SlideShare une entreprise Scribd logo
1  sur  24
Presented by Dr. Nikki Robinson
Critical Challenges and
Differences Between
the Private and Public Sectors
Agenda
Bill Gibbs
Cap Tech Talks Host
1. About Capitol Technology University
2. Session pointers
3. About the presenter
4. Presentation: Dr. Nikki Robinson
5. Q & A
6. Upcoming webinars
7. Recording, Slides, Certificate
About
Established in 1927, We are
one of the only private
Universities in the state of
Maryland specifically
dedicated to engineering,
cybersecurity, computer
sciences and tech
management.
Nonprofit, Private &
Accredited
Capitol is a nonprofit, private accredited university
located in Laurel, Maryland, USA
Capitol Technology University is
accredited by the Commission on
Higher Education of the Middle
States Association of Colleges
and Schools
The University is authorized by
the State of Maryland to confer
Associate’s (A.A.S.), Bachelor’s
(B.S.), Master’s (M.S., M.B.A.,
T.M.B.A), and Doctoral
(D.B.A.,D.Sc., Ph.D.) degrees.
Session Pointers
• We will answer questions at the conclusion of the presentation. At any
time you can post a question in the text chat and we will answer as many
as we can.
• Microphones and webcams are not activated for participants.
• A link to the recording and to the slides will be sent to all registrants and
available on our webinar web page.
• A participation certificate is available by request for both Live Session and
On Demand viewers.
Presented by Dr. Nikki Robinson
Critical Challenges and
Differences Between
the Private and Public Sectors
Dr. Nikki Robinson
• Adjunct Professor/Doctoral Chair at Capitol
Technology University
• Two earned doctorates: Doctor of Science (D.Sc.) in
Cybersecurity, and Ph.D. in Human Factors
• Bachelor’s and Master’s in IT
• Security Architect for IBM
• Teaches graduate-level courses
• CISSP, CHE, CNDA, MCITP, and CCAA
INTRODUCTION
• Security Architect, Security Innovation &
Remediation Team, IBM
• Adjunct Professor and Doctoral Chair/Mentor,
Capitol Technology University
• ICIT Fellow (2022)
• President, Infragard Maryland Chapter
• Podcast Host, Resilient Cyber Podcast
• DSc, Cybersecurity, Capitol Technology University
• PhD, Human Factors, Capitol Technology University
AGENDA
Critical Infrastructure Sectors
Public Sector vs Private Sector
Examples of Past/Current Attacks
Differences in Attack Paths
Sector-Specific Threats
Current Challenges in Public Sector
Current Challenges in Private Sector
Organizations / Standardization
What Can We Do?
CRITICAL INFRASTRUCTURE SECTORS
Nuclear Reactors,
Materials, and Waste
Chemical
Commercial
Facilities
Communications
Critical
Manufacturing
Dams Sector
Defense
Industrial Base
(DIB)
IT Sector
Emergency
Services
Energy
Financial
Services
Food and
Agriculture
Government
Facilities
Healthcare
and Public
Health
CISA/FEMA
Transportation
Systems
Water and
Wastewater
Systems
PUBLIC SECTOR VS PRIVATE SECTOR
Private
• Waste and Water
• 3M
• Defense
• Consulting
• Energy
• BGE, Exelon, etc
• Transportation
• Buses,Transit,Trains
Public
• Department of Energy
• Department of Defense
• Department of Health and Human
Services
• Department of Transportation
EXAMPLES OF
PAST/CURRENT
ATTACKS
• Past:
• Colonial Pipeline (May 2021) (ransomware)
• Florida Water Supply (Feb 2021) (remote access)
• JBS Foods (RaaS group REvil)
• 600 ICS vulnerabilities disclosed 2021
• Present:
• BlackByte Ransomware targeting CI
Reference:
https://securityboulevard.com/2021/11/cyberattack
s-in-2021-highlighted-critical-infrastructure-risks/
DIFFERENCES
IN ATTACK
PATHS
Private Sector
• Business Email Compromise (BEC)
• Phishing/Spear Phishing
• Sophisticated attacks – go for big payout
(think Sony,Yahoo,Wells Fargo)
Public Sector
• Ransomware, Ransomware, OMG
RANSOMWARE
• Phishing
• Vulnerability Chaining
• Sophisticated attacks by APT groups (think
OPM)
SECTOR-SPECIFIC
THREATS/GOALS
• Waste and Water: Upset water treatment / Deface
utility’s websites
• Transportation: Stealing information on shipments /
PII employees and partners
• Energy: Targeting utilities, nation-state actors,
cybercriminals specifically understanding economy
• IT Sector: Everything (DDoS, ransomware, malware,
APT, phishing, spear-phishing, etc)
• Nuclear: Affect facilities and operations, and
compromise command/control systems
CURRENT CHALLENGES IN PUBLIC SECTOR
Limited funding supporting cybersecurity objectives
Limited funding to update IT infrastructure and applications
Outdated and legacy systems that are supporting CI
Production systems rely on applications built 20 or 30 years ago
Migrating to the cloud presents new challenges
Lack of security knowledge with Operations Technology
CURRENT
CHALLENGES
IN PRIVATE
SECTOR
Emerging technology moving incredibly
fast (quantum computing, ML/AI)
Security frameworks outdated and
difficult to adhere to
Constant audits, security assessments,
and controls that may not apply
Vulnerability management challenges
from small to large organizations
More budget for technology, but may still
be limited for cybersecurity
COMMON THREATS
Operations
Technology
(OT)
Ransomware
(for sale/easy
to create)
Phishing
(easy/effective)
Social
Engineering
Insider Threats
Software
Supply Chain
attacks
ORGANIZATIONS /
STANDARDIZATION
DHS / CISA
• Collaboration between DHS/FBI/NSA
NIST
• Software supply chain
• NVD
MITRE
• ATT&CK
• D3FEND
Lockheed Martin
• Cyber Kill Chain
FIRST
• CVSS
WHAT CAN
WE DO?
Encourage increased collaboration between
Private and Public sectors
Encourage
Consider complexity of cybersecurity
concerns – building maturity model
Consider
How do Human Factors play into this?
Integrate HF practices into CI cybersecurity
Action
Understand how attacks differ between
sectors, helps build a risk profile
Understand
Threat intelligence/modeling integrated into
all cybersecurity programs
Threat Intel
Include security in application design and
practice – not an after thought!
Include
VULNERABILITY
MANAGEMENT
• Asset inventory
• Continuous Monitoring
• Endpoint, Detection, and Response
• Risk Management
• Configuration Management
QUESTIONS/COMMENTS?
Reach out to me on
LinkedIn
www.linkedin.com/in/dr-
nikki-robinson
REFERENCES
Reference: https://www.epa.gov/sites/default/files/2018-
06/documents/cybersecurity_guide_for_states_final_0.pdf
Reference: https://www.cm-alliance.com/cybersecurity-blog/cybersecurity-attacks-
the-transportation-industry
Reference: https://www.mckinsey.com/business-functions/risk-and-resilience/our-
insights/the-energy-sector-threat-how-to-address-cybersecurity-vulnerabilities
Reference: https://www.nti.org/about/programs-projects/project/addressing-cyber-
nuclear-security-threats/
Upcoming Webinars
Tech Career Skills
Identification &
Communication in
Writing a Resume
Connie Harrington
Apr. 14
Tips for Finding
Career Success in
Technology
Vennard Wright
May 19
Flight Test
Engineering: Trials
and Triumphs of a
Flight Test Engineer
Dr. Scott Raetzman
June 16
www.captechu.edu/webinar-series
To learn more, and to register visit:

