SlideShare a Scribd company logo
1 of 18
Download to read offline
DURING COVID-19 CRISIS
TELEWORKING &
CYBERSECURITY
[WEBINAR]
Presented by Onepath, Baker Donelson, Red
Clover Advisors & The Secret Service
Today's
OutlineAgenda
Introductions
Survey Results
Panel:
• Marc Debrody, Head of USSS ECTF,
Secret Service Atlanta
• Patrick Kinsella, CTO @ Onepath
• Justin Daniels, General Counsel @
Baker Donelson
• Jodi Daniels, CEO & Founder @Red
Clover Advisors
Live Q&A
50%+
REMOTE WORK IS NEW TO YOU
Survey Results
LET'S GET TO THE NUMBERS
On To-Do List
60%
Once a Year Online
20%
Simulated Phishing Attack
20%
8 Characters +
Symbols
40%
Any Type
40%
MFA
20%
WHICH OF THE FOLLOWING
BEST DESCRIBES YOUR
EMPLOYEE PHISHING TRAINING
PROGRAM?
WHICH BEST DESCRIBES HOW
REMOTE USERS
AUTHENTICATE METHODS?
Survey Results
VPN
60%
No Real
Password
20%
Strong Wifi
Password
20%
On To Do List
60%
Phone Policy
20%
App like IronPath
20%
HOW DOES YOUR REMOTE
WORKFORCE ACCESS THE
COMPANY SERVER?
WHICH BEST DESCRIBES THE
YOUR PROTECTIONS AND
PROCEDURES RELATED TO
EMPLOYEE COMPUTERS,
PHONES AND PDAS
Survey Results
Marc Debrody
The Secret Service
United States Secret
Service, Atlanta Field Office
Electronic Crimes Task
Force
Main (24 hrs)
(404) 331-6111
Direct Line
(404) 222-4886
Email –
mdebrody@usss.dhs.gov
Why the
Secret
Service?
Justin Daniels
Baker Donelson
Baker Donelson Bearman,
Caldwell & Berkowitz, PC
General Counsel &
Cybersecurity Speaker
Main
(678) 406-8706
Direct Line
(404) 229-6847
Email –
jdaniels@bakerdonelson.com
Jodi Daniels
Red Clover Advisors
CEO & Founder
Main
(404) 964-3762
Email –
jodi@redcloveradvisors.com
Teleworking
Security
Issues
Pandemic Specific
Instances
1
2
3
4
USE OF PERSONAL
DEVICES/PHYSICAL DEVICE
SECURITY
NETWORK ACCESS
IDENTITY ACCESS
MANAGEMENT
DATA PROTECTION
Best Practices
& Tips
PERSONAL DEVICE
SECURITY
Create password phrases with
number and letters like
“UGAismyteam@$Network
Access.
Personal and work passwords
should not be the same. Have
employee use an app like
LastPass to securely store
passwords.
NETWORK
ACCESS
VPNs that allow a secure
connection from home internet
to the company network.
Rules addressing when and how
people can access the network
to prevent interrupting or
slowing the network.
IDENTITY ACCESS
MANAGEMENT
Limited access to the network
just for
employee job function.
PROTECTING PERSONAL DATA &
PRIVACY LAWS
STARTS AT HOME
Protect other household members
from accessing or using company
email, files or programs
GDPR & CCPA
Ensure all virtual tools that also might
collect data comply with privacy laws
such as GDPR and CCPA
INCREASED RISK
Heightened risk for data breaches will
trigger privacy law requirements
CROSS BORDER
PRIVACY
If new tools are used to conduct virtual
work, consider any cross-border
transfer privacy requirements
INDIVIDUAL
RIGHTS WILL STILL
BE REQUESTED
HEALTH RELATED
DATA COLLECTION
AND USE MUST
MEET PRIVACY
LAW
REQUIREMENTS
CREATIVE DATA
COLLECTION AND
USE
SCENARIOS NEED
TO FOLLOW
PRIVACY LAW
REQUIREMENTS
CCPA
ENFORCEMENT
BEGINS JULY 1,
2020
PRIVACY LAW CONSIDERATIONS
Patrick Kinsella
Onepath
SVP & Chief Technology
Officer
Direct Line
(678) 504-0036
Email – pkinsella@1path.com
Flatting the Curve... And
Preventing Another Curve
from Growing
• What does it mean to flatten the
curve?
• How does this relate to
cybersecurity?
• Hundreds of fake, potentially
malicious coronavirus-themed
websites have already emerged
(The Hill)
• The remote workforce has increased
by 15% in 2 weeks (Dark Reading),
and half of all SMB owners haven’t
updated their remote work security
policy in over a year (CPA Practice)
WHO NEEDS ACCESS TO WHAT
INFORMATION?
HUMAN ERROR LEADS TO 95% OF
SUCCESSFUL ATTACKS (CYBINT)
By segmenting the distribution of important
files, you’re preventing what a hacker can
access.
Train your employees to spot phishing attacks,
avoid unsecured networks, and protect their
credentials
o Ensure there’s a policy in place to report any
breaches or cybersecurity concerns
o Share this PowerPoint with your workforce
o Not only will you make it through the
pandemic, but you’ll instill your workforce with
the best practices they need to be safer
whenever, wherever
Access
Control &
Cybersecurity
Training
MFA & SSO
• Decreases 99% of attacks (zDnet)
• Install remote management software
and endpoint detection in order to
identify and stop attacks early
⚬ It’s important that you always use
company devices, as your personal
devices won’t have these protections
VIRTUAL PRIVATE NETWORK
(VPN)
Allows users to interact with data on
public/shared networks as if their computers
were connected to a private network
• VPNs still aren’t a perfect solution: make
sure to continuously patch and update
yours to ensure it’s as safe as possible
TOOLS
THANK YOU
Please reach out if you have follow up questions:
Brian Kirsch (bkirsch@1path.com)

