecurity management and staff training. Hit the download icon and start personalization. Our How To Handle Cybersecurity Risk PowerPoint Presentation Slides are explicit and effective. They combine clarity and concise expression. https://bit.ly/3o0xDkR
Building a Next-Generation Security Operations Center (SOC)Sqrrl
So, you need to build a Security Operations Center (SOC)? What does that mean? What does the modern SOC need to do? Learn from Dr. Terry Brugger, who has been doing information security work for over 15 years, including building out a SOC for a large Federal agency and consulting for numerous large enterprises on their security operations.
Watch the presentation with audio here: http://info.sqrrl.com/sqrrl-october-webinar-next-generation-soc
Presentation for March 2017 webcast by NIST.
www.nist.gov/cyberframework
Webcast video: https://www.nist.gov/news-events/events/2017/03/cybersecurity-framework-virtual-events
This presentation introduces the audience to the Framework for Improving Critical Infrastructure Cybersecurity (“The Framework”). It provides a brief history about why and how the Framework was developed, and an understanding of each of the three primary Framework components (the Core, Implementation Tiers, and Profiles). It covers potential benefits of Framework, and how the Framework can be used. It highlights industry resources, progress in Roadmap areas, and future direction of the Framework program.
Insight is one of the best security operation center that influences all the necessary things that reduce the advanced threats and security risk all over your company and protects your network infrastructure across the organization. https://insightmsp.co.in/soc-as-service.php
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...IBM Security
Learn about Sogeti’s journey of creating a new Security Operation Center, and how and why we leveraged QRadar solutions. We explore the full program lifecycle, from strategic choices to technical analysis and benchmarking on the product. We explain how QRadar accelerates the go-to-market of the SOC, and how we embed IBM Security Intelligence offerings in our solution. Having a strong collaboration between different IBM stakeholders such as Software Group, Global Technology Services, as well as the Labs, was key to client satisfaction and operational effectiveness. We also show the value of integrating new QRadar features in our SOC roadmap, in order to constantly stay ahead in the cyber security game.
NIST Cybersecurity Framework is voluntary framework to support the emerging needs for having robust and effective cyber security practices across an enterprise. This presentation recaps the Framework 6 months into implementation and along with changes. Also, discusses the capabilities of TrustedAgent GRC to accelerate and strengthen the implementation of an effective cybersecurity program by automating or addressing many of the practices required by the framework.
CYBER SECURITY and DATA PRIVACY 2022: Data Breach Response - Before and After...Financial Poise
You’ve received the dreaded call that your company has just suffered a data breach – what do you do next? Who do you call for help? What notification obligations do you have?
With proper preparation, you can mitigate the damage caused by this unfortunate event and put your business in a position to recover. Your company may have already implemented its information security program and identified the responsible parties, including applicable outside experts, to be contacted in the event of a breach. However, now you must call up your incident response team to investigate the extent of the breach, evaluate the possible damage to your company, and determine whether you must notify your clients, customers, or the public of the breach. This webinar will help prepare you to take action when the worst happens.
Part of the webinar series:
CYBER SECURITY and DATA PRIVACY 2022
See more at https://www.financialpoise.com/webinars/
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...cyberprosocial
In today’s digitally interconnected world, the term “data breaches” has become all too familiar. Whether it’s a small-scale business or a multinational corporation, no organization is immune to its threat. These breaches can wreak havoc on a company’s finances, reputation, and customer trust. Understanding what they are, how they occur, and most importantly, how to prevent and respond to them, is paramount for businesses of all sizes.
Being aware of the trends that are expected to shape the digital landscape is an important step in ensuring the security of your data and online assets.
Amongst others, the webinar covers:
• Top Cyber Trends for 2023
• Cyber Insurance
• Prioritization of Cyber Risk
Presenters:
Colleen Lennox
Colleen Lennox is the Founder of Cyber Job Central, a newly formed job board dedicated to Cybersecurity job openings. Colleen has 25+ years in Technical Recruiting and loves to help other find their next great job!
Madhu Maganti
Madhu is a goal-oriented cybersecurity/IT advisory leader with more than 20 years of comprehensive experience leading high-performance teams with a proven track record of continuous improvement toward objectives. He is highly knowledgeable in both technical and business principles and processes.
