Cyber Security and Business Aviation
|
|
- Bertina Bruce
- 6 years ago
- Views:
Transcription
1 Cyber Security and Business Aviation What flight departments need to know about the biggest threat facing business aircraft today. October 2017
2 Cyber Security and Business Aviation What flight departments need to know about the biggest threat facing business aircraft today. For being what IBM CEO Ginni Rometty calls the greatest threat to every company in the world 1, it s surprising how little thought many of us give to cyber security in our day-to-day actions. Instead, we tend to brush it off as a problem for multinationals or something for the IT department to worry about. Yet this is a clear and dangerous misconception, as cyber security is not only a part of every IT discussion but every business discussion. Not convinced? Perhaps these statistics will scare you straight: 73% of company security experts expect to experience a major security breach within a year.2 Despite the money and resources spent on cyber security, 87% of company security experts believe their security controls are failing to protect their business.3 65% of security professionals identified phishing and social engineering as the biggest security threats to their organization.4 All it takes is one person clicking a fake to give a hacker direct access to all the data on their device and a direct path to your network. Yet, even though everybody claims to be aware of this risk, 78% of us click on the links anyway.5 The greatest threat to every company in the world Ginni Rometty IBM CEO 97% of applications tested by Trustwave had one or more security vulnerabilities.6 70% of business respondents think that employees are the biggest risk to the business.7 The Straight Talk You Need If you manage or maintain aircraft at a business aviation flight department, consider this primer a must-read. In an interesting and non-technical manner, Satcom Direct s cyber security experts provide the straight talk on cyber security, including what the threats are, how the bad guys do it, and what you can do to protect yourself. Satcom Direct strongly recommends discussing your cyber security strategy with your data provider. By reading this primer, you ll have the information and confidence you need to ask the right questions and take a proactive role in protecting your flight department. 2
3 Don t Think You re a Target? Just Ask Target. 8 Like many companies, Target is equipped with state-of-the-art security technology. Yet in 2014, hackers stole 70 million credit cards. So how did this happen? Most likely, it all started with a simple Google search, where hackers found Target s vendor list. Instead of trying to get through Target s complex security system, the hackers instead backed their way in by compromising an unsuspecting third-party refrigeration contractor. Via a phishing , an employee of the vendor inadvertently allowed a virus to be installed on their computers. As the vendor wasn t using an appropriate anti-malware software, all the hackers had to do was wait until the malware offered them the golden ticket: the vendor s login credentials. With credentials in hand, it was a hop, skip and jump to the credit card information. The lesson learned? Even with the most high-tech security system in place, your entire network remains vulnerable to the vendors who lack proper data security measures. Man vs. Machine What this makes abundantly clear is that your company s data security is vulnerable on two fronts. First is the technology front. Even with the most secure devices or the latest security software, it s always a matter of trying to stay one step ahead of the hackers. If the leading security experts working at the world s most security-conscious companies are kept up at night worrying about the vulnerability of their security controls you should be too. The second front in the battle for cyber security is human error. Even if your IT department is doing everything right to protect the company from an attack, more often than not a breach happens because of a simple mistake by an employee or a vendor. What this means is that in cyber security, you don t have the luxury of choosing one or the other. What you need is a strategy that simultaneously addresses both the technical and the human factors. Altitude Doesn t Make You Safe Unfortunately, being in a business aircraft doesn t exempt you from a cyber threat. One of the most common myths in the industry is that once the aircraft s Wi-Fi signal is out of the range of those on the ramp, it is safe from an attack. Nothing could be farther from the truth. Regardless of whether you are on the ground or in the air, if you can see the internet, then the internet and the hackers are most definitely able to see you. In other words, altitude doesn t make you safe. 3
4 Like it or Not, Your Aircraft is Under Attack Your CEO receives an message from what appears to be a known associate. Being fairly tech savvy, before opening the or clicking on any links, the CEO takes a closer look at the address. Seeing that the name is spelled correctly and the company name follows he decides to open it. Still hesitant, he double checks to make sure the signature and the company logo are correct after all, you can never be too careful these days. Judging that everything adds up, the CEO clicks the link and fills in the requested information before sending it off to an anxiously waiting cybercriminal. Quick Tips from Satcom Direct As if the general threat of a breach isn t bad enough, even more worrying for business aviation is that attackers no longer cast a wide net in hopes of catching something random. Instead, hackers now go out of their way to target VIPs. And what better place to reel in a VIP than in the cabin of a business aircraft? What can you do to better defend your aircraft? Here we take a look at how some of the most common cyber threats facing business aviation