SlideShare a Scribd company logo
1 of 23
Download to read offline
SESSION ID:
#RSAC
Lance Spitzner
Securing Today’s Online Kids
HUM-WO5F
Director
SANS Securing The Human
@Twitter
lspitzner@sans.org
Presenter’s Company
Logo – replace on
master slide
#RSAC
Goal
To enable children to leverage
technology safely and securely.
To become good digital citizens /
leaders.
Remember, we are not securing
data but reputations and futures.
Presenter’s Company
Logo – replace on
master slide
#RSAC
Challenges For Parents
No Reference: Kids growing up in a world we never
experienced.
Always Connected: Kids have constant Internet access
through a variety of devices.
Presenter’s Company
Logo – replace on
master slide
#RSAC
Top Three Threats
Strangers
Friends
Themselves
Presenter’s Company
Logo – replace on
master slide
#RSAC
Strangers
Same concerns we faced as kids, however today’s strangers can
target kids globally, remotely and anonymously.
Sexual Predators
Sextortion
Fraud (game accounts)
Law enforcement is actively targeting this threat.
Presenter’s Company
Logo – replace on
master slide
#RSAC
Friends
Same threats we faced as kids, but on a bigger scale and can
happen anonymously.
Cyber bullying (griefing / salty / trolling)
Pranks / Sextortion
Ex boyfriend / girlfriend.
Bad examples (swearing / excessive gaming / online late)
Law enforcement may not be able to help you here.
Presenter’s Company
Logo – replace on
master slide
#RSAC
Themselves
Sharing too much: with public (social media) or with friends
(sexting)
Accessing / watching inappropriate content
Too much online time
Bullying / harassing others (reputation)
Downloading / sharing copyrighted material
Presenter’s Company
Logo – replace on
master slide
#RSAC
Common Theme
What is one thing all three of these risks share?
COMMUNICATION
8
#RSAC
What You Can Do
Presenter’s Company
Logo – replace on
master slide
#RSAC
Education / Communication
Talking with kids is THE strongest weapon you have. Technology
cannot keep up, nor can you outsource parenting.
Mentor your kids on how to behave, just like we do in the real
world. Ultimately this is about values.
Ensure your kids feel comfortable talking to you. Ask them to
show the technologies they are using and how they use them.
Explain the “Golden Rule” - no consequences when reporting.
Presenter’s Company
Logo – replace on
master slide
#RSAC
Dedicated Computer
Have a computer dedicated just for the kids.
Keep it updated / patched with AV and firewall.
Make sure each child has their own, non-privileged account.
Have your children be responsible for keeping the computer up to
date and secure (let them rebuild it when it gets slow).
My kids only use computer for gaming and writing reports.
Presenter’s Company
Logo – replace on
master slide
#RSAC
Mobile Devices – Where the Action Is
Have a central, family charging station.
All devices go there when devices are not in use and before kids
go to bed.
When kids leave house, smartphone has to be on, tracking
enabled, and they have to respond to all messages from Mom or
Dad (no phone dying due to too much gaming).
Presenter’s Company
Logo – replace on
master slide
#RSAC
Rules Contract
Agree upon rules before giving kids access to new technology
(smartphone / tablet, etc). Like any Acceptable Use Policy, you will
need to update it as kids get older.
Times kids can or cannot be online.
Tie grades to use of devices, get below an 85 in any class, lose your
mobile device.
What they can and cannot do.
Who to report any questions or concerns to.
www.janellburleyhofmann.com/the-contract
Presenter’s Company
Logo – replace on
master slide
#RSAC
Grandparents / Family
Just like you train your kids, you may need to train other family
members.
When kids are at Grandma’s, what rules apply, does Grandma
know the rules?
What happens at Grandma’s stays at Grandma’s
Presenter’s Company
Logo – replace on
master slide
#RSAC
Technology
Filtering is active, you to control what activity your children can
and cannot do online.
Monitoring is passive, it only logs and reports what your children
were doing.
Presenter’s Company
Logo – replace on
master slide
#RSAC
Filtering
Most effective for younger children, prevents them from
accidently accessing harmful content
As children get older, easier to bypass. In addition, as they get
older they need more access (i.e. homework)
Certain websites are their own ‘ecosystem’ and hard to filter,
such as YouTube, Netflix, Steam, Facebook or Instagram.
Presenter’s Company
Logo – replace on
master slide
#RSAC
OpenDNS
Free service, set-up as your DNS server.
Will block attempts to connect to any server based on settings.
Excellent for filtering website activity and protecting against
malicious sites.
Poor reporting.
www.opendns.org
Presenter’s Company
Logo – replace on
master slide
#RSAC
Monitoring
If you want to monitor, start early. Hard to start monitoring
when they are 16.
Overwhelmed by data / automated reporting.
For mobile devices, if you want to monitor your kids Android has
greatest capabilities.
Teen Safe
My Mobile Watchdog
Web Watcher
Presenter’s Company
Logo – replace on
master slide
#RSAC
Other Options
Windows – Family Safety
Mac OS X – Parental Controls
Most phone service providers have monitoring,
reporting & parental controls.
Create a FB / Instagram account and friend your kids.
Presenter’s Company
Logo – replace on
master slide
#RSAC
Set a Good Example
Show your kids how you securely maintain your own computer.
When talking to your kids, stop using technology and look them
in the eye.
Behave on the Internet as you would want your kids to.
Don’t use technology at the dinner table, late at night in bed or
family events.
Presenter’s Company
Logo – replace on
master slide
#RSAC
Got a Geek? Get Them Involved
Cyber Aces www.cyberaces.org
Cyber Patriot www.uscyberpatriot.org
Cyber Challenge www.uscyberchallenge.org
Code Academy www.codeacademy.com
Khan Academy www.khanacademy.org
Scholarships www.sfs.opm.gov
Presenter’s Company
Logo – replace on
master slide
#RSAC
When You Get Home
• Communication is key, this is not about technology, it’s about
values. Start the dialogue by asking your kids what are their
favorite apps and have them show you how the apps work.
• Create a dedicated charging station for your kids and keep
devices in an open area.
• Create a contract for you and your kids.
• Stop using technology when they want to talk to you.
Presenter’s Company
Logo – replace on
master slide
#RSAC
Learn More
securingthehuman.sans.org/resources/kids
www.rsaconference.com/safe

