SlideShare una empresa de Scribd logo
1 de 38
Descargar para leer sin conexión
Over 15 years in cybersecurity
OSCP, CISSP, CISA
Blogger, podcaster, and conference speaker
Provides consulting services in software security,
cybersecurity awareness, strategy, and
investment.
sapran@bsg.tech
Vlad
Styran
10+ years of experience in IT-audit and
consulting, IT project management
Experiences in leading large outsourcing
teams in Ukraine, Poland, and USA
Experiences in building customer
relationships within the US, UK, and
Western Europe geographies.
Leads the BSG advisory practice and consults
large development teams in all aspects of
cybersecurity. varusha@bsg.tech
Andriy
Varusha
Our job is to help companies in all
aspects of cybersecurity. We
complete more than 50 security
projects yearly. And we are aware of
the business security vulnerabilities
across the verticals.
We help our customers address their
future security challenges: prevent
data breaches and achieve
compliance.
About BSG
Top 5 popular misconceptions about SMB cybersecurity.
10 steps to combat cyber threats.
Questions and answers.
1.
2.
3.
Plan for Today
Top 5 Popular Misconceptions
about the Cybersecurity of Small
and Medium-sized Business
In fact, no one cares about how large or
how small your business is.
Attackers hack you first and think about
how to monetize it later.
Myth 1: Too small to be a target
Myth 2: Anti-virus is enough to keep you safe
They aren't, as any other "silver bullet"
technology that was hyped throughout the
history of computer technology, such as
firewalls, DLP, end-point protection,
sandboxes, etc.
As a great quote from the hacking history
book “The Cult of the Dead Cow” goes:
“Antivirus is better than nothing.”
Both these statements are incorrect.
There is a shared trust model in the cloud
that every business must understand.
You are responsible for the security “in the
cloud,” while a good cloud provider is
responsible for the security “of the cloud.”
Myth 3: Cloud services are secure.
Or cloud services are insecure.
Shared Responsibility model for cloud security
https://www.cisecurity.org/blog/shared-responsibility-cloud-security-what-you-need-to-know/
Myth 4: Cybersecurity is too expensive
If you do small business, your stakes are
relatively low, as is your cybersecurity
investment.
If you grow your business, your stakes
go higher as a cybersecurity investment
does.
The effectiveness of your security
spendings is a matter of both what you
do and how you do it.
Myth 5: IT is responsible for cybersecurity
It is false.
Understanding cybersecurity is essential for
modern IT professionals and business units.
However, the responsibility for cybersecurity
resides solely on those responsible for the rest of
risk decisions: the business leaders.
10 steps to combat cyber threats
How to protect your business within a
limited budget?
WARNING: Your threat model is not our threat model
Educate employees
1.
Humans are not the weakest security
link. Humans are the product of
evolution conditioned to produce the
risk-aware species. We are better at
seeing a tiger in the grass than
identify cyber threats, though.
Humans are the best weapon you
have against malicious hackers. You
just have to train them.
2. Enforce two-factor authentication
Turn on two-factor authentication on every
website, in every system, in every app you use.
3. Use encryption to protect data
and communications
VPN for sensitive
communications
E2E messengers
HTTPS on all websites
Encrypt files in the cloud
Data encryption – everywhere
Update the software regularly and
install an anti-malware solution on
computers, smartphones, and
other electronic devices your
employees use.
P.S. Remember the AV efficiency.
4. Protect the endpoints
Move to the cloud: SaaS applications, IaaS
hosting services, and other professional third-
party services with good security practices.
You will never protect your MS Exchange
better than Microsoft can protect O365, or
Google can protect G-Suite. Mind your threat
model, though.
5. Abandon Earth
Use a logging solution or another
way to get early notification about
being compromised.
"Amateurs don't want to get
hacked. Professionals don't want
to remain hacked."
6. Know when you are hacked
7. When ready, start using
a control framework
CIS – Center for Internet Security
NIST – US National Institute for
Standards & Technology, SP800 series
ISO 27000 series of Information Security
Management standards
PCI DSS standard and supplementary
materials
8. Get cybersecurity insurance
Cybersecurity insurance is still
affordable to most companies.
To lower the premiums, you should
follow some basic cybersecurity
practices and show them to the
insurance company.
9. Do backups
Backup your data regularly to save
yourself the time and pain of trying
to recover lost data.
The “what you don’t know can’t hurt you” principle
does not work in cybersecurity.
Cyberthreats are invisible, but their consequences
are very much apparent.
Without regular testing of your protection, you have
no idea if it matches the attackers efforts.
10. Challenge your security
Useful Links,
Reports, and Tools
World's Biggest Data Breaches & Hacks
https://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/
Data Breach Investigations Report
https://enterprise.verizon.com/resources/reports/dbir/
Key takeaways
Industry highlights
Best practices
Classification patterns
And many more
NIST documents and frameworks
https://www.nist.gov/itl/smallbusinesscyber
NIST Cybersecurity
Framework
Small Business Case
Studies
NIST Cybersecurity
Framework
Cyber Insurance
Cybersecurity Resources
Roadmap
FTC
https://www.ftc.gov/system/files/documents/plain-language/pdf0205-startwithsecurity.pdf
Small Business Big Threat
https://smallbusinessbigthreat.com/access-resources/
Online-Security-Best-Practices
Cybersecurity-Tools
Cybersecurity-Canvas
Security-Best-Practices-for-
Mobile-Devices
Ransomware: What you really
really need to know
Center for Internet Security
https://www.cisecurity.org/wp-content/uploads/2017/09/CIS-Controls-Guide-for-SMEs.pdf
Inventory of Authorized & Unauthorized Devices
Secure Configurations for Hardware and Software
Continuous Vulnerability Assessment & Remediation
Controlled Use of Administrative Privileges
etc.
CISA
https://us-cert.cisa.gov/resources/smb
CISA’s Cyber Essentials
Cybersecurity Resources
Road Map
National Cyber Security Alliance
https://staysafeonline.org/cybersecure-business/
Microsoft Security Youtube Channel
https://www.youtube.com/channel/UC4s3tv0Qq_OSUBfR735Jc6A
Projects and Clients
Review
BSG Security
Findings
https://bit.ly/bsg2020report
Questions and Answers
Stay in Touch With
If you have any questions,
please contact us at:
https://bsg.tech
hello@bsg.tech

