SlideShare a Scribd company logo
1 of 24
Download to read offline
UNDER ATTACK: Preparing
your Company in the Age of
the Hacker!
April 8, 2021 | C-Suite Snacks Webinar Series
Welcome &
Introduction
MICHAEL CAMACHO, CPA, CIA
Partner, Technology, Risk Advisory & Cybersecurity (TRAC) Practice
Citrin Cooperman
mcamacho@citrincooperman.com
401-742-0478
AGENDA
B r each Stats an d F acts
01
FAQs an d R eal -L i fe Exam pl es 02
B e Pr ep ar ed . B e Ver y Pr ep ar ed ! 03
Qu esti o ns? 04
On the Brink:
Age of the Hackers!
“Cybercrime is the greatest threat to
every company in the world.”
-Ginni Rometty, IBM Chairman,President& CEO
“77% of organizations do not have an
incident response plan.”
-Cybint
Breach Stats – The Facts
Global Average Cost per
Breach: $3.86M
Average Cost per Record
Compromised: $146
43% of Cyber Attacks Target
Small Businesses
91% of Breaches are the
Result of Phishing Attacks
Average cost of a breach is
39.6% higher if a company is
not prepared
Average Days to Detect a
Breach: 207
Average Days to Contain a
Breach: 73
Sources: Ponemon Institute/IBM Cost of a Data Breach Report -2020 & Verizon 2020 Data Breach Investigation Report
And the Threat Continues…
Since COVID-19, the FBI
reported a 300% increase in
Cybercrimes
(IMC Grupo)
Remote workers have caused
a security breach in 20% of
organizations
(Malwarebytes)
9.7 Million healthcare records
were compromised in
September 2020 alone
Data breaches in healthcare
industry up 58% in 2020
Approximately $6 trillion is
expected to be spent globally
on cybersecurity by 2021
(Cybersecurity Ventures)
Average ransomware
payment rose 33% in 2020
over 2019, to $111,605
(Fintech News)
Remote Workforce Stats
78% of CEOs agree remote
collaboration is here to stay
86% of users have never
updated their home router’s
firmware
20% of organizations have
experienced a breach as a
result of remote work
92% of all businesses store
data in the cloud
Average cost of downtime is
$11,600 per minute
Once More into the Breach
• Hackers are industry agnostic
• COVID-19increased the likelihood of a data
breach at a time when companies are ill-
equipped to deal with the repercussions
• WFH distractions combined with 18,000,000
spear-phishing emails per day is creating a
perfectstorm
• The recessioncreated by COVID-19makes it
more difficultfor companies to recoverfrom an
attack
Incidents/Breaches TRAC has been involved with by year:
• Compared to 3 in 2017 and 2018 combined
• 17 in 2019
• 19 in 2020
• 4 to date in 2021
Breaches are more sophisticated, on a large scale, and
have greater impact
Average business downtime during a breach:
• One to two weeks (longest just over a month)
Average cost of breach response:
• Incident/breach response for small business range from $10,000 -
$100,000+
• Exponentially higher for downtime, legal fees, tech expenditures,
etc.
TRAC Experience
FAQ: Why Now?
IMPACT OF COVID-19
• Focus switchedto remote workforce and ensuring connectivity and sustained operations
▪ VPN networks setup “in a rush” to allow employeesto work from home – little
enhancement since
▪ Vulnerabilities from the usage of unsecured personal computers and home networks
▪ A remote workforce can make it more difficultfor IT staff to monitor and contain threats
▪ Potential distractions increase likelihood of successfulspear-phishing and malware
attacks
▪ Pandemic fatigue setting in with blurred lines between work and home
• IT Departments Trading Security for Convenience
▪ Free pass on password security
▪ Increased use of mobile devices and IoT
▪ Privacy concerns (e.g., Family, Amazon Echo, Unsecured video conferencing,Ad hoc
remote access)
▪ More focus on remote employeesreducing time for monitoring
FAQ: How?
•Accounts for morethan 80% of all reported incidents
•Primarily driven by malwaredelivered by email
•Increased sophistication of attacks making them
harder to identify
•Employees aren’t sufficiently trained to identify
Phishing
•95% of all breaches aredue to human error
•Increased useof mobile devices for business use,
plus
•1 in 36 mobile devices havehigh risk apps installed
Human Error
• Deficient security policies
• Over 60% of companies have over 500 accounts with
non-expiring password
• Lack of log monitoring / detection controls
Lack of Effective IT
Policies and
Monitoring
TRAC Experience - Cyber Threat
Landscape
Office 365 Exploit Morphs into
an Internal Control Deficiency
The Quiet Observer
A Phishing Tale
Seek and Destroy
“I Can’t Believe I Clicked It
…Again”
The Weakest Link
COMMON THEMES:
• Almost all of the breaches were avoidable
▪ Log Reviews
▪ Automated Tools
▪ Employee Education
STEP 1: UNDERSTAND THE DIFFERENCE BETWEEN
A SECURITY INCIDENT AND A BREACH:
• SECURITY INCIDENT: An event that leads to a violation
of an organization’s security policies and puts sensitive
data at risk of exposure.
• Examples: Malware infection, destructive attacks,
loss or theft of equipment
• DATA BREACH: A security incident that results in
unauthorized access to data.
in the Hacker’s Playground
Preparing Your Company
• Each event has differentrequirements
• Important to understanddifferent
definitions by industry and state
in the Hacker’s Playground
Preparing Your Company
STEP 2: PREPARE A PLAN FOR RESPONDING TO
ALL SECURITY INCIDENTS:
• Incident Identification & Response:
▪ Resources - Who do you contact first?
▪ Roles and Responsibilities
▪ Don’t forget third-party providers
• Detection and Analysis
• Containment, Eradication and Recovery
• Incident/ Breach Communications
• Remediation & Post Incident Activities
• Plan should be comprehensive& inclusive
• Plan should be tested
in the Hacker’s Playground
STEP 3: PERIODICALLY TEST AND RE-EVALUATE
YOUR PLAN
• Ensure all team members understand the plan
▪ Approach and timing can make the difference
between a successful and unsuccessful response
• Perform table-top test of Incident Response Plan:
▪ An Untested Plan Can Lead to Unidentified Risks
• Review plan annually
▪ Solutions that were good a year ago may no
longer be viable
Preparing Your Company
UNDERSTAND YOUR RISK BE PROACTIVE
Where Do I Start?
UNDERSTAND YOUR RISK BE PROACTIVE
Where Do I Start?
6
Vulnerability Management Services
• Simulated “Bad-guy”
• Testyour network and system controls beforethe Hackers do
• Search for vulnerabilities which can allow forpotential attack
vectors (penetration testing and vulnerability assessments)
• Average rate per hour: $150 - $300
• Incidentor breach response:
▪ Detection,forensics and analysis
▪ Containment, eradication and recovery
▪ Postincident remediation
▪ Average rate per hour: $350 - $500+
CyberSecure
EASE YOUR MIND WITH CYBERSECURE:
• No cost incident response engagement letter with
terms, conditions and rates to expedite incident
response times
• 24/7/365 incident response team at your service
• Discount on standard rates if paired with a SCORE
Report, Penetration/Phishing Tests, or vCISO
Services
▪ Being aware of your environment pre-incident
will reduce response time
Questions?
MICHAEL CAMACHO, CPA, CIA
Partner, Technology, Risk Advisory & Cybersecurity
(TRAC) Practice
Citrin Cooperman
mcamacho@citrincooperman.com
401-742-0478
Thank You
F or W at c hi ng & Li s t eni ng
UPCOMING C-SUITE SNACKS WEBINARS:
CONTAINING COSTS AND WINNING THE TALENT WAR: BEST PRACTICES ON
MANAGING EMPLOYEE BENEFITS
April 15, 2021 | 12:00 PM ET/9:00 AM PT
Featuring: Shaun Gagnon, Partner at Camlife
REDUCING RISK AND COST IN THE GLOBAL SUPPLYCHAIN
April 22, 2021 | 12:00 PM ET/9:00 AM PT
Featuring: John Giordano, Partner, and Tom Cook, CEO of Blue Tiger International

