SlideShare a Scribd company logo
Security 101
Training, awareness, and strategies
Stephen Cobb, CISSP
Senior Security Researcher
ESET NA
The SMB Sweet Spot for the
cyber-criminally inclined
Enterprises
SMB
“Sweet Spot”
Consumers
Assets
worth
looting
Level of protection
The challenge
• Organizations of every type rely on
computers to handle information
• Everyone today is a computer user
• Most have no security training
• Lack of security
training leads
to problems
How big is the challenge
We asked U.S. consumers if they had ever
received any computer security training
No:
68%
Yes:
32%
*Savitz Research for ESET, 2012
68% is sadly consistent
We asked working adults in the U.S. if they had
ever received any computer security training
No:
68%
Yes:
32%
*Harris poll for ESET, 2012
73% is even worse
We asked adults in U.S. who use social media if
they had ever received online safety training
No:
73%
Yes:
27%
*Harris poll for ESET, 2012
Security training is not yet part
of our society*
• This has serious implications for your
business
• 93% of American adults say they’ve
had no computer security training in
the last 12 months
• How many of them work for you, or for
your clients, suppliers, etc?
*Savitz Research for ESET, 2012
Some problems that lack of security
training can cause
• Unauthorized access to information
• Loss of access to information
• Loss of information
• Corruption of information
• Theft of information
The implications are non-trivial
• Loss of revenue
• Loss of business
• Fines, lawsuits, headlines
• Unbudgeted expenses
– Breach costs currently estimated at
around $190 per record exposed*
– 5,263 records = $1 million hit
*Ponemon Institute
Trojan terminates escrow firm
• $1.1 million wired to China and could
not be retrieved
• Firm was closed by state law, now in
receivership, 9 people out of a job
• So what’s the best weapon for keeping
that kind of Trojan code out of your
company’s system?
A well-trained workforce
• Knows not to click on suspicious links
in email or social media
• Knows to report strange activity (e.g.
the two-factor authentication not
working)
• Knows to scan all incoming files for
malware
– Email, USB drives
Does training make a difference?
• Yes
• A significant percentage of problems
can be averted, or their impact
minimized, if more employees get
better security training and education*
*A bunch of different studies in recent years
Security training or awareness
• What’s the difference?
• Training makes sure people at different
levels of IT engagement have the right
knowledge to execute their roles
securely
• Awareness makes sure all people at all
levels know what to look out for
Not that kind of actor…
Do your employees know what
motivates bad actors?
IMPACTADVANTAGEMONEY
CREDENTIALS
Do you know how the bad guys
operate?
Taken to exploit site
Malware server
Popular
Attack
Technique
!?**!
User clicks a link Gets infected/owned
Command & Control
Cyber Security 101: Training, awareness, strategies for small to medium sized business
Cyber Security 101: Training, awareness, strategies for small to medium sized business
• RAT has full access to victim PC
• And its network connections
• Search and exfiltrate files
• Access to webcam and audio
• Scrape passwords
• Execute system functions
• Chat with victim
What happens next?
Cyber Security 101: Training, awareness, strategies for small to medium sized business
Cyber Security 101: Training, awareness, strategies for small to medium sized business
Cyber Security 101: Training, awareness, strategies for small to medium sized business
So how do we move forward?
The road map: A B C D E F
• Assess your assets, risks, resources
• Build your policy
• Choose your controls
• Deploy controls
• Educate employees, execs, vendors
• Further assess, audit, test
A B C D E F
F E D C B A
Technology
Assess assets, risks, resources
• Assets: digital, physical
– If you don’t know what you’ve got you
can’t protect it!
• Risks
– Who or what is the threat?
• Resources
– In house, hired, partners, vendors,
trade groups, associations
Build your policy
• Security begins with policy
• Policy begins with C-level buy-in
• High-level commitment to protecting
the privacy and security of data
• Then a set of policies that spell out the
protective measures, the controls that
will be used
Choose controls to enforce policies
• For example:
– Policy: Only authorized employees can
access sensitive data
– Controls:
• Require identification and authentication of
all employees via unique user name and
password
• Limit access through application(s) by
requiring authentication
• Log all access
Deploy controls, ensure they work
• Put control in place; for example,
antivirus (anti-malware, anti-phishing,
anti-spam)
• Test control
– Does it work technically?
– Does it “work” with your work?
– Can employees work it?
Educate everyone
• Everyone needs to know
– What the security policies are
– How to comply with them through
proper use of controls
• Pay attention to any information-
sharing relationships
– Vendors, partners, even clients
• Clearly state consequences of failure
to comply
Who gets trained?
• Everyone, but not in the same way,
break it down:
– All-hands training
– IT staff training
– Security staff training
How to deliver training
• In person
• Online
• On paper
• In house
• Outside contractor
• Mix and match
• Be creative
Incentives?
• Yes!
• To launch programs, push agendas
• Prizes do work
• But also make security part of every
job description and evaluation
Use your internal organs
• Of communication!
• Newsletter
• Intranet
• Bulletin board
• Meetings
• Company-wide email
How to do awareness
• Make it fun
• Make it relevant
• Leverage the news
• Bear in mind that everyone benefits
from greater awareness, at work and at
home
Resources to tap
• Industry associations
• FS-ISAC, NH-ISAC, others
• CompTIA, SBA, BBB
• ISSA, ISACA, SANS, (ISC)2
• Local colleges and universities
• Securing Our eCity
Need more motivation?
• Security training is the law
– HIPAA
– Red Flag Identity Theft Prevention
– Gramm-Leach-Bliley, Sarbanes-Oxley
– FISMA
• Or required by industry
– PCI Data Security Standard
Or just plain required
• To get that big juicy contract
• Many companies now require suppliers
to certify that they have security
training and awareness programs in
place as a condition of doing business
Further assess, audit, test…
• This is a process, not a project
• Lay out a plan to assess security on a
periodic basis
• Stay up-to-date on emerging threats
• Stay vigilant around change such as
arrivals, departures, functionality
A B C D E F
F E D C B A
Backup and archive
Firewall
and scan:
Incoming traffic
emails
files
devices
media
Encrypt
Monitor
Filter and
monitor
outbound
Authenticate
users
The Technology Slide
Thank you!
• stephen.cobb@eset.com
• WeLiveSecurity.com
• www.eset.com
• More info in the lobby

