Computer Security Day: Webinar on Cybersecurity
- Angelina Angelov
- 30 nov 2021
- 6 Min. de lectura

Cybersecurity incidents may lead to reputational damage, lost productivity, stealing of intellectual property, operational disruptions, and high costs of recovery. Data protection is a huge challenge that requires ongoing commitment. Therefore, we must establish cybersecurity policies and procedures and ensure its implementation and compliance. Training at all levels, especially of leaders, can be that differentiating factor to reduce the risks associated with the use of technologies. It is therefore necessary to create a culture of cybersecurity.
The following is a transcript of some parts of the Webinar:
First I would like to take the opportunity to thank the public for joining us today, members of the IWIRC association and more widely colleagues and friends, for joining us in this meeting on the occasion of Computer Security Day.
Our lifestyle has changed. According to IoT Analytics, by the end of 2020, the number of connected devices worldwide reached around 21.7 billion, and 54% of them is part of the Internet of Things. We are surrounded by smart devices: at home, in the office, on the street. In October 2019, the American Bar Association published the Technology Report, where they indicate that an average person uses around 36 cloud-based applications in their daily lives.
Juan Jose has made it clear what the statistics for 2021 have been alarming. Globally, 1 in 61 organizations has been affected by ransomware every week. Despite the efforts, cyber crime will continue to grow, so it is no longer enough to have cybersecurity, but to build cyber resilience. Broadly, build the strategy on cyber resilience.
Cybersecurity must be part of the strategic plan of your business towards the digital transformation. Cyber resilience must become a cornerstone of the ecosystem. The CIO, as a technical professional, must actively participate in strategic planning.
Cybersecurity is NOT the sole responsibility of the Technology staff. It is everyone's responsibility.
Risk management
The cybersecurity policy needs to be based on the Risk Assessment of the firm and those responsible for each process. The foundation of Cybersecurity Program is to have the support of Senior Management. After they are committed and onboard, create policies and procedures to follow and then implement the corrective measures to achieve compliance.
Keywords: Owner, General Manager, CEO: If you identify your name between the keywords, you are ultimately responsible.
Basic knowledge of cyber rules will keep you from being a perfect target for cyber criminals.
Keywords: Legal, compliance
If you find any of the keywords in the job title or description, then your role is critical to risk management.
Understand the legal implications of cybersecurity to enable robust risk mitigation,
Implement an effective compliance program.
Actively participate in the risk management process working with Planning, Finance, Administration and other areas, to mitigate risks in a comprehensive manner.
Support incident response team
After an eventual incident, carry out the necessary steps, either in support of official investigation bodies, notifications to clients, suppliers or the general public.
Protect information from legal compliance: Make sure information is destroyed in accordance with your organization's data retention policies or external regulations.
Other roles:
Fully understand your role and take personal responsibility for knowing how your organization addresses cybersecurity risks.
Be willing to learn, as technology continually evolve.
Know how to manage, control, store, transfer and dispose of information in your organization.
Protect your assets by physically safeguarding your computer, mobile devices, and non-electronic information.
Follow your organization's security procedures for facilities and prevent unauthorized access through social engineering tricks, souplantation of identity or so called spoofing.
Use the best authentication capabilities your organization offers to control access to computers, mobile devices, and others
Use encryption for information in transit and at rest.
If you work from home, protect your home devices and connections
Learn about your organization's security incident notification policy and contacts.
Take control of your own security and cybersecurity; don't assume hardware and software vendors will do it for you
Security policies include the three axes:
Physical security: user policies
Technical Security: IT responsibility
Administrative Security: Cybersecurity Policies and Procedures
What do we protect?
Physical and electronic database of employees
Physical and electronic database of customers
Physical and electronic financial information of clients and the branch
Vulnerable data is stored, in process and in transit.
Administrative security begins by defining policies and those are approved by Senior Management. To implement any project, we must necessarily have the support of Senior Management and in the case of cyber-resilience, they must be part of the entire process.
Prepare a business continuity and disaster recovery plan as well as breach response plan.
Plan must be consistent and from time to time, you have to test it.
Have a business continuity plan based on the identification and analysis of critical processes
Establish an alternative physical infrastructure where to work, communications equipments, technology, identify key people, etc.
