Presented by Frederick J. Santarsiere



Similar documents
Cyber R &D Research Roundtable

SECURITY CONSIDERATIONS FOR LAW FIRMS

CYBERSECURITY: PROTECTING YOUR ORGANIZATION AGAINST CYBER ATTACKS. Viviana Campanaro CISSP Director, Security and Compliance July 14, 2015

Report on CAP Cybersecurity November 5, 2015

Security Risk Management Strategy in a Mobile and Consumerised World

FedVTE Training Catalog SPRING advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

Emerging Network Security Threats and what they mean for internal auditors. December 11, 2013 John Gagne, CISSP, CISA

Field of Study Area of Expertise Certification Vendor Course

How To Protect Yourself From Cyber Threats

Real World Healthcare Security Exposures. Brian Selfridge, Partner, Meditology Services

Into the cybersecurity breach

Information Security Services

How-To Guide: Cyber Security. Content Provided by

InfoSec Academy Pen Testing & Hacking Track

SECURITY. Risk & Compliance Services

Corporate Overview. MindPoint Group, LLC 8078 Edinburgh Drive, Springfield, VA Office: Fax:

Social Media Security Training and Certifications. Stay Ahead. Get Certified. Ultimate Knowledge Institute. ultimateknowledge.com

Network Support. Technical Certificate. Program Outcomes: FOUNDATION COURSES. 1 of 7

Protecting against cyber threats and security breaches

Device Hardening, Vulnerability Remediation and Mitigation for Security Compliance

InfoSec Academy Application & Secure Code Track

FedVTE Training Catalog SUMMER advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

Belmont Savings Bank. Are there Hackers at the gate? 2013 Wolf & Company, P.C.

Professional Services Overview

How To Protect Yourself From A Hacker Attack

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

Are You Ready for PCI 3.1?

Cyber Security and Information Assurance Controls Prevention and Reaction NOVEMBER 2013

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Penetration testing & Ethical Hacking. Security Week 2014

Expert Reference Series of White Papers. 10 Security Concerns for Cloud Computing

Information Systems Security Certificate Program

Cyber Insurance: How to Investigate the Right Coverage for Your Company

Modern Cyber Threats. how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure. Axel Wirth

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

EC Council Certified Ethical Hacker V8

Information Security for the Rest of Us

Presented by Evan Sylvester, CISSP

N-Dimension Solutions Cyber Security for Utilities

INFORMATION SECURITY FOR YOUR AGENCY

WEB APPLICATION FIREWALL

Compliance. Review. Our Compliance Review is based on an in-depth analysis and evaluation of your organization's:

Course and Service Portfolio Specialized IT courses for IT professional and organizations willing to take benefit from the competitive advantages

I ve been breached! Now what?

Guide to Penetration Testing

16) INFORMATION SECURITY INCIDENT MANAGEMENT

GUIDE TO IMPROVING INFORMATION SECURITY IDENTIFYING WEAKNESSES & STRENGTHENING SECURITY

How To Test For Security On A Network Without Being Hacked

NATIONAL CYBER SECURITY AWARENESS MONTH

2014 Entry Form (Complete one for each entry.) Fill out the entry name exactly as you want it listed in the program.

NETWORK SECURITY. 3 Key Elements

Course Content: Session 1. Ethics & Hacking

Cloud Assurance: Ensuring Security and Compliance for your IT Environment

GEARS Cyber-Security Services

Cyber- Attacks: The New Frontier for Fraudsters. Daniel Wanjohi, Technology Security Specialist

Track 2: Introductory Track PREREQUISITE: BASIC COMPUTER EXPERIENCE

Defending Against Data Beaches: Internal Controls for Cybersecurity

Executive Management of Information Security

What Directors need to know about Cybersecurity?

