SlideShare a Scribd company logo
1 of 28
Click to edit Master title style
7/17/2017 1
Business
Resilience
Frontier
Communications
June 15, 2016
Sponsored by:
Top Five
Things You Can
Do to Protect
Your Clients
and Your
Business
UCONN Stamford
March 30, 2015
Presented bySponsored by:
Bruce Carlson
President & CEO
Connecticut Technology Council
Introduction
Top Five
Things You Can
Do to Protect
Your Clients
and Your
Business
UCONN Stamford
March 30, 2015
Presented bySponsored by:
Paul Quick
Senior Vice President &
General Manager - Connecticut
Frontier Communications
Welcome
Life
Cycle of
a Data
BreachSponsored by:
P re s e n t e d
b y
Patricia Fisher
President & CEO, JANUS Associates
Board Member, CTC
Chair, CTC Cybersecurity Task Force
Introduction of Speakers
Life
Cycle of
a Data
BreachSponsored by:
Martin
McBride
Presented by
Featured Speaker:
Suzanne Novak
Owner / President
ERUdyne, LLC
Building Business Resilience…
In an “Internet of Things” World
Connecticut Technology Council
CyberSecurity Seminar Series
Suzanne C. Novak
President, ERUdyne, LLC
June 15, 2016
Defining Business Resilience
• A Business Resilient Organization Has the
Following Characteristics:
– Can sustain itself through difficult challenges
– Can adapt to the event and realign itself
– Encourages innovation and forward leaning
operations
– Manages risk by building in transformation
– Has resilient leaders
6/15/2016 7ERUdyne
Defining Business Resilience
• Business Continuity is NOT Business Resilience
– Business continuity is a component of business
resilience
– Most companies stop at business continuity
– Business continuity focuses on recovery,
redundancy and hardening of operational
procedures and technology points of failure
– Business resilience focuses on adaptability,
accessibility and strategy
6/15/2016 8ERUdyne
Building Business Resilience
• Building Business Resilience One Layer at a Time
Facilities/Security
Technology
Data/Applications
Processes
Organization
Strategy
6/15/2016 9ERUdyne
Building Business Resilience
• How to Build Business Resilience in IoT World
– What’s Different?
Facilities/Security
Technology
Data/Applications
Processes
Organization
Strategy
6/15/2016 10ERUdyne
Case Study: Business Resilience
• Overcoming Hurdles with Innovation and Adaptation
– Oreck
• Communications Planning
• Customer Relationships
• Employee Management
• Stakeholder Interaction
• Media Relations
“For resilience builders the greatest risk of all is not
properly managing risk, as a core enabler of growth.”
6/15/2016 11ERUdyne
Business Resilience in an IoT World
Questions?
Suzanne C. Novak
Suzanne.novak@erudyne.com
203-645-2209
6/15/2016 12ERUdyne
Life
Cycle of
a Data
BreachSponsored by:
Martin
McBride
Presented by
Featured Speaker:
Nancy A. D. Hancock
Partner
Pullman & Comley, LLC
Member, CTC Cybersecurity Task Force
Life
Cycle of
a Data
BreachSponsored by:
Martin
McBride
Presented by
Featured Speaker:
Joe Ercolano
Associate Director,
Connecticut Small Business
Development Center
Joe Ercolano,
CTSBDC Associate Director
June 15, 2016
PrepareCT is funded in part through a
Cooperative Agreement with the
U.S. Small Business Administration.
Cybersecurity Seminar Series
Business Resilience
Who is CTSBDC?
• No-cost business advising and other support services
• Hosted by the UConn, School of Business
• National program of the U.S Small Business Administration (SBA)
– 36 years
• Department of Economic and Community Development (DECD)
investment, and local partners
• 13 Advisors at 33 locations
PrepareCT.com
The mission of the CTSBDC is to help grow and
start businesses, so that Connecticut has more
job creation, business start-ups, and financial
investment in its small business community.
What I Will Cover Today
• A few basic preparedness points to keep in
mind
• Resources available
• Financial and business continuity services
available
PrepareCT.com
PrepareCT.com
Disaster Preparedness Training, Worksheets, and Resources
PrepareCT.com
Realistically Assess Risk
• Start with a risk
assessment worksheet
• Assign probability and
impact ratings (1-5)
• Multiply the numbers for
probability and impact
• Results will identify areas
of higher importance
3 5 6 7 Have A Plan
Contact Key Stakeholders
Your message is important. What information you
convey, how you convey it, and when, can either inform,
confuse, or worry others.
Plan to contact
• Employees
• Clients/Customers
• Stakeholders
• Regulatory Agencies
• Media
3 5 6 7 Have A Plan
20
PrepareCT.com
Financial Impact
Consider a disaster which stops your business for 5 days:
• $5,000 received per day in revenue multiplied by 2%
interest payment for overdraft, multiply by 5 days of
outage equals the impact for lost revenue:
$5,000 + 2% Interest x 5 days = $25,500 impact
• A reduction in Goodwill and Customer Confidence
reduces revenue 5% per day for 30 days:
$5,000 – 5% Revenue Loss x 30 days = $7,500 impact
3 5 6 7 Have A Plan
Financial Analysis and Benchmarking
Business Continuity = Growth
GrowCT.com
PrepareCT.com
855-428-7232
CTSBDC@uconn.edu
Facebook.com/GrowCT
Twitter.com/GrowCT
LinkedIn.com/company/ctsbdc
PrepareCT.com
Life
Cycle of
a Data
BreachSponsored by:
Martin
McBride
Presented by
Featured Speaker:
Matt Kozloski
Director of Technology,
Kelser Corporation
Life
Cycle of
a Data
BreachSponsored by:
P re s e n t e d b y
The Panel
Suzanne Novak
Owner & President, ERUdyne, LLC;
Member, CTC Cybersecurity Task Force
Nancy A. D. Hancock
Partner, Pullman & Comley, LLC;
Member, CTC Cybersecurity Task Force
Joe Ercolano
Associate Director,
Connecticut Small Business Development Center
Moderator:
Patricia Fisher
President & CEO, JANUS
Associates; Board
Member, CTC; Chair, CTC
Cybersecurity Task Force
Matt Kozloski
Director of Technology, Kelser Corporation
Life
Cycle of
a Data
BreachSponsored by:
P re s e n t e d
b y
Bruce Carlson
President & CEO
CT Technology Council
Patricia Fisher
President & CEO
JANUS Associates, Inc.
Nancy Hancock
Partner
Pullman and Comley LLC
Richard Harris
Partner
Day Pitney LLP
Rick Huebner
President & CEO
Visual Technologies, Inc.
Lyle Liberman
COO
JANUS Associates, Inc.
Andy McCarthy
VP of Engineering &
Technical Ops,
Western NE Region
Comcast
Suzanne Novak
Owner/President
ERUdyne. LLC
Dr. Leon Pintsov
CEO
SignitSure Inc.
Paige Rasid
COO
CT Technology Council
Larry Selnick
Director, Treasury and
Payment Solutions,
Webster Bank
Ray Umerley
Vice President
Chief Data Protection
Officer, Pitney Bowes
Ron Vernier
SVP and CIO
Hartford Steam Boiler
C y b e r s e c u r i t y Ta s k F o rc e
Life
Cycle of
a Data
BreachSponsored by:
Martin
McBride
Presented by
Cyber Insurance & Cyber Liability
When: September 14 | 9am – 11:30am
Where: The Hartford Club| Hartford
Cost: $25 CTC Members | $35 Non-members $40 at the door
Upcoming Seminar
Sponsored by:

