Transcript
Page 1: Essentials for a Cybersecurity Framework

SE

CU

RIT

Y

Essentials for a Cybersecurity Framework

Michelle Syc

Senior Analyst, Advisory & Assurance Services

ADNET Technologies, LLC

Page 2: Essentials for a Cybersecurity Framework

SE

CU

RIT

Y

Roadmap

Cyberspace debunkedCyber security executive orderCyber Security Quick wins

Page 3: Essentials for a Cybersecurity Framework

Image Source: GoWest, Quickly spread the Bitcoin virtual worlds 2012 http://bitcoin.hu/?p=2324

Page 4: Essentials for a Cybersecurity Framework

SE

CU

RIT

Y

Cyber Space

• extension of the human mind and human society

• U.S. Constitution does not necessarily apply

• Belongs to everyone• No one in charge • No centralized protection• No U.S. national policy on cyber attacks

Page 6: Essentials for a Cybersecurity Framework

SE

CU

RIT

YImage Source: O’Hara Sean, EV Studio at: http://evstudio.com/floor-plan-for-small-1200-sf-house-with-3-bedrooms-and-2-bathrooms/

Scenario 1:• 3 young children• Front and Back door wide open• Front door open to busy street 5 feet away• All internal doors wide open• Storage closet = uneven flight of stairs, no banisters, unfinished basement• Man-to-man defense

Page 7: Essentials for a Cybersecurity Framework

SE

CU

RIT

YImage Source: O’Hara Sean, EV Studio at: http://evstudio.com/floor-plan-for-small-1200-sf-house-with-3-bedrooms-and-2-bathrooms/

Scenario 2:• 3 young children• Front and Back door wide open• Front door opens to busy street 5 feet away• All internal doors wide open• Storage closet = uneven flight of stairs, no banisters, unfinished basement• Zone Defense

Page 8: Essentials for a Cybersecurity Framework

SE

CU

RIT

YImage Source: O’Hara Sean, EV Studio at: http://evstudio.com/floor-plan-for-small-1200-sf-house-with-3-bedrooms-and-2-bathrooms/

Scenario 2:• 3 young children• Front and Back door wide open• Front door opens to busy street 5 feet away• All internal doors wide open• Storage closet = uneven flight of stairs, no banisters, unfinished basement• Zone Defense

Page 9: Essentials for a Cybersecurity Framework

SE

CU

RIT

YImage Source: O’Hara Sean, EV Studio at: http://evstudio.com/floor-plan-for-small-1200-sf-house-with-3-bedrooms-and-2-bathrooms/

Scenario 2:• 3 young children• Front and Back door wide open• Front door opens to busy street 5 feet away• All internal doors wide open• Storage closet = uneven flight of stairs, no banisters, unfinished basement• Zone Defense

Page 10: Essentials for a Cybersecurity Framework

SE

CU

RIT

YImage Source: O’Hara Sean, EV Studio at: http://evstudio.com/floor-plan-for-small-1200-sf-house-with-3-bedrooms-and-2-bathrooms/

Scenario 2:• 3 young children• Front and Back door wide open• Front door opens to busy street 5 feet away• All internal doors wide open• Storage closet = uneven flight of stairs, no banisters, unfinished basement• Zone Defense

Page 11: Essentials for a Cybersecurity Framework

SE

CU

RIT

YImage Source: O’Hara Sean, EV Studio at: http://evstudio.com/floor-plan-for-small-1200-sf-house-with-3-bedrooms-and-2-bathrooms/

Scenario 1:• 3 young children• Front and Back door wide open• Front door open to busy street 5 feet away• All internal doors wide open• Storage closet = uneven flight of stairs, no banisters, unfinished basement• Man-to-man defense

Scenario 2:• 3 young children• Front and Back door wide open• Front door opens to busy street 5 feet away• All internal doors wide open• Storage closet = uneven flight of stairs, no banisters, unfinished basement• Zone Defense

Scenario 3:• One 5-year-old, two 2-year-old twins• Front and Back door wide open• Front door open to busy street 5 feet away• All internal doors wide open• Storage closet = uneven flight of stairs, no banisters, unfinished basement• Zone Defense

Scenario 4:• One 5-year-old, two 2-year-old twins• Front and Back door wide open• Front door open to busy street 5 feet away• All internal doors wide open• Storage closet = patched and repaired stairs (carpeted / banisters)• Zone Defense

Scenario 5:• One 5-year-old, two 2-year-old twins• Front and Back closed and locked• All internal doors wide open• Storage closet = patched and repaired stairs (carpeted / banisters)• Zone Defense

Scenario 6:• One 5-year-old, two 2-year-old twins• Front and Back closed and locked• All internal doors closed• Storage closet = patched and repaired stairs (carpeted / banisters)• Restricted / Safe Zones

Page 12: Essentials for a Cybersecurity Framework

SE

CU

RIT

YImage Source: O’Hara Sean, EV Studio at: http://evstudio.com/floor-plan-for-small-1200-sf-house-with-3-bedrooms-and-2-bathrooms/

Scenario 3:• One 5-year-old, two 2-year-old twins• Front and Back door wide open• Front door open to busy street 5 feet away• All internal doors wide open• Storage closet = uneven flight of stairs, no banisters, unfinished basement• Zone Defense

Page 13: Essentials for a Cybersecurity Framework

SE

CU

RIT

YImage Source: O’Hara Sean, EV Studio at: http://evstudio.com/floor-plan-for-small-1200-sf-house-with-3-bedrooms-and-2-bathrooms/

Scenario 4:• One 5-year-old, two 2-year-old twins• Front and Back door wide open• Front door open to busy street 5 feet away• All internal doors wide open• Storage closet = patched and repaired stairs (carpeted / banisters)• Zone Defense

Page 14: Essentials for a Cybersecurity Framework

SE

CU

RIT

YImage Source: O’Hara Sean, EV Studio at: http://evstudio.com/floor-plan-for-small-1200-sf-house-with-3-bedrooms-and-2-bathrooms/

Scenario 5:• One 5-year-old, two 2-year-old twins• Front and Back closed and locked• All internal doors wide open• Storage closet = patched and repaired stairs (carpeted / banisters)• Zone Defense

Page 15: Essentials for a Cybersecurity Framework

SE

CU

RIT

YImage Source: O’Hara Sean, EV Studio at: http://evstudio.com/floor-plan-for-small-1200-sf-house-with-3-bedrooms-and-2-bathrooms/

Scenario 6:• One 5-year-old, two 2-year-old twins• Front and Back closed and locked• All internal doors closed• Storage closet = patched and repaired stairs (carpeted / banisters)• Restricted / Safe Zones

Page 16: Essentials for a Cybersecurity Framework

SE

CU

RIT

YAp

plica

tion

Whi

te Li

sting

Patch SystemsUpdate

ApplicationsUse Common,

Secure Configuration

Reduce

Administrative

PrivilegesFive Quick Wins for effective

Cyber Security

Page 17: Essentials for a Cybersecurity Framework

SE

CU

RIT

Y

Roadmap

Cyberspace debunkedCyber security executive orderCyber Security Quick wins

Page 18: Essentials for a Cybersecurity Framework

SE

CU

RIT

Y

Additional Resources

• http://www.whitehouse.gov/cybersecurity• http://www.sans.org/critical-security-controls• http://www.cyberaction.org• http://csrc.nist.gov/

@ADNETTech #WorkSmart

@ADNETTechnologiesLLC

@[email protected]


Top Related