SlideShare a Scribd company logo
Seven Deadly CyberSecurity Sins By Cruz Cerda
1.
Inconsistency
in enforcing
security
policies
• It’s not enough just to have security policies —
you have to regularly check and consistently
enforce them, lest they exist uselessly.
2. Negligence
in the
approach to
user security
awareness
training
71 percent of respondents
either include security
awareness as a one-off
employee onboarding
event, or reinforce it once
annually.
User training is massively
under-prioritized
3. Shortsightedness in the application of
cybersecurity technologies
Only basic technologies are being deployed
4. Complacency around
vulnerability reporting
Vulnerability reporting is often weak, or even nonexistent.
5. Inflexibility in adapting
processes and approach
after a breach
The majority of organizations make no
changes to their technology or processes
following a breach
6. Stagnation in the
application of key prevention
techniques
Widely accepted prevention techniques and processes remain
overlooked
7. Lethargy around
detection and
response
Detection, response, and
resolution times are all growing.
References
• Heikkila, A. (2017). Businesses Are
Overconfident About Cyber Security. Retrieved
from
https://www.business2community.com/cyberse
curity/businesses-overconfident-cyber-security-
01966674#0MSDERGyIsbPpusJ.97
• SolarWinds MSP (2017). Cybersecurity: Can
overconfidence lead to an extinction event?
Retrieved from
https://www.solarwindsmsp.com/sites/solarwin
dsmsp/files/resources/SW_MSP_Security_Rese
arch_Report_2017_EN_US_Whitepaper.pdf

More Related Content

What's hot

Effective Vulnerability Management
Effective Vulnerability ManagementEffective Vulnerability Management
Effective Vulnerability ManagementVicky Ames
 
Using automation to improve the effectiveness of security operations
Using automation to improve the effectiveness of security operationsUsing automation to improve the effectiveness of security operations
Using automation to improve the effectiveness of security operations
Huntsman Security
 
Risk and Testing by Graham et al
Risk and Testing by Graham et al Risk and Testing by Graham et al
Risk and Testing by Graham et al
Emi Rahmi
 
Vulnerability Management: What You Need to Know to Prioritize Risk
Vulnerability Management: What You Need to Know to Prioritize RiskVulnerability Management: What You Need to Know to Prioritize Risk
Vulnerability Management: What You Need to Know to Prioritize Risk
AlienVault
 
Why Medical Devices Are So Vulnerable
Why Medical Devices Are So VulnerableWhy Medical Devices Are So Vulnerable
Why Medical Devices Are So Vulnerable
Medigate
 
Web Application Vulnerability Management
Web Application Vulnerability ManagementWeb Application Vulnerability Management
Web Application Vulnerability Management
jpubal
 
Is Your Vulnerability Management Program Keeping Pace With Risks?
Is Your Vulnerability Management Program Keeping Pace With Risks?Is Your Vulnerability Management Program Keeping Pace With Risks?
Is Your Vulnerability Management Program Keeping Pace With Risks?
Skybox Security
 
Planning and Deploying an Effective Vulnerability Management Program
Planning and Deploying an Effective Vulnerability Management ProgramPlanning and Deploying an Effective Vulnerability Management Program
Planning and Deploying an Effective Vulnerability Management Program
Sasha Nunke
 
Staab Itp 251 Chapter 9 Swl Case Presentation
Staab   Itp 251   Chapter 9   Swl Case PresentationStaab   Itp 251   Chapter 9   Swl Case Presentation
Staab Itp 251 Chapter 9 Swl Case Presentationstaabjg
 
Infographic the new era of corporate continuity of operations
Infographic the new era of corporate continuity of operationsInfographic the new era of corporate continuity of operations
Infographic the new era of corporate continuity of operations
Professor Eric K. Noji, M.D., MPH, DTMH(Lon), FRCP(UK)hon
 
Is Your Vulnerability Management Program Irrelevant?
Is Your Vulnerability Management Program Irrelevant?Is Your Vulnerability Management Program Irrelevant?
Is Your Vulnerability Management Program Irrelevant?
Skybox Security
 
Implementing Vulnerability Management
Implementing Vulnerability Management Implementing Vulnerability Management
Implementing Vulnerability Management
Argyle Executive Forum
 
