Download presentation
Presentation is loading. Please wait.
Published byEmma Tate Modified over 9 years ago
1
POWERED BY: #NPPROTGC KEYNOTE Two Perspectives for Cybersecurity Best Practices Jane LeClair, Phd Chief Operating Officer National Cybersecurity Institute (NCI) at Excelsior College Lisa Lori Partner Klehr, Harrison, Harvey, Branzburg LLP
2
POWERED BY: Dr. Jane LeClair Chief Operating Officer National Cybersecurity Institute at Excelsior College The Challenges of Cybersecurity #NPPROTGC
3
POWERED BY: A Connected World #NPPROTGC
4
Malicious Intent 4
5
POWERED BY: Cyber crime costs the global economy $1 trillion annually Merchants lose $190 billion to credit card fraud annually Banks lose $11 billion in ATM fraud annually Identify theft costs Americans $37 billion annually Over 70 million people in the US were cyber victims last year Financial Losses Staggering Losses #NPPROTGC
6
POWERED BY: Well Known Breaches #NPPROTGC
7
POWERED BY: Hackers Attack Everywhere Banks Defense contractors Learning institutions Medical facilities Government agencies The White House And….Non-profit organizations Cyber Breaches Are Everywhere #NPPROTGC
8
POWERED BY: Hackers are seeking data from any source they can obtain it Personally Identifiable Information (PII) Data is ‘mined’ and used for further intrusions Information is leveraged to gain higher access DATA!! What Are They After? #NPPROTGC
9
POWERED BY: Defined as “actions by a nation state to penetrate another nation’s computers or networks for the purposes of causing damage or disruption” (Clarke and Knake, 2010) Goal of gaining access to many of America’s digital infrastructures Cyber Warfare But More Than That... #NPPROTGC
10
POWERED BY: Computer virus Network worms Sophisticated malware Targeted attacks, mobile attacks, espionage, cyber warfare Higher Level of Sophistication So What’s Changing #NPPROTGC
11
POWERED BY: Attacks are rising Vulnerability increased through the backdoor Increased costs when systems down Increased access to clients, partners, donors, contractors, etc. Gateway How That Impacts You #NPPROTGC
12
POWERED BY: Ability and Desire to secure systems make you unique Generally centralized management Limited specialized cyber staff Relaxed culture often has limited formal cyber policies Large numbers do not have formal cyber security plan Large numbers do not have a formal internet security policy Often ignore cyber due to day-to-day operations Competing with large organizations, intel groups, military, government for workforce Challenges Organizational Structure #NPPROTGC
13
POWERED BY: Often ignorant of extent of security threats May feel it’s a given….why worry….flawed perceptions Not concerned about internal threats Don’t have expertise to develop and implement plans/policies Often feel that a data breach would have no effect on them Large numbers of owners/operator are responsible personally Forced to depend on advice from vendors/consultants Physical/Cyber security not made a priority Challenges Organizational Structure #NPPROTGC
14
POWERED BY: Increased basic attacks and more sophisticated Focus of attacks has been easily exploitable weaknesses Trojans used to lurk within and be a watering hole Attackers play on low knowledge level, limited resources, inexperience in design configuration and implementation of controls such as passwords, updated security settings, patch management, phishing Threats What You Are Facing #NPPROTGC
15
POWERED BY: Realization Awareness Preparation What You Can Do #NPPROTGC
16
POWERED BY: All digital systems are vulnerable It isn’t a matter of IF, but WHEN you will be attacked Work to reduce your chances of a cyber breach Realization #NPPROTGC
17
POWERED BY: Realizing Your Vulnerability #NPPROTGC
18
POWERED BY: Reduce your risk Increase awareness Educate and train your employees Awareness #NPPROTGC
19
POWERED BY: Sophisticated Malware Impact of Internet of Things Bring Your Own Devices Expanded Black Market Increased Website Hijacking Cyber Threats #NPPROTGC
20
POWERED BY: Cybersecurity is a People Problem Wired communication pathway between the digital network and the Internet Wireless communication pathway between the digital network and the Internet Connection (authorized and unauthorized) of portable digital media and computing devices to the digital network Physical access (authorized and unauthorized) to the digital network (insider threat) Hardware/software supply chain (equipment from a supplier) #NPPROTGC
21
POWERED BY: Integrating the Domains Ensure the right technology, configuration maintenance and integration Ensure policies/ procedures are in place to define scope, application, use and exceptions Ensure awareness, acceptance and tech personnel required #NPPROTGC
22
POWERED BY: Social engineering is the #1 method of initiating a breach ALL of us house personally identifiable information If you don’t have the expertise… hire it! You can build better ‘mousetraps’ Pay attention to Cloud security Be aware of your supply chain Cyber Focus #NPPROTGC
23
POWERED BY: Install an Intrusion Detection System (IDS) Appoint and train a cybersecurity response team Develop a cybersecurity disaster and recovery plan Prepare for the Inevitable Prepare #NPPROTGC
