Crafting a Cybersecurity Strategy that Works
Texas Association of Broadcasters August 2016
Chris Homer PBS Technology & Operations
Crafting a Cybersecurity Strategy that Works Texas Association of - - PowerPoint PPT Presentation
Crafting a Cybersecurity Strategy that Works Texas Association of Broadcasters August 2016 Chris Homer PBS Technology & Operations Cybersecurity Strategy for Broadcasters Summary Broadcast Industry Challenges Understanding
Chris Homer PBS Technology & Operations
Type Definition
Web App Attack Attack the vulnerabilities and authentication of a web application layer such as invalidated redirects, cross site forgery, cross site scripting and others. Point-of-Sale
Remote attacks against the environments where card transactions are conducted.
Insider Misuse Internal or partner misuse of resources. Physical Theft & Loss Loss of information asset whereas the data is more valuable than the asset. Crimeware Use of malware followed by ramsomeware Cyber-espionage Access to state or corporate sensitive data. Denial of Service Any attack to compromise network or system availability.
*2016 Data Breach Investigation Report-Verizon
Step Description
Reconnaissance & Probing Find Target Harvest information (email, conference listings, public lists, etc.) Delivery & Attack Place delivery mechanism online Use social engineering to induce target to access malware or other exploits Installation & Exploitation Exploit vulnerabilities on target systems to acquire access Elevate user privileges and install additional “tools” Compromise & Expansion Exfiltration of data Use compromised systems to exploit additional systems
DAM Extra/Intra Net Traditional IT (ERP, HR, Programming, Research) File Ingest Enterprise Network Public Web Sites Internet NRCS
Internal Firewall
Station Playout STL or WAN to Hub General Users Traffic Scheduling Editing Graphics
*Framework for Improving Critical Infrastructure Cybersecurity NIST-2014
*Framework for Improving Critical Infrastructure Cybersecurity NIST-2014