Why are Systems Vulnerable?
Why has IT spend on security grown?
Some of this was driven by more extensive use of IT in the pandemic
- Electronic rather than physical interactions with customers
- Remote working by employees
What is Cyber Risk?
What does Cyber Insurance Cover?
Examples of Cyber Risks
Your cyber insurance cover includes:
Cyber First Aid
Belt and Braces Control of Security Planning Principles
Management Control
Each department manage their own controls affecting people, processes and
technology.
Risk Management
Centralised control of the enterprise, including compliance, legal, quality control
and financial control.
Internal Audit
Third force that checks the adequacy of the controls in place. This might include
some external assistance from experts.
Minimum Permissions
Types of Controls
Reusable Passwords
– Strings of characters typed to authenticate the use
of a username (account) on a computer.
– They are used repeatedly and so are called
reusable passwords.
Major Incident Response
Managing Internet Threats