Housekeeping Tw itter: # ACMW ebinarSec Welcome to today s ACM - - PowerPoint PPT Presentation

housekeeping
SMART_READER_LITE
LIVE PREVIEW

Housekeeping Tw itter: # ACMW ebinarSec Welcome to today s ACM - - PowerPoint PPT Presentation

Housekeeping Tw itter: # ACMW ebinarSec Welcome to today s ACM Webinar. The presentation starts at the top of the hour. If you are experiencing any problems/ issues, refresh your console by pressing the F5 key on your keyboard


slide-1
SLIDE 1

“Housekeeping”

Tw itter: # ACMW ebinarSec

  • Welcome to today’s ACM Webinar. The presentation starts at the top of the hour.
  • If you are experiencing any problems/ issues, refresh your console by pressing the F5 key on your

keyboard in W indow s, Com m and + R if on a Mac, or refresh your browser if you’re on a mobile device; or close and re-launch the presentation. You can also view the Webcast Help Guide, by clicking on the “Help” widget in the bottom dock.

  • To control volume, adjust the master volume on your computer.
  • If you think of a question during the presentation, please type it into the Q&A box and click on the

submit button. You do not need to wait until the end of the presentation to begin submitting questions.

  • At the end of the presentation, you’ll see a survey open in your browser. Please take a minute to

fill it out to help us improve your next webinar experience.

  • You can download a copy of these slides by clicking on the Resources widget in the bottom dock.
  • This presentation is being recorded and will be available for on-demand viewing in the next 1-2
  • days. You will receive an autom atic e-m ail notification when the recording is ready.

1

slide-2
SLIDE 2

Getting Cyber Safety Through to Employees (and anyone else)

Ron Woerner Twitter: @ronw123 Bellevue University Director CyberSecurity Studies

slide-3
SLIDE 3
  • 1,400+ trusted technical books and videos by leading publishers including

O’Reilly, Morgan Kaufmann, others

  • Online courses with assessments and certification-track mentoring, member

discounts on tuition at partner institutions

  • Learning Webinars on big topics (Cloud/ Mobile Development, Cybersecurity, Big

Data, Recommender Systems, SaaS, Agile, Machine Learning, NLP , Hadoop, Parallel Programming, etc.)

  • ACM Tech Packs on top current computing topics: Annotated Bibliographies

compiled by subject experts

  • Popular video tutorials/ keynotes from ACM Digital Library, A.M. Turing Centenary

talks/ panels

  • Podcasts with industry leaders/ award winners

ACM Learning Center

http://learning.acm.org

3

slide-4
SLIDE 4

“Housekeeping”

  • If you are experiencing any problems/ issues, refresh your console by pressing the F5 key on your

keyboard in W indow s, Com m and + R if on a Mac, or refresh your browser if you’re on a mobile device; or close and re-launch the presentation. You can also view the Webcast Help Guide, by clicking on the “Help” widget in the bottom dock.

  • To control volume, adjust the master volume on your computer.
  • If you think of a question during the presentation, please type it into the Q&A box and click on the

submit button. You do not need to wait until the end of the presentation to begin submitting questions.

  • At the end of the presentation, you’ll see a survey open in your browser. Please take a minute to

fill it out to help us improve your next webinar experience.

  • You can download a copy of these slides by clicking on the Resources widget in the bottom dock.
  • This presentation is being recorded and will be available for on-demand viewing in the next 1-2
  • days. You will receive an autom atic e-m ail notification when the recording is ready.

4

slide-5
SLIDE 5

Talk Back

  • Use the Facebook widget in the bottom panel

to share this presentation with friends and colleagues

  • Use Tw itter widget to Tweet your favorite

quotes from today’s presentation with hashtag # ACMW ebinarSec

  • Submit questions and comments via Twitter to

@acm education – we’re reading them!

