SlideShare a Scribd company logo
CYBER
SECURITY
PLANNING 101
ANDRE W LOSCHM ANN M A RK G A U DE T RYAN VALLE E
PANELISTS
BRYAN HARALOVICH
Partner,
Welch LLP
President & CTO,
Field Effect Software
Product Line
Manager, CIRA
Senior VP,
Fully Managed
Cyber Security and SMEs
Andrew L os ch ma n n
3 messages for
SMEs in 2019:
You can do something
You are important
You have cyber security
responsibilities
Message #1
You are important.
• Threat actors (“attackers”) are not individuals, they’re organizations.
• The motivation is almost always financially motivated.
• Like most organizations, they adapt. In 2019, this means automation and
scale: Data theft and resale, Credential sales, Ransomware, Financial
Redirection… what’s next?
If you have any assets, or have the potential to have an asset, you are a
target.
Message #2
You have cyber security
responsibilities.
• Customers
• Stakeholders
• Regulatory, Industry and other authorities
Message #3
You can do something.
• It is not an impossible problem.
• Cyber Security threats are well understood at this point, as are
effective defence strategies.
• This technology, knowledge and process needed to make a real
difference is not out of reach.
• Believe it or not, the basics matter, and making a mistake on the
basics are what will get you into trouble.
Measuring
Success
Cyber Security is
measurable and should:
• Be continuous
• Improve your network
• Lower your risk (and
costs)
D-Zone Cybersecurity
MARK GAUDET
Organizations
have
implemented a
multiple security
tools.
Of organizations reported
being compromised last
year. This number
approaches 100% in larger
organizations.
43%
Canadians
understand
the
importance of
layers.
DNS as a Layer of Defense
Use of DNS Firewalls
Could Reduce 33%
of All Cybersecurity
Breaches.
DNS Firewall as layer of defense
Of malicious data
breaches came from a
form of cyber-attack that
leverages emails, texts,
phone calls or even in-
person visits.
93%
Only 54 per cent of small
businesses provide cybersecurity
training for their employees even
though the most common form
of malware seen by our
respondents, phishing attacks (42
per cent), directly exploit
employees as a point of
weakness.
54%
The Human Layer of Defense
Reduction in users clicking
on phishing emails after
implementing D-Zone
Cybersecurity Awareness
Training.
3x
Transform your users into a human firewall
The most integrated training, phishing simulation, gamification and
measurement tool available.
D-Zone Cybersecurity Awareness Training
Score and
measure
Ongoing and
Remedial Training
“Turned cyber risk from
something to lose sleep
about into something we
effectively manage”
C-Therm Technologies
Awareness
Survey
Phishing
simulation
End user
training
modules
and risk
analysis
CIRA delivers a family of cybersecurity
services to Canadian organizations.
D-Zone Anycast DNS
Authoritative DNS for
your domains
 Improve
performance with
a global footprint
 Protect from DNS
DDoS and DNS
hijacking
D-Zone DNS Firewall
Recursive DNS with
threat blocking
 100,000 new
threats blocked
daily
 Stops malware
command-and-
control
D-Zone
Cybersecurity
Awareness Training
Phishing and training
for end-users
 Most integrated
platform
available
 Reduce user
clicks on malware
links by 3X
Summary
• Defense in Depth
• Leverage additional layers
• DNS
• Staff
Fully Managed – Cyber Security
RYAN VAL L EE
Current threats and who they are
targeting
The Continued Increase in Ransomware.
• In 2016, a business fell victim to ransomware every 40 seconds.
