cybersecurity, compliance, mobility, and protecting ...€¦ · cybersecurity tips! don’t bank on...

28
© 2011 Global Knowledge Training LLC. All rights reserved. 12/8/2015 Page 1 Cybersecurity, Compliance, Mobility, and Protecting Information David Willson Attorney at Law CISSP, Security +

Upload: others

Post on 15-Jun-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Cybersecurity, Compliance, Mobility, and Protecting ...€¦ · Cybersecurity Tips! Don’t bank on your smartphone If banking online, make sure the bank window is the only one open,

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 1

Cybersecurity ComplianceMobility and Protecting

Information

David Willson Attorney at Law

CISSP Security +

Agenda Why Train Because everyone loves training

What you should remember

The threat and how technology has made loss and theft of info quick and easy

How to lower risk liability protect info and build customer confidence

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 2

What is your pain

Do you know someone or a company that

Has lost data or had data stolen

Had a mobile device with important info lost or stolen

Been fined or sued lost customers reputation time or revenue

Been HACKED

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 3

The Training Challenge

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 4

reat

What to Remember

The Th is REAL

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 5

The Threat

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 6

1

Conn of

OVERWHELMING

Verizon data breach report shows weak passwords at root of 201

data breaches

ficials investigating possible data breach

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 7

The Value of Information

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 8

Whatrsquos Their Motivation

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 9

So who is the target

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 10

How Trusting Are You

Trust but Verify

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 11

The Issue

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 12

Do you drop your security guard when yougo home

Training is about changing attitudes about security and

keeping people alert

ldquoThink before you

clickrdquo

ldquoKnow when to hold em know when to fold emrdquo

ldquoKnow when to say NOrdquo

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 13

Okay letrsquos take a breath

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 14

Games

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 15

Convenience vs Security

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 16

Interesting Comments I have Heard

ldquoIrsquom not worried about itrdquo

ldquoMy computer company said I am securerdquo

ldquoI donrsquot have anything the hackers wantrdquo

ldquoI have a really good password Itrsquos really longrdquo

ldquoThat is not my area IT is responsible for securing infordquo

ldquoIts not my information and its not my jobrdquo

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 17

The Risk

Whatrsquos the Risk of bad security practices National security issue Embarrassment Loss of Revenue Bankruptcy Loss of customer confidence Loss of proprietary datatrade secrets

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 18

The Liability

Whorsquos liable when information is lost or stolen YOU

One of consumersrsquo biggest fears is identity theft

Loss leads to fines lawsuits and negative reputation

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 19

Must Have Security

Compliance depending on your industry requires security

Commonsense and your fiduciary responsibility requires good security

As an employee you have a responsibility to protect company information

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 20

How To Reduce Risk ndash Eliminate Liability

1 Determine what information you are collecting processing and storing

2 Who has access to that information 3 Categorize the info based on sensitivity 4 Write the policies showing how info is secured

protected and to educate employees on their responsibilities

5 Train train train

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 21

Policy Must Haves

Policies outline how the company is implementing security ndash so a security policy is a MUST

Policies provide employees notice of dorsquos and donrsquots as well as their responsibility

Some other policies social media BYOD wireless work from home password Internet usage or AUP etc Also for certain industries compliance policies

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 22

What did we learn

Hackersthieves want everything not just credit card rsquos

Mobile devices have increased the threat Stealing datainfo is relatively easy It can lead to catastrophic consequences Training is the key Keep training interesting fun and interactive Take a personal interest in protecting all info

not just your own

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 23

Cybersecurity Tips

Donrsquot bank on your smartphone If banking online make sure the bank window is

the only one open and the URL says Https When using public WiFi like a coffee shop

airport hotel use a proxy like Hotspot Donrsquot click on links in email go to the site like

Facebook LinkedIn etc When you can encrypt all data Donrsquot click on the ldquounsubscriberdquo link on

unwanted emails It validates your email and may add you to spam

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 24

BLUF End User is the Target

Train the Workforce to A Recognize the threat B Recognize the scams C Understand the Value of Information

Training should be A Interesting B Engaging C Continuous

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 25

Donrsquot Be This Guy

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 26

commended Global Knowledge Courses

Certified Ethical Hacker v7 Cybersecurity Foundations Foundstone Ultimate Hacking Defending Windows Networks Cybersecurity Mobility amp Compliance Course (CSMCC)

wwwglobalknowledgecom 1-877-333-8326

Questions

David Willson JD LLM CISSP Security +

(719) 648-4176 davidtitaninfosecuritygroupcom wwwtitaninfosecuritygroupcom

Page 2: Cybersecurity, Compliance, Mobility, and Protecting ...€¦ · Cybersecurity Tips! Don’t bank on your smartphone If banking online, make sure the bank window is the only one open,

Agenda Why Train Because everyone loves training

What you should remember

The threat and how technology has made loss and theft of info quick and easy

How to lower risk liability protect info and build customer confidence

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 2

What is your pain

Do you know someone or a company that

Has lost data or had data stolen

Had a mobile device with important info lost or stolen

Been fined or sued lost customers reputation time or revenue

Been HACKED

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 3

The Training Challenge

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 4

reat

What to Remember

The Th is REAL

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 5

The Threat

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 6

1

Conn of

OVERWHELMING

Verizon data breach report shows weak passwords at root of 201

data breaches

ficials investigating possible data breach

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 7

The Value of Information

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 8

Whatrsquos Their Motivation

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 9

So who is the target

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 10

How Trusting Are You

Trust but Verify

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 11

The Issue

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 12

Do you drop your security guard when yougo home

Training is about changing attitudes about security and

keeping people alert

ldquoThink before you

clickrdquo

ldquoKnow when to hold em know when to fold emrdquo

ldquoKnow when to say NOrdquo

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 13

Okay letrsquos take a breath

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 14

Games

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 15

Convenience vs Security

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 16

Interesting Comments I have Heard

ldquoIrsquom not worried about itrdquo

ldquoMy computer company said I am securerdquo

ldquoI donrsquot have anything the hackers wantrdquo

ldquoI have a really good password Itrsquos really longrdquo

ldquoThat is not my area IT is responsible for securing infordquo

ldquoIts not my information and its not my jobrdquo

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 17

The Risk

Whatrsquos the Risk of bad security practices National security issue Embarrassment Loss of Revenue Bankruptcy Loss of customer confidence Loss of proprietary datatrade secrets

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 18

The Liability

Whorsquos liable when information is lost or stolen YOU

One of consumersrsquo biggest fears is identity theft

Loss leads to fines lawsuits and negative reputation

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 19

Must Have Security

Compliance depending on your industry requires security

Commonsense and your fiduciary responsibility requires good security

As an employee you have a responsibility to protect company information

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 20

How To Reduce Risk ndash Eliminate Liability

1 Determine what information you are collecting processing and storing

2 Who has access to that information 3 Categorize the info based on sensitivity 4 Write the policies showing how info is secured

protected and to educate employees on their responsibilities

5 Train train train

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 21

Policy Must Haves

Policies outline how the company is implementing security ndash so a security policy is a MUST

Policies provide employees notice of dorsquos and donrsquots as well as their responsibility

Some other policies social media BYOD wireless work from home password Internet usage or AUP etc Also for certain industries compliance policies

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 22

What did we learn

Hackersthieves want everything not just credit card rsquos

Mobile devices have increased the threat Stealing datainfo is relatively easy It can lead to catastrophic consequences Training is the key Keep training interesting fun and interactive Take a personal interest in protecting all info

not just your own

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 23

Cybersecurity Tips

Donrsquot bank on your smartphone If banking online make sure the bank window is

the only one open and the URL says Https When using public WiFi like a coffee shop

airport hotel use a proxy like Hotspot Donrsquot click on links in email go to the site like

Facebook LinkedIn etc When you can encrypt all data Donrsquot click on the ldquounsubscriberdquo link on

unwanted emails It validates your email and may add you to spam

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 24

BLUF End User is the Target

Train the Workforce to A Recognize the threat B Recognize the scams C Understand the Value of Information

Training should be A Interesting B Engaging C Continuous

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 25

Donrsquot Be This Guy

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 26

commended Global Knowledge Courses

Certified Ethical Hacker v7 Cybersecurity Foundations Foundstone Ultimate Hacking Defending Windows Networks Cybersecurity Mobility amp Compliance Course (CSMCC)

wwwglobalknowledgecom 1-877-333-8326

Questions

David Willson JD LLM CISSP Security +

(719) 648-4176 davidtitaninfosecuritygroupcom wwwtitaninfosecuritygroupcom

Page 3: Cybersecurity, Compliance, Mobility, and Protecting ...€¦ · Cybersecurity Tips! Don’t bank on your smartphone If banking online, make sure the bank window is the only one open,