More Related Content

What's hot

NFP Speak: COVID-19 Webinar Series - Part 3 - IT & Cybersecurity Risk Awareness
NFP Speak: COVID-19 Webinar Series - Part 3 - IT & Cybersecurity Risk AwarenessNFP Speak: COVID-19 Webinar Series - Part 3 - IT & Cybersecurity Risk Awareness
NFP Speak: COVID-19 Webinar Series - Part 3 - IT & Cybersecurity Risk AwarenessCitrin Cooperman
 
Top 10 leading fraud detection and prevention solution providers
Top 10 leading fraud detection and prevention solution providersTop 10 leading fraud detection and prevention solution providers
Top 10 leading fraud detection and prevention solution providersMerry D'souza
 
Not-For-Profit Risks in the COVID-19 Environment
Not-For-Profit Risks in the COVID-19 EnvironmentNot-For-Profit Risks in the COVID-19 Environment
Not-For-Profit Risks in the COVID-19 EnvironmentCitrin Cooperman
 
FireEye Cyber Defense Summit 2016 Now What - Before & After The Breach
FireEye Cyber Defense Summit 2016 Now What - Before & After The BreachFireEye Cyber Defense Summit 2016 Now What - Before & After The Breach
FireEye Cyber Defense Summit 2016 Now What - Before & After The BreachFireEye, Inc.
 
Navigating COVID's Impact on the Financial Services Industry
Navigating COVID's Impact on the Financial Services IndustryNavigating COVID's Impact on the Financial Services Industry
Navigating COVID's Impact on the Financial Services IndustryCitrin Cooperman
 
Cybersecurity & the Board of Directors
Cybersecurity & the Board of DirectorsCybersecurity & the Board of Directors
Cybersecurity & the Board of DirectorsAbdul-Hakeem Ajijola
 
What Risk Factors Not-For-Profit Organizations Need to Know in Today's COVID-...
What Risk Factors Not-For-Profit Organizations Need to Know in Today's COVID-...What Risk Factors Not-For-Profit Organizations Need to Know in Today's COVID-...
What Risk Factors Not-For-Profit Organizations Need to Know in Today's COVID-...Citrin Cooperman
 
Cybersecurity in the Boardroom
Cybersecurity in the BoardroomCybersecurity in the Boardroom
Cybersecurity in the BoardroomMarko Suswanto
 
Cybersecurity for Energy: Moving Beyond Compliance
Cybersecurity for Energy: Moving Beyond ComplianceCybersecurity for Energy: Moving Beyond Compliance
Cybersecurity for Energy: Moving Beyond ComplianceEnergySec
 
Cyber-risk Oversight Handbook for Corporate Boards
Cyber-risk Oversight Handbook for Corporate BoardsCyber-risk Oversight Handbook for Corporate Boards
Cyber-risk Oversight Handbook for Corporate BoardsCheffley White
 
Incident Response: How To Prepare
Incident Response: How To PrepareIncident Response: How To Prepare
Incident Response: How To PrepareResilient Systems
 
Cyber Risk: Exposures, prevention, and solutions
Cyber Risk: Exposures, prevention, and solutionsCyber Risk: Exposures, prevention, and solutions
Cyber Risk: Exposures, prevention, and solutionsCapri Insurance
 
Building Human Intelligence – Pun Intended
Building Human Intelligence – Pun IntendedBuilding Human Intelligence – Pun Intended
Building Human Intelligence – Pun IntendedEnergySec
 
You will be breached
You will be breachedYou will be breached
You will be breachedMike Saunders
 
cybersecurity_alert_feb_12_2015
cybersecurity_alert_feb_12_2015cybersecurity_alert_feb_12_2015
cybersecurity_alert_feb_12_2015Paul Ferrillo
 
