<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Addressing cybersecurity to an unaccustomed industry in Governance, Risk, Compliance</title>
    <link>https://community.isc2.org/t5/Governance-Risk-Compliance/Addressing-cybersecurity-to-an-unaccustomed-industry/m-p/39607#M147</link>
    <description>&lt;P&gt;Thanks to everyone for your suggestions!&amp;nbsp; I've been working on a presentation that included many of them, and hopefully I'll have a chance offer it to the trade group.&lt;/P&gt;</description>
    <pubDate>Tue, 29 Sep 2020 21:04:25 GMT</pubDate>
    <dc:creator>ericgeater</dc:creator>
    <dc:date>2020-09-29T21:04:25Z</dc:date>
    <item>
      <title>Addressing cybersecurity to an unaccustomed industry</title>
      <link>https://community.isc2.org/t5/Governance-Risk-Compliance/Addressing-cybersecurity-to-an-unaccustomed-industry/m-p/38518#M109</link>
      <description>&lt;P&gt;I recently sat in a cybersecurity webinar hosted by our org's trade group.&amp;nbsp; It was billed as "recent trends related to&amp;nbsp;cyber-attacks and&amp;nbsp;how you can best prepare your business&amp;nbsp;through education and protection," but the technical components were a virtual presentation on ransomware, and a glossing over business email compromise and security awareness training, ending with a pitch for cybersecurity insurance.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The focus seemed to be on scare tactics&amp;nbsp;instead of&amp;nbsp;&lt;EM&gt;designing a strategy&lt;/EM&gt;.&amp;nbsp; Creating a security posture, vulnerability assessments, and backup policy were only mentioned at the end because I asked the panelists for suggested strategies during the Q&amp;amp;A!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;With cybersecurity month coming up, I'm thinking about building a presentation for the trade group.&amp;nbsp; The focus and emphasis would be on items such as governance and policy (or informed decision-making), accountability, asset protection and resilience, and maybe do a shallow dive into risk management and BCP/DRP.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you were going to address a business group which only dealt with cybersecurity on an ad hoc basis, what would you focus on?&amp;nbsp; What would you emphasize?&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 27 Aug 2020 17:35:25 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Governance-Risk-Compliance/Addressing-cybersecurity-to-an-unaccustomed-industry/m-p/38518#M109</guid>
      <dc:creator>ericgeater</dc:creator>
      <dc:date>2020-08-27T17:35:25Z</dc:date>
    </item>
    <item>
      <title>Re: Addressing cybersecurity to an unaccustomed industry</title>
      <link>https://community.isc2.org/t5/Governance-Risk-Compliance/Addressing-cybersecurity-to-an-unaccustomed-industry/m-p/38519#M110</link>
      <description>&lt;P&gt;Oh, and one of the panelists works for a cybersecurity underwriter.&lt;/P&gt;</description>
      <pubDate>Thu, 27 Aug 2020 17:36:50 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Governance-Risk-Compliance/Addressing-cybersecurity-to-an-unaccustomed-industry/m-p/38519#M110</guid>
      <dc:creator>ericgeater</dc:creator>
      <dc:date>2020-08-27T17:36:50Z</dc:date>
    </item>
    <item>
      <title>Re: Addressing cybersecurity to an unaccustomed industry</title>
      <link>https://community.isc2.org/t5/Governance-Risk-Compliance/Addressing-cybersecurity-to-an-unaccustomed-industry/m-p/38520#M111</link>
      <description>&amp;gt; ericgeater (Contributor II) posted a new topic in Governance, Risk, Compliance&lt;BR /&gt;&lt;BR /&gt;&amp;gt; &amp;nbsp; The focus seemed to be on scare tactics&amp;nbsp;instead&lt;BR /&gt;&amp;gt; of&amp;nbsp;designing a strategy.&lt;BR /&gt;&lt;BR /&gt;There's a lot of that going around, these days.&lt;BR /&gt;&lt;BR /&gt;&amp;gt; &amp;nbsp; If you were&lt;BR /&gt;&amp;gt; going to address a business group which only dealt with cybersecurity on an ad&lt;BR /&gt;&amp;gt; hoc basis, what would you focus on?&amp;nbsp; What would you emphasize?&amp;nbsp;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Backups.