What is your pain

Do you know someone or a company that

Has lost data or had data stolen

Had a mobile device with important info lost or stolen

Been fined or sued lost customers reputation time or revenue

Been HACKED

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 3

The Training Challenge

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 4

reat

What to Remember

The Th is REAL

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 5

The Threat

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 6

1

Conn of

OVERWHELMING

Verizon data breach report shows weak passwords at root of 201

data breaches

ficials investigating possible data breach

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 7

The Value of Information

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 8

Whatrsquos Their Motivation

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 9

So who is the target

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 10

How Trusting Are You

Trust but Verify

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 11

The Issue

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 12

Do you drop your security guard when yougo home

Training is about changing attitudes about security and

keeping people alert

ldquoThink before you

clickrdquo

ldquoKnow when to hold em know when to fold emrdquo

ldquoKnow when to say NOrdquo

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 13

Okay letrsquos take a breath

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 14

Games

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 15

Convenience vs Security

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 16

Interesting Comments I have Heard

ldquoIrsquom not worried about itrdquo

ldquoMy computer company said I am securerdquo

ldquoI donrsquot have anything the hackers wantrdquo

ldquoI have a really good password Itrsquos really longrdquo

ldquoThat is not my area IT is responsible for securing infordquo

ldquoIts not my information and its not my jobrdquo

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 17

The Risk

Whatrsquos the Risk of bad security practices National security issue Embarrassment Loss of Revenue Bankruptcy Loss of customer confidence Loss of proprietary datatrade secrets

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 18

The Liability

Whorsquos liable when information is lost or stolen YOU

One of consumersrsquo biggest fears is identity theft

Loss leads to fines lawsuits and negative reputation

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 19

Must Have Security

Compliance depending on your industry requires security

Commonsense and your fiduciary responsibility requires good security

As an employee you have a responsibility to protect company information

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 20

How To Reduce Risk ndash Eliminate Liability

1 Determine what information you are collecting processing and storing

2 Who has access to that information 3 Categorize the info based on sensitivity 4 Write the policies showing how info is secured

protected and to educate employees on their responsibilities

5 Train train train

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 21

Policy Must Haves

Policies outline how the company is implementing security ndash so a security policy is a MUST

Policies provide employees notice of dorsquos and donrsquots as well as their responsibility

Some other policies social media BYOD wireless work from home password Internet usage or AUP etc Also for certain industries compliance policies

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 22

What did we learn

Hackersthieves want everything not just credit card rsquos

Mobile devices have increased the threat Stealing datainfo is relatively easy It can lead to catastrophic consequences Training is the key Keep training interesting fun and interactive Take a personal interest in protecting all info

not just your own

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 23

Cybersecurity Tips

Donrsquot bank on your smartphone If banking online make sure the bank window is

the only one open and the URL says Https When using public WiFi like a coffee shop

airport hotel use a proxy like Hotspot Donrsquot click on links in email go to the site like

Facebook LinkedIn etc When you can encrypt all data Donrsquot click on the ldquounsubscriberdquo link on

unwanted emails It validates your email and may add you to spam

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 24

BLUF End User is the Target

Train the Workforce to A Recognize the threat B Recognize the scams C Understand the Value of Information

Training should be A Interesting B Engaging C Continuous

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 25

Donrsquot Be This Guy

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 26

commended Global Knowledge Courses

Certified Ethical Hacker v7 Cybersecurity Foundations Foundstone Ultimate Hacking Defending Windows Networks Cybersecurity Mobility amp Compliance Course (CSMCC)

wwwglobalknowledgecom 1-877-333-8326

Questions

David Willson JD LLM CISSP Security +

(719) 648-4176 davidtitaninfosecuritygroupcom wwwtitaninfosecuritygroupcom

Page 4: Cybersecurity, Compliance, Mobility, and Protecting ...€¦ · Cybersecurity Tips! Don’t bank on your smartphone If banking online, make sure the bank window is the only one open,

The Training Challenge

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 4

reat

What to Remember

The Th is REAL

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 5

The Threat

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 6

1

Conn of

OVERWHELMING

Verizon data breach report shows weak passwords at root of 201

data breaches

ficials investigating possible data breach

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 7

The Value of Information

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 8

Whatrsquos Their Motivation

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 9

So who is the target

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 10

How Trusting Are You

Trust but Verify

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 11

The Issue

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 12

Do you drop your security guard when yougo home

Training is about changing attitudes about security and

keeping people alert

ldquoThink before you

clickrdquo

ldquoKnow when to hold em know when to fold emrdquo

ldquoKnow when to say NOrdquo

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 13

Okay letrsquos take a breath

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 14

Games

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 15

Convenience vs Security

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 16

Interesting Comments I have Heard

ldquoIrsquom not worried about itrdquo

ldquoMy computer company said I am securerdquo

ldquoI donrsquot have anything the hackers wantrdquo

ldquoI have a really good password Itrsquos really longrdquo

ldquoThat is not my area IT is responsible for securing infordquo

ldquoIts not my information and its not my jobrdquo

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 17

The Risk

Whatrsquos the Risk of bad security practices National security issue Embarrassment Loss of Revenue Bankruptcy Loss of customer confidence Loss of proprietary datatrade secrets

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 18

The Liability

Whorsquos liable when information is lost or stolen YOU

One of consumersrsquo biggest fears is identity theft

Loss leads to fines lawsuits and negative reputation

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 19

Must Have Security

Compliance depending on your industry requires security

Commonsense and your fiduciary responsibility requires good security

As an employee you have a responsibility to protect company information

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 20

How To Reduce Risk ndash Eliminate Liability

1 Determine what information you are collecting processing and storing

2 Who has access to that information 3 Categorize the info based on sensitivity 4 Write the policies showing how info is secured

protected and to educate employees on their responsibilities

5 Train train train

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 21

Policy Must Haves

Policies outline how the company is implementing security ndash so a security policy is a MUST

Policies provide employees notice of dorsquos and donrsquots as well as their responsibility

Some other policies social media BYOD wireless work from home password Internet usage or AUP etc Also for certain industries compliance policies

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 22

What did we learn

Hackersthieves want everything not just credit card rsquos

Mobile devices have increased the threat Stealing datainfo is relatively easy It can lead to catastrophic consequences Training is the key Keep training interesting fun and interactive Take a personal interest in protecting all info

not just your own

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 23

Cybersecurity Tips

Donrsquot bank on your smartphone If banking online make sure the bank window is

the only one open and the URL says Https When using public WiFi like a coffee shop

airport hotel use a proxy like Hotspot Donrsquot click on links in email go to the site like

Facebook LinkedIn etc When you can encrypt all data Donrsquot click on the ldquounsubscriberdquo link on

unwanted emails It validates your email and may add you to spam

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 24

BLUF End User is the Target

Train the Workforce to A Recognize the threat B Recognize the scams C Understand the Value of Information

Training should be A Interesting B Engaging C Continuous

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 25

Donrsquot Be This Guy

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 26

commended Global Knowledge Courses

Certified Ethical Hacker v7 Cybersecurity Foundations Foundstone Ultimate Hacking Defending Windows Networks Cybersecurity Mobility amp Compliance Course (CSMCC)

wwwglobalknowledgecom 1-877-333-8326

Questions

David Willson JD LLM CISSP Security +

(719) 648-4176 davidtitaninfosecuritygroupcom wwwtitaninfosecuritygroupcom

Page 5: Cybersecurity, Compliance, Mobility, and Protecting ...€¦ · Cybersecurity Tips! Don’t bank on your smartphone If banking online, make sure the bank window is the only one open,

reat

What to Remember

The Th is REAL

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 5

The Threat

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 6

1

Conn of

OVERWHELMING

Verizon data breach report shows weak passwords at root of 201

data breaches

ficials investigating possible data breach

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 7

The Value of Information

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 8

Whatrsquos Their Motivation

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 9

So who is the target

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 10

How Trusting Are You

Trust but Verify

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 11

The Issue

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 12

Do you drop your security guard when yougo home

Training is about changing attitudes about security and

keeping people alert

ldquoThink before you

clickrdquo

ldquoKnow when to hold em know when to fold emrdquo

ldquoKnow when to say NOrdquo

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 13

Okay letrsquos take a breath

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 14

Games

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 15

Convenience vs Security

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 16

Interesting Comments I have Heard

ldquoIrsquom not worried about itrdquo

ldquoMy computer company said I am securerdquo

ldquoI donrsquot have anything the hackers wantrdquo

ldquoI have a really good password Itrsquos really longrdquo

ldquoThat is not my area IT is responsible for securing infordquo

ldquoIts not my information and its not my jobrdquo

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 17

The Risk

Whatrsquos the Risk of bad security practices National security issue Embarrassment Loss of Revenue Bankruptcy Loss of customer confidence Loss of proprietary datatrade secrets

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 18

The Liability

Whorsquos liable when information is lost or stolen YOU

One of consumersrsquo biggest fears is identity theft

Loss leads to fines lawsuits and negative reputation

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 19

Must Have Security

Compliance depending on your industry requires security

Commonsense and your fiduciary responsibility requires good security

As an employee you have a responsibility to protect company information

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 20

How To Reduce Risk ndash Eliminate Liability

1 Determine what information you are collecting processing and storing

2 Who has access to that information 3 Categorize the info based on sensitivity 4 Write the policies showing how info is secured

protected and to educate employees on their responsibilities

5 Train train train

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 21

Policy Must Haves

Policies outline how the company is implementing security ndash so a security policy is a MUST

Policies provide employees notice of dorsquos and donrsquots as well as their responsibility

Some other policies social media BYOD wireless work from home password Internet usage or AUP etc Also for certain industries compliance policies

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 22

What did we learn

Hackersthieves want everything not just credit card rsquos

Mobile devices have increased the threat Stealing datainfo is relatively easy It can lead to catastrophic consequences Training is the key Keep training interesting fun and interactive Take a personal interest in protecting all info

not just your own

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 23

Cybersecurity Tips

Donrsquot bank on your smartphone If banking online make sure the bank window is

the only one open and the URL says Https When using public WiFi like a coffee shop

airport hotel use a proxy like Hotspot Donrsquot click on links in email go to the site like

