Episode 3

How to apply the 80/20 rule to your cyber security strategy

Published on: 9th September, 2022

Cyber criminals are getting smarter. Protecting your enterprise is getting expense.

Where do you start in your cyber security journey?

The co-founders of Assurance IT discuss the top 5 cyber security tools every enterprise should start with. 

In this episode, Luigi Tiano, and Ernesto Pellegrino also discuss: 

  1. 13 Cyber Secure Measures
  2. Incident Response Plans
  3. Reason to increase cyber security awareness among executives
  4. How the workspace changed over the last two years and how it's affecting IT
  5. #1 cause of cyber attacks
  6. Feedback from cyber security insurance companies
  7. Top 5 things you need to protect against ransomware

 


Resources: 

Watch the episode: https://youtu.be/FejMyQmT9hA

Blog: www.assuranceit.ca/blog/13-parts-of-an-effective-business-continuity-plan-to-protect-against-ransomware

CyberSecure Canada: https://cyber.gc.ca/en/guidance/baseline-cyber-security-controls-small-and-medium-organizations

Ernesto Pellegrino’s LinkedIn: https://www.linkedin.com/in/ernestopellegrino/

Luigi Tiano’s LinkedIn: https://www.linkedin.com/in/luigitiano/

Assurance IT Website: http://www.assuranceit.ca/




About 10 Questions to Cyber Resilience: 

Twice per month, learn about how IT leaders are strengthening their cyber security practices. Every episode comprises of 10 questions that get you one step closer to cyber resilience. Subscribe to stay up-to-date with hot topics in cyber security. 

 

About Assurance IT: 

Assurance IT (www.assuranceit.ca) specializes in data protection and data privacy for the mid-market in Canada, since 2011. The Montreal-based company’s unique approach to helping customers become cyber resilient is called the PPR Methodology which stands for Prepare, Protect and Recover. Based on industry best practices, the PPR Methodology is an easier way to achieve cyber security and compliance objectives.

Transcript
Speaker:

This is 10 questions to

Speaker:

cyber resilience brought

Speaker:

to you by Assurance IT.

Speaker:

Released twice per month, every

Speaker:

episode brings you one step

Speaker:

closer to cyber resilience

Speaker:

by hearing how IT leaders are

Speaker:

practicing cyber security.

Speaker:

Resources mentioned in the episode

Speaker:

can be found in the show notes.

Speaker:

If you are ready to take your

Speaker:

cyber resilience to the next

Speaker:

level, be sure to subscribe so

Speaker:

you can catch every episode.

Speaker:

They were gonna be talking about 13

Speaker:

controls based on the cybersecurity

Speaker:

Canada framework, before we jump

Speaker:

into it and, and talk about it.

Speaker:

It's important that we

Speaker:

introduce ourselves.

Speaker:

I'm Lu Gitano.

Speaker:

Co-founder here at assurance it

Speaker:

and a little bit about assurance

Speaker:

it we're based on the Montreal.

Speaker:

We service clients across Canada

Speaker:

and we help businesses stay

Speaker:

protected, become cyber resilient,

Speaker:

mitigate risk, protect them from

Speaker:

attacks and help them recover

Speaker:

in the event of a disaster.

Speaker:

Ernest Ella, you know, based that.

Speaker:

Also co-founder here with

Speaker:

Luigi, my role work, focus on

Speaker:

the technology aspect of it,

Speaker:

help organizations leverage the

Speaker:

technology, really to meet those,

Speaker:

you know, attach them and meet

Speaker:

those business objectives and

Speaker:

become cyber resilient in doing so.

Speaker:

So again, my main focus or my,

Speaker:

my focus is primarily working

Speaker:

with the technology people

Speaker:

within the organization to,

Speaker:

to really bridge that gap.

Speaker:

Awesome.

Speaker:

Before we get into cyber

Speaker:

secure Canada, a little bit.

Speaker:

The assurance it model.

Speaker:

We developed a model here to

Speaker:

help our clients remain safe.

Speaker:

We call it the PPR methodology,

Speaker:

prepare, protect, and recover.

Speaker:

Essentially what it helps companies

Speaker:

do is identify any gaps in

Speaker:

their cyber security strategy.

Speaker:

Reduce the chance of human error.

Speaker:

Reduce the risk.

Speaker:

Associated with running a

Speaker:

lot of infrastructure and

Speaker:

complex infrastructure.

Speaker:

Once we identify those gaps

Speaker:

and we're able to prepare the

Speaker:

organization, then we can protect.

Speaker:

You can only protect

Speaker:

what you know you have.

Speaker:

Right.

Speaker:

Right.

Speaker:

And then, and then basically once

Speaker:

we know what we're protecting and

Speaker:

we're protecting it from all sides.

Speaker:

You wanna be able

Speaker:

to recover, right?

Speaker:

So there's that, that's what

Speaker:

we call the PPR methodology.

Speaker:

But a lot of people ask us where

Speaker:

the PPR methodology came from.

Speaker:

Right?

Speaker:

And, and this is where I think

Speaker:

Ernie's gonna provide a lot of

Speaker:

value is we, we had to base ourself

Speaker:

on something that was robust, was

Speaker:

tried and proven and, and something

Speaker:

that we could hang our hat on.