&lt;BR /&gt;&lt;BR /&gt;====================== (quote inserted randomly by Pegasus Mailer)&lt;BR /&gt;rslade@gmail.com rmslade@outlook.com rslade@computercrime.org&lt;BR /&gt;'Tory' is the anglicized spelling of Irish 'tóraidhe', which used&lt;BR /&gt;to refer to an Irish bandit or rapparee&lt;BR /&gt;victoria.tc.ca/techrev/rms.htm &lt;A href="http://twitter.com/rslade" target="_blank"&gt;http://twitter.com/rslade&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://blogs.securiteam.com/index.php/archives/author/p1/" target="_blank"&gt;http://blogs.securiteam.com/index.php/archives/author/p1/&lt;/A&gt;&lt;BR /&gt;&lt;A href="https://community.isc2.org/t5/forums/recentpostspage/user-id/1324864413" target="_blank"&gt;https://community.isc2.org/t5/forums/recentpostspage/user-id/1324864413&lt;/A&gt;</description>
      <pubDate>Thu, 27 Aug 2020 18:11:12 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Governance-Risk-Compliance/Addressing-cybersecurity-to-an-unaccustomed-industry/m-p/38520#M111</guid>
      <dc:creator>rslade</dc:creator>
      <dc:date>2020-08-27T18:11:12Z</dc:date>
    </item>
    <item>
      <title>Re: Addressing cybersecurity to an unaccustomed industry</title>
      <link>https://community.isc2.org/t5/Governance-Risk-Compliance/Addressing-cybersecurity-to-an-unaccustomed-industry/m-p/38521#M112</link>
      <description>&lt;P&gt;First off, you can't go wrong talking about any of that you listed. You could easily make an hour long presentation on any of those topics.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If I had to group them together for compression I'd start with Risk because all of those listed are strategies to reduce risk to the organization. So essential you're starting with the scare tactic of Risk but follow up with strategies of prevention with governance/policy creation and accountability for management, BCP/DR plans and asset protection that IT can get involved with. Then you can talk about getting everyone involved with a solid security awareness training plan.&amp;nbsp; &amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 27 Aug 2020 18:25:16 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Governance-Risk-Compliance/Addressing-cybersecurity-to-an-unaccustomed-industry/m-p/38521#M112</guid>
      <dc:creator>tmekelburg1</dc:creator>
      <dc:date>2020-08-27T18:25:16Z</dc:date>
    </item>
    <item>
      <title>Re: Addressing cybersecurity to an unaccustomed  industry</title>
      <link>https://community.isc2.org/t5/Governance-Risk-Compliance/Addressing-cybersecurity-to-an-unaccustomed-industry/m-p/38522#M113</link>
      <description>&amp;gt; ericgeater (Contributor II) posted a new reply in Governance, Risk, Compliance&lt;BR /&gt;&lt;BR /&gt;&amp;gt; Oh, and one of the panelists works for a cybersecurity underwriter.&lt;BR /&gt;&lt;BR /&gt;I think I'll have a heart attack and die from *NOT* being surprised.&lt;BR /&gt;&lt;BR /&gt;====================== (quote inserted randomly by Pegasus Mailer)&lt;BR /&gt;rslade@gmail.com rmslade@outlook.com rslade@computercrime.org&lt;BR /&gt;If you have time to whine and complain about something then you&lt;BR /&gt;have the time to do something about it. - Anthony J. D'Angelo&lt;BR /&gt;victoria.tc.ca/techrev/rms.htm &lt;A href="http://twitter.com/rslade" target="_blank"&gt;http://twitter.com/rslade&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://blogs.securiteam.com/index.php/archives/author/p1/" target="_blank"&gt;http://blogs.securiteam.com/index.php/archives/author/p1/&lt;/A&gt;&lt;BR /&gt;&lt;A href="https://community.isc2.org/t5/forums/recentpostspage/user-id/1324864413" target="_blank"&gt;https://community.isc2.org/t5/forums/recentpostspage/user-id/1324864413&lt;/A&gt;</description>
      <pubDate>Thu, 27 Aug 2020 18:26:12 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Governance-Risk-Compliance/Addressing-cybersecurity-to-an-unaccustomed-industry/m-p/38522#M113</guid>
      <dc:creator>rslade</dc:creator>
      <dc:date>2020-08-27T18:26:12Z</dc:date>
    </item>
    <item>
      <title>Re: Addressing cybersecurity to an unaccustomed industry</title>
