SlideShare a Scribd company logo
1 of 16
Security Matters It’s not about the network
What’s Your Biggest Threat? http://flickr.com/photos/mikeygottawa/533355476/
The Top 12 Security Threats Reported by CTOs ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Top 12 Security Threats Reported by CTOs ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Top 2 (and #6) Security Threats The Cost of an “Inside Job” ,[object Object],[object Object]
Security Philosophy Control What You Can ,[object Object],[object Object]
Control What You Can Networks ,[object Object],[object Object],[object Object],[object Object],http://flickr.com/photos/abbyladybug/930518276/
Control What You Can Workstations ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],http://flickr.com/photos/53088165@N00/579761138/
Control What You Can In the Cloud ,[object Object],[object Object],[object Object],[object Object],http://flickr.com/photos/86778817@N00/88641569/
Control What You Can Devices / Drives ,[object Object],[object Object],http://flickr.com/photos/ian-s/2152798588/
Security Philosophy IT’s More than Digital ,[object Object],[object Object]
Security Philosophy Plug the Biggest Holes ,[object Object],[object Object],[object Object]
Security Philosophy Plan for Failure ,[object Object],[object Object]
Security Philosophy Train for Success ,[object Object],[object Object],[object Object]
Security Resources ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
As we look ahead into the next century, leaders will be those who empower others. - Bill Gates, founder Microsoft

More Related Content

What's hot

Craft Your Cyber Incident Response Plan (Before It's Too Late)
Craft Your Cyber Incident Response Plan (Before It's Too Late)Craft Your Cyber Incident Response Plan (Before It's Too Late)
Craft Your Cyber Incident Response Plan (Before It's Too Late)
Resilient Systems
 
Comprehensive risk management for a cyber secure organization
Comprehensive risk management for a cyber secure organizationComprehensive risk management for a cyber secure organization
Comprehensive risk management for a cyber secure organization
Joe Hessmiller
 
International Conference on Cyber Security, Hide and Go Seek
International Conference on Cyber Security, Hide and Go SeekInternational Conference on Cyber Security, Hide and Go Seek
International Conference on Cyber Security, Hide and Go Seek
David Knox
 

What's hot (20)

Are Your IT Systems Secure?
Are Your IT Systems Secure?Are Your IT Systems Secure?
Are Your IT Systems Secure?
 
Identify and Stop Insider Threats
Identify and Stop Insider ThreatsIdentify and Stop Insider Threats
Identify and Stop Insider Threats
 
Craft Your Cyber Incident Response Plan (Before It's Too Late)
Craft Your Cyber Incident Response Plan (Before It's Too Late)Craft Your Cyber Incident Response Plan (Before It's Too Late)
Craft Your Cyber Incident Response Plan (Before It's Too Late)
 
How to Catch a Wolf in Sheep's Clothing
How to Catch a Wolf in Sheep's ClothingHow to Catch a Wolf in Sheep's Clothing
How to Catch a Wolf in Sheep's Clothing
 
Internal Threats: The New Sources of Attack
Internal Threats: The New Sources of AttackInternal Threats: The New Sources of Attack
Internal Threats: The New Sources of Attack
 
Five things I learned about information security
Five things I learned about information securityFive things I learned about information security
Five things I learned about information security
 
Art Hathaway - Artificial Intelligence - Real Threat Prevention
Art Hathaway - Artificial Intelligence - Real Threat PreventionArt Hathaway - Artificial Intelligence - Real Threat Prevention
Art Hathaway - Artificial Intelligence - Real Threat Prevention
 
Comprehensive Data Leak Prevention
Comprehensive Data Leak PreventionComprehensive Data Leak Prevention
Comprehensive Data Leak Prevention
 
The Insider Threat
The Insider ThreatThe Insider Threat
The Insider Threat
 
Insider Threat - How Do You Find a Wolf in Sheep's Clothing?
Insider Threat - How Do You Find a Wolf in Sheep's Clothing?Insider Threat - How Do You Find a Wolf in Sheep's Clothing?
Insider Threat - How Do You Find a Wolf in Sheep's Clothing?
 