Cyber Security - Things you need to know
Cyber Security - Things you need to knowCyber Security - Things you need to know
Cyber Security - Things you need to knowNathan Desfontaines
 
Stay Ahead of Threats with Advanced Security Protection - Fortinet
Stay Ahead of Threats with Advanced Security Protection - FortinetStay Ahead of Threats with Advanced Security Protection - Fortinet
Stay Ahead of Threats with Advanced Security Protection - FortinetMarcoTechnologies
 
Cyber security do your part be the resistance
Cyber security do your part be the resistanceCyber security do your part be the resistance
Cyber security do your part be the resistancePaul-Charife Allen
 
Incident Response: Don't Mess It Up, Here's How To Get It Right
Incident Response: Don't Mess It Up, Here's How To Get It RightIncident Response: Don't Mess It Up, Here's How To Get It Right
Incident Response: Don't Mess It Up, Here's How To Get It RightResilient Systems
 
Foley-Cybersecurity-White-Paper_3.9.15
Foley-Cybersecurity-White-Paper_3.9.15Foley-Cybersecurity-White-Paper_3.9.15
Foley-Cybersecurity-White-Paper_3.9.15James Fisher
 

What's hot (20)

NFP Speak: COVID-19 Webinar Series - Part 3 - IT & Cybersecurity Risk Awareness
NFP Speak: COVID-19 Webinar Series - Part 3 - IT & Cybersecurity Risk AwarenessNFP Speak: COVID-19 Webinar Series - Part 3 - IT & Cybersecurity Risk Awareness
NFP Speak: COVID-19 Webinar Series - Part 3 - IT & Cybersecurity Risk Awareness
 
Top 10 leading fraud detection and prevention solution providers
Top 10 leading fraud detection and prevention solution providersTop 10 leading fraud detection and prevention solution providers
Top 10 leading fraud detection and prevention solution providers
 
Not-For-Profit Risks in the COVID-19 Environment
Not-For-Profit Risks in the COVID-19 EnvironmentNot-For-Profit Risks in the COVID-19 Environment
Not-For-Profit Risks in the COVID-19 Environment
 
FireEye Cyber Defense Summit 2016 Now What - Before & After The Breach
FireEye Cyber Defense Summit 2016 Now What - Before & After The BreachFireEye Cyber Defense Summit 2016 Now What - Before & After The Breach
FireEye Cyber Defense Summit 2016 Now What - Before & After The Breach
 
Navigating COVID's Impact on the Financial Services Industry
Navigating COVID's Impact on the Financial Services IndustryNavigating COVID's Impact on the Financial Services Industry
Navigating COVID's Impact on the Financial Services Industry
 
Cybersecurity & the Board of Directors
Cybersecurity & the Board of DirectorsCybersecurity & the Board of Directors
Cybersecurity & the Board of Directors
 
What Risk Factors Not-For-Profit Organizations Need to Know in Today's COVID-...
What Risk Factors Not-For-Profit Organizations Need to Know in Today's COVID-...What Risk Factors Not-For-Profit Organizations Need to Know in Today's COVID-...
What Risk Factors Not-For-Profit Organizations Need to Know in Today's COVID-...
 
Cybersecurity in the Boardroom
Cybersecurity in the BoardroomCybersecurity in the Boardroom
Cybersecurity in the Boardroom
 
Cybersecurity for Energy: Moving Beyond Compliance
Cybersecurity for Energy: Moving Beyond ComplianceCybersecurity for Energy: Moving Beyond Compliance
Cybersecurity for Energy: Moving Beyond Compliance
 
Cyber-risk Oversight Handbook for Corporate Boards
Cyber-risk Oversight Handbook for Corporate BoardsCyber-risk Oversight Handbook for Corporate Boards
Cyber-risk Oversight Handbook for Corporate Boards
 
Incident Response: How To Prepare
Incident Response: How To PrepareIncident Response: How To Prepare
Incident Response: How To Prepare
 
Cyber Risk: Exposures, prevention, and solutions
Cyber Risk: Exposures, prevention, and solutionsCyber Risk: Exposures, prevention, and solutions
Cyber Risk: Exposures, prevention, and solutions
 
Building Human Intelligence – Pun Intended
Building Human Intelligence – Pun IntendedBuilding Human Intelligence – Pun Intended
Building Human Intelligence – Pun Intended
 
You will be breached
You will be breachedYou will be breached
You will be breached
 
cybersecurity_alert_feb_12_2015
cybersecurity_alert_feb_12_2015cybersecurity_alert_feb_12_2015
cybersecurity_alert_feb_12_2015
 
Cyber Security - Things you need to know
Cyber Security - Things you need to knowCyber Security - Things you need to know
Cyber Security - Things you need to know
 
Stay Ahead of Threats with Advanced Security Protection - Fortinet
Stay Ahead of Threats with Advanced Security Protection - FortinetStay Ahead of Threats with Advanced Security Protection - Fortinet
Stay Ahead of Threats with Advanced Security Protection - Fortinet
 
Cyber security do your part be the resistance
Cyber security do your part be the resistanceCyber security do your part be the resistance
Cyber security do your part be the resistance
 
Incident Response: Don't Mess It Up, Here's How To Get It Right
Incident Response: Don't Mess It Up, Here's How To Get It RightIncident Response: Don't Mess It Up, Here's How To Get It Right
Incident Response: Don't Mess It Up, Here's How To Get It Right
 
Foley-Cybersecurity-White-Paper_3.9.15
Foley-Cybersecurity-White-Paper_3.9.15Foley-Cybersecurity-White-Paper_3.9.15
Foley-Cybersecurity-White-Paper_3.9.15
 

Similar to C-Suite Snacks Webinar Series : Under Attack - Preparing Your Company in the Age of the Hacker!

