SlideShare une entreprise Scribd logo
1  sur  18
John Christly
Global Chief Information Security Officer
Netsurion and EventTracker
• Cybersecurity Evangelist, security blogger, threat researcher, and has participated in
international, regional and national events as a speaker and panelist
• Has taught groups including ISACA, ACFE, and ISSA on topics ranging from forensics to
auditing IT systems for fraud
• Is the former Founder and CEO of OMC Systems, a cybersecurity advisory firm that
developed a custom web based incident management platform used in healthcare
• Is an MSI Senior Fellow™ and has many years of experience in technical and
cybersecurity management both domestically and internationally
• Holds various certifications including the ISC2 CISSP, Certified Fraud Examiner, AccessData
Certified Examiner, PMI PMP, HIPAA Security Specialist, Lean Six Sigma Master Black Belt,
and is a Florida Licensed Private Investigator.
• Experience includes several industry regulations including HIPAA, HITECH, GLBA, FERPA,
FCPA, FIPA, and PCI
Copyright © 2017 Netsurion. All Rights Reserved. Reproduction Prohibited.
About Netsurion and EventTracker
Netsurion is a managed security service provider specializing in the protection of multi-location businesses’
information, payment systems, and Wi-Fi networks from data breaches, network outages, and ever-evolving
cyberthreats.
Netsurion’s patented remote installation process and PCI compliance solutions help simplify the
implementation process and ongoing support. Any sized branch or remote office, franchise, or sole proprietor
operation can use Netsurion without the costs of on-site support.
Our service offering – SIEM-at-the-Edge – is powered by our subsidiary, EventTracker, which helps deliver
comprehensive security benefits to “edge” locations that normally would not have the means to leverage such
a solution.
EventTracker’s advanced security solutions protect enterprises and small businesses from data breaches
and insider fraud, and streamline regulatory compliance. EventTracker’s platform comprises SIEM,
vulnerability scanning, intrusion detection, behavior analytics, a HoneyNet deception network and other
defense-in-depth capabilities within a single management platform.
The company complements its state-of-the-art technology with 24/7 managed services from its global
security operations center (SOC) to ensure its customers achieve desired outcomes—safer networks,
better endpoint security, earlier detection of intrusion, and relevant and specific threat intelligence.
The company serves the retail, hospitality, healthcare, legal, banking and financial services, utilities, and
government sectors.
Copyright © 2017 Netsurion. All Rights Reserved. Reproduction Prohibited.
Humans are the weakest link
Copyright © 2017 Netsurion. All Rights Reserved. Reproduction Prohibited.
Humansaretheweakestlink
According to the Verizon
DBIR 2016, phishing tops
the list of increasing
concerns and
cybercriminals are
exploiting humans as the
weakest link
phishing 63% of confirmed data
breaches involved leveraging
weak/default/stolen
passwords
Best Practice #1: Secure the human
• Provide employees with
cybersecurity awareness training.
• Control access to critical systems
and information.
Copyright © 2017 Netsurion. All Rights Reserved. Reproduction Prohibited.
Absolute security is impossible
Copyright © 2017 Netsurion. All Rights Reserved. Reproduction Prohibited.
SECURITY SPEND
DOES NOT ALWAYS
CORRELATE TO
EFFECTIVENESS
Best Practice #2: Optimize your security
investment
• Conduct IT asset audit and prioritize
assets based on risk.
• Identify events that can cause
interruptions to business processes,
along with the probability and
impact, and their consequences for
information security.**
• Designate your highest level of
protection to your most critical
assets.
Copyright © 2017 Netsurion. All Rights Reserved. Reproduction Prohibited.
Best Practice #3: Start with the basics
Think of it as layers of protection. The basic layer of security, at the bottom, is the
staple of every business network.
