PREPARATION – DELETE BEFORE MEETING

Slides:



Advertisements
Similar presentations
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Advertisements

1 1 Risk Management: How to Comply with Everything July 11, 2013.
1 Continuity Planning for transportation agencies.
Computer Security: Principles and Practice
Introduction to Network Defense
Section Ten: Security Violations and Deviations Note: All classified markings contained within this presentation are for training purposes only.
1 Copyright Scott Wright. All rights reserved. SC 1 Selling the Streetwise Security Awareness Program.
Delivering Security for Mobile Device and Mobile Application Management INSERT MSP LOGO HERE.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
The State of Computer & Data Security in Corporations Independent Survey.
IT 499 Bachelor Capstone Week 4. Adgenda Administrative Review UNIT Four UNIT Five Project UNIT Six Preview Project Status Summary.
Cloud Computing Project By:Jessica, Fadiah, and Bill.
Visibility. Intelligence. response Information Security: Risk Management or Business Enablement? Mike Childs Vice President Rook Security.
INNOVATE THROUGH MOTIVATION MSP Services Overview KEVIN KIRKPATRICK – OWNER, MSP INC LOGO.
INNOVATE THROUGH MOTIVATION Mobile Computing & Your Business KEVIN KIRKPATRICK – OWNER, MSP INC LOGO.
1 SUSTAINING THE ELECTRICAL INDUSTRY WITH A STRUCTURED HSE MS.
Impact Research 1 Optimizing Your Help Desk: Summary Document.
Models of Security Management Matt Cupp. Overview What is Security Management? What is Security Management? ISO/IEC ISO/IEC NIST Special Publication.
Computer Security and the “H” word Glen Klinkhart, CEO Mike Messick, CTO.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
The Policy Company Limited © Safeguarding – Part 1 - Policy.
Managed IT Solutions More Reliable Networks Are Our Business
Maciej Pęciak Robert Dąbroś
Planning for Application Recovery
3 Do you monitor for unauthorized intrusion activity?
CPA Gilberto Rivera, VP Compliance and Operational Risk
Office 365 Security Assessment Workshop
Comprehensive Security and Compliance at an Affordable Price.
Workplace Financial Wellness
Errors, Fraud, Risk Management, and Internal Controls
Managed Security Services.
Managed Security Services
F5 PRO ASSETS We’ve created these Pro Assets to help you communicate the ideas in this article to your team. Feel free to remove these intro pages, and.
Managed Security Services.
ESSENTIALS OF A PHYSICAL SECURITY SYSTEMS RISK ASSESSMENT
Managed Security Services. Table Of Contents 1. Company profile 2. Managed Security Services 3.3. Features of Managed Security Services.
The L&D Portfolio Evaluation Model:
Information Security: Risk Management or Business Enablement?
CMGT 431 Competitive Success/snaptutorial.com
CMGT 431 Education for Service-- snaptutorial.com.
CMGT 431 STUDY Lessons in Excellence--cmgt431study.com.
CMGT 431 Teaching Effectively-- snaptutorial.com.
Here are some top tips to help you bake responsible data into your project design:.
8 Reasons You Need a Security Penetration Test
Why ISO 27001? Subtitle or presenter
Systems Analysis and Design
Cybersecurity Am I concerned?
Cyber security Policy development and implementation
Why ISO 27001? MARIANNE ENGELBRECHT
 How does GDPR impact your business? Pro Tip: Pro Tip: Pro Tip:
PREPARATION – DELETE BEFORE MEETING
Delete these instructions and PLACE YOUR COMPANY INFO HERE
Life Science online SLO Assessment
Third-party risk management (TPRM)
Fixed Cost IT Management
No!. [NEXT SLIDE] LOGO HERE.
DSC Contract Management Committee Meeting
3 Do you monitor for unauthorized intrusion activity?
Employee Cybersecurity Program
Cloud Management as a Service
PREPARATION – DELETE BEFORE MEETING
Management How-To Guide
Optimizing Your Help Desk:
PREPARATION – DELETE BEFORE MEETING
3 Do you monitor for unauthorized intrusion activity?
CMGT/431 INFORMATION SYSTEMS SECURITY The Latest Version // uopcourse.com
CMGT 431 CMGT431 cmgt 431 cmgt431 Entire Course // uopstudy.com
Goddard Chamber September 12th, 2019 Hosts: John Ash & Jon Grover
Presentation transcript:

