Implementing and Executing a Cybersecurity Plan - PowerPoint PPT Presentation

About This Presentation
Title:

Implementing and Executing a Cybersecurity Plan

Description:

| To thwart cyber attacks, companies must implement a cybersecurity plan designed to prevent data theft and similar damaging events. This plan should include appropriate training of personnel as well as maintenance of up-to-date security tools and programs. – PowerPoint PPT presentation

Number of Views:136
Slides: 12
Provided by: Fidelis0202
Category: Other

less

Transcript and Presenter's Notes

Title: Implementing and Executing a Cybersecurity Plan


1
(No Transcript)
2
  • Hardly a week passes without a report of yet
    another high-profile case where cyber criminals
    steal off with heaps of credit cards numbers or
    other sensitive data. Deterring cybercrime is a
    pressing concern for any business owner, but many
    have only a vague idea about the proper way to go
    about implementing a security plan. With that in
    mind, heres an overview of cybersecurity and
    what you can do to keep your business safe from
    attack.

3
  • From governmental agencies to private companies,
    organizations of all sizes can be and have been
    targeted by malicious hackers.
  • In late 2014, the FBI issued an official advisory
    that warned the U.S. business community of the
    danger posed by highly sophisticated malware
    attacks.

4
  • Some threat actors simply intend to cause havoc
    by wrecking a companys computer systems, but in
    many cases financial gain is the goal.
  • Intellectual property, financial data, personal
    identifiable information. The latter poses a
    tempting target due to the widespread consumer
    habit of reusing passwords across multiple sites.
  • In 2013, a single data breach enabled hackers to
    nab around two million usernames and passwords
    from 93,000 (!) sites.

5
  • A company that falls victim to a data breach can
    suffer a number of negative consequences that may
    even threaten the continued existence of the
    organization. These consequences can include
  • Loss of customer confidence
  • Loss of sensitive data (if hard drives are
    erased)
  • Fines and penalties from regulatory agencies
    and/or credit card companies if data security
    rules (e.g., the PCI DSS) were flouted

6
  • Far too many businesses wait until disaster
    strikes before putting together a loss mitigation
    plan to cope with the fallout from a data breach.
    For others, security measures put in place
    simply arent adequate.
  • For optimal protection against hackers, its
    important to implement a wide-ranging
    cybersecurity plan.

7
  • A comprehensive cybersecurity plan consists of
    two primary elements the right personnel and the
    right security products.
  • Relevant in-house staff should be familiar with
    the various aspects of the cybersecurity system
    in place. They should also be aware of correct
    actions to take in the event of a confirmed or
    suspected data breach.
  • Its also vitally important to maintain
    up-to-date cybersecurity products, including
    firewalls and malware detection software.

8
  • In addition to training in-house personnel, many
    companies elect to hire a third-party
    organization for assistance with cybersecurity,
    including
  • Incident response - Some cybersecurity companies
    have 24/7 hotlines in the event of a breach.
  • Forensic analysis - This includes collecting
    and/or reverse-engineering malware and similar
    threats.
  • Prevention assessments - This evaluates potential
    security risks of a particular system.

9
Cybersecurity Products and Services
  • Firewalls and anti-virus programs are standard
    elements of any cybersecurity system, but for
    maximal security its important to consider more
    advanced tools, such as
  • Automated threat intelligence - This can detect
    Internet-based hazards (e.g., malware) before
    they wreak havoc.
  • Data exfiltration prevention - This stops
    unauthorized transmission of sensitive data.
  • Metadata capture - Every network transaction is
    logged for future analysis
  • Actionable Visibility Ability to see and take
    action on everything in the network.

10
  • General Dynamics Fidelis Cybersecurity Solutions
    offers a comprehensive portfolio of products,
    services, and expertise to combat todays
    sophisticated advanced threats and prevent data
    breaches. Our commercial enterprise and
    government customers around the globe can face
    advanced threats with confidence through use of
    our Network Defense and Forensics Services,
    delivered by a team of security professionals
    with decades of hands-on experience, and our
    award-winning Fidelis XPS Advanced Threat Defense
    products, which provide visibility and control
    over the entire threat lifecycle. To learn more
    about General Dynamics Fidelis Cybersecurity
    Solutions, please visit www.fidelissecurity.com.

11
About General Dynamics Fidelis Cybersecurity
Solutions
  • http//www.fidelissecurity.com/products/advanced-t
    hreat-defense
  • http//www.fidelissecurity.com/services/breach-ser
    vices
  • http//www.threatgeek.com/2014/11/are-you-playing-
    cybersecurity-chess.html
  • http//www.threatgeek.com/2014/10/write-the-playbo
    ok-before-gameday.html
  • http//www.nato.int/docu/review/2013/cyber/timelin
    e/EN/index.htm
  • http//www.fastcompany.com/3039273/fbi-warns-us-co
    mpanies-vulnerable-in-the-wake-of-sony-cyberattack
Write a Comment
User Comments (0)
About PowerShow.com