Cybersecurity Frameworks and You: The Perfect Match

McKonly & Asbury, LLP
McKonly & Asbury, LLPMcKonly & Asbury, LLP
Cybersecurity
Frameworks and You
The Perfect Match
Building Successful
Employee Relationships
A Cornerstone to Fraud Prevention
and Risk Management
Building Successful
Employee Relationships
A Cornerstone to Fraud Prevention
and Risk Management
Cybersecurity
Frameworks and You
The Perfect Match
Introductions
Sam BowerCraft
• Senior Manager in Internal Audit and Management Consulting Group
• Certified Information Systems Auditor (CISA)
• Security Consultant related to financial data, information systems, and
assets.
• M.S. Information Systems
David Hammarberg
• Principal of Forensic Accounting
• Certified Fraud Examiner (CFE)
• Director of Information Technology
• CPA, MCSE, CISSP, CISA
• 16+ years of experience
Objectives
• Understanding the importance of using a framework in your organization.
• How a framework can benefit an organization.
• NIST Cybersecurity Framework:
• The basic requirements for any organization.
Frameworks &
Their Importance
An Exercise
• List all the areas of information technology and security that are
important for your organization to consider and address.
Framework Benefits
• Structure
• Building from a pre-existing foundation
• Identify vulnerabilities
• Analyze or evaluate the risk associated with that vulnerability.
• Determine appropriate ways to eliminate or control the vulnerability.
• Efficiency: Cost Savings (time and dollars)
• Effectiveness
• Support
Framework Drawbacks
• While structure is good, understanding is better.
• Limitations:
• The framework versus your environment.
• “No battle plan survives contact with the enemy.”
- Helmuth von Moltke the Elder
• Clarity of Responsibility: you and the framework
Best Practices
NOT…
• An automated security
mechanism or setting.
• A business practice.
• A theory or possibility. It is in
place.
• The one best practice; it is not
the best of all.
• A human practice or method to
perform a process.
• Security related, helping to
protect information, resources,
or operations.
• Effective as shown by experience
and results.
• Among the most effective
practices used to perform this
process.
Best Practices
From Worst to Best: Chevron says:
• Good Idea: Unproven. Intuitively makes sense, could be successful…
requires analysis.
• Good Practice: Has improved results; supported by data and analysis.
• Local Best Practice: Best approach for large parts of the organization
based on analysis of performance internally and some external
review.
• Industry Best Practice: Best approach for large parts of the
organization based on analysis of performance internally and
externally.
Standard Operating Procedures
• Facilitate Communication
• Provide consistency
• Increase productivity
• Provide for cross training
• Help ensure things are done right.
Reviewing Your World
Writing Things Down
• How is your memory?
• How long can you focus on one thing?
• Written goals result in more achievement.
• Reminders help focus… and keep track.
• Unburden your brain; de-clutter with a list / framework.
• Clearer thinking and being able to review…
and communicate.
• Identify what needs your focus.
Security Risk Assessment
• Identify the potential inherent security risks.
• Assess the likelihood and significance of occurrence of the identified
security risks (ranking of risks).
• Evaluate which users and departments are most likely to have a significant
security event and identify the methods they are likely to use.
• Identify and map existing preventive and detective controls to the relevant
security risks (framework).
• Evaluate whether the identified controls are operating effectively and
efficiently.
• Identify and evaluate residual security risks resulting from ineffective or
nonexistent controls.
• Respond to residual security risks.
Approach Comparisons
Proscriptive
• Scope the environment.
• Do these things.
• Evaluate control responses.
• Design
• Operation
• Remediate/update controls.
• Repeat.
Risk Based
• Scope the environment.
• Evaluate vulnerabilities.
• Rank risks.
• Evaluate control responses.
• Design
• Operation
• Remediate/update controls.
• Repeat.
After the Risk Assessment
• The Risk Assessment may reveal certain residual risks that have not
been adequately mitigated due to lack of, or non-compliance with,
appropriate preventive and detective controls.
• The security professional works with the client to develop mitigation
strategies for any residual risks with an unacceptably high likelihood
or significance of occurrence.
• Responses should be evaluated in terms of their costs versus
benefits and in light of the organization's level of risk tolerance.
Cybercrime
Cybercrime, is simply a crime that involves a
computer and a network.
Types of Cybercrime
• Hacking
• Theft
• Cyber Stalking
• Identity Theft
• Malicious Software
• Child Soliciting and Abuse
Categories of Cybercrime
• Individual: This type of cyber crime can be in the form of cyber
stalking, distributing pornography, trafficking and “grooming.”
• Property: In this case, they can steal a person’s bank details and
siphon off money; misuse the credit card to make numerous
purchases online; run a scam to get naïve people to part with their
hard earned money; use malicious software to gain access to an
organizations website or disrupt the systems of the organization.
• Government: Crimes against a government are referred to as cyber
terrorism. If successful, this category can wreak havoc and cause
panic amongst the civilian population.
Combating Cybercrimes
• Security Hardware
• Security Software
• Security Awareness
• Working along side other businesses
• Working with government agencies
Query
• Are you willing to operate your information technology
environment in an ad hoc and informal manner given the
risks in the world today related to cybersecurity?
Query
• Do you want to reinvent the wheel?
Cybersecurity
Basic Requirements
Cybersecurity - Basics
• IT Environment Inventory
• What do you need to protect?
• What data does it house?
• Risk Assessment
• What risks do you face?
• What vulnerabilities do you have?
• Structure
• Framework/roadmap
• Checklist
• Continuous Improvement
Risk Assessment – NIST Style 800-60
NIST Cybersecurity Framework
• What is the framework?
• 2013, President Obama issued Executive Order 13636,
which directed NIST to work with stakeholders in
developing a voluntary framework-based on existing
standards, guidelines, and practices, for reducing cyber
risks... (not just for government agencies)
NIST Cybersecurity Framework
• https://www.nist.gov/cyberframework
Cybersecurity Frameworks and You: The Perfect Match
Cybersecurity Frameworks and You: The Perfect Match
Cybersecurity Frameworks and You: The Perfect Match
Cybersecurity Frameworks and You: The Perfect Match
Cybersecurity Frameworks and You: The Perfect Match
Cybersecurity Frameworks and You: The Perfect Match
NIST Cybersecurity Controls
• ID.AM-1: Physical devices and systems within
the organization are inventoried.
• ID.AM-4: External information systems are
catalogued.
• ID.GV-1: Organizational information security
policy is established.
• ID.RA-1: Asset vulnerabilities are identified
and documented.
• ID.RA-4: Potential business impacts and
likelihoods are identified.
• ID.RA-6: Risk responses are identified and
prioritized.
• ID.AM-1: Physical devices and systems within the
organization are inventoried.
• ID.AM-4: ExternaPR.AC-1: Identities and credentials
are managed for authorized devices and users.
• PR.AC-3: Remote access is managed.
• PR.AC-4: Access permissions are managed,
incorporating the principles of least privilege and
separation of duties.
• PR.AT-1: All users are informed and trained.
• PR.AT-2: Privileged users understand roles &
responsibilities.
• PR.IP-6: Data is destroyed according to policy.
• PR.IP-9: Response plans (Incident Response and
Business Continuity) and recovery plans (Incident
Recovery and Disaster Recovery) are in place and
managed.*THIS IS A SAMPLE
SANS Top-20 Critical Controls
1. Inventory of Authorized and Unauthorized
Devices
2. Inventory of Authorized and Unauthorized
Software
3. Secure Configurations for Hardware and Software
on Laptops, Workstations, and Servers
4. Continuous Vulnerability Assessment and
Remediation
5. Malware Defenses
6. Application Software Security
7. Wireless Device Control
8. Data Recovery Capability (validated manually)
9. Security Skills Assessment and Appropriate
Training to Fill Gaps (validated manually)
10. Secure Configurations for Network Devices such
as Firewalls, Routers, and Switches
11. Limitation and Control of Network Ports,
Protocols, and Services
12. Controlled Use of Administrative Privileges
13. Boundary Defense
14. Maintenance, Monitoring, and Analysis of Security
Audit Logs
15. Controlled Access Based on the Need to Know
16. Account Monitoring and Control
17. Data Loss Prevention
18. Incident Response Capability (validated manually)
19. Secure Network Engineering (validated manually)
20. Penetration Tests and Red Team Exercises
(validated manually)
NIST – Assess & Review
• External Vulnerability Assessments
• Network Architecture Reviews
• VPN Security Reviews
• Host/OS Configuration Reviews
• Internal Vulnerability Assessments
• Wireless Security Reviews
• Firewall Security Reviews
• Active Directory Reviews
Cyber Maturity
NIST Measuring Maturity
One way management
can assess and improve.
Documents
• https://www.nist.gov/cyberframework
• NIST Cybersecurity Framework website
• http://energy.gov/sites/prod/files/2014/03/f13/C2M2-v1-1_cor.pdf
• Maturity model
• https://www.sans.org/media/critical-security-controls/critical-controls-
poster-2016.pdf
• SANS Top 20 Critical Security Controls
Questions?
Sam BowerCraft
• Senior Manager in Internal Audit and Management Consulting Group
• Certified Information Systems Auditor (CISA)
• M.S. Information Systems
• SBowerCraft@macpas.com
David Hammarberg
• Principal of Forensic Accounting
• Certified Fraud Examiner (CFE)
• Director of Information Technology
• CPA, MCSE, CISSP, CISA
• DHammarberg@macpas.com
Building Successful
Employee Relationships
A Cornerstone to Fraud Prevention
and Risk Management
Questions?
• Documents:
• https://www.nist.gov/cyberframework
• NIST Cybersecurity Framework website
• http://energy.gov/sites/prod/files/2014/03/f13/C2M2-v1-1_cor.pdf
• Maturity model
• https://www.sans.org/media/critical-security-controls/critical-controls-
poster-2016.pdf
• SANS Top 20 Critical Security Controls
Questions?
Sam BowerCraft
• Senior Manager in Internal Audit and Management Consulting Group
• Certified Information Systems Auditor (CISA)
• M.S. Information Systems
• SBowerCraft@macpas.com
David Hammarberg
• Principal of Forensic Accounting
• Certified Fraud Examiner (CFE)
• Director of Information Technology
• CPA, MCSE, CISSP, CISA
• DHammarberg@macpas.com
1 de 45

