SlideShare a Scribd company logo
1 of 18
Download to read offline
“It’s like Inception without the science fiction”
Personal Cyber Hygiene
Advisory and Trainings for Executives, their
Families, Acquaintances & Organisations
To reduce the cyber-related risks including // Impersonation
Scams & ID Theft // CEO Fraud // Kidnapping + Ransom //
Extortion
WWW.LARSHILSE.COM 

Global Thought Leader in #DigitalStrategy, #CyberSecurity, #CyberTerrorism, #CyberDefence, #CyberCrime
About Lars G. A. Hilse
• Background in Security: 25+ years of field experience
• Focus: Cyber Security & Digital Strategy // Deep web & Cryptocurrency > Privately
funded close to USD $ 500.000 of research in Cyber Crime, Cyber Terrorism, Cyber
Defence, Cyber Insurance
• Acts as // Political advisor > Critical Infrastructure, Network Future // Collaborator/
Advisor > Law Enforcement/Intelligence/Crisis Management // Consultant > Risk
Assessment & Mitigation, Crisis Response, Establishing Cyber Security Maturity
Models
WWW.LARSHILSE.COM 

Global Thought Leader in #DigitalStrategy, #CyberSecurity, #CyberTerrorism, #CyberDefence, #CyberCrime
What is Personal Cyber Hygiene?
Individualised training program to improve risk aware usage of public and
private communication channels (e. g. Social Media, Internet, Telephone,
Email, etc.) to reduce cyber-related threats such as // Impersonation
Scams & ID Theft // CEO Fraud // Kidnapping + Ransom (of Target, their
families, and acquaintances) // Extortion // Launched Jan. 2015
// Trainings delivered: 37
WWW.LARSHILSE.COM 

Global Thought Leader in #DigitalStrategy, #CyberSecurity, #CyberTerrorism, #CyberDefence, #CyberCrime
Of hundreds discovered during previous trainings, and incidents resulting of
exploited vulnerabilities…
WWW.LARSHILSE.COM 

Global Thought Leader in #DigitalStrategy, #CyberSecurity, #CyberTerrorism, #CyberDefence, #CyberCrime
Example: Family Vacation
Mexico // Target’s teenage son posts a picture of the fantastic view at the
luxury resort to social media // including precise geo-location
Avoidable Result // Location of wealthy family unveiled // A kidnapping +
ransom attempt ensued
WWW.LARSHILSE.COM 

Global Thought Leader in #DigitalStrategy, #CyberSecurity, #CyberTerrorism, #CyberDefence, #CyberCrime
Example: Unattended Mobile
Brazil // Target’s phone is in their office to ensure undisturbed meetings //
Office breached by means of social engineering // Malware planted on
unattended phone
Avoidable Result // Target’s personal information accessible by criminals //
Target fell victim to extortion due to sensitive material on their mobile phone
WWW.LARSHILSE.COM 

Global Thought Leader in #DigitalStrategy, #CyberSecurity, #CyberTerrorism, #CyberDefence, #CyberCrime
Example: Business Trip
China // Host invites Target out for the night // Target’s laptop is left behind in
hotel room // Maid enters room // installs malware
Avoidable Result // Corporate network breached // Privilege escalation
gave criminals full access to all corporate secrets, assets, communication,
etc. // Personal information about the Target was also accessible
WWW.LARSHILSE.COM 

Global Thought Leader in #DigitalStrategy, #CyberSecurity, #CyberTerrorism, #CyberDefence, #CyberCrime
Example: Travel
Japan // Target is on business travel // Organisation’s email has been
monitored for months by hackers // Hackers impersonate Target
Avoidable Result // Hackers trick CFO to wire USD $ 14 million to their
account // The assets are unrecoverable // Organisation is forced to file for
bankruptcy
WWW.LARSHILSE.COM 

Global Thought Leader in #DigitalStrategy, #CyberSecurity, #CyberTerrorism, #CyberDefence, #CyberCrime
Example: USD $1 billion theft
Bangladesh // Bangladesh Bank (national bank) // Despite tight security
employee login credentials obtained by hackers // Privilege escalation //
Access to SWIFT terminal
Avoidable Result // 35 wire orders totalling USD $1 billion issued // four wires
processed exceeding USD $ 80 million executed // Despite extensive
investigative work not all funds have been recovered
WWW.LARSHILSE.COM 

