SlideShare a Scribd company logo
Too Small to Get
Hacked? Think Again.
Actionable Strategies to Protect your SMB
Agenda
• Introductions
• The Current Security Landscape
• Most Common Types of Threats &
Cyberattacks
• How to Prevent the Most Common Types of
Threats (at any budget)
• Why and How Engage with Vendors
• Q&A
Meet the Speakers
Nikola Todev
Head of Info Sec
OnRamp
Nemi George
Sr. Director of Info Sec
& Service Operations,
Pacific Dental Services
Terry McDaniel
Vice President of IT &
Executive
Source Power and Gas
About OnRamp
OnRamp, a LightEdge company, offers
HITRUST-certified data center
services with a focus on delivering
highly available and secure hybrid
hosting.
The combination of OnRamp and
LightEdge creates the strongest
compliance and security solutions
portfolio on the market.
Together, they operate 7 enterprise-class data centers to deploy cloud computing,
colocation, disaster recovery and managed services.
About Source
Power & Gas
Source Power & Gas is a Texas-based retail energy provider with
retail operations in the Texas, Illinois, Ohio, Maryland and New Jersey
markets. We pride ourselves on providing both competitive rates and
exceptional customer service to all our customers - from residential
consumers to the largest commercial and industrial clients.
More at www.spgenergy.com
About Pacific
Dental Services
Founded in 1994, Pacific Dental Services® (PDS®) is
one of the country’s leading dental support
organizations, providing supported autonomy that
enables dentists to concentrate on clinical excellence
and the highest levels of cost-effective comprehensive
patient care. PDS originated the PRIVATE PRACTICE+®
model to enable dentists to focus on their passion:
serving patients.
More at www.pacificdentalservices.com
POLL
58% all cyberattacks target small businesses
2018 Verizon Data Breach Investigations Report (DBIR)
2018 Cost of a Data Breach Study by Ponemon
The average total cost of a data breach
reached $3.86 million in 2018
27.9%
$4M
2018
Likelihood of a recurring material breach
over the next two years:
The Current Landscape
What is a Cyberthreat?
• External Threats – I.e. Social Engineering
• Insider Threats – I.e. Employee maliciously sells login credentials
to access valuable info
Types of Cyberthreats
The possibility of a malicious attempt to damage or disrupt a
computer network or system with the intention to access files or
steal data.
Most Common Types of
Cyberattacks
1. Denial-of-service (DoS) and distributed denial-of-service (DDoS) attacks
2. Man-in-the-middle (MitM) attack
3. Phishing and spear phishing attacks
4. Drive-by attack
5. Password attack
6. SQL injection attack
7. Cross-site scripting (XSS) attack
8. Eavesdropping attack
9. Birthday attack
10. Malware attack
netwrix.com 2018
thebestvpn.com
1 in 131
emails
contains a
malware
POLL
How Can You Protect Your
Business?
• Perform analysis of the value of your assets. Which
assets are worth protecting?
• Understand how your business services interact with
the customers
• Develop goals for managing risks, security and
compliance
• Implement an Information Security Management
Program and Governance
• Determine what resources are available to achieve
goals. Will you need the assistance of outside vendors?
Classification of Assets
How data is used and/or accessed determines the level of
risk you’re willing to accept and the time, effort, and
money it takes to secure assets based on their value.
What is the impact of these assets to your operations?
(financial implications, reputational damage, loss of
business opportunities, or legal consequences)
Image Source: securefirstsolutions.com
How Can You Protect Your
Business (Cont.)
Take a holistic approach:
• People
• Program Development
• Processes, Policies, and
Procedures
• Technology
