SlideShare ist ein Scribd-Unternehmen logo
1 von 42
Copyright © Wombat Security Technologies, Inc. 2008-2011
Jason Hong, PhD
Assoc. Prof, Carnegie Mellon University
CTO, Wombat Security Technologies
Knowledgeable Users are the
Best Cyber Security Defense
Copyright © Wombat Security Technologies, Inc. 2008-2011
About Wombat Security
 Founded in 2008 based on research on human
element of computer security at Carnegie Mellon
 Passwords, access control, privacy policies, etc
 Initial products on anti-phishing
 Article in Scientific American on protecting
people from phishing scams
 Have given multiple talks at RSA, ISSA
about human element of security
Copyright © Wombat Security Technologies, Inc. 2008-2011
Human Element of Security
 People are an important part of computer
security for every organization
 Keeping passwords strong and secure
 Avoiding social engineering
 Avoiding malware
 Appropriate use of social networking tools
 Keeping mobile devices secure
 Overlooking human element is the most
common mistake in computer security
Copyright © Wombat Security Technologies, Inc. 2008-2011
Technology Alone Won’t Work
 Tempting to just buy some software or
hardware that promises to solve these problems
 However, attackers are very resourceful,
constantly looking to circumvent your defenses
 Also, technology alone can’t motivate people in
your organization
 Examples
 Recent breaches at RSA, Epsilon, Canadian and
Australian government due to phishing emails
 Malware infections because of social networking
Copyright © Wombat Security Technologies, Inc. 2008-2011
Can We Educate End-Users?
 Users are not motivated to learn about security
 Security is a secondary task
 Difficult to teach people to make right decisions
without increasing false positives
“User education is a complete waste of time. It is
about as much use as nailing jelly to a wall….
They are not interested…they just want to do
their job.”
Martin Overton, IBM security specialist
http://news.cnet.com/21007350_361252132.html
Copyright © Wombat Security Technologies, Inc. 2008-2011
Yes, End-Users Are Trainable
 Our research demonstrates that users can learn
techniques to protect themselves… if you can get
them to pay attention to training
 Problem is that today’s training often boring,
time consuming, and ineffective
 All day lecture, but no chance to practice skills
 Or passively watching videos
 Or posters and mugs and calendars
 Raise awareness, but little on what to actually do
Copyright © Wombat Security Technologies, Inc. 2008-2011
How Do We Get People Trained?
 Create “teachable moments”: PhishGuru
 Make training engaging: Anti-Phishing Phil
 Use learning science principles throughout
PhishGuru Anti-Phishing Phil
Copyright © Wombat Security Technologies, Inc. 2008-2011
How Do We Get People Trained?
 Create “teachable moments”: PhishGuru
 Make training engaging: Anti-Phishing Phil
 Use learning science principles throughout
PhishGuru Anti-Phishing Phil
Copyright © Wombat Security Technologies, Inc. 2008-2011
PhishGuru Embedded Training
 Send emails that look like a phishing attack
 If recipient falls for it, show intervention that
teaches what cues to look for in succinct and
engaging format
 Useful for people who don’t know that they don’t know
 Multiple user studies have demonstrated
that PhishGuru is effective
 Delivering training via direct email
not effective
Copyright © Wombat Security Technologies, Inc. 2008-2011
Subject: Revision to Your Amazon.com Information
Copyright © Wombat Security Technologies, Inc. 2008-2011
Subject: Revision to Your Amazon.com Information
Please login and enter your information
Copyright © Wombat Security Technologies, Inc. 2008-2011
Copyright © Wombat Security Technologies, Inc. 2008-2011
Evaluation of PhishGuru
 Is embedded training effective?
 We’ve conducted 4 peer-reviewed studies
showing embedded training works well
 Studies showed significant decrease in falling
for phish and ability to retain what they learned
P. Kumaraguru, Y. Rhee, A. Acquisti, L. Cranor, J. Hong, and E. Nunge.
Protecting People from Phishing: The Design and Evaluation of an
Embedded Training Email System. CHI 2007.
P. Kumaraguru, J. Cranshaw, A. Acquisti, L. Cranor, J. Hong, M.A. Blair,
and T. Pham. School of Phish: A Real-Word Evaluation of Anti-
Phishing Training. SOUPS 2009.
Copyright © Wombat Security Technologies, Inc. 2008-2011
Case Study #1: PhishGuru
 Canadian healthcare organization
 Three-month embedded training campaign
 190 employees
 Security assessment and effective training in context
Copyright © Wombat Security Technologies, Inc. 2008-2011
Simulated Phishing Email
Copyright © Wombat Security Technologies, Inc. 2008-2011
Case Study
Copyright © Wombat Security Technologies, Inc. 2008-2011
Measurable Reduction in Falling for Phish
Viewed
Email
Only %
Viewed
Email and
Clicked
Link % Employees
Campaign 1 20 10.53% 35 18.42% 190