Recomendados

Introduction to Risk Management via the NIST Cyber Security Framework por
Introduction to Risk Management via the NIST Cyber Security FrameworkIntroduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security FrameworkPECB
5.5K visualizações20 slides
NIST cybersecurity framework por
NIST cybersecurity frameworkNIST cybersecurity framework
NIST cybersecurity frameworkShriya Rai
1K visualizações11 slides
Cybersecurity roadmap : Global healthcare security architecture por
Cybersecurity roadmap : Global healthcare security architectureCybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architecturePriyanka Aash
8.5K visualizações22 slides
NIST CyberSecurity Framework: An Overview por
NIST CyberSecurity Framework: An OverviewNIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewTandhy Simanjuntak
49.7K visualizações39 slides
How to implement NIST cybersecurity standards in my organization por
How to implement NIST cybersecurity standards in my organizationHow to implement NIST cybersecurity standards in my organization
How to implement NIST cybersecurity standards in my organizationExigent Technologies LLC
757 visualizações14 slides
Enterprise Security Architecture for Cyber Security por
Enterprise Security Architecture for Cyber SecurityEnterprise Security Architecture for Cyber Security
Enterprise Security Architecture for Cyber SecurityThe Open Group SA
38.8K visualizações45 slides

Mais conteúdo relacionado

Mais procurados

Cybersecurity Risk Management Program and Your Organization por
Cybersecurity Risk Management Program and Your OrganizationCybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your OrganizationMcKonly & Asbury, LLP
724 visualizações58 slides
HITRUST Certification por
HITRUST CertificationHITRUST Certification
HITRUST CertificationControlCase
906 visualizações31 slides
IBM Security Strategy Overview por
IBM Security Strategy OverviewIBM Security Strategy Overview
IBM Security Strategy Overviewxband
1.6K visualizações34 slides
Building an effective Information Security Roadmap por
Building an effective Information Security RoadmapBuilding an effective Information Security Roadmap
Building an effective Information Security RoadmapElliott Franklin
27.1K visualizações47 slides
Cyber Threat Intelligence por
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat IntelligenceMarlabs
1.7K visualizações6 slides
Introduction to NIST Cybersecurity Framework por
Introduction to NIST Cybersecurity FrameworkIntroduction to NIST Cybersecurity Framework
Introduction to NIST Cybersecurity FrameworkTuan Phan
9.5K visualizações48 slides

