SlideShare a Scribd company logo
1 of 37
Download to read offline
© 2020 Attivo Networks. All rights reserved. 1Confidential
Transform your biggest risks into one of your greatest allies
human dilemma_
Webinar starts at
12:00 pm AEDT
/the
© 2020 Attivo Networks. All rights reserved. 2Confidential
Transform your biggest risks into one of your greatest allies
human dilemma_
/the
+
Our Speakers
Jacqueline Jayne
KnowBe4
Security Awareness Advocate - APAC
Kelvin Heath
Vectra
Chief Security Officer
human dilemma_
/the
5
90%
of successful data breaches
started with a phishing
attack
• 90% of successful data breaches
started with a phishing attack
• In Australia, 65% of Businesses
reported interruptions due to a
security breach in the last year
• 60% of small business who
experienced a major cyber incident
never recover
Reality by Numbers
6
Percentage of
organisations that
have been breached
in the past 12
months
• 35% of Japanese
• 34% of Australian
• 33.5% of Indian
• 32% of Malaysian
• 26% of Singapore
• 24% of Philippines
70% say educating employees
and leaders is their biggest
challenge and 60% struggle to
provide it
https://www.sophos.com/en-us/medialibrary/Gated-Assets/white-
papers/sophos-the-future-of-cybersecurity-in-apj.pdf
7
Human Error
• 1,300,000 Facebook logins
• 19,000,000 texts sent
• 190,000,000 emails sent
• $1,100,000 spent online
Wait One Minute!
9
Agenda
• The Perception vs. Reality dilemma
• Understanding the OODA (Observe, Orient,
Decide, Act) Loop
• How social engineers and scam artists
achieve their goals by subverting its
different components
• How we can defend ourselves and our
organisations
10
Pick a card
11
Is it gone?
12
How did I do it?
We started with this:
And ended with this:
These are two completely different sets of cards.
And by rushing you through the process, you probably didn’t notice!
13
Our brains’ job
is to filter, interpret,
and present us
with ‘reality’
Understanding the root of deception
14
What is REALITY?
15
"It deosn't mttaer in waht oredr the ltteers in a
wrod are, the olny iprmoetnt tihng is taht the
frist and lsat ltteer be in the rghit pclae.
The rset can be a toatl mses and you can sitll
raed it wouthit a porbelm.
Tihs is bcuseae the huamn mnid deos not raed
ervey lteter by istlef, but the wrod as a wlohe."
16
Agenda
• The Perception vs. Reality dilemma
• Understanding the OODA (Observe, Orient,
Decide, Act) Loop
• How social engineers and scam artists
achieve their goals by subverting its
different components
• How we can defend ourselves and our
organisations
OODA
-----------
A Model for
Decision
Making
OBSERVE
ORIENT
DECIDE
ACT
18
OBSERVE
ORIENT
DECIDE
ACT
OBSERVE
ORIENT
DECIDE
CRITICAL THINKING STEPS
The ideal situation for a
social engineer is to hijack
the OODA loop by creating a
knee-jerk action that
effectively bypasses the first
three steps and results in the
attacker’s intended Action.
19
OBSERVE
ORIENT
DECIDE
ACT
OBSERVE
ORIENT
DECIDE
Messing with the OODA Loop
• Manipulate facts
• Withhold facts
• Manipulate Context
• Manipulate Attention
• Exploit known bias
• Invoke Emotion
• Feed them a ”truth sandwich”
20
Agenda
• The Perception vs. Reality dilemma
• Understanding the OODA (Observe, Orient,
Decide, Act) Loop
• How social engineers and scam artists
achieve their goals by subverting its
different components
• How we can defend ourselves and our
organisations
21
Disinformation
watch videotocontinue
error
to solve
clickhere
advertising
wait5 secondS
downloadskip
click here
getfreemoney!
$
22
Immediate Stressor Events
https://www.mailguard.com.au
23
Immediate Stressor Events
https://www.mailguard.com.au
24
Immediate Stressor Events
https://www.mailguard.com.au
25
Immediate Stressor Events
https://www.mailguard.com.au
26
https://www.cyber.gov.au/threats
https://auspost.com.au/
Smishing
27
Agenda
• The Perception vs. Reality dilemma
• Understanding the OODA (Observe, Orient, Decide, Act)
Loop
• How social engineers and scam artists achieve their
goals by subverting its different components
• How we can defend ourselves and our organisations
28
If you try to work against human nature,
you will fail…
30
It’s a Human Condition
Are You Being Manipulated?
-- understand the lures --
Greed
Urgency
Curiosity
Fear
Self Interest
Helpfulness
+
Where does Security Awareness & Training fit in
with my Cyber Security Compliance & Frameworks?
NIST ISO 27001PCI DSS
33
Security Awareness and Education Program
34
Phishing Security Test
Phishing Reply Test
Phishing
Security Awareness
Training Password Email Security Malware
Social Media Phishing Test
Phish Alert Button
Second Chance
Automated Security
Awareness Program
(ASAP)
Training Preview
Breached Password Test
Weak Password Test
Password Exposure Test
Multi-Factor
Authentication
Security Assessment
Email Exposure
Check Pro
Domain Spoof Test
Mailserver Assessment
(MSA)
Domain Doppelgänger
Ransomware
Simulator Tool
USB Security Test
E-Books Case Studies White Papers BlogResearchWebinarsGlossary …and more!
FREE Tools and Resources https://www.knowbe4.com/resources
35
Products and Services
Kevin Mitnick
Security Awareness Training
Enterprise Security
Awareness Training
Identify and respond to email
threats faster with PhishER
Streamline your compliance,
risk, and audit management
with KCM GRC.
Book a KnowBe4
Platform Overview
+
For more information and to book your
KnowBe4 platform demonstration
Visit our partner page!
https://www.vectracorp.com/partners/knowbe4
Questions?
© 2020 Attivo Networks. All rights reserved. 37Confidential
THANK YOU !
Contact us on:
vectra-corp.com
vimeo.com/vectra
linkedin.com/company/vectra-corporation-ltd
info@vectra-corp.com