Contenu connexe

Tendances

Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?PECB
 
The Future of Cybersecurity - October 2015
The Future of Cybersecurity - October 2015The Future of Cybersecurity - October 2015
The Future of Cybersecurity - October 2015Security Innovation
 
Risks and Security of Internet and System
Risks and Security of Internet and SystemRisks and Security of Internet and System
Risks and Security of Internet and SystemParam Nanavati
 
Critical Infrastructure and Cyber Threat
Critical Infrastructure and Cyber ThreatCritical Infrastructure and Cyber Threat
Critical Infrastructure and Cyber ThreatMotorola Solutions
 
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...WCIT 2014
 
ICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security GovernanceICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security GovernanceCharles Lim
 
Security Solutions against Computer Networks Threats
Security Solutions against Computer Networks ThreatsSecurity Solutions against Computer Networks Threats
Security Solutions against Computer Networks ThreatsEswar Publications
 
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...PECB
 
ICS Supply Chain Security: Learning from Recent Incidents and Other Sectors
ICS Supply Chain Security: Learning from Recent Incidents and Other SectorsICS Supply Chain Security: Learning from Recent Incidents and Other Sectors
ICS Supply Chain Security: Learning from Recent Incidents and Other SectorsEnergySec
 
Combating cyber crimes chinatu
Combating cyber crimes chinatuCombating cyber crimes chinatu
Combating cyber crimes chinatuChinatu Uzuegbu
 
IDC Best Practices in Private Sector Cyber Security
IDC Best Practices in Private Sector Cyber SecurityIDC Best Practices in Private Sector Cyber Security
IDC Best Practices in Private Sector Cyber Securityinside-BigData.com
 
Your cyber security webinar
Your cyber security webinarYour cyber security webinar
Your cyber security webinarEmpired
 
Thinking like a hacker - Introducing Hacker Vision
Thinking like a hacker - Introducing Hacker VisionThinking like a hacker - Introducing Hacker Vision
Thinking like a hacker - Introducing Hacker VisionPECB
 
2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurityMatthew Rosenquist
 
Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.Vertex Holdings
 

Tendances (20)

Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?
 