More Related Content

What's hot

Ponemon Report: When Trust Online Breaks, Businesses Lose Customers
Ponemon Report: When Trust Online Breaks, Businesses Lose CustomersPonemon Report: When Trust Online Breaks, Businesses Lose Customers
Ponemon Report: When Trust Online Breaks, Businesses Lose CustomersVenafi
 
Symantec Internet Security Threat Report 2014 - Volume 19
Symantec Internet Security Threat Report 2014 - Volume 19Symantec Internet Security Threat Report 2014 - Volume 19
Symantec Internet Security Threat Report 2014 - Volume 19Symantec
 
Big Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPRBig Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPRMatt Stubbs
 
2018 Global State of Information Security Survey
2018 Global State of Information Security Survey2018 Global State of Information Security Survey
2018 Global State of Information Security SurveyIDG
 
Big Data LDN 2017: AI in the digital economy
Big Data LDN 2017: AI in the digital economyBig Data LDN 2017: AI in the digital economy
Big Data LDN 2017: AI in the digital economyMatt Stubbs
 
Top Risks of Enterprise Mobility
Top Risks of Enterprise MobilityTop Risks of Enterprise Mobility
Top Risks of Enterprise MobilitySymantec
 
Australian CFOs in Jeopardy: What you don't know about software license compl...
Australian CFOs in Jeopardy: What you don't know about software license compl...Australian CFOs in Jeopardy: What you don't know about software license compl...
Australian CFOs in Jeopardy: What you don't know about software license compl...Flexera
 
Adjusting Your Security Controls: It’s the New Normal
Adjusting Your Security Controls: It’s the New NormalAdjusting Your Security Controls: It’s the New Normal
Adjusting Your Security Controls: It’s the New NormalPriyanka Aash
 
Big Data LDN 2017: The Intelligent Edge: What Data-driven Means in the Age of...
Big Data LDN 2017: The Intelligent Edge: What Data-driven Means in the Age of...Big Data LDN 2017: The Intelligent Edge: What Data-driven Means in the Age of...
Big Data LDN 2017: The Intelligent Edge: What Data-driven Means in the Age of...Matt Stubbs
 
Cyber Risk Management in the New Digitalisation Age - Mitigating Risk with Cy...
Cyber Risk Management in the New Digitalisation Age - Mitigating Risk with Cy...Cyber Risk Management in the New Digitalisation Age - Mitigating Risk with Cy...
Cyber Risk Management in the New Digitalisation Age - Mitigating Risk with Cy...Netpluz Asia Pte Ltd
 