      <link>https://community.isc2.org/t5/Governance-Risk-Compliance/Addressing-cybersecurity-to-an-unaccustomed-industry/m-p/38527#M114</link>
      <description>&lt;P&gt;&lt;SPAN&gt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;If you were going to address a business group which only dealt with cybersecurity on an ad hoc basis, what would you focus on?&amp;nbsp; What would you emphasize?&amp;gt;&amp;gt;&amp;gt;&amp;gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;When preparing to address a group I would start with some questions to frame the conversation.&amp;nbsp; Most important 1).&amp;nbsp; Who is the audience?&amp;nbsp; Sounds like you know that so what are they going to walk away from this meeting with?&amp;nbsp; 2).&amp;nbsp; What is the outcome you want to achieve from this group?&amp;nbsp; Do you wish to inform?&amp;nbsp; Are you trying to sell products or services?&amp;nbsp; Do you want to give some news you can use?&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;3).&amp;nbsp; Localize it.&amp;nbsp; Answer the question So what?&amp;nbsp; Why should I care?&amp;nbsp; If the answer to why should I care is because security is everyone's responsibility then you already lost them, it's just another mandatory training to check a box.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;About the fear and scare tactics.&amp;nbsp; It's so common to pull the old scare them into pulling out their wallets.&amp;nbsp; The term FUD Fear Uncertainty and Doubt.&amp;nbsp; It's still a thing.&amp;nbsp; It's not productive but it sensationalizes otherwise pretty mundane topics.&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;You have great ideas that anyone could benefit from so I say go for it.&amp;nbsp; It's not a bad idea to use a ripped from the days headline story to demonstrate high impact from Cyber to Kinetic like Stuxnet or whatever government is being held hostage because ransomware with no restorable backups.&amp;nbsp; Great saying " No Backup, No Restore " .&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 27 Aug 2020 20:24:43 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Governance-Risk-Compliance/Addressing-cybersecurity-to-an-unaccustomed-industry/m-p/38527#M114</guid>
      <dc:creator>MikeinGlennDale</dc:creator>
      <dc:date>2020-08-27T20:24:43Z</dc:date>
    </item>
    <item>
      <title>Re: Addressing cybersecurity to an unaccustomed industry</title>
      <link>https://community.isc2.org/t5/Governance-Risk-Compliance/Addressing-cybersecurity-to-an-unaccustomed-industry/m-p/38529#M115</link>
      <description>&lt;P&gt;1) Security Awareness Training - users need to understand the risk of phishing, malware, ransomware etc. 2)&amp;nbsp; Asset management for both hardware and software...&amp;nbsp; If you don't know what you have, how are you going to protect it? 3)Vulnerability assessments both internal and external.&amp;nbsp; Frankly, this is a no brainer.&amp;nbsp; I see way to many clients thinking patching solves all the problems.&amp;nbsp; Try removing software that is end-of-life, no longer used.&amp;nbsp; See #2&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 27 Aug 2020 21:51:13 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Governance-Risk-Compliance/Addressing-cybersecurity-to-an-unaccustomed-industry/m-p/38529#M115</guid>
      <dc:creator>PuettK</dc:creator>
      <dc:date>2020-08-27T21:51:13Z</dc:date>
    </item>
    <item>
      <title>Re: Addressing cybersecurity to an unaccustomed industry</title>
      <link>https://community.isc2.org/t5/Governance-Risk-Compliance/Addressing-cybersecurity-to-an-unaccustomed-industry/m-p/38545#M117</link>
      <description>&lt;P&gt;I'd start by relating cyber risk to business risk and talk about how to deal with business continuity.&lt;/P&gt;&lt;P&gt;Maybe have them, interactively, translate cyber risks in business risks and ask them how they deal with those kind of risks.&lt;/P&gt;&lt;P&gt;In my view cybersecurity (or if you wish, cyber resilience) has two main topics, Asset management (know what you have and what it's vulnerabilities and hence risks are) and Risk Management.&lt;/P&gt;&lt;P&gt;Talk about risk Appetite, Risk budget, risk management strategies (like acceptance, insurance and mitigation).&lt;/P&gt;&lt;P&gt;Also talk about the level of the organisation at which the responsibility should reside (C-level in my view) and who is authorized to accept risks.&lt;/P&gt;</description>
