Cybersecurity…
Real World Solutions
Network Paladin (Making complex Cyber & Privacy issues understandable and actionable )
Ernest Staats estaats@networkpaladin.org
Our
Reality
Other SDA’s have learned that…
1. We are never as safe or secure as we think we are
2. Nobody’s defenses can protect against a determined hacker
3. Networks and data systems are inherently insecure
There are always vulnerabilities that can be exploited
4. Your Response is More important than your security Software
People are the
strongest and weakest
link!
Individuals Enable Hacking
People make mistakes by:
•Sharing passwords
•Using outdated software
•Losing or improperly discarding files
•Mishandling personal information
•Storing unencrypted personal information on laptops or easily lost mobile devices
•Circumventing information security controls
oIntentionally for their purposes;
oIn the mistaken belief that they can improve efficiency;
oIn narrow mindedly thinking that they “just need to get the job done” regardless of risk
What to Do?
1. Expect a breach & establish a response plan (Link to resources)
2. Purchase cyber insurance (A team to help you) (Link to resources)
3. Develop, implement, & document policies and procedures (Now)
4. Consider outsourcing some security aspects (e.g. 24/7 monitoring)
5. Have backups, backups of backups and backups where people can’t
find them (Link to Backup resources)
6. Discover then Restrict access to any system or report that contains
sensitive information (Link to sensitive data resource)
7. Use an out of band communication method (signal, telegram)
What to Do?
8. Establish a password manager (Link to resources)
9. Limit local Admin accounts
10. Patch systems and applications
11. Use Multi-Factor authentication
12. Verify all 3rd party vendors (Link to Resources)
13. Risk Management is everyone’s responsibility (Train Engage them)
14. Secure your Data Systems (Link to resources)
Reduce reliance
and burden on
people
Start with People
Policies Set the Framework to align People, Processes and Technology
Policy without enforcement is a suggestion
Processes
Reflect need of
People in relation to
policies
& Technology
Success Relies On:
Technology
Process
People
Demo – HID Card Key Bypass
Cyber Incident Response Plan
Key elements to have in place before a cyber incident occurs include:
A cyber incident response plan customized for the
organization’s specific Data Systems- (including cloud apps).
Well-defined and assigned roles to ensure appropriate
individuals understand their duties.
Communications plans so the organization can efficiently
communicate and explain reportable incidents.
Link to IR Resources
How Do We Prevent Being a Headline?
Colonial Pipeline & SDA Organizations
Gov issued Executive Order Requiring:
1. Multifactor Authentication (Limit Local Admin Accounts)
2. Zero Trust (Contain legacy systems) `
3. Use Risk based Governance & Compliance
4. Documented IR & communication plans
5. Vendor vetting (Link to template)
Colonial Pipeline SDA Orgs
Access VIA VPN Access VIA RDP or VPN
Some multifactor Password Multifactor Passwords – Some – to NONE
Access through a Legacy System Access through Legacy Systems
Information Leakage is Easy
Governance Terminology
Policies: Formal statements produced and supported by senior
management (Approved by your board)
Standards: Mandatory courses of action or rules that give formal
policies support and direction (Approved by leadership team)
Procedures: Detailed step-by-step technical instructions to achieve a
goal or mandate. (Managed by tech team)
•Data Integrity Procedures (Backups, retention, restore (overwrite) authorization, etc.) (Link to templates)
•Data Governance Procedures (DATA handling, lifecycle, deletion, access control & authentication, etc.)
•Data Classification Procedures (PII, PCI, PHI, and how the entity stores, accesses and manages that data)
•Email Retention Policy and Procedures (email is one of our significant internal liabilities)
•Incident Response Plan (Policies & Procedures) (Link to templates)
•Cyber Security (Policies and Procedures)
Document Policies and Procedures
Mobile Issues /Demo
Deep Fakes: Spoofed Voice
https://www.zdnet.com/article/forget-email-scammers-use-
ceo-voice-deepfakes-to-con-workers-into-wiring-cash/
USE A Code Word
Identify Caller
Use Code Words
PIN security – 6 digit code no Pattern
Camera and mic can be turned on without
permission
Ransomware Trends 2021
Ransomware Response
1. Start a log of all actions taken by who (Link to template)
2. Determine what is encrypted
3. Contain system pull network cable & disconnect wireless
4. Call Cyber Insurance team ….
5. (Ransomware Check Lists)
6. Know if you are willing to pay
7. See if Ransomware has an unlock key www.nomoreransom.org
8. Determine if you need to report a breach
9. Consider contacting local and federal law www.ic3.gov
Monitor your Ministry & Life (Demo)
Google alerts: https://www.google.com/alerts
Hacked Account: https://haveibeenpwned.com/
Dark Web Scan: https://try.idx.us/cyberscan/
Public Records: http://publicrecords.searchsystems.net/
Image Search: https://yandex.com/images/
Metadata Viewer: http://exif.regex.info/exif.cgi
Take Control – Data Detox: https://datadetox.myshadow.org/en/home
Common Pitfalls to Avoid
•Emphasizing highly publicized but rare threats over basic cyber hygiene
•Treating cybersecurity as a one-off project instead of a key
organizational component
•Not sustaining budget and human resources for cyber defenses
•Lack of vendor governance and oversight
More Common Pitfalls to Avoid
•Implementing the latest cybersecurity tools and technology instead of
addressing critical security controls (Link to CIS v7 template)
•Have independent security reports that are not (captain obvious)
•No written information security program with supporting policies,
processes, and procedures
•Lack of governance and oversight
Legal Data Privacy Resources
Data Protection Laws of the World
https://www.dlapiperdataprotection.com/
US State Breach Notification Law Interactive Map
https://www.bakerlaw.com/BreachNotificationLawMap
State Laws Related to Internet Privacy
http://www.ncsl.org/research/telecommunications-and-information-
technology/state-laws-related-to-internet-privacy.aspx
US state comprehensive privacy law comparison:
https://iapp.org/resources/article/us-state-privacy-legislation-tracker/
https://emtemp.gcom.cloud/ngw/globalassets/en/legal-compliance/documents/trends/gdpr-compliance-audit-checklist.pdf
Cybersecurity…real world solutions