Netwealth educational webinar: Peace of mind in a digital world
Netwealth educational webinar: Peace of mind in a digital worldNetwealth educational webinar: Peace of mind in a digital world
Netwealth educational webinar: Peace of mind in a digital worldnetwealthInvest
 
Nonprofit Cybersecurity Risk Assessment Basics
Nonprofit Cybersecurity Risk Assessment BasicsNonprofit Cybersecurity Risk Assessment Basics
Nonprofit Cybersecurity Risk Assessment BasicsCommunity IT Innovators
 
LogRhythm_-_Modern_Cyber_Threat_Pandemic.pptx
LogRhythm_-_Modern_Cyber_Threat_Pandemic.pptxLogRhythm_-_Modern_Cyber_Threat_Pandemic.pptx
LogRhythm_-_Modern_Cyber_Threat_Pandemic.pptxCNSHacking
 
Module 8 - External Crisis – Changing Technology.pptx
Module 8 - External Crisis – Changing Technology.pptxModule 8 - External Crisis – Changing Technology.pptx
Module 8 - External Crisis – Changing Technology.pptxcaniceconsulting
 
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...Cristian Garcia G.
 
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONSIMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONSPreetiDevidas
 
Security Incident Response Readiness Survey
Security Incident Response Readiness Survey  Security Incident Response Readiness Survey
Security Incident Response Readiness Survey Rahul Neel Mani
 
Too Small to Get Hacked? Think Again (Webinar)
Too Small to Get Hacked? Think Again (Webinar)Too Small to Get Hacked? Think Again (Webinar)
Too Small to Get Hacked? Think Again (Webinar)OnRamp
 
Steel Point Solutions IAS Track 3 "Sustaining a Cyber Workforce" by L.T. Hawkins
Steel Point Solutions IAS Track 3 "Sustaining a Cyber Workforce" by L.T. HawkinsSteel Point Solutions IAS Track 3 "Sustaining a Cyber Workforce" by L.T. Hawkins
Steel Point Solutions IAS Track 3 "Sustaining a Cyber Workforce" by L.T. Hawkinslthawkins
 
Quantifying Cyber Risk, Insurance and The Value of Personal Data
Quantifying Cyber Risk, Insurance and The Value of Personal DataQuantifying Cyber Risk, Insurance and The Value of Personal Data
Quantifying Cyber Risk, Insurance and The Value of Personal DataSteven Schwartz
 
Hacking the Human - How Secure Is Your Organization?
Hacking the Human - How Secure Is Your Organization?Hacking the Human - How Secure Is Your Organization?
Hacking the Human - How Secure Is Your Organization?CBIZ, Inc.
 
2015 Cyber Security
2015 Cyber Security2015 Cyber Security
2015 Cyber SecurityAllen Zhang
 
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)Sarah Jarvis
 
20101012 isa larry_clinton
20101012 isa larry_clinton20101012 isa larry_clinton
20101012 isa larry_clintonCIONET
 
How to assess your Cybersecurity Vulnerability_.pdf
How to assess your Cybersecurity Vulnerability_.pdfHow to assess your Cybersecurity Vulnerability_.pdf
How to assess your Cybersecurity Vulnerability_.pdfMetaorange
 
How to assess your Cybersecurity Vulnerability_.pptx
How to assess your Cybersecurity Vulnerability_.pptxHow to assess your Cybersecurity Vulnerability_.pptx
How to assess your Cybersecurity Vulnerability_.pptxMetaorange
 
Webinar - Bitglass and CyberEdge - Hidden Security Threats
Webinar - Bitglass and CyberEdge - Hidden Security ThreatsWebinar - Bitglass and CyberEdge - Hidden Security Threats
Webinar - Bitglass and CyberEdge - Hidden Security ThreatsBitglass
 

Similar to C-Suite Snacks Webinar Series : Under Attack - Preparing Your Company in the Age of the Hacker! (20)

Netwealth educational webinar: Peace of mind in a digital world
Netwealth educational webinar: Peace of mind in a digital worldNetwealth educational webinar: Peace of mind in a digital world
Netwealth educational webinar: Peace of mind in a digital world
 
Nonprofit Cybersecurity Risk Assessment Basics
Nonprofit Cybersecurity Risk Assessment BasicsNonprofit Cybersecurity Risk Assessment Basics
Nonprofit Cybersecurity Risk Assessment Basics
 
LogRhythm_-_Modern_Cyber_Threat_Pandemic.pptx
LogRhythm_-_Modern_Cyber_Threat_Pandemic.pptxLogRhythm_-_Modern_Cyber_Threat_Pandemic.pptx
LogRhythm_-_Modern_Cyber_Threat_Pandemic.pptx
 
Nonprofit Cybersecurity Incident Report
Nonprofit Cybersecurity Incident ReportNonprofit Cybersecurity Incident Report
Nonprofit Cybersecurity Incident Report
 
Module 8 - External Crisis – Changing Technology.pptx
Module 8 - External Crisis – Changing Technology.pptxModule 8 - External Crisis – Changing Technology.pptx
Module 8 - External Crisis – Changing Technology.pptx
 
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
 
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONSIMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
 
Security Incident Response Readiness Survey
Security Incident Response Readiness Survey  Security Incident Response Readiness Survey
Security Incident Response Readiness Survey
 
Too Small to Get Hacked? Think Again (Webinar)
Too Small to Get Hacked? Think Again (Webinar)Too Small to Get Hacked? Think Again (Webinar)
Too Small to Get Hacked? Think Again (Webinar)
 
Steel Point Solutions IAS Track 3 "Sustaining a Cyber Workforce" by L.T. Hawkins
Steel Point Solutions IAS Track 3 "Sustaining a Cyber Workforce" by L.T. HawkinsSteel Point Solutions IAS Track 3 "Sustaining a Cyber Workforce" by L.T. Hawkins
Steel Point Solutions IAS Track 3 "Sustaining a Cyber Workforce" by L.T. Hawkins
 
Quantifying Cyber Risk, Insurance and The Value of Personal Data
Quantifying Cyber Risk, Insurance and The Value of Personal DataQuantifying Cyber Risk, Insurance and The Value of Personal Data
Quantifying Cyber Risk, Insurance and The Value of Personal Data
 
Cyber threat forecast 2018..
Cyber threat forecast 2018..Cyber threat forecast 2018..
Cyber threat forecast 2018..
 
