SlideShare a Scribd company logo
1 of 15
© COPYRIGHTMARS INCORPORATED | CONFIDENTIAL© COPYRIGHTMARS INCORPORATED | CONFIDENTIAL
“My Greatest Learning and Greatest
Achievement from the Summer
Internship at Mars Global Services”.
By: Mackenzie Starcevich
© COPYRIGHTMARS INCORPORATED | CONFIDENTIAL
Agenda
2
Introduction
What I Learned About Mars
What I Learned From My Role
–Examples of projects completed during my internship
What I Learned About Myself
Conclusion
© COPYRIGHTMARS INCORPORATED | CONFIDENTIAL
Introduction
3
Name: Mackenzie Starcevich
School: University of Saint Francis
Studying: Business Administration w/
specialty in Risk Management
Job title: MIS Security Intern
© COPYRIGHTMARS INCORPORATED | CONFIDENTIAL
What I Learned About Mars Inc.
4
 Importance of Five Principles to Mars
Inc.
–They are thought about before making any
type of decision
–Each one is actively demonstrated everyday
• Ex. Efficiency- the recycling system that is all
around MGI
 It is a positive work culture
–Always smiling
–People were friendly and approachable
 Associates have a zig zag career path at
Mars
–You will not be doing the same exact thing
your whole life
–Broaden your experiences within the
company itself
 Candy is EVERYWHERE
© COPYRIGHTMARS INCORPORATED | CONFIDENTIAL
What I Learned About My Position
5
 IT security is important for the
company’s success
 Being on a global team is not
always easy
–For example, trying to schedule
meetings with people from out of
the country.
 Tasks were different everyday
–Projects will show the broad
spectrum of work
 Team collaboration is important
–Learned that from our weekly
governance calls
© COPYRIGHTMARS INCORPORATED | CONFIDENTIAL
Information Security Program Pillars
6
Security Program Pillars
Data Protection RMS instructions
Cyber Monitoring Look-a-Like Domain Testing
Traditional Security
• Risk Form Review
• Risk Acceptance Form
• Risk Calculation Research
• Risk Reporting in Service Now
Governance
• Cyber Security Trends-Audit Committee
Deck
• Bubble Chart Definition Deck- MIS LT Deck
© COPYRIGHTMARS INCORPORATED | CONFIDENTIAL
Example of Governance: Bubble Chart Explanation
7
© COPYRIGHTMARS INCORPORATED | CONFIDENTIAL
Identify
Activities that help
understand the
business & risk
implications of a
cybersecurity breach
Protect
Proactive safeguards to
minimize the potential
for user, information,
or network
compromise or breach
Detect
Activities that enable
detection of user,
information, or
network compromise
or breach
Respond
Activities that capture
and contain the
anomaly to enable
analysis & mitigation
Recover
Activities that enable
recovery and return to
normal business
operations
Example of Traditional Security: National Institute of Standards & Technology
(NIST) Cyber-Security Framework Functions
 Asset
Management
 Business
Environment
 Governance
 Risk
Assessment
 Risk
Management
Strategy
 Access Control
 Risk Awareness /
Training
 Maintenance
 Protective
Technology
 Information
Protection
Processes
 Anomalies &
Events
 Security
Continuous
Monitoring
 Detection
Processes
 Responsibility
Planning
 Communications
 Analysis
 Mitigation
 Improvements
 Recovery
Planning
 Improvements
 Communications
© COPYRIGHTMARS INCORPORATED | CONFIDENTIAL
Examples of Traditional Security- Risk Calculation Research
9
© COPYRIGHTMARS INCORPORATED | CONFIDENTIAL
Cyber Crime
Monetization of Data
• Social Engineering
• Extortion
• Strategic Data Integrity Attack
Primary Risk Areas Effected:
• IP, Sensitive Data Loss
• PII Loss
• Fraud
• Credit Card Data Loss
Insider Threat
Monetization of Data or Espionage
• Privilege abuse
• Misuse of data
• Collusion between insider and outsider
Primary Risk Areas Effected:
• IP, Sensitive Data Loss
• Fraud
• PII Loss
• Credit Card Data Loss
Hacktivism
Decrease in traditional web defacement
and denial of service attacks.
Increase in destructive attacks exposing:
• Incriminating information
• Questionable corporate practices
• 3P and Govt. relationships
Primary Risk Areas Effected:
• Corporate Brand Reputation
Internet of Things
Internet connected physical objects such
as home appliances, fitbits, cars
• Privacy concerns
• Connection to corporate networks
• Physical safety concerns
Primary Risk Areas Effected:
• IP, Sensitive Data Loss
• Disruption to IT Infrastructure
Cyber Espionage
Energy, Healthcare sectors and critical
infrastructure remain attractive targets.
Increased use of non sophisticated attacks
to conduct espionage campaigns.
Primary Risk Areas Effected:
• IP, Sensitive Data Loss
• Corporate Brand Reputation
Security Industry Trends
10
Critical Infrastructure
Increase in the number of industrial control
system (ICS) device vulnerability disclosures.
Targets broadening beyond defense industry
and governments to include energy, oil, mining,
healthcare.
Primary Risk Areas Effected:
• Disruption to Plant Industrial Controls
• Corporate Brand Reputation
© COPYRIGHTMARS INCORPORATED | CONFIDENTIAL
Example of Cyber Monitoring: Domain Look-a-likes
11
© COPYRIGHTMARS INCORPORATED | CONFIDENTIAL12
*ExampleofDataProtection:RMSInstructions
© COPYRIGHTMARS INCORPORATED | CONFIDENTIAL
Examples of Traditional Security- Risk Reporting
13
Estimatedcostofremediationtoassetlayers
© COPYRIGHTMARS INCORPORATED | CONFIDENTIAL
What I Learned About Myself
14
 Enjoy working in a team setting
 IT is more interesting to me than I thought it would be
 Mars is a company that I would love to work for in the future
© COPYRIGHTMARS INCORPORATED | CONFIDENTIAL© COPYRIGHTMARS INCORPORATED | CONFIDENTIAL
Thank you!