Risk and testing
Risk and testingRisk and testing
Risk and testing
Emi Rahmi
 
IT Security Incident Response for Nonprofits
IT Security Incident Response for NonprofitsIT Security Incident Response for Nonprofits
IT Security Incident Response for Nonprofits
Community IT Innovators
 
Web Application Security Vulnerability Management Framework
Web Application Security Vulnerability Management FrameworkWeb Application Security Vulnerability Management Framework
Web Application Security Vulnerability Management Framework
jpubal
 
Applying iso-san-diego-ca
Applying iso-san-diego-caApplying iso-san-diego-ca
Applying iso-san-diego-ca
GlobalCompliancePanel
 
Community IT - Crafting Nonprofit IT Security Policy
Community IT - Crafting Nonprofit IT Security PolicyCommunity IT - Crafting Nonprofit IT Security Policy
Community IT - Crafting Nonprofit IT Security Policy
Community IT Innovators
 
Vulnerability Assessment Presentation
Vulnerability Assessment PresentationVulnerability Assessment Presentation
Vulnerability Assessment Presentation
Lionel Medina
 
Enterprise Class Vulnerability Management Like A Boss
Enterprise Class Vulnerability Management Like A BossEnterprise Class Vulnerability Management Like A Boss
Enterprise Class Vulnerability Management Like A Boss
rbrockway
 

What's hot (20)

Effective Vulnerability Management
Effective Vulnerability ManagementEffective Vulnerability Management
Effective Vulnerability Management
 
Using automation to improve the effectiveness of security operations
Using automation to improve the effectiveness of security operationsUsing automation to improve the effectiveness of security operations
Using automation to improve the effectiveness of security operations
 
Risk and Testing by Graham et al
Risk and Testing by Graham et al Risk and Testing by Graham et al
Risk and Testing by Graham et al
 
Vulnerability Management: What You Need to Know to Prioritize Risk
Vulnerability Management: What You Need to Know to Prioritize RiskVulnerability Management: What You Need to Know to Prioritize Risk
Vulnerability Management: What You Need to Know to Prioritize Risk
 
Why Medical Devices Are So Vulnerable
Why Medical Devices Are So VulnerableWhy Medical Devices Are So Vulnerable
Why Medical Devices Are So Vulnerable
 
Web Application Vulnerability Management
Web Application Vulnerability ManagementWeb Application Vulnerability Management
Web Application Vulnerability Management
 
Is Your Vulnerability Management Program Keeping Pace With Risks?
Is Your Vulnerability Management Program Keeping Pace With Risks?Is Your Vulnerability Management Program Keeping Pace With Risks?
Is Your Vulnerability Management Program Keeping Pace With Risks?
 
Planning and Deploying an Effective Vulnerability Management Program
Planning and Deploying an Effective Vulnerability Management ProgramPlanning and Deploying an Effective Vulnerability Management Program
Planning and Deploying an Effective Vulnerability Management Program
 
Staab Itp 251 Chapter 9 Swl Case Presentation
Staab   Itp 251   Chapter 9   Swl Case PresentationStaab   Itp 251   Chapter 9   Swl Case Presentation
Staab Itp 251 Chapter 9 Swl Case Presentation
 
Infographic the new era of corporate continuity of operations
Infographic the new era of corporate continuity of operationsInfographic the new era of corporate continuity of operations
Infographic the new era of corporate continuity of operations
 
Is Your Vulnerability Management Program Irrelevant?
Is Your Vulnerability Management Program Irrelevant?Is Your Vulnerability Management Program Irrelevant?
Is Your Vulnerability Management Program Irrelevant?
 
Implementing Vulnerability Management
Implementing Vulnerability Management Implementing Vulnerability Management
Implementing Vulnerability Management
 
Risk and testing
Risk and testingRisk and testing
Risk and testing
 
IT Security Incident Response for Nonprofits
IT Security Incident Response for NonprofitsIT Security Incident Response for Nonprofits
IT Security Incident Response for Nonprofits
 
Web Application Security Vulnerability Management Framework
Web Application Security Vulnerability Management FrameworkWeb Application Security Vulnerability Management Framework
Web Application Security Vulnerability Management Framework
 
Applying iso-san-diego-ca
Applying iso-san-diego-caApplying iso-san-diego-ca
Applying iso-san-diego-ca
 
Community IT - Crafting Nonprofit IT Security Policy
Community IT - Crafting Nonprofit IT Security PolicyCommunity IT - Crafting Nonprofit IT Security Policy
Community IT - Crafting Nonprofit IT Security Policy
 