Mais procurados(20)

Cybersecurity Risk Management Program and Your Organization por McKonly & Asbury, LLP
Cybersecurity Risk Management Program and Your OrganizationCybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your Organization
McKonly & Asbury, LLP724 visualizações
HITRUST Certification por ControlCase
HITRUST CertificationHITRUST Certification
HITRUST Certification
ControlCase906 visualizações
IBM Security Strategy Overview por xband
IBM Security Strategy OverviewIBM Security Strategy Overview
IBM Security Strategy Overview
xband1.6K visualizações
Building an effective Information Security Roadmap por Elliott Franklin
Building an effective Information Security RoadmapBuilding an effective Information Security Roadmap
Building an effective Information Security Roadmap
Elliott Franklin27.1K visualizações
Cyber Threat Intelligence por Marlabs
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
Marlabs1.7K visualizações
Introduction to NIST Cybersecurity Framework por Tuan Phan
Introduction to NIST Cybersecurity FrameworkIntroduction to NIST Cybersecurity Framework
Introduction to NIST Cybersecurity Framework
Tuan Phan9.5K visualizações
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap) por WAJAHAT IQBAL
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)
WAJAHAT IQBAL7.6K visualizações
Introduction to Cyber Resilience por Peter Wood
Introduction to Cyber ResilienceIntroduction to Cyber Resilience
Introduction to Cyber Resilience
Peter Wood1.5K visualizações
SOC: Use cases and are we asking the right questions? por Jonathan Sinclair
SOC: Use cases and are we asking the right questions?SOC: Use cases and are we asking the right questions?
SOC: Use cases and are we asking the right questions?
Jonathan Sinclair368 visualizações
Effective Security Operation Center - present by Reza Adineh por ReZa AdineH
Effective Security Operation Center - present by Reza AdinehEffective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza Adineh
ReZa AdineH438 visualizações
[Round table] zeroing in on zero trust architecture por Denise Bailey
[Round table] zeroing in on zero trust architecture[Round table] zeroing in on zero trust architecture
[Round table] zeroing in on zero trust architecture
Denise Bailey332 visualizações
From SIEM to SOC: Crossing the Cybersecurity Chasm por Priyanka Aash
From SIEM to SOC: Crossing the Cybersecurity ChasmFrom SIEM to SOC: Crossing the Cybersecurity Chasm
From SIEM to SOC: Crossing the Cybersecurity Chasm
Priyanka Aash1.1K visualizações
Information Security vs. Data Governance vs. Data Protection: What Is the Rea... por PECB
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
PECB 1.5K visualizações
cyber-security-reference-architecture por Birendra Negi ☁️
cyber-security-reference-architecturecyber-security-reference-architecture
cyber-security-reference-architecture
Birendra Negi ☁️751 visualizações
Secure SDLC Framework por Rishi Kant
Secure SDLC FrameworkSecure SDLC Framework
Secure SDLC Framework
Rishi Kant1.4K visualizações
Domain 1 - Security and Risk Management por Maganathin Veeraragaloo
Domain 1 - Security and Risk ManagementDomain 1 - Security and Risk Management
Domain 1 - Security and Risk Management
Maganathin Veeraragaloo7.7K visualizações
Building a Next-Generation Security Operations Center (SOC) por Sqrrl
Building a Next-Generation Security Operations Center (SOC)Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)
Sqrrl5.1K visualizações
Defence in Depth Architectural Decisions por Peter Rawsthorne
Defence in Depth Architectural DecisionsDefence in Depth Architectural Decisions
Defence in Depth Architectural Decisions
Peter Rawsthorne4K visualizações
HITRUST 101: All the basics you need to know por ➲ Stella Bridges
HITRUST 101: All the basics you need to knowHITRUST 101: All the basics you need to know
HITRUST 101: All the basics you need to know
➲ Stella Bridges2K visualizações
Security operations center-SOC Presentation-مرکز عملیات امنیت por ReZa AdineH
Security operations center-SOC Presentation-مرکز عملیات امنیتSecurity operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیت
ReZa AdineH6.2K visualizações

Destaque

Achieving Visible Security at Scale with the NIST Cybersecurity Framework por
Achieving Visible Security at Scale with the NIST Cybersecurity FrameworkAchieving Visible Security at Scale with the NIST Cybersecurity Framework
Achieving Visible Security at Scale with the NIST Cybersecurity FrameworkKevin Fealey
843 visualizações16 slides
Cybersecurity Framework - What are Pundits Saying? por
Cybersecurity Framework - What are Pundits Saying?Cybersecurity Framework - What are Pundits Saying?
Cybersecurity Framework - What are Pundits Saying?Jim Meyer
991 visualizações20 slides
Accountability for Corporate Cybersecurity - Who Owns What? por
Accountability for Corporate Cybersecurity - Who Owns What?Accountability for Corporate Cybersecurity - Who Owns What?
Accountability for Corporate Cybersecurity - Who Owns What?Henry Draughon
1.7K visualizações12 slides
InduSoft Speaks at Houston Infragard on February 17, 2015 por
InduSoft Speaks at Houston Infragard on February 17, 2015InduSoft Speaks at Houston Infragard on February 17, 2015
InduSoft Speaks at Houston Infragard on February 17, 2015AVEVA
1.2K visualizações105 slides
Cybersecurity concepts & Defense best practises por
Cybersecurity concepts & Defense best practisesCybersecurity concepts & Defense best practises
Cybersecurity concepts & Defense best practisesWAJAHAT IQBAL
2.4K visualizações45 slides
NIST Cybersecurity Framework - Mindmap por
NIST Cybersecurity Framework - MindmapNIST Cybersecurity Framework - Mindmap
NIST Cybersecurity Framework - MindmapWAJAHAT IQBAL
2.8K visualizações1 slide

Destaque(9)