Infographic young earning_professionals_india
Infographic young earning_professionals_indiaInfographic young earning_professionals_india
Infographic young earning_professionals_indiaSrividya Gopani
 

What's hot (11)

Ponemon Report: When Trust Online Breaks, Businesses Lose Customers
Ponemon Report: When Trust Online Breaks, Businesses Lose CustomersPonemon Report: When Trust Online Breaks, Businesses Lose Customers
Ponemon Report: When Trust Online Breaks, Businesses Lose Customers
 
Symantec Internet Security Threat Report 2014 - Volume 19
Symantec Internet Security Threat Report 2014 - Volume 19Symantec Internet Security Threat Report 2014 - Volume 19
Symantec Internet Security Threat Report 2014 - Volume 19
 
Big Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPRBig Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPR
 
2018 Global State of Information Security Survey
2018 Global State of Information Security Survey2018 Global State of Information Security Survey
2018 Global State of Information Security Survey
 
Big Data LDN 2017: AI in the digital economy
Big Data LDN 2017: AI in the digital economyBig Data LDN 2017: AI in the digital economy
Big Data LDN 2017: AI in the digital economy
 
Top Risks of Enterprise Mobility
Top Risks of Enterprise MobilityTop Risks of Enterprise Mobility
Top Risks of Enterprise Mobility
 
Australian CFOs in Jeopardy: What you don't know about software license compl...
Australian CFOs in Jeopardy: What you don't know about software license compl...Australian CFOs in Jeopardy: What you don't know about software license compl...
Australian CFOs in Jeopardy: What you don't know about software license compl...
 
Adjusting Your Security Controls: It’s the New Normal
Adjusting Your Security Controls: It’s the New NormalAdjusting Your Security Controls: It’s the New Normal
Adjusting Your Security Controls: It’s the New Normal
 
Big Data LDN 2017: The Intelligent Edge: What Data-driven Means in the Age of...
Big Data LDN 2017: The Intelligent Edge: What Data-driven Means in the Age of...Big Data LDN 2017: The Intelligent Edge: What Data-driven Means in the Age of...
Big Data LDN 2017: The Intelligent Edge: What Data-driven Means in the Age of...
 
Cyber Risk Management in the New Digitalisation Age - Mitigating Risk with Cy...
Cyber Risk Management in the New Digitalisation Age - Mitigating Risk with Cy...Cyber Risk Management in the New Digitalisation Age - Mitigating Risk with Cy...
Cyber Risk Management in the New Digitalisation Age - Mitigating Risk with Cy...
 
Infographic young earning_professionals_india
Infographic young earning_professionals_indiaInfographic young earning_professionals_india
Infographic young earning_professionals_india
 

Similar to Teleworking cybersecurity webinar (final)

[ON-DEMAND WEBINAR] Shifting the Business Infrastructure: Cybersecurity in a ...
[ON-DEMAND WEBINAR] Shifting the Business Infrastructure: Cybersecurity in a ...[ON-DEMAND WEBINAR] Shifting the Business Infrastructure: Cybersecurity in a ...
[ON-DEMAND WEBINAR] Shifting the Business Infrastructure: Cybersecurity in a ...Rea & Associates
 
Cisco Security DNA
Cisco Security DNACisco Security DNA
Cisco Security DNAMatteo Masi
 
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalystScale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalystBill Burns
 
BIS "Is Your Company at Risk for a Security Breach?"
BIS "Is Your Company at Risk for a Security Breach?"BIS "Is Your Company at Risk for a Security Breach?"
BIS "Is Your Company at Risk for a Security Breach?"ChristiAKannapel
 
Journey to the Perfect Application: Digital Transformation During a Crisis
Journey to the Perfect Application: Digital Transformation During a CrisisJourney to the Perfect Application: Digital Transformation During a Crisis
Journey to the Perfect Application: Digital Transformation During a CrisisAggregage
 
Becoming your customer's security partner in the digital age
Becoming your customer's security partner in the digital ageBecoming your customer's security partner in the digital age
Becoming your customer's security partner in the digital ageExponential_e
 
Cases for Financial Market
Cases for Financial MarketCases for Financial Market
Cases for Financial MarketKarina Matos
 
