Cybersecurity Cover Design | 1 |
Meet the Presenters | 2-3 |
A. Agenda | 24 |
B. Threat Landscapes - Overview Trends | 26-27 |
Slide Number 1 | 26-27 |
The National Indian Gaming Commission’s Four Agency-Wide Focus Areas | 28-29 |
Factors Shaping the NIGC Perspective on Preparedness in the Cyber Security Area | 30-31 |
Common Goals Among NIGC Cyber Initiatives | 32-33 |
NIGC Cyber Security Awareness In Ocotober www.NIGC.gov | 34-35 |
The NIGC Year-Long Campaign Promotes #NIGC3For35 | 36-37 |
The NIGC Cyber Security Symposium www.NIGC.gov | 38-39 |
The NIGC Cyber Resource Page Updates www.NIGC.gov | 40-41 |
Thank You For Supporting And Following The NIGC’s Outreach And Resource | 42-43 |
C. Cybersecurity is a Board Level Leadership Imperative | 44-45 |
D. Cyber Insurance Landscape | 76 |
E. What are the Crown Jewels that Protect | 80-81 |
F. Human Firewall | 128-129 |
G. Mapping the MICS to the NIST Framework | 226-227 |
Mapping the MICS to the NIST Framework Building a Strong Security Foundation Indian Gaming Association Cybersecurity Training Thursday, October 20, 2022 9:00 am – 10:30 am | 226-227 |
Slide Number 2 | 228-229 |
Untangling the Myriad of Standards & Regulations | 230-231 |
Side by Side – They All Have the Same Elements | 232-233 |
The Good News | 234-235 |
Slide Number 6 | 236-237 |
Common Requirements & Mapping: | 238-239 |
Policies, Procedures & Standards are the Foundation of any Information Security & Assurance Program | 240-241 |
Don’t Start from Scratch! | 242-243 |
Slide Number 10 | 244-245 |
Slide Number 11 | 246-247 |
Slide Number 12 | 248-249 |
Examples of Compensating Controls | 250-251 |
Configuration Management | 252-253 |
Why did I pick those two examples? | 254-255 |
Assurance: Make it Secure, Make it Audit-Proof | 256-257 |
Assurance: Make it Secure, Make it Audit-Proof | 258-259 |
Questions? renita@2nd-derivative.com | 260-261 |
H. Essential Elements of a Cybersecurity Compliance Program | 262-263 |
I. What is Security as a Service | 308-309 |
J. Digital Payment Security - What you Need to Know | 350-351 |
K. Table Top Ransomware | 416-417 |
L. Are you Prepared to Get Hackes? | 486-487 |
Made with FlippingBook - Online catalogs