Speaker:

When we talked to customers

Speaker:

about it, wasn't just something

Speaker:

that we came up with out of,

Speaker:

out of air, out of thin air.

Speaker:

It was something that we

Speaker:

were able to base ourself on.

Speaker:

And obviously we came

Speaker:

across cyber secure Canada.

Speaker:

That has an amazing set of, of,

Speaker:

of controls and a framework that

Speaker:

of course is, is stamped by the,

Speaker:

the Canadian government, you

Speaker:

know, a pretty substantial body.

Speaker:

Who's done extensive research on

Speaker:

how to protect the enterprise.

Speaker:

So.

Speaker:

Today, I'm gonna, you know, I've,

Speaker:

I've, that's why we're here Ernie.

Speaker:

I'm gonna probably pass the

Speaker:

ball off to you to talk a

Speaker:

little bit more about cyber

Speaker:

secure Canada, what it is, how

Speaker:

it fits into our methodology

Speaker:

and how it's helping clients.

Speaker:

I'll, I'll kind, kind of act

Speaker:

more as the, as the interviewer,

Speaker:

because you can probably talk a

Speaker:

little bit more in depth about it.

Speaker:

Well, you did a great job there.

Speaker:

Luigi, just defining how we

Speaker:

streamlined, you know, how we

Speaker:

created a methodology around

Speaker:

protecting right and Canadian

Speaker:

center of cybersecurity

Speaker:

and, and other governments

Speaker:

across the world are putting

Speaker:

together these frameworks.

Speaker:

It's the government's

Speaker:

response to cybersecurity.

Speaker:

They put together these security

Speaker:

controls, advice, guidance,

Speaker:

security controls on how

Speaker:

organizations can get the most out

Speaker:

of their cybersecurity investments.

Speaker:

Really.

Speaker:

And you'll hear us refer to

Speaker:

the 13 cybersecurity points.

Speaker:

You'll hear us refer to, to

Speaker:

baseline cybersecurity controls.

Speaker:

We encourage organizations to

Speaker:

implement as many of these cyber

Speaker:

security controls as possible.

Speaker:

We understand that not every

Speaker:

organization can implement all of.

Speaker:

But really it's a matter

Speaker:

of going through and, and

Speaker:

understanding which ones matter

Speaker:

to you and, and definitely I'll,

Speaker:

I'll help you protect against

Speaker:

those ransomware and cyber

Speaker:

attacks that we're hearing so

Speaker:

much in the media as of late.

Speaker:

Right.

Speaker:

Right, right.

Speaker:

And, and it's well

Speaker:

documented online.

Speaker:

It's accessible to anyone, frankly.

Speaker:

That's kind of how we, we

Speaker:

came across it and it's mind

Speaker:

boggling and maybe a little bit

Speaker:

brutally honest here, how a lot

Speaker:

of organizations haven't really

Speaker:

got their, their head around it.

Speaker:

I just shared my screen.

Speaker:

You, you see it earlier?

Speaker:

Cuz I, I.

Speaker:

What I wanna do I do.

Speaker:

And the number one develop

Speaker:

an incident response plan.

Speaker:

And when we see organizations that

Speaker:

don't have an incident response

Speaker:

plan, whether it be a cyber attack,

Speaker:

human attack, disaster, right.

Speaker:

Physical disaster, you need to

Speaker:

have an incident response plan.

Speaker:

And it's number one.

Speaker:

So.

Speaker:

You're gonna be running with

Speaker:

a chicken without a head.

Speaker:

If you don't, you

Speaker:

know, what do I do?

Speaker:

What systems are critical.

Speaker:

So you need to answer all

Speaker:

those questions prior.

Speaker:

And I guess we'll drive into

Speaker:

them a little deeper as we

Speaker:

go, but they just hit me.

Speaker:

I see incident response file and

Speaker:

we've talked to customers on a, on

Speaker:

a, on a daily basis and, and it's,

Speaker:

it's, it's scary to know that.

Speaker:

Most of them don't have a

Speaker:

robust or, or any incident

Speaker:

response plan in place.

Speaker:

And, and we think it's definitely

Speaker:

number one in the top 13 in order

Speaker:

to really be cyber resilient is

Speaker:

developing an incident response.

Speaker:

Well, it actually helps you take

Speaker:

inventory of what you have, right?

Speaker:

I mean, you could only build

Speaker:

a, a response plan once

Speaker:

you know what you have.

Speaker:

And I think that's, that's

Speaker:

a major, major issue with

Speaker:

a lot of, of organizations.

Speaker:

They, they sometimes

Speaker:

forget what they own.

Speaker:

They have a lot of infrastructure,

Speaker:

some is old, some is outdated.

Speaker:

It may have been installed

Speaker:

or deployed at some point

Speaker:

and kind of forgotten.

Speaker:

And then there's security

Speaker:

gaps that get there's security

Speaker:

holes that get created because

Speaker:

of that, that infrastructure

Speaker:

that's not being patched.

Speaker:

Right.

Speaker:

Inventory is, is key.

Speaker:

And I think it, you know,

Speaker:

knowing what you own, then

Speaker:

you can, you can react on it.