Campaign 2 37 19.47% 23 12.11% 190
Campaign 3 7 3.70% 10 5.29% 189
Copyright © Wombat Security Technologies, Inc. 2008-2011
0 10 20 30 40
Campaign3
Campaign2
Campaign1
ViewedEmail and Clicked
Link
ViewedEmail Only
Copyright © Wombat Security Technologies, Inc. 2008-2011
Case Study #2: PhishGuru
 Tested with over 500 people in one month period
 1 simulated phish at beginning of month,
testing done at end of month
 About 50% reduction in falling for phish
 68 out of 85 surveyed said they recommend continuing
doing this sort of training in the future
 “I really liked the idea of sending *organization+ fake
phishing emails and then saying to them, essentially,
HEY! You could've just gotten scammed! You should
be more careful – here's how...”
Copyright © Wombat Security Technologies, Inc. 2008-2011
How Do We Get People Trained?
 Create “teachable moments”: PhishGuru
 Make training engaging: Anti-Phishing Phil
 Use learning science principles throughout
PhishGuru Anti-Phishing Phil
Copyright © Wombat Security Technologies, Inc. 2008-2011
Micro-Games for Cyber Security
 Training doesn’t have to be boring
 Training doesn’t have to take long either
 Micro game format, play for short time
 Two-thirds of Americans played
a video game in past six months
 Not just young people
 Average game player 35 years old
 25% of people over 50 play games
 Not just males
 40% of casual gamers are women
Copyright © Wombat Security Technologies, Inc. 2008-2011
Case Study 3: Anti-Phishing Phil
 Tested Anti-Phishing Phil with ~4500 people
 Huge improvement by novices in identifying
phishing URLs
 Also dramatically lowered false positives
Copyright © Wombat Security Technologies, Inc. 2008-2011
Copyright © Wombat Security Technologies, Inc. 2008-2011
Copyright © Wombat Security Technologies, Inc. 2008-2011
Copyright © Wombat Security Technologies, Inc. 2008-2011
Copyright © Wombat Security Technologies, Inc. 2008-2011
Copyright © Wombat Security Technologies, Inc. 2008-2011
Copyright © Wombat Security Technologies, Inc. 2008-2011
False negatives for users who played Anti-Phishing Phil (“game condition”). False negatives are
situations where people incorrectly label a phishing site as legitimate. Novices saw the greatest
reduction in false negatives, and retained what they had learned.
Copyright © Wombat Security Technologies, Inc. 2008-2011
False positives for users who played the Anti-Phishing Phil game. False positives are situations
where people incorrectly label a legitimate site as phishing. Again, novices saw the greatest
improvement in reducing false positives, and retained what they had learned.
Copyright © Wombat Security Technologies, Inc. 2008-2011
How Do We Get People Trained?
 Create “teachable moments”: PhishGuru
 Make training engaging: Anti-Phishing Phil
 Use learning science principles throughout
PhishGuru Anti-Phishing Phil
Copyright © Wombat Security Technologies, Inc. 2008-2011
Learning Science
Area of research examining learning,
retention, and transfer of skills
Example principles
 Learning by doing
 Immediate feedback
 Conceptual-procedural
 Reflection
Copyright © Wombat Security Technologies, Inc. 2008-2011
Organizational Perspective
Challenges:
 People are stretched for time
 Large number of computer security topics
Effective training:
 Needs to respect people’s time (short, engaging)
 Be effective
 Up-to-date coverage of security topics
 Measurable – who is vulnerable, where
Copyright © Wombat Security Technologies, Inc. 2008-2011
Copyright © Wombat Security Technologies, Inc. 2008-2011
Example Topic: Email Security
Copyright © Wombat Security Technologies, Inc. 2008-2011
Example Topic: Passwords
Copyright © Wombat Security Technologies, Inc. 2008-2011
Other Training: Social Networks
Copyright © Wombat Security Technologies, Inc. 2008-2011
Measurable
Copyright © Wombat Security Technologies, Inc. 2008-2011
Measurable
Copyright © Wombat Security Technologies, Inc. 2008-2011
Summary
 Human element is critical but most often
overlooked aspect of computer security
 Ex. phishing scams, passwords, mobile devices
 Security training can work, but only if done right!
 Training needs to respect time, engaging
 Broad coverage of topics, measurable
 Wombat’s interactive cybersecurity training
available for use
Copyright © Wombat Security Technologies, Inc. 2008-2011
Cyber Security Awareness Month
 Wombat is offering a FREE Cyber Security
Vulnerability Assessment
 Limited time offer for your first campaign FREE*
 October 2011
Contact Ralph Massaro at 412-621-1484 x 114 or
r.massaro@wombatsecurity.com
*Up to 100 people
Copyright © Wombat Security Technologies, Inc. 2008-2011
Thank you!
Thanks, where can
I learn more?
Find more at
wombatsecurity.com
Anti-Phishing Phil white paper:
Cyber Security Training Game
Teaches People to Avoid Phishing
Attacks
PhishGuru white paper:
An Empirical Evaluation of
PhishGuru Training