Risk Management Process
Communicate
People
• Conduct Employee Training (at least once per year)
• General Training
• Group-Specific Training
• Manage roles and identities
• Use gamification of security awareness to develop a culture of
security
Your employees are either your greatest asset or weakest
link! 47% of data breaches are caused by employee
negligence. For example, weak, stolen or reused passwords
cause 81% of breaches.
SecuirtyMagazine.com
InfoSecurityMagazine.com
Develop an Information Security
Management Program
• System with built in maturity assessment and
measurement of control effectiveness. SANS top 20,
ISO 27001, are a good place to start.
• Creates a minimum bench mark for operation and also
sets a target for compliance and remediation. The
program must be backed up with a minimum
technology security baseline program.
• Create a security score card
Processes, Policies, &
Procedures
Focus on user centric security and audit operational and business
processes. Be sure to enforce policies once they’re developed:
• I.e. Data Classification Policy, DLP, Acceptable Use Policy,
Change Management Policy, Remote Access Policy,
Remote Access Policy, Password Policy
• Implement controls that prevent issues before they occur:
• I.e. Network Segmentation, Access Control
• Perform periodic security assessments/audits with penetration
testing
• Be prepared for incidents: Conduct simulations, including
incident response
Technology
Choose tools that assist in managing
the risks of your business services -
defense, monitoring, threat awareness,
visibility and automation.
Detection
Response
Prevention
Redundancy is also key. Use data backups and implement
a disaster recovery plan
•Data encryption in transit and at rest
•Firewalls
•Identity and access management
•Multi-factor authentication
•Cloud encryption
•Audit logs showing access to data
•Vulnerability scanning, intrusion
detection/prevention
•Hardware and OS patching
•Security Audits
•Security Information & Event Management
(SIEM)
SMB Case Studies
Code Spaces: a former SaaS provider
Attacked via DDoS through its Amazon Cloud control panel. Hackers erased data,
backups, offsite backups, & configurations before extorting the business by claiming
a fee to resolve their issues. Code Spaces was unable to resolve the issue and repay
customers. Code Spaces was unable to continue operations and closed.
Medium-sized Retail Organization
Organization had a very robust Cyber-security plan with a tested DR
plan. A key vendor of the organization, while going through integration
work, was successfully attacked with ransomware. The security
posturing of ABC Company prevented the attack from entering ABC’s
systems, the vendor attack took out operations for over two weeks. The
final cost to the vendor is still being determined but ABC company lost
close to half a million dollars because of the impact to the day to day
operations
Nearly 60% of small businesses that fail within six months of being hacked.
Vendor Assessment
Security
Understands
Your Business
Goals
Credentials &
Certifications
Service Level
Agreements (SLAs)
Meets Your BAA
Requirements (If
applicable)
Expertise in Your
Industry
Availability &
Scalability
Beware of 3rd Party Risk Indicators
• Turnover of the vendor’s key personnel
• IT glitches, operational failures and
stoppages
• Outdated IT systems and equipment
• History of frequent data breach
incidents
• Legal actions against the vendor
• Poorly written security and privacy
policies and procedures
Thank you! Questions?
Contact Us
Nikola Todev
Head of Info Sec
OnRamp
Ntodev@lightedge.com
Nemi George
Sr. Director of Info Sec
& Service Operations,
Pacific Dental Services
Nemi.George@pacden.
com
Terry McDaniel
Vice President of IT &
Executive
Source Power and Gas
tmcdaniel@spgenergy.com