Achieving Visible Security at Scale with the NIST Cybersecurity Framework por Kevin Fealey
Achieving Visible Security at Scale with the NIST Cybersecurity FrameworkAchieving Visible Security at Scale with the NIST Cybersecurity Framework
Achieving Visible Security at Scale with the NIST Cybersecurity Framework
Kevin Fealey843 visualizações
Cybersecurity Framework - What are Pundits Saying? por Jim Meyer
Cybersecurity Framework - What are Pundits Saying?Cybersecurity Framework - What are Pundits Saying?
Cybersecurity Framework - What are Pundits Saying?
Jim Meyer991 visualizações
Accountability for Corporate Cybersecurity - Who Owns What? por Henry Draughon
Accountability for Corporate Cybersecurity - Who Owns What?Accountability for Corporate Cybersecurity - Who Owns What?
Accountability for Corporate Cybersecurity - Who Owns What?
Henry Draughon1.7K visualizações
InduSoft Speaks at Houston Infragard on February 17, 2015 por AVEVA
InduSoft Speaks at Houston Infragard on February 17, 2015InduSoft Speaks at Houston Infragard on February 17, 2015
InduSoft Speaks at Houston Infragard on February 17, 2015
AVEVA1.2K visualizações
Cybersecurity concepts & Defense best practises por WAJAHAT IQBAL
Cybersecurity concepts & Defense best practisesCybersecurity concepts & Defense best practises
Cybersecurity concepts & Defense best practises
WAJAHAT IQBAL2.4K visualizações
NIST Cybersecurity Framework - Mindmap por WAJAHAT IQBAL
NIST Cybersecurity Framework - MindmapNIST Cybersecurity Framework - Mindmap
NIST Cybersecurity Framework - Mindmap
WAJAHAT IQBAL2.8K visualizações
NISTs Cybersecurity Framework -- Comparison with Best Practice por David Ochel
NISTs Cybersecurity Framework -- Comparison with Best PracticeNISTs Cybersecurity Framework -- Comparison with Best Practice
NISTs Cybersecurity Framework -- Comparison with Best Practice
David Ochel8.1K visualizações
Security architecture frameworks por John Arnold
Security architecture frameworksSecurity architecture frameworks
Security architecture frameworks
John Arnold8.7K visualizações
NIST Cyber Security Framework: 4 Steps for CIOs - Deloitte CIO - WSJ por Sherry Jones
NIST Cyber Security Framework: 4 Steps for CIOs - Deloitte CIO - WSJNIST Cyber Security Framework: 4 Steps for CIOs - Deloitte CIO - WSJ
NIST Cyber Security Framework: 4 Steps for CIOs - Deloitte CIO - WSJ
Sherry Jones207 visualizações

Similar a Cybersecurity Frameworks and You: The Perfect Match

Cyber Security # Lec 3 por
Cyber Security # Lec 3 Cyber Security # Lec 3
Cyber Security # Lec 3 Kabul Education University
529 visualizações38 slides
SLVA - Security monitoring and reporting itweb workshop por
SLVA - Security monitoring and reporting   itweb workshopSLVA - Security monitoring and reporting   itweb workshop
SLVA - Security monitoring and reporting itweb workshopSLVA Information Security
644 visualizações48 slides
Assessing System Risk the Smart Way por
Assessing System Risk the Smart WayAssessing System Risk the Smart Way
Assessing System Risk the Smart WaySecurity Innovation
98 visualizações35 slides
Your cyber security webinar por
Your cyber security webinarYour cyber security webinar
Your cyber security webinarIntergen
711 visualizações26 slides
Top Security Challenges Facing Credit Unions Today por
Top Security Challenges Facing Credit Unions TodayTop Security Challenges Facing Credit Unions Today
Top Security Challenges Facing Credit Unions TodayChris Gates
32.6K visualizações58 slides
Steps in it audit por
Steps in it auditSteps in it audit
Steps in it auditkinjalmkothari92
9.8K visualizações22 slides

Similar a Cybersecurity Frameworks and You: The Perfect Match(20)

SLVA - Security monitoring and reporting itweb workshop por SLVA Information Security
SLVA - Security monitoring and reporting   itweb workshopSLVA - Security monitoring and reporting   itweb workshop
SLVA - Security monitoring and reporting itweb workshop
SLVA Information Security644 visualizações
Assessing System Risk the Smart Way por Security Innovation
Assessing System Risk the Smart WayAssessing System Risk the Smart Way
Assessing System Risk the Smart Way
Security Innovation98 visualizações
Your cyber security webinar por Intergen
Your cyber security webinarYour cyber security webinar
Your cyber security webinar
Intergen711 visualizações
Top Security Challenges Facing Credit Unions Today por Chris Gates
Top Security Challenges Facing Credit Unions TodayTop Security Challenges Facing Credit Unions Today
Top Security Challenges Facing Credit Unions Today
Chris Gates32.6K visualizações
Steps in it audit por kinjalmkothari92
Steps in it auditSteps in it audit
Steps in it audit
kinjalmkothari929.8K visualizações
Colorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptx por AkramAlqadasi1
Colorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptxColorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptx
Colorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptx
AkramAlqadasi13 visualizações
5 Steps to an Effective Vulnerability Management Program por Tripwire
5 Steps to an Effective Vulnerability Management Program5 Steps to an Effective Vulnerability Management Program
5 Steps to an Effective Vulnerability Management Program
Tripwire640 visualizações
The Journey to Cyber Resilience in a World of Fear, Uncertainty and Doubt por John D. Johnson
The Journey to Cyber Resilience in a World of Fear, Uncertainty and DoubtThe Journey to Cyber Resilience in a World of Fear, Uncertainty and Doubt
The Journey to Cyber Resilience in a World of Fear, Uncertainty and Doubt
John D. Johnson1.2K visualizações
Security metrics por PRAYAGRAJ11
Security metrics Security metrics
Security metrics
PRAYAGRAJ11368 visualizações
UMASS-NISTCSF-October-2016-Presentation-rev2.pptx por Abid Ur Rehman
UMASS-NISTCSF-October-2016-Presentation-rev2.pptxUMASS-NISTCSF-October-2016-Presentation-rev2.pptx
UMASS-NISTCSF-October-2016-Presentation-rev2.pptx
Abid Ur Rehman1 visão
Your cyber security webinar por Empired
Your cyber security webinarYour cyber security webinar
Your cyber security webinar
Empired540 visualizações
How to assess and manage cyber risk por Stephen Cobb
How to assess and manage cyber riskHow to assess and manage cyber risk
How to assess and manage cyber risk
Stephen Cobb1.7K visualizações
RMS Security Breakfast por Rackspace
RMS Security BreakfastRMS Security Breakfast
RMS Security Breakfast
Rackspace681 visualizações
Security metrics 2 por Manish Kumar
Security metrics 2Security metrics 2
Security metrics 2
Manish Kumar323 visualizações
Professional Designations IT Assurance por a3virani
Professional Designations IT AssuranceProfessional Designations IT Assurance
Professional Designations IT Assurance
a3virani429 visualizações
CNIT 160: Ch 2b: Security Strategy Development por Sam Bowne
CNIT 160: Ch 2b: Security Strategy DevelopmentCNIT 160: Ch 2b: Security Strategy Development
CNIT 160: Ch 2b: Security Strategy Development
Sam Bowne351 visualizações
Application Portfolio Risk Ranking: Banishing FUD With Structure and Numbers por Denim Group
Application Portfolio Risk Ranking: Banishing FUD With Structure and NumbersApplication Portfolio Risk Ranking: Banishing FUD With Structure and Numbers
Application Portfolio Risk Ranking: Banishing FUD With Structure and Numbers
Denim Group659 visualizações
Risk Management Approach to Cyber Security por Ernest Staats
Risk Management  Approach to Cyber Security Risk Management  Approach to Cyber Security
Risk Management Approach to Cyber Security
Ernest Staats3.3K visualizações