More Related Content

What's hot

Information classification
Information classificationInformation classification
Information classificationJyothsna Sridhar
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...International Federation of Accountants
 
Incident Response: Security's Special Teams
Incident Response: Security's Special TeamsIncident Response: Security's Special Teams
Incident Response: Security's Special TeamsResilient Systems
 
Taking a Data-Driven Approach to Business Continuity
Taking a Data-Driven Approach to Business ContinuityTaking a Data-Driven Approach to Business Continuity
Taking a Data-Driven Approach to Business ContinuityResolver Inc.
 
Addressing Future Risks and Legal Challenges of Insider Threats
Addressing Future Risks and Legal Challenges of Insider ThreatsAddressing Future Risks and Legal Challenges of Insider Threats
Addressing Future Risks and Legal Challenges of Insider ThreatsForcepoint LLC
 
Energy Industry Organizational Strategies to Increase Cyber Resiliency
Energy Industry Organizational Strategies to Increase Cyber ResiliencyEnergy Industry Organizational Strategies to Increase Cyber Resiliency
Energy Industry Organizational Strategies to Increase Cyber ResiliencyEnergySec
 
Vulnerability management - beyond scanning
Vulnerability management - beyond scanningVulnerability management - beyond scanning
Vulnerability management - beyond scanningVladimir Jirasek
 
Foley-Cybersecurity-White-Paper_3.9.15
Foley-Cybersecurity-White-Paper_3.9.15Foley-Cybersecurity-White-Paper_3.9.15
Foley-Cybersecurity-White-Paper_3.9.15James Fisher
 
NESCO Town Hall Workforce Development Presentation
NESCO Town Hall Workforce Development PresentationNESCO Town Hall Workforce Development Presentation
NESCO Town Hall Workforce Development PresentationEnergySec
 
Simplifying Security for Cloud Adoption - Defining your game plan
Simplifying Security for Cloud Adoption - Defining your game planSimplifying Security for Cloud Adoption - Defining your game plan
Simplifying Security for Cloud Adoption - Defining your game planSecurestorm
 
Its time to rethink everything a governance risk compliance primer
Its time to rethink everything a governance risk compliance primerIts time to rethink everything a governance risk compliance primer
Its time to rethink everything a governance risk compliance primerEnclaveSecurity
 
Cloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance ChallengesCloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance ChallengesEric Vanderburg
 
Cyber Security and the CEO
Cyber Security and the CEOCyber Security and the CEO
Cyber Security and the CEOMicheal Axelsen
 
2010 State Of Enterprise Security
2010 State Of Enterprise Security2010 State Of Enterprise Security
2010 State Of Enterprise SecuritySymantec
 
Cyber Crime Simulation Game - incl quick overview of ISO 27001
Cyber Crime Simulation Game - incl quick overview of ISO 27001Cyber Crime Simulation Game - incl quick overview of ISO 27001
Cyber Crime Simulation Game - incl quick overview of ISO 27001PECB
 
