SlideShare a Scribd company logo
1 of 47
Eoin Heffernan | Founder
The Integrate Agency CIC
What Do We Do?
Managing agent and support services to provide access to
funding, particularly government contracts including
Business
development and
bidding services
Removing Barriers
Capacity building consultancy
(data security, management
structure, marketing, business
strategy)
Partnership
brokering
Contract
management
Case Study - Integrate South East
Four local charities (ยฃ7.5m turnover, employment programmes expertise,
young people, mental health expertise, local expertise and network)
Opportunities
Special purpose vehicle โ€“ honest broker
Community Interest Company (CIC) for the benefit of the South East
Asset lock โ€“ no profit leaves the community, contract package area
Shares allow for ownership and investment
Each partner in SPV has ownership 25% of Integrate South East CIC
Shared horizon scanning, opportunity sharing
Shared back office services to create scale and efficiencies
Shared purchase of a hotel on Isle of Wight
Consortium to bid for local social services contracts
Collaborative solution design โ€“ millennial veterans programme
Case Study - Mencap
ยฃ191m turnover, market leader
National strategy for Department for Work and Pensions
(DWP) contracts
Assessment of strengths for contract delivery
Case Study โ€“ Silent Secret
November 2014 startup, social enterprise, social
network
Turnover ยฃ17,360 2014-15
Sourced ยฃ386,000 new income in 22 months
(ยฃ17,580 per month)
Won 2016 EIB European Social Innovation
Tournament in Slovenia (300+ entrants)
Selected for 2017 NHS mental health digital
innovators accelerator
Developed strategic partnership with Mind
Capacity Building โ€“ Cybersecurity
Cyber and data security
Boring, technical but vital
Expensive to source expertise
Cybersecurity consultant day rate ยฃ540 UK
median, โ€œIntro to the GDPR for VCSEโ€ ยฃ195-ยฃ495
This project intends to develop and share learning
and case studies โ€“ recording todayโ€™s session
How to be a digitally savvy organisation
Kevin McLoughlin
The aim of this presentation is to raise awareness of information &
cyber security and security implications regarding:
1.Personal Data
2.Sensitive Personal Data
3.Principle 7 (Data Protection Act 1998)
4.Organisational Data
5.Cyber Security
6.Protecting Against Cyber Threat
AIM
So what time is it any way..!!
Prevent Unauthorised Access
Review the Process, Procedure
Stop: Loss, Theft, Compromise of Data
Simple or Complex..!!
Group Discussionโ€ฆ
1.Personal Data
Data which relate to a living individual who can be identified (name, address, D.O.B, National
Insurance etc.)
2.Sensitive Personal Data
Makes special reference to information defined as "sensitive personal data" which refers
specifically to information such as;
(a) the racial or ethnic origin of the data subject,
(b) his political opinions,
(c) his religious beliefs or other beliefs of a similar nature,
(d) whether he is a member of a trade union
(e) his physical or mental health or condition,
(f) his sexual life,
(g) the commission or alleged commission by him of any offence, or
(h) any proceedings for any offence committed or alleged to have been committed by him, the
disposal of such proceedings or the sentence of any court in such proceedings.
Definitions of Importance
Principle 7 (Data Protection Act 1998)
โ€œAppropriate technical and organisational measures shall be taken
against unauthorised or unlawful processing of personal data and
against accidental loss or destruction of, or damage to, personal dataโ€.
Definitions of Importance
