Cybersecurity is a Journey and Not a Destination: Developing a risk management culture in your business. Thursday, May 21, 2015

Similar documents
Cyber COBIT. Ophir Zilbiger, CEO SECOZ Shay Zandani, CEO CyberARM. December 2013

CYBER SOLUTIONS & THREAT INTELLIGENCE

Cybersecurity A Regulatory Perspective Sara Nielsen IT Manager Federal Reserve Bank of Kansas City

Sage Data Security Services Directory

MOBILE SECURITY 2017 SPOTLIGHT REPORT. Information Security PRESENTED BY. Group Partner

Understanding Holistic Effects of Cyber Events on Critical Infrastructure

NERC Staff Organization Chart Budget 2019

Cyber Attacks & Breaches It s not if, it s When

FTA 2017 SEATTLE. Cybersecurity and the State Tax Threat Environment. Copyright FireEye, Inc. All rights reserved.

Cybersecurity Risk Mitigation: Protect Your Member Data. Introduction

Designing and Building a Cybersecurity Program

ISE Cyber Security UCITS Index (HUR)

Must Have Items for Your Cybersecurity or IT Budget in 2018

End-to-End Trust, Segmentation and Segregation in the IIoT

Digital Health Cyber Security Centre

Bringing cyber to the Board of Directors & C-level and keeping it there. Dirk Lybaert, Proximus September 9 th 2016

Cyber Security For Utilities Risks, Trends & Standards. IEEE Toronto March 22, Doug Westlund Senior VP, AESI Inc.

NATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium

May 14, :30PM to 2:30PM CST. In Plain English: Cybersecurity and IT Exam Expectations

Understanding the Changing Cybersecurity Problem

Security in India: Enabling a New Connected Era

CRITICAL INFRASTRUCTURE AND CYBER THREAT CRITICAL INFRASTRUCTURE AND CYBER THREAT

White Paper. View cyber and mission-critical data in one dashboard

GEORGIA CYBERSECURITY WORKFORCE ACADEMY. NASCIO 2018 State IT Recognition Awards

Information Governance, the Next Evolution of Privacy and Security

Cyber Risk Program Maturity Assessment UNDERSTAND AND MANAGE YOUR ORGANIZATION S CYBER RISK.

FFIEC Cyber Security Assessment Tool. Overview and Key Considerations

NERC Staff Organization Chart Budget 2019

Angela McKay Director, Government Security Policy and Strategy Microsoft

NERC Staff Organization Chart

A Comprehensive Guide to Remote Managed IT Security for Higher Education

Risk: Security s New Compliance. Torsten George VP Worldwide Marketing and Products, Agiliance Professional Strategies - S23

Boston Chapter AGA 2018 Regional Professional Development Conference Cyber Security MAY 2018

NERC Staff Organization Chart Budget 2018

Presented by Ingrid Fredeen and Pamela Passman. Copyright 2017NAVEXGlobal,Inc. AllRightsReserved. Page 0

Technology Risk Management in Banking Industry. Rocky Cheng General Manager, Information Technology, Bank of China (Hong Kong) Limited

Securing the Internet of Things (IoT) at the U.S. Department of Veterans Affairs

Background FAST FACTS

California Cybersecurity Integration Center (Cal-CSIC)

Cybersecurity. Securely enabling transformation and change

Bringing Cybersecurity to the Boardroom Bret Arsenault

Florida Government Finance Officers Association. Staying Secure when Transforming to a Digital Government

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE

Building a Threat Intelligence Program

Cyber Security: What s the Big Deal?

Les joies et les peines de la transformation numérique

Key Findings from the Global State of Information Security Survey 2017 Indonesian Insights

Gujarat Forensic Sciences University

Securing Your Digital Transformation

Cyber Security: Threat and Prevention

Delivering Integrated Cyber Defense for the Cloud Generation Darren Thomson

Cybersecurity, Trade, and Economic Development

INTRODUCTION. We would like to thank HelpSystems for supporting this unique research. We hope you will enjoy the report.

The Mobile Risk Management Company. Overview of Fixmo and Mobile Risk Management (MRM) Solutions

Cybersecurity and the Board of Directors

DHG presenter. August 17, Addressing the Evolving Cybersecurity Landscape. DHG Birmingham CPE Seminar 1

Cybersecurity Guidance for Small Firms Thursday, November 8 9:00 a.m. 10:00 a.m.

National Cyber Security Operations Center (N-CSOC) Stakeholders' Conference

Cyber Intelligence Professional Certificate Program Booz Allen Hamilton 2-Day Seminar Agenda September 2016

Managing Cybersecurity Risk

CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018

Fidelis Overview. 15 August 2016 ISC2 Cyber Defense Forum

Cybersecurity Today Avoid Becoming a News Headline

Monthly Cyber Threat Briefing

About Issues in Building the National Strategy for Cybersecurity in Vietnam

Cyber Risks in the Boardroom Conference

Hacking and Cyber Espionage

2017 Cyber Incident & Breach Readiness Webinar Will Start Shortly

Cybersecurity Overview

HOLY ANGEL UNIVERSITY COLLEGE OF INFORMATION AND COMMUNICATIONS TECHNOLOGY CYBER SECURITY COURSE SYLLABUS

EFFECTIVELY TARGETING ADVANCED THREATS. Terry Sangha Sales Engineer at Trustwave

Cyber Risk for Maritime

Strategy is Key: How to Successfully Defend and Protect. Session # CS1, February 19, 2017 Karl West, CISO, Intermountain Healthcare

Systemic Analyser in Network Threats

CYBER CAMPUS KPMG BUSINESS SCHOOL THE CYBER SCHOOL FOR THE REAL WORLD. The Business School for the Real World