happen and offer some quick tips for mitigating these risks. Scenario 1: The Phishing Threat Messages that ask for sensitive information or that need information urgently should always raise a red flag. Before clicking, hover your curser over a link to see what the URL is. If the website is unfamiliar, don t click, just delete. Always confirm that an is legitimate before opening an attachment. This could be as simple as calling or ing the sender to let them know you received an unexpected document and want to confirm it was from them before opening. Scenario 2: The Spy Who Stole the Secrets Threat Awesome Company is negotiating a merger with Better Company. Hector, a hacker who works for The Questionable Company, a major competitor of Awesome Company, gets wind of the deal. Hector starts by hacking into the computers at Blue Skies Charter and steals a flight manifest showing when Awesome Company s CEO is traveling to the city that Better Company is located. Combining this information with data on the aircraft, Hector uses a hacking site to pinpoint its departure and arrival time. With this information in hand, The Questionable Company can now either buy stock in Better Company to cash in on 4
5 the upcoming merger or make a well-timed competing bid to disrupt the deal altogether. By creating procedures that limit access, eliminate out-of-date addresses and establish a protocol for transmitting sensitive information, many of the doors used by hackers can be wholly or at least partially closed. Scenario 3: The Threat of the Evil Twin Scenario 4: The Let s Do Business Threat A couple of days before welcoming passengers on board the company aircraft for a business trip to Brussels, flight planner Joe starts receiving s from Belgian catering companies promoting their services. How do they know we re going to Brussels?, he thinks. Simple, flight plan data for European flights is available on a subscription basis from NMOC and FBOs, meaning catering companies and other service-oriented businesses can use it to find customers. It also means hackers, posing as caterers, can use it to find potential targets. It starts with educating both crew and passengers about the threats and advising them that a company s exposure to hacking or corporate espionage could be elevated when traveling. Scenario 5: The Bad Thumb Drive Threat While killing time in the FBO lounge, Jane, a member of the flight crew, connects to a free, no-password-required Wi-Fi network. Like most of us, she s just so happy she doesn t have to go track down a password that she doesn t think twice before connecting. Little does Jane know that the network she just connected to isn t the FBO s actual network, which is password protected, but instead what is called an evil twin an unsecured network with a name similar to the legit connection. At the other end of her unsecure connection is a savvy hacker busy browsing her files and downloading company documents all while Jane is busy preparing for her upcoming flight. Always use a secure, password-protected connection. During an MRO conference, Chris, your head of maintenance, picks up the usual SWAG: bags, pens, notepads and a handful of USB drives. Back at the shop and needing to save a file, Chris reaches into the desk drawer and grabs one of those drives, plugs it in and starts to download. What Chris doesn t know is that by plugging the thumb drive into his computer, he just transferred a virus to the aircraft databases that is well on its way to wreaking havoc on the aircraft. It s not unheard of for hackers to scatter infected USB drives in company parking lots, around a trade show, or wherever they are likely to be picked up by an unsuspecting employee. To protect yourself, implement maintenance protocols that prohibit the use of unauthorized USB drives. 5
6 Scenario 6: The Questionable Airspace Threat Flying over certain countries can increase the risk of hacking. For example, when in some countries airspace, airborne internet traffic is automatically routed to a satellite earth station, meaning someone is likely looking and listening. Use geolocation-based services that send an automatic alert to pilots when entering questionable airspace to remember to terminate the internet connection. The Big Cost of a Data Breach So, how much do these threats cost a company? According to IBM, the estimated average cost of each stolen record is $ That s $ for every stolen bank account, password, social account, file all of which adds up fast. In fact, the global cost of cybercrime is set to increase to $2 trillion by Then there s the cost of resolving an attack. According to Hewlett Packard Enterprise, the mean number of days needed to resolve cyber-attacks is 46, with an average cost of $21,155 per day or a total cost of $973,130 over the 46-day remediation period.11 Not If, But When The unfortunate reality is that it s not a matter of if a breach will occur, but when. As a result, companies are investing heavily in cyber security. According to Forbes, the cyber security market is expected to grow from $75 billion in 2015 to $170 billion by 2020, with companies spending $1 trillion for cyber security in the five years from Even Bank of America has gone on record saying it has an unlimited budget when it comes to combating cybercrime. There s also the issue of backing your security with the necessary talent which is neither readily available nor cheap. According to Stanford s Peninsula Press, more than 209,000 cyber security jobs in the U.S. are unfilled. Furthermore, demand for cyber security professionals is expected to rise to 6 million globally by 2019, with a projected shortfall of 1.5 million. So, how does your company compare? Are you taking the threat of cyber security seriously? Is your back-end security technology up to date? Have you provided your employees with training? Are your vendors utilizing best practices in cyber security? What about adding the additional technological features to help mitigate the effect of human error? When a hacker strikes your aircraft, are you ready? Overwhelmed Yet? Despite all this bad news, there is good news too. When it comes to cyber security, there are several quick fixes you can easily implement today to potentially save you and your company significantly tomorrow. It all starts with a full cyber security assessment. As information governance reduces losses by $1 million annually, there s never been a better time to invest in an assessment of your data controls. And all you have to do is to pick up the phone and call your aviation data provider. Think of your cyber security assessment as an insurance policy. Even if you have the world s best driving record, you still get auto insurance. Why? To protect yourself from all the other poor drivers on the road. Likewise, even if you have the world s most secure network and latest cyber security technology, you need to protect yourself from the vendors, suppliers and employees who don t. A cyber security assessment is your insurance policy to protect you from everybody else. 6
7 Your Comprehensive Cyber Security Strategy Addressing the risks of cyber security in business aviation requires the use of both the latest technology and the right procedures to mitigate against human error and only Satcom Direct offers both. Simply said, nobody in business aviation has invested more in cyber security than Satcom Direct. Satcom Direct is the only provider offering the technology, assessment, training and ongoing support needed to address both the technological and human components of cyber security. SD s cyber security team combines experience and expertise, providing comprehensive solutions to help bolster your flight security practices from cockpit to cabin and beyond. Our comprehensive security service includes: 1. Network Discovery. The SD Cyber Security team will evaluate your state-of-the-network and current security processes, and provide a complimentary consultation to give recommendations on any identified areas of improvement. 2. Security Risk Assessment. SD offers a full onsite risk assessment for flight departments, to help you understand and identify threats to your environment both on-wing and at the hangar. Our security experts come to your location, evaluate your network and current security processes, and make recommendations on how to combat security risks found within a flight department through a suite of practices that adhere to ISO and NIST standards. 3. Risk Mitigation and Threat Monitoring Services. To protect against known cyber security risks, SD offers a variety of enhanced threat analysis and prevention solutions, such as Antivirus, Modern Malware Protection and Threat Intelligence services. Our in-house network security experts stay ahead of evolving security threats and actively monitor network activity to detect and block intrusion attempts in real time. 4. SD Private Network. The SD Private Network (SDPN) is a global communications framework that allows satellite and air-to-ground connectivity providers to connect to the aircraft through our SD Data Center and its multiple points of presence (POPs) worldwide avoiding the public internet and protecting user communications and data. With the SDPN, you can apply all of your current corporate compliance and security to the aircraft network just like any other company location. The SD Private Network offers an unparalleled level of security and reliability. 7
8 Going the Extra Mile: The SD Data Center Satcom Direct is the only data provider in business aviation that operates a wholly-owned data center dedicated to safeguarding your connectivity and communication streams. The SD Data Center is the foundation for all of Satcom Direct s services and the base from which we can help you build a tailored cyber security strategy. Whereas other providers outsource this to third-party data centers, with Satcom Direct your data never leaves the company s 25,000 sq. ft. purpose built facility that meets Tier III standards, complies with major industry requirements, and is designed to withstand a Category 5 hurricane. In other words, your data is safe here. Ready to protect your company from a cyber attack? To request a comprehensive review from the SD Cyber Security team, contact us today at cybersecurity@satcomdirect.com or Satcom Direct, Inc 2017 All Rights Reserved. 8
ALTITUDE DOESN T MAKE YOU SAFE. Satcom Direct s Comprehensive Cyber Security Portfolio for Business Aviation
ALTITUDE DOESN T MAKE YOU SAFE Satcom Direct s Comprehensive Cyber Security Portfolio for Business Aviation CYBER SECURITY IS THE GREATEST THREAT TO EVERY COMPANY IN THE WORLD. IBM CEO GINNI ROMETTY SD
More informationPREPARE & PREVENT. The SD Comprehensive Cybersecurity Portfolio for Business Aviation
PREPARE & PREVENT The SD Comprehensive Cybersecurity Portfolio for Business Aviation SD CYBERSECURITY SERVICES At SD, security isn t a slogan, it is our culture. Just because you are in a business jet
More informationCYBER SECURITY: ALTITUDE DOES NOT MAKE YOU SAFE
CYBER SECURITY: ALTITUDE DOES NOT MAKE YOU SAFE JULY 2018 It s not a matter of IF a breach will occur but WHEN JUST THE FACTS 2.3 BILLION 51 INDEPENDENT Credentials spilled in 2017 Credential Spill Incidents
More informationCYBERSECURITY MADE SIMPLE
CYBERSECURITY MADE SIMPLE Wednesday, October 17, 2018 1300Hrs Rob Hill, Business Development Director Global Data Solutions: Satcom Direct It s not a matter of IF a breach will occur but WHEN Connect with
More informationTroubleshooting and Cyber Protection Josh Wheeler
May 4, 2016 Troubleshooting and Cyber Protection Josh Wheeler Network Security Network Security Risks Video Network Security Risks Article Network Security Risks Data stealing or disruption of network
More informationManaging IT Risk: What Now and What to Look For. Presented By Tina Bode IT Assurance Services
Managing IT Risk: What Now and What to Look For Presented By Tina Bode IT Assurance Services Agenda 1 2 WHAT TOP TEN IT SECURITY RISKS YOU CAN DO 3 QUESTIONS 2 IT S ALL CONNECTED Introduction All of our
More informationIT & DATA SECURITY BREACH PREVENTION
IT & DATA SECURITY BREACH PREVENTION A PRACTICAL GUIDE Part 1: Reducing Employee and Application Risks CONTENTS EMPLOYEES: IT security hygiene best practice APPLICATIONS: Make patching a priority AS CORPORATE
More informationIntegrated Access Management Solutions. Access Televentures
Integrated Access Management Solutions Access Televentures Table of Contents OVERCOMING THE AUTHENTICATION CHALLENGE... 2 1 EXECUTIVE SUMMARY... 2 2 Challenges to Providing Users Secure Access... 2 2.1
More informationHow to Build a Culture of Security
How to Build a Culture of Security March 2016 Table of Contents You are the target... 3 Social Engineering & Phishing and Spear-Phishing... 4 Browsing the Internet & Social Networking... 5 Bringing Your
More information5 Trends That Will Impact Your IT Planning in Layered Security. Executive Brief
5 Trends That Will Impact Your IT Planning in 2012 Layered Security Executive Brief a QuinStreet Excutive Brief. 2011 Layered Security Many of the IT trends that your organization will tackle in 2012 aren
More informationKeep the Door Open for Users and Closed to Hackers
Keep the Door Open for Users and Closed to Hackers A Shift in Criminal Your Web site serves as the front door to your enterprise for many customers, but it has also become a back door for fraudsters. According
More informationFriday, 1/17/14 10:30 a.m. 11:45 a.m. PRESENTED BY: William Figures David Ross Charlie LeBlanc
Data Security in the Information Age Friday, 1/17/14 10:30 a.m. 11:45 a.m. PRESENTED BY: William Figures David Ross Charlie LeBlanc Schedulers & Dispatchers Conference New Orleans, LA January 14-17, 2014
More informationWayward Wi-Fi. How Rogue Hotspots Can Hijack Your Data and Put Your Mobile Devices at Risk
Wayward Wi-Fi How Rogue Hotspots Can Hijack Your Data and Put Your Mobile Devices at Risk 288 MILLION There are more than 288 million unique Wi-Fi networks worldwide. Source: Wireless Geographic Logging
More informationQuick recap on ing Security Recap on where to find things on Belvidere website & a look at the Belvidere Facebook page
Workshop #7 Email Security Previous workshops 1. Introduction 2. Smart phones & Tablets 3. All about WatsApp 4. More on WatsApp 5. Surfing the Internet 6. Emailing Quick recap on Emailing Email Security
More informationThe Value Of NEONet Cybersecurity. Why You Need To Protect Your The Value Of NEOnet Cybersecurity. Private Student Data In Ohio
Prompt. Courteous. Knowledgeable. Support you deserve. The Value Of NEONet Cybersecurity Why You Need To Protect Your Private Student Data In Ohio 1 TABLE OF CONTENTS 2 2 2-3 4 5 7 Introduction The Three
More informationRoadmap to the Efficient Cloud: 3 Checkpoints for the Modern Enterprise
Roadmap to the Efficient Cloud: 3 Checkpoints for the Modern Enterprise Roadmap for the Modern Enterprise As your AWS environment grows, the importance of instilling governance and following best practice
More informationPanda Security 2010 Page 1
Panda Security 2010 Page 1 Executive Summary The malware economy is flourishing and affecting both consumers and businesses of all sizes. The reality is that cybercrime is growing exponentially in frequency
More informationEntertaining & Effective Security Awareness Training
Entertaining & Effective Security Awareness Training www.digitaldefense.com Technology Isn t Enough Improve Security with a Fun Training Program that Works! Social engineering, system issues and employee
More information2018 Edition. Security and Compliance for Office 365
2018 Edition Security and Compliance for Office 365 [Proofpoint has] given us our time back to focus on the really evil stuff. CISO, Global 500 Manufacturer Like millions of businesses around the world,
More informationKnowBe4 is the world s largest integrated platform for awareness training combined with simulated phishing attacks.
KnowBe4 is the world s largest integrated platform for awareness training combined with simulated phishing attacks. About Us The world s most popular integrated Security Awareness Training and Simulated
More informationHOSTED SECURITY SERVICES
HOSTED SECURITY SERVICES A PROVEN STRATEGY FOR PROTECTING CRITICAL IT INFRASTRUCTURE AND DEVICES Being always-on, always-connected might be good for business, but it creates an ideal climate for cybercriminal
More information2018 Mobile Security Report
2018 Mobile Security Report CONTENTS Introduction 3 Businesses suspect their mobile workers are being hacked 4 Cafés, airports and hotels: a hotspot for Wi-Fi related security incidents 5 BYOD: Bring Your
More informationCYBER SECURITY TAILORED FOR BUSINESS SUCCESS
CYBER SECURITY TAILORED FOR BUSINESS SUCCESS KNOW THE ASIAN CYBER SECURITY LANDSCAPE As your organisation adopts digital transformation initiatives to accelerate your business ahead, understand the cyber
More informationSECURITY ON PUBLIC WI-FI New Zealand. A guide to help you stay safe online while using public Wi-Fi
SECURITY ON PUBLIC WI-FI New Zealand A guide to help you stay safe online while using public Wi-Fi WHAT S YOUR WI-FI PASSWORD? Enter password for the COFFEE_TIME Wi-Fi network An all too common question
More informationSecurity and Compliance for Office 365
Security and Compliance for Office 365 [Proofpoint has] given us our time back to focus on the really evil stuff. CISO, Global 500 Manufacturer Like millions of businesses around the world, you may be
More informationCISO Success Strategies: On Becoming a Security Business Leader
SESSION ID: CXO W03 CISO Success Strategies: On Becoming a Security Business Leader Frank Kim CISO SANS Institute @fykim Outline Build Your Business Case Rocket Your Relationships Master Your Message 2
More informationThe Cyber Threat. Bob Gourley, Partner, Cognitio June 22, How we think. 1