โ€ข Confidentiality
โ€ข Integrity
โ€ข Availability (Risk)
Definition of Information Security
Governance
The protection of the clients and corporate data is the foremost
concern, and we achieve this in a variety of ways;
1. UK Law
2. Business Obligations
3. Organisational Policy
4. Business Best Practice - Standards
โ€ขThe Computer Misuse Act 1990
โ€ขData Protection Act 1998 & GDPR
โ€ขInternational Standards
โ€ข 27001
โ€ข 27002
โ€ข 27005
โ€ข 27032
โ€ข Cyber Essentials
The Law & Standards
So how safe are youโ€ฆ?
1. Training, Education, Awareness (How often / recorded)
2. Information Security Meetings (Organisational Commitment)
3. Policy / Procedure (Where, when last viewed updated) โ€“ (How disseminated)
4. Audit / Accountability
5. Incident Reporting / Management / Response
Questions and Responses
1. eLearning Package
2. Educational emails
3. Organisational Policy
4. Presentations
5. Posters
6. Screen Saver
7. Staff Handbook
8. Information Security Web Portal
9. Bulleting
10.News
11.Induction
Information Security Training
Often the weakest link in security is not technology, but the people who use it.
People let their guard down to attackers when they are tired or distracted by
work. Some feel intimidated. Others just make honest mistakes. It is a fact that
social engineering is often what allows attackers to steal the information they
desire. Firewalls, intrusion detection systems and antivirus software are just tools
to improve security. The biggest security risks to any company are its own
employees. Nearly all information security attacks originate from the inside.
The Weak Linkโ€ฆ..!!!
Demo
Mobile Device
Group Exerciseโ€ฆ(Part 1)
This is Your TargetThis is You
Attack !!
1. Checking ID/Credentials โ€“ Challenging Visitors
2. Clear Desk/Screen
3. Attention to Detail (email, letters, policy)
4. Regular Accountability/Audit
5. Personal Accountability/Knowledge (Digital Competence)
6. Situation/Third Party Awareness
7. Vigilance/Double Checking
8. The Basics (password protection)
9. Clicking links
10.System updates and patches
11.Anti-virus โ€“ Encryption
12.MDM โ€“ Mobile Device Management
13.Opening attachments
14.Common Sense
Common Failings
A. Assume Nothing
B. Believe No One
C. Check Everyhing
Group Exerciseโ€ฆ(Part 2)
This is Your ThreatThis is You
Defend !!
Physical
Administrative
Technical
The Weakest Link
Firewall
IPS/IDS
Web/Mail Filter
Anti-Virus
Encryption
Backup โ€“ (Read Only Encrypted)
Patch Management
Access Control
Manage Risk
OWASP
Cloud (PaaS, SaaS, IaaS)
DR/BCP
Prevent, Detection, Deter
Social Engineering
The art of manipulating people into performing actions or divulging
confidential information.
Typically trickery or deception for the purpose of information gathering,
fraud, or computer system access; in most cases the attacker never comes
face-to-face with the victims.
Social Engineering Techniques
Demo
Have I been Pawned
!Tu3sd4y!
Passwords
MondayDay 1
TuesdayDay 2
WednesdayDay 3
StationeryDay 4
ProjectorDay 5
?
Dictionary
Attack
(Brute Force)
HTTP vs HTTPS
Password:User Name:
Demo
Phishing
Social Engineering Examples
โ€ข Shoulder Surfing
โ€ข Tailgating
โ€ข Rubbish Bins
โ€ข Telephone Scams
โ€ข Phishing Email
โ€ข Physical (Reception / Door Call)
Social Engineering
Phishing
> IT Security
What the attacker gets
Demo
Fake SSID - Portal
Incidents
โ€ข Lost / Stolen Device
โ€ข Phishing / Spear Phishing
โ€ข Ransomware
โ€ข Social Engineering
โ€ข Lost / Stolen Data
Demo
System Scan & Hack
Incident Management
โ€ข Contain
โ€ข Isolate
โ€ข Minimise Impact
โ€ข Report
โ€ข Escalate
โ€ข Seek Guidance
Questions