Vulnerability Assessment Presentation
Vulnerability Assessment PresentationVulnerability Assessment Presentation
Vulnerability Assessment Presentation
 
Enterprise Class Vulnerability Management Like A Boss
Enterprise Class Vulnerability Management Like A BossEnterprise Class Vulnerability Management Like A Boss
Enterprise Class Vulnerability Management Like A Boss
 
ManagedAntiVirus
ManagedAntiVirusManagedAntiVirus
ManagedAntiVirus
 

Similar to SEVEN DEADLY CYBERSECURITY SINS

7 Best Practices to Protect Critical Business Information [Infographic]
7 Best Practices to Protect Critical Business Information [Infographic]7 Best Practices to Protect Critical Business Information [Infographic]
7 Best Practices to Protect Critical Business Information [Infographic]
Citrix
 
Selling security to the C-level
Selling security to the C-levelSelling security to the C-level
Selling security to the C-level
Donald Tabone
 
Cyber awareness ppt on the recorded data
Cyber awareness ppt on the recorded dataCyber awareness ppt on the recorded data
Cyber awareness ppt on the recorded data
TecnoIncentive
 
Chapter 7 Managing Secure System.pdf
Chapter 7 Managing Secure System.pdfChapter 7 Managing Secure System.pdf
Chapter 7 Managing Secure System.pdf
AbuHanifah59
 
The Open Group - ZT Commandments and Reference Model.pptx
The Open Group - ZT Commandments and Reference Model.pptxThe Open Group - ZT Commandments and Reference Model.pptx
The Open Group - ZT Commandments and Reference Model.pptx
Mark Simos
 
Key Cybersecurity Risks and Mitigation Strategies in 2023 | The Enterprise World
Key Cybersecurity Risks and Mitigation Strategies in 2023 | The Enterprise WorldKey Cybersecurity Risks and Mitigation Strategies in 2023 | The Enterprise World
Key Cybersecurity Risks and Mitigation Strategies in 2023 | The Enterprise World
TEWMAGAZINE
 
Intelligent Security: Defending the Digital Business
Intelligent Security: Defending the Digital BusinessIntelligent Security: Defending the Digital Business
Intelligent Security: Defending the Digital Business
accenture
 
10 Most Important Strategies for Cybersecurity Risk Mitigation.pdf
10 Most Important Strategies for Cybersecurity Risk Mitigation.pdf10 Most Important Strategies for Cybersecurity Risk Mitigation.pdf
10 Most Important Strategies for Cybersecurity Risk Mitigation.pdf
Afour tech
 
Sia Presentation100808
Sia Presentation100808Sia Presentation100808
Sia Presentation100808
baratta44
 
Cybersecurity Program Assessments
Cybersecurity Program AssessmentsCybersecurity Program Assessments
Cybersecurity Program AssessmentsJohn Anderson
 
Securing Solutions Amid The Journey To Digital Transformation.pdf
Securing Solutions Amid The Journey To Digital Transformation.pdfSecuring Solutions Amid The Journey To Digital Transformation.pdf
Securing Solutions Amid The Journey To Digital Transformation.pdf
Ciente
 
Building a Mobile Security Model
Building a Mobile Security Model Building a Mobile Security Model
Building a Mobile Security Model tmbainjr131
 
IT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John LadoIT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John Lado
Mark John Lado, MIT
 
Secure software design
Secure software designSecure software design
Secure software design
Ashis Kumar Chanda
 
Introduction to Cybersecurity.pdf
Introduction to Cybersecurity.pdfIntroduction to Cybersecurity.pdf
Introduction to Cybersecurity.pdf
ssuserf98dd4
 
Best Practices for a Mature Application Security Program Webinar - February 2016
Best Practices for a Mature Application Security Program Webinar - February 2016Best Practices for a Mature Application Security Program Webinar - February 2016
Best Practices for a Mature Application Security Program Webinar - February 2016
Security Innovation
 
Optimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to SuccessOptimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to Success
Sirius
 
Business information security requirements
Business information security requirementsBusiness information security requirements
Business information security requirements
gurneyhal
 
Understanding security operation.pptx
Understanding security operation.pptxUnderstanding security operation.pptx
Understanding security operation.pptx
Piyush Jain
 