More Related Content

Viewers also liked

Connected Kids by Mark McWhinnie WCPS
Connected Kids by Mark McWhinnie WCPSConnected Kids by Mark McWhinnie WCPS
Connected Kids by Mark McWhinnie WCPS
Vicky Sahlin
 
Accenture masters-of-rural-markets-selling-profitably-rural-consumers
Accenture masters-of-rural-markets-selling-profitably-rural-consumersAccenture masters-of-rural-markets-selling-profitably-rural-consumers
Accenture masters-of-rural-markets-selling-profitably-rural-consumers
Vartica Khanna
 

Viewers also liked (19)

DIGITALLY CONNECTING RURAL INDIA BY 2018
DIGITALLY CONNECTING RURAL INDIA BY 2018DIGITALLY CONNECTING RURAL INDIA BY 2018
DIGITALLY CONNECTING RURAL INDIA BY 2018
 
How Connected Are They
How Connected Are TheyHow Connected Are They
How Connected Are They
 
Petrofed
PetrofedPetrofed
Petrofed
 
Mobile telephony in rural india
Mobile telephony in rural indiaMobile telephony in rural india
Mobile telephony in rural india
 
Connected Kids by Mark McWhinnie WCPS
Connected Kids by Mark McWhinnie WCPSConnected Kids by Mark McWhinnie WCPS
Connected Kids by Mark McWhinnie WCPS
 
Growing Up Online. Connected Kids. Report @kaspersky & @iconkidsyouth
Growing Up Online. Connected Kids. Report @kaspersky & @iconkidsyouthGrowing Up Online. Connected Kids. Report @kaspersky & @iconkidsyouth
Growing Up Online. Connected Kids. Report @kaspersky & @iconkidsyouth
 
Connecting Rural India
Connecting Rural IndiaConnecting Rural India
Connecting Rural India
 
How Moms Use Mobile Apps
How Moms Use Mobile AppsHow Moms Use Mobile Apps
How Moms Use Mobile Apps
 
