SlideShare una empresa de Scribd logo
1 de 38
1
Cybersecurity Health Checks:
Safeguarding Your Organisation
Dr. Malcolm Shore
2
Quick Facts about Lynda.com
Government
• Major government agencies
• Branches of military
Corporations
• More than half of the Fortune 50 across
all key industry sectors
Education
• 60% of all US colleges and universities
40% of Australian universities
4M+
Members
…with 350k paying
out of pocket
20
Years
Lynda.com was founded
in 1995
12,000+
Enterprise Clients
…located across
52 countries
6,000+
Courses
…available in
5 languages (German, Spanish,
French, Japanese)
The Global Leader in Online Skills Instruction
INTRODUCTION
3
Dr. Malcolm Shore
Lynda.com author
Technical Director,
BAE Systems Applied Intelligence,
Australia
INTRODUCTION
4
• 1983 - US DoD rainbow series
• 1993 – UK PD0003
• 1998 – BS 7799……ISO 27000
• 2005 – NIST Special Publication 800-53
• … but too difficult and costly
Information Security Standards
BACKGROUND
Cybersecurity Health Checks
5
• From Bulletin Boards to the Web
• Ubiquitous connectivity across the globe
• Clouds aren’t just in the sky…
• From email to social media…
• From telephone to smartphone
• Cyber kill chain … the world has changed
Information Security Standards
BACKGROUND
Cybersecurity Health Checks
6
• Evolution of information security standards lagging
• Information security policies ineffective*
New Approach
BACKGROUND
Cybersecurity Health Checks
*Doherty, NF and Fulford H. Do Information Security Policies Reduce the Incidence of Security Breaches? 2005
7
• UK Cybersecurity Strategy
• Cyber Governance Health Check
• top 350 listed companies
• only15% of Boards manage cyber risk
• only 30% use threat intelligence
• Majority of attacks exploit basic weaknesses
Information Security Policies
BACKGROUND
Cybersecurity Health Checks
8
• Term used in audit community
• Now used in cybersecurity consulting
• Various interpretations
… is simply cyber fitness
Cybersecurity Health Check
DEFINITION
Cybersecurity Health Checks
9
• Check-up – unauthorised users, malware
• Health test - check network traffic for infections
• Full examination - rules, patches, access and privileges
- operational defences
• Fitness test - external penetration exercise
• Cyber insurance
Cybersecurity Health Check
DEFINITION
Cybersecurity Health Checks
10
• Baseline security
• Operational focus
• Affordable, manageable
Cyber Essentials
CYBER ESSENTIALS
Cybersecurity Health Checks
11
CYBER ESSENTIALS
Cybersecurity Health Checks
12
• Prevents low grade technical attacks on
• desktop PCs, laptops
• tablets, smartphones
• email
• web applications
Cyber Essentials
CYBER ESSENTIALS
Cybersecurity Health Checks
13
• Boundary devices
• Secure configuration
• User access control
• Malware protection
• Patch management
Cyber Essentials
CYBER ESSENTIALS
Cybersecurity Health Checks
14
Boundary Firewalls and Internet Gateways
CYBER ESSENTIALS
Cybersecurity health Checks
15
• administrative password must be changed
• documented and authorised rules
• obsolete rules removed
• unnecessary services blocked
• administrative interface accessible only internally
Boundary Firewalls and Internet Gateways
CYBER ESSENTIALS
Cybersecurity health Checks
16
Secure Configuration
CYBER ESSENTIALS
Cybersecurity health Checks
17
• Issues:
• easy to install
• no security configured
• default administrator accounts and
passwords
Secure Configuration
CYBER ESSENTIALS
Cybersecurity health Checks
18
Secure Configuration
CYBER ESSENTIALS
Cybersecurity health Checks
• remove unnecessary default accounts
• change default passwords
• remove or disable unnecessary applications and services
• install personal firewalls on all PCs
19 Cybersecurity Health Checks
20 Cybersecurity Health Checks
21
• Issues:
• legacy access
• excess privileges
User Access Control
CYBER ESSENTIALS
Cybersecurity health Checks
22
User Access Control
CYBER ESSENTIALS
Cybersecurity health Checks
• minimum privileges
• userid and strong passwords
• ensure privileged accounts are not used for internet activity
• disable or remove accounts when no longer required
23
User Access Control
CYBER ESSENTIALS
Cybersecurity health Checks
24
• Install anti-virus software
• up to date signatures
• Use real-time protection
• Scan the filebase
• Blacklisting known malicious sites
Malware Protection
CYBER ESSENTIALS
Cybersecurity Health Checks
25
• Flaws found by developers, researchers, hackers
• Often exploited within 24 hours
• Timely patching
• Licenced software
Patching
CYBER ESSENTIALS
Cybersecurity Health Checks
26
• Good routine check-up and examination
• Does not propose a full cyber fitness test
Cyber Essentials – Health Check?
CYBER ESSENTIALS
Cybersecurity Health Checks
27
• Published March 2015
• Improve cyber resilience
• Cyber defence posture
• Incident management
ASIC Report 429
ASIC REPORT 429
Cybersecurity Health Checks
28
• Adopted in ASIC Report 429
• 26 prompts
• 2 governance
• 24 across the five Framework areas
US Cybersecurity Framework
ASIC REPORT 429
Cybersecurity Health Checks
29
• Board and Executive awareness of cyber risk
• Assessment against the Cybersecurity Framework
Governance
ASIC REPORT 429
Cybersecurity Health Checks
30
• What are the essential information and assets?
• What are the cyber risks?
• Are third party risks considered?
• Does enterprise risk management include cyber risks?
• Are staff aware of cyber risks?
Identify
ASIC REPORT 429
Cybersecurity Health Checks
31
• Are security policies and standards up to date?
• Have IT systems and processes been tested?
• Are there sufficient resources in place?
Protect
ASIC REPORT 429
Cybersecurity Health Checks
32
• Monitoring for cyber attacks
• External engagement
Detect
ASIC REPORT 429
Cybersecurity Health Checks
33
• Is response planning adequate?
• Notifying law enforcement of an attack
• Notifying customers of a breach
Respond
ASIC REPORT 429
Cybersecurity Health Checks
34
• Does the organisation have a recovery plan?
Recover
ASIC REPORT 429
Cybersecurity Health Checks
35
• Full set of controls
• Cyber health checks lost in the noise
• A through life fitness programme
ASIC Report 429 – Cyber Health Check?
ASIC REPORT 429
Cybersecurity Health Checks
36
• Security standards are evolving
• Traditional approach is having limited success
• Cyber health checks are a more manageable approach
• Cyber Essentials provides a health check
Conclusion
CONCLUSION
Cybersecurity Health Checks
37
Resources
CONCLUSION
Cybersecurity Health Checks
38
Q&A
CONCLUSION
Cybersecurity Health Checks