Global Thought Leader in #DigitalStrategy, #CyberSecurity, #CyberTerrorism, #CyberDefence, #CyberCrime
Humans are still the weakest link
“Training employees to think and act with security in mind is the most underfunded
activity in cybersecurity budgets” — Accenture: Ninth annual cost of cybercrime study
WWW.LARSHILSE.COM 

Global Thought Leader in #DigitalStrategy, #CyberSecurity, #CyberTerrorism, #CyberDefence, #CyberCrime
Personal Cyber Hygiene
What does it achieve?
Decreases vulnerabilities and makes the lives of (cyber-) criminals
significantly harder
Increases difficulty of Profile Building // Reduces Risk of Social Engineering
Attacks // Hardens Gatekeeping Mechanisms // Improves Personal Security of
Executives, and their Families // Trains usage of secure access protocols //
Reduction of CEO-Fraud-Risk // Secures Families and Acquaintances
WWW.LARSHILSE.COM 

Global Thought Leader in #DigitalStrategy, #CyberSecurity, #CyberTerrorism, #CyberDefence, #CyberCrime
Personal Cyber Hygiene
Why is it important?
Crime still pays exceptionally, and is therefore flourishing
// Cybercrime = USD $6+ trillion (est. 2022)
// CEO-Fraud = USD $3.5 billion
// Kidnapping & Ransom = USD $1.5 billion (2010)
WWW.LARSHILSE.COM 

Global Thought Leader in #DigitalStrategy, #CyberSecurity, #CyberTerrorism, #CyberDefence, #CyberCrime
Personal Cyber Hygiene
Goals
To understand all vulnerabilities, to avoid their exploitation, and live
safely in the cyber world
// Keeping yourself safe // Keeping your family safe // Keeping your assets
safe // Keeping your organisation safe // In a connected world
WWW.LARSHILSE.COM 

Global Thought Leader in #DigitalStrategy, #CyberSecurity, #CyberTerrorism, #CyberDefence, #CyberCrime
Personal Cyber Hygiene
Delivery
Tailored trainings in comfortable settings for everyone involved
// One on one & group trainings with senior executives, their families,
personnel, and acquaintances
// Development & rollout of organisation-wide trainings
// Development of security protocols & inclusion into existing procedures
// Group trainings with leadership personnel (most vulnerable)
WWW.LARSHILSE.COM 

Global Thought Leader in #DigitalStrategy, #CyberSecurity, #CyberTerrorism, #CyberDefence, #CyberCrime
Personal Cyber Hygiene
Importance of cyber
Modern communication bears significant benefits, and also has pitfalls
// Social media & the internet have become an integral tool for kidnappers &
criminals to profile Targets // Even if Target itself doesn’t use social media,
family & acquaintances can become threats & victims // Internet used to launch
sophisticated attacks on Target’s assets, family, etc.
WWW.LARSHILSE.COM 

Global Thought Leader in #DigitalStrategy, #CyberSecurity, #CyberTerrorism, #CyberDefence, #CyberCrime
Personal Cyber Hygiene
How does it work?
All variables within the framework are individualised
// Trainings deliverable everywhere // Even in vacation settings // A detailed
risk-assessment precedes // Acts as foundation for delivery // Current
security protocol vetted in preliminary research
WWW.LARSHILSE.COM 

Global Thought Leader in #DigitalStrategy, #CyberSecurity, #CyberTerrorism, #CyberDefence, #CyberCrime
WWW.LARSHILSE.COM 

Global Thought Leader in #DigitalStrategy, #CyberSecurity, #CyberTerrorism, #CyberDefence, #CyberCrime
Personal Cyber Hygiene
Questions? Reach out today!
I’m happy to provide any answer you need.
// Phone +49 (0)4835 9513027 // Email lars.hilse@gmail.com
// PGP Key ID 17FFC660

More Related Content

What's hot

Cyber Security: Why your business needs protection & prevention measures
Cyber Security: Why your business needs protection & prevention measuresCyber Security: Why your business needs protection & prevention measures
Cyber Security: Why your business needs protection & prevention measuresCBIZ, Inc.
 
