SlideShare a Scribd company logo
1 of 81
Building an Information Security Awareness Program
Bill Gardner
Assistant Professor
Department of Integrated Science & Technology
Digital Forensics and Information Assurance Program
Marshall University
Hack3rcon.org
appyide.org
hackersforcharity.org
Image Source: http://blog.rucker.ca/2009/02/youre-doing-it-wrong.html
Image Source: http://www.agilemodeling.com/artifacts/networkDiagram.htm
Metrics
Security
Appliances
Anti-Virus/HIDs
Log Management
Patch Management
User Awareness Training
Policies and Procedures
Copyright 2014 Bill Gardner and Frank Hackett
What is Security Awareness
and Training
Why Security Awareness and
Training?
Image Source: http://www.thewindowsclub.com/social-engineering-techniques
Getting Management Buy-in
Image Source: https://supportforums.cisco.com/blog/150946/building-strong-security-policies
Getting Management Buy-in
Image Source: https://www.chromeriver.com/postcards/
Getting Management Buy-in
Image Source: https://www.facebook.com/thesfglobe/photos/a.581802245240710.1073741828.578850155535919/601831693237765/?type=1&theater
Getting Management Buy-in
Image Source: http://www.european-coatings.com/Markets-Companies/CPS-Color-increases-colorant-production
Targeted
Image Source: http://theasggroup.com/2012/05/tools-for-salespeople/
Targeted
Image Source: http://www.processmakerblog.com/bpm-2/secrets-automating-department/
Targeted
Image Source: http://www.innovationmanagement.se/2011/05/19/how-to-foster-greater-collaboration-between-innovators-and-the-it-department/
How Often
Image Source: http://integrityhr.com/top-10-violations-investigated-by-the-dol-and-how-to-avoid-them/
How Often
Image Source: http://cheezburger.com/1904315136
How Often
Image Source: http://www.theproducersperspective.com/my_weblog/2012/11/broadways-2012-quarter-2-report.html/i_love_quarterly_reports_mug-p168055427806712929enw9p_400
How Often
Image Source: http://micronarratives.blogspot.com/2010/08/continual-improvement-cycle-quality.html
User Awareness Training Must
Be Engaging
Image Source: http://jansimson.com/2011/10/29/omg-that-class-is-so-boring/
User Awareness Training Must
Be Engaging
Image Source: https://www.pjrc.com/teensy/projects.html
User Awareness Training Must
Be Engaging
Image Source: http://www.cedia.org/in-person-training
User Awareness Training Must
Be Engaging
Image Source: https://www.facebook.com/efm.lk/photos/a.132867908531.105751.75172638531/10153169793713532/?type=1&theater
User Awareness Training Must
Be Engaging
Image Source: http://pictures.4ever.eu/tag/23829/lot-of-money?pg=2
The First Step of User Awareness
Training is Explaining Risk
Image Source: https://www.facebook.com/photo.php?fbid=1415938958687951&set=a.1384739928474521.1073741828.100008155802751&type=1&theater
Cost of A Data Breach
Image Source: https://www.facebook.com/photo.php?fbid=10152535939267845&set=a.130149082844.132252.90859152844&type=1&theater
Why Hack?
• Money – Identity Theft, Credit Card Theft
• Industrial Espionage - Trade Secrets
• Hacktivism
• Cyber War
• Bragging Rights
Image Source: https://nuestropensar.wordpress.com/2010/12/
Threats
• Russian Business Network
• Chinese Hackers
• Hacktivism
• Cyberwar
Image Source: http://feministmormonhousewivespodcast.org/category/threats/
Russian Business Network
• Commonly
abbreviated as RBN
• Multi-faceted
cybercrime
organization
• Specializes in
personal identity theft
for resale. Image Source: http://jeffreycarr.blogspot.com/2013/01/rbn-connection-to-kasperskys-red.html
Chinese Hackers
• Hack for nationalistic
reasons.
• Some appear to be state
sponsored or a unofficial
part of the Chinese Army.
• GhostNet
• Google Hack
• APT – Advanced
Persistent Threat
Hacktivism
"the nonviolent use of illegal
or legally ambiguous digital
tools in pursuit of political
ends. These tools include
web site defacements,
redirects, denial-of-service
attacks, information theft..."Image Source: http://www.anonymousartofrevolution.com/2013/08/hacktivism-self-defense-for.html
Cyberwar
• Cyberwarfare is used to
refer to politically motivated
hacking to conduct
sabotage and espionage.
• Is state sponsored.
• In the 2007 Russia waged
cyberwar against Estonia.
Image Source: http://www.wired.com/2011/07/make-love-not-cyber-war/
Most Attacks Are Targeted
• Targeted threats are a
class of malware destined
for one specific
organization or industry
• Targeted attacks may
include threats delivered
via e-mail, port attacks,
zero day exploits or
phishing messages.
Who is responsible for security?
Image Source: http://www.caltrate.co.za/everybody-needs-calcium
Image Source: https://blog.lookout.com/blog/2013/11/12/security-alert-adobe-password-breach/
Passwords
Locking Computers
Attachments
 Be cautious of e-mail claiming to contain pictures in attached files, as
the files may contain viruses. Only open attachments from known
senders.
Phishing
Social Engineering
• Not all security breaches are the result of technical
attacks.
• In computer and network security people are the
weakest link.
• As he outlines in this book “The Art of Deception”,
convicted computer hacker Kevin Mitnick
penetrated computer networks by tricking people
into giving him passwords and other confidential
information.
No Tech Hacking
• Dumpster Diving – Sometimes confidential document
can be found in the trash.
• Tailgating – Following someone through a locked door.
• Shoulder Surfing – Getting passwords or other
confidential information by looking over someone’s
shoulder.
• Google Hacking – Finding passwords or other
confidential information by using Google searches.
• P2P Hacking – Finding passwords or other confidential
information on peer-to-peer networks.
No Tech Hacking
Insecure third-party software
• P2P file sharing – Some people share entire hard drive
• Instant Messaging- IM is insecure because it was not designed with
security in mind
Adware
 Adware or advertising-supported software is any software package
which automatically plays, displays, or downloads advertisements to a
computer after the software is installed or while the application is
being used.
Spyware
 Some types of adware are also spyware and can be classified as
software that steals personal information when you enter it into
legitimate programs or websites, or logs your keystrokes to steal your
passwords or other personal information.
Web Attacks
• IFrame attacks
• Cross site scripting
• Doesn’t require the user to click on anything
• Simply visiting the site will cause an infection
Two Examples of Web Attacks
• WV State Bar website: http://www.wvbar.org/
• The WV record: http://www.wvrecord.com/
Metadata Awareness
Redlining/Track Changes
Estimated Publish Date August 18th, 2014
Questions?
Contact Information
• Facebook : https://www.facebook.com/oncee
• Twitter: @oncee
• Linkedin: http://www.linkedin.com/in/304blogs

