SlideShare a Scribd company logo
SBA 8a and Hubzone Certified Company
SBA WOSB and EDWOSB Company
MDOT MBE, DBE, SBE Company
GSA IT 70 Schedule Holder: GS35F329DA
Track 3: Guide to Sustaining A Cyber Workforce
Likia T. Hawkins, CEO/President
Outline
 Presenter’s Biography
 Agenda and Purpose
 Message from Small Business Administration
 Importance of Sustaining An Informed Cyber Workforce
 Threats
 Trends
 Drivers
 Challenges to Maintaining An Informed Cyber Workforce
 Challenges
 Resources Available to Sustain Your Cyber Workforce
 Culture
 Operations
 Budget
 Technology
 References
 Questions/Comments
2
Presenter’s Biography
 Ms. Hawkins is an entrepreneur with over
20 years of experience supporting the
Department of Defense and Intelligence Community.
 Occupation: CEO and President of Steel Point
Solutions, LLC,
 Education: Master of Business Administration (MBA)
with a specialization in Technology Management and
Bachelor of Science in Information Sciences and Systems
 Active Industry Certifications: PMI Program Management
Professional (PMP), ISC2 as a Certified Information Systems
Security Professional CISSP) and ISACA Certified Information
Security Manager (CISM).
 Government/Corporate Certifications: Certified Systems Design Security Officer
(SDSO), IBM Certified Senior Project Manager, and IBM Certified Consultant
 Alma Mater: University of Phoenix and Morgan State University
 Spouse: Michael Hawkins
3
4
Agenda and Purpose
Deployment and operation of an effective cyber security
program that enables the continuous secure operations of
mission and business systems requires an educated workforce
equipped with the knowledge and experience required to
detect, identify, mitigate, and respond to threats and/or
incidents. The cyber security presentation focuses on cost-
effective strategies, tools and resources available to small
business to offset the costs of implementing a sustainable
cyber security practice.
Information
Assurance
Symposium Track 3
• Presenter: Likia T.
Hawkins
• Target Audience: Small
Government
Contracting Firms
• Presentation Level:
Introductory
• Length: 1 hour
Key
Trends
Industry
Drivers
Threats Challenges
1 2 3 4
Culture Operations TechnologyBudget
7 85 6
Message from Small Business Administration
Cybersecurity Message
from SBA
Key
Trends
Industry
Drivers
Threats Challenges
1 2 3 4
Culture Operations TechnologyBudget
7 85 6
6
Importance of Sustaining An Informed Cyber Workforce
Threats: Demonstrated
intent to harm an asset or
cause it to become available
• Estimated Global Cost of Cyber
Crime Against Businesses is
between $445 - $450 Billion
every year with theft of
intellectual property exceeding
$160 Billion loss to individuals
• 68% of small business reported
being a cybervictim more than
once
• 43% of attacks targeted
businesses with less than 250
employees as of 2015
• 60% of businesses attacked go
out of business
Opportunities
BLUF: Easy target
• Growth of web apps and
mobile platforms
• Careless or intentional
actions by individuals
• Misconfiguration
and control of
network devices
• Security Gap
• Priority given to
operations and higher
priority financial needs
1
Means, Opportunities, and Motives
Means
BLUF: Access to resources
to initiate cyber attack
• Availability of pre-
packaged scripts
• Easy access and
availability of data to
conduct cyber attack
(e.g., bank records,
employee data)
• Access to back door to
large organizations
Motives
BLUF: Vary Among threat
Actors
• Personal/Financial Gain
• Political Gain
• Discrediting Organization
• Sabotage
• Denial or Degradation
• Ideology and Grudge
• Fun
Key
Trends
Industry
Drivers
Threats Challenges
1 2 3 4
Culture Operations TechnologyBudget
7 85 6
Importance of Sustaining An Informed Cyber Workforce
2016 Data Breaches and Investigations Research
Source: Verizon’s 2017 Data Breach Investigation Report 4/28/17
7
Trending in Wrong Direction
• Avg Cost of Cybercrime
Incident: $15.4M
• # of Successful Attacks:
Increased 46% in past 4 yrs.
• Recovery Time: Can take up to
46 days for a company to
resolve incident up from 14 days
in 2010
Cyber Security Trends:
Collective view from global
experts on direction of data
breaches and technology
disruption that may impact
particular direction
2
Attack Methods Evolution
• Increased sophistication in
phising and hacking schemes
• Commoditization of Attacks
• Simplification and Ease of Use
Scripts
• Ongoing & Persistent Use of
Small Business As Entry
Points into Large Businesses
Cybercrime Costs Vary
• Smaller orgs experienced higher
proportion of cyber crime costs
related to malware, web-based
attacks and phising/social
engineering
• Larger orgs experienced higher costs
related to denial of services,
malicious insiders, and stolen devices
Key
Trends
Industry
Drivers
Threats Challenges
1 2 3 4
Culture Operations TechnologyBudget
7 85 6
Importance of Sustaining An Informed Cyber Workforce
8
Trending in Wrong Direction
• Avg Cost of Cybercrime
Incident: $15.4M
• # of Successful Attacks:
Increased 46% in past 4 yrs.
• Recovery Time: Can take up to
46 days for a company to
resolve incident up from 14 days
in 2010
Cyber Security Trends:
Collective view from global
experts on direction of data
breaches and technology
disruption that may impact
particular direction
2
Attack Methods Evolution
• Increased sophistication in
phising and hacking schemes
• Commoditization of Attacks
• Simplification and Ease of Use
Scripts
• Ongoing & Persistent Use of Small
Business As Entry Points
into Large Businesses
Cybercrime Costs Vary
• Smaller orgs experienced higher
proportion of cyber crime costs
related to malware, web-based
attacks and phising/social
engineering
• Larger orgs experienced higher costs
related to denial of services,
malicious insiders, and stolen devices
Key
Trends
Industry
Drivers
Threats Challenges
1 2 3 4
Culture Operations TechnologyBudget
7 85 6
Importance of Sustaining An Informed Cyber Workforce
9
Trending in Wrong Direction
• Avg Cost of Cybercrime
Incident: $15.4M
• # of Successful Attacks:
Increased 46% in past 4 yrs.
• Recovery Time: Can take up to
46 days for a company to
resolve incident up from 14 days
in 2010
Cyber Security Trends:
Collective view from global
experts on direction of data
breaches and technology
disruption that may impact
particular direction
2
Attack Methods Evolution
• Increased sophistication in
phising and hacking schemes
• Commoditization of Attacks
• Simplification and Ease of Use
Scripts
• Ongoing & Persistent Use of
Small Business As Entry Points
into Large Businesses
Cybercrime Costs Vary
• Smaller orgs experienced
higher proportion of cyber crime costs
related to malware, web-based
attacks and phising/social
engineering
• Larger orgs experienced higher costs related to
denial of services, malicious
insiders, and stolen devices
Key
Trends
Industry
Drivers
Threats Challenges
1 2 3 4
Culture Operations TechnologyBudget
7 85 6
Importance of Sustaining An Informed Cyber Workforce
10
Trending in Wrong
Direction
• Avg Cost of Cybercrime
Incident Up: $15.4M
• # of Successful Attacks:
Increased: 46% in past 4 yrs.
• Recovery Time Up: Can take
up to 46 days for a company to resolve
incident up from 14 days in 2010
Cyber Security Trends:
Collective view from global
experts on direction of data
breaches and technology
disruption that may impact
particular direction
2
Attack Methods Evolution
• Increased sophistication in
phising and hacking schemes
• Commoditization of Attacks
• Simplification and Ease of Use
Scripts
• Ongoing & Persistent Use of
Small Business As Entry Points
into Large Businesses
Cybercrime Costs Vary
• Smaller orgs experienced higher
proportion of cyber crime costs
related to malware, web-based
attacks and phising/social
engineering
• Larger orgs experienced higher costs
related to denial of services,
malicious insiders, and stolen devices
Key
Trends
Industry
Drivers
Threats Challenges
1 2 3 4
Culture Operations TechnologyBudget
7 85 6
Importance of Sustaining An Informed Cyber Workforce
11
Business Drivers: Resource,
process or condition that is vital
for the continued success and
growth of a business
3 1. Comply with Federal and State regulations and laws (e.g, HIPAA, NISPOM)
