09161824 - Master Cybersecurity


Master Cover
1

A. Agenda
2

C. Why Should We Consider Cyber Insurance
9

D. Cybersecurity is a Board Level Leadership I
18

F. Table Top Exercises
29

Slide 1
29

Slide 2
30

Slide 3
31

Slide 4
32

Slide 5
33

Slide 6
34

Slide 7
35

Slide 8
36

Slide 9
37

Slide 10
38

Slide 11
39

Slide 12
40

Slide 13
41

Slide 14
42

Slide 15
43

Slide 16
44

Slide 17
45

Slide 18
46

Slide 19
47

Slide 20
48

Slide 21
49

Slide 22
50

Slide 23
51

Slide 24
52

Slide 25
53

Slide 26
54

Slide 27
55

Slide 28
56

Slide 29
57

Slide 30
58

Slide 31
59

Slide 32
60

Slide 33
61

Slide 34
62

Slide 35
63

Slide 36
64

Slide 37
65

Slide 38
66

Slide 39
67

Slide 40
68

Slide 41
69

Slide 42
70

Slide 43
71

G. How to structure and oversee a Purple team engagement
72

Opening and overview
72

Slide 1
72

Slide 2
73

Slide 3
74

Foundation and definitions
75

Slide 4
75

Slide 5
76

Slide 6
77

Slide 7
78

How it's different
79

Slide 8
79

Slide 9
80

Slide 10
81

Slide 11
82

Slide 12
83

Slide 13
84

Slide 14
85

Slide 15
86

Slide 16
87

Slide 17
88

Maximizing security investments
89

Slide 18
89

Critical practices to include
90

Slide 25
90

Slide 26
91

Slide 27
92

Slide 28
93

Slide 29
94

Closing thoughts and Q&A
95

Slide 31
95

Slide 32
96

Slide 33
97

H. How to plan and include incident response
98

Slide 1
98

Slide 2
99

Slide 3
100

Slide 4
101

Slide 5
102

Slide 6
103

Slide 7
104

Slide 8
105

Slide 9
106

Slide 10
107

Slide 11
108

Slide 12
109

Slide 13
110

Slide 14
111

Slide 15
112

Slide 16
113

Slide 17
114

Slide 18
115

Slide 19
116

Slide 20
117

Slide 21
118

Slide 22
119

Slide 23
120

Slide 24
121

Slide 25
122

Slide 26
123

Slide 27
124

Slide 28
125

Slide 29
126

Slide 30
127

Slide 31
128

Slide 32
129

Slide 33
130

Slide 34
131

Slide 35
132

Slide 36
133

Slide 37
134

Slide 38
135

Slide 39
136

Slide 40
137

Slide 41
138

Slide 42
139

Slide 43
140

Slide 44
141

Slide 45
142

Slide 46
143

Slide 47
144

Slide 48
145

Slide 49
146

Slide 50
147

Slide 51
148

Slide 52
149

Slide 53
150

Slide 54
151

Slide 55
152

Slide 56
153

I. Securing the human and how to increase a casino’s resistance
154

Opening and overview
154

Slide 1
154

Slide 2
155

Slide 3
156

Introduction to social engineeering
157

Slide 4
157

Slide 5
158

Slide 6
159

Slide 7
160

Slide 8
161

Slide 9
162

Email phishing
163

Slide 10
163

Slide 11
164

Slide 12
165

Slide 13
166

Slide 14
167

Microsoft Teams
168

Slide 15
168

Slide 16
169

Slide 17
170

Vishing
171

Slide 18
171

Slide 19
172

Slide 20
173

Slide 21
174

In-person
175

Slide 22
175

Slide 23
176

Slide 24
177

Slide 25
178

Slide 26
179

Closing thoughts and Q&A
180

Slide 27
180

Slide 28
181

Slide 29
182

Closing and call to action
183

Slide 30
183

J. Is my Casino at Risk from a Ransomware Attack
184

K. Top 20 Security Controls for Maximum Casino
205

Made with FlippingBook - Online catalogs