SlideShare a Scribd company logo
1 of 37
One Step Ahead - Webinar
In partnership with:
In partnership with:
How cyber criminals exploit the
goodness of your employees
An FBI perspective
One Step Ahead - Webinar
In partnership with:
Webinar introduction
by Joe Jouhal
CEO at Avatu
Please send your questions in
through the WebEx system
We’ll answer them one-by-one at
the end of the webinar
One Step Ahead - Webinar
In partnership with:
John Boles
is a former assistant director with the FBI.
Having served over 20 years in the FBI as a
national security executive, his experience in
leading cyber investigations worldwide and
managing critical incident response, his expertise
helps clients protect their data and their business.
Today he’s director of Navigant’s Global Legal
Technology Services.
Your speakers
One Step Ahead - Webinar
In partnership with:
David Nice
has worked in the security environment for
almost 20 years and consequently understands
the challenges faced by companies - and public
bodies - inside and out.
Today, working with ObserveIT, he specialises
in insider threats and helping people to adapt
their behaviours.
Your speakers
One Step Ahead - Webinar
In partnership with:
What is the cyber
INSIDER Threat?
Definition:
Anyone with legitimate access (employee, vendor,
contractor) to a company network/data who puts
that data at risk through either willful misconduct
or unintentional actions
One Step Ahead - Webinar
In partnership with:
What is the cyber
INSIDER Threat?
• Too often, we look outward for danger,
without considering that which can do the
most damage
• Insiders know where the information is,
where the secrets are kept
• Insiders have the legitimate access
crooks covet
One Step Ahead - Webinar
In partnership with:
Malicious INSIDER
• Have intent to harm the company
or improve themselves
• Often motivated by spite, revenge,
or greed
One Step Ahead - Webinar
In partnership with:
Malicious INSIDER
Robert Hanssen spied for the Russians against
the USA for decades because he felt no one
appreciated his intelligence
He stole information and put lives at risk
One Step Ahead - Webinar
In partnership with:
Malicious INSIDER
Edward Snowden stole data based on his
legitimate access for greed
He was recruited by foreign intelligence
agencies by appealing to his inflated
sense of self
One Step Ahead - Webinar
In partnership with:
Unwitting INSIDER
• Unintentionally cause harm to the network,
often in the course of their daily work
• Click on unsafe links
• Visit insecure websites
• Login to free and unprotected Wi-Fi
One Step Ahead - Webinar
In partnership with:
Unwitting INSIDER
• Lose company laptop/mobiles
• Frequently targeted by cyber crooks
• Often the customer facing representative
One Step Ahead - Webinar
In partnership with:
Damages
• Insider theft/inadvertent compromise is
often undetected for long periods
• Theft of IP or even client lists can eliminate
competitive advantage
• Stolen PII/PHI can subject a company to
severe fines and, under GDPR, possibly civil
legal action
• Reputational damage is frequently
long-lasting
One Step Ahead - Webinar
In partnership with:
What to do?
• Start with strong and clear policies and
governance
• Include mobile devices and BYOD
• Ensure you have an acceptable use policy
• Monitor accesses and ensure it’s appropriate
Communicate the rules and make sure
employees understand them
One Step Ahead - Webinar
In partnership with:
Training is key
• Employees must be able to
o Recognise risky behaviour
o Recognise suspicious email and links
o Know what actions to take
• Training should be ongoing and responsive
• Training is best retained when it is positive
and targeted
One Step Ahead - Webinar
In partnership with:
Tech is important, too
• Monitor traffic and connections
o Are employees going to risky sites
o Are employees using unauthorised apps
or data transfer applications
o Is the traffic going where you
expect it to?
• Whitelisting vs Blacklisting
One Step Ahead - Webinar
In partnership with:
It’s the people
• Must combine tech with policy and
oversight with training
• Trust but verify
• It’s much safer (and cheaper) to identify
and remediate risky behaviours than recover
from a breach
• Real cyber security is holistic
Humans are creatures of habit. You can spot the
early warning signs with technology and reduce
the risk
One Step Ahead - Webinar
In partnership with:
Identify and Eliminate Insider Threats
One Step Ahead - Webinar
In partnership with:
