SlideShare a Scribd company logo
Cybersecurity
Game Planning for Success
John Dolan & Derrick Helms, CISSP
Agenda
Developing a strategy for success
#WBInsights15#WBInsights15
Overview
Security
Proven Process
Assess
Plan and
Design
Implement
Detect
RemediateReport
Protect
#WBInsights15#WBInsights15
Assess
Plan assessments based on needs
• Risk
• Compliance Requirements
• Vulnerability Assessments
• Policy
• Current security controls
#WBInsights15#WBInsights15
Plan, Design and Implement
Plan and Design
• Asset Patch Management
• Written Information Security Policy
• Security and Compliance/Incident Management Handbook
• Multi-layer Approach
• Roadmap
Implement
• Phased roll-out
• Test group before organization
#WBInsights15#WBInsights15
Protect
Protect in Layers based on Assets
• Network Level
• Host Level
• User Level
• Data in transit
• Remote Access
• BYOD – Smartphones/Tablets
#WBInsights15#WBInsights15
Detect and Remediate
Detect
• Do you know who is accessing your network?
• Do you know who is accessing and changing files?
• Do you know when you users are logging in and out? From
Where?
Remediate
• What are you doing to remediate your findings?
• Is there a action plan or incident management policy on
what to do and a clear understanding of who is
accountable for making sure it gets done?
#WBInsights15#WBInsights15
Report
Define Key information – What is happening?
• Systems
• Software
• Events
• Users
• Incidents
• Web Activity
• File Access
Thank you!
utgsolutions.com
John Dolan
jdolan@utgsolutions.com
678-730-2793
Derrick Helms, CISSP
dhelms@utgsolutions.com
678-730-2742

More Related Content

What's hot

Windows Accelerate IT Pro Bootcamp: Security (Module 4 of 8)
Windows Accelerate IT Pro Bootcamp: Security (Module 4 of 8)Windows Accelerate IT Pro Bootcamp: Security (Module 4 of 8)
Windows Accelerate IT Pro Bootcamp: Security (Module 4 of 8)
Intergen
 
The Loss of Intellectual Property in the Digital Age: What Companies can d…
The Loss of Intellectual Property in the Digital Age: What Companies can d…The Loss of Intellectual Property in the Digital Age: What Companies can d…
The Loss of Intellectual Property in the Digital Age: What Companies can d…
Christopher Kranich
 
GHFCU_CAlberston_Recommendation-Letter
GHFCU_CAlberston_Recommendation-LetterGHFCU_CAlberston_Recommendation-Letter
GHFCU_CAlberston_Recommendation-Letter
Reginald E. Smith II
 
Solving Document Security
Solving Document SecuritySolving Document Security
Solving Document Security
Zia Consulting
 
Talk1 muscl club_v1_2
Talk1 muscl club_v1_2Talk1 muscl club_v1_2
Talk1 muscl club_v1_2
Sylvain Martinez
 
Notifs 2018
Notifs 2018Notifs 2018
Notifs 2018
Jim Fenton
 
Picking the right Single Sign On Tool to protect your network
Picking the right Single Sign On Tool to protect your networkPicking the right Single Sign On Tool to protect your network
Picking the right Single Sign On Tool to protect your network
David Strom
 
Next-Generation Cybersecurity for the Globally Connected Enterprise with Telos
Next-Generation Cybersecurity for the Globally Connected Enterprise with TelosNext-Generation Cybersecurity for the Globally Connected Enterprise with Telos
Next-Generation Cybersecurity for the Globally Connected Enterprise with Telos
Amazon Web Services
 
Event Presentation: Cyber Security for Industrial Control Systems
Event Presentation: Cyber Security for Industrial Control SystemsEvent Presentation: Cyber Security for Industrial Control Systems
Event Presentation: Cyber Security for Industrial Control Systems
Infonaligy
 
Distributed File System and Why It Matters.
Distributed File System and Why It Matters.Distributed File System and Why It Matters.
Distributed File System and Why It Matters.
Omid Mogharian
 
Securing your presence at the perimeter
Securing your presence at the perimeterSecuring your presence at the perimeter
Securing your presence at the perimeter
Ben Rothke
 
Data Classification And Loss Prevention
Data Classification And Loss PreventionData Classification And Loss Prevention
Data Classification And Loss Prevention
Nicholas Davis
 
Lecture Data Classification And Data Loss Prevention
Lecture Data Classification And Data Loss PreventionLecture Data Classification And Data Loss Prevention
Lecture Data Classification And Data Loss Prevention
Nicholas Davis
 
