WE16 - Cyber Security - Security is Everyone's Responsibility
-
Upload
society-of-women-engineers -
Category
Engineering
-
view
43 -
download
4
Transcript of WE16 - Cyber Security - Security is Everyone's Responsibility
Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.
Cyber Security Security is Everyone’s Responsibility
Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.
The Who, Where and Why.
3Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.
But you still need to be aware of the internal threat.
Attackers are usually external to the victim’s organization.
4Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.
Nobody is immune.
Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement. 5
Attackers are typically after the money.
Financial
Espionage
80%
9%
6Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.
What happens next is determined by the attacker’s end game.
Many breaches share the same threat actions in the early stages of the attack.
Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.
Social Engineering – it’s not just for email
In 2015, Social Engineering was the #1 attack technique. People replaced exploits as attackers’ favorite way to beat Cybersecurity. Proof Point
Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.
Layered Defense
Perimeter
Network
Device
Application
Data
Prac
ticesPolicies
People
Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.
Building a Cyber Defensive Workforce
Safeguard
Passwords
Be Suspicio
usManage access
Design for
Resilience
Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.
Behaviors travel
Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.
Quick tips for everyone
Look our for links in unsolicited emailsPasswords – no sharing, and change them oftenSet passcode locks on your mobile devicesWatch what you share on social media Download software/apps only from safe sources