insights 2015 - cybersecurity- game planning for success
TRANSCRIPT
![Page 1: Insights 2015 - Cybersecurity- Game Planning for Success](https://reader036.vdocuments.mx/reader036/viewer/2022083117/58850e441a28abd05e8b4d8f/html5/thumbnails/1.jpg)
CybersecurityGame Planning for Success
John Dolan & Derrick Helms, CISSP
![Page 2: Insights 2015 - Cybersecurity- Game Planning for Success](https://reader036.vdocuments.mx/reader036/viewer/2022083117/58850e441a28abd05e8b4d8f/html5/thumbnails/2.jpg)
AgendaDeveloping a strategy for success
![Page 3: Insights 2015 - Cybersecurity- Game Planning for Success](https://reader036.vdocuments.mx/reader036/viewer/2022083117/58850e441a28abd05e8b4d8f/html5/thumbnails/3.jpg)
#WBInsights15#WBInsights15
Overview
SecurityProven ProcessAssess
Plan and Design Implement
Detect
RemediateReport
Protect
![Page 4: Insights 2015 - Cybersecurity- Game Planning for Success](https://reader036.vdocuments.mx/reader036/viewer/2022083117/58850e441a28abd05e8b4d8f/html5/thumbnails/4.jpg)
#WBInsights15#WBInsights15
AssessPlan assessments based on needs• Risk• Compliance Requirements• Vulnerability Assessments• Policy• Current security controls
![Page 5: Insights 2015 - Cybersecurity- Game Planning for Success](https://reader036.vdocuments.mx/reader036/viewer/2022083117/58850e441a28abd05e8b4d8f/html5/thumbnails/5.jpg)
#WBInsights15#WBInsights15
Plan, Design and Implement
Plan and Design• Asset Patch Management• Written Information Security Policy• Security and Compliance/Incident Management Handbook • Multi-layer Approach • Roadmap
Implement• Phased roll-out• Test group before organization
![Page 6: Insights 2015 - Cybersecurity- Game Planning for Success](https://reader036.vdocuments.mx/reader036/viewer/2022083117/58850e441a28abd05e8b4d8f/html5/thumbnails/6.jpg)
#WBInsights15#WBInsights15
ProtectProtect in Layers based on Assets • Network Level• Host Level• User Level • Data in transit• Remote Access • BYOD – Smartphones/Tablets
![Page 7: Insights 2015 - Cybersecurity- Game Planning for Success](https://reader036.vdocuments.mx/reader036/viewer/2022083117/58850e441a28abd05e8b4d8f/html5/thumbnails/7.jpg)
#WBInsights15#WBInsights15
Detect and RemediateDetect • Do you know who is accessing your network? • Do you know who is accessing and changing files? • Do you know when you users are logging in and out? From Where?
Remediate • What are you doing to remediate your findings?• Is there a action plan or incident management policy on
what to do and a clear understanding of who is accountable for making sure it gets done?
![Page 8: Insights 2015 - Cybersecurity- Game Planning for Success](https://reader036.vdocuments.mx/reader036/viewer/2022083117/58850e441a28abd05e8b4d8f/html5/thumbnails/8.jpg)
#WBInsights15#WBInsights15
ReportDefine Key information – What is happening?• Systems• Software• Events• Users• Incidents• Web Activity• File Access
![Page 9: Insights 2015 - Cybersecurity- Game Planning for Success](https://reader036.vdocuments.mx/reader036/viewer/2022083117/58850e441a28abd05e8b4d8f/html5/thumbnails/9.jpg)
Thank you!utgsolutions.com
John Dolan [email protected] 678-730-2793
Derrick Helms, [email protected] 678-730-2742