The Future of Cybersecurity - October 2015
The Future of Cybersecurity - October 2015The Future of Cybersecurity - October 2015
The Future of Cybersecurity - October 2015
 
Risks and Security of Internet and System
Risks and Security of Internet and SystemRisks and Security of Internet and System
Risks and Security of Internet and System
 
Critical Infrastructure and Cyber Threat
Critical Infrastructure and Cyber ThreatCritical Infrastructure and Cyber Threat
Critical Infrastructure and Cyber Threat
 
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
 
ICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security GovernanceICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security Governance
 
The red book
The red book  The red book
The red book
 
A Strategy for Addressing Cyber Security Challenges
A Strategy for Addressing Cyber Security Challenges A Strategy for Addressing Cyber Security Challenges
A Strategy for Addressing Cyber Security Challenges
 
Security Solutions against Computer Networks Threats
Security Solutions against Computer Networks ThreatsSecurity Solutions against Computer Networks Threats
Security Solutions against Computer Networks Threats
 
Kristina Tanasichuk: Presentation of GTSC/InfraGard Cyber Survey
Kristina Tanasichuk: Presentation of GTSC/InfraGard Cyber SurveyKristina Tanasichuk: Presentation of GTSC/InfraGard Cyber Survey
Kristina Tanasichuk: Presentation of GTSC/InfraGard Cyber Survey
 
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
 
ICS Supply Chain Security: Learning from Recent Incidents and Other Sectors
ICS Supply Chain Security: Learning from Recent Incidents and Other SectorsICS Supply Chain Security: Learning from Recent Incidents and Other Sectors
ICS Supply Chain Security: Learning from Recent Incidents and Other Sectors
 
Combating cyber crimes chinatu
Combating cyber crimes chinatuCombating cyber crimes chinatu
Combating cyber crimes chinatu
 
IDC Best Practices in Private Sector Cyber Security
IDC Best Practices in Private Sector Cyber SecurityIDC Best Practices in Private Sector Cyber Security
IDC Best Practices in Private Sector Cyber Security
 
Your cyber security webinar
Your cyber security webinarYour cyber security webinar
Your cyber security webinar
 
Presentación AMIB Los Cabos
Presentación AMIB Los CabosPresentación AMIB Los Cabos
Presentación AMIB Los Cabos
 
Thinking like a hacker - Introducing Hacker Vision
Thinking like a hacker - Introducing Hacker VisionThinking like a hacker - Introducing Hacker Vision
Thinking like a hacker - Introducing Hacker Vision
 
2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity
 
Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.
 
Data Safety And Security
Data Safety And SecurityData Safety And Security
Data Safety And Security
 

Similaire à Webinar slides march 2022 nikki robinson

CapTech Talks Webinar May 2023 Kimberly Mentzell Slides.pptx
CapTech Talks Webinar May 2023 Kimberly Mentzell  Slides.pptxCapTech Talks Webinar May 2023 Kimberly Mentzell  Slides.pptx
CapTech Talks Webinar May 2023 Kimberly Mentzell Slides.pptxCapitolTechU
 
Steve Luczynski Mitigating Aviation Cyber Risk
Steve Luczynski  Mitigating Aviation Cyber RiskSteve Luczynski  Mitigating Aviation Cyber Risk
Steve Luczynski Mitigating Aviation Cyber RiskCapitolTechU
 
Slides CapTechTalks Webinar April 2024 Ilia Kolochenko.pptx
Slides CapTechTalks Webinar April 2024 Ilia Kolochenko.pptxSlides CapTechTalks Webinar April 2024 Ilia Kolochenko.pptx
Slides CapTechTalks Webinar April 2024 Ilia Kolochenko.pptxCapitolTechU
 
What to expect at the 2015 Information Assurance for Forum
What to expect at the 2015 Information Assurance for ForumWhat to expect at the 2015 Information Assurance for Forum
What to expect at the 2015 Information Assurance for ForumCentraComm
 
Power Plants Security Webinar Presentation
Power Plants Security Webinar PresentationPower Plants Security Webinar Presentation
Power Plants Security Webinar PresentationCertrec
 
Industrial Control Security USA Sacramento California Oct 6/7
Industrial Control Security USA Sacramento California Oct 6/7Industrial Control Security USA Sacramento California Oct 6/7
Industrial Control Security USA Sacramento California Oct 6/7James Nesbitt
 
Charleston R!OT IoT Applications for Defense Workshop
Charleston R!OT IoT Applications for Defense WorkshopCharleston R!OT IoT Applications for Defense Workshop
Charleston R!OT IoT Applications for Defense WorkshopJoseph Hirl
 
