The First Step in Cybersecurity
Past Threats and Incident of Cybersecurity 76 % of organizations polled by CompTIA said they experienced them [a cybersecurity attack] in 2011 Victims: Google, TJX Companies, Target, LinkedIn, RSA Security, US Senate, and the CIA Port of Antwerp – Drug traffickers recruited hackers to breach IT systems that controlled the movement and location of containers. – Two companies that operated within the port. – Installed firewall and still managed to install keyloggers –
Methods of infiltration Resident/Partner Companies Remote Hacking Vendor Applications Network Enabled Hardware Social Networking BYOD Physical Access
Compliance Initiatives Port Specific Compliance – President Issued Executive Order – NIST Framework Released in February 2014 Industry Compliance: – HIPAA ACT – HITECH ACT – GLBA – Sarbanes-Oxley – Telecommunications Act of 1996
Identify
Protect
Detect
Respond and Recover