Weitere ähnliche Inhalte

Was ist angesagt?

AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVESAN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVESijcsit
 
IT Consumerization – iPad’ing the Enterprise or BYO Malware?
IT Consumerization – iPad’ing the Enterprise or BYO Malware?IT Consumerization – iPad’ing the Enterprise or BYO Malware?
IT Consumerization – iPad’ing the Enterprise or BYO Malware?Barry Caplin
 
Securing Systems of Engagement
Securing Systems of EngagementSecuring Systems of Engagement
Securing Systems of EngagementJohn Palfreyman
 
Information Security Awareness for everyone
Information Security Awareness for everyoneInformation Security Awareness for everyone
Information Security Awareness for everyoneYasir Nafees
 
GRRCON 2013: Imparting security awareness to all levels of users
GRRCON 2013: Imparting security awareness to all levels of usersGRRCON 2013: Imparting security awareness to all levels of users
GRRCON 2013: Imparting security awareness to all levels of usersJoel Cardella
 
Bright talk intrusion prevention are we joking - henshaw july 2010 a
Bright talk   intrusion prevention are we joking - henshaw july 2010 aBright talk   intrusion prevention are we joking - henshaw july 2010 a
Bright talk intrusion prevention are we joking - henshaw july 2010 aMark Henshaw
 
The challenge of security awareness
The challenge of security awarenessThe challenge of security awareness
The challenge of security awarenessJisc
 
Sec and ethics presentation
Sec and ethics presentationSec and ethics presentation
Sec and ethics presentationDarren McManus
 
Cybrary's navigating a security wasteland
Cybrary's navigating a security wasteland Cybrary's navigating a security wasteland
Cybrary's navigating a security wasteland Devendra kashyap
 
Biggest info security mistakes security innovation inc.
Biggest info security mistakes security innovation inc.Biggest info security mistakes security innovation inc.
Biggest info security mistakes security innovation inc.uNIX Jim
 
The importance of authenticity in cyber security training and education
The importance of authenticity in cyber security training and educationThe importance of authenticity in cyber security training and education
The importance of authenticity in cyber security training and educationJisc
 
Module0&1 intro-foundations-b
Module0&1 intro-foundations-bModule0&1 intro-foundations-b
Module0&1 intro-foundations-bBbAOC
 
Telefónica security io_t_final
Telefónica security io_t_finalTelefónica security io_t_final
Telefónica security io_t_finalChristopher Wang
 
Social Engineering - Strategy, Tactics, & Case Studies
Social Engineering - Strategy, Tactics, & Case StudiesSocial Engineering - Strategy, Tactics, & Case Studies
Social Engineering - Strategy, Tactics, & Case StudiesPraetorian
 
Embry-Riddle Aeronautical University
Embry-Riddle Aeronautical UniversityEmbry-Riddle Aeronautical University
Embry-Riddle Aeronautical UniversityGradytl
 
20101012 isa larry_clinton
20101012 isa larry_clinton20101012 isa larry_clinton
20101012 isa larry_clintonCIONET
 
20101012 CIOnet Cyber Security Final Results
20101012 CIOnet Cyber Security Final Results20101012 CIOnet Cyber Security Final Results
20101012 CIOnet Cyber Security Final ResultsCIONET
 

Was ist angesagt? (20)

AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVESAN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
 
IT Consumerization – iPad’ing the Enterprise or BYO Malware?
IT Consumerization – iPad’ing the Enterprise or BYO Malware?IT Consumerization – iPad’ing the Enterprise or BYO Malware?
IT Consumerization – iPad’ing the Enterprise or BYO Malware?
 
