"TechFresh Insights" Series by Dave Nolan

Published on Slideshow
Static slideshow
Download PDF version
Download PDF version
Embed video
Share video
Ask about this video

Scene 1 (0s)

[Audio] Hello I am Dave Nolan and this is the July 2023 TechFresh Insight Series, update..

Scene 2 (11s)

[Audio] TechFresh Insight Series provides expert insights, industry trends and actionable strategies to help you navigate the ever evolving technology landscape with confidence..

Scene 3 (43s)

[Audio] I wanted to start the July series update with an exciting BlueAlly acquisition. We are pleased to welcome B2B Technologies to the BlueAlly family. B2B is a long-standing Microsoft Cloud Partner with an emphasis on cloud adoption and migration, application modernization, mobile device management, and security solutions using Microsoft technologies this represents additional depth being layered into the BlueAlly offering..

Scene 4 (1m 13s)

[Audio] In this TechFresh Insight series we are focusing on the topic of Cybersecurity Maturity Plans. Companies need to perform regular assessments of their cybersecurity plans. However, the cyberthreat landscape is complex making it challenging to be proactive and stay ahead of evolving threats. So how can you take a holistic approach to protect your customer and proprietary information effectively? Take a short quiz to assess the maturity of your organization's cybersecurity plan..

Scene 5 (1m 47s)

[Audio] Before we start the Quiz it is important to note that with 34% of middle-market executives considering cyberattacks or privacy breaches as their top digital threats is important to understand how mature your cybersecurity plan is..

Scene 6 (2m 3s)

[Audio] And with the Security and Privacy as the top IT resilience challenge it is crucial to prioritize security and privacy initiatives to protect customer and proprietary information effectively. Now let's get the quiz started..

Scene 7 (2m 19s)

[Audio] By taking this short quiz to assess the maturity of your organization's cybersecurity program you will find out what your cybersecurity risk is and what you should be doing to protect your organization..

Scene 8 (2m 34s)

[Audio] This is the first of 5 questions. Please select your answer 1, 2, 3 or 4. The first question is: Has your organization implemented security policies for the following areas? Answer 1 Data privacy, information privacy and information governance. Answer 2 Information security and information governance. Answer 3 Information security only. Answer 4 None of the Above. Please record your answer 1, 2, 3 or 4. We will add up these to provide a Score at the end..

Scene 9 (3m 16s)

[Audio] This is the second of 5 questions. Please select your answer 1, 2 or 3. The second question is: Has your organization implemented Multi-factor Authentication on all public-facing technologies including email, websites, applications, VPN and remote access solutions? Answer 1 Yes, it is implemented on all public-facing technologies. Answer 2 Yes, but it is implemented on some public-facing technologies. Answer 3 No, it is not implemented on any public-facing technologies. Please record your answer 1, 2 or 3. We will add up these to provide a Score at the end..

Scene 10 (4m 4s)

[Audio] This is the third of 5 questions. Please select your answer 1, 2, 3 or 4. The third question is: Does your organization have a dedicated team responsible for security operations, including incident management, remediation, and threat hunting? Answer 1 Yes we have a team in place that handles incident management, remediation and threat hunting. Answer 2 Yes we have a team in place that handles incident management and remediation. Answer 3 Yes we have a team in place that handles only incident management. Answer 4 No we do not have a dedicated team in place for security operations. Please record your answer 1, 2, 3 or 4. We will add up these to provide a Score at the end..

Scene 11 (4m 59s)

[Audio] This is the fourth of 5 questions. Please select your answer 1, 2, 3. or 4. The fourth question is: Does your organization regularly backup all business data, including storing recent backups offsite, additionally is there a disaster recovery plan as part of your data protection strategy. Answer 1 We perform full backups regularly, store one recent backup offsite and have a documented disaster recover plan. Answer 2 We perform full backups regularly, store one recent backup offsite, and conduct regular testing. Answer 3 We have some backups in place, but there is not regular testing. Answer 4 I am unsure about the status of our backup data. Please record your answer 1, 2, 3 or 4. We will add up these to provide a Score at the end..

Scene 12 (6m 0s)

[Audio] This is the fifth of 5 questions. Please select your answer 1, 2 or 3. The fifth question is: Has your organization implemented technology to enforce Data Leakage Policy DLP, including monitoring email attachments and data sharing via cloud services? Answer 1 Yes we have DLP technology in place for monitoring email and cloud sharing. Answer 2 Yes we have DLP technology in place for monitoring email only. Answer 3 No we do not have DLP technology implemented. Please record your answer 1, 2 or 3. We will add up these to provide a Score at the end..

Scene 13 (6m 48s)

[Audio] Adding up your scores if it ranges between 15 and 18 your organization's cybersecurity program has a strong foundation, but there is still room for further development. To ensure comprehensive protection, it is essential to enhance your cybersecurity strategy by addressing potential threats. Investing in measures to improve overall compliance and cybersecurity maturity is critical. For a personalized approach on how to bolster your cybersecurity posture, we recommend contacting your cybersecurity consultant for a comprehensive Security Maturity Assessment. Reach out to BlueAlly consulting today to take your cybersecurity to the next level..

Scene 14 (7m 32s)

[Audio] Adding up your scores if it ranges between 8 and 14 your organization's cybersecurity program has a solid foundation but, it is still in the development phase. To ensure adequate protection, it is important to ensure that your cybersecurity strategy encompasses all potential threats, investing in ransomware and malware prevention now can help avoid higher costs associated with a breach in the future. For a customized approach to improving overall compliance and cybersecurity maturity, contact your cybersecurity consultant for a security maturity assessment. Reach out to BlueAlly consulting today to get started on enhancing your cybersecurity posture..

Scene 15 (8m 15s)

[Audio] Adding up your scores if it ranges between 5 and 7 congratulations, your organization has achieved a high level of performance with a comprehensive cybersecurity strategy that incorporates threat intelligence tools and robust security programs. Your strategy demonstrates a strategic alignment with you business objectives and effectively addresses relevant vulnerabilities. However, it is important to continuously maintain and keep up with you cyber defense program to ensure ongoing protection for your business. Regular staff training and periodic reviews of your cybersecurity strategy will help ensure that your organization remains cyber ready. For more information on how to safeguard your business against cyberattacks contact BlueAlly consulting..

Scene 16 (9m 3s)

[Audio] Is your business prepared and resilient against costly outages and cyberthreats? BlueAlly takes a Comprehensive Approach to Cybersecurity Assessments. This includes a thorough assessment that encompasses all facets of your IT infrastructure, including networks, systems, applications, and data repositories. By leaving no stone unturned, our consultants ensure a holistic understanding of potential risk. Contact your BlueAlly consultant today to schedule a Security Maturity Assessment..

Scene 17 (9m 40s)

[Audio] Thank you for your time and attention today. I hope this TechFresh Insight series update on Cybersecurity Maturity Plans was helpful. Your feedback is welcome so if you have a topic or have a question that you would like us to cover in a future update let us know what is on your mind. Until our next update take care..