Hacking the Human - How Secure Is Your Organization?
Hacking the Human - How Secure Is Your Organization?Hacking the Human - How Secure Is Your Organization?
Hacking the Human - How Secure Is Your Organization?
 
2015 Cyber Security
2015 Cyber Security2015 Cyber Security
2015 Cyber Security
 
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
 
20101012 isa larry_clinton
20101012 isa larry_clinton20101012 isa larry_clinton
20101012 isa larry_clinton
 
How to assess your Cybersecurity Vulnerability_.pdf
How to assess your Cybersecurity Vulnerability_.pdfHow to assess your Cybersecurity Vulnerability_.pdf
How to assess your Cybersecurity Vulnerability_.pdf
 
How to assess your Cybersecurity Vulnerability_.pptx
How to assess your Cybersecurity Vulnerability_.pptxHow to assess your Cybersecurity Vulnerability_.pptx
How to assess your Cybersecurity Vulnerability_.pptx
 
Webinar - Bitglass and CyberEdge - Hidden Security Threats
Webinar - Bitglass and CyberEdge - Hidden Security ThreatsWebinar - Bitglass and CyberEdge - Hidden Security Threats
Webinar - Bitglass and CyberEdge - Hidden Security Threats
 
Project.pptx
Project.pptxProject.pptx
Project.pptx
 

More from Citrin Cooperman

How About Provider Relief Funds: Deadlines, Reporting, and Auditing Nuances
How About Provider Relief Funds: Deadlines, Reporting, and Auditing NuancesHow About Provider Relief Funds: Deadlines, Reporting, and Auditing Nuances
How About Provider Relief Funds: Deadlines, Reporting, and Auditing NuancesCitrin Cooperman
 
C-Suite Snacks Webinar Series: Modern Decision Support
C-Suite Snacks Webinar Series: Modern Decision SupportC-Suite Snacks Webinar Series: Modern Decision Support
C-Suite Snacks Webinar Series: Modern Decision SupportCitrin Cooperman
 
C-Suite Snacks Webinar Series: Building an Advisory Board
C-Suite Snacks Webinar Series: Building an Advisory BoardC-Suite Snacks Webinar Series: Building an Advisory Board
C-Suite Snacks Webinar Series: Building an Advisory BoardCitrin Cooperman
 
C-Suite Snacks Webinar Series: Prepping Your Company's Financials for Sale
C-Suite Snacks Webinar Series: Prepping Your Company's Financials for SaleC-Suite Snacks Webinar Series: Prepping Your Company's Financials for Sale
C-Suite Snacks Webinar Series: Prepping Your Company's Financials for SaleCitrin Cooperman
 
Preparing for the New Lease Accounting Standard
Preparing for the New Lease Accounting StandardPreparing for the New Lease Accounting Standard
Preparing for the New Lease Accounting StandardCitrin Cooperman
 
Lease Accounting: Preparing Your Business for 2022
Lease Accounting: Preparing Your Business for 2022Lease Accounting: Preparing Your Business for 2022
Lease Accounting: Preparing Your Business for 2022Citrin Cooperman
 
High Net Worth Webinar Series - Tax Planning and Update for 2022
High Net Worth Webinar Series - Tax Planning and Update for 2022High Net Worth Webinar Series - Tax Planning and Update for 2022
High Net Worth Webinar Series - Tax Planning and Update for 2022Citrin Cooperman
 
C-Suite Snacks Webinar Series: The Talent Wars - Can Benefits Be Your Secret ...
C-Suite Snacks Webinar Series: The Talent Wars - Can Benefits Be Your Secret ...C-Suite Snacks Webinar Series: The Talent Wars - Can Benefits Be Your Secret ...
C-Suite Snacks Webinar Series: The Talent Wars - Can Benefits Be Your Secret ...Citrin Cooperman
 
High Net Worth Webinar Series - The Business of Digital Assets​ & Blockchain
High Net Worth Webinar Series - The Business of Digital Assets​ & BlockchainHigh Net Worth Webinar Series - The Business of Digital Assets​ & Blockchain
High Net Worth Webinar Series - The Business of Digital Assets​ & BlockchainCitrin Cooperman
 
High Net Worth Webinar Series - Estate Planning Strategies and Updates
High Net Worth Webinar Series - Estate Planning Strategies and UpdatesHigh Net Worth Webinar Series - Estate Planning Strategies and Updates
High Net Worth Webinar Series - Estate Planning Strategies and UpdatesCitrin Cooperman
 
Showtime for Shuttered Venue Operators Grant (SVOG) Recipients
Showtime for Shuttered Venue Operators Grant (SVOG) RecipientsShowtime for Shuttered Venue Operators Grant (SVOG) Recipients
Showtime for Shuttered Venue Operators Grant (SVOG) RecipientsCitrin Cooperman
 
C-Suite Snacks Webinar Series: A Year Like No Other - Manufacturing and Distr...
C-Suite Snacks Webinar Series: A Year Like No Other - Manufacturing and Distr...C-Suite Snacks Webinar Series: A Year Like No Other - Manufacturing and Distr...
C-Suite Snacks Webinar Series: A Year Like No Other - Manufacturing and Distr...Citrin Cooperman
 
Manufacturing & Distribution Update: The Economic Impact on the Industry
Manufacturing & Distribution Update: The Economic Impact on the IndustryManufacturing & Distribution Update: The Economic Impact on the Industry
Manufacturing & Distribution Update: The Economic Impact on the IndustryCitrin Cooperman
 
