SlideShare a Scribd company logo
Cyber-Security: Problem > Solutions >Actions
Agenda
• Problem
• Hacker Economy
• Legal and Regulatory Environment
• Business Impact
• Solutions
• Cyber Strategies
• Strengths / Weaknesses
• Actions
• Risk Analysis
• Priorities
• Roadmap and Action Plan
Problem
$445 Billion Global Cost in 2015*
Confidential3
* McAfee, Net Losses: Estimating the Global Cost of Cybercrime
Recent Global Data Losses
In 2015
• 85% increase in companies
choosing not to report the
number of records lost
• 43% of all attacks targeted at
small businesses with less than
250 employees
• Over 1,000,000 daily web
attacks against people
• 55% increase in spear-phishing
campaigns targeting employees
• 35% increase in ransomware
4
2015 total reported exposed identities jumped 23% to 429 million
www.informationisbeautiful.net
5
Ransomware is on the Rise
38% of organizations have been targeted by cyber-extortion
2016 Internet Security Threat Report
Cybercrime is Big Business, with product developers,
distributors, brokers, individuals, and gangs all trying to
monetize your sensitive information.
• Product Developers
Exploit Tools, Zero Day
Researchers, Malware Writers
• Distributors & Brokers
As a Service Providers,
Marketplace Owners, Tool
Vendors, Hosted System Providers
• Individuals and Gangs
Utilize widely available tools and
resources to research and target
companies and individuals
Credit Cards: $1 to $30
Payment Accounts: $20 - $300
Health Care Records: $10 to $50
Identities, & Accounts: $1 to $100s
Crypto Ransom: $15,000+
Intellectual Property: $MM to $BB
Confidential6
Source: McAfee The Hidden Data Economy
Inside the mind of a hacker: It’s a business and time is
money. Most are looking for targets of opportunity -
increasingly small and medium size businesses
Percent of Surveyed Hackers who Agree or Strongly Agree Percent
Hackers go after the easiest targets first 72%
Automated hacking tools make it easier to execute attacks 68%
Hacker tools are highly effective for exploiting targeted organizations 64%
Attacks are deterred by an increase of 40 hours to conduct an attack 60%
Time & resources to execute successful attacks have decreased 56%
Most hackers can be defeated with common sense controls 47%
Confidential7
Source: Flipping the Economics of Attacks Ponemon Institute, 2016
Direct legal, forensic, notification, and PR costs of a
breach can be substantial. Many of the highest claims
have been in small and medium size businesses.
Based on a 2015 insurance claim
study by NetDiligence:
• The average cost for Crisis Services
was $499,710
• The average cost for legal defense was
$434,354.
• The average cost for legal settlement
was $880,839.
• 46% of claims were for organizations
under $300M. 71% for organizations
under $2B
• There was insider involvement in 32%
of the claims submitted.
Confidential8
$0
$2,000,000
$4,000,000
$6,000,000
$8,000,000
$10,000,000
$12,000,000
$14,000,000
$16,000,000
-
20,000,000
40,000,000
60,000,000
80,000,000
100,000,000
120,000,000
Under $50M $50M to
$300M
$300M to
$2B
$2B to $10B $10B+
totalInsuredCosts
RecordsExposed
Insurance Payouts
Max in Study Sample
Records Exposed Total Insured Costs 2015 NetDiligence® Cyber Claims Study
Damage to a company’s brand is estimated to cost 7.5 times more than the direct
costs of recovering from an attack.
Confidential9
7.5X
Kaspersky: CYBERCRIMINALS: UNMASKING THE VILLAIN
CEOs and Boards Top Concerns
10
• 61% ranked cybersecurity/IT as a
top concern to their board
• 67% indicated their boards
engaged internal or external
auditors to monitor or address
cybersecurity risk
Eisner Amper: Concerns About Risks Confronting Boards
The Growing Involvement of Boards
“To me, it’s about teaching the Board that security is not some
hairy monster out there hiding in the dark. Instead, it’s a risk
that can be managed as an economic decision,”
Stuart Berman of Steelcase
• 45% of Boards participate in the
overall security strategy
• 24% increase in security spending
was attributed to Boards
participation in cybersecurity
budget discussions
• Board level involvement and the
purchase of insurance can reduce
the cost of a data breach.
• National Association for Corporate
Directors (NACD) guidelines advise
that Boards should view cyber-risks
from an enterprise- wide standpoint
11
PWC: The Global State of Information Security® Survey 2016
The Legal and Regulatory environment is evolving, with
new case law and a complex array of federal and state
agencies battling over jurisdiction.
• Federal Law
• Federal Trade Commission Act
• Gramm-Leach-Bliley Act
• Fair Credit Reporting Act
• Children's Online Privacy
Protection Act
• Sarbanes-Oxley (SOX)
• HIPPA/HITECH
• State Law
• Consumer Protection Acts
• Data Breach Notification Statutes
Confidential12
Organizations must seek legal
guidance to:
• Assess their internal cyber-
security positon and risks
• Understand their third-party
obligations and risks
• Have a breach response plan
• Manage, in confidence,
communications with all affected
parties
Solutions
An evolving set of tactics
Confidential13
Basic: The Walled City
• Initial defensive strategy
• Focus on keeping intruders at
bay with:
• Firewalls
• Passwords
• Virus Protection
• Once in, may have unlimited
access
Confidential14
Stronger: Moat and Castle
• Next Generation Strategy
• Focus on layers of protection
with:
• Defense in depth
• Vulnerability scanning and
patching
• Segregated networks
• Limited use of administrative
passwords
• Once in, more difficult to exploit
Confidential15
Advanced: The Shopping Mall
• Evolving strategy
• Focus on watching and taking
action on bad actors while
limiting usefulness of exploits
• Monitoring
• Encryption
• Honey Pots
• Big data use profiles and alerts
• Quickly find and stop intrusions
Confidential16
Goal: Two Men and a Bear
• Economic and Due Care strategy
• Exceed industry and regulatory
standards:
• Focus on implementing
sufficient security controls to
make it too costly for
criminals to exploit
• Criminals move on to the
next target
• Minimize legal and regulatory
exposure
Confidential17
Actions
Addressing Cyber Risk
Confidential18
Actions
Confidential19
• Conduct a cyber-security assessment
• Establish a cyber roadmap and action planAssess
• Based on identified risks and priorities,
implement people, process and technology
initiatives
Implement
• Have a breach response plan in place
• Have the extended team contracted for and
ready to go
Be Ready
Assessment provides clear measurements of key
issues for your particular environment
Threat Assessment
Understand what could truly
harm the organization
• Identify key threats and risks
specific to the organization &
its industry
Technology Environment
Understand the current
technology environment
• Systems
• Networks
• Information Stores
• Partner/Supplier/Customer
Integration
Organizational Environment
Understand the current
organizational environment
• People
• Skills
• Capabilities
• Resources
• Cyber Awareness
Control Environment
Assess current cyber security
capabilities & controls
• Regulatory Requirements
• Control Framework
• Control Activities (Policies,
Procedures, Technology,
Management)
• Actual use and
implementation
• Resilience Strategy &
Capability
Recommendations
Executive Summary
• Overall vulnerabilities
• What’s working
• What could be improved
• Control areas to focus on
• Implementation Roadmap
• Assessment Summary by Key
Control Area
Confidential20
Interviews, Data Gathering, & Direct Observations Action Plans
Confidential21
Probability of Occurrence High ++++Low +
High ++++
Low +
Potential
Impact
Theft / Loss
of Patient
PHI & PII
SAMPLE THREAT MATRIX
Loss of
Funds
Loss of
System
Resources
Theft / Loss
of Provider
PII
Theft / Loss
of Employee
PII
Loss of
Confidential
Management
Information
Impact and probability of occurrence are relative and judgmentally
based on potential financial/reputational loss, the value of information
to external parties and current trends in cyber-security exploits.
Theft of
Donor
Information
Example Recommended
Cyber Strategies
• Improve cyber-security culture
• Reduce data and system exposures
• Make it too expensive for attackers
• Increase ability to detect
compromise
• Improve 3rd party security &
contractual obligations
• Practice crisis response plan
• Provide for long-term sustainability
Confidential22
Resilience Planning – Preparing for the
inevitable
Current
Environment
Key Threats
Information
Supply Chain
Security Controls
& Organization
Response
Plans
Organizational
Responsibilities
Breach Response
Checklist
Communication
Strategies
Monitoring &
Tracking Solutions
Response
Team
Legal
Forensics
Insurance
Public Relations
Surge Capabilities
Legal
Requirements
Compliance &
Regulatory
Notification
Contractual
Financial
Exposure
Cyber Insurance
Contractual
Obligations
Contractual
Support / Risk
Sharing
Confidential23
Conclusions
Exercising Due Care
Confidential24
Conclusions
• Cybersecurity is a Business Problem that
affects the entire organization and not just IT
• The risk cannot be ignored
• There is no one size that fits all. Every
organization is unique.
• Cyber assessments and breach response
should be performed under attorney client
privilege.
• The right partners can reduce complexity and
cost
• The time to start an assessment is now
Confidential25
Contact Information
Joe Nathans
Partner
Technology Services
NextLevel
1420 Fifth Ave.
Suite 2200
Seattle, WA 98101
Mobile: 425.931.8102
Joe.nathans@nlbev.com
www.nlbev.com
Chuck Gottschalk
CEO & Founder
NextLevel
1420 Fifth Ave.
Suite 2200
Seattle, WA 98101
Mobile: 206.420.1222
Ofiice: 206.915.1839
Chuck.Gottschalk@nlbev.com
www.nlbev.com
26 Confidential