Rogers eBook Security
Rogers eBook SecurityRogers eBook Security
Rogers eBook Security
 
Securing Systems of Engagement
Securing Systems of EngagementSecuring Systems of Engagement
Securing Systems of Engagement
 
Information Security Awareness for everyone
Information Security Awareness for everyoneInformation Security Awareness for everyone
Information Security Awareness for everyone
 
GRRCON 2013: Imparting security awareness to all levels of users
GRRCON 2013: Imparting security awareness to all levels of usersGRRCON 2013: Imparting security awareness to all levels of users
GRRCON 2013: Imparting security awareness to all levels of users
 
Bright talk intrusion prevention are we joking - henshaw july 2010 a
Bright talk   intrusion prevention are we joking - henshaw july 2010 aBright talk   intrusion prevention are we joking - henshaw july 2010 a
Bright talk intrusion prevention are we joking - henshaw july 2010 a
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Program
 
The challenge of security awareness
The challenge of security awarenessThe challenge of security awareness
The challenge of security awareness
 
Sec and ethics presentation
Sec and ethics presentationSec and ethics presentation
Sec and ethics presentation
 
Cybrary's navigating a security wasteland
Cybrary's navigating a security wasteland Cybrary's navigating a security wasteland
Cybrary's navigating a security wasteland
 
Biggest info security mistakes security innovation inc.
Biggest info security mistakes security innovation inc.Biggest info security mistakes security innovation inc.
Biggest info security mistakes security innovation inc.
 
The importance of authenticity in cyber security training and education
The importance of authenticity in cyber security training and educationThe importance of authenticity in cyber security training and education
The importance of authenticity in cyber security training and education
 
Module0&1 intro-foundations-b
Module0&1 intro-foundations-bModule0&1 intro-foundations-b
Module0&1 intro-foundations-b
 
Telefónica security io_t_final
Telefónica security io_t_finalTelefónica security io_t_final
Telefónica security io_t_final
 
Social Engineering - Strategy, Tactics, & Case Studies
Social Engineering - Strategy, Tactics, & Case StudiesSocial Engineering - Strategy, Tactics, & Case Studies
Social Engineering - Strategy, Tactics, & Case Studies
 
Embry-Riddle Aeronautical University
Embry-Riddle Aeronautical UniversityEmbry-Riddle Aeronautical University
Embry-Riddle Aeronautical University
 
information security awareness course
information security awareness courseinformation security awareness course
information security awareness course
 
20101012 isa larry_clinton
20101012 isa larry_clinton20101012 isa larry_clinton
20101012 isa larry_clinton
 
20101012 CIOnet Cyber Security Final Results
20101012 CIOnet Cyber Security Final Results20101012 CIOnet Cyber Security Final Results
20101012 CIOnet Cyber Security Final Results
 

Andere mochten auch

La métrica y la estructura de un romance
La métrica y la estructura de un romanceLa métrica y la estructura de un romance
La métrica y la estructura de un romanceadrianacanessa00
 
5 Steps To A Smart Compensation Plan
5 Steps To A Smart Compensation Plan5 Steps To A Smart Compensation Plan
5 Steps To A Smart Compensation PlanBambooHR
 
10 Tips for WeChat
10 Tips for WeChat10 Tips for WeChat
10 Tips for WeChatChris Baker
 
Prototyping is an attitude
Prototyping is an attitudePrototyping is an attitude
Prototyping is an attitudeWith Company
 
Benefits of drinking water
Benefits of drinking waterBenefits of drinking water
Benefits of drinking waterEason Chan
 

Andere mochten auch (6)

La métrica y la estructura de un romance
La métrica y la estructura de un romanceLa métrica y la estructura de un romance
La métrica y la estructura de un romance
 
5 Steps To A Smart Compensation Plan
5 Steps To A Smart Compensation Plan5 Steps To A Smart Compensation Plan
5 Steps To A Smart Compensation Plan
 
Stay Up To Date on the Latest Happenings in the Boardroom: Recommended Summer...
Stay Up To Date on the Latest Happenings in the Boardroom: Recommended Summer...Stay Up To Date on the Latest Happenings in the Boardroom: Recommended Summer...
Stay Up To Date on the Latest Happenings in the Boardroom: Recommended Summer...
 
