![Page 1: WE16 - Cyber Security - Security is Everyone's Responsibility](https://reader035.vdocument.in/reader035/viewer/2022062310/587269971a28ab31498b55f3/html5/thumbnails/1.jpg)
Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.
Cyber Security Security is Everyone’s Responsibility
![Page 2: WE16 - Cyber Security - Security is Everyone's Responsibility](https://reader035.vdocument.in/reader035/viewer/2022062310/587269971a28ab31498b55f3/html5/thumbnails/2.jpg)
Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.
The Who, Where and Why.
![Page 3: WE16 - Cyber Security - Security is Everyone's Responsibility](https://reader035.vdocument.in/reader035/viewer/2022062310/587269971a28ab31498b55f3/html5/thumbnails/3.jpg)
3Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.
But you still need to be aware of the internal threat.
Attackers are usually external to the victim’s organization.
![Page 4: WE16 - Cyber Security - Security is Everyone's Responsibility](https://reader035.vdocument.in/reader035/viewer/2022062310/587269971a28ab31498b55f3/html5/thumbnails/4.jpg)
4Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.
Nobody is immune.
![Page 5: WE16 - Cyber Security - Security is Everyone's Responsibility](https://reader035.vdocument.in/reader035/viewer/2022062310/587269971a28ab31498b55f3/html5/thumbnails/5.jpg)
Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement. 5
Attackers are typically after the money.
Financial
Espionage
80%
9%
![Page 6: WE16 - Cyber Security - Security is Everyone's Responsibility](https://reader035.vdocument.in/reader035/viewer/2022062310/587269971a28ab31498b55f3/html5/thumbnails/6.jpg)
6Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.
What happens next is determined by the attacker’s end game.
Many breaches share the same threat actions in the early stages of the attack.
![Page 7: WE16 - Cyber Security - Security is Everyone's Responsibility](https://reader035.vdocument.in/reader035/viewer/2022062310/587269971a28ab31498b55f3/html5/thumbnails/7.jpg)
Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.
Social Engineering – it’s not just for email
In 2015, Social Engineering was the #1 attack technique. People replaced exploits as attackers’ favorite way to beat Cybersecurity. Proof Point
![Page 8: WE16 - Cyber Security - Security is Everyone's Responsibility](https://reader035.vdocument.in/reader035/viewer/2022062310/587269971a28ab31498b55f3/html5/thumbnails/8.jpg)
Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.
Layered Defense
Perimeter
Network
Device
Application
Data
Prac
ticesPolicies
People
![Page 9: WE16 - Cyber Security - Security is Everyone's Responsibility](https://reader035.vdocument.in/reader035/viewer/2022062310/587269971a28ab31498b55f3/html5/thumbnails/9.jpg)
Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.
Building a Cyber Defensive Workforce
Safeguard
Passwords
Be Suspicio
usManage access
Design for
Resilience
![Page 10: WE16 - Cyber Security - Security is Everyone's Responsibility](https://reader035.vdocument.in/reader035/viewer/2022062310/587269971a28ab31498b55f3/html5/thumbnails/10.jpg)
Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.
Behaviors travel
![Page 11: WE16 - Cyber Security - Security is Everyone's Responsibility](https://reader035.vdocument.in/reader035/viewer/2022062310/587269971a28ab31498b55f3/html5/thumbnails/11.jpg)
Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.
Quick tips for everyone
Look our for links in unsolicited emailsPasswords – no sharing, and change them oftenSet passcode locks on your mobile devicesWatch what you share on social media Download software/apps only from safe sources