Top Cybersecurity Management Questions Answered  

Top Questions About Cybersecurity Management Answered

Cybersecurity management may seem complicated and, let’s face it, it often is. But even without a degree in computer science, there are several important steps and processes you should have in place to ensure your IT infrastructure is protected from intruders.

You don’t need to be an expert, but having a rudimentary understanding of what goes into cybersecurity management will help you hire competent people and partner with a skilled cybersecurity firm.

Here are several important questions you should be asking and the answers that will help keep your key assets secure.

What is the difference between a threat, vulnerability and a risk?

threat is a potential danger that may result from a possible attack by an intruder attempting to gain access to your network. This can be either by directly targeting your systems or by running a phishing scam against your employees.

vulnerability is a weakness or a gap in your network’s armor; it’s the spot where an intruder can break through, causing a breach. This may be a flaw in your firewall, for example, or an employee ignorant of how social engineering and phishing email works.

risk is the potential for having a computer attack, data loss, or any such adverse action takes place. Computer risks can be identified before an attack occurs so that, hopefully, you can proactively fix them. Your level of risk can be reduced to a more acceptable level by installing additional controls that can stop vulnerabilities from being exploited. However, it is seldom technically or financially viable to eliminate all risk. Rather, you want to reduce your risk to an acceptable level at an acceptable cost to the organization.

Diligent cybersecurity management requires an organization to contemplate potential risks and try to reduce them.

Should I be testing my systems with known attacker tools?

Advancements in hacker technology and defense are constantly evolving. The best way to prepare for increasing cyberattacks is to be ahead of the game. In this cat-and-mouse race, it becomes imperative to not only discover the gaps in your systems but to prioritize them for remediation. This is usually done by using the process of threat hunting to analyze, probe, and discover system vulnerabilities that should be fixed according to the level of risk posed to an asset should a vulnerability be exploited.

Adhering to the bare-minimum compliance regimes is never enough to keep your organization protected. And the only way to know that your tech will hold up against an actual attack is to test your systems and mimic those attacks.

Should I be conducting social engineering attack simulations?

Social engineering involves the psychosocial manipulation of employees for the purpose of disclosing confidential information. People are always the weakest link in any cybersecurity plan. As such, you need to know who in your organization is likely to click on that email phishing link or fall for other social engineering scams.

Just as you want to run attacks against your perimeter and network defenses, you need to do the same by conducting social engineering attack simulations. By running your own phishing attack, you can pinpoint key departments and people who will benefit from cybersecurity awareness training. Many organizations regularly provide training and tests to help ensure that staff members are knowledgeable and vigilant of risky events or unusual circumstances as they perform their normal work activities.

What is information governance and should I use it?

Information governance is a holistic method to managing information by creating and applying best practices, roles, controls, and metrics that ensure important information is handled as a valuable asset.

Information governance includes creating data maps of your networks with a deep understanding of the flow of information. Knowing what information is being kept, where it’s kept, and its data classification can be the difference between successfully controlling a hacking or malware attack and failing to prevent a costly data breach.

But information governance goes deeper—when done well, it also creates policies and business practices that define how information on the network should be treated from its inception through to deletion.

As old information piles up in the proverbial “digital attic” of your legacy systems, intruders can use these forgotten or unprotected archives to gain access to your other more sensitive assets. With a solid information governance plan in place, you can prevent these dusty corners from becoming risky havens where data breaches can occur.

What is an incident response plan and do I need one?

Incident Response encompasses the processes and actions that address, handle, and manage the outcome of a security incident in a way that reduces recovery time and cost.

Unfortunately, security incidents are an inevitable part of today’s business. Despite all the security network devices, security applications, and policies, eventually, a hacker may find a system or network vulnerability that allows them to break in.

Having an incident response plan in place can mean the difference between a successfully mitigated attack and a dangerous data breach.

An incident response plan will guide your teams through a security incident, step by step, to contain and minimize the damage once an attack is detected. An added benefit to creating a working plan with full support from all the involved areas of the organization is that trial simulations can be run as practice exercises, allowing all the involved players to understand how to spring into action at the first sign of an attack and work together to stop it.

Mitigate threats, reduce risk and get back to business with the help of experts.

Our Partners

Penetration Testing Whitepaper

Threat Intelligence

Subscribe to receive insider threat intelligence from Difenda’s front line security analysts in our 24/7/365 SOC.

Ken Perkins

Biography coming soon.

Megan Miller

Megan Miller’s energy and passion for learning flow into all aspects of her work. As the Growth Manager, North America, she brings a background in sciences which she has transitioned to the tech sector in her role at Difenda.

With a Bachelors of Science in Geology, Megan is a lifelong learner who is voracious about learning anything she can get her hands on about cybersecurity. Her positive energy has built a sales strategy with a focus on expanding in the United States while nurturing the Canadian presence. She is responsible for recruiting and training the sales team. Together with the company’s leadership, she creates the sales process and the company’s product strategy in order to better serve the customer base. This ensures that our customers have a highly trained and highly motivated team to help them every step of the way, Megan has completed Microsoft SC-900 training and working towards mastering Microsoft.