Más contenido relacionado

La actualidad más candente

Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...Eric Vanderburg
 
Debunked: 5 Myths About Zero Trust Security
Debunked: 5 Myths About Zero Trust SecurityDebunked: 5 Myths About Zero Trust Security
Debunked: 5 Myths About Zero Trust SecurityCentrify Corporation
 
Ransomware Has Evolved And So Should Your Company
Ransomware Has Evolved And So Should Your CompanyRansomware Has Evolved And So Should Your Company
Ransomware Has Evolved And So Should Your CompanyVeriato
 
How to Recover from a Ransomware Disaster
How to Recover from a Ransomware DisasterHow to Recover from a Ransomware Disaster
How to Recover from a Ransomware DisasterSpanning Cloud Apps
 
An in depth understanding in the application of the zero-trust security model...
An in depth understanding in the application of the zero-trust security model...An in depth understanding in the application of the zero-trust security model...
An in depth understanding in the application of the zero-trust security model...Max Justice
 
Porque las Amenazas avanzadas requieren de una Seguridad para Aplicaciones av...
Porque las Amenazas avanzadas requieren de una Seguridad para Aplicaciones av...Porque las Amenazas avanzadas requieren de una Seguridad para Aplicaciones av...
Porque las Amenazas avanzadas requieren de una Seguridad para Aplicaciones av...Cristian Garcia G.
 
