SlideShare ist ein Scribd-Unternehmen logo
1 von 17
Security Awareness
Chris Merkel
Director, IS Security
Brunswick Corporation
Why “Awareness”?
…when I have an IDS/IPS, UTM
Gateway, Encryption, DLP, Vuln
Scanning, Patch Management, AV,
HIDS, WAF, SEIM, Secure Code
Review, Whitelisting, MDM, cable
locks, lo-jack and epoxy in all of
my USB ports!!!!
Hint: You don’t have a technology problem.
“A computer lets you make
more mistakes faster than any
invention in human history –
with the possible exception of
handguns and tequila.”
- Mitch Ratliff
What is awareness?
This is not awareness:
Neither is this:
92%
3%
5%
Percentage of US Employees Completing
Security Awareness Module in the Past 12mo.
Complete
Incomplete
VP - Exempt
…or this:
Awareness is knowledge:
• That *you* are being targeted as part of a larger
campaign to steal something.
• Within your specific business risk context.
• Which will require you to be able to identify
suspicious “things”.
• To understand and avoid a negative outcome.
• By taking appropriate action.
• Or immediate corrective actions, if a thoughtless
or incorrect choice is made.
Excellent
Awareness
Poster
What’s the problem?
How does it affect me?
What should I do?
Does Awareness “Work”?
Common criticisms:
• One click, by one user, and you’re
compromised, so why bother?
• We told them not to do that, and they still did it.
• They didn’t remember our advice.
Our Goal:
Harm Reduction,
Not Elimination
Awareness Ideas
• Publish informational content in your IT
knowledgebase / wiki.
• Periodic informational emails.
• “Point of failure” education on your internet
gateways.
• “Coaching” people when they visit sites common
to scams.
• Internal phishing campaigns.
• Scam bounty programs.
• Annual, self-paced, awareness training.
Measuring Efficacy – A Must
The best possible outcome is that *nothing*
happens. Measure that.
Next best option – reduction in bad things:
- Web content filter hits.
- Phishing assessments.
- Anti-virus hits / infections.
But….
Correlation ≠ Causation
Be rigorous with your data.
Educational Resources:
• SANS Securing the human blog / newsletter
• US-CERT National Cyber Awareness System
• Krebs on Security
• Office of the National Counterintelligence Executive
• NIST Computer Security Resource Center
• Infragard Center for Information Security
Awareness
• FTC – Onguard Online
• StaySafeOnline.org - National Cyber Security
Alliance
Phishing Resources
• Free: SPT
• Commercial:
▫ Phish5
▫ Phishline
▫ Phishme
Security Awareness - Defined, Managed and Measured

Weitere ähnliche Inhalte

Was ist angesagt?

Simplitfy - Guarding your Data
Simplitfy - Guarding your DataSimplitfy - Guarding your Data
Simplitfy - Guarding your DataErick Solms
 
Backups and Disaster Recovery for Nonprofits
Backups and Disaster Recovery for NonprofitsBackups and Disaster Recovery for Nonprofits
Backups and Disaster Recovery for NonprofitsCommunity IT Innovators
 
Ed McCabe - Putting the Intelligence back in Threat Intelligence
Ed McCabe - Putting the Intelligence back in Threat IntelligenceEd McCabe - Putting the Intelligence back in Threat Intelligence
Ed McCabe - Putting the Intelligence back in Threat Intelligencecentralohioissa
 
The What If's of Hostile:Evil Personas
The What If's of Hostile:Evil PersonasThe What If's of Hostile:Evil Personas
The What If's of Hostile:Evil PersonasAllison Donatto
 
A Practical Security Framework for Website Owners
A Practical Security Framework for Website OwnersA Practical Security Framework for Website Owners
A Practical Security Framework for Website OwnersTony Perez
 
You can't teach an old dog new tricks
You can't teach an old dog new tricksYou can't teach an old dog new tricks
You can't teach an old dog new tricksWatchful Software
 
Digital literacy & online safety
Digital literacy & online safety Digital literacy & online safety
Digital literacy & online safety hannahstrevig
 
Information Security Awareness
Information Security Awareness Information Security Awareness
Information Security Awareness SnapComms
 