More Related Content

What's hot

Peter Kornelisse, Infosecurity.nl, 4 november, Jaarbeurs Utrecht
Peter Kornelisse, Infosecurity.nl, 4 november, Jaarbeurs UtrechtPeter Kornelisse, Infosecurity.nl, 4 november, Jaarbeurs Utrecht
Peter Kornelisse, Infosecurity.nl, 4 november, Jaarbeurs UtrechtInfosecurity2010
ย 
GDPR Workshop
GDPR WorkshopGDPR Workshop
GDPR WorkshopCurt Lewis
ย 
Information Security Lesson 1 - Eric Vanderburg
Information Security Lesson 1 - Eric VanderburgInformation Security Lesson 1 - Eric Vanderburg
Information Security Lesson 1 - Eric VanderburgEric Vanderburg
ย 
Jyotin gambhir
Jyotin gambhirJyotin gambhir
Jyotin gambhirjanetlouis
ย 
Privacy by Design - taking in account the state of the art
Privacy by Design - taking in account the state of the artPrivacy by Design - taking in account the state of the art
Privacy by Design - taking in account the state of the artJames Mulhern
ย 
Achieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyAchieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyShiva Bissessar
ย 
General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR) General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR) Karina Matos
ย 
Privacy by Design as a system design strategy - EIC 2019
Privacy by Design as a system design strategy - EIC 2019 Privacy by Design as a system design strategy - EIC 2019
Privacy by Design as a system design strategy - EIC 2019 Sagara Gunathunga
ย 
Cyber training 23 5 2012
Cyber training 23 5 2012Cyber training 23 5 2012
Cyber training 23 5 2012Jacqueline Fick
ย 
Cyber Recovery - Legal Toolkit
Cyber Recovery - Legal ToolkitCyber Recovery - Legal Toolkit
Cyber Recovery - Legal ToolkitKevin Duffey
ย 
Enlightened Privacy โ€“ by Design for a Smarter Grid
Enlightened Privacy โ€“ by Design for a Smarter GridEnlightened Privacy โ€“ by Design for a Smarter Grid
Enlightened Privacy โ€“ by Design for a Smarter Gridbradley_g
ย 
CEOs leading Recovery from Cyber Attack
CEOs leading Recovery from Cyber AttackCEOs leading Recovery from Cyber Attack
CEOs leading Recovery from Cyber AttackKevin Duffey
ย 
David Smith gfke 2014
David Smith gfke 2014David Smith gfke 2014
David Smith gfke 2014innovationoecd
ย 
Cybersecurity and data loss - It's not just about lost USB keys today
Cybersecurity and data loss - It's not just about lost USB keys todayCybersecurity and data loss - It's not just about lost USB keys today
Cybersecurity and data loss - It's not just about lost USB keys todayDan Michaluk
ย 
GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR solutions (JS Event 28/2/18) | Greenlight Computers GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR solutions (JS Event 28/2/18) | Greenlight Computers Gary Dodson
ย 
SEMHIMA Presentation Final 06052012
SEMHIMA Presentation Final 06052012SEMHIMA Presentation Final 06052012
SEMHIMA Presentation Final 06052012mrpchcchpc
ย 
Infocom security 2016 - Cromar Presentation
Infocom security 2016 - Cromar PresentationInfocom security 2016 - Cromar Presentation
Infocom security 2016 - Cromar PresentationEthos Media S.A.
ย 

What's hot (20)