2. Reduce/minimize operational cybersecurity related costs
3. Reduce/minimize revenue/sales losses
4. Maintain/increase client base
5. Maintain/increase reputation
6. Sustained Cybersecurity Awareness
Key
Trends
Industry
Drivers
Threats Challenges
1 2 3 4
Culture Operations TechnologyBudget
7 85 6
Challenges to Maintaining An Informed Cyber Workforce
12
Business Challenges: Tackling
cybersecurity is one of the most
serious economic challenges
confronting businesses of all sizes.
Protection of intellectual
property, business and personal
data requires:
1. Cybersecurity Strategy
2. Executive Commitment
3. Informed and Trained
Resources
4. Standardized Processes
5. Cyber Focused Mindset
4
Culture
OperationsBudget
Technology
• Balance Cyber Needs
• Touch Budget Priorities
• Alignment with
Operational Needs
• Executive Buy-In
• Active Involvement
• Commitment of
Resources
• Business Operation
Integration
• Policies
• Standardize
Processes (e.g.,
mobile plan,
personal laptop
usage)
• Comprehensive
Plan
• Addresses On and
off premise
Control required
to incorporates
Mission Critical
Data
Key
Trends
Industry
Drivers
Threats Challenges
1 2 3 4
Culture Operations TechnologyBudget
7 85 6
Challenges to Maintaining An Informed Cyber Workforce
13
Business Challenges: Tackling
cybersecurity is one of the most
serious economic challenges
confronting businesses.
Protection of intellectual
property, business and personal
data requires:
1. Cybersecurity Strategy
2. Executive Commitment
3. Informed and Trained
Resources
4. Standardized Processes
5. Cyber Focused Mindset
4
Executive and director commitment to reporting, allocation of
resources and aligning cybersecurity priorities with business
objectives and how it will be implemented at the strategic, tactical
and operational level
Creation/development and maintenance of plans, policies, and
processes that enables an understanding of how cybersecurity
will be integrated into overarching business operations to
achieve minimal disruption in the event of a cyber attack
Commitment of corporate resources required to fund initiatives
required to protect critical and personal data, and minimizes
disruption
Comprehensive and living plan that aligns technical and physical
controls to critical and personal data, annual audits, roles and
responsibilities, insider threat, and escalation procedures
Culture
Operations
Technology
Budget
Key
Trends
Industry
Drivers
Threats Challenges
1 2 3 4
Culture Operations TechnologyBudget
7 85 6
Resources Available to Sustain Your Cyber Workforce
5
Key
Trends
Industry
Drivers
Threats Challenges
1 2 3 4
Culture Operations TechnologyBudget
7 85 6
TakeChargeandAct
• CEO
Engagement
• Prioritize Data
Protection
• Develop
cybersecurity
strategy
• Create Cultural
View as
Cybersecurity as
a Shared
Responsibility
• Treat
cybersecurity as
revenue enabler
not business
expense
MakeEveryoneAccountable
• Set Clear
Expectations
for Your
Employees
related to
protecting
business, client
and personal
data
• Foster
environment
that encourages
honesty and
open dialogue
• Conduct spot
checks
TrainandReinforce
• Make Security
Awareness a
part of new hire
training
• Leverage
educational
resources
• Repeat and
frequency
• Visual Aid
Reinforcement
• Set milestones
and reward
incentives for
exceptional
compliance
CheckYourDefenses
• Adopt Schedule
for testing
operational IT
practices
• Be Willing to
Implement
Vendor Tools
• Audit Controls
• Develop Plan of
Actions and
Milestones
• Measure
progress
• Accountability
14
Culture
Budget
Technology
Operations
A Culture of
Cybersecurity:
Occurs from
within
and is the sum of
your organization’s
commitment and
willingness to:
1. Take Charge
And Act
2. Hold Everyone
Accountable
3. Train &
Reinforce
4. Check Defenses
Resources Available to Sustain Your Cyber Workforce
Key
Trends
Industry
Drivers
Threats Challenges
1 2 3 4
Culture Operations TechnologyBudget
7 85 6
Operations
• Conduct semi-annual review of Federal and State Legislation, Laws and
Policies
• Align Cybersecurity Strategic Plan with guidelines and industry standards and
best practices developed by private and public sector
• Create cybersecurity policies that align with risk level and data seeking to
protect
• Includes Data, Mobile, and Personal Laptop , Email, Internet Usage, Social
Media, Risks, Incidents, and Insider Threat policies
• Align with Cybersecurity Plan to Policies, and Policies to Corporate Processes
• Validate performance against plan, policy and processes, and update as needed
15
Culture
Budget
Technology
Operations
Integration of Cybersecurity
into Business Operations
involves:
1. Well defined corporate
cybersecurity plan that
aligns policies and
processes to industry
standards and best
practices
2. Innovative approach to
enhancing security posture
of your systems and data
3. HR practices that educate
employees about cyber
threats while holding them
accountable for complying
with the organization’s
cybersecurity policies
and procedures.
6
Resources Available to Sustain Your Cyber Workforce
Key
Trends
Industry
Drivers
Threats Challenges
1 2 3 4
Culture Operations TechnologyBudget
7 85 6
Technology
• Develop IT SW/HW baselines
• Maintain CM Control of SW/HW Baseline
• Keep IT SW & HW baselines current
• Audit IT SW & HW compliance against Policies & Processes
• Develop Plan of Actions & Milestones (POA&M’s)
• Report and monitor POA&M corrective action plan progress
• Assess IT Requirements on semi or annual basis
• Be open and willing to implement vendor tools
• Review cybersecurity controls of vendor to ensure functionality aligns with
cybersecurity plan and processes
16
Culture
Budget
Technology
Operations
Integration of Cybersecurity
into Business Operations
involves:
1. Well defined corporate
cybersecurity plan that
aligns policies and
processes to industry
standards and best
practices
2. Innovative approach to
enhancing security posture
of your systems and data
3. HR practices that educate
employees about cyber
threats while holding them
accountable for complying
with the organization’s
cybersecurity policies
and procedures.
6
Resources Available to Sustain Your Cyber Workforce
Key
Trends
Industry
Drivers
Threats Challenges
1 2 3 4
Culture Operations TechnologyBudget
7 85 6
Workforce
• Establish security roles and responsibilities (e.g., clearly identify company data
ownership, employee roles for security oversight, and inherit privileges)
• Add as line item to employees job description
• Integrate into yearly/semi-annual perf. evaluations
• Workforce training principles incorporates topics such as How to Handle
Critical and Personal Data, Self-Reporting and How to Respond to Incidents
• Incorporated into ne hire security briefing
• Spells out penalties for violating policies
• Use Visual Cues to Reinforce Cybersecurity Practices
• Conducted on a semi-annual and annual basis
• Reviewed on an annual basis to ensure topics are relevant and continue to align
with organization’s policies, programs and processes
17
Culture
Budget
Technology
Operations
Integration of Cybersecurity
into Business Operations
involves:
1. Well defined corporate
cybersecurity plan that
aligns policies and
processes to industry
standards and best
practices
2. Innovative approach to
enhancing security posture
of your systems and data
3. HR practices that educate
employees about cyber
threats while holding them
accountable for complying
with the organization’s
cybersecurity policies
and procedures.
6
Resources Available to Sustain Your Cyber Workforce
Key
Trends
Industry
Drivers
Threats Challenges
1 2 3 4
Culture Operations TechnologyBudget
7 85 6
Operations
• Business Operations Director or Manager should develop and evaluate on a yearly
basis its cybersecurity budget that aligns the organization’s policies, programs, and
processes
• Should be feasible and realistic
• Aligns to level of risk the organization is willing to accept and type of data it is
seeking to protect
• Sufficient funding to maintain a governance structure
• Includes line item to fund for workforce training, securing the infrastructure, system
testing and evaluation, system upgrades, facility security and perhaps, cybersecurity
insurance
• Presented and approved by Owner, CEO, or Partners
