The Five "Hows": How Cybersecurity Helps Drive Business Agility
https://www.netcomlearning.com/webinars/?advid=1315
Agenda • Which Security Measures Impact You the Most? • Common Types of Cyber Attacks • Trends in the Industry • When a Breach Occurs, How Long Would it Take you to Respond? • Key Challenges to Combating Cyber Security Threats • Where to Invest Your Resources
https://www.netcomlearning.com/webinars/?advid=1315
Which Security Measures Impact You the Most? • Old/Limited Technology • Bad Processes/Habits • General Leadership • Employee Experience Levels • Compliance Mandate • External Factors
https://www.netcomlearning.com/webinars/?advid=1315
Security is a global challenge
https://www.netcomlearning.com/webinars/?advid=1315
The Inevitability (and Cost) of an Attack 90 Million Cyber Attacks in 2016
70% of attacks go unnoticed https://www.netcomlearning.com/webinars/?advid=1315
Common Types of Cyber Attacks • Malware • Phishing • SQL Injection Attack • Cross-Site Scripting (XSS) • Denial of Service (DoS) • Man in the Middle and Session Hijacking • Credential Reuse • Spear Phishing • Brute Force https://www.netcomlearning.com/webinars/?advid=1315
Trends in the Industry • Cyber Crime Damage Costs to Hit 6 TRILLION annually by 2021 • Cybersecurity Spending to exceed 1 Trillion from 2017 to 2021 • Cyber Crime will more than TRIPLE the number of unfilled Cybersecurity jobs, which will be 3.5 million by 2021 • Human Attacks to reach 6 Billion people by 2022 • Global Ransomware Damage Costs will exceed 5 Billion total for 2017
During the next five years, Cyber Crime might become the greatest threat to every person, place, and thing in the world. https://www.netcomlearning.com/webinars/?advid=1315
What Conclusions Can We Draw? • It’s not “if”, but “when” • You must be prepared for the “Before, During, and After” of an Incident • Threats are on the rise, and Cybersecurity positions will have to meet the demand • More insight is a good thing, but can also be part of the problem • One of the greatest challenges is coordinating your teams • There is no catch all hardware/software solution, TRAINING must be part of your strategy https://www.netcomlearning.com/webinars/?advid=1315
When a Breach Occurs, How Long Would it Take You to Respond? • Hours • Days • Weeks • Months • Years • We’re Not Sure We Can
https://www.netcomlearning.com/webinars/?advid=1315
Implementing a Security Strategy that Aligns to Business Objectives • Good Security should work like a BI Tool: There is an automation process empowering humans to discover what they need • The key to most business strategies is to add agility and automation • Much of this falls on CISO and CTO’s shoulders • Create KPI (Key Performance Indicators) that directly tie to business KIs (Key Imperatives) • Implement “Security by Design” – having security professionals join projects at the start • Agility is the goal https://www.netcomlearning.com/webinars/?advid=1315
Key Challenges to Combating Cyber Security Threats • Data Volume: There are millions of new and developing threats on the landscape every year • Complexity: Cyber Security threats are becoming increasingly more sophisticated • Scalability: SQL-based tooling and infrastructure don’t scale well and are costly to maintain https://www.netcomlearning.com/webinars/?advid=1315
GDPR INCIDENT RESPONSE REQUIREMENTS Article 33: Notification of a personal data breach to the supervisory authority: (1) In the case of a personal data breach, the controller shall without undue delay and, where feasible, not later than 72 hours after having become aware of it‌ Article 34: Communication of a personal data breach to the data subject (1) When the personal data breach is likely to result in a high risk to the rights and freedoms of natural persons, the controller shall communicate the personal data breach to the data subject without undue delay https://www.netcomlearning.com/webinars/?advid=1315
Data Analytics and Security • 74% of business want to be “Data Driven” • 29% believe that they are • The average operating system is 12 years old • Incident Response time averages 170 days and additional 45 days to remediate • We must give employees access to the right data, all the time! • Big Data and Analytics must become a critical part of your security strategy https://www.netcomlearning.com/webinars/?advid=1315
Where to Invest Your Resources • What should you be spending on IT and how should you be spending it? • “Businesses are confused and uncertain as to what appropriate IT budgets are, and they don’t have a clear vision how these funds should be spent” – American Structurepoint • IT budgets are on the rise – 6.7% growth from 2017 to 2018 in Healthcare alone • Budgets for IT Automation and Cloud Services are growing as well • 2018-2021 will see a boost in IT Staffing https://www.netcomlearning.com/webinars/?advid=1315
https://www.netcomlearning.com/webinars/?advid=1315
Training • 2017 U.S Training Expenditures increased 32.5 percent to $90.6 Billion • 83% of Companies currently lack the right personal to adequately prepare for and remediate against a ybersecurity Incident • Only 1 out of 3 cybersecurity professionals have received training on dealing with Advanced Persistent Threats • There are currently over 1 million unfilled cybersecurity jobs • Cloud and Big Data are now driving the security conversation • Business Agility and Security are no longer separate pieces of the puzzle https://www.netcomlearning.com/webinars/?advid=1315
We’ve come a long way… 2018
https://www.netcomlearning.com/webinars/?advid=1315
Cyber Security Training Today ▪ Increasingly crowded marketplace ▪ Focused on a narrow market (govt./military) ▪ Hyper-specialized offerings are the norm
▪ No easy pathway for IT workers to get into security
https://www.netcomlearning.com/webinars/?advid=1315
Ensure training is hands-on.