More Related Content

What's hot

Cybersecurity Interview Questions Part -2.pdf
Cybersecurity Interview Questions Part -2.pdfCybersecurity Interview Questions Part -2.pdf
Cybersecurity Interview Questions Part -2.pdf
Infosec Train
 
cyber security PPT
cyber security PPTcyber security PPT
cyber security PPT
Nitesh Dubey
 
Rothke secure360 building a security operations center (soc)
Rothke   secure360 building a security operations center (soc)Rothke   secure360 building a security operations center (soc)
Rothke secure360 building a security operations center (soc)
Ben Rothke
 
Zero Trust
Zero TrustZero Trust
Zero Trust
Boaz Shunami
 
Splunk Security Session - .conf Go Köln
Splunk Security Session - .conf Go KölnSplunk Security Session - .conf Go Köln
Splunk Security Session - .conf Go Köln
Splunk
 
Cyber Threat Hunting Training (CCTHP)
Cyber Threat Hunting Training (CCTHP)Cyber Threat Hunting Training (CCTHP)
Cyber Threat Hunting Training (CCTHP)
ENOInstitute
 
The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)
PECB
 
Building an Analytics Enables SOC
Building an Analytics Enables SOCBuilding an Analytics Enables SOC
Building an Analytics Enables SOC
Splunk
 
Network security - Defense in Depth
Network security - Defense in DepthNetwork security - Defense in Depth
Network security - Defense in Depth
Dilum Bandara
 
SOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterSOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations Center
Michael Nickle
 
Threat Hunting
Threat HuntingThreat Hunting
Threat Hunting
Splunk
 
Cyber Security For Organization Proposal PowerPoint Presentation Slides
Cyber Security For Organization Proposal PowerPoint Presentation SlidesCyber Security For Organization Proposal PowerPoint Presentation Slides
Cyber Security For Organization Proposal PowerPoint Presentation Slides
SlideTeam
 
Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)
k33a
 
Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?
Zscaler
 
Zero trust in a hybrid architecture
Zero trust in a hybrid architectureZero trust in a hybrid architecture
Zero trust in a hybrid architecture
Hybrid IT Europe
 
cyber security presentation.pptx
cyber security presentation.pptxcyber security presentation.pptx
cyber security presentation.pptx
kishore golla
 
Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]
David Sweigert
 
Rothke rsa 2012 building a security operations center (soc)
Rothke rsa 2012  building a security operations center (soc)Rothke rsa 2012  building a security operations center (soc)
Rothke rsa 2012 building a security operations center (soc)
Ben Rothke
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Prabhat kumar Suman
 
PaloAlto Enterprise Security Solution
PaloAlto Enterprise Security SolutionPaloAlto Enterprise Security Solution
PaloAlto Enterprise Security Solution
Prime Infoserv
 

What's hot (20)

Cybersecurity Interview Questions Part -2.pdf
Cybersecurity Interview Questions Part -2.pdfCybersecurity Interview Questions Part -2.pdf
Cybersecurity Interview Questions Part -2.pdf
 
cyber security PPT
cyber security PPTcyber security PPT
cyber security PPT
 
Rothke secure360 building a security operations center (soc)
Rothke   secure360 building a security operations center (soc)Rothke   secure360 building a security operations center (soc)
Rothke secure360 building a security operations center (soc)
 
Zero Trust
Zero TrustZero Trust
Zero Trust
 
Splunk Security Session - .conf Go Köln
Splunk Security Session - .conf Go KölnSplunk Security Session - .conf Go Köln
Splunk Security Session - .conf Go Köln
 
Cyber Threat Hunting Training (CCTHP)
Cyber Threat Hunting Training (CCTHP)Cyber Threat Hunting Training (CCTHP)
Cyber Threat Hunting Training (CCTHP)
 
The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)
 
Building an Analytics Enables SOC
Building an Analytics Enables SOCBuilding an Analytics Enables SOC
Building an Analytics Enables SOC
 
Network security - Defense in Depth
Network security - Defense in DepthNetwork security - Defense in Depth
Network security - Defense in Depth
 
SOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterSOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations Center
 
Threat Hunting
Threat HuntingThreat Hunting
Threat Hunting
 
Cyber Security For Organization Proposal PowerPoint Presentation Slides
Cyber Security For Organization Proposal PowerPoint Presentation SlidesCyber Security For Organization Proposal PowerPoint Presentation Slides
Cyber Security For Organization Proposal PowerPoint Presentation Slides
 
Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)
 
Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?
 
Zero trust in a hybrid architecture
Zero trust in a hybrid architectureZero trust in a hybrid architecture
Zero trust in a hybrid architecture
 
cyber security presentation.pptx
cyber security presentation.pptxcyber security presentation.pptx
cyber security presentation.pptx
 
Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]
 
Rothke rsa 2012 building a security operations center (soc)
Rothke rsa 2012  building a security operations center (soc)Rothke rsa 2012  building a security operations center (soc)
Rothke rsa 2012 building a security operations center (soc)
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
PaloAlto Enterprise Security Solution
PaloAlto Enterprise Security SolutionPaloAlto Enterprise Security Solution
PaloAlto Enterprise Security Solution
 

Viewers also liked

Introduksjon til funksjonell reaktiv programmering
Introduksjon til funksjonell reaktiv programmeringIntroduksjon til funksjonell reaktiv programmering
Introduksjon til funksjonell reaktiv programmering
mikaelbr
 
Rica Belna _ Art for Interior Design (Graphic + Photo PDF) - meeting your int...
Rica Belna _ Art for Interior Design (Graphic + Photo PDF) - meeting your int...Rica Belna _ Art for Interior Design (Graphic + Photo PDF) - meeting your int...
Rica Belna _ Art for Interior Design (Graphic + Photo PDF) - meeting your int...
Petra Trimmel - Product Management Hub | Art-Y-Sana
 
I’m not okay – my chemical romance
I’m not okay – my chemical romanceI’m not okay – my chemical romance
I’m not okay – my chemical romance
CharLilyMay
 
Contextual Inquiry: Information Flow
Contextual Inquiry: Information FlowContextual Inquiry: Information Flow
Contextual Inquiry: Information Flow
Jackie Wolf
 
Hukum Newton Gravitasi
Hukum Newton GravitasiHukum Newton Gravitasi
Hukum Newton Gravitasi
Mira Pribadi
 
Location, risk assessment and casting
Location, risk assessment and castingLocation, risk assessment and casting
Location, risk assessment and casting
CharLilyMay
 
Jetfuel superburn
Jetfuel superburnJetfuel superburn
Jetfuel superburn
Paul Davidson
 
Heidi Beachler UDL Presentation
Heidi Beachler UDL PresentationHeidi Beachler UDL Presentation
Heidi Beachler UDL Presentation
Beachlhm
 
Presentazione dsa gen 2013 (3)corretta
Presentazione dsa gen 2013 (3)correttaPresentazione dsa gen 2013 (3)corretta
Presentazione dsa gen 2013 (3)correttaloryRo
 
Team11
Team11Team11
Team11
YGHCC14
 
Botacora de tecnologia1
Botacora de tecnologia1Botacora de tecnologia1
Botacora de tecnologia1
Orianitha Arboleda
 
The design process
The design processThe design process
The design process
KGforTRU
 
電撃の巨人 by チームモスキート
電撃の巨人 by チームモスキート電撃の巨人 by チームモスキート
電撃の巨人 by チームモスキート
JunOhashi
 
Decade of 60´s
Decade of 60´sDecade of 60´s
Decade of 60´s
Magaly_Denisse
 
Function of Mobile Jammer
Function of Mobile JammerFunction of Mobile Jammer
Function of Mobile Jammer
Professional Packers & Movers Pvt. Ltd.
 
