Artwork

Contenuto fornito da CPA Trendlines. Tutti i contenuti dei podcast, inclusi episodi, grafica e descrizioni dei podcast, vengono caricati e forniti direttamente da CPA Trendlines o dal partner della piattaforma podcast. Se ritieni che qualcuno stia utilizzando la tua opera protetta da copyright senza la tua autorizzazione, puoi seguire la procedura descritta qui https://it.player.fm/legal.
Player FM - App Podcast
Vai offline con l'app Player FM !

Episode 29: Jill Cagliostro on When Cyber-Crime Hits Close to Home, with Steven Sacks

21:13
 
Condividi
 

Manage episode 289868173 series 2907093
Contenuto fornito da CPA Trendlines. Tutti i contenuti dei podcast, inclusi episodi, grafica e descrizioni dei podcast, vengono caricati e forniti direttamente da CPA Trendlines o dal partner della piattaforma podcast. Se ritieni che qualcuno stia utilizzando la tua opera protetta da copyright senza la tua autorizzazione, puoi seguire la procedura descritta qui https://it.player.fm/legal.
With cyber-crime growing by leaps and bounds, accountants are caught in the cross-hairs, cyber-security professional Jill Cagliostro tells Steven Sacks for CPA Trendlines.
Cagliostro, senior product manager with Splunk, a data management and security company, says “cybercriminals are getting more advanced. They’re finding new avenues and new ways to get in every single day.”
“And beyond that,” she says, “they’re also communicating with each other. So they’re able to share these new tactics and techniques amongst each other to become more proficient together.”
Key Takeaways
-- Bad actors are communicating in places like the dark web and in forums to share their ideas and to plan to breach private and government entities.
-- Third-party vendors must go through security questionnaires before they are onboarded as a partner with a private entity.
-- The questionnaires are employed to ensure that the third-party vendor has the necessary security mechanisms in place, such as two-factor authentication, encryption, and comprehensive policies that must be followed.
-- There are key metrics to use to assess the risk of cyberattacks. KPIs that indicate how secure something is or how good the security team is doing at protecting the organization can be difficult.
-- Clients are looking for different KPIs that they can show the level of success that they’ve had with identifying threats in their environment.
-- Companies that experience security breaches will find it more difficult to attract future security talent because security professionals will not want to have on their resume companies that were victimized by a security breach as it will imply that they allowed a breach to occur.
-- The most common way that companies get hacked is through phishing emails, which doesn’t always go to the executives. Security should really not just inform technology decisions, but business decisions as well.
-- One of the best ways the IT team and security teams monitor for behaviors is by tracking activity on employees’ work computers. By connecting to a corporate VPN allows the IT and security teams to see what is going on internally.
-- In addition to external threats, there are internal threats that could be very costly. Company employees can have access to trade secrets, confidential information, and insider trading information.
-- There are a couple of different ways to monitor this behavior using data-loss prevention tools that can monitor files going in and out of a company’s network.
Full transcript and video here: https://cpatrendlines.com/2021/04/11/fighting-cyber-crime-starts-close-to-home/
  continue reading

131 episodi

Artwork
iconCondividi
 
Manage episode 289868173 series 2907093
Contenuto fornito da CPA Trendlines. Tutti i contenuti dei podcast, inclusi episodi, grafica e descrizioni dei podcast, vengono caricati e forniti direttamente da CPA Trendlines o dal partner della piattaforma podcast. Se ritieni che qualcuno stia utilizzando la tua opera protetta da copyright senza la tua autorizzazione, puoi seguire la procedura descritta qui https://it.player.fm/legal.
With cyber-crime growing by leaps and bounds, accountants are caught in the cross-hairs, cyber-security professional Jill Cagliostro tells Steven Sacks for CPA Trendlines.
Cagliostro, senior product manager with Splunk, a data management and security company, says “cybercriminals are getting more advanced. They’re finding new avenues and new ways to get in every single day.”
“And beyond that,” she says, “they’re also communicating with each other. So they’re able to share these new tactics and techniques amongst each other to become more proficient together.”
Key Takeaways
-- Bad actors are communicating in places like the dark web and in forums to share their ideas and to plan to breach private and government entities.
-- Third-party vendors must go through security questionnaires before they are onboarded as a partner with a private entity.
-- The questionnaires are employed to ensure that the third-party vendor has the necessary security mechanisms in place, such as two-factor authentication, encryption, and comprehensive policies that must be followed.
-- There are key metrics to use to assess the risk of cyberattacks. KPIs that indicate how secure something is or how good the security team is doing at protecting the organization can be difficult.
-- Clients are looking for different KPIs that they can show the level of success that they’ve had with identifying threats in their environment.
-- Companies that experience security breaches will find it more difficult to attract future security talent because security professionals will not want to have on their resume companies that were victimized by a security breach as it will imply that they allowed a breach to occur.
-- The most common way that companies get hacked is through phishing emails, which doesn’t always go to the executives. Security should really not just inform technology decisions, but business decisions as well.
-- One of the best ways the IT team and security teams monitor for behaviors is by tracking activity on employees’ work computers. By connecting to a corporate VPN allows the IT and security teams to see what is going on internally.
-- In addition to external threats, there are internal threats that could be very costly. Company employees can have access to trade secrets, confidential information, and insider trading information.
-- There are a couple of different ways to monitor this behavior using data-loss prevention tools that can monitor files going in and out of a company’s network.
Full transcript and video here: https://cpatrendlines.com/2021/04/11/fighting-cyber-crime-starts-close-to-home/
  continue reading

131 episodi

همه قسمت ها

×
 
Loading …

Benvenuto su Player FM!

Player FM ricerca sul web podcast di alta qualità che tu possa goderti adesso. È la migliore app di podcast e funziona su Android, iPhone e web. Registrati per sincronizzare le iscrizioni su tutti i tuoi dispositivi.

 

Guida rapida