SlideShare a Scribd company logo
1 of 37
Download to read offline
> The Human
dimension
human aspect of information security
Guess You’ll all agree
  with me that….
bad information security
         means


bad company security


     lost credibility
we must be sure that
   we protect our data, our
commercial secrets, our assets
and our business transactions
YOU DO EVERYTHING TO
 MAKE THIS HAPPEN
      FOR SURE
but…




  EMPLOYEES WORK WITH COMPANY DATA,
COMPANY SYSTEMS, THEY ARE IN TOUCH WITH
    CLIENTS, SERVICES AND PRODUCTS.

  THEY NEED TO UNDERSTAND THE BASIC
  PRINCIPLES OF INFORMATION SECURITY.
Fact:
HUMAN ERROR IS THE
CAUSE OF 42% OF ALL
SECURITY BREACHES

           ISC2 White Paper : Securing the Organizations: Creating A
           Partnership Between HR and Information Security
Information security is one of
           the biggest challenges a business faces today.



            55% of                                                  50%         of

            companies used                                          respondents think that
                                                                    their employees had
            over 7 different                                        little or even no
            vendors to keep                                         awareness of data
            their network                                           protection issues or
            secure.                                                 corporate security policy.


Ref: Checkpoint Technologies&The Ponemon Institute Survey 2011 >>
2,400 IT security staff across the world
When does “an employee”
becomes a RISK?
Do you know what these are?


         123456

         Password

          iloveu
I mean…
The gap between you
guys
And your average
employee
is

HUGE
Fact:

We don’t know
As much as you do
Paper, pen, letter
typewriter
computer
internet, e-mail
Web 2.0, social media
Virtual communities
People move…
Both in real and virtual world…
And they create risk!
With or without knowing it
A picture…
87,5% of large businesses have a security policy in place.

67% of the companies that give a high priority to security also had a security policy.

A big majority of companies take steps to raise awareness among employees.

More than 50% allow staff to access their systems remotely.

The proportion of businesses restricting internet access dropped by 50%.

Now only fewer than 10% gave no access to the internet.

Employees are increasingly being targeted by "social engineering" attacks.

Businesses are becoming more concerned about what was being said about them on
social networking sites.

More than 80% of large companies blocked access to inappropriate websites.

86% logged and monitored staff access to the internet.

                                                                  Research by PWC UK , 2010
more exposure,
more action,
more knowhow sharing,
more interaction

The Return is big but
the Risk is big too
your   employees
can   fast become
the   weakest    link
in your information
security
changing employee behaviour
is the key
to improving information security.
The big   how
Offer them a clear framework

  EMAIL SECURITY
  INTERNET SECURITY
  DATA SECURITY
  ASSETS SECURITY
Do you have policies?

Why?
Customize the access
according to the skills and
needs of the employees

customize the risk

But standardize your
policies
The worst way to
communicate a policy is
Publishing it
Educate, educate, educate:

have your employees build
the “awareness” muscle

Give people good habits
Communicate your
best practices
Create an awareness
culture:
let it be a dialogue
Make it formal:
it is serious
Make it simple,

make it fun,

make it participative
Make it a
management issue
Be   fully   proactive
Tell them
Personal = professional
Prohibiting
Limiting
Banning
is not your key to success

trust
answer

 WIIFM?
Hr & it partnership*

Does hr talk about these?

I am afraid not…

Legal base remains unclear too…
You have to be security
and policy mentor

Your employees have to be
security and policy literate

Your company has to be
security and policy fluent
get connected
 E-mail:
 pinar.akkaya.pa@gmail.com

 LinkedIn:
 http://tr.linkedin.com/in/pinarakkaya

 Twitter: http://twitter.com/PINARAKKAYA
 http://twitter.com/lifesocialmedia


 http://tr.linkedin.com/groups/hrleadersturkey

More Related Content

What's hot

Allow is the New Block
Allow is the New BlockAllow is the New Block
Allow is the New Block
Sean Dickson
 
Cloud security and cloud adoption public
Cloud security and cloud adoption   publicCloud security and cloud adoption   public
Cloud security and cloud adoption public
John Mathon
 
Nexus It Group Resume Writing
Nexus It Group   Resume WritingNexus It Group   Resume Writing
Nexus It Group Resume Writing
tlinde
 
