Anatomy of a Cyber Attack: Risks and Threat Mitigation

There are several ways your business should protect itself from a cyber attack.  A panel of experts was assembled to discuss these issues from various angles:

  • TechnicalBruce Ward, VP of Business Strategy at Peters & Associates, discussed common security controls organizations employ to minimize risks from cyber-attacks.
  • LegalTodd Rowe, partner at Tressler, LLP, discussed Illinois state law and the need to conform to Illinois’ Personal Information Protection Act (PIPA).
  • FinancialMike Richmond, Risk Advisor from The Horton Group, discussed the costs involved with a typical breach and 1st and 3rd party coverage with various insurance coverage.

What did the experts say?

Several compelling statements and questions were addressed. A few of the highlights that were discussed:

  1. Todd discussed Illinois’ 2016 update to the Personal Information and Protection Act (PIPA) which went into effect in January 2017. In the law, Illinois organizations are chartered to “…implement and maintain reasonable security measures to protect those records from unauthorized access, acquisition, destruction, use, modification, or disclosure.”
  1. Mike stated that data IS your organization’s asset and it is not only logical to inventory your data, but also to quantify your organization’s data significance to gauge security measures required. $221 per record was the referenced yardstick.  Beyond the number, another $600+/record exists in reputational damage, contract reduction, and revenue loss.  How many records is your organization chartered to protect?  Bruce added that significant data can usually be found in the following locations:
   Human Resources – personnel files Research and Development – patents
   Operations – customer accounts, production IT – passwords, security architecture
   Financials – past / present / future reporting Third Party – outsourced vendors
  1. Bruce shared several stories on reasonable security controls in a modern infrastructure and a strategy to employ vCISO’s to outline a strategy to protect data.

Cyber Attack

For a free consultation with a security compliance professional, email info@peters.com. We are happy to help.

Peters & Associates eBook-Defending Your Data.

Take Your Security Strategy to The Next Level.

Download the Peters & Associates eBook-Defending Your Data.

Learn how to Secure Your Infrastructure, and Discover How to Defend Against Today’s Evolving Security Threats.

GET YOUR COPY
Peters & Associates Security Assessment.

Not sure how secure you are compared to your peers?

Take our free Security Assessment to find out how you can improve your organization’s security posture.

START HERE
By | 2017-05-07T07:26:49+00:00 April 14th, 2017|IT Security Solutions|Comments Off on Anatomy of a Cyber Attack: Risks and Threat Mitigation

About the Author:

Bruce is the Vice President of Business Strategy. In addition to client-facing roles, Bruce is responsible for operational excellence in areas such as marketing, product alignment, and vendor relations. Over the past 25 years, Bruce has always served in an advisory role for C-level executives, IT Directors and CISOs to ensure that business goals align with IT strategies and initiatives. Microsoft has recognized, trained and badged Bruce as an internal Microsoft resource to allow him full access to solution architecture, roadmaps and competitive guidance. Bruce has a focus on consultative education and helping organizations envision their future with justifiable rationale. He is sought after on speaking engagements including CIO roundtables, executive forums, and conferences. Bruce is a graduate from the University of Illinois (Secondary Ed.) and also holds an MBA from Keller Graduate School, with a credentialed security focus (CISM).