More Related Content

What's hot

Data Driven Decisions - Big Data Warehousing Meetup, FICO
Data Driven Decisions - Big Data Warehousing Meetup, FICOData Driven Decisions - Big Data Warehousing Meetup, FICO
Data Driven Decisions - Big Data Warehousing Meetup, FICO
Caserta
 
Extending BI with Big Data Analytics
Extending BI with Big Data AnalyticsExtending BI with Big Data Analytics
Extending BI with Big Data Analytics
Datameer
 
Supply Chain Intelligence and Analytics Executive Guidelines for Success
Supply Chain Intelligence and Analytics Executive Guidelines for SuccessSupply Chain Intelligence and Analytics Executive Guidelines for Success
Supply Chain Intelligence and Analytics Executive Guidelines for Success
Halo BI
 
Big Data in Financial Services: How to Improve Performance with Data-Driven D...
Big Data in Financial Services: How to Improve Performance with Data-Driven D...Big Data in Financial Services: How to Improve Performance with Data-Driven D...
Big Data in Financial Services: How to Improve Performance with Data-Driven D...
Perficient, Inc.
 
Best Practices in Implementing Social and Mobile CX for Utilities
Best Practices in Implementing Social and Mobile CX for UtilitiesBest Practices in Implementing Social and Mobile CX for Utilities
Best Practices in Implementing Social and Mobile CX for Utilities
Capgemini
 
Machine Learning in Banking
Machine Learning in BankingMachine Learning in Banking
Machine Learning in Banking
accenture
 
Better Business From Exploring Ideas - AWS Summit Sydney 2018
Better Business From Exploring Ideas - AWS Summit Sydney 2018Better Business From Exploring Ideas - AWS Summit Sydney 2018
Better Business From Exploring Ideas - AWS Summit Sydney 2018
Amazon Web Services
 
Teaching organizations to fish in a data-rich future: Stories from data leaders
Teaching organizations to fish in a data-rich future: Stories from data leadersTeaching organizations to fish in a data-rich future: Stories from data leaders
Teaching organizations to fish in a data-rich future: Stories from data leaders
Amanda Sirianni
 
Inside the mind of Generation D: What it means to be data-rich and analytica...
Inside the mind of Generation D:  What it means to be data-rich and analytica...Inside the mind of Generation D:  What it means to be data-rich and analytica...
Inside the mind of Generation D: What it means to be data-rich and analytica...
Derek Franks
 
The Big Picture: Real-time Data is Defining Intelligent Offers
The Big Picture: Real-time Data is Defining Intelligent OffersThe Big Picture: Real-time Data is Defining Intelligent Offers
The Big Picture: Real-time Data is Defining Intelligent Offers
Cloudera, Inc.
 
CRM is not enough
CRM is not enoughCRM is not enough
CRM is not enough
Segment
 
Hadoop: Revolutionizing Analytics AND Operations
Hadoop: Revolutionizing Analytics AND OperationsHadoop: Revolutionizing Analytics AND Operations
Hadoop: Revolutionizing Analytics AND Operations
MapR Technologies
 
Credit Card Analytics on a Connected Data Platform
Credit Card Analytics on a Connected Data PlatformCredit Card Analytics on a Connected Data Platform
Credit Card Analytics on a Connected Data Platform
Hortonworks
 
It’s Not Enough to Just Collect Data
It’s Not Enough to Just Collect DataIt’s Not Enough to Just Collect Data
It’s Not Enough to Just Collect Data
Teradata
 
Introducing Gartner
Introducing GartnerIntroducing Gartner
Introducing Gartner
chrisforte43
 
IBM Big Data Analytics - Cognitive Computing and Watson - Findability Day 2014
IBM Big Data Analytics - Cognitive Computing and Watson - Findability Day 2014IBM Big Data Analytics - Cognitive Computing and Watson - Findability Day 2014
IBM Big Data Analytics - Cognitive Computing and Watson - Findability Day 2014
Findwise
 
TIBCO presentation at the Chief Analytics Officer Forum East Coast 2016 (#CAO...
TIBCO presentation at the Chief Analytics Officer Forum East Coast 2016 (#CAO...TIBCO presentation at the Chief Analytics Officer Forum East Coast 2016 (#CAO...
TIBCO presentation at the Chief Analytics Officer Forum East Coast 2016 (#CAO...
Chief Analytics Officer Forum
 
Dubai Big Data in Finance, Intro to Hadoop 2-Apr-14 - Michael Segel
Dubai Big Data in Finance, Intro to Hadoop 2-Apr-14 - Michael SegelDubai Big Data in Finance, Intro to Hadoop 2-Apr-14 - Michael Segel
Dubai Big Data in Finance, Intro to Hadoop 2-Apr-14 - Michael Segel
Michael Segel
 

What's hot (20)

Data Driven Decisions - Big Data Warehousing Meetup, FICO
Data Driven Decisions - Big Data Warehousing Meetup, FICOData Driven Decisions - Big Data Warehousing Meetup, FICO
Data Driven Decisions - Big Data Warehousing Meetup, FICO
 
Extending BI with Big Data Analytics
Extending BI with Big Data AnalyticsExtending BI with Big Data Analytics
Extending BI with Big Data Analytics
 
Supply Chain Intelligence and Analytics Executive Guidelines for Success
Supply Chain Intelligence and Analytics Executive Guidelines for SuccessSupply Chain Intelligence and Analytics Executive Guidelines for Success
Supply Chain Intelligence and Analytics Executive Guidelines for Success
 
Big Data in Financial Services: How to Improve Performance with Data-Driven D...
Big Data in Financial Services: How to Improve Performance with Data-Driven D...Big Data in Financial Services: How to Improve Performance with Data-Driven D...
Big Data in Financial Services: How to Improve Performance with Data-Driven D...
 