More Related Content

Similar to June 2016 cybersecurityseminarseries final

The secret sauce of Silicon Valley - Marco Marinucci, Jul 2011
The secret sauce of  Silicon Valley - Marco Marinucci, Jul 2011The secret sauce of  Silicon Valley - Marco Marinucci, Jul 2011
The secret sauce of Silicon Valley - Marco Marinucci, Jul 2011Marco Marinucci
 
Digital Disruption Finance Melb Nov 18th 2015
Digital Disruption Finance Melb Nov 18th 2015Digital Disruption Finance Melb Nov 18th 2015
Digital Disruption Finance Melb Nov 18th 2015Coding Workshops for Kids
 
WI Counties Ass'c Education Seminar on Broadband 8.17.15
WI Counties Ass'c Education Seminar on Broadband 8.17.15WI Counties Ass'c Education Seminar on Broadband 8.17.15
WI Counties Ass'c Education Seminar on Broadband 8.17.15WI Broadband
 
2010 sponsor loop
2010 sponsor loop2010 sponsor loop
2010 sponsor loopguest9285a5
 
FIRST-WA-Financial-Planning-May-2020.pdf
FIRST-WA-Financial-Planning-May-2020.pdfFIRST-WA-Financial-Planning-May-2020.pdf
FIRST-WA-Financial-Planning-May-2020.pdfXolaniRadebeRadebe
 
Lessons Learned from Entrepreneurial Initiatives
Lessons Learned from Entrepreneurial InitiativesLessons Learned from Entrepreneurial Initiatives
Lessons Learned from Entrepreneurial InitiativesMichael Gaiss
 