Random 130528114933-phpapp02
Random 130528114933-phpapp02Random 130528114933-phpapp02
Random 130528114933-phpapp02Harut Harutunyan
 
The ISE Spoken Interview (1)
The ISE Spoken Interview (1)The ISE Spoken Interview (1)
The ISE Spoken Interview (1)
Ulises Escarcega-Prieto
 
Intro to Tools & Resources: UMSI Orientation Fall 2014
Intro to Tools & Resources: UMSI Orientation Fall 2014Intro to Tools & Resources: UMSI Orientation Fall 2014
Intro to Tools & Resources: UMSI Orientation Fall 2014
Jackie Wolf
 
Trabajo polítecnica grupo tc consulting - indra souto -
  Trabajo polítecnica grupo tc consulting - indra souto -  Trabajo polítecnica grupo tc consulting - indra souto -
Trabajo polítecnica grupo tc consulting - indra souto -Daniel Muinos
 

Viewers also liked (20)

Introduksjon til funksjonell reaktiv programmering
Introduksjon til funksjonell reaktiv programmeringIntroduksjon til funksjonell reaktiv programmering
Introduksjon til funksjonell reaktiv programmering
 
Rica Belna _ Art for Interior Design (Graphic + Photo PDF) - meeting your int...
Rica Belna _ Art for Interior Design (Graphic + Photo PDF) - meeting your int...Rica Belna _ Art for Interior Design (Graphic + Photo PDF) - meeting your int...
Rica Belna _ Art for Interior Design (Graphic + Photo PDF) - meeting your int...
 
I’m not okay – my chemical romance
I’m not okay – my chemical romanceI’m not okay – my chemical romance
I’m not okay – my chemical romance
 
Contextual Inquiry: Information Flow
Contextual Inquiry: Information FlowContextual Inquiry: Information Flow
Contextual Inquiry: Information Flow
 
Hukum Newton Gravitasi
Hukum Newton GravitasiHukum Newton Gravitasi
Hukum Newton Gravitasi
 
Location, risk assessment and casting
Location, risk assessment and castingLocation, risk assessment and casting
Location, risk assessment and casting
 
Jetfuel superburn
Jetfuel superburnJetfuel superburn
Jetfuel superburn
 
Heidi Beachler UDL Presentation
Heidi Beachler UDL PresentationHeidi Beachler UDL Presentation
Heidi Beachler UDL Presentation
 
Presentazione dsa gen 2013 (3)corretta
Presentazione dsa gen 2013 (3)correttaPresentazione dsa gen 2013 (3)corretta
Presentazione dsa gen 2013 (3)corretta
 
Team11
Team11Team11
Team11
 
Botacora de tecnologia1
Botacora de tecnologia1Botacora de tecnologia1
Botacora de tecnologia1
 
The design process
The design processThe design process
The design process
 
電撃の巨人 by チームモスキート
電撃の巨人 by チームモスキート電撃の巨人 by チームモスキート
電撃の巨人 by チームモスキート
 
Decade of 60´s
Decade of 60´sDecade of 60´s
Decade of 60´s
 
Function of Mobile Jammer
Function of Mobile JammerFunction of Mobile Jammer
Function of Mobile Jammer
 
Random 130528114933-phpapp02
Random 130528114933-phpapp02Random 130528114933-phpapp02
Random 130528114933-phpapp02
 
fisika Gerak
fisika Gerakfisika Gerak
fisika Gerak
 
The ISE Spoken Interview (1)
The ISE Spoken Interview (1)The ISE Spoken Interview (1)
The ISE Spoken Interview (1)
 
Intro to Tools & Resources: UMSI Orientation Fall 2014
Intro to Tools & Resources: UMSI Orientation Fall 2014Intro to Tools & Resources: UMSI Orientation Fall 2014
Intro to Tools & Resources: UMSI Orientation Fall 2014
 
Trabajo polítecnica grupo tc consulting - indra souto -
  Trabajo polítecnica grupo tc consulting - indra souto -  Trabajo polítecnica grupo tc consulting - indra souto -
Trabajo polítecnica grupo tc consulting - indra souto -
 

Similar to NextLevel Cyber Security Executive Briefing

Cyber Response and Planning for SMBs
Cyber Response and Planning for SMBsCyber Response and Planning for SMBs
Cyber Response and Planning for SMBs
Mary Brophy
 
David doughty presentation 181119
David doughty presentation 181119David doughty presentation 181119
David doughty presentation 181119
David Doughty
 
Data Security: Why You Need Data Loss Prevention & How to Justify It
Data Security: Why You Need Data Loss Prevention & How to Justify ItData Security: Why You Need Data Loss Prevention & How to Justify It
Data Security: Why You Need Data Loss Prevention & How to Justify It
Marc Crudgington, MBA
 
Steel Point Solutions IAS Track 3 "Sustaining a Cyber Workforce" by L.T. Hawkins
Steel Point Solutions IAS Track 3 "Sustaining a Cyber Workforce" by L.T. HawkinsSteel Point Solutions IAS Track 3 "Sustaining a Cyber Workforce" by L.T. Hawkins
Steel Point Solutions IAS Track 3 "Sustaining a Cyber Workforce" by L.T. Hawkins
lthawkins
 
CYBER SECURITY FOR LAW FIRMS
CYBER SECURITY FOR LAW FIRMSCYBER SECURITY FOR LAW FIRMS
CYBER SECURITY FOR LAW FIRMS
Scott Suhy
 
Insight2014 mitigate risk_fraud_6863
Insight2014 mitigate risk_fraud_6863Insight2014 mitigate risk_fraud_6863
Insight2014 mitigate risk_fraud_6863
IBMgbsNA
 
Core Elements of Retail LP Shortened version 15MB
Core Elements of Retail LP Shortened version 15MBCore Elements of Retail LP Shortened version 15MB
Core Elements of Retail LP Shortened version 15MB
Alan Greggo
 
4th Digital Finance Forum, Simon Brady
4th Digital Finance Forum, Simon Brady4th Digital Finance Forum, Simon Brady
4th Digital Finance Forum, Simon Brady
Starttech Ventures
 
Introduction to Incident Response Management
Introduction to Incident Response ManagementIntroduction to Incident Response Management
Introduction to Incident Response Management
Don Caeiro
 
A Brave New World of Cyber Security and Data Breach
A Brave New World of Cyber Security and Data BreachA Brave New World of Cyber Security and Data Breach
A Brave New World of Cyber Security and Data Breach
Jim Brashear
 
Final presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit planFinal presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit plan
Cameron Forbes Over
 