• 70% of all malware attacks last year were ransomware.
• 91% of cyberattacks begin with spear phishing email, which are
commonly used to infect organizations with ransomware.
Cybersecurity Ventures predicts cybercrime will cost the world in excess of
$6 trillion annually by 2021, up from $3 trillion in 2015. Ransomware is
expected to worsen and make up a proportionately larger share of total
cybercrime by 2021.
Weaponization of Artificial Intelligence
• Security companies are using AI to protect environments and users,
therefore it is certain that the hackers are following suit in their attack
methodologies.
• Hackers leverage AI in spear phishing exploits to create carefully
targeted messages that trick people into sharing sensitive data and
installing malware.
• AI is used to collect information about a target organization from
across the internet, to instigate detailed and targeted exploits, and
crack passwords.
Who Are They Targeting?
• 71% of ransomware attacks in 2018 targeted small businesses, with an average ransom
demand of $116,000 USD.
• Consumer-targeted ransomware attacks have declined by 33% since the end of 2018.
• Ransomware attacks on business targets have seen a substantial increase in the first
quarter of 2019, up by 195 percent since the fourth quarter of 2018.
• 16% of cyber-attacks target public sector entities, 15% focus on healthcare organizations,
and 10 % of attacks target the financial industry.
•
•
•
•
•
•
•
•
•
Who Are They Targeting? - Continued
• As can be seen from the data, public administrations are a very large target and this has
been seen with the number of public municipalities which have suffered breaches
recently.
• “There's over two thousand municipalities in Canada ... they hold a lot of sensitive
information on individuals ... on properties, on a lot of transactions. They're very
vulnerable.” Dan Mathieson, mayor of Stratford … in a CBC news report after the
municipality was hit with ransomware on 14th April 2019.
Best practices in Risk Mitigation
(Financial, public and brand damage)
HAVE A PLAN CYBERSECURITY INSURANCE CYBERSECURITY PARTNER
Disclosure issues
surrounding the Personal Information Protection and Electronic
Documents Act (PIPEDA)
PIPEDA applies to private-sector organizations across Canada that collect, use or disclose
personal information in the course of a commercial activity. As of 1st November 2018, it is
mandatory to report to the Privacy Commissioner of Canada breaches of security
safeguards involving personal information that pose a real risk of significant harm to
individuals. Failure to report such a breach can lead to fines of up to $100,000. (source:
Government of Canada & Global News)
•
•
•
W R I T T E N
P L A N S
Prevention Policy
Essential steps for preventing attacks
S E C U R I T Y
H Y G I E N E
B E T T E R
A U T H E N T I C A T I O N
2 - F A C T O R
A U T H E N T I C A T I O N
E D U C A T I O N
Call for help!
Business Continuity Plan
Steps to take after a cyber attack
Disconnect the
internet
Isolate the
Servers
Call Insurance
Company
Execute DR
Plan
Find Patient
Zero
Clean the
Environment
Restore Data
and Servers
Report the
Breach
Ongoing impact
ANDRE W LOSCHM ANN M A RK G A U DE T RYAN VALLE E
PANELISTS
BRYAN HARALOVICH
Partner,
Welch LLP
bharalovich@welchllp.com
613.236.9191
President & CTO,
Field Effect Software
aloschmann@fieldeffect.com
613.686.6342
Product Line Manager,
CIRA
mark.gaudet@cira.ca
613.237.5335
Senior VP,
Fully Managed
Ryan.vallee@fullymanaged.com
613.591.9800
THANK YOU