Jigsaw Academy Digital India Contest - Uttarakhand & Himachal Pradesh
Jigsaw Academy Digital India Contest - Uttarakhand & Himachal PradeshJigsaw Academy Digital India Contest - Uttarakhand & Himachal Pradesh
Jigsaw Academy Digital India Contest - Uttarakhand & Himachal Pradesh
 
RURAL MARKETING DOCUMENTARY@RAVENSHAW UNIVERSITY AVILASH MOHAPATRA
RURAL MARKETING DOCUMENTARY@RAVENSHAW UNIVERSITY AVILASH MOHAPATRARURAL MARKETING DOCUMENTARY@RAVENSHAW UNIVERSITY AVILASH MOHAPATRA
RURAL MARKETING DOCUMENTARY@RAVENSHAW UNIVERSITY AVILASH MOHAPATRA
 
New parent
New parentNew parent
New parent
 
Rural Mobile
Rural MobileRural Mobile
Rural Mobile
 
Accenture masters-of-rural-markets-selling-profitably-rural-consumers
Accenture masters-of-rural-markets-selling-profitably-rural-consumersAccenture masters-of-rural-markets-selling-profitably-rural-consumers
Accenture masters-of-rural-markets-selling-profitably-rural-consumers
 
Country spotlight: India
Country spotlight: India Country spotlight: India
Country spotlight: India
 
Value Added Services in Rural India - Mobile VAS Asia 2009
Value Added Services in Rural India - Mobile VAS Asia 2009Value Added Services in Rural India - Mobile VAS Asia 2009
Value Added Services in Rural India - Mobile VAS Asia 2009
 
Rural marketing – Advancements in digital marketing - 2016
Rural marketing – Advancements in digital marketing - 2016Rural marketing – Advancements in digital marketing - 2016
Rural marketing – Advancements in digital marketing - 2016
 
#Fitspo: How Wellness is Disrupting Brands
#Fitspo: How Wellness is Disrupting Brands#Fitspo: How Wellness is Disrupting Brands
#Fitspo: How Wellness is Disrupting Brands
 
Rural Banking in India
Rural Banking in IndiaRural Banking in India
Rural Banking in India
 
Mobile Value Added Services in India
Mobile Value Added Services in IndiaMobile Value Added Services in India
Mobile Value Added Services in India
 

Similar to Securing Today’s Online Kids

Online safety
Online safetyOnline safety
Online safety
elioar8
 
Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)
Matt Forney
 
Technology and Safety
Technology and SafetyTechnology and Safety
Technology and Safety
Keith Haley
 
Tech Talent Meetup Hacking Security Event Recap
Tech Talent Meetup Hacking Security Event RecapTech Talent Meetup Hacking Security Event Recap
Tech Talent Meetup Hacking Security Event Recap
Dominic Vogel
 
Internet Use for Third & Fourth Graders
Internet Use for Third & Fourth GradersInternet Use for Third & Fourth Graders
Internet Use for Third & Fourth Graders
Barb Jansen
 
What's Next for Technology? Mansfield Senior Center 2014
What's Next for Technology? Mansfield Senior Center 2014What's Next for Technology? Mansfield Senior Center 2014
What's Next for Technology? Mansfield Senior Center 2014
Steve Sokoloski
 

Similar to Securing Today’s Online Kids (20)

Our Digital World - A look at E-safety issues for teenagers
Our Digital World - A look at E-safety issues for teenagersOur Digital World - A look at E-safety issues for teenagers
Our Digital World - A look at E-safety issues for teenagers
 
Online safety
Online safetyOnline safety
Online safety
 
eSafety and online security within schools
eSafety and online security within schoolseSafety and online security within schools
eSafety and online security within schools
 
Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)Parent GuideBook Internet Safety (1)
Parent GuideBook Internet Safety (1)
 
Ouch 201705 en
Ouch 201705 enOuch 201705 en
Ouch 201705 en
 
Safety Net: A Parent's Guide (Infographic)
Safety Net: A Parent's Guide (Infographic)Safety Net: A Parent's Guide (Infographic)
Safety Net: A Parent's Guide (Infographic)
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pests
 
Technology and Safety
Technology and SafetyTechnology and Safety
Technology and Safety
 