18
Culture
Budget
Technology
Operations
Budget:
Businesses
seeking
to reduce the
likelihood of a cyber
attack should weigh
the decision of adding
budget line items
that provides resources
to integrate
cybersecurity into:
1. Operations
2. Technology
3. Workforce
7
Resources Available to Sustain Your Cyber Workforce
Key
Trends
Industry
Drivers
Threats Challenges
1 2 3 4
Culture Operations TechnologyBudget
7 85 6
Technology
• IT Director or Manager should develop and evaluate on a yearly bases its
cybersecurity budget that aligns to the organization’s policies, programs and
processes.
• Should be feasible and realistic
• Based on controls required to protect, defend, respond, and/or mitigate attacks
• Should include funds required to upgrade and/or
1. IT SW
2. IT Hardware
• Include line items that will employ layered defense strategy such as: web filtering
software, antivirus signature protection, proactive malware protection, firewalls,
intrusion detection systems, and border routers, and monitoring
• Presented and approved by COO or Operation’s Director
19
Culture
Budget
Technology
Operations
Budget:
Businesses seeking
to reduce the
likelihood of a cyber
attack should weigh
the decision of adding
budget line items
that provides
resources to integrate
cybersecurity into:
1. Operations
2. Technology
3. Workforce
7
Resources Available to Sustain Your Cyber Workforce
Key
Trends
Industry
Drivers
Threats Challenges
1 2 3 4
Culture Operations TechnologyBudget
7 85 6
Workforce
• Human Resource Director or Manager should work with Operations and IT
Director and Manager to develop and evaluate on a yearly bases its cybersecurity
budget that aligns to the organization’s policies, programs and processes.
• Should be feasible and realistic
• Reinforce policies outlined in organization’s employee handbook and client
agreements
• Include line items that will: reinforce and train workforce and perform background
checks and credentialing.
• Presented and approved by COO or Operation’s Director
20
Culture
Budget
Technology
Operations
Budget:
Businesses
seeking
to reduce the
likelihood of a cyber
attack should weigh
the decision of adding
budget line items
that provides resources
to integrate
cybersecurity into:
1. Operations
2. Technology
3. Workforce
7
Resources Available to Sustain Your Cyber Workforce
Key
Trends
Industry
Drivers
Threats Challenges
1 2 3 4
Culture Operations TechnologyBudget
7 85 6
Executives&Management
Purpose: Provide senior executives and management personnel with tools and
techniques required to understand, assess, and define the organization’s
cybersecurity policies, programs and processes to protect against threats and
vulnerabilities
Objectives:
1. Support development of cybersecurity policy, program, and processes
2.Ensure you understand the role an effective cybersecurity plan plays in your
business,
3. How to apply government to ensure reduce exposure for your organization and
yourself.
Training Resources:
•SBA Cybersecurity
•Stop. Think. Connect. Small Business Resources
•Security Awareness Visual Aides
21
Culture
Budget
Technology
Operations
Technology:
Reinforcement of
sound cybersecurity
practices requires
reinforcement of
organizations policies,
processes, and tools.
Education should be
Training should be
customized based on
the audience’s role in their
organization at
a high-level this
should include Executives
& Management,
Implementers, and the
Workforce
8
Resources Available to Sustain Your Cyber Workforce
Key
Trends
Industry
Drivers
Threats Challenges
1 2 3 4
Culture Operations TechnologyBudget
7 85 6
Implementers
Purpose: Provide implementers with the knowledge, tools and techniques to
properly analyze, assess, select and deploy appropriate technologies required
to enhance security posture and protect organization’s sensitive data.
Objectives:
1.Identify Risks
2.Analyze and Assess Cybersecurity Threats and Vulnerabilities
3.Understand Attack Vectors and Countermeasures
4.Configure & Deploy Countermeasures
5. Assess countermeasures
Training Resources:
• SBA Cybersecurity
• National Cybersecurity and Communications Integration Center
• Compliance Resources on Protecting Sensitive Data
22
Culture
Budget
Technology
Operations
Technology:
Reinforcement of
sound cybersecurity
practices requires
reinforcement of
organizations policies,
processes, and tools.
Education should be
Training should be
customized based on
the audience’s role in their
organization at
a high-level this
should include Executives
& Management,
Implementers, and the
Workforce
8
Resources Available to Sustain Your Cyber Workforce
Key
Trends
Industry
Drivers
Threats Challenges
1 2 3 4
Culture Operations TechnologyBudget
7 85 6
Workforce
Purpose: Reinforce and educate on your workforce on the policies, processes,
and program in place to increase the organization’s cybersecurity security posture
Objectives:
1. Educate workforce on cybersecurity policies, program, and processes
2. Offer common language for workforce
3. Increase situational awareness
4. Increase
Training Resources:
• Corporate Employee Handbook
• Corporate Security Awareness Briefing
• SBA Cybersecurity
• Cybersecurity Workforce Framework
• Online Training Vendors (Cybrary.it)
• SANS Cyber Aces Online
23
Culture
Budget
Technology
Operations
Technology:
Reinforcement of
sound cybersecurity
practices requires
reinforcement of
organizations policies,
processes, and tools.
Education should be
Training should be
customized based on
the audience’s role in their
organization at
a high-level this
should include Executives
& Management,
Implementers, and the
Workforce
8
References
1. Cybersecurity In the Workplace Is Everybody’s Business, 10/11/16, Homeinsurance.com:
http://www.nasdaq.com/article/cybersecurity-in-the-workplace-is-everybodys-business-cm691804, May 4, 2017
2. Verizon’s 2017 Data Breach Investigation Report 4/28/17, https://insidecybersecurity.com/document/verizons-2017-data-breach-
investigation-report, May 4, 2017
3. Threats, Vulnerabilities and Exploits – oh my!, ICANN, 10 August 15. https://www.icann.org/news/blog/threats-vulnerabilities-and-
exploits-oh-my, May 4, 2017
4. 10 cyber security trends to look out for in 2017, Information Age, http://www.information-age.com/10-cyber-security-trends-look-
2017-123463680/
5. The Top 17 Security Predictions for 2017: Government Technology, January 8, 2017: http://www.govtech.com/blogs/lohrmann-on-
cybersecurity/the-top-17-security-predictions-for-2017.html
6. Tutorial 1: The Impact of Cybercrime on Small Business, https://www.sbir.gov/tutorials/cyber-security/tutorial-1#, May 4, 2017
7. National Conference of State Legislature: http://www.ncsl.org/research/telecommunications-and-information-
technology/cybersecurity-legislation-2016.aspx, May 5, 2017
8. Ponemon.org, 2016 Cost of Cyber Crime Study & the Risk of Business Innovation,
http://www.ponemon.org/local/upload/file/2016%20HPE%20CCC%20GLOBAL%20REPORT%20FINAL%203.pdf, May 5, 2017
9. The new economics of cybercrime by Mahmood Sher-Jan, 2 November 2015 http://www.isaca.org/cyber/cyber-security-
articles/pages/the-new-economics-of-cybercrime.aspx, May 7, 2017
10. Meeting the cybersecurity challenge by James Kaplan, Shantnu Sharma, and Allen Weinberg, http://www.mckinsey.com/business-
functions/digital-mckinsey/our-insights/meeting-the-cybersecurity-challenge, May 7, 2017
11. Ten Cyber security Strategies, FCC,
https://www.uschamber.com/sites/default/files/legacy/issues/defense/files/10_CYBER_Strategies_for_Small_Biz.pdf, May 7, 2017
12. FTC Issues Cybersecurity Guidance for Small Businesses, May 10, 2017, Insider Cybersecurity.com,
https://insidecybersecurity.com/daily-briefs/ftc-issues-cybersecurity-guidance-small-businesses, May 11, 2017
13. Small Business Computer Security Basics, FTC.gov, https://www.ftc.gov/tips-advice/business-center/guidance/small-business-
computer-security-basics, May 11, 2017
14. FCC Cyber Security Planning Guide,FCC,
https://www.dhs.gov/sites/default/files/publications/FCC%20Cybersecurity%20Planning%20Guide_1.pdf, May 11, 2017
15. Small Business Cyber Security Guide, University of Southern Maine, Maine Cyber Security Cluster, Cyber Security Organization,
24
25
Questions/Comments