Peter Kornelisse, Infosecurity.nl, 4 november, Jaarbeurs Utrecht
Peter Kornelisse, Infosecurity.nl, 4 november, Jaarbeurs UtrechtPeter Kornelisse, Infosecurity.nl, 4 november, Jaarbeurs Utrecht
Peter Kornelisse, Infosecurity.nl, 4 november, Jaarbeurs Utrecht
ย 
GDPR Workshop
GDPR WorkshopGDPR Workshop
GDPR Workshop
ย 
Information Security Lesson 1 - Eric Vanderburg
Information Security Lesson 1 - Eric VanderburgInformation Security Lesson 1 - Eric Vanderburg
Information Security Lesson 1 - Eric Vanderburg
ย 
Jyotin gambhir
Jyotin gambhirJyotin gambhir
Jyotin gambhir
ย 
Privacy by Design - taking in account the state of the art
Privacy by Design - taking in account the state of the artPrivacy by Design - taking in account the state of the art
Privacy by Design - taking in account the state of the art
ย 
Achieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyAchieving Caribbean Cybersecuirty
Achieving Caribbean Cybersecuirty
ย 
General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR) General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)
ย 
Privacy by Design as a system design strategy - EIC 2019
Privacy by Design as a system design strategy - EIC 2019 Privacy by Design as a system design strategy - EIC 2019
Privacy by Design as a system design strategy - EIC 2019
ย 
Cyber training 23 5 2012
Cyber training 23 5 2012Cyber training 23 5 2012
Cyber training 23 5 2012
ย 
Cyber Recovery - Legal Toolkit
Cyber Recovery - Legal ToolkitCyber Recovery - Legal Toolkit
Cyber Recovery - Legal Toolkit
ย 
Payroll Data & GDPR: What you need to know?
Payroll Data & GDPR: What you need to know?Payroll Data & GDPR: What you need to know?
Payroll Data & GDPR: What you need to know?
ย 
Privacy and Data Protection
Privacy and Data ProtectionPrivacy and Data Protection
Privacy and Data Protection
ย 
3GRC approach to GDPR V 0.1 www.3grc.co.uk
3GRC  approach to GDPR V 0.1 www.3grc.co.uk3GRC  approach to GDPR V 0.1 www.3grc.co.uk
3GRC approach to GDPR V 0.1 www.3grc.co.uk
ย 
Enlightened Privacy โ€“ by Design for a Smarter Grid
Enlightened Privacy โ€“ by Design for a Smarter GridEnlightened Privacy โ€“ by Design for a Smarter Grid
Enlightened Privacy โ€“ by Design for a Smarter Grid
ย 
CEOs leading Recovery from Cyber Attack
CEOs leading Recovery from Cyber AttackCEOs leading Recovery from Cyber Attack
CEOs leading Recovery from Cyber Attack
ย 
David Smith gfke 2014
David Smith gfke 2014David Smith gfke 2014
David Smith gfke 2014
ย 
Cybersecurity and data loss - It's not just about lost USB keys today
Cybersecurity and data loss - It's not just about lost USB keys todayCybersecurity and data loss - It's not just about lost USB keys today
Cybersecurity and data loss - It's not just about lost USB keys today
ย 
GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR solutions (JS Event 28/2/18) | Greenlight Computers GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR solutions (JS Event 28/2/18) | Greenlight Computers
ย 
SEMHIMA Presentation Final 06052012
SEMHIMA Presentation Final 06052012SEMHIMA Presentation Final 06052012
SEMHIMA Presentation Final 06052012
ย 
Infocom security 2016 - Cromar Presentation
Infocom security 2016 - Cromar PresentationInfocom security 2016 - Cromar Presentation
Infocom security 2016 - Cromar Presentation
ย 

Similar to Cyber Safe Southwark

Meeting the cyber risk challenge
Meeting the cyber risk challengeMeeting the cyber risk challenge
Meeting the cyber risk challengeFERMA
ย 
Dealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber ResilienceDealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber ResilienceDonald Tabone
ย 
BSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing businessBSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing businessJoel Cardella
ย 
Security Scare - Cybersecurity & What to Do About It!
Security Scare - Cybersecurity & What to Do About It!Security Scare - Cybersecurity & What to Do About It!
Security Scare - Cybersecurity & What to Do About It!Craig Rispin
ย 
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015Joe Bartolo
ย 
Classification-HowToBoostInformationProtection
Classification-HowToBoostInformationProtectionClassification-HowToBoostInformationProtection
Classification-HowToBoostInformationProtectionGianmarco Ferri
ย 
Big data contains valuable information - Protect It!
Big data contains valuable information - Protect It!Big data contains valuable information - Protect It!
Big data contains valuable information - Protect It!Praveenkumar Hosangadi
ย 
IBM's four key steps to security and privacy for big data
IBM's four key steps to security and privacy for big dataIBM's four key steps to security and privacy for big data
IBM's four key steps to security and privacy for big dataIBM Analytics
ย 
A Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOsA Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOsgppcpa
ย 
Cyber Security Strategies and Approaches
Cyber Security Strategies and ApproachesCyber Security Strategies and Approaches
Cyber Security Strategies and Approachesvngundi
ย 
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docxCISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docxmccormicknadine86
ย 
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docxCISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docxsleeperharwell
ย 
Small Business Administration Recommendations
Small Business Administration RecommendationsSmall Business Administration Recommendations
Small Business Administration RecommendationsMeg Weber
ย 
Cybersecurity Employee Training
Cybersecurity Employee TrainingCybersecurity Employee Training
Cybersecurity Employee TrainingPaige Rasid
ย 
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)Andris Soroka
ย 
ISO27k Awareness presentation v2.pptx
ISO27k Awareness presentation v2.pptxISO27k Awareness presentation v2.pptx
ISO27k Awareness presentation v2.pptxNapoleon NV
ย 
Best practices to mitigate data breach risk
Best practices to mitigate data breach riskBest practices to mitigate data breach risk
Best practices to mitigate data breach riskLivingstone Advisory
ย 
Cyber Security for the Small Business Experience
Cyber Security for the Small Business ExperienceCyber Security for the Small Business Experience
Cyber Security for the Small Business ExperienceNational Retail Federation
ย 
IT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 ConferenceIT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 ConferenceJeff Lemmermann
ย 

