Cybersecurity Risk Management in K-12 Education: Challenges and Strategies

 
Building a Resilient Shield:
Cybersecurity Risk Management
Strategies for Public School
Districts-MSPLIP
 
Jeff Schobel – CEO, ResoluteGuard
Room 103 – 3-4pm
6/15/2023
 
2
 
TODAY’S SESSION
 
Agenda
 
K-12 Cybersecurity Challenges
Cyber Attacks
Cyber Insurance
Importance of Executive Governance
Today’s Technology Director
Cyber Action Plan & Strategy
Policies and Guidelines
Vulnerability Assessments
Questions
 
K-12 CYBERSECURITY CHALLENGES
3
 
4
 
CYBERSECURITY CHALLENGES IN EDUCATION
 
Lack of Funds for Cybersecurity Tools
Implementation of Basic Cybersecurity Tools
Lack of Expertise and/or Dedicated Cybersecurity Professional
Staffing Challenges
Implementing
Managing
Monitoring
 
Cyberattacks are on the rise and outpacing even the
most skilled IT professionals.
 
5
 
STATE OF OUR SCHOOLS…
 
Lack of positions allocated to cybersecurity
Inability to find and hire staff with cybersecurity skills and
training
Concentration of cybersecurity responsibilities on a single
staff member and is not a dedicated cybersecurity resource
Lack of training on resources to respond when a threat is
identified
At-home learning
1:1 schools-network devices
 
School Districts face ongoing staffing challenges
in implementing, managing, and monitoring the
cybersecurity of their networks and systems.
 
CYBER ATTACKS
6
 
7
 
CYBER ATTACK DATA
 
K-12 Viewed as Soft Targets and Lucrative: Student and Employee PII
with Cyber Criminal Sophistication!
 
Microsoft Study: 63% of all malware attacks worldwide happen within K-12
 
Average of 214 days a Cybercriminal goes undetected within a network
 
Average of 72 days needed for recovery efforts
 
2021 Report: Over 1,000 K-12 cybersecurity incidents since 2016
 
8
 
HACKERS INFILTRATE SECOND-LARGEST U.S. SCHOOL DISTRICT IN GROWING TREND
 
“District staff recognized the breach quickly and took fast action that may have averted an operational disaster.”
“When the district acknowledged the attack, officials also announced an array of measures to improve
cybersecurity. These measures, the district said, "have been taken, will be taken immediately or will be
implemented as soon as feasible.”
“It requires all of us to work together to work to identify these threats and these actors and to take steps to
mitigate the damage.”
“District officials said 
they immediately established a plan of action to provide protection in the future
,
“informed by top public and private sector technology and cyber security professionals.””
 
September 7, 2022
 
CYBER INSURANCE
9
 
10
 
AS RANSOMWARE AND OTHER CYBER-ATTACKS INCREASE INSURANCE COVERAGE COSTS
AND TERMS ARE ALSO INCREASING
 
Lowering of Coverage Limits
Increasing Premiums and Deductibles
Limited or No Ransomware coverage
Required Security Controls in place
 
Insurance Carriers Are Requiring Detailed Questionnaires to
Determine Insurance Renewal Costs and Terms
 
2022-2023:  Recommendations or Few Security Controls
     2023-2024:  New Security Controls?
 
11
 
Cyber Insurance Coverage - Public Entity Minimum System Security Standards/Best Practices
 
Patching- Updated within 30 days; 1-7 days for Critical & High Severity patching
Guidelines/Policies- Incident Response; Disaster Recovery; Business Continuity
Backups- Separate from Primary Network; Regular Backups; Testing; Encryption; Restore within 72 Hours, Anti-Virus
Multi-factor Authentication (MFA)-  100% for Remote Access and Privileged User Accounts; Email Access
Endpoint Protection, Detection & Response (EDR)- EDR Solution in place across Enterprise
Remote Desktop Protocol- MFA Enabled VPN Remote access; Network-level Authentication enabled
Employee Training- Simulated Phishing Email Training; Regular Cyber Security Training; Fraudulent Accounting
Transactions
Regular Vulnerability Scans/Assessments
End of Life Software- Plan/Guidelines and Adequate Measures to Protect EOL Software
 