More Related Content

PDF
Cybersecurity Employee Training
Paige Rasid
 
PPTX
Hyphenet Security Awareness Training
Jen Ruhman
 
PPTX
Information Security Awareness Training Open
Fred Beck MBA, CPA
 
PPSX
Security Awareness Training
William Mann
 
PPT
Employee Security Training[1]@
R_Yanus
 
PPTX
Cybersecurity Awareness
JoshuaWisniewski3
 
PPTX
Cybersecurity Awareness Training for Employees.pptx
Mustafa Amiri
 
PDF
Cybersecurity Awareness Training Presentation v2024.03
DallasHaselhorst
 
Cybersecurity Employee Training
Paige Rasid
 
Hyphenet Security Awareness Training
Jen Ruhman
 
Information Security Awareness Training Open
Fred Beck MBA, CPA
 
Security Awareness Training
William Mann
 
Employee Security Training[1]@
R_Yanus
 
Cybersecurity Awareness
JoshuaWisniewski3
 
Cybersecurity Awareness Training for Employees.pptx
Mustafa Amiri
 
Cybersecurity Awareness Training Presentation v2024.03
DallasHaselhorst
 

What's hot (20)

PDF
End-User Security Awareness
Surya Bathulapalli
 
PPTX
Security awareness
Josh Chandler
 
PPT
IT Security Awareness-v1.7.ppt
OoXair
 
PPTX
Cybersecurity Awareness Training
Dave Monahan
 
PDF
Employee Security Awareness Program
davidcurriecia
 
PDF
Customer information security awareness training
AbdalrhmanTHassan
 
PDF
Security Awareness Training
Daniel P Wallace
 
PPTX
Basic Security Training for End Users
Community IT Innovators
 
PDF
Security Awareness Training
Dmitriy Scherbina
 
PPTX
Information security awareness - 101
mateenzero
 
PPTX
Information Security Awareness
SnapComms
 
PPTX
Cyber Security Awareness Program.pptx
Dinesh582831
 
PPTX
Awareness Training on Information Security
Ken Holmes
 
PDF
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
Edureka!
 
