PREPARATION – DELETE BEFORE MEETING

Slides:



Advertisements
Similar presentations
BD Finance Training. Table of Contents:  The BD Bible  Stages of working with the Bible  Your KPIs  Napoleon Tools  Cash Flow  The Next Step Dream.
Advertisements

Rutland High School Technical Review Visit Looking At Results Planning Next Steps Learning About Resources.
What is spyware? Supervisor dr. lo’ay tawalbeh Search By Mahmoud al-ashram Soufyan al-qblawe.
Dear User, This presentation has been designed for you by the Hearts and Minds Support Team It provides a guideline for conducting a Seeing Yourself As.
Dear User, This presentation has been designed for you by the Hearts and Minds Support Team. It provides a template for presenting the results of the SAFE.
During an Interview: It’s Show Time
1 Copyright Scott Wright. All rights reserved. SC 1 Selling the Streetwise Security Awareness Program.
Purchasing Homework Manager Online. First go to the Online Learning Center at
Skill Editor. When you see a Red circle or a next button, like this, that means we want you to click on something. These are the same steps you’ll take.
"If you fail to plan, you plan to fail".
Legal Safe Guards For The Nurse. 1- Contracts Exchange of promises between two parties. Usually contains: Real consent of the two parties. Real consent.
HIPAA Compliance Case Study: Establishing and Implementing a Program to Audit HIPAA Compliance Drew Hunt Network Security Analyst Valley Medical Center.
6/27/20161 Interviewing Chapter Section Objectives Identify methods of preparing for interviews, including researching and rehearsing Recognize.
Case Management Updates.  During the of week April 11, 2011, the ETO system experienced technical difficulties.  As of April 13, 2011, the errors have.
New Employee Orientation
Law Firm Data Security: What In-house Counsel Need to Know
WHY VIDEO SURVELLIANCE
WHY VIDEO SURVELLIANCE
What is it and why is it important?
Office 365 Security Assessment Workshop
Professional Social Networking
2017 Winter Employee Engagement Survey
Select Survey Invitations
Workplace Financial Wellness
Third Party Risk Governance in a Diverse Environment
Joe, Larry, Josh, Susan, Mary, & Ken
Supervisory Control and Quality
EMOTIONAL FACTORS.
The Club Health Assessment
A Site Administrator’s Guide to Talking to Parents about the ELPAC
Unfortunately, any small business could face the risk of a data breach or cyber attack. Regardless of how big or small your business is, if your data,
THE NEWBIE TEACHER’S GUIDE TO BLOGGING WITH BLOGGER #TeacherTeachTech/Chima Ezuo BLOGGER BASICS.
Making Information Security Manageable with GRC
THIS IS A TIPS & TRICKS SLIDE FOR YOU
MANAGER AS COACH TOOLKIT Winter 2013
Managing Performance of Staff:
Getting Hired By Expireds Part 2
Today’s Meet ! To help facilitate today’s meeting (and keep it short) you can ask your questions here, we will answer them and return.
WHO ARE HERS RATERS? RESNET & You: The Future of Energy Ratings.
The Individual Development Plan (IDP)
Building Self Management skills as a Young Professional
Background This slide should be removed from the deck once the template is updated. During the 2018 Legislative Session, Act 555 was passed requiring schools.
Cyber Security - Protecting Information
The benefits of diversity
PREPARATION – DELETE BEFORE MEETING
Drew Hunt Network Security Analyst Valley Medical Center
WHY VIDEO SURVELLIANCE
WHY VIDEO SURVELLIANCE
Brand promise guarantee
Interpersonal/Social Skills
Third-party risk management (TPRM)
Fahrig, R. SI Reorg Presentation: DCSI
3 Do you monitor for unauthorized intrusion activity?
Security Assessments Offered
Employee Cybersecurity Program
Employee Cybersecurity Program
PREPARATION – DELETE BEFORE MEETING
XX XX $ $ Dark Web Scans Simulated Phishing
Dark Web Domain Status Report
Applying for Apprenticeships
[Group Name].
Employee Cybersecurity Program
Business Case Template
Management How-To Guide
PREPARATION – DELETE BEFORE MEETING
The prospecting rulebook, A 4-WEEK strategy document
3 Do you monitor for unauthorized intrusion activity?
CyberSecurity Strategy For Defendable ROI
Digital Marketing Services PREPARED BY : GLOBALMAILMEDIA
Presentation transcript:

PREPARATION – DELETE BEFORE MEETING Fill in the following: Slide 2: Enter the “Presented By: Name, Title, Company” with your information Replace the “Your Logo Here” logo with your company logo Slide 3: Fill this slide out with your personal information as well as your Company information TIPS: PRACTICE – run through the deck multiple times Focus on the impact to their business, not the stats or the technology Be relatable and have talking points Don’t read right off the slides.