Más contenido relacionado

La actualidad más candente

All you wanted to know about iso 27000
All you wanted to know about iso 27000All you wanted to know about iso 27000
All you wanted to know about iso 27000Ramana K V
 
Securing Industrial Control Systems
Securing Industrial Control SystemsSecuring Industrial Control Systems
Securing Industrial Control SystemsEric Andresen
 
ISO 27001 Training | ISO 27001 Internal Auditor Training | ISMS Internal Audi...
ISO 27001 Training | ISO 27001 Internal Auditor Training | ISMS Internal Audi...ISO 27001 Training | ISO 27001 Internal Auditor Training | ISMS Internal Audi...
ISO 27001 Training | ISO 27001 Internal Auditor Training | ISMS Internal Audi...himalya sharma
 
Nist 800 82
Nist 800 82Nist 800 82
Nist 800 82majolic
 
ISO 27001 - IMPLEMENTATION CONSULTING
ISO 27001 - IMPLEMENTATION CONSULTINGISO 27001 - IMPLEMENTATION CONSULTING
ISO 27001 - IMPLEMENTATION CONSULTINGArul Nambi
 
Industrial Control Security USA Sacramento California Oct 13/14
Industrial Control Security USA Sacramento California Oct 13/14Industrial Control Security USA Sacramento California Oct 13/14
Industrial Control Security USA Sacramento California Oct 13/14James Nesbitt
 
Get iso 27000 certification in 7 steps
Get iso 27000 certification in 7 stepsGet iso 27000 certification in 7 steps
Get iso 27000 certification in 7 stepsBen Pournader
 
7 Key Problems to Avoid in ISO 27001 Implementation
7 Key Problems to Avoid in ISO 27001 Implementation7 Key Problems to Avoid in ISO 27001 Implementation
7 Key Problems to Avoid in ISO 27001 ImplementationPECB
 
we45 ISO-27001 Case Study
we45 ISO-27001 Case Studywe45 ISO-27001 Case Study
we45 ISO-27001 Case Studywe45
 
Deep secure holistic protection for ICS
Deep secure holistic protection for ICSDeep secure holistic protection for ICS
Deep secure holistic protection for ICSjohnsdeepsecure
 
ISO 27001 Training | ISO 27001 Implementation
ISO 27001 Training | ISO 27001 ImplementationISO 27001 Training | ISO 27001 Implementation
ISO 27001 Training | ISO 27001 Implementationhimalya sharma
 
Iso27001 Isaca Seminar (23 May 08)
Iso27001  Isaca Seminar (23 May 08)Iso27001  Isaca Seminar (23 May 08)
Iso27001 Isaca Seminar (23 May 08)samsontamwaiho
 
It security iso 27001
It security iso 27001It security iso 27001
It security iso 27001Iris Maaß
 
Basic introduction to iso27001
Basic introduction to iso27001Basic introduction to iso27001
Basic introduction to iso27001Imran Ahmed
 
ISO 27001 Awareness IGN Mantra 2nd Day, 2nd Session.
ISO 27001 Awareness IGN Mantra 2nd Day, 2nd Session.ISO 27001 Awareness IGN Mantra 2nd Day, 2nd Session.
ISO 27001 Awareness IGN Mantra 2nd Day, 2nd Session.IGN MANTRA
 
CMMC, ISO/IEC 27001, ISO/IEC 27032, and NIST – What You Need to Know
CMMC, ISO/IEC 27001, ISO/IEC 27032, and NIST – What You Need to KnowCMMC, ISO/IEC 27001, ISO/IEC 27032, and NIST – What You Need to Know
CMMC, ISO/IEC 27001, ISO/IEC 27032, and NIST – What You Need to KnowPECB
 