Data Privacy, Security, and Sovereignty in a Cloudy World
Data Privacy, Security, and Sovereignty in a Cloudy WorldData Privacy, Security, and Sovereignty in a Cloudy World
Data Privacy, Security, and Sovereignty in a Cloudy WorldNetskope
 
CTEK Cyber Briefing - April 2022.pptx
CTEK Cyber Briefing - April 2022.pptxCTEK Cyber Briefing - April 2022.pptx
CTEK Cyber Briefing - April 2022.pptxSophia Price
 
CynergisTek Cyber Briefing April 2022
CynergisTek Cyber Briefing April 2022CynergisTek Cyber Briefing April 2022
CynergisTek Cyber Briefing April 2022SophiaPalmira1
 
The Secure Business in the Digital Age - 27th September 2017
The Secure Business in the Digital Age - 27th September 2017The Secure Business in the Digital Age - 27th September 2017
The Secure Business in the Digital Age - 27th September 2017Exponential_e
 
Corporate Treasurers Focus on Cyber Security
Corporate Treasurers Focus on Cyber SecurityCorporate Treasurers Focus on Cyber Security
Corporate Treasurers Focus on Cyber SecurityJoan Weber
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementCA Technologies
 
CRI "Lessons From The Front Lines" March 26th Dublin
CRI "Lessons From The Front Lines" March 26th Dublin CRI "Lessons From The Front Lines" March 26th Dublin
CRI "Lessons From The Front Lines" March 26th Dublin OCTF Industry Engagement
 
4 Cyber Security KPIs
4 Cyber Security KPIs4 Cyber Security KPIs
4 Cyber Security KPIsSteven Aiello
 
5 Technology Trends Construction Contractors Can't Afford To Ignore
5 Technology Trends Construction Contractors Can't Afford To Ignore5 Technology Trends Construction Contractors Can't Afford To Ignore
5 Technology Trends Construction Contractors Can't Afford To IgnoreGross, Mendelsohn & Associates
 
Harness the Power of Big Data with Oracle
Harness the Power of Big Data with OracleHarness the Power of Big Data with Oracle
Harness the Power of Big Data with OracleSai Janakiram Penumuru
 
Assure Patient and Clinician Digital Experiences with ThousandEyes for Health...
Assure Patient and Clinician Digital Experiences with ThousandEyes for Health...Assure Patient and Clinician Digital Experiences with ThousandEyes for Health...
Assure Patient and Clinician Digital Experiences with ThousandEyes for Health...ThousandEyes
 
Cisco Connect 2018 Malaysia - Cisco services-guiding your digital transformation
Cisco Connect 2018 Malaysia - Cisco services-guiding your digital transformationCisco Connect 2018 Malaysia - Cisco services-guiding your digital transformation
Cisco Connect 2018 Malaysia - Cisco services-guiding your digital transformationNetworkCollaborators
 

Similar to Teleworking cybersecurity webinar (final) (20)

[ON-DEMAND WEBINAR] Shifting the Business Infrastructure: Cybersecurity in a ...
[ON-DEMAND WEBINAR] Shifting the Business Infrastructure: Cybersecurity in a ...[ON-DEMAND WEBINAR] Shifting the Business Infrastructure: Cybersecurity in a ...
[ON-DEMAND WEBINAR] Shifting the Business Infrastructure: Cybersecurity in a ...
 
Cisco Security DNA
Cisco Security DNACisco Security DNA
Cisco Security DNA
 
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalystScale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
 
BIS "Is Your Company at Risk for a Security Breach?"
BIS "Is Your Company at Risk for a Security Breach?"BIS "Is Your Company at Risk for a Security Breach?"
BIS "Is Your Company at Risk for a Security Breach?"
 