6 MILLION AVERAGE PAY. CYBER Security. How many cyber security professionals will be added in 2019? for popular indursty positions are

CALIFORNIA CYBERSECURITY TASK FORCE

Cybersecurity: Considerations for Internal Audit. Gina Gondron Senior Manager Frazier & Deeter Geek Week August 10, 2016

Managing IT Risk: What Now and What to Look For. Presented By Tina Bode IT Assurance Services

Ransomware A case study of the impact, recovery and remediation events

NERC Staff Organization Chart Budget 2017

Automating the Top 20 CIS Critical Security Controls

Cybersecurity Fundamentals

Cybersecurity. Overview. Define Cyber Security Importance of Cyber Security 2017 Cyber Trends Top 10 Cyber Security Controls

Achieving Cyber-Readiness through Information Sharing Analysis Organizations (ISAOs)

Plenary Session: Branch Cybersecurity Controls Thursday, February 22 1:15 p.m. 2:15 p.m.

COST OF CYBER CRIME STUDY INSIGHTS ON THE SECURITY INVESTMENTS THAT MAKE A DIFFERENCE

CYBER SECURITY AND MITIGATING RISKS

CYBERSECURITY. Protecting Against the Financial, Regulatory and Reputational Impacts of Cyber Attack

ENISA & Cybersecurity. Dr. Udo Helmbrecht Executive Director, European Network & Information Security Agency (ENISA) 25 October 2010

NERC Staff Organization Chart Budget 2017

Sizzle or Fizzle: Is Threat Intelligence Really Worth My Time?

ISACA West Florida Chapter - Cybersecurity Event

U.S. State of Cybercrime

NERC CIP VERSION 6 BACKGROUND COMPLIANCE HIGHLIGHTS

CYBERSECURITY HOW IT IS TRANSFORMING THE IT ASSURANCE FIELD

GDPR: Get Prepared! A Checklist for Implementing a Security and Event Management Tool. Contact. Ashley House, Ashley Road London N17 9LZ

Software & Supply Chain Assurance: Enabling Enterprise Resilience through Security Automation, Software Assurance and Supply Chain Risk Management

Digital Healthcare. Yordan Iliev Director R&D Healthcare. Regional Cybersecurity Forum, November 2016, Grand Hotel Sofia, Bulgaria

Cyber Security Maturity Model

Transcription:

Cybersecurity is a Journey and Not a Destination: Developing a risk management culture in your business. Thursday, May 21, 2015

Cybersecurity is a Journey and Not a Destination: Developing a risk management culture in your business. Thursday, May 21, 2015

German Nunez is the President and co-founder of NDP (Net-Centric Design Professionals), a Colorado-based engineering firm specializing in net-centric system design, cybersecurity and systems integration. He has served as the company s president since its founding in 2005. In 2013, NDP and Braxton Technologies merged under newly-created Braxton Science & Technology Group (BSTG), where he has expanded his role as an executive advisor. German has nearly twenty years of experience in telecommunications and network engineering, serving customers in both commercial and government sectors.

Agenda What is cybersecurity? What are the current cyber threats? What are the changes the DoD and intelligence community has seen and how has that influenced the private sector?

What is Cybersecurity? Cybersecurity - Definition Measures taken to protect a computer or computer system (as on the Internet) against unauthorized access or attack Term first used in 1994 Cyberspace The notional environment in which communication over computer networks occurs Cybercrime is estimated to cost the global economy over $400 billion a year

What is Cybersecurity? (cont.) Fundamentals Is a security issue of unprecedented global scale Highly asymmetrical Protects four things: Secrets Assets Identity Perception Who is responsible for Cybersecurity in the US? The Office of Cybersecurity and Communications (CS&C), within the National Protection and Programs Directorate [DHS]

What are the current cyber threats? Data Breaches by Industry Emerging Threats Ransomware Mobile Malware IoT exploits Espionageware and cyberwar 5% 33% 7% 12% 43% Suggested places to stay current: National Cyber Awareness System https://www.uscert.gov/ncas/current-activity FireEye https://www.fireeye.com/currentthreats.html Finance Business Education Gov t Healthcare According to the Identity Theft Resource Center, the number of tracked data breaches in the United States increased by 27.5% from 2013 to 2014

DoD Influence in the Private Sector What are the changes the DoD and intelligence community has seen and how has that influenced the private sector? Advanced Persistent Threat Insider Threat Department of Defense DIRECTIVE 5205.16 The DoD Insider Threat Program Controlled Interfaces Influenced the Security Information and Event Management (SIEM) Market defined by the customer s need to analyze security event data in real-time for internal and external threat management, and to collect, store, analyze and report on log data for incident response, forensics and regulatory compliance.

Trends Superior Prescriptive Models Advanced Intermediate Vulnerability Control Correlations Systems Predictive Models Basic Log Management Monitoring Compliant Protection Monitor and Report Manage and Control Predict and Prescribe

Robb Reck is VP and Chief Information Security Officer for Pulte Financial Services. Robb is an information security and risk professional, with over 16 years of experience in IT, Compliance, and Information Security. He has created comprehensive security programs for multiple organizations in the financial and software industries. He serves as the Vice President of the Denver Chapter of the Information Systems Security Association (ISSA).

Security is not a technology problem - This is a brave new world - Are we secure? - Like any other risk

Where to Invest Strong foundations - Complete /accurate asset inventories - Updated and tuned network and end-point protections - Regular processes to review audit logs - Incident response process and tests Focus on - Process over technology - Training the individuals NOT the newest tools

What it Looks Like