Please join us as we hear from experts in the legal, technical and federal fields discuss cybersecurity issues in the wake of COVID-19 and the abundance of work-from-home policies taking place.
1. DURING COVID-19 CRISIS
TELEWORKING &
CYBERSECURITY
[WEBINAR]
Presented by Onepath, Baker Donelson, Red
Clover Advisors & The Secret Service
2. Today's
OutlineAgenda
Introductions
Survey Results
Panel:
• Marc Debrody, Head of USSS ECTF,
Secret Service Atlanta
• Patrick Kinsella, CTO @ Onepath
• Justin Daniels, General Counsel @
Baker Donelson
• Jodi Daniels, CEO & Founder @Red
Clover Advisors
Live Q&A
4. On To-Do List
60%
Once a Year Online
20%
Simulated Phishing Attack
20%
8 Characters +
Symbols
40%
Any Type
40%
MFA
20%
WHICH OF THE FOLLOWING
BEST DESCRIBES YOUR
EMPLOYEE PHISHING TRAINING
PROGRAM?
WHICH BEST DESCRIBES HOW
REMOTE USERS
AUTHENTICATE METHODS?
Survey Results
5. VPN
60%
No Real
Password
20%
Strong Wifi
Password
20%
On To Do List
60%
Phone Policy
20%
App like IronPath
20%
HOW DOES YOUR REMOTE
WORKFORCE ACCESS THE
COMPANY SERVER?
WHICH BEST DESCRIBES THE
YOUR PROTECTIONS AND
PROCEDURES RELATED TO
EMPLOYEE COMPUTERS,
PHONES AND PDAS
Survey Results
6. Marc Debrody
The Secret Service
United States Secret
Service, Atlanta Field Office
Electronic Crimes Task
Force
Main (24 hrs)
(404) 331-6111
Direct Line
(404) 222-4886
Email –
mdebrody@usss.dhs.gov
11. Best Practices
& Tips
PERSONAL DEVICE
SECURITY
Create password phrases with
number and letters like
“UGAismyteam@$Network
Access.
Personal and work passwords
should not be the same. Have
employee use an app like
LastPass to securely store
passwords.
NETWORK
ACCESS
VPNs that allow a secure
connection from home internet
to the company network.
Rules addressing when and how
people can access the network
to prevent interrupting or
slowing the network.
IDENTITY ACCESS
MANAGEMENT
Limited access to the network
just for
employee job function.
12. PROTECTING PERSONAL DATA &
PRIVACY LAWS
STARTS AT HOME
Protect other household members
from accessing or using company
email, files or programs
GDPR & CCPA
Ensure all virtual tools that also might
collect data comply with privacy laws
such as GDPR and CCPA
INCREASED RISK
Heightened risk for data breaches will
trigger privacy law requirements
CROSS BORDER
PRIVACY
If new tools are used to conduct virtual
work, consider any cross-border
transfer privacy requirements
13. INDIVIDUAL
RIGHTS WILL STILL
BE REQUESTED
HEALTH RELATED
DATA COLLECTION
AND USE MUST
MEET PRIVACY
LAW
REQUIREMENTS
CREATIVE DATA
COLLECTION AND
USE
SCENARIOS NEED
TO FOLLOW
PRIVACY LAW
REQUIREMENTS
CCPA
ENFORCEMENT
BEGINS JULY 1,
2020
PRIVACY LAW CONSIDERATIONS
15. Flatting the Curve... And
Preventing Another Curve
from Growing
• What does it mean to flatten the
curve?
• How does this relate to
cybersecurity?
• Hundreds of fake, potentially
malicious coronavirus-themed
websites have already emerged
(The Hill)
• The remote workforce has increased
by 15% in 2 weeks (Dark Reading),
and half of all SMB owners haven’t
updated their remote work security
policy in over a year (CPA Practice)
16. WHO NEEDS ACCESS TO WHAT
INFORMATION?
HUMAN ERROR LEADS TO 95% OF
SUCCESSFUL ATTACKS (CYBINT)
By segmenting the distribution of important
files, you’re preventing what a hacker can
access.
Train your employees to spot phishing attacks,
avoid unsecured networks, and protect their
credentials
o Ensure there’s a policy in place to report any
breaches or cybersecurity concerns
o Share this PowerPoint with your workforce
o Not only will you make it through the
pandemic, but you’ll instill your workforce with
the best practices they need to be safer
whenever, wherever
Access
Control &
Cybersecurity
Training
17. MFA & SSO
• Decreases 99% of attacks (zDnet)
• Install remote management software
and endpoint detection in order to
identify and stop attacks early
⚬ It’s important that you always use
company devices, as your personal
devices won’t have these protections
VIRTUAL PRIVATE NETWORK
(VPN)
Allows users to interact with data on
public/shared networks as if their computers
were connected to a private network
• VPNs still aren’t a perfect solution: make
sure to continuously patch and update
yours to ensure it’s as safe as possible
TOOLS
18. THANK YOU
Please reach out if you have follow up questions:
Brian Kirsch (bkirsch@1path.com)