Cybersecurity Risk Governance
Cybersecurity Risk GovernanceCybersecurity Risk Governance
Cybersecurity Risk GovernanceDan Michaluk
 
The developing world of cyber litigation and compliance
The developing world of cyber litigation and complianceThe developing world of cyber litigation and compliance
The developing world of cyber litigation and compliancePECB
 
BSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing businessBSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing businessJoel Cardella
 
Black Hat USA 2015: A Visual Snapshot of Security Threats, Trends and Ideas
Black Hat USA 2015: A Visual Snapshot of Security Threats, Trends and IdeasBlack Hat USA 2015: A Visual Snapshot of Security Threats, Trends and Ideas
Black Hat USA 2015: A Visual Snapshot of Security Threats, Trends and IdeasTripwire
 
Privacy, Data Security and Anti-Spam Compliance
Privacy, Data Security and Anti-Spam CompliancePrivacy, Data Security and Anti-Spam Compliance
Privacy, Data Security and Anti-Spam ComplianceDan Michaluk
 

What's hot (20)

Information classification
Information classificationInformation classification
Information classification
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
 
Incident Response: Security's Special Teams
Incident Response: Security's Special TeamsIncident Response: Security's Special Teams
Incident Response: Security's Special Teams
 
Taking a Data-Driven Approach to Business Continuity
Taking a Data-Driven Approach to Business ContinuityTaking a Data-Driven Approach to Business Continuity
Taking a Data-Driven Approach to Business Continuity
 
Addressing Future Risks and Legal Challenges of Insider Threats
Addressing Future Risks and Legal Challenges of Insider ThreatsAddressing Future Risks and Legal Challenges of Insider Threats
Addressing Future Risks and Legal Challenges of Insider Threats
 
Energy Industry Organizational Strategies to Increase Cyber Resiliency
Energy Industry Organizational Strategies to Increase Cyber ResiliencyEnergy Industry Organizational Strategies to Increase Cyber Resiliency
Energy Industry Organizational Strategies to Increase Cyber Resiliency
 
Vulnerability management - beyond scanning
Vulnerability management - beyond scanningVulnerability management - beyond scanning
Vulnerability management - beyond scanning
 
Foley-Cybersecurity-White-Paper_3.9.15
Foley-Cybersecurity-White-Paper_3.9.15Foley-Cybersecurity-White-Paper_3.9.15
Foley-Cybersecurity-White-Paper_3.9.15
 
NESCO Town Hall Workforce Development Presentation
NESCO Town Hall Workforce Development PresentationNESCO Town Hall Workforce Development Presentation
NESCO Town Hall Workforce Development Presentation
 
Simplifying Security for Cloud Adoption - Defining your game plan
Simplifying Security for Cloud Adoption - Defining your game planSimplifying Security for Cloud Adoption - Defining your game plan
Simplifying Security for Cloud Adoption - Defining your game plan
 
Its time to rethink everything a governance risk compliance primer
Its time to rethink everything a governance risk compliance primerIts time to rethink everything a governance risk compliance primer
Its time to rethink everything a governance risk compliance primer
 
Cloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance ChallengesCloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance Challenges
 
Cyber Security and the CEO
Cyber Security and the CEOCyber Security and the CEO
Cyber Security and the CEO
 
2010 State Of Enterprise Security
2010 State Of Enterprise Security2010 State Of Enterprise Security
2010 State Of Enterprise Security
 
Cyber Crime Simulation Game - incl quick overview of ISO 27001
Cyber Crime Simulation Game - incl quick overview of ISO 27001Cyber Crime Simulation Game - incl quick overview of ISO 27001
Cyber Crime Simulation Game - incl quick overview of ISO 27001
 
Cybersecurity Risk Governance
Cybersecurity Risk GovernanceCybersecurity Risk Governance
Cybersecurity Risk Governance
 
The developing world of cyber litigation and compliance
The developing world of cyber litigation and complianceThe developing world of cyber litigation and compliance
The developing world of cyber litigation and compliance
 
BSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing businessBSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing business
 
Black Hat USA 2015: A Visual Snapshot of Security Threats, Trends and Ideas
Black Hat USA 2015: A Visual Snapshot of Security Threats, Trends and IdeasBlack Hat USA 2015: A Visual Snapshot of Security Threats, Trends and Ideas
Black Hat USA 2015: A Visual Snapshot of Security Threats, Trends and Ideas
 
Privacy, Data Security and Anti-Spam Compliance
Privacy, Data Security and Anti-Spam CompliancePrivacy, Data Security and Anti-Spam Compliance
Privacy, Data Security and Anti-Spam Compliance
 