Madhu specializes in cybersecurity risk assessments, enterprise risk management, regulatory compliance, Sarbanes-Oxley (SOX) compliance and system and organization controls (SOC) reporting.
Date: January 25, 2023
Tags: ISO, ISO/IEC 27032, Cybersecurity Management
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: https://pecb.com/en/education-and-certification-for-individuals/iso-iec-27032
https://pecb.com/article/cybersecurity-risk-assessment
https://pecb.com/article/a-deeper-understanding-of-cybersecurity
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
Whitepaper: https://pecb.com/whitepaper
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
Slideshare: http://www.slideshare.net/PECBCERTIFICATION
YouTube video: https://youtu.be/BAAl_PI9uRc
The Science and Art of Cyber Incident Response (with Case Studies)Kroll
In this joint presentation for the ISSA-LA Summit X in Los Angeles, Jennifer Rathburn, a cybersecurity and data privacy law expert at Foley & Lardner LLP and William Dixon, Associate Managing Director in Kroll's Cyber Risk practice, highlight three incident response scenarios and tips on breach preparation and response.
To learn more, contact Jennifer or William at:
Jennifer Rathburn, Foley & Lardner LLP
jrathburn@foley.com; 414-297-5864
William Dixon, Kroll, a Division of Duff & Phelps
william.dixon@kroll.com; 213-247-3973
Managing Privacy Risk and Promoting Ethical Culture in the Digital AgePerficient, Inc.
Businesses that responsibly manage privacy and educate their customers about their privacy practices benefit greatly - especially with regard to positive brand development.
What Not-for-Profits Can Do To Prevent "Uninspired" TheftCBIZ, Inc.
This presentation showcases the reasoning for and the importance of cyberseucrity in the not-for-profit sector. Case studies reinforce the importance of being ahead of the curve when managing cyber risk.
Overcoming Hidden Risks in a Shared Security ModelOnRamp
Risk management, compliance, and security are a shared burden between your organization and your vendors. Standards such as NIST (Publication 500-292) and regulations like HIPAA and PCI-DSS provide considerations for compliance and security but do not account for the nuances of your unique business or your infrastructure. Guidelines are written as though one party is responsible for compliance and security, but you rely on multiple vendors. Outsourcing can lead to ambiguous delegation of compliance responsibilities, lack of data governance and security practices, and difficulty in achieving data protection—ultimately risking non-compliance and leaving your infrastructure vulnerable.
Join our expert panel as they share insights into closing the gap on who’s responsible for what in data security and best practices for improving your security posture.
Takeaways:
Who owns the responsibility of compliance and security?
How to find and mitigate hidden risks in a 3rd party ecosystem
How to map your requirements to owners, policies, and controls
Expert recommendations for PCI, HIPAA, FERPA, FISMA and more.
Data Breach Response: Before and After the BreachFinancial Poise
You’ve received the dreaded call that your company has just suffered a data breach – what do you do next? Who do you call for help? What notification obligations do you have?
With proper preparation, you can mitigate the damage caused by this unfortunate event and put your business in a position to recover. Your company may have already implemented its information security program and identified the responsible parties, including applicable outside experts, to be contacted in the event of a breach. However, now you must call up your incident response team to investigate the extent of the breach, evaluate the possible damage to your company, and determine whether you must notify your clients, customers, or the public of the breach. This webinar will help prepare you to take action when the worst happens.
Part of the webinar series: Cybersecurity & Data Privacy 2021
See more at https://www.financialpoise.com/webinars/
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
I have heard many times that architecture is not important for the front-end. Also, many times I have seen how developers implement features on the front-end just following the standard rules for a framework and think that this is enough to successfully launch the project, and then the project fails. How to prevent this and what approach to choose? I have launched dozens of complex projects and during the talk we will analyze which approaches have worked for me and which have not.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
3. Breaches – Two Weeks in 2018
April 3, 2018 – registration information for up to 7 million consumers
who created an account on Panerabread.com was exposed
April 1, 2018 – hackers store payments information from 5 million
consumers via store payments systems; 125,000 card numbers
found for sale on the Dark Web
March 29.2018 – MyFitnessPal app is breached and registration
info on up to 150 million users is hacked
Late March 2018 – [24]7.ai, a customers services operations
company, reported a breach that occurred in Sept/Oct 2017 resulted in
the access of payments information from its client companies
Source: First Data Corporation
4. ◦ In 2017 there were 1579 data breaches that were reported and recorded with an estimated 179
million records exposed
◦ The number of data breaches represented a 44% increase over the number reported in 2016 and the
number of records lost was up by 400%!