Best Practices in Implementing Social and Mobile CX for Utilities
Best Practices in Implementing Social and Mobile CX for UtilitiesBest Practices in Implementing Social and Mobile CX for Utilities
Best Practices in Implementing Social and Mobile CX for Utilities
 
Machine Learning in Banking
Machine Learning in BankingMachine Learning in Banking
Machine Learning in Banking
 
Better Business From Exploring Ideas - AWS Summit Sydney 2018
Better Business From Exploring Ideas - AWS Summit Sydney 2018Better Business From Exploring Ideas - AWS Summit Sydney 2018
Better Business From Exploring Ideas - AWS Summit Sydney 2018
 
Big Data & Analytics Day
Big Data & Analytics Day Big Data & Analytics Day
Big Data & Analytics Day
 
Teaching organizations to fish in a data-rich future: Stories from data leaders
Teaching organizations to fish in a data-rich future: Stories from data leadersTeaching organizations to fish in a data-rich future: Stories from data leaders
Teaching organizations to fish in a data-rich future: Stories from data leaders
 
Inside the mind of Generation D: What it means to be data-rich and analytica...
Inside the mind of Generation D:  What it means to be data-rich and analytica...Inside the mind of Generation D:  What it means to be data-rich and analytica...
Inside the mind of Generation D: What it means to be data-rich and analytica...
 
The Big Picture: Real-time Data is Defining Intelligent Offers
The Big Picture: Real-time Data is Defining Intelligent OffersThe Big Picture: Real-time Data is Defining Intelligent Offers
The Big Picture: Real-time Data is Defining Intelligent Offers
 
CRM is not enough
CRM is not enoughCRM is not enough
CRM is not enough
 
Hadoop: Revolutionizing Analytics AND Operations
Hadoop: Revolutionizing Analytics AND OperationsHadoop: Revolutionizing Analytics AND Operations
Hadoop: Revolutionizing Analytics AND Operations
 
Credit Card Analytics on a Connected Data Platform
Credit Card Analytics on a Connected Data PlatformCredit Card Analytics on a Connected Data Platform
Credit Card Analytics on a Connected Data Platform
 
It’s Not Enough to Just Collect Data
It’s Not Enough to Just Collect DataIt’s Not Enough to Just Collect Data
It’s Not Enough to Just Collect Data
 
Introducing Gartner
Introducing GartnerIntroducing Gartner
Introducing Gartner
 
IBM Big Data Analytics - Cognitive Computing and Watson - Findability Day 2014
IBM Big Data Analytics - Cognitive Computing and Watson - Findability Day 2014IBM Big Data Analytics - Cognitive Computing and Watson - Findability Day 2014
IBM Big Data Analytics - Cognitive Computing and Watson - Findability Day 2014
 
TIBCO presentation at the Chief Analytics Officer Forum East Coast 2016 (#CAO...
TIBCO presentation at the Chief Analytics Officer Forum East Coast 2016 (#CAO...TIBCO presentation at the Chief Analytics Officer Forum East Coast 2016 (#CAO...
TIBCO presentation at the Chief Analytics Officer Forum East Coast 2016 (#CAO...
 
Dubai Big Data in Finance, Intro to Hadoop 2-Apr-14 - Michael Segel
Dubai Big Data in Finance, Intro to Hadoop 2-Apr-14 - Michael SegelDubai Big Data in Finance, Intro to Hadoop 2-Apr-14 - Michael Segel
Dubai Big Data in Finance, Intro to Hadoop 2-Apr-14 - Michael Segel
 
01 big dataoverview
01 big dataoverview01 big dataoverview
01 big dataoverview
 

Similar to Too Small to Get Hacked? Think Again (Webinar)

