![Page 1: The emerging battle between Cyber Defense and …...Mobile Threat Data is now mobile and connected devices are the target Commercial/Military UAVs Artificial intelligence Mobile payment](https://reader034.vdocuments.us/reader034/viewer/2022042111/5e8c207db9f93b5aac6e3bbb/html5/thumbnails/1.jpg)
“The emerging battle between Cyber Defense and Cybercrime: How Technology is changing to keep Company and HR data safe”
™ © Copyright 2017 Protocol 46, Inc.
All Rights Reserved
![Page 2: The emerging battle between Cyber Defense and …...Mobile Threat Data is now mobile and connected devices are the target Commercial/Military UAVs Artificial intelligence Mobile payment](https://reader034.vdocuments.us/reader034/viewer/2022042111/5e8c207db9f93b5aac6e3bbb/html5/thumbnails/2.jpg)
™ © Copyright 2017 Protocol 46, Inc.
All Rights Reserved
![Page 3: The emerging battle between Cyber Defense and …...Mobile Threat Data is now mobile and connected devices are the target Commercial/Military UAVs Artificial intelligence Mobile payment](https://reader034.vdocuments.us/reader034/viewer/2022042111/5e8c207db9f93b5aac6e3bbb/html5/thumbnails/3.jpg)
AGENDA
TM
BRIEF Update on Cyber Threat Landscape
HR Involvement
Solutions
Q&A
![Page 4: The emerging battle between Cyber Defense and …...Mobile Threat Data is now mobile and connected devices are the target Commercial/Military UAVs Artificial intelligence Mobile payment](https://reader034.vdocuments.us/reader034/viewer/2022042111/5e8c207db9f93b5aac6e3bbb/html5/thumbnails/4.jpg)
TM
Do we treat cybersecurity as:
an IT duty?an Operations duty?
or HR duty?
![Page 5: The emerging battle between Cyber Defense and …...Mobile Threat Data is now mobile and connected devices are the target Commercial/Military UAVs Artificial intelligence Mobile payment](https://reader034.vdocuments.us/reader034/viewer/2022042111/5e8c207db9f93b5aac6e3bbb/html5/thumbnails/5.jpg)
eCellarSystems, LLC
![Page 7: The emerging battle between Cyber Defense and …...Mobile Threat Data is now mobile and connected devices are the target Commercial/Military UAVs Artificial intelligence Mobile payment](https://reader034.vdocuments.us/reader034/viewer/2022042111/5e8c207db9f93b5aac6e3bbb/html5/thumbnails/7.jpg)
R.I.P. 201?
![Page 8: The emerging battle between Cyber Defense and …...Mobile Threat Data is now mobile and connected devices are the target Commercial/Military UAVs Artificial intelligence Mobile payment](https://reader034.vdocuments.us/reader034/viewer/2022042111/5e8c207db9f93b5aac6e3bbb/html5/thumbnails/8.jpg)
TM
![Page 9: The emerging battle between Cyber Defense and …...Mobile Threat Data is now mobile and connected devices are the target Commercial/Military UAVs Artificial intelligence Mobile payment](https://reader034.vdocuments.us/reader034/viewer/2022042111/5e8c207db9f93b5aac6e3bbb/html5/thumbnails/9.jpg)
TM
“If you have integrity,
….nothing else matters.
If you do NOT have integrity,
….nothing else matters.”
![Page 10: The emerging battle between Cyber Defense and …...Mobile Threat Data is now mobile and connected devices are the target Commercial/Military UAVs Artificial intelligence Mobile payment](https://reader034.vdocuments.us/reader034/viewer/2022042111/5e8c207db9f93b5aac6e3bbb/html5/thumbnails/10.jpg)
Mobile Threat
Data is now mobile and connected devices are the target
Commercial/Military UAVs
Artificial intelligence
Mobile payment
Networked telematics
Internet of things DDoS
Mirai Botnet
EVOLUTION OF THE CYBER THREATImpact of attacks growing as technology becomes more inter-connected
Unsophisticated Attacks
Exploration and Experimentation (Damage normally caused by accident)
Hacks conducted for Notoriety
1987 Christmas Tree Exec Worm
Attacks with a Purpose
Hackers identifying how to exploit weaknesses. Damage and Disruption done on purpose
Distinction between Script Kiddies and Hackers develops
Emergence of commercial internet (Web 1.0)
1992 – 1260 Virus (1st
Polymorphic Virus
1996- Cryptoviralogy is born
Age of Email
Hackers utilize email as the delivery system for worms and viruses
Criminal organizations start building infrastructure to exploit cyber crime.