◦ As of the week of April 16, 2018
◦ Number of reported data breaches = 319
◦ Number of data records lost/stolen = 11 million +
Source: Identity Theft Resource Center
5.
6. For organizations that store, process or transmit sensitive information, a data breach is an
eventuality. A data breach represents a “cybersecurity crisis”!
No organization can achieve complete and total cybersecurity
Avoiding a cyber crisis comes down to:
◦ Managing the incident before, during and after it unfolds
◦ Ensuring that a cyber incident is not seen as purely an IT issue by company execs
◦ Ensuring the multiple functions across the company are aware and prepared to deal with a cyber crisis
◦ Realizing that a poor response can exacerbate a crisis
7. A computer incident could refer to day-to-day security incidents such as malware infections, application or
network disruptions involving limited information disclosure. Incidents are handled routinely as per the
Incident Response Procedure and limited visibility may be provided to the CIO and other executives
A cybersecurity crisis refers to a more serious situation that has the potential to cause significant financial,
reputation or brand damage to the company. Examples include a major denial of service attack, known or
suspected infiltration by bad actors or loss of large amounts of sensitive data. The company’s C-suite
needs to be notified and typically stays engaged until closure
A computer incident can quickly escalate into a cybersecurity crisis
9. Company’s executive leadership lacks sufficient understanding of their roles or what information they
will need in order to make decisions during a cybersecurity crisis
Information security team practices incident response in isolation from the executives and business
leaders
No playbook exists defining actions and/or decision points for responders
If processes have been defined, they are rarely tested for effectiveness
Triggers to escalate an incident to senior management are not clearly defined
Communication protocols are not defined and templates do not exist
There are no clearly defined guidelines on when to engage law enforcement, internal/external
counsel or when to notify affected parties or customers
Cyber security insurance coverage either does not exist or is unclear
10. An organization must be ready to:
◦ Respond quickly and effectively
◦ Provide information to a multitude of internal and external stakeholders
◦ Update or change existing agreements / arrangements with business partners
◦ Respond to legal or regulatory requirements
◦ Engage in proactive communications to public and media
◦ Monitor social media channels and respond accordingly
11. Home Depot
◦ Responded within hours of breach confirmation
◦ Took full responsibility and apologized
◦ CEO personally apologized in a well written letter
◦ Set up a call center to handle 50,000 call per day
◦ Within 2 weeks updated their technology
Anthem
◦ Self discovered the breach and announced immediately
◦ WSJ called it a textbook case in effective crisis management
◦ Anthem created a dedicated website to provide updates on the breach
◦ Website clearly identifies who was affected and exactly what was lost
12. Uber
◦ The company concealed the breach
◦ Paid hackers $100K to keep it quiet and delete the data
◦ No apologies and no statements from the CEO early on
Equifax
◦ Took more than a month to disclose
◦ Completely ignored the significance of the emotional connection between company and consumers
◦ Created a website that was not on the corp domain resulting in numerous phishing messaged
◦ Required more personal data and provided vague response
◦ Credit protection agreement included a clause that excluded consumer from a class action
16. Tools and technologies in portfolio
Forensic capabilities
Threat intelligence utilization
Incident response plans
17. Critical business applications and processes
Business limitations and acceptable risk
RTO and RPO requirements
Resource requirements for recovery
18. State and federal notification requirements
Law enforcement engagement
Effect on compliance mandates
Obligations to affected parties and stakeholders
19. Root cause analysis
Cleanup
Lessons learned database
Additional people, process and technologies
More reading: https://www2.deloitte.com/content/dam/Deloitte/global/Documents/Risk/gx-cm-cyber-pov.pdf
20. Step – 1: Involve Your Executive Leadership Team
This includes the C-suite, i.e CEO, COO, CFO, CIO, CCO
This includes business unit leaders, i.e EVPs, SVPs
This includes representatives or delegates from Legal, HR, Corporate Communications and
Marketing
These leaders and representatives must be familiar with their role and responsibilities
during a crisis