Mais de McKonly & Asbury, LLP

Ethics: A Focus on the 7 Threats por
Ethics: A Focus on the 7 ThreatsEthics: A Focus on the 7 Threats
Ethics: A Focus on the 7 ThreatsMcKonly & Asbury, LLP
3.7K visualizações30 slides
Ratio Analysis and Business Performance – Why Should I Care – Part 2? por
Ratio Analysis and Business Performance – Why Should I Care – Part 2?Ratio Analysis and Business Performance – Why Should I Care – Part 2?
Ratio Analysis and Business Performance – Why Should I Care – Part 2?McKonly & Asbury, LLP
223 visualizações35 slides
Not-For-Profit Organizations: Lessons Learned from Implementation of the New ... por
Not-For-Profit Organizations: Lessons Learned from Implementation of the New ...Not-For-Profit Organizations: Lessons Learned from Implementation of the New ...
Not-For-Profit Organizations: Lessons Learned from Implementation of the New ...McKonly & Asbury, LLP
216 visualizações38 slides
2019 State Taxes: Pennsylvania Update and The Multistate Tax Climate por
2019 State Taxes: Pennsylvania Update and The Multistate Tax Climate2019 State Taxes: Pennsylvania Update and The Multistate Tax Climate
2019 State Taxes: Pennsylvania Update and The Multistate Tax ClimateMcKonly & Asbury, LLP
137 visualizações45 slides
Leasing: A New Standard is Finally Here por
Leasing: A New Standard is Finally HereLeasing: A New Standard is Finally Here
Leasing: A New Standard is Finally HereMcKonly & Asbury, LLP
216 visualizações39 slides
Business Valuation Update & Impact of the Tax Cuts and Jobs Act por
Business Valuation Update & Impact of the Tax Cuts and Jobs ActBusiness Valuation Update & Impact of the Tax Cuts and Jobs Act
Business Valuation Update & Impact of the Tax Cuts and Jobs ActMcKonly & Asbury, LLP
162 visualizações38 slides

Mais de McKonly & Asbury, LLP(20)

