This document discusses cyber defense in depth which covers five key elements: detection, protection, management, response, and recovery. It provides details on each element such as understanding threats through vulnerability scanning, implementing security controls and training, managing cybersecurity risks through frameworks like ISO 27001, preparing response plans for when attacks succeed, and using services that provide insurance and support for cyber incidents and breaches.
This document discusses cyber defense in depth which covers five key elements: detection, protection, management, response, and recovery. It provides details on each element such as understanding threats through vulnerability scanning, implementing security controls and training, managing cybersecurity risks through frameworks like ISO 27001, preparing response plans for when attacks succeed, and using services that provide insurance and support for cyber incidents and breaches.
This document discusses cyber defense in depth which covers five key elements: detection, protection, management, response, and recovery. It provides details on each element such as understanding threats through vulnerability scanning, implementing security controls and training, managing cybersecurity risks through frameworks like ISO 27001, preparing response plans for when attacks succeed, and using services that provide insurance and support for cyber incidents and breaches.
• Cyber defence in depth covers five important elements: detection, protection, management, response and recovery. Detection
• Understanding your threats
• Understanding the threats you face and where your cyber defences are most at risk of being breached is critical to securing your organisation against cyber attacks. • Most attacks exploit two types of vulnerability: technical and human. • New technical vulnerabilities are discovered and exploited by criminals every day. Previously patched vulnerabilities can also be reintroduced into systems by updates and reconfigurations. • A programme of regular vulnerability scanning is a critical component of a risk- based approach to security: it identifies security vulnerabilities in workstations, internal and external networks, and communications equipment. • It is an automated activity that scans infrastructure targets for known vulnerabilities and misconfigurations, enabling you to bolster your defences where you most need to. Protection • Protect your organisation • Protecting your organisation against cyber attacks and data breaches is a complex undertaking. It is inevitable that some attacks will get past your defences, through threats such as zero-day attacks and well-designed phishing emails. • It is therefore essential to implement more robust cyber security controls and ensure you have appropriately trained staff to manage cyber security defences and breaches. • Not all organisations need to implement extensive security measures, but a base level of cyber security is essential to protect against automated attacks that seek to exploit common vulnerabilities. • Certification to basic security schemes such as Cyber Essentials helps protect organisations from the most common cyber threats and demonstrate their commitment to cyber security. Management
• Manage your cyber security risks
• or many organisations, managing cyber security risks requires a more intensive approach than simply implementing basic protections. Cyber security isn’t a destination – it is an ongoing process, requiring continual evaluation, maintenance and revision. • This should include such measures as embedding risk-based security controls in corporate processes, managing the security of supply chains and carrying out regular audits to ensure security controls remain up to date. • ISO 27001 is the international standard for an ISMS (information security management system), a risk-based approach to information security that encompasses people, processes and technology. Independently audited certification to the Standard demonstrates to customers, stakeholders and staff that the organisation has implemented and maintains information security best practice. Response
• Prepare your response
• Cyber criminals need to find only one weakness to infiltrate your systems, so it is essential to be prepared. The security measures you have implemented should minimize the impact of a successful attack, but how you respond is critical to limiting disruption and costs. • This is especially important when it comes to breaches of personal data, which must be reported to the data protection authorities within 72 hours of being aware of the breach under the GDPR and DPA 2018. • Organizations need a robust business continuity management system, combined with cyber security and data protection audits, and supply chain security to minimise the attack’s likelihood and impact. • Implementing cyber incident response management plans means you won’t waste valuable time when the worst happens Recovery
• Safeguard your organization from cyber threats and gain peace
• Cyber Safeguard provides all the essential support, training, testing and insurance cover you need for a cyber secure business. Our easy-to-manage service enables you to: • Access cyber insurance cover from day one; • Quickly roll out staff awareness training and track staff participation, both in the office and remotely; • Ensure staff are appropriately trained to spot phishing emails, avoid email misuse and adhere to data privacy and information security best practices; • Perform unlimited scans to check for vulnerabilities and use your ‘Scanned by IT Governance’ badge to demonstrate to clients that you take security seriously; • Access emergency cyber incident and breach support whenever and however you need it; and • Gain peace of mind with advice from legal and cyber security experts.