YJT1 - Application of Effective Comm (UG 0914) Task 2: Presentation Kody M. Hackbusch.

Slides:



Advertisements
Similar presentations
1 Fortinet Confidential 1 T I T R E Fortinet 2013 Global Survey.
Advertisements

 National association Pamela Walker, Director of Government Affairs National Association of State Chief Information Officers NLC Congressional City Conference:
Discovery – The Next Generation!: Business Context of Risk Presentation to the North London Branch British Computer Society 19 March, 2008 Dr. Victoria.
CSI 2005 Computer Crime Survey Put together by J. Scott, 2006 Using Graphics and Text from the Published CSI/FBI 2005 Crime Survey.
Chapter © 2009 Pearson Education, Inc. Publishing as Prentice Hall.
Welcome to New Hire Orientation Information Security
Boost your network security with NETASQ Vulnerability Manager.
Formulating a Security Policy for the Modern IT Landscape.
Third Annual Shopping on the Job: ISACA’s Online Holiday Shopping and Workplace Internet Safety Survey Commissioned by ISACA ( November 2010.
Cybercrime Outlook on African banks Adwo Heintjes Global Head IT Audit & Ops Rabobank.
Cybercrime & Breach Impact Questions American Bar Association Criminal Justice Section June 6, 2014.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Copyright 2009 Trend Micro Inc. Classification 9/9/ Corporate End User Study Employee Online Behavior.
Staying Ahead of the Curve in Cyber Security Bill Chang CEO, SingTel Group Enterprise.
Study Results Advanced Persistent Threat Awareness.
© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Cyber Security: Now and.
Mobile Technology and Cyber Threats Deon Woods Bell Office of International Affairs The Fifth Annual African Consumer Protection Dialogue Conference Livingstone,
Thomas Levy. Agenda 1.Aims: Reducing Cyber Risk 2.Information Risk Management 3.Secure Configuration 4.Network Security 5.Managing User Access 6.Education.
BRING YOUR OWN DEVICE. BYOD AND THE IMPACT ON IT SECURITY BYOD and pressure employees put on IT organization to supply or allow consumer mobility devices.
Kim Andreasson Managing Director DAKA advisory AB Bahrain International eGovernment Forum Kingdom of Bahrain 8-10 April 2013 Measuring E-Government.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
© 2015 ForeScout Technologies, Page 2 Source: Identity Theft Resource Center Annual number of data breaches Breaches reported Average annual cost of security.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
EECS 710: Information Security and Assurance Assignment #3 Brent Frye 10/13/
Internet Security Breach & Its Impact on Business Operations Kim Nguyen Manish Shirke Wa Mo Saravanan Velrajan.
TOP 10 TECHNOLOGY INITIATIVES © Robert G. Parker S-1 Issues Loss or theft of mobile devices Lack of MDM (mobile device management) software Cloud.
Enforcing Cyber security in Mobile Applications – Public Sector Use Case SAPHINA MCHOME, VIOLA RUKIZA TANZANIA REVENUE AUTHORITY INFORMATION AND COMMUNICATION.
PUTTING MANAGED FILE TRANSFER IN PERSPECTIVE May 2015 Derek E. Brink, CISSP, Vice President and Research Fellow IT Security and IT GRC.
Insider Threat Nation States Cyber Crime Hactivist Cyber Terrorist IndustrializedHackers Dynamic Cyber Security Landscape Cyber Actors ThreatsThreats.
Cloud Market Readiness Report Finance, Media, and Legal Sectors March 2014 Trend Consulting 2013.
DRAFT 1 Belfast th World Cyber Security Technology Research Summit Suren Gupta Allstate Corporation Executive Vice President Allstate Technology.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
Develop your Legal Practice using “Cloud” applications, but … Make sure your data is safe! Tuesday 17 November 2015 The Law Society, London Allan Carton,
MIS323 – Business Telecommunications Chapter 10 Security.
Cyber Security in the Mobile Era KEEPING ENTERPRISE DATA SAFE IN THE BYOD ERA.
Regional Cyber Crime Unit
The Future Started Yesterday… Rupert March Director, Platform & Developer Experience CEE Multi-Country Region.
Centre of Expertise - Security Securing your business against cybercrime Or surely we do not have anything to worry about...do we?
1 Current Trends in Enterprise IT Network Security Key Takeaways Based on 100 Survey Responses © 2016 Lumeta Corporation.
Program Overview and 2015 Outlook Finance & Administration Committee Meeting February 10, 2015 Sheri Le, Manager of Cybersecurity RTD.
EIC – Jornada ciberatacs cyber risk outlook June 2016.
Cyber Insurance Risk Transfer Alternatives Heather Soronen - Operations Director Rocky Mountain Insurance Information Association.
Cyber: risk without borders Airmic 2016 Harrogate International Centre Tuesday 7 th June 2016.
TOTAL POLICING LDSC: Protecting London’s Business Community. Presentation to.
Cyber Insurance Risk Transfer Alternatives
Cybersecurity as a Business Differentiator
Law Firm Data Security: What In-house Counsel Need to Know
CYBERSECURITY INCIDENCE IN THE FINANCIAL SERVICES SECTOR March 28, 2017 Presented by Osato Omogiafo Head IT Audit.
Information Security Program
Information Security – Current Challenges
Business At the Speed of Cyber
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Behavior Analytics Market to surpass $3.5bn by 2024: Global Market Insights,
Board Concerns About Cyber Security
Teri Takai EXECUTIVE DIRECTOR, CENTER FOR DIGITAL GOVERNMENT.
Join In Be Secure Presentation
Curating an Effective Security Culture
SMB practice development: Security play
SMB practice development: Security play
The Practical Side of Meaningful Use:
Cybersecurity Am I concerned?
Keeping your data, money & reputation safe
Cyber Risk & Cyber Insurance - Overview
Industry Overview The global AI in cyber security market is predicted to grow at 35.0% CAGR during the forecast period with the market size reaching USD.
Windows 10 Enterprise subscriptions in CSP – Messaging Summary
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fuel Cell Market size worth $25.5bn by 2024 Low Power Wide Area Network.
The State of Cybersecurity in State Government NAST March 26, 2019
Information Services Security Management
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fuel Cell Market size worth $25.5bn by 2024 Low Power Wide Area Network.
Figuring out CyberSecurity Return On Investment
CyberSecurity Strategy For Defendable ROI
Presentation transcript:

YJT1 - Application of Effective Comm (UG 0914) Task 2: Presentation Kody M. Hackbusch

Imagine for a moment…

“Only 1 in 10 people who regularly use a computer or other digital device to connect to the Internet have received any kind of cyber security training in the last 12 months, and more than two thirds have never had any such training.” (Cobb, 2012) “Only 20% of IT security professionals are confident their organizations have made adequate investments in educating users on how to avoid phishing attacks.” (Shephard, 2015)

Data shows that despite the ever growing adoption of interconnected and mobile technologies in business there is a lack of cyber-threat awareness among users. This indicates the need for executives and managers to have a high level understanding of the current digital landscape so they can evaluate current infrastructure and readiness.

 What does awareness mean?  What are some of the common threats?  Cost/Benefit Analysis Overview

 Awareness is understanding what to look for, common pitfalls and how our actions can affect the organization as a whole.  Awareness is about being mindful and respectful of how we interact with the technology that provides us with the productivity enhancements that we all appreciate and have come to rely upon.  Awareness is about responsibility from the executive level down to the temp worker. Awareness

 Spear Phishing  Whaling  Crypto Ransoming  Rogue Insiders  Social Media  BYOD Threats

 Loss of productivity  Breach goes undetected  Loss of future revenue  Affects interconnected partner systems  Intellectual Property  Sensitive/confidential data Costs of cyber attack Cost/Benefit Analysis lists derived from (Brink, 2014) (K Rudolph, 2015)

 Be seen as a leader  Reduced threat of incidents  Decreased down-time  Protection of assets, more confidence  Improved compliance  Improved morale  Protection against users Benefits of training Cost/Benefit Analysis lists derived from (Brink, 2014) (K Rudolph, 2015)

Recap Data shows that despite the ever growing adoption of interconnected and mobile technologies in business there is a lack of cyber-threat awareness among users. This indicates the need for executives and managers to have a high level understanding of the current digital landscape so they can evaluate current infrastructure and readiness.

Recap  What does awareness mean?  What are some of the common threats?  Cost/Benefit Analysis

PWC 2015 US CEO Survey

Understanding that one of the largest security weaknesses in businesses today is user actions should prompt you to take a closer look at how your organization handles not just the technology you employ but those who use it. Conclusion

References Brink, D. E. (2014, November). The last mile in IT security: changing user behaviors. (Aberdeen Group) Retrieved from Changing-User-Behaviors.asp Changing-User-Behaviors.asphttp://v1.aberdeen.com/launch/report/research_report/9910-RR- Changing-User-Behaviors.asp Burg, D. (2015). Concern over cyber threats has CEOs warming. (Pricewaterhouse Coopers LLP) Retrieved from PWC 2015 US CEO Survey: Cobb, S. (2012, October 10). Study finds 90 percent have no recent cybersecurity training. (ESET Anti- Virus) Retrieved from percent-have-no-recent-cybersecurity-training/ 90-percent-have-no-recent-cybersecurity-training/ 90-percent-have-no-recent-cybersecurity-training/ K Rudolph. (2015). Benefits of an Information Security Awareness Program. Retrieved from Native Intelligence Inc: Shephard, D. (2015, March 16). 84 Fascinating & Scary IT Security Statistics. Retrieved from statistics/ statistics/ statistics/