Most activity is web defacement/network break-ins with limited data theft.
2002 – Web 2.0
Advent of BOT Attacks
RISE OF THE ELITE HACKER
Cyber Crime becomes monetized. (Data sales and Ransomware)
Widespread state sponsored attacks
Hackers start utilizing tertiary networks to breach the target.
Cyber Activism become commonplace
2010 – Operation Aurora revealed
June 2010 – Stuxnetreleased
Low
1990s 2000s1980s
High
Cyber terrorism
Insecure codes
Cyber crime
Identity theft
Hackers
Data breach
Network attacks
Malware
Critical infrastructure attacks
Foreign state sponsored cyber espionage
Cyber warfare
FUTURE2010-2016
BU
SIN
ES
S IM
PA
CT
![Page 11: The emerging battle between Cyber Defense and …...Mobile Threat Data is now mobile and connected devices are the target Commercial/Military UAVs Artificial intelligence Mobile payment](https://reader034.vdocuments.us/reader034/viewer/2022042111/5e8c207db9f93b5aac6e3bbb/html5/thumbnails/11.jpg)
Cybersecurity 2017 Trends• 'Malware’ as a precision tool to breach
an organization’s defenses
• Ransomware
• Phishing
![Page 12: The emerging battle between Cyber Defense and …...Mobile Threat Data is now mobile and connected devices are the target Commercial/Military UAVs Artificial intelligence Mobile payment](https://reader034.vdocuments.us/reader034/viewer/2022042111/5e8c207db9f93b5aac6e3bbb/html5/thumbnails/12.jpg)
0
50
100
150
200
250
Q1 2015 Q2 2015 Q3 2015 Q4 2015 Q1 2016 Q2 2016 Q3 2016 Q4 2016 Q1 2017
Volume of Spam 2015 - 2017In Excess of 205 Billion email per DAY
![Page 13: The emerging battle between Cyber Defense and …...Mobile Threat Data is now mobile and connected devices are the target Commercial/Military UAVs Artificial intelligence Mobile payment](https://reader034.vdocuments.us/reader034/viewer/2022042111/5e8c207db9f93b5aac6e3bbb/html5/thumbnails/13.jpg)
™
0
100,000
200,000
300,000
400,000
500,000
600,000
700,000
800,000
900,000
1,000,000
2007 2008 2009 2010 2011 2012 2013 2014 2015 2016
Volume of Malware 2007-20161 Million New Incidents Per DAY
![Page 14: The emerging battle between Cyber Defense and …...Mobile Threat Data is now mobile and connected devices are the target Commercial/Military UAVs Artificial intelligence Mobile payment](https://reader034.vdocuments.us/reader034/viewer/2022042111/5e8c207db9f93b5aac6e3bbb/html5/thumbnails/14.jpg)
Cyber Crime• Is Big Business for
Hackers
• Easy and Profitable to Sell Data
![Page 15: The emerging battle between Cyber Defense and …...Mobile Threat Data is now mobile and connected devices are the target Commercial/Military UAVs Artificial intelligence Mobile payment](https://reader034.vdocuments.us/reader034/viewer/2022042111/5e8c207db9f93b5aac6e3bbb/html5/thumbnails/15.jpg)
© Copyright Protocol 46 2017. All Rights Reserved.
