Cyber Readiness: 5 Critical Steps for Your Organization

Wednesdays With Woodward webinar series logo

Cyber Readiness: 5 Critical Steps for Your Organization

October 11, 2023

Wednesday 1:00 p.m.-2:00 p.m. ET

If your organization hasn’t implemented cyber readiness practices, or doesn’t know where to start, this program is for you. Watch the replay to get an hour of practical steps for cyber readiness. Mullen Coughlin’s Carolyn Purwin Ryan and Travelers’ Tim Francis take a deep dive into five key cybersecurity practices you can begin implementing today:

Watch webinar replay

Summary

What did we learn? Here are the top takeaways from Cyber Readiness: 5 Critical Steps for Your Organization.

Know your vulnerabilities. Knowing the vulnerabilities in a system allows an organization to take the proper precautions to avoid cyber threats. “There are a variety of ways in which threat actors can gain access. Once they have access, they’re able to deploy malware, allowing them to potentially encrypt your data and gain control of your network,” Francis says. Purwin Ryan advises companies of all sizes to “think about the data you have and what kind of things a threat actor might want in order to extort you.” Once you identify where you are most vulnerable, Travelers recommends five basic practices you can implement to secure your networks and data.

Multifactor authentication (MFA) remains crucial. MFA is a multistep account login process that requires a user to verify their identity in at least two ways. After a username and password are provided, the next level of authentication might include a one-time passcode sent to the user’s smartphone, for example. While many organizations already use some form of MFA to keep their systems secure, Francis notes the importance of implementing it correctly across all systems. “Many of our customers face threats even though they thought they had MFA or did have MFA, but it wasn’t quite configured as well as it could have been. Ninety-nine percent of the threats we see can be protected by MFA that’s adequately deployed,” he shares. Francis also stresses that having MFA on email is not enough; MFA on virtual private networks (VPN) is especially important with so many people working remotely.

Updating systems can help organizations stay ahead of cyber threats. With the cyber landscape constantly evolving, vulnerabilities develop frequently. When this occurs, software manufacturers release patches to help keep systems protected from threat actors. However, the timeline of implementing these patches for each organization is a critical factor to consider. “If you have a procedure or a policy in place within your organization that says we implement those patches in 30 days, most of the threat actors know this, and they take advantage within those first 30 days,” Purwin Ryan says. Francis agrees, adding, “The threat actors are going after low-hanging fruit. They can go out and scan networks and see whose vulnerabilities exist, where they exist and take advantage of them.” Purwin Ryan adds, “Don’t make yourself an easy target – update quickly.”

Endpoint detection and response (EDR) provides extra protection. Two of the main tools organizations can use to protect their systems are antivirus and EDR. “If we think about antivirus, think about it as the wall that protects the system. So, it’s keeping out things that it’s designed to keep out,” Francis says. “Endpoint detection and response can see things that get through the wall, identify them and encapsulate them. Both are necessary layers.” Purwin Ryan encourages organizations to see EDR as a key investment. Francis agrees, noting that smaller organizations that don’t have a cybersecurity team may also want to consider investing in a managed detection and response (MDR) service: “EDR is the tool, and MDR is a service that can run this tool for you and help deal with the threats identified.”

Having an updated incident response (IR) plan makes a difference. In the case of a cyber breach, an IR plan can help organizations take the necessary steps to get back up and running as soon as possible. Typically, these plans document what to do after a cyberattack as well as who is responsible for each step. When creating a plan, contact your insurance broker to be sure you have coverage. “The most important thing is to know who you will call first. Use the support services you have, like Travelers’ 24/7 hotline,” Purwin Ryan advises. She also suggests printing a copy of the plan in case computer access is compromised. Francis added that simply having a plan isn’t enough. It’s critical to update it regularly and practice it as well.

Backups are a key investment. Purwin Ryan notes that when threat actors attack an organization’s cyber system, backups are a top target so that the organization has a greater chance of paying ransom to get its information back. “It’s critical to invest in good backups that are secure and separate from your organization,” she urges. “The best systems have multiple backups.” Francis adds that the frequency of backups and what you back up depend on your organization: “Understand what’s mission critical. Doing a full backup of data and systems is vital, but it’s most important to back up what’s changed since you did the last full backup.”

Resources are available to help. Organizations can utilize many proactive resources to help strengthen their cyber knowledge and systems. “CISA, the Cybersecurity & Infrastructure Security Agency, has information available,” Francis says. You can also check out the Travelers Institute’s cyber readiness hub, which includes in-depth information on the five cyber readiness practices and links to additional resources. If a cyber incident does occur, Purwin Ryan suggested getting in touch with the experts as soon as possible for guidance: “It’s always good to run ideas by people. Run it by Travelers, run it by the forensics team, run it by a breach coach. Those are the kinds of things we’re here to help with.”

Speakers

 Carolyn Purwin Ryan
Carolyn Purwin Ryan
Partner, Mullen Coughlin

  Tim Francis headshot  
Tim Francis
Vice President, Enterprise Cyber Lead, Travelers

Host

Joan Woodward headshot
Joan Woodward
President, Travelers Institute; Executive Vice President, Public Policy, Travelers


four-panelists-seated-on-stage-at-event.png

Events & webinars

Don't miss other upcoming programs in the Wednesdays with Woodward® series.

Close up picture of businessman using keyboard

Join our email list

Get on the list to receive program invitations, replays and more.