24
POWERED BY: Key steps to reduce the pain of a data breach Legal issues after a data breach What to tell the media, customers, vendors How to reduce the chances of a future attack Disaster Recovery #NPPROTGC
25
POWERED BY: Assemble internal team Perform initial internal investigation Document who and how it was discovered and what might have been stolen Contact law enforcement Hire specialists Prepare for media coverage, social media Key Steps After a Data Breach #NPPROTGC
26
POWERED BY: Communicate with your customers Perform in-depth investigation Continue in-depth documentation Implement fixes Validate the fixes Enhance overall cybersecurity measures Key Steps After a Data Breach #NPPROTGC
27
POWERED BY: Document the potential scope of the attack What parts of the network were attacked? What data may have been stolen? How was the attack identified? Documentation #NPPROTGC
28
POWERED BY: Evidence Preservation View your system as a physical crime scene. Evidence must be protected and an initial investigation conducted quickly and with as little contamination as possible. Retain system, application, database, and network device logs and avoid making changes to the system suspected of being compromised before data is preserved. Investigation #NPPROTGC
29
POWERED BY: Forensic Data Collection Consult an expert to assist you in acquiring a forensic image of the hard drive and the live memory of the systems suspected of being compromised Follow the proper chain of custody procedures. The more details you can save, the better chance there is to identify the criminals. Investigation #NPPROTGC
30
POWERED BY: Expect Lawsuits Determine Notification Requirements Be prepared to share breach documentation Determine what outside help needed Legal Issues After a Data Breach #NPPROTGC
31
POWERED BY: Implement stronger security measures. It can happen to you again How to Reduce Chances of a Future Attack #NPPROTGC
32
POWERED BY: Conduct employee awareness training: Each person needs to be cautious Do role-playing with phishing examples Practice social engineering tricks so your people can identify someone trying to do it How to Reduce Chances of a Future Attack #NPPROTGC
33
POWERED BY: Create a list of key people to involve for your response to an attack: Management: Senior officers or owners IT: Employee or outsourced key contact Financial: Employee or outside bookkeeper Marketing/PR: Communications to customers, vendors, partners as well as media responses and press releases Response Planning #NPPROTGC
34
POWERED BY: Human Resources: Communications to employees and how to handle questions from customers or the media. Telecommunications: How to communicate with staff, vendors and customers if work-provided phones and email system are compromised. Response Planning #NPPROTGC
35
POWERED BY: Web and Email Security Cyber Law Requirements Social Media Data Storage End/Host Security Mobile Security Wireless Security Cloud Security Disaster Recovery and Business Continuity Planning Senior Management Responsibility Cyber Education and Training Requirements #NPPROTGC
36
POWERED BY: Know your risk from a Technical and Human standpoint Know how your information is used and stored Ensure TOTAL integrity Implement Robust password policies Have a Disaster/Recovery plan Ensure encryption on all devices Scan emails and files to prevent introduction of viruses Keep Patch management updated Ensure employee education Have and update policies Improve cyber culture within the organization Consider Cyber Insurance Recommendations and Best Practices #NPPROTGC
37
POWERED BY: Best Practices Plan Ahead Assess assets, risks, resources Build policies Choose controls Deploy controls Educate executives, employees, vendors Continually assess, audit and test #NPPROTGC
38
POWERED BY: There will be an increase in cyber attacks Small organizations will continue to be gateways Increased interconnection of organizations and clients Growing need to develop a cyber culture Future Trends #NPPROTGC
39
POWERED BY: National Cybersecurity Institute The National Cybersecurity Institute (NCI) at Excelsior College is an academic, research and training center located in Washington, D.C. Its mission is to assist government, industry, military, and academic sectors meet our cyber security challenges, with a particular focus on shaping the cyber security workforce. #NPPROTGC
40
POWERED BY: Provide training on security awareness Professional development training for cyber professionals Support research / publications conducted by leading cyber security experts Facilitate workshops to educate stakeholders on important dimensions of cyber security Present webinars to widely disseminate cutting edge policy and research Help you develop your cyber plan, risk assessment, incident response and training National Cybersecurity Institute #NPPROTGC
41
POWERED BY: Dr. Jane LeClair Chief Operating Officer National Cybersecurity Institute 2000 M St NW Suite 500 Washington, D.C. nci@excelsior.edu www.excelsior.edu Questions? #NPPROTGC
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.