Personal Digital Hygiene is a concept developed by Lars Hilse. It focusses on reducing the risk of high value individuals, and their exposure and footprint on the digital world, making them less susceptible to kidnapping+ransom, and other (cyber) crimes
2. Personal Cyber Hygiene
Advisory and Trainings for Executives, their
Families, Acquaintances & Organisations
To reduce the cyber-related risks including // Impersonation
Scams & ID Theft // CEO Fraud // Kidnapping + Ransom //
Extortion
WWW.LARSHILSE.COM
Global Thought Leader in #DigitalStrategy, #CyberSecurity, #CyberTerrorism, #CyberDefence, #CyberCrime
3. About Lars G. A. Hilse
• Background in Security: 25+ years of field experience
• Focus: Cyber Security & Digital Strategy // Deep web & Cryptocurrency > Privately
funded close to USD $ 500.000 of research in Cyber Crime, Cyber Terrorism, Cyber
Defence, Cyber Insurance
• Acts as // Political advisor > Critical Infrastructure, Network Future // Collaborator/
Advisor > Law Enforcement/Intelligence/Crisis Management // Consultant > Risk
Assessment & Mitigation, Crisis Response, Establishing Cyber Security Maturity
Models
WWW.LARSHILSE.COM
Global Thought Leader in #DigitalStrategy, #CyberSecurity, #CyberTerrorism, #CyberDefence, #CyberCrime
4. What is Personal Cyber Hygiene?
Individualised training program to improve risk aware usage of public and
private communication channels (e. g. Social Media, Internet, Telephone,
Email, etc.) to reduce cyber-related threats such as // Impersonation
Scams & ID Theft // CEO Fraud // Kidnapping + Ransom (of Target, their
families, and acquaintances) // Extortion // Launched Jan. 2015
// Trainings delivered: 37
WWW.LARSHILSE.COM
Global Thought Leader in #DigitalStrategy, #CyberSecurity, #CyberTerrorism, #CyberDefence, #CyberCrime
5. Of hundreds discovered during previous trainings, and incidents resulting of
exploited vulnerabilities…
WWW.LARSHILSE.COM
Global Thought Leader in #DigitalStrategy, #CyberSecurity, #CyberTerrorism, #CyberDefence, #CyberCrime
6. Example: Family Vacation
Mexico // Target’s teenage son posts a picture of the fantastic view at the
luxury resort to social media // including precise geo-location
Avoidable Result // Location of wealthy family unveiled // A kidnapping +
ransom attempt ensued
WWW.LARSHILSE.COM
Global Thought Leader in #DigitalStrategy, #CyberSecurity, #CyberTerrorism, #CyberDefence, #CyberCrime
7. Example: Unattended Mobile
Brazil // Target’s phone is in their office to ensure undisturbed meetings //
Office breached by means of social engineering // Malware planted on
unattended phone
Avoidable Result // Target’s personal information accessible by criminals //
Target fell victim to extortion due to sensitive material on their mobile phone
WWW.LARSHILSE.COM
Global Thought Leader in #DigitalStrategy, #CyberSecurity, #CyberTerrorism, #CyberDefence, #CyberCrime
8. Example: Business Trip
China // Host invites Target out for the night // Target’s laptop is left behind in
hotel room // Maid enters room // installs malware
Avoidable Result // Corporate network breached // Privilege escalation
gave criminals full access to all corporate secrets, assets, communication,
etc. // Personal information about the Target was also accessible
WWW.LARSHILSE.COM
Global Thought Leader in #DigitalStrategy, #CyberSecurity, #CyberTerrorism, #CyberDefence, #CyberCrime
9. Example: Travel
Japan // Target is on business travel // Organisation’s email has been
monitored for months by hackers // Hackers impersonate Target
Avoidable Result // Hackers trick CFO to wire USD $ 14 million to their
account // The assets are unrecoverable // Organisation is forced to file for
bankruptcy
WWW.LARSHILSE.COM
Global Thought Leader in #DigitalStrategy, #CyberSecurity, #CyberTerrorism, #CyberDefence, #CyberCrime
10. Example: USD $1 billion theft
Bangladesh // Bangladesh Bank (national bank) // Despite tight security
employee login credentials obtained by hackers // Privilege escalation //
Access to SWIFT terminal
Avoidable Result // 35 wire orders totalling USD $1 billion issued // four wires
processed exceeding USD $ 80 million executed // Despite extensive
investigative work not all funds have been recovered
WWW.LARSHILSE.COM
Global Thought Leader in #DigitalStrategy, #CyberSecurity, #CyberTerrorism, #CyberDefence, #CyberCrime
11. Humans are still the weakest link
“Training employees to think and act with security in mind is the most underfunded
activity in cybersecurity budgets” — Accenture: Ninth annual cost of cybercrime study
WWW.LARSHILSE.COM
Global Thought Leader in #DigitalStrategy, #CyberSecurity, #CyberTerrorism, #CyberDefence, #CyberCrime
12. Personal Cyber Hygiene
What does it achieve?
