Curating an Effective Security Culture

Slides:



Advertisements
Similar presentations
THE MEMBERS GROUP Safeguard Iowa Partnership – Cybersecurity Webinar Series.
Advertisements

Security for Today’s Threat Landscape Kat Pelak 1.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Internet Security Awareness Presenter: Royce Wilkerson.
KEEPING YOUR FAMILY SAFE ONLINE Tips from a Parent Who is Paid to be Paranoid Aaron Ades AVP Cybersecurity at MetLife and Parent of Two Children of the.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Agenda Do You Need to Be Concerned? Information Risk at Nationwide
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Staying Ahead of the Curve in Cyber Security Bill Chang CEO, SingTel Group Enterprise.
FIVE STEPS TO REDUCE THE RISK OF CYBERCRIME TO YOUR BUSINESS.
Data Security: Steps to Improved Information Security September 22, 2015 Presented by: Alex Henderson General Counsel and Chief Administrative Officer.
GSHRM Conference Cyber Security Education Shri Cockroft, CISO Piedmont Healthcare, Inc. September 21, 2015.
 Introduction to Computing  Computer Programming  Terrorisom.
Desktop Security: Making Sure Your Office Environment is Secure.
Strong Security for Your Weak Link: Implementing People-Centric Security Jennifer Cheng, Director of Product Marketing.
Information Security: Current Threats Marc Scarborough Information Security Officer
External Threats Internal Threats Nation States Cyber Terrorists Hacktivists Organised criminal networks Independent insider Insider planted by external.
DHS Publishes Report Saying Low but Persistent Risk of Cyber Attack on Energy Sector DHS REPORT ON ENERGY CYBERSECURITY April 6, 2016 | Ben Booker Source:
YJT1 - Application of Effective Comm (UG 0914) Task 2: Presentation Kody M. Hackbusch.
CURRENT STATUS OF CYBERCRIME  Security is the fastest growing service in IT  Cyber Crime Costs $750 Billion annually  70% of threats arrive via .
October 28, 2015 Cyber Security Awareness Update.
Presented by: Mike Gerdes Director, Information Security Center of Expertise Cybersecurity State of the Union.
AP CSP: Cybercrime.
Earth’s Mightiest Heroes: Combating the Evils Lurking in Cyberspace
Information Security Program
Cyber Security Zafar Sadik
Louisiana State University
Cybersecurity - What’s Next? June 2017
Data Compromises: A Tax Practitioners “Nightmare”
Executive Director, Education Technology Services
Cyber Security Awareness Workshop
F5 PRO ASSETS We’ve created these Pro Assets to help you communicate to your team the importance of app security and performance. Feel free to remove.
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Michael Bird Team Lead, Account Executive.
CHAPTER 4 Information Security.
Dissecting the Cyber Security Threat Landscape
Rapid Research - Cybercrime
UNIVERSITY Common Cyber Security Myths An Update on Cyber Security.
CSI Survey 2007 Tiffany Gorman
Today’s Risk. Today’s Solutions. Cyber security and
Cybersecurity Awareness
Information Technology Services Education and Awareness Team
I have many checklists: how do I get started with cyber security?
Partnering to Minimize the Impact of Data Compromises
4 ways to stay safe online 1. Avoid viruses and phishing scams
Risk of the Internet At Home
Auburn Information Technology
Strong Security for Your Weak Link:
Threat landscape financial sector
Security Essentials for Small Businesses
David J. Carter, CISO Commonwealth Office of Technology
Cybersecurity Am I concerned?
Keeping your data, money & reputation safe
Ransomware and Data breaches in public libraries
Cyber Security Culture
Anatomy of a Large Scale Attack
Security Hardening through Awareness August 2018
Policies and Procedures to Protect you, your Office and your Data
Information Technology Services Education and Awareness Team
Cybersecurity and Cyberhygiene
DATA BREACHES 6 4 , 9 3 There were…
Introduction to Symantec Security Service
Cyber Security 04/04/2019 STEP Mauritius 2019
Privacy, Security, and Ethics
Presented to Information Systems Security Association of Orange County
Safety & Security Online
Cybersecurity: Don’t Be Scared; Be Prepared Dean Choudhri, CISSP, CISM, CRISC Assistant Vice President, Cybersecurity and Information Assurance Alloya.
Election Security Presented by: michelle K. tassinari Director and Legal counsel Elections division Office of the secretary of the commonwealth.
“Workplace Behaviour: Activating your greatest security asset”
Presentation transcript:

Curating an Effective Security Culture November 3, 2017 Curating an Effective Security Culture September 18, 2018 AFB Cybersecurity Training

Today’s Topics The value of your data Today’s most prolific threats November 3, 2017 Today’s Topics The value of your data Today’s most prolific threats Elements of cybersecurity Effective training components Personal cyber protection AFB Cybersecurity Training

What Is Your Data Worth? $0.50 to $3.00

What Is Your Data Worth? $5.00 to $25.00

What Is Your Data Worth? $100 to $350

What Is Your Data Worth? $300 to $600

Global Cybercrime Statistics November 3, 2017 Global Cybercrime Statistics $600 Billion-a-year enterprise Cybercrime-as-a-Service (CaaS) Third costliest category of global crime (behind only government corruption and drug trafficking) - FBI Office of Private Sector Digest March 12, 2018 AFB Cybersecurity Training

Top Cyber Threats to Your Business – 2018 November 3, 2017 Top Cyber Threats to Your Business – 2018 Ransomware Business Email Compromise Phishing Identity Theft AFB Cybersecurity Training

November 3, 2017 AFB Cybersecurity Training

Average Revenue per Transaction

Malware Attack Vectors Source: Osterman Research, Inc.

Targeted Malware (Spear-phishing) is effective 2 out of 3 times.

Elements of Effective IT Security November 3, 2017 Elements of Effective IT Security Strong network security: Firewall Anti-virus Email security Consistent patching Web content filtering Don’t click! Classify and protect data Password management Mobile security GSRM Security Awareness Training 2018

Elements of an Effective Training Program Instructor-led information security seminar for your employees and staff Professional video for absent/new team members Periodic micro information security training emails/newsletters Simulated email phishing attacks to test employee information security posture Rinse and Repeat!

November 3, 2017 Milton’s 99% Rule You can avoid 99% of potential breach and compliance issues if you follow the basic security protocols.

Milton’s Best Practices Multi-factor Authentication (MFA/2FA) Strong network security: Firewall Anti-virus Email security Consistent patching Web content filtering Password management Freeze your credit https://www.imagequest.com/white-papers/

IT Compliance • Managed IT Services • CyberSecurity Nashville, TN • Louisville, KY • Rochester, NY Milton Bartley • CEO • (888) 979-2679 • mbartley@imagequest.com