Identify and Eliminate Insider Threats
Over 1,500 customers worldwide
One Step Ahead - Webinar
In partnership with:
Trust but Verify
• Make your employees advocates for risk
prevention against threats
• Insider threats put your organisation at risk
One Step Ahead - Webinar
In partnership with:
The benefits of
addressing the
INSIDER Threat
• A heightened awareness of security
throughout the organisation
• A steep decline in the number of
security incidents
• A reduction in the amount of time spent
detecting and investigating incidents
One Step Ahead - Webinar
In partnership with:
• Identification of critical users & systems
• Identification of rogue accounts & shared accounts
• Identification of sensitive file/ folder locations
Know your CRITICAL assets
Src: NIST Special Publication 800-61 Volume 2
One Step Ahead - Webinar
In partnership with:
Logs can be difficult to correlate and understand
Can YOU tell what happened here?
One Step Ahead - Webinar
In partnership with:
Visibility
• Unique ‘over-the-shoulder’ view of all employee, vendor
and consultant activity provides unmatched visibility
• Alerts are in plain English and easy to understand
• Investigations take minutes instead of days
…a video is worth 1,000 logs
One Step Ahead - Webinar
In partnership with:
One Step Ahead - Webinar
In partnership with:
Detect
• 180 out-of-the-box
Insider Threat indicators
• 25 Risk categories
customisable by user
group:
• Data exfiltration
• Bypassing security controls
• Creating backdoor
• Identity theft
• Privilege elevation
• Unauthorised admin tasks
• Malicious software
• Shell attack
• System tampering
Decrease RISK immediately with actionable analytics
One Step Ahead - Webinar
In partnership with:
One Step Ahead - Webinar
In partnership with:
Analytics
• Uncover and investigate risky user activity through
identification of anomalous behaviour
• Key logging alerts detect data exfiltration attempts when users
type protected keywords in emails, chat applications, social
media sites, and more
Dynamic
filters
User activity and working
hours over time
Total and average time
per day spent by user
Most used
applications
and websites
ACHIEVE greater insight with alerts and analytics
One Step Ahead - Webinar
In partnership with:
Increase VISIBILITY
with website categorisation
• Know when users visit un-allowed/out-of-policy websites, such as
o Adult sites, illegal streaming, Darknet, illegal drugs, workplace
violence, time wasting
• Know when users visit bad reputation sites to avoid:
o Phishing (block the user before disclosing any PII)
o Contamination (block before downloading malicious content)
Website
categories are
indicated in alerts
and reports for
greater visibility
into user
behaviour
One Step Ahead - Webinar
In partnership with:
Educate
EDUCATE - early and often
• Educate employees about policy violations in real time
• Offer constructive alternatives
• Provide communication medium for security policy
feedback and suggestions
One Step Ahead - Webinar
In partnership with:
Deter
• Warn users against proceeding with out-of-policy activities
• Notify users that policy violations will be recorded
and reviewed
• Reduce non-compliant actions by 80% by implementing
real-time warnings
Show warnings:
out-of-policy behaviour is
recorded & reviewed
DETER non-compliant actions with notifications
One Step Ahead - Webinar
In partnership with:
Changing employee BEHAVIOUR
reduces the risk of a security
breach by 45% to 70%
One Step Ahead - Webinar
In partnership with:
Prevent
• Direct enforcement of company policy
• Effective asset protection and damage control
• Optimise Security and IT processes by collecting user
feedback before the application is closed or user is logged-off
A Remote Vendor trying
to connect to a Server.
User is forced to Log Off
(with optional user-provided feedback).
Security analysts can quickly
spot a blocked user and easily
review feedback provided
by the user
PREVENT users from violating policies
One Step Ahead - Webinar
In partnership with:
SECURITY without compromising
employee privacy
One Step Ahead - Webinar
In partnership with:
Forrester Techradar ™ : endpoint security, Q1 2017
One Step Ahead - Webinar
In partnership with:
Time for your
questions
One Step Ahead - Webinar
In partnership with:
Thank you
For more information contact:
luisa.farmer@avatu.co.uk
phone: +44 1296 621121
One Step Ahead - Webinar
In partnership with:
In partnership with:
How cyber criminals exploit the
goodness of your employees
An FBI perspective