Data privacy & data governance
Data privacy & data governanceData privacy & data governance
Data privacy & data governance
poojasanghavi
 
Mobile application securitry risks ISACA Silicon Valley 2012
Mobile application securitry risks ISACA Silicon Valley 2012Mobile application securitry risks ISACA Silicon Valley 2012
Mobile application securitry risks ISACA Silicon Valley 2012
Symosis Security (Previously C-Level Security)
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application Security
Lenin Aboagye
 
Ciso executive forum 2013
Ciso executive forum 2013Ciso executive forum 2013
Ciso executive forum 2013
Bill Burns
 
MISA Cloud Workshop_ ipc privacy in the cloud
MISA Cloud Workshop_ ipc privacy in the cloudMISA Cloud Workshop_ ipc privacy in the cloud
MISA Cloud Workshop_ ipc privacy in the cloud
MISA Ontario Cloud SIG
 

What's hot (18)

Windows Accelerate IT Pro Bootcamp: Security (Module 4 of 8)
Windows Accelerate IT Pro Bootcamp: Security (Module 4 of 8)Windows Accelerate IT Pro Bootcamp: Security (Module 4 of 8)
Windows Accelerate IT Pro Bootcamp: Security (Module 4 of 8)
 
The Loss of Intellectual Property in the Digital Age: What Companies can d…
The Loss of Intellectual Property in the Digital Age: What Companies can d…The Loss of Intellectual Property in the Digital Age: What Companies can d…
The Loss of Intellectual Property in the Digital Age: What Companies can d…
 
GHFCU_CAlberston_Recommendation-Letter
GHFCU_CAlberston_Recommendation-LetterGHFCU_CAlberston_Recommendation-Letter
GHFCU_CAlberston_Recommendation-Letter
 
Solving Document Security
Solving Document SecuritySolving Document Security
Solving Document Security
 
Talk1 muscl club_v1_2
Talk1 muscl club_v1_2Talk1 muscl club_v1_2
Talk1 muscl club_v1_2
 
Notifs 2018
Notifs 2018Notifs 2018
Notifs 2018
 
Picking the right Single Sign On Tool to protect your network
Picking the right Single Sign On Tool to protect your networkPicking the right Single Sign On Tool to protect your network
Picking the right Single Sign On Tool to protect your network
 
Next-Generation Cybersecurity for the Globally Connected Enterprise with Telos
Next-Generation Cybersecurity for the Globally Connected Enterprise with TelosNext-Generation Cybersecurity for the Globally Connected Enterprise with Telos
Next-Generation Cybersecurity for the Globally Connected Enterprise with Telos
 
Event Presentation: Cyber Security for Industrial Control Systems
Event Presentation: Cyber Security for Industrial Control SystemsEvent Presentation: Cyber Security for Industrial Control Systems
Event Presentation: Cyber Security for Industrial Control Systems
 
Distributed File System and Why It Matters.
Distributed File System and Why It Matters.Distributed File System and Why It Matters.
Distributed File System and Why It Matters.
 
Securing your presence at the perimeter
Securing your presence at the perimeterSecuring your presence at the perimeter
Securing your presence at the perimeter
 
Data Classification And Loss Prevention
Data Classification And Loss PreventionData Classification And Loss Prevention
Data Classification And Loss Prevention
 
Lecture Data Classification And Data Loss Prevention
Lecture Data Classification And Data Loss PreventionLecture Data Classification And Data Loss Prevention
Lecture Data Classification And Data Loss Prevention
 
Data privacy & data governance
Data privacy & data governanceData privacy & data governance
Data privacy & data governance
 
Mobile application securitry risks ISACA Silicon Valley 2012
Mobile application securitry risks ISACA Silicon Valley 2012Mobile application securitry risks ISACA Silicon Valley 2012
Mobile application securitry risks ISACA Silicon Valley 2012
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application Security
 
Ciso executive forum 2013
Ciso executive forum 2013Ciso executive forum 2013
Ciso executive forum 2013
 
MISA Cloud Workshop_ ipc privacy in the cloud
MISA Cloud Workshop_ ipc privacy in the cloudMISA Cloud Workshop_ ipc privacy in the cloud
MISA Cloud Workshop_ ipc privacy in the cloud
 

Similar to Insights 2015 - Cybersecurity- Game Planning for Success

Building a Mobile Security Program
Building a Mobile Security ProgramBuilding a Mobile Security Program
Building a Mobile Security Program
Denim Group
 