Speaker:

And I think that's, that's

Speaker:

one of the issues where we see

Speaker:

things from respond, response

Speaker:

falls, fall short, right?

Speaker:

So exactly that.

Speaker:

So you need to inventory

Speaker:

your environment,

Speaker:

understand what you have.

Speaker:

What's critical.

Speaker:

What's not critical label them.

Speaker:

Right.

Speaker:

And put them in different facets

Speaker:

where you understand which

Speaker:

ones have an SLA of one hour.

Speaker:

What can my organization live with

Speaker:

for 24 hours without a system being

Speaker:

up or an application being up.

Speaker:

Right.

Speaker:

So that's.

Speaker:

Putting a Dr.

Speaker:

Plan in place.

Speaker:

And, and then we, we talk

Speaker:

about incident response.

Speaker:

That's the aftermath.

Speaker:

If we get hit with a

Speaker:

ransomware attack or a, or,

Speaker:

or a physical disaster, who

Speaker:

do we call, what do we do?

Speaker:

Right.

Speaker:

What do we do?

Speaker:

Yeah, exactly.

Speaker:

Right.

Speaker:

In terms of, in terms of,

Speaker:

you know, even your brand

Speaker:

recognition, you know, what

Speaker:

is, do we have a lawyer to work

Speaker:

with us in order to, you know,

Speaker:

make those announcements public?

Speaker:

Right.

Speaker:

So what do we tell

Speaker:

the public happen?

Speaker:

It's important.

Speaker:

So a quick plan to really

Speaker:

eliminate the, the mess that would.

Speaker:

It's it's it's critical.

Speaker:

Yeah.

Speaker:

Yeah.

Speaker:

Communication.

Speaker:

I mean, cause we, we we're

Speaker:

going through this ourselves.

Speaker:

We wanna make sure we kind of

Speaker:

update our plan on a regular

Speaker:

basis, but communication to, to

Speaker:

your internal staff, to your,

Speaker:

your customers, to your clients.

Speaker:

And if you obviously have public

Speaker:

company and so on, you wanna

Speaker:

make, you wanna make that, that

Speaker:

communication really streamlined

Speaker:

to make sure you're, you

Speaker:

know, you're saying the right

Speaker:

stuff and, and advising the

Speaker:

right people of what happened.

Speaker:

I, I don't wanna spend too much

Speaker:

time on just necessarily the

Speaker:

instant response plan, but, but to

Speaker:

your, to a point you made earlier

Speaker:

and I maybe we can touch upon it.

Speaker:

A customer of ours.

Speaker:

Or, you know, a customer that

Speaker:

we've been working with, you

Speaker:

know, asked us for a vulnerability

Speaker:

assessment a few weeks ago.

Speaker:

And, and the response that

Speaker:

we, we looked at each other

Speaker:

and we, we said, well, there's

Speaker:

a good chance that they're,

Speaker:

they're already vulnerable.

Speaker:

Right.

Speaker:

They're vulnerable.

Speaker:

So, so maybe touch a

Speaker:

bit about that, right?

Speaker:

I mean, every organization

Speaker:

is vulnerable.

Speaker:

Why an assessment is

Speaker:

it actually needed?

Speaker:

So we use this framework

Speaker:

or this model, or these

Speaker:

security controls to say,

Speaker:

okay, I'm aware they're there.

Speaker:

I can take a stab at them before

Speaker:

I go into a full blown assessment.

Speaker:

You, you know, if you don't

Speaker:

patch your operating systems,

Speaker:

you don't patch your hypervisors.

Speaker:

I'll let you do a, an vulnerability

Speaker:

assessment against my environment.

Speaker:

I know I'm vulner.

Speaker:

So again, it's touching upon these

Speaker:

13 security control points, really

Speaker:

to look at what do I have in place?

Speaker:

That's the first step.

Speaker:

That's where I would start.

Speaker:

I would reference these security

Speaker:

points, say, okay, what out of 13?

Speaker:

How many do I have in place today?

Speaker:

Right.

Speaker:

What's my maturity level

Speaker:

within these control points.

Speaker:

Where am I at?

Speaker:

Yeah, backup plan.

Speaker:

We look at one of them

Speaker:

backup and encrypt data.

Speaker:

Yeah.

Speaker:

I have a backup system.

Speaker:

Is that.

Speaker:

We drive a little deeper within it.

Speaker:

Try to extract some,

Speaker:

some valuable data.

Speaker:

Do I do testing?

Speaker:

Do I have a Dr.

Speaker:

Plan?

Speaker:

Have I identified

Speaker:

which applications are

Speaker:

critical to my business?

Speaker:

And what is the SLA against

Speaker:

those, those applications?

Speaker:

You know, those are the questions

Speaker:

you need to ask yourself

Speaker:

before you spend the money.

Speaker:

Really to do investment.

Speaker:

So, and at the same time,

Speaker:

there are different reasons.

Speaker:

You can look at these controls,

Speaker:

you can answer these controls,

Speaker:

but the awareness within the,

Speaker:

the C level is not there.

Speaker:

Right?

Speaker:

So maybe some organizations

Speaker:

are looking at assessments in

Speaker:

order to create that awareness

Speaker:

and say, Hey, C level here,

Speaker:

Hey management, this is what we

Speaker:

assessed and we need to something

Speaker:

about it and you need budget.