Negative effects of social media
Negative effects of social mediaNegative effects of social media
Negative effects of social mediaNida Rabbani
 
Social media privacy issues
Social media privacy issuesSocial media privacy issues
Social media privacy issuesNousheen Arshad
 
Negative side of Social meadia
Negative side of Social meadia Negative side of Social meadia
Negative side of Social meadia Sarath Mathew
 
Cyber security talks 2019 by theko moima
Cyber security talks 2019 by theko moimaCyber security talks 2019 by theko moima
Cyber security talks 2019 by theko moimaTheko Moima
 
introduction to cyber security
introduction to cyber securityintroduction to cyber security
introduction to cyber securitySlamet Ar Rokhim
 
Digital Security for Journalists
Digital Security for JournalistsDigital Security for Journalists
Digital Security for JournalistsLaurent Eschenauer
 
Cybersecurity Awareness Training Presentation v1.2
Cybersecurity Awareness Training Presentation v1.2Cybersecurity Awareness Training Presentation v1.2
Cybersecurity Awareness Training Presentation v1.2DallasHaselhorst
 
Social Media Etiquette
Social Media EtiquetteSocial Media Etiquette
Social Media EtiquettePaul Maynard
 
Intro to Facebook Presentation – Facebook, How to Get Started Safely
Intro to Facebook Presentation – Facebook, How to Get Started SafelyIntro to Facebook Presentation – Facebook, How to Get Started Safely
Intro to Facebook Presentation – Facebook, How to Get Started Safelyhewie
 
Face Facebook: The History of Facebook
Face Facebook: The History of FacebookFace Facebook: The History of Facebook
Face Facebook: The History of FacebookKhalid Farhan
 
Computer & internet Security
Computer & internet SecurityComputer & internet Security
Computer & internet SecurityGerard Lamusse
 
Ethical hacking course
Ethical hacking courseEthical hacking course
Ethical hacking courseChitraKuder
 
Cyber Security – Challenges [Autosaved].pptx
Cyber Security – Challenges [Autosaved].pptxCyber Security – Challenges [Autosaved].pptx
Cyber Security – Challenges [Autosaved].pptxRambilashTudu
 
Online Social Networks: 5 threats and 5 ways to use them safely
Online Social Networks: 5 threats and 5 ways to use them safelyOnline Social Networks: 5 threats and 5 ways to use them safely
Online Social Networks: 5 threats and 5 ways to use them safelyTom Eston
 
Dangers to social media
Dangers to social mediaDangers to social media
Dangers to social mediaRyan Ward
 

What's hot (20)

Cyber Security: Why your business needs protection & prevention measures
Cyber Security: Why your business needs protection & prevention measuresCyber Security: Why your business needs protection & prevention measures
Cyber Security: Why your business needs protection & prevention measures
 
Phishing
PhishingPhishing
Phishing
 
Negative effects of social media
Negative effects of social mediaNegative effects of social media
Negative effects of social media
 
Social media privacy issues
Social media privacy issuesSocial media privacy issues
Social media privacy issues
 
Negative side of Social meadia
Negative side of Social meadia Negative side of Social meadia
Negative side of Social meadia
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security talks 2019 by theko moima
Cyber security talks 2019 by theko moimaCyber security talks 2019 by theko moima
Cyber security talks 2019 by theko moima
 
introduction to cyber security
introduction to cyber securityintroduction to cyber security
introduction to cyber security
 
Digital Security for Journalists
Digital Security for JournalistsDigital Security for Journalists
Digital Security for Journalists
 
Cybersecurity Awareness Training Presentation v1.2
Cybersecurity Awareness Training Presentation v1.2Cybersecurity Awareness Training Presentation v1.2
Cybersecurity Awareness Training Presentation v1.2
 