Facebook LinkedIn etc When you can encrypt all data Donrsquot click on the ldquounsubscriberdquo link on

unwanted emails It validates your email and may add you to spam

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 24

BLUF End User is the Target

Train the Workforce to A Recognize the threat B Recognize the scams C Understand the Value of Information

Training should be A Interesting B Engaging C Continuous

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 25

Donrsquot Be This Guy

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 26

commended Global Knowledge Courses

Certified Ethical Hacker v7 Cybersecurity Foundations Foundstone Ultimate Hacking Defending Windows Networks Cybersecurity Mobility amp Compliance Course (CSMCC)

wwwglobalknowledgecom 1-877-333-8326

Questions

David Willson JD LLM CISSP Security +

(719) 648-4176 davidtitaninfosecuritygroupcom wwwtitaninfosecuritygroupcom

Page 6: Cybersecurity, Compliance, Mobility, and Protecting ...€¦ · Cybersecurity Tips! Don’t bank on your smartphone If banking online, make sure the bank window is the only one open,

The Threat

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 6

1

Conn of

OVERWHELMING

Verizon data breach report shows weak passwords at root of 201

data breaches

ficials investigating possible data breach

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 7

The Value of Information

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 8

Whatrsquos Their Motivation

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 9

So who is the target

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 10

How Trusting Are You

Trust but Verify

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 11

The Issue

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 12

Do you drop your security guard when yougo home

Training is about changing attitudes about security and

keeping people alert

ldquoThink before you

clickrdquo

ldquoKnow when to hold em know when to fold emrdquo

ldquoKnow when to say NOrdquo

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 13

Okay letrsquos take a breath

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 14

Games

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 15

Convenience vs Security

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 16

Interesting Comments I have Heard

ldquoIrsquom not worried about itrdquo

ldquoMy computer company said I am securerdquo

ldquoI donrsquot have anything the hackers wantrdquo

ldquoI have a really good password Itrsquos really longrdquo

ldquoThat is not my area IT is responsible for securing infordquo

ldquoIts not my information and its not my jobrdquo

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 17

The Risk

Whatrsquos the Risk of bad security practices National security issue Embarrassment Loss of Revenue Bankruptcy Loss of customer confidence Loss of proprietary datatrade secrets

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 18

The Liability

Whorsquos liable when information is lost or stolen YOU

One of consumersrsquo biggest fears is identity theft

Loss leads to fines lawsuits and negative reputation

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 19

Must Have Security

Compliance depending on your industry requires security

Commonsense and your fiduciary responsibility requires good security

As an employee you have a responsibility to protect company information

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 20

How To Reduce Risk ndash Eliminate Liability

1 Determine what information you are collecting processing and storing

2 Who has access to that information 3 Categorize the info based on sensitivity 4 Write the policies showing how info is secured

protected and to educate employees on their responsibilities

5 Train train train

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 21

Policy Must Haves

Policies outline how the company is implementing security ndash so a security policy is a MUST

Policies provide employees notice of dorsquos and donrsquots as well as their responsibility

Some other policies social media BYOD wireless work from home password Internet usage or AUP etc Also for certain industries compliance policies

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 22

What did we learn

Hackersthieves want everything not just credit card rsquos

Mobile devices have increased the threat Stealing datainfo is relatively easy It can lead to catastrophic consequences Training is the key Keep training interesting fun and interactive Take a personal interest in protecting all info

not just your own

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 23

Cybersecurity Tips

Donrsquot bank on your smartphone If banking online make sure the bank window is

the only one open and the URL says Https When using public WiFi like a coffee shop

airport hotel use a proxy like Hotspot Donrsquot click on links in email go to the site like

Facebook LinkedIn etc When you can encrypt all data Donrsquot click on the ldquounsubscriberdquo link on

unwanted emails It validates your email and may add you to spam

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 24

BLUF End User is the Target

Train the Workforce to A Recognize the threat B Recognize the scams C Understand the Value of Information

Training should be A Interesting B Engaging C Continuous

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 25

Donrsquot Be This Guy

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 26

commended Global Knowledge Courses

Certified Ethical Hacker v7 Cybersecurity Foundations Foundstone Ultimate Hacking Defending Windows Networks Cybersecurity Mobility amp Compliance Course (CSMCC)

wwwglobalknowledgecom 1-877-333-8326

Questions

David Willson JD LLM CISSP Security +

(719) 648-4176 davidtitaninfosecuritygroupcom wwwtitaninfosecuritygroupcom

Page 7: Cybersecurity, Compliance, Mobility, and Protecting ...€¦ · Cybersecurity Tips! Don’t bank on your smartphone If banking online, make sure the bank window is the only one open,

1

Conn of

OVERWHELMING

Verizon data breach report shows weak passwords at root of 201

data breaches

ficials investigating possible data breach

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 7

The Value of Information

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 8

Whatrsquos Their Motivation

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 9

So who is the target

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 10

How Trusting Are You

Trust but Verify

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 11

The Issue

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 12

Do you drop your security guard when yougo home

Training is about changing attitudes about security and

keeping people alert

ldquoThink before you

clickrdquo

ldquoKnow when to hold em know when to fold emrdquo

ldquoKnow when to say NOrdquo

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 13

Okay letrsquos take a breath

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 14

Games

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 15

Convenience vs Security

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 16

Interesting Comments I have Heard

ldquoIrsquom not worried about itrdquo

ldquoMy computer company said I am securerdquo

ldquoI donrsquot have anything the hackers wantrdquo

ldquoI have a really good password Itrsquos really longrdquo

ldquoThat is not my area IT is responsible for securing infordquo

ldquoIts not my information and its not my jobrdquo

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 17

The Risk

Whatrsquos the Risk of bad security practices National security issue Embarrassment Loss of Revenue Bankruptcy Loss of customer confidence Loss of proprietary datatrade secrets

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 18

The Liability

Whorsquos liable when information is lost or stolen YOU

One of consumersrsquo biggest fears is identity theft

Loss leads to fines lawsuits and negative reputation

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 19

Must Have Security

Compliance depending on your industry requires security

Commonsense and your fiduciary responsibility requires good security

As an employee you have a responsibility to protect company information

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 20

How To Reduce Risk ndash Eliminate Liability

1 Determine what information you are collecting processing and storing

2 Who has access to that information 3 Categorize the info based on sensitivity 4 Write the policies showing how info is secured

protected and to educate employees on their responsibilities

5 Train train train

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 21

Policy Must Haves

Policies outline how the company is implementing security ndash so a security policy is a MUST

Policies provide employees notice of dorsquos and donrsquots as well as their responsibility

Some other policies social media BYOD wireless work from home password Internet usage or AUP etc Also for certain industries compliance policies

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 22

What did we learn

Hackersthieves want everything not just credit card rsquos

Mobile devices have increased the threat Stealing datainfo is relatively easy It can lead to catastrophic consequences Training is the key Keep training interesting fun and interactive Take a personal interest in protecting all info

not just your own

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 23

Cybersecurity Tips

Donrsquot bank on your smartphone If banking online make sure the bank window is

the only one open and the URL says Https When using public WiFi like a coffee shop

airport hotel use a proxy like Hotspot Donrsquot click on links in email go to the site like

Facebook LinkedIn etc When you can encrypt all data Donrsquot click on the ldquounsubscriberdquo link on

unwanted emails It validates your email and may add you to spam

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 24

BLUF End User is the Target

Train the Workforce to A Recognize the threat B Recognize the scams C Understand the Value of Information

Training should be A Interesting B Engaging C Continuous

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 25

Donrsquot Be This Guy

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 26

commended Global Knowledge Courses

Certified Ethical Hacker v7 Cybersecurity Foundations Foundstone Ultimate Hacking Defending Windows Networks Cybersecurity Mobility amp Compliance Course (CSMCC)

wwwglobalknowledgecom 1-877-333-8326

Questions

David Willson JD LLM CISSP Security +

(719) 648-4176 davidtitaninfosecuritygroupcom wwwtitaninfosecuritygroupcom

Page 8: Cybersecurity, Compliance, Mobility, and Protecting ...€¦ · Cybersecurity Tips! Don’t bank on your smartphone If banking online, make sure the bank window is the only one open,

The Value of Information

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 8

Whatrsquos Their Motivation

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 9

So who is the target

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 10

How Trusting Are You

Trust but Verify

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 11

The Issue

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 12

Do you drop your security guard when yougo home

Training is about changing attitudes about security and

keeping people alert

ldquoThink before you

clickrdquo

ldquoKnow when to hold em know when to fold emrdquo

ldquoKnow when to say NOrdquo

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 13

Okay letrsquos take a breath

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 14

Games

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 15

Convenience vs Security

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 16

Interesting Comments I have Heard

ldquoIrsquom not worried about itrdquo

ldquoMy computer company said I am securerdquo

ldquoI donrsquot have anything the hackers wantrdquo

ldquoI have a really good password Itrsquos really longrdquo

ldquoThat is not my area IT is responsible for securing infordquo

ldquoIts not my information and its not my jobrdquo

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 17

The Risk

Whatrsquos the Risk of bad security practices National security issue Embarrassment Loss of Revenue Bankruptcy Loss of customer confidence Loss of proprietary datatrade secrets