Experiential Learning
https://www.netcomlearning.com/webinars/?advid=1315
Monitor, analyze and respond to actual cyber attacks.
Invest in vendor-neutral training ▪ In certain cases, there is a need for vendor-specific training ▪ IBM, Cisco and many more
▪ Vendor-neutral training is a great alternative ▪ Train security professionals to “guard the castle” with no additional infrastructure investment
https://www.netcomlearning.com/webinars/?advid=1315
The certification alphabet soup LPT
CFR
GSAE
CHFI CSA
CISSP
GCFW
GSNA
GSLC
ECSA
GISO
SSCP CSIH
How do you choose? CCNAS
CNDA
CASP
CEH CCNPS
https://www.netcomlearning.com/webinars/?advid=1315
CACES GCUX
https://www.netcomlearning.com/webinars/?advid=1315
CompTIA Career Training and Certifications • Core Competencies • • • •
IT Fundamentals A+ Net+ Security+
• Cybersecurity Training • CySA+ • PenTest+ • CASP https://www.netcomlearning.com/webinars/?advid=1315
CertNexus Certifications • CyberSec First Responder – 310 • Detect • Analyze • Respond
• Certified Internet of Things Practioner • Cyber Secure Coder
https://www.netcomlearning.com/webinars/?advid=1315
ISC2 Certifications • CISSP • CAP
https://www.netcomlearning.com/webinars/?advid=1315
SOME THINGS TO CONSIDER ▪ Who manages security in your organization? ▪ How many individuals, if any, are dedicated to keeping the bad guys out? ▪ What is your organizational security strategy? ▪ What preventative measures are you taking? ▪ Is your security team ready to identify and respond to an attack? ▪ How will you cut down on the 170/45 day problem?
https://www.netcomlearning.com/webinars/?advid=1315
Recorded Webinar Video To watch the recorded webinar video for live demos, please access the link: https://bit.ly/2JhZOHP
https://www.netcomlearning.com/webinars/?advid=1315
About NetCom Learning
https://www.netcomlearning.com/webinars/?advid=1315
Recommended Courses » CompTIA Security+ Certification - Class scheduled on June 18 » Certified Information Systems Security Professional (CISSP) Certification - Class scheduled on June 25 » CAP Certification - Class scheduled on June 25 » CompTIA Cybersecurity Analyst (CySA+) Certification - Class scheduled on Jul 23 » CompTIA Advanced Security Practitioner (CASP) Certification - Class scheduled on Jul 30
https://www.netcomlearning.com/webinars/?advid=1315
Preparing and Architecting for Machine Learning The Applications of SDN in Cisco (Part 2) ITIL: 3 Reasons to Align DevOps with IT Service Management (ITSM) How to Transition from AutoCAD to Revit BIM - What You Must Know Changing Role of IT Leaders in the Digital Age Let the Battle Begin: SaaS, PaaS and IaaS The Five Phases of Ethical Hacking Windows Server 2016: Advanced Networking Features Microsoft Excel 301: Working with tables and Pivot Charts https://www.netcomlearning.com/webinars/?advid=1315
https://www.netcomlearning.com/webinars/?advid=1315
https://www.netcomlearning.com/webinars/?advid=1315
THANK YOU !!!
https://www.netcomlearning.com/webinars/?advid=1315