More Related Content

PDF
IT security in 2021: Why Ransomware Is Still The Biggest Threat
PDF
Cisa ransomware guide
PPTX
Ransomware Has Evolved And So Should Your Company
PDF
The Cost of Doing Nothing: A Ransomware Backup Story
PPTX
Webinar: Backup vs. Ransomware - 5 Requirements for Backup Success
PPT
Safeguard your enterprise against ransomware
PPTX
Anatomy of a Ransomware Event
PPTX
Cybersecurity
IT security in 2021: Why Ransomware Is Still The Biggest Threat
Cisa ransomware guide
Ransomware Has Evolved And So Should Your Company
The Cost of Doing Nothing: A Ransomware Backup Story
Webinar: Backup vs. Ransomware - 5 Requirements for Backup Success
Safeguard your enterprise against ransomware
Anatomy of a Ransomware Event
Cybersecurity

What's hot (20)

PDF
GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...
PDF
Triangulum - Ransomware Evolved - Why your backups arent good enough
PPTX
Ransomware Detection: Don’t Pay Up. Backup.
PDF
TIC-TOC: Ransomware: Help your Customers be Prepared with Dominique Singer an...
PDF
The importance of Cybersecurity
PDF
Cambodia CERT Seminar: Incident response for ransomeware attacks
PDF
Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...
PPTX
Cybersecurity Training
PDF
Application Security | Application Security Tutorial | Cyber Security Certifi...
PPTX
Cyber Attack Survival: Are You Ready?
PPTX
Ransomware: A Perilous Malware
PDF
Cyber Security For Organization Proposal PowerPoint Presentation Slides
PDF
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
PPTX
Ransomware Resiliency, Recoverability and Availability
PPTX
Ransomware: Can you protect against attacks?
PPTX
DC970 Presents: Defense in Depth
PPTX
Hyphenet Security Awareness Training
PDF
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
PDF
Cybersecurity: How to Protect Your Firm from a Cyber Attack
PPTX
An introduction to Cyber Essentials
GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...
Triangulum - Ransomware Evolved - Why your backups arent good enough
Ransomware Detection: Don’t Pay Up. Backup.
TIC-TOC: Ransomware: Help your Customers be Prepared with Dominique Singer an...
The importance of Cybersecurity
Cambodia CERT Seminar: Incident response for ransomeware attacks
Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...
Cybersecurity Training
Application Security | Application Security Tutorial | Cyber Security Certifi...
Cyber Attack Survival: Are You Ready?
Ransomware: A Perilous Malware
Cyber Security For Organization Proposal PowerPoint Presentation Slides
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Ransomware Resiliency, Recoverability and Availability
Ransomware: Can you protect against attacks?
DC970 Presents: Defense in Depth
Hyphenet Security Awareness Training
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
Cybersecurity: How to Protect Your Firm from a Cyber Attack
An introduction to Cyber Essentials
Ad

