83
2013 Cyber Attack & Business Continuity Simulation Georgia Tech Ferst Center 19 February 2013 Kelsey The Webinar FINAL

Georgia Tech Ferst Center 19 February 2013 Kelsey FINAL

Embed Size (px)

Citation preview

  • Slide 1
  • Slide 2
  • Georgia Tech Ferst Center 19 February 2013 Kelsey FINAL
  • Slide 3
  • Promotional Video
  • Slide 4
  • Slide 5
  • Website Down Power Outage Explosion SNOW and ICE Industrial Espionage Hurricane Delivery Vehicles Blocked Flood Plane Crash Tornado Vandalism Strike Fire Epidemic TRAIN WRECK Product Tampering Extortion Chemical spill tsunami Promotional Video
  • Slide 6
  • Slide 7
  • Cyber Exercises Promotional Video
  • Slide 8
  • Slide 9
  • Slide 10
  • Top C-Level Executives, Senior Managers and Security Practitioners Promotional Video
  • Slide 11
  • Control Losses Save GNNs Brand Restore Viewer & Shareholder Confidence Management Dream Team Promotional Video
  • Slide 12
  • Slide 13
  • Slide 14
  • Slide 15
  • Welcome Kelsey Kelsey Bouton
  • Slide 16
  • Welcome Kelsey Roy Hadley Kelsey Bouton
  • Slide 17
  • Welcome Kelsey Cyber Exercises Jim CavanaghRoy Hadley Kelsey Bouton
  • Slide 18
  • Welcome Kelsey Cyber Exercises Kelsey Bouton
  • Slide 19
  • Background Jim Hundreds each month
  • Slide 20
  • Background Jim Hundreds each month NDA or Classified
  • Slide 21
  • Background Roy Hundreds each month NDA or Classified Simulation for All Businesses
  • Slide 22
  • Background Jim Hundreds each month NDA or Classified Simulation for All Businesses Different Perspective
  • Slide 23
  • Background Jim Hundreds each month NDA or Classified Simulation for All Businesses Different Perspective There is something to be learned for all business segments
  • Slide 24
  • Background Roy Hundreds each month NDA or Classified Simulation for All Businesses Different Perspective There is something to be learned for all business segments Annual Event: Different/Current Scenario
  • Slide 25
  • Background Jim Collaborative Blog
  • Slide 26
  • Background Jim Backgrounder Collaborative Blog
  • Slide 27
  • Background Roy Briefing Backgrounder Collaborative Blog
  • Slide 28
  • Background Roy Briefing Backgrounder Collaborative Blog Simulation
  • Slide 29
  • Background Jim Briefing Backgrounder Collaborative Blog Simulation
  • Slide 30
  • Background Kelsey Briefing Backgrounder Collaborative Blog Simulation
  • Slide 31
  • Background Roy Briefing Backgrounder Collaborative Blog Simulation
  • Slide 32
  • Background Roy Briefing Backgrounder Collaborative Blog Simulation Debrief LESSONS LEARNED Debrief
  • Slide 33
  • Background Kelsey Recovery Reception
  • Slide 34
  • Background Roy Recovery Reception
  • Slide 35
  • Background Jim Recovery Reception
  • Slide 36
  • Event Kelsey Event Details
  • Slide 37
  • Event Roy Registration Opens Registration Opens at 7:00
  • Slide 38
  • Event Kelsey Registration Opens Continental Breakfast Served
  • Slide 39
  • Event Roy Registration Opens Continental Breakfast Served
  • Slide 40
  • Welcome / Program Overview Event Jim 8:00 to 8:20
  • Slide 41
  • Event Jim 8:00 to 8:20 The most important fictional news source in the world! Welcome / Program Overview
  • Slide 42
  • Need to Know vs Duty to Share Event Roy 8:20 to 8:30
  • Slide 43
  • Data Breach Investigation Report Event Jim 8:30 to 9:30
  • Slide 44
  • Bad Actors: Motivations & Profiles Event Roy 9:45 to 10:15
  • Slide 45
  • The Advanced Persistent Threat & GNN Event Jim 10:15 to 11:00
  • Slide 46
  • Intentional Electromagnetic Interference Event Roy 11:00 to 12:00 Photos courtesy US Navy.
  • Slide 47
  • Event Kelsey 12:00 to 12:30
  • Slide 48
  • Event Roy Registration Opens Data Breach Investigation Report Welcome / Program Overview Need to Know vs Duty to Share Bad Actors: Motivations & Profiles The Advanced Persistent Threat & GNN Intentional Electromagnetic Interference LUNCH 12:00 to 12:30
  • Slide 49
  • Color Guard Event Roy 12:30 to 12:33
  • Slide 50
  • Color Guard Event Jim 12:30 to 12:33
  • Slide 51
  • Color Guard Event Jim 12:30 to 12:33
  • Slide 52
  • Color Guard Event Jim 12:30 to 12:33 HSEEP
  • Slide 53
  • Simulation Welcome Event Roy 12:33 to 1:00
  • Slide 54
  • Scenario Overview Event Roy 1:00 to 1:28
  • Slide 55
  • Slide 56
  • Simulation Event Kelsey 1:28 to 3:30
  • Slide 57
  • Simulation Event Kelsey 1:28 to 3:30
  • Slide 58
  • Simulation Event Jim 1:28 to 3:30
  • Slide 59
  • Simulation Event Jim 1:28 to 3:30
  • Slide 60
  • Simulation Event Jim 1:28 to 3:30
  • Slide 61
  • Self Assessment Event Jim 3:30 to 3:45
  • Slide 62
  • Lessons Learned Event Jim 3:45 to 5:00
  • Slide 63
  • Recovery Reception Event Roy Recovery Reception
  • Slide 64
  • Event Kelsey Registration Opens Data Breach Investigation Report Welcome / Program Overview Need to Know vs Duty to Share Bad Actors: Motivations & Profiles The Advanced Persistent Threat & GNN Intentional Electromagnetic Interference LUNCH Color Guard Simulation Welcome Scenario Overview Simulation Self Assessment Lessons Learned Adjourn Recovery Reception
  • Slide 65
  • Welcome Roy
  • Slide 66
  • Affiliated Associations Roy
  • Slide 67
  • Affiliated Associations Roy
  • Slide 68
  • Affiliated Associations Roy
  • Slide 69
  • Affiliated Associations
  • Slide 70
  • Roy Affiliated Associations
  • Slide 71
  • Roy Affiliated Associations
  • Slide 72
  • Roy Affiliated Associations
  • Slide 73
  • Roy Affiliated Associations
  • Slide 74
  • Vendors & Sponsors Jim
  • Slide 75
  • Vendors & Sponsors Jim
  • Slide 76
  • Vendors & Sponsors Jim
  • Slide 77
  • Vendors & Sponsors Jim
  • Slide 78
  • Vendors & Sponsors Jim
  • Slide 79
  • Vendors & Sponsors Jim
  • Slide 80
  • Vendors & Sponsors Jim
  • Slide 81
  • Vendors & Sponsors Jim
  • Slide 82
  • Q&A Kelsey
  • Slide 83
  • Event Kelsey Registration Opens Data Breach Investigation Report Welcome / Program Overview Need to Know vs Duty to Share Bad Actors: Motivations & Profiles The Advanced Persistent Threat & GNN Intentional Electromagnetic Interference LUNCH Color Guard Simulation Welcome Scenario Overview Simulation Self Assessment Lessons Learned Adjourn Recovery Reception
  • Slide 84