More Related Content

PPTX
Virtual Bridge Sessions: The National Cyber Security Centre at Your Service
PPTX
6 Defence-In-Depth Security Tactics as Recommended by the National Cyber Secu...
DOCX
It risk assessment in uae
PDF
Cyber Security 2017 Challenges
PPTX
Cybersecurity 1. intro to cybersecurity
PPTX
Cyber Security for the Small Business Experience
PPTX
Career in cyber security
PPTX
Cyber-Security in Education
Virtual Bridge Sessions: The National Cyber Security Centre at Your Service
6 Defence-In-Depth Security Tactics as Recommended by the National Cyber Secu...
It risk assessment in uae
Cyber Security 2017 Challenges
Cybersecurity 1. intro to cybersecurity
Cyber Security for the Small Business Experience
Career in cyber security
Cyber-Security in Education

What's hot (19)

PPTX
Intro to cybersecurity concepts 20210813
PPTX
2019 Cyber Security Trends
PPSX
Board and Cyber Security
PDF
Cyber Security: Why your business needs protection & prevention measures
PPTX
Cybersecurity training seminars, courses, cybersecurity laws
PPTX
Bl cybersecurity z_dooly
PPSX
The Ultimate Guide To Cyber Security Certifications
PPT
Introduction to Cyber Security
PPTX
Eliminating the Confusion Surrounding Cyber Insurance
PDF
Toward Continuous Cybersecurity with Network Automation
PPTX
Cybersecurity
PDF
CSE 2016 Future of Cyber Security by Matthew Rosenquist
PDF
Cyber Security - awareness, vulnerabilities and solutions
PDF
Cyber Security vs IT Security in 2 mins
PPTX
Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...
PDF
ICION 2016 - Cyber Security Governance
PPTX
Navigating Cybersecurity
PPTX
What is cyber security
PPT
Breaking down the cyber security framework closing critical it security gaps
Intro to cybersecurity concepts 20210813
2019 Cyber Security Trends
Board and Cyber Security
Cyber Security: Why your business needs protection & prevention measures
Cybersecurity training seminars, courses, cybersecurity laws
Bl cybersecurity z_dooly
The Ultimate Guide To Cyber Security Certifications
Introduction to Cyber Security
Eliminating the Confusion Surrounding Cyber Insurance
Toward Continuous Cybersecurity with Network Automation
Cybersecurity
CSE 2016 Future of Cyber Security by Matthew Rosenquist
Cyber Security - awareness, vulnerabilities and solutions
Cyber Security vs IT Security in 2 mins
Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...
ICION 2016 - Cyber Security Governance
Navigating Cybersecurity
What is cyber security
Breaking down the cyber security framework closing critical it security gaps
Ad

Similar to Cyber Security Planning 101 (20)

PDF
Ransomware attack
PDF
Protecting the brand—cyber-attacks and the reputation of the enterprise
PDF
Before the Breach: Using threat intelligence to stop attackers in their tracks
PPTX
Presentation - Cybersecurity Essentials.pptx
PDF
The Impact of Cyber Threats: Protecting Your Business in the Digital Age
PDF
Intelligence-Driven Fraud Prevention
 
PDF
Security - intelligence - maturity-model-ciso-whitepaper
PDF
Sel03129 usen
PPTX
The State of Endpoint Security Today
PPTX
cyber security awareness------------.pptx
PDF
2017 Scalar Security Study Summary
PDF
Scalar security study2017_slideshare_rev[1]
PPTX
Cyber Liability - Insurance Risk Management and Preparation
PDF
Insiders Guide to Social Engineering - End-Users are the Weakest Link
PPTX
Cyber security
PDF
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
PDF
The new MFA security gap deciphered — Real-world guide on how to fix it For C...
PDF
DATA BREACH & PREVENTION - Hemali Rangoliya
PDF
IBM Security Services
PDF
Strategies to combat new, innovative cyber threats in 2019
Ransomware attack
Protecting the brand—cyber-attacks and the reputation of the enterprise
Before the Breach: Using threat intelligence to stop attackers in their tracks
Presentation - Cybersecurity Essentials.pptx
The Impact of Cyber Threats: Protecting Your Business in the Digital Age
Intelligence-Driven Fraud Prevention
 
Security - intelligence - maturity-model-ciso-whitepaper
Sel03129 usen
The State of Endpoint Security Today
cyber security awareness------------.pptx
2017 Scalar Security Study Summary
Scalar security study2017_slideshare_rev[1]
Cyber Liability - Insurance Risk Management and Preparation
Insiders Guide to Social Engineering - End-Users are the Weakest Link
Cyber security
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
The new MFA security gap deciphered — Real-world guide on how to fix it For C...
DATA BREACH & PREVENTION - Hemali Rangoliya
IBM Security Services
Strategies to combat new, innovative cyber threats in 2019
Ad

More from Welch LLP (20)