Similar to Cyber Safe Southwark (20)

Meeting the cyber risk challenge
Meeting the cyber risk challengeMeeting the cyber risk challenge
Meeting the cyber risk challenge
ย 
Dealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber ResilienceDealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber Resilience
ย 
BSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing businessBSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing business
ย 
Security Scare - Cybersecurity & What to Do About It!
Security Scare - Cybersecurity & What to Do About It!Security Scare - Cybersecurity & What to Do About It!
Security Scare - Cybersecurity & What to Do About It!
ย 
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
ย 
Classification-HowToBoostInformationProtection
Classification-HowToBoostInformationProtectionClassification-HowToBoostInformationProtection
Classification-HowToBoostInformationProtection
ย 
Big data contains valuable information - Protect It!
Big data contains valuable information - Protect It!Big data contains valuable information - Protect It!
Big data contains valuable information - Protect It!
ย 
IBM's four key steps to security and privacy for big data
IBM's four key steps to security and privacy for big dataIBM's four key steps to security and privacy for big data
IBM's four key steps to security and privacy for big data
ย 
A Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOsA Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOs
ย 
Cert adli wahid_iisf2011
Cert adli wahid_iisf2011Cert adli wahid_iisf2011
Cert adli wahid_iisf2011
ย 
Cyber Security Strategies and Approaches
Cyber Security Strategies and ApproachesCyber Security Strategies and Approaches
Cyber Security Strategies and Approaches
ย 
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docxCISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
ย 
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docxCISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
ย 
Small Business Administration Recommendations
Small Business Administration RecommendationsSmall Business Administration Recommendations
Small Business Administration Recommendations
ย 
Cybersecurity Employee Training
Cybersecurity Employee TrainingCybersecurity Employee Training
Cybersecurity Employee Training
ย 
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
ย 
ISO27k Awareness presentation v2.pptx
ISO27k Awareness presentation v2.pptxISO27k Awareness presentation v2.pptx
ISO27k Awareness presentation v2.pptx
ย 
Best practices to mitigate data breach risk
Best practices to mitigate data breach riskBest practices to mitigate data breach risk
Best practices to mitigate data breach risk
ย 
Cyber Security for the Small Business Experience
Cyber Security for the Small Business ExperienceCyber Security for the Small Business Experience
Cyber Security for the Small Business Experience
ย 
IT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 ConferenceIT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 Conference
ย 

