gourmet cyber security on a fast food budget
play

Gourmet Cyber Security on a Fast Food Budget DAVID ROSSELL, PH.D., - PowerPoint PPT Presentation

Gourmet Cyber Security on a Fast Food Budget DAVID ROSSELL, PH.D., CISSP NTIVA, INC. Maximizing Your Cybersecurity Investment o Know What You Value o Understand Your Risks o Invest appropriately Know What You Value Understand your data o What


  1. Gourmet Cyber Security on a Fast Food Budget DAVID ROSSELL, PH.D., CISSP NTIVA, INC.

  2. Maximizing Your Cybersecurity Investment o Know What You Value o Understand Your Risks o Invest appropriately

  3. Know What You Value Understand your data o What do you need to keep? o How long do you need to keep it? o Who needs to access it?

  4. Know What You Value Understand your members o What do they expect from your security program?

  5. Understand your risks First, some vocabulary ry o Threats o Vulnerabilities o Risks

  6. Understand Your Risks, cont’d. Understand your risks Learn your threat environment o Just because you’re paranoid, doesn’t mean you’re wrong Understand the legal environment o Are you likely to be sued for a breach? o Are there rival or competing organizations to which you would lose members? Conduct a risk assessment o Coming up next!

  7. Risk Assessment Cheat Sheet 1. Document where your data lives 2. Think about who could mean you harm, external and internal 3. Think about what can disrupt your business (e.g., hurricane or fire) 4. Determine how likely attacks and disruptions are 5. Determine how bad these things are for your business 6. Use a matrix to rank the severity of the risk 7. Identify what controls you have in place to head off risks 8. Invest where your risk is high and you don’t have controls to help reduce that risk

  8. Impact Likelihood Low Medium High Low Low Risk Low Risk Medium Risk Medium Low Risk Medium Risk High Risk High Low Risk High Risk High Risk

  9. Invest Appropriately o Target cybersecurity investment to minimize your risk o Implement basic measures as part of your due diligence o Invest in advanced systems where your risk assessment directs

  10. Due Diligence 1. Throw stuff out! 2. Standard antivirus 3. Create clear security policies 4. Plan for disasters and security incidents 5. Implement multifactor authentication (MFA) for remote access 6. Educate your employees in how to recognize phishing attacks

  11. How do I decide if I need additional security measures? o Do your members expect or need them? o Is a data breach an “extinction event” for your organization?

  12. Advanced Systems In Intrusion Detection and Response (I (IDR or SIE IEM) o Detects suspicious activity on your network and with user accounts o Good for identifying attacks in early stages

  13. Advanced Systems Advanced Endpoint Detection and Response (E (EDR) o Detects suspicious activity on computers and servers and automatically blocks it o Good for preventing viruses and attacks from getting a toehold

  14. Advanced Systems Vuln lnerability Sc Scanning and Remediation o Looks for settings or missing patches that attackers can exploit o Closing the vulnerabilities makes it harder for attackers to move within your network

  15. Summary Three things you can do to dramatically im improve your cybersecurity posture! o Ass ssess your r ris risks o Se Secure remote access with ith mult ltif ifactor authentic icatio ion (M (MFA) o Train in your r use sers routin inely ly to recogniz ize phis ishin ing attacks

  16. Where to get help? Managed Security Service Providers (MSSPs) recommend, implement, and monitor security solutions for organizations that don’t have the time or expertise to do it themselves.

  17. Contact Us david.rossell@ntiva.com Ntiva, Inc. 7900 Westpark Drive, Suite A100 McLean, VA. www.ntiva.com 703 891 0131

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend