Give Me 5 Understanding Cyber Security Part 1: How Cyber Security is Impacting Your Business

Similar documents
2017 RIMS CYBER SURVEY

Cyber Risks in the Boardroom Conference

Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure

Collaboration on Cybersecurity program between California University and Shippensburg University

Cybersecurity and the Board of Directors

IT SECURITY OFFICER. Department: Information Technology. Pay Range: Professional 18

The CERT Top 10 List for Winning the Battle Against Insider Threats

Bringing cyber to the Board of Directors & C-level and keeping it there. Dirk Lybaert, Proximus September 9 th 2016

Opening Doors to Cyber and Homeland Security Careers

Your CONNECTION to the CREDENTIALING COMMUNITY JOIN TODAY

The Insider Threat Center: Thwarting the Evil Insider

Security and Privacy Governance Program Guidelines

KENYA SCHOOL OF GOVERNMENT EMPLOYMENT OPORTUNITY (EXTERNAL ADVERTISEMENT)

APMP Certification. Webinar presentation by: Mark Wigginton Regional Director, Shipley Associates September 11, 2013

Standing Together for Financial Industry Resilience Quantum Dawn 3 After-Action Report. November 19, 2015

Insider Threat Program: Protecting the Crown Jewels. Monday, March 2, 2:15 pm - 3:15 pm

Legal, Ethical, and Professional Issues in Information Security

Business continuity management and cyber resiliency

Clarity on Cyber Security. Media conference 29 May 2018

Membership

WELCOME TO THE INNOVATIVE PAYMENTS ASSOCIATION

December 10, Statement of the Securities Industry and Financial Markets Association. Senate Committee on Banking, Housing, and Urban Development

Membership Categories and Benefits

encrypted, and that all portable devices (laptops, phones, thumb drives, etc.) be encrypted while in use and while at rest?

The ACFE Law Enforcement and Government Alliance

Cyber Security and Cyber Fraud

79th OREGON LEGISLATIVE ASSEMBLY Regular Session. Senate Bill 90

FileMaker Business Alliance. Program Guide

Cybersecurity and Hospitals: A Board Perspective

COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN

DFARS Cyber Rule Considerations For Contractors In 2018

WEB ACCESSIBILITY POLICY

Could the BIGGEST Threat to Your Business be INSIDE Your Company?

Preparing for a Breach October 14, 2016

The Value of Bipartisanship

PROTECTING ARIZONA AGAINST CYBER THREATS THE ARIZONA CYBERSECURITY TEAM

CHARTER OUR MISSION OUR OBJECTIVES OUR GUIDING PRINCIPLES

SOC Summit June 6, Strengthening Capacity in Cyber Talent sans.org/cybertalent

Regulation P & GLBA Training

Standing Together for Financial Industry Resilience Quantum Dawn IV after-action report June 2018

UNSCR 1540 Compliance From Policy to Implementation

Combating Cyber Risk in the Supply Chain

Effective Cyber Incident Response in Insurance Companies

Strengthening Capacity in Cyber Talent sans.org/cybertalent

Compliance with NIST

RISK MANAGEMENT Education and Certification

Candidate Profile for the Position of Vice President, Education and Certification

SALARY $ $72.54 Hourly $3, $5, Biweekly $8, $12, Monthly $103, $150, Annually

Cyber Management for Ports Results of Small Port Cyber Security Workshops

Section One of the Order: The Cybersecurity of Federal Networks.

ASSEMBLY, No STATE OF NEW JERSEY. 217th LEGISLATURE INTRODUCED FEBRUARY 4, 2016

Hearing Voices: The Cybersecurity Pro s View of the Profession

ROADMAP TO DFARS COMPLIANCE

The HIPAA Omnibus Rule

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE

Session 609 Tuesday, October 22, 2:45 PM - 3:45 PM Track: IT Governance and Security

POSITION DESCRIPTION

Indonesia Cyber Security Market

Business Continuity Management

CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018

2016 SC REGIONAL HOUSING AUTHORITY NO. 3 S EIV SECURITY POLICY

Article II - Standards Section V - Continuing Education Requirements

Reducing Cybersecurity Costs & Risk through Automation Technologies

Anatomy of a Data Breach: A Practical Guide for Small Law Departments

THE TRUSTED NETWORK POWERING GLOBAL SUPPLY CHAINS AND THEIR COMMUNITIES APPROVED EDUCATION PROVIDER INFORMATION PACK

Advanced Concepts & Technologies International, LLC

Understanding Cyber Insurance & Regulatory Drivers for Business Continuity

Exert Influence. Combine forces to transform public policy and open new markets, at the state and federal levels

Hacking and Cyber Espionage

PROVIDING INVESTIGATIVE SOLUTIONS

STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE

falanx Cyber ISO 27001: How and why your organisation should get certified

Keeping Your SOCs Full. May 26, Strengthening Capacity in Cyber Talent sans.org/cybertalent

UNIVERSITY OF RWANDA VACANCY ANNOUNCEMENT

PROCEDURE COMPREHENSIVE HEALTH SERVICES, INC

GEORGIA CYBERSECURITY WORKFORCE ACADEMY. NASCIO 2018 State IT Recognition Awards

POSITION DESCRIPTION

INFORMATION SECURITY-SECURITY INCIDENT RESPONSE

Risk: Security s New Compliance. Torsten George VP Worldwide Marketing and Products, Agiliance Professional Strategies - S23

PROJECT MANAGEMENT PROFESSIONAL (PMP)

Thales Cyber Assurance Webinar Your first step to Cyber Security

Information Governance, the Next Evolution of Privacy and Security

SAVANNAH LAKES VILLAGE PROPERTY OWNERS ASSOCIATION, INC. JOB DESCRIPTION

Public Power Forward Challenges & Opportunities

MY CERTIFICATION HELPED ME GET HERE. MY MEMBERSHIP HELPS KEEP ME HERE.

Lakeshore Technical College Official Policy

A Global Look at IT Audit Best Practices

Cybersecurity Guidance for Small Firms Thursday, November 8 9:00 a.m. 10:00 a.m.

Business Case for Training and Certification

National Initiative for Cyber Education (NICE) and the Cybersecurity Workforce Framework: Attract and Retain the Best in InfoSec.

Cybersecurity Fundamentals

MANUAL OF UNIVERSITY POLICIES PROCEDURES AND GUIDELINES. Applies to: faculty staff students student employees visitors contractors

Cybersecurity in Higher Ed

Managing the Cybersecurity Threat

CERTIFIED IN THE GOVERNANCE OF ENTERPRISE IT CGEIT AFFIRM YOUR STRATEGIC VALUE AND CAREER SUCCESS

October 21 22, 2014 Introduction to CompTIA, Communities, and ITSS

Putting It All Together:

HIPAA in 2017: Hot Topics You Can t Ignore. Danika Brinda, PhD, RHIA, CHPS, HCISPP March 16, 2017

AMERICAN CHAMBER OF COMMERCE IN THAILAND DIGITAL ECONOMY POSITION PAPER

SECURITY CODE. Responsible Care. American Chemistry Council. 7 April 2011

Transcription:

Give Me 5 Understanding Cyber Security Part 1: How Cyber Security is Impacting Your Business

Women Impacting Public Policy (WIPP) is a nonprofit, membership organization working to increase the economic power and public policy clout of women entrepreneurs by providing essential business skills education, leadership opportunities for business and personal growth, and a seat at the table among policymakers in Washington, D.C. WIPP was founded in 2001 and is recognized as a national, nonpartisan voice for women business owners, advocating on behalf of its coalition of 4.7 million businesswomen including 78 business organizations. WIPP identifies important trends and opportunities and provides a collaborative model for the public and private sectors to advance the economic empowerment of women. www.wipp.org

Give Me 5 National program from WIPP & American Express OPEN designed to educate women business owners on how to apply for and secure federal procurement opportunities. Give Me 5 works to increase the representation of Women Business Owners that win government contracts. We provide accessible business education tools to assist both new and experienced federal contractors. Women Business Owners could gain more than $4 billion in annual revenues if the 5% contracting goal set by Congress was reached.

Your Voice - Be heard! www.wedecide2016.org

Give Me 5 Understanding Cyber Security Part 1: How Cyber Security is Impacting Your Business

Instructor Angela Dingle, President Ex Nihilo Management, LLC Women Impacting Public Policy (WIPP) Education Foundation Board of Directors Certified in the Governance of Enterprise Information Technology (CGEIT) Managed over $40 million in Government Contracts

If you hire or manage employees, contractors or subcontractors; own a business or manage information, this session is for you. Introduction

Course Goals Understand the Need Understand Your Responsibilities Understand How to Protect Your Business

Cyber Security Defined Cyber Security is a collection of policies, procedures, practices and technologies designed to protect networks, computers, programs and data from attack, damage or unauthorized access.

Understanding the Need Source: SecureID News, 2016

Understanding the Need 21.5 Million SSNs 5.6 Million Fingerprints 4.2 Million Personnel Records 13 Months Undetected How did we find out?

Understanding the Need 720,000 Compromised Taxpayer Accounts Undetected for 16 Months Aggregation of Data Hack or Data Breach?

Understanding the Need Edward Snowden Former Military Federal Contractor Top Secret Clearance Polygraph Exam Computer Professional Insider Threat

Understanding the Need Notification of problem by a customer, law enforcement, coworker, informant, auditor or other external person who becomes suspicious Detection by law enforcement investigators

How It Impacts Your Business Negative Media Attention Inability to Conduct Business Data Loss System Damage Loss of Corporate Trade Secrets Damaged Corporate Reputation Website Defacement

How it Impacts Your Business Potential Loss of Life Personal Injury Identity Theft Financial Damages False Accusations Co-Worker Threats Unclear or Unmet Expectations

How It Impacts Your Business Technology Standards Federal Acquisition Regulations Personnel Security Policies Access Controls

How it Impacts Your Business Increased Contractual Responsibility Application Across All Disciplines Potential Cost Increases Potential Audits Delayed Security Clearance Processing Increased Reporting Requirements Financial Penalties or Fines Contract Loss

Protecting Your Business Educate Yourself and Your Staff Review Contracts to Understand Responsibilities Implement Appropriate Policies and Technologies Inspect What You Expect Consult with a Professional Expert to Assist

Review Cyber security affects all government contractors not just IT providers You have a responsibility to implement and enforce cyber security policy within your organization Failure to do so could be costly Early adopters could have a competitive advantage

Questions? Angela Dingle, President Phone: (202) 379-4884Email: adingle@exnihilo-mgmt.com www.exnihilo-mgmt.com/cyber

Thank You For Participating Following this call you will receive links to the podcast of this session. For questions, please contact Lin Stuart at Lstuart@wipp.org

Your Voice - Be heard! www.wedecide2016.org

Get Involved! Join a policy issue committee and learn how policy can impact your business growth Make your voice heard - become a member of our national Instant Impact Advocacy Team Participate in our educational series unlimited opportunities for you and your staff Receive weekly policy updates and briefings 1-888-488-WIPP www.wipp.org Questions? Contact WIPP Staff Program & Education Coordinator: Lin Stuart LStuart@wipp.org (415) 434-4314 Membership Coordinator: Lynn Bunim LBunim@wipp.org (415) 434-4314