Recently uploaded

VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...SUHANI PANDEY
ย 
๐“€คCall On 7877925207 ๐“€ค Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
๐“€คCall On 7877925207 ๐“€ค Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...๐“€คCall On 7877925207 ๐“€ค Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
๐“€คCall On 7877925207 ๐“€ค Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...Neha Pandey
ย 
Dubai Call Girls Milky O525547819 Call Girls Dubai Soft Dating
Dubai Call Girls Milky O525547819 Call Girls Dubai Soft DatingDubai Call Girls Milky O525547819 Call Girls Dubai Soft Dating
Dubai Call Girls Milky O525547819 Call Girls Dubai Soft Datingkojalkojal131
ย 
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...SUHANI PANDEY
ย 
โ‚น5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] ๐Ÿ”|97111...
โ‚น5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] ๐Ÿ”|97111...โ‚น5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] ๐Ÿ”|97111...
โ‚น5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] ๐Ÿ”|97111...Diya Sharma
ย 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtrahman018755
ย 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirtrahman018755
ย 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableSeo
ย 
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...SUHANI PANDEY
ย 
Call Now โ˜Ž 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now โ˜Ž 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.Call Now โ˜Ž 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now โ˜Ž 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.soniya singh
ย 
Top Rated Pune Call Girls Daund โŸŸ 6297143586 โŸŸ Call Me For Genuine Sex Servi...
Top Rated  Pune Call Girls Daund โŸŸ 6297143586 โŸŸ Call Me For Genuine Sex Servi...Top Rated  Pune Call Girls Daund โŸŸ 6297143586 โŸŸ Call Me For Genuine Sex Servi...
Top Rated Pune Call Girls Daund โŸŸ 6297143586 โŸŸ Call Me For Genuine Sex Servi...Call Girls in Nagpur High Profile
ย 
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...SUHANI PANDEY
ย 
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...Escorts Call Girls
ย 
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...roncy bisnoi
ย 
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...SUHANI PANDEY
ย 
VVIP Pune Call Girls Mohammadwadi WhatSapp Number 8005736733 With Elite Staff...
VVIP Pune Call Girls Mohammadwadi WhatSapp Number 8005736733 With Elite Staff...VVIP Pune Call Girls Mohammadwadi WhatSapp Number 8005736733 With Elite Staff...
VVIP Pune Call Girls Mohammadwadi WhatSapp Number 8005736733 With Elite Staff...SUHANI PANDEY
ย 
Call Now โ˜Ž 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now โ˜Ž 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now โ˜Ž 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now โ˜Ž 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.soniya singh
ย 
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
ย 

Recently uploaded (20)

VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
ย 
๐“€คCall On 7877925207 ๐“€ค Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
๐“€คCall On 7877925207 ๐“€ค Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...๐“€คCall On 7877925207 ๐“€ค Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
๐“€คCall On 7877925207 ๐“€ค Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
ย 
Dubai Call Girls Milky O525547819 Call Girls Dubai Soft Dating
Dubai Call Girls Milky O525547819 Call Girls Dubai Soft DatingDubai Call Girls Milky O525547819 Call Girls Dubai Soft Dating
Dubai Call Girls Milky O525547819 Call Girls Dubai Soft Dating
ย 
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
ย 
โ‚น5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] ๐Ÿ”|97111...
โ‚น5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] ๐Ÿ”|97111...โ‚น5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] ๐Ÿ”|97111...
โ‚น5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] ๐Ÿ”|97111...
ย 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirt
ย 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirt
ย 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
ย 
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...
ย 
Call Now โ˜Ž 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now โ˜Ž 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.Call Now โ˜Ž 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now โ˜Ž 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
ย 
Top Rated Pune Call Girls Daund โŸŸ 6297143586 โŸŸ Call Me For Genuine Sex Servi...
Top Rated  Pune Call Girls Daund โŸŸ 6297143586 โŸŸ Call Me For Genuine Sex Servi...Top Rated  Pune Call Girls Daund โŸŸ 6297143586 โŸŸ Call Me For Genuine Sex Servi...
Top Rated Pune Call Girls Daund โŸŸ 6297143586 โŸŸ Call Me For Genuine Sex Servi...
ย 
Low Sexy Call Girls In Mohali 9053900678 ๐ŸฅตHave Save And Good Place ๐Ÿฅต
Low Sexy Call Girls In Mohali 9053900678 ๐ŸฅตHave Save And Good Place ๐ŸฅตLow Sexy Call Girls In Mohali 9053900678 ๐ŸฅตHave Save And Good Place ๐Ÿฅต
Low Sexy Call Girls In Mohali 9053900678 ๐ŸฅตHave Save And Good Place ๐Ÿฅต
ย 
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
ย 
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
ย 
valsad Escorts Service โ˜Ž๏ธ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service โ˜Ž๏ธ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...valsad Escorts Service โ˜Ž๏ธ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service โ˜Ž๏ธ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
ย 
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
ย 
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
ย 
VVIP Pune Call Girls Mohammadwadi WhatSapp Number 8005736733 With Elite Staff...
VVIP Pune Call Girls Mohammadwadi WhatSapp Number 8005736733 With Elite Staff...VVIP Pune Call Girls Mohammadwadi WhatSapp Number 8005736733 With Elite Staff...
VVIP Pune Call Girls Mohammadwadi WhatSapp Number 8005736733 With Elite Staff...
ย 
Call Now โ˜Ž 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now โ˜Ž 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now โ˜Ž 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now โ˜Ž 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
ย 
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
ย 