Netpluz DDoS Mitigation - Managed Cyber Security
Netpluz DDoS Mitigation - Managed Cyber Security Netpluz DDoS Mitigation - Managed Cyber Security
Netpluz DDoS Mitigation - Managed Cyber Security Netpluz Asia Pte Ltd
 
Mastering Next Gen SIEM Use Cases (Part 2)
Mastering Next Gen SIEM Use Cases (Part 2)Mastering Next Gen SIEM Use Cases (Part 2)
Mastering Next Gen SIEM Use Cases (Part 2)DNIF
 
Ict conf td-evs_pcidss-final
Ict conf td-evs_pcidss-finalIct conf td-evs_pcidss-final
Ict conf td-evs_pcidss-finalDejan Jeremic
 
DTS Solution - Cyber Security Services Portfolio
DTS Solution - Cyber Security Services PortfolioDTS Solution - Cyber Security Services Portfolio
DTS Solution - Cyber Security Services PortfolioShah Sheikh
 
Healthcare Cybersecurity Survey 2018 - Sirius
Healthcare Cybersecurity Survey 2018 - SiriusHealthcare Cybersecurity Survey 2018 - Sirius
Healthcare Cybersecurity Survey 2018 - SiriusSirius
 
Cyber security resilience ESRM Conference Amsterdam 2016
Cyber security resilience  ESRM Conference Amsterdam 2016Cyber security resilience  ESRM Conference Amsterdam 2016
Cyber security resilience ESRM Conference Amsterdam 2016Niran Seriki, CCISO, CISM
 
The State Of Information and Cyber Security in 2016
The State Of Information and Cyber Security in 2016The State Of Information and Cyber Security in 2016
The State Of Information and Cyber Security in 2016Shannon G., MBA
 
Black Hat USA 2015: A Visual Snapshot of Security Threats, Trends and Ideas
Black Hat USA 2015: A Visual Snapshot of Security Threats, Trends and IdeasBlack Hat USA 2015: A Visual Snapshot of Security Threats, Trends and Ideas
Black Hat USA 2015: A Visual Snapshot of Security Threats, Trends and IdeasTripwire
 
Mastering Next Gen SIEM Use Cases (Part 1)
Mastering Next Gen SIEM Use Cases (Part 1)Mastering Next Gen SIEM Use Cases (Part 1)
Mastering Next Gen SIEM Use Cases (Part 1)DNIF
 
Ict 2015 saga - cisco cybersecurity rešenja- Viktor Varga
Ict 2015   saga - cisco cybersecurity rešenja- Viktor VargaIct 2015   saga - cisco cybersecurity rešenja- Viktor Varga
Ict 2015 saga - cisco cybersecurity rešenja- Viktor VargaDejan Jeremic
 
HOW TO PREPARE FOR AND RESPOND TO A RANDSOMWARE ATTACK [Webinar]
HOW TO PREPARE FOR AND RESPOND TO A RANDSOMWARE ATTACK [Webinar]HOW TO PREPARE FOR AND RESPOND TO A RANDSOMWARE ATTACK [Webinar]
HOW TO PREPARE FOR AND RESPOND TO A RANDSOMWARE ATTACK [Webinar]Stanton Viaduc
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security GovernancePriyanka Aash
 

La actualidad más candente (20)

Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
 
Debunked: 5 Myths About Zero Trust Security
Debunked: 5 Myths About Zero Trust SecurityDebunked: 5 Myths About Zero Trust Security
Debunked: 5 Myths About Zero Trust Security
 
Ransomware Has Evolved And So Should Your Company
Ransomware Has Evolved And So Should Your CompanyRansomware Has Evolved And So Should Your Company
Ransomware Has Evolved And So Should Your Company
 
How to Recover from a Ransomware Disaster
How to Recover from a Ransomware DisasterHow to Recover from a Ransomware Disaster
How to Recover from a Ransomware Disaster
 
An in depth understanding in the application of the zero-trust security model...
An in depth understanding in the application of the zero-trust security model...An in depth understanding in the application of the zero-trust security model...
An in depth understanding in the application of the zero-trust security model...
 
Porque las Amenazas avanzadas requieren de una Seguridad para Aplicaciones av...
Porque las Amenazas avanzadas requieren de una Seguridad para Aplicaciones av...Porque las Amenazas avanzadas requieren de una Seguridad para Aplicaciones av...
Porque las Amenazas avanzadas requieren de una Seguridad para Aplicaciones av...
 