• Firewalls
• Up-to-date Anti-virus
• Patch Management
• Vulnerability Management
Copyright © 2017 Netsurion. All Rights Reserved. Reproduction Prohibited.
IDS/IPSPay Attention Patch ManagementAnti-Virus
Vulnerability Scanner
Unified Threat
Mgmt
AuthenticationNextGen Firewall
Best Practice #4: Layer on more advanced
security
Copyright © 2017 Netsurion. All Rights Reserved. Reproduction Prohibited.
HardenedDiligent
IDS/IPSPay Attention Patch ManagementAnti-Virus
Vulnerability Scanner
File Integrity
Monitoring
Vulnerability Assessment
Log Search
PCI-DSS | HIPAA | FFIEC | SEC
FISMA | Gov| Military/RMF|
etc.
Compliance Reports
Review & Annotation
Incidents
Notifications
Centralized Log
Management
International ISO
27001(2) GPG 13
UK
Unified Threat
Mgmt
AuthenticationNextGen Firewall
There’s no such thing as perfect prevention
Copyright © 2017 Netsurion. All Rights Reserved. Reproduction Prohibited.
82%
67% of attackers spent
several days retrieving assets.
25% of organizations
who suffered an incident
were able to discover it
within days.
of attackers were able to
complete a compromise
within “minutes.”
This trend points to an ongoing detection deficit disorder. The suggestion is that
defenders struggle to uncover the indicators of compromise.
Best Practice #5: Detection
You must look for other common
evidence of compromise, such as:
• command and control activity
• suspicious network traffic
• file access
• unauthorized use of valid
credentials
Copyright © 2017 Netsurion. All Rights Reserved. Reproduction Prohibited.
Hurdles to overcome
Copyright © 2017 Netsurion. All Rights Reserved. Reproduction Prohibited.
Best Practice #6: Co-sourcing
Copyright © 2017 Netsurion. All Rights Reserved. Reproduction Prohibited.
Improve Security & Operations
Real-time Visibility & Oversight
Augment Staff & Reduce Costs
 SIEM and event
correlation
 Actionable threat
intelligence
analyzed by SOC
 Unlimited log
management
SIEM and Log
Management
 Honeynet
deception as a
service
 Alert turning and
automated
response rules
 Endpoint USB
Monitoring
Threat Detection
and Response
 Vulnerability
assessment
 Network
vulnerability
scanning
 Network intrusion
detection
Vulnerability
Assessment
 Monitors user
activity and alerts
on anomalous
activity
 Reveals system
misuse or
compromise
 Ensures audit trails
for compliance
Behavior Analysis
 File integrity
monitoring
 Automated log
review
 FISMA, PCI DSS,
HIPAA, NIST, GPG13
and more
Compliance
Management
Firewall and Anti-Virus
Copyright © 2017 Netsurion. All Rights Reserved. Reproduction Prohibited.
Complete Managed Security
 Strategic security initiative roll-out
program
 Communication and change
management expertise
 Educate and encourage adoption
 Generate awareness and support
BrandGuard
Trust in your brand starts with security.
Copyright © 2017 Netsurion. All Rights Reserved. Reproduction Prohibited.
Security Adoption for Franchisees
DETECTRESPOND
PREVENTPREDICT
SIEMphonic (Co-Managed SIEM)
 Prevent: Vulnerability scan, harden, divert via Honeypot, PTaaS
 Detect: 24/7 coverage
 Respond: Forensics, remediation recommendations, on-site retainer
 Predict: Dedicated analyst team, broad threat intel sources, risk register
ANALYZE
MONITOR
24/7
 Full range of technology + services, ideal for small InfoSec teams
 Simplify and reduce the time to implement, administer and scale SIEM++
Advanced Threat Detection and Response
SIEMPHONIC
Copyright © 2017 Netsurion. All Rights Reserved. Reproduction Prohibited.
24/7 Co-Managed SIEM
PECB IT Security Training Courses
 ISO/IEC 27032 Lead Cybersecurity Manager
5 Day Course
 Lead Pen Test Professional
5 Days Course
 ISO/IEC 27034 Application Security
5 Days Course
 ISO/IEC 27035 Information Security Incident Management
5 Days Course
 Computer Forensics Examiner
5 Days Course
Exam and certification fees are included in the training price.
https://www.pecb.com/it-security | www.pecb.com/events
?
jchristly@netsurion.com
www.netsurion.com
www.eventtracker.com
https://www.linkedin.com/in/johnchristly
@christly
@Netsurion @logtalk
THANK YOU