Similar to Cybersecurity…real world solutions (20)

PPTX
Tsc2021 cyber-issues
PPTX
2022 Rea & Associates' Cybersecurity Conference
 
PPT
Port of seattle security presentation david morris
PPTX
Cybersecurity Basics of awareness presentation .pptx
PPT
December ISSA Meeting Executive Security Presentation
PDF
Understanding Cyber Kill Chain and OODA loop
PDF
Today's Breach Reality, The IR Imperative, And What You Can Do About It
PDF
Today's Cyber Challenges: Methodology to Secure Your Business
PPTX
Introduction-to-Cybersecurit57hhfcbbcxxx
PPTX
New PPTX mittre attack Presentation.pptx
PPTX
New PegwrgwewegewtgPTX Presentation.pptx
PDF
Cyber Defense - How to be prepared to APT
PPTX
Cybersecurity.pptx
PPTX
cybersecurity.pptx cybersecurity.pptx cybersecurity.pptx
PPTX
slidesgo-navigating-the-cyber-landscape-understanding-threats-and-strategies-...
PPTX
Incident Response: Validation, Containment & Forensics
PPTX
Cybersecurity Priorities and Roadmap: Recommendations to DHS
PPTX
Cybersecurity - Sam Maccherola
PPTX
Presentation - Cybersecurity Essentials.pptx
PDF
Cervone uof t - nist framework (1)
Tsc2021 cyber-issues
2022 Rea & Associates' Cybersecurity Conference
 
Port of seattle security presentation david morris
Cybersecurity Basics of awareness presentation .pptx
December ISSA Meeting Executive Security Presentation
Understanding Cyber Kill Chain and OODA loop
Today's Breach Reality, The IR Imperative, And What You Can Do About It
Today's Cyber Challenges: Methodology to Secure Your Business
Introduction-to-Cybersecurit57hhfcbbcxxx
New PPTX mittre attack Presentation.pptx
New PegwrgwewegewtgPTX Presentation.pptx
Cyber Defense - How to be prepared to APT
Cybersecurity.pptx
cybersecurity.pptx cybersecurity.pptx cybersecurity.pptx
slidesgo-navigating-the-cyber-landscape-understanding-threats-and-strategies-...
Incident Response: Validation, Containment & Forensics
Cybersecurity Priorities and Roadmap: Recommendations to DHS
Cybersecurity - Sam Maccherola
Presentation - Cybersecurity Essentials.pptx
Cervone uof t - nist framework (1)
Ad

Recently uploaded (20)

