1 / 8

Know About Cyber Security Risk Assessment

Cyber security is the figure of technologies, procedures and applies designed to shield networks, computers, programs and information from attack, loss or illegal access.

Download Presentation

Know About Cyber Security Risk Assessment

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Know About Cyber Security Risk Assessment http://www.infosecpartners.com/

  2. Introduction: Cyber security is the figure of technologies, procedures and applies designed to shield networks, computers, programs and information from attack, loss or illegal access. http://www.infosecpartners.com/

  3. Why carry out a cyber-security risk assessment To recognize the holes in your organization’s critical risk extents To control activities to close those gaps Also confirm that you spend time and money in the correct zones and do not waste resources http://www.infosecpartners.com/

  4. Elements the Includes in Cyber Security Services Application Security - Application securities have protected your application and hardware from threads or viruses. Information security - Information securities have protected your data and information systems from threads. Network security - Network securities protect and monitor your network area from threads and attackers and restrict to unauthorized access. http://www.infosecpartners.com/

  5. How to Implement Cyber Security Identifying the data that needs to be protected Cataloging where critical data exists Identifying who has and who should have access to the data http://www.infosecpartners.com/

  6. Security control implementation Security and Privacy Controls for Federal Information Systems and Organizations (NIST 800-53) ISO 27001 SANS Critical Security Controls Regular verification of security control performance http://www.infosecpartners.com/

  7. Gap readiness planning and testing Recognizing whom to inform internally Founding a response team. Applying observing procedures to track invader activity Establishing outlet anticipation Informing proper authorized specialists Assessing the amount of the negotiation. Coordinating with legal counsel and insurance carriers Evaluating root-cause and applying security remediation Risk acceptance and risk transfer http://www.infosecpartners.com/

  8. Thank You http://www.infosecpartners.com/

More Related