this is your presentation titlethreats coremax •over 11 percent of total pc users are working on a...

14
Bob Linehan CoreMax Consulting June 1, 2016 Cyber Hygiene

Upload: others

Post on 05-Aug-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: THIS IS YOUR PRESENTATION TITLEThreats CoreMax •Over 11 percent of total PC users are working on a very vulnerable Windows XP system. •Over 500,000 new samples of distinct malware

Bob LinehanCoreMax Consulting

June 1, 2016

Cyber Hygiene

Page 2: THIS IS YOUR PRESENTATION TITLEThreats CoreMax •Over 11 percent of total PC users are working on a very vulnerable Windows XP system. •Over 500,000 new samples of distinct malware

AgendaCoreMax

Cybersecurity

Threats

What’s is the Risk?

Access Controls

Risk types

Resources

Controls

Cyber Hygiene

Getting Started

Page 3: THIS IS YOUR PRESENTATION TITLEThreats CoreMax •Over 11 percent of total PC users are working on a very vulnerable Windows XP system. •Over 500,000 new samples of distinct malware

CyberSecurity CoreMax

Cybersecurity = Information Technology Security

Sophisticated cyber actors and nation-states exploit vulnerabilities

Serious Homeland Threat

Page 4: THIS IS YOUR PRESENTATION TITLEThreats CoreMax •Over 11 percent of total PC users are working on a very vulnerable Windows XP system. •Over 500,000 new samples of distinct malware

ThreatsCoreMax

• Over 11 percent of total PC users are working on a very vulnerable Windows XP system.

• Over 500,000 new samples of distinct malware are seen per day just by Virustotal, so relying on traditional anti-malware defenses is becoming a losing battle.

• The 2015 IBM Cost of Data Breach report found a consolidated average cost for an organization experiencing a breach of 3.8M or $154 per record

• 85% of known vulnerabilities can be stopped by deploying the Top 5 CIS Controls.

Page 5: THIS IS YOUR PRESENTATION TITLEThreats CoreMax •Over 11 percent of total PC users are working on a very vulnerable Windows XP system. •Over 500,000 new samples of distinct malware

What is the Risk?CoreMax

Source Gartner Consulting

Page 6: THIS IS YOUR PRESENTATION TITLEThreats CoreMax •Over 11 percent of total PC users are working on a very vulnerable Windows XP system. •Over 500,000 new samples of distinct malware

Access ControlsCoreMax

Access control is a security technique that can be used to regulate who or what can view or use resources in a computing environment.

There are 2 main types of access control: Physical Logical.

Access Control Systems Perform:• Authorization identification • Authentication • Access approval • Accountability of entities through login credentials

Page 7: THIS IS YOUR PRESENTATION TITLEThreats CoreMax •Over 11 percent of total PC users are working on a very vulnerable Windows XP system. •Over 500,000 new samples of distinct malware

Risk TypesCoreMax

• Malware

• Ransomware

• Phishing

• Password Attacks

• Rogue Software

• Denial-of-Service (DoS) Attacks

• Man in the Middle (MITM)

• Drive-By Downloads

• Malvertising

Page 8: THIS IS YOUR PRESENTATION TITLEThreats CoreMax •Over 11 percent of total PC users are working on a very vulnerable Windows XP system. •Over 500,000 new samples of distinct malware

Resources CoreMax

Page 9: THIS IS YOUR PRESENTATION TITLEThreats CoreMax •Over 11 percent of total PC users are working on a very vulnerable Windows XP system. •Over 500,000 new samples of distinct malware

Client

Privacy

CIS

FISMA

FERPA

ITIL

NSA MNP

ISO

HIPAA/

HITECH

NIST

CoreMax

Confidential & Proprietary

Security Controls

Page 10: THIS IS YOUR PRESENTATION TITLEThreats CoreMax •Over 11 percent of total PC users are working on a very vulnerable Windows XP system. •Over 500,000 new samples of distinct malware

CoreMax

National Institute of Standards and Technology (CSF)

IdentifyProtectDetectRespond Recover

Cyber Hygiene

Page 11: THIS IS YOUR PRESENTATION TITLEThreats CoreMax •Over 11 percent of total PC users are working on a very vulnerable Windows XP system. •Over 500,000 new samples of distinct malware

CoreMax

COUNT: Know what's connected to your network

CONFIGURE: Protect your systems by implementing key security settings.

CONTROL: Protect your systems by properly managing accounts and limiting user and administrator privileges to only what they need to do their job.

PATCH: Protect your systems by keeping current!

REPEAT: This is a 'cycle of events' that must repeat itself frequently enough when appropriate.

Cyber Hygiene

Page 12: THIS IS YOUR PRESENTATION TITLEThreats CoreMax •Over 11 percent of total PC users are working on a very vulnerable Windows XP system. •Over 500,000 new samples of distinct malware

Get Started……

CoreMax

What am I trying to protect?

Where are my gaps?

What are my priorities?

Where can I automate?

How can my vendor partners help?

Page 13: THIS IS YOUR PRESENTATION TITLEThreats CoreMax •Over 11 percent of total PC users are working on a very vulnerable Windows XP system. •Over 500,000 new samples of distinct malware

CoreMax

Inventory of Authorized and Unauthorized DevicesInventory of Authorized and Unauthorized SoftwareSecure Configurations for Hardware and SoftwareContinuous Vulnerability Assessment and RemediationControlled Use of Administrative PrivilegesMaintenance, Monitoring, and Analysis of Audit LogsEmail and Web Browser ProtectionsMalware DefensesLimitation and Control of Network PortsData Recovery CapabilitySecure Configurations for Network DevicesBoundary DefenseData ProtectionControlled Access Based on the Need to KnowWireless Access ControlAccount Monitoring and ControlSecurity Skills Assessment and Training to Fill GapsApplication Software SecurityIncident Response and ManagementPenetration Tests and Red Team Exercises

……….Work Through the Controls List

Page 14: THIS IS YOUR PRESENTATION TITLEThreats CoreMax •Over 11 percent of total PC users are working on a very vulnerable Windows XP system. •Over 500,000 new samples of distinct malware

Robert LinehanPrincipalCoreMax [email protected]

Thank You

CoreMax