Contenu connexe

En vedette

6 Pitfalls when Implementing Enterprise Risk Management
6 Pitfalls when Implementing Enterprise Risk Management6 Pitfalls when Implementing Enterprise Risk Management
6 Pitfalls when Implementing Enterprise Risk ManagementPECB
 
PECB Webinaire: ISO 9001- Ce qui change en 2015.
PECB Webinaire: ISO 9001- Ce qui change en 2015. PECB Webinaire: ISO 9001- Ce qui change en 2015.
PECB Webinaire: ISO 9001- Ce qui change en 2015. PECB
 
Exercising BCMS plan
Exercising BCMS planExercising BCMS plan
Exercising BCMS planPECB
 
Baker Tilly Presents: Emerging Trends in Cybersecurity
Baker Tilly Presents: Emerging Trends in CybersecurityBaker Tilly Presents: Emerging Trends in Cybersecurity
Baker Tilly Presents: Emerging Trends in CybersecurityBakerTillyConsulting
 
Iso 22000 lead auditor course fsms - food safety management system - irca c...
Iso 22000 lead auditor course   fsms - food safety management system - irca c...Iso 22000 lead auditor course   fsms - food safety management system - irca c...
Iso 22000 lead auditor course fsms - food safety management system - irca c...Intertek Moody
 
La investigacion aplicada a la educacion virtual
La investigacion aplicada a la educacion virtualLa investigacion aplicada a la educacion virtual
La investigacion aplicada a la educacion virtualLuz Marina Melendez Campos
 

En vedette (7)

6 Pitfalls when Implementing Enterprise Risk Management
6 Pitfalls when Implementing Enterprise Risk Management6 Pitfalls when Implementing Enterprise Risk Management
6 Pitfalls when Implementing Enterprise Risk Management
 
PECB Webinaire: ISO 9001- Ce qui change en 2015.
PECB Webinaire: ISO 9001- Ce qui change en 2015. PECB Webinaire: ISO 9001- Ce qui change en 2015.
PECB Webinaire: ISO 9001- Ce qui change en 2015.
 
The new ISO 9001:2015
The new ISO 9001:2015The new ISO 9001:2015
The new ISO 9001:2015
 
Exercising BCMS plan
Exercising BCMS planExercising BCMS plan
Exercising BCMS plan
 
Baker Tilly Presents: Emerging Trends in Cybersecurity
Baker Tilly Presents: Emerging Trends in CybersecurityBaker Tilly Presents: Emerging Trends in Cybersecurity
Baker Tilly Presents: Emerging Trends in Cybersecurity
 
Iso 22000 lead auditor course fsms - food safety management system - irca c...
Iso 22000 lead auditor course   fsms - food safety management system - irca c...Iso 22000 lead auditor course   fsms - food safety management system - irca c...
Iso 22000 lead auditor course fsms - food safety management system - irca c...
 
La investigacion aplicada a la educacion virtual
La investigacion aplicada a la educacion virtualLa investigacion aplicada a la educacion virtual
La investigacion aplicada a la educacion virtual
 

Plus de PECB

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of CybersecurityDORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of CybersecurityPECB
 
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI GovernanceSecuring the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI GovernancePECB
 
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...PECB
 
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...PECB
 
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyPECB
 
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...PECB
 
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital TransformationISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital TransformationPECB
 
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsManaging ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsPECB
 
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?PECB
 
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...PECB
 
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...PECB
 
Student Information Session University KTMC
Student Information Session University KTMC Student Information Session University KTMC
Student Information Session University KTMC PECB
 
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...PECB
 
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...PECB
 
Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA PECB
 
IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?PECB
 
Information Session University Egybyte.pptx
Information Session University Egybyte.pptxInformation Session University Egybyte.pptx
Information Session University Egybyte.pptxPECB
 
Student Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptxStudent Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptxPECB
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023PECB
 

Plus de PECB (20)

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of CybersecurityDORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
 
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI GovernanceSecuring the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
 
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
 
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
 
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
 
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
 
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital TransformationISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
 
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsManaging ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
 
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
 
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
 
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
 
Student Information Session University KTMC
Student Information Session University KTMC Student Information Session University KTMC
Student Information Session University KTMC
 
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
 
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
 
Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA
 
IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?
 