The Cyber Threat Bob Gourley, Partner, Cognitio June 22, 2016 How we think. 1 About This Presentation Based on decades of experience in cyber conflict Including cyber defense, cyber intelligence, cyber
More informationWho We Are! Natalie Timpone
Who We Are! Natalie Timpone Manager of Security Business Management Office Enterprise Security Awareness Manager Carmelo Walsh Security, Risk, and Compliance Security Awareness Subject Matter Expert Who
More informationSMALL BUSINESS CYBERSECURITY SURVIVAL GUIDE
SMALL BUSINESS CYBERSECURITY SURVIVAL GUIDE Small business cybersecurity survival guide By Stephen Cobb, ESET Senior Security Researcher Computers and the internet bring many benefits to small businesses,
More informationTHE EFFECTIVE APPROACH TO CYBER SECURITY VALIDATION BREACH & ATTACK SIMULATION
BREACH & ATTACK SIMULATION THE EFFECTIVE APPROACH TO CYBER SECURITY VALIDATION Cymulate s cyber simulation platform allows you to test your security assumptions, identify possible security gaps and receive
More informationDIGITAL TRUST Making digital work by making digital secure
Making digital work by making digital secure MARKET DRIVERS AND CHALLENGES THE ROLE OF IT SECURITY IN THE DIGITAL AGE 2 In today s digital age we see the impact of poor security controls everywhere. Bots
More informationCYBER SECURITY FOR BUSINESS COUNTING THE COSTS, FINDING THE VALUE
CYBER SECURITY FOR BUSINESS COUNTING THE COSTS, FINDING THE VALUE Business has always looked to squeeze the maximum possible benefit out of IT resources at the lowest possible cost but measuring return
More information2018 GLOBAL CHANNEL PARTNER SURVEY THYCOTIC CHANNEL PARTNER SURVEY REPORT
2018 GLOBAL CHANNEL PARTNER SURVEY THYCOTIC CHANNEL PARTNER SURVEY REPORT THYCOTIC 2018 GLOBAL CHANNEL PARTNER SURVEY Channel Partner survey highlights client cybersecurity concerns and opportunities for
More informationTrain employees to avoid inadvertent cyber security breaches
Train employees to avoid inadvertent cyber security breaches TRAIN EMPLOYEES TO AVOID INADVERTENT CYBER SECURITY BREACHES PAGE 2 How much do you know about cyber security? Small business owners often lack
More informationA quick-reference guide to secure your organization s data and reduce cybersecurity attacks
Cybersecurity & Network Security: Best Practices to Protect Your Data A quick-reference guide to secure your organization s data and reduce cybersecurity attacks 1 More and more cybersecurity breaches
More informationEFFECTIVE INCIDENT RESPONSE
ONLINE REPORT SPONSORED BY: Special Report: Incident Response EFFECTIVE INCIDENT RESPONSE INSIDE P2 PREPARATION IS ESSENTIAL P3 CHOOSE THE SERVICE APPROACH TO INCIDENT RESPONSE P4 ADOPT A MULTI- PRONGED
More informationUNLOCKED DOORS RESEARCH SHOWS PRINTERS ARE BEING LEFT VULNERABLE TO CYBER ATTACKS
WHITE PAPER UNLOCKED DOORS RESEARCH SHOWS PRINTERS ARE BEING LEFT VULNERABLE TO CYBER ATTACKS While IT teams focus on other endpoints, security for corporate printers lags behind Printers make easy targets:
More informationHow to recognize phishing s
Phishing email messages, websites, and phone calls are designed to steal money, steal data and/or destroy information. Cybercriminals can do this by installing malicious software on your computer or stealing
More informationCLEARING THE PATH: PREVENTING THE BLOCKS TO CYBERSECURITY IN BUSINESS
CLEARING THE PATH: PREVENTING THE BLOCKS TO CYBERSECURITY IN BUSINESS Introduction The world of cybersecurity is changing. As all aspects of our lives become increasingly connected, businesses have made
More informationTop Ten IT Security Risks CHRISTOPHER S. ELLINGWOOD SENIOR MANAGER, IT ASSURANCE SERVICES
Top Ten IT Security Risks - 2017 CHRISTOPHER S. ELLINGWOOD SENIOR MANAGER, IT ASSURANCE SERVICES INTRODUCTION IT S ALL CONNECTED IN 2017. All of our Top 10 risks impact both us as consumers and as professionals
More informationsecurity FRAUD PREVENTION Business Checklist Safeguard your money, your credit and your good name.
security FRAUD PREVENTION Business Checklist Safeguard your money, your credit and your good name. Security for Your Business Mitigating risk is a daily reality for business owners, but you don t have
More informationThe Value of Automated Penetration Testing White Paper
The Value of Automated Penetration Testing White Paper Overview As an information security expert and the security manager of the company, I am well aware of the difficulties of enterprises and organizations
More informationCyber Security Stress Test SUMMARY REPORT
Cyber Security Stress Test SUMMARY REPORT predict prevent respond detect FINAL SCORE PREDICT: PREVENT: Final score: RESPOND: DETECT: BRILLIANT! You got a 100/100. That's as good as it gets. So take a second
More informationSecurity Awareness & Best Practices Best Practices for Maintaining Data Security in Your Business Environment
Security Awareness & Best Practices Best Practices for Maintaining Data Security in Your Business Environment Ray Colado, Information Security Analyst Raise awareness around information security to help
More informationSMALL BUSINESS CYBERSECURITY SURVIVAL GUIDE
SMALL BUSINESS CYBERSECURITY SURVIVAL GUIDE Small business cybersecurity survival guide By Stephen Cobb, ESET Senior Security Researcher Computers and the internet bring many benefits to small businesses,
More informationwith Advanced Protection
with Advanced Email Protection OVERVIEW Today s sophisticated threats are changing. They re multiplying. They re morphing into new variants. And they re targeting people, not just technology. As organizations
More information10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS
10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS WHITE PAPER INTRODUCTION BANKS ARE A COMMON TARGET FOR CYBER CRIMINALS AND OVER THE LAST YEAR, FIREEYE HAS BEEN HELPING CUSTOMERS RESPOND
More informationPCI Compliance. What is it? Who uses it? Why is it important?