March cybersecurity powerpoint
March cybersecurity powerpointMarch cybersecurity powerpoint
March cybersecurity powerpointCourtney King
 
Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to CybersecurityKrutarth Vasavada
 
Cyber Security in Manufacturing
Cyber Security in ManufacturingCyber Security in Manufacturing
Cyber Security in ManufacturingCentraComm
 
Top Cyber News MAGAZINE. Dr. Bradford L. Sims. Capitol Technology University
Top Cyber News MAGAZINE. Dr. Bradford L. Sims. Capitol Technology UniversityTop Cyber News MAGAZINE. Dr. Bradford L. Sims. Capitol Technology University
Top Cyber News MAGAZINE. Dr. Bradford L. Sims. Capitol Technology UniversityTopCyberNewsMAGAZINE
 
2019 NCLGISA Spring Cybersecurity Threats & Trends: Blended Threats and Smart...
2019 NCLGISA Spring Cybersecurity Threats & Trends: Blended Threats and Smart...2019 NCLGISA Spring Cybersecurity Threats & Trends: Blended Threats and Smart...
2019 NCLGISA Spring Cybersecurity Threats & Trends: Blended Threats and Smart...Internetwork Engineering (IE)
 
Staying Ahead of the Race - Quantum computing in Cybersecurity
Staying Ahead of the Race - Quantum computing in Cybersecurity Staying Ahead of the Race - Quantum computing in Cybersecurity
Staying Ahead of the Race - Quantum computing in Cybersecurity Lilminow
 
Security in IT (data and cyber security)
Security in IT (data and cyber security)Security in IT (data and cyber security)
Security in IT (data and cyber security)Rohana K Amarakoon
 
Opening Keynote - Cybersecurity Summit 2018
Opening Keynote - Cybersecurity Summit 2018Opening Keynote - Cybersecurity Summit 2018
Opening Keynote - Cybersecurity Summit 2018aztechcouncil
 
security in it (data and cyber security)
security in it (data and cyber security)security in it (data and cyber security)
security in it (data and cyber security)Rohana K Amarakoon
 
CapTech Talks Webinar October 2023 Bill Butler.pptx
CapTech Talks Webinar October 2023 Bill Butler.pptxCapTech Talks Webinar October 2023 Bill Butler.pptx
CapTech Talks Webinar October 2023 Bill Butler.pptxCapitolTechU
 
CapTechU Doctoral Info Session Oct 2022.pptx
CapTechU Doctoral Info Session Oct 2022.pptxCapTechU Doctoral Info Session Oct 2022.pptx
CapTechU Doctoral Info Session Oct 2022.pptxCapitolTechU
 

Similaire à Webinar slides march 2022 nikki robinson (20)

CapTech Talks Webinar May 2023 Kimberly Mentzell Slides.pptx
CapTech Talks Webinar May 2023 Kimberly Mentzell  Slides.pptxCapTech Talks Webinar May 2023 Kimberly Mentzell  Slides.pptx
CapTech Talks Webinar May 2023 Kimberly Mentzell Slides.pptx
 
Steve Luczynski Mitigating Aviation Cyber Risk
Steve Luczynski  Mitigating Aviation Cyber RiskSteve Luczynski  Mitigating Aviation Cyber Risk
Steve Luczynski Mitigating Aviation Cyber Risk
 
Slides CapTechTalks Webinar April 2024 Ilia Kolochenko.pptx
Slides CapTechTalks Webinar April 2024 Ilia Kolochenko.pptxSlides CapTechTalks Webinar April 2024 Ilia Kolochenko.pptx
Slides CapTechTalks Webinar April 2024 Ilia Kolochenko.pptx
 
2019 Cyber Security Trends
2019 Cyber Security Trends2019 Cyber Security Trends
2019 Cyber Security Trends
 
What to expect at the 2015 Information Assurance for Forum
What to expect at the 2015 Information Assurance for ForumWhat to expect at the 2015 Information Assurance for Forum
What to expect at the 2015 Information Assurance for Forum
 
Power Plants Security Webinar Presentation
Power Plants Security Webinar PresentationPower Plants Security Webinar Presentation
Power Plants Security Webinar Presentation
 
Industrial Control Security USA Sacramento California Oct 6/7
Industrial Control Security USA Sacramento California Oct 6/7Industrial Control Security USA Sacramento California Oct 6/7
Industrial Control Security USA Sacramento California Oct 6/7
 
Charleston R!OT IoT Applications for Defense Workshop
Charleston R!OT IoT Applications for Defense WorkshopCharleston R!OT IoT Applications for Defense Workshop
Charleston R!OT IoT Applications for Defense Workshop
 
March cybersecurity powerpoint
March cybersecurity powerpointMarch cybersecurity powerpoint
March cybersecurity powerpoint
 
Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to Cybersecurity
 
Cyber Security in Manufacturing
Cyber Security in ManufacturingCyber Security in Manufacturing
Cyber Security in Manufacturing
 