Nonprofit Cybersecurity Risk Assessment Basics
Nonprofit Cybersecurity Risk Assessment BasicsNonprofit Cybersecurity Risk Assessment Basics
Nonprofit Cybersecurity Risk Assessment Basics
Community IT Innovators
 
Cybersecurity- What Retailers Need To Know
Cybersecurity- What Retailers Need To KnowCybersecurity- What Retailers Need To Know
Cybersecurity- What Retailers Need To Know
Shantam Goel
 
Cyber Security for the Small Business Experience
Cyber Security for the Small Business ExperienceCyber Security for the Small Business Experience
Cyber Security for the Small Business Experience
National Retail Federation
 
ComResource Business Solutions
ComResource Business SolutionsComResource Business Solutions
ComResource Business Solutions
Anthony Dials
 
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Cristian Garcia G.
 
What CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber SecurityWhat CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber Security
Karyl Scott
 
Cyber Security for Non-Technical Executives (SC GMIS) Columbia, SC
Cyber Security for Non-Technical Executives (SC GMIS) Columbia, SCCyber Security for Non-Technical Executives (SC GMIS) Columbia, SC
Cyber Security for Non-Technical Executives (SC GMIS) Columbia, SC
AT-NET Services, Inc. - Charleston Division
 
SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)Norm Barber
 
Managing security threats in today’s enterprise
Managing security threats in today’s enterpriseManaging security threats in today’s enterprise
Managing security threats in today’s enterprise
Quick Heal Technologies Ltd.
 
Quantifying Cyber Risk, Insurance and The Value of Personal Data
Quantifying Cyber Risk, Insurance and The Value of Personal DataQuantifying Cyber Risk, Insurance and The Value of Personal Data
Quantifying Cyber Risk, Insurance and The Value of Personal Data
Steven Schwartz
 
CCA study group
CCA study groupCCA study group
CCA study group
IIBA UK Chapter
 
Your cyber security webinar
Your cyber security webinarYour cyber security webinar
Your cyber security webinar
Intergen
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
Anil
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
Anil
 
CyberM3 Business Enablement: Cybersecurity That Empowers Your Business with C...
CyberM3 Business Enablement: Cybersecurity That Empowers Your Business with C...CyberM3 Business Enablement: Cybersecurity That Empowers Your Business with C...
CyberM3 Business Enablement: Cybersecurity That Empowers Your Business with C...
Booz Allen Hamilton
 
Best Practices to Cybersecurity Vulnerability Management,.pdf
Best Practices to Cybersecurity Vulnerability Management,.pdfBest Practices to Cybersecurity Vulnerability Management,.pdf
Best Practices to Cybersecurity Vulnerability Management,.pdf
Tuan Yang
 
Beware the Firewall My Son: The Workshop
Beware the Firewall My Son: The WorkshopBeware the Firewall My Son: The Workshop
Beware the Firewall My Son: The Workshop
Michele Chubirka
 
Strategic Insights on IT & Cyber Risk Assessments.pdf
Strategic Insights on IT & Cyber Risk Assessments.pdfStrategic Insights on IT & Cyber Risk Assessments.pdf
Strategic Insights on IT & Cyber Risk Assessments.pdf
lilabroughton259
 
ComResource Agency Solutions
ComResource Agency SolutionsComResource Agency Solutions
ComResource Agency Solutions
Anthony Dials
 

Similar to Too Small to Get Hacked? Think Again (Webinar) (20)

Nonprofit Cybersecurity Risk Assessment Basics
Nonprofit Cybersecurity Risk Assessment BasicsNonprofit Cybersecurity Risk Assessment Basics
Nonprofit Cybersecurity Risk Assessment Basics
 
Cybersecurity- What Retailers Need To Know
Cybersecurity- What Retailers Need To KnowCybersecurity- What Retailers Need To Know
Cybersecurity- What Retailers Need To Know
 
Cyber Security for the Small Business Experience
Cyber Security for the Small Business ExperienceCyber Security for the Small Business Experience
Cyber Security for the Small Business Experience
 
ComResource Business Solutions
ComResource Business SolutionsComResource Business Solutions
ComResource Business Solutions
 
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
 
What CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber SecurityWhat CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber Security
 
