Cybersecurity Webinar Series PowerPoint Presentation, PPT - DocSlides

Cybersecurity Webinar Series PowerPoint Presentation, PPT - DocSlides

2018-03-14 22K 22 0 0

Description

5 Steps to Managing your Risks. “. Size . D. oesn’t . Matter”. Presenter. William J McBorrough. , . MSIA, CISSP, CISA, CRISC, . CEH, CCSFP. Managing Principal, . MCGlobalTech. 17 . years Information Security Professional. ID: 650222

Direct Link: Link:https://www.docslides.com/karlyn-bohler/cybersecurity-webinar-series Embed code:

Download this presentation

DownloadNote - The PPT/PDF document "Cybersecurity Webinar Series" is the property of its rightful owner. Permission is granted to download and print the materials on this web site for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.

Presentations text content in Cybersecurity Webinar Series

Slide1

Cybersecurity Webinar Series

5 Steps to Managing your Risks

Size

D

oesn’t

Matter”

Slide2

Presenter

William J McBorrough

,

MSIA, CISSP, CISA, CRISC,

CEH, CCSFPManaging Principal, MCGlobalTech17 years Information Security Professional9 years Adjunct College ProfessorSecurity and Risk Management “Expert”Small Business Owner

Slide3

The PROBLEM is Real

FACT

:

Cyber attacks on small business are on the rise

FACT

:

The impact to a small business is much greater than larger counterparts.

FACT

:

Most small businesses aren’t prepared to face this reality.

Slide4

The PROBLEM is Real

Small Businesses are in denial when it comes to cyber risks. Common excuses are:

“We’re

too small

.”

“We

can’t afford

it.”

“It’s

too complicated.”

Our

IT guy is taking care of

it.”

But that’s not all, is it?

More pressing priorities

Competing demands on time, resources and energy

Slide5

Sources of Cyber Information

Security Vendors want to see their products.

“If I’m selling hammers, I’m only interested in

your nails. I’m not concerned with the fact that

your screws are all falling out” - WJM

News

m

edia reports are focused on sensational stories. Large brand names. Millions of affected users. A small business getting hacked is not sexy.

Slide6

Risk Driven vs.

Controls

Focused

Security

Technology

Risk Management

“Business

Slide7

Case Study - Size Doesn’t Matter

Meet Sam

Solopreneur

= Sam,

Inc

!

“Always on the Go!”

“No office space.”

“No Infrastrure”

”No Employees”

No Security Program

Slide8

Risk Management Step 1

Identify Critical Asset

Communication

(Calls, Email, Text, Social

Media,etc

)

Data

(Contacts, emails, files, Photos, Videos,

etc

)Apps

(Productivity, Financial,

etc

)

Slide9

Risk Management Step 2

Identify Critical Assets

Identify Threats

Gravity

, Clumsy

Fingers

Thieves, Faulty Memory

Shoulder

surfers, Nosy people

Software bugs

Slide10

Risk Management Step 3

Identify Critical Assets

Identify Threats

Identify Vulnerabilities

Glass

screen - Scratches, Cracks,

Breaks

Small

, portable - Easy to conceal, lose track

ofScreen visible from above,

sides

Poor

Software Development, Testing -

Vendor

Slide11

Risk Management Step 4

Identify Critical Assets

Identify Threats

Identify Vulnerabilities

Assess Risks

High

High

Medium

Low

Likelihood = Probability of threat exploiting Vulnerability

Consequences = Impact to business

Risk = Likelihood of Consequence

Slide12

Risk Management Step 5

Identify Critical Assets

Identify Threats

Identify Vulnerabilities

Assess

Risks

Manage Risk(

Avoid, Mitigate, Transfer,

Accept)

Mitigate - Purchase Case, Screen

Cover

Mitigate

, Transfer - Password, Backup,

Location Service/App,

Insurance,

Mitigate

-

Privacy

screen,

Behavior

Accept

- Delay upgrades? Oh

well

Avoid

- Toss phone out the window

Slide13

Now that you know…..

Have you identified your business critical assets?

Have to thought about the threats that may affect them and adversely impact your business?

Have you looked for where your assets might be susceptible to those threats?

Have you assessed the risk by considering the potential likelihood and impact to your business?

Have you made an informed, conscious decision in line with your business mission and needs about your risk?

Slide14

Key Takeaways

Size doesn’t matter.

Your “IT Guy” can’t do this for you.

It doesn’t have to be expensive and complicated.

We can help.

Slide15

Questions

Slide16

About Us

MCGlobalTech

Mission Critical Global Technology Group (MCGlobalTech) is a minority owned, small business founded by industry leaders to provide strategic advisory and security consulting services to public and private sector business managers to better align technology and security programs with organizational mission and business goals.

The Principals at MCGlobalTech have been providing Information Security services to the Federal Government and the private sector for over 25 years

Slide17

Our Values

At MCGlobalTech,

we believe that strong values create long term relationships with our customers, employees, partners and the communities we serve. At the heart of everything we do, our corporate values are:Providing customer satisfactionDelivering innovative solutions Empowering staff for successPromoting Entrepreneurial spirit Maintaining technical excellence

Slide18

What we offer

MCGlobalTech

is able to provide our customers with innovative, mission-critical solutions in a broad variety of technologies.  We consider the following our core competencies: Information Assurance (Security Authorization) Vulnerability Management Security Risk Management Security Engineering Penetration Testing Network Security

Slide19

Contact Us

Mission Critical Global Technology Group

1325 G Street, NW

Suite 500

Washington, District of Columbia 20005

Phone: 202.355.9448

Email: Info@mcglobaltech.com

 

William J. McBorrough

Sales

Division

Co-Founder/Managing Principal Corporate Headquarters

wjm4@mcglobaltech.com

sales@mcglobaltech.com

(202) 355-9448 x101 (202) 355-9448 x200

(571) 249-4677 (cell)

 

 

Slide20


About DocSlides
DocSlides allows users to easily upload and share presentations, PDF documents, and images.Share your documents with the world , watch,share and upload any time you want. How can you benefit from using DocSlides? DocSlides consists documents from individuals and organizations on topics ranging from technology and business to travel, health, and education. Find and search for what interests you, and learn from people and more. You can also download DocSlides to read or reference later.