Ethics: A Focus on the 7 Threats por McKonly & Asbury, LLP
Ethics: A Focus on the 7 ThreatsEthics: A Focus on the 7 Threats
Ethics: A Focus on the 7 Threats
McKonly & Asbury, LLP3.7K visualizações
Ratio Analysis and Business Performance – Why Should I Care – Part 2? por McKonly & Asbury, LLP
Ratio Analysis and Business Performance – Why Should I Care – Part 2?Ratio Analysis and Business Performance – Why Should I Care – Part 2?
Ratio Analysis and Business Performance – Why Should I Care – Part 2?
McKonly & Asbury, LLP223 visualizações
Not-For-Profit Organizations: Lessons Learned from Implementation of the New ... por McKonly & Asbury, LLP
Not-For-Profit Organizations: Lessons Learned from Implementation of the New ...Not-For-Profit Organizations: Lessons Learned from Implementation of the New ...
Not-For-Profit Organizations: Lessons Learned from Implementation of the New ...
McKonly & Asbury, LLP216 visualizações
2019 State Taxes: Pennsylvania Update and The Multistate Tax Climate por McKonly & Asbury, LLP
2019 State Taxes: Pennsylvania Update and The Multistate Tax Climate2019 State Taxes: Pennsylvania Update and The Multistate Tax Climate
2019 State Taxes: Pennsylvania Update and The Multistate Tax Climate
McKonly & Asbury, LLP137 visualizações
Leasing: A New Standard is Finally Here por McKonly & Asbury, LLP
Leasing: A New Standard is Finally HereLeasing: A New Standard is Finally Here
Leasing: A New Standard is Finally Here
McKonly & Asbury, LLP216 visualizações
Business Valuation Update & Impact of the Tax Cuts and Jobs Act por McKonly & Asbury, LLP
Business Valuation Update & Impact of the Tax Cuts and Jobs ActBusiness Valuation Update & Impact of the Tax Cuts and Jobs Act
Business Valuation Update & Impact of the Tax Cuts and Jobs Act
McKonly & Asbury, LLP162 visualizações
Tax Cut and Jobs Act: What You Need to Know por McKonly & Asbury, LLP
Tax Cut and Jobs Act: What You Need to KnowTax Cut and Jobs Act: What You Need to Know
Tax Cut and Jobs Act: What You Need to Know
McKonly & Asbury, LLP101 visualizações
Business Ethics & The Three Monkeys in the Room por McKonly & Asbury, LLP
Business Ethics & The Three Monkeys in the RoomBusiness Ethics & The Three Monkeys in the Room
Business Ethics & The Three Monkeys in the Room
McKonly & Asbury, LLP353 visualizações
Modern Trust Laws: Delivering Direction and Control por McKonly & Asbury, LLP
Modern Trust Laws: Delivering Direction and ControlModern Trust Laws: Delivering Direction and Control
Modern Trust Laws: Delivering Direction and Control
McKonly & Asbury, LLP221 visualizações
Professional Ethics for CPAs - What the Rules Say and How to Interpret Them por McKonly & Asbury, LLP
Professional Ethics for CPAs - What the Rules Say and How to Interpret ThemProfessional Ethics for CPAs - What the Rules Say and How to Interpret Them
Professional Ethics for CPAs - What the Rules Say and How to Interpret Them
McKonly & Asbury, LLP108 visualizações
2018 Pennsylvania Tax Update: The State Budget, Legislation, and Multistate T... por McKonly & Asbury, LLP
2018 Pennsylvania Tax Update: The State Budget, Legislation, and Multistate T...2018 Pennsylvania Tax Update: The State Budget, Legislation, and Multistate T...
2018 Pennsylvania Tax Update: The State Budget, Legislation, and Multistate T...
McKonly & Asbury, LLP217 visualizações
Not-for-Profit Financial Reporting: How to Convert Your Financial Statements ... por McKonly & Asbury, LLP
Not-for-Profit Financial Reporting: How to Convert Your Financial Statements ...Not-for-Profit Financial Reporting: How to Convert Your Financial Statements ...
Not-for-Profit Financial Reporting: How to Convert Your Financial Statements ...
McKonly & Asbury, LLP180 visualizações
Navigating the new Trust Services Criteria por McKonly & Asbury, LLP
Navigating the new Trust Services CriteriaNavigating the new Trust Services Criteria
Navigating the new Trust Services Criteria
McKonly & Asbury, LLP513 visualizações
Tax Credit Opportunities for Historic Building Rehabilitations por McKonly & Asbury, LLP
Tax Credit Opportunities for Historic Building RehabilitationsTax Credit Opportunities for Historic Building Rehabilitations
Tax Credit Opportunities for Historic Building Rehabilitations
McKonly & Asbury, LLP185 visualizações
Preparing to Buy? Topics and Tips for Buying a Business por McKonly & Asbury, LLP
Preparing to Buy? Topics and Tips for Buying a BusinessPreparing to Buy? Topics and Tips for Buying a Business
Preparing to Buy? Topics and Tips for Buying a Business
McKonly & Asbury, LLP100 visualizações
Data Analytics: Better Decision, Better Business por McKonly & Asbury, LLP
Data Analytics: Better Decision, Better BusinessData Analytics: Better Decision, Better Business
Data Analytics: Better Decision, Better Business
McKonly & Asbury, LLP187 visualizações
Tax Reform Legislation Analysis - Part 2 por McKonly & Asbury, LLP
Tax Reform Legislation Analysis - Part 2Tax Reform Legislation Analysis - Part 2
Tax Reform Legislation Analysis - Part 2
McKonly & Asbury, LLP144 visualizações
Tax Reform Legislation Analysis por McKonly & Asbury, LLP
Tax Reform Legislation AnalysisTax Reform Legislation Analysis
Tax Reform Legislation Analysis
McKonly & Asbury, LLP106 visualizações
Preparing to Buy or Sell? Topics and Tips for a Successful Transition por McKonly & Asbury, LLP
Preparing to Buy or Sell? Topics and Tips for a Successful TransitionPreparing to Buy or Sell? Topics and Tips for a Successful Transition
Preparing to Buy or Sell? Topics and Tips for a Successful Transition
McKonly & Asbury, LLP71 visualizações
Ethics: Real Life Application of the AICPA Code of Professional Conduct por McKonly & Asbury, LLP
Ethics: Real Life Application of the AICPA Code of Professional ConductEthics: Real Life Application of the AICPA Code of Professional Conduct
Ethics: Real Life Application of the AICPA Code of Professional Conduct
McKonly & Asbury, LLP2.3K visualizações

Último

Accel_Series_2023Autumn_En.pptx por
Accel_Series_2023Autumn_En.pptxAccel_Series_2023Autumn_En.pptx
Accel_Series_2023Autumn_En.pptxNTTDATA INTRAMART
203 visualizações75 slides
MechMaf Shipping LLC por
MechMaf Shipping LLCMechMaf Shipping LLC
MechMaf Shipping LLCMechMaf Shipping LLC
59 visualizações288 slides
Bloomerang_Forecasting Your Fundraising Revenue 2024.pptx.pdf por
Bloomerang_Forecasting Your Fundraising Revenue 2024.pptx.pdfBloomerang_Forecasting Your Fundraising Revenue 2024.pptx.pdf
Bloomerang_Forecasting Your Fundraising Revenue 2024.pptx.pdfBloomerang
146 visualizações32 slides
Top 10 Web Development Companies in California por
Top 10 Web Development Companies in CaliforniaTop 10 Web Development Companies in California
Top 10 Web Development Companies in CaliforniaTopCSSGallery
74 visualizações27 slides
Quandoo - Passion - Matthias M.pptx por
Quandoo - Passion - Matthias M.pptxQuandoo - Passion - Matthias M.pptx
Quandoo - Passion - Matthias M.pptxMatthias Maximilian
23 visualizações5 slides
Valuation Quarterly Webinar Dec23.pdf por
Valuation Quarterly Webinar Dec23.pdfValuation Quarterly Webinar Dec23.pdf
Valuation Quarterly Webinar Dec23.pdfFelixPerez547899
40 visualizações12 slides

Último(20)

