Slides from a webinar presented Nov. 16, 2023 by Capitol Technology University and featuring Tom Vazdar, a noted banking cybersecurity expert from Europe.
3. Bill Gibbs
Cap Tech Talks Coordinator
1. About Capitol Technology University
2. Session Pointers
3. The Center for Women in Cyber
4. About the Presenter
5. Presentation
6. Q & A
7. Upcoming Webinars in the CWC Series
8. Recording, Slides, Certificate
Agenda
3
4. About
Established in 1927, we are
one of the few private
Universities in the U.S.
specifically dedicated to
STEM-Based
academic programs. The
University offers degrees at
the Associate, Bachelor,
Master, and Doctoral levels
4
5. Nonprofit, Private &
Accredited
Capitol is a nonprofit, private accredited university
located in Laurel, Maryland, USA
Capitol Technology University is
accredited by the Commission on
Higher Education of the Middle
States Association of Colleges
and Schools
The University is authorized by the
State of Maryland to confer
Associate’s (A.A.S.), Bachelor’s (B.S.),
Master’s (M.S., M.B.A., M.Ed, M.Res.,
T.M.B.A, M.Phil.), and Doctoral
(D.Sc., Ph.D., D.B.A., Ed.D.) degrees.
6. • We will answer questions at the conclusion of the presentation. At any time
you can post a question in the text chat and we will answer as many as we
can.
• Microphones and webcams are not activated for participants.
• A link to the recording and to the slides will be sent to all registrants and
available on our webinar web page.
• A participation certificate is available by request for both Live Session and On
Demand viewers.
Session Pointers
6
8. About the presenter: Tom Vazdar, CISSP
• Founder and Director of Riskoria Advising & Professional Services
• Former Chief Security Officer/Chief Information Officer
• Focus on intersection of risk management, policy and compliance
with special focus on the banking industry
• Based in Europe
• Has worked with EUROPOL, ENISA, European Payments Council
and the European Cooperation in Science and Technology (COST)
Association
• Completing a Ph.D. in Economics and Global Security at the
University of Zagreb (Croatia)
• Certified Information Systems Security Professional (CISSP)
8
10. November 16, 2023, CAPitol technology university WEBINAR
Tom Vazdar, CISSP ⏐ Riskoria advising & professional services
Banking on Security
Transferring Cybersecurity Culture to SMEs
11. Banking on Security:
Transferring Cybersecurity Culture to SMEs
Introduction
SMEs
Vulnerable yet Vital Players in the
Economy
Banking Sector
A Cybersecurity Role Model for
SMEs
Significance of
Cybersecurity in the
Digital Age
12. Adopting Banking
Strategies for
SMEs
• Bridging the Cybersecurity Knowledge Gap
• Banking Strategies as a Blueprint for SMEs
• Goal: Enhancing SMEs' Cybersecurity Readiness
13. Earlydays
(late1960s– 1980s)
Internet was designed to
facilitate openness and
information sharing, not
security.
History of
cybersecurity
culture
The prevalence of
viruses, worms, and
espionage let to the
development of the first
antivirus software and
firewalls.
Cyber threats become
more complex, and it
become evident that a
proactive approach to
cybersecurity was
necessary.
Evident that technology
alone was insufficient to
prevent cyber threats,
the idea of cybersecurity
culture emerged.
It will continue to evolve
alongside cyber threats.
The use of AI, continuous
education and training
will receive more
attention in the future.
Rise ofCyberThreats
(1990s– 2000s)
Shifttoproactivesecurity
(Mid 2000s – present)
Emergenceof
cybersecurityculture
(Mid 2000s – Present)
Futureofcybersecurity
culture
14. Cybersecurity in the
banking industry
Employees handle sensitive information
properly and share it only on a need-to-
know basis.