21. Step – 2: Create a Cyber Security Crisis Management Plan
Ideally, the crisis management plan should be a separate document, with the following
essential elements:
• Structure of the crisis management team
• Responsibility matrix with names of the specific individuals
• Threat matrix with severity levels and associated response protocols
• Communication templates for customers, business partners, media and external agencies
• Procedures to inform authorities and affected parties and to provide identity and credit
protection services
22. Step – 3: Conduct Breach Simulations
• Breach simulation is a table top exercise in your boardroom
• All the key executives need to participate
• A hypothetical breach scenario is created and the participants are asked to respond
• Guidance is provided by the moderators
• The executive team becomes familiar with the process and the sources of information
23. Step – 4: Engage a Third Party
• Breach can stay undetected for years but once they are detected there is extreme urgency
to investigate
• Finding the right forensics partner can be a challenge
• Companies have no choice but to rush into a contract often overlooking critical provisions
• Legal and compliance teams need to be involved in the review of all contractual language
• Internal or external legal counsel should be used to engage the third party forensic
company and attorney client privileges should be protected in the contract language
24. • Data breaches are inevitable. Therefore, an organization MUST be prepared to handle one
• The information security team MUST take the lead in building and socializing a crisis
management program
• The information security team MUST build partnerships with Legal, Compliance, Corporate
Communication and Privacy teams of the company
• A detailed crisis management plan MUST be created and maintained
• Periodic simulations MUST be conducted
• The executives of the company MUST be educated and must fully understand their roles
and responsibilities
28. If data loss is confirmed, the State Attorney Generals must be notified in accordance with the State’s privacy
directives. 47 states and 3 U.S. territories all have their own data breach laws, enforced by state attorneys
general.
Breach notification letters must be sent to the individuals whose personal information was lost or
compromised.
Some States like California, Massachusetts, New York, North Carolina, Illinois, West Virginia and Maryland have
specific formats that must be followed. All other states do not have any constraints.
Create and maintain a repository of breach notification letters for all the states where your customers reside
29. DEPARTMENT / TEAM REPRESENTATIVE TITLE RESPONSIBILITY
EXEC LEADERSHIP BRIAN WILLIAMS CEO Inform Board of Directors on the
status of breach investigations etc
EXEC LEDERSHIP PETER ALEXANDER CFO Determine cost of breach and data
loss
COPORATE COMMUNICATIONS HALEY JACKSON SVP Ensure consistent and timeline
communications to media and
authorities
HR MANU RAJU EVP Determine impact on employees
CUSTOMER RELATIONS KRISTEN WELKER DIRECTOR Establish and maintain
communications with customers
LEGAL CHUCK TODD CORPORATE COUNSEL Engage internal and external legal
teams to ensure compliance with
laws
30. INCIDENT SCOPE SEVERITY ACTION
DENIAL OF SERVICE ATTACK Limited to no impact on business apps LOW Monitor traffic
Fine tune DDoS appliances to eliminate noise
Inform ISP
Crtical business application performance impacted MEDIUM Initiate incident response protocol
Engage ISP
Perform RCA
Provide updtes to affected parties
Internet access down. Business apps offline HIGH Initiate crisis management protocol
Inform executives and business leaders
Craft and send communications to customers
and other parties
POTENTIAL DATA LOSS Limited data exposed by CSR LOW Send apology letters
Provide credit protection to affected
individuals
Inform State AGs
Moderate amount of data lost or exposed MEDIUM Initiate incident response protocol
Suspected data breach HIGH Initiate crisis management protocol
Consult with corporate counsel, privacy and
compliance officers
Inform Board of Directors
Update communication templates for media,
customers, investors and authorities
Engage forensics teams
Engage external counsel
31. Create generic communication templates for the various possible scenarios and have them vetted and approved by corporate
communication, privacy and legal
Sample Communication-1
We are currently investigating a Denial of Service attack on our website that is resulting in degraded performance. At this time,
we have confirmed that no customer data is impacted. We are working closely with our ISP and our IT service provider to
restore services.