Whether at work or play, Megan is fully committed. She took her love of hockey all the way to the semi-professional level as a competitive hockey player. Megan loves all things sports including water skiing, scuba diving, cycling, and snowboarding. She also enjoys time with family and reading about alternative energy, innovation, and cybersecurity.

Natasha Phanor

As the Microsoft Partner Manager at Difenda, Natasha Phanor is responsible for driving growth within our Microsoft Partnership. With six years in the industry, she offers a fresh, energetic approach, and the ability to focus on our customer’s needs throughout the entire process. Natasha has the innate ability to foresee customer needs and solve problems before they arise, which creates a smooth road for each customer she encounters.

As the recipient of the Outstanding Services Partner of the Year Award in 2018, it is clear that Natasha responds quickly to customer needs, creates a platform for understanding a customer’s business requirements, and walks them through the process to ensure their complete satisfaction.

In her spare time, Natasha is as energetic and passionate as she is on the job. A self-proclaimed foodie-extraordinaire, she enjoys dinner parties, traveling, downhill skiing, hiking, biking, and reading. Natasha has a Bachelor of Fine Arts, specializing in Dance, from Ryerson University.

Lisa Templeton

Lisa Templeton is the perfect combination of human empathy and technological prowess. In her role as People Services Manager, she takes care of our team members to support them in their daily work, as well as on their personal life paths. Happy employees make for happy customers, and Lisa excels in giving our employees the tools they need for success in order to become the best possible versions of themselves. Along with employee formation, she shines in the service delivery support domain to continuously improve the process. Her 24 years of experience in IT Operations and Service Management help her create quality and efficiency at Difenda.

Having attended the Information Systems Management certificate program at Ryerson University, and with various other certifications to her credit, Lisa is perceptive and innovative when it comes to information technology, but also sensitive to the needs of her human constituents. Responsible for achieving the first privately owned company HDI Support Center certification in Canada, she has also designed and implemented Service Management excellence programs and 24×7 IT Operations departments for multiple IT organizations, and has created corporate rewards and recognition programs to keep her employees engaged and motivated.

On the personal side, Lisa passionately supports the cause of breast cancer research, having lost her mother to the disease. She reads voraciously in her spare time, and enjoys the art of home renovation. The summer months also bring time on her boat and exploring new hiking trails.

Miranda McCurdy

Miranda McCurdy uses her myriad super powers in all aspects of her job and personal life. As the Marketing Director at Difenda, Miranda McCurdy brings over a decade of experience to the table, which includes expertise in all facets of operations, brand management, and content marketing, as well as a multitude of successful strategies for the ever-expanding digital world. She is an expert at simplifying the message the company is trying to send, filling in gaps in the information, and strengthening the content in order to create compelling narratives that strengthen the brand and developing programs that bring teams together.

With several Addy Awards issued by the American Advertising Federation Cleveland to her credit, and her never say die attitude, Miranda understands both the broader picture and the minute details that are needed to successfully market a product. With her abilities to harness both the talent needed to spread the message, as well as to create the message itself, she is an integral cog in the company’s ability to communicate with customers and other stakeholders.

When she is not building a brand, she shares her ability to fill the gaps in her community by volunteering with Habitat for Humanity, the Special Olympics, and the Charleston Food Bank. In her spare time, Miranda spends time with her family, enjoys fitness and health, paddle boarding, reading, and arts and crafts.

Juliana Zaremba

Connections are the name of the game for Juliana Zaremba. As Strategic Partnerships Director, she is responsible for Difenda’s channel partnerships and the development and ownership of the channel partner program. She is also responsible for the global Microsoft Partnership, including the creation of strategic plans with MSFT contacts that will facilitate the continued growth of the business and establish certification and training protocols in all security technologies. Her role is multifaceted, as she acquires partners, manages relationships with them, and develops strategies that will provide cutting edge security solutions to our customer base. Another integral aspect of her job is to facilitate growth.

With a Bachelor’s in Math from the University of Waterloo and 14 years of experience from her previous roles at Herjavec Group and CDW, her cutting edge focus and ability to develop long-lasting relationships and strategies provides world class security solutions to our customer base.

Juliana thrives on connections outside of work as well. She is a philanthropist and contributor with Women4Change based in Hamilton. This group of local women is passionate about supporting local causes, and she focuses her efforts around Women in STEM. She is also a member of Club Italia in Niagara Falls and supports their youth events throughout the year.

When not managing the Microsoft Global partnership, Juliana enjoys reading, often reading several books at once. Juliana enjoys exploring the Niagara Escarpment with her family, as well as sharing meals and experiences with her extended family. Juliana’s competitive nature has her always trying new things, like Whoop band challenges and Peloton.

Jeffry Jacob

Biography Coming Soon