EXECUTIVE GOVERNANCE
12
 
13
 
CYBER RISK MANAGEMENT IS:
 
Reactionary in Nature
Focused only on IT Security
Nonalignment with District Objectives
Check the Box Mentality
Senior Executives asking the Wrong Questions
Compliance ≠ Security
$’s ≠ Security
Extremely Difficult to Quantify
 
14
 
BUSINESS DECISIONS
 
K-12 Decision makers may be disconnected from the cyber realities.
 
Decision makers are unaware an incident can lead to serious harm.
 
This should be cause for immediate action.
 
15
 
BUSINESS DECISIONS
 
What questions should
administration be asking IT?
 
What questions should
IT be asking administration?
 
16
 
KEY BENEFITS OF GOVERNANCE
Ensure Value is
brought to the
District
 
Ensure Risks are
identified and
Addressed
 
Ensure Systems and
Policies are in
Compliance
 
17
 
WITHOUT EXECUTIVE GOVERNANCE & IT
 
Difficulty aligning District and IT strategies
Difficulty achieving intended goals
Less likely to realize value
Higher IT‐related costs for continuity
Less innovation
Less trust between IT and administration
 
18
 
HOW DO YOU MEASURE THE VALUE OF INFORMATION
AND TECHNOLOGY?
 
Value as:
Benefits Realization &
Resource Optimization
 
Ensure Value is
Brought to the
District
 
19
 
RISK MITIGATION
 
How do you measure the
mitigation of risk related to
information and technology?
 
Ensure Risks are
Identified and
addressed
 
20
 
RISK OPTIMIZATION
 
Address risks associated with Information & Technology
Focus on the preservation of value
Integrated within risk management
Ensure an IT security focus for the District
Measured showing impact and contributions of optimizing  Information and Technology related risk
 
TODAY’S TECHNOLOGY
DIRECTOR
21
 
22
 
TODAY’S TECHNOLOGY DIRECTOR
 
 
 
 No Time
 
            
 Lack of Advanced Capability               
 Lack of Funds
 Too Many Daily Operational Needs
 Lack of Shared Plan
 
23
 
THE ROLE OF THE CISO
 
Governance of I & T
Cyber Risk
IT Compliance
IT Assessment / Audit
Cybersecurity Awareness
Related Policies/Guidelines
A CISO is the
executive‐level
manager who
directs strategy,
operations and the
budget for the
protection of the
enterprise
information assets
and manages that
program.
 
CYBER ACTION PLAN & STRATEGY
24
 
25
 
CYBER ACTION PLAN & STRATEGY
 
You must have a plan with a strategy of
 continuously improving your cyber-security profile
to meet todays ever-evolving cyber security challenges
 
26
 
CYBER ACTION PLAN & STRATEGY
 
Leverages your Cyber Plan & Strategy to Align
 
Your Executive Governance, Administrative and Technical Activities
 
 with Regulatory and Insurance Requirements and/or Considerations,
 
 To Guard Against A Cyber Disruption Of Service
 
 
Support Continuously Improving Your Cyber-Security Profile
 
27
 
CYBER PLAN SAMPLE
 
28
 
BENEFITS
 
Increased alignment between Cybersecurity and District Objectives
Development of Information Security that is nimble and flexible
Reduction in wasted efforts and resources, and improvement in efficiency of security and the district as a whole
Opportunity to identify new, secure innovations and technology
True synergy between security and district leadership, where the goals of both groups are being met
 