02. ISM - Cyber Security Principles (March 2023).pdf
02. ISM - Cyber Security Principles (March 2023).pdf02. ISM - Cyber Security Principles (March 2023).pdf
02. ISM - Cyber Security Principles (March 2023).pdf
leelakrishna298976
 

Similar to SEVEN DEADLY CYBERSECURITY SINS (20)

7 Best Practices to Protect Critical Business Information [Infographic]
7 Best Practices to Protect Critical Business Information [Infographic]7 Best Practices to Protect Critical Business Information [Infographic]
7 Best Practices to Protect Critical Business Information [Infographic]
 
Selling security to the C-level
Selling security to the C-levelSelling security to the C-level
Selling security to the C-level
 
Cyber awareness ppt on the recorded data
Cyber awareness ppt on the recorded dataCyber awareness ppt on the recorded data
Cyber awareness ppt on the recorded data
 
Chapter 7 Managing Secure System.pdf
Chapter 7 Managing Secure System.pdfChapter 7 Managing Secure System.pdf
Chapter 7 Managing Secure System.pdf
 
The Open Group - ZT Commandments and Reference Model.pptx
The Open Group - ZT Commandments and Reference Model.pptxThe Open Group - ZT Commandments and Reference Model.pptx
The Open Group - ZT Commandments and Reference Model.pptx
 
Key Cybersecurity Risks and Mitigation Strategies in 2023 | The Enterprise World
Key Cybersecurity Risks and Mitigation Strategies in 2023 | The Enterprise WorldKey Cybersecurity Risks and Mitigation Strategies in 2023 | The Enterprise World
Key Cybersecurity Risks and Mitigation Strategies in 2023 | The Enterprise World
 
Intelligent Security: Defending the Digital Business
Intelligent Security: Defending the Digital BusinessIntelligent Security: Defending the Digital Business
Intelligent Security: Defending the Digital Business
 
10 Most Important Strategies for Cybersecurity Risk Mitigation.pdf
10 Most Important Strategies for Cybersecurity Risk Mitigation.pdf10 Most Important Strategies for Cybersecurity Risk Mitigation.pdf
10 Most Important Strategies for Cybersecurity Risk Mitigation.pdf
 
Sia Presentation100808
Sia Presentation100808Sia Presentation100808
Sia Presentation100808
 
Cybersecurity Program Assessments
Cybersecurity Program AssessmentsCybersecurity Program Assessments
Cybersecurity Program Assessments
 
Securing Solutions Amid The Journey To Digital Transformation.pdf
Securing Solutions Amid The Journey To Digital Transformation.pdfSecuring Solutions Amid The Journey To Digital Transformation.pdf
Securing Solutions Amid The Journey To Digital Transformation.pdf
 
Building a Mobile Security Model
Building a Mobile Security Model Building a Mobile Security Model
Building a Mobile Security Model
 
IT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John LadoIT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John Lado
 
Secure software design
Secure software designSecure software design
Secure software design
 
Introduction to Cybersecurity.pdf
Introduction to Cybersecurity.pdfIntroduction to Cybersecurity.pdf
Introduction to Cybersecurity.pdf
 
Best Practices for a Mature Application Security Program Webinar - February 2016
Best Practices for a Mature Application Security Program Webinar - February 2016Best Practices for a Mature Application Security Program Webinar - February 2016
Best Practices for a Mature Application Security Program Webinar - February 2016
 
Optimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to SuccessOptimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to Success
 
Business information security requirements
Business information security requirementsBusiness information security requirements
Business information security requirements
 
Understanding security operation.pptx
Understanding security operation.pptxUnderstanding security operation.pptx
Understanding security operation.pptx
 
02. ISM - Cyber Security Principles (March 2023).pdf
02. ISM - Cyber Security Principles (March 2023).pdf02. ISM - Cyber Security Principles (March 2023).pdf
02. ISM - Cyber Security Principles (March 2023).pdf
 

More from CRUZ CERDA

Slideshare hcahps, data driven analysis: how to improve top box scores for co...
Slideshare hcahps, data driven analysis: how to improve top box scores for co...Slideshare hcahps, data driven analysis: how to improve top box scores for co...
Slideshare hcahps, data driven analysis: how to improve top box scores for co...
CRUZ CERDA
 
ITRC 2017 ANNUAL DATABREACH YEAR-END REVIEW
ITRC 2017 ANNUAL DATABREACH YEAR-END REVIEWITRC 2017 ANNUAL DATABREACH YEAR-END REVIEW
ITRC 2017 ANNUAL DATABREACH YEAR-END REVIEW
CRUZ CERDA
 