More Related Content

What's hot

Using Threat Intelligence to Address Your Growing Digital Risk
Using Threat Intelligence to Address Your Growing Digital RiskUsing Threat Intelligence to Address Your Growing Digital Risk
Using Threat Intelligence to Address Your Growing Digital Risk
SurfWatch Labs
 
Countering Advanced Persistent Threats
Countering Advanced Persistent ThreatsCountering Advanced Persistent Threats
Countering Advanced Persistent Threats
Booz Allen Hamilton
 
Cyber Security and the National Central Banks
Cyber Security and the National Central BanksCyber Security and the National Central Banks
Cyber Security and the National Central Banks
Community Protection Forum
 
Your cyber security webinar
Your cyber security webinarYour cyber security webinar
Your cyber security webinar
Empired
 
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
PECB
 
Mergers and Acquisition Security - Areas of Interest
Mergers and Acquisition Security - Areas of InterestMergers and Acquisition Security - Areas of Interest
Mergers and Acquisition Security - Areas of InterestMatthew Rosenquist
 
Your cyber security webinar
Your cyber security webinarYour cyber security webinar
Your cyber security webinar
Intergen
 
Banks and cybersecurity v2
Banks and cybersecurity v2Banks and cybersecurity v2
Banks and cybersecurity v2
Semir Ibrahimovic
 
Hunting for cyber threats targeting weapon systems
Hunting for cyber threats targeting weapon systemsHunting for cyber threats targeting weapon systems
Hunting for cyber threats targeting weapon systems
Fidelis Cybersecurity
 
Sean McCloskey: How do we Strengthen the Public-Private Partnership to Mitiga...
Sean McCloskey: How do we Strengthen the Public-Private Partnership to Mitiga...Sean McCloskey: How do we Strengthen the Public-Private Partnership to Mitiga...
Sean McCloskey: How do we Strengthen the Public-Private Partnership to Mitiga...
Government Technology and Services Coalition
 
Cybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your OrganizationCybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your Organization
McKonly & Asbury, LLP
 
ICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security GovernanceICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security GovernanceCharles Lim
 
A Manifesto for Cyber Resilience
A Manifesto for Cyber ResilienceA Manifesto for Cyber Resilience
A Manifesto for Cyber Resilience
Symantec
 
Compliance Awareness
Compliance AwarenessCompliance Awareness
Compliance Awareness
Dinesh O Bareja
 
Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...
Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...
Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...
BCM Institute
 
Webinar: Be Cyber Smart – Stories from the Trenches
Webinar: Be Cyber Smart – Stories from the TrenchesWebinar: Be Cyber Smart – Stories from the Trenches
Webinar: Be Cyber Smart – Stories from the Trenches
Withum
 
Dealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber ResilienceDealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber Resilience
Donald Tabone
 
Cyber security maturity model- IT/ITES
Cyber security maturity model- IT/ITES Cyber security maturity model- IT/ITES
Cyber security maturity model- IT/ITES
Priyanka Aash
 
Cybersecurity Operations: Examining the State of the SOC
Cybersecurity Operations: Examining the State of the SOCCybersecurity Operations: Examining the State of the SOC
Cybersecurity Operations: Examining the State of the SOC
Fidelis Cybersecurity
 
Cyber Security Strategies and Approaches
Cyber Security Strategies and ApproachesCyber Security Strategies and Approaches
Cyber Security Strategies and Approaches
vngundi
 

What's hot (20)

Using Threat Intelligence to Address Your Growing Digital Risk
Using Threat Intelligence to Address Your Growing Digital RiskUsing Threat Intelligence to Address Your Growing Digital Risk
Using Threat Intelligence to Address Your Growing Digital Risk
 
Countering Advanced Persistent Threats
Countering Advanced Persistent ThreatsCountering Advanced Persistent Threats
Countering Advanced Persistent Threats
 
Cyber Security and the National Central Banks
Cyber Security and the National Central BanksCyber Security and the National Central Banks
Cyber Security and the National Central Banks
 
Your cyber security webinar
Your cyber security webinarYour cyber security webinar
Your cyber security webinar
 
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
 
Mergers and Acquisition Security - Areas of Interest
Mergers and Acquisition Security - Areas of InterestMergers and Acquisition Security - Areas of Interest
Mergers and Acquisition Security - Areas of Interest
 
Your cyber security webinar
Your cyber security webinarYour cyber security webinar
Your cyber security webinar
 
Banks and cybersecurity v2
Banks and cybersecurity v2Banks and cybersecurity v2
Banks and cybersecurity v2
 
Hunting for cyber threats targeting weapon systems
Hunting for cyber threats targeting weapon systemsHunting for cyber threats targeting weapon systems
Hunting for cyber threats targeting weapon systems
 
Sean McCloskey: How do we Strengthen the Public-Private Partnership to Mitiga...
Sean McCloskey: How do we Strengthen the Public-Private Partnership to Mitiga...Sean McCloskey: How do we Strengthen the Public-Private Partnership to Mitiga...
Sean McCloskey: How do we Strengthen the Public-Private Partnership to Mitiga...
 
Cybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your OrganizationCybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your Organization
 
ICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security GovernanceICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security Governance
 
A Manifesto for Cyber Resilience
A Manifesto for Cyber ResilienceA Manifesto for Cyber Resilience
A Manifesto for Cyber Resilience
 
Compliance Awareness
Compliance AwarenessCompliance Awareness
Compliance Awareness
 
Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...
Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...
Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...
 
Webinar: Be Cyber Smart – Stories from the Trenches
Webinar: Be Cyber Smart – Stories from the TrenchesWebinar: Be Cyber Smart – Stories from the Trenches
Webinar: Be Cyber Smart – Stories from the Trenches
 
Dealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber ResilienceDealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber Resilience
 
Cyber security maturity model- IT/ITES
Cyber security maturity model- IT/ITES Cyber security maturity model- IT/ITES
Cyber security maturity model- IT/ITES
 
Cybersecurity Operations: Examining the State of the SOC
Cybersecurity Operations: Examining the State of the SOCCybersecurity Operations: Examining the State of the SOC
Cybersecurity Operations: Examining the State of the SOC
 
Cyber Security Strategies and Approaches
Cyber Security Strategies and ApproachesCyber Security Strategies and Approaches
Cyber Security Strategies and Approaches
 

Similar to Steel Point Solutions IAS Track 3 "Sustaining a Cyber Workforce" by L.T. Hawkins

NextLevel Cyber Security Executive Briefing
NextLevel Cyber Security Executive BriefingNextLevel Cyber Security Executive Briefing
NextLevel Cyber Security Executive Briefing
Joe Nathans
 
Cybersecurity Challenges in the Modern Digital Landscape.docx
Cybersecurity Challenges in the Modern Digital Landscape.docxCybersecurity Challenges in the Modern Digital Landscape.docx
Cybersecurity Challenges in the Modern Digital Landscape.docx
PelorusTechnologies
 
MCGlobalTech Service Presentation
MCGlobalTech Service PresentationMCGlobalTech Service Presentation
MCGlobalTech Service Presentation
William McBorrough
 
MCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationMCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service Presentation
William McBorrough
 
Vulnerability Management – Opportunities and Challenges!
Vulnerability Management – Opportunities and Challenges!Vulnerability Management – Opportunities and Challenges!
Vulnerability Management – Opportunities and Challenges!
Outpost24
 
A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...
Judith Beckhard Cardoso
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
Anil
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
Anil
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
Krist Davood - Principal - CIO
 
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Cristian Garcia G.
 
