#44 – How to Make a Cybersecurity Game Plan in 15 Minutes


img_4479

EFFECTED USERS: Every Listener with Personal Data and no plan

Hair of fire 3 of 5

SUMMARY: Being prepared will save you valuable time after a breach is discovered.

  • The Internet Crime Complaint Center (IC3) reported that cybercrimes roughly quadrupled between January and April 2020, and the average cost of a business data breach was $3.86 million last year.
  • The U.S. recorded 145.2 million ransomware attacks Q3 2020 alone. In certain contexts, paying ransomware hackers could put the victim at risk of Office of Foreign Assets Control (OFAC) actions.

So, how can you be sure that you are ready for a breach?

Here with me to talk about this today is Liam Downward.

Liam has been working as a cybersecurity professional for 20 years, and has been running Cyrisma [Sy’-risma] (a cybersecurity company that he founded) for almost 3 years.

He is an expert at multiple cybersecurity programs, including: healthcare, financial services, retail, and manufacturing.  Also, he is a ECouncil Certified Ethical Hacker, and he was awarded one of the top 100 high-tech leaders in the state of Hawaii. He now lives in New York and we are happy to have him on our show today.

Welcome Liam!

So, what are the basic steps to creating a cybersecurity game plan in 15 minutes.

  1. Tabletop session
    1. Who should be there: Biz owner, Tech owner, key users.
    2. What industry are you in?  Are you regulated?  Do have regulations in your state/county?
    3. Do you have Consumer PII?
  2. Pick a threat scenario (ransomware, bitcoin miners, malicious software.)
    1. Who is our first call?What steps do we take?
    2. How long can we be offline?

How to find an Manged Service Provider (MSP)

  1. Talk to your colleagues – who do you use?
  2. Search Keywords: MSP, cybersecurity, web app pen(etration) testing, pen test, regulatory compliance.
  3. Assign a simple task:
    1. Do we have current vulnerabilities?
    2. Do we have a backup? Offsite?
    3. Do we store data?
    4. Are our systems securely configured?

Cyrisma’s linkedin Page: https://www.linkedin.com/company/cyrisma

Liam’s Personal Linkedin Page: linkedin.com/in/liamdownward

Cyrisma’s Home page: https://www.cyrisma.com/

Published by

Unknown's avatar

David W. Schropfer

David W. Schropfer is a technology executive, author, and speaker with deep expertise in cybersecurity, artificial intelligence, and quantum computing. He currently serves as Executive Vice President of Operations at DomainSkate, where he leads growth for an AI-driven cybersecurity threat intelligence platform. As host of the DIY Cyber Guy podcast, David has conducted hundreds of interviews with global experts, making complex topics like ransomware, AI, and quantum risk accessible to business leaders and consumers. He has also moderated panels and delivered keynotes at major industry events, known for translating emerging technologies into actionable insights. David’s entrepreneurial track record includes founding AnchorID (SAFE), a patented zero-trust mobile security platform. He previously launched one of the first SaaS cloud products at SoftZoo.com, grew global telecom revenue at IDT, and advised Fortune 500 companies on mobile commerce and payments with The Luciano Group. He is the author of several books, including Digital Habits and The SmartPhone Wallet, which became an Amazon #1 bestseller in its category. David holds a Master of Business Administration from the University of Miami and a Bachelor of Arts from Boston College.

One thought on “#44 – How to Make a Cybersecurity Game Plan in 15 Minutes

Comments are closed.