The First Step in Cybersecurity. Past Threats and Incident of Cybersecurity 76 % of organizations...

Post on 18-Jan-2016

214 views 0 download

Tags:

Transcript of The First Step in Cybersecurity. Past Threats and Incident of Cybersecurity 76 % of organizations...

The First Step in Cybersecurity

Past Threats and Incident of Cybersecurity

• 76 % of organizations polled by CompTIA said they experienced them [a cybersecurity attack] in 2011

• Victims: Google, TJX Companies, Target, LinkedIn, RSA Security, US Senate, and the CIA

• Port of Antwerp– Drug traffickers recruited hackersto breach IT systems that controlled the movement and location of containers.– Two companies that operated within the port.– Installed firewall and still managed to install keyloggers– http://www.bbc.com/news/world-europe-24539417

Methods of infiltration

• Resident/Partner Companies• Remote Hacking• Vendor Applications• Network Enabled Hardware• Social Networking• BYOD• Physical Access

Compliance Initiatives

• Port Specific Compliance– President Issued Executive Order 13636– NIST Framework Released in February 2014

• Industry Compliance:– HIPAA ACT– HITECH ACT– GLBA– Sarbanes-Oxley– Telecommunications Act of 1996

Identify

Identify

Identify

Protect

Protect

Protect

Detect

Detect

Respond and Recover