PDF
Comparative analysis of machine learning models for fake news detection in so...
PDF
NewMind AI Weekly Chronicles – August ’25 Week IV
PDF
5-Ways-AI-is-Revolutionizing-Telecom-Quality-Engineering.pdf
PDF
sustainability-14-14877-v2.pddhzftheheeeee
PDF
Enhancing plagiarism detection using data pre-processing and machine learning...
PDF
The-Future-of-Automotive-Quality-is-Here-AI-Driven-Engineering.pdf
PPTX
TEXTILE technology diploma scope and career opportunities
PPTX
Training Program for knowledge in solar cell and solar industry
PDF
Taming the Chaos: How to Turn Unstructured Data into Decisions
PDF
The-2025-Engineering-Revolution-AI-Quality-and-DevOps-Convergence.pdf
PPTX
Microsoft Excel 365/2024 Beginner's training
PDF
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
PDF
Transform-Your-Factory-with-AI-Driven-Quality-Engineering.pdf
PDF
Dell Pro Micro: Speed customer interactions, patient processing, and learning...
PDF
UiPath Agentic Automation session 1: RPA to Agents
PDF
4 layer Arch & Reference Arch of IoT.pdf
PPTX
Custom Battery Pack Design Considerations for Performance and Safety
PPTX
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
PDF
Credit Without Borders: AI and Financial Inclusion in Bangladesh
PDF
“A New Era of 3D Sensing: Transforming Industries and Creating Opportunities,...
Comparative analysis of machine learning models for fake news detection in so...
NewMind AI Weekly Chronicles – August ’25 Week IV
5-Ways-AI-is-Revolutionizing-Telecom-Quality-Engineering.pdf
sustainability-14-14877-v2.pddhzftheheeeee
Enhancing plagiarism detection using data pre-processing and machine learning...
The-Future-of-Automotive-Quality-is-Here-AI-Driven-Engineering.pdf
TEXTILE technology diploma scope and career opportunities
Training Program for knowledge in solar cell and solar industry
Taming the Chaos: How to Turn Unstructured Data into Decisions
The-2025-Engineering-Revolution-AI-Quality-and-DevOps-Convergence.pdf
Microsoft Excel 365/2024 Beginner's training
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
Transform-Your-Factory-with-AI-Driven-Quality-Engineering.pdf
Dell Pro Micro: Speed customer interactions, patient processing, and learning...
UiPath Agentic Automation session 1: RPA to Agents
4 layer Arch & Reference Arch of IoT.pdf
Custom Battery Pack Design Considerations for Performance and Safety
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
Credit Without Borders: AI and Financial Inclusion in Bangladesh
“A New Era of 3D Sensing: Transforming Industries and Creating Opportunities,...