High Net Worth Webinar Series: SALT Thoughts - Pass-Through Entity Taxes & Re...
High Net Worth Webinar Series: SALT Thoughts - Pass-Through Entity Taxes & Re...High Net Worth Webinar Series: SALT Thoughts - Pass-Through Entity Taxes & Re...
High Net Worth Webinar Series: SALT Thoughts - Pass-Through Entity Taxes & Re...Citrin Cooperman
 
The New Rage in SALT: State Pass-Through Entity Tax
The New Rage in SALT: State Pass-Through Entity TaxThe New Rage in SALT: State Pass-Through Entity Tax
The New Rage in SALT: State Pass-Through Entity TaxCitrin Cooperman
 
C-Suite Snacks Webinar Series: What's Your IP Worth? Discovering the Value of...
C-Suite Snacks Webinar Series: What's Your IP Worth? Discovering the Value of...C-Suite Snacks Webinar Series: What's Your IP Worth? Discovering the Value of...
C-Suite Snacks Webinar Series: What's Your IP Worth? Discovering the Value of...Citrin Cooperman
 
C-Suite Snacks Webinar Series: Best-In-Class Finance and Accounting: Should Y...
C-Suite Snacks Webinar Series: Best-In-Class Finance and Accounting: Should Y...C-Suite Snacks Webinar Series: Best-In-Class Finance and Accounting: Should Y...
C-Suite Snacks Webinar Series: Best-In-Class Finance and Accounting: Should Y...Citrin Cooperman
 
C-Suite Snacks Webinar Series: Not Sold on Selling Your Business? Why Now is ...
C-Suite Snacks Webinar Series: Not Sold on Selling Your Business? Why Now is ...C-Suite Snacks Webinar Series: Not Sold on Selling Your Business? Why Now is ...
C-Suite Snacks Webinar Series: Not Sold on Selling Your Business? Why Now is ...Citrin Cooperman
 
MasterSnacks: Cybersecurity - Disaster Recovery: Hoping for the Best but Plan...
MasterSnacks: Cybersecurity - Disaster Recovery: Hoping for the Best but Plan...MasterSnacks: Cybersecurity - Disaster Recovery: Hoping for the Best but Plan...
MasterSnacks: Cybersecurity - Disaster Recovery: Hoping for the Best but Plan...Citrin Cooperman
 
C-Suite Snacks Webinar Series: Mise en Place: Ensuring the Success of Your Bu...
C-Suite Snacks Webinar Series: Mise en Place: Ensuring the Success of Your Bu...C-Suite Snacks Webinar Series: Mise en Place: Ensuring the Success of Your Bu...
C-Suite Snacks Webinar Series: Mise en Place: Ensuring the Success of Your Bu...Citrin Cooperman
 

More from Citrin Cooperman (20)

How About Provider Relief Funds: Deadlines, Reporting, and Auditing Nuances
How About Provider Relief Funds: Deadlines, Reporting, and Auditing NuancesHow About Provider Relief Funds: Deadlines, Reporting, and Auditing Nuances
How About Provider Relief Funds: Deadlines, Reporting, and Auditing Nuances
 
C-Suite Snacks Webinar Series: Modern Decision Support
C-Suite Snacks Webinar Series: Modern Decision SupportC-Suite Snacks Webinar Series: Modern Decision Support
C-Suite Snacks Webinar Series: Modern Decision Support
 
C-Suite Snacks Webinar Series: Building an Advisory Board
C-Suite Snacks Webinar Series: Building an Advisory BoardC-Suite Snacks Webinar Series: Building an Advisory Board
C-Suite Snacks Webinar Series: Building an Advisory Board
 
C-Suite Snacks Webinar Series: Prepping Your Company's Financials for Sale
C-Suite Snacks Webinar Series: Prepping Your Company's Financials for SaleC-Suite Snacks Webinar Series: Prepping Your Company's Financials for Sale
C-Suite Snacks Webinar Series: Prepping Your Company's Financials for Sale
 
Preparing for the New Lease Accounting Standard
Preparing for the New Lease Accounting StandardPreparing for the New Lease Accounting Standard
Preparing for the New Lease Accounting Standard
 
Lease Accounting: Preparing Your Business for 2022
Lease Accounting: Preparing Your Business for 2022Lease Accounting: Preparing Your Business for 2022
Lease Accounting: Preparing Your Business for 2022
 
High Net Worth Webinar Series - Tax Planning and Update for 2022
High Net Worth Webinar Series - Tax Planning and Update for 2022High Net Worth Webinar Series - Tax Planning and Update for 2022
High Net Worth Webinar Series - Tax Planning and Update for 2022
 
C-Suite Snacks Webinar Series: The Talent Wars - Can Benefits Be Your Secret ...
C-Suite Snacks Webinar Series: The Talent Wars - Can Benefits Be Your Secret ...C-Suite Snacks Webinar Series: The Talent Wars - Can Benefits Be Your Secret ...
C-Suite Snacks Webinar Series: The Talent Wars - Can Benefits Be Your Secret ...
 
High Net Worth Webinar Series - The Business of Digital Assets​ & Blockchain
High Net Worth Webinar Series - The Business of Digital Assets​ & BlockchainHigh Net Worth Webinar Series - The Business of Digital Assets​ & Blockchain
High Net Worth Webinar Series - The Business of Digital Assets​ & Blockchain
 
High Net Worth Webinar Series - Estate Planning Strategies and Updates
High Net Worth Webinar Series - Estate Planning Strategies and UpdatesHigh Net Worth Webinar Series - Estate Planning Strategies and Updates
High Net Worth Webinar Series - Estate Planning Strategies and Updates
 
Showtime for Shuttered Venue Operators Grant (SVOG) Recipients
Showtime for Shuttered Venue Operators Grant (SVOG) RecipientsShowtime for Shuttered Venue Operators Grant (SVOG) Recipients
Showtime for Shuttered Venue Operators Grant (SVOG) Recipients
 
C-Suite Snacks Webinar Series: A Year Like No Other - Manufacturing and Distr...
C-Suite Snacks Webinar Series: A Year Like No Other - Manufacturing and Distr...C-Suite Snacks Webinar Series: A Year Like No Other - Manufacturing and Distr...
C-Suite Snacks Webinar Series: A Year Like No Other - Manufacturing and Distr...
 