All clear id_whitepaper__not_all_breaches_are_created_equal
All clear id_whitepaper__not_all_breaches_are_created_equalAll clear id_whitepaper__not_all_breaches_are_created_equal
All clear id_whitepaper__not_all_breaches_are_created_equal
Nicholas Cramer
 

What's hot (18)

1. Augmenting Work with AI and Driving Adoption of Collaboration
1. Augmenting Work with AI and Driving Adoption of Collaboration1. Augmenting Work with AI and Driving Adoption of Collaboration
1. Augmenting Work with AI and Driving Adoption of Collaboration
 
Cyber liability and cyber security
Cyber liability and cyber securityCyber liability and cyber security
Cyber liability and cyber security
 
Managing Cyber Risk: Are Companies Safeguarding Their Assets?
Managing Cyber Risk: Are Companies Safeguarding Their Assets?Managing Cyber Risk: Are Companies Safeguarding Their Assets?
Managing Cyber Risk: Are Companies Safeguarding Their Assets?
 
Allow is the New Block
Allow is the New BlockAllow is the New Block
Allow is the New Block
 
Edelman Privacy Risk Index 2012
Edelman Privacy Risk Index 2012Edelman Privacy Risk Index 2012
Edelman Privacy Risk Index 2012
 
Cybersecurity Actions for CEOs
Cybersecurity Actions for CEOsCybersecurity Actions for CEOs
Cybersecurity Actions for CEOs
 
Strong Authentication: Securing Identities and Enabling Business
Strong Authentication: Securing Identities and Enabling BusinessStrong Authentication: Securing Identities and Enabling Business
Strong Authentication: Securing Identities and Enabling Business
 
True Drivers of MDM webinar
True Drivers of MDM webinarTrue Drivers of MDM webinar
True Drivers of MDM webinar
 
Cloud security and cloud adoption public
Cloud security and cloud adoption   publicCloud security and cloud adoption   public
Cloud security and cloud adoption public
 
Nexus It Group Resume Writing
Nexus It Group   Resume WritingNexus It Group   Resume Writing
Nexus It Group Resume Writing
 
What people Analytics can't capture
What people Analytics can't capture What people Analytics can't capture
What people Analytics can't capture
 
All clear id_whitepaper__not_all_breaches_are_created_equal
All clear id_whitepaper__not_all_breaches_are_created_equalAll clear id_whitepaper__not_all_breaches_are_created_equal
All clear id_whitepaper__not_all_breaches_are_created_equal
 
Leveraging Human Factors for Effective Security Training, for ISSA Webinar Ma...
Leveraging Human Factors for Effective Security Training, for ISSA Webinar Ma...Leveraging Human Factors for Effective Security Training, for ISSA Webinar Ma...
Leveraging Human Factors for Effective Security Training, for ISSA Webinar Ma...
 
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
 
Get Employees Invested In CyberSecurity
Get Employees Invested In CyberSecurity Get Employees Invested In CyberSecurity
Get Employees Invested In CyberSecurity
 
Business Objects Security
Business Objects SecurityBusiness Objects Security
Business Objects Security
 
When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...
When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...
When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...
 
Security Analytics for Certified Fraud Examiners
Security Analytics for Certified Fraud ExaminersSecurity Analytics for Certified Fraud Examiners
Security Analytics for Certified Fraud Examiners
 

Similar to PINAR AKKAYA - The Human Dimension

BBA 3551, Information Systems Management 1 Course Lea.docx
 BBA 3551, Information Systems Management 1 Course Lea.docx BBA 3551, Information Systems Management 1 Course Lea.docx
BBA 3551, Information Systems Management 1 Course Lea.docx
aryan532920
 
1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx
1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx
1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx
ambersalomon88660
 
Before you collaborate
Before you collaborateBefore you collaborate
Before you collaborate
Todd Nilson
 
The 10 Secret Codes of Security
The 10 Secret Codes of SecurityThe 10 Secret Codes of Security
The 10 Secret Codes of Security
Karina Elise
 
Assignmnt-700 words with 3 referencesToday, there is a crisi.docx
Assignmnt-700 words with 3 referencesToday, there is a crisi.docxAssignmnt-700 words with 3 referencesToday, there is a crisi.docx
Assignmnt-700 words with 3 referencesToday, there is a crisi.docx
normanibarber20063
 