PCI Compliance What is it? Who uses it? Why is it important? Definitions: PCI- Payment Card Industry DSS-Data Security Standard Merchants Anyone who takes a credit card payment 3 rd party processors companies
More informationWhy you MUST protect your customer data
Why you MUST protect your customer data If you think you re exempt from compliance with customer data security and privacy laws because you re a small business, think again. Businesses of all sizes are
More informationCyber Risks in the Boardroom Conference
Cyber Risks in the Boardroom Conference Managing Business, Legal and Reputational Risks Perspectives for Directors and Executive Officers Preparing Your Company to Identify, Mitigate and Respond to Risks
More informationSmall Business Is Big Business in Cybercrime A TrendLabs Primer
Small Business Is Big Business in Cybercrime A TrendLabs Primer Things Every Small Business Should Know About Web Threats and Cybercrime For cybercriminals, no business is too small to exploit. Albeit
More informationMapping Your Requirements to the NIST Cybersecurity Framework. Industry Perspective
Mapping Your Requirements to the NIST Cybersecurity Framework Industry Perspective 1 Quest has the solutions and services to help your organization identify, protect, detect, respond and recover, better
More informationBULLETPROOF365 SECURING YOUR IT. Bulletproof365.com
BULLETPROOF365 SECURING YOUR IT Bulletproof365.com INTRODUCING BULLETPROOF365 The world s leading productivity platform wrapped with industry-leading security, unmatched employee education and 24x7 IT
More informationSage Data Security Services Directory
Sage Data Security Services Directory PROTECTING INFORMATION ASSETS ENSURING REGULATORY COMPLIANCE FIGHTING CYBERCRIME Discover the Sage Difference Protecting your business from cyber attacks is a full-time
More informationSOLUTIONS BRIEF GOGO AIRBORNE SECURITY SUMMARY 2017 Q3 RELEASE
SOLUTIONS BRIEF GOGO AIRBORNE SECURITY SUMMARY 2017 Q3 RELEASE SECURE AIRBORNE CONNECTIVITY: OVERVIEW Gogo Business Aviation realizes the ever-pressing need to be vigilant in staying ahead of potential
More informationThanks for attending this session on April 6 th, 2016 If you have any question, please contact Jim at
Thanks! Thanks for attending this session on April 6 th, 2016 If you have any question, please contact Jim at jim@stickleyonsecurity.com Don t forget to checkout Stickley on Security and learn about our
More informationState of Cloud Survey GERMANY FINDINGS
2011 State of Cloud Survey GERMANY FINDINGS CONTENTS Executive Summary... 4 Methodology... 6 Finding 1: Cloud security is top goal and top concern.................................. 8 Finding 2: IT staff
More informationUsing Threat Analytics to Protect Privileged Access and Prevent Breaches
Using Threat Analytics to Protect Privileged Access and Prevent Breaches Under Attack Protecting privileged access and preventing breaches remains an urgent concern for companies of all sizes. Attackers
More informationHow Cyber-Criminals Steal and Profit from your Data
How Cyber-Criminals Steal and Profit from your Data Presented by: Nick Podhradsky, SVP Operations SBS CyberSecurity www.sbscyber.com Consulting Network Security IT Audit Education 1 Agenda Why cybersecurity
More informationFOR FINANCIAL SERVICES ORGANIZATIONS
RSA BUSINESS-DRIVEN SECURITYTM FOR FINANCIAL SERVICES ORGANIZATIONS MANAGING THE NEXUS OF RISK & SECURITY A CHANGING LANDSCAPE AND A NEW APPROACH Today s financial services technology landscape is increasingly
More informationDIGITAL LIFE E-GUIDE. A Guide to 2013 New Year s Resolutions
A DIGITAL LIFE E-GUIDE A Guide to 2013 New Year s Resolutions 2012 is coming to a close, and what better way to prepare for the year ahead than to get our New Year s resolutions straightened out? With
More informationEmployee Security Awareness Training
Employee Security Awareness Training September 2016 Purpose Employees have access to sensitive data through the work they perform for York. Examples of sensitive data include social security numbers, medical
More informationEFFECTIVELY TARGETING ADVANCED THREATS. Terry Sangha Sales Engineer at Trustwave
EFFECTIVELY TARGETING ADVANCED THREATS Terry Sangha Sales Engineer at Trustwave THE CHALLENGE PROTECTING YOUR ENVIRONMENT IS NOT GETTING EASIER ENDPOINT POINT OF SALE MOBILE VULNERABILITY MANAGEMENT CYBER
More informationDATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE
DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE EXECUTIVE SUMMARY ALIGNING CYBERSECURITY WITH RISK The agility and cost efficiencies
More information10 FOCUS AREAS FOR BREACH PREVENTION
10 FOCUS AREAS FOR BREACH PREVENTION Keith Turpin Chief Information Security Officer Universal Weather and Aviation Why It Matters Loss of Personally Identifiable Information (PII) Loss of Intellectual
More informationINTELLIGENCE DRIVEN GRC FOR SECURITY
INTELLIGENCE DRIVEN GRC FOR SECURITY OVERVIEW Organizations today strive to keep their business and technology infrastructure organized, controllable, and understandable, not only to have the ability to
More informationPractical SCADA Cyber Security Lifecycle Steps
Practical SCADA Cyber Security Lifecycle Steps Standards Certification Jim McGlone CMO, Kenexis Education & Training Publishing Conferences & Exhibits Bio Jim McGlone, CMO, Kenexis GICSP ISA Safety & Security
