2 hours 39 minutes
welcome back to acid security course. And in this final module, I'm going to talk about differences in approach between small, medium and large businesses when it comes to asset security and pretty much any kind of security topic that you can
come up to in the every day's business.
uh, I'm going to especially
focus on how does SMB work unless it protection small media businesses and how large businesses working the protections. And I'm going to take just the example off. What happens if there there was a bridge
and what do we know do now? Because this is the situation. So if there is no bridge, everything is working perfectly, and we shouldn't be focusing on anything. So we are. I'm going to talk about what happens if you have breach. And these examples I'm giving you from my own personal experience
because I have bean in situations to consult companies and people
after the breaches.
So, in small medium business, everybody who is involved, even those who are not involved, are placed in one in one room, one table.
Somebody who is in charge does the forensics. It can be outside person.
so if they can't find the cause they hired outside help to do the forensics.
Now, when they identify the issue,
the next step is still sit and find a solution,
and they usually examine entire defense.
They're not afraid to bring whoever is needed in the situation, because
they say, Okay, we we were not smart enough.
Nobody's especially to blame because they work as a team. Not as Ah is a
Off course. They try not to spend too much money. This is also something that's my experience.
Then they agree. Who is going to do what?
And then they say, Let's go to work and in the end they do the testing on your solution,
and that's it.
So, uh, things that they're really good at is if they can find the cause, they can high right side help.
They do examine the entire difference, even if
they are think they were thinking that it was good
and bringing somebody from the outside is never a problem,
and these people usually tend to find relatively cheap solutions for the problem They had
also, they can agree easily. Who is going to do what?
So these things function purpose perfectly where they can have the issue is forensics, so they usually have to hire some outside. How? Because they don't have Specialist focusing on forensics
let's get to work. Part is sometimes slow because
sometimes two people tend to do the same thing instead of everybody getting their own focused group of tasks.
Testing the solution is usually done very well in this, and
now when we look at the large business, we have a different approach again, they said to the table,
and the first thing is, uh, they tried to find Who's to blame
on it's Ah, it's a logical people reaction because everybody is holding their part of the What's a frontline and they want to see who made the mistake because everybody is afraid of their jobs
for their jobs. And
they usually try to do, for instance, by themselves.
Then what's usually happening in that there is a report. It's written and sent to
the chief of security information off. There seems security information after officer
on. Then he creates election plan for CEO and C E. O,
and then CEO and his team create cost analysis is
and then CEO and CFO usually have to choose between, and this is a difficult thing in big companies. So have avoidance, transparency, medication or acceptance off risk.
when you're trendy, been so avoidance, you try to find a way to simply
ban something and then there is no more risk if you can do it in that way. If it's transference, then for example, you can sure something again for some against something like this. So if it happens again then
then you're covered any. Any financial damage you covered, you can accept the risk there. OK, it was a very small Bridget costed us. I don't know 20 k and were multi $1,000,000,000 company. So we can live with that
or they can do the mitigation and say OK, whatever is done by the team and
security information officer proposed to CEO, and they realize that it's it's makes sense to do the mitigation. Then they find a way to prevent everything from happening ever again for next time.
And if they choose the mitigation, then see Io is given instructions to create delivery plan
and then changes. They are implemented. Sometimes they do the testing. Sometimes they don't because sometimes they simply don't have the manpower, cost cutting budget. The restrictions
what they really do well in big companies is forensics because they have people who can do that.
Um, and cost analyses is done perfectly,
and when instructions are given to the mitigations, then it runs through the verticals quickly and efficiently.
So these are the differences in approach. You see that large businesses air, usually slower
mitigating. The problem the and sometimes they choose to avoid it or just to accept it and say, OK, this is acceptable risk. It's not too much money. If somebody does it like once a month.
It's 20 k and 20 K's a pedicure for us. Who cares?
Which is usually the wrong strategy, because if there is a smolder opened in inside the company's network,
it's usually it tends to get bigger in time.
And, uh, so So these are the good things and bad things in small and companies.
in this video, I have been talking about how these post briefs and post breach scenarios ah, workout in small medium businesses and in large businesses
Intermediate PC Security
The Intermediate PC Security course will teach students about endpoint protection. Students will learn ...
4 CEU/CPE Hours Available
Certificate of Completion Offered
MTA 98-367 Security Fundamentals
The Microsoft Technology Associate (MTA) is Microsoft’s newest suite of technology certification exams that validate ...
2 CEU/CPE Hours Available
Certificate of Completion Offered