Final presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit planFinal presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit plan
Cameron Forbes Over
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
Krist Davood - Principal - CIO
 
mHealth Israel_Cyber Risk in Healthcare_Mary Alice Annecharico_CIO Henry Ford...
mHealth Israel_Cyber Risk in Healthcare_Mary Alice Annecharico_CIO Henry Ford...mHealth Israel_Cyber Risk in Healthcare_Mary Alice Annecharico_CIO Henry Ford...
mHealth Israel_Cyber Risk in Healthcare_Mary Alice Annecharico_CIO Henry Ford...
Levi Shapiro
 
Colorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptx
Colorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptxColorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptx
Colorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptx
AkramAlqadasi1
 
Cyber Security: Threat and Prevention
Cyber Security: Threat and PreventionCyber Security: Threat and Prevention
Cyber Security: Threat and Prevention
fmi_igf
 
How to handle data breach incidents under GDPR
How to handle data breach incidents under GDPRHow to handle data breach incidents under GDPR
How to handle data breach incidents under GDPR
Charlie Pownall
 
Using international standards to improve US cybersecurity
Using international standards to improve US cybersecurityUsing international standards to improve US cybersecurity
Using international standards to improve US cybersecurity
IT Governance Ltd
 
Corporate Treasurers Focus on Cyber Security
Corporate Treasurers Focus on Cyber SecurityCorporate Treasurers Focus on Cyber Security
Corporate Treasurers Focus on Cyber Security
Joan Weber
 
Securing Fintech: Threats, Challenges & Best Practices
Securing Fintech: Threats, Challenges & Best PracticesSecuring Fintech: Threats, Challenges & Best Practices
Securing Fintech: Threats, Challenges & Best Practices
Ulf Mattsson
 

Similar to NextLevel Cyber Security Executive Briefing (20)

Cyber Response and Planning for SMBs
Cyber Response and Planning for SMBsCyber Response and Planning for SMBs
Cyber Response and Planning for SMBs
 
David doughty presentation 181119
David doughty presentation 181119David doughty presentation 181119
David doughty presentation 181119
 
Data Security: Why You Need Data Loss Prevention & How to Justify It
Data Security: Why You Need Data Loss Prevention & How to Justify ItData Security: Why You Need Data Loss Prevention & How to Justify It
Data Security: Why You Need Data Loss Prevention & How to Justify It
 
Steel Point Solutions IAS Track 3 "Sustaining a Cyber Workforce" by L.T. Hawkins
Steel Point Solutions IAS Track 3 "Sustaining a Cyber Workforce" by L.T. HawkinsSteel Point Solutions IAS Track 3 "Sustaining a Cyber Workforce" by L.T. Hawkins
Steel Point Solutions IAS Track 3 "Sustaining a Cyber Workforce" by L.T. Hawkins
 
CYBER SECURITY FOR LAW FIRMS
CYBER SECURITY FOR LAW FIRMSCYBER SECURITY FOR LAW FIRMS
CYBER SECURITY FOR LAW FIRMS
 
Insight2014 mitigate risk_fraud_6863
Insight2014 mitigate risk_fraud_6863Insight2014 mitigate risk_fraud_6863
Insight2014 mitigate risk_fraud_6863
 
Core Elements of Retail LP Shortened version 15MB
Core Elements of Retail LP Shortened version 15MBCore Elements of Retail LP Shortened version 15MB
Core Elements of Retail LP Shortened version 15MB
 
4th Digital Finance Forum, Simon Brady
4th Digital Finance Forum, Simon Brady4th Digital Finance Forum, Simon Brady
4th Digital Finance Forum, Simon Brady
 
Introduction to Incident Response Management
Introduction to Incident Response ManagementIntroduction to Incident Response Management
Introduction to Incident Response Management
 
A Brave New World of Cyber Security and Data Breach
A Brave New World of Cyber Security and Data BreachA Brave New World of Cyber Security and Data Breach
A Brave New World of Cyber Security and Data Breach
 
Final presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit planFinal presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit plan
 
Final presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit planFinal presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit plan
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 
mHealth Israel_Cyber Risk in Healthcare_Mary Alice Annecharico_CIO Henry Ford...
mHealth Israel_Cyber Risk in Healthcare_Mary Alice Annecharico_CIO Henry Ford...mHealth Israel_Cyber Risk in Healthcare_Mary Alice Annecharico_CIO Henry Ford...
mHealth Israel_Cyber Risk in Healthcare_Mary Alice Annecharico_CIO Henry Ford...
 
Colorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptx
Colorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptxColorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptx
Colorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptx
 
Cyber Security: Threat and Prevention
Cyber Security: Threat and PreventionCyber Security: Threat and Prevention
Cyber Security: Threat and Prevention
 
How to handle data breach incidents under GDPR
How to handle data breach incidents under GDPRHow to handle data breach incidents under GDPR
How to handle data breach incidents under GDPR
 
Using international standards to improve US cybersecurity
Using international standards to improve US cybersecurityUsing international standards to improve US cybersecurity
Using international standards to improve US cybersecurity
 
Corporate Treasurers Focus on Cyber Security
Corporate Treasurers Focus on Cyber SecurityCorporate Treasurers Focus on Cyber Security
Corporate Treasurers Focus on Cyber Security
 
Securing Fintech: Threats, Challenges & Best Practices
Securing Fintech: Threats, Challenges & Best PracticesSecuring Fintech: Threats, Challenges & Best Practices
Securing Fintech: Threats, Challenges & Best Practices
 

Recently uploaded

XP 2024 presentation: A New Look to Leadership
XP 2024 presentation: A New Look to LeadershipXP 2024 presentation: A New Look to Leadership
XP 2024 presentation: A New Look to Leadership
samililja
 
Updated diagnosis. Cause and treatment of hypothyroidism
Updated diagnosis. Cause and treatment of hypothyroidismUpdated diagnosis. Cause and treatment of hypothyroidism
Updated diagnosis. Cause and treatment of hypothyroidism
Faculty of Medicine And Health Sciences
 
