SlideShare ist ein Scribd-Unternehmen logo
1 von 11
"Many of the most damaging security penetrations are,
and will continue to be, due to Social Engineering, not
electronic hacking or cracking . . . Social Engineering
is the single greatest security risk in the decade ahead."
91% of data breaches start with a “spear-phishing” email,
research from security software firm Trend Micro shows.
Explosive Malware Growth: Endpoint Security does not catch it all
 Organized, focused and financially motivated hackers
 100,000+ new malware variants released each day
 800 million phishing emails are sent each day with those levels continuing to rise.
 Zero-day exploits and drive-by downloads creating need for regular Internet Security Awareness Training
Percentage Of Malware Not Being Caught
February 2009 saw the introduction of RAP testing to Virus Bulletin's VB100 comparative reviews, measuring
products' reactive and proactive detection abilities against the most recent malware that has emerged
around the world. McAfee and Microsoft highlighted with Blue Stars. Above graph was published early 2013.
And that is just malware that AV companies know about. There is more Stuxnet and Flame-type malware out
there. Source: http://www.virusbtn.com/vb100/rap-index.xml
Why Organizations Need Internet Security Awareness Training
 ‘Defense in Depth’ security.
Organizations defend their
networks on each of these six
levels. End User Internet Security
Awareness Training resides in the
outer layer:
Policies, Procedures, and
Awareness.
 End User Security Awareness is an
important piece of the security
puzzle because many attack types
go after the end user (called social
engineering) to succeed.
 End User Security Awareness can
affect every aspect of an
organization’s security profile, as it
is where security starts! That is why
it is so important that organizations
give their end-users Internet
Security Awareness Training.
Policies, Procedures & Awareness
Perimeter
Internal Network
Host
Application
Data
KnowBe4 Internet Security Awareness Program
1. Establish initial Phish-prone percentage
2. Train (On-demand Security Awareness Training)
3. Test (Continued Phishing Security Tests)
4. Educate (Ongoing Security Hints and Tips Emails)
5. Reporting and Tracking Results (Your Management
Console)
7 Reasons Companies are Outsourcing Online Training
1. Reduce Costs - How you manage training is always about how
you manage costs.
2. Access to Talent - Especially hard when it gets to Security
Awareness Training which is highly specialized.
3. Geographic Reach & Scalability – Being able to train all
employees worldwide via distance learning on the same security
processes and procedures, and flex resources.
4. Compliance - Many organizations these days are required to
comply with a multitude of regulations, just take the PCI
(Payment Card Industry) Security Program for example.
5. Mitigate Risks – Training helps to prevent failures and from the
liabilities of being sued for insufficient training, a clear and
present danger in the case of cyber heists.
6. Training is not Core to the Business - For many organizations,
training is a necessity, but the development, management and
delivery of training is a distraction.
7. Leverage the Cost of Technology – One of the first major
investments is a Learning Management System. Why incur these
costs when the outsourcing company has already paid for it?
KnowBe4 has a unique
competitive advantage
provided by its automated
Phishing Security Tests
Value Proposition: Risk and Opex
• Reduced malware infections
• Reduced data loss
• Reduced potential cyber-theft
• Users have security top of mind
• Reduced help desk calls
• Reduced cleaning and re-imaging
of machines
• Reduced down time, increased
user productivity
• Real ROI
RISK
OPEX
Web Demo on Request:
carolm@knowbe4.com
Questions and Answers

Weitere ähnliche Inhalte

Was ist angesagt?

Cybersecurity Awareness Training Presentation v1.2
Cybersecurity Awareness Training Presentation v1.2Cybersecurity Awareness Training Presentation v1.2
Cybersecurity Awareness Training Presentation v1.2
DallasHaselhorst
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023
PECB
 
SIEM presentation final
SIEM presentation finalSIEM presentation final
SIEM presentation final
Rizwan S
 

Was ist angesagt? (20)

Cyber Security Incident Response
Cyber Security Incident ResponseCyber Security Incident Response
Cyber Security Incident Response
 
End User Security Awareness Presentation
End User Security Awareness PresentationEnd User Security Awareness Presentation
End User Security Awareness Presentation
 
Swift-cyber-attacks.pptx
Swift-cyber-attacks.pptxSwift-cyber-attacks.pptx
Swift-cyber-attacks.pptx
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Information Security Awareness for everyone
Information Security Awareness for everyoneInformation Security Awareness for everyone
Information Security Awareness for everyone
 
A to Z of Information Security Management
A to Z of Information Security ManagementA to Z of Information Security Management
A to Z of Information Security Management
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101
 
NIST presentation on RMF 2.0 / SP 800-37 rev. 2
NIST presentation on RMF 2.0 / SP 800-37 rev. 2NIST presentation on RMF 2.0 / SP 800-37 rev. 2
NIST presentation on RMF 2.0 / SP 800-37 rev. 2
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
 
Information security
Information securityInformation security
Information security
 