![Page 16: The emerging battle between Cyber Defense and …...Mobile Threat Data is now mobile and connected devices are the target Commercial/Military UAVs Artificial intelligence Mobile payment](https://reader034.vdocuments.us/reader034/viewer/2022042111/5e8c207db9f93b5aac6e3bbb/html5/thumbnails/16.jpg)
• “Monetized” their activity
• More sophistication
• Smaller organizations targeted
™
Hacker ActivityPast to CurrentHacker ActivityPast to Current
![Page 17: The emerging battle between Cyber Defense and …...Mobile Threat Data is now mobile and connected devices are the target Commercial/Military UAVs Artificial intelligence Mobile payment](https://reader034.vdocuments.us/reader034/viewer/2022042111/5e8c207db9f93b5aac6e3bbb/html5/thumbnails/17.jpg)
Cost to any organization of a cyber-attack can literally destroy a
business.
![Page 18: The emerging battle between Cyber Defense and …...Mobile Threat Data is now mobile and connected devices are the target Commercial/Military UAVs Artificial intelligence Mobile payment](https://reader034.vdocuments.us/reader034/viewer/2022042111/5e8c207db9f93b5aac6e3bbb/html5/thumbnails/18.jpg)
- 2016 Ponemon Institute Cost of Data Breach Study
$Healthcare
$245Financial
$123Transportation
$71Public
$200Education
$149Industrial
$154Retail
$137Energy
$450
$400
$350
$300
$250
$200
$150
$100
$ 50
$0
Per-Record Data Breach Costs
by Industry
![Page 19: The emerging battle between Cyber Defense and …...Mobile Threat Data is now mobile and connected devices are the target Commercial/Military UAVs Artificial intelligence Mobile payment](https://reader034.vdocuments.us/reader034/viewer/2022042111/5e8c207db9f93b5aac6e3bbb/html5/thumbnails/19.jpg)
Norton / Symantec Corp: July 2016
Cost / Profit from Crime
• Global black market in marijuana, cocaine and heroin COMBINED: $288 billion
• Cost of global cybercrime: $388 billion and growing
![Page 20: The emerging battle between Cyber Defense and …...Mobile Threat Data is now mobile and connected devices are the target Commercial/Military UAVs Artificial intelligence Mobile payment](https://reader034.vdocuments.us/reader034/viewer/2022042111/5e8c207db9f93b5aac6e3bbb/html5/thumbnails/20.jpg)
Information from:
2016: • 1,093 data breaches in U.S. (TRACKED)
- almost half of World breaches
• 900,000,000 Records Stolen
![Page 21: The emerging battle between Cyber Defense and …...Mobile Threat Data is now mobile and connected devices are the target Commercial/Military UAVs Artificial intelligence Mobile payment](https://reader034.vdocuments.us/reader034/viewer/2022042111/5e8c207db9f93b5aac6e3bbb/html5/thumbnails/21.jpg)
Information from:
• Average consolidated cost of a data breach in 2016 was $17.36 million.
• Average small size company breach cost was $454,000
![Page 22: The emerging battle between Cyber Defense and …...Mobile Threat Data is now mobile and connected devices are the target Commercial/Military UAVs Artificial intelligence Mobile payment](https://reader034.vdocuments.us/reader034/viewer/2022042111/5e8c207db9f93b5aac6e3bbb/html5/thumbnails/22.jpg)
Information from:
Minimum Cost of Breach:• Small Company was
$300,000
• Medium size company was $6.7 million
• Large size company was
$73.75 million
![Page 23: The emerging battle between Cyber Defense and …...Mobile Threat Data is now mobile and connected devices are the target Commercial/Military UAVs Artificial intelligence Mobile payment](https://reader034.vdocuments.us/reader034/viewer/2022042111/5e8c207db9f93b5aac6e3bbb/html5/thumbnails/23.jpg)
“Economic cost”and
Reputational Costs
are Significant.
