Cybersecurity Threats and Compliance Initiatives

the first step in cybersecurity n.w
1 / 13
Embed
Share

Explore past cyber threats, methods of infiltration, compliance initiatives, and key steps to identify, protect, detect, respond, and recover from cyber incidents in this comprehensive guide.

  • Cybersecurity
  • Threats
  • Compliance
  • Security measures
  • Incident response

Uploaded on | 0 Views


Download Presentation

Please find below an Image/Link to download the presentation.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.

You are allowed to download the files provided on this website for personal or commercial use, subject to the condition that they are used lawfully. All files are the property of their respective owners.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.

E N D

Presentation Transcript


  1. The First Step in Cybersecurity

  2. Past Threats and Incident of Cybersecurity 76 % of organizations polled by CompTIA said they experienced them [a cybersecurity attack] in 2011 Victims: Google, TJX Companies, Target, LinkedIn, RSA Security, US Senate, and the CIA Port of Antwerp Drug traffickers recruited hackers to breach IT systems that controlled the movement and location of containers. Two companies that operated within the port. Installed firewall and still managed to install keyloggers http://www.bbc.com/news/world-europe-24539417

  3. Methods of infiltration Resident/Partner Companies Remote Hacking Vendor Applications Network Enabled Hardware Social Networking BYOD Physical Access

  4. Compliance Initiatives Port Specific Compliance President Issued Executive Order 13636 NIST Framework Released in February 2014 Industry Compliance: HIPAA ACT HITECH ACT GLBA Sarbanes-Oxley Telecommunications Act of 1996

  5. Identify

  6. Identify

  7. Identify

  8. Protect

  9. Protect

  10. Protect

  11. Detect

  12. Detect

  13. Respond and Recover

Related


More Related Content