What Does a Full Featured Security Strategy Look Like?
What Does a Full Featured Security Strategy Look Like?What Does a Full Featured Security Strategy Look Like?
What Does a Full Featured Security Strategy Look Like?
Precisely
 
Fishnet Security Overview
Fishnet Security   OverviewFishnet Security   Overview
Fishnet Security Overview
tbeckwith
 
IT Compliance and Governance with DLP Controls and Vulnerability Scanning Sof...
IT Compliance and Governance with DLP Controls and Vulnerability Scanning Sof...IT Compliance and Governance with DLP Controls and Vulnerability Scanning Sof...
IT Compliance and Governance with DLP Controls and Vulnerability Scanning Sof...
Skoda Minotti
 
Logicalis BYOD Briefing
Logicalis BYOD BriefingLogicalis BYOD Briefing
Logicalis BYOD Briefing
Logicalis Australia
 
Rightscale Webinar: PCI in Public Cloud
Rightscale Webinar: PCI in Public CloudRightscale Webinar: PCI in Public Cloud
Rightscale Webinar: PCI in Public Cloud
RightScale
 
DCD Converged Brazil 2016
DCD Converged Brazil 2016 DCD Converged Brazil 2016
DCD Converged Brazil 2016
Scott Carlson
 
Outpost24 webinar - The new CISO imperative: connecting technical vulnerabili...
Outpost24 webinar - The new CISO imperative: connecting technical vulnerabili...Outpost24 webinar - The new CISO imperative: connecting technical vulnerabili...
Outpost24 webinar - The new CISO imperative: connecting technical vulnerabili...
Outpost24
 
Starting your Career in Information Security
Starting your Career in Information SecurityStarting your Career in Information Security
Starting your Career in Information Security
Ahmed Sayed-
 
DT Company Overview January 2013
DT Company Overview January 2013DT Company Overview January 2013
DT Company Overview January 2013
DataTactics
 
Scalar Security Roadshow: Toronto Presentation - April 15, 2015
Scalar Security Roadshow: Toronto Presentation - April 15, 2015Scalar Security Roadshow: Toronto Presentation - April 15, 2015
Scalar Security Roadshow: Toronto Presentation - April 15, 2015
Scalar Decisions
 
Aligning Application Security to Compliance
Aligning Application Security to ComplianceAligning Application Security to Compliance
Aligning Application Security to Compliance
Security Innovation
 
[Webinar] Building a Product Security Incident Response Team: Learnings from ...
[Webinar] Building a Product Security Incident Response Team: Learnings from ...[Webinar] Building a Product Security Incident Response Team: Learnings from ...
[Webinar] Building a Product Security Incident Response Team: Learnings from ...
bugcrowd
 
Securing Your Mobile Applications
Securing Your Mobile ApplicationsSecuring Your Mobile Applications
Securing Your Mobile Applications
Greg Patton
 
Securing the Internet of Things
Securing the Internet of ThingsSecuring the Internet of Things
Securing the Internet of Things
Christopher Frenz
 
The SharePoint Migration Playbook
The SharePoint Migration PlaybookThe SharePoint Migration Playbook
The SharePoint Migration Playbook
JoAnna Cheshire
 
The What, Why, and How of DevSecOps
The What, Why, and How of DevSecOpsThe What, Why, and How of DevSecOps
The What, Why, and How of DevSecOps
Cprime
 
Wadoop vivek shrivastava
Wadoop vivek shrivastavaWadoop vivek shrivastava
Wadoop vivek shrivastava
Data Con LA
 
Open House prez.pptx
Open House prez.pptxOpen House prez.pptx
Open House prez.pptx
Joti Lalli
 
Threat Modeling All Day!
Threat Modeling All Day!Threat Modeling All Day!
Threat Modeling All Day!
Steven Carlson
 

Similar to Insights 2015 - Cybersecurity- Game Planning for Success (20)

Building a Mobile Security Program
Building a Mobile Security ProgramBuilding a Mobile Security Program
Building a Mobile Security Program
 
What Does a Full Featured Security Strategy Look Like?
What Does a Full Featured Security Strategy Look Like?What Does a Full Featured Security Strategy Look Like?
What Does a Full Featured Security Strategy Look Like?
 