![Page 24: The emerging battle between Cyber Defense and …...Mobile Threat Data is now mobile and connected devices are the target Commercial/Military UAVs Artificial intelligence Mobile payment](https://reader034.vdocuments.us/reader034/viewer/2022042111/5e8c207db9f93b5aac6e3bbb/html5/thumbnails/24.jpg)
Only 6% of Companies will Survive Longer than 2
Years after a Data Breach.Gartner Research
![Page 25: The emerging battle between Cyber Defense and …...Mobile Threat Data is now mobile and connected devices are the target Commercial/Military UAVs Artificial intelligence Mobile payment](https://reader034.vdocuments.us/reader034/viewer/2022042111/5e8c207db9f93b5aac6e3bbb/html5/thumbnails/25.jpg)
™
A FIREWALL
AND
ANTI-
MALWARE
SOFTWARE
ARE NOTADEQUATE
PROTECTION!
![Page 26: The emerging battle between Cyber Defense and …...Mobile Threat Data is now mobile and connected devices are the target Commercial/Military UAVs Artificial intelligence Mobile payment](https://reader034.vdocuments.us/reader034/viewer/2022042111/5e8c207db9f93b5aac6e3bbb/html5/thumbnails/26.jpg)
You MIGHT be THINKING...
...But we have
our IT guys
protecting us
![Page 27: The emerging battle between Cyber Defense and …...Mobile Threat Data is now mobile and connected devices are the target Commercial/Military UAVs Artificial intelligence Mobile payment](https://reader034.vdocuments.us/reader034/viewer/2022042111/5e8c207db9f93b5aac6e3bbb/html5/thumbnails/27.jpg)
• Break / Fix
• Install Software
• Keep machines working
• Re-active
IT Department
CRITICAL TO UNDERSTAND DIFFERENCES
Works to:
• Detect
• Analyze
• Defend
• Proactive
Cyber Security
Your HR and IT Department’s Best Friend™
![Page 28: The emerging battle between Cyber Defense and …...Mobile Threat Data is now mobile and connected devices are the target Commercial/Military UAVs Artificial intelligence Mobile payment](https://reader034.vdocuments.us/reader034/viewer/2022042111/5e8c207db9f93b5aac6e3bbb/html5/thumbnails/28.jpg)
• Break / Fix
• Install Software
• Keep machines working
• Re-active
IT Department
CRITICAL TO UNDERSTAND DIFFERENCES
Prevents Bad Guys from:
• Gaining access to Company records
• Holding Company Hostage
Cyber Security
Your HR and IT Department’s Best Friend™
![Page 29: The emerging battle between Cyber Defense and …...Mobile Threat Data is now mobile and connected devices are the target Commercial/Military UAVs Artificial intelligence Mobile payment](https://reader034.vdocuments.us/reader034/viewer/2022042111/5e8c207db9f93b5aac6e3bbb/html5/thumbnails/29.jpg)
Nationally, the time elapsed from the initial breach to when the breach is detected exceeds 200 days- Accenture
![Page 30: The emerging battle between Cyber Defense and …...Mobile Threat Data is now mobile and connected devices are the target Commercial/Military UAVs Artificial intelligence Mobile payment](https://reader034.vdocuments.us/reader034/viewer/2022042111/5e8c207db9f93b5aac6e3bbb/html5/thumbnails/30.jpg)
Time from the detection of a new vulnerability by
to client notification is under 24 Hours
![Page 31: The emerging battle between Cyber Defense and …...Mobile Threat Data is now mobile and connected devices are the target Commercial/Military UAVs Artificial intelligence Mobile payment](https://reader034.vdocuments.us/reader034/viewer/2022042111/5e8c207db9f93b5aac6e3bbb/html5/thumbnails/31.jpg)
The Alliance NetworkJanuary 2016
TheSOLUTION
Military Grade Cyber Security Prevention and Protection
![Page 32: The emerging battle between Cyber Defense and …...Mobile Threat Data is now mobile and connected devices are the target Commercial/Military UAVs Artificial intelligence Mobile payment](https://reader034.vdocuments.us/reader034/viewer/2022042111/5e8c207db9f93b5aac6e3bbb/html5/thumbnails/32.jpg)
Best Defense is often Prevention85% of All Cyber
Security Attacks Can be Stopped by
Implementing
5 Cyber Security Tools
![Page 33: The emerging battle between Cyber Defense and …...Mobile Threat Data is now mobile and connected devices are the target Commercial/Military UAVs Artificial intelligence Mobile payment](https://reader034.vdocuments.us/reader034/viewer/2022042111/5e8c207db9f93b5aac6e3bbb/html5/thumbnails/33.jpg)
OUR SUITE of PRODUCTS
NimbleFeather™
Picket Fence™
RazorWire™
Stonewall Aegis™
TitaniumCastle
• We assess and rank a company’s vulnerabilities to hacking. This gives the Company’s IT department the ability to fix these weaknesses.