Journey to the Perfect Application: Digital Transformation During a Crisis
Journey to the Perfect Application: Digital Transformation During a CrisisJourney to the Perfect Application: Digital Transformation During a Crisis
Journey to the Perfect Application: Digital Transformation During a Crisis
 
Becoming your customer's security partner in the digital age
Becoming your customer's security partner in the digital ageBecoming your customer's security partner in the digital age
Becoming your customer's security partner in the digital age
 
Cases for Financial Market
Cases for Financial MarketCases for Financial Market
Cases for Financial Market
 
Data Privacy, Security, and Sovereignty in a Cloudy World
Data Privacy, Security, and Sovereignty in a Cloudy WorldData Privacy, Security, and Sovereignty in a Cloudy World
Data Privacy, Security, and Sovereignty in a Cloudy World
 
CTEK Cyber Briefing - April 2022.pptx
CTEK Cyber Briefing - April 2022.pptxCTEK Cyber Briefing - April 2022.pptx
CTEK Cyber Briefing - April 2022.pptx
 
CynergisTek Cyber Briefing April 2022
CynergisTek Cyber Briefing April 2022CynergisTek Cyber Briefing April 2022
CynergisTek Cyber Briefing April 2022
 
The Secure Business in the Digital Age - 27th September 2017
The Secure Business in the Digital Age - 27th September 2017The Secure Business in the Digital Age - 27th September 2017
The Secure Business in the Digital Age - 27th September 2017
 
Corporate Treasurers Focus on Cyber Security
Corporate Treasurers Focus on Cyber SecurityCorporate Treasurers Focus on Cyber Security
Corporate Treasurers Focus on Cyber Security
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access Management
 
Federal IT Initiatives - BDPA Conference Executive Panel
Federal IT Initiatives - BDPA Conference Executive PanelFederal IT Initiatives - BDPA Conference Executive Panel
Federal IT Initiatives - BDPA Conference Executive Panel
 
CRI "Lessons From The Front Lines" March 26th Dublin
CRI "Lessons From The Front Lines" March 26th Dublin CRI "Lessons From The Front Lines" March 26th Dublin
CRI "Lessons From The Front Lines" March 26th Dublin
 
4 Cyber Security KPIs
4 Cyber Security KPIs4 Cyber Security KPIs
4 Cyber Security KPIs
 
5 Technology Trends Construction Contractors Can't Afford To Ignore
5 Technology Trends Construction Contractors Can't Afford To Ignore5 Technology Trends Construction Contractors Can't Afford To Ignore
5 Technology Trends Construction Contractors Can't Afford To Ignore
 
Harness the Power of Big Data with Oracle
Harness the Power of Big Data with OracleHarness the Power of Big Data with Oracle
Harness the Power of Big Data with Oracle
 
Assure Patient and Clinician Digital Experiences with ThousandEyes for Health...
Assure Patient and Clinician Digital Experiences with ThousandEyes for Health...Assure Patient and Clinician Digital Experiences with ThousandEyes for Health...
Assure Patient and Clinician Digital Experiences with ThousandEyes for Health...
 
Cisco Connect 2018 Malaysia - Cisco services-guiding your digital transformation
Cisco Connect 2018 Malaysia - Cisco services-guiding your digital transformationCisco Connect 2018 Malaysia - Cisco services-guiding your digital transformation
Cisco Connect 2018 Malaysia - Cisco services-guiding your digital transformation
 

Recently uploaded

"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 

Recently uploaded (20)

E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 

Teleworking cybersecurity webinar (final)