Cyber Safe Southwark

  • 1.
  • 2. Eoin Heffernan | Founder The Integrate Agency CIC
  • 3. What Do We Do? Managing agent and support services to provide access to funding, particularly government contracts including Business development and bidding services Removing Barriers Capacity building consultancy (data security, management structure, marketing, business strategy) Partnership brokering Contract management
  • 4. Case Study - Integrate South East Four local charities (ยฃ7.5m turnover, employment programmes expertise, young people, mental health expertise, local expertise and network) Opportunities Special purpose vehicle โ€“ honest broker Community Interest Company (CIC) for the benefit of the South East Asset lock โ€“ no profit leaves the community, contract package area Shares allow for ownership and investment Each partner in SPV has ownership 25% of Integrate South East CIC Shared horizon scanning, opportunity sharing Shared back office services to create scale and efficiencies Shared purchase of a hotel on Isle of Wight Consortium to bid for local social services contracts Collaborative solution design โ€“ millennial veterans programme
  • 5. Case Study - Mencap ยฃ191m turnover, market leader National strategy for Department for Work and Pensions (DWP) contracts Assessment of strengths for contract delivery
  • 6. Case Study โ€“ Silent Secret November 2014 startup, social enterprise, social network Turnover ยฃ17,360 2014-15 Sourced ยฃ386,000 new income in 22 months (ยฃ17,580 per month) Won 2016 EIB European Social Innovation Tournament in Slovenia (300+ entrants) Selected for 2017 NHS mental health digital innovators accelerator Developed strategic partnership with Mind
  • 7. Capacity Building โ€“ Cybersecurity Cyber and data security Boring, technical but vital Expensive to source expertise Cybersecurity consultant day rate ยฃ540 UK median, โ€œIntro to the GDPR for VCSEโ€ ยฃ195-ยฃ495 This project intends to develop and share learning and case studies โ€“ recording todayโ€™s session
  • 8. How to be a digitally savvy organisation Kevin McLoughlin
  • 9. The aim of this presentation is to raise awareness of information & cyber security and security implications regarding: 1.Personal Data 2.Sensitive Personal Data 3.Principle 7 (Data Protection Act 1998) 4.Organisational Data 5.Cyber Security 6.Protecting Against Cyber Threat AIM
  • 10. So what time is it any way..!!
  • 11. Prevent Unauthorised Access Review the Process, Procedure Stop: Loss, Theft, Compromise of Data Simple or Complex..!!
  • 13. 1.Personal Data Data which relate to a living individual who can be identified (name, address, D.O.B, National Insurance etc.) 2.Sensitive Personal Data Makes special reference to information defined as "sensitive personal data" which refers specifically to information such as; (a) the racial or ethnic origin of the data subject, (b) his political opinions, (c) his religious beliefs or other beliefs of a similar nature, (d) whether he is a member of a trade union (e) his physical or mental health or condition, (f) his sexual life, (g) the commission or alleged commission by him of any offence, or (h) any proceedings for any offence committed or alleged to have been committed by him, the disposal of such proceedings or the sentence of any court in such proceedings. Definitions of Importance
  • 14. Principle 7 (Data Protection Act 1998) โ€œAppropriate technical and organisational measures shall be taken against unauthorised or unlawful processing of personal data and against accidental loss or destruction of, or damage to, personal dataโ€. Definitions of Importance
  • 15. โ€ข Confidentiality โ€ข Integrity โ€ข Availability (Risk) Definition of Information Security