Speaker:

Then budget is key.

Speaker:

That's a very good point.

Speaker:

If you look at it that way.

Speaker:

So I, I would say that 99% of

Speaker:

the, the organizations we deal

Speaker:

with small, medium, They're

Speaker:

vulnerable in some way, shape

Speaker:

or form they're vulnerable.

Speaker:

But I think what you just

Speaker:

said is important, the actual

Speaker:

availability of funds and

Speaker:

the not only availability of

Speaker:

funds, but the willingness to

Speaker:

actually invest in these areas.

Speaker:

We we've, we've traditionally

Speaker:

seen it as being a cost center.

Speaker:

The last 20 years, we keep saying

Speaker:

it as a cost center and, and we, we

Speaker:

hear some organizations saying that

Speaker:

it's the enabler to the business.

Speaker:

I, you know, I think we should

Speaker:

hear more of that, but we, we

Speaker:

don't often hear that it is an

Speaker:

investment for the next step or

Speaker:

the digital transformation in,

Speaker:

in the, in the organization.

Speaker:

And I think that vulnerability

Speaker:

assessment sometimes is

Speaker:

used as leverage to go

Speaker:

and find the funding.

Speaker:

Absolutely.

Speaker:

But, but I'm gonna, I'm gonna

Speaker:

be, again, brutally honest.

Speaker:

I, I think a lot of it executives

Speaker:

are still ignoring the fact

Speaker:

that they're vulnerable and

Speaker:

they only react after the

Speaker:

fact and they, they're kind of

Speaker:

flying blind and, and they're,

Speaker:

they're doing the basics.

Speaker:

To cyber security and not

Speaker:

really building a cyber

Speaker:

resilient organization.

Speaker:

They're they're like you said,

Speaker:

they're putting in a few different

Speaker:

controls, they got their backup,

Speaker:

you know, they're securing the

Speaker:

perimeter at some level, they

Speaker:

got some firewalls, they've

Speaker:

got whatever basic security

Speaker:

that that is allowing them to,

Speaker:

to kind of run, but they're

Speaker:

not going that extra step.

Speaker:

And let's be honest.

Speaker:

I mean, the cyber criminals,

Speaker:

they're, they're getting lot

Speaker:

smarter, a lot, you know, quicker,

Speaker:

faster, faster, better, faster.

Speaker:

Absolutely.

Speaker:

The tool sets are,

Speaker:

are more advanced.

Speaker:

Absolutely.

Speaker:

And, and they get in.

Speaker:

Right.

Speaker:

And to add to that point

Speaker:

Lu over the last couple of

Speaker:

years, we've seen, we've seen.

Speaker:

Change massive change.

Speaker:

You know, COVID organizations

Speaker:

working from home in the past,

Speaker:

or, you know, employees will go to

Speaker:

work and the ones that work from

Speaker:

home that 10% of the employees with

Speaker:

VPN in, and, you know, you connect

Speaker:

in and you have access you're in

Speaker:

the network and you have access

Speaker:

to everything in the perimeter.

Speaker:

Right, right.

Speaker:

Today with the advent work from

Speaker:

home where 80% of the employees

Speaker:

are working from home and not

Speaker:

going into the office, they're

Speaker:

connecting in, we can have the

Speaker:

same approach and they know

Speaker:

that there there's gonna be more

Speaker:

vulnerability by putting firewall

Speaker:

rule, allowing this person in or

Speaker:

one IP in those things are, are

Speaker:

at it's over the dream's over.

Speaker:

You have to be more continuous.

Speaker:

The advent of zero

Speaker:

trust, not trusting.

Speaker:

Anybody within your organization

Speaker:

has to be put in place because the

Speaker:

cyber criminals, they get in, they

Speaker:

stay in and they scan and they

Speaker:

understand, and they eliminate

Speaker:

your backups and they, and they

Speaker:

understand how you, you know, your

Speaker:

security controls and they attack.

Speaker:

So, you know, organizations

Speaker:

need to understand that this is

Speaker:

critical and overnight you can

Speaker:

lose everything you work for.

Speaker:

So it's key and an.

Speaker:

Could have leveled.

Speaker:

The awareness needs to be raised,

Speaker:

need to put security up front

Speaker:

and center a and, and allocate

Speaker:

those budgets in order to, to

Speaker:

really implement the baselines.

Speaker:

And again, I talk to organization,

Speaker:

I say, where do we start?

Speaker:

There's 13.

Speaker:

Where do we start?

Speaker:

We can successfully

Speaker:

implement the 80 20 rule.

Speaker:

You can achieve 80% of the

Speaker:

benefit from 20% of the effort.

Speaker:

How interesting M FFA, right?

Speaker:

You, you need to have

Speaker:

multifactor authentication.

Speaker:

You can't just have your

Speaker:

users connecting in remotely

Speaker:

and accessing their, their

Speaker:

email on their phone.

Speaker:

On their mobile device.

Speaker:

Doesn't make sense.

Speaker:

They need to double authenticate

Speaker:

it's key and any cyber insurance

Speaker:

policy is gonna ask for it.