Netpluz DDoS Mitigation - Managed Cyber Security
Netpluz DDoS Mitigation - Managed Cyber Security Netpluz DDoS Mitigation - Managed Cyber Security
Netpluz DDoS Mitigation - Managed Cyber Security
 
Mastering Next Gen SIEM Use Cases (Part 2)
Mastering Next Gen SIEM Use Cases (Part 2)Mastering Next Gen SIEM Use Cases (Part 2)
Mastering Next Gen SIEM Use Cases (Part 2)
 
Ict conf td-evs_pcidss-final
Ict conf td-evs_pcidss-finalIct conf td-evs_pcidss-final
Ict conf td-evs_pcidss-final
 
INFINITY Presentation
INFINITY PresentationINFINITY Presentation
INFINITY Presentation
 
DTS Solution - Cyber Security Services Portfolio
DTS Solution - Cyber Security Services PortfolioDTS Solution - Cyber Security Services Portfolio
DTS Solution - Cyber Security Services Portfolio
 
Healthcare Cybersecurity Survey 2018 - Sirius
Healthcare Cybersecurity Survey 2018 - SiriusHealthcare Cybersecurity Survey 2018 - Sirius
Healthcare Cybersecurity Survey 2018 - Sirius
 
Cyber security resilience ESRM Conference Amsterdam 2016
Cyber security resilience  ESRM Conference Amsterdam 2016Cyber security resilience  ESRM Conference Amsterdam 2016
Cyber security resilience ESRM Conference Amsterdam 2016
 
The State Of Information and Cyber Security in 2016
The State Of Information and Cyber Security in 2016The State Of Information and Cyber Security in 2016
The State Of Information and Cyber Security in 2016
 
The Cyber Attack Risk
The Cyber Attack RiskThe Cyber Attack Risk
The Cyber Attack Risk
 
Black Hat USA 2015: A Visual Snapshot of Security Threats, Trends and Ideas
Black Hat USA 2015: A Visual Snapshot of Security Threats, Trends and IdeasBlack Hat USA 2015: A Visual Snapshot of Security Threats, Trends and Ideas
Black Hat USA 2015: A Visual Snapshot of Security Threats, Trends and Ideas
 
Mastering Next Gen SIEM Use Cases (Part 1)
Mastering Next Gen SIEM Use Cases (Part 1)Mastering Next Gen SIEM Use Cases (Part 1)
Mastering Next Gen SIEM Use Cases (Part 1)
 
Ict 2015 saga - cisco cybersecurity rešenja- Viktor Varga
Ict 2015   saga - cisco cybersecurity rešenja- Viktor VargaIct 2015   saga - cisco cybersecurity rešenja- Viktor Varga
Ict 2015 saga - cisco cybersecurity rešenja- Viktor Varga
 
HOW TO PREPARE FOR AND RESPOND TO A RANDSOMWARE ATTACK [Webinar]
HOW TO PREPARE FOR AND RESPOND TO A RANDSOMWARE ATTACK [Webinar]HOW TO PREPARE FOR AND RESPOND TO A RANDSOMWARE ATTACK [Webinar]
HOW TO PREPARE FOR AND RESPOND TO A RANDSOMWARE ATTACK [Webinar]
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
 

Similar a Slides to the online event "Creating an effective cybersecurity strategy" by Berezha Security Group

Security Guide For Small Business
Security Guide For Small BusinessSecurity Guide For Small Business
Security Guide For Small BusinessBrendanRose
 
Top 6 things_small_businesses_q12015
Top 6 things_small_businesses_q12015Top 6 things_small_businesses_q12015
Top 6 things_small_businesses_q12015anpapathanasiou
 
Tech Talent Meetup Hacking Security Event Recap
Tech Talent Meetup Hacking Security Event RecapTech Talent Meetup Hacking Security Event Recap
Tech Talent Meetup Hacking Security Event RecapDominic Vogel
 
Information security for business majors
Information security for business majorsInformation security for business majors
Information security for business majorsPaul Melson
 
Trustwave: 7 Experts on Transforming Your Threat Detection & Response Strategy
Trustwave: 7 Experts on Transforming Your Threat Detection & Response StrategyTrustwave: 7 Experts on Transforming Your Threat Detection & Response Strategy
Trustwave: 7 Experts on Transforming Your Threat Detection & Response StrategyMighty Guides, Inc.
 