10 Tips for WeChat
10 Tips for WeChat10 Tips for WeChat
10 Tips for WeChat
 
Prototyping is an attitude
Prototyping is an attitudePrototyping is an attitude
Prototyping is an attitude
 
Benefits of drinking water
Benefits of drinking waterBenefits of drinking water
Benefits of drinking water
 

Ähnlich wie Knowledgeable Users are the Best Cyber Security Defense, for ISSA webinar Sept2011

Protecting Organizations from Phishing Scams, RSA Webinar on Sep 2010
Protecting Organizations from Phishing Scams, RSA Webinar on Sep 2010Protecting Organizations from Phishing Scams, RSA Webinar on Sep 2010
Protecting Organizations from Phishing Scams, RSA Webinar on Sep 2010Jason Hong
 
Protecting Organizations from Phishing Scams, for RSA Webinar in Sep2010
Protecting Organizations from Phishing Scams, for RSA Webinar in Sep2010Protecting Organizations from Phishing Scams, for RSA Webinar in Sep2010
Protecting Organizations from Phishing Scams, for RSA Webinar in Sep2010Jason Hong
 
Achieving Behavioral Change, for ISSA 2011 in San Francisco Feb 2011
Achieving Behavioral Change, for ISSA 2011 in San Francisco Feb 2011Achieving Behavioral Change, for ISSA 2011 in San Francisco Feb 2011
Achieving Behavioral Change, for ISSA 2011 in San Francisco Feb 2011Jason Hong
 
Best practices for_implementing_security_awareness_training
Best practices for_implementing_security_awareness_trainingBest practices for_implementing_security_awareness_training
Best practices for_implementing_security_awareness_trainingwardell henley
 
Issa Vancouver 6 09 Pareto's Revenge
Issa Vancouver 6 09  Pareto's RevengeIssa Vancouver 6 09  Pareto's Revenge
Issa Vancouver 6 09 Pareto's RevengeMike Murray
 
Cybersecurity education catalog sae september 2021
Cybersecurity education catalog sae september 2021Cybersecurity education catalog sae september 2021
Cybersecurity education catalog sae september 2021TrustwaveHoldings
 
1.Security Overview And Patching
1.Security Overview And Patching1.Security Overview And Patching
1.Security Overview And Patchingphanleson
 
How Cyber Security Courses Opens Up Amazing Career Opportunities?
How Cyber Security Courses Opens Up Amazing Career Opportunities?How Cyber Security Courses Opens Up Amazing Career Opportunities?
How Cyber Security Courses Opens Up Amazing Career Opportunities?Robert Smith
 
State of Cyber: Views from an Industry Insider
State of Cyber: Views from an Industry InsiderState of Cyber: Views from an Industry Insider
State of Cyber: Views from an Industry InsiderBen Johnson
 
Building Human Intelligence – Pun Intended
Building Human Intelligence – Pun IntendedBuilding Human Intelligence – Pun Intended
Building Human Intelligence – Pun IntendedEnergySec
 
Fissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-trainingFissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-trainingSwati Gupta
 
Cybersecurity Training For Humans!
Cybersecurity Training For Humans!Cybersecurity Training For Humans!
Cybersecurity Training For Humans!InnesGerrard
 
Five things I learned about information security
Five things I learned about information securityFive things I learned about information security
Five things I learned about information securityMajor Hayden
 
Paul Henry’s 2011 Malware Trends
Paul Henry’s 2011 Malware TrendsPaul Henry’s 2011 Malware Trends
Paul Henry’s 2011 Malware TrendsLumension
 
Artificial intelligence in fintech
Artificial intelligence in fintechArtificial intelligence in fintech
Artificial intelligence in fintechSpotle.ai
 
Grading Guide Lifespan Development and Personality PaperPSY1.docx
Grading Guide Lifespan Development and Personality PaperPSY1.docxGrading Guide Lifespan Development and Personality PaperPSY1.docx
Grading Guide Lifespan Development and Personality PaperPSY1.docxwhittemorelucilla
 
Beyond the Phish with GTRI and Wombat Security Technologies
Beyond the Phish with GTRI and Wombat Security TechnologiesBeyond the Phish with GTRI and Wombat Security Technologies
Beyond the Phish with GTRI and Wombat Security TechnologiesZivaro Inc
 
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptxTop_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptxinfosec train
 

Ähnlich wie Knowledgeable Users are the Best Cyber Security Defense, for ISSA webinar Sept2011 (20)

Protecting Organizations from Phishing Scams, RSA Webinar on Sep 2010
Protecting Organizations from Phishing Scams, RSA Webinar on Sep 2010Protecting Organizations from Phishing Scams, RSA Webinar on Sep 2010
Protecting Organizations from Phishing Scams, RSA Webinar on Sep 2010
 
