Lance Spitzner

Slides:



Advertisements
Similar presentations
NIMAC 2.0: The Accessible Media Producer Portal NIMAC 2.0 for AMPs.
Advertisements

INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
A note for you We have created this presentation for you, the outstanding employee who has IT security on the brain. We want to help you spread the word.
HR Time Collection System. Time Collection System Overview Types of Time Collection Devices (TCD) Kaba web clockKaba wall clock.
Supervisor Training - Student Job Workflow Presentation by Kathy Johnson Select Applicant Choose Action Move in Workflow 1.
Everything you want to know about managing mobile devices in the enterprise Ivan Hemmans hemmans.com From A to Z.
The Most Critical Risk Control: Human Behavior Lynn Goodendorf Director, Information Security Atlanta ISACA Chapter Meeting June 20, 2014.
Module 6 Reinforcement Activity Risk Management
Audible Magic Corporation 985 University Avenue #35 Los Gatos, CA USA x145 Tools to Help Universities.
CVM EMPLOYEE KABA GUIDE. WHAT IS Kaba? Beginning Saturday, September 27th, temp employees who have been submitting bi-weekly timesheets will now enter.
Internet Security PA Turnpike Commission. Internet Security Practices, rule #1: Be distrustful when using the Internet!
Network security policy: best practices
Turn ordinary workers into unstoppable teams.. Validate skills using the 2007 Microsoft ® Office system. Microsoft Business Certification represents an.
Citadel Security Software Presents Are you Vulnerable? Bill Diamond Senior Security Engineer
Turn ordinary workers into unstoppable teams.. Validate skills using the 2007 Microsoft ® Office system. Microsoft Business Certification represents an.
Turn ordinary workers into unstoppable teams.. Validate skills using the 2007 Microsoft ® Office system. Microsoft Business Certification represents an.
St. Mark’s Community Service New Website and x2VOL Sophomores, Juniors, and Seniors August 27, 2012.
Lean and (Prepared for) Mean: Application Security Program Essentials Philip J. Beyer - Texas Education Agency John B. Dickson.
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
Comprehensive Training for Distributor on Help Desk Application
Electronic Banking Risk Assessment - Product Training
ESCCO Data Security Training David Dixon September 2014.
Washington Campus Compact New Time Log Database Note to users: You should use Internet Explorer to use this database. In other programs (i.e. Firefox)
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Difficult Employees. SOME OTHER OPTIONS IN DISCIPLINE 1. Demotion 2. Transfer 3. Performance improvement plan.
Enrolment Services – Class Scheduling Fall 2014 Course Combinations.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
| nectar.org.au NECTAR TRAINING Module 5 The Research Cloud Lifecycle.
April 14, A Watershed Date in HIPAA Privacy Compliance: Where Should You Be in HIPAA Security Compliance and How to Get There… John Parmigiani National.
Information Security Awareness Training. Why Information Security? Information is a valuable asset for all kinds of business More and more information.
Logging Antivirus Examples Use recent examples from media of such attacks (RSA, Epsilon, Oak Ridge National Labs, HBGary). Articles in business magazines.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
Deploy Phase Tips for Success or It ain’t over ‘til it’s over.
A PRACTICAL GUIDE TO RESPONDING TO A HEALTHCARE DATA SECURITY BREACH May 19, 2011 | State College, PA Matthew H. Meade Stephanie Winer-Schreiber.
Professional Development Enrollment Talladega County School District.
‹#› September 2015 Cloud-CISC Cloud Cyber Incident Information Sharing Center.
Using LastPass. Great password management is impossible w/o a great tool Auto-fill (hands-free login) will save you approximately one hour per month You.
HO © 2012 Fluor. All rights reserved. Quick Wins in Vulnerability Management Classification: Confidential Owner: Michael Holcomb Approver: Phil.
Lecture 19 Page 1 CS 236 Online Securing Your System CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Strong Security for Your Weak Link: Implementing People-Centric Security Jennifer Cheng, Director of Product Marketing.
Computer Security By Duncan Hall.
Is Vendor Management The New Risk Management? Douglas DeGrote.
Information Security Everyday Best Practices Lock your workstation when you walk away – Hit Ctrl + Alt + Delete Store your passwords securely and don’t.
WHY A SMALL BUSINESS MOBILE APP? PROPOSAL CORTEZ APP BUILDER.
©2015 Check Point Software Technologies Ltd. 1 [Restricted] ONLY for designated groups and individuals CHECK POINT MOBILE THREAT PREVENTION.
NIMAC for Accessible Media Producers: February 2013 NIMAC 2.0 for AMPs.
Moving to BYOD Gary Audin 1.
Managed IT Services JND Consulting Group LLC
JANELL LAYSER Training Manual. AWARENESS! Social Engineers are out there, and everyone should be prepared to deal with them! They can contact you by phone,
Total Enterprise Mobility Comprehensive Management and Security
Introducing Athena Patent Using Artificial Intelligence to revolutionize Patent search and analysis.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
Local Points of Contact Webinar
Security Awareness Program
Business GROWTH With Marketing.
WEL-COME Norton Internet Security Service Number Norton Internet Security Service Number
Putting It All Together
Putting It All Together
What The Right Steps To Check RR Mail If It Is Hacked?
Forensics Week 11.
Cybersecurity Awareness
Unfortunately, any small business could face the risk of a data breach or cyber attack. Regardless of how big or small your business is, if your data,
Information is at the heart of any University, and Harvard is no exception. We create it, analyze it, share it, and apply it. As you would imagine, we.
I have many checklists: how do I get started with cyber security?
Dos and Don’ts.
CONVERCENT INCIDENT REPORTING Employee Training
Move this to online module slides 11-56
Business-class solution
Modern benefits administration and HR software, supported by us.
LAB2-R04 Achieving and Measuring Success with the Security Awareness Maturity Model Lance Spitzner Director SANS Securing The
Presentation transcript:

Lance Spitzner

Non-Existent Compliance Focused Promoting Awareness & Change Long Term Sustainment Metrics Security Awareness Maturity Model

Useful Metrics Focus on just a few, high-value metrics. –A metric that measures a human risk or behavior that you care about –A metric that is actionable –A metric that is low cost/automated –A metric that repeatable

2 Types of Awareness Metrics Metrics that measure the deployment of your awareness program. Are you compliant? Metrics that measure the impact of your awareness program. Are you changing behavior?

Key Points Computers do not have feelings, but people do. Announce and explain your metrics program ahead of time, then start slow & simple Do not embarrass people nor release names of those who fail to management. Only notify management of repeat offenders. Focus on real-world risks, do not ‘trick’ people.

Example Metric - Phishing Recreate the very same attacks that the bad guys are launching. Excellent way to measure change in behavior. –Measures a top human risk –Simple, low-cost and easy to automate –Repeatable and quantifiable measurements –Actionable

Get Approval Before conducting any type of assessment, make sure you have appropriate approvals. If you can’t get approval, try a test run against the blockers (HR, Legal). Make sure security team knows ahead of time. Let them know each time you do it and whom to contact when things go wrong.

Example

Click Results If an end user falls victim to an assessment, you have two general options –Error message/no feedback –Immediate feedback that explains this was a test, what they did wrong and how to protect themselves

Follow-up Send results of test to all employees 24 hours later. Explain the results, how they could have detected phishing and what to look for in the future. Include an image of phishing . Include your monthly security awareness newsletter.

Violations First violation: Employee is notified and given additional or follow-up training. Second violation: Employee is notified and manager is copied. Third violation: Manager is required to have meeting with employee and report results to security. Fourth violation: Employee reported to HR.

The Impact First phish: 30-60% fall victim months later: As low as 5%. The more often the assessments, the more effective the impact. –Quarterly: 19% –Every other month: 12% –Monthly:05% Over time, you will most likely have to increase the difficulty of the tests.

Human Sensors Another valuable metric is how many reported the attack. At some point, you may need to develop a policy on what to report. For example: –Do not report when you know you have a phish. Simply delete. –Report if you don’t know (think APT). –Report if you fell victim.

How To Phish URL Shorteners Marketing Solutions Cloud Phishing Services Pen Testing Software

The Attack

Are People Updating Devices?

Physical Security Behaviors See if an unauthorized person can enter or walk around facilities without an ID badge. Check desktops to make sure computer screens are locked and there is no sensitive information left on desks. Check parked cars for mobile devices left in the open.

Number of Infected Computers Track the number of infected computers on monthly a basis. As most infections are the result of human behavior, the number should go down over time. One Defense Industry organization had such a dramatic drop in infections they could free up half a FTE (Full-Time Employee).

Visualizing Your Measurements

Next Generation Awareness 3 rd Generation STH will be about understanding and measuring User Risk – security and compliance TOGETHER. Measurable metrics to understand whether you’re winning or losing. SANS Security Awareness Summit will have a focus around this initiative – 10 September 2014 in Dallas. Interested in being involved in the development of this new approach? - John Fitzgerald

Summary Metrics are a powerful way to both measure and reinforce your awareness program. securingthehuman.org/resources/metrics sans.org/mgt433