Download presentation
Presentation is loading. Please wait.
2
Curating an Effective Security Culture
November 3, 2017 Curating an Effective Security Culture September 18, 2018 AFB Cybersecurity Training
3
Today’s Topics The value of your data Today’s most prolific threats
November 3, 2017 Today’s Topics The value of your data Today’s most prolific threats Elements of cybersecurity Effective training components Personal cyber protection AFB Cybersecurity Training
4
What Is Your Data Worth? $0.50 to $3.00
5
What Is Your Data Worth? $5.00 to $25.00
6
What Is Your Data Worth? $100 to $350
7
What Is Your Data Worth? $300 to $600
8
Global Cybercrime Statistics
November 3, 2017 Global Cybercrime Statistics $600 Billion-a-year enterprise Cybercrime-as-a-Service (CaaS) Third costliest category of global crime (behind only government corruption and drug trafficking) - FBI Office of Private Sector Digest March 12, 2018 AFB Cybersecurity Training
9
Top Cyber Threats to Your Business – 2018
November 3, 2017 Top Cyber Threats to Your Business – 2018 Ransomware Business Compromise Phishing Identity Theft AFB Cybersecurity Training
10
November 3, 2017 AFB Cybersecurity Training
11
Average Revenue per Transaction
12
Malware Attack Vectors
Source: Osterman Research, Inc.
13
Targeted Malware (Spear-phishing) is effective 2 out of 3 times.
14
Elements of Effective IT Security
November 3, 2017 Elements of Effective IT Security Strong network security: Firewall Anti-virus security Consistent patching Web content filtering Don’t click! Classify and protect data Password management Mobile security GSRM Security Awareness Training 2018
15
Elements of an Effective Training Program
Instructor-led information security seminar for your employees and staff Professional video for absent/new team members Periodic micro information security training s/newsletters Simulated phishing attacks to test employee information security posture Rinse and Repeat!
16
November 3, 2017 Milton’s 99% Rule You can avoid 99% of potential breach and compliance issues if you follow the basic security protocols.
17
Milton’s Best Practices
Multi-factor Authentication (MFA/2FA) Strong network security: Firewall Anti-virus security Consistent patching Web content filtering Password management Freeze your credit
18
IT Compliance • Managed IT Services • CyberSecurity
Nashville, TN • Louisville, KY • Rochester, NY Milton Bartley • CEO • (888) •
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.