The five hows how cybersecurity helps drive business agility (handouts)

Page 1

The Five "Hows": How Cybersecurity Helps Drive Business Agility

https://www.netcomlearning.com/webinars/?advid=1315


Agenda • Which Security Measures Impact You the Most? • Common Types of Cyber Attacks • Trends in the Industry • When a Breach Occurs, How Long Would it Take you to Respond? • Key Challenges to Combating Cyber Security Threats • Where to Invest Your Resources

https://www.netcomlearning.com/webinars/?advid=1315


Which Security Measures Impact You the Most? • Old/Limited Technology • Bad Processes/Habits • General Leadership • Employee Experience Levels • Compliance Mandate • External Factors

https://www.netcomlearning.com/webinars/?advid=1315


Security is a global challenge

https://www.netcomlearning.com/webinars/?advid=1315


The Inevitability (and Cost) of an Attack 90 Million Cyber Attacks in 2016

70% of attacks go unnoticed https://www.netcomlearning.com/webinars/?advid=1315


Common Types of Cyber Attacks • Malware • Phishing • SQL Injection Attack • Cross-Site Scripting (XSS) • Denial of Service (DoS) • Man in the Middle and Session Hijacking • Credential Reuse • Spear Phishing • Brute Force https://www.netcomlearning.com/webinars/?advid=1315


Trends in the Industry • Cyber Crime Damage Costs to Hit 6 TRILLION annually by 2021 • Cybersecurity Spending to exceed 1 Trillion from 2017 to 2021 • Cyber Crime will more than TRIPLE the number of unfilled Cybersecurity jobs, which will be 3.5 million by 2021 • Human Attacks to reach 6 Billion people by 2022 • Global Ransomware Damage Costs will exceed 5 Billion total for 2017

During the next five years, Cyber Crime might become the greatest threat to every person, place, and thing in the world. https://www.netcomlearning.com/webinars/?advid=1315


What Conclusions Can We Draw? • It’s not “if”, but “when” • You must be prepared for the “Before, During, and After” of an Incident • Threats are on the rise, and Cybersecurity positions will have to meet the demand • More insight is a good thing, but can also be part of the problem • One of the greatest challenges is coordinating your teams • There is no catch all hardware/software solution, TRAINING must be part of your strategy https://www.netcomlearning.com/webinars/?advid=1315


When a Breach Occurs, How Long Would it Take You to Respond? • Hours • Days • Weeks • Months • Years • We’re Not Sure We Can

https://www.netcomlearning.com/webinars/?advid=1315


Implementing a Security Strategy that Aligns to Business Objectives • Good Security should work like a BI Tool: There is an automation process empowering humans to discover what they need • The key to most business strategies is to add agility and automation • Much of this falls on CISO and CTO’s shoulders • Create KPI (Key Performance Indicators) that directly tie to business KIs (Key Imperatives) • Implement “Security by Design” – having security professionals join projects at the start • Agility is the goal https://www.netcomlearning.com/webinars/?advid=1315


Key Challenges to Combating Cyber Security Threats • Data Volume: There are millions of new and developing threats on the landscape every year • Complexity: Cyber Security threats are becoming increasingly more sophisticated • Scalability: SQL-based tooling and infrastructure don’t scale well and are costly to maintain https://www.netcomlearning.com/webinars/?advid=1315


GDPR INCIDENT RESPONSE REQUIREMENTS Article 33: Notification of a personal data breach to the supervisory authority: (1) In the case of a personal data breach, the controller shall without undue delay and, where feasible, not later than 72 hours after having become aware of it‌ Article 34: Communication of a personal data breach to the data subject (1) When the personal data breach is likely to result in a high risk to the rights and freedoms of natural persons, the controller shall communicate the personal data breach to the data subject without undue delay https://www.netcomlearning.com/webinars/?advid=1315


Data Analytics and Security • 74% of business want to be “Data Driven” • 29% believe that they are • The average operating system is 12 years old • Incident Response time averages 170 days and additional 45 days to remediate • We must give employees access to the right data, all the time! • Big Data and Analytics must become a critical part of your security strategy https://www.netcomlearning.com/webinars/?advid=1315