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 18

The Liability

Whorsquos liable when information is lost or stolen YOU

One of consumersrsquo biggest fears is identity theft

Loss leads to fines lawsuits and negative reputation

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 19

Must Have Security

Compliance depending on your industry requires security

Commonsense and your fiduciary responsibility requires good security

As an employee you have a responsibility to protect company information

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 20

How To Reduce Risk ndash Eliminate Liability

1 Determine what information you are collecting processing and storing

2 Who has access to that information 3 Categorize the info based on sensitivity 4 Write the policies showing how info is secured

protected and to educate employees on their responsibilities

5 Train train train

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 21

Policy Must Haves

Policies outline how the company is implementing security ndash so a security policy is a MUST

Policies provide employees notice of dorsquos and donrsquots as well as their responsibility

Some other policies social media BYOD wireless work from home password Internet usage or AUP etc Also for certain industries compliance policies

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 22

What did we learn

Hackersthieves want everything not just credit card rsquos

Mobile devices have increased the threat Stealing datainfo is relatively easy It can lead to catastrophic consequences Training is the key Keep training interesting fun and interactive Take a personal interest in protecting all info

not just your own

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 23

Cybersecurity Tips

Donrsquot bank on your smartphone If banking online make sure the bank window is

the only one open and the URL says Https When using public WiFi like a coffee shop

airport hotel use a proxy like Hotspot Donrsquot click on links in email go to the site like

Facebook LinkedIn etc When you can encrypt all data Donrsquot click on the ldquounsubscriberdquo link on

unwanted emails It validates your email and may add you to spam

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 24

BLUF End User is the Target

Train the Workforce to A Recognize the threat B Recognize the scams C Understand the Value of Information

Training should be A Interesting B Engaging C Continuous

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 25

Donrsquot Be This Guy

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 26

commended Global Knowledge Courses

Certified Ethical Hacker v7 Cybersecurity Foundations Foundstone Ultimate Hacking Defending Windows Networks Cybersecurity Mobility amp Compliance Course (CSMCC)

wwwglobalknowledgecom 1-877-333-8326

Questions

David Willson JD LLM CISSP Security +

(719) 648-4176 davidtitaninfosecuritygroupcom wwwtitaninfosecuritygroupcom

Page 9: Cybersecurity, Compliance, Mobility, and Protecting ...€¦ · Cybersecurity Tips! Don’t bank on your smartphone If banking online, make sure the bank window is the only one open,

Whatrsquos Their Motivation

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 9

So who is the target

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 10

How Trusting Are You

Trust but Verify

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 11

The Issue

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 12

Do you drop your security guard when yougo home

Training is about changing attitudes about security and

keeping people alert

ldquoThink before you

clickrdquo

ldquoKnow when to hold em know when to fold emrdquo

ldquoKnow when to say NOrdquo

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 13

Okay letrsquos take a breath

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 14

Games

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 15

Convenience vs Security

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 16

Interesting Comments I have Heard

ldquoIrsquom not worried about itrdquo

ldquoMy computer company said I am securerdquo

ldquoI donrsquot have anything the hackers wantrdquo

ldquoI have a really good password Itrsquos really longrdquo

ldquoThat is not my area IT is responsible for securing infordquo

ldquoIts not my information and its not my jobrdquo

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 17

The Risk

Whatrsquos the Risk of bad security practices National security issue Embarrassment Loss of Revenue Bankruptcy Loss of customer confidence Loss of proprietary datatrade secrets

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 18

The Liability

Whorsquos liable when information is lost or stolen YOU

One of consumersrsquo biggest fears is identity theft

Loss leads to fines lawsuits and negative reputation

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 19

Must Have Security

Compliance depending on your industry requires security

Commonsense and your fiduciary responsibility requires good security

As an employee you have a responsibility to protect company information

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 20

How To Reduce Risk ndash Eliminate Liability

1 Determine what information you are collecting processing and storing

2 Who has access to that information 3 Categorize the info based on sensitivity 4 Write the policies showing how info is secured

protected and to educate employees on their responsibilities

5 Train train train

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 21

Policy Must Haves

Policies outline how the company is implementing security ndash so a security policy is a MUST

Policies provide employees notice of dorsquos and donrsquots as well as their responsibility

Some other policies social media BYOD wireless work from home password Internet usage or AUP etc Also for certain industries compliance policies

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 22

What did we learn

Hackersthieves want everything not just credit card rsquos

Mobile devices have increased the threat Stealing datainfo is relatively easy It can lead to catastrophic consequences Training is the key Keep training interesting fun and interactive Take a personal interest in protecting all info

not just your own

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 23

Cybersecurity Tips

Donrsquot bank on your smartphone If banking online make sure the bank window is

the only one open and the URL says Https When using public WiFi like a coffee shop

airport hotel use a proxy like Hotspot Donrsquot click on links in email go to the site like

Facebook LinkedIn etc When you can encrypt all data Donrsquot click on the ldquounsubscriberdquo link on

unwanted emails It validates your email and may add you to spam

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 24

BLUF End User is the Target

Train the Workforce to A Recognize the threat B Recognize the scams C Understand the Value of Information

Training should be A Interesting B Engaging C Continuous

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 25

Donrsquot Be This Guy

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 26

commended Global Knowledge Courses

Certified Ethical Hacker v7 Cybersecurity Foundations Foundstone Ultimate Hacking Defending Windows Networks Cybersecurity Mobility amp Compliance Course (CSMCC)

wwwglobalknowledgecom 1-877-333-8326

Questions

David Willson JD LLM CISSP Security +

(719) 648-4176 davidtitaninfosecuritygroupcom wwwtitaninfosecuritygroupcom

Page 10: Cybersecurity, Compliance, Mobility, and Protecting ...€¦ · Cybersecurity Tips! Don’t bank on your smartphone If banking online, make sure the bank window is the only one open,

So who is the target

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 10

How Trusting Are You

Trust but Verify

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 11

The Issue

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 12

Do you drop your security guard when yougo home

Training is about changing attitudes about security and

keeping people alert

ldquoThink before you

clickrdquo

ldquoKnow when to hold em know when to fold emrdquo

ldquoKnow when to say NOrdquo

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 13

Okay letrsquos take a breath

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 14

Games

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 15

Convenience vs Security

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 16

Interesting Comments I have Heard

ldquoIrsquom not worried about itrdquo

ldquoMy computer company said I am securerdquo

ldquoI donrsquot have anything the hackers wantrdquo

ldquoI have a really good password Itrsquos really longrdquo

ldquoThat is not my area IT is responsible for securing infordquo

ldquoIts not my information and its not my jobrdquo

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 17

The Risk

Whatrsquos the Risk of bad security practices National security issue Embarrassment Loss of Revenue Bankruptcy Loss of customer confidence Loss of proprietary datatrade secrets

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 18

The Liability

Whorsquos liable when information is lost or stolen YOU

One of consumersrsquo biggest fears is identity theft

Loss leads to fines lawsuits and negative reputation

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 19

Must Have Security

Compliance depending on your industry requires security

Commonsense and your fiduciary responsibility requires good security

As an employee you have a responsibility to protect company information

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 20

How To Reduce Risk ndash Eliminate Liability

1 Determine what information you are collecting processing and storing

2 Who has access to that information 3 Categorize the info based on sensitivity 4 Write the policies showing how info is secured

protected and to educate employees on their responsibilities

5 Train train train

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 21

Policy Must Haves

Policies outline how the company is implementing security ndash so a security policy is a MUST

Policies provide employees notice of dorsquos and donrsquots as well as their responsibility

Some other policies social media BYOD wireless work from home password Internet usage or AUP etc Also for certain industries compliance policies

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 22

What did we learn

Hackersthieves want everything not just credit card rsquos

Mobile devices have increased the threat Stealing datainfo is relatively easy It can lead to catastrophic consequences Training is the key Keep training interesting fun and interactive Take a personal interest in protecting all info

not just your own

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 23

Cybersecurity Tips

Donrsquot bank on your smartphone If banking online make sure the bank window is

the only one open and the URL says Https When using public WiFi like a coffee shop

airport hotel use a proxy like Hotspot Donrsquot click on links in email go to the site like

Facebook LinkedIn etc When you can encrypt all data Donrsquot click on the ldquounsubscriberdquo link on

unwanted emails It validates your email and may add you to spam

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 24

BLUF End User is the Target

Train the Workforce to A Recognize the threat B Recognize the scams C Understand the Value of Information

Training should be A Interesting B Engaging C Continuous

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 25

Donrsquot Be This Guy

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 26

commended Global Knowledge Courses

Certified Ethical Hacker v7 Cybersecurity Foundations Foundstone Ultimate Hacking Defending Windows Networks Cybersecurity Mobility amp Compliance Course (CSMCC)

wwwglobalknowledgecom 1-877-333-8326

Questions

David Willson JD LLM CISSP Security +

(719) 648-4176 davidtitaninfosecuritygroupcom wwwtitaninfosecuritygroupcom

Page 11: Cybersecurity, Compliance, Mobility, and Protecting ...€¦ · Cybersecurity Tips! Don’t bank on your smartphone If banking online, make sure the bank window is the only one open,

