Less Security Products, More Secured Products
You are squinting if you can read this
Less Security Products, More Secured Products You are squinting if - - PowerPoint PPT Presentation
Less Security Products, More Secured Products You are squinting if you can read this Which is Worst? ERP system down for a week or Customer Data Hacked | slide 2 Less Security Products, More Secured Products You are squinting if you can
You are squinting if you can read this
| slide 2
Customer Data Hacked ERP system down for a week
Which is Worst?
You are squinting if you can read this
TELUS Restricted
Cyber Security
| slide 5
Exercise #1 https://vimeo.com/29985766
| slide 6 | slide 6
Presenter
for TELUS Health*
Security Officer TELUS Health
| slide 7
Cyber Threat World Map
| slide 8
What is Cyber Security?
| slide 9
Exercise #2
| slide 10
Exercise #3 https://www.youtube.com/watch?v=4gR562GW7TI
| slide 11 | slide 11
What motivates Hackers? 1.Financial Gain (ransom)
| slide 12 | slide 12
Cyber Security – Most Targeted Industry
1.PHI/PII is very lucrative (10x)
| slide 13
World’s Biggest Data Breaches
Cyber Security – Recent News and Trends
| slide 14
Ransomware
https://www.youtube.com/watch?v=2sNrhcVGbx0
| slide 15
Ransomware
| slide 16 | slide 16
Equifax – 4th Largest Hack in History
What Happened?
BOD, Address, Driver’s License, Credit Cards, Bank Accounts, etc.)
Core Lessons
(patching, vulnerability scanning, incident management, etc.)
| slide 17 | slide 17
Looking Back at 2017 and Looking Forward at 2018
cap)
and Notification rules
| slide 18
What BAs Should Know about Cyber Security?
Everything Can Be Hacked Data Sensitivity Security is Risk Management BA is a Technical Liaison Cyber Security Requirements
| slide 19 | slide 19
Everything Can Be Hacked
Know Your Crown Jewels
| slide 20 | slide 20
Data Sensitivity
Not All Data are Equal
| slide 21 | slide 21
Security is Risk Management
Don’t Accept the Risk On Your Own!!
| slide 22 | slide 22
BA is a Technical Liaison
Consult with Privacy and Security Groups Ensuring Compliance with Internal Policies and External Regulations (PCI, PIPA) Business Cases and Budgeting
Business Cyber Security
| slide 23 | slide 23
Cyber Security Requirements | Secure-by-Design
Similar to resilient-by-design or privacy-by-design, secure-by-design specifies that security must be included in the fundamental design of the system, application or solution from the ground up. This differs from current approaches that identify security later and treat it as a layer that can be added to an existing design to make it secure, or a technique that can be applied at a discrete point in the process.
| slide 24
Exercise #3 Hawaiian Emergency Management Officials Hold Interview
| slide 25
Contact