Master Cover | 1 |
A. Agenda | 2 |
C. Why Should We Consider Cyber Insurance | 9 |
D. Cybersecurity is a Board Level Leadership I | 18 |
F. Table Top Exercises | 29 |
Slide 1 | 29 |
Slide 2 | 30 |
Slide 3 | 31 |
Slide 4 | 32 |
Slide 5 | 33 |
Slide 6 | 34 |
Slide 7 | 35 |
Slide 8 | 36 |
Slide 9 | 37 |
Slide 10 | 38 |
Slide 11 | 39 |
Slide 12 | 40 |
Slide 13 | 41 |
Slide 14 | 42 |
Slide 15 | 43 |
Slide 16 | 44 |
Slide 17 | 45 |
Slide 18 | 46 |
Slide 19 | 47 |
Slide 20 | 48 |
Slide 21 | 49 |
Slide 22 | 50 |
Slide 23 | 51 |
Slide 24 | 52 |
Slide 25 | 53 |
Slide 26 | 54 |
Slide 27 | 55 |
Slide 28 | 56 |
Slide 29 | 57 |
Slide 30 | 58 |
Slide 31 | 59 |
Slide 32 | 60 |
Slide 33 | 61 |
Slide 34 | 62 |
Slide 35 | 63 |
Slide 36 | 64 |
Slide 37 | 65 |
Slide 38 | 66 |
Slide 39 | 67 |
Slide 40 | 68 |
Slide 41 | 69 |
Slide 42 | 70 |
Slide 43 | 71 |
G. How to structure and oversee a Purple team engagement | 72 |
Opening and overview | 72 |
Slide 1 | 72 |
Slide 2 | 73 |
Slide 3 | 74 |
Foundation and definitions | 75 |
Slide 4 | 75 |
Slide 5 | 76 |
Slide 6 | 77 |
Slide 7 | 78 |
How it's different | 79 |
Slide 8 | 79 |
Slide 9 | 80 |
Slide 10 | 81 |
Slide 11 | 82 |
Slide 12 | 83 |
Slide 13 | 84 |
Slide 14 | 85 |
Slide 15 | 86 |
Slide 16 | 87 |
Slide 17 | 88 |
Maximizing security investments | 89 |
Slide 18 | 89 |
Critical practices to include | 90 |
Slide 25 | 90 |
Slide 26 | 91 |
Slide 27 | 92 |
Slide 28 | 93 |
Slide 29 | 94 |
Closing thoughts and Q&A | 95 |
Slide 31 | 95 |
Slide 32 | 96 |
Slide 33 | 97 |
H. How to plan and include incident response | 98 |
Slide 1 | 98 |
Slide 2 | 99 |
Slide 3 | 100 |
Slide 4 | 101 |
Slide 5 | 102 |
Slide 6 | 103 |
Slide 7 | 104 |
Slide 8 | 105 |
Slide 9 | 106 |
Slide 10 | 107 |
Slide 11 | 108 |
Slide 12 | 109 |
Slide 13 | 110 |
Slide 14 | 111 |
Slide 15 | 112 |
Slide 16 | 113 |
Slide 17 | 114 |
Slide 18 | 115 |
Slide 19 | 116 |
Slide 20 | 117 |
Slide 21 | 118 |
Slide 22 | 119 |
Slide 23 | 120 |
Slide 24 | 121 |
Slide 25 | 122 |
Slide 26 | 123 |
Slide 27 | 124 |
Slide 28 | 125 |
Slide 29 | 126 |
Slide 30 | 127 |
Slide 31 | 128 |
Slide 32 | 129 |
Slide 33 | 130 |
Slide 34 | 131 |
Slide 35 | 132 |
Slide 36 | 133 |
Slide 37 | 134 |
Slide 38 | 135 |
Slide 39 | 136 |
Slide 40 | 137 |
Slide 41 | 138 |
Slide 42 | 139 |
Slide 43 | 140 |
Slide 44 | 141 |
Slide 45 | 142 |
Slide 46 | 143 |
Slide 47 | 144 |
Slide 48 | 145 |
Slide 49 | 146 |
Slide 50 | 147 |
Slide 51 | 148 |
Slide 52 | 149 |
Slide 53 | 150 |
Slide 54 | 151 |
Slide 55 | 152 |
Slide 56 | 153 |
I. Securing the human and how to increase a casino’s resistance | 154 |
Opening and overview | 154 |
Slide 1 | 154 |
Slide 2 | 155 |
Slide 3 | 156 |
Introduction to social engineeering | 157 |
Slide 4 | 157 |
Slide 5 | 158 |
Slide 6 | 159 |
Slide 7 | 160 |
Slide 8 | 161 |
Slide 9 | 162 |
Email phishing | 163 |
Slide 10 | 163 |
Slide 11 | 164 |
Slide 12 | 165 |
Slide 13 | 166 |
Slide 14 | 167 |
Microsoft Teams | 168 |
Slide 15 | 168 |
Slide 16 | 169 |
Slide 17 | 170 |
Vishing | 171 |
Slide 18 | 171 |
Slide 19 | 172 |
Slide 20 | 173 |
Slide 21 | 174 |
In-person | 175 |
Slide 22 | 175 |
Slide 23 | 176 |
Slide 24 | 177 |
Slide 25 | 178 |
Slide 26 | 179 |
Closing thoughts and Q&A | 180 |
Slide 27 | 180 |
Slide 28 | 181 |
Slide 29 | 182 |
Closing and call to action | 183 |
Slide 30 | 183 |
J. Is my Casino at Risk from a Ransomware Attack | 184 |
K. Top 20 Security Controls for Maximum Casino | 205 |
Made with FlippingBook - Online catalogs