Cybersecurity Field Guide #1:
What to Do
When Everything
Changes
In cybersecurity, change is your only constant. This guide helps you navigate its complexities in a world where innovations and threats arise seemingly daily (to say nothing of a random pandemic). Let’s assess where your organization stands and then outline how to identify common threats. You’ll then get tool recommendations and strategies and see what’s on the horizon (including remote work and talent demands).
Like this guide? Here’s a link to view other guides.
Take a Look Inside
Assess. Identify threats. Look forward. During significant bouts of industrial change, the right steps in the correct order make all the difference. Assessing your situation and its impact on your business can help maintain continuity while mitigating unexpected consequences. Then, identifying some of the most common threats and diving deeper into understanding how they work can better prepare you for prevention and defense, better protecting your valuable data. Take a look.
Prioritizing in Chaos
The recent pandemic has drastically altered the trajectory of the entire world.
This guide helps identify where you are, what you need to be aware of and what comes next as the dust settles on one of the most life-altering events since WWII.
It’s OK to be optimistic: Despite many disastrous impacts, we also see opportunities for innovation on the horizon.
The Topics and Summaries
Understanding your current environment means knowing what you did, what you have and what you need to do next.
- Maintaining Business Continuity
- Work from Home (WFH) Post COVID-19
Hackers are taking advantage of the dreaded “new normal.” People are working from home in droves on networks you can’t see (what perimeter?). Let’s examine some of the most comment threats.
- Malware, signs of infection
- Ransomware, crypto locker targets
- Other threats – riskware, mobile devices, permissions, spearphishing and COVID-19-specific emails
Protecting valuable data, adhering to stringent regulations and maintaining healthy business operations have made threat prevention a higher priority. So what are the best practices for minimizing the risk of prevalent threats?
- Good hygiene, protecting against ransomware, mobile device security how-tos, VPNs
- Vacant facility considerations
- Securing WFH (and Zoom!)
WFH may have saved your organization some money, space and time. What does all this really look like, and post-COVID-19, is it a good or bad idea to stay the WFH course or go back to the office – and why?
Field Guide Library
CYBERSECURITY
FIELD GUIDE #1
What to Do When Everything Changes
COVID-19 = accelerated digital transformation (change, change and more change). Our first Cybersecurity Field Guide will help you navigate cybersecurity complexities in a world where innovation never stops and threats arise daily.
CYBERSECURITY
FIELD GUIDE #2
How to Survive an Attack
How can you create a comprehensive response to cyber-attacks? This is the Cybersecurity Field Guide for you. It looks at how – from assembling your cross-functional team to tabletop exercises and war games – to mitigation if the unthinkable happens.
CYBERSECURITY
FIELD GUIDE #3
Get SASE to Accelerate Your Digital Transformation
Let’s clear up secure access service edge (SASE) confusion. Optiv’s third Cybersecurity Field Guide will help you better understand SASE, the promise of its future, its benefits and hurdles, and includes a list of providers.
CYBERSECURITY
FIELD GUIDE #3.5
How to Effectively Implement and Operationalize SASE
In Optiv’s first SASE Field Guide (#3.0), we provided a high-level explanation for the secure access service edge (SASE) concept and critical considerations. With this SASE Field Guide #3.5 – the next in the SASE series – we provide detailed guidance about where and how to start your SASE journey.
CYBERSECURITY
FIELD GUIDE #4
Best Practices for Automated Vulnerability Remediation
Is automated remediation the answer? Optiv’s Fourth Field Guide offers detailed guidance and six use cases with time saved. Evolve from a time-consuming process to one that leverages new processes and recent technological advances.