Manufacturing & Distribution Update: The Economic Impact on the Industry
Manufacturing & Distribution Update: The Economic Impact on the IndustryManufacturing & Distribution Update: The Economic Impact on the Industry
Manufacturing & Distribution Update: The Economic Impact on the Industry
 
High Net Worth Webinar Series: SALT Thoughts - Pass-Through Entity Taxes & Re...
High Net Worth Webinar Series: SALT Thoughts - Pass-Through Entity Taxes & Re...High Net Worth Webinar Series: SALT Thoughts - Pass-Through Entity Taxes & Re...
High Net Worth Webinar Series: SALT Thoughts - Pass-Through Entity Taxes & Re...
 
The New Rage in SALT: State Pass-Through Entity Tax
The New Rage in SALT: State Pass-Through Entity TaxThe New Rage in SALT: State Pass-Through Entity Tax
The New Rage in SALT: State Pass-Through Entity Tax
 
C-Suite Snacks Webinar Series: What's Your IP Worth? Discovering the Value of...
C-Suite Snacks Webinar Series: What's Your IP Worth? Discovering the Value of...C-Suite Snacks Webinar Series: What's Your IP Worth? Discovering the Value of...
C-Suite Snacks Webinar Series: What's Your IP Worth? Discovering the Value of...
 
C-Suite Snacks Webinar Series: Best-In-Class Finance and Accounting: Should Y...
C-Suite Snacks Webinar Series: Best-In-Class Finance and Accounting: Should Y...C-Suite Snacks Webinar Series: Best-In-Class Finance and Accounting: Should Y...
C-Suite Snacks Webinar Series: Best-In-Class Finance and Accounting: Should Y...
 
C-Suite Snacks Webinar Series: Not Sold on Selling Your Business? Why Now is ...
C-Suite Snacks Webinar Series: Not Sold on Selling Your Business? Why Now is ...C-Suite Snacks Webinar Series: Not Sold on Selling Your Business? Why Now is ...
C-Suite Snacks Webinar Series: Not Sold on Selling Your Business? Why Now is ...
 
MasterSnacks: Cybersecurity - Disaster Recovery: Hoping for the Best but Plan...
MasterSnacks: Cybersecurity - Disaster Recovery: Hoping for the Best but Plan...MasterSnacks: Cybersecurity - Disaster Recovery: Hoping for the Best but Plan...
MasterSnacks: Cybersecurity - Disaster Recovery: Hoping for the Best but Plan...
 
C-Suite Snacks Webinar Series: Mise en Place: Ensuring the Success of Your Bu...
C-Suite Snacks Webinar Series: Mise en Place: Ensuring the Success of Your Bu...C-Suite Snacks Webinar Series: Mise en Place: Ensuring the Success of Your Bu...
C-Suite Snacks Webinar Series: Mise en Place: Ensuring the Success of Your Bu...
 

Recently uploaded

Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Dipal Arora
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Roland Driesen
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756dollysharma2066
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Neil Kimberley
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfAdmir Softic
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...Any kyc Account
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communicationskarancommunications
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Roland Driesen
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...lizamodels9
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒anilsa9823
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesDipal Arora
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxWorkforce Group
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...Aggregage
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.Aaiza Hassan
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataExhibitors Data
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsP&CO
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...amitlee9823
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyEthan lee
 

Recently uploaded (20)

Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pillsMifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communications
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
 
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors Data
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
 

C-Suite Snacks Webinar Series : Under Attack - Preparing Your Company in the Age of the Hacker!