Top Cyber News MAGAZINE. Dr. Bradford L. Sims. Capitol Technology University
Top Cyber News MAGAZINE. Dr. Bradford L. Sims. Capitol Technology UniversityTop Cyber News MAGAZINE. Dr. Bradford L. Sims. Capitol Technology University
Top Cyber News MAGAZINE. Dr. Bradford L. Sims. Capitol Technology University
 
2019 NCLGISA Spring Cybersecurity Threats & Trends: Blended Threats and Smart...
2019 NCLGISA Spring Cybersecurity Threats & Trends: Blended Threats and Smart...2019 NCLGISA Spring Cybersecurity Threats & Trends: Blended Threats and Smart...
2019 NCLGISA Spring Cybersecurity Threats & Trends: Blended Threats and Smart...
 
Federal IT Initiatives - BDPA Conference Executive Panel
Federal IT Initiatives - BDPA Conference Executive PanelFederal IT Initiatives - BDPA Conference Executive Panel
Federal IT Initiatives - BDPA Conference Executive Panel
 
Staying Ahead of the Race - Quantum computing in Cybersecurity
Staying Ahead of the Race - Quantum computing in Cybersecurity Staying Ahead of the Race - Quantum computing in Cybersecurity
Staying Ahead of the Race - Quantum computing in Cybersecurity
 
Security in IT (data and cyber security)
Security in IT (data and cyber security)Security in IT (data and cyber security)
Security in IT (data and cyber security)
 
Opening Keynote - Cybersecurity Summit 2018
Opening Keynote - Cybersecurity Summit 2018Opening Keynote - Cybersecurity Summit 2018
Opening Keynote - Cybersecurity Summit 2018
 
security in it (data and cyber security)
security in it (data and cyber security)security in it (data and cyber security)
security in it (data and cyber security)
 
CapTech Talks Webinar October 2023 Bill Butler.pptx
CapTech Talks Webinar October 2023 Bill Butler.pptxCapTech Talks Webinar October 2023 Bill Butler.pptx
CapTech Talks Webinar October 2023 Bill Butler.pptx
 
CapTechU Doctoral Info Session Oct 2022.pptx
CapTechU Doctoral Info Session Oct 2022.pptxCapTechU Doctoral Info Session Oct 2022.pptx
CapTechU Doctoral Info Session Oct 2022.pptx
 

Plus de CapitolTechU

CapTechU Masters Presentation April 2024.pptx
CapTechU Masters Presentation April 2024.pptxCapTechU Masters Presentation April 2024.pptx
CapTechU Masters Presentation April 2024.pptxCapitolTechU
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
CapTechU Masters Info Session March 2024.pptx
CapTechU Masters Info Session March 2024.pptxCapTechU Masters Info Session March 2024.pptx
CapTechU Masters Info Session March 2024.pptxCapitolTechU
 
Slides CapTechTalks Webinar March 2024 Joshua Sinai.pptx
Slides CapTechTalks Webinar March 2024 Joshua Sinai.pptxSlides CapTechTalks Webinar March 2024 Joshua Sinai.pptx
Slides CapTechTalks Webinar March 2024 Joshua Sinai.pptxCapitolTechU
 
CapTechU Doctoral Presentation -March 2024 slides.pptx
CapTechU Doctoral Presentation -March 2024 slides.pptxCapTechU Doctoral Presentation -March 2024 slides.pptx
CapTechU Doctoral Presentation -March 2024 slides.pptxCapitolTechU
 
Masters Presentation - February 2024.pptx
Masters Presentation - February  2024.pptxMasters Presentation - February  2024.pptx
Masters Presentation - February 2024.pptxCapitolTechU
 
Capitol Doctoral Presentation -Feb 2024.pptx
Capitol Doctoral Presentation -Feb 2024.pptxCapitol Doctoral Presentation -Feb 2024.pptx
Capitol Doctoral Presentation -Feb 2024.pptxCapitolTechU
 
CapTechTalks Webinar Feb 2024 Darrell Burrell.pptx
CapTechTalks Webinar Feb 2024 Darrell Burrell.pptxCapTechTalks Webinar Feb 2024 Darrell Burrell.pptx
CapTechTalks Webinar Feb 2024 Darrell Burrell.pptxCapitolTechU
 
Masters Presentation - January 2024.pptx
Masters Presentation - January 2024.pptxMasters Presentation - January 2024.pptx
Masters Presentation - January 2024.pptxCapitolTechU
 
Capitol Tech U Doctoral Presentation -Jan 2024
Capitol Tech U Doctoral Presentation -Jan 2024Capitol Tech U Doctoral Presentation -Jan 2024
Capitol Tech U Doctoral Presentation -Jan 2024CapitolTechU
 