Fishnet Security Overview
Fishnet Security   OverviewFishnet Security   Overview
Fishnet Security Overview
 
IT Compliance and Governance with DLP Controls and Vulnerability Scanning Sof...
IT Compliance and Governance with DLP Controls and Vulnerability Scanning Sof...IT Compliance and Governance with DLP Controls and Vulnerability Scanning Sof...
IT Compliance and Governance with DLP Controls and Vulnerability Scanning Sof...
 
Logicalis BYOD Briefing
Logicalis BYOD BriefingLogicalis BYOD Briefing
Logicalis BYOD Briefing
 
Rightscale Webinar: PCI in Public Cloud
Rightscale Webinar: PCI in Public CloudRightscale Webinar: PCI in Public Cloud
Rightscale Webinar: PCI in Public Cloud
 
DCD Converged Brazil 2016
DCD Converged Brazil 2016 DCD Converged Brazil 2016
DCD Converged Brazil 2016
 
Outpost24 webinar - The new CISO imperative: connecting technical vulnerabili...
Outpost24 webinar - The new CISO imperative: connecting technical vulnerabili...Outpost24 webinar - The new CISO imperative: connecting technical vulnerabili...
Outpost24 webinar - The new CISO imperative: connecting technical vulnerabili...
 
Starting your Career in Information Security
Starting your Career in Information SecurityStarting your Career in Information Security
Starting your Career in Information Security
 
DT Company Overview January 2013
DT Company Overview January 2013DT Company Overview January 2013
DT Company Overview January 2013
 
Scalar Security Roadshow: Toronto Presentation - April 15, 2015
Scalar Security Roadshow: Toronto Presentation - April 15, 2015Scalar Security Roadshow: Toronto Presentation - April 15, 2015
Scalar Security Roadshow: Toronto Presentation - April 15, 2015
 
Aligning Application Security to Compliance
Aligning Application Security to ComplianceAligning Application Security to Compliance
Aligning Application Security to Compliance
 
[Webinar] Building a Product Security Incident Response Team: Learnings from ...
[Webinar] Building a Product Security Incident Response Team: Learnings from ...[Webinar] Building a Product Security Incident Response Team: Learnings from ...
[Webinar] Building a Product Security Incident Response Team: Learnings from ...
 
Securing Your Mobile Applications
Securing Your Mobile ApplicationsSecuring Your Mobile Applications
Securing Your Mobile Applications
 
Securing the Internet of Things
Securing the Internet of ThingsSecuring the Internet of Things
Securing the Internet of Things
 
The SharePoint Migration Playbook
The SharePoint Migration PlaybookThe SharePoint Migration Playbook
The SharePoint Migration Playbook
 
The What, Why, and How of DevSecOps
The What, Why, and How of DevSecOpsThe What, Why, and How of DevSecOps
The What, Why, and How of DevSecOps
 
Wadoop vivek shrivastava
Wadoop vivek shrivastavaWadoop vivek shrivastava
Wadoop vivek shrivastava
 
Open House prez.pptx
Open House prez.pptxOpen House prez.pptx
Open House prez.pptx
 
Threat Modeling All Day!
Threat Modeling All Day!Threat Modeling All Day!
Threat Modeling All Day!
 

More from Windham Brannon

Insights 2015 - On the Economic, Business, & Political Climate
Insights 2015 - On the Economic, Business, & Political ClimateInsights 2015 - On the Economic, Business, & Political Climate
Insights 2015 - On the Economic, Business, & Political Climate
Windham Brannon
 
Insights 2015 - Family Business
Insights 2015 - Family BusinessInsights 2015 - Family Business
Insights 2015 - Family Business
Windham Brannon
 
Insights 2015 - State and Local Tax Traps for the Unwary - Tim Clancy
Insights 2015 - State and Local Tax Traps for the Unwary - Tim ClancyInsights 2015 - State and Local Tax Traps for the Unwary - Tim Clancy
Insights 2015 - State and Local Tax Traps for the Unwary - Tim Clancy
Windham Brannon
 
Insights 2015 - Accounting Update for Everybody - Chris Rouse
Insights 2015 - Accounting Update for Everybody - Chris RouseInsights 2015 - Accounting Update for Everybody - Chris Rouse
Insights 2015 - Accounting Update for Everybody - Chris Rouse
Windham Brannon
 
Insights 2015 - Accounting Update for Private Companies
Insights 2015 - Accounting Update for Private CompaniesInsights 2015 - Accounting Update for Private Companies
Insights 2015 - Accounting Update for Private Companies
Windham Brannon
 
