Download presentation
Presentation is loading. Please wait.
Published byBerniece Parks Modified over 9 years ago
2
Cyber Exposure – what it is and how to manage it Narrated by Doug Nagan Understanding Cyber Exposure ©2015 all rights reserved – Nagan Research Group LLC
3
Course Objectives Provide a framework for managing cyber exposure © 2015 all rights reserved Nagan Research Group LLC2
4
Course Objectives Provide a framework for managing cyber exposure Understanding cyber exposures many aspects Cyber Exposure is not just technical © 2015 all rights reserved Nagan Research Group LLC3
5
Course Objectives Provide a framework for managing cyber exposure Understanding cyber exposures many aspects Cyber Exposure is not just technical Determining your organizations cyber exposure © 2015 all rights reserved Nagan Research Group LLC4
6
Course Objectives Provide a framework for managing cyber exposure Understanding cyber exposures many aspects Cyber Exposure is not just technical Determining your organizations cyber exposure Understanding how to manage program Framework © 2015 all rights reserved Nagan Research Group LLC5
7
Course Structure Course consists of 6 modules Introduction Identifying vulnerabilities – Part 1 Identifying vulnerabilities – Part 2 Determining Impact Triage, Priorities and Management Summary © 2015 all rights reserved Nagan Research Group LLC6
8
Course Structure Course consists of 6 modules Introduction Identifying vulnerabilities – Part 1 Identifying vulnerabilities – Part 2 Determining Impact Triage, Priorities and Management Summary Each module should take less than 10 minutes © 2015 all rights reserved Nagan Research Group LLC7
9
Course Structure Course consists of 7 modules Each module should takes less than 10 minutes Each module has a 10 question quiz at end completion of which is required to take next module © 2015 all rights reserved Nagan Research Group LLC8
10
What is Cyber Exposure? Cyber Exposure’ is the term we use to define the vulnerabilities that arise when you use cyber technology. © 2015 all rights reserved Nagan Research Group LLC9
11
What is Cyber Exposure? Cyber Exposure’ is the term we use to define the vulnerabilities that arise when you use cyber technology. Vulnerabilities include technical ones, but also include legal, compliance, financial, intellectual property, and the usage of personal devices and services (BYOD, Social Media), and the Internet of Things (IoT) vulnerabilities as well. © 2015 all rights reserved Nagan Research Group LLC10
12
Framework 1. Identify all your potential cyber exposures © 2015 all rights reserved Nagan Research Group LLC11
13
Framework 1 - Identify all your potential cyber exposures 2 - Determine found exposures potential impact on your organization © 2015 all rights reserved Nagan Research Group LLC12
14
Framework 1 - Identify all your potential cyber exposures 2 - Determine found exposures potential impact on your organization 3 - Perform Triage What cyber exposures to retain, mitigate, outsource, or ignore © 2015 all rights reserved Nagan Research Group LLC13
15
Framework 1 - Identify all your potential cyber exposures 2 - Determine found exposures potential impact on your organization 3 - Perform Triage What ones to retain, mitigate, outsource, or ignore 4 - Manage © 2015 all rights reserved Nagan Research Group LLC14
16
Framework 1 - Identify all your potential cyber exposures 2 - Determine found exposures potential impact on your organization 3 - Perform Triage What ones to retain, mitigate, outsource, or ignore 4 - Manage 5 - Start all over © 2015 all rights reserved Nagan Research Group LLC15
17
End of Module 1 Congratulations! You have completed Module 1 of ‘Understanding Cyber Exposure’ The link below will take you to the Module 1 quiz http://www.naganresearchgroup.com/limesurvey/index.php/853334/lang-en http://www.naganresearchgroup.com/limesurvey/index.php/853334/lang-en (note: you may need to cut and paste the link) © 2015 all rights reserved Nagan Research Group LLC16
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.