CapTech Talks Webinar December 2023 Diane Janosek.pptx
CapTech Talks Webinar December 2023 Diane Janosek.pptxCapTech Talks Webinar December 2023 Diane Janosek.pptx
CapTech Talks Webinar December 2023 Diane Janosek.pptxCapitolTechU
 
CapTech Talks Webinar November 2023 Tom Vazdar slides.pptx
CapTech Talks Webinar November 2023 Tom Vazdar slides.pptxCapTech Talks Webinar November 2023 Tom Vazdar slides.pptx
CapTech Talks Webinar November 2023 Tom Vazdar slides.pptxCapitolTechU
 
Masters Presentation - November 2023
Masters Presentation - November 2023 Masters Presentation - November 2023
Masters Presentation - November 2023 CapitolTechU
 
Doctoral Presentation -Nov 2023.pptx
Doctoral Presentation -Nov 2023.pptxDoctoral Presentation -Nov 2023.pptx
Doctoral Presentation -Nov 2023.pptxCapitolTechU
 
Clean Air Force EC- Board MeetingSlides Nov 1 2023.pptx
Clean Air Force EC- Board MeetingSlides Nov 1 2023.pptxClean Air Force EC- Board MeetingSlides Nov 1 2023.pptx
Clean Air Force EC- Board MeetingSlides Nov 1 2023.pptxCapitolTechU
 
CapTechU Masters Presentation October 2023.pptx
CapTechU Masters Presentation October 2023.pptxCapTechU Masters Presentation October 2023.pptx
CapTechU Masters Presentation October 2023.pptxCapitolTechU
 
Doctoral Presentation -October 2023.pptx
Doctoral Presentation -October 2023.pptxDoctoral Presentation -October 2023.pptx
Doctoral Presentation -October 2023.pptxCapitolTechU
 
Capitol Masters Info Session Sept 2023
Capitol Masters Info Session Sept 2023Capitol Masters Info Session Sept 2023
Capitol Masters Info Session Sept 2023CapitolTechU
 
Capitol Doctoral Presentation -Sept 2023.pptx
Capitol Doctoral Presentation -Sept 2023.pptxCapitol Doctoral Presentation -Sept 2023.pptx
Capitol Doctoral Presentation -Sept 2023.pptxCapitolTechU
 
CapTechU Masters Virtual Open House - August 2023.pptx
CapTechU Masters Virtual Open House - August 2023.pptxCapTechU Masters Virtual Open House - August 2023.pptx
CapTechU Masters Virtual Open House - August 2023.pptxCapitolTechU
 

Plus de CapitolTechU (20)

CapTechU Masters Presentation April 2024.pptx
CapTechU Masters Presentation April 2024.pptxCapTechU Masters Presentation April 2024.pptx
CapTechU Masters Presentation April 2024.pptx
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
CapTechU Masters Info Session March 2024.pptx
CapTechU Masters Info Session March 2024.pptxCapTechU Masters Info Session March 2024.pptx
CapTechU Masters Info Session March 2024.pptx
 
Slides CapTechTalks Webinar March 2024 Joshua Sinai.pptx
Slides CapTechTalks Webinar March 2024 Joshua Sinai.pptxSlides CapTechTalks Webinar March 2024 Joshua Sinai.pptx
Slides CapTechTalks Webinar March 2024 Joshua Sinai.pptx
 
CapTechU Doctoral Presentation -March 2024 slides.pptx
CapTechU Doctoral Presentation -March 2024 slides.pptxCapTechU Doctoral Presentation -March 2024 slides.pptx
CapTechU Doctoral Presentation -March 2024 slides.pptx
 
Masters Presentation - February 2024.pptx
Masters Presentation - February  2024.pptxMasters Presentation - February  2024.pptx
Masters Presentation - February 2024.pptx
 
Capitol Doctoral Presentation -Feb 2024.pptx
Capitol Doctoral Presentation -Feb 2024.pptxCapitol Doctoral Presentation -Feb 2024.pptx
Capitol Doctoral Presentation -Feb 2024.pptx
 
CapTechTalks Webinar Feb 2024 Darrell Burrell.pptx
CapTechTalks Webinar Feb 2024 Darrell Burrell.pptxCapTechTalks Webinar Feb 2024 Darrell Burrell.pptx
CapTechTalks Webinar Feb 2024 Darrell Burrell.pptx
 
Masters Presentation - January 2024.pptx
Masters Presentation - January 2024.pptxMasters Presentation - January 2024.pptx
Masters Presentation - January 2024.pptx
 
Capitol Tech U Doctoral Presentation -Jan 2024
Capitol Tech U Doctoral Presentation -Jan 2024Capitol Tech U Doctoral Presentation -Jan 2024
Capitol Tech U Doctoral Presentation -Jan 2024
 