PDF
Cybersecurity Awareness Training Presentation v1.3
DallasHaselhorst
 
PDF
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Edureka!
 
PDF
Cyber security training
Wilmington University
 
PPTX
Cyber Security Awareness Session for Executives and Non-IT professionals
Krishna Srikanth Manda
 
PPT
End User Security Awareness Presentation
Cristian Mihai
 
PPTX
Information Security Awareness, Petronas Marketing Sudan
Ahmed Musaad
 
End-User Security Awareness
Surya Bathulapalli
 
Security awareness
Josh Chandler
 
IT Security Awareness-v1.7.ppt
OoXair
 
Cybersecurity Awareness Training
Dave Monahan
 
Employee Security Awareness Program
davidcurriecia
 
Customer information security awareness training
AbdalrhmanTHassan
 
Security Awareness Training
Daniel P Wallace
 
Basic Security Training for End Users
Community IT Innovators
 
Security Awareness Training
Dmitriy Scherbina
 
Information security awareness - 101
mateenzero
 
Information Security Awareness
SnapComms
 
Cyber Security Awareness Program.pptx
Dinesh582831
 
Awareness Training on Information Security
Ken Holmes
 
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
Edureka!
 
Cybersecurity Awareness Training Presentation v1.3
DallasHaselhorst
 
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Edureka!
 
Cyber security training
Wilmington University
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Krishna Srikanth Manda
 
End User Security Awareness Presentation
Cristian Mihai
 
Information Security Awareness, Petronas Marketing Sudan
Ahmed Musaad
 
Ad

Viewers also liked (18)

PDF
Cyber security awareness for students
Kandarp Shah
 
PPTX
Cyber crime and security ppt
Lipsita Behera
 
PPTX
Cyber security presentation
Bijay Bhandari
 
PPTX
INFORMATION SECURITY
Ahmed Moussa
 
PPTX
ISO 27001 - Information security user awareness training presentation - part 3
Tanmay Shinde
 
PPT
Computer Malware
aztechtchr
 
PPTX
Cyber security
Siblu28
 
PPTX
Cybercrime.ppt
Aeman Khan
 
PPT
Employee Security Awareness Program
CommLab India – Rapid eLearning Solutions
 
PDF
Trustwave Cybersecurity Education Catalog
Trustwave
 
PPS
Physical security.ppt
Faheem Ul Hasan
 
PPTX
ISO 27001 - information security user awareness training presentation - Part 1
Tanmay Shinde
 
PPTX
Social Media Cyber Security Awareness Briefing
Department of Defense
 
PPT
Introduction to Cyber Security
Stephen Lahanas
 
PPTX
Cyber Awareness presentation for Parents
lisluandaprimary
 
PPT
New Hire Information Security Awareness
hubbargf
 
PPT
Cyber security awareness training by cyber security infotech(csi)
Cyber Security Infotech
 
PPTX
ISO 27001 - information security user awareness training presentation -part 2
Tanmay Shinde
 
Cyber security awareness for students
Kandarp Shah
 
Cyber crime and security ppt
Lipsita Behera
 
Cyber security presentation
Bijay Bhandari
 
INFORMATION SECURITY
Ahmed Moussa
 
ISO 27001 - Information security user awareness training presentation - part 3
Tanmay Shinde
 
Computer Malware
aztechtchr
 
Cyber security
Siblu28
 
Cybercrime.ppt
Aeman Khan
 
Employee Security Awareness Program
CommLab India – Rapid eLearning Solutions
 
Trustwave Cybersecurity Education Catalog
Trustwave
 
Physical security.ppt
Faheem Ul Hasan
 
ISO 27001 - information security user awareness training presentation - Part 1
Tanmay Shinde
 