Decreases vulnerabilities and makes the lives of (cyber-) criminals
significantly harder
Increases difficulty of Profile Building // Reduces Risk of Social Engineering
Attacks // Hardens Gatekeeping Mechanisms // Improves Personal Security of
Executives, and their Families // Trains usage of secure access protocols //
Reduction of CEO-Fraud-Risk // Secures Families and Acquaintances
WWW.LARSHILSE.COM
Global Thought Leader in #DigitalStrategy, #CyberSecurity, #CyberTerrorism, #CyberDefence, #CyberCrime
13. Personal Cyber Hygiene
Why is it important?
Crime still pays exceptionally, and is therefore flourishing
// Cybercrime = USD $6+ trillion (est. 2022)
// CEO-Fraud = USD $3.5 billion
// Kidnapping & Ransom = USD $1.5 billion (2010)
WWW.LARSHILSE.COM
Global Thought Leader in #DigitalStrategy, #CyberSecurity, #CyberTerrorism, #CyberDefence, #CyberCrime
14. Personal Cyber Hygiene
Goals
To understand all vulnerabilities, to avoid their exploitation, and live
safely in the cyber world
// Keeping yourself safe // Keeping your family safe // Keeping your assets
safe // Keeping your organisation safe // In a connected world
WWW.LARSHILSE.COM
Global Thought Leader in #DigitalStrategy, #CyberSecurity, #CyberTerrorism, #CyberDefence, #CyberCrime
15. Personal Cyber Hygiene
Delivery
Tailored trainings in comfortable settings for everyone involved
// One on one & group trainings with senior executives, their families,
personnel, and acquaintances
// Development & rollout of organisation-wide trainings
// Development of security protocols & inclusion into existing procedures
// Group trainings with leadership personnel (most vulnerable)
WWW.LARSHILSE.COM
Global Thought Leader in #DigitalStrategy, #CyberSecurity, #CyberTerrorism, #CyberDefence, #CyberCrime
16. Personal Cyber Hygiene
Importance of cyber
Modern communication bears significant benefits, and also has pitfalls
// Social media & the internet have become an integral tool for kidnappers &
criminals to profile Targets // Even if Target itself doesn’t use social media,
family & acquaintances can become threats & victims // Internet used to launch
sophisticated attacks on Target’s assets, family, etc.
WWW.LARSHILSE.COM
Global Thought Leader in #DigitalStrategy, #CyberSecurity, #CyberTerrorism, #CyberDefence, #CyberCrime
17. Personal Cyber Hygiene
How does it work?
All variables within the framework are individualised
// Trainings deliverable everywhere // Even in vacation settings // A detailed
risk-assessment precedes // Acts as foundation for delivery // Current
security protocol vetted in preliminary research
WWW.LARSHILSE.COM
Global Thought Leader in #DigitalStrategy, #CyberSecurity, #CyberTerrorism, #CyberDefence, #CyberCrime
18. WWW.LARSHILSE.COM
Global Thought Leader in #DigitalStrategy, #CyberSecurity, #CyberTerrorism, #CyberDefence, #CyberCrime
Personal Cyber Hygiene
Questions? Reach out today!
I’m happy to provide any answer you need.
// Phone +49 (0)4835 9513027 // Email lars.hilse@gmail.com
// PGP Key ID 17FFC660