Transcript Document
The First Step in
Cybersecurity
Past Threats and Incident of Cybersecurity
• 76 % of organizations polled by CompTIA said they
experienced them [a cybersecurity attack] in 2011
• Victims: Google, TJX Companies, Target, LinkedIn, RSA Security, US
Senate, and the CIA
• Port of Antwerp
– Drug traffickers recruited hackers
to breach IT systems that controlled
the movement and location of
containers.
– Two companies that operated
within the port.
– Installed firewall and still managed to install keyloggers
– http://www.bbc.com/news/world-europe-24539417
Methods of infiltration
•
•
•
•
•
•
•
Resident/Partner Companies
Remote Hacking
Vendor Applications
Network Enabled Hardware
Social Networking
BYOD
Physical Access
Compliance Initiatives
• Port Specific Compliance
– President Issued Executive Order 13636
– NIST Framework Released in February 2014
• Industry Compliance:
– HIPAA ACT
– HITECH ACT
– GLBA
– Sarbanes-Oxley
– Telecommunications Act of 1996
Identify
Identify
Identify
Protect
Protect
Protect
Detect
Detect
Respond and Recover