cyber readiness and hygiene for government contractors

14
Defend Your High Value Data and Information Systems GTSC August 2017 Copyright © 2017, DAR Partners, Inc. All rights reserved. | www.DARpartners.com

Upload: kristina-tanasichuk

Post on 22-Jan-2018

22 views

Category:

Government & Nonprofit


1 download

TRANSCRIPT

Defend Your High Value Data and Information Systems

GTSC August 2017

Copyright © 2017, DAR Partners, Inc. All rights reserved. | www.DARpartners.com

•  Poorpasswordmanagement•  Leavingyourcomputeron,una6ended•  Openinge-maila6achmentsfromstrangers•  Notinstallingan=-virusso>ware•  Laptopsontheloose•  WeakOPSEC•  PlugandPlaywithoutprotec=on•  Notrepor=ngsecurityviola=ons•  Alwaysbehindthe=mes(OS,applica=onpatches)•  Keepinganeyeoutinsidetheorganiza=on

Top10securitymistakesof2001

Why isn't cyber security a top priority?

Black–Scholesequa/onisamathema/calmodelofafinancialmarketcontainingderiva/veinvestmentinstrumentsprovidingthetheore/cales/mateofthepriceofEuropean-styleop/ons

Where is cybersecurity on your priority list?

Think Like the Bad Guys

Copyright © 2016, DAR Partners, Inc. All rights reserved. | www.DARpartners.com

Kabul, Afghanistan, Source: The Companion

“The 8-Month Search”

Copyright © 2017, DAR Partners, Inc. All rights reserved. | www.DARpartners.com

ASK YOURSELF THESE QUESTIONS §  What malware and anti-virus tools do you have deployed and do

you update them regularly? (Border, Servers, Laptops/Desktops, etc.)!

!§  Do you review alerts and what is your incident response

processes? " " " "!§  What solutions and policies do you have in place to prevent and/

or mitigate the unintentional unauthorized disclosure? "" " " "!

§  Do you educate and frequently test your users to build awareness? " " " " "!

§  Do you perform vulnerability assessment frequently to see what hackers can take advantage of you with? " " "

" "!!

No Plan, No…, No…

Where Are You Putting That Data

What security controls are in place to protect it?

JOHN HARRISON, DIRECTOR, CYBER SECURITY SERVICES Based in Washington, DC, John uses his military and intelligence experience to truly understand the adversary. With over 15 years in the security industry, he helps design cybersecurity programs to protect your profits, customers, and sensitive data. He is a combat service disabled veteran who served eight years in the US Marine Corps. Following his military career, he spent several years in the Intelligence Community where his insights and recommendations informed leaders like President Bush, President Obama, General David Petraeus, General John Allen, and international partnered nations with the aim at preventing terrorist attacks around the world. He has a bachelor’s degree in criminal law, an MBA from Georgetown, and several top cybersecurity certifications. [email protected]

Copyright © 2017, DAR Partners, Inc. All rights reserved. | www.DARpartners.com