Cyber Security for Non-Technical Executives (SC GMIS) Columbia, SC
Cyber Security for Non-Technical Executives (SC GMIS) Columbia, SCCyber Security for Non-Technical Executives (SC GMIS) Columbia, SC
Cyber Security for Non-Technical Executives (SC GMIS) Columbia, SC
 
SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)
 
Managing security threats in today’s enterprise
Managing security threats in today’s enterpriseManaging security threats in today’s enterprise
Managing security threats in today’s enterprise
 
Quantifying Cyber Risk, Insurance and The Value of Personal Data
Quantifying Cyber Risk, Insurance and The Value of Personal DataQuantifying Cyber Risk, Insurance and The Value of Personal Data
Quantifying Cyber Risk, Insurance and The Value of Personal Data
 
CCA study group
CCA study groupCCA study group
CCA study group
 
Your cyber security webinar
Your cyber security webinarYour cyber security webinar
Your cyber security webinar
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
 
CyberM3 Business Enablement: Cybersecurity That Empowers Your Business with C...
CyberM3 Business Enablement: Cybersecurity That Empowers Your Business with C...CyberM3 Business Enablement: Cybersecurity That Empowers Your Business with C...
CyberM3 Business Enablement: Cybersecurity That Empowers Your Business with C...
 
Best Practices to Cybersecurity Vulnerability Management,.pdf
Best Practices to Cybersecurity Vulnerability Management,.pdfBest Practices to Cybersecurity Vulnerability Management,.pdf
Best Practices to Cybersecurity Vulnerability Management,.pdf
 
Simple Safe Steps to Cyber Security
Simple Safe Steps to Cyber SecuritySimple Safe Steps to Cyber Security
Simple Safe Steps to Cyber Security
 
Beware the Firewall My Son: The Workshop
Beware the Firewall My Son: The WorkshopBeware the Firewall My Son: The Workshop
Beware the Firewall My Son: The Workshop
 
Strategic Insights on IT & Cyber Risk Assessments.pdf
Strategic Insights on IT & Cyber Risk Assessments.pdfStrategic Insights on IT & Cyber Risk Assessments.pdf
Strategic Insights on IT & Cyber Risk Assessments.pdf
 
ComResource Agency Solutions
ComResource Agency SolutionsComResource Agency Solutions
ComResource Agency Solutions
 

Recently uploaded

State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 

Recently uploaded (20)

State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 

Too Small to Get Hacked? Think Again (Webinar)

