Recently, the # CyberAvengers (of which I am a member along with cyber experts Paul Ferrillo, Kenneth Holley, George Platsis, Shawn Tuma, George Thomas, and Christophe Veltsos) published a basic cyber-hygiene formula in Brink News (http://www.brinknews.com/cyber-hygiene-and-government-industry-cooperation-for-better-cybersecurity/)  that provides a god 9 point checklist for cyber protection:
1)  Update and patch your networks, operating system and devices promptly. “Critical” is “critical” for a reason. Do it within 72 hours of release.
2)  Train your employees on how to detect spear-phishing attempts and what best social media practices are. Quarterly training can reduce the risk by up to 90 percent in most cases.
3)  Use multifactor authentication. We have effectively reached the age of password uselessness due to our poor habits. Passwords slow down bad guys who do not know what they are doing. Biometric solutions are great, but proceed with caution if you go this route because you now have data management and privacy concerns that must be addressed.
4)  Back up regularly (daily if feasible). Where possible, use the “1, 2, 3” backup rule: 1. a segmented backup on-site; 2. one off-site; and 3. one in the cloud. No need to pay the ransom if you have a clean backup ready to be uploaded to your system.
5)  Be cautious with older systems. Yes, older systems can be repaired. However, the upfront capital cost is not always affordable. The critical issue becomes support (patches) for these system stops. If these systems are past their “patch life” they become tempting targets for hackers.
6)  Follow-on to the last point, sometimes the best answer is the cloud. Cloud service providers have state of the art hardware and software and cloud migrations have become easier, especially over the last two years. The cloud is not a savior—it comes with other issues, such as needing to learn what your obligations and responsibilities are, ensuring you have robust agreements with your vendors, and knowing what third-party sources will have access to your information.
7)  Know how your intrusion detection and prevention system works. Is it signature-based? Perhaps it is behavioral-based? Maybe it is both? New cyber threats require new tools. This is where machine learning, cognitive computing, AI, automation, and orchestration all come into play (but only when done in tandem with all other techniques discussed here). Internet data traffic has reached the stage where humans aren’t able to do this on their own.
8)  Consider a Managed Service Provider (MSP) or a Managed Security Service Provider (MSSP). Cybersecurity is not everybody’s strength, but one ransomware attack could be crushing. There are options out there to help you. Sure, it costs money, but you are buying peace of mind. Do your homework and find the right solution for you.
9)  Do you drive your car without insurance? Cyber insurance is not mandatory yet, but it may be in the future. Chances are if you are doing a lot of what is suggested here, premium payments will be at the lower end.
A successful cybersecurity will also require integration of emerging technologies for identity management, authentication, horizon monitoring, malware mitigation, resilience, and forensics.  Automation and artificial intelligence are already impacting the capabilities in those areas.
Cybersecurity capabilities in information sharing, hardware, software, encryption, analytics, training and protocols, must keep pace to protect and preempt the increasingly sophisticated threats in both the public and private sectors.

Where does your cybersecurity perspectives come from?

My perspectives on both cybersecurity and homeland security come from my experience in the policy arenas in Washington, DC. In my early career I worked almost seven years for the late Senator Arlen Specter. In this role I covered technology and national security issues and spend my days writing and promoting legislation and meeting with constituent companies with interests in those areas. This was beneficial because it gave me a ground view of how things work in Washington, DC. And interacting with what I term “The Four Pillars”; Government, Academia, Media, and Industry on a daily basis.
My first deep dive into cybersecurity was at the Department of Homeland Security (DHS). I was one of the first people onboard and helped set up both the Office of Legislative Affairs and later served as the first Director of Legislative Affairs for the Science & Technology Directorate. Initially, CBRNE (chemical, biological, radiological, nuclear and explosive) threats were the primary focus of DHS. But as the digital world and connectivity evolved, so did the security mission. Presidential directives and Congressional mandates elevated DHS to play a primary role in the civilian side of government for cybersecurity. Cyber intrusions and threats from malware and hackers required restructuring of priorities and missions.
Each passing year since its inception DHS has to step up capabilities in assessing situational awareness, information sharing and resilience research and development plans with the stakeholders to mitigate risk and protect critical infrastructure. I have stayed close to many of my former colleagues both inside and outside of government who have been steering the DHS mandates.
I was also fortunate to teach at the Johns Hopkins University (SAIS) campus for two years a course called “Congress and Homeland Security.”  It added a new perspective for me on the implications of policy, especially in the privacy areas. It also contributed to my understanding of how academic and policy institutions an really impact on programs, budgets, and priorities in the milieu of Washington, DC.
What I have concluded from publishing over 150 articles, numerous speeches, and as working as a Subject Matter Expert is all areas of homeland security and cybersecurity, is that security outcomes really depend on a three tiered formula. 1) You need the innovation and expertise from the technical and engineering people in government and industry. 2) You need the business and policy perspectives to integrate management approaches and to commercialize technologies, and 3) you need evangelists to explore, communicate, and help provide vision for all connected to the internet to understand and meet the challenges of world of algorithms; x’s and o’s.  I try to dabble in all three tiers, but focus primarily on evangelism.

Chuck Brooks is President of Brooks Consulting International.  In both 2017 and 2016, he was named “Cybersecurity Marketer of the Year by the Cybersecurity Excellence Awards. LinkedIn named Chuck as one of “The Top 5 Tech People to Follow on LinkedIn” out of their 500 million members.  He is also an advisor to LinkedIn on cybersecurity and emerging technology issues. Chuck’s professional industry affiliations include being the Chairman of CompTIA’s New and Emerging Technology Committee, and as a  member of The AFCEA Cybersecurity Committee. In government, Chuck has served at The Department of Homeland Security (DHS) as the first Legislative Director of  The Science & Technology Directorate at the Department of Homeland Security. He served as a top Advisor to the late Senator Arlen Specter on Capitol Hill covering  security and technology issues on Capitol Hill.  In academia, Chuck was an Adjunct Faculty Member at Johns Hopkins University where he taught a graduate course on homeland security for two years.  He has an MA in International relations from the University of Chicago, a BA in Political Science from DePauw University, and a Certificate in International Law from The Hague Academy of International Law.