Social Media Etiquette
Social Media EtiquetteSocial Media Etiquette
Social Media Etiquette
 
Intro to Facebook Presentation – Facebook, How to Get Started Safely
Intro to Facebook Presentation – Facebook, How to Get Started SafelyIntro to Facebook Presentation – Facebook, How to Get Started Safely
Intro to Facebook Presentation – Facebook, How to Get Started Safely
 
Face Facebook: The History of Facebook
Face Facebook: The History of FacebookFace Facebook: The History of Facebook
Face Facebook: The History of Facebook
 
Computer & internet Security
Computer & internet SecurityComputer & internet Security
Computer & internet Security
 
Ethical hacking course
Ethical hacking courseEthical hacking course
Ethical hacking course
 
Cyber Security – Challenges [Autosaved].pptx
Cyber Security – Challenges [Autosaved].pptxCyber Security – Challenges [Autosaved].pptx
Cyber Security – Challenges [Autosaved].pptx
 
Online Social Networks: 5 threats and 5 ways to use them safely
Online Social Networks: 5 threats and 5 ways to use them safelyOnline Social Networks: 5 threats and 5 ways to use them safely
Online Social Networks: 5 threats and 5 ways to use them safely
 
E-Commerce.pptx
E-Commerce.pptxE-Commerce.pptx
E-Commerce.pptx
 
PHISHING attack
PHISHING attack PHISHING attack
PHISHING attack
 
Dangers to social media
Dangers to social mediaDangers to social media
Dangers to social media
 

Similar to Personal Digital Hygiene

Cyber law and password protection
Cyber law and password protectionCyber law and password protection
Cyber law and password protectionBavijesh Thaliyil
 
What Are Script Kiddies.pdf
What Are Script Kiddies.pdfWhat Are Script Kiddies.pdf
What Are Script Kiddies.pdfuzair
 
CC_Futureinc_Cyber Security
CC_Futureinc_Cyber SecurityCC_Futureinc_Cyber Security
CC_Futureinc_Cyber SecurityAlistair Blake
 
CYBER SECURITY AND ETHICAL HACKING.pptx
CYBER SECURITY AND ETHICAL HACKING.pptxCYBER SECURITY AND ETHICAL HACKING.pptx
CYBER SECURITY AND ETHICAL HACKING.pptxRiyaNair19
 
Cybersecurity Interview Questions Part -2.pdf
Cybersecurity Interview Questions Part -2.pdfCybersecurity Interview Questions Part -2.pdf
Cybersecurity Interview Questions Part -2.pdfInfosec Train
 
Combating cyber crimes chinatu
Combating cyber crimes chinatuCombating cyber crimes chinatu
Combating cyber crimes chinatuChinatu Uzuegbu
 
Cyber security for Developers
Cyber security for DevelopersCyber security for Developers
Cyber security for Developerstechtutorus
 
Cyber security and its controls.pptx
Cyber security and its controls.pptxCyber security and its controls.pptx
Cyber security and its controls.pptxsrikmhh
 
What is Cybersecurity and career paths.
What is Cybersecurity and career paths.What is Cybersecurity and career paths.
What is Cybersecurity and career paths.The Whole World News
 
Security in e-commerce
Security in e-commerceSecurity in e-commerce
Security in e-commerceSensePost
 
Info Session on Cybersecurity & Cybersecurity Study Jams
Info Session on Cybersecurity & Cybersecurity Study JamsInfo Session on Cybersecurity & Cybersecurity Study Jams
Info Session on Cybersecurity & Cybersecurity Study JamsGDSCCVR
 
Deepfake Technology's Emergence: Exploring Its Impact on Cybersecurity
Deepfake Technology's Emergence: Exploring Its Impact on CybersecurityDeepfake Technology's Emergence: Exploring Its Impact on Cybersecurity
Deepfake Technology's Emergence: Exploring Its Impact on CybersecurityPC Doctors NET
 
securing-the-digital-frontier-a-guide-to-cyber-security
securing-the-digital-frontier-a-guide-to-cyber-securitysecuring-the-digital-frontier-a-guide-to-cyber-security
securing-the-digital-frontier-a-guide-to-cyber-securitycajiwol341
 