PDF
Investment Management for Intergenerational Wealth
PDF
Financial Planning for Intergenerational Wealth
PDF
How to Interview Candidates with Military Precision
PDF
Tax Compliance in an Era of Change
PDF
Hiring Top Global Talent: The Opportunity for Canada's Tech Sector
PDF
Cannabis in the Workplace 101: What you need to know as an employer
PDF
Tax on Split Income: How Do the New Rules Impact You?
PDF
Advanced Negotiating: Finding the Win-Win
PDF
A New Look on Investing
PDF
NPO Governance Bootcamp: Financial Reporting Basics
PDF
3 Essentials for Canadian Companies Doing Business in the U.S.
PDF
Survivor's Guide to Restructuring and the Related Tax Issues
PDF
5 Pillars of Creating Customer Loyalty
PPTX
The Art of Structuring Your Deal
PPTX
The Business Owner's Roadmap to Succession Planning
PPTX
Information Technology in the Cloud
PPTX
Top 10 Tax Issues for Charities
PPTX
Bookkeeping 101: What You Need to Know
PPTX
Fundraising Tips for Techs
PDF
Welch 2016 Private Enterprise Accounting Updates
Investment Management for Intergenerational Wealth
Financial Planning for Intergenerational Wealth
How to Interview Candidates with Military Precision
Tax Compliance in an Era of Change
Hiring Top Global Talent: The Opportunity for Canada's Tech Sector
Cannabis in the Workplace 101: What you need to know as an employer
Tax on Split Income: How Do the New Rules Impact You?
Advanced Negotiating: Finding the Win-Win
A New Look on Investing
NPO Governance Bootcamp: Financial Reporting Basics
3 Essentials for Canadian Companies Doing Business in the U.S.
Survivor's Guide to Restructuring and the Related Tax Issues
5 Pillars of Creating Customer Loyalty
The Art of Structuring Your Deal
The Business Owner's Roadmap to Succession Planning
Information Technology in the Cloud
Top 10 Tax Issues for Charities
Bookkeeping 101: What You Need to Know
Fundraising Tips for Techs
Welch 2016 Private Enterprise Accounting Updates

Recently uploaded (20)

PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Electronic commerce courselecture one. Pdf
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
cuic standard and advanced reporting.pdf
PDF
Encapsulation theory and applications.pdf
PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
KodekX | Application Modernization Development
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Empathic Computing: Creating Shared Understanding
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
“AI and Expert System Decision Support & Business Intelligence Systems”
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Diabetes mellitus diagnosis method based random forest with bat algorithm
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Electronic commerce courselecture one. Pdf
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
cuic standard and advanced reporting.pdf
Encapsulation theory and applications.pdf
Spectral efficient network and resource selection model in 5G networks
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
KodekX | Application Modernization Development
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Understanding_Digital_Forensics_Presentation.pptx
Empathic Computing: Creating Shared Understanding
Dropbox Q2 2025 Financial Results & Investor Presentation
Advanced methodologies resolving dimensionality complications for autism neur...
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...