Social Media Cyber Security Awareness Briefing
Department of Defense
 
Introduction to Cyber Security
Stephen Lahanas
 
Cyber Awareness presentation for Parents
lisluandaprimary
 
New Hire Information Security Awareness
hubbargf
 
Cyber security awareness training by cyber security infotech(csi)
Cyber Security Infotech
 
ISO 27001 - information security user awareness training presentation -part 2
Tanmay Shinde
 
Ad

Similar to Cyber Security 101: Training, awareness, strategies for small to medium sized business (20)

PDF
Information Security Awareness
Net at Work
 
PPTX
Using Technology and People to Improve your Threat Resistance and Cyber Security
Stephen Cobb
 
PDF
Best Practices for Security Awareness and Training
Kimberly Hood
 
PPTX
Secure Iowa Oct 2016
Larry Slobodzian
 
PDF
Aetna information security assurance program
Siddharth Janakiram
 
PPTX
Team black
hetvi naik
 
PPTX
Be More Secure than your Competition: MePush Cyber Security for Small Business
Art Ocain
 
PPTX
Cybercrime and the Hidden Perils of Patient Data
Stephen Cobb
 
PPTX
People are the biggest risk
Evan Francen
 
PDF
Social Engineering Audit & Security Awareness
CBIZ, Inc.
 
PPTX
How to assess and manage cyber risk
Stephen Cobb
 
PPTX
How To Become An IT Security Risk Analyst
Niloufer Tamboly CISSP, CPA, CIA, CISA, CFE
 
PPTX
Using Technology and Techno-People to Improve your Threat Resistance and Cybe...
Stephen Cobb
 
PPTX
Cyber Security # Lec 3
Kabul Education University
 
PPT
13734729.ppt
AmitPandey388410
 
PDF
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Shawn Tuma
 
PPTX
IT & Network Security Awareness
The Network Support Company
 
PPTX
BSIDES DETROIT 2015: Data breaches cost of doing business
Joel Cardella
 
PPTX
How to Mitigate Risk From Your Expanding Digital Presence
SurfWatch Labs
 
PDF
The Hacking Team Hack: Lessons Learned for Enterprise Security
Stephen Cobb
 
Information Security Awareness
Net at Work
 
Using Technology and People to Improve your Threat Resistance and Cyber Security
Stephen Cobb
 
Best Practices for Security Awareness and Training
Kimberly Hood
 
Secure Iowa Oct 2016
Larry Slobodzian
 
Aetna information security assurance program
Siddharth Janakiram
 
Team black
hetvi naik
 
Be More Secure than your Competition: MePush Cyber Security for Small Business
Art Ocain
 
Cybercrime and the Hidden Perils of Patient Data
Stephen Cobb
 
People are the biggest risk
Evan Francen
 
Social Engineering Audit & Security Awareness
CBIZ, Inc.
 
How to assess and manage cyber risk
Stephen Cobb
 
How To Become An IT Security Risk Analyst
Niloufer Tamboly CISSP, CPA, CIA, CISA, CFE
 
Using Technology and Techno-People to Improve your Threat Resistance and Cybe...
Stephen Cobb
 
Cyber Security # Lec 3
Kabul Education University
 
13734729.ppt
AmitPandey388410
 
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Shawn Tuma
 
IT & Network Security Awareness
The Network Support Company
 
BSIDES DETROIT 2015: Data breaches cost of doing business
Joel Cardella
 
How to Mitigate Risk From Your Expanding Digital Presence
SurfWatch Labs
 
The Hacking Team Hack: Lessons Learned for Enterprise Security
Stephen Cobb
 

More from Stephen Cobb (19)

PPTX
Cybercrime-as-health-crisis-shared.pptx
Stephen Cobb
 
PPTX
Cybersecurity Risk Perception and Communication
Stephen Cobb
 
PPTX
What Makes a Good CISO
Stephen Cobb
 
PDF
Sizing the Cyber Skills Gap
Stephen Cobb
 
PPTX
Security and Wearables: Success starts with security
Stephen Cobb
 
PPTX
Cybersecurity for the non-technical
Stephen Cobb
 
PPTX
The mobile health IT security challenge: way bigger than HIPAA?
Stephen Cobb
 