More informationExpert Reference Series of White Papers. Cisco Completes the Security Picture with Sourcefire
Expert Reference Series of White Papers Cisco Completes the Security Picture with Sourcefire 1-800-COURSES www.globalknowledge.com Cisco Completes the Security Picture with Sourcefire Rich Hummel, CCNA,
More informationIMPROVING NETWORK SECURITY
IMPROVING NETWORK SECURITY How AN Information Assurance Professional Assessment HELPED THE The City of Stow, Ohio is a community of just under 35,000 people, located 35 miles south of Cleveland and part
More informationThe Cost of Phishing. Understanding the True Cost Dynamics Behind Phishing Attacks A CYVEILLANCE WHITE PAPER MAY 2015
The Cost of Phishing Understanding the True Cost Dynamics Behind Phishing Attacks A CYVEILLANCE WHITE PAPER MAY 2015 Executive Summary.... 3 The Costs... 4 How To Estimate the Cost of an Attack.... 5 Table
More informationThe Cyber War on Small Business
The Cyber War on Small Business Dillon Behr Executive Lines Broker Risk Placement Services, Inc. Meet Our Speaker Dillon Behr Executive Lines Broker Risk Placement Services, Inc. Previously worked as Cyber
More informationAutomated Context and Incident Response
Technical Brief Automated Context and Incident Response www.proofpoint.com Incident response requires situational awareness of the target, his or her environment, and the attacker. However, security alerts
More informationHP Fortify Software Security Center
HP Fortify Software Security Center Proactively Eliminate Risk in Software Trust Your Software 92% of exploitable vulnerabilities are in software National Institute for Standards and Technology (NIST)
More informationTHE ESSENTIAL GUIDE TO CYBER SECURITY FOR OFFSITE EVENTS
THE ESSENTIAL GUIDE TO CYBER SECURITY FOR OFFSITE EVENTS THE ESSENTIAL GUIDE TO CYBER SECURITY FOR OFFSITE EVENTS You are taking your team offsite for training or a meeting. During this offsite session,
More informationDigital Marketing Manager, Marketing Manager, Agency Owner. Bachelors in Marketing, Advertising, Communications, or equivalent experience
Persona name Amanda Industry, geographic or other segments B2B Roles Digital Marketing Manager, Marketing Manager, Agency Owner Reports to VP Marketing or Agency Owner Education Bachelors in Marketing,
More informationCA Security Management
CA Security CA Security CA Security In today s business environment, security remains one of the most pressing IT concerns. Most organizations are struggling to protect an increasing amount of disparate
More information4 Ways to Protect Your Organization from a Data Breach
BEST PRACTICES GUIDE Patient Data Security 4 Ways to Protect Your Organization from a Data Breach Patient Data Security 2 It s a treasure trove of personal data. The proverbial pot of data gold. For every
More informationOPERATIONS CENTER. Keep your client s data safe and business going & growing with SOC continuous protection
SECURITY OPERATIONS CENTER Keep your client s data safe and business going & growing with SOC continuous protection Business Need of Security Operations Center SOC Benefits NOC vs SOC UnderDefense Incident
More informationSECURITY AUTOMATION BEST PRACTICES. A Guide on Making Your Security Team Successful with Automation SECURITY AUTOMATION BEST PRACTICES - 1
SECURITY AUTOMATION BEST PRACTICES A Guide on Making Your Security Team Successful with Automation SECURITY AUTOMATION BEST PRACTICES - 1 Introduction The best security postures are those that are built
More informationA GUIDE TO CYBERSECURITY METRICS YOUR VENDORS (AND YOU) SHOULD BE WATCHING
A GUIDE TO 12 CYBERSECURITY METRICS YOUR VENDORS (AND YOU) SHOULD BE WATCHING There is a major difference between perceived and actual security. Perceived security is what you believe to be in place at
More informationThe NextGen cyber crime battlefield. Why organizations will always lose this battle
The NextGen cyber crime battlefield. Why organizations will always lose this battle Enforce cyber threat intelligence into your organization 10 April 2014 KPMG has been awarded with the Europe Awards as
More informationCyber Attacks & Breaches It s not if, it s When
` Cyber Attacks & Breaches It s not if, it s When IMRI Team Aliso Viejo, CA Trusted Leader with Solution Oriented Results Since 1992 Data Center/Cloud Computing/Consolidation/Operations 15 facilities,
More informationSix Ways to Protect your Business in a Mobile World
Six Ways to Protect your Business in a Mobile World Mobile technology promises big rewards In a study of how mobility benefits businesses 1 77% say it helps drive business growth 61% say it boosts productivity
More informationLegal Aspects of Cybersecurity
Legal Aspects of Cybersecurity John W. Mashni Taylor A. Gast (517) 371-8257 (517) 371-8238 jmashni@fosterswift.com tgast@fosterswift.com Alexander A. Ayar (248) 538-6326 AAyar@FosterSwift.com Risks Data
More informationNETSURION DEFENSE AGAINST BACKOFF: How Netsurion Effectively Protected Against Threats
NETSURION DEFENSE AGAINST BACKOFF: How Netsurion Effectively Protected Against Threats Powering Secure and Agile Networks In the wake of the numerous recent data breaches, many consumers are demanding
More informationEBOOK. Stopping Fraud. How Proofpoint Helps Protect Your Organization from Impostors, Phishers and Other Non-Malware Threats.
