the information security crisis: practical steps for your

20
Focus on Management - May 2019 The information security crisis: practical steps for your business

Upload: others

Post on 07-Nov-2021

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: The information security crisis: practical steps for your

Focus on Management - May 2019

The information security crisis: practical steps for your business

Page 2: The information security crisis: practical steps for your

Content

Page 3: The information security crisis: practical steps for your

Scott Culp – Microsoft, 2000

Page 4: The information security crisis: practical steps for your

1. If a bad guy can persuade you to run his program on your computer, it’s not solely your computer anymore.

Page 5: The information security crisis: practical steps for your

2. If a bad guy can alter the operating system on your computer, it’s not your computer anymore.

Page 6: The information security crisis: practical steps for your

3. If a bad guy has unrestricted physical access to your computer, it’s not your computer anymore.

Page 7: The information security crisis: practical steps for your

4. If you allow a bad guy to run active content in your website, it’s not your website anymore.

Page 8: The information security crisis: practical steps for your

5. Weak passwords trump strong security.

Page 9: The information security crisis: practical steps for your

6. A computer is only as secure as the administrator is trustworthy.

Page 10: The information security crisis: practical steps for your

7. Encrypted data is only as secure as the decryption key.

Page 11: The information security crisis: practical steps for your

8. An out-of-date antimalware scanner is only marginally better than no scanner at all.

Page 12: The information security crisis: practical steps for your

9. Absolute anonymity isn’t practically achievable, online or offline.

Page 13: The information security crisis: practical steps for your

10. Technology is not a panacea.

Page 14: The information security crisis: practical steps for your

Cybercrime

Financial fraud crimesCyberterrorismCyberwarfareComputer as a targetComputer as a tool

Page 15: The information security crisis: practical steps for your

Patrick Kral – SANS - Incident Handler's Handbook, 2011

Page 16: The information security crisis: practical steps for your

Case Study – Business Email Compromise

Page 17: The information security crisis: practical steps for your

Campbell McKenzie – Incident Response Solutions, 2019

Page 18: The information security crisis: practical steps for your

Mitigation Strategies

Page 19: The information security crisis: practical steps for your

Password Managers

Page 20: The information security crisis: practical steps for your