EMPLOYEES ARE HUMAN IT ONLY TAKES ONE TO MAKE A MISTAKE PRESENTED BY: [NAME, TITLE, COMPANY]

WHO AM I? [Your name and job title] [Company Name] [Brief speaker biography] [Note some personal tidbits, get personal and real with your prospects] One hobby or activity [Company Name] [Brief company biography] Security-focused We pride ourselves on helping small to mid-size businesses strengthen their security posture and protect them from cybertheft.

YOUR EMPLOYEE SECURE SCORE OVERALL RISK LEVEL: [LOW RISK] [MEDIUM RISK] or [HIGH RISK] NUMBER OF AT RISK EMPLOYEES: [NUMBER] Your company has an ESS of [A], meaning you are in [RISK LEVEL] of experiencing an incident. A Your average phishing rate is [B%]. Compare to Industry. B% Use this slide if your prospect’s Company ESS is in the HIGH RISK or MEDIUM RISK A: Enter the “Company Overall Employee Secure Score (ESS). This is based on their employees’ performance. B: Enter the “Average Phishing Fail Rate” Let’s compare your phishing rate to the industry standard. Across all industries, the average baseline phishing fail rate for an organization with (the below) is: 1-249 employees: 30.9% fail rate 250-999 employees: 29% fail rate 1000+ employees: 25% fail rate - For further breakdown of specific industry fail rate totals, visit: https://www.knowbe4.com/press/knowbe4-unveils-new-phishing-benchmark-data-and- showcases-most-at-risk-industries C: Enter the number of medium & high-risk employees. You will want to combine the total number of medium and high-risk employees together. - Make sure the prospect knows that increased encouragement and discussing their employees’ struggles with you will allow you to help them. Be sure to tailor this message based on the improvement or regression of this score. Improvement: focus on how routine phishing and education allows for this phishing fail rate to continue to decrease Regression: Either due to whitelisting issues on baseline campaign, difficulty of campaigns, or it’s too soon to see improvement Have the names of the high and medium-risk employees ready so you can go over them with the prospect You have [C] employees that are medium and risk. C% All it takes is one employee, low risk today doesn’t mean no risk.

BENEFITS OF KEEPING UP WITH EVA Keep up the good work and continue to watch the progress your employees, yourself, and your organization make together. Continuous training and phishing turns employee weaknesses into strengths Employee Secure Score analytics keep security top of mind. Continuous Dark Web Monitoring alerts employees of potential new threats. But what happens if one of your employees still makes a mistake? 1. TechTarget https://searchsecurity.techtarget.com/definition/social-engineering 2. Symantec 2018 Internet Security Threat Report https://interactive.symantec.com/ISTR?CID=70138000001MD17AAG 3. The 2018 Black Report by Nuix https://www.nuix.com/black-report/black-report-2018

01 02 DO YOU KNOW YOUR SECURITY BLIND SPOTS? Why 3rd party is best Technology can keep us safe when humans make mistakes. Humans are just that, human. All it takes is one click. 3rd Party Security Risk Assessment (SRA) An SRA evaluates your current security posture and identifies risks to your sensitive data. Lower your Security Risks We recommend steps you can take to lower those risks. 01 02 Why 3rd party is best Don’t want the same company building the house to inspect their own work Accountability Second opinion Evaluates security gaps and weaknesses. The SRA identifies where data is resides in the organization, the current security measures in place to protect that data , and any threats posed to the organization. The final report contains recommendations based on the risks discovered during the process and ways to lower those levels of risk.

NEXT STEPS 3rd Party Security Risk Assessment What I need from you: Let’s make sure you’ve got the right tools in place to ensure you’re protected. I will: Provide a complementary Security Risk Assessment Find the gaps in your current security posture Present you with a report that shows the risks to your company and steps you can take to lower those risks. What I need from you: Return the signed proposal by [DATE] Assign an internal contact for me to work with directly – this should only take two hours Keep up the encouragement with EVA! Note: We suggest offering the SRA for free to your prospect as it is included in the Breach Prevention Platform and lowers the friction of getting them to agree to the proposal. Feel free to upcharge for the SRA – but make sure you turn that tile off for your client prior to enrolling them on EVA! Another suggestion is to give them a discount and charge them only for labor. The Risk Assessment looks at the current Administrative, Physical, and Technical safeguards in place for your client. This allows us to identify where the appropriate security measures are lacking and allows us to create recommendations for remediating the risks associated with those gaps.