Concienciacion en ciberseguridad y buenas prácticas
Concienciacion en ciberseguridad y buenas prácticas Concienciacion en ciberseguridad y buenas prácticas
Concienciacion en ciberseguridad y buenas prácticas
 
Cybersecurity Awareness Training Presentation v1.2
Cybersecurity Awareness Training Presentation v1.2Cybersecurity Awareness Training Presentation v1.2
Cybersecurity Awareness Training Presentation v1.2
 
Cyber security landscape
Cyber security landscapeCyber security landscape
Cyber security landscape
 
Employee Awareness in Cyber Security - Kloudlearn
Employee Awareness in Cyber Security - KloudlearnEmployee Awareness in Cyber Security - Kloudlearn
Employee Awareness in Cyber Security - Kloudlearn
 
Information Security Risk Management
Information Security Risk ManagementInformation Security Risk Management
Information Security Risk Management
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023
 
SIEM presentation final
SIEM presentation finalSIEM presentation final
SIEM presentation final
 

Ähnlich wie Security Awareness Training from KnowBe4

Why network based security
Why network based securityWhy network based security
Why network based security
Alan Rudd
 
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
Sarah Jarvis
 
8Network Security April 2020FEATUREAre your IT staf.docx
8Network Security  April 2020FEATUREAre your IT staf.docx8Network Security  April 2020FEATUREAre your IT staf.docx
8Network Security April 2020FEATUREAre your IT staf.docx
meghanivkwserie
 
8Network Security April 2020FEATUREAre your IT staf.docx
8Network Security  April 2020FEATUREAre your IT staf.docx8Network Security  April 2020FEATUREAre your IT staf.docx
8Network Security April 2020FEATUREAre your IT staf.docx
priestmanmable
 
InformationSecurity_11141
InformationSecurity_11141InformationSecurity_11141
InformationSecurity_11141
sraina2
 

Ähnlich wie Security Awareness Training from KnowBe4 (20)

Module 2 - Cybersecurity On the Defense.pdf
Module 2 - Cybersecurity On the Defense.pdfModule 2 - Cybersecurity On the Defense.pdf
Module 2 - Cybersecurity On the Defense.pdf
 
Segurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago CavannaSegurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago Cavanna
 
How to assess your Cybersecurity Vulnerability_.pdf
How to assess your Cybersecurity Vulnerability_.pdfHow to assess your Cybersecurity Vulnerability_.pdf
How to assess your Cybersecurity Vulnerability_.pdf
 
How to assess your Cybersecurity Vulnerability_.pptx
How to assess your Cybersecurity Vulnerability_.pptxHow to assess your Cybersecurity Vulnerability_.pptx
How to assess your Cybersecurity Vulnerability_.pptx
 
Why network based security
Why network based securityWhy network based security
Why network based security
 
Cyber Security Trends - Where the Industry Is Heading in an Uncertainty
Cyber Security Trends - Where the Industry Is Heading in an UncertaintyCyber Security Trends - Where the Industry Is Heading in an Uncertainty
Cyber Security Trends - Where the Industry Is Heading in an Uncertainty
 
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
 
8Network Security April 2020FEATUREAre your IT staf.docx
8Network Security  April 2020FEATUREAre your IT staf.docx8Network Security  April 2020FEATUREAre your IT staf.docx
8Network Security April 2020FEATUREAre your IT staf.docx
 
8Network Security April 2020FEATUREAre your IT staf.docx
8Network Security  April 2020FEATUREAre your IT staf.docx8Network Security  April 2020FEATUREAre your IT staf.docx
8Network Security April 2020FEATUREAre your IT staf.docx
 
What you need to know about cyber security
What you need to know about cyber securityWhat you need to know about cyber security
What you need to know about cyber security
 
Bitdefender - Solution Paper - Active Threat Control
Bitdefender - Solution Paper - Active Threat ControlBitdefender - Solution Paper - Active Threat Control
Bitdefender - Solution Paper - Active Threat Control
 
Defensive Cybersecurity: A Modern Approach to Safeguarding Digital Assets
Defensive Cybersecurity: A Modern Approach to Safeguarding Digital AssetsDefensive Cybersecurity: A Modern Approach to Safeguarding Digital Assets
Defensive Cybersecurity: A Modern Approach to Safeguarding Digital Assets
 
Measures to Avoid Cyber-attacks
Measures to Avoid Cyber-attacksMeasures to Avoid Cyber-attacks
Measures to Avoid Cyber-attacks
 
Measure To Avoid Cyber Attacks
Measure To Avoid Cyber AttacksMeasure To Avoid Cyber Attacks
Measure To Avoid Cyber Attacks
 
Key Cybersecurity Risks and Mitigation Strategies in 2023 | The Enterprise World
Key Cybersecurity Risks and Mitigation Strategies in 2023 | The Enterprise WorldKey Cybersecurity Risks and Mitigation Strategies in 2023 | The Enterprise World
Key Cybersecurity Risks and Mitigation Strategies in 2023 | The Enterprise World
 
