In March of 2020 I presented a cybersecurity webinar to help educate businesses on the latest threats on the Internet today. This slide deck provides a visual overview of the 50 minute webinar.
10. Locked out of all files.
Your backup has been intentionally erased.
Customer data has been stolen.
You are being asked to pay $25K
Your business will be down for 7 days.
SCENARIO
TO PREVENT
11. WHO IS THE
ATTACKER?
WHAT DO THEY
ATTACK?
WHERE DO ATTACKS
COME FROM?
WHY DO ATTACKS
EVEN HAPPEN?
HOW DO YOU
PROTECT
YOURSELF?
26. New types of viruses
and malware require
new types of
detection. We are
looking for behavior.
27. Opinion: AI and Machine Learning will
power both Cyber Offense and Defense
in 2020. Artificial intelligence and
machine learning hold great promise for
both defenders and attackers, making it
one of the most important security
trends to follow in 2020, says Gerald
Beuchelt, the CISO of LogMeIn.
62. DARK WEB SCANNING
DNS FILTERIING/BLOCKING
AI ANTIVIRUS
MFA ON OFFICE 365 & GSUITE
EMAIL ENCRYPTION 365 EMAIL AND FILES BACKUP
PASSWORD MANAGEMENT APP
DEFENSIVE POLICIES AND PROCEDURES
UNIQUE PASSPHRASE EVERYWHERE
PHISH CAMPAIGN TESTING
HAYSTACKING
Best selling Simon Sinek says to start with Why, so let’s begin there.
There you go. This is the main reason. SURPRISE!
But Chad, my company doesn’t make millions, there is very little value in my data and actually, they can have my company if they really want it!
In the gaming world they call these
Microtransactions
Most people picture this when they think of a cybercriminal.
Truth is, this is more like it.
In fact, just like your business, they hold strategy meetings to discuss their, TARGET MARKET, ESTABLISH REVENUE TARGETS, CREATE ONLINE AND EMAIL MARKETING CAMPAIGNS, CREATE SALES GOALS AND DISTRIBUTE BONUSES.
HECK I IMAGINE THERE MAY EVEN BE FRANCHISES AVAILABLE. FOR THOSE WANTING TO OWN YOUR OWN BUSINESS ONE DAY YOU MAY WANT TO CONSIDER THIS?
THE BUSINESS MODEL FOR RANSOMEWARE IS SO GOOD, IT IS PROJECTED TO BE A 20 BILLION $ BUSINESS NEXT YEAR.
AND CYBERCRIME ACROSS ALL , WELL YOU CAN READ THE SLIDE.
WE HAVE IDENTIFIED THE WHY, THE WHO, , NOW LET’S GET INTO THE WHERE AND HOW.
WE HAVE IDENTIFIED THE WHY, THE WHO, , NOW LET’S GET INTO THE WHERE AND HOW.
WE HAVE IDENTIFIED THE WHY, THE WHO, , NOW LET’S GET INTO THE WHERE AND HOW.
WE HAVE IDENTIFIED THE WHY, THE WHO, , NOW LET’S GET INTO THE WHERE AND HOW.