ISO/IEC 27001 as a Starting Point for GRC
ISO/IEC 27001 as a Starting Point for GRCISO/IEC 27001 as a Starting Point for GRC
ISO/IEC 27001 as a Starting Point for GRCPECB
 
ISO 27001 - three years of lessons learned
ISO 27001 - three years of lessons learnedISO 27001 - three years of lessons learned
ISO 27001 - three years of lessons learnedJisc
 

La actualidad más candente (20)

All you wanted to know about iso 27000
All you wanted to know about iso 27000All you wanted to know about iso 27000
All you wanted to know about iso 27000
 
Securing Industrial Control Systems
Securing Industrial Control SystemsSecuring Industrial Control Systems
Securing Industrial Control Systems
 
ISO 27001 - Information Security Management System
ISO 27001 - Information Security Management SystemISO 27001 - Information Security Management System
ISO 27001 - Information Security Management System
 
ISO 27001 Training | ISO 27001 Internal Auditor Training | ISMS Internal Audi...
ISO 27001 Training | ISO 27001 Internal Auditor Training | ISMS Internal Audi...ISO 27001 Training | ISO 27001 Internal Auditor Training | ISMS Internal Audi...
ISO 27001 Training | ISO 27001 Internal Auditor Training | ISMS Internal Audi...
 
Nist 800 82
Nist 800 82Nist 800 82
Nist 800 82
 
ISO 27001 - IMPLEMENTATION CONSULTING
ISO 27001 - IMPLEMENTATION CONSULTINGISO 27001 - IMPLEMENTATION CONSULTING
ISO 27001 - IMPLEMENTATION CONSULTING
 
Industrial Control Security USA Sacramento California Oct 13/14
Industrial Control Security USA Sacramento California Oct 13/14Industrial Control Security USA Sacramento California Oct 13/14
Industrial Control Security USA Sacramento California Oct 13/14
 
Get iso 27000 certification in 7 steps
Get iso 27000 certification in 7 stepsGet iso 27000 certification in 7 steps
Get iso 27000 certification in 7 steps
 
27001 awareness Training
27001 awareness Training27001 awareness Training
27001 awareness Training
 
7 Key Problems to Avoid in ISO 27001 Implementation
7 Key Problems to Avoid in ISO 27001 Implementation7 Key Problems to Avoid in ISO 27001 Implementation
7 Key Problems to Avoid in ISO 27001 Implementation
 
we45 ISO-27001 Case Study
we45 ISO-27001 Case Studywe45 ISO-27001 Case Study
we45 ISO-27001 Case Study
 
Deep secure holistic protection for ICS
Deep secure holistic protection for ICSDeep secure holistic protection for ICS
Deep secure holistic protection for ICS
 
ISO 27001 Training | ISO 27001 Implementation
ISO 27001 Training | ISO 27001 ImplementationISO 27001 Training | ISO 27001 Implementation
ISO 27001 Training | ISO 27001 Implementation
 
Iso27001 Isaca Seminar (23 May 08)
Iso27001  Isaca Seminar (23 May 08)Iso27001  Isaca Seminar (23 May 08)
Iso27001 Isaca Seminar (23 May 08)
 
It security iso 27001
It security iso 27001It security iso 27001
It security iso 27001
 
Basic introduction to iso27001
Basic introduction to iso27001Basic introduction to iso27001
Basic introduction to iso27001
 
ISO 27001 Awareness IGN Mantra 2nd Day, 2nd Session.
ISO 27001 Awareness IGN Mantra 2nd Day, 2nd Session.ISO 27001 Awareness IGN Mantra 2nd Day, 2nd Session.
ISO 27001 Awareness IGN Mantra 2nd Day, 2nd Session.
 
CMMC, ISO/IEC 27001, ISO/IEC 27032, and NIST – What You Need to Know
CMMC, ISO/IEC 27001, ISO/IEC 27032, and NIST – What You Need to KnowCMMC, ISO/IEC 27001, ISO/IEC 27032, and NIST – What You Need to Know
CMMC, ISO/IEC 27001, ISO/IEC 27032, and NIST – What You Need to Know
 
ISO/IEC 27001 as a Starting Point for GRC
ISO/IEC 27001 as a Starting Point for GRCISO/IEC 27001 as a Starting Point for GRC
ISO/IEC 27001 as a Starting Point for GRC
 
ISO 27001 - three years of lessons learned
ISO 27001 - three years of lessons learnedISO 27001 - three years of lessons learned
ISO 27001 - three years of lessons learned
 

Destacado

3 Ways Online Learning Boosts Employee Engagement
3 Ways Online Learning Boosts Employee Engagement3 Ways Online Learning Boosts Employee Engagement
3 Ways Online Learning Boosts Employee EngagementLinkedIn Learning Solutions
 
Case Study: Rebuilding an Admissions Web Presence
Case Study: Rebuilding an Admissions Web PresenceCase Study: Rebuilding an Admissions Web Presence
Case Study: Rebuilding an Admissions Web PresenceDave Olsen
 
3 Things Every Sales Team Needs to Be Thinking About in 2017
3 Things Every Sales Team Needs to Be Thinking About in 20173 Things Every Sales Team Needs to Be Thinking About in 2017
3 Things Every Sales Team Needs to Be Thinking About in 2017Drift
 
