successful cyber security awareness programs

11
FABRIKAM Successful Cyber Security Awareness Programs IACC 2018 Annual Conference

Upload: others

Post on 11-Jan-2022

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Successful Cyber Security Awareness Programs

FABRIKAM

Successful Cyber Security Awareness Programs

I A C C 2 0 1 8 A n n u a l C o n f e r e n c e

Page 2: Successful Cyber Security Awareness Programs

2

• Dewand Neely – CIO, State of Indiana

• Chris Mertens – Director of IT, Hamilton County

• Ron Pelletier – Founder, Pondurance

Page 3: Successful Cyber Security Awareness Programs
Page 4: Successful Cyber Security Awareness Programs
Page 5: Successful Cyber Security Awareness Programs
Page 6: Successful Cyber Security Awareness Programs

What is Hamilton County Doing?

6

Page 7: Successful Cyber Security Awareness Programs

Security Programs/Measures

• End user awareness training – required monthly

• Multi-Factor for all Public Safety users (considering everyone)

• PC Security Policies

• Automatic locking when PC is idle

• Virus updates every 4 hours

• Windows/Security updates monthly

• Advanced email scanning for malware/viruses

• Network logging and analytics

• Phishing exercises and reporting to departments

• Mobile Device Management/Encryption

• Daily/Weekly/Monthly backups – Offsite and Tested

7

Page 8: Successful Cyber Security Awareness Programs

Ron PelletierM o t i v a t i o n s & M i t i g a t i o n s

8

Page 9: Successful Cyber Security Awareness Programs

What Motivates Bad Actors?

• Street Cred – Proving they can do it for their own ego

• Hactivism/Denial of Service – Keeping you from operating

• Steal & Use Your Data – Corporate espionage is alive and well

• Steal & Sell Your Data - Identities/cards sold on the dark web

• Steal Your CPUs & Bandwidth – Cryptojackers are spiking

• Steal Your Money – Tricking someone into giving it up

• Hold Your Data Hostage – Ransomware has made big headlines

9

Page 10: Successful Cyber Security Awareness Programs

Mitigate Your Risk by Reducing Your Attack Surface

• Mobile Disk Encryption – Lose a device? No problem!

• Vulnerability Management – Moving target? Move with it!

• Multi-Factor Authentication – A password just isn't enough

• Next-Gen Antivirus - Signatures are for suckers!

• Threat Hunting & Response – You need people to counter people

• User Awareness Training – Even Ft. Knox can be breached if people can be fooled

10

D o n ' t t r y t o o u t r u n t h e bear !

A t h o r o u g h E n t e r p r i s e R i s k A n a l y s i s i s K e y

W h a t d o I h a v e ?W h o w o u l d w a n t i t ?

H o w w o u l d t h e y g e t i t ?W h a t i s t h e l i k e l i h o o d a n d i m p a c t ?

Page 11: Successful Cyber Security Awareness Programs

FABRIKAM

THANK YOUD e w a n d N e e l y

D n e e l y @ i o t . I N . g o v

C h r i s M e r t e n s

C h r i s . m e r t e n s @ h a m i l t o n c o u n t y. i n . g o v

R o n P e l l e t i e r

R o n . p e l l e t i e r @ p o n d u r a n c e . c o m