Where to Invest Your Resources • What should you be spending on IT and how should you be spending it? • “Businesses are confused and uncertain as to what appropriate IT budgets are, and they don’t have a clear vision how these funds should be spent” – American Structurepoint • IT budgets are on the rise – 6.7% growth from 2017 to 2018 in Healthcare alone • Budgets for IT Automation and Cloud Services are growing as well • 2018-2021 will see a boost in IT Staffing https://www.netcomlearning.com/webinars/?advid=1315


https://www.netcomlearning.com/webinars/?advid=1315


Training • 2017 U.S Training Expenditures increased 32.5 percent to $90.6 Billion • 83% of Companies currently lack the right personal to adequately prepare for and remediate against a ybersecurity Incident • Only 1 out of 3 cybersecurity professionals have received training on dealing with Advanced Persistent Threats • There are currently over 1 million unfilled cybersecurity jobs • Cloud and Big Data are now driving the security conversation • Business Agility and Security are no longer separate pieces of the puzzle https://www.netcomlearning.com/webinars/?advid=1315


We’ve come a long way… 2018

https://www.netcomlearning.com/webinars/?advid=1315


Cyber Security Training Today ▪ Increasingly crowded marketplace ▪ Focused on a narrow market (govt./military) ▪ Hyper-specialized offerings are the norm

▪ No easy pathway for IT workers to get into security

https://www.netcomlearning.com/webinars/?advid=1315


Ensure training is hands-on.

Experiential Learning

https://www.netcomlearning.com/webinars/?advid=1315

Monitor, analyze and respond to actual cyber attacks.


Invest in vendor-neutral training ▪ In certain cases, there is a need for vendor-specific training ▪ IBM, Cisco and many more

▪ Vendor-neutral training is a great alternative ▪ Train security professionals to “guard the castle” with no additional infrastructure investment

https://www.netcomlearning.com/webinars/?advid=1315


The certification alphabet soup LPT

CFR

GSAE

CHFI CSA

CISSP

GCFW

GSNA

GSLC

ECSA

GISO

SSCP CSIH

How do you choose? CCNAS

CNDA

CASP

CEH CCNPS

https://www.netcomlearning.com/webinars/?advid=1315

CACES GCUX


https://www.netcomlearning.com/webinars/?advid=1315


CompTIA Career Training and Certifications • Core Competencies • • • •

IT Fundamentals A+ Net+ Security+

• Cybersecurity Training • CySA+ • PenTest+ • CASP https://www.netcomlearning.com/webinars/?advid=1315


CertNexus Certifications • CyberSec First Responder – 310 • Detect • Analyze • Respond

• Certified Internet of Things Practioner • Cyber Secure Coder

https://www.netcomlearning.com/webinars/?advid=1315


ISC2 Certifications • CISSP • CAP

https://www.netcomlearning.com/webinars/?advid=1315


SOME THINGS TO CONSIDER ▪ Who manages security in your organization? ▪ How many individuals, if any, are dedicated to keeping the bad guys out? ▪ What is your organizational security strategy? ▪ What preventative measures are you taking? ▪ Is your security team ready to identify and respond to an attack? ▪ How will you cut down on the 170/45 day problem?

https://www.netcomlearning.com/webinars/?advid=1315


Recorded Webinar Video To watch the recorded webinar video for live demos, please access the link: https://bit.ly/2JhZOHP

https://www.netcomlearning.com/webinars/?advid=1315


About NetCom Learning

https://www.netcomlearning.com/webinars/?advid=1315


Recommended Courses » CompTIA Security+ Certification - Class scheduled on June 18 » Certified Information Systems Security Professional (CISSP) Certification - Class scheduled on June 25 » CAP Certification - Class scheduled on June 25 » CompTIA Cybersecurity Analyst (CySA+) Certification - Class scheduled on Jul 23 » CompTIA Advanced Security Practitioner (CASP) Certification - Class scheduled on Jul 30

https://www.netcomlearning.com/webinars/?advid=1315


Preparing and Architecting for Machine Learning The Applications of SDN in Cisco (Part 2) ITIL: 3 Reasons to Align DevOps with IT Service Management (ITSM) How to Transition from AutoCAD to Revit BIM - What You Must Know Changing Role of IT Leaders in the Digital Age Let the Battle Begin: SaaS, PaaS and IaaS The Five Phases of Ethical Hacking Windows Server 2016: Advanced Networking Features Microsoft Excel 301: Working with tables and Pivot Charts https://www.netcomlearning.com/webinars/?advid=1315


https://www.netcomlearning.com/webinars/?advid=1315


https://www.netcomlearning.com/webinars/?advid=1315


THANK YOU !!!

https://www.netcomlearning.com/webinars/?advid=1315


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.