  • 1. UNDER ATTACK: Preparing your Company in the Age of the Hacker! April 8, 2021 | C-Suite Snacks Webinar Series
  • 2. Welcome & Introduction MICHAEL CAMACHO, CPA, CIA Partner, Technology, Risk Advisory & Cybersecurity (TRAC) Practice Citrin Cooperman mcamacho@citrincooperman.com 401-742-0478
  • 3. AGENDA B r each Stats an d F acts 01 FAQs an d R eal -L i fe Exam pl es 02 B e Pr ep ar ed . B e Ver y Pr ep ar ed ! 03 Qu esti o ns? 04
  • 4. On the Brink: Age of the Hackers! “Cybercrime is the greatest threat to every company in the world.” -Ginni Rometty, IBM Chairman,President& CEO “77% of organizations do not have an incident response plan.” -Cybint
  • 5. Breach Stats – The Facts Global Average Cost per Breach: $3.86M Average Cost per Record Compromised: $146 43% of Cyber Attacks Target Small Businesses 91% of Breaches are the Result of Phishing Attacks Average cost of a breach is 39.6% higher if a company is not prepared Average Days to Detect a Breach: 207 Average Days to Contain a Breach: 73 Sources: Ponemon Institute/IBM Cost of a Data Breach Report -2020 & Verizon 2020 Data Breach Investigation Report
  • 6. And the Threat Continues… Since COVID-19, the FBI reported a 300% increase in Cybercrimes (IMC Grupo) Remote workers have caused a security breach in 20% of organizations (Malwarebytes) 9.7 Million healthcare records were compromised in September 2020 alone Data breaches in healthcare industry up 58% in 2020 Approximately $6 trillion is expected to be spent globally on cybersecurity by 2021 (Cybersecurity Ventures) Average ransomware payment rose 33% in 2020 over 2019, to $111,605 (Fintech News)
  • 7. Remote Workforce Stats 78% of CEOs agree remote collaboration is here to stay 86% of users have never updated their home router’s firmware 20% of organizations have experienced a breach as a result of remote work 92% of all businesses store data in the cloud Average cost of downtime is $11,600 per minute
  • 8. Once More into the Breach • Hackers are industry agnostic • COVID-19increased the likelihood of a data breach at a time when companies are ill- equipped to deal with the repercussions • WFH distractions combined with 18,000,000 spear-phishing emails per day is creating a perfectstorm • The recessioncreated by COVID-19makes it more difficultfor companies to recoverfrom an attack
  • 9. Incidents/Breaches TRAC has been involved with by year: • Compared to 3 in 2017 and 2018 combined • 17 in 2019 • 19 in 2020 • 4 to date in 2021 Breaches are more sophisticated, on a large scale, and have greater impact Average business downtime during a breach: • One to two weeks (longest just over a month) Average cost of breach response: • Incident/breach response for small business range from $10,000 - $100,000+ • Exponentially higher for downtime, legal fees, tech expenditures, etc. TRAC Experience
  • 10. FAQ: Why Now? IMPACT OF COVID-19 • Focus switchedto remote workforce and ensuring connectivity and sustained operations ▪ VPN networks setup “in a rush” to allow employeesto work from home – little enhancement since ▪ Vulnerabilities from the usage of unsecured personal computers and home networks ▪ A remote workforce can make it more difficultfor IT staff to monitor and contain threats ▪ Potential distractions increase likelihood of successfulspear-phishing and malware attacks ▪ Pandemic fatigue setting in with blurred lines between work and home • IT Departments Trading Security for Convenience ▪ Free pass on password security ▪ Increased use of mobile devices and IoT ▪ Privacy concerns (e.g., Family, Amazon Echo, Unsecured video conferencing,Ad hoc remote access) ▪ More focus on remote employeesreducing time for monitoring
  • 11. FAQ: How? •Accounts for morethan 80% of all reported incidents •Primarily driven by malwaredelivered by email •Increased sophistication of attacks making them harder to identify •Employees aren’t sufficiently trained to identify Phishing •95% of all breaches aredue to human error •Increased useof mobile devices for business use, plus •1 in 36 mobile devices havehigh risk apps installed Human Error • Deficient security policies • Over 60% of companies have over 500 accounts with non-expiring password • Lack of log monitoring / detection controls Lack of Effective IT Policies and Monitoring
  • 12. TRAC Experience - Cyber Threat Landscape Office 365 Exploit Morphs into an Internal Control Deficiency The Quiet Observer A Phishing Tale Seek and Destroy “I Can’t Believe I Clicked It …Again” The Weakest Link COMMON THEMES: • Almost all of the breaches were avoidable ▪ Log Reviews ▪ Automated Tools ▪ Employee Education
  • 13. STEP 1: UNDERSTAND THE DIFFERENCE BETWEEN A SECURITY INCIDENT AND A BREACH: • SECURITY INCIDENT: An event that leads to a violation of an organization’s security policies and puts sensitive data at risk of exposure. • Examples: Malware infection, destructive attacks, loss or theft of equipment • DATA BREACH: A security incident that results in unauthorized access to data. in the Hacker’s Playground Preparing Your Company • Each event has differentrequirements • Important to understanddifferent definitions by industry and state
  • 14. in the Hacker’s Playground Preparing Your Company STEP 2: PREPARE A PLAN FOR RESPONDING TO ALL SECURITY INCIDENTS: • Incident Identification & Response: ▪ Resources - Who do you contact first? ▪ Roles and Responsibilities ▪ Don’t forget third-party providers • Detection and Analysis • Containment, Eradication and Recovery • Incident/ Breach Communications • Remediation & Post Incident Activities • Plan should be comprehensive& inclusive • Plan should be tested
  • 15. in the Hacker’s Playground STEP 3: PERIODICALLY TEST AND RE-EVALUATE YOUR PLAN • Ensure all team members understand the plan ▪ Approach and timing can make the difference between a successful and unsuccessful response • Perform table-top test of Incident Response Plan: ▪ An Untested Plan Can Lead to Unidentified Risks • Review plan annually ▪ Solutions that were good a year ago may no longer be viable Preparing Your Company
  • 16. UNDERSTAND YOUR RISK BE PROACTIVE Where Do I Start?
  • 17.
  • 18.
  • 19.
  • 20. UNDERSTAND YOUR RISK BE PROACTIVE Where Do I Start?
  • 21. 6 Vulnerability Management Services • Simulated “Bad-guy” • Testyour network and system controls beforethe Hackers do • Search for vulnerabilities which can allow forpotential attack vectors (penetration testing and vulnerability assessments) • Average rate per hour: $150 - $300 • Incidentor breach response: ▪ Detection,forensics and analysis ▪ Containment, eradication and recovery ▪ Postincident remediation ▪ Average rate per hour: $350 - $500+
  • 22. CyberSecure EASE YOUR MIND WITH CYBERSECURE: • No cost incident response engagement letter with terms, conditions and rates to expedite incident response times • 24/7/365 incident response team at your service • Discount on standard rates if paired with a SCORE Report, Penetration/Phishing Tests, or vCISO Services ▪ Being aware of your environment pre-incident will reduce response time
  • 23. Questions? MICHAEL CAMACHO, CPA, CIA Partner, Technology, Risk Advisory & Cybersecurity (TRAC) Practice Citrin Cooperman mcamacho@citrincooperman.com 401-742-0478
  • 24. Thank You F or W at c hi ng & Li s t eni ng UPCOMING C-SUITE SNACKS WEBINARS: CONTAINING COSTS AND WINNING THE TALENT WAR: BEST PRACTICES ON MANAGING EMPLOYEE BENEFITS April 15, 2021 | 12:00 PM ET/9:00 AM PT Featuring: Shaun Gagnon, Partner at Camlife REDUCING RISK AND COST IN THE GLOBAL SUPPLYCHAIN April 22, 2021 | 12:00 PM ET/9:00 AM PT Featuring: John Giordano, Partner, and Tom Cook, CEO of Blue Tiger International