Cybersecurity…real world solutions

  • 1. Cybersecurity… Real World Solutions Network Paladin (Making complex Cyber & Privacy issues understandable and actionable ) Ernest Staats [email protected]
  • 3. Other SDA’s have learned that… 1. We are never as safe or secure as we think we are 2. Nobody’s defenses can protect against a determined hacker 3. Networks and data systems are inherently insecure There are always vulnerabilities that can be exploited 4. Your Response is More important than your security Software
  • 4. People are the strongest and weakest link!
  • 5. Individuals Enable Hacking People make mistakes by: •Sharing passwords •Using outdated software •Losing or improperly discarding files •Mishandling personal information •Storing unencrypted personal information on laptops or easily lost mobile devices •Circumventing information security controls oIntentionally for their purposes; oIn the mistaken belief that they can improve efficiency; oIn narrow mindedly thinking that they “just need to get the job done” regardless of risk
  • 6. What to Do? 1. Expect a breach & establish a response plan (Link to resources) 2. Purchase cyber insurance (A team to help you) (Link to resources) 3. Develop, implement, & document policies and procedures (Now) 4. Consider outsourcing some security aspects (e.g. 24/7 monitoring) 5. Have backups, backups of backups and backups where people can’t find them (Link to Backup resources) 6. Discover then Restrict access to any system or report that contains sensitive information (Link to sensitive data resource) 7. Use an out of band communication method (signal, telegram)
  • 7. What to Do? 8. Establish a password manager (Link to resources) 9. Limit local Admin accounts 10. Patch systems and applications 11. Use Multi-Factor authentication 12. Verify all 3rd party vendors (Link to Resources) 13. Risk Management is everyone’s responsibility (Train Engage them) 14. Secure your Data Systems (Link to resources)
  • 8. Reduce reliance and burden on people Start with People Policies Set the Framework to align People, Processes and Technology Policy without enforcement is a suggestion Processes Reflect need of People in relation to policies & Technology Success Relies On: Technology Process People
  • 9. Demo – HID Card Key Bypass
  • 10. Cyber Incident Response Plan Key elements to have in place before a cyber incident occurs include: A cyber incident response plan customized for the organization’s specific Data Systems- (including cloud apps). Well-defined and assigned roles to ensure appropriate individuals understand their duties. Communications plans so the organization can efficiently communicate and explain reportable incidents. Link to IR Resources
  • 11. How Do We Prevent Being a Headline?
  • 12. Colonial Pipeline & SDA Organizations Gov issued Executive Order Requiring: 1. Multifactor Authentication (Limit Local Admin Accounts) 2. Zero Trust (Contain legacy systems) ` 3. Use Risk based Governance & Compliance 4. Documented IR & communication plans 5. Vendor vetting (Link to template) Colonial Pipeline SDA Orgs Access VIA VPN Access VIA RDP or VPN Some multifactor Password Multifactor Passwords – Some – to NONE Access through a Legacy System Access through Legacy Systems
  • 14. Governance Terminology Policies: Formal statements produced and supported by senior management (Approved by your board) Standards: Mandatory courses of action or rules that give formal policies support and direction (Approved by leadership team) Procedures: Detailed step-by-step technical instructions to achieve a goal or mandate. (Managed by tech team)
  • 15. •Data Integrity Procedures (Backups, retention, restore (overwrite) authorization, etc.) (Link to templates) •Data Governance Procedures (DATA handling, lifecycle, deletion, access control & authentication, etc.) •Data Classification Procedures (PII, PCI, PHI, and how the entity stores, accesses and manages that data) •Email Retention Policy and Procedures (email is one of our significant internal liabilities) •Incident Response Plan (Policies & Procedures) (Link to templates) •Cyber Security (Policies and Procedures) Document Policies and Procedures
  • 16. Mobile Issues /Demo Deep Fakes: Spoofed Voice https://www.zdnet.com/article/forget-email-scammers-use- ceo-voice-deepfakes-to-con-workers-into-wiring-cash/ USE A Code Word Identify Caller Use Code Words PIN security – 6 digit code no Pattern Camera and mic can be turned on without permission
  • 18. Ransomware Response 1. Start a log of all actions taken by who (Link to template) 2. Determine what is encrypted 3. Contain system pull network cable & disconnect wireless 4. Call Cyber Insurance team …. 5. (Ransomware Check Lists) 6. Know if you are willing to pay 7. See if Ransomware has an unlock key www.nomoreransom.org 8. Determine if you need to report a breach 9. Consider contacting local and federal law www.ic3.gov
  • 19. Monitor your Ministry & Life (Demo) Google alerts: https://www.google.com/alerts Hacked Account: https://haveibeenpwned.com/ Dark Web Scan: https://try.idx.us/cyberscan/ Public Records: http://publicrecords.searchsystems.net/ Image Search: https://yandex.com/images/ Metadata Viewer: http://exif.regex.info/exif.cgi Take Control – Data Detox: https://datadetox.myshadow.org/en/home
  • 20. Common Pitfalls to Avoid •Emphasizing highly publicized but rare threats over basic cyber hygiene •Treating cybersecurity as a one-off project instead of a key organizational component •Not sustaining budget and human resources for cyber defenses •Lack of vendor governance and oversight
  • 21. More Common Pitfalls to Avoid •Implementing the latest cybersecurity tools and technology instead of addressing critical security controls (Link to CIS v7 template) •Have independent security reports that are not (captain obvious) •No written information security program with supporting policies, processes, and procedures •Lack of governance and oversight
  • 22. Legal Data Privacy Resources Data Protection Laws of the World https://www.dlapiperdataprotection.com/ US State Breach Notification Law Interactive Map https://www.bakerlaw.com/BreachNotificationLawMap State Laws Related to Internet Privacy http://www.ncsl.org/research/telecommunications-and-information- technology/state-laws-related-to-internet-privacy.aspx US state comprehensive privacy law comparison: https://iapp.org/resources/article/us-state-privacy-legislation-tracker/ https://emtemp.gcom.cloud/ngw/globalassets/en/legal-compliance/documents/trends/gdpr-compliance-audit-checklist.pdf