Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

The Secure Communicator: Protect Yourself and Your Client, STC Summit 2015

729 views

Published on

Do you understand how you’ve been affected by the Heartbleed bug? Are you worried about maintaining your privacy online? (You should be.) Do you know how to best protect client or company information? Is it safe to use social media? Have you heard of ransomware? Are you worried about identity theft?

It’s not getting any safer out there! If your head is spinning after considering these questions, you need to attend The Secure Communicator—Protect Yourself and Your Client

Most technical communicators know that it’s important to secure their work and online presence, but many don’t know how to do it effectively. Good security can enable—not hinder—your work. Join the presenter as he discusses the steps you can take to adopt a security lifestyle that protects you and enables you to work effectively:
Protecting your computer
Protecting your reputation
Protecting your information
Protecting your identity
Creating strong and memorable passwords
Leveraging cool tools

Published in: Business
  • Be the first to comment

The Secure Communicator: Protect Yourself and Your Client, STC Summit 2015

  1. 1. The Secure Communicator Protect Yourself and Your Client Ben Woelk, CISSP Program Manager Information Security Office Rochester Institute of Technology
  2. 2. Why Worry? Ben Woelk--The Secure Communicator 2
  3. 3. Overview • Threat Landscape • Solutions • Cool Tools • Q&A Ben Woelk--The Secure Communicator 3
  4. 4. THREAT LANDSCAPE 2015 Ben Woelk--The Secure Communicator 4
  5. 5. What’sStolen? Ben Woelk--The Secure Communicator 5
  6. 6. Value? Ben Woelk--The Secure Communicator 6
  7. 7. Social Media Ben Woelk--The Secure Communicator 7
  8. 8. Mobile Ben Woelk--The Secure Communicator 8
  9. 9. Ransomware Ben Woelk--The Secure Communicator 9
  10. 10. Ben Woelk--The Secure Communicator 10
  11. 11. Solutions Ben Woelk--The Secure Communicator 11
  12. 12. Protecting Your Computer • Anti-virus • Firewalls • Patching Ben Woelk--The Secure Communicator 12
  13. 13. Protecting Your Reputation Ben Woelk--The Secure Communicator 13
  14. 14. Protecting Your Information Ben Woelk--The Secure Communicator 14
  15. 15. Protecting Your Identity Ben Woelk--The Secure Communicator 15
  16. 16. Passwords Ben Woelk--The Secure Communicator 16
  17. 17. Passphrase It was a dark and stormy night becomes ItwasaDark215&StormyNight Length > complexity Ben Woelk--The Secure Communicator 17
  18. 18. Cool Tools • Password Safes • Google Dashboard • Browser Plugins – Netcraft – McAfee Site Advisor • Secunia PSI • Mobile Security Apps Ben Woelk--The Secure Communicator 18
  19. 19. Password Safes Ben Woelk--The Secure Communicator 19
  20. 20. Google Dashboard Monitor use of your name Ben Woelk--The Secure Communicator 20
  21. 21. Browser Plugins – Netcraft Ben Woelk--The Secure Communicator 21
  22. 22. – McAfee Site Advisor Browser Plugins Ben Woelk--The Secure Communicator 22
  23. 23. SecuniaPSI Ben Woelk--The Secure Communicator 23
  24. 24. Mobile Security Apps • Lookout Security & Antivirus (Android, iOS) • Avast Mobile Security (Android) • Avast SecureMe (iOS) • Google Authenticator (Android, iOS) • Find My iPhone (iOS) • iVault (iOS) Ben Woelk--The Secure Communicator 24
  25. 25. Resources • Goodreads Cyber Security Library https://www.goodreads.com/search?q=cyber+secur ity+library • Infosec Communicator Blog benwoelk.com • Shockproofing Your Use of Social Media eBook (free 6/21–6/25) http://amzn.com/B00OJMK4T2 • ISTR20 Internet Security Threat Report, April 2015, Symantec http://www.symantec.com/security_response/publications/th reatreport.jsp Ben Woelk--The Secure Communicator 25
  26. 26. Questions (and maybe some answers) Ben Woelk Ben.woelk@gmail.com Benwoelk.com @benwoelk www.linkedin.com/in/benwoelk/ Ben Woelk--The Secure Communicator 26

×