cyber security for growing organizations...cyber security for growing organizations action plan for...

27
Cyber Security For Growing Organizations Action Plan For Executives Presented by Steve Meek, CISSP

Upload: others

Post on 05-Oct-2020

8 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Cyber Security For Growing Organizations...Cyber Security For Growing Organizations Action Plan For Executives Presented by Steve Meek, CISSP

Cyber Security For Growing OrganizationsAction Plan For Executives

Presented by Steve Meek, CISSP

Page 2: Cyber Security For Growing Organizations...Cyber Security For Growing Organizations Action Plan For Executives Presented by Steve Meek, CISSP

Copyright © 2019 The Fulcrum Group Inc.

Agenda

Cybersecurity news

Risk Management

What to do

Giveaway

Page 3: Cyber Security For Growing Organizations...Cyber Security For Growing Organizations Action Plan For Executives Presented by Steve Meek, CISSP

Copyright © 2019 The Fulcrum Group Inc.

About Me?

Page 4: Cyber Security For Growing Organizations...Cyber Security For Growing Organizations Action Plan For Executives Presented by Steve Meek, CISSP

Copyright © 2019 The Fulcrum Group, Inc..

Page 5: Cyber Security For Growing Organizations...Cyber Security For Growing Organizations Action Plan For Executives Presented by Steve Meek, CISSP

Copyright © 2019 The Fulcrum Group, Inc..

Page 6: Cyber Security For Growing Organizations...Cyber Security For Growing Organizations Action Plan For Executives Presented by Steve Meek, CISSP

Copyright © 2019 The Fulcrum Group, Inc..

Page 7: Cyber Security For Growing Organizations...Cyber Security For Growing Organizations Action Plan For Executives Presented by Steve Meek, CISSP

Copyright © 2019 The Fulcrum Group, Inc..

Page 8: Cyber Security For Growing Organizations...Cyber Security For Growing Organizations Action Plan For Executives Presented by Steve Meek, CISSP

Copyright © 2019 The Fulcrum Group, Inc..

Page 9: Cyber Security For Growing Organizations...Cyber Security For Growing Organizations Action Plan For Executives Presented by Steve Meek, CISSP

Copyright © 2019 The Fulcrum Group Inc.

Cybersecurity News

Center for Internet Security- May 2019.

Page 10: Cyber Security For Growing Organizations...Cyber Security For Growing Organizations Action Plan For Executives Presented by Steve Meek, CISSP

Copyright © 2019 The Fulcrum Group Inc.

Cybersecurity News

Page 11: Cyber Security For Growing Organizations...Cyber Security For Growing Organizations Action Plan For Executives Presented by Steve Meek, CISSP

Copyright © 2019 The Fulcrum Group Inc.

Cybersecurity News

Common threats

Business Email Compromise

Digital Extortion

Ransomware

Crypto-mining

False sense of security

Verizon 2019 DBIR

Page 12: Cyber Security For Growing Organizations...Cyber Security For Growing Organizations Action Plan For Executives Presented by Steve Meek, CISSP

Copyright © 2019 The Fulcrum Group Inc.

Risk Management

Security Events

Security Incidents

Data Breaches

Page 13: Cyber Security For Growing Organizations...Cyber Security For Growing Organizations Action Plan For Executives Presented by Steve Meek, CISSP

Copyright © 2019 The Fulcrum Group, Inc..

Page 14: Cyber Security For Growing Organizations...Cyber Security For Growing Organizations Action Plan For Executives Presented by Steve Meek, CISSP

Copyright © 2019 The Fulcrum Group, Inc..

Page 15: Cyber Security For Growing Organizations...Cyber Security For Growing Organizations Action Plan For Executives Presented by Steve Meek, CISSP

Copyright © 2019 The Fulcrum Group Inc.

Risk Management

Risk Matrix

Likelihood- probability

that a risk can occur

Impact- potential effect on

the organizationExtremely

Harmful

Harmful Slightly

Harmful

Highly

Likely

Likely

Unlikely

40%

30%

Impact

Lik

eli

ho

od

Page 16: Cyber Security For Growing Organizations...Cyber Security For Growing Organizations Action Plan For Executives Presented by Steve Meek, CISSP

Copyright © 2019 The Fulcrum Group Inc.

Risk Management

Different types of security

Doors

Windows

Locks

Fence

Alarm

Motion Sensor

Crime Watch

Monitoring

Dog

Gun(s)

Police

Insurance

Protect Detect Respond

Page 17: Cyber Security For Growing Organizations...Cyber Security For Growing Organizations Action Plan For Executives Presented by Steve Meek, CISSP

Copyright © 2019 The Fulcrum Group Inc.