• Remember the IT department can't fix what it doesn’t know about.
• Your HR and IT Department’s Best Friend™
![Page 34: The emerging battle between Cyber Defense and …...Mobile Threat Data is now mobile and connected devices are the target Commercial/Military UAVs Artificial intelligence Mobile payment](https://reader034.vdocuments.us/reader034/viewer/2022042111/5e8c207db9f93b5aac6e3bbb/html5/thumbnails/34.jpg)
Cyber Security Protection
![Page 35: The emerging battle between Cyber Defense and …...Mobile Threat Data is now mobile and connected devices are the target Commercial/Military UAVs Artificial intelligence Mobile payment](https://reader034.vdocuments.us/reader034/viewer/2022042111/5e8c207db9f93b5aac6e3bbb/html5/thumbnails/35.jpg)
Cyber Security ProtectionEffective Security Strategies to Fortify and Thwart Threats
![Page 36: The emerging battle between Cyber Defense and …...Mobile Threat Data is now mobile and connected devices are the target Commercial/Military UAVs Artificial intelligence Mobile payment](https://reader034.vdocuments.us/reader034/viewer/2022042111/5e8c207db9f93b5aac6e3bbb/html5/thumbnails/36.jpg)
Cyber Security ProtectionEffective Security Strategies to Fortify and Thwart Threats
© Copyright 1997, 2009 Protocol 46, Inc.
![Page 37: The emerging battle between Cyber Defense and …...Mobile Threat Data is now mobile and connected devices are the target Commercial/Military UAVs Artificial intelligence Mobile payment](https://reader034.vdocuments.us/reader034/viewer/2022042111/5e8c207db9f93b5aac6e3bbb/html5/thumbnails/37.jpg)
Cyber Security ProtectionEffective Security Strategies to Fortify and Thwart Threats
© Copyright 1997, 2009 Protocol 46, Inc.
![Page 38: The emerging battle between Cyber Defense and …...Mobile Threat Data is now mobile and connected devices are the target Commercial/Military UAVs Artificial intelligence Mobile payment](https://reader034.vdocuments.us/reader034/viewer/2022042111/5e8c207db9f93b5aac6e3bbb/html5/thumbnails/38.jpg)
Cyber Security ProtectionEffective Security Strategies to Fortify and Thwart Threats
© Copyright 1997, 2009 Protocol 46, Inc.
![Page 39: The emerging battle between Cyber Defense and …...Mobile Threat Data is now mobile and connected devices are the target Commercial/Military UAVs Artificial intelligence Mobile payment](https://reader034.vdocuments.us/reader034/viewer/2022042111/5e8c207db9f93b5aac6e3bbb/html5/thumbnails/39.jpg)
Cyber Security ProtectionEffective Security Strategies to Fortify and Thwart Threats
© Copyright 1997, 2009 Protocol 46, Inc.
![Page 40: The emerging battle between Cyber Defense and …...Mobile Threat Data is now mobile and connected devices are the target Commercial/Military UAVs Artificial intelligence Mobile payment](https://reader034.vdocuments.us/reader034/viewer/2022042111/5e8c207db9f93b5aac6e3bbb/html5/thumbnails/40.jpg)
Cyber Security ProtectionEffective Security Strategies to Fortify and Thwart Threats
© Copyright 1997, 2009 Protocol 46, Inc.