Pci compliance training agents
Pci compliance training  agentsPci compliance training  agents
Pci compliance training agentsocinc
 
Cybersecurity Interview Questions Part -2.pdf
Cybersecurity Interview Questions Part -2.pdfCybersecurity Interview Questions Part -2.pdf
Cybersecurity Interview Questions Part -2.pdfInfosec Train
 
Security Transformation
Security TransformationSecurity Transformation
Security TransformationFaisal Yahya
 
IT Solutions for 3 Common Small Business Problems
IT Solutions for 3 Common Small Business ProblemsIT Solutions for 3 Common Small Business Problems
IT Solutions for 3 Common Small Business ProblemsBrooke Bordelon
 
11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of securityMatthew Pascucci
 
The Unconventional Guide to Cyber Threat Intelligence
The Unconventional Guide to Cyber Threat IntelligenceThe Unconventional Guide to Cyber Threat Intelligence
The Unconventional Guide to Cyber Threat IntelligenceAhad
 
Protecting the Core of Your Network
Protecting the Core of Your Network Protecting the Core of Your Network
Protecting the Core of Your Network Mighty Guides, Inc.
 
The significance of the 7 Colors of Information Security
The significance of the 7 Colors of Information SecurityThe significance of the 7 Colors of Information Security
The significance of the 7 Colors of Information Securitylearntransformation0
 
The 10 Secret Codes of Security
The 10 Secret Codes of SecurityThe 10 Secret Codes of Security
The 10 Secret Codes of SecurityKarina Elise
 
Cyber threat Intelligence Dubai - Ahad.pptx
Cyber threat Intelligence Dubai - Ahad.pptxCyber threat Intelligence Dubai - Ahad.pptx
Cyber threat Intelligence Dubai - Ahad.pptxAhad
 
The Unconventional Guide to Cyber Threat Intelligence - Ahad.pdf
The Unconventional Guide to Cyber Threat Intelligence - Ahad.pdfThe Unconventional Guide to Cyber Threat Intelligence - Ahad.pdf
The Unconventional Guide to Cyber Threat Intelligence - Ahad.pdfAhad
 
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)Sarah Jarvis
 

Similar a Slides to the online event "Creating an effective cybersecurity strategy" by Berezha Security Group (20)

Security Guide For Small Business
Security Guide For Small BusinessSecurity Guide For Small Business
Security Guide For Small Business
 
Top 6 things_small_businesses_q12015
Top 6 things_small_businesses_q12015Top 6 things_small_businesses_q12015
Top 6 things_small_businesses_q12015
 
Tech Talent Meetup Hacking Security Event Recap
Tech Talent Meetup Hacking Security Event RecapTech Talent Meetup Hacking Security Event Recap
Tech Talent Meetup Hacking Security Event Recap
 
Information security for business majors
Information security for business majorsInformation security for business majors
Information security for business majors
 
Rogers eBook Security
Rogers eBook SecurityRogers eBook Security
Rogers eBook Security
 
Trustwave: 7 Experts on Transforming Your Threat Detection & Response Strategy
Trustwave: 7 Experts on Transforming Your Threat Detection & Response StrategyTrustwave: 7 Experts on Transforming Your Threat Detection & Response Strategy
Trustwave: 7 Experts on Transforming Your Threat Detection & Response Strategy
 
Pci compliance training agents
Pci compliance training  agentsPci compliance training  agents
Pci compliance training agents
 
Cybersecurity Interview Questions Part -2.pdf
Cybersecurity Interview Questions Part -2.pdfCybersecurity Interview Questions Part -2.pdf
Cybersecurity Interview Questions Part -2.pdf
 