PREPARATION – DELETE BEFORE MEETING Fill in the following: Slide 2: Enter the “Presented By: Name, Title, Company” with your information Replace the “Your Logo Here” logo with your company logo Slide 3: Fill this slide out with your personal information as well as your Company information Slide 4 Nothing to fill in here. This is where you will explain the importance of an MSP and the risks associated with not having proactive managed services. Slide 5 Here you will replace the SRA Threat Chart with your client’s chart. Slide 7 THE PITCH. It’s time to pitch your MSP services, focus on the benefits, and how you can help them. Format the slide as you see fit and tailor it to your specific offering. Here you will fill in their top 3 risks, or the top 3 that align best with your service. Also fill in what service you provide to help them lower that risk. Now go out there and CLOSE! TIPS: PRACTICE – run through the deck multiple times Focus on the impact to their business, not the stats or the technology Be relatable and have talking points Don’t read right off the slides.

PRESENTED BY: [NAME, TITLE, COMPANY] WHAT ARE YOUR BLINDSPOTS? TECHNOLOGY HAS OUR BACK WHEN HUMANS MAKE MISTAKES PRESENTED BY: [NAME, TITLE, COMPANY]

WHO AM I? [Your name and job title] [Company Name] [Brief speaker biography] [Note some personal tidbits, get personal and real with your prospects] One hobby or activity [Company Name] [Brief company biography] Security-focused We pride ourselves on helping small to mid-size businesses strengthen their security posture and protect them from cybertheft.

WHAT IS A MANAGED SERVICE PROVIDER? A Managed Service Provider (MSP) is a third-party IT service company that manages and maintains your network, applications, and systems on a proactive basis. Risks of not having a robust MSP Lack of security to fall back on if an employee makes a mistake. Nobody is maintaining your network. What do MSPs do? - MSPs are intended to help improve operations and reduce expenses. - By having a Managed Service Provider, your organization can focus on improving your services without having to worry about interruptions. - Proactive monitoring of networks, applications, and other systems is necessary to keep them stable and reliable. RISK of not having a robust MSP – Below are reasons these risks are important Continuous security monitoring, implementation, and focus lowers the risk of data breaches. - If an employee makes a mistake, you need security to protect not only your network but your company assets and to recover from an incident. Having nobody to maintain your network is like not performing maintenance on your car. If you stop maintaining your car, it WILL stop running. Having an MSP will help you ensure your network (applications, systems, etc.) are maintained. For example, continuous patching – If you’re not ensuring patches are being performed when needed, you’re leaving your computers/network vulnerable. MSPs can help make sure you’re getting the maintenance when you need I If you don’t have a plan for how you’re going to handle or respond to an incident or data breach once it occurs, your organization could end up with long downtimes leading to loss of revenue. - MSPs can help you prepare for an incident and make sure all the appropriate security/backup measures are in place to decrease downtime and keep you up and running if an outage or incident occurred. Not having a plan to respond to an incident leads to long downtime.

01 02 03 YOUR SECURITY RISK ASSEMENT How we performed your Security Risk Assessment Enter first highest threat Services to lower risk Enter second Highest threat Services to lower risk 01 02 Enter third Highest threat Services to lower risk 03 Map MSP services to threats/findings & recommendations. This is your time to pitch your service and really drive the point home that you can help remediate these risks. - Offer to give a proposal for MSP services Box compares finding  services (table) Drill into findings and recommendations. Here, you want to highlight their high/medium risks or the ones that map best to your MSP services. Ensure they understand the risk to their business if the recommendations go ignored, but also make sure they know that remediation is possible. They may be alarmed by seeing high/medium risks, but this is where you really want them to know they have work to do to protect themselves – and YOU CAN HELP WITH THAT! (next slide)

HOW WE CAN HELP Threat Risk Remediation Benefit Map MSP services to threats/findings & recommendations. This is your time to pitch your service and really drive the point home that you can help remediate these risks. - Offer to give a proposal for MSP services - Box compares finding  services (table)