More Related Content

What's hot

Outpost24 webinar - Bridging your cyber hygiene gap to prevent enterprise hac...
Outpost24 webinar - Bridging your cyber hygiene gap to prevent enterprise hac...Outpost24 webinar - Bridging your cyber hygiene gap to prevent enterprise hac...
Outpost24 webinar - Bridging your cyber hygiene gap to prevent enterprise hac...Outpost24
 
Wasn't expecting that! Now what?
Wasn't expecting that! Now what?Wasn't expecting that! Now what?
Wasn't expecting that! Now what?Jisc
 
Protecting endpoints from targeted attacks
Protecting endpoints from targeted attacksProtecting endpoints from targeted attacks
Protecting endpoints from targeted attacksAppSense
 
Data Security: What Every Leader Needs to Know
Data Security: What Every Leader Needs to KnowData Security: What Every Leader Needs to Know
Data Security: What Every Leader Needs to KnowRoger Hagedorn
 
Craft Your Cyber Incident Response Plan (Before It's Too Late)
Craft Your Cyber Incident Response Plan (Before It's Too Late)Craft Your Cyber Incident Response Plan (Before It's Too Late)
Craft Your Cyber Incident Response Plan (Before It's Too Late)Resilient Systems
 
Your cyber security webinar
Your cyber security webinarYour cyber security webinar
Your cyber security webinarIntergen
 
Setting up CSIRT
Setting up CSIRTSetting up CSIRT
Setting up CSIRTAPNIC
 
Network security, seriously?
Network security, seriously?Network security, seriously?
Network security, seriously?Peter Wood
 
Webinar: Understanding the Cyber Threat Landscape for Nonprofits
Webinar: Understanding the Cyber Threat Landscape for NonprofitsWebinar: Understanding the Cyber Threat Landscape for Nonprofits
Webinar: Understanding the Cyber Threat Landscape for NonprofitsWithum
 
Why You’ll Care More About Mobile Security in 2020 - Tom Bain
Why	You’ll Care More About Mobile Security in 2020 - Tom BainWhy	You’ll Care More About Mobile Security in 2020 - Tom Bain
Why You’ll Care More About Mobile Security in 2020 - Tom BainEC-Council
 
Ruben Melendez - Economically Justifying IT Security Initiatives
Ruben Melendez - Economically Justifying IT Security InitiativesRuben Melendez - Economically Justifying IT Security Initiatives
Ruben Melendez - Economically Justifying IT Security Initiativescentralohioissa
 
Building a Mobile Security Model
Building a Mobile Security Model Building a Mobile Security Model
Building a Mobile Security Model tmbainjr131
 
Prevent Getting Hacked by Using a Network Vulnerability Scanner
Prevent Getting Hacked by Using a Network Vulnerability ScannerPrevent Getting Hacked by Using a Network Vulnerability Scanner
Prevent Getting Hacked by Using a Network Vulnerability ScannerGFI Software
 
Security in the News
Security in the NewsSecurity in the News
Security in the NewsJames Sutter
 
You Will Be Breached
You Will Be BreachedYou Will Be Breached
You Will Be BreachedMike Saunders
 
Tre Smith - From Decision to Implementation: Who's On First?
Tre Smith - From Decision to Implementation: Who's On First?Tre Smith - From Decision to Implementation: Who's On First?
Tre Smith - From Decision to Implementation: Who's On First?centralohioissa
 

What's hot (20)

Outpost24 webinar - Bridging your cyber hygiene gap to prevent enterprise hac...
Outpost24 webinar - Bridging your cyber hygiene gap to prevent enterprise hac...Outpost24 webinar - Bridging your cyber hygiene gap to prevent enterprise hac...
Outpost24 webinar - Bridging your cyber hygiene gap to prevent enterprise hac...
 
Wasn't expecting that! Now what?
Wasn't expecting that! Now what?Wasn't expecting that! Now what?
Wasn't expecting that! Now what?
 
Challenges2013
Challenges2013Challenges2013
Challenges2013
 
Protecting endpoints from targeted attacks
Protecting endpoints from targeted attacksProtecting endpoints from targeted attacks
Protecting endpoints from targeted attacks
 
Data Security: What Every Leader Needs to Know
Data Security: What Every Leader Needs to KnowData Security: What Every Leader Needs to Know
Data Security: What Every Leader Needs to Know
 
YBB-NW-distribution
YBB-NW-distributionYBB-NW-distribution
YBB-NW-distribution
 
Building CSIRT and its competency
Building CSIRT and its competencyBuilding CSIRT and its competency
Building CSIRT and its competency
 
Craft Your Cyber Incident Response Plan (Before It's Too Late)
Craft Your Cyber Incident Response Plan (Before It's Too Late)Craft Your Cyber Incident Response Plan (Before It's Too Late)
Craft Your Cyber Incident Response Plan (Before It's Too Late)
 
Your cyber security webinar
Your cyber security webinarYour cyber security webinar
Your cyber security webinar
 
Setting up CSIRT
Setting up CSIRTSetting up CSIRT
Setting up CSIRT
 
It and-cyber-module-2
It and-cyber-module-2It and-cyber-module-2
It and-cyber-module-2
 
Network security, seriously?
Network security, seriously?Network security, seriously?
Network security, seriously?
 