      <pubDate>Fri, 28 Aug 2020 11:46:19 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Governance-Risk-Compliance/Addressing-cybersecurity-to-an-unaccustomed-industry/m-p/38545#M117</guid>
      <dc:creator>Johannes</dc:creator>
      <dc:date>2020-08-28T11:46:19Z</dc:date>
    </item>
    <item>
      <title>Re: Addressing cybersecurity to an unaccustomed industry</title>
      <link>https://community.isc2.org/t5/Governance-Risk-Compliance/Addressing-cybersecurity-to-an-unaccustomed-industry/m-p/38546#M118</link>
      <description>Oh, and don't forget about Security by Design and Security in Depth</description>
      <pubDate>Fri, 28 Aug 2020 11:47:56 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Governance-Risk-Compliance/Addressing-cybersecurity-to-an-unaccustomed-industry/m-p/38546#M118</guid>
      <dc:creator>Johannes</dc:creator>
      <dc:date>2020-08-28T11:47:56Z</dc:date>
    </item>
    <item>
      <title>Re: Addressing cybersecurity to an unaccustomed industry</title>
      <link>https://community.isc2.org/t5/Governance-Risk-Compliance/Addressing-cybersecurity-to-an-unaccustomed-industry/m-p/38548#M119</link>
      <description>&lt;P&gt;&lt;EM&gt;What is the outcome you want to achieve from this group?&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Our trade group focuses most of their resources on the business they conduct.&amp;nbsp; The trade group has a VP for IT (who arranged the aforementioned webinar), so the cyber-insurance sales pitch makes it sound like they're either softballing for the underwriters, or they're looking for topics to share with members.&amp;nbsp; If there's an outcome, it's to say things out loud to IT peers within these affiliated companies, and create a security roundtable that focuses on how companies like ours devise security strategies.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 28 Aug 2020 12:22:18 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Governance-Risk-Compliance/Addressing-cybersecurity-to-an-unaccustomed-industry/m-p/38548#M119</guid>
      <dc:creator>ericgeater</dc:creator>
      <dc:date>2020-08-28T12:22:18Z</dc:date>
    </item>
    <item>
      <title>Re: Addressing cybersecurity to an unaccustomed industry</title>
      <link>https://community.isc2.org/t5/Governance-Risk-Compliance/Addressing-cybersecurity-to-an-unaccustomed-industry/m-p/38551#M120</link>
      <description>&lt;P&gt;Is the group only interested in trade or does it also have members from industry?&lt;/P&gt;&lt;P&gt;In the latter case I think it's important that Cybersecurity for IT and Cybersecurity for ICS are tow entirely different things although they look superficially similar. Where in IT we talk about Confidentiality, Integrity and Availability, in ICS we turn that around and talk about Safety, safety, safety, Availability, Integrity and Confidentialy. The risks for both kinds of security are completely different. In the IT world we talk about identity theft, theft of Intellectual Property and the like but in ICS loss of human life or severe injuries are real risks that have to be mitigated.&lt;/P&gt;</description>
      <pubDate>Fri, 28 Aug 2020 12:58:09 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Governance-Risk-Compliance/Addressing-cybersecurity-to-an-unaccustomed-industry/m-p/38551#M120</guid>
      <dc:creator>Johannes</dc:creator>
      <dc:date>2020-08-28T12:58:09Z</dc:date>
    </item>
    <item>
      <title>Re: Addressing cybersecurity to an unaccustomed industry</title>
      <link>https://community.isc2.org/t5/Governance-Risk-Compliance/Addressing-cybersecurity-to-an-unaccustomed-industry/m-p/38677#M122</link>