Burning Issue Presentation By Kenmaryon.pdf
Burning Issue Presentation By Kenmaryon.pdfBurning Issue Presentation By Kenmaryon.pdf
Burning Issue Presentation By Kenmaryon.pdf
kkirkland2
 
2024-05-30_meetup_devops_aix-marseille.pdf
2024-05-30_meetup_devops_aix-marseille.pdf2024-05-30_meetup_devops_aix-marseille.pdf
2024-05-30_meetup_devops_aix-marseille.pdf
Frederic Leger
 
Suzanne Lagerweij - Influence Without Power - Why Empathy is Your Best Friend...
Suzanne Lagerweij - Influence Without Power - Why Empathy is Your Best Friend...Suzanne Lagerweij - Influence Without Power - Why Empathy is Your Best Friend...
Suzanne Lagerweij - Influence Without Power - Why Empathy is Your Best Friend...
Suzanne Lagerweij
 
Gregory Harris - Cycle 2 - Civics Presentation
Gregory Harris - Cycle 2 - Civics PresentationGregory Harris - Cycle 2 - Civics Presentation
Gregory Harris - Cycle 2 - Civics Presentation
gharris9
 
ASONAM2023_presection_slide_track-recommendation.pdf
ASONAM2023_presection_slide_track-recommendation.pdfASONAM2023_presection_slide_track-recommendation.pdf
ASONAM2023_presection_slide_track-recommendation.pdf
ToshihiroIto4
 
Carrer goals.pptx and their importance in real life
Carrer goals.pptx  and their importance in real lifeCarrer goals.pptx  and their importance in real life
Carrer goals.pptx and their importance in real life
artemacademy2
 
Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024
Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024
Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024
Dutch Power
 
Mẫu PPT kế hoạch làm việc sáng tạo cho nửa cuối năm PowerPoint
Mẫu PPT kế hoạch làm việc sáng tạo cho nửa cuối năm PowerPointMẫu PPT kế hoạch làm việc sáng tạo cho nửa cuối năm PowerPoint
Mẫu PPT kế hoạch làm việc sáng tạo cho nửa cuối năm PowerPoint
1990 Media
 
Competition and Regulation in Professions and Occupations – ROBSON – June 202...
Competition and Regulation in Professions and Occupations – ROBSON – June 202...Competition and Regulation in Professions and Occupations – ROBSON – June 202...
Competition and Regulation in Professions and Occupations – ROBSON – June 202...
OECD Directorate for Financial and Enterprise Affairs
 
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdfSupercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Access Innovations, Inc.
 
Collapsing Narratives: Exploring Non-Linearity • a micro report by Rosie Wells
Collapsing Narratives: Exploring Non-Linearity • a micro report by Rosie WellsCollapsing Narratives: Exploring Non-Linearity • a micro report by Rosie Wells
Collapsing Narratives: Exploring Non-Linearity • a micro report by Rosie Wells
Rosie Wells
 
Tom tresser burning issue.pptx My Burning issue
Tom tresser burning issue.pptx My Burning issueTom tresser burning issue.pptx My Burning issue
Tom tresser burning issue.pptx My Burning issue
amekonnen
 
Competition and Regulation in Professions and Occupations – OECD – June 2024 ...
Competition and Regulation in Professions and Occupations – OECD – June 2024 ...Competition and Regulation in Professions and Occupations – OECD – June 2024 ...
Competition and Regulation in Professions and Occupations – OECD – June 2024 ...
OECD Directorate for Financial and Enterprise Affairs
 
Mastering the Concepts Tested in the Databricks Certified Data Engineer Assoc...
Mastering the Concepts Tested in the Databricks Certified Data Engineer Assoc...Mastering the Concepts Tested in the Databricks Certified Data Engineer Assoc...
Mastering the Concepts Tested in the Databricks Certified Data Engineer Assoc...
SkillCertProExams
 
Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024
Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024
Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024
Dutch Power
 
Gregory Harris' Civics Presentation.pptx
Gregory Harris' Civics Presentation.pptxGregory Harris' Civics Presentation.pptx
Gregory Harris' Civics Presentation.pptx
gharris9
 
Media as a Mind Controlling Strategy In Old and Modern Era
Media as a Mind Controlling Strategy In Old and Modern EraMedia as a Mind Controlling Strategy In Old and Modern Era
Media as a Mind Controlling Strategy In Old and Modern Era
faizulhassanfaiz1670
 

Recently uploaded (19)

XP 2024 presentation: A New Look to Leadership
XP 2024 presentation: A New Look to LeadershipXP 2024 presentation: A New Look to Leadership
XP 2024 presentation: A New Look to Leadership
 
Updated diagnosis. Cause and treatment of hypothyroidism
Updated diagnosis. Cause and treatment of hypothyroidismUpdated diagnosis. Cause and treatment of hypothyroidism
Updated diagnosis. Cause and treatment of hypothyroidism
 
Burning Issue Presentation By Kenmaryon.pdf
Burning Issue Presentation By Kenmaryon.pdfBurning Issue Presentation By Kenmaryon.pdf
Burning Issue Presentation By Kenmaryon.pdf
 
2024-05-30_meetup_devops_aix-marseille.pdf
2024-05-30_meetup_devops_aix-marseille.pdf2024-05-30_meetup_devops_aix-marseille.pdf
2024-05-30_meetup_devops_aix-marseille.pdf
 
Suzanne Lagerweij - Influence Without Power - Why Empathy is Your Best Friend...
Suzanne Lagerweij - Influence Without Power - Why Empathy is Your Best Friend...Suzanne Lagerweij - Influence Without Power - Why Empathy is Your Best Friend...
Suzanne Lagerweij - Influence Without Power - Why Empathy is Your Best Friend...
 