Information Session University Egybyte.pptx
Information Session University Egybyte.pptxInformation Session University Egybyte.pptx
Information Session University Egybyte.pptx
 
Student Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptxStudent Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptx
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023
 

Dernier

Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...Pooja Nehwal
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxShobhayan Kirtania
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 

Dernier (20)

Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptx
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 

6 Steps to Secure Your Organization from Cybersecurity Threats

  • 1.
  • 2. John Christly Global Chief Information Security Officer Netsurion and EventTracker • Cybersecurity Evangelist, security blogger, threat researcher, and has participated in international, regional and national events as a speaker and panelist • Has taught groups including ISACA, ACFE, and ISSA on topics ranging from forensics to auditing IT systems for fraud • Is the former Founder and CEO of OMC Systems, a cybersecurity advisory firm that developed a custom web based incident management platform used in healthcare • Is an MSI Senior Fellow™ and has many years of experience in technical and cybersecurity management both domestically and internationally • Holds various certifications including the ISC2 CISSP, Certified Fraud Examiner, AccessData Certified Examiner, PMI PMP, HIPAA Security Specialist, Lean Six Sigma Master Black Belt, and is a Florida Licensed Private Investigator. • Experience includes several industry regulations including HIPAA, HITECH, GLBA, FERPA, FCPA, FIPA, and PCI Copyright © 2017 Netsurion. All Rights Reserved. Reproduction Prohibited.
  • 3. About Netsurion and EventTracker Netsurion is a managed security service provider specializing in the protection of multi-location businesses’ information, payment systems, and Wi-Fi networks from data breaches, network outages, and ever-evolving cyberthreats. Netsurion’s patented remote installation process and PCI compliance solutions help simplify the implementation process and ongoing support. Any sized branch or remote office, franchise, or sole proprietor operation can use Netsurion without the costs of on-site support. Our service offering – SIEM-at-the-Edge – is powered by our subsidiary, EventTracker, which helps deliver comprehensive security benefits to “edge” locations that normally would not have the means to leverage such a solution. EventTracker’s advanced security solutions protect enterprises and small businesses from data breaches and insider fraud, and streamline regulatory compliance. EventTracker’s platform comprises SIEM, vulnerability scanning, intrusion detection, behavior analytics, a HoneyNet deception network and other defense-in-depth capabilities within a single management platform. The company complements its state-of-the-art technology with 24/7 managed services from its global security operations center (SOC) to ensure its customers achieve desired outcomes—safer networks, better endpoint security, earlier detection of intrusion, and relevant and specific threat intelligence. The company serves the retail, hospitality, healthcare, legal, banking and financial services, utilities, and government sectors. Copyright © 2017 Netsurion. All Rights Reserved. Reproduction Prohibited.
  • 4. Humans are the weakest link Copyright © 2017 Netsurion. All Rights Reserved. Reproduction Prohibited. Humansaretheweakestlink According to the Verizon DBIR 2016, phishing tops the list of increasing concerns and cybercriminals are exploiting humans as the weakest link phishing 63% of confirmed data breaches involved leveraging weak/default/stolen passwords
  • 5. Best Practice #1: Secure the human • Provide employees with cybersecurity awareness training. • Control access to critical systems and information. Copyright © 2017 Netsurion. All Rights Reserved. Reproduction Prohibited.
  • 6. Absolute security is impossible Copyright © 2017 Netsurion. All Rights Reserved. Reproduction Prohibited. SECURITY SPEND DOES NOT ALWAYS CORRELATE TO EFFECTIVENESS
  • 7. Best Practice #2: Optimize your security investment • Conduct IT asset audit and prioritize assets based on risk. • Identify events that can cause interruptions to business processes, along with the probability and impact, and their consequences for information security.** • Designate your highest level of protection to your most critical assets. Copyright © 2017 Netsurion. All Rights Reserved. Reproduction Prohibited.