![Page 41: The emerging battle between Cyber Defense and …...Mobile Threat Data is now mobile and connected devices are the target Commercial/Military UAVs Artificial intelligence Mobile payment](https://reader034.vdocuments.us/reader034/viewer/2022042111/5e8c207db9f93b5aac6e3bbb/html5/thumbnails/41.jpg)
Cyber Security ProtectionEffective Security Strategies to Fortify and Thwart Threats
© Copyright 1997, 2009 Protocol 46, Inc.
![Page 42: The emerging battle between Cyber Defense and …...Mobile Threat Data is now mobile and connected devices are the target Commercial/Military UAVs Artificial intelligence Mobile payment](https://reader034.vdocuments.us/reader034/viewer/2022042111/5e8c207db9f93b5aac6e3bbb/html5/thumbnails/42.jpg)
True Cyber Security Protection
Defense in Depth
![Page 43: The emerging battle between Cyber Defense and …...Mobile Threat Data is now mobile and connected devices are the target Commercial/Military UAVs Artificial intelligence Mobile payment](https://reader034.vdocuments.us/reader034/viewer/2022042111/5e8c207db9f93b5aac6e3bbb/html5/thumbnails/43.jpg)
Protocol 46 Bitdefender
Nimble Feather
Stonewall Aegis
Picket Fence
Razor Wire
True Cyber Security Protection
TRUE CYBERSECURITY
PROTECTION
PROTOCOL46
PROTECTION
![Page 44: The emerging battle between Cyber Defense and …...Mobile Threat Data is now mobile and connected devices are the target Commercial/Military UAVs Artificial intelligence Mobile payment](https://reader034.vdocuments.us/reader034/viewer/2022042111/5e8c207db9f93b5aac6e3bbb/html5/thumbnails/44.jpg)
OUR COMPANY ADVANTAGE
COMPETITION
AFFORDABILITY
™
Ease of UsePlug and Play
ReportsPull All Information Together
![Page 45: The emerging battle between Cyber Defense and …...Mobile Threat Data is now mobile and connected devices are the target Commercial/Military UAVs Artificial intelligence Mobile payment](https://reader034.vdocuments.us/reader034/viewer/2022042111/5e8c207db9f93b5aac6e3bbb/html5/thumbnails/45.jpg)
OUR COMPANY ADVANTAGE
COMPETITION
Military and 3 Letter Agency Cyber Security Expertise and
Experience
Fighting an A-Typical War
™
![Page 46: The emerging battle between Cyber Defense and …...Mobile Threat Data is now mobile and connected devices are the target Commercial/Military UAVs Artificial intelligence Mobile payment](https://reader034.vdocuments.us/reader034/viewer/2022042111/5e8c207db9f93b5aac6e3bbb/html5/thumbnails/46.jpg)
OUR COMPANY ADVANTAGE
COMPETITION
Our Solutions
are PRO-ACTIVE
™
rather than
REMEDIAL
™
![Page 47: The emerging battle between Cyber Defense and …...Mobile Threat Data is now mobile and connected devices are the target Commercial/Military UAVs Artificial intelligence Mobile payment](https://reader034.vdocuments.us/reader034/viewer/2022042111/5e8c207db9f93b5aac6e3bbb/html5/thumbnails/47.jpg)
OUR COMPANY ADVANTAGE
COMPETITION
We get AHEAD of the Breach
™
Not Clean up the Mess After
™
![Page 48: The emerging battle between Cyber Defense and …...Mobile Threat Data is now mobile and connected devices are the target Commercial/Military UAVs Artificial intelligence Mobile payment](https://reader034.vdocuments.us/reader034/viewer/2022042111/5e8c207db9f93b5aac6e3bbb/html5/thumbnails/48.jpg)
OUR COMPANY ADVANTAGE
COMPETITION
PRO-ACTIVE
™
Multi device/sensor concept make us different / better than the competition
All Protocol 46 tools work in concert to provide continuous scanning and multiple layers of proactive
protection.