Securityguide
SecurityguideSecurityguide
Securityguide
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 
eTracemate
eTracemateeTracemate
eTracemate
 
The Internet Keep Safe Coalition
The Internet Keep Safe CoalitionThe Internet Keep Safe Coalition
The Internet Keep Safe Coalition
 
Kinderguarded Intro
Kinderguarded IntroKinderguarded Intro
Kinderguarded Intro
 
Internet / Cyber Security
Internet / Cyber SecurityInternet / Cyber Security
Internet / Cyber Security
 
Tech Talent Meetup Hacking Security Event Recap
Tech Talent Meetup Hacking Security Event RecapTech Talent Meetup Hacking Security Event Recap
Tech Talent Meetup Hacking Security Event Recap
 
Internet Use for Third & Fourth Graders
Internet Use for Third & Fourth GradersInternet Use for Third & Fourth Graders
Internet Use for Third & Fourth Graders
 
Online safety 101
Online safety 101Online safety 101
Online safety 101
 
What's Next for Technology? Mansfield Senior Center 2014
What's Next for Technology? Mansfield Senior Center 2014What's Next for Technology? Mansfield Senior Center 2014
What's Next for Technology? Mansfield Senior Center 2014
 
Freedom of Speech
Freedom of Speech Freedom of Speech
Freedom of Speech
 
Opsec for security researchers
Opsec for security researchersOpsec for security researchers
Opsec for security researchers
 

More from Priyanka Aash

More from Priyanka Aash (20)

Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
 
Verizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfVerizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdf
 
Top 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfTop 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdf
 
Simplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfSimplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdf
 
Generative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfGenerative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdf
 
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfEVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
 
DPDP Act 2023.pdf
DPDP Act 2023.pdfDPDP Act 2023.pdf
DPDP Act 2023.pdf
 
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfCyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
 
Cyber Crisis Management.pdf
Cyber Crisis Management.pdfCyber Crisis Management.pdf
Cyber Crisis Management.pdf
 
CISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfCISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdf
 
Chennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfChennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdf
 
Cloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfCloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdf
 
Stories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldStories From The Web 3 Battlefield
Stories From The Web 3 Battlefield
 
Lessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksLessons Learned From Ransomware Attacks
Lessons Learned From Ransomware Attacks
 
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
 
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
 
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
 
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsCloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 

Recently uploaded

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Recently uploaded (20)