  • 8. Best Practice #3: Start with the basics Think of it as layers of protection. The basic layer of security, at the bottom, is the staple of every business network. • Firewalls • Up-to-date Anti-virus • Patch Management • Vulnerability Management Copyright © 2017 Netsurion. All Rights Reserved. Reproduction Prohibited. IDS/IPSPay Attention Patch ManagementAnti-Virus Vulnerability Scanner Unified Threat Mgmt AuthenticationNextGen Firewall
  • 9. Best Practice #4: Layer on more advanced security Copyright © 2017 Netsurion. All Rights Reserved. Reproduction Prohibited. HardenedDiligent IDS/IPSPay Attention Patch ManagementAnti-Virus Vulnerability Scanner File Integrity Monitoring Vulnerability Assessment Log Search PCI-DSS | HIPAA | FFIEC | SEC FISMA | Gov| Military/RMF| etc. Compliance Reports Review & Annotation Incidents Notifications Centralized Log Management International ISO 27001(2) GPG 13 UK Unified Threat Mgmt AuthenticationNextGen Firewall
  • 10. There’s no such thing as perfect prevention Copyright © 2017 Netsurion. All Rights Reserved. Reproduction Prohibited. 82% 67% of attackers spent several days retrieving assets. 25% of organizations who suffered an incident were able to discover it within days. of attackers were able to complete a compromise within “minutes.” This trend points to an ongoing detection deficit disorder. The suggestion is that defenders struggle to uncover the indicators of compromise.
  • 11. Best Practice #5: Detection You must look for other common evidence of compromise, such as: • command and control activity • suspicious network traffic • file access • unauthorized use of valid credentials Copyright © 2017 Netsurion. All Rights Reserved. Reproduction Prohibited.
  • 12. Hurdles to overcome Copyright © 2017 Netsurion. All Rights Reserved. Reproduction Prohibited.
  • 13. Best Practice #6: Co-sourcing Copyright © 2017 Netsurion. All Rights Reserved. Reproduction Prohibited. Improve Security & Operations Real-time Visibility & Oversight Augment Staff & Reduce Costs
  • 14.  SIEM and event correlation  Actionable threat intelligence analyzed by SOC  Unlimited log management SIEM and Log Management  Honeynet deception as a service  Alert turning and automated response rules  Endpoint USB Monitoring Threat Detection and Response  Vulnerability assessment  Network vulnerability scanning  Network intrusion detection Vulnerability Assessment  Monitors user activity and alerts on anomalous activity  Reveals system misuse or compromise  Ensures audit trails for compliance Behavior Analysis  File integrity monitoring  Automated log review  FISMA, PCI DSS, HIPAA, NIST, GPG13 and more Compliance Management Firewall and Anti-Virus Copyright © 2017 Netsurion. All Rights Reserved. Reproduction Prohibited. Complete Managed Security
  • 15.  Strategic security initiative roll-out program  Communication and change management expertise  Educate and encourage adoption  Generate awareness and support BrandGuard Trust in your brand starts with security. Copyright © 2017 Netsurion. All Rights Reserved. Reproduction Prohibited. Security Adoption for Franchisees
  • 16. DETECTRESPOND PREVENTPREDICT SIEMphonic (Co-Managed SIEM)  Prevent: Vulnerability scan, harden, divert via Honeypot, PTaaS  Detect: 24/7 coverage  Respond: Forensics, remediation recommendations, on-site retainer  Predict: Dedicated analyst team, broad threat intel sources, risk register ANALYZE MONITOR 24/7  Full range of technology + services, ideal for small InfoSec teams  Simplify and reduce the time to implement, administer and scale SIEM++ Advanced Threat Detection and Response SIEMPHONIC Copyright © 2017 Netsurion. All Rights Reserved. Reproduction Prohibited. 24/7 Co-Managed SIEM
  • 17. PECB IT Security Training Courses  ISO/IEC 27032 Lead Cybersecurity Manager 5 Day Course  Lead Pen Test Professional 5 Days Course  ISO/IEC 27034 Application Security 5 Days Course  ISO/IEC 27035 Information Security Incident Management 5 Days Course  Computer Forensics Examiner 5 Days Course Exam and certification fees are included in the training price. https://www.pecb.com/it-security | www.pecb.com/events

Notes de l'éditeur

  1. ** from ISO standard
  2. Stats are from 2016 Verizon Data Breach Investigations Report
  3. Technology alone is about 15 percent of the solution. Expert analysts and robust, disciplined, and documented are the remaining 85 percent.