40 under 40 in cybersecurity. top cyber news magazine
40 under 40 in cybersecurity. top cyber news magazine40 under 40 in cybersecurity. top cyber news magazine
40 under 40 in cybersecurity. top cyber news magazineBradford Sims
 
40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE
40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE
40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINETopCyberNewsMAGAZINE
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCybAnastaciaShadelb
 

Similar to Personal Digital Hygiene (20)

Cyber law and password protection
Cyber law and password protectionCyber law and password protection
Cyber law and password protection
 
What Are Script Kiddies.pdf
What Are Script Kiddies.pdfWhat Are Script Kiddies.pdf
What Are Script Kiddies.pdf
 
CC_Futureinc_Cyber Security
CC_Futureinc_Cyber SecurityCC_Futureinc_Cyber Security
CC_Futureinc_Cyber Security
 
CYBER SECURITY AND ETHICAL HACKING.pptx
CYBER SECURITY AND ETHICAL HACKING.pptxCYBER SECURITY AND ETHICAL HACKING.pptx
CYBER SECURITY AND ETHICAL HACKING.pptx
 
Cybersecurity Interview Questions Part -2.pdf
Cybersecurity Interview Questions Part -2.pdfCybersecurity Interview Questions Part -2.pdf
Cybersecurity Interview Questions Part -2.pdf
 
Combating cyber crimes chinatu
Combating cyber crimes chinatuCombating cyber crimes chinatu
Combating cyber crimes chinatu
 
Cyber security for Developers
Cyber security for DevelopersCyber security for Developers
Cyber security for Developers
 
CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016 CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016
 
CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016 CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016
 
Understanding the Impact of Cyber Security in Health Care
Understanding the Impact of Cyber Security in Health CareUnderstanding the Impact of Cyber Security in Health Care
Understanding the Impact of Cyber Security in Health Care
 
Cyber security and its controls.pptx
Cyber security and its controls.pptxCyber security and its controls.pptx
Cyber security and its controls.pptx
 
What is Cybersecurity and career paths.
What is Cybersecurity and career paths.What is Cybersecurity and career paths.
What is Cybersecurity and career paths.
 
Security in e-commerce
Security in e-commerceSecurity in e-commerce
Security in e-commerce
 
Info Session on Cybersecurity & Cybersecurity Study Jams
Info Session on Cybersecurity & Cybersecurity Study JamsInfo Session on Cybersecurity & Cybersecurity Study Jams
Info Session on Cybersecurity & Cybersecurity Study Jams
 
Deepfake Technology's Emergence: Exploring Its Impact on Cybersecurity
Deepfake Technology's Emergence: Exploring Its Impact on CybersecurityDeepfake Technology's Emergence: Exploring Its Impact on Cybersecurity
Deepfake Technology's Emergence: Exploring Its Impact on Cybersecurity
 
Cybercrime: Radically Rethinking the Global Threat
Cybercrime:  Radically Rethinking the Global ThreatCybercrime:  Radically Rethinking the Global Threat
Cybercrime: Radically Rethinking the Global Threat
 
securing-the-digital-frontier-a-guide-to-cyber-security
securing-the-digital-frontier-a-guide-to-cyber-securitysecuring-the-digital-frontier-a-guide-to-cyber-security
securing-the-digital-frontier-a-guide-to-cyber-security
 
40 under 40 in cybersecurity. top cyber news magazine
40 under 40 in cybersecurity. top cyber news magazine40 under 40 in cybersecurity. top cyber news magazine
40 under 40 in cybersecurity. top cyber news magazine
 
40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE
40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE
40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
 

Recently uploaded

Effective learning in the Age of Hybrid Work - Agile Saturday Tallinn 2024
Effective learning in the Age of Hybrid Work - Agile Saturday Tallinn 2024Effective learning in the Age of Hybrid Work - Agile Saturday Tallinn 2024
Effective learning in the Age of Hybrid Work - Agile Saturday Tallinn 2024Giuseppe De Simone
 