Similar to PINAR AKKAYA - The Human Dimension (20)

Three tools to reduce employee apathy
Three tools to reduce employee apathyThree tools to reduce employee apathy
Three tools to reduce employee apathy
 
Decoding Organizational DNA: Trust, Data and Unlocking Value in the Digital W...
Decoding Organizational DNA: Trust, Data and Unlocking Value in the Digital W...Decoding Organizational DNA: Trust, Data and Unlocking Value in the Digital W...
Decoding Organizational DNA: Trust, Data and Unlocking Value in the Digital W...
 
Rogers eBook Security
Rogers eBook SecurityRogers eBook Security
Rogers eBook Security
 
BBA 3551, Information Systems Management 1 Course Lea.docx
 BBA 3551, Information Systems Management 1 Course Lea.docx BBA 3551, Information Systems Management 1 Course Lea.docx
BBA 3551, Information Systems Management 1 Course Lea.docx
 
Decoding Organizational DNA
Decoding Organizational DNADecoding Organizational DNA
Decoding Organizational DNA
 
Decoding Organizational DNA
Decoding Organizational DNADecoding Organizational DNA
Decoding Organizational DNA
 
Windstream Cloud Security Checklist
Windstream Cloud Security Checklist Windstream Cloud Security Checklist
Windstream Cloud Security Checklist
 
5 Questions Executives Should Be Asking Their Security Teams
5 Questions Executives Should Be Asking Their Security Teams 5 Questions Executives Should Be Asking Their Security Teams
5 Questions Executives Should Be Asking Their Security Teams
 
Organizational Security: When People are Involved
Organizational Security: When People are InvolvedOrganizational Security: When People are Involved
Organizational Security: When People are Involved
 
Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.
 
The Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure AgeThe Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure Age
 
What Small Business Can Do To Protect Themselves Now in Cybersecurity
What Small Business Can Do To Protect Themselves Now in CybersecurityWhat Small Business Can Do To Protect Themselves Now in Cybersecurity
What Small Business Can Do To Protect Themselves Now in Cybersecurity
 
1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx
1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx
1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx
 
Edelman Privacy Risk Index Powered by Ponemon
Edelman Privacy Risk Index Powered by PonemonEdelman Privacy Risk Index Powered by Ponemon
Edelman Privacy Risk Index Powered by Ponemon
 
Before you collaborate
Before you collaborateBefore you collaborate
Before you collaborate
 
The 10 Secret Codes of Security
The 10 Secret Codes of SecurityThe 10 Secret Codes of Security
The 10 Secret Codes of Security
 
Top 6 things_small_businesses_q12015
Top 6 things_small_businesses_q12015Top 6 things_small_businesses_q12015
Top 6 things_small_businesses_q12015
 
Assignmnt-700 words with 3 referencesToday, there is a crisi.docx
Assignmnt-700 words with 3 referencesToday, there is a crisi.docxAssignmnt-700 words with 3 referencesToday, there is a crisi.docx
Assignmnt-700 words with 3 referencesToday, there is a crisi.docx
 
Austin Bsides March 2016 Cyber Presentation
Austin Bsides March 2016 Cyber PresentationAustin Bsides March 2016 Cyber Presentation
Austin Bsides March 2016 Cyber Presentation
 
Protecting the Core of Your Network
Protecting the Core of Your Network Protecting the Core of Your Network
Protecting the Core of Your Network
 

More from Pinar AKKAYA (6)

From the eyes of an expat manager
From the eyes of an expat managerFrom the eyes of an expat manager
From the eyes of an expat manager
 
New countries new leadership Pinar Akkaya Montreal HR Congress
New countries new leadership Pinar Akkaya Montreal HR CongressNew countries new leadership Pinar Akkaya Montreal HR Congress
New countries new leadership Pinar Akkaya Montreal HR Congress
 
Enerji Konferansı Sunum
Enerji Konferansı SunumEnerji Konferansı Sunum
Enerji Konferansı Sunum
 
Business Continuity in HR / IK Perspektifinden Is Sureklilligi
Business Continuity in HR / IK Perspektifinden  Is SureklilligiBusiness Continuity in HR / IK Perspektifinden  Is Sureklilligi
Business Continuity in HR / IK Perspektifinden Is Sureklilligi
 