PPTX
2015: The year-ahead-in-cyber-security
Stephen Cobb
 
PPTX
NCSAM = Cyber Security Awareness Month: Trends and Resources
Stephen Cobb
 
PPTX
The Evolution of Cybercrime
Stephen Cobb
 
PPT
HIPAA, Privacy, Security, and Good Business
Stephen Cobb
 
PPTX
Malware is Called Malicious for a Reason: The Risks of Weaponizing Code
Stephen Cobb
 
PPTX
Malware and the risks of weaponizing code
Stephen Cobb
 
PPTX
Safer Technology Through Threat Awareness and Response
Stephen Cobb
 
PPTX
The Year Ahead in Cyber Security: 2014 edition
Stephen Cobb
 
PPTX
Endpoint and Server: The belt and braces anti-malware strategy
Stephen Cobb
 
PPTX
Enjoy Safer Technology and Defeat Cyber Criminals
Stephen Cobb
 
PPTX
Cyberskills shortage: Where is the cyber workforce of tomorrow
Stephen Cobb
 
PPTX
Getting Started with Business Continuity
Stephen Cobb
 
Cybercrime-as-health-crisis-shared.pptx
Stephen Cobb
 
Cybersecurity Risk Perception and Communication
Stephen Cobb
 
What Makes a Good CISO
Stephen Cobb
 
Sizing the Cyber Skills Gap
Stephen Cobb
 
Security and Wearables: Success starts with security
Stephen Cobb
 
Cybersecurity for the non-technical
Stephen Cobb
 
The mobile health IT security challenge: way bigger than HIPAA?
Stephen Cobb
 
2015: The year-ahead-in-cyber-security
Stephen Cobb
 
NCSAM = Cyber Security Awareness Month: Trends and Resources
Stephen Cobb
 
The Evolution of Cybercrime
Stephen Cobb
 
HIPAA, Privacy, Security, and Good Business
Stephen Cobb
 
Malware is Called Malicious for a Reason: The Risks of Weaponizing Code
Stephen Cobb
 
Malware and the risks of weaponizing code
Stephen Cobb
 
Safer Technology Through Threat Awareness and Response
Stephen Cobb
 
The Year Ahead in Cyber Security: 2014 edition
Stephen Cobb
 
Endpoint and Server: The belt and braces anti-malware strategy
Stephen Cobb
 
Enjoy Safer Technology and Defeat Cyber Criminals
Stephen Cobb
 
Cyberskills shortage: Where is the cyber workforce of tomorrow
Stephen Cobb
 
Getting Started with Business Continuity
Stephen Cobb
 

Recently uploaded (20)

PDF
Latest Scam Shocking the USA in 2025.pdf
onlinescamreport4
 
PPTX
LESSON-2-Roles-of-ICT-in-Teaching-for-learning_123922 (1).pptx
renavieramopiquero
 
PPTX
Google SGE SEO: 5 Critical Changes That Could Wreck Your Rankings in 2025
Reversed Out Creative
 
PDF
BGP Security Best Practices that Matter, presented at PHNOG 2025
APNIC
 
PPTX
Blue and Dark Blue Modern Technology Presentation.pptx
ap177979
 
PPT
Introduction to dns domain name syst.ppt
MUHAMMADKAVISHSHABAN
 
PPTX
Black Yellow Modern Minimalist Elegant Presentation.pptx
nothisispatrickduhh
 
PPTX
Microsoft PowerPoint Student PPT slides.pptx
Garleys Putin
 
PPTX
The Internet of Things (IoT) refers to a vast network of interconnected devic...
chethana8182
 
PPT
Transformaciones de las funciones elementales.ppt
rirosel211
 
PPTX
Artificial-Intelligence-in-Daily-Life (2).pptx
nidhigoswami335
 
PDF
KIPER4D situs Exclusive Game dari server Star Gaming Asia
hokimamad0
 
PPTX
The Monk and the Sadhurr and the story of how
BeshoyGirgis2
 
PPTX
Crypto Recovery California Services.pptx
lionsgate network
 
PPTX
Slides Powerpoint: Eco Economic Epochs.pptx
Steven McGee
 
PPTX
dns domain name system history work.pptx
MUHAMMADKAVISHSHABAN
 
PPTX
B2B_Ecommerce_Internship_Simranpreet.pptx
LipakshiJindal
 
PPTX
How tech helps people in the modern era.
upadhyayaryan154
 
PPTX
The Internet of Things (IoT) refers to a vast network of interconnected devic...
chethana8182
 