POLICIES AND GUIDELINES
29
 
30
 
“IT IS NOT IF, BUT WHEN” – PRIORITIZE INCIDENT RESPONSE READINESS
 
Build a Comprehensive Incident Response Plan
Implement Solutions to Build “WHEN Attacked Resilience”
Manage the Activities That Fortify Your Readiness
Support Maintenance Listed in IRP Guideline
Schedule Incident Response Tabletop Exercise
 
Protect Incidents From Becoming Disasters to Manage Potential
Loss And Avoid a Disruption of Critical Community Services
 
31
 
“IT IS NOT IF, BUT WHEN” 
BUILD YOUR RESPONSE READINESS TO PREVENT AN
INCIDENT FROM BECOMING A DISASTER
 
32
 
 IMPORTANCE OF DOCUMENTING GUIDELINES TO MANAGE MAINTENANCE
ACTIVITIES AND CONTINUOUS IMPROVEMENT
 
Documented Guidelines and Procedures
Incident Response Plan
Business Continuity & Disaster Recovery
Plan
Information Security Policy
Data Backup Guideline
Multi-Factor Authentication
Security Awareness & Training
End-Point Detection & Response
Firewalls and Anti-Virus
Vulnerability Assessment
Data Backup 
Guideline
 
33
 
TRACK REQUIRED GUIDELINE MAINTENANCE ACTIVITIES
 
34
 
IDENTIFY STRENGTHS & WEAKNESSES IN ALIGNMENT WITH REGULATORY
OBJECTIVES
 
in Accordance with the United States
National Institute of Standards & Technology
Cyber Security Framework (NIST-CSF)
Universal “Gold Standard” Framework
Mandated / Recommended as a Basis For All Government Programs
 
Continuously Updated With Newly Identified Cyber Risk
 
Vulnerability Assessments
35
 
36
 
IMMEDIATE ACTION LIST
 
Asset Documentation- Hardware and Software
External Vulnerability Assessments
Internal Vulnerability Assessments
Risk Prioritization and Mitigation
Penetration Testing (Pen Testing)
 
 
 
37
 
IMMEDIATE ACTION LIST
 
38
 
NETWORK SCANS ARE CONDUCTED TO DOCUMENT
YOUR CURRENT INTERNAL AND EXTERNAL SOFTWARE
AND HARDWARE STRENGTHS AND WEAKNESSES
 
Anti-Virus, Anti-Spyware, Patching, Firewalls, Data Backup, MFA, Password and Access Management, Email filtering,
Employee Training, Inactive Computers and Users, External Listening Port Vulnerabilities,
Operating Systems and Software No Longer Supported, etc.
 
39
 
HIGH SEVERITY ISSUES
 
40
 
MEDIUM SEVERITY ISSUES
 
41
 
LOW SEVERITY ISSUES
 
42
 
PERCENTAGE OF K-12 WITH ISSUES
 
43
 
AVERAGE OCCURRENCE OF ISSUES PER K-12
 
44
 
PROGRESS & CHANGE
 
 
Internal / External Scan Updates Your “
Strengths and Weaknesses
 
Incorporates Progress Made and Any Newly Identified Risks
 
Update & Re-Prioritize Cyber Action Plan Activities by Risk of Loss
 
Plan & Strategy Supports Continuous Improvement
 
45
 
IN SUMMARY
 
Executive Governance- Collaborative Relationship
Translate Technical Language into Easy-to-Understand Reports and Guidelines
Customized to Validate Compliance with Specific 2023-2024 Insurance Company Requirements
Prevent a Cyber-Incident from Becoming a “Disruption of Critical Community Services Disaster”
Identify and Document Internal and External “Strengths and Weaknesses”
    Align Continuous Improvement Objectives with Evolving NIST-CSF Based Control Requirements
 
QUESTIONS?
46
 
PRIVATE AND CONFIDENTIAL – NOT FOR DISTRIBUTION
 
tel 201-563-9899      
jschobel@resoluteguard.com
 
resoluteguard.com
Slide Note
Embed
Share

Facing a surge in cyberattacks, K-12 schools struggle with limited funds, expertise, and staff for cybersecurity. This leads to vulnerabilities that make them prime targets for hackers. Lack of dedicated cybersecurity resources and training exacerbates the risks, highlighting the urgent need for comprehensive security measures and governance in educational institutions.