More Related Content

What's hot

Information Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier UniversityInformation Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier University
Atlantic Training, LLC.
 
IT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeIT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community College
Atlantic Training, LLC.
 
Information Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn HospitalInformation Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn Hospital
Atlantic Training, LLC.
 
Phishing attacks ppt
Phishing attacks pptPhishing attacks ppt
Phishing attacks ppt
Aryan Ragu
 

What's hot (20)

Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Program
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness Training
 
Cybersecurity Awareness Training
Cybersecurity Awareness TrainingCybersecurity Awareness Training
Cybersecurity Awareness Training
 
Information Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier UniversityInformation Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier University
 
IT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeIT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community College
 
Cybersecurity tips for employees
Cybersecurity tips for employeesCybersecurity tips for employees
Cybersecurity tips for employees
 
Basic Security Training for End Users
Basic Security Training for End UsersBasic Security Training for End Users
Basic Security Training for End Users
 
Cybersecurity Employee Training
Cybersecurity Employee TrainingCybersecurity Employee Training
Cybersecurity Employee Training
 
Cyber security training
Cyber security trainingCyber security training
Cyber security training
 
IT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.ppt
 
End User Security Awareness Presentation
End User Security Awareness PresentationEnd User Security Awareness Presentation
End User Security Awareness Presentation
 
Awareness Training on Information Security
Awareness Training on Information SecurityAwareness Training on Information Security
Awareness Training on Information Security
 
Information Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn HospitalInformation Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn Hospital
 
Employee Security Awareness Training
Employee Security Awareness TrainingEmployee Security Awareness Training
Employee Security Awareness Training
 
Phishing attacks ppt
Phishing attacks pptPhishing attacks ppt
Phishing attacks ppt
 
