“Workplace Behaviour: Activating your greatest security asset”

Slides:



Advertisements
Similar presentations
K eep I t C onfidential Prepared by: Security Architecture Collaboration Team.
Advertisements

SECURITY AND SOCIAL ENGINEERING US Department of Commerce Office of Security Updated 09/26/11 Security is Everyone's Responsibility – See Something, Say.
STOP.THINK.CONNECT™ NATIONAL CYBERSECURITY AWARENESS CAMPAIGN SMALL BUSINESS PRESENTATION.
Welcome to New Hire Orientation Information Security
Social Engineering PA Turnpike Commission. “Social Engineering is the practice of obtaining confidential information by manipulation of legitimate users”
CYBER CRIME AND SECURITY TRENDS
SHASHANK MASHETTY security. Introduction Electronic mail most commonly referred to as or e- mail. Electronic mail is one of the most commonly.
[Name / Title] [Date] Effective Threat Protection Strategies.
Thomas Levy. Agenda 1.Aims: Reducing Cyber Risk 2.Information Risk Management 3.Secure Configuration 4.Network Security 5.Managing User Access 6.Education.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
Safe Computing Practices. Why would anyone want to hack me? 1 Krebs, Brian - “The Scrap Value of a Hacked PC, Revisited”, 12 Oct 2012,
Information Systems Security New Faculty Orientation Day Queen’s University August 2011 George Farah, GIAC/GSEC Gold, CRISC, CISA University Information.
Awicaksi E-Commerce Security & Payment System E-Commerce.
What Can Go Wrong During a Pen-test? Effectively Engaging and Managing a Pen-test.
Cyber Security Management Lesson Introduction ●Understand organizational context for cyber security ●Understand the people, process and technology dimensions.
Strong Security for Your Weak Link: Implementing People-Centric Security Jennifer Cheng, Director of Product Marketing.
Safe Computing Practices. Why would anyone want to hack me? 1 Krebs, Brian - “The Scrap Value of a Hacked PC, Revisited”, 12 Oct 2012,
ORGANISATIONAL CULTURE ORGANISATION MUST PROVIDE FOR INFORMATION SECURITY FAILING TO PLAN, IS PLANNING TO FAIL ASPECTS THAT SHOULD BE ADRESSED DURING.
Develop your Legal Practice using “Cloud” applications, but … Make sure your data is safe! Tuesday 17 November 2015 The Law Society, London Allan Carton,
Critical Security Controls & Effective Cyber Defense Hasain “The Wolf”
INFORMATION SECURITY AWARENESS Whose Job is it Anyway? Ron Freedman Ron Freedman Vice President VCampus Corporation Scott Wright Scott WrightPresident.
Computer Security By Duncan Hall.
Virus Assignment JESS D. How viruses affect people and businesses  What is a virus? A computer virus is a code or a program that is loaded onto your.
FLTCYBERCOM / C10F    U.S. FLEET CYBER COMMAND / U.S. TENTH FLEET    1 Overall Classification of this Briefing is UNCLASSIFIED//FOUO Phishing.
1 Outline of this module By the end of this module you will be able to: Understand why computer security is important; Name the different threats to.
Threats To Data 30 Threats To Data 30. Threats To Data 30 We’re now going to look at a range of different threats to people’s data: Opportunity Threats.
Safe Computing Practices. What is behind a cyber attack? 1.
BizSmart Lunch & Learn Webinar Information Security and Protecting your business With the increased risk of some sort of cyber- attack over the past few.
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Karsten Chearis Sales Engineer.
Advanced Endpoint Security Data Connectors-Charlotte January 2016
There Will be Attacks – Improve Your Defenses
Cybersecurity - What’s Next? June 2017
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Michael Burke.
Data Compromises: A Tax Practitioners “Nightmare”
Cyber Security Awareness Workshop
F5 PRO ASSETS We’ve created these Pro Assets to help you communicate to your team the importance of app security and performance. Feel free to remove.
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them David Hood Director of Technology Marketing.
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Michael Bird Team Lead, Account Executive.
Jason C. Belford Information Security Briefing Staff Senate
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Michael Vanderhoff.
Forensics Week 11.
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Matthew Gardiner Product Marketing.
Unit 7 – Organisational Systems Security
Today’s Risk. Today’s Solutions. Cyber security and
Cybersecurity Awareness
Call AVG Antivirus Support | Fix Your PC
Information Technology Services Education and Awareness Team
I have many checklists: how do I get started with cyber security?
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Andrew Cotton.
Join In Be Secure Presentation
Strong Security for Your Weak Link:
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Matthew Gardiner Product Marketing.
Curating an Effective Security Culture
There Will be Attacks – Improve Your Defenses
Network Security Best Practices
12 STEPS TO A GDPR AWARE NETWORK
Keeping your data, money & reputation safe
Anatomy of a Large Scale Attack
Steppa Cyber Security Training Tips Your Business Was Seeking For With Cyber Security Training!
Matt Langford, UNC Mike Hart, MSU Denver
Information Technology Services Education and Awareness Team
Information Security – Sep 18
Information Protection
Employee Cybersecurity Program
<offer name> with Microsoft 365 Business Secure Deployment
Employee Cybersecurity Program
Information Protection
Cybersecurity Simplified: Phishing
Thames Valley Chamber / Claire Logic
Presentation transcript:

“Workplace Behaviour: Activating your greatest security asset” Hi DARRAGH I WOULD LIKE TO KEEP THIS SIMPLE AND CLEAR – USE OUR NAME AND LOGO PROMINENTLY AND OUR UNDERSCORE – “CREATING HUMAN FIREWALLS “ OR “CREATING YOUR HUMAN FIREWALL” AND IF YOU CAN DEVELOP A CLEAR AND EXPLICIT GRAPHIC TO ILLUSTRATE THE HUMAN FIREWALL USE THAT WE NEED THIS TO BE CLEAR AS DAY – THEY HAVE TO TOTALLY GET IN THRU THE NEXT 2 SLIDES HUMANS ARE THE WEAKEST LINK “Workplace Behaviour: Activating your greatest security asset” Presented by: Stephen Burke Founder and CEO cyberriskaware.com

AGENDA Who or What do Cyber Criminals Target? What are most companies doing to defend the network? What is the greatest security asset at our disposal? How to “activate your greatest security asset”?

Security Budgets are mostly being spent on technical defenses! Quick show of hands …… Who agrees with the statement Security Budgets are mostly being spent on technical defenses!

Cyber Criminals Target People, NOT system’s ! Quick show of hands …… Who agrees with the statement Cyber Criminals Target People, NOT system’s !

Cyber Criminals Are Targeting People !!

to great success …….. 99% of incidents had human involvement

The Compromised Insider The Malicious Insider Rogues employees Criminal actor employees The Compromised Insider Malware victims Impersonated users The Accidental Insider Inadvertent actors Convenience seekers Insider Threats

Yet companies keep investing in Technical Defense’s…

“Create a human firewall. A network of human sensors.” Our Greatest Security Asset is our ……. People “Create a human firewall. A network of human sensors.”

Workplace Behaviour Challenge “Security Culture is what employees do when the security team isn’t looking”

Common Workplace Behaviour(s) Clicking on links and opening Email attachments Reusing Passwords across accounts Dept’s sharing accounts with passwords stored in XLS! Password - Incrementing a number by 1  (Yes, we know!) Downloading Free Software Unsafe Web Browsing Risks when traveling “Outside the Office” Weak Data Protection Practices Little to no understanding of Security Policies

Activate Positive Behaviour Change Security Awareness Program Real-Time Delivery Knowledge Assessments Phishing Tests “SMiShing” Tests Policy Snippets Compliance & Risk Reporting Real Time Intervention Awareness TRAIN STAFF AT POINT of NEED instead of just scheduling content Deliver fully contextualised content straight to staff based on exhibited risk behaviour.

USER TRIES TO DOWNLOAD FREE SOFTWARE What will the user do now ?

USER TRIES TO DOWNLOAD FREE SOFTWARE

ACCESS SENSITIVE DATA THEN DROPBOX?

AUTOMATE STAFF ON-BOARDING

For further information please contact: THANK YOU For further information please contact: Stephen Burke; Founder and CEO E: stephen@cyberriskaware.com T: +353-87-9583766 cyberriskaware.com