Apple SSL Vulnerability Explained
Apple SSL Vulnerability ExplainedApple SSL Vulnerability Explained
Apple SSL Vulnerability ExplainedMike Chapple
 
Libraries and Privacy: PechaKucha Seattle: Watch Me Now, Notes on a Surveilla...
Libraries and Privacy: PechaKucha Seattle: Watch Me Now, Notes on a Surveilla...Libraries and Privacy: PechaKucha Seattle: Watch Me Now, Notes on a Surveilla...
Libraries and Privacy: PechaKucha Seattle: Watch Me Now, Notes on a Surveilla...Jim Loter
 
Openness in HE: Choosing our paths
Openness in HE: Choosing our pathsOpenness in HE: Choosing our paths
Openness in HE: Choosing our pathsCatherine Cronin
 
#SXSWedu Quotes: Creating Opportunities
#SXSWedu Quotes: Creating Opportunities#SXSWedu Quotes: Creating Opportunities
#SXSWedu Quotes: Creating OpportunitiesHaiku Deck
 
The 'Knowledge Turn' in the UK National Curriculum
The 'Knowledge Turn' in the UK National CurriculumThe 'Knowledge Turn' in the UK National Curriculum
The 'Knowledge Turn' in the UK National CurriculumMr Cornish
 
ImobSync - Seja um executivo - Maio 2014
ImobSync - Seja um executivo - Maio 2014ImobSync - Seja um executivo - Maio 2014
ImobSync - Seja um executivo - Maio 2014Victor Imobsync
 
RSA: CSA GRC Stack Update for the CSA Atlanta Chapter
RSA: CSA GRC Stack Update for the CSA Atlanta ChapterRSA: CSA GRC Stack Update for the CSA Atlanta Chapter
RSA: CSA GRC Stack Update for the CSA Atlanta ChapterPhil Agcaoili
 
Return of Video eLearning as DIY (Do It Yourself)
Return of Video eLearning as DIY (Do It Yourself)Return of Video eLearning as DIY (Do It Yourself)
Return of Video eLearning as DIY (Do It Yourself)Upside Learning Solutions
 
Collateral damage in cyberwarfare
Collateral damage in cyberwarfareCollateral damage in cyberwarfare
Collateral damage in cyberwarfareMike Chapple
 
Top 13 Qualities of an Ideal Instructional Designer
Top 13 Qualities of an Ideal Instructional DesignerTop 13 Qualities of an Ideal Instructional Designer
Top 13 Qualities of an Ideal Instructional DesignerUpside Learning Solutions
 
The Other Advanced Attacks: DNS/NTP Amplification and Careto
The Other Advanced Attacks: DNS/NTP Amplification and CaretoThe Other Advanced Attacks: DNS/NTP Amplification and Careto
The Other Advanced Attacks: DNS/NTP Amplification and CaretoMike Chapple
 
Pedagogy and School Leadership
Pedagogy  and School LeadershipPedagogy  and School Leadership
Pedagogy and School LeadershipJudy O'Connell
 

Destacado (20)

3 Ways Online Learning Boosts Employee Engagement
3 Ways Online Learning Boosts Employee Engagement3 Ways Online Learning Boosts Employee Engagement
3 Ways Online Learning Boosts Employee Engagement
 
Case Study: Rebuilding an Admissions Web Presence
Case Study: Rebuilding an Admissions Web PresenceCase Study: Rebuilding an Admissions Web Presence
Case Study: Rebuilding an Admissions Web Presence
 
Develop Better People Managers
Develop Better People ManagersDevelop Better People Managers
Develop Better People Managers
 
How to Use Photography for Great Presentations
How to Use Photography for Great PresentationsHow to Use Photography for Great Presentations
How to Use Photography for Great Presentations
 
3 Things Every Sales Team Needs to Be Thinking About in 2017
3 Things Every Sales Team Needs to Be Thinking About in 20173 Things Every Sales Team Needs to Be Thinking About in 2017
3 Things Every Sales Team Needs to Be Thinking About in 2017
 
Apple SSL Vulnerability Explained
Apple SSL Vulnerability ExplainedApple SSL Vulnerability Explained
Apple SSL Vulnerability Explained
 
Libraries and Privacy: PechaKucha Seattle: Watch Me Now, Notes on a Surveilla...
Libraries and Privacy: PechaKucha Seattle: Watch Me Now, Notes on a Surveilla...Libraries and Privacy: PechaKucha Seattle: Watch Me Now, Notes on a Surveilla...
Libraries and Privacy: PechaKucha Seattle: Watch Me Now, Notes on a Surveilla...
 
