E N D
1. Security Awareness 101 11th Annual New York State Cyber Security Conference
2. Objectives Security Awareness
Security Program
Resources Available
Training Incorporate security practices into SDLC
Overlaps & iterations: Security becomes a quality checkpoint
- therefore, need to skip back to previous phasesIncorporate security practices into SDLC
Overlaps & iterations: Security becomes a quality checkpoint
- therefore, need to skip back to previous phases
3. Information Security Professionals Who is in charge of a Security Program?
Who has a Security Program Budget?
Looking for low to no-cost solutions to Security Awareness?
What is everyones level of experience for IT Security?
0 to 3 years
3 to 5 years
5 to 10 years
More than 10 years
4. Information Assurance CIA We all know it
Weakest Link
Understanding Security Awareness
Incidents are going to happen
Many laws and regulations require Security Awareness Training CIA We all know it. Its the corner stone, but not the focus of why we are here to talk.
Without Awareness, IA becomes very difficult if not impossible
Incidents are going to happen, you must do a proper post mortem and learn from those, if not, doomed to repeat.
FISMA, and others require training (OMB Circular A-123, Management Accountability and Control, 1995), Government Information Security Reform Act (GISRA) October 2000CIA We all know it. Its the corner stone, but not the focus of why we are here to talk.
Without Awareness, IA becomes very difficult if not impossible
Incidents are going to happen, you must do a proper post mortem and learn from those, if not, doomed to repeat.
FISMA, and others require training (OMB Circular A-123, Management Accountability and Control, 1995), Government Information Security Reform Act (GISRA) October 2000
5. How will this help my Security Program? Business knowledge
The Security market place
Cost benefits
Personal challenges
Understand the focus and the hype
Speak with authority about the concepts and trends
Understand and be able to map how the security would map to your needs
6. Security Awareness What is it?
What do you have?
What is your existing plan?
How do I map it for success?
Why do you focus on it?
How do I train the people who dont have the time?
What about the people who dont know what security is?
7. Security Awareness I am one person
I have one other person
I have a team
What do you focus on?
Cyber Security?
Incident Response?
Security Operations?
Forensics / Electronic Records?
Business Continuity / Disaster Recovery?
Network Security?
8. Security Awareness continued. Its a campaign
You constantly have to train on it
You must be the voice
Start with the basics
Locking your laptop
Where do you leave your laptop
Make it interesting
Make it fun
October is Cyber security Month
9. Start SmallBuild to Big Passwords
Email Links
Anti-virus Software
Security Cables
Passphrases
Locked Doors
Secured Rooms
Biometrics
Hardened O/S
10. Current Threats Advanced Persistent Threat (APT)
Cloud Security
Mobile Security
Application Vulnerabilities
Attacks
Viruses, Worms, Trojans, etc.
Spear Phishing 10
11. Security Program Policies
Procedures
Staffing Modules
Incident Response / Management / Recovery
Risk Assessments
Post Mortem / After Action
Training / Skills / Certifications
Public Relations
12. Resources Available NIST 800-50 and others
Microsoft
(ISC)2
TechRepublic
NIMS / ICS
HSEEP
MS-ISAC
Incident Response
Creating your own Dashboard
13. Security Training Awareness builds to training which evolves into Education
Professional Certifications
Organizations
RSS Feeds
Implementation
Audience
Message
13
14. Security Training continued. Who conducts the training?
What do I focus on?
How do I deliver a meaningful presentation?
How much time do I plan for?
Make it fun reach your audience
15. Adding to your Skills
16. Keys to Success Understand your focus
More upfront work
Use a Framework
Less money
Adding to your Basic Skills
Key Areas
Keeping the right people involved
Understanding when to apply Security
Know what you want upfront
Lessons Learned
17. Questions