How Trusting Are You

Trust but Verify

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 11

The Issue

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 12

Do you drop your security guard when yougo home

Training is about changing attitudes about security and

keeping people alert

ldquoThink before you

clickrdquo

ldquoKnow when to hold em know when to fold emrdquo

ldquoKnow when to say NOrdquo

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 13

Okay letrsquos take a breath

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 14

Games

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 15

Convenience vs Security

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 16

Interesting Comments I have Heard

ldquoIrsquom not worried about itrdquo

ldquoMy computer company said I am securerdquo

ldquoI donrsquot have anything the hackers wantrdquo

ldquoI have a really good password Itrsquos really longrdquo

ldquoThat is not my area IT is responsible for securing infordquo

ldquoIts not my information and its not my jobrdquo

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 17

The Risk

Whatrsquos the Risk of bad security practices National security issue Embarrassment Loss of Revenue Bankruptcy Loss of customer confidence Loss of proprietary datatrade secrets

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 18

The Liability

Whorsquos liable when information is lost or stolen YOU

One of consumersrsquo biggest fears is identity theft

Loss leads to fines lawsuits and negative reputation

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 19

Must Have Security

Compliance depending on your industry requires security

Commonsense and your fiduciary responsibility requires good security

As an employee you have a responsibility to protect company information

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 20

How To Reduce Risk ndash Eliminate Liability

1 Determine what information you are collecting processing and storing

2 Who has access to that information 3 Categorize the info based on sensitivity 4 Write the policies showing how info is secured

protected and to educate employees on their responsibilities

5 Train train train

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 21

Policy Must Haves

Policies outline how the company is implementing security ndash so a security policy is a MUST

Policies provide employees notice of dorsquos and donrsquots as well as their responsibility

Some other policies social media BYOD wireless work from home password Internet usage or AUP etc Also for certain industries compliance policies

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 22

What did we learn

Hackersthieves want everything not just credit card rsquos

Mobile devices have increased the threat Stealing datainfo is relatively easy It can lead to catastrophic consequences Training is the key Keep training interesting fun and interactive Take a personal interest in protecting all info

not just your own

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 23

Cybersecurity Tips

Donrsquot bank on your smartphone If banking online make sure the bank window is

the only one open and the URL says Https When using public WiFi like a coffee shop

airport hotel use a proxy like Hotspot Donrsquot click on links in email go to the site like

Facebook LinkedIn etc When you can encrypt all data Donrsquot click on the ldquounsubscriberdquo link on

unwanted emails It validates your email and may add you to spam

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 24

BLUF End User is the Target

Train the Workforce to A Recognize the threat B Recognize the scams C Understand the Value of Information

Training should be A Interesting B Engaging C Continuous

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 25

Donrsquot Be This Guy

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 26

commended Global Knowledge Courses

Certified Ethical Hacker v7 Cybersecurity Foundations Foundstone Ultimate Hacking Defending Windows Networks Cybersecurity Mobility amp Compliance Course (CSMCC)

wwwglobalknowledgecom 1-877-333-8326

Questions

David Willson JD LLM CISSP Security +

(719) 648-4176 davidtitaninfosecuritygroupcom wwwtitaninfosecuritygroupcom

Page 12: Cybersecurity, Compliance, Mobility, and Protecting ...€¦ · Cybersecurity Tips! Don’t bank on your smartphone If banking online, make sure the bank window is the only one open,

The Issue

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 12

Do you drop your security guard when yougo home

Training is about changing attitudes about security and

keeping people alert

ldquoThink before you

clickrdquo

ldquoKnow when to hold em know when to fold emrdquo

ldquoKnow when to say NOrdquo

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 13

Okay letrsquos take a breath

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 14

Games

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 15

Convenience vs Security

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 16

Interesting Comments I have Heard

ldquoIrsquom not worried about itrdquo

ldquoMy computer company said I am securerdquo

ldquoI donrsquot have anything the hackers wantrdquo

ldquoI have a really good password Itrsquos really longrdquo

ldquoThat is not my area IT is responsible for securing infordquo

ldquoIts not my information and its not my jobrdquo

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 17

The Risk

Whatrsquos the Risk of bad security practices National security issue Embarrassment Loss of Revenue Bankruptcy Loss of customer confidence Loss of proprietary datatrade secrets

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 18

The Liability

Whorsquos liable when information is lost or stolen YOU

One of consumersrsquo biggest fears is identity theft

Loss leads to fines lawsuits and negative reputation

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 19

Must Have Security

Compliance depending on your industry requires security

Commonsense and your fiduciary responsibility requires good security

As an employee you have a responsibility to protect company information

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 20

How To Reduce Risk ndash Eliminate Liability

1 Determine what information you are collecting processing and storing

2 Who has access to that information 3 Categorize the info based on sensitivity 4 Write the policies showing how info is secured

protected and to educate employees on their responsibilities

5 Train train train

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 21

Policy Must Haves

Policies outline how the company is implementing security ndash so a security policy is a MUST

Policies provide employees notice of dorsquos and donrsquots as well as their responsibility

Some other policies social media BYOD wireless work from home password Internet usage or AUP etc Also for certain industries compliance policies

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 22

What did we learn

Hackersthieves want everything not just credit card rsquos

Mobile devices have increased the threat Stealing datainfo is relatively easy It can lead to catastrophic consequences Training is the key Keep training interesting fun and interactive Take a personal interest in protecting all info

not just your own

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 23

Cybersecurity Tips

Donrsquot bank on your smartphone If banking online make sure the bank window is

the only one open and the URL says Https When using public WiFi like a coffee shop

airport hotel use a proxy like Hotspot Donrsquot click on links in email go to the site like

Facebook LinkedIn etc When you can encrypt all data Donrsquot click on the ldquounsubscriberdquo link on

unwanted emails It validates your email and may add you to spam

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 24

BLUF End User is the Target

Train the Workforce to A Recognize the threat B Recognize the scams C Understand the Value of Information

Training should be A Interesting B Engaging C Continuous

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 25

Donrsquot Be This Guy

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 26

commended Global Knowledge Courses

Certified Ethical Hacker v7 Cybersecurity Foundations Foundstone Ultimate Hacking Defending Windows Networks Cybersecurity Mobility amp Compliance Course (CSMCC)

wwwglobalknowledgecom 1-877-333-8326

Questions

David Willson JD LLM CISSP Security +

(719) 648-4176 davidtitaninfosecuritygroupcom wwwtitaninfosecuritygroupcom

Page 13: Cybersecurity, Compliance, Mobility, and Protecting ...€¦ · Cybersecurity Tips! Don’t bank on your smartphone If banking online, make sure the bank window is the only one open,

Do you drop your security guard when yougo home

Training is about changing attitudes about security and

keeping people alert

ldquoThink before you

clickrdquo

ldquoKnow when to hold em know when to fold emrdquo

ldquoKnow when to say NOrdquo

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 13

Okay letrsquos take a breath

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 14

Games

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 15

Convenience vs Security

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 16

Interesting Comments I have Heard

ldquoIrsquom not worried about itrdquo

ldquoMy computer company said I am securerdquo

ldquoI donrsquot have anything the hackers wantrdquo

ldquoI have a really good password Itrsquos really longrdquo

ldquoThat is not my area IT is responsible for securing infordquo

ldquoIts not my information and its not my jobrdquo

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 17

The Risk

Whatrsquos the Risk of bad security practices National security issue Embarrassment Loss of Revenue Bankruptcy Loss of customer confidence Loss of proprietary datatrade secrets

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 18

The Liability

Whorsquos liable when information is lost or stolen YOU

One of consumersrsquo biggest fears is identity theft

Loss leads to fines lawsuits and negative reputation

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 19

Must Have Security

Compliance depending on your industry requires security

Commonsense and your fiduciary responsibility requires good security

As an employee you have a responsibility to protect company information

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 20

How To Reduce Risk ndash Eliminate Liability

1 Determine what information you are collecting processing and storing

2 Who has access to that information 3 Categorize the info based on sensitivity 4 Write the policies showing how info is secured

protected and to educate employees on their responsibilities

5 Train train train

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 21

Policy Must Haves

Policies outline how the company is implementing security ndash so a security policy is a MUST

Policies provide employees notice of dorsquos and donrsquots as well as their responsibility

Some other policies social media BYOD wireless work from home password Internet usage or AUP etc Also for certain industries compliance policies

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 22

What did we learn

Hackersthieves want everything not just credit card rsquos

Mobile devices have increased the threat Stealing datainfo is relatively easy It can lead to catastrophic consequences Training is the key Keep training interesting fun and interactive Take a personal interest in protecting all info

not just your own

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 23

Cybersecurity Tips

Donrsquot bank on your smartphone If banking online make sure the bank window is

the only one open and the URL says Https When using public WiFi like a coffee shop

airport hotel use a proxy like Hotspot Donrsquot click on links in email go to the site like

Facebook LinkedIn etc When you can encrypt all data Donrsquot click on the ldquounsubscriberdquo link on

unwanted emails It validates your email and may add you to spam

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 24

BLUF End User is the Target

Train the Workforce to A Recognize the threat B Recognize the scams C Understand the Value of Information

Training should be A Interesting B Engaging C Continuous

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 25

Donrsquot Be This Guy

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 26

commended Global Knowledge Courses

Certified Ethical Hacker v7 Cybersecurity Foundations Foundstone Ultimate Hacking Defending Windows Networks Cybersecurity Mobility amp Compliance Course (CSMCC)

wwwglobalknowledgecom 1-877-333-8326

Questions

David Willson JD LLM CISSP Security +

(719) 648-4176 davidtitaninfosecuritygroupcom wwwtitaninfosecuritygroupcom

Page 14: Cybersecurity, Compliance, Mobility, and Protecting ...€¦ · Cybersecurity Tips! Don’t bank on your smartphone If banking online, make sure the bank window is the only one open,