Profile-Dwika-Consultant-USA-v2
Profile-Dwika-Consultant-USA-v2Profile-Dwika-Consultant-USA-v2
Profile-Dwika-Consultant-USA-v2Dwika Sudrajat
 
MWDOC Public Affairs: Focus, Value, Momentum
MWDOC Public Affairs: Focus, Value, MomentumMWDOC Public Affairs: Focus, Value, Momentum
MWDOC Public Affairs: Focus, Value, MomentumTiffany Baca
 
50 best workplaces of the year 2019
50 best workplaces of the year 201950 best workplaces of the year 2019
50 best workplaces of the year 2019Pavan Kumar
 
2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...
2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...
2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...Neil Curran MSc CISSP CRISC CGEIT CISM CISA
 
Finance in Cornwall - 10 May 2016 (Segment 2b)
Finance in Cornwall - 10 May 2016 (Segment 2b)Finance in Cornwall - 10 May 2016 (Segment 2b)
Finance in Cornwall - 10 May 2016 (Segment 2b)PKF Francis Clark
 
2015 Seattle Conference
2015 Seattle Conference2015 Seattle Conference
2015 Seattle ConferenceScott Reynolds
 
SMART Fall 2014 Magazine - Eco Dev - VT Biz
SMART Fall 2014 Magazine - Eco Dev - VT BizSMART Fall 2014 Magazine - Eco Dev - VT Biz
SMART Fall 2014 Magazine - Eco Dev - VT Bizwww.SMARTvt.org
 
Australian CIO Summit 2015 Delegate Pack 3
Australian CIO Summit 2015 Delegate Pack 3Australian CIO Summit 2015 Delegate Pack 3
Australian CIO Summit 2015 Delegate Pack 3Shreetej Mhatre
 
Cloud Computing Cynthia Carpio-beck's Work sample of product-service prese...
Cloud Computing   Cynthia Carpio-beck's  Work sample of product-service prese...Cloud Computing   Cynthia Carpio-beck's  Work sample of product-service prese...
Cloud Computing Cynthia Carpio-beck's Work sample of product-service prese...Cynthia Renée Beck, SCPM, MBA
 
BoomStartup Program Introduction 2011
BoomStartup Program Introduction 2011BoomStartup Program Introduction 2011
BoomStartup Program Introduction 2011Andy White
 

Similar to June 2016 cybersecurityseminarseries final (20)

The secret sauce of Silicon Valley - Marco Marinucci, Jul 2011
The secret sauce of  Silicon Valley - Marco Marinucci, Jul 2011The secret sauce of  Silicon Valley - Marco Marinucci, Jul 2011
The secret sauce of Silicon Valley - Marco Marinucci, Jul 2011
 
Digital Disruption Finance Melb Nov 18th 2015
Digital Disruption Finance Melb Nov 18th 2015Digital Disruption Finance Melb Nov 18th 2015
Digital Disruption Finance Melb Nov 18th 2015
 
20230727 Ambassador_Panel I5O_Skills.pptx
20230727 Ambassador_Panel I5O_Skills.pptx20230727 Ambassador_Panel I5O_Skills.pptx
20230727 Ambassador_Panel I5O_Skills.pptx
 
WI Counties Ass'c Education Seminar on Broadband 8.17.15
WI Counties Ass'c Education Seminar on Broadband 8.17.15WI Counties Ass'c Education Seminar on Broadband 8.17.15
WI Counties Ass'c Education Seminar on Broadband 8.17.15
 
2010 sponsor loop
2010 sponsor loop2010 sponsor loop
2010 sponsor loop
 
06-07 Annual Review
06-07 Annual Review06-07 Annual Review
06-07 Annual Review
 
BDPA Cincinnati Chapter Overview (Jun 2010)
BDPA Cincinnati Chapter Overview (Jun 2010)BDPA Cincinnati Chapter Overview (Jun 2010)
BDPA Cincinnati Chapter Overview (Jun 2010)
 
FIRST-WA-Financial-Planning-May-2020.pdf
FIRST-WA-Financial-Planning-May-2020.pdfFIRST-WA-Financial-Planning-May-2020.pdf
FIRST-WA-Financial-Planning-May-2020.pdf
 
Lessons Learned from Entrepreneurial Initiatives
Lessons Learned from Entrepreneurial InitiativesLessons Learned from Entrepreneurial Initiatives
Lessons Learned from Entrepreneurial Initiatives
 
Profile-Dwika-Consultant-USA-v2
Profile-Dwika-Consultant-USA-v2Profile-Dwika-Consultant-USA-v2
Profile-Dwika-Consultant-USA-v2
 
MWDOC Public Affairs: Focus, Value, Momentum
MWDOC Public Affairs: Focus, Value, MomentumMWDOC Public Affairs: Focus, Value, Momentum
MWDOC Public Affairs: Focus, Value, Momentum
 
50 best workplaces of the year 2019
50 best workplaces of the year 201950 best workplaces of the year 2019
50 best workplaces of the year 2019
 
2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...
2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...
2015 Conference Brochure - Trust Security Agility - Businesses Better Prepare...
 