Protecting Organizations from Phishing Scams, for RSA Webinar in Sep2010
Protecting Organizations from Phishing Scams, for RSA Webinar in Sep2010Protecting Organizations from Phishing Scams, for RSA Webinar in Sep2010
Protecting Organizations from Phishing Scams, for RSA Webinar in Sep2010
 
Achieving Behavioral Change, for ISSA 2011 in San Francisco Feb 2011
Achieving Behavioral Change, for ISSA 2011 in San Francisco Feb 2011Achieving Behavioral Change, for ISSA 2011 in San Francisco Feb 2011
Achieving Behavioral Change, for ISSA 2011 in San Francisco Feb 2011
 
Best practices for_implementing_security_awareness_training
Best practices for_implementing_security_awareness_trainingBest practices for_implementing_security_awareness_training
Best practices for_implementing_security_awareness_training
 
Issa Vancouver 6 09 Pareto's Revenge
Issa Vancouver 6 09  Pareto's RevengeIssa Vancouver 6 09  Pareto's Revenge
Issa Vancouver 6 09 Pareto's Revenge
 
Cybersecurity education catalog sae september 2021
Cybersecurity education catalog sae september 2021Cybersecurity education catalog sae september 2021
Cybersecurity education catalog sae september 2021
 
Information Security Awareness Session -2020
Information Security Awareness Session -2020Information Security Awareness Session -2020
Information Security Awareness Session -2020
 
1.Security Overview And Patching
1.Security Overview And Patching1.Security Overview And Patching
1.Security Overview And Patching
 
How Cyber Security Courses Opens Up Amazing Career Opportunities?
How Cyber Security Courses Opens Up Amazing Career Opportunities?How Cyber Security Courses Opens Up Amazing Career Opportunities?
How Cyber Security Courses Opens Up Amazing Career Opportunities?
 
State of Cyber: Views from an Industry Insider
State of Cyber: Views from an Industry InsiderState of Cyber: Views from an Industry Insider
State of Cyber: Views from an Industry Insider
 
Building Human Intelligence – Pun Intended
Building Human Intelligence – Pun IntendedBuilding Human Intelligence – Pun Intended
Building Human Intelligence – Pun Intended
 
Fissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-trainingFissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-training
 
Cybersecurity Training For Humans!
Cybersecurity Training For Humans!Cybersecurity Training For Humans!
Cybersecurity Training For Humans!
 
Five things I learned about information security
Five things I learned about information securityFive things I learned about information security
Five things I learned about information security
 
Need for Data Protection Training - How E-learning Can Help?
Need for Data Protection Training - How E-learning Can Help?Need for Data Protection Training - How E-learning Can Help?
Need for Data Protection Training - How E-learning Can Help?
 
Paul Henry’s 2011 Malware Trends
Paul Henry’s 2011 Malware TrendsPaul Henry’s 2011 Malware Trends
Paul Henry’s 2011 Malware Trends
 
Artificial intelligence in fintech
Artificial intelligence in fintechArtificial intelligence in fintech
Artificial intelligence in fintech
 
Grading Guide Lifespan Development and Personality PaperPSY1.docx
Grading Guide Lifespan Development and Personality PaperPSY1.docxGrading Guide Lifespan Development and Personality PaperPSY1.docx
Grading Guide Lifespan Development and Personality PaperPSY1.docx
 
Beyond the Phish with GTRI and Wombat Security Technologies
Beyond the Phish with GTRI and Wombat Security TechnologiesBeyond the Phish with GTRI and Wombat Security Technologies
Beyond the Phish with GTRI and Wombat Security Technologies
 
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptxTop_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
 

Kürzlich hochgeladen

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 

Kürzlich hochgeladen (20)

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 

Knowledgeable Users are the Best Cyber Security Defense, for ISSA webinar Sept2011