      <description>&lt;P&gt;To address your question, the trade group mostly focuses on sales and relationship building.&amp;nbsp; Only recently was I made aware that there was a&amp;nbsp;"VP of IT" in the trade group!&amp;nbsp; His background includes PMP and ITIL, and he states an expertise in infrastructure design, business process improvement, and cloud computing.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;And here I am, like the Spider Man meme, thinking "if members need those things, then it's a de facto conclusion they need cybersecurity, too."&lt;/P&gt;</description>
      <pubDate>Sat, 29 Aug 2020 14:59:08 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Governance-Risk-Compliance/Addressing-cybersecurity-to-an-unaccustomed-industry/m-p/38677#M122</guid>
      <dc:creator>ericgeater</dc:creator>
      <dc:date>2020-08-29T14:59:08Z</dc:date>
    </item>
    <item>
      <title>Re: Addressing cybersecurity to an unaccustomed industry</title>
      <link>https://community.isc2.org/t5/Governance-Risk-Compliance/Addressing-cybersecurity-to-an-unaccustomed-industry/m-p/39013#M127</link>
      <description>&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/136236425"&gt;@ericgeater&lt;/a&gt;I guess, that one could do some research around that particular industry, in terms of what is likely to get their attention in terms of the types of risks, threats which would have an impact on them.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Are there any regulations, which apply to that particular group, which they have to adhere too and are there any implications or knock on affects, if they are not prepared.&amp;nbsp; As we all know it is a matter of being prepared rather than "if it happens" these days.&amp;nbsp; Example How would be they deal with a Ransomware extortion?&amp;nbsp; What is their particular policy or would they merely hand it over to the Cyber Security Insurance company to deal with?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I would take useful report such as "&lt;A href="https://www.ibm.com/security/data-breach" target="_blank"&gt;https://www.ibm.com/security/data-breach&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;How do they rate in being prepared?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Or check out the International Telecommunications Union (ITU) Cyber Security Index and do some background research?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Work what is critical to that particular industry and what attack vectors have they encountered in the past?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Have they carried out a recent digital transformation - just ask them where they think their data actually exists and whether they think it has the necessary level of protection and that only authorised users, devices, applications and networks can access it legitimately.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;There are plenty of approaches, but simply raising questions and showing examples, may resonate and get them asking questions rather than taking the FUD approach - which in general never works.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_cautim&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 06 Sep 2020 06:45:07 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Governance-Risk-Compliance/Addressing-cybersecurity-to-an-unaccustomed-industry/m-p/39013#M127</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2020-09-06T06:45:07Z</dc:date>
    </item>
    <item>
      <title>Re: Addressing cybersecurity to an unaccustomed industry</title>
      <link>https://community.isc2.org/t5/Governance-Risk-Compliance/Addressing-cybersecurity-to-an-unaccustomed-industry/m-p/39607#M147</link>
      <description>&lt;P&gt;Thanks to everyone for your suggestions!&amp;nbsp; I've been working on a presentation that included many of them, and hopefully I'll have a chance offer it to the trade group.&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 21:04:25 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Governance-Risk-Compliance/Addressing-cybersecurity-to-an-unaccustomed-industry/m-p/39607#M147</guid>
      <dc:creator>ericgeater</dc:creator>
      <dc:date>2020-09-29T21:04:25Z</dc:date>
    </item>
  </channel>
</rss>