Customer information security awareness training
Customer information security awareness trainingCustomer information security awareness training
Customer information security awareness training
 
Information Security Awareness
Information Security Awareness Information Security Awareness
Information Security Awareness
 
Phishing attack
Phishing attackPhishing attack
Phishing attack
 

Similar to Building An Information Security Awareness Program

Gaining A Foothold
Gaining A FootholdGaining A Foothold
Gaining A Foothold
Claranet UK
 

Similar to Building An Information Security Awareness Program (20)

Dos and Don'ts of Internet Security
Dos and Don'ts of Internet SecurityDos and Don'ts of Internet Security
Dos and Don'ts of Internet Security
 
Cyber security & Importance of Cyber Security
Cyber security & Importance of Cyber SecurityCyber security & Importance of Cyber Security
Cyber security & Importance of Cyber Security
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber security
 
cybersecurity-180303131014.pdf
cybersecurity-180303131014.pdfcybersecurity-180303131014.pdf
cybersecurity-180303131014.pdf
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
Chapter 4
Chapter 4Chapter 4
Chapter 4
 
Cyberattacks.pptx
Cyberattacks.pptxCyberattacks.pptx
Cyberattacks.pptx
 
COMPUTER APPLICATIONS Module 4.pptx
COMPUTER APPLICATIONS Module 4.pptxCOMPUTER APPLICATIONS Module 4.pptx
COMPUTER APPLICATIONS Module 4.pptx
 
Cyber Security PPT
Cyber Security PPTCyber Security PPT
Cyber Security PPT
 
Computer Security Threats
Computer Security ThreatsComputer Security Threats
Computer Security Threats
 
Gaining A Foothold
Gaining A FootholdGaining A Foothold
Gaining A Foothold
 
CYBER SECUIRTY PRESENTATION.pptx
CYBER SECUIRTY PRESENTATION.pptxCYBER SECUIRTY PRESENTATION.pptx
CYBER SECUIRTY PRESENTATION.pptx
 
The Hacker Playbook: How to Think like a Cybercriminal to Reduce Risk
The Hacker Playbook: How to Think like a Cybercriminal to Reduce RiskThe Hacker Playbook: How to Think like a Cybercriminal to Reduce Risk
The Hacker Playbook: How to Think like a Cybercriminal to Reduce Risk
 
ICT Security.pdf
ICT Security.pdfICT Security.pdf
ICT Security.pdf
 
Cyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptxCyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptx
 
VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing
 
Cyber security for business
Cyber security for businessCyber security for business
Cyber security for business
 
THESIS-2(2)
THESIS-2(2)THESIS-2(2)
THESIS-2(2)
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Info Session on Cybersecurity & Cybersecurity Study Jams
Info Session on Cybersecurity & Cybersecurity Study JamsInfo Session on Cybersecurity & Cybersecurity Study Jams
Info Session on Cybersecurity & Cybersecurity Study Jams
 

Recently uploaded

AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
ellan12
 
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
soniya singh
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
soniya singh
 
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
soniya singh
 
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Call Girls In Delhi Whatsup 9873940964 Enjoy Unlimited Pleasure
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
Diya Sharma
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
sexy call girls service in goa
 

Recently uploaded (20)

Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirt
 
Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.
 
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
 
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
 
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
 
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
 
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
 
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirt
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
 
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
 
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
 
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
 

Building An Information Security Awareness Program

Editor's Notes

  1. Mature Information Security Program Pyramid
  2. In information security people are the weakest link. Not all attacks are technical.
  3. Policy Development
  4. Policy Enforcement
  5. Cost Savings
  6. Production Increases
  7. Not all users are the same Eg. Sales (road warriors) vs. mailroom (never leaves the office)
  8. Not all users are the same Don’t forget to train the IT Dept.
  9. Different users encounter different risks Different users have different educational levels
  10. New employees
  11. New employees
  12. Quarterly
  13. Continually
  14. Canned solution are boring
  15. No better than a blinkly light box
  16. In-person training is most effective
  17. Personalized training
  18. You don’t have to spend a lot of money to build a good program.
  19. Nobody wants to steal our data It’s all public information anyway Regulatory (HIPAA, PCI) Breach notification laws
  20. Data breaches cost billions of dollars a year.
  21. People have different motives for computer intrusions.