PDF
The Internet of Things (IoT) refers to a vast network of interconnected devic...
chethana8182
 
Latest Scam Shocking the USA in 2025.pdf
onlinescamreport4
 
LESSON-2-Roles-of-ICT-in-Teaching-for-learning_123922 (1).pptx
renavieramopiquero
 
Google SGE SEO: 5 Critical Changes That Could Wreck Your Rankings in 2025
Reversed Out Creative
 
BGP Security Best Practices that Matter, presented at PHNOG 2025
APNIC
 
Blue and Dark Blue Modern Technology Presentation.pptx
ap177979
 
Introduction to dns domain name syst.ppt
MUHAMMADKAVISHSHABAN
 
Black Yellow Modern Minimalist Elegant Presentation.pptx
nothisispatrickduhh
 
Microsoft PowerPoint Student PPT slides.pptx
Garleys Putin
 
The Internet of Things (IoT) refers to a vast network of interconnected devic...
chethana8182
 
Transformaciones de las funciones elementales.ppt
rirosel211
 
Artificial-Intelligence-in-Daily-Life (2).pptx
nidhigoswami335
 
KIPER4D situs Exclusive Game dari server Star Gaming Asia
hokimamad0
 
The Monk and the Sadhurr and the story of how
BeshoyGirgis2
 
Crypto Recovery California Services.pptx
lionsgate network
 
Slides Powerpoint: Eco Economic Epochs.pptx
Steven McGee
 
dns domain name system history work.pptx
MUHAMMADKAVISHSHABAN
 
B2B_Ecommerce_Internship_Simranpreet.pptx
LipakshiJindal
 
How tech helps people in the modern era.
upadhyayaryan154
 
The Internet of Things (IoT) refers to a vast network of interconnected devic...
chethana8182
 
The Internet of Things (IoT) refers to a vast network of interconnected devic...
chethana8182
 

Cyber Security 101: Training, awareness, strategies for small to medium sized business