Cyber Security Planning 101

  • 2. ANDRE W LOSCHM ANN M A RK G A U DE T RYAN VALLE E PANELISTS BRYAN HARALOVICH Partner, Welch LLP President & CTO, Field Effect Software Product Line Manager, CIRA Senior VP, Fully Managed
  • 3. Cyber Security and SMEs Andrew L os ch ma n n
  • 4. 3 messages for SMEs in 2019: You can do something You are important You have cyber security responsibilities
  • 5. Message #1 You are important. • Threat actors (“attackers”) are not individuals, they’re organizations. • The motivation is almost always financially motivated. • Like most organizations, they adapt. In 2019, this means automation and scale: Data theft and resale, Credential sales, Ransomware, Financial Redirection… what’s next? If you have any assets, or have the potential to have an asset, you are a target.
  • 6. Message #2 You have cyber security responsibilities. • Customers • Stakeholders • Regulatory, Industry and other authorities
  • 7. Message #3 You can do something. • It is not an impossible problem. • Cyber Security threats are well understood at this point, as are effective defence strategies. • This technology, knowledge and process needed to make a real difference is not out of reach. • Believe it or not, the basics matter, and making a mistake on the basics are what will get you into trouble.
  • 8. Measuring Success Cyber Security is measurable and should: • Be continuous • Improve your network • Lower your risk (and costs)
  • 11. Of organizations reported being compromised last year. This number approaches 100% in larger organizations. 43%
  • 13. DNS as a Layer of Defense Use of DNS Firewalls Could Reduce 33% of All Cybersecurity Breaches.
  • 14. DNS Firewall as layer of defense
  • 15. Of malicious data breaches came from a form of cyber-attack that leverages emails, texts, phone calls or even in- person visits. 93%
  • 16. Only 54 per cent of small businesses provide cybersecurity training for their employees even though the most common form of malware seen by our respondents, phishing attacks (42 per cent), directly exploit employees as a point of weakness. 54% The Human Layer of Defense
  • 17. Reduction in users clicking on phishing emails after implementing D-Zone Cybersecurity Awareness Training. 3x Transform your users into a human firewall
  • 18. The most integrated training, phishing simulation, gamification and measurement tool available. D-Zone Cybersecurity Awareness Training Score and measure Ongoing and Remedial Training “Turned cyber risk from something to lose sleep about into something we effectively manage” C-Therm Technologies Awareness Survey Phishing simulation End user training modules and risk analysis
  • 19. CIRA delivers a family of cybersecurity services to Canadian organizations. D-Zone Anycast DNS Authoritative DNS for your domains  Improve performance with a global footprint  Protect from DNS DDoS and DNS hijacking D-Zone DNS Firewall Recursive DNS with threat blocking  100,000 new threats blocked daily  Stops malware command-and- control D-Zone Cybersecurity Awareness Training Phishing and training for end-users  Most integrated platform available  Reduce user clicks on malware links by 3X
  • 20. Summary • Defense in Depth • Leverage additional layers • DNS • Staff
  • 21. Fully Managed – Cyber Security RYAN VAL L EE
  • 22. Current threats and who they are targeting The Continued Increase in Ransomware. • In 2016, a business fell victim to ransomware every 40 seconds. • 70% of all malware attacks last year were ransomware. • 91% of cyberattacks begin with spear phishing email, which are commonly used to infect organizations with ransomware. Cybersecurity Ventures predicts cybercrime will cost the world in excess of $6 trillion annually by 2021, up from $3 trillion in 2015. Ransomware is expected to worsen and make up a proportionately larger share of total cybercrime by 2021.
  • 23. Weaponization of Artificial Intelligence • Security companies are using AI to protect environments and users, therefore it is certain that the hackers are following suit in their attack methodologies. • Hackers leverage AI in spear phishing exploits to create carefully targeted messages that trick people into sharing sensitive data and installing malware. • AI is used to collect information about a target organization from across the internet, to instigate detailed and targeted exploits, and crack passwords.
  • 24. Who Are They Targeting? • 71% of ransomware attacks in 2018 targeted small businesses, with an average ransom demand of $116,000 USD. • Consumer-targeted ransomware attacks have declined by 33% since the end of 2018. • Ransomware attacks on business targets have seen a substantial increase in the first quarter of 2019, up by 195 percent since the fourth quarter of 2018. • 16% of cyber-attacks target public sector entities, 15% focus on healthcare organizations, and 10 % of attacks target the financial industry. • • • • • • • • •
  • 25. Who Are They Targeting? - Continued • As can be seen from the data, public administrations are a very large target and this has been seen with the number of public municipalities which have suffered breaches recently. • “There's over two thousand municipalities in Canada ... they hold a lot of sensitive information on individuals ... on properties, on a lot of transactions. They're very vulnerable.” Dan Mathieson, mayor of Stratford … in a CBC news report after the municipality was hit with ransomware on 14th April 2019.
  • 26. Best practices in Risk Mitigation (Financial, public and brand damage) HAVE A PLAN CYBERSECURITY INSURANCE CYBERSECURITY PARTNER
  • 27. Disclosure issues surrounding the Personal Information Protection and Electronic Documents Act (PIPEDA) PIPEDA applies to private-sector organizations across Canada that collect, use or disclose personal information in the course of a commercial activity. As of 1st November 2018, it is mandatory to report to the Privacy Commissioner of Canada breaches of security safeguards involving personal information that pose a real risk of significant harm to individuals. Failure to report such a breach can lead to fines of up to $100,000. (source: Government of Canada & Global News) • • •
  • 28. W R I T T E N P L A N S Prevention Policy Essential steps for preventing attacks S E C U R I T Y H Y G I E N E B E T T E R A U T H E N T I C A T I O N 2 - F A C T O R A U T H E N T I C A T I O N E D U C A T I O N
  • 29. Call for help! Business Continuity Plan Steps to take after a cyber attack Disconnect the internet Isolate the Servers Call Insurance Company Execute DR Plan Find Patient Zero Clean the Environment Restore Data and Servers Report the Breach Ongoing impact
  • 30. ANDRE W LOSCHM ANN M A RK G A U DE T RYAN VALLE E PANELISTS BRYAN HARALOVICH Partner, Welch LLP bharalovich@welchllp.com 613.236.9191 President & CTO, Field Effect Software aloschmann@fieldeffect.com 613.686.6342 Product Line Manager, CIRA mark.gaudet@cira.ca 613.237.5335 Senior VP, Fully Managed Ryan.vallee@fullymanaged.com 613.591.9800