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 

Securing Today’s Online Kids

  • 1. SESSION ID: #RSAC Lance Spitzner Securing Today’s Online Kids HUM-WO5F Director SANS Securing The Human @Twitter lspitzner@sans.org
  • 2. Presenter’s Company Logo – replace on master slide #RSAC Goal To enable children to leverage technology safely and securely. To become good digital citizens / leaders. Remember, we are not securing data but reputations and futures.
  • 3. Presenter’s Company Logo – replace on master slide #RSAC Challenges For Parents No Reference: Kids growing up in a world we never experienced. Always Connected: Kids have constant Internet access through a variety of devices.
  • 4. Presenter’s Company Logo – replace on master slide #RSAC Top Three Threats Strangers Friends Themselves
  • 5. Presenter’s Company Logo – replace on master slide #RSAC Strangers Same concerns we faced as kids, however today’s strangers can target kids globally, remotely and anonymously. Sexual Predators Sextortion Fraud (game accounts) Law enforcement is actively targeting this threat.
  • 6. Presenter’s Company Logo – replace on master slide #RSAC Friends Same threats we faced as kids, but on a bigger scale and can happen anonymously. Cyber bullying (griefing / salty / trolling) Pranks / Sextortion Ex boyfriend / girlfriend. Bad examples (swearing / excessive gaming / online late) Law enforcement may not be able to help you here.
  • 7. Presenter’s Company Logo – replace on master slide #RSAC Themselves Sharing too much: with public (social media) or with friends (sexting) Accessing / watching inappropriate content Too much online time Bullying / harassing others (reputation) Downloading / sharing copyrighted material
  • 8. Presenter’s Company Logo – replace on master slide #RSAC Common Theme What is one thing all three of these risks share? COMMUNICATION 8
  • 10. Presenter’s Company Logo – replace on master slide #RSAC Education / Communication Talking with kids is THE strongest weapon you have. Technology cannot keep up, nor can you outsource parenting. Mentor your kids on how to behave, just like we do in the real world. Ultimately this is about values. Ensure your kids feel comfortable talking to you. Ask them to show the technologies they are using and how they use them. Explain the “Golden Rule” - no consequences when reporting.
  • 11. Presenter’s Company Logo – replace on master slide #RSAC Dedicated Computer Have a computer dedicated just for the kids. Keep it updated / patched with AV and firewall. Make sure each child has their own, non-privileged account. Have your children be responsible for keeping the computer up to date and secure (let them rebuild it when it gets slow). My kids only use computer for gaming and writing reports.
  • 12. Presenter’s Company Logo – replace on master slide #RSAC Mobile Devices – Where the Action Is Have a central, family charging station. All devices go there when devices are not in use and before kids go to bed. When kids leave house, smartphone has to be on, tracking enabled, and they have to respond to all messages from Mom or Dad (no phone dying due to too much gaming).
  • 13. Presenter’s Company Logo – replace on master slide #RSAC Rules Contract Agree upon rules before giving kids access to new technology (smartphone / tablet, etc). Like any Acceptable Use Policy, you will need to update it as kids get older. Times kids can or cannot be online. Tie grades to use of devices, get below an 85 in any class, lose your mobile device. What they can and cannot do. Who to report any questions or concerns to. www.janellburleyhofmann.com/the-contract
  • 14. Presenter’s Company Logo – replace on master slide #RSAC Grandparents / Family Just like you train your kids, you may need to train other family members. When kids are at Grandma’s, what rules apply, does Grandma know the rules? What happens at Grandma’s stays at Grandma’s
  • 15. Presenter’s Company Logo – replace on master slide #RSAC Technology Filtering is active, you to control what activity your children can and cannot do online. Monitoring is passive, it only logs and reports what your children were doing.
  • 16. Presenter’s Company Logo – replace on master slide #RSAC Filtering Most effective for younger children, prevents them from accidently accessing harmful content As children get older, easier to bypass. In addition, as they get older they need more access (i.e. homework) Certain websites are their own ‘ecosystem’ and hard to filter, such as YouTube, Netflix, Steam, Facebook or Instagram.
  • 17. Presenter’s Company Logo – replace on master slide #RSAC OpenDNS Free service, set-up as your DNS server. Will block attempts to connect to any server based on settings. Excellent for filtering website activity and protecting against malicious sites. Poor reporting. www.opendns.org
  • 18. Presenter’s Company Logo – replace on master slide #RSAC Monitoring If you want to monitor, start early. Hard to start monitoring when they are 16. Overwhelmed by data / automated reporting. For mobile devices, if you want to monitor your kids Android has greatest capabilities. Teen Safe My Mobile Watchdog Web Watcher
  • 19. Presenter’s Company Logo – replace on master slide #RSAC Other Options Windows – Family Safety Mac OS X – Parental Controls Most phone service providers have monitoring, reporting & parental controls. Create a FB / Instagram account and friend your kids.
  • 20. Presenter’s Company Logo – replace on master slide #RSAC Set a Good Example Show your kids how you securely maintain your own computer. When talking to your kids, stop using technology and look them in the eye. Behave on the Internet as you would want your kids to. Don’t use technology at the dinner table, late at night in bed or family events.
  • 21. Presenter’s Company Logo – replace on master slide #RSAC Got a Geek? Get Them Involved Cyber Aces www.cyberaces.org Cyber Patriot www.uscyberpatriot.org Cyber Challenge www.uscyberchallenge.org Code Academy www.codeacademy.com Khan Academy www.khanacademy.org Scholarships www.sfs.opm.gov
  • 22. Presenter’s Company Logo – replace on master slide #RSAC When You Get Home • Communication is key, this is not about technology, it’s about values. Start the dialogue by asking your kids what are their favorite apps and have them show you how the apps work. • Create a dedicated charging station for your kids and keep devices in an open area. • Create a contract for you and your kids. • Stop using technology when they want to talk to you.
  • 23. Presenter’s Company Logo – replace on master slide #RSAC Learn More securingthehuman.sans.org/resources/kids www.rsaconference.com/safe