Okay letrsquos take a breath

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 14

Games

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 15

Convenience vs Security

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 16

Interesting Comments I have Heard

ldquoIrsquom not worried about itrdquo

ldquoMy computer company said I am securerdquo

ldquoI donrsquot have anything the hackers wantrdquo

ldquoI have a really good password Itrsquos really longrdquo

ldquoThat is not my area IT is responsible for securing infordquo

ldquoIts not my information and its not my jobrdquo

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 17

The Risk

Whatrsquos the Risk of bad security practices National security issue Embarrassment Loss of Revenue Bankruptcy Loss of customer confidence Loss of proprietary datatrade secrets

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 18

The Liability

Whorsquos liable when information is lost or stolen YOU

One of consumersrsquo biggest fears is identity theft

Loss leads to fines lawsuits and negative reputation

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 19

Must Have Security

Compliance depending on your industry requires security

Commonsense and your fiduciary responsibility requires good security

As an employee you have a responsibility to protect company information

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 20

How To Reduce Risk ndash Eliminate Liability

1 Determine what information you are collecting processing and storing

2 Who has access to that information 3 Categorize the info based on sensitivity 4 Write the policies showing how info is secured

protected and to educate employees on their responsibilities

5 Train train train

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 21

Policy Must Haves

Policies outline how the company is implementing security ndash so a security policy is a MUST

Policies provide employees notice of dorsquos and donrsquots as well as their responsibility

Some other policies social media BYOD wireless work from home password Internet usage or AUP etc Also for certain industries compliance policies

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 22

What did we learn

Hackersthieves want everything not just credit card rsquos

Mobile devices have increased the threat Stealing datainfo is relatively easy It can lead to catastrophic consequences Training is the key Keep training interesting fun and interactive Take a personal interest in protecting all info

not just your own

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 23

Cybersecurity Tips

Donrsquot bank on your smartphone If banking online make sure the bank window is

the only one open and the URL says Https When using public WiFi like a coffee shop

airport hotel use a proxy like Hotspot Donrsquot click on links in email go to the site like

Facebook LinkedIn etc When you can encrypt all data Donrsquot click on the ldquounsubscriberdquo link on

unwanted emails It validates your email and may add you to spam

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 24

BLUF End User is the Target

Train the Workforce to A Recognize the threat B Recognize the scams C Understand the Value of Information

Training should be A Interesting B Engaging C Continuous

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 25

Donrsquot Be This Guy

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 26

commended Global Knowledge Courses

Certified Ethical Hacker v7 Cybersecurity Foundations Foundstone Ultimate Hacking Defending Windows Networks Cybersecurity Mobility amp Compliance Course (CSMCC)

wwwglobalknowledgecom 1-877-333-8326

Questions

David Willson JD LLM CISSP Security +

(719) 648-4176 davidtitaninfosecuritygroupcom wwwtitaninfosecuritygroupcom

Page 15: Cybersecurity, Compliance, Mobility, and Protecting ...€¦ · Cybersecurity Tips! Don’t bank on your smartphone If banking online, make sure the bank window is the only one open,

Games

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 15

Convenience vs Security

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 16

Interesting Comments I have Heard

ldquoIrsquom not worried about itrdquo

ldquoMy computer company said I am securerdquo

ldquoI donrsquot have anything the hackers wantrdquo

ldquoI have a really good password Itrsquos really longrdquo

ldquoThat is not my area IT is responsible for securing infordquo

ldquoIts not my information and its not my jobrdquo

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 17

The Risk

Whatrsquos the Risk of bad security practices National security issue Embarrassment Loss of Revenue Bankruptcy Loss of customer confidence Loss of proprietary datatrade secrets

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 18

The Liability

Whorsquos liable when information is lost or stolen YOU

One of consumersrsquo biggest fears is identity theft

Loss leads to fines lawsuits and negative reputation

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 19

Must Have Security

Compliance depending on your industry requires security

Commonsense and your fiduciary responsibility requires good security

As an employee you have a responsibility to protect company information

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 20

How To Reduce Risk ndash Eliminate Liability

1 Determine what information you are collecting processing and storing

2 Who has access to that information 3 Categorize the info based on sensitivity 4 Write the policies showing how info is secured

protected and to educate employees on their responsibilities

5 Train train train

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 21

Policy Must Haves

Policies outline how the company is implementing security ndash so a security policy is a MUST

Policies provide employees notice of dorsquos and donrsquots as well as their responsibility

Some other policies social media BYOD wireless work from home password Internet usage or AUP etc Also for certain industries compliance policies

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 22

What did we learn

Hackersthieves want everything not just credit card rsquos

Mobile devices have increased the threat Stealing datainfo is relatively easy It can lead to catastrophic consequences Training is the key Keep training interesting fun and interactive Take a personal interest in protecting all info

not just your own

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 23

Cybersecurity Tips

Donrsquot bank on your smartphone If banking online make sure the bank window is

the only one open and the URL says Https When using public WiFi like a coffee shop

airport hotel use a proxy like Hotspot Donrsquot click on links in email go to the site like

Facebook LinkedIn etc When you can encrypt all data Donrsquot click on the ldquounsubscriberdquo link on

unwanted emails It validates your email and may add you to spam

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 24

BLUF End User is the Target

Train the Workforce to A Recognize the threat B Recognize the scams C Understand the Value of Information

Training should be A Interesting B Engaging C Continuous

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 25

Donrsquot Be This Guy

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 26

commended Global Knowledge Courses

Certified Ethical Hacker v7 Cybersecurity Foundations Foundstone Ultimate Hacking Defending Windows Networks Cybersecurity Mobility amp Compliance Course (CSMCC)

wwwglobalknowledgecom 1-877-333-8326

Questions

David Willson JD LLM CISSP Security +

(719) 648-4176 davidtitaninfosecuritygroupcom wwwtitaninfosecuritygroupcom

Page 16: Cybersecurity, Compliance, Mobility, and Protecting ...€¦ · Cybersecurity Tips! Don’t bank on your smartphone If banking online, make sure the bank window is the only one open,

Convenience vs Security

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 16

Interesting Comments I have Heard

ldquoIrsquom not worried about itrdquo

ldquoMy computer company said I am securerdquo

ldquoI donrsquot have anything the hackers wantrdquo

ldquoI have a really good password Itrsquos really longrdquo

ldquoThat is not my area IT is responsible for securing infordquo

ldquoIts not my information and its not my jobrdquo

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 17

The Risk

Whatrsquos the Risk of bad security practices National security issue Embarrassment Loss of Revenue Bankruptcy Loss of customer confidence Loss of proprietary datatrade secrets

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 18

The Liability

Whorsquos liable when information is lost or stolen YOU

One of consumersrsquo biggest fears is identity theft

Loss leads to fines lawsuits and negative reputation

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 19

Must Have Security

Compliance depending on your industry requires security

Commonsense and your fiduciary responsibility requires good security

As an employee you have a responsibility to protect company information

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 20

How To Reduce Risk ndash Eliminate Liability

1 Determine what information you are collecting processing and storing

2 Who has access to that information 3 Categorize the info based on sensitivity 4 Write the policies showing how info is secured

protected and to educate employees on their responsibilities

5 Train train train

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 21

Policy Must Haves

Policies outline how the company is implementing security ndash so a security policy is a MUST

Policies provide employees notice of dorsquos and donrsquots as well as their responsibility

Some other policies social media BYOD wireless work from home password Internet usage or AUP etc Also for certain industries compliance policies

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 22

What did we learn

Hackersthieves want everything not just credit card rsquos

Mobile devices have increased the threat Stealing datainfo is relatively easy It can lead to catastrophic consequences Training is the key Keep training interesting fun and interactive Take a personal interest in protecting all info

not just your own

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 23

Cybersecurity Tips

Donrsquot bank on your smartphone If banking online make sure the bank window is

the only one open and the URL says Https When using public WiFi like a coffee shop

airport hotel use a proxy like Hotspot Donrsquot click on links in email go to the site like

Facebook LinkedIn etc When you can encrypt all data Donrsquot click on the ldquounsubscriberdquo link on

unwanted emails It validates your email and may add you to spam

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 24

BLUF End User is the Target

Train the Workforce to A Recognize the threat B Recognize the scams C Understand the Value of Information

Training should be A Interesting B Engaging C Continuous

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 25

Donrsquot Be This Guy

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 26

commended Global Knowledge Courses

Certified Ethical Hacker v7 Cybersecurity Foundations Foundstone Ultimate Hacking Defending Windows Networks Cybersecurity Mobility amp Compliance Course (CSMCC)

wwwglobalknowledgecom 1-877-333-8326

Questions

David Willson JD LLM CISSP Security +

(719) 648-4176 davidtitaninfosecuritygroupcom wwwtitaninfosecuritygroupcom

Page 17: Cybersecurity, Compliance, Mobility, and Protecting ...€¦ · Cybersecurity Tips! Don’t bank on your smartphone If banking online, make sure the bank window is the only one open,