As more information become available, we will be sure to provide you with regular updates.
Sample Communication-2
As of approximately 11:00 am CST, we have become aware of a potential compromise of our network and systems. At this
time, we are unable to confirm the extent of the compromise and whether sensitive data could have been lost. We are
working closely with the authorities and with internal and external cyber security experts to determine the nature and extent
of compromise.
We will provide regular updates on our website at www.abccompany.com and will conduct media briefing as necessary
32. Sample Communication-3
Over the course the past 24 hours we have been able to obtain further details of the incident that affected
[our network, website, systems]. We have confirmed that [nature of the incident, how many people were
affected, what data was lost]. We are still investigating [the cause of the incident, the people/event behind
the incident, extent of the incident].
We have engaged[law enforcement, cyber forensics etc]. We have also enlisted the help of [additional
resources brought in to assist with the incident] to assist us in immediately mitigating the incident.
We will continue to provide you with updates as new information become available. We recommend that
you monitor our website at [insert website address] for the latest information.
33. Borrower’s Name Date:____________
Street Address
City, Zip Code
Dear Mr. ___________
We are writing to inform you of an incident involving your personal information. On (INSERT INCIDENT DATE), an incident occurred
where your non-public information may have been viewed by a third-party.
While we do not believe your information will be misused, out of an abundance of caution we are notifying you so you may take steps
to protect yourself against misuse of your information. Always remember to carefully review your statements every month to identify
any unauthorized transactions. If you see any items on your statement you believe are not yours, please contact us immediately.
Remain vigilant over the next 12 to 24 months and promptly report incidents of suspected identity theft or unauthorized activity to us
and the appropriate law enforcement agency.
To help protect your identity, we are offering a complimentary one (1) year membership of Experian’s ProtectMyIDTM Elite. This
product helps detect possible misuse of your personal information and provides you with superior identity protection services focused
on immediate identification and resolution of identity theft.
Activate ProtectMyID Now in Three Easy Steps:
ENSURE That You Enroll By: INSERT ENROLLMENT DATE
Visit ProtectMyID Web Site: www.protectmyid.com/enroll or call 877-441-6943 to enroll
Your Activation Code (INSERT CODE)
.
.
34. T0
A reputable cyber security blogger has published information on his website indicating that ABC Company may have been affected
by a recent well publicized hack in which customer’s sensitive data was exposed.
The blogger speculates that connection between ABC Company and the publicized hack and provides some evidence that ABC
Company’s account and password information is available on the dark web.
Customers and the media begin to call the company wanting to know if their personal information has been compromised. Media
outlets want to know if the company has an official statement.
Questions for the team
• What is the first course of action?
• What are the immediate priorities?
• What type of communication should be issued?
35. T0 + 7
ABC Company’s CISO receives a call from the FBI who indicate that based on their investigations, they believe that the
compromise of ABC Company’s information systems occurred over 3 months ago. They have reason to believe that large amounts
of customer sensitive data, including credit card numbers may have been exposed.
In the meantime, media attention has steadily increased and newspapers articles and television stories being published. ABC
Company’s employees are being approached by local media outlets for exclusive interviews.
Traffic to the company website has increased and performance has been affected. Customer service calls are creating a backlog
with long wait times.
The Board of Directors is getting inquiries from the media and is asking for urgent updates
Questions for the team
• How does your response to the incident change based on these development
• Have the priorities changed?
• How would you update the communications?
• Who would you engage at this stage?
36. T0 + 21
Media and public response is harsh despite continued PR efforts. There is now open talk of suing the company and authorities
have launched inquiries. The PCI council is involved and insisting on bringing in their their own forensics company.
Forensics teams have found evidence of the hack going back 14 months and traces of ongoing activities. A Chinese organization
dubbed Deep Panda is likely to be involved based on the hash signatures of the Derusbi command and control software.
The Board of Directors is becoming increasingly inpatient and insisting on a comprehensive plan to remediate the current
situation and prevent this scenario from happening again.
ABC Company begins to quantify cost of the breach and determine how much of their investigative efforts and expenditures will
be covered by their cyber insurance policy.
Questions for the team
• How does your response to the incident change based on these development
• Have the priorities changed?
• How would you update the communications?
• Who would you engage at this stage?