/
Cyber Risk: What You Should Be Asking IT Cyber Risk: What You Should Be Asking IT

Cyber Risk: What You Should Be Asking IT - PowerPoint Presentation

alida-meadow
alida-meadow . @alida-meadow
Follow
351 views
Uploaded On 2018-09-22

Cyber Risk: What You Should Be Asking IT - PPT Presentation

Jeremiah Bristow Senior Vice President Enterprise Risk and Security Agenda Disclaimer 20 Questions for ITSecurity Based on the 20 CIS Controls Inventory of Authorized Devices on the Network ID: 676038

control security based recommendations security control recommendations based network assessment access resources protection authorized inventory software data secure configurations risk

Share:

Link:

Embed:

Download Presentation from below link

Download Presentation The PPT/PDF document "Cyber Risk: What You Should Be Asking IT" is the property of its rightful owner. Permission is granted to download and print the materials on this web site for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.


Presentation Transcript

Slide1

Cyber Risk: What You Should Be Asking IT

Jeremiah Bristow

Senior Vice President – Enterprise Risk and SecuritySlide2

AgendaSlide3

DisclaimerSlide4

20 Questions for IT/Security

Based on the 20 CIS ControlsSlide5

Inventory of Authorized Devices on the NetworkSlide6

Inventory of Authorized and Unauthorized SoftwareSlide7

Secure ConfigurationsSlide8

Continuous Vulnerability Assessment / RemediationSlide9

Control Use of Admin PrivilegesSlide10

Audit LoggingSlide11

Email and Web Browser ProtectionSlide12

Malware DefensesSlide13

Limitation of Ports / Protocols / ServicesSlide14

Data RecoverySlide15

Secure Configurations for network (remove?)Slide16

Boundary DefenseSlide17

Data ProtectionSlide18

Controlled Access Based on Need to KnowSlide19

Wireless Access ControlSlide20

Account Monitoring and ControlSlide21

Security Skills Assessment / TrainingSlide22

Application Software SecuritySlide23

Incident Response and ManagementSlide24

Penetration Tests and Red Team ExercisesSlide25

Recommendations / ResourcesSlide26

Recommendations / ResourcesSlide27

RecommendationsSlide28

515-326-5671

jbristow@shazam.net