Your security risk is higher than ever.

Slides:



Advertisements
Similar presentations
Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.
Advertisements

David A. Brown Chief Information Security Officer State of Ohio
Information Security– SNO International Zanzibar, Tanzania Joe Beaulac, Sr. Manager – Cyber Defense Center & Risk/Vulnerability Management 23 September.
NUAGA May 22,  IT Specialist, Utah Department of Technology Services (DTS)  Assigned to Department of Alcoholic Beverage Control  PCI Professional.
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
E-Security: 10 Steps to Protect Your School’s Network NEN – the education network.
Thomas Levy. Agenda 1.Aims: Reducing Cyber Risk 2.Information Risk Management 3.Secure Configuration 4.Network Security 5.Managing User Access 6.Education.
Office of Campus Information Security Driving a Security Architecture by Assessing Risk Stefan Wahe Sr. Information Security Analyst.
IT Security – Scanning / Vulnerability Assessment David Geick State of Connecticut IT Security.
Chapter 2 Securing Network Server and User Workstations.
Critical Security Controls & Effective Cyber Defense Hasain “The Wolf”
©2015 HEAT Software. All rights reserved. Proprietary & Confidential. Ransomware: How to Avoid Extortion Matthew Walker – VP Northern Europe.
IPv6 security for WLCG sites (preparing for ISGC2016 talk) David Kelsey (STFC-RAL) HEPiX IPv6 WG, CERN 22 Jan 2016.
Information Security tools for records managers Frank Rankin.
Best Cyber Security Practices for Counties An introduction to cybersecurity framework.
September 20, 2016 How to Defend Your Organization from a Cyber Breach LTC Tim Bloechl (U.S. Army, Ret.) Director, Cyber Security Business.
Endpoint and DataCenter Security
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Karsten Chearis Sales Engineer.
Your Partner for Superior Cybersecurity
Sophos Intercept X Matt Cooke – Senior Product Marketing Manager.
Increasing Information and Data Security in Today’s Cybersecurity World 2017 Conference Review 6/6/2017.
Your Partner for Superior Cybersecurity
Managing Compliance for All Departments
Your Partner for Superior Cybersecurity
Securing Your ERP Infrastructure
Cybersecurity - What’s Next? June 2017
Your Partner for Superior Cybersecurity
Critical Security Controls
Securing the Academy: Better Cybersecurity for Instructors and Administrators
Endpoint and DataCenter Security
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Michael Burke.
Security Standard: “reasonable security”
THR2099 What to do BEFORE all hell breaks loose: Building a modern cybersecurity strategy.
Secure Software Confidentiality Integrity Data Security Authentication
Patching 3rd Party Apps in SCCM & Much More!
Putting It All Together
Active Cyber Security, OnDemand
Putting It All Together
Trends in Ransomware Distribution
Business Risks of Insecure Networks
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them David Hood Director of Technology Marketing.
Joe, Larry, Josh, Susan, Mary, & Ken
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Michael Bird Team Lead, Account Executive.
NYBA 2017 Technology, Compliance &
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Michael Vanderhoff.
Jon Peppler, Menlo Security Channels
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Matthew Gardiner Product Marketing.
Today’s Risk. Today’s Solutions. Cyber security and
How to allow USB Flash Drive Scan in Avast Antivirus.
I have many checklists: how do I get started with cyber security?
Implementing and Auditing the Critical Controls
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Andrew Cotton.
Reconnaissance Report Trillium Technologies
National Cyber Security
Information Security Awareness
Top Ten Cyber Security Hygiene Tips
How to Mitigate the Consequences What are the Countermeasures?
Implementing Client Security on Windows 2000 and Windows XP Level 150
Anatomy of a Large Scale Attack
Cybersecurity: Tried and True Tactics for Assessing and Managing Risks, Employee Training and Program Testing Brian Rubin, Partner, Sutherland Tee Meeks,
Cybersecurity Threat Assessment
16. Account Monitoring and Control
Information Protection
Cybersecurity and Cyberhygiene
November 30, 2017 By: Richard D. Condello NRECA Senior Director
Security in mobile technologies
Cloud and Database Security
Information Protection
Cybersecurity Simplified: Ransomware
Cybriant Partner Partner Program White Label Materials
Presentation transcript:

Your security risk is higher than ever. $19.95/mo. 40% buys hackers easy-to-use “as-a-service” options for attacks. ZDNet of spam contains ransomware. IBM Your security risk is higher than ever.

16% over 2015. 2016 ransomware attacks were up Verizon 2016 DBIR

of recipients open phishing messages. 30% of recipients open phishing messages. click on attachments. 12% Verizon 2016 DBIR

You can’t afford to be wrong on this one. 1 in 2 70% $1B USD executives experience a ransomware attack of businesses hit pay the ransom in ransom paid in 2016 IBM IBM FBI estimate

“IT wants things to work smoothly, while security wants security. Feedback from a survey of 100 CIO/CSOs “IT wants things to work smoothly, while security wants security. At the endpoint, they have to work together to maintain both.”

https://www.youtube.com/watch?v=dHtIGp0DPcA&feature=youtu.be

Install top rated antivirus software 10 Security tips Install top rated antivirus software

2017 10 Best as of May 2017

Restrict administrator rights

Install and update a firewall

Implement patches and software on popular software

Enforce strict password policies

Top 25 most common passwords 123456 123456789 qwerty 12345678 111111 1234567890 1234567 password 123123 987654321 qwertyuiop mynoob 123321 666666 18atcskd2w 7777777 1q2w3e4r 654321 555555 3rjs1la7qe google 1q2w3e4r5t 123qwe zxcvbnm 1q2w3e

Lock those screens

Secure wi-fi routers

Secure your browsers

Use encryption

Train and recruit users.

Our defense-in-depth solutions Patch & Vulnerability Management Application Control & Privilege Management Endpoint Security Secure Program Management Patch and secure the OSes and 3rd-party apps that you can. Prevent all other apps from running while practicing the principles of least privilege. Add advanced anti-malware and AV capabilities, device control, and global policy for all devices. Marry security capabilities with workflows and asset management processes to complete a secure lifecycle. Patch management Vulnerability management Application control Privilege management Device control Anti-malware Threat alerting Asset management Service management Secure configuration management

The first 5 controls Inventory of authorized and unauthorized devices CIS, US-CERT, ASD, and other authorities prioritize these five elements of cyber hygiene to significantly reduce security threats. Inventory of authorized and unauthorized devices Inventory of authorized and unauthorized software Secure configuration Controlled use of administration privileges Continuous vulnerability assessment and remediation

Department of Homeland Security/FBI Cybersecurity Briefing December 30, 2016 Although in the context of nation-state cyber hacking, in this nationwide public (no clearance required) call, the following techniques were recommended to improve cybersecurity prophylaxis Data Backups Risk Analysis and remediation Staff Training Vulnerability Scanning & Patching Application Whitelisting Incident Response Business Continuity Planning Penetration Testing

Physical security