Automation of Information (Cyber) Security by Joe Hessmiller
Automation of Information (Cyber) Security by Joe HessmillerAutomation of Information (Cyber) Security by Joe Hessmiller
Automation of Information (Cyber) Security by Joe Hessmiller
 
Comprehensive risk management for a cyber secure organization
Comprehensive risk management for a cyber secure organizationComprehensive risk management for a cyber secure organization
Comprehensive risk management for a cyber secure organization
 
The insider versus external threat
The insider versus external threatThe insider versus external threat
The insider versus external threat
 
Cyber security do your part be the resistance
Cyber security do your part be the resistanceCyber security do your part be the resistance
Cyber security do your part be the resistance
 
Assessing Your security
Assessing Your securityAssessing Your security
Assessing Your security
 
Unintentional Insider Threat featuring Dr. Eric Cole
Unintentional Insider Threat featuring Dr. Eric ColeUnintentional Insider Threat featuring Dr. Eric Cole
Unintentional Insider Threat featuring Dr. Eric Cole
 
The Accidental Insider Threat
The Accidental Insider ThreatThe Accidental Insider Threat
The Accidental Insider Threat
 
Data Breaches: Is IBM i Really at Risk?
Data Breaches: Is IBM i Really at Risk?Data Breaches: Is IBM i Really at Risk?
Data Breaches: Is IBM i Really at Risk?
 
Top Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your BusinessTop Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your Business
 
International Conference on Cyber Security, Hide and Go Seek
International Conference on Cyber Security, Hide and Go SeekInternational Conference on Cyber Security, Hide and Go Seek
International Conference on Cyber Security, Hide and Go Seek
 

Similar to Nonprofit Security Matters: It's Not About the Network

CISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docxCISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
mccormicknadine86
 
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docxCISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
sleeperharwell
 
Managing insider threat
Managing insider threatManaging insider threat
Managing insider threat
milliemill
 
Use speaker notes on each slide I need 6 slides EXCLUDING cover page.docx
Use speaker notes on each slide I need 6 slides EXCLUDING cover page.docxUse speaker notes on each slide I need 6 slides EXCLUDING cover page.docx
Use speaker notes on each slide I need 6 slides EXCLUDING cover page.docx
gidmanmary
 
BLACKOPS_USCS CyberSecurity Literacy
BLACKOPS_USCS CyberSecurity LiteracyBLACKOPS_USCS CyberSecurity Literacy
BLACKOPS_USCS CyberSecurity Literacy
Casey Fleming
 
Research Paper Sentence OutlineResearch Question How e-commer.docx
Research Paper Sentence OutlineResearch Question How e-commer.docxResearch Paper Sentence OutlineResearch Question How e-commer.docx
Research Paper Sentence OutlineResearch Question How e-commer.docx
audeleypearl
 

Similar to Nonprofit Security Matters: It's Not About the Network (20)

CISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docxCISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
 
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docxCISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
 
IT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 ConferenceIT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 Conference
 
Proactive incident response
Proactive incident responseProactive incident response
Proactive incident response
 
Cybersecurity - Sam Maccherola
Cybersecurity - Sam MaccherolaCybersecurity - Sam Maccherola
Cybersecurity - Sam Maccherola
 
Forensics
ForensicsForensics
Forensics
 
Managing insider threat
Managing insider threatManaging insider threat
Managing insider threat
 
Mobile Security: 5 Steps to Mobile Risk Management
Mobile Security: 5 Steps to Mobile Risk ManagementMobile Security: 5 Steps to Mobile Risk Management
Mobile Security: 5 Steps to Mobile Risk Management
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security Basics
 
The Top Ten Insider Threats And How To Prevent Them
The Top Ten Insider Threats And How To Prevent ThemThe Top Ten Insider Threats And How To Prevent Them
The Top Ten Insider Threats And How To Prevent Them
 
Group 13
Group 13Group 13
Group 13
 
2008 Trends
2008 Trends2008 Trends
2008 Trends
 
Use speaker notes on each slide I need 6 slides EXCLUDING cover page.docx
Use speaker notes on each slide I need 6 slides EXCLUDING cover page.docxUse speaker notes on each slide I need 6 slides EXCLUDING cover page.docx
Use speaker notes on each slide I need 6 slides EXCLUDING cover page.docx
 
Security Threats for SMBs
Security Threats for SMBsSecurity Threats for SMBs
Security Threats for SMBs
 
BLACKOPS_USCS CyberSecurity Literacy
BLACKOPS_USCS CyberSecurity LiteracyBLACKOPS_USCS CyberSecurity Literacy
BLACKOPS_USCS CyberSecurity Literacy
 
First Responders Course - Session 3 - Monitoring and Controlling Incident Costs
First Responders Course - Session 3 - Monitoring and Controlling Incident CostsFirst Responders Course - Session 3 - Monitoring and Controlling Incident Costs
First Responders Course - Session 3 - Monitoring and Controlling Incident Costs
 
Research Paper Sentence OutlineResearch Question How e-commer.docx
Research Paper Sentence OutlineResearch Question How e-commer.docxResearch Paper Sentence OutlineResearch Question How e-commer.docx
Research Paper Sentence OutlineResearch Question How e-commer.docx
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
 