Risk Management

The National Institute of Standards and Technology

(NIST) Guidance

Page 18: Cyber Security For Growing Organizations...Cyber Security For Growing Organizations Action Plan For Executives Presented by Steve Meek, CISSP

Copyright © 2019 The Fulcrum Group Inc.

Risk Management

Page 19: Cyber Security For Growing Organizations...Cyber Security For Growing Organizations Action Plan For Executives Presented by Steve Meek, CISSP

Copyright © 2019 The Fulcrum Group, Inc..

Page 20: Cyber Security For Growing Organizations...Cyber Security For Growing Organizations Action Plan For Executives Presented by Steve Meek, CISSP

Copyright © 2019 The Fulcrum Group Inc.

What to do?

Left of Boom Right of Boom

Risk assessments

Vulnerability scanning

Penetration testing

Compliance review

Firewalls

Anti-virus

Email filtering

IDS/IPS

Security Operations

Incident Response

Remediation

Forensics

Secure Workforce and Cyber Security Insurance

Page 21: Cyber Security For Growing Organizations...Cyber Security For Growing Organizations Action Plan For Executives Presented by Steve Meek, CISSP

Copyright © 2019 The Fulcrum Group Inc.

What to do?

Center for

Internet

Security

Page 22: Cyber Security For Growing Organizations...Cyber Security For Growing Organizations Action Plan For Executives Presented by Steve Meek, CISSP

Copyright © 2019 The Fulcrum Group Inc.

What to do- Exercise

SMB Security Maturity Model

Identify Protect Detect Respond Recover

Exec involvement

Hardware/software

Basic policies

Advanced policies

Threat intelligence

Risk assessment

Standards/

procedures

Key data

repositories

Third-party eval.

1

3

5

Physical security

Secure configs

Patch OS, A/V, f/w,

email filter

Security

awareness

Admin control

NGFW, URL, MFA

Secure network

Simulated phishing

Encryption at

rest/in transit

High availability

Logging configured

Owner

Network monitoring

Security

information and

event management

Log review

Continuous

security monitoring

Lessons learned

Page 23: Cyber Security For Growing Organizations...Cyber Security For Growing Organizations Action Plan For Executives Presented by Steve Meek, CISSP

Copyright © 2019 The Fulcrum Group, Inc..

Page 24: Cyber Security For Growing Organizations...Cyber Security For Growing Organizations Action Plan For Executives Presented by Steve Meek, CISSP

Copyright © 2019 The Fulcrum Group Inc.

What to do- Full

SMB Security Maturity Model

Identify Protect Detect Respond Recover

Who’s

responsible

Communication

Data

classification

Basic incident

response

Tracking

Analysis/mitigation

Detailed IRP/ SIRT

Work lessons

learned

Server backups

Cloud protections

PC/device

recover

Business impact

assessment

Basic recovery

plan

Lessons learned

Detailed recovery

Tested recovery

Manage retention,

recovery times

Page 25: Cyber Security For Growing Organizations...Cyber Security For Growing Organizations Action Plan For Executives Presented by Steve Meek, CISSP

Copyright © 2019 The Fulcrum Group Inc.

Summary

Use threat intelligence to know

risks

Be the leader your organization

needs

Beware a false sense of

security

Identify key assets and data

repositories

Work both left and right of boom

Make detection a key security

effort

Page 26: Cyber Security For Growing Organizations...Cyber Security For Growing Organizations Action Plan For Executives Presented by Steve Meek, CISSP

Copyright © 2019 The Fulcrum Group Inc.

Giveaway

The Fulcrum Group, Inc.

5751 Kroger Drive, Suite 279,

Fort Worth, TX 76244

Phone: 817-337-0300

Support Desk: 817-898-1277

Web: www.fulcrum.pro

[email protected]

Page 27: Cyber Security For Growing Organizations...Cyber Security For Growing Organizations Action Plan For Executives Presented by Steve Meek, CISSP

Copyright © 2019 The Fulcrum Group Inc.

SMB LinksNational Cyber Awareness System

Alerts https://www.us-

cert.gov/ncas/alerts

2019 Data Breach Investigations Report

https://enterprise.verizon.com/resources

/reports/dbir/

National Institute of Standards and

Technology

https://www.nist.gov/cyberframework/sm

all-and-medium-business-resources

CIS® (Center for Internet Security, Inc.)

https://www.cisecurity.org/controls/

Global Cyber Alliance (GCA) toolkit

https://gcatoolkit.org/smallbusiness/

Ghost In The Wires: My Adventures as

the World's Most Wanted Hacker by

Kevin Mitnick