  • 1. Too Small to Get Hacked? Think Again. Actionable Strategies to Protect your SMB
  • 2. Agenda • Introductions • The Current Security Landscape • Most Common Types of Threats & Cyberattacks • How to Prevent the Most Common Types of Threats (at any budget) • Why and How Engage with Vendors • Q&A
  • 3. Meet the Speakers Nikola Todev Head of Info Sec OnRamp Nemi George Sr. Director of Info Sec & Service Operations, Pacific Dental Services Terry McDaniel Vice President of IT & Executive Source Power and Gas
  • 4. About OnRamp OnRamp, a LightEdge company, offers HITRUST-certified data center services with a focus on delivering highly available and secure hybrid hosting. The combination of OnRamp and LightEdge creates the strongest compliance and security solutions portfolio on the market. Together, they operate 7 enterprise-class data centers to deploy cloud computing, colocation, disaster recovery and managed services.
  • 5. About Source Power & Gas Source Power & Gas is a Texas-based retail energy provider with retail operations in the Texas, Illinois, Ohio, Maryland and New Jersey markets. We pride ourselves on providing both competitive rates and exceptional customer service to all our customers - from residential consumers to the largest commercial and industrial clients. More at www.spgenergy.com
  • 6. About Pacific Dental Services Founded in 1994, Pacific Dental Services® (PDS®) is one of the country’s leading dental support organizations, providing supported autonomy that enables dentists to concentrate on clinical excellence and the highest levels of cost-effective comprehensive patient care. PDS originated the PRIVATE PRACTICE+® model to enable dentists to focus on their passion: serving patients. More at www.pacificdentalservices.com
  • 8. 58% all cyberattacks target small businesses 2018 Verizon Data Breach Investigations Report (DBIR) 2018 Cost of a Data Breach Study by Ponemon The average total cost of a data breach reached $3.86 million in 2018 27.9% $4M 2018 Likelihood of a recurring material breach over the next two years: The Current Landscape
  • 9. What is a Cyberthreat? • External Threats – I.e. Social Engineering • Insider Threats – I.e. Employee maliciously sells login credentials to access valuable info Types of Cyberthreats The possibility of a malicious attempt to damage or disrupt a computer network or system with the intention to access files or steal data.
  • 10. Most Common Types of Cyberattacks 1. Denial-of-service (DoS) and distributed denial-of-service (DDoS) attacks 2. Man-in-the-middle (MitM) attack 3. Phishing and spear phishing attacks 4. Drive-by attack 5. Password attack 6. SQL injection attack 7. Cross-site scripting (XSS) attack 8. Eavesdropping attack 9. Birthday attack 10. Malware attack netwrix.com 2018 thebestvpn.com 1 in 131 emails contains a malware
  • 11. POLL
  • 12. How Can You Protect Your Business? • Perform analysis of the value of your assets. Which assets are worth protecting? • Understand how your business services interact with the customers • Develop goals for managing risks, security and compliance • Implement an Information Security Management Program and Governance • Determine what resources are available to achieve goals. Will you need the assistance of outside vendors?
  • 13. Classification of Assets How data is used and/or accessed determines the level of risk you’re willing to accept and the time, effort, and money it takes to secure assets based on their value. What is the impact of these assets to your operations? (financial implications, reputational damage, loss of business opportunities, or legal consequences) Image Source: securefirstsolutions.com
  • 14. How Can You Protect Your Business (Cont.) Take a holistic approach: • People • Program Development • Processes, Policies, and Procedures • Technology Risk Management Process Communicate
  • 15. People • Conduct Employee Training (at least once per year) • General Training • Group-Specific Training • Manage roles and identities • Use gamification of security awareness to develop a culture of security Your employees are either your greatest asset or weakest link! 47% of data breaches are caused by employee negligence. For example, weak, stolen or reused passwords cause 81% of breaches. SecuirtyMagazine.com InfoSecurityMagazine.com
  • 16. Develop an Information Security Management Program • System with built in maturity assessment and measurement of control effectiveness. SANS top 20, ISO 27001, are a good place to start. • Creates a minimum bench mark for operation and also sets a target for compliance and remediation. The program must be backed up with a minimum technology security baseline program. • Create a security score card
  • 17. Processes, Policies, & Procedures Focus on user centric security and audit operational and business processes. Be sure to enforce policies once they’re developed: • I.e. Data Classification Policy, DLP, Acceptable Use Policy, Change Management Policy, Remote Access Policy, Remote Access Policy, Password Policy • Implement controls that prevent issues before they occur: • I.e. Network Segmentation, Access Control • Perform periodic security assessments/audits with penetration testing • Be prepared for incidents: Conduct simulations, including incident response
  • 18. Technology Choose tools that assist in managing the risks of your business services - defense, monitoring, threat awareness, visibility and automation. Detection Response Prevention Redundancy is also key. Use data backups and implement a disaster recovery plan •Data encryption in transit and at rest •Firewalls •Identity and access management •Multi-factor authentication •Cloud encryption •Audit logs showing access to data •Vulnerability scanning, intrusion detection/prevention •Hardware and OS patching •Security Audits •Security Information & Event Management (SIEM)
  • 19. SMB Case Studies Code Spaces: a former SaaS provider Attacked via DDoS through its Amazon Cloud control panel. Hackers erased data, backups, offsite backups, & configurations before extorting the business by claiming a fee to resolve their issues. Code Spaces was unable to resolve the issue and repay customers. Code Spaces was unable to continue operations and closed. Medium-sized Retail Organization Organization had a very robust Cyber-security plan with a tested DR plan. A key vendor of the organization, while going through integration work, was successfully attacked with ransomware. The security posturing of ABC Company prevented the attack from entering ABC’s systems, the vendor attack took out operations for over two weeks. The final cost to the vendor is still being determined but ABC company lost close to half a million dollars because of the impact to the day to day operations Nearly 60% of small businesses that fail within six months of being hacked.
  • 20. Vendor Assessment Security Understands Your Business Goals Credentials & Certifications Service Level Agreements (SLAs) Meets Your BAA Requirements (If applicable) Expertise in Your Industry Availability & Scalability
  • 21. Beware of 3rd Party Risk Indicators • Turnover of the vendor’s key personnel • IT glitches, operational failures and stoppages • Outdated IT systems and equipment • History of frequent data breach incidents • Legal actions against the vendor • Poorly written security and privacy policies and procedures
  • 23. Contact Us Nikola Todev Head of Info Sec OnRamp Ntodev@lightedge.com Nemi George Sr. Director of Info Sec & Service Operations, Pacific Dental Services Nemi.George@pacden. com Terry McDaniel Vice President of IT & Executive Source Power and Gas tmcdaniel@spgenergy.com