Prepare and test cyber attack scenarios
Define those responsible for communication and the emergency committee, responsible for decision-making
Ensure regular training with the participation of all employees, from Senior Management to employees in the front line, through special courses, tests and simulations. Human error in using information systems improperly remains among the most common reasons for a cybersecurity incident. Cyber exercises and trainings for the entire team help build a culture of security within organizations, increase awareness of cyber security, and prevent employees from falling for social engineering and data theft. It also improves staff resistance to phishing.
Once the training sessions are completed, which must also be continuous and mandatory for new hires, employees must sign the security agreements and, if applicable, those for the use of their own equipment.
What does Building a Cybersecurity Culture mean?
The culture of our organizations is essential to establish a successful cybersecurity program. Culture should emphasize, reinforce, encourage leaders to model behavior towards safety. Culture is how we do things in our organizations: and it is the leaders who set the guidelines. It requires vision, investment support in safety and modeling good personal safety habits. And it starts by raising awareness. It is the critical component. When we create awareness in organizational culture, our ability to address risks increases. Be vigilant and prepared, regardless of whether you are a small, non-profit, or one of the Fortun 100. Mindset shifts will drive appropriate behaviors at the individual level, helping build resilience throughout the organization.
Regarding leadership: Cybersecurity needs require financial and human resources
Understand the basics and best practices, enough to allow sound decision making Include cyber risks within the category of your business risk: NOT a topic reserved for IT
Develop and maintain information security policies and standards.
Create cross-functional teams to achieve cybersecurity program goals
Hiring experts can save money, resources, and protect your business. They have more experience and qualified equipment and personnel.
Use technology to enforce policy:
Password changes
Use of passwords with specific characteristics
Disable USB ports
Do not allow access to certain pages
Systems lockout due to inactivity
Note to leaders
Don't be afraid to ask questions. No one expects leaders to understand cybersecurity as well as finance or operations, but everyone expects it to mitigate business risks, and a real risk today is cybersecurity risk. As a leader, your job depends on how well you deal with risks sometimes with unfamiliar issues.
ISO 27000 standards provide recommendations for the use of organizational policies and structures to reduce risk, and the COSO framework connects corporate governance with culture by highlighting the importance of cultural requirements, core values, and human talent development and training. The clear commitment of leaders to risk management is essential for success.
The good news is that a study published by Ernst and Young in 2020 identifies that 81% of board members classify cybersecurity as "Highly Relevant," and Gartner predicts that by 2025, 40% will have a cybersecurity committee. (currently it is only 10%). We have one in the office.
Customer expectations, for internal clientas are hybrid work and for external: Security, Mobility and Connectivity.
Audits, audits and more auditors are in the light of day, forms of hundreds of pages to fill out, both the part on administrative protections or others.
Risk of not being in compliance is expensive:
Speaking, for example, of the GDPR, the first thing many people mention is the risk of fines. But for most organizations, fines are not the most significant risk of non-compliance.
Loss of confidence
This is the number one scare for most organizations. If customers don't trust you with their data, they won't do business with you. Complying with applicable regulations and standards is becoming the basis for doing business. "If he's not playing by the rules, we don't even talk."
Reputational damage
If a breach occurs, your name will appear in the news, damaging reputation and lowering trust. No organization wants to be known or remembered for the breach that occurred and the data they lost. Panama Papers, Pandora Papers, to mention some.
Fines
Although it is not the most important consequence according to many organizations, it is still very important and could have a substantial impact on business.
Simple recommendations:
DO NOT put your passwords written on a "post it"
DO NOT let your minor children use the devices where they have the office data
Use encryption, but remember to safeguard the key or password used to encrypt. There are no alternative ways to open previously encrypted data.
USB memory sticks: Encrypted, for example Ironkey, Apricom
Keep personal files separate from office files
But also:
Limit the ability of others to find your router
Use secure connections (VPN)
If you travel, do not enter sensitive data on public computers, much less open public networks, for example, libraries, Internet cafes, hotels, airports.
Finally: use Social Media wisely: Don't share your personal information on corporate accounts or vice versa
To conclude, I only have to thank the public once again, remaining at their disposal to answer any questions.
Angelina Angelov
Comments