Viewers also liked

Mars marketing plan
Mars marketing planMars marketing plan
Mars marketing planMarni Starr
 
Mars incorporated interview questions and answers
Mars incorporated interview questions and answersMars incorporated interview questions and answers
Mars incorporated interview questions and answersPenelopeCruz99
 
Customer Success Story: Mars Inc. [New York]
Customer Success Story: Mars Inc. [New York]Customer Success Story: Mars Inc. [New York]
Customer Success Story: Mars Inc. [New York]SAP Ariba
 
Employee Engagement Case Study: Metropolitan Police: Kingston Branch
Employee Engagement Case Study: Metropolitan Police: Kingston BranchEmployee Engagement Case Study: Metropolitan Police: Kingston Branch
Employee Engagement Case Study: Metropolitan Police: Kingston BranchEngage for Success
 
Mars Incorporated Marketing Analysis
Mars Incorporated Marketing AnalysisMars Incorporated Marketing Analysis
Mars Incorporated Marketing AnalysisEmily Crowther
 
Mars, incorporated strategic swot analysis review
Mars, incorporated   strategic swot analysis reviewMars, incorporated   strategic swot analysis review
Mars, incorporated strategic swot analysis reviewCompanyProfile123
 
Mars Case Study: BITC Workwell Model in Practice
Mars Case Study: BITC Workwell Model in PracticeMars Case Study: BITC Workwell Model in Practice
Mars Case Study: BITC Workwell Model in PracticeEngage for Success
 
ПДСЕР Рівне
ПДСЕР РівнеПДСЕР Рівне
ПДСЕР РівнеZhytloUa
 
Propuesta de una experiencia de aprendizaje innovadora a
Propuesta de una experiencia de aprendizaje innovadora aPropuesta de una experiencia de aprendizaje innovadora a
Propuesta de una experiencia de aprendizaje innovadora aMariana Torres
 
Risk dg 19 may 2016 presentation slides
Risk dg 19 may 2016 presentation slidesRisk dg 19 may 2016 presentation slides
Risk dg 19 may 2016 presentation slidesNabila Gimadi
 
Williams Globalization Paper
Williams Globalization PaperWilliams Globalization Paper
Williams Globalization PaperShanequa Williams
 

Viewers also liked (15)

Mars marketing plan
Mars marketing planMars marketing plan
Mars marketing plan
 
Mars incorporated interview questions and answers
Mars incorporated interview questions and answersMars incorporated interview questions and answers
Mars incorporated interview questions and answers
 
Customer Success Story: Mars Inc. [New York]
Customer Success Story: Mars Inc. [New York]Customer Success Story: Mars Inc. [New York]
Customer Success Story: Mars Inc. [New York]
 
Employee Engagement Case Study: Metropolitan Police: Kingston Branch
Employee Engagement Case Study: Metropolitan Police: Kingston BranchEmployee Engagement Case Study: Metropolitan Police: Kingston Branch
Employee Engagement Case Study: Metropolitan Police: Kingston Branch
 
Mars
MarsMars
Mars
 
Mars Incorporated Marketing Analysis
Mars Incorporated Marketing AnalysisMars Incorporated Marketing Analysis
Mars Incorporated Marketing Analysis
 
Mars, incorporated strategic swot analysis review
Mars, incorporated   strategic swot analysis reviewMars, incorporated   strategic swot analysis review
Mars, incorporated strategic swot analysis review
 
Mars Case Study: BITC Workwell Model in Practice
Mars Case Study: BITC Workwell Model in PracticeMars Case Study: BITC Workwell Model in Practice
Mars Case Study: BITC Workwell Model in Practice
 
ПДСЕР Рівне
ПДСЕР РівнеПДСЕР Рівне
ПДСЕР Рівне
 
CVcurrent
CVcurrentCVcurrent
CVcurrent
 
Augmenta
AugmentaAugmenta
Augmenta
 
Propuesta de una experiencia de aprendizaje innovadora a
Propuesta de una experiencia de aprendizaje innovadora aPropuesta de una experiencia de aprendizaje innovadora a
Propuesta de una experiencia de aprendizaje innovadora a
 
Risk dg 19 may 2016 presentation slides
Risk dg 19 may 2016 presentation slidesRisk dg 19 may 2016 presentation slides
Risk dg 19 may 2016 presentation slides
 
Williams Globalization Paper
Williams Globalization PaperWilliams Globalization Paper
Williams Globalization Paper
 