CapTech Talks Webinar December 2023 Diane Janosek.pptx
CapTech Talks Webinar December 2023 Diane Janosek.pptxCapTech Talks Webinar December 2023 Diane Janosek.pptx
CapTech Talks Webinar December 2023 Diane Janosek.pptx
 
CapTech Talks Webinar November 2023 Tom Vazdar slides.pptx
CapTech Talks Webinar November 2023 Tom Vazdar slides.pptxCapTech Talks Webinar November 2023 Tom Vazdar slides.pptx
CapTech Talks Webinar November 2023 Tom Vazdar slides.pptx
 
Masters Presentation - November 2023
Masters Presentation - November 2023 Masters Presentation - November 2023
Masters Presentation - November 2023
 
Doctoral Presentation -Nov 2023.pptx
Doctoral Presentation -Nov 2023.pptxDoctoral Presentation -Nov 2023.pptx
Doctoral Presentation -Nov 2023.pptx
 
Clean Air Force EC- Board MeetingSlides Nov 1 2023.pptx
Clean Air Force EC- Board MeetingSlides Nov 1 2023.pptxClean Air Force EC- Board MeetingSlides Nov 1 2023.pptx
Clean Air Force EC- Board MeetingSlides Nov 1 2023.pptx
 
CapTechU Masters Presentation October 2023.pptx
CapTechU Masters Presentation October 2023.pptxCapTechU Masters Presentation October 2023.pptx
CapTechU Masters Presentation October 2023.pptx
 
Doctoral Presentation -October 2023.pptx
Doctoral Presentation -October 2023.pptxDoctoral Presentation -October 2023.pptx
Doctoral Presentation -October 2023.pptx
 
Capitol Masters Info Session Sept 2023
Capitol Masters Info Session Sept 2023Capitol Masters Info Session Sept 2023
Capitol Masters Info Session Sept 2023
 
Capitol Doctoral Presentation -Sept 2023.pptx
Capitol Doctoral Presentation -Sept 2023.pptxCapitol Doctoral Presentation -Sept 2023.pptx
Capitol Doctoral Presentation -Sept 2023.pptx
 
CapTechU Masters Virtual Open House - August 2023.pptx
CapTechU Masters Virtual Open House - August 2023.pptxCapTechU Masters Virtual Open House - August 2023.pptx
CapTechU Masters Virtual Open House - August 2023.pptx
 

Dernier

Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxShobhayan Kirtania
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 

Dernier (20)

Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptx
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 