Webinar: Understanding the Cyber Threat Landscape for Nonprofits
Webinar: Understanding the Cyber Threat Landscape for NonprofitsWebinar: Understanding the Cyber Threat Landscape for Nonprofits
Webinar: Understanding the Cyber Threat Landscape for Nonprofits
 
Why You’ll Care More About Mobile Security in 2020 - Tom Bain
Why	You’ll Care More About Mobile Security in 2020 - Tom BainWhy	You’ll Care More About Mobile Security in 2020 - Tom Bain
Why You’ll Care More About Mobile Security in 2020 - Tom Bain
 
Ruben Melendez - Economically Justifying IT Security Initiatives
Ruben Melendez - Economically Justifying IT Security InitiativesRuben Melendez - Economically Justifying IT Security Initiatives
Ruben Melendez - Economically Justifying IT Security Initiatives
 
Building a Mobile Security Model
Building a Mobile Security Model Building a Mobile Security Model
Building a Mobile Security Model
 
Prevent Getting Hacked by Using a Network Vulnerability Scanner
Prevent Getting Hacked by Using a Network Vulnerability ScannerPrevent Getting Hacked by Using a Network Vulnerability Scanner
Prevent Getting Hacked by Using a Network Vulnerability Scanner
 
Security in the News
Security in the NewsSecurity in the News
Security in the News
 
You Will Be Breached
You Will Be BreachedYou Will Be Breached
You Will Be Breached
 
Tre Smith - From Decision to Implementation: Who's On First?
Tre Smith - From Decision to Implementation: Who's On First?Tre Smith - From Decision to Implementation: Who's On First?
Tre Smith - From Decision to Implementation: Who's On First?
 

Similar to Cybersecurity: An FBI perspective: how cyber criminals exploit the goodness of your employees | Part of the Avatu One-Step Ahead Security programme

KnowBe4-Presentation-Overview.pdf
KnowBe4-Presentation-Overview.pdfKnowBe4-Presentation-Overview.pdf
KnowBe4-Presentation-Overview.pdfahmad661583
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Stephen Cobb
 
Netwealth educational webinar: Peace of mind in a digital world
Netwealth educational webinar: Peace of mind in a digital worldNetwealth educational webinar: Peace of mind in a digital world
Netwealth educational webinar: Peace of mind in a digital worldnetwealthInvest
 
Cyber Attacks aren't going away - including Cyber Security in your risk strategy
Cyber Attacks aren't going away - including Cyber Security in your risk strategyCyber Attacks aren't going away - including Cyber Security in your risk strategy
Cyber Attacks aren't going away - including Cyber Security in your risk strategyJames Mulhern
 
Best Practices for Security Awareness and Training
Best Practices for Security Awareness and TrainingBest Practices for Security Awareness and Training
Best Practices for Security Awareness and TrainingKimberly Hood
 
2015 Cyber Security
2015 Cyber Security2015 Cyber Security
2015 Cyber SecurityAllen Zhang
 
Information Security Awareness
Information Security Awareness Information Security Awareness
Information Security Awareness Net at Work
 
Cyber innovation without a new product to buy-Michael Boeckx - cybersec europ...
Cyber innovation without a new product to buy-Michael Boeckx - cybersec europ...Cyber innovation without a new product to buy-Michael Boeckx - cybersec europ...
Cyber innovation without a new product to buy-Michael Boeckx - cybersec europ...NRBsanv
 
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your DataLaw Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your DataAccellis Technology Group
 
Everything is not awesome: The rising threat of Cyber-attack and what to do a...
Everything is not awesome: The rising threat of Cyber-attack and what to do a...Everything is not awesome: The rising threat of Cyber-attack and what to do a...
Everything is not awesome: The rising threat of Cyber-attack and what to do a...Robi Sen
 
