
Cybersecurity Threats and Compliance Initiatives
Explore past cyber threats, methods of infiltration, compliance initiatives, and key steps to identify, protect, detect, respond, and recover from cyber incidents in this comprehensive guide.
Download Presentation

Please find below an Image/Link to download the presentation.
The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.
You are allowed to download the files provided on this website for personal or commercial use, subject to the condition that they are used lawfully. All files are the property of their respective owners.
The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.
E N D
Presentation Transcript
The First Step in Cybersecurity
Past Threats and Incident of Cybersecurity 76 % of organizations polled by CompTIA said they experienced them [a cybersecurity attack] in 2011 Victims: Google, TJX Companies, Target, LinkedIn, RSA Security, US Senate, and the CIA Port of Antwerp Drug traffickers recruited hackers to breach IT systems that controlled the movement and location of containers. Two companies that operated within the port. Installed firewall and still managed to install keyloggers http://www.bbc.com/news/world-europe-24539417
Methods of infiltration Resident/Partner Companies Remote Hacking Vendor Applications Network Enabled Hardware Social Networking BYOD Physical Access
Compliance Initiatives Port Specific Compliance President Issued Executive Order 13636 NIST Framework Released in February 2014 Industry Compliance: HIPAA ACT HITECH ACT GLBA Sarbanes-Oxley Telecommunications Act of 1996