Webinar slides march 2022 nikki robinson

  • 1. Presented by Dr. Nikki Robinson Critical Challenges and Differences Between the Private and Public Sectors
  • 2. Agenda Bill Gibbs Cap Tech Talks Host 1. About Capitol Technology University 2. Session pointers 3. About the presenter 4. Presentation: Dr. Nikki Robinson 5. Q & A 6. Upcoming webinars 7. Recording, Slides, Certificate
  • 3. About Established in 1927, We are one of the only private Universities in the state of Maryland specifically dedicated to engineering, cybersecurity, computer sciences and tech management.
  • 4. Nonprofit, Private & Accredited Capitol is a nonprofit, private accredited university located in Laurel, Maryland, USA Capitol Technology University is accredited by the Commission on Higher Education of the Middle States Association of Colleges and Schools The University is authorized by the State of Maryland to confer Associate’s (A.A.S.), Bachelor’s (B.S.), Master’s (M.S., M.B.A., T.M.B.A), and Doctoral (D.B.A.,D.Sc., Ph.D.) degrees.
  • 5. Session Pointers • We will answer questions at the conclusion of the presentation. At any time you can post a question in the text chat and we will answer as many as we can. • Microphones and webcams are not activated for participants. • A link to the recording and to the slides will be sent to all registrants and available on our webinar web page. • A participation certificate is available by request for both Live Session and On Demand viewers.
  • 6. Presented by Dr. Nikki Robinson Critical Challenges and Differences Between the Private and Public Sectors
  • 7. Dr. Nikki Robinson • Adjunct Professor/Doctoral Chair at Capitol Technology University • Two earned doctorates: Doctor of Science (D.Sc.) in Cybersecurity, and Ph.D. in Human Factors • Bachelor’s and Master’s in IT • Security Architect for IBM • Teaches graduate-level courses • CISSP, CHE, CNDA, MCITP, and CCAA
  • 8. INTRODUCTION • Security Architect, Security Innovation & Remediation Team, IBM • Adjunct Professor and Doctoral Chair/Mentor, Capitol Technology University • ICIT Fellow (2022) • President, Infragard Maryland Chapter • Podcast Host, Resilient Cyber Podcast • DSc, Cybersecurity, Capitol Technology University • PhD, Human Factors, Capitol Technology University
  • 9. AGENDA Critical Infrastructure Sectors Public Sector vs Private Sector Examples of Past/Current Attacks Differences in Attack Paths Sector-Specific Threats Current Challenges in Public Sector Current Challenges in Private Sector Organizations / Standardization What Can We Do?
  • 10. CRITICAL INFRASTRUCTURE SECTORS Nuclear Reactors, Materials, and Waste Chemical Commercial Facilities Communications Critical Manufacturing Dams Sector Defense Industrial Base (DIB) IT Sector Emergency Services Energy Financial Services Food and Agriculture Government Facilities Healthcare and Public Health CISA/FEMA Transportation Systems Water and Wastewater Systems
  • 11. PUBLIC SECTOR VS PRIVATE SECTOR Private • Waste and Water • 3M • Defense • Consulting • Energy • BGE, Exelon, etc • Transportation • Buses,Transit,Trains Public • Department of Energy • Department of Defense • Department of Health and Human Services • Department of Transportation
  • 12. EXAMPLES OF PAST/CURRENT ATTACKS • Past: • Colonial Pipeline (May 2021) (ransomware) • Florida Water Supply (Feb 2021) (remote access) • JBS Foods (RaaS group REvil) • 600 ICS vulnerabilities disclosed 2021 • Present: • BlackByte Ransomware targeting CI Reference: https://securityboulevard.com/2021/11/cyberattack s-in-2021-highlighted-critical-infrastructure-risks/
  • 13. DIFFERENCES IN ATTACK PATHS Private Sector • Business Email Compromise (BEC) • Phishing/Spear Phishing • Sophisticated attacks – go for big payout (think Sony,Yahoo,Wells Fargo) Public Sector • Ransomware, Ransomware, OMG RANSOMWARE • Phishing • Vulnerability Chaining • Sophisticated attacks by APT groups (think OPM)
  • 14. SECTOR-SPECIFIC THREATS/GOALS • Waste and Water: Upset water treatment / Deface utility’s websites • Transportation: Stealing information on shipments / PII employees and partners • Energy: Targeting utilities, nation-state actors, cybercriminals specifically understanding economy • IT Sector: Everything (DDoS, ransomware, malware, APT, phishing, spear-phishing, etc) • Nuclear: Affect facilities and operations, and compromise command/control systems
  • 15. CURRENT CHALLENGES IN PUBLIC SECTOR Limited funding supporting cybersecurity objectives Limited funding to update IT infrastructure and applications Outdated and legacy systems that are supporting CI Production systems rely on applications built 20 or 30 years ago Migrating to the cloud presents new challenges Lack of security knowledge with Operations Technology
  • 16. CURRENT CHALLENGES IN PRIVATE SECTOR Emerging technology moving incredibly fast (quantum computing, ML/AI) Security frameworks outdated and difficult to adhere to Constant audits, security assessments, and controls that may not apply Vulnerability management challenges from small to large organizations More budget for technology, but may still be limited for cybersecurity
  • 17. COMMON THREATS Operations Technology (OT) Ransomware (for sale/easy to create) Phishing (easy/effective) Social Engineering Insider Threats Software Supply Chain attacks
  • 18. ORGANIZATIONS / STANDARDIZATION DHS / CISA • Collaboration between DHS/FBI/NSA NIST • Software supply chain • NVD MITRE • ATT&CK • D3FEND Lockheed Martin • Cyber Kill Chain FIRST • CVSS
  • 19. WHAT CAN WE DO? Encourage increased collaboration between Private and Public sectors Encourage Consider complexity of cybersecurity concerns – building maturity model Consider How do Human Factors play into this? Integrate HF practices into CI cybersecurity Action Understand how attacks differ between sectors, helps build a risk profile Understand Threat intelligence/modeling integrated into all cybersecurity programs Threat Intel Include security in application design and practice – not an after thought! Include
  • 20. VULNERABILITY MANAGEMENT • Asset inventory • Continuous Monitoring • Endpoint, Detection, and Response • Risk Management • Configuration Management
  • 21. QUESTIONS/COMMENTS? Reach out to me on LinkedIn www.linkedin.com/in/dr- nikki-robinson
  • 22. REFERENCES Reference: https://www.epa.gov/sites/default/files/2018- 06/documents/cybersecurity_guide_for_states_final_0.pdf Reference: https://www.cm-alliance.com/cybersecurity-blog/cybersecurity-attacks- the-transportation-industry Reference: https://www.mckinsey.com/business-functions/risk-and-resilience/our- insights/the-energy-sector-threat-how-to-address-cybersecurity-vulnerabilities Reference: https://www.nti.org/about/programs-projects/project/addressing-cyber- nuclear-security-threats/
  • 23. Upcoming Webinars Tech Career Skills Identification & Communication in Writing a Resume Connie Harrington Apr. 14 Tips for Finding Career Success in Technology Vennard Wright May 19 Flight Test Engineering: Trials and Triumphs of a Flight Test Engineer Dr. Scott Raetzman June 16