Preventing Data Breaches
Preventing Data BreachesPreventing Data Breaches
Preventing Data Breaches
 
5 Steps to Mobile Risk Management
5 Steps to Mobile Risk Management5 Steps to Mobile Risk Management
5 Steps to Mobile Risk Management
 

More from Holly Ross

The New Data Imperative
The New Data ImperativeThe New Data Imperative
The New Data Imperative
Holly Ross
 
MNA Lose Control
MNA Lose ControlMNA Lose Control
MNA Lose Control
Holly Ross
 
MNA - Lose Control
MNA - Lose ControlMNA - Lose Control
MNA - Lose Control
Holly Ross
 
Wearemedia Buzz Webinar
Wearemedia Buzz WebinarWearemedia Buzz Webinar
Wearemedia Buzz Webinar
Holly Ross
 
Fundraising In Social Media - CNA
Fundraising In Social Media - CNAFundraising In Social Media - CNA
Fundraising In Social Media - CNA
Holly Ross
 
Twitter Me This: Intro to Twitter
Twitter Me This: Intro to TwitterTwitter Me This: Intro to Twitter
Twitter Me This: Intro to Twitter
Holly Ross
 
Five Trends that will Impact IT
Five Trends that will Impact ITFive Trends that will Impact IT
Five Trends that will Impact IT
Holly Ross
 

More from Holly Ross (20)

WVDO: People Still Give to People
WVDO: People Still Give to PeopleWVDO: People Still Give to People
WVDO: People Still Give to People
 
Social Media in 30 Minutes a Day
Social Media in 30 Minutes a DaySocial Media in 30 Minutes a Day
Social Media in 30 Minutes a Day
 
Tech Leadership for the Sustainable Win
Tech Leadership for the Sustainable WinTech Leadership for the Sustainable Win
Tech Leadership for the Sustainable Win
 
ConnectingUp Keynote: Leading Change
ConnectingUp Keynote: Leading ChangeConnectingUp Keynote: Leading Change
ConnectingUp Keynote: Leading Change
 
The New Data Imperative
The New Data ImperativeThe New Data Imperative
The New Data Imperative
 
AFP: A Facebook Page your Fans Will Like (or Even Love!)
AFP: A Facebook Page your Fans Will Like (or Even Love!)AFP: A Facebook Page your Fans Will Like (or Even Love!)
AFP: A Facebook Page your Fans Will Like (or Even Love!)
 
Unlocking the True Value of Social Media
Unlocking the True Value of Social Media Unlocking the True Value of Social Media
Unlocking the True Value of Social Media
 
Art of Technology: Data Management
Art of Technology: Data ManagementArt of Technology: Data Management
Art of Technology: Data Management
 
Art of Technology: Core Technical Services
Art of Technology: Core Technical ServicesArt of Technology: Core Technical Services
Art of Technology: Core Technical Services
 
Art of Technology: Social Media
Art of Technology: Social MediaArt of Technology: Social Media
Art of Technology: Social Media
 
Social Media for Beginners
Social Media for BeginnersSocial Media for Beginners
Social Media for Beginners
 
Let A Thousand Tech Flowers Bloom
Let A Thousand Tech Flowers BloomLet A Thousand Tech Flowers Bloom
Let A Thousand Tech Flowers Bloom
 
Message is the Medium
Message is the MediumMessage is the Medium
Message is the Medium
 
Mission Based Technology Planning
Mission Based Technology PlanningMission Based Technology Planning
Mission Based Technology Planning
 
MNA Lose Control
MNA Lose ControlMNA Lose Control
MNA Lose Control
 
MNA - Lose Control
MNA - Lose ControlMNA - Lose Control
MNA - Lose Control
 
Wearemedia Buzz Webinar
Wearemedia Buzz WebinarWearemedia Buzz Webinar
Wearemedia Buzz Webinar
 
Fundraising In Social Media - CNA
Fundraising In Social Media - CNAFundraising In Social Media - CNA
Fundraising In Social Media - CNA
 
Twitter Me This: Intro to Twitter
Twitter Me This: Intro to TwitterTwitter Me This: Intro to Twitter
Twitter Me This: Intro to Twitter
 
Five Trends that will Impact IT
Five Trends that will Impact ITFive Trends that will Impact IT
Five Trends that will Impact IT
 

Recently uploaded

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Recently uploaded (20)

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 

Nonprofit Security Matters: It's Not About the Network

  • 1. Security Matters It’s not about the network
  • 2. What’s Your Biggest Threat? http://flickr.com/photos/mikeygottawa/533355476/
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16. As we look ahead into the next century, leaders will be those who empower others. - Bill Gates, founder Microsoft