InformationSecurity_11141
InformationSecurity_11141InformationSecurity_11141
InformationSecurity_11141
 
03_Emmanuel Ndiaye_Degroof Petercam.pptx
03_Emmanuel Ndiaye_Degroof Petercam.pptx03_Emmanuel Ndiaye_Degroof Petercam.pptx
03_Emmanuel Ndiaye_Degroof Petercam.pptx
 
Netwealth educational webinar: Peace of mind in a digital world
Netwealth educational webinar: Peace of mind in a digital worldNetwealth educational webinar: Peace of mind in a digital world
Netwealth educational webinar: Peace of mind in a digital world
 
University-of-Miami_MEDINA
University-of-Miami_MEDINAUniversity-of-Miami_MEDINA
University-of-Miami_MEDINA
 
16231
1623116231
16231
 

Kürzlich hochgeladen

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Kürzlich hochgeladen (20)

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 

Security Awareness Training from KnowBe4

  • 1.
  • 2. "Many of the most damaging security penetrations are, and will continue to be, due to Social Engineering, not electronic hacking or cracking . . . Social Engineering is the single greatest security risk in the decade ahead." 91% of data breaches start with a “spear-phishing” email, research from security software firm Trend Micro shows.
  • 3. Explosive Malware Growth: Endpoint Security does not catch it all  Organized, focused and financially motivated hackers  100,000+ new malware variants released each day  800 million phishing emails are sent each day with those levels continuing to rise.  Zero-day exploits and drive-by downloads creating need for regular Internet Security Awareness Training
  • 4. Percentage Of Malware Not Being Caught February 2009 saw the introduction of RAP testing to Virus Bulletin's VB100 comparative reviews, measuring products' reactive and proactive detection abilities against the most recent malware that has emerged around the world. McAfee and Microsoft highlighted with Blue Stars. Above graph was published early 2013. And that is just malware that AV companies know about. There is more Stuxnet and Flame-type malware out there. Source: http://www.virusbtn.com/vb100/rap-index.xml
  • 5. Why Organizations Need Internet Security Awareness Training  ‘Defense in Depth’ security. Organizations defend their networks on each of these six levels. End User Internet Security Awareness Training resides in the outer layer: Policies, Procedures, and Awareness.  End User Security Awareness is an important piece of the security puzzle because many attack types go after the end user (called social engineering) to succeed.  End User Security Awareness can affect every aspect of an organization’s security profile, as it is where security starts! That is why it is so important that organizations give their end-users Internet Security Awareness Training. Policies, Procedures & Awareness Perimeter Internal Network Host Application Data
  • 6. KnowBe4 Internet Security Awareness Program 1. Establish initial Phish-prone percentage 2. Train (On-demand Security Awareness Training) 3. Test (Continued Phishing Security Tests) 4. Educate (Ongoing Security Hints and Tips Emails) 5. Reporting and Tracking Results (Your Management Console)
  • 7. 7 Reasons Companies are Outsourcing Online Training 1. Reduce Costs - How you manage training is always about how you manage costs. 2. Access to Talent - Especially hard when it gets to Security Awareness Training which is highly specialized. 3. Geographic Reach & Scalability – Being able to train all employees worldwide via distance learning on the same security processes and procedures, and flex resources. 4. Compliance - Many organizations these days are required to comply with a multitude of regulations, just take the PCI (Payment Card Industry) Security Program for example. 5. Mitigate Risks – Training helps to prevent failures and from the liabilities of being sued for insufficient training, a clear and present danger in the case of cyber heists. 6. Training is not Core to the Business - For many organizations, training is a necessity, but the development, management and delivery of training is a distraction. 7. Leverage the Cost of Technology – One of the first major investments is a Learning Management System. Why incur these costs when the outsourcing company has already paid for it? KnowBe4 has a unique competitive advantage provided by its automated Phishing Security Tests
  • 8. Value Proposition: Risk and Opex • Reduced malware infections • Reduced data loss • Reduced potential cyber-theft • Users have security top of mind • Reduced help desk calls • Reduced cleaning and re-imaging of machines • Reduced down time, increased user productivity • Real ROI RISK OPEX
  • 9.
  • 10. Web Demo on Request: carolm@knowbe4.com

Hinweis der Redaktion

  1. KnowBe4's management team has more than 30 years of expertise in selling to SMEs, with deep roots in IT Security.      We know how to sell to this market.   Our secret sauce is our new cloud-based DCU - Dynamic Content Updates - model. Employees get trained on -today's- threats, not a canned security training that was created a year ago!   We provide continuous testing after the training, and we have the free ThreatApp with daily smartphone updates with relevant threat intelligence.    KnowB4 focuses on the well over 8 million small and midsize organizations (in the green box).            
  2. There are seven good reasons why organizations are outsourcing online training:  1. Reduce Costs 2. Access to Talent 3. Geographic Reach& Scalability 4. Compliance  5. Mitigate Risks 6. Training is not Core to the Business 7. Leverage the Cost of Technology