2017 ITRC DATABREACH SUMMARY REPORT as of 12272017
2017  ITRC DATABREACH SUMMARY REPORT as of 122720172017  ITRC DATABREACH SUMMARY REPORT as of 12272017
2017 ITRC DATABREACH SUMMARY REPORT as of 12272017
CRUZ CERDA
 
DOCTORAL STUDY ORAL DEFENSE - MEDICAL IDENTITY THEFT AND PALM VEIN AUTHENTICA...
DOCTORAL STUDY ORAL DEFENSE - MEDICAL IDENTITY THEFT AND PALM VEIN AUTHENTICA...DOCTORAL STUDY ORAL DEFENSE - MEDICAL IDENTITY THEFT AND PALM VEIN AUTHENTICA...
DOCTORAL STUDY ORAL DEFENSE - MEDICAL IDENTITY THEFT AND PALM VEIN AUTHENTICA...
CRUZ CERDA
 
2017 ITRC DATABREACH SUMMARY REPORT 12062017
2017 ITRC DATABREACH SUMMARY REPORT 120620172017 ITRC DATABREACH SUMMARY REPORT 12062017
2017 ITRC DATABREACH SUMMARY REPORT 12062017
CRUZ CERDA
 
2017 ITRC DATABREACH SUMMARY REPORT 11152017
2017 ITRC DATABREACH SUMMARY REPORT 111520172017 ITRC DATABREACH SUMMARY REPORT 11152017
2017 ITRC DATABREACH SUMMARY REPORT 11152017
CRUZ CERDA
 
2017 ITRC DATABREACH SUMMARY REPORT 11072017
2017 ITRC DATABREACH SUMMARY REPORT 110720172017 ITRC DATABREACH SUMMARY REPORT 11072017
2017 ITRC DATABREACH SUMMARY REPORT 11072017
CRUZ CERDA
 
2017 ITRC DATABREACH SUMMARY REPORT 11012017 FINAL
2017 ITRC DATABREACH SUMMARY REPORT 11012017 FINAL2017 ITRC DATABREACH SUMMARY REPORT 11012017 FINAL
2017 ITRC DATABREACH SUMMARY REPORT 11012017 FINAL
CRUZ CERDA
 
2017 ITRC DATABREACH SUMMARY REPORT 10252017 FINAL
2017 ITRC DATABREACH SUMMARY REPORT 10252017 FINAL2017 ITRC DATABREACH SUMMARY REPORT 10252017 FINAL
2017 ITRC DATABREACH SUMMARY REPORT 10252017 FINAL
CRUZ CERDA
 
2017 ITRC DATABREACH SUMMARY REPORT 10252017
2017 ITRC DATABREACH SUMMARY REPORT 102520172017 ITRC DATABREACH SUMMARY REPORT 10252017
2017 ITRC DATABREACH SUMMARY REPORT 10252017
CRUZ CERDA
 
2017 ITRC DATABREACH SUMMARY REPORT 07252017
2017 ITRC DATABREACH SUMMARY REPORT 072520172017 ITRC DATABREACH SUMMARY REPORT 07252017
2017 ITRC DATABREACH SUMMARY REPORT 07252017
CRUZ CERDA
 
2017 ITRC DATABREACH SUMMARY REPORT 06272017
2017 ITRC DATABREACH SUMMARY REPORT 062720172017 ITRC DATABREACH SUMMARY REPORT 06272017
2017 ITRC DATABREACH SUMMARY REPORT 06272017
CRUZ CERDA
 
2017 ITRC DATABREACH SUMMARY REPORT 06132017
2017 ITRC DATABREACH SUMMARY REPORT 061320172017 ITRC DATABREACH SUMMARY REPORT 06132017
2017 ITRC DATABREACH SUMMARY REPORT 06132017
CRUZ CERDA
 
2017 ITRC DATABREACH SUMMARY REPORT 06062017
2017 ITRC DATABREACH SUMMARY REPORT 060620172017 ITRC DATABREACH SUMMARY REPORT 06062017
2017 ITRC DATABREACH SUMMARY REPORT 06062017
CRUZ CERDA
 