Motivational theories an leadership skills
Motivational theories an leadership skillsMotivational theories an leadership skills
Motivational theories an leadership skillskristinalimarenko7
 
原版1:1复刻密西西比大学毕业证Mississippi毕业证留信学历认证
原版1:1复刻密西西比大学毕业证Mississippi毕业证留信学历认证原版1:1复刻密西西比大学毕业证Mississippi毕业证留信学历认证
原版1:1复刻密西西比大学毕业证Mississippi毕业证留信学历认证jdkhjh
 
Measuring True Process Yield using Robust Yield Metrics
Measuring True Process Yield using Robust Yield MetricsMeasuring True Process Yield using Robust Yield Metrics
Measuring True Process Yield using Robust Yield MetricsCIToolkit
 
Paired Comparison Analysis: A Practical Tool for Evaluating Options and Prior...
Paired Comparison Analysis: A Practical Tool for Evaluating Options and Prior...Paired Comparison Analysis: A Practical Tool for Evaluating Options and Prior...
Paired Comparison Analysis: A Practical Tool for Evaluating Options and Prior...CIToolkit
 
LPC Warehouse Management System For Clients In The Business Sector
LPC Warehouse Management System For Clients In The Business SectorLPC Warehouse Management System For Clients In The Business Sector
LPC Warehouse Management System For Clients In The Business Sectorthomas851723
 
Beyond the Five Whys: Exploring the Hierarchical Causes with the Why-Why Diagram
Beyond the Five Whys: Exploring the Hierarchical Causes with the Why-Why DiagramBeyond the Five Whys: Exploring the Hierarchical Causes with the Why-Why Diagram
Beyond the Five Whys: Exploring the Hierarchical Causes with the Why-Why DiagramCIToolkit
 
How-How Diagram: A Practical Approach to Problem Resolution
How-How Diagram: A Practical Approach to Problem ResolutionHow-How Diagram: A Practical Approach to Problem Resolution
How-How Diagram: A Practical Approach to Problem ResolutionCIToolkit
 
From Goals to Actions: Uncovering the Key Components of Improvement Roadmaps
From Goals to Actions: Uncovering the Key Components of Improvement RoadmapsFrom Goals to Actions: Uncovering the Key Components of Improvement Roadmaps
From Goals to Actions: Uncovering the Key Components of Improvement RoadmapsCIToolkit
 
Management and managerial skills training manual.pdf
Management and managerial skills training manual.pdfManagement and managerial skills training manual.pdf
Management and managerial skills training manual.pdffillmonipdc
 
Unlocking Productivity and Personal Growth through the Importance-Urgency Matrix
Unlocking Productivity and Personal Growth through the Importance-Urgency MatrixUnlocking Productivity and Personal Growth through the Importance-Urgency Matrix
Unlocking Productivity and Personal Growth through the Importance-Urgency MatrixCIToolkit
 
Farmer Representative Organization in Lucknow | Rashtriya Kisan Manch
Farmer Representative Organization in Lucknow | Rashtriya Kisan ManchFarmer Representative Organization in Lucknow | Rashtriya Kisan Manch
Farmer Representative Organization in Lucknow | Rashtriya Kisan ManchRashtriya Kisan Manch
 
Call Us🔝⇛+91-97111🔝47426 Call In girls Munirka (DELHI)
Call Us🔝⇛+91-97111🔝47426 Call In girls Munirka (DELHI)Call Us🔝⇛+91-97111🔝47426 Call In girls Munirka (DELHI)
Call Us🔝⇛+91-97111🔝47426 Call In girls Munirka (DELHI)jennyeacort
 
Simplifying Complexity: How the Four-Field Matrix Reshapes Thinking
Simplifying Complexity: How the Four-Field Matrix Reshapes ThinkingSimplifying Complexity: How the Four-Field Matrix Reshapes Thinking
Simplifying Complexity: How the Four-Field Matrix Reshapes ThinkingCIToolkit
 
LPC Operations Review PowerPoint | Operations Review
LPC Operations Review PowerPoint | Operations ReviewLPC Operations Review PowerPoint | Operations Review
LPC Operations Review PowerPoint | Operations Reviewthomas851723
 
