Cyber Readiness Program
Presented by: Henry Vido, Program Director, CRI Mohamed Mahdy, Information Technology & Administration Director, IBAG
Cyber Readiness Program Presented by: Henry Vido, Program - - PowerPoint PPT Presentation
Cyber Readiness Program Presented by: Henry Vido, Program Director, CRI Mohamed Mahdy, Information Technology & Administration Director, IBAG The Cyber Readiness Institute empowers small and medium- sized organizations with practical
Presented by: Henry Vido, Program Director, CRI Mohamed Mahdy, Information Technology & Administration Director, IBAG
The Cyber Readiness Institute empowers small and medium- sized organizations with practical tools and resources to improve their cybersecurity. Our first offering is the free, validated Cyber Readiness Program. Our Co-Chairs and Members are cyber experts and business leaders – from across sectors and regions – who have come together to secure global value chains.
cyber resilient
authentication, and USBs – and providing guidance for incident response and going to the cloud
tools and metrics
A weak password is an easy access point to your most sensitive information and systems.
Patches are updates to your software and systems that contain important security remedies.
Phishing is an email-borne attack that attempts to use your email account to do something malicious.
USBs and removable media devices are easy gateways for malware to infect your computer.
The Program also provides guidance on moving to the Cloud.
be customized for each
internal Cyber Leader.
Cyber Readiness Leader. Tips on being an effective Cyber Readiness Leader. Commitment letter between CEO and the Leader.
issues: Authentication, Patching, Phishing, and USB use. Prioritize what to protect and what to move to the cloud and when. Establish baseline metrics.
templates so they are practical for
from template.
to workforce. Access training and communication
measure impact. Obtain a certificate from the Cyber Readiness Institute.
What do we have? Network infrastructure Workstations list Servers list Types of information What is the most important? Network infrastructure Workstations list Servers list Types of information
Spot check
department managers
with some HQ employees
Results
Cyber ready
against security measurements from some employees Decision We should run security awareness program (During and after the program)
Develop a Policy
USBs in your
developing a strong company policy either prohibiting USB use or at a minimum monitoring their use. Educate Employees
malware or malicious code present. This applies even to new USBs
information needs to be shared with a trusted party and there is no access to a secure network
USB must be re-scanned on a computer not connected to the network by the Cyber Leader or designated IT person, to check for malware or malicious code
at a trade show, given to them by a vendor, picked up in a parking lot) or the Cyber Leader or designated IT person
Disable USB port using Domain GPO ( HQ & CSC) Disable USB port remotely using Registry editor ( Branches)
devices used for business.
Passphrases must be at least 64 characters in
special characters, or a combination of lower and upper case