NCC_Protocol_WEB_2016-07-12
NCC_Protocol_WEB_2016-07-12NCC_Protocol_WEB_2016-07-12
NCC_Protocol_WEB_2016-07-12
 

Similar to Final Presentation

Dealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber ResilienceDealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber ResilienceDonald Tabone
 
IBM Security 2017 Lunch and Learn Series
IBM Security 2017 Lunch and Learn SeriesIBM Security 2017 Lunch and Learn Series
IBM Security 2017 Lunch and Learn SeriesJeff Miller
 
Irv Badr: Managing Risk Safety and Security Compliance
Irv Badr: Managing Risk Safety and Security Compliance Irv Badr: Managing Risk Safety and Security Compliance
Irv Badr: Managing Risk Safety and Security Compliance EnergyTech2015
 
Webinar-MSP+ Cyber Insurance Fina.pptx
Webinar-MSP+  Cyber Insurance Fina.pptxWebinar-MSP+  Cyber Insurance Fina.pptx
Webinar-MSP+ Cyber Insurance Fina.pptxControlCase
 
Cyber security: A roadmap to secure solutions
Cyber security: A roadmap to secure solutionsCyber security: A roadmap to secure solutions
Cyber security: A roadmap to secure solutionsSchneider Electric
 
New technologies - Amer Haza'a
New technologies - Amer Haza'aNew technologies - Amer Haza'a
New technologies - Amer Haza'aFahmi Albaheth
 
A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...Judith Beckhard Cardoso
 
What the GDPR Means for your Cybersecurity Strategy [Webinar Slides]
What the GDPR Means for your Cybersecurity Strategy [Webinar Slides]What the GDPR Means for your Cybersecurity Strategy [Webinar Slides]
What the GDPR Means for your Cybersecurity Strategy [Webinar Slides]TrustArc
 
CIO Summit: Data Security in a Mobile World
CIO Summit: Data Security in a Mobile WorldCIO Summit: Data Security in a Mobile World
CIO Summit: Data Security in a Mobile WorldiMIS
 
CIO Summit: Data Security in a Mobile World
CIO Summit: Data Security in a Mobile WorldCIO Summit: Data Security in a Mobile World
CIO Summit: Data Security in a Mobile WorldiMIS
 
Too Small to Get Hacked? Think Again (Webinar)
Too Small to Get Hacked? Think Again (Webinar)Too Small to Get Hacked? Think Again (Webinar)
Too Small to Get Hacked? Think Again (Webinar)OnRamp
 
Symantec 2011 State of Security Survey Global Findings
Symantec 2011 State of Security Survey Global FindingsSymantec 2011 State of Security Survey Global Findings
Symantec 2011 State of Security Survey Global FindingsSymantec
 
Where There Is Smoke, There is Fire: Extracting Actionable Intelligence from ...
Where There Is Smoke, There is Fire: Extracting Actionable Intelligence from ...Where There Is Smoke, There is Fire: Extracting Actionable Intelligence from ...
Where There Is Smoke, There is Fire: Extracting Actionable Intelligence from ...Enterprise Management Associates
 
The Legal Case for Cybersecurity
The Legal Case for CybersecurityThe Legal Case for Cybersecurity
The Legal Case for CybersecurityShawn Tuma
 
BU-Security-Camp-2020-Guidepoint.pptx
BU-Security-Camp-2020-Guidepoint.pptxBU-Security-Camp-2020-Guidepoint.pptx
BU-Security-Camp-2020-Guidepoint.pptxamyray28
 
Developing a 360° view of risk and compliance
Developing a 360° view of risk and complianceDeveloping a 360° view of risk and compliance
Developing a 360° view of risk and complianceInuit AB
 
The Journey to Cyber Resilience in a World of Fear, Uncertainty and Doubt
The Journey to Cyber Resilience in a World of Fear, Uncertainty and DoubtThe Journey to Cyber Resilience in a World of Fear, Uncertainty and Doubt
The Journey to Cyber Resilience in a World of Fear, Uncertainty and DoubtJohn D. Johnson
 
Introduction to RESILIA and Cyber Resilience
Introduction to RESILIA and Cyber ResilienceIntroduction to RESILIA and Cyber Resilience
Introduction to RESILIA and Cyber ResilienceChristian F. Nissen
 
Understanding New Technology and Security Risks as you respond to COVID-19
Understanding New Technology and Security Risks as you respond to COVID-19Understanding New Technology and Security Risks as you respond to COVID-19
Understanding New Technology and Security Risks as you respond to COVID-19Emma Kelly
 

Similar to Final Presentation (20)

Dealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber ResilienceDealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber Resilience
 
IBM Security 2017 Lunch and Learn Series
IBM Security 2017 Lunch and Learn SeriesIBM Security 2017 Lunch and Learn Series
IBM Security 2017 Lunch and Learn Series
 
Irv Badr: Managing Risk Safety and Security Compliance
Irv Badr: Managing Risk Safety and Security Compliance Irv Badr: Managing Risk Safety and Security Compliance
Irv Badr: Managing Risk Safety and Security Compliance
 
Webinar-MSP+ Cyber Insurance Fina.pptx
Webinar-MSP+  Cyber Insurance Fina.pptxWebinar-MSP+  Cyber Insurance Fina.pptx
Webinar-MSP+ Cyber Insurance Fina.pptx
 
Cyber security: A roadmap to secure solutions
Cyber security: A roadmap to secure solutionsCyber security: A roadmap to secure solutions
Cyber security: A roadmap to secure solutions
 
New technologies - Amer Haza'a
New technologies - Amer Haza'aNew technologies - Amer Haza'a
New technologies - Amer Haza'a
 
A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...
 
What the GDPR Means for your Cybersecurity Strategy [Webinar Slides]
What the GDPR Means for your Cybersecurity Strategy [Webinar Slides]What the GDPR Means for your Cybersecurity Strategy [Webinar Slides]
What the GDPR Means for your Cybersecurity Strategy [Webinar Slides]
 
CIO Summit: Data Security in a Mobile World
CIO Summit: Data Security in a Mobile WorldCIO Summit: Data Security in a Mobile World
CIO Summit: Data Security in a Mobile World
 
CIO Summit: Data Security in a Mobile World
CIO Summit: Data Security in a Mobile WorldCIO Summit: Data Security in a Mobile World
CIO Summit: Data Security in a Mobile World
 
Secure Iowa Oct 2016
Secure Iowa Oct 2016Secure Iowa Oct 2016
Secure Iowa Oct 2016
 
Too Small to Get Hacked? Think Again (Webinar)
Too Small to Get Hacked? Think Again (Webinar)Too Small to Get Hacked? Think Again (Webinar)
Too Small to Get Hacked? Think Again (Webinar)
 
Symantec 2011 State of Security Survey Global Findings
Symantec 2011 State of Security Survey Global FindingsSymantec 2011 State of Security Survey Global Findings
Symantec 2011 State of Security Survey Global Findings
 
Where There Is Smoke, There is Fire: Extracting Actionable Intelligence from ...
Where There Is Smoke, There is Fire: Extracting Actionable Intelligence from ...Where There Is Smoke, There is Fire: Extracting Actionable Intelligence from ...
Where There Is Smoke, There is Fire: Extracting Actionable Intelligence from ...
 
The Legal Case for Cybersecurity
The Legal Case for CybersecurityThe Legal Case for Cybersecurity
The Legal Case for Cybersecurity
 
BU-Security-Camp-2020-Guidepoint.pptx
BU-Security-Camp-2020-Guidepoint.pptxBU-Security-Camp-2020-Guidepoint.pptx
BU-Security-Camp-2020-Guidepoint.pptx
 
Developing a 360° view of risk and compliance
Developing a 360° view of risk and complianceDeveloping a 360° view of risk and compliance
Developing a 360° view of risk and compliance
 
The Journey to Cyber Resilience in a World of Fear, Uncertainty and Doubt
The Journey to Cyber Resilience in a World of Fear, Uncertainty and DoubtThe Journey to Cyber Resilience in a World of Fear, Uncertainty and Doubt
The Journey to Cyber Resilience in a World of Fear, Uncertainty and Doubt
 
Introduction to RESILIA and Cyber Resilience
Introduction to RESILIA and Cyber ResilienceIntroduction to RESILIA and Cyber Resilience
Introduction to RESILIA and Cyber Resilience
 
Understanding New Technology and Security Risks as you respond to COVID-19
Understanding New Technology and Security Risks as you respond to COVID-19Understanding New Technology and Security Risks as you respond to COVID-19
Understanding New Technology and Security Risks as you respond to COVID-19
 

