#44 – How to Make a Cybersecurity Game Plan in 15 Minutes


img_4479

EFFECTED USERS: Every Listener with Personal Data and no plan

Hair of fire 3 of 5

SUMMARY: Being prepared will save you valuable time after a breach is discovered.

  • The Internet Crime Complaint Center (IC3) reported that cybercrimes roughly quadrupled between January and April 2020, and the average cost of a business data breach was $3.86 million last year.
  • The U.S. recorded 145.2 million ransomware attacks Q3 2020 alone. In certain contexts, paying ransomware hackers could put the victim at risk of Office of Foreign Assets Control (OFAC) actions.

So, how can you be sure that you are ready for a breach?

Here with me to talk about this today is Liam Downward.

Liam has been working as a cybersecurity professional for 20 years, and has been running Cyrisma [Sy’-risma] (a cybersecurity company that he founded) for almost 3 years.

He is an expert at multiple cybersecurity programs, including: healthcare, financial services, retail, and manufacturing.  Also, he is a ECouncil Certified Ethical Hacker, and he was awarded one of the top 100 high-tech leaders in the state of Hawaii. He now lives in New York and we are happy to have him on our show today.

Welcome Liam!

So, what are the basic steps to creating a cybersecurity game plan in 15 minutes.

  1. Tabletop session
    1. Who should be there: Biz owner, Tech owner, key users.
    2. What industry are you in?  Are you regulated?  Do have regulations in your state/county?
    3. Do you have Consumer PII?
  2. Pick a threat scenario (ransomware, bitcoin miners, malicious software.)
    1. Who is our first call?What steps do we take?
    2. How long can we be offline?

How to find an Manged Service Provider (MSP)

  1. Talk to your colleagues – who do you use?
  2. Search Keywords: MSP, cybersecurity, web app pen(etration) testing, pen test, regulatory compliance.
  3. Assign a simple task:
    1. Do we have current vulnerabilities?
    2. Do we have a backup? Offsite?
    3. Do we store data?
    4. Are our systems securely configured?

Cyrisma’s linkedin Page: https://www.linkedin.com/company/cyrisma

Liam’s Personal Linkedin Page: linkedin.com/in/liamdownward

Cyrisma’s Home page: https://www.cyrisma.com/

Published by

David W. Schropfer

David W. Schropfer is the CEO of SAFE (Smartphone Authentication For Everyone), a cybersecurity company in New York (www.theSafe.io).  Every day, he and his team of professionals keep the people who use The SAFE Button protected from some of the most common traps, hacks and attacks that target computer systems of all sizes. David is the author of the bestselling cybersecurity book, Digital Habits: 5 Simple Tips to Help Keep You and Your Information Safe Online. His previous books, including The Smartphone Wallet and industry whitepapers, predicted some of the biggest trends in the payments, mobile, and security industries.  Since graduating Boston College, David earned an Executive MBA from the University of Miami.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.