Get Cyber Ready: Best Practices for Navigating Today’s Biggest Threats

Wednesdays With Woodward webinar series logo

Get Cyber Ready: Best Practices for Navigating Today’s Biggest Threats

October 2, 2024

Wednesday 1:00 p.m.-2:00 p.m. ET

Cyber: Prepare, Prevent, Mitigate, Restore
Logo with text Small Business Big Opportunity, Travelers Institute, Travelers

Today, businesses face a myriad of threats that can jeopardize their operations and reputation. With the Travelers Risk Index highlighting cyber risks as the top concern for organizations, understanding the current threat landscape is crucial. Tony Collings of the Cybersecurity and Infrastructure Security Agency (CISA), Renee Wynn, former CIO of National Aeronautics and Space Administration (NASA), and Tim Francis, Travelers Enterprise Cyber Lead, joined us to share insights into the latest cyber threats and essential practices that can help protect organizations’ networks, devices and valuable data.

Watch webinar replay

Summary

What did we learn? Here are the top takeaways from Get Cyber Ready: Best Practices for Navigating Today’s Biggest Threats:

NASA’s experience with cybersecurity offers important lessons for organizations on earth. “Even though space is really far away, it’s not too far for cybersecurity risks,” Wynn said. The National Aeronautics and Space Act of 1958 created the agency, which has contributed to everyday life on earth in many ways, such as the cooling technology used in a wide array of applications from childbirth to drink tumblers, Wynn said. Along the way, the agency has been forced to grapple with an evolving landscape of cybersecurity risks, she said. NASA uses quantum-ready encryption for satellite communication, multifactor authentication (MFA) and monitoring to detect anomalous behaviors. “The integrity of data is key to discoveries made in space,” she said.

Updating your systems regularly can lower cybersecurity risks posed by outdated software. NASA has nearly 4,000 systems to keep updated, which is a major task, Wynn said. “With thousands of systems, we would be in patch mode for the systems we could patch almost every day,” she said, adding that updates get done after testing to avoid breaking a function associated with a mission or business area. However, many organizations have legacy systems that can’t be updated, requiring you to take other steps to mitigate risks, she said, citing NASA’s vulnerability management program, which started out tracking about 1.5 million vulnerabilities. “For large, complex global or off-the-globe systems, you must have a vulnerability management program,” she said.

Multifactor authentication can help keep bad actors from accessing your accounts. The 2024 Travelers Risk Index survey showed that 52% of small businesses are not yet using MFA, so getting this in place is key. “When we talk about MFA in cybersecurity, we talk about something you know – such as a password or a PIN – something you have, such as a code sent to you via text message or email, a phone call or a code on your app, and something you are, like a fingerprint,” Collings said. Using just a password and a PIN is not MFA, he said. “That’s two of the same factor. More and more, biometrics are coming into play,” he said, adding that it’s wise to check your state laws for privacy requirements around using and storing biometric data if you plan to go this route at your company.

Endpoint detection and response (EDR) offers a comprehensive and robust way to protect systems. EDR offers more protection than firewall or antivirus technology, which are focused on preventing known vulnerabilities or viruses, Francis said. “Traditional firewall and antivirus don’t do a great job of knowing what’s gotten through that wasn’t on the list of being disallowed in the first place – or understanding where vulnerabilities or malware might go once they get past that firewall,” he said. “EDR is a more comprehensive way to not only prevent a threat from entering the system in the first place, but to be able to contain it, track it and isolate it.” If malware does get through, EDR makes it easier for IT security experts to understand where the malware ended up and to keep it from spreading across the network, he added.

Having an incident response (IR) plan is an essential part of proactively managing cyber risks. An incident response plan is a documented plan to use in case of a successful cyberattack on your organization, Collings said. When creating an IR plan, involve your IT team as well as your legal team and public information officer if you have them in your company, he said. Having a plan can help your organization respond in an orderly way after an incident that could otherwise cause chaos and panic. “Don’t make the mistake of not having a plan,” he said, adding that a plan doesn’t need to be perfect, and you can always pivot, adjust and learn from mistakes. “Test the plan and then improve and update it after an incident,” he stressed.

Regularly backing up your data is a key component of cybersecurity. When making decisions about data backup, it’s important to consider factors such as sensitivity of data, confidentiality and privacy, as well as what data is most critical to your business and mission, Wynn said. “When you do a backup, there is a cost. So you really need to look at the system itself, the data and how much you need to do,” she said. For example: NASA did a backup of its financial system every night, Wynn said. “Others may be more frequent, others may be less, but it comes down to the importance and criticality of the data,” she said. The bottom line: “You’d better have your data backed up.”

The Cybersecurity and Infrastructure Security Agency offers an array of tools and resources for organizations. One of the key resources from CISA is a free cybersecurity assessment from a cybersecurity advisor (CSA), as well as more specialized help from experts such as emergency communication coordinators, protective security advisors and chemical security inspectors, Collings said. “All of these advisors are at no cost to you, and they are just waiting for a call to work with you,” he said, adding, “Don’t just think of them as a one-time thing. Build relationships. Partnerships are key.” CISA can also scan your public-facing IPs and web applications, which are being scanned by others multiple times a day whether you’re aware of it or not, he said. “The difference is, we’re the federal government, and we will scan them and send you the results of those scans,” he said, adding that your CSA can use the scan results to help you fix issues, weaknesses and misconfigurations in your cybersecurity.

Speakers

Tony Collings headshot
Tony Collings
Cybersecurity State Coordinator for Illinois, Region 5, Cybersecurity and Infrastructure Security Agency (CISA)

Renee Wynn headshot
Renee Wynn
Former Chief Information Officer, National Aeronautics and Space Administration (NASA)

Tim Francis headshot  
Tim Francis
Vice President, Enterprise Cyber Lead, Travelers

Host

 Jessica Kearney Headshot  
Jessica Kearney
Assistant Vice President, Travelers Institute, Travelers

Related content

Experts highlight five key practices to increase your cyber readiness

Take a deep dive into the five key cyber readiness practices and tips experts shared during the spring/summer leg of our cyber tour.

Panelists at a cyber event

Using Travelers Cyber Readiness Practices to Defend Against the Three P’s

With so many means of attack available to cyber threat actors, organization and IT leaders must understand how attacks happen.

Cyber: Prepare, Prevent, Mitigate, Restore Travelers Institute

Find a live cyber event near you

Attend a live event to learn more from government and industry experts about evolving cyber threats and how you can protect your organization.

Four people on a cybersecurity panel

Event highlights in the news

Cybersecurity risk called a human issue, not a technical problem
October 2, 2024 | Legal Dive