Interesting Comments I have Heard

ldquoIrsquom not worried about itrdquo

ldquoMy computer company said I am securerdquo

ldquoI donrsquot have anything the hackers wantrdquo

ldquoI have a really good password Itrsquos really longrdquo

ldquoThat is not my area IT is responsible for securing infordquo

ldquoIts not my information and its not my jobrdquo

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 17

The Risk

Whatrsquos the Risk of bad security practices National security issue Embarrassment Loss of Revenue Bankruptcy Loss of customer confidence Loss of proprietary datatrade secrets

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 18

The Liability

Whorsquos liable when information is lost or stolen YOU

One of consumersrsquo biggest fears is identity theft

Loss leads to fines lawsuits and negative reputation

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 19

Must Have Security

Compliance depending on your industry requires security

Commonsense and your fiduciary responsibility requires good security

As an employee you have a responsibility to protect company information

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 20

How To Reduce Risk ndash Eliminate Liability

1 Determine what information you are collecting processing and storing

2 Who has access to that information 3 Categorize the info based on sensitivity 4 Write the policies showing how info is secured

protected and to educate employees on their responsibilities

5 Train train train

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 21

Policy Must Haves

Policies outline how the company is implementing security ndash so a security policy is a MUST

Policies provide employees notice of dorsquos and donrsquots as well as their responsibility

Some other policies social media BYOD wireless work from home password Internet usage or AUP etc Also for certain industries compliance policies

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 22

What did we learn

Hackersthieves want everything not just credit card rsquos

Mobile devices have increased the threat Stealing datainfo is relatively easy It can lead to catastrophic consequences Training is the key Keep training interesting fun and interactive Take a personal interest in protecting all info

not just your own

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 23

Cybersecurity Tips

Donrsquot bank on your smartphone If banking online make sure the bank window is

the only one open and the URL says Https When using public WiFi like a coffee shop

airport hotel use a proxy like Hotspot Donrsquot click on links in email go to the site like

Facebook LinkedIn etc When you can encrypt all data Donrsquot click on the ldquounsubscriberdquo link on

unwanted emails It validates your email and may add you to spam

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 24

BLUF End User is the Target

Train the Workforce to A Recognize the threat B Recognize the scams C Understand the Value of Information

Training should be A Interesting B Engaging C Continuous

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 25

Donrsquot Be This Guy

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 26

commended Global Knowledge Courses

Certified Ethical Hacker v7 Cybersecurity Foundations Foundstone Ultimate Hacking Defending Windows Networks Cybersecurity Mobility amp Compliance Course (CSMCC)

wwwglobalknowledgecom 1-877-333-8326

Questions

David Willson JD LLM CISSP Security +

(719) 648-4176 davidtitaninfosecuritygroupcom wwwtitaninfosecuritygroupcom

Page 18: Cybersecurity, Compliance, Mobility, and Protecting ...€¦ · Cybersecurity Tips! Don’t bank on your smartphone If banking online, make sure the bank window is the only one open,

The Risk

Whatrsquos the Risk of bad security practices National security issue Embarrassment Loss of Revenue Bankruptcy Loss of customer confidence Loss of proprietary datatrade secrets

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 18

The Liability

Whorsquos liable when information is lost or stolen YOU

One of consumersrsquo biggest fears is identity theft

Loss leads to fines lawsuits and negative reputation

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 19

Must Have Security

Compliance depending on your industry requires security

Commonsense and your fiduciary responsibility requires good security

As an employee you have a responsibility to protect company information

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 20

How To Reduce Risk ndash Eliminate Liability

1 Determine what information you are collecting processing and storing

2 Who has access to that information 3 Categorize the info based on sensitivity 4 Write the policies showing how info is secured

protected and to educate employees on their responsibilities

5 Train train train

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 21

Policy Must Haves

Policies outline how the company is implementing security ndash so a security policy is a MUST

Policies provide employees notice of dorsquos and donrsquots as well as their responsibility

Some other policies social media BYOD wireless work from home password Internet usage or AUP etc Also for certain industries compliance policies

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 22

What did we learn

Hackersthieves want everything not just credit card rsquos

Mobile devices have increased the threat Stealing datainfo is relatively easy It can lead to catastrophic consequences Training is the key Keep training interesting fun and interactive Take a personal interest in protecting all info

not just your own

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 23

Cybersecurity Tips

Donrsquot bank on your smartphone If banking online make sure the bank window is

the only one open and the URL says Https When using public WiFi like a coffee shop

airport hotel use a proxy like Hotspot Donrsquot click on links in email go to the site like

Facebook LinkedIn etc When you can encrypt all data Donrsquot click on the ldquounsubscriberdquo link on

unwanted emails It validates your email and may add you to spam

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 24

BLUF End User is the Target

Train the Workforce to A Recognize the threat B Recognize the scams C Understand the Value of Information

Training should be A Interesting B Engaging C Continuous

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 25

Donrsquot Be This Guy

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 26

commended Global Knowledge Courses

Certified Ethical Hacker v7 Cybersecurity Foundations Foundstone Ultimate Hacking Defending Windows Networks Cybersecurity Mobility amp Compliance Course (CSMCC)

wwwglobalknowledgecom 1-877-333-8326

Questions

David Willson JD LLM CISSP Security +

(719) 648-4176 davidtitaninfosecuritygroupcom wwwtitaninfosecuritygroupcom

Page 19: Cybersecurity, Compliance, Mobility, and Protecting ...€¦ · Cybersecurity Tips! Don’t bank on your smartphone If banking online, make sure the bank window is the only one open,

The Liability

Whorsquos liable when information is lost or stolen YOU

One of consumersrsquo biggest fears is identity theft

Loss leads to fines lawsuits and negative reputation

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 19

Must Have Security

Compliance depending on your industry requires security

Commonsense and your fiduciary responsibility requires good security

As an employee you have a responsibility to protect company information

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 20

How To Reduce Risk ndash Eliminate Liability

1 Determine what information you are collecting processing and storing

2 Who has access to that information 3 Categorize the info based on sensitivity 4 Write the policies showing how info is secured

protected and to educate employees on their responsibilities

5 Train train train

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 21

Policy Must Haves

Policies outline how the company is implementing security ndash so a security policy is a MUST

Policies provide employees notice of dorsquos and donrsquots as well as their responsibility

Some other policies social media BYOD wireless work from home password Internet usage or AUP etc Also for certain industries compliance policies

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 22

What did we learn

Hackersthieves want everything not just credit card rsquos

Mobile devices have increased the threat Stealing datainfo is relatively easy It can lead to catastrophic consequences Training is the key Keep training interesting fun and interactive Take a personal interest in protecting all info

not just your own

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 23

Cybersecurity Tips

Donrsquot bank on your smartphone If banking online make sure the bank window is

the only one open and the URL says Https When using public WiFi like a coffee shop

airport hotel use a proxy like Hotspot Donrsquot click on links in email go to the site like

Facebook LinkedIn etc When you can encrypt all data Donrsquot click on the ldquounsubscriberdquo link on

unwanted emails It validates your email and may add you to spam

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 24

BLUF End User is the Target

Train the Workforce to A Recognize the threat B Recognize the scams C Understand the Value of Information

Training should be A Interesting B Engaging C Continuous

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 25

Donrsquot Be This Guy

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 26

commended Global Knowledge Courses

Certified Ethical Hacker v7 Cybersecurity Foundations Foundstone Ultimate Hacking Defending Windows Networks Cybersecurity Mobility amp Compliance Course (CSMCC)

wwwglobalknowledgecom 1-877-333-8326

Questions

David Willson JD LLM CISSP Security +

(719) 648-4176 davidtitaninfosecuritygroupcom wwwtitaninfosecuritygroupcom

Page 20: Cybersecurity, Compliance, Mobility, and Protecting ...€¦ · Cybersecurity Tips! Don’t bank on your smartphone If banking online, make sure the bank window is the only one open,

Must Have Security

Compliance depending on your industry requires security

Commonsense and your fiduciary responsibility requires good security

As an employee you have a responsibility to protect company information

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 20

How To Reduce Risk ndash Eliminate Liability

1 Determine what information you are collecting processing and storing

2 Who has access to that information 3 Categorize the info based on sensitivity 4 Write the policies showing how info is secured

protected and to educate employees on their responsibilities

5 Train train train

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 21

Policy Must Haves

Policies outline how the company is implementing security ndash so a security policy is a MUST

Policies provide employees notice of dorsquos and donrsquots as well as their responsibility

Some other policies social media BYOD wireless work from home password Internet usage or AUP etc Also for certain industries compliance policies

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 22

What did we learn

Hackersthieves want everything not just credit card rsquos

Mobile devices have increased the threat Stealing datainfo is relatively easy It can lead to catastrophic consequences Training is the key Keep training interesting fun and interactive Take a personal interest in protecting all info

not just your own

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 23

Cybersecurity Tips

Donrsquot bank on your smartphone If banking online make sure the bank window is

the only one open and the URL says Https When using public WiFi like a coffee shop

airport hotel use a proxy like Hotspot Donrsquot click on links in email go to the site like

Facebook LinkedIn etc When you can encrypt all data Donrsquot click on the ldquounsubscriberdquo link on

unwanted emails It validates your email and may add you to spam

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 24

BLUF End User is the Target

Train the Workforce to A Recognize the threat B Recognize the scams C Understand the Value of Information

