Earlier this month, we gathered a panel of experts at our Spring Security Summit. The topic of the day was cyber security and risk mitigation. Our speakers covered the breadth of a cyber security framework – from identification of important data to recovering from a cyber attack. If you weren’t able to join us that day, this brief recap and the video introduction below should provide you with a snapshot of what we discussed. We’ll be hosting another security summit in the Fall of 2017. The content presented there will build off of the information that we shared at this event. Keep an eye out for details in your inbox and on our website. We hope to see you there!
Below, you’ll find a short clip from our Vice President of Business Strategy, Bruce Ward. In his opening remarks, Bruce explained how to take a data-centric approach to security. This approach begins with an organization identifying the data that needs to be secure. I’ll let Bruce guide you the rest of the way.
A Framework for Security
Bruce’s introduction was just a portion of the day’s presentations. In total, the agenda covered the entirety of a complete security framework. Using the slide below as a basis, we dove into the 5 main components of a cyber security plan. You’re surely familiar with some of these, but it’s possible that you have some gaps.
Identify: What data needs to be secured? Do you have regulated data? Intellectual property data? Customer or employee information? Starting with these questions, you can begin to classify your data and determine how the rest of the framework fits around it.
Protect: You’re certainly doing some of this today. Anti-virus on your desktop, SPAM filtering on your email, end-user training, encryption on your data, etc. Protection is a necessary part of your security strategy, but it isn’t flawless. The other components of the framework help to keep you secure when protection fails.
Detect: What happens when protection fails? How do you know if you’ve been breached? How can you tell if user activity on an account is legitimate or the activity of a bad actor with stolen credentials ? Determining if and how an internal or external breach occurred is vital to your security strategy. The longer a hacker is in your environment, the greater opportunity he or she has to find compromising data, plant malware, or compromise higher-level accounts.
Respond: What do you do when a breach is detected? Who is responsible for what? How are impacted third parties notified? The immediate aftermath of discovering a data breach can be hectic and confusing. When time matters most, an incident response plan is critically important to a well-rounded security plan.
Recover: System downtime can put companies out of business. In the wake of a cyber security incident, organizations need to be able to trust that their backups are safe, recent, and can be implemented quickly. The ability to recover quickly can greatly reduce the impact of a security breach.
While the cyber security landscape evolves rapidly, businesses need to start building a security strategy based on more than just protection. Using these elements as the basis for a cyber security framework, organizations can better position themselves to protect the most sensitive data and recover if that protection fails.
If you’d like help establishing and implementing a cyber security framework, Peters & Associates is happy to help. Email us at email@example.com and keep an eye out for our Fall Security Summit invitation.