Gregory Harris - Cycle 2 - Civics Presentation
Gregory Harris - Cycle 2 - Civics PresentationGregory Harris - Cycle 2 - Civics Presentation
Gregory Harris - Cycle 2 - Civics Presentation
 
ASONAM2023_presection_slide_track-recommendation.pdf
ASONAM2023_presection_slide_track-recommendation.pdfASONAM2023_presection_slide_track-recommendation.pdf
ASONAM2023_presection_slide_track-recommendation.pdf
 
Carrer goals.pptx and their importance in real life
Carrer goals.pptx  and their importance in real lifeCarrer goals.pptx  and their importance in real life
Carrer goals.pptx and their importance in real life
 
Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024
Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024
Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024
 
Mẫu PPT kế hoạch làm việc sáng tạo cho nửa cuối năm PowerPoint
Mẫu PPT kế hoạch làm việc sáng tạo cho nửa cuối năm PowerPointMẫu PPT kế hoạch làm việc sáng tạo cho nửa cuối năm PowerPoint
Mẫu PPT kế hoạch làm việc sáng tạo cho nửa cuối năm PowerPoint
 
Competition and Regulation in Professions and Occupations – ROBSON – June 202...
Competition and Regulation in Professions and Occupations – ROBSON – June 202...Competition and Regulation in Professions and Occupations – ROBSON – June 202...
Competition and Regulation in Professions and Occupations – ROBSON – June 202...
 
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdfSupercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
 
Collapsing Narratives: Exploring Non-Linearity • a micro report by Rosie Wells
Collapsing Narratives: Exploring Non-Linearity • a micro report by Rosie WellsCollapsing Narratives: Exploring Non-Linearity • a micro report by Rosie Wells
Collapsing Narratives: Exploring Non-Linearity • a micro report by Rosie Wells
 
Tom tresser burning issue.pptx My Burning issue
Tom tresser burning issue.pptx My Burning issueTom tresser burning issue.pptx My Burning issue
Tom tresser burning issue.pptx My Burning issue
 
Competition and Regulation in Professions and Occupations – OECD – June 2024 ...
Competition and Regulation in Professions and Occupations – OECD – June 2024 ...Competition and Regulation in Professions and Occupations – OECD – June 2024 ...
Competition and Regulation in Professions and Occupations – OECD – June 2024 ...
 
Mastering the Concepts Tested in the Databricks Certified Data Engineer Assoc...
Mastering the Concepts Tested in the Databricks Certified Data Engineer Assoc...Mastering the Concepts Tested in the Databricks Certified Data Engineer Assoc...
Mastering the Concepts Tested in the Databricks Certified Data Engineer Assoc...
 
Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024
Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024
Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024
 
Gregory Harris' Civics Presentation.pptx
Gregory Harris' Civics Presentation.pptxGregory Harris' Civics Presentation.pptx
Gregory Harris' Civics Presentation.pptx
 
Media as a Mind Controlling Strategy In Old and Modern Era
Media as a Mind Controlling Strategy In Old and Modern EraMedia as a Mind Controlling Strategy In Old and Modern Era
Media as a Mind Controlling Strategy In Old and Modern Era
 