Editor's Notes

  1. Do you currently have a plan in place to mitigate and contain an attack?
  2. How much time have you spent thinking about or how much money have you spent on Cyber-security. How many have a plan in place if they were hacked today What would happen if they were fined $100k by the government (use any number here). How would it impact your operations or would it force your business to close?
  3. Discuss the different between incident vs breach External – Give Examples Examples: Mass emails to employees posing as trusted persons or companies User clicks on a link and the malicious code is in the system Social engineering Attacker calls posing as IT to get you to give your login information Thumb drives left in public places with malicious code installed that auto-runs when plugged in to a computer Insider - Give Examples Employee maliciously gives/sells login information Employee loads code into system
  4. Denial of Service Attacks are the most common types of attacks, largely as they are performed externally and most times organizations do not realize they are under attack and put performance hits down to slow speeds, congestion, or end point issues. They are also the hardest to prevent, although once in action, they are fairly easy to address with the right tools and personnel. Man in the Middle (MitM) attacks are the 2nd most common, when a hijacker inserts itself between client – server communication. Phishing & Spear Phishing is the 3rd most common, but the 2nd most difficult to prevent as it relies on employee and user behavior. Phishing and other social engineering attacks are still the easiest and least expensive way to attack most organizations, and it is especially effective due to its scatter gun approach especially when it is used to distribute malware. How often do these occur?
  5. What barriers are keeping you from protecting your business and its assets?
  6. What is the value of assets, what are the threats to those assets (value, ownership, availability) Terry regarding goals: Deciding what industry standard to implement like ISO 27001, NIST, etc. Our goals in the most basic terms were, 1. Plan, (decide standard) 2. Assessment, 3. Fix critical, 4. Identify data criticality, 5. Develop and implement DR plan, 6. Implement SIEM with automation. Nikola regarding goals: Sample goals for managing risks, security and compliance include: Definition of levels of criticality above which we must act with a sense of urgency, authorization for risks above certain levels etc. Ability to control access to different level of assets Ability to monitor access to and usage of assets Ability to exchange sensitive assets with partners in a secure and confidential manner Ability to dispose of sensitive assets in a safe, unrecoverable manner Compliance with requirements of specific frameworks to enable business with specific entities
  7. This goes back to poll – if you said yes, but haven’t identified and classified your assets, you have a faulty cybersecurity plan!
  8. Employee negligence is the main cause of data breaches, according to a state of the industry report by Shred-it, an information security company. The report found that 47 percent of business leaders said human error such as accidental loss of a device or document by an employee had caused a data breach at their organization. Gamification: Running social campaigns such as USB drops, phishing simulation, are good practices to raise awareness and turn your greatest asset \ weakest link into security agents. Produce dashboards on outcomes of exercises – most phish prone department to least prone department; first 5 people to report phish mail, etc. reward with prices – can be a $25 voucher, a T Shirt, or just a mention in the weekly office memo / newsletter.
  9. Highlight a few of these policies
  10. Do you know where your data is being stored, processed or transmitted to? Who has access to your data? Do they work onshore / offshore? Is their organization regulated? Do they have logical and physical security controls? Do they have a named individual responsible for information security?, etc.
  11. Discuss the warning signs of a 3rd party that is struggling with their own security measures, and will likely put you at risk, too. It’s not impossible to determine like some organizations indicate across studies.