Uploaded on Apr 02, 2024 | 1 Views


Download Presentation

Please find below an Image/Link to download the presentation.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. Download presentation by click this link. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.

E N D

Presentation Transcript


  1. Building a Resilient Shield: Cybersecurity Risk Management Strategies for Public School Districts-MSPLIP Jeff Schobel CEO, ResoluteGuard Room 103 3-4pm 6/15/2023

  2. TODAYS SESSION Agenda K-12 Cybersecurity Challenges Cyber Attacks Cyber Insurance Importance of Executive Governance Today s Technology Director Cyber Action Plan & Strategy Policies and Guidelines Vulnerability Assessments Questions 2

  3. K-12 CYBERSECURITY CHALLENGES 3

  4. CYBERSECURITY CHALLENGES IN EDUCATION Cyberattacks are on the rise and outpacing even the most skilled IT professionals. Lack of Funds for Cybersecurity Tools Implementation of Basic Cybersecurity Tools Lack of Expertise and/or Dedicated Cybersecurity Professional Staffing Challenges Implementing Managing Monitoring 4

  5. STATE OF OUR SCHOOLS School Districts face ongoing staffing challenges in implementing, managing, and monitoring the cybersecurity of their networks and systems. Lack of positions allocated to cybersecurity Inability to find and hire staff with cybersecurity skills and training Concentration of cybersecurity responsibilities on a single staff member and is not a dedicated cybersecurity resource Lack of training on resources to respond when a threat is identified At-home learning 1:1 schools-network devices 5

  6. CYBER ATTACKS 6

  7. CYBER ATTACK DATA Microsoft Study: 63% of all malware attacks worldwide happen within K-12 Average of 214 days a Cybercriminal goes undetected within a network Average of 72 days needed for recovery efforts 2021 Report: Over 1,000 K-12 cybersecurity incidents since 2016 K-12 Viewed as Soft Targets and Lucrative: Student and Employee PII with Cyber Criminal Sophistication! 7

  8. HACKERS INFILTRATE SECOND-LARGEST U.S. SCHOOL DISTRICT IN GROWING TREND September 7, 2022 District staff recognized the breach quickly and took fast action that may have averted an operational disaster. When the district acknowledged the attack, officials also announced an array of measures to improve cybersecurity. These measures, the district said, "have been taken, will be taken immediately or will be implemented as soon as feasible. It requires all of us to work together to work to identify these threats and these actors and to take steps to mitigate the damage. District officials said they immediately established a plan of action to provide protection in the future, informed by top public and private sector technology and cyber security professionals. 8

  9. CYBER INSURANCE 9

  10. AS RANSOMWARE AND OTHER CYBER-ATTACKS INCREASE INSURANCE COVERAGE COSTS AND TERMS ARE ALSO INCREASING Lowering of Coverage Limits Increasing Premiums and Deductibles Limited or No Ransomware coverage Required Security Controls in place Insurance Carriers Are Requiring Detailed Questionnaires to Determine Insurance Renewal Costs and Terms 2022-2023: Recommendations or Few Security Controls 2023-2024: New Security Controls? 10

  11. Cyber Insurance Coverage - Public Entity Minimum System Security Standards/Best Practices Patching- Updated within 30 days; 1-7 days for Critical & High Severity patching Guidelines/Policies- Incident Response; Disaster Recovery; Business Continuity Backups- Separate from Primary Network; Regular Backups; Testing; Encryption; Restore within 72 Hours, Anti-Virus Multi-factor Authentication (MFA)- 100% for Remote Access and Privileged User Accounts; Email Access Endpoint Protection, Detection & Response (EDR)- EDR Solution in place across Enterprise Remote Desktop Protocol- MFA Enabled VPN Remote access; Network-level Authentication enabled Employee Training- Simulated Phishing Email Training; Regular Cyber Security Training; Fraudulent Accounting Transactions Regular Vulnerability Scans/Assessments End of Life Software- Plan/Guidelines and Adequate Measures to Protect EOL Software 11

