Presentation is loading. Please wait.

Presentation is loading. Please wait.

Curating an Effective Security Culture

Similar presentations


Presentation on theme: "Curating an Effective Security Culture"— Presentation transcript:

1

2 Curating an Effective Security Culture
November 3, 2017 Curating an Effective Security Culture September 18, 2018 AFB Cybersecurity Training

3 Today’s Topics The value of your data Today’s most prolific threats
November 3, 2017 Today’s Topics The value of your data Today’s most prolific threats Elements of cybersecurity Effective training components Personal cyber protection AFB Cybersecurity Training

4 What Is Your Data Worth? $0.50 to $3.00

5 What Is Your Data Worth? $5.00 to $25.00

6 What Is Your Data Worth? $100 to $350

7 What Is Your Data Worth? $300 to $600

8 Global Cybercrime Statistics
November 3, 2017 Global Cybercrime Statistics $600 Billion-a-year enterprise Cybercrime-as-a-Service (CaaS) Third costliest category of global crime (behind only government corruption and drug trafficking) - FBI Office of Private Sector Digest March 12, 2018 AFB Cybersecurity Training

9 Top Cyber Threats to Your Business – 2018
November 3, 2017 Top Cyber Threats to Your Business – 2018 Ransomware Business Compromise Phishing Identity Theft AFB Cybersecurity Training

10 November 3, 2017 AFB Cybersecurity Training

11 Average Revenue per Transaction

12 Malware Attack Vectors
Source: Osterman Research, Inc.

13 Targeted Malware (Spear-phishing) is effective 2 out of 3 times.

14 Elements of Effective IT Security
November 3, 2017 Elements of Effective IT Security Strong network security: Firewall Anti-virus security Consistent patching Web content filtering Don’t click! Classify and protect data Password management Mobile security GSRM Security Awareness Training 2018

15 Elements of an Effective Training Program
Instructor-led information security seminar for your employees and staff Professional video for absent/new team members Periodic micro information security training s/newsletters Simulated phishing attacks to test employee information security posture Rinse and Repeat!

16 November 3, 2017 Milton’s 99% Rule You can avoid 99% of potential breach and compliance issues if you follow the basic security protocols.

17 Milton’s Best Practices
Multi-factor Authentication (MFA/2FA) Strong network security: Firewall Anti-virus security Consistent patching Web content filtering Password management Freeze your credit

18 IT Compliance • Managed IT Services • CyberSecurity
Nashville, TN • Louisville, KY • Rochester, NY Milton Bartley • CEO • (888) •


Download ppt "Curating an Effective Security Culture"

Similar presentations


Ads by Google