Finance in Cornwall - 10 May 2016 (Segment 2b)
Finance in Cornwall - 10 May 2016 (Segment 2b)Finance in Cornwall - 10 May 2016 (Segment 2b)
Finance in Cornwall - 10 May 2016 (Segment 2b)
 
2015 Seattle Conference
2015 Seattle Conference2015 Seattle Conference
2015 Seattle Conference
 
SMART Fall 2014 Magazine - Eco Dev - VT Biz
SMART Fall 2014 Magazine - Eco Dev - VT BizSMART Fall 2014 Magazine - Eco Dev - VT Biz
SMART Fall 2014 Magazine - Eco Dev - VT Biz
 
Australian CIO Summit 2015 Delegate Pack 3
Australian CIO Summit 2015 Delegate Pack 3Australian CIO Summit 2015 Delegate Pack 3
Australian CIO Summit 2015 Delegate Pack 3
 
Presidential address
Presidential addressPresidential address
Presidential address
 
Cloud Computing Cynthia Carpio-beck's Work sample of product-service prese...
Cloud Computing   Cynthia Carpio-beck's  Work sample of product-service prese...Cloud Computing   Cynthia Carpio-beck's  Work sample of product-service prese...
Cloud Computing Cynthia Carpio-beck's Work sample of product-service prese...
 
BoomStartup Program Introduction 2011
BoomStartup Program Introduction 2011BoomStartup Program Introduction 2011
BoomStartup Program Introduction 2011
 

Recently uploaded

Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 

Recently uploaded (20)

Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 

June 2016 cybersecurityseminarseries final

  • 1. Click to edit Master title style 7/17/2017 1 Business Resilience Frontier Communications June 15, 2016 Sponsored by:
  • 2. Top Five Things You Can Do to Protect Your Clients and Your Business UCONN Stamford March 30, 2015 Presented bySponsored by: Bruce Carlson President & CEO Connecticut Technology Council Introduction
  • 3. Top Five Things You Can Do to Protect Your Clients and Your Business UCONN Stamford March 30, 2015 Presented bySponsored by: Paul Quick Senior Vice President & General Manager - Connecticut Frontier Communications Welcome
  • 4. Life Cycle of a Data BreachSponsored by: P re s e n t e d b y Patricia Fisher President & CEO, JANUS Associates Board Member, CTC Chair, CTC Cybersecurity Task Force Introduction of Speakers
  • 5. Life Cycle of a Data BreachSponsored by: Martin McBride Presented by Featured Speaker: Suzanne Novak Owner / President ERUdyne, LLC
  • 6. Building Business Resilience… In an “Internet of Things” World Connecticut Technology Council CyberSecurity Seminar Series Suzanne C. Novak President, ERUdyne, LLC June 15, 2016
  • 7. Defining Business Resilience • A Business Resilient Organization Has the Following Characteristics: – Can sustain itself through difficult challenges – Can adapt to the event and realign itself – Encourages innovation and forward leaning operations – Manages risk by building in transformation – Has resilient leaders 6/15/2016 7ERUdyne
  • 8. Defining Business Resilience • Business Continuity is NOT Business Resilience – Business continuity is a component of business resilience – Most companies stop at business continuity – Business continuity focuses on recovery, redundancy and hardening of operational procedures and technology points of failure – Business resilience focuses on adaptability, accessibility and strategy 6/15/2016 8ERUdyne
  • 9. Building Business Resilience • Building Business Resilience One Layer at a Time Facilities/Security Technology Data/Applications Processes Organization Strategy 6/15/2016 9ERUdyne
  • 10. Building Business Resilience • How to Build Business Resilience in IoT World – What’s Different? Facilities/Security Technology Data/Applications Processes Organization Strategy 6/15/2016 10ERUdyne
  • 11. Case Study: Business Resilience • Overcoming Hurdles with Innovation and Adaptation – Oreck • Communications Planning • Customer Relationships • Employee Management • Stakeholder Interaction • Media Relations “For resilience builders the greatest risk of all is not properly managing risk, as a core enabler of growth.” 6/15/2016 11ERUdyne
  • 12. Business Resilience in an IoT World Questions? Suzanne C. Novak Suzanne.novak@erudyne.com 203-645-2209 6/15/2016 12ERUdyne
  • 13. Life Cycle of a Data BreachSponsored by: Martin McBride Presented by Featured Speaker: Nancy A. D. Hancock Partner Pullman & Comley, LLC Member, CTC Cybersecurity Task Force
  • 14. Life Cycle of a Data BreachSponsored by: Martin McBride Presented by Featured Speaker: Joe Ercolano Associate Director, Connecticut Small Business Development Center
  • 15. Joe Ercolano, CTSBDC Associate Director June 15, 2016 PrepareCT is funded in part through a Cooperative Agreement with the U.S. Small Business Administration. Cybersecurity Seminar Series Business Resilience
  • 16. Who is CTSBDC? • No-cost business advising and other support services • Hosted by the UConn, School of Business • National program of the U.S Small Business Administration (SBA) – 36 years • Department of Economic and Community Development (DECD) investment, and local partners • 13 Advisors at 33 locations PrepareCT.com The mission of the CTSBDC is to help grow and start businesses, so that Connecticut has more job creation, business start-ups, and financial investment in its small business community.
  • 17. What I Will Cover Today • A few basic preparedness points to keep in mind • Resources available • Financial and business continuity services available
  • 19. PrepareCT.com Realistically Assess Risk • Start with a risk assessment worksheet • Assign probability and impact ratings (1-5) • Multiply the numbers for probability and impact • Results will identify areas of higher importance 3 5 6 7 Have A Plan
  • 20. Contact Key Stakeholders Your message is important. What information you convey, how you convey it, and when, can either inform, confuse, or worry others. Plan to contact • Employees • Clients/Customers • Stakeholders • Regulatory Agencies • Media 3 5 6 7 Have A Plan 20
  • 21. PrepareCT.com Financial Impact Consider a disaster which stops your business for 5 days: • $5,000 received per day in revenue multiplied by 2% interest payment for overdraft, multiply by 5 days of outage equals the impact for lost revenue: $5,000 + 2% Interest x 5 days = $25,500 impact • A reduction in Goodwill and Customer Confidence reduces revenue 5% per day for 30 days: $5,000 – 5% Revenue Loss x 30 days = $7,500 impact 3 5 6 7 Have A Plan
  • 22. Financial Analysis and Benchmarking
  • 25. Life Cycle of a Data BreachSponsored by: Martin McBride Presented by Featured Speaker: Matt Kozloski Director of Technology, Kelser Corporation
  • 26. Life Cycle of a Data BreachSponsored by: P re s e n t e d b y The Panel Suzanne Novak Owner & President, ERUdyne, LLC; Member, CTC Cybersecurity Task Force Nancy A. D. Hancock Partner, Pullman & Comley, LLC; Member, CTC Cybersecurity Task Force Joe Ercolano Associate Director, Connecticut Small Business Development Center Moderator: Patricia Fisher President & CEO, JANUS Associates; Board Member, CTC; Chair, CTC Cybersecurity Task Force Matt Kozloski Director of Technology, Kelser Corporation
  • 27. Life Cycle of a Data BreachSponsored by: P re s e n t e d b y Bruce Carlson President & CEO CT Technology Council Patricia Fisher President & CEO JANUS Associates, Inc. Nancy Hancock Partner Pullman and Comley LLC Richard Harris Partner Day Pitney LLP Rick Huebner President & CEO Visual Technologies, Inc. Lyle Liberman COO JANUS Associates, Inc. Andy McCarthy VP of Engineering & Technical Ops, Western NE Region Comcast Suzanne Novak Owner/President ERUdyne. LLC Dr. Leon Pintsov CEO SignitSure Inc. Paige Rasid COO CT Technology Council Larry Selnick Director, Treasury and Payment Solutions, Webster Bank Ray Umerley Vice President Chief Data Protection Officer, Pitney Bowes Ron Vernier SVP and CIO Hartford Steam Boiler C y b e r s e c u r i t y Ta s k F o rc e
  • 28. Life Cycle of a Data BreachSponsored by: Martin McBride Presented by Cyber Insurance & Cyber Liability When: September 14 | 9am – 11:30am Where: The Hartford Club| Hartford Cost: $25 CTC Members | $35 Non-members $40 at the door Upcoming Seminar Sponsored by:

Editor's Notes

  1. Open for Q&A……