EBOOK Stopping Email Fraud How Proofpoint Helps Protect Your Organization from Impostors, Phishers and Other Non-Malware Threats www.proofpoint.com EBOOK Stopping Email Fraud 2 Today s email attacks have
More informationBring Your Own Device (BYOD)
Bring Your Own Device (BYOD) An information security and ediscovery analysis A Whitepaper Call: +44 345 222 1711 / +353 1 210 1711 Email: cyber@bsigroup.com Visit: bsigroup.com Executive summary Organizations
More informationBRING SPEAR PHISHING PROTECTION TO THE MASSES
E-Guide BRING SPEAR PHISHING PROTECTION TO THE MASSES SearchSecurity phishing. I n this expert tip, David Sherry describes how a combination of technical controls and user awareness training can help put
More informationMake security part of your client systems refresh
Make security part of your client systems refresh Safeguard your information with Dell Data Security Solutions while boosting productivity and reducing costs Your organization might have many reasons for
More informationIBM Global Technology Services Provide around-the-clock expertise and protect against Internet threats.
IBM Global Technology Services Provide around-the-clock expertise and protect against Internet threats. Enhancing cost to serve and pricing maturity Keeping up with quickly evolving ` Internet threats
More informationBULLETPROOF365 SECURING YOUR IT. Bulletproof365.com
BULLETPROOF365 SECURING YOUR IT Bulletproof365.com INTRODUCING BULLETPROOF365 The world s leading productivity platform wrapped with industry-leading security, unmatched employee education and 24x7 IT
More informationChanging the Game: An HPR Approach to Cyber CRM007
Speakers: Changing the Game: An HPR Approach to Cyber CRM007 Michal Gnatek, Senior Vice President, Marsh & McLennan Karen Miller, Sr. Treasury & Risk Manager, FireEye, Inc. Learning Objectives At the end
More informationBut it Was Such a Little Phish February 2016 Webinar
But it Was Such a Little Phish February 2016 Webinar Firestorm Insights February 2016 1000 Holcomb Woods Parkway Suite 130 Roswell, GA 30076 770-643-1114 Fax: 1-800-418-9088 www.firestorm.com Page Intentionally
More informationTechnology Risk Management in Banking Industry. Rocky Cheng General Manager, Information Technology, Bank of China (Hong Kong) Limited
Technology Risk Management in Banking Industry Rocky Cheng General Manager, Information Technology, Bank of China (Hong Kong) Limited Change in Threat Landscape 2 Problem & Threats faced by Banking Industry
More informationCyber Insurance: What is your bank doing to manage risk? presented by
Cyber Insurance: What is your bank doing to manage risk? David Kitchen presented by Lisa Micciche Today s Agenda Claims Statistics Common Types of Cyber Attacks Typical Costs Incurred to Respond to an
More informationDeMystifying Data Breaches and Information Security Compliance
May 22-25, 2016 Los Angeles Convention Center Los Angeles, California DeMystifying Data Breaches and Information Security Compliance Presented by James Harrison OM32 5/25/2016 3:00 PM - 4:15 PM The handouts
More informationA CFO s Guide to Cyber Security in the Coming Year
CYBER SECURITY A CFO s Guide to Cyber Security in the Coming Year LEVERAGE TECHNOLOGY AND YOUR FINANCIAL INSTITUTION TO BUILD BETTER DEFENSES www.cfo.com www.huntington.com A CFO s Guide to Cyber Security
More informationBest Practices in Securing a Multicloud World
Best Practices in Securing a Multicloud World Actions to take now to protect data, applications, and workloads We live in a multicloud world. A world where a multitude of offerings from Cloud Service Providers
More informationBuilding cyber resilience into our railway s DNA. Matthew Simpson. Technical Director, Cyber Security
Building cyber resilience into our railway s DNA Matthew Simpson Technical Director, Cyber Security Building cyber resilience into our railway s DNA As we move into the age of the digital railway, retro-fixing
More informationHealthcare HIPAA and Cybersecurity Update
Baker Tilly refers to Baker Tilly Virchow Krause, LLP, an independently owned and managed member of Baker Tilly International. Healthcare HIPAA and Cybersecurity Update Agenda > Introductions > Cybersecurity
More information