NextLevel Cyber Security Executive Briefing

  • 1. Cyber-Security: Problem > Solutions >Actions
  • 2. Agenda • Problem • Hacker Economy • Legal and Regulatory Environment • Business Impact • Solutions • Cyber Strategies • Strengths / Weaknesses • Actions • Risk Analysis • Priorities • Roadmap and Action Plan
  • 3. Problem $445 Billion Global Cost in 2015* Confidential3 * McAfee, Net Losses: Estimating the Global Cost of Cybercrime
  • 4. Recent Global Data Losses In 2015 • 85% increase in companies choosing not to report the number of records lost • 43% of all attacks targeted at small businesses with less than 250 employees • Over 1,000,000 daily web attacks against people • 55% increase in spear-phishing campaigns targeting employees • 35% increase in ransomware 4 2015 total reported exposed identities jumped 23% to 429 million www.informationisbeautiful.net
  • 5. 5 Ransomware is on the Rise 38% of organizations have been targeted by cyber-extortion 2016 Internet Security Threat Report
  • 6. Cybercrime is Big Business, with product developers, distributors, brokers, individuals, and gangs all trying to monetize your sensitive information. • Product Developers Exploit Tools, Zero Day Researchers, Malware Writers • Distributors & Brokers As a Service Providers, Marketplace Owners, Tool Vendors, Hosted System Providers • Individuals and Gangs Utilize widely available tools and resources to research and target companies and individuals Credit Cards: $1 to $30 Payment Accounts: $20 - $300 Health Care Records: $10 to $50 Identities, & Accounts: $1 to $100s Crypto Ransom: $15,000+ Intellectual Property: $MM to $BB Confidential6 Source: McAfee The Hidden Data Economy
  • 7. Inside the mind of a hacker: It’s a business and time is money. Most are looking for targets of opportunity - increasingly small and medium size businesses Percent of Surveyed Hackers who Agree or Strongly Agree Percent Hackers go after the easiest targets first 72% Automated hacking tools make it easier to execute attacks 68% Hacker tools are highly effective for exploiting targeted organizations 64% Attacks are deterred by an increase of 40 hours to conduct an attack 60% Time & resources to execute successful attacks have decreased 56% Most hackers can be defeated with common sense controls 47% Confidential7 Source: Flipping the Economics of Attacks Ponemon Institute, 2016
  • 8. Direct legal, forensic, notification, and PR costs of a breach can be substantial. Many of the highest claims have been in small and medium size businesses. Based on a 2015 insurance claim study by NetDiligence: • The average cost for Crisis Services was $499,710 • The average cost for legal defense was $434,354. • The average cost for legal settlement was $880,839. • 46% of claims were for organizations under $300M. 71% for organizations under $2B • There was insider involvement in 32% of the claims submitted. Confidential8 $0 $2,000,000 $4,000,000 $6,000,000 $8,000,000 $10,000,000 $12,000,000 $14,000,000 $16,000,000 - 20,000,000 40,000,000 60,000,000 80,000,000 100,000,000 120,000,000 Under $50M $50M to $300M $300M to $2B $2B to $10B $10B+ totalInsuredCosts RecordsExposed Insurance Payouts Max in Study Sample Records Exposed Total Insured Costs 2015 NetDiligence® Cyber Claims Study
  • 9. Damage to a company’s brand is estimated to cost 7.5 times more than the direct costs of recovering from an attack. Confidential9 7.5X Kaspersky: CYBERCRIMINALS: UNMASKING THE VILLAIN
  • 10. CEOs and Boards Top Concerns 10 • 61% ranked cybersecurity/IT as a top concern to their board • 67% indicated their boards engaged internal or external auditors to monitor or address cybersecurity risk Eisner Amper: Concerns About Risks Confronting Boards
  • 11. The Growing Involvement of Boards “To me, it’s about teaching the Board that security is not some hairy monster out there hiding in the dark. Instead, it’s a risk that can be managed as an economic decision,” Stuart Berman of Steelcase • 45% of Boards participate in the overall security strategy • 24% increase in security spending was attributed to Boards participation in cybersecurity budget discussions • Board level involvement and the purchase of insurance can reduce the cost of a data breach. • National Association for Corporate Directors (NACD) guidelines advise that Boards should view cyber-risks from an enterprise- wide standpoint 11 PWC: The Global State of Information Security® Survey 2016
  • 12. The Legal and Regulatory environment is evolving, with new case law and a complex array of federal and state agencies battling over jurisdiction. • Federal Law • Federal Trade Commission Act • Gramm-Leach-Bliley Act • Fair Credit Reporting Act • Children's Online Privacy Protection Act • Sarbanes-Oxley (SOX) • HIPPA/HITECH • State Law • Consumer Protection Acts • Data Breach Notification Statutes Confidential12 Organizations must seek legal guidance to: • Assess their internal cyber- security positon and risks • Understand their third-party obligations and risks • Have a breach response plan • Manage, in confidence, communications with all affected parties
  • 13. Solutions An evolving set of tactics Confidential13
  • 14. Basic: The Walled City • Initial defensive strategy • Focus on keeping intruders at bay with: • Firewalls • Passwords • Virus Protection • Once in, may have unlimited access Confidential14
  • 15. Stronger: Moat and Castle • Next Generation Strategy • Focus on layers of protection with: • Defense in depth • Vulnerability scanning and patching • Segregated networks • Limited use of administrative passwords • Once in, more difficult to exploit Confidential15
  • 16. Advanced: The Shopping Mall • Evolving strategy • Focus on watching and taking action on bad actors while limiting usefulness of exploits • Monitoring • Encryption • Honey Pots • Big data use profiles and alerts • Quickly find and stop intrusions Confidential16
  • 17. Goal: Two Men and a Bear • Economic and Due Care strategy • Exceed industry and regulatory standards: • Focus on implementing sufficient security controls to make it too costly for criminals to exploit • Criminals move on to the next target • Minimize legal and regulatory exposure Confidential17
  • 19. Actions Confidential19 • Conduct a cyber-security assessment • Establish a cyber roadmap and action planAssess • Based on identified risks and priorities, implement people, process and technology initiatives Implement • Have a breach response plan in place • Have the extended team contracted for and ready to go Be Ready
  • 20. Assessment provides clear measurements of key issues for your particular environment Threat Assessment Understand what could truly harm the organization • Identify key threats and risks specific to the organization & its industry Technology Environment Understand the current technology environment • Systems • Networks • Information Stores • Partner/Supplier/Customer Integration Organizational Environment Understand the current organizational environment • People • Skills • Capabilities • Resources • Cyber Awareness Control Environment Assess current cyber security capabilities & controls • Regulatory Requirements • Control Framework • Control Activities (Policies, Procedures, Technology, Management) • Actual use and implementation • Resilience Strategy & Capability Recommendations Executive Summary • Overall vulnerabilities • What’s working • What could be improved • Control areas to focus on • Implementation Roadmap • Assessment Summary by Key Control Area Confidential20 Interviews, Data Gathering, & Direct Observations Action Plans
  • 21. Confidential21 Probability of Occurrence High ++++Low + High ++++ Low + Potential Impact Theft / Loss of Patient PHI & PII SAMPLE THREAT MATRIX Loss of Funds Loss of System Resources Theft / Loss of Provider PII Theft / Loss of Employee PII Loss of Confidential Management Information Impact and probability of occurrence are relative and judgmentally based on potential financial/reputational loss, the value of information to external parties and current trends in cyber-security exploits. Theft of Donor Information
  • 22. Example Recommended Cyber Strategies • Improve cyber-security culture • Reduce data and system exposures • Make it too expensive for attackers • Increase ability to detect compromise • Improve 3rd party security & contractual obligations • Practice crisis response plan • Provide for long-term sustainability Confidential22
  • 23. Resilience Planning – Preparing for the inevitable Current Environment Key Threats Information Supply Chain Security Controls & Organization Response Plans Organizational Responsibilities Breach Response Checklist Communication Strategies Monitoring & Tracking Solutions Response Team Legal Forensics Insurance Public Relations Surge Capabilities Legal Requirements Compliance & Regulatory Notification Contractual Financial Exposure Cyber Insurance Contractual Obligations Contractual Support / Risk Sharing Confidential23
  • 25. Conclusions • Cybersecurity is a Business Problem that affects the entire organization and not just IT • The risk cannot be ignored • There is no one size that fits all. Every organization is unique. • Cyber assessments and breach response should be performed under attorney client privilege. • The right partners can reduce complexity and cost • The time to start an assessment is now Confidential25
  • 26. Contact Information Joe Nathans Partner Technology Services NextLevel 1420 Fifth Ave. Suite 2200 Seattle, WA 98101 Mobile: 425.931.8102 Joe.nathans@nlbev.com www.nlbev.com Chuck Gottschalk CEO & Founder NextLevel 1420 Fifth Ave. Suite 2200 Seattle, WA 98101 Mobile: 206.420.1222 Ofiice: 206.915.1839 Chuck.Gottschalk@nlbev.com www.nlbev.com 26 Confidential