  12. EXECUTIVE GOVERNANCE 12

  13. CYBER RISK MANAGEMENT IS: Reactionary in Nature Focused only on IT Security Nonalignment with District Objectives Check the Box Mentality Senior Executives asking the Wrong Questions Compliance Security $ s Security Extremely Difficult to Quantify 13

  14. BUSINESS DECISIONS K-12 Decision makers may be disconnected from the cyber realities. Decision makers are unaware an incident can lead to serious harm. This should be cause for immediate action. 14

  15. BUSINESS DECISIONS What questions should administration be asking IT? What questions should IT be asking administration? 15

  16. KEY BENEFITS OF GOVERNANCE Ensure Risks are identified and Addressed Ensure Value is brought to the District Ensure Systems and Policies are in Compliance 16

  17. WITHOUT EXECUTIVE GOVERNANCE & IT Difficulty aligning District and IT strategies Difficulty achieving intended goals Less likely to realize value Higher IT related costs for continuity Less innovation Less trust between IT and administration 17

  18. HOW DO YOU MEASURE THE VALUE OF INFORMATION AND TECHNOLOGY? Value as: Ensure Value is Brought to the District Benefits Realization & Resource Optimization 18

  19. RISK MITIGATION How do you measure the mitigation of risk related to information and technology? Ensure Risks are Identified and addressed 19

  20. RISK OPTIMIZATION Address risks associated with Information & Technology Focus on the preservation of value Integrated within risk management Ensure an IT security focus for the District Measured showing impact and contributions of optimizing Information and Technology related risk 20

  21. TODAYS TECHNOLOGY DIRECTOR 21

  22. TODAYS TECHNOLOGY DIRECTOR No Time Lack of Advanced Capability Lack of Funds Too Many Daily Operational Needs Lack of Shared Plan 22

  23. THE ROLE OF THE CISO A CISO is the executive level manager who directs strategy, operations and the budget for the protection of the enterprise information assets and manages that program. Governance of I & T Cyber Risk IT Compliance IT Assessment / Audit Cybersecurity Awareness Related Policies/Guidelines 23

  24. CYBER ACTION PLAN & STRATEGY 24

  25. CYBER ACTION PLAN & STRATEGY You must have a plan with a strategy of continuously improving your cyber-security profile to meet todays ever-evolving cyber security challenges 25

  26. CYBER ACTION PLAN & STRATEGY Leverages your Cyber Plan & Strategy to Align Your Executive Governance, Administrative and Technical Activities with Regulatory and Insurance Requirements and/or Considerations, To Guard Against A Cyber Disruption Of Service Support Continuously Improving Your Cyber-Security Profile 26

  27. CYBER PLAN SAMPLE 27

  28. BENEFITS Increased alignment between Cybersecurity and District Objectives Development of Information Security that is nimble and flexible Reduction in wasted efforts and resources, and improvement in efficiency of security and the district as a whole Opportunity to identify new, secure innovations and technology True synergy between security and district leadership, where the goals of both groups are being met 28

  29. POLICIES AND GUIDELINES 29

  30. IT IS NOT IF, BUT WHEN PRIORITIZE INCIDENT RESPONSE READINESS Build a Comprehensive Incident Response Plan Implement Solutions to Build WHEN Attacked Resilience Manage the Activities That Fortify Your Readiness Support Maintenance Listed in IRP Guideline Schedule Incident Response Tabletop Exercise Protect Incidents From Becoming Disasters to Manage Potential Loss And Avoid a Disruption of Critical Community Services 30