• Share sensitive information only with
authorized personnel
• ensure proper encryption and security
• Enforce policies
• conduct regular training sessions on
protecting sensitive information
• implement data loss prevention systems
• Three lines of defense
• Proactive approach
• Risk management
• Continuous Education and Training
• Leadership-Driven Focus
A Proactive Stance on Cyber Threats
15. The contemporary
context for SMEs
• Limited resources
• Lack of expertise
• Reactive approach
• Supply chain vulnerabilities
• Lack of employee training
• Compliance obstacles
• Rapidly evolving threat landscape
Increasing importance of a strong cybersecurity culture
and The challenges faced by SMEs in the current digital
era
16. Learning from the banking industry
Proactive approach
Risk management
Continuous learning
Leadership involvement
Investment in technology
Incident response plan
Regulatory compliance
Third-party risk management
Customer education
Cybersecurity culture
17. Cultivating a Strong
Cybersecurity Culture
Integrating
cyberpsychology into
cybersecurity culture
Cybersecurity is not just about
technology; it's also about
people. Human behavior plays
a crucial role in both creating
vulnerabilities and defending
against cyber threats.
Understanding psychological
factors such as motivation,
perception, and decision-
making processes can help in
predicting and preventing
risky cyber behaviors.
Cyberpsychology provides
insights into how individuals
interact with technology,
including their responses to
cyber threats and adherence
to security protocols.
How Cyberpsychology
Helps in Shaping
Behaviors
Cyberpsychology studies how
psychological principles apply
in the digital world.
It helps in understanding why
individuals might fall prey to
cyber attacks like phishing,
and how to motivate them
towards safer practices.
Insights from cyberpsychology
can guide the development of
more effective cybersecurity
training programs.
20. Continuous Education
and Training
• Emphasizing the Role of Ongoing
Cybersecurity Training
• Developing Effective Cybersecurity
Training Programs
• Incorporating Cyberpsychology into
Training
• Measuring the Impact of Training
• Creating a Culture of Continuous
Learning
21. CONCLUSION
• Cybersecurity is not optional -
it's a necessity for SMEs in
today's digital world.
• A strong cybersecurity culture
is as important as
technological defenses.
• Proactive risk management
and continuous learning are
vital.
• Leadership-driven
cybersecurity approach is A
model for SME success.
22. Scan QR code and Follow Tom on LinkedIn
https://www.linkedin.com/in/tabularecta
Scan QR code and visit Riskoria
https://riskoria.eu
Q&A
Thank you for
your attention
Tom Vazdar
tvazdar@riskoria.eu
23. Upcoming Webinars
Data Governance and
Compliance in the Ubiquitous
Digital World
December 14
Dr. Diane Janosek
Women in Cyber Leadership Series
23
www.captechu.edu/webinar-series
Cyber Threat
Intelligence Driven
Phishing Awareness
Programs
January 18
Dr. Danae Brooks
Finding Your Scholarly
Voice: Using Peer-reviewed
Publications to Showcase
Your Expertise
February 15
Dr. Darrell Burrell
24. To Register for Webinars or
View On Demand Webinars:
www.captechu.edu/webinar-series
24
25. Join us for Master’s and Doctoral
Virtual Information Sessions. Held
monthly. To learn more:
Email: gradadmit@captechu.edu •
Phone: 1- 800-950-1992
Capitol offers regionally accredited
online certificates, undergraduate
degrees, and graduate degrees
related to cybersecurity:
• 5 Certificate programs
• Online Bachelor of Science Degree
• 8 Online Master’s Degree programs
• 7 Online Doctoral Programs
25
26. Recording, Slides & Certificate
A copy of the slides and a link
to the recording will be sent to
all registrants. Watch for an
email
A Certificate of Completion is
available upon request to
both live session and On
Demand viewers
Simply reply to the email
26
27. Thank You!
This concludes today’s webinar
Watch for a follow up email that contains:
1. How to get a Participation Certificate
(Available by request for both Live Session
and On Demand viewers)
2. Link to the webinar recording and slides
Thanks for Joining Us!
27