The Hacker Playbook: How to Think like a Cybercriminal to Reduce Risk
The Hacker Playbook: How to Think like a Cybercriminal to Reduce RiskThe Hacker Playbook: How to Think like a Cybercriminal to Reduce Risk
The Hacker Playbook: How to Think like a Cybercriminal to Reduce RiskBeyondTrust
 
Why implement a robust cyber security policy?
Why implement a robust cyber security policy?Why implement a robust cyber security policy?
Why implement a robust cyber security policy?Jisc
 
Empired Convergence 2017 - Keeping Pace, Staying Safe in the Digital World
Empired Convergence 2017 - Keeping Pace, Staying Safe in the Digital WorldEmpired Convergence 2017 - Keeping Pace, Staying Safe in the Digital World
Empired Convergence 2017 - Keeping Pace, Staying Safe in the Digital WorldEmpired
 
Community IT Webinar - IT Security for Nonprofits
Community IT Webinar - IT Security for NonprofitsCommunity IT Webinar - IT Security for Nonprofits
Community IT Webinar - IT Security for NonprofitsCommunity IT Innovators
 
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptxTop_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptxinfosec train
 
Scot Secure 2019 Edinburgh (Day 2)
Scot Secure 2019 Edinburgh (Day 2)Scot Secure 2019 Edinburgh (Day 2)
Scot Secure 2019 Edinburgh (Day 2)Ray Bugg
 

Similar to Cybersecurity: An FBI perspective: how cyber criminals exploit the goodness of your employees | Part of the Avatu One-Step Ahead Security programme (20)

KnowBe4-Presentation-Overview.pdf
KnowBe4-Presentation-Overview.pdfKnowBe4-Presentation-Overview.pdf
KnowBe4-Presentation-Overview.pdf
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
 
Netwealth educational webinar: Peace of mind in a digital world
Netwealth educational webinar: Peace of mind in a digital worldNetwealth educational webinar: Peace of mind in a digital world
Netwealth educational webinar: Peace of mind in a digital world
 
Team black
Team blackTeam black
Team black
 
Secure Iowa Oct 2016
Secure Iowa Oct 2016Secure Iowa Oct 2016
Secure Iowa Oct 2016
 
13734729.ppt
13734729.ppt13734729.ppt
13734729.ppt
 
Cyber Attacks aren't going away - including Cyber Security in your risk strategy
Cyber Attacks aren't going away - including Cyber Security in your risk strategyCyber Attacks aren't going away - including Cyber Security in your risk strategy
Cyber Attacks aren't going away - including Cyber Security in your risk strategy
 
Best Practices for Security Awareness and Training
Best Practices for Security Awareness and TrainingBest Practices for Security Awareness and Training
Best Practices for Security Awareness and Training
 
2015 Cyber Security
2015 Cyber Security2015 Cyber Security
2015 Cyber Security
 
Information Security Awareness
Information Security Awareness Information Security Awareness
Information Security Awareness
 
Cyber innovation without a new product to buy-Michael Boeckx - cybersec europ...
Cyber innovation without a new product to buy-Michael Boeckx - cybersec europ...Cyber innovation without a new product to buy-Michael Boeckx - cybersec europ...
Cyber innovation without a new product to buy-Michael Boeckx - cybersec europ...
 
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your DataLaw Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
 
Everything is not awesome: The rising threat of Cyber-attack and what to do a...
Everything is not awesome: The rising threat of Cyber-attack and what to do a...Everything is not awesome: The rising threat of Cyber-attack and what to do a...
Everything is not awesome: The rising threat of Cyber-attack and what to do a...
 
The Hacker Playbook: How to Think like a Cybercriminal to Reduce Risk
The Hacker Playbook: How to Think like a Cybercriminal to Reduce RiskThe Hacker Playbook: How to Think like a Cybercriminal to Reduce Risk
The Hacker Playbook: How to Think like a Cybercriminal to Reduce Risk
 
Why implement a robust cyber security policy?
Why implement a robust cyber security policy?Why implement a robust cyber security policy?
Why implement a robust cyber security policy?
 