Openness in HE: Choosing our paths
Openness in HE: Choosing our pathsOpenness in HE: Choosing our paths
Openness in HE: Choosing our paths
 
Dynamics Of Gdp
Dynamics  Of GdpDynamics  Of Gdp
Dynamics Of Gdp
 
#SXSWedu Quotes: Creating Opportunities
#SXSWedu Quotes: Creating Opportunities#SXSWedu Quotes: Creating Opportunities
#SXSWedu Quotes: Creating Opportunities
 
The 'Knowledge Turn' in the UK National Curriculum
The 'Knowledge Turn' in the UK National CurriculumThe 'Knowledge Turn' in the UK National Curriculum
The 'Knowledge Turn' in the UK National Curriculum
 
ImobSync - Seja um executivo - Maio 2014
ImobSync - Seja um executivo - Maio 2014ImobSync - Seja um executivo - Maio 2014
ImobSync - Seja um executivo - Maio 2014
 
RSA: CSA GRC Stack Update for the CSA Atlanta Chapter
RSA: CSA GRC Stack Update for the CSA Atlanta ChapterRSA: CSA GRC Stack Update for the CSA Atlanta Chapter
RSA: CSA GRC Stack Update for the CSA Atlanta Chapter
 
Return of Video eLearning as DIY (Do It Yourself)
Return of Video eLearning as DIY (Do It Yourself)Return of Video eLearning as DIY (Do It Yourself)
Return of Video eLearning as DIY (Do It Yourself)
 
Collateral damage in cyberwarfare
Collateral damage in cyberwarfareCollateral damage in cyberwarfare
Collateral damage in cyberwarfare
 
Top 13 Qualities of an Ideal Instructional Designer
Top 13 Qualities of an Ideal Instructional DesignerTop 13 Qualities of an Ideal Instructional Designer
Top 13 Qualities of an Ideal Instructional Designer
 
Venezuela Technology Integration 2015
Venezuela Technology Integration 2015Venezuela Technology Integration 2015
Venezuela Technology Integration 2015
 
The Other Advanced Attacks: DNS/NTP Amplification and Careto
The Other Advanced Attacks: DNS/NTP Amplification and CaretoThe Other Advanced Attacks: DNS/NTP Amplification and Careto
The Other Advanced Attacks: DNS/NTP Amplification and Careto
 
MOOCs: still a viable business model?
MOOCs: still a viable business model?MOOCs: still a viable business model?
MOOCs: still a viable business model?
 
Pedagogy and School Leadership
Pedagogy  and School LeadershipPedagogy  and School Leadership
Pedagogy and School Leadership
 

Similar a Cybersecurity Health Checks: An SEO-Optimized Approach

The 5 ws of Cyber Security
The 5 ws of Cyber SecurityThe 5 ws of Cyber Security
The 5 ws of Cyber SecurityMisha Hanin
 
Colorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptx
Colorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptxColorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptx
Colorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptxAkramAlqadasi1
 
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #2
SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #2SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #2
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #2Lisa Niles
 
What is the UK Cyber Essentials scheme?
What is the  UK Cyber Essentials scheme?What is the  UK Cyber Essentials scheme?
What is the UK Cyber Essentials scheme?IT Governance Ltd
 
Starting your Career in Information Security
Starting your Career in Information SecurityStarting your Career in Information Security
Starting your Career in Information SecurityAhmed Sayed-
 
Himss 2011 securing health information in the cloud -- feisal nanji
Himss 2011    securing health information in the cloud -- feisal nanjiHimss 2011    securing health information in the cloud -- feisal nanji
Himss 2011 securing health information in the cloud -- feisal nanjiFeisal Nanji
 
20CS024 Ethics in Information Technology
20CS024 Ethics in Information Technology20CS024 Ethics in Information Technology
20CS024 Ethics in Information TechnologyKathirvel Ayyaswamy
 
5 Things Your Security Administrator Should Tell You
5 Things Your Security Administrator Should Tell You5 Things Your Security Administrator Should Tell You
5 Things Your Security Administrator Should Tell YouHelpSystems
 
Cybersecurity Assurance at CloudSec 2015 Kuala Lumpur
Cybersecurity Assurance  at CloudSec 2015 Kuala LumpurCybersecurity Assurance  at CloudSec 2015 Kuala Lumpur
Cybersecurity Assurance at CloudSec 2015 Kuala LumpurAlan Yau Ti Dun
 
Accelerating Regulatory Compliance for IBM i Systems
Accelerating Regulatory Compliance for IBM i SystemsAccelerating Regulatory Compliance for IBM i Systems
Accelerating Regulatory Compliance for IBM i SystemsPrecisely
 
Taking the Pulse of IBM i Security for 2020
Taking the Pulse of IBM i Security for 2020Taking the Pulse of IBM i Security for 2020
Taking the Pulse of IBM i Security for 2020Precisely
 
Cybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your OrganizationCybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your OrganizationMcKonly & Asbury, LLP
 
5 Steps to Reduce Your Window of Vulnerability
5 Steps to Reduce Your Window of Vulnerability5 Steps to Reduce Your Window of Vulnerability
5 Steps to Reduce Your Window of VulnerabilitySkybox Security
 
SurfWatch Labs Threat Intelligence Solution Demo
SurfWatch Labs Threat Intelligence Solution DemoSurfWatch Labs Threat Intelligence Solution Demo
SurfWatch Labs Threat Intelligence Solution DemoSurfWatch Labs
 
Cyber Threat Intelligence Solution Demonstration
Cyber Threat Intelligence Solution DemonstrationCyber Threat Intelligence Solution Demonstration
Cyber Threat Intelligence Solution DemonstrationSurfWatch Labs
 
Cyber Threat Intelligence Solution Demonstration
Cyber Threat Intelligence Solution DemonstrationCyber Threat Intelligence Solution Demonstration
Cyber Threat Intelligence Solution DemonstrationSurfWatch Labs
 