  • 16. Governance The protection of the clients and corporate data is the foremost concern, and we achieve this in a variety of ways; 1. UK Law 2. Business Obligations 3. Organisational Policy 4. Business Best Practice - Standards
  • 17. โ€ขThe Computer Misuse Act 1990 โ€ขData Protection Act 1998 & GDPR โ€ขInternational Standards โ€ข 27001 โ€ข 27002 โ€ข 27005 โ€ข 27032 โ€ข Cyber Essentials The Law & Standards
  • 18. So how safe are youโ€ฆ?
  • 19.
  • 20. 1. Training, Education, Awareness (How often / recorded) 2. Information Security Meetings (Organisational Commitment) 3. Policy / Procedure (Where, when last viewed updated) โ€“ (How disseminated) 4. Audit / Accountability 5. Incident Reporting / Management / Response Questions and Responses
  • 21. 1. eLearning Package 2. Educational emails 3. Organisational Policy 4. Presentations 5. Posters 6. Screen Saver 7. Staff Handbook 8. Information Security Web Portal 9. Bulleting 10.News 11.Induction Information Security Training
  • 22. Often the weakest link in security is not technology, but the people who use it. People let their guard down to attackers when they are tired or distracted by work. Some feel intimidated. Others just make honest mistakes. It is a fact that social engineering is often what allows attackers to steal the information they desire. Firewalls, intrusion detection systems and antivirus software are just tools to improve security. The biggest security risks to any company are its own employees. Nearly all information security attacks originate from the inside. The Weak Linkโ€ฆ..!!!
  • 24. Group Exerciseโ€ฆ(Part 1) This is Your TargetThis is You Attack !!
  • 25.
  • 26. 1. Checking ID/Credentials โ€“ Challenging Visitors 2. Clear Desk/Screen 3. Attention to Detail (email, letters, policy) 4. Regular Accountability/Audit 5. Personal Accountability/Knowledge (Digital Competence) 6. Situation/Third Party Awareness 7. Vigilance/Double Checking 8. The Basics (password protection) 9. Clicking links 10.System updates and patches 11.Anti-virus โ€“ Encryption 12.MDM โ€“ Mobile Device Management 13.Opening attachments 14.Common Sense Common Failings
  • 27. A. Assume Nothing B. Believe No One C. Check Everyhing
  • 28. Group Exerciseโ€ฆ(Part 2) This is Your ThreatThis is You Defend !!
  • 32. Firewall IPS/IDS Web/Mail Filter Anti-Virus Encryption Backup โ€“ (Read Only Encrypted) Patch Management Access Control Manage Risk OWASP Cloud (PaaS, SaaS, IaaS) DR/BCP Prevent, Detection, Deter
  • 33. Social Engineering The art of manipulating people into performing actions or divulging confidential information. Typically trickery or deception for the purpose of information gathering, fraud, or computer system access; in most cases the attacker never comes face-to-face with the victims.
  • 36. !Tu3sd4y! Passwords MondayDay 1 TuesdayDay 2 WednesdayDay 3 StationeryDay 4 ProjectorDay 5 ? Dictionary Attack (Brute Force)
  • 39. Social Engineering Examples โ€ข Shoulder Surfing โ€ข Tailgating โ€ข Rubbish Bins โ€ข Telephone Scams โ€ข Phishing Email โ€ข Physical (Reception / Door Call)
  • 44. Incidents โ€ข Lost / Stolen Device โ€ข Phishing / Spear Phishing โ€ข Ransomware โ€ข Social Engineering โ€ข Lost / Stolen Data
  • 46. Incident Management โ€ข Contain โ€ข Isolate โ€ข Minimise Impact โ€ข Report โ€ข Escalate โ€ข Seek Guidance

Editor's Notes

  1. We bring groups togetherโ€ฆSpecial purpose vehicle (Alliance contracting, not tiered) Asset lock - (WIN THEME)
  2. We bring groups togetherโ€ฆSpecial purpose vehicle (Alliance contracting, not tiered) Asset lock - (WIN THEME)
  3. We bring groups togetherโ€ฆSpecial purpose vehicle (Alliance contracting, not tiered) Asset lock - (WIN THEME)
  4. We bring groups togetherโ€ฆSpecial purpose vehicle (Alliance contracting, not tiered) Asset lock - (WIN THEME)