Introduction to LPC - Facility Design And Re-Engineering
Introduction to LPC - Facility Design And Re-EngineeringIntroduction to LPC - Facility Design And Re-Engineering
Introduction to LPC - Facility Design And Re-Engineeringthomas851723
 
Shaping Organizational Culture Beyond Wishful Thinking
Shaping Organizational Culture Beyond Wishful ThinkingShaping Organizational Culture Beyond Wishful Thinking
Shaping Organizational Culture Beyond Wishful ThinkingGiuseppe De Simone
 
Fifteenth Finance Commission Presentation
Fifteenth Finance Commission PresentationFifteenth Finance Commission Presentation
Fifteenth Finance Commission Presentationmintusiprd
 
Reflecting, turning experience into insight
Reflecting, turning experience into insightReflecting, turning experience into insight
Reflecting, turning experience into insightWayne Abrahams
 

Recently uploaded (20)

Effective learning in the Age of Hybrid Work - Agile Saturday Tallinn 2024
Effective learning in the Age of Hybrid Work - Agile Saturday Tallinn 2024Effective learning in the Age of Hybrid Work - Agile Saturday Tallinn 2024
Effective learning in the Age of Hybrid Work - Agile Saturday Tallinn 2024
 
Motivational theories an leadership skills
Motivational theories an leadership skillsMotivational theories an leadership skills
Motivational theories an leadership skills
 
原版1:1复刻密西西比大学毕业证Mississippi毕业证留信学历认证
原版1:1复刻密西西比大学毕业证Mississippi毕业证留信学历认证原版1:1复刻密西西比大学毕业证Mississippi毕业证留信学历认证
原版1:1复刻密西西比大学毕业证Mississippi毕业证留信学历认证
 
Measuring True Process Yield using Robust Yield Metrics
Measuring True Process Yield using Robust Yield MetricsMeasuring True Process Yield using Robust Yield Metrics
Measuring True Process Yield using Robust Yield Metrics
 
Paired Comparison Analysis: A Practical Tool for Evaluating Options and Prior...
Paired Comparison Analysis: A Practical Tool for Evaluating Options and Prior...Paired Comparison Analysis: A Practical Tool for Evaluating Options and Prior...
Paired Comparison Analysis: A Practical Tool for Evaluating Options and Prior...
 
sauth delhi call girls in Defence Colony🔝 9953056974 🔝 escort Service
sauth delhi call girls in Defence Colony🔝 9953056974 🔝 escort Servicesauth delhi call girls in Defence Colony🔝 9953056974 🔝 escort Service
sauth delhi call girls in Defence Colony🔝 9953056974 🔝 escort Service
 
LPC Warehouse Management System For Clients In The Business Sector
LPC Warehouse Management System For Clients In The Business SectorLPC Warehouse Management System For Clients In The Business Sector
LPC Warehouse Management System For Clients In The Business Sector
 
Beyond the Five Whys: Exploring the Hierarchical Causes with the Why-Why Diagram
Beyond the Five Whys: Exploring the Hierarchical Causes with the Why-Why DiagramBeyond the Five Whys: Exploring the Hierarchical Causes with the Why-Why Diagram
Beyond the Five Whys: Exploring the Hierarchical Causes with the Why-Why Diagram
 
How-How Diagram: A Practical Approach to Problem Resolution
How-How Diagram: A Practical Approach to Problem ResolutionHow-How Diagram: A Practical Approach to Problem Resolution
How-How Diagram: A Practical Approach to Problem Resolution
 
From Goals to Actions: Uncovering the Key Components of Improvement Roadmaps
From Goals to Actions: Uncovering the Key Components of Improvement RoadmapsFrom Goals to Actions: Uncovering the Key Components of Improvement Roadmaps
From Goals to Actions: Uncovering the Key Components of Improvement Roadmaps
 
Management and managerial skills training manual.pdf
Management and managerial skills training manual.pdfManagement and managerial skills training manual.pdf
Management and managerial skills training manual.pdf
 