More Related Content

Similar to The Human Delimma - KnowBe4 & Vectra

I Was A Guest Lecturer at Yeditepe University MBA Program in Turkey
I Was A Guest Lecturer at Yeditepe University MBA Program in TurkeyI Was A Guest Lecturer at Yeditepe University MBA Program in Turkey
I Was A Guest Lecturer at Yeditepe University MBA Program in TurkeyFahri Karakas
 
Practical Advantages of a Security Educated Workforce
Practical Advantages of a Security Educated WorkforcePractical Advantages of a Security Educated Workforce
Practical Advantages of a Security Educated WorkforceKeyaan Williams
 
Malware in the Wild: Evolving to Evade Detection
Malware in the Wild: Evolving to Evade DetectionMalware in the Wild: Evolving to Evade Detection
Malware in the Wild: Evolving to Evade DetectionLastline, Inc.
 
The trinity fuelling the future of project management
The trinity fuelling the future of project managementThe trinity fuelling the future of project management
The trinity fuelling the future of project managementUlohomuno, Eze Afieroho PMP
 
Bad Advice, Unintended Consequences, and Broken Paradigms: Think & Act Di...
Bad Advice, Unintended Consequences, and Broken Paradigms: Think & Act Di...Bad Advice, Unintended Consequences, and Broken Paradigms: Think & Act Di...
Bad Advice, Unintended Consequences, and Broken Paradigms: Think & Act Di...Steve Werby
 
War Against Terrorism - CIO's Role
War Against Terrorism - CIO's RoleWar Against Terrorism - CIO's Role
War Against Terrorism - CIO's RoleAyodeji Rotibi
 
Failing and Failing Fast in AppDev – How Do We Keep up in AppSec?
Failing and Failing Fast in AppDev – How Do We Keep up in AppSec?Failing and Failing Fast in AppDev – How Do We Keep up in AppSec?
Failing and Failing Fast in AppDev – How Do We Keep up in AppSec?Capgemini
 
Scot Secure 2017
Scot Secure 2017Scot Secure 2017
Scot Secure 2017Ray Bugg
 
Red vs. Blue Why we’ve been getting it wrong for 25 years
Red vs. Blue Why we’ve been getting it wrong for 25 yearsRed vs. Blue Why we’ve been getting it wrong for 25 years
Red vs. Blue Why we’ve been getting it wrong for 25 yearsEC-Council
 
Risk - effective engagement v. Management tick box exercise?
Risk - effective engagement v. Management tick box exercise?Risk - effective engagement v. Management tick box exercise?
Risk - effective engagement v. Management tick box exercise?Warwick Business School
 
Getting to know you: the psychology of information management
Getting to know you: the psychology of information managementGetting to know you: the psychology of information management
Getting to know you: the psychology of information managementHeather Jack
 