Security Transformation
Security TransformationSecurity Transformation
Security Transformation
 
IT Solutions for 3 Common Small Business Problems
IT Solutions for 3 Common Small Business ProblemsIT Solutions for 3 Common Small Business Problems
IT Solutions for 3 Common Small Business Problems
 
11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security
 
Robust Software Solutions.pptx
Robust Software Solutions.pptxRobust Software Solutions.pptx
Robust Software Solutions.pptx
 
The Unconventional Guide to Cyber Threat Intelligence
The Unconventional Guide to Cyber Threat IntelligenceThe Unconventional Guide to Cyber Threat Intelligence
The Unconventional Guide to Cyber Threat Intelligence
 
Protecting the Core of Your Network
Protecting the Core of Your Network Protecting the Core of Your Network
Protecting the Core of Your Network
 
The significance of the 7 Colors of Information Security
The significance of the 7 Colors of Information SecurityThe significance of the 7 Colors of Information Security
The significance of the 7 Colors of Information Security
 
The 10 Secret Codes of Security
The 10 Secret Codes of SecurityThe 10 Secret Codes of Security
The 10 Secret Codes of Security
 
Cyber threat Intelligence Dubai - Ahad.pptx
Cyber threat Intelligence Dubai - Ahad.pptxCyber threat Intelligence Dubai - Ahad.pptx
Cyber threat Intelligence Dubai - Ahad.pptx
 
The Unconventional Guide to Cyber Threat Intelligence - Ahad.pdf
The Unconventional Guide to Cyber Threat Intelligence - Ahad.pdfThe Unconventional Guide to Cyber Threat Intelligence - Ahad.pdf
The Unconventional Guide to Cyber Threat Intelligence - Ahad.pdf
 
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
 
Wisegate_GeekSpeak_LG
Wisegate_GeekSpeak_LGWisegate_GeekSpeak_LG
Wisegate_GeekSpeak_LG
 

Último

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 

Último (20)

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 

Slides to the online event "Creating an effective cybersecurity strategy" by Berezha Security Group