Speaker:

Right?

Speaker:

Data protection, data recovery.

Speaker:

You know, MD.

Speaker:

The age of installing McAffee or

Speaker:

again, I don't mean to, to hit

Speaker:

on a, on a don't point, anybody

Speaker:

out, man, don't we friends

Speaker:

to work with these companies,

Speaker:

man, don't point anybody out.

Speaker:

Right?

Speaker:

Right.

Speaker:

The, the day of installing

Speaker:

that antivirus and, you know,

Speaker:

downloading updates and crossing

Speaker:

your fingers where it does

Speaker:

scan it's over, you need to

Speaker:

have manage detection response,

Speaker:

and the cyber insurance is

Speaker:

gonna ask for it without it.

Speaker:

The underwriters will not, will

Speaker:

not, will not register you.

Speaker:

They, they won't give you

Speaker:

the, the cyber insurance.

Speaker:

So, so let's, uh, let's not talk

Speaker:

about cyber insurance, cuz I really

Speaker:

wanna bring that up later, but

Speaker:

I'm glad you, you started talking

Speaker:

about that cuz that's a huge topic.

Speaker:

I don't think we have enough

Speaker:

time to talk all about it

Speaker:

today, but so 80, 20 rule.

Speaker:

That's interesting.

Speaker:

So you're saying implement a

Speaker:

few of these controls and that's

Speaker:

gonna cover you for the most part.

Speaker:

Well it'll.

Speaker:

Yeah, for sure.

Speaker:

It's, it's a good start, right?

Speaker:

Achieve 80% of the benefits

Speaker:

with 20% of the effort.

Speaker:

If you focus on those four that

Speaker:

I, that identified, and, and those

Speaker:

are the four critical security

Speaker:

controls that the cyber insurance

Speaker:

companies are looking for.

Speaker:

Right.

Speaker:

And that's where they see, that's

Speaker:

what they see you being as the most

Speaker:

vulnerable MDR, MFA data protection

Speaker:

and, and incident response.

Speaker:

Those, those are, those

Speaker:

are key and educat.

Speaker:

Again, I'm gonna throw out an

Speaker:

interesting fact Lu, sorry.

Speaker:

I'm I'm doing a lot of the talking

Speaker:

here, but I'm gonna throw out an

Speaker:

interesting fact, 90% of separate

Speaker:

tax come from the end user it's.

Speaker:

So, or through, through an

Speaker:

end user through some end.

Speaker:

Yeah.

Speaker:

Fishing, fishing, not,

Speaker:

not the trout fishing.

Speaker:

No, not the trout.

Speaker:

pH that's pH fishing.

Speaker:

That's right.

Speaker:

pH fishing.

Speaker:

They click on the

Speaker:

email they get in.

Speaker:

You don't know they're in and

Speaker:

again, they start digging.

Speaker:

They start doing more and

Speaker:

more digging they're they're

Speaker:

in network for weeks, right?

Speaker:

They're in your per.

Speaker:

You're in your network for weeks.

Speaker:

And that's, that's the, that's

Speaker:

one thing that a lot of what

Speaker:

we're starting to hear it.

Speaker:

When we talk about backups

Speaker:

with our clients, right?

Speaker:

They want longer retention periods.

Speaker:

They want longer archive periods

Speaker:

because now they're starting to

Speaker:

see even their, their tertiary

Speaker:

backups being vulnerable because

Speaker:

they're not backing up enough data.

Speaker:

So.

Speaker:

But, but let me ask you

Speaker:

this, this framework, this

Speaker:

framework that you're talking

Speaker:

about, it's, it's, it's easy.

Speaker:

It's logical, right?

Speaker:

In my, in my opinion, if you

Speaker:

look at through these, these, and

Speaker:

there's nothing in here, that's

Speaker:

really out of this world, you

Speaker:

know, in terms of, in terms of

Speaker:

the, the, the line items, right?

Speaker:

They're, they're

Speaker:

pretty standard, right?

Speaker:

If you ask any it professional,

Speaker:

they, they, they don't, they

Speaker:

don't need an interpretation

Speaker:

to know what these things are.

Speaker:

How many companies are

Speaker:

actually using this framework.

Speaker:

That's a good question.

Speaker:

That's a good question.

Speaker:

How many companies are,

Speaker:

are actually using it?

Speaker:

I'd say a lot of companies

Speaker:

are using are, are able to

Speaker:

answer, you know, several

Speaker:

of those security control.

Speaker:

How many organizations go in depth.

Speaker:

That's the real question, right?

Speaker:

And why lack of resources.

Speaker:

And we're hearing that a

Speaker:

lot lately organizations,

Speaker:

especially SMEs, small mid-size

Speaker:

organizations, they're, they're

Speaker:

really having a hard time

Speaker:

finding resources, retaining

Speaker:

resources and, and the cost of

Speaker:

resources gone through the roof.

Speaker:

So you need to leverage a managed

Speaker:

service provider or outsource

Speaker:

certain services in order to,

Speaker:

to stay at, at the top of your.

Speaker:

Right.

Speaker:

They don't have enough time, not

Speaker:

enough time to focus on strategic

Speaker:

projects, but they're going

Speaker:

from, you know, they're focused

Speaker:

on reactive versus proactive.