2017 ITRC DATABREACH SUMMARY REPORT 05232017
2017 ITRC DATABREACH SUMMARY REPORT 052320172017 ITRC DATABREACH SUMMARY REPORT 05232017
2017 ITRC DATABREACH SUMMARY REPORT 05232017
CRUZ CERDA
 
2017 ITRC Databreach Summary Report 05172017
2017 ITRC Databreach Summary Report 051720172017 ITRC Databreach Summary Report 05172017
2017 ITRC Databreach Summary Report 05172017
CRUZ CERDA
 
2017 ITRC Databreach Summary Report 0502017
2017 ITRC Databreach Summary Report 05020172017 ITRC Databreach Summary Report 0502017
2017 ITRC Databreach Summary Report 0502017
CRUZ CERDA
 
2017 ITRC Databreach Summary Report 04042017
2017 ITRC Databreach Summary Report 040420172017 ITRC Databreach Summary Report 04042017
2017 ITRC Databreach Summary Report 04042017
CRUZ CERDA
 
2017 ITRC Databreach Summary Report 03282017
2017 ITRC Databreach Summary Report 032820172017 ITRC Databreach Summary Report 03282017
2017 ITRC Databreach Summary Report 03282017
CRUZ CERDA
 
2017 ITRC Databreach Summary Report 03212017
2017 ITRC Databreach Summary Report 032120172017 ITRC Databreach Summary Report 03212017
2017 ITRC Databreach Summary Report 03212017
CRUZ CERDA
 

More from CRUZ CERDA (20)

Slideshare hcahps, data driven analysis: how to improve top box scores for co...
Slideshare hcahps, data driven analysis: how to improve top box scores for co...Slideshare hcahps, data driven analysis: how to improve top box scores for co...
Slideshare hcahps, data driven analysis: how to improve top box scores for co...
 
ITRC 2017 ANNUAL DATABREACH YEAR-END REVIEW
ITRC 2017 ANNUAL DATABREACH YEAR-END REVIEWITRC 2017 ANNUAL DATABREACH YEAR-END REVIEW
ITRC 2017 ANNUAL DATABREACH YEAR-END REVIEW
 
2017 ITRC DATABREACH SUMMARY REPORT as of 12272017
2017  ITRC DATABREACH SUMMARY REPORT as of 122720172017  ITRC DATABREACH SUMMARY REPORT as of 12272017
2017 ITRC DATABREACH SUMMARY REPORT as of 12272017
 
DOCTORAL STUDY ORAL DEFENSE - MEDICAL IDENTITY THEFT AND PALM VEIN AUTHENTICA...
DOCTORAL STUDY ORAL DEFENSE - MEDICAL IDENTITY THEFT AND PALM VEIN AUTHENTICA...DOCTORAL STUDY ORAL DEFENSE - MEDICAL IDENTITY THEFT AND PALM VEIN AUTHENTICA...
DOCTORAL STUDY ORAL DEFENSE - MEDICAL IDENTITY THEFT AND PALM VEIN AUTHENTICA...
 
2017 ITRC DATABREACH SUMMARY REPORT 12062017
2017 ITRC DATABREACH SUMMARY REPORT 120620172017 ITRC DATABREACH SUMMARY REPORT 12062017
2017 ITRC DATABREACH SUMMARY REPORT 12062017
 
2017 ITRC DATABREACH SUMMARY REPORT 11152017
2017 ITRC DATABREACH SUMMARY REPORT 111520172017 ITRC DATABREACH SUMMARY REPORT 11152017
2017 ITRC DATABREACH SUMMARY REPORT 11152017
 
2017 ITRC DATABREACH SUMMARY REPORT 11072017
2017 ITRC DATABREACH SUMMARY REPORT 110720172017 ITRC DATABREACH SUMMARY REPORT 11072017
2017 ITRC DATABREACH SUMMARY REPORT 11072017
 
2017 ITRC DATABREACH SUMMARY REPORT 11012017 FINAL
2017 ITRC DATABREACH SUMMARY REPORT 11012017 FINAL2017 ITRC DATABREACH SUMMARY REPORT 11012017 FINAL
2017 ITRC DATABREACH SUMMARY REPORT 11012017 FINAL
 
2017 ITRC DATABREACH SUMMARY REPORT 10252017 FINAL
2017 ITRC DATABREACH SUMMARY REPORT 10252017 FINAL2017 ITRC DATABREACH SUMMARY REPORT 10252017 FINAL
2017 ITRC DATABREACH SUMMARY REPORT 10252017 FINAL
 