Too Small to Get Hacked? Think Again (Webinar)
Too Small to Get Hacked? Think Again (Webinar)Too Small to Get Hacked? Think Again (Webinar)
Too Small to Get Hacked? Think Again (Webinar)
OnRamp
 
Top 10 Cybersecurity Predictions for 2015
Top 10 Cybersecurity Predictions for 2015Top 10 Cybersecurity Predictions for 2015
Top 10 Cybersecurity Predictions for 2015
Matthew Rosenquist
 
2019 Cyber Security Trends
2019 Cyber Security Trends2019 Cyber Security Trends
2019 Cyber Security Trends
Internetwork Engineering (IE)
 
Regional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi Kenya
Regional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi KenyaRegional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi Kenya
Regional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi Kenya
Martin M
 
Nonprofit Cybersecurity Risk Assessment Basics
Nonprofit Cybersecurity Risk Assessment BasicsNonprofit Cybersecurity Risk Assessment Basics
Nonprofit Cybersecurity Risk Assessment Basics
Community IT Innovators
 
The 5 ws of Cyber Security
The 5 ws of Cyber SecurityThe 5 ws of Cyber Security
The 5 ws of Cyber Security
Misha Hanin
 
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
FERMA
 
C-Suite Snacks Webinar Series : Under Attack - Preparing Your Company in the ...
C-Suite Snacks Webinar Series : Under Attack - Preparing Your Company in the ...C-Suite Snacks Webinar Series : Under Attack - Preparing Your Company in the ...
C-Suite Snacks Webinar Series : Under Attack - Preparing Your Company in the ...
Citrin Cooperman
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
International Federation of Accountants
 

Similar to Steel Point Solutions IAS Track 3 "Sustaining a Cyber Workforce" by L.T. Hawkins (20)

NextLevel Cyber Security Executive Briefing
NextLevel Cyber Security Executive BriefingNextLevel Cyber Security Executive Briefing
NextLevel Cyber Security Executive Briefing
 
Cybersecurity Challenges in the Modern Digital Landscape.docx
Cybersecurity Challenges in the Modern Digital Landscape.docxCybersecurity Challenges in the Modern Digital Landscape.docx
Cybersecurity Challenges in the Modern Digital Landscape.docx
 
MCGlobalTech Service Presentation
MCGlobalTech Service PresentationMCGlobalTech Service Presentation
MCGlobalTech Service Presentation
 
MCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationMCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service Presentation
 
Vulnerability Management – Opportunities and Challenges!
Vulnerability Management – Opportunities and Challenges!Vulnerability Management – Opportunities and Challenges!
Vulnerability Management – Opportunities and Challenges!
 
A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
 
Too Small to Get Hacked? Think Again (Webinar)
Too Small to Get Hacked? Think Again (Webinar)Too Small to Get Hacked? Think Again (Webinar)
Too Small to Get Hacked? Think Again (Webinar)
 
Top 10 Cybersecurity Predictions for 2015
Top 10 Cybersecurity Predictions for 2015Top 10 Cybersecurity Predictions for 2015
Top 10 Cybersecurity Predictions for 2015
 
2019 Cyber Security Trends
2019 Cyber Security Trends2019 Cyber Security Trends
2019 Cyber Security Trends
 
Regional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi Kenya
Regional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi KenyaRegional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi Kenya
Regional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi Kenya
 
Nonprofit Cybersecurity Risk Assessment Basics
Nonprofit Cybersecurity Risk Assessment BasicsNonprofit Cybersecurity Risk Assessment Basics
Nonprofit Cybersecurity Risk Assessment Basics
 
ISACA ISSA Presentation
ISACA ISSA PresentationISACA ISSA Presentation
ISACA ISSA Presentation
 
The 5 ws of Cyber Security
The 5 ws of Cyber SecurityThe 5 ws of Cyber Security
The 5 ws of Cyber Security
 
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
 
C-Suite Snacks Webinar Series : Under Attack - Preparing Your Company in the ...
C-Suite Snacks Webinar Series : Under Attack - Preparing Your Company in the ...C-Suite Snacks Webinar Series : Under Attack - Preparing Your Company in the ...
C-Suite Snacks Webinar Series : Under Attack - Preparing Your Company in the ...
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
 

Recently uploaded

Office Furniture | Furniture Store in Sarasota, Florida | Sarasota Collection
Office Furniture | Furniture Store in Sarasota, Florida | Sarasota CollectionOffice Furniture | Furniture Store in Sarasota, Florida | Sarasota Collection
Office Furniture | Furniture Store in Sarasota, Florida | Sarasota Collection
The Sarasota Collection Home Store
 
Showcase Portfolio- Marian Andrea Tana.pdf
Showcase Portfolio- Marian Andrea Tana.pdfShowcase Portfolio- Marian Andrea Tana.pdf
Showcase Portfolio- Marian Andrea Tana.pdf
MarianAndreaSTana
 
Dining Tables and Chairs | Furniture Store in Sarasota, Florida
Dining Tables and Chairs | Furniture Store in Sarasota, FloridaDining Tables and Chairs | Furniture Store in Sarasota, Florida
Dining Tables and Chairs | Furniture Store in Sarasota, Florida
The Sarasota Collection Home Store
 
Web Technology LAB MANUAL for Undergraduate Programs
Web Technology  LAB MANUAL for Undergraduate ProgramsWeb Technology  LAB MANUAL for Undergraduate Programs
Web Technology LAB MANUAL for Undergraduate Programs
Chandrakant Divate
 
Strategic Analysis of Starbucks Coffee Company - MBA.docx
Strategic Analysis of Starbucks Coffee Company - MBA.docxStrategic Analysis of Starbucks Coffee Company - MBA.docx
Strategic Analysis of Starbucks Coffee Company - MBA.docx
RAJU MAKWANA
 
How To Leak-Proof Your Magazine Business
How To Leak-Proof Your Magazine BusinessHow To Leak-Proof Your Magazine Business
How To Leak-Proof Your Magazine Business
Charlie McDermott
 
Best Crypto Marketing Ideas to Lead Your Project to Success
Best Crypto Marketing Ideas to Lead Your Project to SuccessBest Crypto Marketing Ideas to Lead Your Project to Success
Best Crypto Marketing Ideas to Lead Your Project to Success
Intelisync
 

Recently uploaded (7)

Office Furniture | Furniture Store in Sarasota, Florida | Sarasota Collection
Office Furniture | Furniture Store in Sarasota, Florida | Sarasota CollectionOffice Furniture | Furniture Store in Sarasota, Florida | Sarasota Collection
Office Furniture | Furniture Store in Sarasota, Florida | Sarasota Collection
 
Showcase Portfolio- Marian Andrea Tana.pdf
Showcase Portfolio- Marian Andrea Tana.pdfShowcase Portfolio- Marian Andrea Tana.pdf
Showcase Portfolio- Marian Andrea Tana.pdf
 
Dining Tables and Chairs | Furniture Store in Sarasota, Florida
Dining Tables and Chairs | Furniture Store in Sarasota, FloridaDining Tables and Chairs | Furniture Store in Sarasota, Florida
Dining Tables and Chairs | Furniture Store in Sarasota, Florida
 
Web Technology LAB MANUAL for Undergraduate Programs
Web Technology  LAB MANUAL for Undergraduate ProgramsWeb Technology  LAB MANUAL for Undergraduate Programs
Web Technology LAB MANUAL for Undergraduate Programs
 