Speaker:

That's the challenge.

Speaker:

And, and you need to overcome

Speaker:

those challenges by partnering

Speaker:

with some, some key strategic

Speaker:

partners that can guide you

Speaker:

and help you along the way.

Speaker:

So in short, not many are using

Speaker:

this specific framework, they're

Speaker:

just using bits and pieces of it.

Speaker:

Well, exactly bits and pieces and,

Speaker:

and, and talking to, you know,

Speaker:

we do, you know, like, you know,

Speaker:

you and I speak to cyber insurance

Speaker:

firms all the time, right?

Speaker:

Cyber insurance, we work

Speaker:

hand in hand with them and.

Speaker:

The message from, from them is that

Speaker:

the cyber insurance underwriters

Speaker:

are not renewing the policies.

Speaker:

So it's an indicator that

Speaker:

insurance companies are in

Speaker:

the business of making money.

Speaker:

So if they're not renewing them,

Speaker:

it means that they're paying

Speaker:

out more than they're receiving.

Speaker:

Well, it means, it means

Speaker:

it means the it's not worth

Speaker:

holding the policy worth,

Speaker:

worth holding the policy.

Speaker:

So if they're not holding the

Speaker:

policy means the companies

Speaker:

are not doing their, their

Speaker:

end of the bargain, which is

Speaker:

putting these controls in.

Speaker:

Yeah.

Speaker:

So, so that, that's

Speaker:

an interesting point.

Speaker:

So let, maybe let's talk

Speaker:

a little bit about cyber

Speaker:

insurance right now.

Speaker:

So we've, we've been a little

Speaker:

bit, I'd say avanguard when it

Speaker:

comes to working with corporations

Speaker:

enterprises on the end user side.

Speaker:

So when it comes to cyber

Speaker:

insurance, the analogy I use

Speaker:

often, and I think now we can

Speaker:

deep dive a little bit into these

Speaker:

conversations is just because

Speaker:

you have a skillset in it.

Speaker:

It doesn't mean that you

Speaker:

deserve a cybersecurity policy,

Speaker:

the analogy of driving a car,

Speaker:

you can, you can drive a car.

Speaker:

I know how to drive a car.

Speaker:

You get an insurance policy, but

Speaker:

if you go out there and you buy

Speaker:

yourself from McLaren and, and

Speaker:

you basically drive it at 300

Speaker:

kilometers an hour or 200 miles

Speaker:

an hour, and you get yourself.

Speaker:

Hurt or, you know, severely

Speaker:

injured just because you don't

Speaker:

know how to drive it properly.

Speaker:

Maybe you're not

Speaker:

worthy of a policy.

Speaker:

Right.

Speaker:

I think that's what we're seeing

Speaker:

more and more from the company

Speaker:

saying, well, show me that you

Speaker:

deserve this policy and maybe

Speaker:

we'll give you one and if not,

Speaker:

well, it's gonna cost you like.

Speaker:

In some cases, two, 300% of

Speaker:

what they were paying last year.

Speaker:

And we're seeing that

Speaker:

we're seeing that, that's

Speaker:

what they're telling us.

Speaker:

Yeah.

Speaker:

Right.

Speaker:

Underwriters are going to 300%

Speaker:

more than what they did last year.

Speaker:

Yeah.

Speaker:

So, so what are the top ones

Speaker:

that, what are the top controls

Speaker:

that, that cyber insurance

Speaker:

policies are recommending?

Speaker:

Uh, Is it back to your 80

Speaker:

20 rule, 80 20 rule, 80 20

Speaker:

rule focused on MFA data

Speaker:

protection, end user awareness.

Speaker:

And maybe I didn't mention

Speaker:

that one before, but end

Speaker:

user awareness training key.

Speaker:

The end user needs to understand

Speaker:

what an email looks like.

Speaker:

Aing email looks like they need

Speaker:

to understand what it is to open

Speaker:

and not open an email where to

Speaker:

click and I'll click which websites

Speaker:

not to go to need to underst.

Speaker:

That's fundamental, right?

Speaker:

Fundamental.

Speaker:

But again, it's, it's, it's simple.

Speaker:

It's a people process technology.

Speaker:

You onboard a new employee.

Speaker:

They need to go to

Speaker:

awareness training.

Speaker:

It it's key every year

Speaker:

and it has to be multi.

Speaker:

Keep your mind them

Speaker:

on a regular basis.

Speaker:

Ransomware is always evolving.

Speaker:

They're trying to find better

Speaker:

and faster ways to get in.

Speaker:

More innovative ways,

Speaker:

really correlating

Speaker:

information upon people.

Speaker:

Sometimes I get some from American

Speaker:

expressing that, you know, my

Speaker:

statements coming up in the next

Speaker:

15 days, it's really targeting.

Speaker:

It's really looks like the real

Speaker:

thing, so they need to be aware.

Speaker:

Okay.

Speaker:

So again, MFA data protection,

Speaker:

employee awareness,

Speaker:

training education.

Speaker:

Yeah.

Speaker:

And last but not least

Speaker:

next generation antivirus.

Speaker:

Right.

Speaker:

Or MD manage detection.