  • 1. DURING COVID-19 CRISIS TELEWORKING & CYBERSECURITY [WEBINAR] Presented by Onepath, Baker Donelson, Red Clover Advisors & The Secret Service
  • 2. Today's OutlineAgenda Introductions Survey Results Panel: • Marc Debrody, Head of USSS ECTF, Secret Service Atlanta • Patrick Kinsella, CTO @ Onepath • Justin Daniels, General Counsel @ Baker Donelson • Jodi Daniels, CEO & Founder @Red Clover Advisors Live Q&A
  • 3. 50%+ REMOTE WORK IS NEW TO YOU Survey Results LET'S GET TO THE NUMBERS
  • 4. On To-Do List 60% Once a Year Online 20% Simulated Phishing Attack 20% 8 Characters + Symbols 40% Any Type 40% MFA 20% WHICH OF THE FOLLOWING BEST DESCRIBES YOUR EMPLOYEE PHISHING TRAINING PROGRAM? WHICH BEST DESCRIBES HOW REMOTE USERS AUTHENTICATE METHODS? Survey Results
  • 5. VPN 60% No Real Password 20% Strong Wifi Password 20% On To Do List 60% Phone Policy 20% App like IronPath 20% HOW DOES YOUR REMOTE WORKFORCE ACCESS THE COMPANY SERVER? WHICH BEST DESCRIBES THE YOUR PROTECTIONS AND PROCEDURES RELATED TO EMPLOYEE COMPUTERS, PHONES AND PDAS Survey Results
  • 6. Marc Debrody The Secret Service United States Secret Service, Atlanta Field Office Electronic Crimes Task Force Main (24 hrs) (404) 331-6111 Direct Line (404) 222-4886 Email – mdebrody@usss.dhs.gov
  • 8. Justin Daniels Baker Donelson Baker Donelson Bearman, Caldwell & Berkowitz, PC General Counsel & Cybersecurity Speaker Main (678) 406-8706 Direct Line (404) 229-6847 Email – jdaniels@bakerdonelson.com
  • 9. Jodi Daniels Red Clover Advisors CEO & Founder Main (404) 964-3762 Email – jodi@redcloveradvisors.com
  • 10. Teleworking Security Issues Pandemic Specific Instances 1 2 3 4 USE OF PERSONAL DEVICES/PHYSICAL DEVICE SECURITY NETWORK ACCESS IDENTITY ACCESS MANAGEMENT DATA PROTECTION
  • 11. Best Practices & Tips PERSONAL DEVICE SECURITY Create password phrases with number and letters like “UGAismyteam@$Network Access. Personal and work passwords should not be the same. Have employee use an app like LastPass to securely store passwords. NETWORK ACCESS VPNs that allow a secure connection from home internet to the company network. Rules addressing when and how people can access the network to prevent interrupting or slowing the network. IDENTITY ACCESS MANAGEMENT Limited access to the network just for employee job function.
  • 12. PROTECTING PERSONAL DATA & PRIVACY LAWS STARTS AT HOME Protect other household members from accessing or using company email, files or programs GDPR & CCPA Ensure all virtual tools that also might collect data comply with privacy laws such as GDPR and CCPA INCREASED RISK Heightened risk for data breaches will trigger privacy law requirements CROSS BORDER PRIVACY If new tools are used to conduct virtual work, consider any cross-border transfer privacy requirements
  • 13. INDIVIDUAL RIGHTS WILL STILL BE REQUESTED HEALTH RELATED DATA COLLECTION AND USE MUST MEET PRIVACY LAW REQUIREMENTS CREATIVE DATA COLLECTION AND USE SCENARIOS NEED TO FOLLOW PRIVACY LAW REQUIREMENTS CCPA ENFORCEMENT BEGINS JULY 1, 2020 PRIVACY LAW CONSIDERATIONS
  • 14. Patrick Kinsella Onepath SVP & Chief Technology Officer Direct Line (678) 504-0036 Email – pkinsella@1path.com
  • 15. Flatting the Curve... And Preventing Another Curve from Growing • What does it mean to flatten the curve? • How does this relate to cybersecurity? • Hundreds of fake, potentially malicious coronavirus-themed websites have already emerged (The Hill) • The remote workforce has increased by 15% in 2 weeks (Dark Reading), and half of all SMB owners haven’t updated their remote work security policy in over a year (CPA Practice)
  • 16. WHO NEEDS ACCESS TO WHAT INFORMATION? HUMAN ERROR LEADS TO 95% OF SUCCESSFUL ATTACKS (CYBINT) By segmenting the distribution of important files, you’re preventing what a hacker can access. Train your employees to spot phishing attacks, avoid unsecured networks, and protect their credentials o Ensure there’s a policy in place to report any breaches or cybersecurity concerns o Share this PowerPoint with your workforce o Not only will you make it through the pandemic, but you’ll instill your workforce with the best practices they need to be safer whenever, wherever Access Control & Cybersecurity Training
  • 17. MFA & SSO • Decreases 99% of attacks (zDnet) • Install remote management software and endpoint detection in order to identify and stop attacks early ⚬ It’s important that you always use company devices, as your personal devices won’t have these protections VIRTUAL PRIVATE NETWORK (VPN) Allows users to interact with data on public/shared networks as if their computers were connected to a private network • VPNs still aren’t a perfect solution: make sure to continuously patch and update yours to ensure it’s as safe as possible TOOLS
  • 18. THANK YOU Please reach out if you have follow up questions: Brian Kirsch (bkirsch@1path.com)