Monitoring and Reporting on IBM i Compliance and Security
Monitoring and Reporting on IBM i Compliance and SecurityMonitoring and Reporting on IBM i Compliance and Security
Monitoring and Reporting on IBM i Compliance and SecurityPrecisely
 

Similar a Cybersecurity Health Checks: An SEO-Optimized Approach (20)

Institute of Internal Auditors Presentation 2014
Institute of Internal Auditors Presentation 2014Institute of Internal Auditors Presentation 2014
Institute of Internal Auditors Presentation 2014
 
The 5 ws of Cyber Security
The 5 ws of Cyber SecurityThe 5 ws of Cyber Security
The 5 ws of Cyber Security
 
Robert Nichols: Cybersecurity for Government Contractors
Robert Nichols: Cybersecurity for Government ContractorsRobert Nichols: Cybersecurity for Government Contractors
Robert Nichols: Cybersecurity for Government Contractors
 
Colorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptx
Colorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptxColorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptx
Colorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptx
 
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #2
SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #2SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #2
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #2
 
What is the UK Cyber Essentials scheme?
What is the  UK Cyber Essentials scheme?What is the  UK Cyber Essentials scheme?
What is the UK Cyber Essentials scheme?
 
Info.ppt
Info.pptInfo.ppt
Info.ppt
 
Starting your Career in Information Security
Starting your Career in Information SecurityStarting your Career in Information Security
Starting your Career in Information Security
 
Himss 2011 securing health information in the cloud -- feisal nanji
Himss 2011    securing health information in the cloud -- feisal nanjiHimss 2011    securing health information in the cloud -- feisal nanji
Himss 2011 securing health information in the cloud -- feisal nanji
 
20CS024 Ethics in Information Technology
20CS024 Ethics in Information Technology20CS024 Ethics in Information Technology
20CS024 Ethics in Information Technology
 
5 Things Your Security Administrator Should Tell You
5 Things Your Security Administrator Should Tell You5 Things Your Security Administrator Should Tell You
5 Things Your Security Administrator Should Tell You
 
Cybersecurity Assurance at CloudSec 2015 Kuala Lumpur
Cybersecurity Assurance  at CloudSec 2015 Kuala LumpurCybersecurity Assurance  at CloudSec 2015 Kuala Lumpur
Cybersecurity Assurance at CloudSec 2015 Kuala Lumpur
 
Accelerating Regulatory Compliance for IBM i Systems
Accelerating Regulatory Compliance for IBM i SystemsAccelerating Regulatory Compliance for IBM i Systems
Accelerating Regulatory Compliance for IBM i Systems
 
Taking the Pulse of IBM i Security for 2020
Taking the Pulse of IBM i Security for 2020Taking the Pulse of IBM i Security for 2020
Taking the Pulse of IBM i Security for 2020
 
Cybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your OrganizationCybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your Organization
 
5 Steps to Reduce Your Window of Vulnerability
5 Steps to Reduce Your Window of Vulnerability5 Steps to Reduce Your Window of Vulnerability
5 Steps to Reduce Your Window of Vulnerability
 
SurfWatch Labs Threat Intelligence Solution Demo
SurfWatch Labs Threat Intelligence Solution DemoSurfWatch Labs Threat Intelligence Solution Demo
SurfWatch Labs Threat Intelligence Solution Demo
 
Cyber Threat Intelligence Solution Demonstration
Cyber Threat Intelligence Solution DemonstrationCyber Threat Intelligence Solution Demonstration
Cyber Threat Intelligence Solution Demonstration
 
Cyber Threat Intelligence Solution Demonstration
Cyber Threat Intelligence Solution DemonstrationCyber Threat Intelligence Solution Demonstration
Cyber Threat Intelligence Solution Demonstration
 
Monitoring and Reporting on IBM i Compliance and Security
Monitoring and Reporting on IBM i Compliance and SecurityMonitoring and Reporting on IBM i Compliance and Security
Monitoring and Reporting on IBM i Compliance and Security
 

Más de LinkedIn Learning Solutions

Mobile devices: the new learning platform for Higher Education
Mobile devices: the new learning platform for Higher EducationMobile devices: the new learning platform for Higher Education
Mobile devices: the new learning platform for Higher EducationLinkedIn Learning Solutions
 
Fostering innovation to achieve mission critical goals
Fostering innovation to achieve mission critical goalsFostering innovation to achieve mission critical goals
Fostering innovation to achieve mission critical goalsLinkedIn Learning Solutions
 
LinkedIn Learning | What We're Learning About Learning
LinkedIn Learning | What We're Learning About LearningLinkedIn Learning | What We're Learning About Learning
LinkedIn Learning | What We're Learning About LearningLinkedIn Learning Solutions
 
Project-Based Instruction and the Importance of Self-Directed Learning
Project-Based Instruction and the Importance of Self-Directed LearningProject-Based Instruction and the Importance of Self-Directed Learning
Project-Based Instruction and the Importance of Self-Directed LearningLinkedIn Learning Solutions
 
9 Learning Strategies from Knowledge to Know-How
9 Learning Strategies from Knowledge to Know-How9 Learning Strategies from Knowledge to Know-How
9 Learning Strategies from Knowledge to Know-HowLinkedIn Learning Solutions
 
