Download presentation
Presentation is loading. Please wait.
Published byMelvyn Sims Modified over 9 years ago
1
The First Step in Cybersecurity
2
Past Threats and Incident of Cybersecurity 76 % of organizations polled by CompTIA said they experienced them [a cybersecurity attack] in 2011 Victims: Google, TJX Companies, Target, LinkedIn, RSA Security, US Senate, and the CIA Port of Antwerp – Drug traffickers recruited hackers to breach IT systems that controlled the movement and location of containers. – Two companies that operated within the port. – Installed firewall and still managed to install keyloggers – http://www.bbc.com/news/world-europe-24539417 http://www.bbc.com/news/world-europe-24539417
3
Methods of infiltration Resident/Partner Companies Remote Hacking Vendor Applications Network Enabled Hardware Social Networking BYOD Physical Access
4
Compliance Initiatives Port Specific Compliance – President Issued Executive Order 13636 – NIST Framework Released in February 2014 Industry Compliance: – HIPAA ACT – HITECH ACT – GLBA – Sarbanes-Oxley – Telecommunications Act of 1996
5
Identify
8
Protect
11
Detect
13
Respond and Recover
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.