Strategic Analysis of Starbucks Coffee Company - MBA.docx
Strategic Analysis of Starbucks Coffee Company - MBA.docxStrategic Analysis of Starbucks Coffee Company - MBA.docx
Strategic Analysis of Starbucks Coffee Company - MBA.docx
 
How To Leak-Proof Your Magazine Business
How To Leak-Proof Your Magazine BusinessHow To Leak-Proof Your Magazine Business
How To Leak-Proof Your Magazine Business
 
Best Crypto Marketing Ideas to Lead Your Project to Success
Best Crypto Marketing Ideas to Lead Your Project to SuccessBest Crypto Marketing Ideas to Lead Your Project to Success
Best Crypto Marketing Ideas to Lead Your Project to Success
 

Steel Point Solutions IAS Track 3 "Sustaining a Cyber Workforce" by L.T. Hawkins

  • 1. SBA 8a and Hubzone Certified Company SBA WOSB and EDWOSB Company MDOT MBE, DBE, SBE Company GSA IT 70 Schedule Holder: GS35F329DA Track 3: Guide to Sustaining A Cyber Workforce Likia T. Hawkins, CEO/President
  • 2. Outline  Presenter’s Biography  Agenda and Purpose  Message from Small Business Administration  Importance of Sustaining An Informed Cyber Workforce  Threats  Trends  Drivers  Challenges to Maintaining An Informed Cyber Workforce  Challenges  Resources Available to Sustain Your Cyber Workforce  Culture  Operations  Budget  Technology  References  Questions/Comments 2
  • 3. Presenter’s Biography  Ms. Hawkins is an entrepreneur with over 20 years of experience supporting the Department of Defense and Intelligence Community.  Occupation: CEO and President of Steel Point Solutions, LLC,  Education: Master of Business Administration (MBA) with a specialization in Technology Management and Bachelor of Science in Information Sciences and Systems  Active Industry Certifications: PMI Program Management Professional (PMP), ISC2 as a Certified Information Systems Security Professional CISSP) and ISACA Certified Information Security Manager (CISM).  Government/Corporate Certifications: Certified Systems Design Security Officer (SDSO), IBM Certified Senior Project Manager, and IBM Certified Consultant  Alma Mater: University of Phoenix and Morgan State University  Spouse: Michael Hawkins 3
  • 4. 4 Agenda and Purpose Deployment and operation of an effective cyber security program that enables the continuous secure operations of mission and business systems requires an educated workforce equipped with the knowledge and experience required to detect, identify, mitigate, and respond to threats and/or incidents. The cyber security presentation focuses on cost- effective strategies, tools and resources available to small business to offset the costs of implementing a sustainable cyber security practice. Information Assurance Symposium Track 3 • Presenter: Likia T. Hawkins • Target Audience: Small Government Contracting Firms • Presentation Level: Introductory • Length: 1 hour Key Trends Industry Drivers Threats Challenges 1 2 3 4 Culture Operations TechnologyBudget 7 85 6
  • 5. Message from Small Business Administration Cybersecurity Message from SBA Key Trends Industry Drivers Threats Challenges 1 2 3 4 Culture Operations TechnologyBudget 7 85 6
  • 6. 6 Importance of Sustaining An Informed Cyber Workforce Threats: Demonstrated intent to harm an asset or cause it to become available • Estimated Global Cost of Cyber Crime Against Businesses is between $445 - $450 Billion every year with theft of intellectual property exceeding $160 Billion loss to individuals • 68% of small business reported being a cybervictim more than once • 43% of attacks targeted businesses with less than 250 employees as of 2015 • 60% of businesses attacked go out of business Opportunities BLUF: Easy target • Growth of web apps and mobile platforms • Careless or intentional actions by individuals • Misconfiguration and control of network devices • Security Gap • Priority given to operations and higher priority financial needs 1 Means, Opportunities, and Motives Means BLUF: Access to resources to initiate cyber attack • Availability of pre- packaged scripts • Easy access and availability of data to conduct cyber attack (e.g., bank records, employee data) • Access to back door to large organizations Motives BLUF: Vary Among threat Actors • Personal/Financial Gain • Political Gain • Discrediting Organization • Sabotage • Denial or Degradation • Ideology and Grudge • Fun Key Trends Industry Drivers Threats Challenges 1 2 3 4 Culture Operations TechnologyBudget 7 85 6
  • 7. Importance of Sustaining An Informed Cyber Workforce 2016 Data Breaches and Investigations Research Source: Verizon’s 2017 Data Breach Investigation Report 4/28/17 7 Trending in Wrong Direction • Avg Cost of Cybercrime Incident: $15.4M • # of Successful Attacks: Increased 46% in past 4 yrs. • Recovery Time: Can take up to 46 days for a company to resolve incident up from 14 days in 2010 Cyber Security Trends: Collective view from global experts on direction of data breaches and technology disruption that may impact particular direction 2 Attack Methods Evolution • Increased sophistication in phising and hacking schemes • Commoditization of Attacks • Simplification and Ease of Use Scripts • Ongoing & Persistent Use of Small Business As Entry Points into Large Businesses Cybercrime Costs Vary • Smaller orgs experienced higher proportion of cyber crime costs related to malware, web-based attacks and phising/social engineering • Larger orgs experienced higher costs related to denial of services, malicious insiders, and stolen devices Key Trends Industry Drivers Threats Challenges 1 2 3 4 Culture Operations TechnologyBudget 7 85 6
  • 8. Importance of Sustaining An Informed Cyber Workforce 8 Trending in Wrong Direction • Avg Cost of Cybercrime Incident: $15.4M • # of Successful Attacks: Increased 46% in past 4 yrs. • Recovery Time: Can take up to 46 days for a company to resolve incident up from 14 days in 2010 Cyber Security Trends: Collective view from global experts on direction of data breaches and technology disruption that may impact particular direction 2 Attack Methods Evolution • Increased sophistication in phising and hacking schemes • Commoditization of Attacks • Simplification and Ease of Use Scripts • Ongoing & Persistent Use of Small Business As Entry Points into Large Businesses Cybercrime Costs Vary • Smaller orgs experienced higher proportion of cyber crime costs related to malware, web-based attacks and phising/social engineering • Larger orgs experienced higher costs related to denial of services, malicious insiders, and stolen devices Key Trends Industry Drivers Threats Challenges 1 2 3 4 Culture Operations TechnologyBudget 7 85 6
  • 9. Importance of Sustaining An Informed Cyber Workforce 9 Trending in Wrong Direction • Avg Cost of Cybercrime Incident: $15.4M • # of Successful Attacks: Increased 46% in past 4 yrs. • Recovery Time: Can take up to 46 days for a company to resolve incident up from 14 days in 2010 Cyber Security Trends: Collective view from global experts on direction of data breaches and technology disruption that may impact particular direction 2 Attack Methods Evolution • Increased sophistication in phising and hacking schemes • Commoditization of Attacks • Simplification and Ease of Use Scripts • Ongoing & Persistent Use of Small Business As Entry Points into Large Businesses Cybercrime Costs Vary • Smaller orgs experienced higher proportion of cyber crime costs related to malware, web-based attacks and phising/social engineering • Larger orgs experienced higher costs related to denial of services, malicious insiders, and stolen devices Key Trends Industry Drivers Threats Challenges 1 2 3 4 Culture Operations TechnologyBudget 7 85 6
  • 10. Importance of Sustaining An Informed Cyber Workforce 10 Trending in Wrong Direction • Avg Cost of Cybercrime Incident Up: $15.4M • # of Successful Attacks: Increased: 46% in past 4 yrs. • Recovery Time Up: Can take up to 46 days for a company to resolve incident up from 14 days in 2010 Cyber Security Trends: Collective view from global experts on direction of data breaches and technology disruption that may impact particular direction 2 Attack Methods Evolution • Increased sophistication in phising and hacking schemes • Commoditization of Attacks • Simplification and Ease of Use Scripts • Ongoing & Persistent Use of Small Business As Entry Points into Large Businesses Cybercrime Costs Vary • Smaller orgs experienced higher proportion of cyber crime costs related to malware, web-based attacks and phising/social engineering • Larger orgs experienced higher costs related to denial of services, malicious insiders, and stolen devices Key Trends Industry Drivers Threats Challenges 1 2 3 4 Culture Operations TechnologyBudget 7 85 6