Insights 2015 - Adaption, Agility and Change from Michalangelo to Google - Pa...
Insights 2015 - Adaption, Agility and Change from Michalangelo to Google - Pa...Insights 2015 - Adaption, Agility and Change from Michalangelo to Google - Pa...
Insights 2015 - Adaption, Agility and Change from Michalangelo to Google - Pa...
Windham Brannon
 
Insights 2015 - Captive Insurance - Doug MacGinnitie
Insights 2015 - Captive Insurance - Doug MacGinnitieInsights 2015 - Captive Insurance - Doug MacGinnitie
Insights 2015 - Captive Insurance - Doug MacGinnitie
Windham Brannon
 
Windham Brannon's ICD-10 Webinar
Windham Brannon's ICD-10 WebinarWindham Brannon's ICD-10 Webinar
Windham Brannon's ICD-10 Webinar
Windham Brannon
 

More from Windham Brannon (8)

Insights 2015 - On the Economic, Business, & Political Climate
Insights 2015 - On the Economic, Business, & Political ClimateInsights 2015 - On the Economic, Business, & Political Climate
Insights 2015 - On the Economic, Business, & Political Climate
 
Insights 2015 - Family Business
Insights 2015 - Family BusinessInsights 2015 - Family Business
Insights 2015 - Family Business
 
Insights 2015 - State and Local Tax Traps for the Unwary - Tim Clancy
Insights 2015 - State and Local Tax Traps for the Unwary - Tim ClancyInsights 2015 - State and Local Tax Traps for the Unwary - Tim Clancy
Insights 2015 - State and Local Tax Traps for the Unwary - Tim Clancy
 
Insights 2015 - Accounting Update for Everybody - Chris Rouse
Insights 2015 - Accounting Update for Everybody - Chris RouseInsights 2015 - Accounting Update for Everybody - Chris Rouse
Insights 2015 - Accounting Update for Everybody - Chris Rouse
 
Insights 2015 - Accounting Update for Private Companies
Insights 2015 - Accounting Update for Private CompaniesInsights 2015 - Accounting Update for Private Companies
Insights 2015 - Accounting Update for Private Companies
 
Insights 2015 - Adaption, Agility and Change from Michalangelo to Google - Pa...
Insights 2015 - Adaption, Agility and Change from Michalangelo to Google - Pa...Insights 2015 - Adaption, Agility and Change from Michalangelo to Google - Pa...
Insights 2015 - Adaption, Agility and Change from Michalangelo to Google - Pa...
 
Insights 2015 - Captive Insurance - Doug MacGinnitie
Insights 2015 - Captive Insurance - Doug MacGinnitieInsights 2015 - Captive Insurance - Doug MacGinnitie
Insights 2015 - Captive Insurance - Doug MacGinnitie
 
Windham Brannon's ICD-10 Webinar
Windham Brannon's ICD-10 WebinarWindham Brannon's ICD-10 Webinar
Windham Brannon's ICD-10 Webinar
 

Recently uploaded

Gregory Harris - Cycle 2 - Civics Presentation
Gregory Harris - Cycle 2 - Civics PresentationGregory Harris - Cycle 2 - Civics Presentation
Gregory Harris - Cycle 2 - Civics Presentation
gharris9
 
原版制作贝德福特大学毕业证(bedfordhire毕业证)硕士文凭原版一模一样
原版制作贝德福特大学毕业证(bedfordhire毕业证)硕士文凭原版一模一样原版制作贝德福特大学毕业证(bedfordhire毕业证)硕士文凭原版一模一样
原版制作贝德福特大学毕业证(bedfordhire毕业证)硕士文凭原版一模一样
gpww3sf4
 
Pro-competitive Industrial Policy – OECD – June 2024 OECD discussion
Pro-competitive Industrial Policy – OECD – June 2024 OECD discussionPro-competitive Industrial Policy – OECD – June 2024 OECD discussion
Pro-competitive Industrial Policy – OECD – June 2024 OECD discussion
OECD Directorate for Financial and Enterprise Affairs
 
Gregory Harris' Civics Presentation.pptx
Gregory Harris' Civics Presentation.pptxGregory Harris' Civics Presentation.pptx
Gregory Harris' Civics Presentation.pptx
gharris9
 
Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024
Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024
Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024
Dutch Power
 
Updated diagnosis. Cause and treatment of hypothyroidism
Updated diagnosis. Cause and treatment of hypothyroidismUpdated diagnosis. Cause and treatment of hypothyroidism
Updated diagnosis. Cause and treatment of hypothyroidism
Faculty of Medicine And Health Sciences
 