  • 1. Copyright © Wombat Security Technologies, Inc. 2008-2011 Jason Hong, PhD Assoc. Prof, Carnegie Mellon University CTO, Wombat Security Technologies Knowledgeable Users are the Best Cyber Security Defense
  • 2. Copyright © Wombat Security Technologies, Inc. 2008-2011 About Wombat Security  Founded in 2008 based on research on human element of computer security at Carnegie Mellon  Passwords, access control, privacy policies, etc  Initial products on anti-phishing  Article in Scientific American on protecting people from phishing scams  Have given multiple talks at RSA, ISSA about human element of security
  • 3. Copyright © Wombat Security Technologies, Inc. 2008-2011 Human Element of Security  People are an important part of computer security for every organization  Keeping passwords strong and secure  Avoiding social engineering  Avoiding malware  Appropriate use of social networking tools  Keeping mobile devices secure  Overlooking human element is the most common mistake in computer security
  • 4. Copyright © Wombat Security Technologies, Inc. 2008-2011 Technology Alone Won’t Work  Tempting to just buy some software or hardware that promises to solve these problems  However, attackers are very resourceful, constantly looking to circumvent your defenses  Also, technology alone can’t motivate people in your organization  Examples  Recent breaches at RSA, Epsilon, Canadian and Australian government due to phishing emails  Malware infections because of social networking
  • 5. Copyright © Wombat Security Technologies, Inc. 2008-2011 Can We Educate End-Users?  Users are not motivated to learn about security  Security is a secondary task  Difficult to teach people to make right decisions without increasing false positives “User education is a complete waste of time. It is about as much use as nailing jelly to a wall…. They are not interested…they just want to do their job.” Martin Overton, IBM security specialist http://news.cnet.com/21007350_361252132.html
  • 6. Copyright © Wombat Security Technologies, Inc. 2008-2011 Yes, End-Users Are Trainable  Our research demonstrates that users can learn techniques to protect themselves… if you can get them to pay attention to training  Problem is that today’s training often boring, time consuming, and ineffective  All day lecture, but no chance to practice skills  Or passively watching videos  Or posters and mugs and calendars  Raise awareness, but little on what to actually do
  • 7. Copyright © Wombat Security Technologies, Inc. 2008-2011 How Do We Get People Trained?  Create “teachable moments”: PhishGuru  Make training engaging: Anti-Phishing Phil  Use learning science principles throughout PhishGuru Anti-Phishing Phil
  • 8. Copyright © Wombat Security Technologies, Inc. 2008-2011 How Do We Get People Trained?  Create “teachable moments”: PhishGuru  Make training engaging: Anti-Phishing Phil  Use learning science principles throughout PhishGuru Anti-Phishing Phil
  • 9. Copyright © Wombat Security Technologies, Inc. 2008-2011 PhishGuru Embedded Training  Send emails that look like a phishing attack  If recipient falls for it, show intervention that teaches what cues to look for in succinct and engaging format  Useful for people who don’t know that they don’t know  Multiple user studies have demonstrated that PhishGuru is effective  Delivering training via direct email not effective
  • 10. Copyright © Wombat Security Technologies, Inc. 2008-2011 Subject: Revision to Your Amazon.com Information
  • 11. Copyright © Wombat Security Technologies, Inc. 2008-2011 Subject: Revision to Your Amazon.com Information Please login and enter your information
  • 12. Copyright © Wombat Security Technologies, Inc. 2008-2011
  • 13. Copyright © Wombat Security Technologies, Inc. 2008-2011 Evaluation of PhishGuru  Is embedded training effective?  We’ve conducted 4 peer-reviewed studies showing embedded training works well  Studies showed significant decrease in falling for phish and ability to retain what they learned P. Kumaraguru, Y. Rhee, A. Acquisti, L. Cranor, J. Hong, and E. Nunge. Protecting People from Phishing: The Design and Evaluation of an Embedded Training Email System. CHI 2007. P. Kumaraguru, J. Cranshaw, A. Acquisti, L. Cranor, J. Hong, M.A. Blair, and T. Pham. School of Phish: A Real-Word Evaluation of Anti- Phishing Training. SOUPS 2009.
  • 14. Copyright © Wombat Security Technologies, Inc. 2008-2011 Case Study #1: PhishGuru  Canadian healthcare organization  Three-month embedded training campaign  190 employees  Security assessment and effective training in context
  • 15. Copyright © Wombat Security Technologies, Inc. 2008-2011 Simulated Phishing Email
  • 16. Copyright © Wombat Security Technologies, Inc. 2008-2011 Case Study
  • 17. Copyright © Wombat Security Technologies, Inc. 2008-2011 Measurable Reduction in Falling for Phish Viewed Email Only % Viewed Email and Clicked Link % Employees Campaign 1 20 10.53% 35 18.42% 190 Campaign 2 37 19.47% 23 12.11% 190 Campaign 3 7 3.70% 10 5.29% 189
