in house vs outsourced help
play

In-house vs Outsourced help H2H Compliment your existing team? Cost - - PowerPoint PPT Presentation

In-house vs Outsourced help H2H Compliment your existing team? Cost - Insurance? Proactive / Reactive Its not if youre going to have a cyber related event, its when ARGH! Have a plan ready for compromised accounts Dont panic -


  1. In-house vs Outsourced help H2H Compliment your existing team? Cost - Insurance? Proactive / Reactive…

  2. It’s not if you’re going to have a cyber related event, it’s when

  3. ARGH! Have a plan ready for compromised accounts Don’t panic - You’re prepared! Have access reset links readily available Twitter - https://support.twitter.com/forms/signin Facebook - https://www.facebook.com/hacked Google - https://accounts.google.com/signin/ recovery

  4. Reporting guidelines… http://legislature.vermont.gov/statutes/section/09/062/02435

  5. We can do better… Practical Takeaways

  6. CAN-SPAM ACT https://www.ftc.gov/tips-advice/business-center/guidance/can-spam-act-compliance-guide-business

  7. How to deal with ransomeware • Don’t click or open attachments/links that look suspicious • Be careful on social media - videos are not really videos etc… • Backup your files! (cloud?) • Call for help!

  8. How many of you use an android or apple device?

  9. Use a good passphrase | pin http://danielamitay.com/blog/2011/6/13/most-common-iphone-passcodes

  10. Use a good passphrase | pin p@ssw0rd qwerty12345! whyisitcoldinvermont? http://danielamitay.com/blog/2011/6/13/most-common-iphone-passcodes

  11. But I have an Apple iPhone/ iPad. I’m safe :)

  12. Automated Attempts a password every 6 seconds 100% success rate

  13. Password Mangers https://www.wired.com/2016/01/you-need-a-password-manager/

  14. The Internet of Things https://www.amazon.com/Amazon-Echo-Bluetooth-Speaker-with-WiFi-Alexa

  15. Security and Encryption Mobile devices have direct access to sensitive systems - how are you protecting them? http://arstechnica.com/gadgets/2015/08/phone-and-laptop-encryption-guide-protect-your-stuff-and-yourself/

  16. How many people use multi- factor authentication?

  17. Do you… Store, transmit or process credit card data? What is the deal with the chip? https://www.mastercard.com/ca/merchant/en/Why_is_PCI_Important.pdf https://www.pcisecuritystandards.org/

  18. How many of you have ever connected to…

  19. http://thefederalistpapers.integratedmarket.netdna-cdn.com/wp-content/uploads/2016/08/clinton-server-montage.jpeg

  20. So what can you do? • Use your phone as a wifi hotspot • Ensure you trust which wifi you are connecting to • Use a Virtual Private Network

  21. Antivirus • It can be compared to the flu shot…

  22. In closing Use good cyber hygiene Find a confidant Consider a Security Operations Center to remote monitor your systems/networks

  23. Questions? Thank you! Jonathan Rajewski, MS, CCE, CFE, CISSP, ENCE Director - Senator Leahy Center for Digital Investigation @jtrajewski Assistant Professor - Digital Forensics | Cyber Security rajewski@champlain.edu Digital Forensic Examiner - Vermont Internet Crimes Against Children Task Force

  24. Is Your Small Business Online Smart? 2016-2017 Roundtable Series Main Presenter Jonathan Rajewski ​ | ​ Champlain College rajewski@champlain.edu Jonathan T. Rajewski is a Computer & Digital Forensics instructor and a Computer Forensic Examiner with the Vermont Internet Crimes Task Force in Burlington, Vermont. He has experience http://www.champlain.edu with both civil and criminal digital forensic investigations and in providing expert written and oral digital forensic testimony. He has served many high profile confidential clients and has worked alongside international and local, state/federal governmental entities. https://www.linkedin.com/in/jrajewski

  25. C ONNECTWITH U S ON S OCIAL M EDIA https://champlainvalley.score.org https://www.facebook.com/VermontScore https://twitter.com/vt_score https://www.linkedin.com/company/champlainvalleyscore https://www.instagram.com/vtscore

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend