Time
2 hours 9 minutes
Difficulty
Beginner
CEU/CPE
2

Video Transcription

00:00
welcome back to acid security course. And in this final module, I'm going to talk about differences in approach between small, medium and large businesses when it comes to asset security and pretty much any kind of security topic that you can
00:16
come up to in the every day's business.
00:20
So, um,
00:22
uh, I'm going to especially
00:26
focus on how does SMB work unless it protection small media businesses and how large businesses working the protections. And I'm going to take just the example off. What happens if there there was a bridge
00:42
and what do we know do now? Because this is the situation. So if there is no bridge, everything is working perfectly, and we shouldn't be focusing on anything. So we are. I'm going to talk about what happens if you have breach. And these examples I'm giving you from my own personal experience
00:59
because I have bean in situations to consult companies and people
01:03
after the breaches.
01:06
So, in small medium business, everybody who is involved, even those who are not involved, are placed in one in one room, one table.
01:15
Somebody who is in charge does the forensics. It can be outside person.
01:19
Um,
01:22
so if they can't find the cause they hired outside help to do the forensics.
01:27
Now, when they identify the issue,
01:32
the next step is still sit and find a solution,
01:34
and they usually examine entire defense.
01:40
They're not afraid to bring whoever is needed in the situation, because
01:45
they say, Okay, we we were not smart enough.
01:49
Nobody's especially to blame because they work as a team. Not as Ah is a
01:55
verticals.
01:57
Off course. They try not to spend too much money. This is also something that's my experience.
02:04
Then they agree. Who is going to do what?
02:07
And then they say, Let's go to work and in the end they do the testing on your solution,
02:15
and that's it.
02:19
So, uh, things that they're really good at is if they can find the cause, they can high right side help.
02:28
They do examine the entire difference, even if
02:32
yeah,
02:34
they are think they were thinking that it was good
02:38
and bringing somebody from the outside is never a problem,
02:44
and these people usually tend to find relatively cheap solutions for the problem They had
02:53
also, they can agree easily. Who is going to do what?
02:58
So these things function purpose perfectly where they can have the issue is forensics, so they usually have to hire some outside. How? Because they don't have Specialist focusing on forensics
03:10
and, UM,
03:13
let's get to work. Part is sometimes slow because
03:16
sometimes two people tend to do the same thing instead of everybody getting their own focused group of tasks.
03:27
Testing the solution is usually done very well in this, and
03:32
now when we look at the large business, we have a different approach again, they said to the table,
03:38
and the first thing is, uh, they tried to find Who's to blame
03:44
on it's Ah, it's a logical people reaction because everybody is holding their part of the What's a frontline and they want to see who made the mistake because everybody is afraid of their jobs
03:59
for their jobs. And
04:01
then, uh,
04:03
they usually try to do, for instance, by themselves.
04:08
Then what's usually happening in that there is a report. It's written and sent to
04:13
the chief of security information off. There seems security information after officer
04:18
on. Then he creates election plan for CEO and C E. O,
04:25
and then CEO and his team create cost analysis is
04:29
and then CEO and CFO usually have to choose between, and this is a difficult thing in big companies. So have avoidance, transparency, medication or acceptance off risk.
04:44
Um,
04:46
so
04:46
when you're trendy, been so avoidance, you try to find a way to simply
04:54
ban something and then there is no more risk if you can do it in that way. If it's transference, then for example, you can sure something again for some against something like this. So if it happens again then
05:08
then you're covered any. Any financial damage you covered, you can accept the risk there. OK, it was a very small Bridget costed us. I don't know 20 k and were multi $1,000,000,000 company. So we can live with that
05:25
or they can do the mitigation and say OK, whatever is done by the team and
05:33
security information officer proposed to CEO, and they realize that it's it's makes sense to do the mitigation. Then they find a way to prevent everything from happening ever again for next time.
05:47
And if they choose the mitigation, then see Io is given instructions to create delivery plan
05:55
and then changes. They are implemented. Sometimes they do the testing. Sometimes they don't because sometimes they simply don't have the manpower, cost cutting budget. The restrictions
06:09
and, um,
06:12
what they really do well in big companies is forensics because they have people who can do that.
06:18
Um, and cost analyses is done perfectly,
06:24
and when instructions are given to the mitigations, then it runs through the verticals quickly and efficiently.
06:33
So these are the differences in approach. You see that large businesses air, usually slower
06:41
in the
06:42
mitigating. The problem the and sometimes they choose to avoid it or just to accept it and say, OK, this is acceptable risk. It's not too much money. If somebody does it like once a month.
07:00
It's 20 k and 20 K's a pedicure for us. Who cares?
07:04
Which is usually the wrong strategy, because if there is a smolder opened in inside the company's network,
07:13
it's usually it tends to get bigger in time.
07:17
And, uh, so So these are the good things and bad things in small and companies.
07:26
So
07:27
in this video, I have been talking about how these post briefs and post breach scenarios ah, workout in small medium businesses and in large businesses

Up Next

Asset Security Fundamentals

As a cybersecurity professional, it's often your responsibility to set security standards for your organization. In the Asset Security Fundamentals course, you will identify what types of assets need protection and the job roles that are involved.

Instructed By

Instructor Profile Image
Milan Cetic
IT Security Consultant
Instructor