Accel_Series_2023Autumn_En.pptx por NTTDATA INTRAMART
Accel_Series_2023Autumn_En.pptxAccel_Series_2023Autumn_En.pptx
Accel_Series_2023Autumn_En.pptx
NTTDATA INTRAMART203 visualizações
Bloomerang_Forecasting Your Fundraising Revenue 2024.pptx.pdf por Bloomerang
Bloomerang_Forecasting Your Fundraising Revenue 2024.pptx.pdfBloomerang_Forecasting Your Fundraising Revenue 2024.pptx.pdf
Bloomerang_Forecasting Your Fundraising Revenue 2024.pptx.pdf
Bloomerang146 visualizações
Top 10 Web Development Companies in California por TopCSSGallery
Top 10 Web Development Companies in CaliforniaTop 10 Web Development Companies in California
Top 10 Web Development Companies in California
TopCSSGallery74 visualizações
Quandoo - Passion - Matthias M.pptx por Matthias Maximilian
Quandoo - Passion - Matthias M.pptxQuandoo - Passion - Matthias M.pptx
Quandoo - Passion - Matthias M.pptx
Matthias Maximilian23 visualizações
Valuation Quarterly Webinar Dec23.pdf por FelixPerez547899
Valuation Quarterly Webinar Dec23.pdfValuation Quarterly Webinar Dec23.pdf
Valuation Quarterly Webinar Dec23.pdf
FelixPerez54789940 visualizações
davood_keshavarz_david_keshavarz_criminal_conviction_prison_sentence_judgemen... por morshedislam3
davood_keshavarz_david_keshavarz_criminal_conviction_prison_sentence_judgemen...davood_keshavarz_david_keshavarz_criminal_conviction_prison_sentence_judgemen...
davood_keshavarz_david_keshavarz_criminal_conviction_prison_sentence_judgemen...
morshedislam317 visualizações
Integrating Talent Management Practices por Seta Wicaksana
Integrating Talent Management PracticesIntegrating Talent Management Practices
Integrating Talent Management Practices
Seta Wicaksana134 visualizações
Accounts Class 12 project cash flow statement and ratio analysis por JinendraPamecha
Accounts Class 12 project cash flow statement and ratio analysisAccounts Class 12 project cash flow statement and ratio analysis
Accounts Class 12 project cash flow statement and ratio analysis
JinendraPamecha35 visualizações
Bloomerang Thank Yous Dec 2023.pdf por Bloomerang
Bloomerang Thank Yous Dec 2023.pdfBloomerang Thank Yous Dec 2023.pdf
Bloomerang Thank Yous Dec 2023.pdf
Bloomerang123 visualizações
PMU Launch - Guaranteed Slides por pmulaunch
PMU Launch - Guaranteed SlidesPMU Launch - Guaranteed Slides
PMU Launch - Guaranteed Slides
pmulaunch16 visualizações
Navigating EUDR Compliance within the Coffee Industry por Peter Horsten
Navigating EUDR Compliance within the Coffee IndustryNavigating EUDR Compliance within the Coffee Industry
Navigating EUDR Compliance within the Coffee Industry
Peter Horsten44 visualizações
Pitch Deck Teardown: Scalestack's $1M AI sales tech Seed deck por HajeJanKamps
Pitch Deck Teardown: Scalestack's $1M AI sales tech Seed deckPitch Deck Teardown: Scalestack's $1M AI sales tech Seed deck
Pitch Deck Teardown: Scalestack's $1M AI sales tech Seed deck
HajeJanKamps597 visualizações
Presentation on proposed acquisition of leading European asset manager Aermon... por KeppelCorporation
Presentation on proposed acquisition of leading European asset manager Aermon...Presentation on proposed acquisition of leading European asset manager Aermon...
Presentation on proposed acquisition of leading European asset manager Aermon...
KeppelCorporation240 visualizações
Imports Next Level.pdf por Bloomerang
Imports Next Level.pdfImports Next Level.pdf
Imports Next Level.pdf
Bloomerang120 visualizações
v s.pptx por ravikhadalwal
v s.pptxv s.pptx
v s.pptx
ravikhadalwal10 visualizações
Basic of Air Ticketing & IATA Geography por Md Shaifullar Rabbi
Basic of Air Ticketing & IATA GeographyBasic of Air Ticketing & IATA Geography
Basic of Air Ticketing & IATA Geography
Md Shaifullar Rabbi 67 visualizações
Monthly Social Media Update November 2023 copy.pptx por Andy Lambert
Monthly Social Media Update November 2023 copy.pptxMonthly Social Media Update November 2023 copy.pptx
Monthly Social Media Update November 2023 copy.pptx
Andy Lambert30 visualizações

