Cyber Exposure – what it is and how to manage it Narrated by Doug Nagan Understanding Cyber Exposure ©2015 all rights reserved – Nagan Research Group.

Slides:



Advertisements
Similar presentations
© BMA Inc All rights reserved. Lean decision making Box score.
Advertisements

EXERCISE IN MITIGATION DECISIONS MODULE 2 THE MULTI-HAZARD ENVIRONMENT.
Legal Information Systems Group Managing Knowledge Through Process and Technology Conoco Law School Conoco Law School Implementation Overview Bonnie Nunnery.
CRTP Coursework Assignment Accounting for Leases Exposure Draft (ED/2013/6) Submission date: 20 January 2014 by 2:00 pm 1.
Networked Systems Survivability CERT ® Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA © 2002 Carnegie.
Introduction to the State-Level Mitigation 20/20 TM Software for Management of State-Level Hazard Mitigation Planning and Programming A software program.
Making the case for Absence Management NS 10/10 Copyright © 2010 by The Hartford. All rights reserved. No part of this document may be published.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Qualitative.
Framework for Global Electronic Commerce Communications 411 Relevant Site:
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #6 Forensics Services September 10, 2007.
Ideas about ICT Management Faculty meeting to discuss the Comp/Tele program Henri Slettenhaar Webster University Geneva.
Internet Safety Getting On Board with the Plan. Introduction Technology and the Internet offer valuable resources and tools that enhance learning, but.
SME Security. Articulate the major security risks and legal compliance issues for an SME.Explain and justify approaches of investment on InfoSec controls,
Cyberbullying Powerpoint By YOU. Part A · Cyber-Bullying: What it is · Cyber-Bullying: What it isn’t · Cyber-Bullying and the Law · What Can Schools Do?
SeETL Demonstration 09 Demo Reports Online 1/9/2012
IT Strategy for Business © Oxford University Press 2008 All rights reserved Chapter 12 IT Security Strategies.
© IDT911, LLC. All Rights Reserved — Confidential 0 Cyber and Privacy Breach Coverages.
Financial Risk Management Ramsha Rashid. INTRODUCTION TO RISK MANAGMENT DEFINATION: Risk Management is a scientific approach to deal with pure risk by.
 Figure 2.1 The Organization, the Levels of Its [2] Environment, and the Components of Those Levels Figure 2.1 The Organization, the Levels of Its [2]
ENTREPRENEUR’S DETAILS Entrepreneur’s Name: Address: Mobile Number: Landline Number: Postal Address: T City: State: SECTOR: Information Technology/Technology.
IT Security CS5493(74293). IT Security Q: Why do you need security? A: To protect assets.
CYBER SECURITY & ITS IMPACT ON FINANCIAL STATEMENTS AUDITS BOB WAGNER TUESDAY, NOVEMBER FLORIDA SCHOOL FINANCE OFFICERS ASSOCIATION CONFERENCE.
Course Title. N2 - Attention Getter Enter information on screen to serve as the “attention- getter” portion of the course.
ISACA Accra, Kumasi Workshop September 2013 Business Continuity Management Compiled and presented by: Eric Magnusen ( BCM Consultant) BCM-Consult, Al Faslu.
Cyber Risk Management and Insurance
Articulate the major security risks and legal compliance issues for a Fire and Rescue Service. Identify and justify technical controls for securing remote.
Cyber Crime Consultant Consulting now e-commerce cyber laws and regulations in india from best ecommerce lawyer crime based in Mumbai, india. Get complete.
MGT 445 Week 3 Individual Negotiation Strategy Article Analysis Use the Electronic Reserve Readings link for the course, the Internet, or other resources.
MGT 426 Week 1 Individual Assignment Article Review Use the course’s Electronic Reserve Readings (ERR), the Internet, or other resources, to find an article.
CJA 304 Week 5 Course Summary Post a summary of what you learning in this course. What did you find that was useful or that challenged your thinking? To.
PSYCH 545 Week 5 Individual Legal Aspects of Professional Psychology Paper To purchase this material click on below link
ETH 557 Week 4 DQ 2 To purchase this material link 557/ETH-557-Week-4-DQ-2 For more courses visit our website
FIN 320 Week 5 DQ 2 How does an organization engaged in international trade mitigate its exposure risk? What are some tools businesses may use to manage.
PSY 410 Week 5 DQ 2 How can you apply what you have learned in this course to other aspects of your life? To purchase this material click on below link.
PSY 480 Week 2 Individual Week Two Quiz To purchase this material click on below link Week-2-Individual-Week-Two-Quiz.
PSY 490 Complete Class - Brand New PSY 490 Capstone Course in Psychology Version 9, ~~~~ Week 4 Quiz Not Included in this. To purchase this material click.
PSY 490 Week 1 Summary Write and present a summary of how this week’s readings and activities have affected your thought process regarding any aspect of.
PSY 490 Week 2 Summary Write and present a summary of how this week’s readings and activities have affected your thought process regarding any aspect of.
PSY 490 Week 3 Summary Write and present a summary of how this week’s readings and activities have affected your thought process regarding any aspect of.
PSY 490 Week 4 Summary​ Write and present a summary of how this week’s readings and activities have affected your thought process regarding any aspect.
BUS 311 Week 5 DQ 1 Intellectual Property and Technology To purchase this material click below link
ISCOM 383 Week 2 Individual Assignment Global Value Chain Article Analysis Research the Electronic Reserve Readings for ISCOM/383, course texts, the University.
IT 244 Week 4 Cyber Crime To purchase this material link Week-4-Cyber-Crime For more courses visit our website.
LAW 421 Week 2 DQ 2 To purchase this material link 421-Week-2-DQ-2 For more courses visit our website
ADJ 235 Week 9 Capstone DQ What have you learned about the ethical issues that face criminal justice professionals? What have you learned in regard to.
HRM 310 Week 1 Individual Reasons for Change Paper Resources: Week One Readings, Electronic Reserve Readings, the Internet, or other resources. Find an.
ACC 300 Week 5 DQ 1 What must financial managers consider when operating in the global environment? What types of regulatory compliance might they face?
11/03/2016.
An Information Security Management System
Information Security Program
Protecting Our Reputation is Everybody’s Job
Risk Assessment.
The National Curriculum
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Page 1 Fundamentals of Information Systems.
Module 1
Make Your Own Quiz.
Drafting a Climate Change Response Plan
Placeholder for client logo
Managing Procurement and Logistics of HIV/AIDS Drugs and Related Supplies Introduction and Overview May 30 to June 4, 2005 Abuja, Nigeria.
Kaye Bachelard Mark O’Connor
Advanced Cyber Exposure Management
Cyber Risk & Cyber Insurance - Overview
Cyber security Policy development and implementation
I UNDERSTAND CONCEPTS OF CYBERSECURITY
8e: International Trade and Globalization
Effective Risk Management in Decision Making Process
CRU Intellectual Property 2019 Commodity Test Document ©2019 CRU International Ltd. All rights reserved.
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fuel Cell Market size worth $25.5bn by 2024 Low Power Wide Area Network.
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Presentation transcript:

Cyber Exposure – what it is and how to manage it Narrated by Doug Nagan Understanding Cyber Exposure ©2015 all rights reserved – Nagan Research Group LLC

Course Objectives  Provide a framework for managing cyber exposure © 2015 all rights reserved Nagan Research Group LLC2

Course Objectives  Provide a framework for managing cyber exposure  Understanding cyber exposures many aspects Cyber Exposure is not just technical © 2015 all rights reserved Nagan Research Group LLC3

Course Objectives  Provide a framework for managing cyber exposure  Understanding cyber exposures many aspects Cyber Exposure is not just technical  Determining your organizations cyber exposure © 2015 all rights reserved Nagan Research Group LLC4

Course Objectives  Provide a framework for managing cyber exposure  Understanding cyber exposures many aspects Cyber Exposure is not just technical  Determining your organizations cyber exposure  Understanding how to manage program Framework © 2015 all rights reserved Nagan Research Group LLC5

Course Structure  Course consists of 6 modules  Introduction  Identifying vulnerabilities – Part 1  Identifying vulnerabilities – Part 2  Determining Impact  Triage, Priorities and Management  Summary © 2015 all rights reserved Nagan Research Group LLC6

Course Structure  Course consists of 6 modules  Introduction  Identifying vulnerabilities – Part 1  Identifying vulnerabilities – Part 2  Determining Impact  Triage, Priorities and Management  Summary  Each module should take less than 10 minutes © 2015 all rights reserved Nagan Research Group LLC7

Course Structure  Course consists of 7 modules  Each module should takes less than 10 minutes  Each module has a 10 question quiz at end completion of which is required to take next module © 2015 all rights reserved Nagan Research Group LLC8

What is Cyber Exposure?  Cyber Exposure’ is the term we use to define the vulnerabilities that arise when you use cyber technology. © 2015 all rights reserved Nagan Research Group LLC9

What is Cyber Exposure?  Cyber Exposure’ is the term we use to define the vulnerabilities that arise when you use cyber technology.  Vulnerabilities include technical ones, but also include legal, compliance, financial, intellectual property, and the usage of personal devices and services (BYOD, Social Media), and the Internet of Things (IoT) vulnerabilities as well. © 2015 all rights reserved Nagan Research Group LLC10

Framework 1. Identify all your potential cyber exposures © 2015 all rights reserved Nagan Research Group LLC11

Framework 1 - Identify all your potential cyber exposures 2 - Determine found exposures potential impact on your organization © 2015 all rights reserved Nagan Research Group LLC12

Framework 1 - Identify all your potential cyber exposures 2 - Determine found exposures potential impact on your organization 3 - Perform Triage What cyber exposures to retain, mitigate, outsource, or ignore © 2015 all rights reserved Nagan Research Group LLC13

Framework 1 - Identify all your potential cyber exposures 2 - Determine found exposures potential impact on your organization 3 - Perform Triage What ones to retain, mitigate, outsource, or ignore 4 - Manage © 2015 all rights reserved Nagan Research Group LLC14

Framework 1 - Identify all your potential cyber exposures 2 - Determine found exposures potential impact on your organization 3 - Perform Triage What ones to retain, mitigate, outsource, or ignore 4 - Manage 5 - Start all over © 2015 all rights reserved Nagan Research Group LLC15

End of Module 1  Congratulations! You have completed Module 1 of ‘Understanding Cyber Exposure’  The link below will take you to the Module 1 quiz   (note: you may need to cut and paste the link) © 2015 all rights reserved Nagan Research Group LLC16