20 tips for information security around human factors and human error
20 tips for information security around human factors and human error20 tips for information security around human factors and human error
20 tips for information security around human factors and human errorToru Nakata
 
Common Technology Misconceptions
Common Technology MisconceptionsCommon Technology Misconceptions
Common Technology MisconceptionsNick Toadvine
 
FINAL presentationMay2016
FINAL presentationMay2016FINAL presentationMay2016
FINAL presentationMay2016Melissa Krasnow
 
Internet security for parents
Internet security for parentsInternet security for parents
Internet security for parentsShannon Blackerby
 
Protecting Children In The Classroom
Protecting Children In The ClassroomProtecting Children In The Classroom
Protecting Children In The ClassroomRussell Dyas
 
"make secure" securing the development supply chain All Things Open 2019
"make secure" securing the development supply chain All Things Open 2019"make secure" securing the development supply chain All Things Open 2019
"make secure" securing the development supply chain All Things Open 2019Wes Widner
 
Securing the Development Supply Chain
Securing the Development Supply ChainSecuring the Development Supply Chain
Securing the Development Supply ChainAll Things Open
 
Technological invasion 23 nov 2018
Technological invasion   23 nov 2018Technological invasion   23 nov 2018
Technological invasion 23 nov 2018J A Bhavsar
 

Was ist angesagt? (20)

Simplitfy - Guarding your Data
Simplitfy - Guarding your DataSimplitfy - Guarding your Data
Simplitfy - Guarding your Data
 
Backups and Disaster Recovery for Nonprofits
Backups and Disaster Recovery for NonprofitsBackups and Disaster Recovery for Nonprofits
Backups and Disaster Recovery for Nonprofits
 
Ed McCabe - Putting the Intelligence back in Threat Intelligence
Ed McCabe - Putting the Intelligence back in Threat IntelligenceEd McCabe - Putting the Intelligence back in Threat Intelligence
Ed McCabe - Putting the Intelligence back in Threat Intelligence
 
Brochure
BrochureBrochure
Brochure
 
The What If's of Hostile:Evil Personas
The What If's of Hostile:Evil PersonasThe What If's of Hostile:Evil Personas
The What If's of Hostile:Evil Personas
 
A Practical Security Framework for Website Owners
A Practical Security Framework for Website OwnersA Practical Security Framework for Website Owners
A Practical Security Framework for Website Owners
 
Cyber security training
Cyber security trainingCyber security training
Cyber security training
 
You can't teach an old dog new tricks
You can't teach an old dog new tricksYou can't teach an old dog new tricks
You can't teach an old dog new tricks
 
Digital literacy & online safety
Digital literacy & online safety Digital literacy & online safety
Digital literacy & online safety
 
Information Security Awareness
Information Security Awareness Information Security Awareness
Information Security Awareness
 
20 tips for information security around human factors and human error
20 tips for information security around human factors and human error20 tips for information security around human factors and human error
20 tips for information security around human factors and human error
 
Common Technology Misconceptions
Common Technology MisconceptionsCommon Technology Misconceptions
Common Technology Misconceptions
 
FINAL presentationMay2016
FINAL presentationMay2016FINAL presentationMay2016
FINAL presentationMay2016
 
The Current State of Cybersecurity
The Current State of CybersecurityThe Current State of Cybersecurity
The Current State of Cybersecurity
 
Internet security for parents
Internet security for parentsInternet security for parents
Internet security for parents
 
Privacy Primer
Privacy PrimerPrivacy Primer
Privacy Primer
 
Protecting Children In The Classroom
Protecting Children In The ClassroomProtecting Children In The Classroom
Protecting Children In The Classroom
 
"make secure" securing the development supply chain All Things Open 2019
"make secure" securing the development supply chain All Things Open 2019"make secure" securing the development supply chain All Things Open 2019
"make secure" securing the development supply chain All Things Open 2019
 
Securing the Development Supply Chain
Securing the Development Supply ChainSecuring the Development Supply Chain
Securing the Development Supply Chain
 
Technological invasion 23 nov 2018
Technological invasion   23 nov 2018Technological invasion   23 nov 2018
Technological invasion 23 nov 2018
 