Speaker:

MDR.

Speaker:

Yeah.

Speaker:

MDR key.

Speaker:

Right.

Speaker:

Key.

Speaker:

Yeah.

Speaker:

And those are, those are

Speaker:

pretty simple things to do.

Speaker:

I mean, a funny story, and

Speaker:

again, I'm not gonna point

Speaker:

anybody out when a customer

Speaker:

emailed me a couple of weeks.

Speaker:

Well, maybe a couple months ago.

Speaker:

And he says my, my cyber insurance

Speaker:

company's mandating me to do

Speaker:

cyber security awareness training.

Speaker:

Right.

Speaker:

What did they do?

Speaker:

And so, well, what they didn't

Speaker:

do basically is, so we basically

Speaker:

flipped over a quote over for like

Speaker:

some security awareness training.

Speaker:

And it was literally a

Speaker:

couple thousand dollars,

Speaker:

you know what I mean?

Speaker:

It, it was, and that's what

Speaker:

it costs a lot of companies,

Speaker:

especially, you know, if

Speaker:

you're a hundred employees, 200

Speaker:

employees, you're not paying, you

Speaker:

know, your, your sub sub 10 K.

Speaker:

Right.

Speaker:

And it's like 50 bucks a

Speaker:

year per employee, roughly.

Speaker:

And he literally answered me back

Speaker:

and says, well, can you just gimme

Speaker:

a link to a few YouTube video?

Speaker:

That I can show my employees.

Speaker:

yeah.

Speaker:

Yeah.

Speaker:

I remember this conversation.

Speaker:

Yeah.

Speaker:

And I'm saying, I'm saying it's

Speaker:

like, again, I mean, if you want

Speaker:

someone to drive a car, would

Speaker:

you send them to your uncle Bob

Speaker:

to learn how to drive a car?

Speaker:

Would you send 'em to an

Speaker:

actual school to learn how

Speaker:

to drive the car property?

Speaker:

It's just sad to see that

Speaker:

sometimes people don't take it

Speaker:

serious and that's a fundamental.

Speaker:

Control that you can put in

Speaker:

place and it's, it's gonna pay,

Speaker:

pay itself off, you know, 10

Speaker:

X in the event that some kind

Speaker:

of ran more tries to get in.

Speaker:

So it's, it's just sad to see.

Speaker:

And we, we just noticed we

Speaker:

have a couple of comments

Speaker:

that are coming in.

Speaker:

Yeah.

Speaker:

You know what?

Speaker:

I was looking at the, I was

Speaker:

looking at the common board.

Speaker:

I'm gonna go ahead.

Speaker:

And the last one's

Speaker:

interesting, right?

Speaker:

Even C season security

Speaker:

professionals and, and like

Speaker:

the example that I gave, right.

Speaker:

They're getting better and better

Speaker:

make errors on email quick.

Speaker:

You need not only to train your

Speaker:

users, but also have the te.

Speaker:

To deal with the

Speaker:

inevitable false positives.

Speaker:

Right.

Speaker:

It's the truth.

Speaker:

Yeah, yeah, yeah, yeah.

Speaker:

Yeah.

Speaker:

So, so essentially like,

Speaker:

People process technology.

Speaker:

I think we just need to, we

Speaker:

just need to make sure that

Speaker:

you've put that in place

Speaker:

and you're continuously

Speaker:

measure and check in on them.

Speaker:

The plan do check act.

Speaker:

I know we talk a little bit

Speaker:

about that when we're doing our,

Speaker:

our, you know, our due diligence

Speaker:

internally for certain things, but

Speaker:

you have to make sure that people

Speaker:

are aware and, and whether they're

Speaker:

new employees, older employees,

Speaker:

I think everyone could be victim

Speaker:

anyone's, you know, vulnerable.

Speaker:

So it's becomes responsive and,

Speaker:

and ultimately who's responsible.

Speaker:

Look, we've been it professionals

Speaker:

for a long time and.

Speaker:

You could see it from

Speaker:

my wrinkles there.

Speaker:

See?

Speaker:

Yeah.

Speaker:

well, no, but, but let's

Speaker:

be, let's be clear.

Speaker:

Right.

Speaker:

You know, like there's so

Speaker:

many things going on, right?

Speaker:

Like if you're a traditional

Speaker:

it professional on the system

Speaker:

administration side, you've

Speaker:

got to deal with a whole

Speaker:

bunch of different things.

Speaker:

You're securing, you're patching.

Speaker:

You're, you're dealing

Speaker:

with new deployments.

Speaker:

You're, you're tearing down,

Speaker:

you're bringing stuff up.

Speaker:

There's so much stuff going

Speaker:

on in your day that you

Speaker:

probably don't have the

Speaker:

ability to prioritize security.

Speaker:

Then you've got the

Speaker:

security folks who are.

Speaker:

often, you know, trying to

Speaker:

push security down into design

Speaker:

of everything they do, right?

Speaker:

Yeah.

Speaker:

And then, and then you've

Speaker:

got the executives who just

Speaker:

want you to do more with less

Speaker:

deliver, deliver, deliver.

Speaker:

Right, right.

Speaker:

Do more with less.

Speaker:

So, so ultimately I, you know, I,

Speaker:

it makes me wonder, like, how do

Speaker:

you, how do you kind of segment

Speaker:

that and how do you break into

Speaker:

the fact that you need the buy-in

Speaker:

and you need the, the stakeholders

Speaker:

and you need the business to

Speaker:

really set aside the budget.

Speaker:

It's funny how we, when we

Speaker:

talk to compliance people in an

Speaker:

organization, all of a sudden,

Speaker:

like budget frees, We talk about

Speaker:

compliance privacy data, privacy

Speaker:

budget becomes a non-issue.

Speaker:

But when we're talking about

Speaker:

technology specifically bits and

Speaker:

bites and speeds and feeds, it's

Speaker:

like everyone kind of like says,

Speaker:

well, we'll deal what we have.

Speaker:

We're good.

Speaker:

You know, I don't have time

Speaker:

to implement something new.

Speaker:

Yeah, so definitely

Speaker:

it's, it's challenging.

Speaker:

And I think the, the awareness

Speaker:

that, you know, what we're

Speaker:

seeing today in the media,

Speaker:

right, we're seeing these cyber

Speaker:

attacks happen, you know, the

Speaker:

war with Ukraine and Russia

Speaker:

and, and the advent of the cyber

Speaker:

attacks are creating awareness.

Speaker:

So I think, you know, when

Speaker:

awareness comes the ability

Speaker:

to take it more seriously, an

Speaker:

organization to understand that

Speaker:

they can lose what they built.

Speaker:

You know what they put in place,

Speaker:

sweat equity, we call it that sweat

Speaker:

equity that they put in place the

Speaker:

small and mid-size organizations

Speaker:

can lose that overnight.

Speaker:

And they have to understand

Speaker:

that this is a serious threat.

Speaker:

So I'm gonna leave

Speaker:

you off with this.

Speaker:

I think we encourage organization

Speaker:

to implement as many of these

Speaker:

baselines controls as possible.

Speaker:

We know, and we understand

Speaker:

that not every kinda

Speaker:

organization can implement

Speaker:

every control, but we suggest.

Speaker:

You just focus on MFA data

Speaker:

protection, MDR incident

Speaker:

response awareness training.

Speaker:

As, as the, the 80 20 rule that

Speaker:

I mentioned earlier in the,

Speaker:

in the call visit cyber dot.

Speaker:

gc.ca to reference those 13

Speaker:

security points for assurance

Speaker:

is there to help you through

Speaker:

that journey where we help

Speaker:

organizations bridge that gap

Speaker:

and become more cyber resilient.

Speaker:

You did very good

Speaker:

on the blog there.

Speaker:

I like the blog.

Speaker:

I'm gonna, I'm gonna plug your

Speaker:

blog cuz you put a very good blog

Speaker:

out on our website, which talks.

Speaker:

An in depth about the

Speaker:

13, the 13 controls.

Speaker:

I think it's worth a read because

Speaker:

you really went into each one and,

Speaker:

and anyone who's starting their

Speaker:

journey, even if they're, you

Speaker:

know, they think they're halfway

Speaker:

through their journey or starting

Speaker:

their journey, they can read

Speaker:

through it and they can kind of

Speaker:

get a quick idea of what, what it

Speaker:

takes to, to get, to get started.

Speaker:

A lot of these points

Speaker:

are logical folks.

Speaker:

They're not, this is not.

Speaker:

This is not a rocket science

Speaker:

in any way or stretch.

Speaker:

It's really something that that's

Speaker:

palatable, you know, prioritize

Speaker:

what you need to do, speak to

Speaker:

your executives about, you know,

Speaker:

getting, getting serious about

Speaker:

your cyber resilience journey.

Speaker:

It's really worth the

Speaker:

investment of time.

Speaker:

And, and maybe a little

Speaker:

bit of money of course,

Speaker:

because it takes money to,

Speaker:

to pay for these solutions.

Speaker:

But yeah, I mean, this is, I, I

Speaker:

hope we made our point across.

Speaker:

I think with that, we're

Speaker:

gonna let you guys go.

Speaker:

Awesome.

Speaker:

And thanks everyone for,

Speaker:

for have a good weekend.

Speaker:

All right.

Speaker:

Thank you.

Speaker:

Thank you.

Speaker:

Bye bye.

Speaker:

Thank you for listening

Speaker:

to 10 questions to cyber.

Speaker:

Brought to you by

Speaker:

assurance it assurance.

Speaker:

It is in the cybersecurity

Speaker:

space, specializing in data

Speaker:

protection and compliance

Speaker:

since 2011, they primarily help

Speaker:

mid-sized enterprises in Canada.

Speaker:

If you have questions about

Speaker:

protecting your data, reach out to

Speaker:

us directly at info@assuranceit.ca

Next Episode All Episodes Previous Episode
Show artwork for 10 Questions to Cyber Resilience

About the Podcast

10 Questions to Cyber Resilience
Cyber resilience is the ultimate IT goal for every business. Twice per month, join Assurance IT as they discuss various cyber security topics with IT leaders to help you get closer to your cyber security goals. Each episode includes best practices that can be applied to your enterprise. Cyber resilience is a collaborative effort; let's work toward it together!