™
![Page 49: The emerging battle between Cyber Defense and …...Mobile Threat Data is now mobile and connected devices are the target Commercial/Military UAVs Artificial intelligence Mobile payment](https://reader034.vdocuments.us/reader034/viewer/2022042111/5e8c207db9f93b5aac6e3bbb/html5/thumbnails/49.jpg)
OUR COMPANY ADVANTAGE
COMPETITION
PRO-ACTIVEOur solutions are monitored and updated in
response to the cyber threat-scape.
Competitors or other products do not update, do not upgrade or have the ability to change like we do.
™
![Page 50: The emerging battle between Cyber Defense and …...Mobile Threat Data is now mobile and connected devices are the target Commercial/Military UAVs Artificial intelligence Mobile payment](https://reader034.vdocuments.us/reader034/viewer/2022042111/5e8c207db9f93b5aac6e3bbb/html5/thumbnails/50.jpg)
TM
Do we treat cybersecurity as:
an IT duty?An Operations duty?
or HR duty?
![Page 51: The emerging battle between Cyber Defense and …...Mobile Threat Data is now mobile and connected devices are the target Commercial/Military UAVs Artificial intelligence Mobile payment](https://reader034.vdocuments.us/reader034/viewer/2022042111/5e8c207db9f93b5aac6e3bbb/html5/thumbnails/51.jpg)
Q and A
![Page 53: The emerging battle between Cyber Defense and …...Mobile Threat Data is now mobile and connected devices are the target Commercial/Military UAVs Artificial intelligence Mobile payment](https://reader034.vdocuments.us/reader034/viewer/2022042111/5e8c207db9f93b5aac6e3bbb/html5/thumbnails/53.jpg)
CYBER SECURITY CHECKLIST
Can you answer
How much is the issue of security integrated into your business?
Is our security clear and consistent?
How do we monitor our systems and prevent breaches?
How often do we verify the effectiveness of our security?
Do our security goals align with business priorities?
Do we have the basic rights for security measures?
What is our plan to respond to a data breach? Are we adequately insured?
Are third parties really securing our most valuable information?
Have we identified and protected our most valuable processes and information?
Do we treat cybersecurity as an IT, an Operations, or a HR duty?
Cybersecurity
checklistCan you answer these questions about your
business?
![Page 54: The emerging battle between Cyber Defense and …...Mobile Threat Data is now mobile and connected devices are the target Commercial/Military UAVs Artificial intelligence Mobile payment](https://reader034.vdocuments.us/reader034/viewer/2022042111/5e8c207db9f93b5aac6e3bbb/html5/thumbnails/54.jpg)
• Inventory of Authorized and Unauthorized
Devices• Inventory of Authorized and Unauthorized
Software• Secure Configurations for Hardware and
Software• Continuous Vulnerability Assessment and
Remediation
• The one we don’t do is:• Controlled Use of Administrative Privileges
![Page 55: The emerging battle between Cyber Defense and …...Mobile Threat Data is now mobile and connected devices are the target Commercial/Military UAVs Artificial intelligence Mobile payment](https://reader034.vdocuments.us/reader034/viewer/2022042111/5e8c207db9f93b5aac6e3bbb/html5/thumbnails/55.jpg)
• Bitdefender
• Nimble Feather
• Stonewall Aegis
• Picket Fence
• Razor Wire
True Cyber Security ProtectionEffective Security Strategies to Fortify and Thwart Threats
![Page 56: The emerging battle between Cyber Defense and …...Mobile Threat Data is now mobile and connected devices are the target Commercial/Military UAVs Artificial intelligence Mobile payment](https://reader034.vdocuments.us/reader034/viewer/2022042111/5e8c207db9f93b5aac6e3bbb/html5/thumbnails/56.jpg)
Proud to be Veteran owned
™
Over 150 years of Military Intelligence and Cyber Security Experience.