  • 1. Security 101 Training, awareness, and strategies Stephen Cobb, CISSP Senior Security Researcher ESET NA
  • 2. The SMB Sweet Spot for the cyber-criminally inclined Enterprises SMB “Sweet Spot” Consumers Assets worth looting Level of protection
  • 3. The challenge • Organizations of every type rely on computers to handle information • Everyone today is a computer user • Most have no security training • Lack of security training leads to problems
  • 4. How big is the challenge We asked U.S. consumers if they had ever received any computer security training No: 68% Yes: 32% *Savitz Research for ESET, 2012
  • 5. 68% is sadly consistent We asked working adults in the U.S. if they had ever received any computer security training No: 68% Yes: 32% *Harris poll for ESET, 2012
  • 6. 73% is even worse We asked adults in U.S. who use social media if they had ever received online safety training No: 73% Yes: 27% *Harris poll for ESET, 2012
  • 7. Security training is not yet part of our society* • This has serious implications for your business • 93% of American adults say they’ve had no computer security training in the last 12 months • How many of them work for you, or for your clients, suppliers, etc? *Savitz Research for ESET, 2012
  • 8. Some problems that lack of security training can cause • Unauthorized access to information • Loss of access to information • Loss of information • Corruption of information • Theft of information
  • 9. The implications are non-trivial • Loss of revenue • Loss of business • Fines, lawsuits, headlines • Unbudgeted expenses – Breach costs currently estimated at around $190 per record exposed* – 5,263 records = $1 million hit *Ponemon Institute
  • 10. Trojan terminates escrow firm • $1.1 million wired to China and could not be retrieved • Firm was closed by state law, now in receivership, 9 people out of a job • So what’s the best weapon for keeping that kind of Trojan code out of your company’s system?
  • 11. A well-trained workforce • Knows not to click on suspicious links in email or social media • Knows to report strange activity (e.g. the two-factor authentication not working) • Knows to scan all incoming files for malware – Email, USB drives
  • 12. Does training make a difference? • Yes • A significant percentage of problems can be averted, or their impact minimized, if more employees get better security training and education* *A bunch of different studies in recent years
  • 13. Security training or awareness • What’s the difference? • Training makes sure people at different levels of IT engagement have the right knowledge to execute their roles securely • Awareness makes sure all people at all levels know what to look out for
  • 14. Not that kind of actor… Do your employees know what motivates bad actors? IMPACTADVANTAGEMONEY CREDENTIALS
  • 15. Do you know how the bad guys operate?
  • 16. Taken to exploit site Malware server Popular Attack Technique !?**! User clicks a link Gets infected/owned Command & Control
  • 19. • RAT has full access to victim PC • And its network connections • Search and exfiltrate files • Access to webcam and audio • Scrape passwords • Execute system functions • Chat with victim
  • 24. So how do we move forward?
  • 25. The road map: A B C D E F • Assess your assets, risks, resources • Build your policy • Choose your controls • Deploy controls • Educate employees, execs, vendors • Further assess, audit, test A B C D E F F E D C B A Technology
  • 26. Assess assets, risks, resources • Assets: digital, physical – If you don’t know what you’ve got you can’t protect it! • Risks – Who or what is the threat? • Resources – In house, hired, partners, vendors, trade groups, associations
  • 27. Build your policy • Security begins with policy • Policy begins with C-level buy-in • High-level commitment to protecting the privacy and security of data • Then a set of policies that spell out the protective measures, the controls that will be used
  • 28. Choose controls to enforce policies • For example: – Policy: Only authorized employees can access sensitive data – Controls: • Require identification and authentication of all employees via unique user name and password • Limit access through application(s) by requiring authentication • Log all access
  • 29. Deploy controls, ensure they work • Put control in place; for example, antivirus (anti-malware, anti-phishing, anti-spam) • Test control – Does it work technically? – Does it “work” with your work? – Can employees work it?
  • 30. Educate everyone • Everyone needs to know – What the security policies are – How to comply with them through proper use of controls • Pay attention to any information- sharing relationships – Vendors, partners, even clients • Clearly state consequences of failure to comply
  • 31. Who gets trained? • Everyone, but not in the same way, break it down: – All-hands training – IT staff training – Security staff training
  • 32. How to deliver training • In person • Online • On paper • In house • Outside contractor • Mix and match • Be creative
  • 33. Incentives? • Yes! • To launch programs, push agendas • Prizes do work • But also make security part of every job description and evaluation
  • 34. Use your internal organs • Of communication! • Newsletter • Intranet • Bulletin board • Meetings • Company-wide email
  • 35. How to do awareness • Make it fun • Make it relevant • Leverage the news • Bear in mind that everyone benefits from greater awareness, at work and at home
  • 36. Resources to tap • Industry associations • FS-ISAC, NH-ISAC, others • CompTIA, SBA, BBB • ISSA, ISACA, SANS, (ISC)2 • Local colleges and universities • Securing Our eCity
  • 37. Need more motivation? • Security training is the law – HIPAA – Red Flag Identity Theft Prevention – Gramm-Leach-Bliley, Sarbanes-Oxley – FISMA • Or required by industry – PCI Data Security Standard
  • 38. Or just plain required • To get that big juicy contract • Many companies now require suppliers to certify that they have security training and awareness programs in place as a condition of doing business
  • 39. Further assess, audit, test… • This is a process, not a project • Lay out a plan to assess security on a periodic basis • Stay up-to-date on emerging threats • Stay vigilant around change such as arrivals, departures, functionality A B C D E F F E D C B A
  • 40. Backup and archive Firewall and scan: Incoming traffic emails files devices media Encrypt Monitor Filter and monitor outbound Authenticate users The Technology Slide
  • 41. Thank you! • [email protected] WeLiveSecurity.com • www.eset.com • More info in the lobby