Are you prepared to be next? Invensys Cyber Security

Introduction. Jason Lawrence, MSISA, CISSP, CISA Manager, EY Advanced Security Center Atlanta, Georgia

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

Network Engineering Technology

External Supplier Control Requirements

Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015

Fundamentals of Information Systems Security Unit 1 Information Systems Security Fundamentals

Everything You Wanted to Know about DISA STIGs but were Afraid to Ask

Cyber Essentials Scheme

RLI PROFESSIONAL SERVICES GROUP PROFESSIONAL LEARNING EVENT PSGLE 123. Cybersecurity: A Growing Concern for Small Businesses

167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College

Collateral Effects of Cyberwar

Val-EdTM. Valiant Technologies Education & Training Services. 2-day Workshop on Business Continuity & Disaster Recovery Planning

EC-Council. Certified Ethical Hacker. Program Brochure

CYBERSECURITY BEST PRACTICES FOR SMALL AND MEDIUM PENNSYLVANIA UTILITIES

SCAC Annual Conference. Cybersecurity Demystified

Payment Card Industry Data Security Standard

Enterprise Computing Solutions

Transcription:

http://cinoltd.com/ Presented by Frederick J. Santarsiere CHFI, CISSP, CISM, CISA, CEH, CEI, CAP, SSCP Sec+, Net+, A+, MCSA, MCSE, MCITP, MCT CCENT, CCNA, CCNA Wireless, CCNA Voice CISCO SMBEN, SMBAM, CA Erwin SA

Club Director Written by: Frederick Santarsiere CTO CINO Ltd Companies

Cyber Security & Hacking Prevention Programs Risk Analysis - Vulnerability Scans to Full Penetration Testing Compliance Verification : PCI, HIPAA, SOX & ISO 27001 Security Consulting & Countermeasures Mitigation & Managed Security Services Documentation and Policy Review & Development Business Threat Intelligence Analysis & Reporting Physical Security Assessments & Countermeasure Installations Incident Response Plan (IRP) development and implementation Business Continuity Planning (BCP) & Disaster Recovery (DR) Development *Patented Key-Logger Protection Software*

Hacking vs. Ethical Hacking Hacking malicious attacker exploits vulnerabilities to compromise security controls and violate the Confidentiality, Integrity and availability of the system and the data. Ethical Hacking Simulating techniques used by Hackers to test the strength of controls to identify vulnerabilities which could be exploited. Ethical Hackers- Test the strength of the security controls

Why should you care? Reputation and the CLUB s name: CLUB s NAME TARNISHED LOSS of Membership (over security risk) Lawsuits : Prudent Man rule took precautionary measures vs. Negligence

Why should you care? Reputation and the CLUB s name: CLUB s NAME TARNISHED LOSS of Membership (over security risk) Lawsuits : Prudent Man rule took precautionary measures vs. Negligence You preserve the Great Historical past of your Club Hacker s don t live in the past!

New Battlefield Club s & Members data You are now on the radar of the attackers The world has evolved!!!

Lock Down Your World NOW!!! Take Preventive Measures SECURE YOUR BUSINESS ASSETS Lessons learned today can also help you protect your personal data as well

What are they looking for? Data that they can steal, use to extort and sell And you have Members Personal Data to protect!

How Do They Get Your Data? ATTACK VECTORS ATTACK VECTOR Pathways used to hack exploit vulnerability Attack Vectors = Vulnerability + Exploit

Constant VULNERABILITY Awareness Required!

IT products holes identified by the gov t: Cisco, Google, Microsoft

New Attack Vectors Constantly Identified

Security Functionality Triad qsecurity Functionality Security Triad Hardening removing unnecessary functionality Functionality Ease of Use Hospitality Industry There is usually NO Full-time Cyber Security Expert onsite constantly implementing Cyber-Security Best Practices

3 most common ATTACK Vectors!!! Vulnerabilities (we see in the hospitality industry repeatedly) How the VICTIM was EXPLOITED Countermeasures: How to not be the next VICTIM

3 most common Vulnerabilities we see in the hospitality industry repeatedly: Missing patches : Tuesday s Patch is Wednesday s Exploit End user awareness : phishing attacks,drive-by downloads Default settings & services : Swiss cheese network These Vulnerabilities increase your RISK of becoming the next VICTIM!!!

Typical Risk management Misconceptions Egg shell defense : "We already have a firewall already" vs. Defense in Depth Attackers now attack from inside out Operational Support vs. Security Support : "We have an IT administrator already"(no security specialist)

EXPLOITED: Recent Case study examples RANSOMWARE Extortion / Shutdown operations!!! (BYOD) DATA BREECH: PII (DOB,Social Security #s, charges) MALWARE distribution: club used as outward proxy Spamming blacklisted Website vandalized

Comprehensive Risk Management Work Effort - Hackers Look for the weakest link Report Card timeline now Current Threat Level Defensive Posture (POAM) Remediation List Desired State Best Practices

For More Info Contact Us: Cino Ltd Companies (516) 932-0317 ext. 312 safe@cinoltd.com