Empired Convergence 2017 - Keeping Pace, Staying Safe in the Digital World
Empired Convergence 2017 - Keeping Pace, Staying Safe in the Digital WorldEmpired Convergence 2017 - Keeping Pace, Staying Safe in the Digital World
Empired Convergence 2017 - Keeping Pace, Staying Safe in the Digital World
 
Community IT Webinar - IT Security for Nonprofits
Community IT Webinar - IT Security for NonprofitsCommunity IT Webinar - IT Security for Nonprofits
Community IT Webinar - IT Security for Nonprofits
 
Opi cyber talk for executives
Opi cyber talk for executivesOpi cyber talk for executives
Opi cyber talk for executives
 
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptxTop_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
 
Scot Secure 2019 Edinburgh (Day 2)
Scot Secure 2019 Edinburgh (Day 2)Scot Secure 2019 Edinburgh (Day 2)
Scot Secure 2019 Edinburgh (Day 2)
 

Recently uploaded

Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 

Recently uploaded (20)

Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 

Cybersecurity: An FBI perspective: how cyber criminals exploit the goodness of your employees | Part of the Avatu One-Step Ahead Security programme

  • 1. One Step Ahead - Webinar In partnership with: In partnership with: How cyber criminals exploit the goodness of your employees An FBI perspective
  • 2. One Step Ahead - Webinar In partnership with: Webinar introduction by Joe Jouhal CEO at Avatu Please send your questions in through the WebEx system We’ll answer them one-by-one at the end of the webinar
  • 3. One Step Ahead - Webinar In partnership with: John Boles is a former assistant director with the FBI. Having served over 20 years in the FBI as a national security executive, his experience in leading cyber investigations worldwide and managing critical incident response, his expertise helps clients protect their data and their business. Today he’s director of Navigant’s Global Legal Technology Services. Your speakers
  • 4. One Step Ahead - Webinar In partnership with: David Nice has worked in the security environment for almost 20 years and consequently understands the challenges faced by companies - and public bodies - inside and out. Today, working with ObserveIT, he specialises in insider threats and helping people to adapt their behaviours. Your speakers
  • 5. One Step Ahead - Webinar In partnership with: What is the cyber INSIDER Threat? Definition: Anyone with legitimate access (employee, vendor, contractor) to a company network/data who puts that data at risk through either willful misconduct or unintentional actions
  • 6. One Step Ahead - Webinar In partnership with: What is the cyber INSIDER Threat? • Too often, we look outward for danger, without considering that which can do the most damage • Insiders know where the information is, where the secrets are kept • Insiders have the legitimate access crooks covet
  • 7. One Step Ahead - Webinar In partnership with: Malicious INSIDER • Have intent to harm the company or improve themselves • Often motivated by spite, revenge, or greed
  • 8. One Step Ahead - Webinar In partnership with: Malicious INSIDER Robert Hanssen spied for the Russians against the USA for decades because he felt no one appreciated his intelligence He stole information and put lives at risk
  • 9. One Step Ahead - Webinar In partnership with: Malicious INSIDER Edward Snowden stole data based on his legitimate access for greed He was recruited by foreign intelligence agencies by appealing to his inflated sense of self
  • 10. One Step Ahead - Webinar In partnership with: Unwitting INSIDER • Unintentionally cause harm to the network, often in the course of their daily work • Click on unsafe links • Visit insecure websites • Login to free and unprotected Wi-Fi
  • 11. One Step Ahead - Webinar In partnership with: Unwitting INSIDER • Lose company laptop/mobiles • Frequently targeted by cyber crooks • Often the customer facing representative
  • 12. One Step Ahead - Webinar In partnership with: Damages • Insider theft/inadvertent compromise is often undetected for long periods • Theft of IP or even client lists can eliminate competitive advantage • Stolen PII/PHI can subject a company to severe fines and, under GDPR, possibly civil legal action • Reputational damage is frequently long-lasting
  • 13. One Step Ahead - Webinar In partnership with: What to do? • Start with strong and clear policies and governance • Include mobile devices and BYOD • Ensure you have an acceptable use policy • Monitor accesses and ensure it’s appropriate Communicate the rules and make sure employees understand them
  • 14. One Step Ahead - Webinar In partnership with: Training is key • Employees must be able to o Recognise risky behaviour o Recognise suspicious email and links o Know what actions to take • Training should be ongoing and responsive • Training is best retained when it is positive and targeted
  • 15. One Step Ahead - Webinar In partnership with: Tech is important, too • Monitor traffic and connections o Are employees going to risky sites o Are employees using unauthorised apps or data transfer applications o Is the traffic going where you expect it to? • Whitelisting vs Blacklisting
