Cybersecurity Trends for 2018

Slides:



Advertisements
Similar presentations
The Whole/Hole of Security Public (DoD) v. Corporate Carl Bourland US Army Judge Advocate Generals Corps.
Advertisements

MSIT 458: Information Security & Assurance By Curtis Pethley.
Know the Client Own the Problem Share the Solution The 2005 Case for Information Technology Security October 14, 2004.
SEC835 Database and Web application security Information Security Architecture.
Information Security and YOU!. Information Assurance Outreach Information Security Online Security Remote Access with Demonstration The Cloud Social.
1 We’ve been p0wn’d? Review of 2015 Surface Transportation Cybersecurity Incidents 2015 TRB Session 850 Edward Fok USDOT/FHWA – Resource Center.
Data Security: Steps to Improved Information Security September 22, 2015 Presented by: Alex Henderson General Counsel and Chief Administrative Officer.
CUTTING COMPLEXITY – SIMPLIFYING SECURITY INSERT PRESENTERS NAME HERE XXXX INSERT DATE OF EVENT HERE XXXX.
The Changing World of Endpoint Protection
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
Enterprise Cybersecurity Strategy
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. State of Network Security.
Security and Resilience Pat Looney Brookhaven National Laboratory April 2016.
CLOSE THE SECURITY GAP WITH IT SOLUTIONS FROM COMPUTACENTER AND CISCO AUGUST 2014.
Presented by: Mike Gerdes Director, Information Security Center of Expertise Cybersecurity State of the Union.
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fuel Cell Market size worth $25.5bn by 2024 Advanced Persistent Threats.
Cybersecurity as a Business Differentiator
Law Firm Data Security: What In-house Counsel Need to Know
Michael Wright • Chief Security Officer • Tech Lock
Performing Risk Analysis and Testing: Outsource or In-house
OIT Security Operations
CYBERSECURITY INCIDENCE IN THE FINANCIAL SERVICES SECTOR March 28, 2017 Presented by Osato Omogiafo Head IT Audit.
Enterprise Mobility Suite Technical and Business Briefing
Cybersecurity - What’s Next? June 2017
Healthcare Cybersecurity: State of Industry
Comprehensive Security and Compliance at an Affordable Price.
Juniper Software-Defined Secure Network
BEST PRACTICES FOR AN IT SECURITY ASSESSMENT
Information Security.
Attention CFOs How to tighten your belt and still survive May 18, 2017.
Real-time protection for web sites and web apps against ATTACKS
Cyber Security: State of the Nation
Compliance with hardening standards
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Firewall as a Service Market to grow at 25% CAGR from 2017 to 2024: Global.
BUILDING A PRIVACY AND SECURITY PROGRAM FOR YOUR NON-PROFIT
Xiaohong (Dorothy) Yuan North Carolina A&T State University 11/16/2017
NYBA 2017 Technology, Compliance &
Today’s Risk. Today’s Solutions. Cyber security and
Closing the Breach Detection Gap
Data Security Team 1.
COMPTIA CAS-003 Dumps VCE
CompTIA CAS-003 Exam Study Material - CompTIA CAS-003 Exam Dumps Realexamdumps.com
Virtual Private Network (VPN) Market
I have many checklists: how do I get started with cyber security?
Nessus Vulnerability Scanning
Advanced Services Cyber Security 101 © ABB February, | Slide 1.
Strong Security for Your Weak Link:
The Importance of DevSecOps
SMB practice development: Security play
Navigating Security Seas in a Small Ship with a Limited Crew
National Cyber Security
Security Essentials for Small Businesses
Securing the Threats of Tomorrow, Today.
ITP Maturity Model Survey 2018
SMB practice development: Security play
Cyber Security professions Overview
How to Detect Attacks and Supervise Rail Systems?
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fuel Cell Market size worth $25.5bn by 2024 Low Power Wide Area Network.
Information Protection
Detection Detect the breach and protect the data. By,
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
IT Management Services Infrastructure Services
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fuel Cell Market size worth $25.5bn by 2024 Low Power Wide Area Network.
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fuel Cell Market size worth $25.5bn by 2024 Low Power Wide Area Network.
Plan and design the solution
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Enterprise Networking Market Size to Exceed $90 bn by 2025 Growing at CAGR.
Information Protection
©2018 Graphical Research. All rights reserved. North America Enterprise Networking Market to trace exponential gain of $30bn.
Cloud Computing for Wireless Networks
Presentation transcript:

Cybersecurity Trends for 2018 Greg Blake Chief Information Officer Idaho Housing and Finance Association

Governance, Risk, and Compliance (GRC)

Making a proper risk assessments is important

Cybersecurity Program Develop and enterprise-wide data security governance program Cybersecurity Program It is the responsibility of every manger to know what assets are in use so they can manage the associated risks. Average cost of Cybersecurity breach is $3.7 Million A formal Cybersecurity program can reduce the cost of a breach $325K Implementing a Cybersecurity program ranges from $50K - $300K Annual Cybersecurity cost is $50K

Steps to implement a Cybersecurity Program

Cloud security should be your focus Develop security guidelines for cloud vendors Develop a cloud decision model Create a robust vendor management program

We all have the same behavior patterns Limbic region in the brain “oh no” hands to their heads

Yeah! Raised their arms in celebration

CARTA – Continuous Adaptive Risk and Trust Assessment Focus on protection to prevention CARTA – Continuous Adaptive Risk and Trust Assessment Deciding with certainty if an event is good or bad Behavioral Firewall (Preempt) Palo Alto Fortinet Checkpoint CISCO Juniper Forcepoint “All systems and devices must be considered potentially compromised and their behaviors continuously assessed for risk and trust.” “Users once authenticated, are given just enough trust to complete the action being requested, and their behaviors are continuously verified and assessed for risk.”

UEBA – User behavior and advanced Analytics Focus on protection to prevention Balabit Dtex E8 Security Exabeam Forcepoint Fortscale Gurucul Haystax Technology HPE Niara Interset Microsoft Palo Alto Networks Preempt RedOwl Securonix Splunk Varonis Veriato ZoneFox UEBA – User behavior and advanced Analytics How UEBA solutions work “UEBA solutions identify patterns in typical user behavior and then pinpoint anomalous activities that do not match those patterns and could correspond with security incidents.”

Software Development Lifecycle Changes DevOps to DevSecOps For its 2016 State of DevOps Report, Puppet Labs surveyed 4,600 technical professionals. Three type of organization High IT performers, which complete multiple deployments per day Medium IT performers, which deploy between once a week to once a month Low IT performers, which deploy once per month or less Study found that high IT performers deploy 200 time more frequently than low IT performers. Their lead ties are 2,555 times faster

Software Development Lifecycle Changes Implement an Agile Development Methodology Add a security professional rol

Hack yourself first Privacy is not real anymore – Assume your PII has been compromised If a hackers want inside your system he will find a way Find your vulnerabilities before the hacker does Traditional way to attack cyber crime is outdated Keep an eye our for future cyber crime strategies Select the perfect team to do a penetration test

Test your defenses

Prince William at the Royal Air Force HQ Prince William at a Royal Air Force Facility. Documentary was filmed and published online This media photo was widely distributed before someone zoomed in on the posted notices above the Prince.

RAF hacked by a major security blunder MilFlip is the UK Military Flight Information system. Not necessarily a top secret web site, but not for general public use either!