5

slide-6
SLIDE 6

Poll

What % of security breaches were caused by human error:

  • 23%
  • 31%
  • 42%

6

slide-7
SLIDE 7

Poll

What % of security breaches were caused by human error:

  • 13%
  • 31%
  • 43%
  • 62%

7

Source: http://www.futuristech.info/etc/interesting-infographic-shows-security- breaches-are-getting-more-costly

slide-8
SLIDE 8

8

Human Paradox

slide-9
SLIDE 9

9

slide-10
SLIDE 10

10

Human Paradox

slide-11
SLIDE 11

It might seem basic, but…

11

http://www.bloomberg.com/graphics/2014-data-breaches/

slide-12
SLIDE 12

Human Paradox

12

Humans continue to be

  • ur weakest link.

We need humans to keep

  • ur organization going.
slide-13
SLIDE 13

Poll

How often does your organization perform security awareness:

  • Once a month
  • Once every six months
  • Once a year
  • When they think about it
  • What’s that?

13

slide-14
SLIDE 14

Why have an awareness program?

14

slide-15
SLIDE 15

What it’s all about

15

slide-16
SLIDE 16

Human Paradox

16

slide-17
SLIDE 17

17

Employees as part of t he solut ion

slide-18
SLIDE 18

Educate to Change Specific Behaviors

18

Build their Security Mindset Ask, “Who Owns the Headache?”

Start with Why?

Risks, Threats & Vulnerabilities Continuous Process

They do and we do

Effective Awareness

slide-19
SLIDE 19

Page 19

Educate to change specific behaviors

slide-20
SLIDE 20

20

Make it Personal

slide-21
SLIDE 21

Page 21

Who owns the Headache?

slide-22
SLIDE 22

Page 22

Building the Security Mindset

slide-23
SLIDE 23

Page 23

Building the Security Mindset

slide-24
SLIDE 24

Page 24

Building the Security Mindset

slide-25
SLIDE 25

Page 25

Phishing –

Educate to change behavior

slide-26
SLIDE 26

26

slide-27
SLIDE 27

Poll

What is your greatest cyber awareness challenge:

  • Users don’t participate / engage
  • Management not involved
  • Lack of good material
  • Time to do it
  • Other

27

slide-28
SLIDE 28

Ways to Get Involved -

click here

28

http://www.staysafeonline.org/data-privacy-day/

slide-29
SLIDE 29

click here

29

slide-30
SLIDE 30

MS-ISAC - http://msisac.cisecurity.org/

http://stcguide.com/ Resources & PSAs: http://stcguide.com/resource-index/

30

slide-31
SLIDE 31

http://www.dhs.gov/stopthinkconnect http://staysafeonline.org/

31

slide-32
SLIDE 32

What it’s all about

32

slide-33
SLIDE 33

Ron Woerner

– Director of Cybersecurity Studies for Bellevue University – 20+ years experience in IT – Security Professional for 15 years – Given tons’o presentations on security and Internet safety – AFA US CyberPatriot Mentor of Year, 2013-2014

33

slide-34
SLIDE 34

Questions???

Webinar Q&A Twitter: #ACMWebinarSec

34

slide-35
SLIDE 35

35

slide-36
SLIDE 36

Ron Woerner Ronald . Woerner @ bellevue.edu Twitter: @ronw123 Bellevue University Director MS CyberSecurity Studies

slide-37
SLIDE 37

ACM: The Learning Continues…

  • Questions about this webcast? learning@acm.org
  • ACM Learning Webinars (on-demand archive):

http://learning.acm.org/webinar

  • ACM SIGCAS: http://www.sigcas.org/
  • ACM Learning Center: http://learning.acm.org

– Books and Videos:

  • CISSP All-in-One Exam Guide, Sixth Edition
  • Computer and Information Security Handbook
  • Learning Whitehat Hacking and Penetration Testing
  • Network and System Security
  • Network Intrusion Analysis
  • Violent Python
  • …and more

– Courses

  • Certified Ethical Hacker (CEH) v8
  • CISSP 2013 Domain
  • …and others

37