2-sec "A Day in the Life of a Cyber Security Professional" Interop London Jun...
2-sec "A Day in the Life of a Cyber Security Professional" Interop London Jun...2-sec "A Day in the Life of a Cyber Security Professional" Interop London Jun...
2-sec "A Day in the Life of a Cyber Security Professional" Interop London Jun...2-sec
 
Airport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyAirport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyRussell Publishing
 
2015 LOMA Conference - Third party risk management - Session 20
2015 LOMA Conference - Third party risk management - Session 202015 LOMA Conference - Third party risk management - Session 20
2015 LOMA Conference - Third party risk management - Session 20Marc S. Sokol
 
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...Matt Hathaway
 
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...Alexandre Sieira
 

Similar to The Human Delimma - KnowBe4 & Vectra (20)

I Was A Guest Lecturer at Yeditepe University MBA Program in Turkey
I Was A Guest Lecturer at Yeditepe University MBA Program in TurkeyI Was A Guest Lecturer at Yeditepe University MBA Program in Turkey
I Was A Guest Lecturer at Yeditepe University MBA Program in Turkey
 
Practical Advantages of a Security Educated Workforce
Practical Advantages of a Security Educated WorkforcePractical Advantages of a Security Educated Workforce
Practical Advantages of a Security Educated Workforce
 
Malware in the Wild: Evolving to Evade Detection
Malware in the Wild: Evolving to Evade DetectionMalware in the Wild: Evolving to Evade Detection
Malware in the Wild: Evolving to Evade Detection
 
The trinity fuelling the future of project management
The trinity fuelling the future of project managementThe trinity fuelling the future of project management
The trinity fuelling the future of project management
 
Bad Advice, Unintended Consequences, and Broken Paradigms: Think & Act Di...
Bad Advice, Unintended Consequences, and Broken Paradigms: Think & Act Di...Bad Advice, Unintended Consequences, and Broken Paradigms: Think & Act Di...
Bad Advice, Unintended Consequences, and Broken Paradigms: Think & Act Di...
 
Group Interview Paper
Group Interview PaperGroup Interview Paper
Group Interview Paper
 
War Against Terrorism - CIO's Role
War Against Terrorism - CIO's RoleWar Against Terrorism - CIO's Role
War Against Terrorism - CIO's Role
 
Failing and Failing Fast in AppDev – How Do We Keep up in AppSec?
Failing and Failing Fast in AppDev – How Do We Keep up in AppSec?Failing and Failing Fast in AppDev – How Do We Keep up in AppSec?
Failing and Failing Fast in AppDev – How Do We Keep up in AppSec?
 
Scot Secure 2017
Scot Secure 2017Scot Secure 2017
Scot Secure 2017
 
Red vs. Blue Why we’ve been getting it wrong for 25 years
Red vs. Blue Why we’ve been getting it wrong for 25 yearsRed vs. Blue Why we’ve been getting it wrong for 25 years
Red vs. Blue Why we’ve been getting it wrong for 25 years
 
Risk - effective engagement v. Management tick box exercise?
Risk - effective engagement v. Management tick box exercise?Risk - effective engagement v. Management tick box exercise?
Risk - effective engagement v. Management tick box exercise?
 
2012 777 The Seven Blind Spots in Business and How to Prevent Them
2012 777   The Seven Blind Spots in Business and How to Prevent Them2012 777   The Seven Blind Spots in Business and How to Prevent Them
2012 777 The Seven Blind Spots in Business and How to Prevent Them
 
Getting to know you: the psychology of information management
Getting to know you: the psychology of information managementGetting to know you: the psychology of information management
Getting to know you: the psychology of information management
 
2-sec "A Day in the Life of a Cyber Security Professional" Interop London Jun...
2-sec "A Day in the Life of a Cyber Security Professional" Interop London Jun...2-sec "A Day in the Life of a Cyber Security Professional" Interop London Jun...
2-sec "A Day in the Life of a Cyber Security Professional" Interop London Jun...
 
Airport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyAirport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthy
 
2015 LOMA Conference - Third party risk management - Session 20
2015 LOMA Conference - Third party risk management - Session 202015 LOMA Conference - Third party risk management - Session 20
2015 LOMA Conference - Third party risk management - Session 20
 
Educause+V4.ppt
Educause+V4.pptEducause+V4.ppt
Educause+V4.ppt
 
Hacker House August Proposal
Hacker House August ProposalHacker House August Proposal
Hacker House August Proposal
 
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...
 
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...
 

Recently uploaded

Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 

Recently uploaded (20)

Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 

The Human Delimma - KnowBe4 & Vectra