Andere mochten auch

建立您的第一份簡報 I
建立您的第一份簡報 I建立您的第一份簡報 I
建立您的第一份簡報 Inur9264
 
Purple Reign Ball 2012 Save the Date
Purple Reign Ball 2012 Save the DatePurple Reign Ball 2012 Save the Date
Purple Reign Ball 2012 Save the Datememphisywca
 
โจทย์ปัญหาPbl1
โจทย์ปัญหาPbl1โจทย์ปัญหาPbl1
โจทย์ปัญหาPbl1namthip2539
 
ฟรอยด์
ฟรอยด์ฟรอยด์
ฟรอยด์ai-sohyanya
 
130628 01 urbano-social
130628 01 urbano-social130628 01 urbano-social
130628 01 urbano-socialJose Milara
 

Andere mochten auch (7)

建立您的第一份簡報 I
建立您的第一份簡報 I建立您的第一份簡報 I
建立您的第一份簡報 I
 
You
YouYou
You
 
Purple Reign Ball 2012 Save the Date
Purple Reign Ball 2012 Save the DatePurple Reign Ball 2012 Save the Date
Purple Reign Ball 2012 Save the Date
 
โจทย์ปัญหาPbl1
โจทย์ปัญหาPbl1โจทย์ปัญหาPbl1
โจทย์ปัญหาPbl1
 
ฟรอยด์
ฟรอยด์ฟรอยด์
ฟรอยด์
 
130719 04 final
130719 04 final130719 04 final
130719 04 final
 
130628 01 urbano-social
130628 01 urbano-social130628 01 urbano-social
130628 01 urbano-social
 

Ähnlich wie Security Awareness - Defined, Managed and Measured

Mark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
Mark Villinski - Top 10 Tips for Educating Employees about CybersecurityMark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
Mark Villinski - Top 10 Tips for Educating Employees about Cybersecuritycentralohioissa
 
2015 Cyber Security
2015 Cyber Security2015 Cyber Security
2015 Cyber SecurityAllen Zhang
 
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...Rishi Singh
 
Netwealth educational webinar: Peace of mind in a digital world
Netwealth educational webinar: Peace of mind in a digital worldNetwealth educational webinar: Peace of mind in a digital world
Netwealth educational webinar: Peace of mind in a digital worldnetwealthInvest
 
11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of securityMatthew Pascucci
 
Using Technology and People to Improve your Threat Resistance and Cyber Security
Using Technology and People to Improve your Threat Resistance and Cyber SecurityUsing Technology and People to Improve your Threat Resistance and Cyber Security
Using Technology and People to Improve your Threat Resistance and Cyber SecurityStephen Cobb
 
Data Security for Nonprofits
Data Security for NonprofitsData Security for Nonprofits
Data Security for NonprofitsNPowerCR
 
Cyber security do your part be the resistance
Cyber security do your part be the resistanceCyber security do your part be the resistance
Cyber security do your part be the resistancePaul-Charife Allen
 
An Introduction To IT Security And Privacy In Libraries
 An Introduction To IT Security And Privacy In Libraries An Introduction To IT Security And Privacy In Libraries
An Introduction To IT Security And Privacy In LibrariesBlake Carver
 
Cyber Attacks aren't going away - including Cyber Security in your risk strategy
Cyber Attacks aren't going away - including Cyber Security in your risk strategyCyber Attacks aren't going away - including Cyber Security in your risk strategy
Cyber Attacks aren't going away - including Cyber Security in your risk strategyJames Mulhern
 
Social Networking Security For OCRI - Scott Wright - Condensed July 9, 2009
Social Networking Security For OCRI - Scott Wright - Condensed July 9, 2009Social Networking Security For OCRI - Scott Wright - Condensed July 9, 2009
Social Networking Security For OCRI - Scott Wright - Condensed July 9, 2009Scott Wright
 
Be More Secure than your Competition: MePush Cyber Security for Small Business
Be More Secure than your Competition:  MePush Cyber Security for Small BusinessBe More Secure than your Competition:  MePush Cyber Security for Small Business
Be More Secure than your Competition: MePush Cyber Security for Small BusinessArt Ocain
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Stephen Cobb
 