  31. IT IS NOT IF, BUT WHEN BUILD YOUR RESPONSE READINESS TO PREVENT AN INCIDENT FROM BECOMING A DISASTER 31

  32. IMPORTANCE OF DOCUMENTING GUIDELINES TO MANAGE MAINTENANCE ACTIVITIES AND CONTINUOUS IMPROVEMENT Data Backup Guideline Documented Guidelines and Procedures Incident Response Plan Business Continuity & Disaster Recovery Plan Information Security Policy Data Backup Guideline Multi-Factor Authentication Security Awareness & Training End-Point Detection & Response Firewalls and Anti-Virus Vulnerability Assessment 32

  33. TRACK REQUIRED GUIDELINE MAINTENANCE ACTIVITIES 33

  34. IDENTIFY STRENGTHS & WEAKNESSES IN ALIGNMENT WITH REGULATORY OBJECTIVES in Accordance with the United States National Institute of Standards & Technology Cyber Security Framework (NIST-CSF) Universal Gold Standard Framework Mandated / Recommended as a Basis For All Government Programs Continuously Updated With Newly Identified Cyber Risk 34

  35. Vulnerability Assessments 35

  36. IMMEDIATE ACTION LIST Asset Documentation- Hardware and Software External Vulnerability Assessments Internal Vulnerability Assessments Risk Prioritization and Mitigation Penetration Testing (Pen Testing) 36

  37. IMMEDIATE ACTION LIST 37

  38. NETWORK SCANS ARE CONDUCTED TO DOCUMENT YOUR CURRENT INTERNAL AND EXTERNAL SOFTWARE AND HARDWARE STRENGTHS AND WEAKNESSES Anti-Virus, Anti-Spyware, Patching, Firewalls, Data Backup, MFA, Password and Access Management, Email filtering, Employee Training, Inactive Computers and Users, External Listening Port Vulnerabilities, Operating Systems and Software No Longer Supported, etc. 38

  39. HIGH SEVERITY ISSUES Points Issue Description of Risk Fix Unsupported Microsoft Office Version Unsupported software no longer receives vital security patches and present an inherent risk Unsupported operating systems no longer receive vital security patches and present an inherent risk 97 Upgrade Office 97 Unsupported Operating System Upgrade OS or Replace Computer 94 Anti-Spyware not installed Potentially exposes computer to malicious software Ensure Anti-Spyware is installed 94 Anti-Virus not Installed Potentially exposes computer to malicious software Ensure Anti-Virus is installed Ensure Anti-Spyware definitions are up to date Ensure Anti-Virus definitions are up to date 90 Anti-Spyware not up to date Potentially exposes computer to malicious software 90 Anti-Virus not up to date Potentially exposes computer to malicious software 4 or more missing security patch levels exposes computer to malicious software and access 90 Excessive Security Patches Missing Implement security patching program 39

  40. MEDIUM SEVERITY ISSUES Points Issue Description of Risk Fix Indication of an error caused by an improperly de-commissioned Domain Controller or a fail-over condition that should be remediated 88 Offline Domain Controller Investigate/remove offline controllers 77 Account lockout not enabled Password less than 8 characters allowed No account lockout allows brute force password attacks without interrupton. Allowing users to pick extremely short passwords are vulnerable to brute force attacks Enable Account Lockout for all users Enable enforcement of password length rule 75 Enforcing password complexity limits the ability of an attacker to acquire a password through brute force Enable enforcement of password complexity rule 75 Password complexity not enabled Password history not Remembered Automatic screen lock not turned on Short password histories allow users to rotate through a known set of passwords which may have been compromised Set password history remember to at least 6 72 72 Having no screen lock enabled allows unauthorized access to network resources Enable automatic screen lock 68 Disk Space Issues Low disk space makes computers unstable and succeptible to malicious software Free or add disk space Open or insecure WiFi protocols by SSID Open or insecure WiFi protocols may allow an attacker access to the company's network and resources 50 Ensure WiFi is secure 40