  • 16. One Step Ahead - Webinar In partnership with: It’s the people • Must combine tech with policy and oversight with training • Trust but verify • It’s much safer (and cheaper) to identify and remediate risky behaviours than recover from a breach • Real cyber security is holistic Humans are creatures of habit. You can spot the early warning signs with technology and reduce the risk
  • 17. One Step Ahead - Webinar In partnership with: Identify and Eliminate Insider Threats
  • 18. One Step Ahead - Webinar In partnership with: Identify and Eliminate Insider Threats Over 1,500 customers worldwide
  • 19. One Step Ahead - Webinar In partnership with: Trust but Verify • Make your employees advocates for risk prevention against threats • Insider threats put your organisation at risk
  • 20. One Step Ahead - Webinar In partnership with: The benefits of addressing the INSIDER Threat • A heightened awareness of security throughout the organisation • A steep decline in the number of security incidents • A reduction in the amount of time spent detecting and investigating incidents
  • 21. One Step Ahead - Webinar In partnership with: • Identification of critical users & systems • Identification of rogue accounts & shared accounts • Identification of sensitive file/ folder locations Know your CRITICAL assets Src: NIST Special Publication 800-61 Volume 2
  • 22. One Step Ahead - Webinar In partnership with: Logs can be difficult to correlate and understand Can YOU tell what happened here?
  • 23. One Step Ahead - Webinar In partnership with: Visibility • Unique ‘over-the-shoulder’ view of all employee, vendor and consultant activity provides unmatched visibility • Alerts are in plain English and easy to understand • Investigations take minutes instead of days …a video is worth 1,000 logs
  • 24. One Step Ahead - Webinar In partnership with:
  • 25. One Step Ahead - Webinar In partnership with: Detect • 180 out-of-the-box Insider Threat indicators • 25 Risk categories customisable by user group: • Data exfiltration • Bypassing security controls • Creating backdoor • Identity theft • Privilege elevation • Unauthorised admin tasks • Malicious software • Shell attack • System tampering Decrease RISK immediately with actionable analytics
  • 26. One Step Ahead - Webinar In partnership with:
  • 27. One Step Ahead - Webinar In partnership with: Analytics • Uncover and investigate risky user activity through identification of anomalous behaviour • Key logging alerts detect data exfiltration attempts when users type protected keywords in emails, chat applications, social media sites, and more Dynamic filters User activity and working hours over time Total and average time per day spent by user Most used applications and websites ACHIEVE greater insight with alerts and analytics
  • 28. One Step Ahead - Webinar In partnership with: Increase VISIBILITY with website categorisation • Know when users visit un-allowed/out-of-policy websites, such as o Adult sites, illegal streaming, Darknet, illegal drugs, workplace violence, time wasting • Know when users visit bad reputation sites to avoid: o Phishing (block the user before disclosing any PII) o Contamination (block before downloading malicious content) Website categories are indicated in alerts and reports for greater visibility into user behaviour
  • 29. One Step Ahead - Webinar In partnership with: Educate EDUCATE - early and often • Educate employees about policy violations in real time • Offer constructive alternatives • Provide communication medium for security policy feedback and suggestions
  • 30. One Step Ahead - Webinar In partnership with: Deter • Warn users against proceeding with out-of-policy activities • Notify users that policy violations will be recorded and reviewed • Reduce non-compliant actions by 80% by implementing real-time warnings Show warnings: out-of-policy behaviour is recorded & reviewed DETER non-compliant actions with notifications
  • 31. One Step Ahead - Webinar In partnership with: Changing employee BEHAVIOUR reduces the risk of a security breach by 45% to 70%
  • 32. One Step Ahead - Webinar In partnership with: Prevent • Direct enforcement of company policy • Effective asset protection and damage control • Optimise Security and IT processes by collecting user feedback before the application is closed or user is logged-off A Remote Vendor trying to connect to a Server. User is forced to Log Off (with optional user-provided feedback). Security analysts can quickly spot a blocked user and easily review feedback provided by the user PREVENT users from violating policies
  • 33. One Step Ahead - Webinar In partnership with: SECURITY without compromising employee privacy
  • 34. One Step Ahead - Webinar In partnership with: Forrester Techradar ™ : endpoint security, Q1 2017
  • 35. One Step Ahead - Webinar In partnership with: Time for your questions
  • 36. One Step Ahead - Webinar In partnership with: Thank you For more information contact: luisa.farmer@avatu.co.uk phone: +44 1296 621121
  • 37. One Step Ahead - Webinar In partnership with: In partnership with: How cyber criminals exploit the goodness of your employees An FBI perspective