Cybrary's navigating a security wasteland
Cybrary's navigating a security wasteland Cybrary's navigating a security wasteland
Cybrary's navigating a security wasteland Devendra kashyap
 
Champaign EDC Cybersecurity Seminar by John Bambenek - March 25, 2014
Champaign EDC Cybersecurity Seminar by John Bambenek - March 25, 2014Champaign EDC Cybersecurity Seminar by John Bambenek - March 25, 2014
Champaign EDC Cybersecurity Seminar by John Bambenek - March 25, 2014John Bambenek
 
Banning Whining, Avoiding Cyber Wolves, and Creating Warrior
Banning Whining, Avoiding Cyber Wolves, and Creating WarriorBanning Whining, Avoiding Cyber Wolves, and Creating Warrior
Banning Whining, Avoiding Cyber Wolves, and Creating WarriorSandra (Sandy) Dunn
 
The Small Business Cyber Security Best Practice Guide
The Small Business Cyber Security Best Practice GuideThe Small Business Cyber Security Best Practice Guide
The Small Business Cyber Security Best Practice GuideInspiring Women
 
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...Matt Hathaway
 
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...Alexandre Sieira
 

Ähnlich wie Security Awareness - Defined, Managed and Measured (20)

Mark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
Mark Villinski - Top 10 Tips for Educating Employees about CybersecurityMark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
Mark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
 
2015 Cyber Security
2015 Cyber Security2015 Cyber Security
2015 Cyber Security
 
Mind the gap
Mind the gapMind the gap
Mind the gap
 
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
 
Netwealth educational webinar: Peace of mind in a digital world
Netwealth educational webinar: Peace of mind in a digital worldNetwealth educational webinar: Peace of mind in a digital world
Netwealth educational webinar: Peace of mind in a digital world
 
11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security
 
Using Technology and People to Improve your Threat Resistance and Cyber Security
Using Technology and People to Improve your Threat Resistance and Cyber SecurityUsing Technology and People to Improve your Threat Resistance and Cyber Security
Using Technology and People to Improve your Threat Resistance and Cyber Security
 
Data Security for Nonprofits
Data Security for NonprofitsData Security for Nonprofits
Data Security for Nonprofits
 
Cyber security do your part be the resistance
Cyber security do your part be the resistanceCyber security do your part be the resistance
Cyber security do your part be the resistance
 
An Introduction To IT Security And Privacy In Libraries
 An Introduction To IT Security And Privacy In Libraries An Introduction To IT Security And Privacy In Libraries
An Introduction To IT Security And Privacy In Libraries
 
Cyber Attacks aren't going away - including Cyber Security in your risk strategy
Cyber Attacks aren't going away - including Cyber Security in your risk strategyCyber Attacks aren't going away - including Cyber Security in your risk strategy
Cyber Attacks aren't going away - including Cyber Security in your risk strategy
 
Social Networking Security For OCRI - Scott Wright - Condensed July 9, 2009
Social Networking Security For OCRI - Scott Wright - Condensed July 9, 2009Social Networking Security For OCRI - Scott Wright - Condensed July 9, 2009
Social Networking Security For OCRI - Scott Wright - Condensed July 9, 2009
 
Be More Secure than your Competition: MePush Cyber Security for Small Business
Be More Secure than your Competition:  MePush Cyber Security for Small BusinessBe More Secure than your Competition:  MePush Cyber Security for Small Business
Be More Secure than your Competition: MePush Cyber Security for Small Business
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
 
Cybrary's navigating a security wasteland
Cybrary's navigating a security wasteland Cybrary's navigating a security wasteland
Cybrary's navigating a security wasteland
 
Champaign EDC Cybersecurity Seminar by John Bambenek - March 25, 2014
Champaign EDC Cybersecurity Seminar by John Bambenek - March 25, 2014Champaign EDC Cybersecurity Seminar by John Bambenek - March 25, 2014
Champaign EDC Cybersecurity Seminar by John Bambenek - March 25, 2014
 
Banning Whining, Avoiding Cyber Wolves, and Creating Warrior
Banning Whining, Avoiding Cyber Wolves, and Creating WarriorBanning Whining, Avoiding Cyber Wolves, and Creating Warrior
Banning Whining, Avoiding Cyber Wolves, and Creating Warrior
 
The Small Business Cyber Security Best Practice Guide
The Small Business Cyber Security Best Practice GuideThe Small Business Cyber Security Best Practice Guide
The Small Business Cyber Security Best Practice Guide
 
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...
 