PINAR AKKAYA - Oooops! When recruitment interviews go wrong
PINAR AKKAYA - Oooops! When recruitment interviews go wrongPINAR AKKAYA - Oooops! When recruitment interviews go wrong
PINAR AKKAYA - Oooops! When recruitment interviews go wrong
 
PINAR AKKAYA - A Tale Of Getting Connected
PINAR AKKAYA - A Tale Of Getting ConnectedPINAR AKKAYA - A Tale Of Getting Connected
PINAR AKKAYA - A Tale Of Getting Connected
 

Recently uploaded

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 

PINAR AKKAYA - The Human Dimension

  • 1. > The Human dimension human aspect of information security
  • 2. Guess You’ll all agree with me that….
  • 3. bad information security means bad company security lost credibility
  • 4. we must be sure that we protect our data, our commercial secrets, our assets and our business transactions
  • 5. YOU DO EVERYTHING TO MAKE THIS HAPPEN FOR SURE
  • 6. but… EMPLOYEES WORK WITH COMPANY DATA, COMPANY SYSTEMS, THEY ARE IN TOUCH WITH CLIENTS, SERVICES AND PRODUCTS. THEY NEED TO UNDERSTAND THE BASIC PRINCIPLES OF INFORMATION SECURITY.
  • 7. Fact: HUMAN ERROR IS THE CAUSE OF 42% OF ALL SECURITY BREACHES ISC2 White Paper : Securing the Organizations: Creating A Partnership Between HR and Information Security
  • 8. Information security is one of the biggest challenges a business faces today. 55% of 50% of companies used respondents think that their employees had over 7 different little or even no vendors to keep awareness of data their network protection issues or secure. corporate security policy. Ref: Checkpoint Technologies&The Ponemon Institute Survey 2011 >> 2,400 IT security staff across the world
  • 9.
  • 10. When does “an employee” becomes a RISK?
  • 11. Do you know what these are? 123456 Password iloveu
  • 12. I mean… The gap between you guys And your average employee is HUGE
  • 13. Fact: We don’t know As much as you do
  • 14. Paper, pen, letter typewriter computer internet, e-mail Web 2.0, social media Virtual communities
  • 15. People move… Both in real and virtual world… And they create risk! With or without knowing it
  • 16. A picture… 87,5% of large businesses have a security policy in place. 67% of the companies that give a high priority to security also had a security policy. A big majority of companies take steps to raise awareness among employees. More than 50% allow staff to access their systems remotely. The proportion of businesses restricting internet access dropped by 50%. Now only fewer than 10% gave no access to the internet. Employees are increasingly being targeted by "social engineering" attacks. Businesses are becoming more concerned about what was being said about them on social networking sites. More than 80% of large companies blocked access to inappropriate websites. 86% logged and monitored staff access to the internet. Research by PWC UK , 2010
  • 17. more exposure, more action, more knowhow sharing, more interaction The Return is big but the Risk is big too
  • 18. your employees can fast become the weakest link in your information security
  • 19. changing employee behaviour is the key to improving information security.
  • 20. The big how
  • 21. Offer them a clear framework EMAIL SECURITY INTERNET SECURITY DATA SECURITY ASSETS SECURITY
  • 22. Do you have policies? Why?
  • 23. Customize the access according to the skills and needs of the employees customize the risk But standardize your policies
  • 24. The worst way to communicate a policy is Publishing it
  • 25. Educate, educate, educate: have your employees build the “awareness” muscle Give people good habits
  • 28. Make it formal: it is serious
  • 29. Make it simple, make it fun, make it participative
  • 31. Be fully proactive
  • 32. Tell them Personal = professional
  • 35. Hr & it partnership* Does hr talk about these? I am afraid not… Legal base remains unclear too…
  • 36. You have to be security and policy mentor Your employees have to be security and policy literate Your company has to be security and policy fluent
  • 37. get connected E-mail: pinar.akkaya.pa@gmail.com LinkedIn: http://tr.linkedin.com/in/pinarakkaya Twitter: http://twitter.com/PINARAKKAYA http://twitter.com/lifesocialmedia http://tr.linkedin.com/groups/hrleadersturkey