Final Presentation

  • 1. © COPYRIGHTMARS INCORPORATED | CONFIDENTIAL© COPYRIGHTMARS INCORPORATED | CONFIDENTIAL “My Greatest Learning and Greatest Achievement from the Summer Internship at Mars Global Services”. By: Mackenzie Starcevich
  • 2. © COPYRIGHTMARS INCORPORATED | CONFIDENTIAL Agenda 2 Introduction What I Learned About Mars What I Learned From My Role –Examples of projects completed during my internship What I Learned About Myself Conclusion
  • 3. © COPYRIGHTMARS INCORPORATED | CONFIDENTIAL Introduction 3 Name: Mackenzie Starcevich School: University of Saint Francis Studying: Business Administration w/ specialty in Risk Management Job title: MIS Security Intern
  • 4. © COPYRIGHTMARS INCORPORATED | CONFIDENTIAL What I Learned About Mars Inc. 4  Importance of Five Principles to Mars Inc. –They are thought about before making any type of decision –Each one is actively demonstrated everyday • Ex. Efficiency- the recycling system that is all around MGI  It is a positive work culture –Always smiling –People were friendly and approachable  Associates have a zig zag career path at Mars –You will not be doing the same exact thing your whole life –Broaden your experiences within the company itself  Candy is EVERYWHERE
  • 5. © COPYRIGHTMARS INCORPORATED | CONFIDENTIAL What I Learned About My Position 5  IT security is important for the company’s success  Being on a global team is not always easy –For example, trying to schedule meetings with people from out of the country.  Tasks were different everyday –Projects will show the broad spectrum of work  Team collaboration is important –Learned that from our weekly governance calls
  • 6. © COPYRIGHTMARS INCORPORATED | CONFIDENTIAL Information Security Program Pillars 6 Security Program Pillars Data Protection RMS instructions Cyber Monitoring Look-a-Like Domain Testing Traditional Security • Risk Form Review • Risk Acceptance Form • Risk Calculation Research • Risk Reporting in Service Now Governance • Cyber Security Trends-Audit Committee Deck • Bubble Chart Definition Deck- MIS LT Deck
  • 7. © COPYRIGHTMARS INCORPORATED | CONFIDENTIAL Example of Governance: Bubble Chart Explanation 7
  • 8. © COPYRIGHTMARS INCORPORATED | CONFIDENTIAL Identify Activities that help understand the business & risk implications of a cybersecurity breach Protect Proactive safeguards to minimize the potential for user, information, or network compromise or breach Detect Activities that enable detection of user, information, or network compromise or breach Respond Activities that capture and contain the anomaly to enable analysis & mitigation Recover Activities that enable recovery and return to normal business operations Example of Traditional Security: National Institute of Standards & Technology (NIST) Cyber-Security Framework Functions  Asset Management  Business Environment  Governance  Risk Assessment  Risk Management Strategy  Access Control  Risk Awareness / Training  Maintenance  Protective Technology  Information Protection Processes  Anomalies & Events  Security Continuous Monitoring  Detection Processes  Responsibility Planning  Communications  Analysis  Mitigation  Improvements  Recovery Planning  Improvements  Communications
  • 9. © COPYRIGHTMARS INCORPORATED | CONFIDENTIAL Examples of Traditional Security- Risk Calculation Research 9
  • 10. © COPYRIGHTMARS INCORPORATED | CONFIDENTIAL Cyber Crime Monetization of Data • Social Engineering • Extortion • Strategic Data Integrity Attack Primary Risk Areas Effected: • IP, Sensitive Data Loss • PII Loss • Fraud • Credit Card Data Loss Insider Threat Monetization of Data or Espionage • Privilege abuse • Misuse of data • Collusion between insider and outsider Primary Risk Areas Effected: • IP, Sensitive Data Loss • Fraud • PII Loss • Credit Card Data Loss Hacktivism Decrease in traditional web defacement and denial of service attacks. Increase in destructive attacks exposing: • Incriminating information • Questionable corporate practices • 3P and Govt. relationships Primary Risk Areas Effected: • Corporate Brand Reputation Internet of Things Internet connected physical objects such as home appliances, fitbits, cars • Privacy concerns • Connection to corporate networks • Physical safety concerns Primary Risk Areas Effected: • IP, Sensitive Data Loss • Disruption to IT Infrastructure Cyber Espionage Energy, Healthcare sectors and critical infrastructure remain attractive targets. Increased use of non sophisticated attacks to conduct espionage campaigns. Primary Risk Areas Effected: • IP, Sensitive Data Loss • Corporate Brand Reputation Security Industry Trends 10 Critical Infrastructure Increase in the number of industrial control system (ICS) device vulnerability disclosures. Targets broadening beyond defense industry and governments to include energy, oil, mining, healthcare. Primary Risk Areas Effected: • Disruption to Plant Industrial Controls • Corporate Brand Reputation
  • 11. © COPYRIGHTMARS INCORPORATED | CONFIDENTIAL Example of Cyber Monitoring: Domain Look-a-likes 11
  • 12. © COPYRIGHTMARS INCORPORATED | CONFIDENTIAL12 *ExampleofDataProtection:RMSInstructions
  • 13. © COPYRIGHTMARS INCORPORATED | CONFIDENTIAL Examples of Traditional Security- Risk Reporting 13 Estimatedcostofremediationtoassetlayers
  • 14. © COPYRIGHTMARS INCORPORATED | CONFIDENTIAL What I Learned About Myself 14  Enjoy working in a team setting  IT is more interesting to me than I thought it would be  Mars is a company that I would love to work for in the future
  • 15. © COPYRIGHTMARS INCORPORATED | CONFIDENTIAL© COPYRIGHTMARS INCORPORATED | CONFIDENTIAL Thank you!

