Cybersecurity, Hacking and Ransomware: What Every Local Government Needs to Know
June 10th, 2020
W W W . A R G O C Y B E R . C O M
June 10th, 2020 W W W . A R G O C Y B E R . C O M Lorem ipsum dolor - - PowerPoint PPT Presentation
Cybersecurity, Hacking and Ransomware: What Every Local Government Needs to Know June 10th, 2020 W W W . A R G O C Y B E R . C O M Lorem ipsum dolor sit amet, consectetuer Jim Rogers, CEO, SME & Co-Founder has over 25 years of industry
W W W . A R G O C Y B E R . C O M
Lorem ipsum dolor sit amet, consectetuer adipiscing elit, sed diam nonummy nibh euismod tincidunt ut laoreet dolore magna aliquam erat volutpat. Ut wisi enim ad minim veniam, quis nostrud exerci tation last loverna ullamcorper suscipit lobortis nisl ut aliquip. Duis autem vel eum iriure dolor in hendrerit in vulputate velit esse molestie consequat, vel illum dolore eu feugiat nulla facilisis at vero eros et accumsan et iusto odio dignissim qui blandit praesent luptatum zzril delenit augue duis dolore te feugait nulla Lorem ipsum dolor sit amet, cons ectetuer adipiscing elit, sed diam nonummy nibh euismod tincidunt ut laoreet dolore magna aliquam erat volutpat. Ut wisi enim ad minim veniam, quis.
Jim Rogers, CEO, SME & Co-Founder
has over 25 years of industry Cyber Security Experience in the Department of Defense and the Intelligence Community. Jim started his career here in Pensacola as an enlisted person being trained in Electronic Warfare and Cryptologic
his journey into Cyber security and has completed both a BS and MS in Cyber Security and received Graduate Certificates from the National Defense University as well as many top industry Cyber Security Certifications. Jim Currently mentors many up-and-coming cyber security professionals in hopes to impart his knowledge and experience on the next generation.
Kevin J. Schmidt, CTO & Co-Founder
is a born-and-raised native of West Pensacola. In 1993 he was offered and
able to sharpen his skills in software engineering, system administration, network engineering, and leadership. At the age of 23, Kevin took what he learned and moved to Atlanta, GA. For 21 years, Kevin worked at various start-ups and software companies in and around Atlanta. He was employee number five at one of the first Security Information and Event Management (SIEM) software companies, which IBM eventually bought. He spent 12 years at Dell Secureworks, a national MSSP. He is also a published author and holds a cyber security and machine learning patent.
W W W . A R G O C Y B E R . C O M
W W W . A R G O C Y B E R . C O M
https://en.wikipedia.org/wiki/Cyber_resilience
W W W . A R G O C Y B E R . C O M
written by others
agendas, or terrorism
highly sophisticated
states) with covert and open-source intelligence at their disposal
W W W . A R G O C Y B E R . C O M
to not LEAK your data.
In a recent ransomware survey, 80% of respondents perceived ransomware as an extreme or moderate threat, and of those organizations that suffered a ransomware attack, 75% experienced up to five attacks over one year. It’s no surprise given that ransomware is (at time of publication) a USD $2 billion ‘market’, and rapidly growing as threat actors, including organized crime and malicious states, try to take their share.
W W W . A R G O C Y B E R . C O M
W W W . A R G O C Y B E R . C O M
Monitoring (FIM)
(SIEM) Event Correlation & Alerting
W W W . A R G O C Y B E R . C O M
network segmentation and a least-privilege model to limit ability for any ransomware to traverse the network.
W W W . A R G O C Y B E R . C O M
ransomware attack, it can still cost your organization in terms of lost productivity and the efforts to try to retrieve that data. Defining and implementing a backup policy is a critical defense, and, using offline backups.
W W W . A R G O C Y B E R . C O M
Regularly train your employees on how to identify phishing attempts, the risks associated with
they feel that they have been compromised, including who and how to report the incident to ensure the fastest response.