  • 1.
  • 2. Over 15 years in cybersecurity OSCP, CISSP, CISA Blogger, podcaster, and conference speaker Provides consulting services in software security, cybersecurity awareness, strategy, and investment. sapran@bsg.tech Vlad Styran
  • 3. 10+ years of experience in IT-audit and consulting, IT project management Experiences in leading large outsourcing teams in Ukraine, Poland, and USA Experiences in building customer relationships within the US, UK, and Western Europe geographies. Leads the BSG advisory practice and consults large development teams in all aspects of cybersecurity. varusha@bsg.tech Andriy Varusha
  • 4. Our job is to help companies in all aspects of cybersecurity. We complete more than 50 security projects yearly. And we are aware of the business security vulnerabilities across the verticals. We help our customers address their future security challenges: prevent data breaches and achieve compliance. About BSG
  • 5. Top 5 popular misconceptions about SMB cybersecurity. 10 steps to combat cyber threats. Questions and answers. 1. 2. 3. Plan for Today
  • 6. Top 5 Popular Misconceptions about the Cybersecurity of Small and Medium-sized Business
  • 7. In fact, no one cares about how large or how small your business is. Attackers hack you first and think about how to monetize it later. Myth 1: Too small to be a target
  • 8. Myth 2: Anti-virus is enough to keep you safe They aren't, as any other "silver bullet" technology that was hyped throughout the history of computer technology, such as firewalls, DLP, end-point protection, sandboxes, etc. As a great quote from the hacking history book “The Cult of the Dead Cow” goes: “Antivirus is better than nothing.”
  • 9. Both these statements are incorrect. There is a shared trust model in the cloud that every business must understand. You are responsible for the security “in the cloud,” while a good cloud provider is responsible for the security “of the cloud.” Myth 3: Cloud services are secure. Or cloud services are insecure.
  • 10. Shared Responsibility model for cloud security https://www.cisecurity.org/blog/shared-responsibility-cloud-security-what-you-need-to-know/
  • 11. Myth 4: Cybersecurity is too expensive If you do small business, your stakes are relatively low, as is your cybersecurity investment. If you grow your business, your stakes go higher as a cybersecurity investment does. The effectiveness of your security spendings is a matter of both what you do and how you do it.
  • 12.
  • 13. Myth 5: IT is responsible for cybersecurity It is false. Understanding cybersecurity is essential for modern IT professionals and business units. However, the responsibility for cybersecurity resides solely on those responsible for the rest of risk decisions: the business leaders.
  • 14. 10 steps to combat cyber threats How to protect your business within a limited budget?
  • 15. WARNING: Your threat model is not our threat model
  • 16. Educate employees 1. Humans are not the weakest security link. Humans are the product of evolution conditioned to produce the risk-aware species. We are better at seeing a tiger in the grass than identify cyber threats, though. Humans are the best weapon you have against malicious hackers. You just have to train them.
  • 17. 2. Enforce two-factor authentication Turn on two-factor authentication on every website, in every system, in every app you use.
  • 18. 3. Use encryption to protect data and communications VPN for sensitive communications E2E messengers HTTPS on all websites Encrypt files in the cloud Data encryption – everywhere
  • 19. Update the software regularly and install an anti-malware solution on computers, smartphones, and other electronic devices your employees use. P.S. Remember the AV efficiency. 4. Protect the endpoints
  • 20. Move to the cloud: SaaS applications, IaaS hosting services, and other professional third- party services with good security practices. You will never protect your MS Exchange better than Microsoft can protect O365, or Google can protect G-Suite. Mind your threat model, though. 5. Abandon Earth
  • 21. Use a logging solution or another way to get early notification about being compromised. "Amateurs don't want to get hacked. Professionals don't want to remain hacked." 6. Know when you are hacked
  • 22. 7. When ready, start using a control framework CIS – Center for Internet Security NIST – US National Institute for Standards & Technology, SP800 series ISO 27000 series of Information Security Management standards PCI DSS standard and supplementary materials
  • 23. 8. Get cybersecurity insurance Cybersecurity insurance is still affordable to most companies. To lower the premiums, you should follow some basic cybersecurity practices and show them to the insurance company.
  • 24. 9. Do backups Backup your data regularly to save yourself the time and pain of trying to recover lost data.
  • 25. The “what you don’t know can’t hurt you” principle does not work in cybersecurity. Cyberthreats are invisible, but their consequences are very much apparent. Without regular testing of your protection, you have no idea if it matches the attackers efforts. 10. Challenge your security
  • 27. World's Biggest Data Breaches & Hacks https://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/
  • 28. Data Breach Investigations Report https://enterprise.verizon.com/resources/reports/dbir/ Key takeaways Industry highlights Best practices Classification patterns And many more
  • 29. NIST documents and frameworks https://www.nist.gov/itl/smallbusinesscyber NIST Cybersecurity Framework Small Business Case Studies NIST Cybersecurity Framework Cyber Insurance Cybersecurity Resources Roadmap
  • 31. Small Business Big Threat https://smallbusinessbigthreat.com/access-resources/ Online-Security-Best-Practices Cybersecurity-Tools Cybersecurity-Canvas Security-Best-Practices-for- Mobile-Devices Ransomware: What you really really need to know
  • 32. Center for Internet Security https://www.cisecurity.org/wp-content/uploads/2017/09/CIS-Controls-Guide-for-SMEs.pdf Inventory of Authorized & Unauthorized Devices Secure Configurations for Hardware and Software Continuous Vulnerability Assessment & Remediation Controlled Use of Administrative Privileges etc.
  • 34. National Cyber Security Alliance https://staysafeonline.org/cybersecure-business/
  • 35. Microsoft Security Youtube Channel https://www.youtube.com/channel/UC4s3tv0Qq_OSUBfR735Jc6A
  • 36. Projects and Clients Review BSG Security Findings https://bit.ly/bsg2020report
  • 38. Stay in Touch With If you have any questions, please contact us at: https://bsg.tech hello@bsg.tech