Training should be A Interesting B Engaging C Continuous

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 25

Donrsquot Be This Guy

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 26

commended Global Knowledge Courses

Certified Ethical Hacker v7 Cybersecurity Foundations Foundstone Ultimate Hacking Defending Windows Networks Cybersecurity Mobility amp Compliance Course (CSMCC)

wwwglobalknowledgecom 1-877-333-8326

Questions

David Willson JD LLM CISSP Security +

(719) 648-4176 davidtitaninfosecuritygroupcom wwwtitaninfosecuritygroupcom

Page 21: Cybersecurity, Compliance, Mobility, and Protecting ...€¦ · Cybersecurity Tips! Don’t bank on your smartphone If banking online, make sure the bank window is the only one open,

How To Reduce Risk ndash Eliminate Liability

1 Determine what information you are collecting processing and storing

2 Who has access to that information 3 Categorize the info based on sensitivity 4 Write the policies showing how info is secured

protected and to educate employees on their responsibilities

5 Train train train

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 21

Policy Must Haves

Policies outline how the company is implementing security ndash so a security policy is a MUST

Policies provide employees notice of dorsquos and donrsquots as well as their responsibility

Some other policies social media BYOD wireless work from home password Internet usage or AUP etc Also for certain industries compliance policies

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 22

What did we learn

Hackersthieves want everything not just credit card rsquos

Mobile devices have increased the threat Stealing datainfo is relatively easy It can lead to catastrophic consequences Training is the key Keep training interesting fun and interactive Take a personal interest in protecting all info

not just your own

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 23

Cybersecurity Tips

Donrsquot bank on your smartphone If banking online make sure the bank window is

the only one open and the URL says Https When using public WiFi like a coffee shop

airport hotel use a proxy like Hotspot Donrsquot click on links in email go to the site like

Facebook LinkedIn etc When you can encrypt all data Donrsquot click on the ldquounsubscriberdquo link on

unwanted emails It validates your email and may add you to spam

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 24

BLUF End User is the Target

Train the Workforce to A Recognize the threat B Recognize the scams C Understand the Value of Information

Training should be A Interesting B Engaging C Continuous

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 25

Donrsquot Be This Guy

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 26

commended Global Knowledge Courses

Certified Ethical Hacker v7 Cybersecurity Foundations Foundstone Ultimate Hacking Defending Windows Networks Cybersecurity Mobility amp Compliance Course (CSMCC)

wwwglobalknowledgecom 1-877-333-8326

Questions

David Willson JD LLM CISSP Security +

(719) 648-4176 davidtitaninfosecuritygroupcom wwwtitaninfosecuritygroupcom

Page 22: Cybersecurity, Compliance, Mobility, and Protecting ...€¦ · Cybersecurity Tips! Don’t bank on your smartphone If banking online, make sure the bank window is the only one open,

Policy Must Haves

Policies outline how the company is implementing security ndash so a security policy is a MUST

Policies provide employees notice of dorsquos and donrsquots as well as their responsibility

Some other policies social media BYOD wireless work from home password Internet usage or AUP etc Also for certain industries compliance policies

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 22

What did we learn

Hackersthieves want everything not just credit card rsquos

Mobile devices have increased the threat Stealing datainfo is relatively easy It can lead to catastrophic consequences Training is the key Keep training interesting fun and interactive Take a personal interest in protecting all info

not just your own

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 23

Cybersecurity Tips

Donrsquot bank on your smartphone If banking online make sure the bank window is

the only one open and the URL says Https When using public WiFi like a coffee shop

airport hotel use a proxy like Hotspot Donrsquot click on links in email go to the site like

Facebook LinkedIn etc When you can encrypt all data Donrsquot click on the ldquounsubscriberdquo link on

unwanted emails It validates your email and may add you to spam

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 24

BLUF End User is the Target

Train the Workforce to A Recognize the threat B Recognize the scams C Understand the Value of Information

Training should be A Interesting B Engaging C Continuous

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 25

Donrsquot Be This Guy

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 26

commended Global Knowledge Courses

Certified Ethical Hacker v7 Cybersecurity Foundations Foundstone Ultimate Hacking Defending Windows Networks Cybersecurity Mobility amp Compliance Course (CSMCC)

wwwglobalknowledgecom 1-877-333-8326

Questions

David Willson JD LLM CISSP Security +

(719) 648-4176 davidtitaninfosecuritygroupcom wwwtitaninfosecuritygroupcom

Page 23: Cybersecurity, Compliance, Mobility, and Protecting ...€¦ · Cybersecurity Tips! Don’t bank on your smartphone If banking online, make sure the bank window is the only one open,

What did we learn

Hackersthieves want everything not just credit card rsquos

Mobile devices have increased the threat Stealing datainfo is relatively easy It can lead to catastrophic consequences Training is the key Keep training interesting fun and interactive Take a personal interest in protecting all info

not just your own

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 23

Cybersecurity Tips

Donrsquot bank on your smartphone If banking online make sure the bank window is

the only one open and the URL says Https When using public WiFi like a coffee shop

airport hotel use a proxy like Hotspot Donrsquot click on links in email go to the site like

Facebook LinkedIn etc When you can encrypt all data Donrsquot click on the ldquounsubscriberdquo link on

unwanted emails It validates your email and may add you to spam

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 24

BLUF End User is the Target

Train the Workforce to A Recognize the threat B Recognize the scams C Understand the Value of Information

Training should be A Interesting B Engaging C Continuous

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 25

Donrsquot Be This Guy

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 26

commended Global Knowledge Courses

Certified Ethical Hacker v7 Cybersecurity Foundations Foundstone Ultimate Hacking Defending Windows Networks Cybersecurity Mobility amp Compliance Course (CSMCC)

wwwglobalknowledgecom 1-877-333-8326

Questions

David Willson JD LLM CISSP Security +

(719) 648-4176 davidtitaninfosecuritygroupcom wwwtitaninfosecuritygroupcom

Page 24: Cybersecurity, Compliance, Mobility, and Protecting ...€¦ · Cybersecurity Tips! Don’t bank on your smartphone If banking online, make sure the bank window is the only one open,

Cybersecurity Tips

Donrsquot bank on your smartphone If banking online make sure the bank window is

the only one open and the URL says Https When using public WiFi like a coffee shop

airport hotel use a proxy like Hotspot Donrsquot click on links in email go to the site like

Facebook LinkedIn etc When you can encrypt all data Donrsquot click on the ldquounsubscriberdquo link on

unwanted emails It validates your email and may add you to spam

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 24

BLUF End User is the Target

Train the Workforce to A Recognize the threat B Recognize the scams C Understand the Value of Information

Training should be A Interesting B Engaging C Continuous

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 25

Donrsquot Be This Guy

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 26

commended Global Knowledge Courses

Certified Ethical Hacker v7 Cybersecurity Foundations Foundstone Ultimate Hacking Defending Windows Networks Cybersecurity Mobility amp Compliance Course (CSMCC)

wwwglobalknowledgecom 1-877-333-8326

Questions

David Willson JD LLM CISSP Security +

(719) 648-4176 davidtitaninfosecuritygroupcom wwwtitaninfosecuritygroupcom

Page 25: Cybersecurity, Compliance, Mobility, and Protecting ...€¦ · Cybersecurity Tips! Don’t bank on your smartphone If banking online, make sure the bank window is the only one open,

BLUF End User is the Target

Train the Workforce to A Recognize the threat B Recognize the scams C Understand the Value of Information

Training should be A Interesting B Engaging C Continuous

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 25

Donrsquot Be This Guy

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 26

commended Global Knowledge Courses

Certified Ethical Hacker v7 Cybersecurity Foundations Foundstone Ultimate Hacking Defending Windows Networks Cybersecurity Mobility amp Compliance Course (CSMCC)

wwwglobalknowledgecom 1-877-333-8326

Questions

David Willson JD LLM CISSP Security +

(719) 648-4176 davidtitaninfosecuritygroupcom wwwtitaninfosecuritygroupcom

Page 26: Cybersecurity, Compliance, Mobility, and Protecting ...€¦ · Cybersecurity Tips! Don’t bank on your smartphone If banking online, make sure the bank window is the only one open,

Donrsquot Be This Guy

copy 2011 Global Knowledge Training LLC All rights reserved 1282015 Page 26

commended Global Knowledge Courses

Certified Ethical Hacker v7 Cybersecurity Foundations Foundstone Ultimate Hacking Defending Windows Networks Cybersecurity Mobility amp Compliance Course (CSMCC)

wwwglobalknowledgecom 1-877-333-8326

Questions

David Willson JD LLM CISSP Security +

(719) 648-4176 davidtitaninfosecuritygroupcom wwwtitaninfosecuritygroupcom

Page 27: Cybersecurity, Compliance, Mobility, and Protecting ...€¦ · Cybersecurity Tips! Don’t bank on your smartphone If banking online, make sure the bank window is the only one open,

commended Global Knowledge Courses

Certified Ethical Hacker v7 Cybersecurity Foundations Foundstone Ultimate Hacking Defending Windows Networks Cybersecurity Mobility amp Compliance Course (CSMCC)

wwwglobalknowledgecom 1-877-333-8326

Questions

David Willson JD LLM CISSP Security +

(719) 648-4176 davidtitaninfosecuritygroupcom wwwtitaninfosecuritygroupcom

Page 28: Cybersecurity, Compliance, Mobility, and Protecting ...€¦ · Cybersecurity Tips! Don’t bank on your smartphone If banking online, make sure the bank window is the only one open,

Questions

David Willson JD LLM CISSP Security +

(719) 648-4176 davidtitaninfosecuritygroupcom wwwtitaninfosecuritygroupcom