W W W . A R G O C Y B E R . C O M
exploit for which a patch had been available for over one month. The organizations impacted were either unaware of the patch or had failed to deploy the patch in a timely fashion. Knowing what assets exist across your environment, what software and services they run, understanding where vulnerabilities exist and what patches are available are all critical to being able to shore up any gaps before a malicious actor exploits that vulnerability.
W W W . A R G O C Y B E R . C O M
many software security solutions like vulnerability or malware defense solutions require threat intelligence to be able to know what threats are out there and how to detect them. Ensure that you regularly update your security solutions to address any issues, add new and enhanced capabilities, and ensure that they are running with their latest threat intelligence so that they are optimally protecting your environment.
W W W . A R G O C Y B E R . C O M
identifying new systems and devices that need to be monitored and assessed for vulnerabilities that ransomware could exploit.
W W W . A R G O C Y B E R . C O M
that attackers could exploit in a ransomware attack. The platform ranks vulnerabilities by severity so that you can prioritize your remediation efforts.
W W W . A R G O C Y B E R . C O M
known ransomware, and communications with known malicious servers. Using field- proven IDS technologies, we identify attacks, malware, policy violations, and port scans that could be indicators of malicious activity on your networks.
W W W . A R G O C Y B E R . C O M
behavior and configuration status to identify suspicious activity and potential exposure. This includes the ability to identify changes to critical system and application files, as well as modifications to the Windows Registry, that could be made to initiate the ransomware’s encryption engine.
W W W . A R G O C Y B E R . C O M
seemingly unrelated events across disparate systems to pinpoint the few events that are truly important in that mass of information. Such platforms are regularly updated with ransomware-specific correlation rules that identify a range of behaviors that are indicative of a ransomware infection, including downloading the ransomware file, systems attempting to connect with a C&C server and post data, multiple failed connections from a system attempting to connect to a domain (or multiple domains) within a narrow time window, and more.
W W W . A R G O C Y B E R . C O M
ability to automate the centralized collection and normalization of events and logs from devices, servers, applications and more from across your on-premises and cloud environments, as well as from your cloud applications like Office 365. This data is can be centrally retained for at least one year, helping support compliance requirements and the ability to perform forensics on attacks that may have only recently been discovered, but that require investigation of more historic data. Centralizing collection also supports the automatic analysis of anomalies and attacks like ransomware and enables analysts to perform search and forensics on collected data. Analysts can also run any of the built- in and customizable reports, such as to demonstrate compliance with standards like PCI DSS, HIPAA, and so on for regular review of security events and activities.
W W W . A R G O C Y B E R . C O M
W W W . A R G O C Y B E R . C O M
W W W . A R G O C Y B E R . C O M
W W W . A R G O C Y B E R . C O M
W W W . A R G O C Y B E R . C O M
W W W . A R G O C Y B E R . C O M
W W W . A R G O C Y B E R . C O M It's not a matter of if you will be compromised, but when it will happen. Every day we see a new headline that turns the spotlight on cyber-attacks of retail giants and enterprise businesses. But SMBs are not immune to cyber-attack. It’s alarming and causes a ripple effect of fear across our daily lives. While this intense publicity increases awareness for cyber security in general – it’s not always effective at bringing attention to business leaders who think smaller companies are inherently unattractive targets for cyber criminals. This sort of misunderstanding leaves companies highly vulnerable, especially those with limited resources, expertise, and budgets. Located in beautiful and historic downtown Pensacola, Argo Cyber Systems is a pure-play cyber security firm. We are cyber security and intelligence experts offering dedicated security monitoring of critical infrastructure assets, businesses, and other environments. Our platform is attested as compliant for several regulatory and cybersecurity standards, including NIST, RMF, FedRAMP, DOD CMMC, PCI DSS, HIPAA, HITECH, and SOC 2. Argo Cyber Systems is here to help.