Pro-competitive Industrial Policy – LANE – June 2024 OECD discussion
Pro-competitive Industrial Policy – LANE – June 2024 OECD discussionPro-competitive Industrial Policy – LANE – June 2024 OECD discussion
Pro-competitive Industrial Policy – LANE – June 2024 OECD discussion
OECD Directorate for Financial and Enterprise Affairs
 
Artificial Intelligence, Data and Competition – ČORBA – June 2024 OECD discus...
Artificial Intelligence, Data and Competition – ČORBA – June 2024 OECD discus...Artificial Intelligence, Data and Competition – ČORBA – June 2024 OECD discus...
Artificial Intelligence, Data and Competition – ČORBA – June 2024 OECD discus...
OECD Directorate for Financial and Enterprise Affairs
 
2024-05-30_meetup_devops_aix-marseille.pdf
2024-05-30_meetup_devops_aix-marseille.pdf2024-05-30_meetup_devops_aix-marseille.pdf
2024-05-30_meetup_devops_aix-marseille.pdf
Frederic Leger
 
Burning Issue Presentation By Kenmaryon.pdf
Burning Issue Presentation By Kenmaryon.pdfBurning Issue Presentation By Kenmaryon.pdf
Burning Issue Presentation By Kenmaryon.pdf
kkirkland2
 
ASONAM2023_presection_slide_track-recommendation.pdf
ASONAM2023_presection_slide_track-recommendation.pdfASONAM2023_presection_slide_track-recommendation.pdf
ASONAM2023_presection_slide_track-recommendation.pdf
ToshihiroIto4
 
Carrer goals.pptx and their importance in real life
Carrer goals.pptx  and their importance in real lifeCarrer goals.pptx  and their importance in real life
Carrer goals.pptx and their importance in real life
artemacademy2
 
Collapsing Narratives: Exploring Non-Linearity • a micro report by Rosie Wells
Collapsing Narratives: Exploring Non-Linearity • a micro report by Rosie WellsCollapsing Narratives: Exploring Non-Linearity • a micro report by Rosie Wells
Collapsing Narratives: Exploring Non-Linearity • a micro report by Rosie Wells
Rosie Wells
 
Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024
Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024
Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024
Dutch Power
 
XP 2024 presentation: A New Look to Leadership
XP 2024 presentation: A New Look to LeadershipXP 2024 presentation: A New Look to Leadership
XP 2024 presentation: A New Look to Leadership
samililja
 
Suzanne Lagerweij - Influence Without Power - Why Empathy is Your Best Friend...
Suzanne Lagerweij - Influence Without Power - Why Empathy is Your Best Friend...Suzanne Lagerweij - Influence Without Power - Why Empathy is Your Best Friend...
Suzanne Lagerweij - Influence Without Power - Why Empathy is Your Best Friend...
Suzanne Lagerweij
 
Mastering the Concepts Tested in the Databricks Certified Data Engineer Assoc...
Mastering the Concepts Tested in the Databricks Certified Data Engineer Assoc...Mastering the Concepts Tested in the Databricks Certified Data Engineer Assoc...
Mastering the Concepts Tested in the Databricks Certified Data Engineer Assoc...
SkillCertProExams
 
Competition and Regulation in Professions and Occupations – ROBSON – June 202...
Competition and Regulation in Professions and Occupations – ROBSON – June 202...Competition and Regulation in Professions and Occupations – ROBSON – June 202...
Competition and Regulation in Professions and Occupations – ROBSON – June 202...
OECD Directorate for Financial and Enterprise Affairs
 
Mẫu PPT kế hoạch làm việc sáng tạo cho nửa cuối năm PowerPoint
Mẫu PPT kế hoạch làm việc sáng tạo cho nửa cuối năm PowerPointMẫu PPT kế hoạch làm việc sáng tạo cho nửa cuối năm PowerPoint
Mẫu PPT kế hoạch làm việc sáng tạo cho nửa cuối năm PowerPoint
1990 Media
 
Tom tresser burning issue.pptx My Burning issue
Tom tresser burning issue.pptx My Burning issueTom tresser burning issue.pptx My Burning issue
Tom tresser burning issue.pptx My Burning issue
amekonnen
 

Recently uploaded (20)

Gregory Harris - Cycle 2 - Civics Presentation
Gregory Harris - Cycle 2 - Civics PresentationGregory Harris - Cycle 2 - Civics Presentation
Gregory Harris - Cycle 2 - Civics Presentation
 