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...
 

Kürzlich hochgeladen

FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 

Kürzlich hochgeladen (20)

FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 

Security Awareness - Defined, Managed and Measured

  • 1. Security Awareness Chris Merkel Director, IS Security Brunswick Corporation
  • 2. Why “Awareness”? …when I have an IDS/IPS, UTM Gateway, Encryption, DLP, Vuln Scanning, Patch Management, AV, HIDS, WAF, SEIM, Secure Code Review, Whitelisting, MDM, cable locks, lo-jack and epoxy in all of my USB ports!!!!
  • 3. Hint: You don’t have a technology problem. “A computer lets you make more mistakes faster than any invention in human history – with the possible exception of handguns and tequila.” - Mitch Ratliff
  • 5. This is not awareness:
  • 6. Neither is this: 92% 3% 5% Percentage of US Employees Completing Security Awareness Module in the Past 12mo. Complete Incomplete VP - Exempt
  • 8. Awareness is knowledge: • That *you* are being targeted as part of a larger campaign to steal something. • Within your specific business risk context. • Which will require you to be able to identify suspicious “things”. • To understand and avoid a negative outcome. • By taking appropriate action. • Or immediate corrective actions, if a thoughtless or incorrect choice is made.
  • 9. Excellent Awareness Poster What’s the problem? How does it affect me? What should I do?
  • 10. Does Awareness “Work”? Common criticisms: • One click, by one user, and you’re compromised, so why bother? • We told them not to do that, and they still did it. • They didn’t remember our advice.
  • 12. Awareness Ideas • Publish informational content in your IT knowledgebase / wiki. • Periodic informational emails. • “Point of failure” education on your internet gateways. • “Coaching” people when they visit sites common to scams. • Internal phishing campaigns. • Scam bounty programs. • Annual, self-paced, awareness training.
  • 13. Measuring Efficacy – A Must The best possible outcome is that *nothing* happens. Measure that. Next best option – reduction in bad things: - Web content filter hits. - Phishing assessments. - Anti-virus hits / infections.
  • 14. But…. Correlation ≠ Causation Be rigorous with your data.
  • 15. Educational Resources: • SANS Securing the human blog / newsletter • US-CERT National Cyber Awareness System • Krebs on Security • Office of the National Counterintelligence Executive • NIST Computer Security Resource Center • Infragard Center for Information Security Awareness • FTC – Onguard Online • StaySafeOnline.org - National Cyber Security Alliance
  • 16. Phishing Resources • Free: SPT • Commercial: ▫ Phish5 ▫ Phishline ▫ Phishme

