Cybersecurity
What you need to know
Cybersecurity What you need to know Agenda Introduction Kevin - - PowerPoint PPT Presentation
Cybersecurity What you need to know Agenda Introduction Kevin Bobroske What is cybersecurity? Why should I care? What can I do about it? High level cyber framework overview Summary + QA Fun stuff BIO Kevin
What you need to know
Kevin Bobroske
(CISM)
Security/Cybersecurity
Company
Definition of cybersecurity
: The practice of protecting systems, networks, and programs from digital attacks.
Confidentiality, Integrity and Availability (CIA Triad)
C - limit access to information I - assurance that the information is trustworthy and accurate A - guarantee of reliable access to the information by authorized people
Ventures, 2017)
systems and data are NOT useful to anyone but your employees and customers
cybersecurity
responds to threats across your infrastructure, network and applications
with compliance frameworks
systems and data are available and useful to your employees and customers
administration
performance issues
It is fundamentally flawed to protect against modern threats
“outside” groups can be detected and blocked
necessary but aren’t enough to keep businesses safe
perimeter based on identity that secures company resources that are located anywhere; including users, devices, apps, data, and infrastructure.
businesses (2019 Data Breach Investigations
Report)
fell prey to a cyberattack (Ponemon's 2018 State of
Cybersecurity)
attack, 58% suffered a data breach
breaches of small businesses in 2018 (Identity Breach
Report 2018)
It’s not if, it’s when an attack will occur. Are you ready?
priority?
is a growing concern among small and medium businesses and it’s not going away
there
program
supports including the organization's role in the supply chain, and the organizations place in the critical infrastructure sector
identifying legal and regulatory requirements regarding the cybersecurity capabilities of the organization
external organizational resources, and risk response activities as a basis for the organizations Risk Assessment
including priorities, constraints, risk tolerances, and assumptions used to support risk decisions associated with managing supply chain risks
the organization including physical and remote access
Awareness and Training including role based and privileged user training
integrity, and availability of information
procedures to maintain and manage the integrity of information systems and assets
Maintenance, including remote maintenance, activities
and resilience of systems and assists are consistent with
their potential impact is understood
capabilities to monitor cybersecurity events and verify the effectiveness of protective measures including network and physical activities
awareness of anomalous events
and after an incident
with stakeholders, law enforcement, external stakeholders as appropriate
support recovery activities including forensic analysis, and determining the impact of incidents
incorporating lessons learned from current and previous detection / response activities
Planning processes and procedures to restore systems and/or assets affected by cybersecurity incidents
learned and reviews of existing strategies
coordinated during and following the recovery from a cybersecurity incident
responsibility
people are always security’s weakest link
were due to human error, and 25% were comprised of both IT and business process failures (system glitches) (2018 Cost of a Data Breach Study)
someone did or should have done!
The practice of protecting systems, networks, and programs from digital attacks.
Dark Web Scans https://www.keepersecurity.com/free-data-breach-scan.html https://haveibeenpwned.com/ Malware https://dream-techs.com/?page_id=954 Hacker Maps https://www.digitalattackmap.com/#anim=1&color=0&country=ALL&list=0&time=18316&view=map https://threatmap.fortiguard.com/ https://cybermap.kaspersky.com/ https://threatmap.checkpoint.com/ https://map.lookingglasscyber.com/ Demo Videos https://www.youtube.com/watch?v=lod_8O53njM https://www.youtube.com/watch?v=CV39QzFpJx4 https://www.youtube.com/watch?v=-0ofQsAwF2I https://www.youtube.com/watch?v=lc7scxvKQOo https://www.youtube.com/watch?v=PWVN3Rq4gzw
Kevin Bobroske, MBA,CISM Co-Founder/Director Dream Technology Solutions kevin.Bobroske@dream-techs.com 250-744-7973 https://dream-techs.com