2017 ITRC DATABREACH SUMMARY REPORT 10252017
2017 ITRC DATABREACH SUMMARY REPORT 102520172017 ITRC DATABREACH SUMMARY REPORT 10252017
2017 ITRC DATABREACH SUMMARY REPORT 10252017
 
2017 ITRC DATABREACH SUMMARY REPORT 07252017
2017 ITRC DATABREACH SUMMARY REPORT 072520172017 ITRC DATABREACH SUMMARY REPORT 07252017
2017 ITRC DATABREACH SUMMARY REPORT 07252017
 
2017 ITRC DATABREACH SUMMARY REPORT 06272017
2017 ITRC DATABREACH SUMMARY REPORT 062720172017 ITRC DATABREACH SUMMARY REPORT 06272017
2017 ITRC DATABREACH SUMMARY REPORT 06272017
 
2017 ITRC DATABREACH SUMMARY REPORT 06132017
2017 ITRC DATABREACH SUMMARY REPORT 061320172017 ITRC DATABREACH SUMMARY REPORT 06132017
2017 ITRC DATABREACH SUMMARY REPORT 06132017
 
2017 ITRC DATABREACH SUMMARY REPORT 06062017
2017 ITRC DATABREACH SUMMARY REPORT 060620172017 ITRC DATABREACH SUMMARY REPORT 06062017
2017 ITRC DATABREACH SUMMARY REPORT 06062017
 
2017 ITRC DATABREACH SUMMARY REPORT 05232017
2017 ITRC DATABREACH SUMMARY REPORT 052320172017 ITRC DATABREACH SUMMARY REPORT 05232017
2017 ITRC DATABREACH SUMMARY REPORT 05232017
 
2017 ITRC Databreach Summary Report 05172017
2017 ITRC Databreach Summary Report 051720172017 ITRC Databreach Summary Report 05172017
2017 ITRC Databreach Summary Report 05172017
 
2017 ITRC Databreach Summary Report 0502017
2017 ITRC Databreach Summary Report 05020172017 ITRC Databreach Summary Report 0502017
2017 ITRC Databreach Summary Report 0502017
 
2017 ITRC Databreach Summary Report 04042017
2017 ITRC Databreach Summary Report 040420172017 ITRC Databreach Summary Report 04042017
2017 ITRC Databreach Summary Report 04042017
 
2017 ITRC Databreach Summary Report 03282017
2017 ITRC Databreach Summary Report 032820172017 ITRC Databreach Summary Report 03282017
2017 ITRC Databreach Summary Report 03282017
 
2017 ITRC Databreach Summary Report 03212017
2017 ITRC Databreach Summary Report 032120172017 ITRC Databreach Summary Report 03212017
2017 ITRC Databreach Summary Report 03212017
 

Recently uploaded

FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 

SEVEN DEADLY CYBERSECURITY SINS

  • 1. Seven Deadly CyberSecurity Sins By Cruz Cerda
  • 2. 1. Inconsistency in enforcing security policies • It’s not enough just to have security policies — you have to regularly check and consistently enforce them, lest they exist uselessly.
  • 3. 2. Negligence in the approach to user security awareness training 71 percent of respondents either include security awareness as a one-off employee onboarding event, or reinforce it once annually. User training is massively under-prioritized
  • 4. 3. Shortsightedness in the application of cybersecurity technologies Only basic technologies are being deployed
  • 5. 4. Complacency around vulnerability reporting Vulnerability reporting is often weak, or even nonexistent.
  • 6. 5. Inflexibility in adapting processes and approach after a breach The majority of organizations make no changes to their technology or processes following a breach
  • 7. 6. Stagnation in the application of key prevention techniques Widely accepted prevention techniques and processes remain overlooked
  • 8. 7. Lethargy around detection and response Detection, response, and resolution times are all growing.
  • 9. References • Heikkila, A. (2017). Businesses Are Overconfident About Cyber Security. Retrieved from https://www.business2community.com/cyberse curity/businesses-overconfident-cyber-security- 01966674#0MSDERGyIsbPpusJ.97 • SolarWinds MSP (2017). Cybersecurity: Can overconfidence lead to an extinction event? Retrieved from https://www.solarwindsmsp.com/sites/solarwin dsmsp/files/resources/SW_MSP_Security_Rese arch_Report_2017_EN_US_Whitepaper.pdf