the first step in cybersecurity. past threats and incident of cybersecurity 76 % of organizations...
TRANSCRIPT
The First Step in Cybersecurity
Past Threats and Incident of Cybersecurity
• 76 % of organizations polled by CompTIA said they experienced them [a cybersecurity attack] in 2011
• Victims: Google, TJX Companies, Target, LinkedIn, RSA Security, US Senate, and the CIA
• Port of Antwerp– Drug traffickers recruited hackersto breach IT systems that controlled the movement and location of containers.– Two companies that operated within the port.– Installed firewall and still managed to install keyloggers– http://www.bbc.com/news/world-europe-24539417
Methods of infiltration
• Resident/Partner Companies• Remote Hacking• Vendor Applications• Network Enabled Hardware• Social Networking• BYOD• Physical Access
Compliance Initiatives
• Port Specific Compliance– President Issued Executive Order 13636– NIST Framework Released in February 2014
• Industry Compliance:– HIPAA ACT– HITECH ACT– GLBA– Sarbanes-Oxley– Telecommunications Act of 1996
Identify
Identify
Identify
Protect
Protect
Protect
Detect
Detect
Respond and Recover