You are on page 1of 10

Information

/ Cyber Security

Session 4

March 3, 2023
Cyber Fact

Most companies take nearly 6 months to detect a data


breach, even major ones!
Security
Security Status of Posture
an Organization’s
Networks, Information & Systems
based on
Information Security Resources (e.g. people, hardware, software,
policies)
AND
capabilities in place to
manage defence of that Organization and
to react as the Situation changes.
Security
Posture

Your Security Posture is a measure of:


• Level of visibility you have into your asset inventory and
attack surface;
• Controls and processes you have in place to protect your
enterprise from cyber-attacks;
• Your ability to detect and contain attacks;
• Your ability to react to and recover from security events;
• The level of automation in your security program.
Conceptual Diagram
of Security Posture
Organization’s
Security Security
Posture Posture
in Summary

Vulnerabilities
Defender’s
Capabilities

Security
Software / Culture
Hardware Human Errors
Vulnerabilities
Skills,
Security
Knowledge,
Policies
Effort & Tools
Knowledge
Check
(True / False)

Security posture is the measure of an enterprise’s ability to detect


and contain cyber attacks.
True

An organization’s level of security controls’ automation has no


impact on its security posture.
False
Knowledge
Check
(True / False)

Enablement of 2 Factor Authentication strengthens an organization’s


security posture.
True

An organization allows connection of employees’ personal laptops to


its network. This has no implication on the organization’s security
posture.
False
Knowledge
Check

The first step in ascertaining an Organization’s security posture is to:

a. Address identified vulnerabilities


b. Conduct Vulnerability Assessment
c. Ascertain IT assets
d. Assess threats to the organization
Thank you and
All the best!

You might also like