  • 11. Importance of Sustaining An Informed Cyber Workforce 11 Business Drivers: Resource, process or condition that is vital for the continued success and growth of a business 3 1. Comply with Federal and State regulations and laws (e.g, HIPAA, NISPOM) 2. Reduce/minimize operational cybersecurity related costs 3. Reduce/minimize revenue/sales losses 4. Maintain/increase client base 5. Maintain/increase reputation 6. Sustained Cybersecurity Awareness Key Trends Industry Drivers Threats Challenges 1 2 3 4 Culture Operations TechnologyBudget 7 85 6
  • 12. Challenges to Maintaining An Informed Cyber Workforce 12 Business Challenges: Tackling cybersecurity is one of the most serious economic challenges confronting businesses of all sizes. Protection of intellectual property, business and personal data requires: 1. Cybersecurity Strategy 2. Executive Commitment 3. Informed and Trained Resources 4. Standardized Processes 5. Cyber Focused Mindset 4 Culture OperationsBudget Technology • Balance Cyber Needs • Touch Budget Priorities • Alignment with Operational Needs • Executive Buy-In • Active Involvement • Commitment of Resources • Business Operation Integration • Policies • Standardize Processes (e.g., mobile plan, personal laptop usage) • Comprehensive Plan • Addresses On and off premise Control required to incorporates Mission Critical Data Key Trends Industry Drivers Threats Challenges 1 2 3 4 Culture Operations TechnologyBudget 7 85 6
  • 13. Challenges to Maintaining An Informed Cyber Workforce 13 Business Challenges: Tackling cybersecurity is one of the most serious economic challenges confronting businesses. Protection of intellectual property, business and personal data requires: 1. Cybersecurity Strategy 2. Executive Commitment 3. Informed and Trained Resources 4. Standardized Processes 5. Cyber Focused Mindset 4 Executive and director commitment to reporting, allocation of resources and aligning cybersecurity priorities with business objectives and how it will be implemented at the strategic, tactical and operational level Creation/development and maintenance of plans, policies, and processes that enables an understanding of how cybersecurity will be integrated into overarching business operations to achieve minimal disruption in the event of a cyber attack Commitment of corporate resources required to fund initiatives required to protect critical and personal data, and minimizes disruption Comprehensive and living plan that aligns technical and physical controls to critical and personal data, annual audits, roles and responsibilities, insider threat, and escalation procedures Culture Operations Technology Budget Key Trends Industry Drivers Threats Challenges 1 2 3 4 Culture Operations TechnologyBudget 7 85 6
  • 14. Resources Available to Sustain Your Cyber Workforce 5 Key Trends Industry Drivers Threats Challenges 1 2 3 4 Culture Operations TechnologyBudget 7 85 6 TakeChargeandAct • CEO Engagement • Prioritize Data Protection • Develop cybersecurity strategy • Create Cultural View as Cybersecurity as a Shared Responsibility • Treat cybersecurity as revenue enabler not business expense MakeEveryoneAccountable • Set Clear Expectations for Your Employees related to protecting business, client and personal data • Foster environment that encourages honesty and open dialogue • Conduct spot checks TrainandReinforce • Make Security Awareness a part of new hire training • Leverage educational resources • Repeat and frequency • Visual Aid Reinforcement • Set milestones and reward incentives for exceptional compliance CheckYourDefenses • Adopt Schedule for testing operational IT practices • Be Willing to Implement Vendor Tools • Audit Controls • Develop Plan of Actions and Milestones • Measure progress • Accountability 14 Culture Budget Technology Operations A Culture of Cybersecurity: Occurs from within and is the sum of your organization’s commitment and willingness to: 1. Take Charge And Act 2. Hold Everyone Accountable 3. Train & Reinforce 4. Check Defenses
  • 15. Resources Available to Sustain Your Cyber Workforce Key Trends Industry Drivers Threats Challenges 1 2 3 4 Culture Operations TechnologyBudget 7 85 6 Operations • Conduct semi-annual review of Federal and State Legislation, Laws and Policies • Align Cybersecurity Strategic Plan with guidelines and industry standards and best practices developed by private and public sector • Create cybersecurity policies that align with risk level and data seeking to protect • Includes Data, Mobile, and Personal Laptop , Email, Internet Usage, Social Media, Risks, Incidents, and Insider Threat policies • Align with Cybersecurity Plan to Policies, and Policies to Corporate Processes • Validate performance against plan, policy and processes, and update as needed 15 Culture Budget Technology Operations Integration of Cybersecurity into Business Operations involves: 1. Well defined corporate cybersecurity plan that aligns policies and processes to industry standards and best practices 2. Innovative approach to enhancing security posture of your systems and data 3. HR practices that educate employees about cyber threats while holding them accountable for complying with the organization’s cybersecurity policies and procedures. 6
  • 16. Resources Available to Sustain Your Cyber Workforce Key Trends Industry Drivers Threats Challenges 1 2 3 4 Culture Operations TechnologyBudget 7 85 6 Technology • Develop IT SW/HW baselines • Maintain CM Control of SW/HW Baseline • Keep IT SW & HW baselines current • Audit IT SW & HW compliance against Policies & Processes • Develop Plan of Actions & Milestones (POA&M’s) • Report and monitor POA&M corrective action plan progress • Assess IT Requirements on semi or annual basis • Be open and willing to implement vendor tools • Review cybersecurity controls of vendor to ensure functionality aligns with cybersecurity plan and processes 16 Culture Budget Technology Operations Integration of Cybersecurity into Business Operations involves: 1. Well defined corporate cybersecurity plan that aligns policies and processes to industry standards and best practices 2. Innovative approach to enhancing security posture of your systems and data 3. HR practices that educate employees about cyber threats while holding them accountable for complying with the organization’s cybersecurity policies and procedures. 6
  • 17. Resources Available to Sustain Your Cyber Workforce Key Trends Industry Drivers Threats Challenges 1 2 3 4 Culture Operations TechnologyBudget 7 85 6 Workforce • Establish security roles and responsibilities (e.g., clearly identify company data ownership, employee roles for security oversight, and inherit privileges) • Add as line item to employees job description • Integrate into yearly/semi-annual perf. evaluations • Workforce training principles incorporates topics such as How to Handle Critical and Personal Data, Self-Reporting and How to Respond to Incidents • Incorporated into ne hire security briefing • Spells out penalties for violating policies • Use Visual Cues to Reinforce Cybersecurity Practices • Conducted on a semi-annual and annual basis • Reviewed on an annual basis to ensure topics are relevant and continue to align with organization’s policies, programs and processes 17 Culture Budget Technology Operations Integration of Cybersecurity into Business Operations involves: 1. Well defined corporate cybersecurity plan that aligns policies and processes to industry standards and best practices 2. Innovative approach to enhancing security posture of your systems and data 3. HR practices that educate employees about cyber threats while holding them accountable for complying with the organization’s cybersecurity policies and procedures. 6