原版制作贝德福特大学毕业证(bedfordhire毕业证)硕士文凭原版一模一样
原版制作贝德福特大学毕业证(bedfordhire毕业证)硕士文凭原版一模一样原版制作贝德福特大学毕业证(bedfordhire毕业证)硕士文凭原版一模一样
原版制作贝德福特大学毕业证(bedfordhire毕业证)硕士文凭原版一模一样
 
Pro-competitive Industrial Policy – OECD – June 2024 OECD discussion
Pro-competitive Industrial Policy – OECD – June 2024 OECD discussionPro-competitive Industrial Policy – OECD – June 2024 OECD discussion
Pro-competitive Industrial Policy – OECD – June 2024 OECD discussion
 
Gregory Harris' Civics Presentation.pptx
Gregory Harris' Civics Presentation.pptxGregory Harris' Civics Presentation.pptx
Gregory Harris' Civics Presentation.pptx
 
Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024
Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024
Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024
 
Updated diagnosis. Cause and treatment of hypothyroidism
Updated diagnosis. Cause and treatment of hypothyroidismUpdated diagnosis. Cause and treatment of hypothyroidism
Updated diagnosis. Cause and treatment of hypothyroidism
 
Pro-competitive Industrial Policy – LANE – June 2024 OECD discussion
Pro-competitive Industrial Policy – LANE – June 2024 OECD discussionPro-competitive Industrial Policy – LANE – June 2024 OECD discussion
Pro-competitive Industrial Policy – LANE – June 2024 OECD discussion
 
Artificial Intelligence, Data and Competition – ČORBA – June 2024 OECD discus...
Artificial Intelligence, Data and Competition – ČORBA – June 2024 OECD discus...Artificial Intelligence, Data and Competition – ČORBA – June 2024 OECD discus...
Artificial Intelligence, Data and Competition – ČORBA – June 2024 OECD discus...
 
2024-05-30_meetup_devops_aix-marseille.pdf
2024-05-30_meetup_devops_aix-marseille.pdf2024-05-30_meetup_devops_aix-marseille.pdf
2024-05-30_meetup_devops_aix-marseille.pdf
 
Burning Issue Presentation By Kenmaryon.pdf
Burning Issue Presentation By Kenmaryon.pdfBurning Issue Presentation By Kenmaryon.pdf
Burning Issue Presentation By Kenmaryon.pdf
 
ASONAM2023_presection_slide_track-recommendation.pdf
ASONAM2023_presection_slide_track-recommendation.pdfASONAM2023_presection_slide_track-recommendation.pdf
ASONAM2023_presection_slide_track-recommendation.pdf
 
Carrer goals.pptx and their importance in real life
Carrer goals.pptx  and their importance in real lifeCarrer goals.pptx  and their importance in real life
Carrer goals.pptx and their importance in real life
 
Collapsing Narratives: Exploring Non-Linearity • a micro report by Rosie Wells
Collapsing Narratives: Exploring Non-Linearity • a micro report by Rosie WellsCollapsing Narratives: Exploring Non-Linearity • a micro report by Rosie Wells
Collapsing Narratives: Exploring Non-Linearity • a micro report by Rosie Wells
 
Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024
Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024
Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024
 
XP 2024 presentation: A New Look to Leadership
XP 2024 presentation: A New Look to LeadershipXP 2024 presentation: A New Look to Leadership
XP 2024 presentation: A New Look to Leadership
 
Suzanne Lagerweij - Influence Without Power - Why Empathy is Your Best Friend...
Suzanne Lagerweij - Influence Without Power - Why Empathy is Your Best Friend...Suzanne Lagerweij - Influence Without Power - Why Empathy is Your Best Friend...
Suzanne Lagerweij - Influence Without Power - Why Empathy is Your Best Friend...
 
Mastering the Concepts Tested in the Databricks Certified Data Engineer Assoc...
Mastering the Concepts Tested in the Databricks Certified Data Engineer Assoc...Mastering the Concepts Tested in the Databricks Certified Data Engineer Assoc...
Mastering the Concepts Tested in the Databricks Certified Data Engineer Assoc...
 
Competition and Regulation in Professions and Occupations – ROBSON – June 202...
Competition and Regulation in Professions and Occupations – ROBSON – June 202...Competition and Regulation in Professions and Occupations – ROBSON – June 202...
Competition and Regulation in Professions and Occupations – ROBSON – June 202...
 