Editor's Notes

  1. The MVP volunteering event that I participated in during my internship was a great example of the principle mutuality. Everyone is always smiling and you can tell that they love their job and they love working for Mars and that is not always common for people to love their job and the atmosphere. Many people talked about all of the different roles they have had with Mars.
  2. If the company experiences some type of data breach, the company’s brand could be affected and it could hurt them financially. From a lunch and learn with Paul Ryan I learned that it is important to be flexible with everyone when working for a global team and they will be flexible with you. He gave the example of staying late at work to have important meetings with people from Europe. My projects varied every single day and it made the job interesting because I never got bored doing the same exact thing and this actually broadened my knowledge about IT security while doing these tasks. Every Tuesday the governance team meets and they talk about any issues or updates that may have occurred recently. This keeps everyone up to date with all that is going on and brings items to the table that may need to be discussed.
  3. Here are all the different program pillars that I touched on during my experience.
  4. These are some screen shots of a power point that I created to explain a bubble chart which looks just like the one at the bottom of the screen. The bubble chart is a way to show some risks the company may be experiencing. Each bubble is a certain category and their size and location depends on the risk level and the impact of high level risk on Mars. It took me a while to understand this chart and to be honest, I still do not completely understand it!
  5. Another major project I worked on was sorting through all of the risk forms and assigned each one to a NIST standard. Which is the cyber security framework that Mars follows. This was a more difficult task because of the technical terms used in the risk forms, but I did get a better understanding of the NIST framework. A couple weeks ago Kate and I met with individuals to discuss risk forms they have submitted to see if they are still valid. Service now is the application that is going to be launched soon, and it is where associates are able to upload a risk form. It is more organized than the application used now and there are more tools within the application such as the Risk reports that will be talked about.
  6. For this project, I had to research companies who have experienced data breaches and how much it costed the company as a whole. It was difficult to find some of the information but for the most part, it was all available online. This information was needed to show associates examples of what could happen to Mars if we experience a large data breach.
  7. This is some of the research I did that was presented to the audit committee chairmen. To touch on some of the topics, I learned that insider threats are a major threat to companies today and some cases are intentional and some are accidental. This is why security awareness is important for all Mars associates. Cyber crime was the most common security industry trend that I found and it has hurt many large companies. It is definitely something to be aware of everyday.
  8. Greg created this excel sheet to send out to individuals to test out different domain names that could trick people. It will help him determine how quickly associates look at domain names before clicking on a link. I sent this excel sheet out to all the other interns to see how they reacted to the different URLs.
  9. Here are screen shots of the detailed RMS Instructions document that I created. RMS is a way to protect data when it is sent out. RMS enables you to give the recipient unlimited access to the document or you can limit their access. From completing this document I learned how to of course use RMS and I learned how to screen shot on a PC and then turn it into an organized document.
  10. This past week I have been running different risk reports in service now and this is an example of one of the reports that I ran. This report is only information from 15 risk forms but it is showing the estimated cost of remediation to the asset layers which are shown at the bottom of the table.
  11. I have always been apart of a team my whole life, but it has been on a sports team. I learned that my teamwork capability has helped me with my internship this summer and it made me realize I enjoy working in a team setting. I did not have much background in IT and I honestly did not know hardly anything about it. This internship broadened my knowledge about IT security and it made me more interested in it. I eventually would like to get some sort of Computer Science degree to help me with my future career path. My mom always said how great of a company it was but I thought ya ya mom you love your company until I actually starting working for Mars. They care so much about their associates and they provide them with many great benefits. Many company’s focus on profit profit profit but this company cares about so much more and the five principles really proves it all. In conclusion I am thankful for the opportunity I have had here at Mars and I would love to return after I graduate as a full-time associate.