  • 18. Resources Available to Sustain Your Cyber Workforce Key Trends Industry Drivers Threats Challenges 1 2 3 4 Culture Operations TechnologyBudget 7 85 6 Operations • Business Operations Director or Manager should develop and evaluate on a yearly basis its cybersecurity budget that aligns the organization’s policies, programs, and processes • Should be feasible and realistic • Aligns to level of risk the organization is willing to accept and type of data it is seeking to protect • Sufficient funding to maintain a governance structure • Includes line item to fund for workforce training, securing the infrastructure, system testing and evaluation, system upgrades, facility security and perhaps, cybersecurity insurance • Presented and approved by Owner, CEO, or Partners 18 Culture Budget Technology Operations Budget: Businesses seeking to reduce the likelihood of a cyber attack should weigh the decision of adding budget line items that provides resources to integrate cybersecurity into: 1. Operations 2. Technology 3. Workforce 7
  • 19. Resources Available to Sustain Your Cyber Workforce Key Trends Industry Drivers Threats Challenges 1 2 3 4 Culture Operations TechnologyBudget 7 85 6 Technology • IT Director or Manager should develop and evaluate on a yearly bases its cybersecurity budget that aligns to the organization’s policies, programs and processes. • Should be feasible and realistic • Based on controls required to protect, defend, respond, and/or mitigate attacks • Should include funds required to upgrade and/or 1. IT SW 2. IT Hardware • Include line items that will employ layered defense strategy such as: web filtering software, antivirus signature protection, proactive malware protection, firewalls, intrusion detection systems, and border routers, and monitoring • Presented and approved by COO or Operation’s Director 19 Culture Budget Technology Operations Budget: Businesses seeking to reduce the likelihood of a cyber attack should weigh the decision of adding budget line items that provides resources to integrate cybersecurity into: 1. Operations 2. Technology 3. Workforce 7
  • 20. Resources Available to Sustain Your Cyber Workforce Key Trends Industry Drivers Threats Challenges 1 2 3 4 Culture Operations TechnologyBudget 7 85 6 Workforce • Human Resource Director or Manager should work with Operations and IT Director and Manager to develop and evaluate on a yearly bases its cybersecurity budget that aligns to the organization’s policies, programs and processes. • Should be feasible and realistic • Reinforce policies outlined in organization’s employee handbook and client agreements • Include line items that will: reinforce and train workforce and perform background checks and credentialing. • Presented and approved by COO or Operation’s Director 20 Culture Budget Technology Operations Budget: Businesses seeking to reduce the likelihood of a cyber attack should weigh the decision of adding budget line items that provides resources to integrate cybersecurity into: 1. Operations 2. Technology 3. Workforce 7
  • 21. Resources Available to Sustain Your Cyber Workforce Key Trends Industry Drivers Threats Challenges 1 2 3 4 Culture Operations TechnologyBudget 7 85 6 Executives&Management Purpose: Provide senior executives and management personnel with tools and techniques required to understand, assess, and define the organization’s cybersecurity policies, programs and processes to protect against threats and vulnerabilities Objectives: 1. Support development of cybersecurity policy, program, and processes 2.Ensure you understand the role an effective cybersecurity plan plays in your business, 3. How to apply government to ensure reduce exposure for your organization and yourself. Training Resources: •SBA Cybersecurity •Stop. Think. Connect. Small Business Resources •Security Awareness Visual Aides 21 Culture Budget Technology Operations Technology: Reinforcement of sound cybersecurity practices requires reinforcement of organizations policies, processes, and tools. Education should be Training should be customized based on the audience’s role in their organization at a high-level this should include Executives & Management, Implementers, and the Workforce 8
  • 22. Resources Available to Sustain Your Cyber Workforce Key Trends Industry Drivers Threats Challenges 1 2 3 4 Culture Operations TechnologyBudget 7 85 6 Implementers Purpose: Provide implementers with the knowledge, tools and techniques to properly analyze, assess, select and deploy appropriate technologies required to enhance security posture and protect organization’s sensitive data. Objectives: 1.Identify Risks 2.Analyze and Assess Cybersecurity Threats and Vulnerabilities 3.Understand Attack Vectors and Countermeasures 4.Configure & Deploy Countermeasures 5. Assess countermeasures Training Resources: • SBA Cybersecurity • National Cybersecurity and Communications Integration Center • Compliance Resources on Protecting Sensitive Data 22 Culture Budget Technology Operations Technology: Reinforcement of sound cybersecurity practices requires reinforcement of organizations policies, processes, and tools. Education should be Training should be customized based on the audience’s role in their organization at a high-level this should include Executives & Management, Implementers, and the Workforce 8
  • 23. Resources Available to Sustain Your Cyber Workforce Key Trends Industry Drivers Threats Challenges 1 2 3 4 Culture Operations TechnologyBudget 7 85 6 Workforce Purpose: Reinforce and educate on your workforce on the policies, processes, and program in place to increase the organization’s cybersecurity security posture Objectives: 1. Educate workforce on cybersecurity policies, program, and processes 2. Offer common language for workforce 3. Increase situational awareness 4. Increase Training Resources: • Corporate Employee Handbook • Corporate Security Awareness Briefing • SBA Cybersecurity • Cybersecurity Workforce Framework • Online Training Vendors (Cybrary.it) • SANS Cyber Aces Online 23 Culture Budget Technology Operations Technology: Reinforcement of sound cybersecurity practices requires reinforcement of organizations policies, processes, and tools. Education should be Training should be customized based on the audience’s role in their organization at a high-level this should include Executives & Management, Implementers, and the Workforce 8
  • 24. References 1. Cybersecurity In the Workplace Is Everybody’s Business, 10/11/16, Homeinsurance.com: http://www.nasdaq.com/article/cybersecurity-in-the-workplace-is-everybodys-business-cm691804, May 4, 2017 2. Verizon’s 2017 Data Breach Investigation Report 4/28/17, https://insidecybersecurity.com/document/verizons-2017-data-breach- investigation-report, May 4, 2017 3. Threats, Vulnerabilities and Exploits – oh my!, ICANN, 10 August 15. https://www.icann.org/news/blog/threats-vulnerabilities-and- exploits-oh-my, May 4, 2017 4. 10 cyber security trends to look out for in 2017, Information Age, http://www.information-age.com/10-cyber-security-trends-look- 2017-123463680/ 5. The Top 17 Security Predictions for 2017: Government Technology, January 8, 2017: http://www.govtech.com/blogs/lohrmann-on- cybersecurity/the-top-17-security-predictions-for-2017.html 6. Tutorial 1: The Impact of Cybercrime on Small Business, https://www.sbir.gov/tutorials/cyber-security/tutorial-1#, May 4, 2017 7. National Conference of State Legislature: http://www.ncsl.org/research/telecommunications-and-information- technology/cybersecurity-legislation-2016.aspx, May 5, 2017 8. Ponemon.org, 2016 Cost of Cyber Crime Study & the Risk of Business Innovation, http://www.ponemon.org/local/upload/file/2016%20HPE%20CCC%20GLOBAL%20REPORT%20FINAL%203.pdf, May 5, 2017 9. The new economics of cybercrime by Mahmood Sher-Jan, 2 November 2015 http://www.isaca.org/cyber/cyber-security- articles/pages/the-new-economics-of-cybercrime.aspx, May 7, 2017 10. Meeting the cybersecurity challenge by James Kaplan, Shantnu Sharma, and Allen Weinberg, http://www.mckinsey.com/business- functions/digital-mckinsey/our-insights/meeting-the-cybersecurity-challenge, May 7, 2017 11. Ten Cyber security Strategies, FCC, https://www.uschamber.com/sites/default/files/legacy/issues/defense/files/10_CYBER_Strategies_for_Small_Biz.pdf, May 7, 2017 12. FTC Issues Cybersecurity Guidance for Small Businesses, May 10, 2017, Insider Cybersecurity.com, https://insidecybersecurity.com/daily-briefs/ftc-issues-cybersecurity-guidance-small-businesses, May 11, 2017 13. Small Business Computer Security Basics, FTC.gov, https://www.ftc.gov/tips-advice/business-center/guidance/small-business- computer-security-basics, May 11, 2017 14. FCC Cyber Security Planning Guide,FCC, https://www.dhs.gov/sites/default/files/publications/FCC%20Cybersecurity%20Planning%20Guide_1.pdf, May 11, 2017 15. Small Business Cyber Security Guide, University of Southern Maine, Maine Cyber Security Cluster, Cyber Security Organization, 24