cyber security for
play

CYBER SECURITY FOR NON-TECHNICAL EXECUTIVE Cor Corpor porate O - PowerPoint PPT Presentation

CYBER SECURITY FOR NON-TECHNICAL EXECUTIVE Cor Corpor porate O te Over erview view AT-NET Services offers comprehensive engineering services for the life cycle of your system; design, build, secure and manage CYBER SECURITY FOR


  1. CYBER SECURITY FOR NON-TECHNICAL EXECUTIVE

  2. Cor Corpor porate O te Over erview view AT-NET Services offers comprehensive engineering services for the life cycle of your system; design, build, secure and manage

  3. CYBER SECURITY FOR NON-TECHNICAL EXECUTIVE ROGER.SWANSON@EXPERTIP.NET / 843-576-3773 @ROGER_SWANSON HTTPS://WWW.LINKEDIN.COM/IN/ROGERSWANSON

  4. CYBER SECURITY FOR NON-TECHNICAL EXECUTIVE AGENDA: - 45 MIN PRESENTATION, 10-MINUTE BREAK, - 30-MINUTE SECOND SESSION, - QUESTION & ANSWER PERIOD

  5. LEARNING OBJECTIVES 1. INTRODUCTION TO CYBER SECURITY 2. CYBER SECURITY PRINCIPLES 3. INFORMATION SECURITY LIFECYCLE MANAGEMENT 4. RISKS & VULNERABILITIES 5. PLANNING YOUR CYBER SECURITY PROGRAM 6. INCIDENT RESPONSE ACTIONS

  6. 1. INTRODUCTION TO CYBER SECURITY • Technology expansion helped Internet to develop, Real World Internet • Internet is integrated in almost all forms of human activity, • It can’t be observed apart from the real world, • Damage in cyber space significantly affect physical world.

  7. 1.1. Cyber Security terms and definitions Type of Action Type of Perpetrator Type of Target • Interception of data • Hackers • Individuals • Interference with data • Cyber criminals • Companies reception • Cyber warriors • Public institutions • Illegal access • Cyber terrorist • State bodies • Data destruction • Critical infrastructure • spying • Sabotage • Service denial • Identity theft

  8. 1.2. Cyber Security roles Risk analytics and Policy makers and Threat management management Strategists forensics Engineering, Architecture Education, training and Operations and security and Design awareness management Lawyer (internet crime and Chief technology officers Research data protection)

  9. 1.3. Cyber Security big picture

  10. 1.4. Differences between Information Security & Cyber Security Things that are vulnerable Information through ICT Digital Information Information Other things than information Analog Information Information Security Cyber Security

  11. 2. Cyber Security Principles CYBERSECURITY CONFIDENTIALITY NON-REPUDATION AUTHENTICATION • Fundamental properties that must be maintained. AVAILABILITY INTEGRITY • These are what we protect

  12. 2.2. Authentication (2FA/TFA) & securing data at rest and in transit Authentication Non-repudiation • The ability to verify the identity of • The ability to correlate, with high an individual or entity. certainty, a recorded action with its Authentication is entity oriented. originating individual or entity. Non- repudiation is entity oriented

  13. 2.3. Best practices for office and remote users 1. Balance Protection With Utility 2. Split Up the Users and Resources 3. Assign Minimum Privileges 4. Use Independent Defenses 5. Plan for Failure 6. Record, Record, Record 7. Run Frequent Tests

  14. 3. Information Security (IS) within Lifecycle Management of business systems 3.1. Lifecycle management landscape Seed And Growth And Maturity And Startup Expansion Development Establishment Possible Exit

  15. Phase 1: Conducting Security 3.2. Security architecture processes Assessments Phase 2: Formulation of Target Phase 3: Security Architecture Construction of Policies and Designs Procedures Phase 4: Phase 5: Implementation of Target Integration of Security Security Architecture Practices to Maintain Design Secure Status

  16. 3.2. Security Architecture Lifecycle Architectural Risk Analysis Policy, Standards, Security Operations & Process, Architecture & Monitoring Design Metrics, Assurance Implementation

  17. 3.3. Security architecture tools Process Metrics Defence in Depth Risk Metrics SDL Data Policy & Standards Enterprise Identity Assurance Application Goals Reporting Management Risk Management Domain Vulnerability Host Metrics Management Security Architecture Threat Network Management

  18. Why you should get true professional guidance? Conducting Performing technical cyber security investigations analysis Providing resourcing and response expertise

  19. 3.4. Lifecycle management concepts ECONOMY Profit Eco-efficiency Equity SUSTAINABILITY SOCIATY ENVIRNOMENT Livability Planet People

  20. 2.1. Confidentiality, Integrity, & Availability Confidentiality represents a set of rules that limits access to information, Integrity is the assurance that the information is accurate, and Availability is a guarantee of reliable access to the information by authorized people.