Online Video: How It Changes & Enhances The Way We Learn
Online Video: How It Changes & Enhances The Way We LearnOnline Video: How It Changes & Enhances The Way We Learn
Online Video: How It Changes & Enhances The Way We LearnLinkedIn Learning Solutions
 

Más de LinkedIn Learning Solutions (20)

Mobile devices: the new learning platform for Higher Education
Mobile devices: the new learning platform for Higher EducationMobile devices: the new learning platform for Higher Education
Mobile devices: the new learning platform for Higher Education
 
Fostering innovation to achieve mission critical goals
Fostering innovation to achieve mission critical goalsFostering innovation to achieve mission critical goals
Fostering innovation to achieve mission critical goals
 
Insights from our Workplace Learning Report
Insights from our Workplace Learning Report Insights from our Workplace Learning Report
Insights from our Workplace Learning Report
 
LinkedIn Learning | What We're Learning About Learning
LinkedIn Learning | What We're Learning About LearningLinkedIn Learning | What We're Learning About Learning
LinkedIn Learning | What We're Learning About Learning
 
Creating a Culture of Learning in the New Year
Creating a Culture of Learning in the New YearCreating a Culture of Learning in the New Year
Creating a Culture of Learning in the New Year
 
A New Year, New Look for Lynda.com
A New Year, New Look for Lynda.comA New Year, New Look for Lynda.com
A New Year, New Look for Lynda.com
 
Project-Based Instruction and the Importance of Self-Directed Learning
Project-Based Instruction and the Importance of Self-Directed LearningProject-Based Instruction and the Importance of Self-Directed Learning
Project-Based Instruction and the Importance of Self-Directed Learning
 
9 Learning Strategies from Knowledge to Know-How
9 Learning Strategies from Knowledge to Know-How9 Learning Strategies from Knowledge to Know-How
9 Learning Strategies from Knowledge to Know-How
 
Online Video: How It Changes & Enhances The Way We Learn
Online Video: How It Changes & Enhances The Way We LearnOnline Video: How It Changes & Enhances The Way We Learn
Online Video: How It Changes & Enhances The Way We Learn
 
8 Key Ways to Rock SEO
8 Key Ways to Rock SEO8 Key Ways to Rock SEO
8 Key Ways to Rock SEO
 
Top 5 Skills for Project Managers
Top 5 Skills for Project ManagersTop 5 Skills for Project Managers
Top 5 Skills for Project Managers
 
Creating a Culture of Learning in 6 Steps
Creating a Culture of Learning in 6 StepsCreating a Culture of Learning in 6 Steps
Creating a Culture of Learning in 6 Steps
 
Fred Kofman on Managing Conflict
Fred Kofman on Managing ConflictFred Kofman on Managing Conflict
Fred Kofman on Managing Conflict
 
Ten Tips to Make You More Productive in Excel
Ten Tips to Make You More Productive in ExcelTen Tips to Make You More Productive in Excel
Ten Tips to Make You More Productive in Excel
 
What's New in Office 2016
What's New in Office 2016What's New in Office 2016
What's New in Office 2016
 
Evolution of the iPhone Camera
Evolution of the iPhone CameraEvolution of the iPhone Camera
Evolution of the iPhone Camera
 
Demonstrating Positive Elearning ROI
Demonstrating Positive Elearning ROI Demonstrating Positive Elearning ROI
Demonstrating Positive Elearning ROI
 
A Look Back Through Windows
A Look Back Through WindowsA Look Back Through Windows
A Look Back Through Windows
 
Happiness at Work
Happiness at WorkHappiness at Work
Happiness at Work
 
Mastering Excel Formulas and Functions
Mastering Excel Formulas and FunctionsMastering Excel Formulas and Functions
Mastering Excel Formulas and Functions
 

Último

"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 

Último (20)