  41. LOW SEVERITY ISSUES Points Issue Description of Risk Fix Persistent passwords are more easily compromised than passwords that are routinely changed. Set all passwords to expire. Schedule service account changes 30 User Password Set to Never Expire Operating System in Extended Support Extended Support is a warning period before an operating system is no longer supported by the manufacturer Computers not actively connected to the Domain are at risk of missing security updates. A user that has not logged in for an extended period of time could be a former employee or vendor Open port use should be minimized as much as possible to prevent the spread of malicious software Unpopulated Organizational units may indicate a miscunfiguration of Active Directory 20 Upgrade Operating Systems 15 Inactive Computers Investigate/remove inactive computers 13 User has not logged in 30 Days Computer with Insecure Listening Ports Disable or remove inactive users 10 Investigate/close open ports. Remove or populate empty organizational units. 10 Unpopulated Organizatonal Units 41

  42. PERCENTAGE OF K-12 WITH ISSUES Percentage of K-12 with this issue 71.4 85.7 71.4 71.4 85.7 57.1 71.4 0.0 71.4 42.9 28.6 71.4 57.1 57.1 85.7 100.0 71.4 100.0 100.0 100.0 85.7 Points 97 97 94 94 90 90 90 88 77 75 75 72 72 68 50 30 20 15 13 10 10 Issue Unsupported Microsoft Office Version Unsupported Operating System Anti-Spyware not installed Anti-Virus not Installed Anti-Spyware not up to date Anti-Virus not up to date Excessive Security Patches Missing Offline Domain Controller Account lockout not enabled Password less than 8 characters allowed Password complexity not enabled Password history not Remembered Automatic screen lock not turned on Disk Space Issues Open or insecure WiFi protocols by SSID User Password Set to Never Expire Operating System in Extended Support Inactive Computers User has not logged in 30 Days Computer with Insecure Listening Ports Unpopulated Organizatonal Units 42

  43. AVERAGE OCCURRENCE OF ISSUES PER K-12 Average Occurrence of Instance Type 4.0 18.1 9.4 8.7 56.7 6.3 15.6 0.0 57.1 12.4 4.7 62.9 53.3 1.3 6.3 147.1 19.9 117.0 166.0 62.4 21.0 Points 97 97 94 94 90 90 90 88 77 75 75 72 72 68 50 30 20 15 13 10 10 Issue Unsupported Microsoft Office Version Unsupported Operating System Anti-Spyware not installed Anti-Virus not Installed Anti-Spyware not up to date Anti-Virus not up to date Excessive Security Patches Missing Offline Domain Controller Account lockout not enabled Password less than 8 characters allowed Password complexity not enabled Password history not Remembered Automatic screen lock not turned on Disk Space Issues Open or insecure WiFi protocols by SSID User Password Set to Never Expire Operating System in Extended Support Inactive Computers User has not logged in 30 Days Computer with Insecure Listening Ports Unpopulated Organizational Units 43

  44. PROGRESS & CHANGE Internal / External Scan Updates Your Strengths and Weaknesses Incorporates Progress Made and Any Newly Identified Risks Update & Re-Prioritize Cyber Action Plan Activities by Risk of Loss Plan & Strategy Supports Continuous Improvement 44

  45. IN SUMMARY Executive Governance- Collaborative Relationship Translate Technical Language into Easy-to-Understand Reports and Guidelines Customized to Validate Compliance with Specific 2023-2024 Insurance Company Requirements Prevent a Cyber-Incident from Becoming a Disruption of Critical Community Services Disaster Identify and Document Internal and External Strengths and Weaknesses Align Continuous Improvement Objectives with Evolving NIST-CSF Based Control Requirements 45

  46. QUESTIONS? PRIVATE AND CONFIDENTIAL NOT FOR DISTRIBUTION 46

  47. tel 201-563-9899 jschobel@resoluteguard.com resoluteguard.com

Related


More Related Content

giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#