  21. NIST FRAMEWORK This voluntary Framework consists of standards, guidelines, and best practices to manage cybersecurity- related risk. The Cybersecurity Framework’s prioritized, flexible, and cost-effective approach helps to promote the protection and resilience of critical infrastructure and other sectors important to the economy and national security.

  22. 4. RISKS & VULNERABILITIES 4.1. Basics of risk management Risks Vulnerabilities • Business disruption • Software bugs • Financial losses • Broken processes • Loss of privacy • Ineffective controls • Damage to reputation • Hardware flaws • Loss of confidence • Business change • Legal penalties • Legacy systems • Impaired growth • inadequate BCP • Loss of life • Human error

  23. The critical components of your business 1. Technical infrastructure that supports your critical assets 2. Cyber security landscape relevant to your organization 3. Different types of cyber security threats that you are concerned about 4. Sources of these threats, such as organized crime syndicates, state-sponsored organizations, extremist groups, hacktivists, insiders – or a combination of these 5. Possible threat vectors for attacks to exploit 6. Vulnerabilities to each particular threat

  24. 4.2. What can you do to minimize risk? 1 Start with a cyber security baseline Balance cyber risks against other types 6 of risk All organizations face risks, no matter 2 the size Learn from security solutions used by 7 other organizations 3 Understand what you care about, and why 8 Keep an eye out for cyber security myths Think about situations in which you could 4 be compromised Be aware of the strengths and weaknesses 9 of risk management techniques 5 Accept some risk

  25. What are the biggest threats? • Theft or unauthorized access of hardware, computers and mobile devices • Infect computers with viruses and malware • Attack your technology or website • Attack third party systems • Spam you with emails containing viruses • Gain access to information through your employees

  26. What does the organization value most? • Customer records • Marketing plans • Personal information • Intellectual properties • Financial records • Product design • Business plans • Patent applications • New business ideas • Employee records

  27. What kind of attack would be the most damaging to the organization? Fi Fina nancial ncial loss ss • from theft of money, information, disruption to business Bu Business iness loss ss • damage to reputation, damage to other companies you rely on to do business Costs sts • getting your affected systems up and running In Inve vestment stment loss ss • time notifying the relevant authorities and institutions of the incident

  28. 4.3. Operational threat environments Angry employees Dishonest employees Criminals Governments Terrorist The press Competitors Hackers

  29. Conduct a criticality assessment Defining their critical information assets 1 Determining which cyber security threats are most likely to affect these critical information assets 2 Applying the relevant management or technical controls to reduce the likelihood and impact of cyber 3 security incidents affecting their critical information assets Raising awareness about the need for an effective cyber security response capability 4 Determining the likely (or actual) level of business impact associated with a possible cyber security 5 incident

  30. Classes of attacks Phishing Spyware/Malware 1 6 Trojans, Botnets, Wiper Attacks Theft of Money 2 7 Man in the Middle (MITM) 3 8 Data Manipulation and Destruction Intellectual Property Theft Ransomware 4 9 5 Distributed Denial of Service (DDoS) 10 Rogue or Unpatched Software

  31. Who could be a threat to your business? cli lien ents ts yo you do do cri rimina inals ls bu busin iness ess wit ith curr rrent ent or or bu busin iness ess fo form rmer er com ompeti etitors tors em emplo loyee yees

  32. 5. PLANNING YOUR CYBER SECURITY PROGRAM Correlation and assessment of Data Collection Threat Analysis Risk Acceptability Analysis of Identifying Vulnerability Policies and the Scope Analysis Procedures

  33. 5.1. Templates for Immediate use WWW.LINKEDIN.COM/IN/ROGERSWANSON (SLIDESHARE) DR Checklist – action items listed for planning https://www.slideshare.net/roger_swanson/12-point-disaster-checklist Project Management - Cyber Planning NIST CSPW 04162018 https://www.slideshare.net/roger_swanson/framework-for- improving-critical-infrastructure-cybersecurity- nistcswp04162018 This presentation – Cyber Security for Non-Tech Exec,

Recommend


More recommend