"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 

Cybersecurity Health Checks: An SEO-Optimized Approach

  • 1. 1 Cybersecurity Health Checks: Safeguarding Your Organisation Dr. Malcolm Shore
  • 2. 2 Quick Facts about Lynda.com Government • Major government agencies • Branches of military Corporations • More than half of the Fortune 50 across all key industry sectors Education • 60% of all US colleges and universities 40% of Australian universities 4M+ Members …with 350k paying out of pocket 20 Years Lynda.com was founded in 1995 12,000+ Enterprise Clients …located across 52 countries 6,000+ Courses …available in 5 languages (German, Spanish, French, Japanese) The Global Leader in Online Skills Instruction INTRODUCTION
  • 3. 3 Dr. Malcolm Shore Lynda.com author Technical Director, BAE Systems Applied Intelligence, Australia INTRODUCTION
  • 4. 4 • 1983 - US DoD rainbow series • 1993 – UK PD0003 • 1998 – BS 7799……ISO 27000 • 2005 – NIST Special Publication 800-53 • … but too difficult and costly Information Security Standards BACKGROUND Cybersecurity Health Checks
  • 5. 5 • From Bulletin Boards to the Web • Ubiquitous connectivity across the globe • Clouds aren’t just in the sky… • From email to social media… • From telephone to smartphone • Cyber kill chain … the world has changed Information Security Standards BACKGROUND Cybersecurity Health Checks
  • 6. 6 • Evolution of information security standards lagging • Information security policies ineffective* New Approach BACKGROUND Cybersecurity Health Checks *Doherty, NF and Fulford H. Do Information Security Policies Reduce the Incidence of Security Breaches? 2005
  • 7. 7 • UK Cybersecurity Strategy • Cyber Governance Health Check • top 350 listed companies • only15% of Boards manage cyber risk • only 30% use threat intelligence • Majority of attacks exploit basic weaknesses Information Security Policies BACKGROUND Cybersecurity Health Checks
  • 8. 8 • Term used in audit community • Now used in cybersecurity consulting • Various interpretations … is simply cyber fitness Cybersecurity Health Check DEFINITION Cybersecurity Health Checks
  • 9. 9 • Check-up – unauthorised users, malware • Health test - check network traffic for infections • Full examination - rules, patches, access and privileges - operational defences • Fitness test - external penetration exercise • Cyber insurance Cybersecurity Health Check DEFINITION Cybersecurity Health Checks
  • 10. 10 • Baseline security • Operational focus • Affordable, manageable Cyber Essentials CYBER ESSENTIALS Cybersecurity Health Checks
  • 12. 12 • Prevents low grade technical attacks on • desktop PCs, laptops • tablets, smartphones • email • web applications Cyber Essentials CYBER ESSENTIALS Cybersecurity Health Checks
  • 13. 13 • Boundary devices • Secure configuration • User access control • Malware protection • Patch management Cyber Essentials CYBER ESSENTIALS Cybersecurity Health Checks
  • 14. 14 Boundary Firewalls and Internet Gateways CYBER ESSENTIALS Cybersecurity health Checks
  • 15. 15 • administrative password must be changed • documented and authorised rules • obsolete rules removed • unnecessary services blocked • administrative interface accessible only internally Boundary Firewalls and Internet Gateways CYBER ESSENTIALS Cybersecurity health Checks
  • 17. 17 • Issues: • easy to install • no security configured • default administrator accounts and passwords Secure Configuration CYBER ESSENTIALS Cybersecurity health Checks
  • 18. 18 Secure Configuration CYBER ESSENTIALS Cybersecurity health Checks • remove unnecessary default accounts • change default passwords • remove or disable unnecessary applications and services • install personal firewalls on all PCs
  • 21. 21 • Issues: • legacy access • excess privileges User Access Control CYBER ESSENTIALS Cybersecurity health Checks
  • 22. 22 User Access Control CYBER ESSENTIALS Cybersecurity health Checks • minimum privileges • userid and strong passwords • ensure privileged accounts are not used for internet activity • disable or remove accounts when no longer required
  • 23. 23 User Access Control CYBER ESSENTIALS Cybersecurity health Checks
  • 24. 24 • Install anti-virus software • up to date signatures • Use real-time protection • Scan the filebase • Blacklisting known malicious sites Malware Protection CYBER ESSENTIALS Cybersecurity Health Checks
  • 25. 25 • Flaws found by developers, researchers, hackers • Often exploited within 24 hours • Timely patching • Licenced software Patching CYBER ESSENTIALS Cybersecurity Health Checks
  • 26. 26 • Good routine check-up and examination • Does not propose a full cyber fitness test Cyber Essentials – Health Check? CYBER ESSENTIALS Cybersecurity Health Checks
  • 27. 27 • Published March 2015 • Improve cyber resilience • Cyber defence posture • Incident management ASIC Report 429 ASIC REPORT 429 Cybersecurity Health Checks
  • 28. 28 • Adopted in ASIC Report 429 • 26 prompts • 2 governance • 24 across the five Framework areas US Cybersecurity Framework ASIC REPORT 429 Cybersecurity Health Checks
  • 29. 29 • Board and Executive awareness of cyber risk • Assessment against the Cybersecurity Framework Governance ASIC REPORT 429 Cybersecurity Health Checks
  • 30. 30 • What are the essential information and assets? • What are the cyber risks? • Are third party risks considered? • Does enterprise risk management include cyber risks? • Are staff aware of cyber risks? Identify ASIC REPORT 429 Cybersecurity Health Checks
  • 31. 31 • Are security policies and standards up to date? • Have IT systems and processes been tested? • Are there sufficient resources in place? Protect ASIC REPORT 429 Cybersecurity Health Checks
  • 32. 32 • Monitoring for cyber attacks • External engagement Detect ASIC REPORT 429 Cybersecurity Health Checks
  • 33. 33 • Is response planning adequate? • Notifying law enforcement of an attack • Notifying customers of a breach Respond ASIC REPORT 429 Cybersecurity Health Checks
  • 34. 34 • Does the organisation have a recovery plan? Recover ASIC REPORT 429 Cybersecurity Health Checks
  • 35. 35 • Full set of controls • Cyber health checks lost in the noise • A through life fitness programme ASIC Report 429 – Cyber Health Check? ASIC REPORT 429 Cybersecurity Health Checks
  • 36. 36 • Security standards are evolving • Traditional approach is having limited success • Cyber health checks are a more manageable approach • Cyber Essentials provides a health check Conclusion CONCLUSION Cybersecurity Health Checks

Notas del editor

  1. Item number:459514297
  2. Item number:486763822
  3. Item number:486763822
  4. Item number:486763822
  5. Item number:458040107
  6. Item number:458040107
  7. Item number:458040107