6060
TRANSCRIPT
Confienc
Inter
Aval
People
System
Process
80-443
Unorganized, unmanaged, unsecured data is a reason for crimes
Enery
Transport
Communication
Chemical
Commercial
Critical Manufacturing
Dams
Defense industrial base
Emergency services
Water and wastewater systems
Financial services
Food and agriculture
Gov Facilities
Health care public
Information
Nuclear reactors
Actors:
Political/Religious
Hacktivism, Criminals
Nature Disaster
Russian business network
Tech change
Cyber laws:
HIPAA
Payment card industry
Child Porno
FERPA
Privacy act
GLB act or GLBA
Computer Fraud
Prudent Person Rule
Breaches in cyber laws
Intellectual laws
Patents
Trademarks
Copyright
Trade Secrets
Software privacy
Import and export
Information data flow
Privacy – Pii
Guidelines:
Build a comprehensive cyber security policy
Governance
Cyber Hygiene
Defense in depth with defense in breath
Security triangle
Empower a trusted chief information security officer
Include SME and consultant resources
Cyber Workforce Education & Training
Least privileges and separation of duties
Methodology focus verses technology focused