Mẫu PPT kế hoạch làm việc sáng tạo cho nửa cuối năm PowerPoint
Mẫu PPT kế hoạch làm việc sáng tạo cho nửa cuối năm PowerPointMẫu PPT kế hoạch làm việc sáng tạo cho nửa cuối năm PowerPoint
Mẫu PPT kế hoạch làm việc sáng tạo cho nửa cuối năm PowerPoint
 
Tom tresser burning issue.pptx My Burning issue
Tom tresser burning issue.pptx My Burning issueTom tresser burning issue.pptx My Burning issue
Tom tresser burning issue.pptx My Burning issue
 

Insights 2015 - Cybersecurity- Game Planning for Success

Editor's Notes

  1. Introduction to topic and emphasize that the same core principles are the same across all governing bodies.
  2. JD – Cover overview. Define what I need to do, deploy the needed stuff and then execute. DH –Introduce myself, 15 years, etc. What we do with current clients and who our clients are, Provide Security knowledge, vulnerability assessments, policy reform, etc. Co-Source IT and IT Security Security Staffing Numbers – Some say 1:20 and some say 1:100 to be effective. Understand where you fall and ask yourself is someone really being held accountable for security. Understand that it takes a process. Rome was not built in a day. There is not a finish line. We are not about to talk about a bullet proof vest.
  3. Importance of proper assessment. Risk - What are our risks? What type of data do we have? What is our exposure? What data are we worried about? Partner for what is trending in security. Compliance – Credit Card – PCI, Medical – HIPPA, Vulnerability Assessment – have you ran one? Internal and external, patching Policy- do you have a active police and procedure process Current Security Controls – understand what you have Understand what can hurt my business, maybe it is not data but operational cost.
  4. Asset Patch Management – understand your assets for Patch Management Written Information Security Policy – for the employees understand policy and covers your company from legal signoff Security and Compliance/Incident Management Handbook – how to manual when it comes to your security products and or how to handle security breaches/incidents/etc Multi-layer Approach - Network (IDS/IPS, host-based AV/HIDS and user level Content Filtering/Training/Endpoint Encryption) Roadmap - Rome wasn't built in a day. How will you close the gaps. Set realistic expectations Implement – Phased roll-out and Test Group before rolling out to organization
  5. Devise multi-layer approach. If you’re relying on a single layer of defense you are not protected. Alabama defense example. Network Level- (Firewalls on edge and internal/wireless, IPS/IDS Intrusion Prevention/Detection Systems) Host Level - (AV, Event Monitoring, Content Filtering, Hard Drive encryption, Patch Management) User Level (Training and Content Filtering) Cryptolocker – how to block Data in Transit - (Email Encryption, SSH for File Transmissions) Remote Access - (2factor Authentication) BYOD - Smartphones/Tablets (Email Encryption)
  6. Detect – This is your (IPS/IDS, SIEM, Log Management, etc) This use to be a Enterprise only. Not anymore. Prices have come down and requirements have went up. The detection piece is great but do you have the remediation and or action plan to follow when the detection occurs. Incident Management Plans. Remediation - We spend time to identify weakness but do not hold anyone accountable for remediation. Remediate – this is your Action plans, incident management, etc.
  7. Who is checking? Detect Patches – 88 % of attackers are on known vulnerabilities, 44% of those are on patch 2 years and older. What process or product is providing the information? Is there clear workflows and incident management plans on what to do with information you are getting back? Events, Users, Actions? Who is accountable for the results coming back and ensuring they are addressed? If someone has this as a secondary role then it will always take a back seat which is what usually gets us out of whack. That is where automated systems or monitoring pickup. The reporting piece of the proven process is to give you metrics of what is working and or what is not working in your security practice. Gives you a place to go back.
  8. Closing – Next steps – Gather your team whether it be in house or co sourced and devise a plan. Make sure you are accounting for availability of resources. Start Prioritizing threats and produce your move forward roadmap. Everyone is open for these attacks, big small, financial none financial. Internet means risk. No one wants to spend the Money. There is on direct ROI. It is like buying insurance. The risk is real, we decide to ignore or act on it. Put it on the budget. People have a tendency to shop on logic, purchase on emotion. The money spent in the end cost a lot more then it would up front. We have had customers that call us after the attack and is losing money by the hour. Cryptolocker being the main one. There are best practices to stop it but need it. Check with vendors on patches. Have you staff give you the reports on where you stand.