Cybersecurity Frameworks and You: The Perfect Match

  • 2. Building Successful Employee Relationships A Cornerstone to Fraud Prevention and Risk Management
  • 3. Building Successful Employee Relationships A Cornerstone to Fraud Prevention and Risk Management
  • 5. Introductions Sam BowerCraft • Senior Manager in Internal Audit and Management Consulting Group • Certified Information Systems Auditor (CISA) • Security Consultant related to financial data, information systems, and assets. • M.S. Information Systems David Hammarberg • Principal of Forensic Accounting • Certified Fraud Examiner (CFE) • Director of Information Technology • CPA, MCSE, CISSP, CISA • 16+ years of experience
  • 6. Objectives • Understanding the importance of using a framework in your organization. • How a framework can benefit an organization. • NIST Cybersecurity Framework: • The basic requirements for any organization.
  • 8. An Exercise • List all the areas of information technology and security that are important for your organization to consider and address.
  • 9. Framework Benefits • Structure • Building from a pre-existing foundation • Identify vulnerabilities • Analyze or evaluate the risk associated with that vulnerability. • Determine appropriate ways to eliminate or control the vulnerability. • Efficiency: Cost Savings (time and dollars) • Effectiveness • Support
  • 10. Framework Drawbacks • While structure is good, understanding is better. • Limitations: • The framework versus your environment. • “No battle plan survives contact with the enemy.” - Helmuth von Moltke the Elder • Clarity of Responsibility: you and the framework
  • 11. Best Practices NOT… • An automated security mechanism or setting. • A business practice. • A theory or possibility. It is in place. • The one best practice; it is not the best of all. • A human practice or method to perform a process. • Security related, helping to protect information, resources, or operations. • Effective as shown by experience and results. • Among the most effective practices used to perform this process.
  • 12. Best Practices From Worst to Best: Chevron says: • Good Idea: Unproven. Intuitively makes sense, could be successful… requires analysis. • Good Practice: Has improved results; supported by data and analysis. • Local Best Practice: Best approach for large parts of the organization based on analysis of performance internally and some external review. • Industry Best Practice: Best approach for large parts of the organization based on analysis of performance internally and externally.
  • 13. Standard Operating Procedures • Facilitate Communication • Provide consistency • Increase productivity • Provide for cross training • Help ensure things are done right.
  • 15. Writing Things Down • How is your memory? • How long can you focus on one thing? • Written goals result in more achievement. • Reminders help focus… and keep track. • Unburden your brain; de-clutter with a list / framework. • Clearer thinking and being able to review… and communicate. • Identify what needs your focus.
  • 16. Security Risk Assessment • Identify the potential inherent security risks. • Assess the likelihood and significance of occurrence of the identified security risks (ranking of risks). • Evaluate which users and departments are most likely to have a significant security event and identify the methods they are likely to use. • Identify and map existing preventive and detective controls to the relevant security risks (framework). • Evaluate whether the identified controls are operating effectively and efficiently. • Identify and evaluate residual security risks resulting from ineffective or nonexistent controls. • Respond to residual security risks.
  • 17. Approach Comparisons Proscriptive • Scope the environment. • Do these things. • Evaluate control responses. • Design • Operation • Remediate/update controls. • Repeat. Risk Based • Scope the environment. • Evaluate vulnerabilities. • Rank risks. • Evaluate control responses. • Design • Operation • Remediate/update controls. • Repeat.
  • 18. After the Risk Assessment • The Risk Assessment may reveal certain residual risks that have not been adequately mitigated due to lack of, or non-compliance with, appropriate preventive and detective controls. • The security professional works with the client to develop mitigation strategies for any residual risks with an unacceptably high likelihood or significance of occurrence. • Responses should be evaluated in terms of their costs versus benefits and in light of the organization's level of risk tolerance.
  • 19. Cybercrime Cybercrime, is simply a crime that involves a computer and a network.
  • 20. Types of Cybercrime • Hacking • Theft • Cyber Stalking • Identity Theft • Malicious Software • Child Soliciting and Abuse
  • 21. Categories of Cybercrime • Individual: This type of cyber crime can be in the form of cyber stalking, distributing pornography, trafficking and “grooming.” • Property: In this case, they can steal a person’s bank details and siphon off money; misuse the credit card to make numerous purchases online; run a scam to get naïve people to part with their hard earned money; use malicious software to gain access to an organizations website or disrupt the systems of the organization. • Government: Crimes against a government are referred to as cyber terrorism. If successful, this category can wreak havoc and cause panic amongst the civilian population.
  • 22. Combating Cybercrimes • Security Hardware • Security Software • Security Awareness • Working along side other businesses • Working with government agencies
  • 23. Query • Are you willing to operate your information technology environment in an ad hoc and informal manner given the risks in the world today related to cybersecurity?
  • 24. Query • Do you want to reinvent the wheel?
  • 26. Cybersecurity - Basics • IT Environment Inventory • What do you need to protect? • What data does it house? • Risk Assessment • What risks do you face? • What vulnerabilities do you have? • Structure • Framework/roadmap • Checklist • Continuous Improvement
  • 27. Risk Assessment – NIST Style 800-60
  • 28. NIST Cybersecurity Framework • What is the framework? • 2013, President Obama issued Executive Order 13636, which directed NIST to work with stakeholders in developing a voluntary framework-based on existing standards, guidelines, and practices, for reducing cyber risks... (not just for government agencies)
  • 29. NIST Cybersecurity Framework • https://www.nist.gov/cyberframework
  • 36. NIST Cybersecurity Controls • ID.AM-1: Physical devices and systems within the organization are inventoried. • ID.AM-4: External information systems are catalogued. • ID.GV-1: Organizational information security policy is established. • ID.RA-1: Asset vulnerabilities are identified and documented. • ID.RA-4: Potential business impacts and likelihoods are identified. • ID.RA-6: Risk responses are identified and prioritized. • ID.AM-1: Physical devices and systems within the organization are inventoried. • ID.AM-4: ExternaPR.AC-1: Identities and credentials are managed for authorized devices and users. • PR.AC-3: Remote access is managed. • PR.AC-4: Access permissions are managed, incorporating the principles of least privilege and separation of duties. • PR.AT-1: All users are informed and trained. • PR.AT-2: Privileged users understand roles & responsibilities. • PR.IP-6: Data is destroyed according to policy. • PR.IP-9: Response plans (Incident Response and Business Continuity) and recovery plans (Incident Recovery and Disaster Recovery) are in place and managed.*THIS IS A SAMPLE
  • 37. SANS Top-20 Critical Controls 1. Inventory of Authorized and Unauthorized Devices 2. Inventory of Authorized and Unauthorized Software 3. Secure Configurations for Hardware and Software on Laptops, Workstations, and Servers 4. Continuous Vulnerability Assessment and Remediation 5. Malware Defenses 6. Application Software Security 7. Wireless Device Control 8. Data Recovery Capability (validated manually) 9. Security Skills Assessment and Appropriate Training to Fill Gaps (validated manually) 10. Secure Configurations for Network Devices such as Firewalls, Routers, and Switches 11. Limitation and Control of Network Ports, Protocols, and Services 12. Controlled Use of Administrative Privileges 13. Boundary Defense 14. Maintenance, Monitoring, and Analysis of Security Audit Logs 15. Controlled Access Based on the Need to Know 16. Account Monitoring and Control 17. Data Loss Prevention 18. Incident Response Capability (validated manually) 19. Secure Network Engineering (validated manually) 20. Penetration Tests and Red Team Exercises (validated manually)
  • 38. NIST – Assess & Review • External Vulnerability Assessments • Network Architecture Reviews • VPN Security Reviews • Host/OS Configuration Reviews • Internal Vulnerability Assessments • Wireless Security Reviews • Firewall Security Reviews • Active Directory Reviews
  • 40. NIST Measuring Maturity One way management can assess and improve.
  • 41. Documents • https://www.nist.gov/cyberframework • NIST Cybersecurity Framework website • http://energy.gov/sites/prod/files/2014/03/f13/C2M2-v1-1_cor.pdf • Maturity model • https://www.sans.org/media/critical-security-controls/critical-controls- poster-2016.pdf • SANS Top 20 Critical Security Controls
  • 42. Questions? Sam BowerCraft • Senior Manager in Internal Audit and Management Consulting Group • Certified Information Systems Auditor (CISA) • M.S. Information Systems • SBowerCraft@macpas.com David Hammarberg • Principal of Forensic Accounting • Certified Fraud Examiner (CFE) • Director of Information Technology • CPA, MCSE, CISSP, CISA • DHammarberg@macpas.com
  • 43. Building Successful Employee Relationships A Cornerstone to Fraud Prevention and Risk Management
  • 44. Questions? • Documents: • https://www.nist.gov/cyberframework • NIST Cybersecurity Framework website • http://energy.gov/sites/prod/files/2014/03/f13/C2M2-v1-1_cor.pdf • Maturity model • https://www.sans.org/media/critical-security-controls/critical-controls- poster-2016.pdf • SANS Top 20 Critical Security Controls
  • 45. Questions? Sam BowerCraft • Senior Manager in Internal Audit and Management Consulting Group • Certified Information Systems Auditor (CISA) • M.S. Information Systems • SBowerCraft@macpas.com David Hammarberg • Principal of Forensic Accounting • Certified Fraud Examiner (CFE) • Director of Information Technology • CPA, MCSE, CISSP, CISA • DHammarberg@macpas.com