  • 18. Copyright © Wombat Security Technologies, Inc. 2008-2011 0 10 20 30 40 Campaign3 Campaign2 Campaign1 ViewedEmail and Clicked Link ViewedEmail Only
  • 19. Copyright © Wombat Security Technologies, Inc. 2008-2011 Case Study #2: PhishGuru  Tested with over 500 people in one month period  1 simulated phish at beginning of month, testing done at end of month  About 50% reduction in falling for phish  68 out of 85 surveyed said they recommend continuing doing this sort of training in the future  “I really liked the idea of sending *organization+ fake phishing emails and then saying to them, essentially, HEY! You could've just gotten scammed! You should be more careful – here's how...”
  • 20. Copyright © Wombat Security Technologies, Inc. 2008-2011 How Do We Get People Trained?  Create “teachable moments”: PhishGuru  Make training engaging: Anti-Phishing Phil  Use learning science principles throughout PhishGuru Anti-Phishing Phil
  • 21. Copyright © Wombat Security Technologies, Inc. 2008-2011 Micro-Games for Cyber Security  Training doesn’t have to be boring  Training doesn’t have to take long either  Micro game format, play for short time  Two-thirds of Americans played a video game in past six months  Not just young people  Average game player 35 years old  25% of people over 50 play games  Not just males  40% of casual gamers are women
  • 22. Copyright © Wombat Security Technologies, Inc. 2008-2011 Case Study 3: Anti-Phishing Phil  Tested Anti-Phishing Phil with ~4500 people  Huge improvement by novices in identifying phishing URLs  Also dramatically lowered false positives
  • 23. Copyright © Wombat Security Technologies, Inc. 2008-2011
  • 24. Copyright © Wombat Security Technologies, Inc. 2008-2011
  • 25. Copyright © Wombat Security Technologies, Inc. 2008-2011
  • 26. Copyright © Wombat Security Technologies, Inc. 2008-2011
  • 27. Copyright © Wombat Security Technologies, Inc. 2008-2011
  • 28. Copyright © Wombat Security Technologies, Inc. 2008-2011
  • 29. Copyright © Wombat Security Technologies, Inc. 2008-2011 False negatives for users who played Anti-Phishing Phil (“game condition”). False negatives are situations where people incorrectly label a phishing site as legitimate. Novices saw the greatest reduction in false negatives, and retained what they had learned.
  • 30. Copyright © Wombat Security Technologies, Inc. 2008-2011 False positives for users who played the Anti-Phishing Phil game. False positives are situations where people incorrectly label a legitimate site as phishing. Again, novices saw the greatest improvement in reducing false positives, and retained what they had learned.
  • 31. Copyright © Wombat Security Technologies, Inc. 2008-2011 How Do We Get People Trained?  Create “teachable moments”: PhishGuru  Make training engaging: Anti-Phishing Phil  Use learning science principles throughout PhishGuru Anti-Phishing Phil
  • 32. Copyright © Wombat Security Technologies, Inc. 2008-2011 Learning Science Area of research examining learning, retention, and transfer of skills Example principles  Learning by doing  Immediate feedback  Conceptual-procedural  Reflection
  • 33. Copyright © Wombat Security Technologies, Inc. 2008-2011 Organizational Perspective Challenges:  People are stretched for time  Large number of computer security topics Effective training:  Needs to respect people’s time (short, engaging)  Be effective  Up-to-date coverage of security topics  Measurable – who is vulnerable, where
  • 34. Copyright © Wombat Security Technologies, Inc. 2008-2011
  • 35. Copyright © Wombat Security Technologies, Inc. 2008-2011 Example Topic: Email Security
  • 36. Copyright © Wombat Security Technologies, Inc. 2008-2011 Example Topic: Passwords
  • 37. Copyright © Wombat Security Technologies, Inc. 2008-2011 Other Training: Social Networks
  • 38. Copyright © Wombat Security Technologies, Inc. 2008-2011 Measurable
  • 39. Copyright © Wombat Security Technologies, Inc. 2008-2011 Measurable
  • 40. Copyright © Wombat Security Technologies, Inc. 2008-2011 Summary  Human element is critical but most often overlooked aspect of computer security  Ex. phishing scams, passwords, mobile devices  Security training can work, but only if done right!  Training needs to respect time, engaging  Broad coverage of topics, measurable  Wombat’s interactive cybersecurity training available for use
  • 41. Copyright © Wombat Security Technologies, Inc. 2008-2011 Cyber Security Awareness Month  Wombat is offering a FREE Cyber Security Vulnerability Assessment  Limited time offer for your first campaign FREE*  October 2011 Contact Ralph Massaro at 412-621-1484 x 114 or r.massaro@wombatsecurity.com *Up to 100 people
  • 42. Copyright © Wombat Security Technologies, Inc. 2008-2011 Thank you! Thanks, where can I learn more? Find more at wombatsecurity.com Anti-Phishing Phil white paper: Cyber Security Training Game Teaches People to Avoid Phishing Attacks PhishGuru white paper: An Empirical Evaluation of PhishGuru Training