Hinweis der Redaktion

  1. Good morning, my name is Chris Merkel. I’m the director of information security for Brunswick Corporation. Brunswick is a multi-national recreational goods company, better known by it’s brands in the marine market, including Mercury Marine, Sea Ray, Bayliner, the Fitness industry under the LifeFitness and HammerStregnth brands, as well as our namesake, which is Brunswick bowling and billiards. We’re predominantly a manufacturing company, with operations worldwide, as well as a large retailer, with over 100 Brunswick Zone bowling centers in North America.As the director of security, I’m responsible for a small team that carries out the functions of the information security office, including policy, awareness, secure architecture, secure coding initiatives, security assessments, incident management, as well as forensic support for litigation and investigation processes.During this presentation, I’m going to present my personal views on the topic of security awareness training. I believe that the business of raising awareness, at least with respect to data security, is still in it’s infancy. My views are also not necessarily representative of the organization I work for.In addition, I have received the list of excellent questions that many of you have submitted. I will make an effort to speak to them as I present, but please don’t take that to mean that the topic shouldn’t be discussed further. We come from a diverse set of organizations – retail, manufacturing, critical infrastructure, education and government, and the Q&A time at the end of this session is where I hope the most knowledge transfer occurs. As a norex member, I have found that peer exchange trumps powerpoint, so I’ll do my best to make sure we have plenty of time to discuss how awareness impact you and the specific threats and challenges that your organization faces.
  2. The security industry is awash with jargon and acronyms, sold to us by our vendors in 1U form factors at a “reasonable” price point. Each one of these solutions, we’re told, will eliminate the most terrifying security threats that they rip from the headlines of major media and trade publications.These technologies can and are often very useful for dealing with the operational aspects of security – detecting threats, keeping common malware off computers, for standing up resilient web applications, et cetera. At the end of the day, however, these technologies are device-centric, application-centric, and network centric ways of dealing with the attacks that all of our organizations face.Anyone who has deployed and operated many of these technologies can tell you that they are not, either individually or collectively, a panacea for preventing loss, theft, intrusion or disruption of our systems.This is because there’s another weakness on your network that none of these technologies can mitigate:
  3. One of the largest problems we have to tackle isn’t a technology problem, it’s a people problem. In IT, we’re used to finding solutions to our business problems that can be solved with faster networks, bigger processors, more disk, efficient code and well-tuned IT operational and support processes. If you were a CS or MIS major, you learned a lot about foundational topics like inheritance, Boolean logic and modular system design. What you likely didn’t get were several semesters of behavioral psychology or behavioral economics – these are the domains that we need to better understand if we’re going to be effective in changing the behavior of people on a mass scale, which should be the goal of our security awareness programs.
  4. Making sure we have a good definition for awareness is important. Because many of us on this call have specific regulatory obligations to do “security awareness”, I want to make sure that we raise a distinction between “having a program” and actually driving awareness among people to change behavior.
  5. First, people aren’t going to willingly subject themselves to death by powerpoint. There’s a time and place for good presentations, and it is in person, with a small audience, or possibly on an in-person webinar. In general however, if you expect that you can get people to comprehend the nature of the problem that they face and the solution, all in one presentation, without respect to the target audience, you’re fooling yourself.Many of the other types of training that we provide within an organization are on topics that most people inherently understand. For example, there’s only a small handful of people in your organization that learned that sexual harassment is wrong, that standing on the top of a wobbly ladder is unsafe or that falsifying financial records for personal gain is a crime. The reason many organizations do this training is to remove any shred of doubt that a person found doing any of these things had a reasonable expectation that they would be disciplined or fired. I would argue that computer security is different, because it primarily involves re-training people to have a healthy suspicion of things, to question the identity and motives or others, and do so within a technologically complicated set of tools that we make them use.
  6. If your goal is compliance, doing “security awareness” becomes much, much easier. Find out what your auditors expectations are and devise the most efficient, cost effective and non-intrusive way of accomplishing this. There isn’t anything inherently wrong with “studying for the test” as it were. If your organization has a clear, top-down understanding of their risk, and needing to treat the “human problem” isn’t among them, then it makes sense to do what’s necessary to check the regulatory box and keep the auditors off your back.However, I would suspect that for most of you on this call, you actually want to do things that result in an actual reduction of incidents arising from people failing to make correct decisions about technology and risk. It’s an axoim in security that properly treating the actual risk will almost always also result in less and less severe incidents while doing security only insofar as you need to meet a compliance obligation is only marginally effective.For PCI assessments, how do companies with 10,000+ associates conduct and validate all-company awareness training?Is anyone using any of the interactive software (on premises or on-line) for their security awareness? If so, will they share wins/fails?
  7. We have to compete for people’s attention. There’s nothing wrong with putting up posters per se, but we’re competing for their attention in a crowded space. As technology people, we have near unilateral control over the 19-inch glowing box that nearly all of our people stare into 8 hours per day.So… if we understand that our goal is to make people aware, influence decision making and change outcomes, versus “having a program”, what is the right definition for “security awareness”?
  8. How to monitor the effectiveness of the awareness program?For those with well-established security awareness programs, by which metrics do you measure the success of your program?
  9. Are you doing any activities for Cyber Security Month? If so, do you have any materials you can share?Of those that take a home-grown approach, where do you get your ideas?
  10. For those with well-established security awareness programs, do you use phishing campaigns to test your user's? Did you face any corporate culture challenges with this approach?