Unlocking Productivity and Personal Growth through the Importance-Urgency Matrix
Unlocking Productivity and Personal Growth through the Importance-Urgency MatrixUnlocking Productivity and Personal Growth through the Importance-Urgency Matrix
Unlocking Productivity and Personal Growth through the Importance-Urgency Matrix
 
Farmer Representative Organization in Lucknow | Rashtriya Kisan Manch
Farmer Representative Organization in Lucknow | Rashtriya Kisan ManchFarmer Representative Organization in Lucknow | Rashtriya Kisan Manch
Farmer Representative Organization in Lucknow | Rashtriya Kisan Manch
 
Call Us🔝⇛+91-97111🔝47426 Call In girls Munirka (DELHI)
Call Us🔝⇛+91-97111🔝47426 Call In girls Munirka (DELHI)Call Us🔝⇛+91-97111🔝47426 Call In girls Munirka (DELHI)
Call Us🔝⇛+91-97111🔝47426 Call In girls Munirka (DELHI)
 
Simplifying Complexity: How the Four-Field Matrix Reshapes Thinking
Simplifying Complexity: How the Four-Field Matrix Reshapes ThinkingSimplifying Complexity: How the Four-Field Matrix Reshapes Thinking
Simplifying Complexity: How the Four-Field Matrix Reshapes Thinking
 
LPC Operations Review PowerPoint | Operations Review
LPC Operations Review PowerPoint | Operations ReviewLPC Operations Review PowerPoint | Operations Review
LPC Operations Review PowerPoint | Operations Review
 
Introduction to LPC - Facility Design And Re-Engineering
Introduction to LPC - Facility Design And Re-EngineeringIntroduction to LPC - Facility Design And Re-Engineering
Introduction to LPC - Facility Design And Re-Engineering
 
Shaping Organizational Culture Beyond Wishful Thinking
Shaping Organizational Culture Beyond Wishful ThinkingShaping Organizational Culture Beyond Wishful Thinking
Shaping Organizational Culture Beyond Wishful Thinking
 
Fifteenth Finance Commission Presentation
Fifteenth Finance Commission PresentationFifteenth Finance Commission Presentation
Fifteenth Finance Commission Presentation
 
Reflecting, turning experience into insight
Reflecting, turning experience into insightReflecting, turning experience into insight
Reflecting, turning experience into insight
 

Personal Digital Hygiene

  • 1. “It’s like Inception without the science fiction”
  • 2. Personal Cyber Hygiene Advisory and Trainings for Executives, their Families, Acquaintances & Organisations To reduce the cyber-related risks including // Impersonation Scams & ID Theft // CEO Fraud // Kidnapping + Ransom // Extortion WWW.LARSHILSE.COM 
 Global Thought Leader in #DigitalStrategy, #CyberSecurity, #CyberTerrorism, #CyberDefence, #CyberCrime
  • 3. About Lars G. A. Hilse • Background in Security: 25+ years of field experience • Focus: Cyber Security & Digital Strategy // Deep web & Cryptocurrency > Privately funded close to USD $ 500.000 of research in Cyber Crime, Cyber Terrorism, Cyber Defence, Cyber Insurance • Acts as // Political advisor > Critical Infrastructure, Network Future // Collaborator/ Advisor > Law Enforcement/Intelligence/Crisis Management // Consultant > Risk Assessment & Mitigation, Crisis Response, Establishing Cyber Security Maturity Models WWW.LARSHILSE.COM 
 Global Thought Leader in #DigitalStrategy, #CyberSecurity, #CyberTerrorism, #CyberDefence, #CyberCrime
  • 4. What is Personal Cyber Hygiene? Individualised training program to improve risk aware usage of public and private communication channels (e. g. Social Media, Internet, Telephone, Email, etc.) to reduce cyber-related threats such as // Impersonation Scams & ID Theft // CEO Fraud // Kidnapping + Ransom (of Target, their families, and acquaintances) // Extortion // Launched Jan. 2015 // Trainings delivered: 37 WWW.LARSHILSE.COM 
 Global Thought Leader in #DigitalStrategy, #CyberSecurity, #CyberTerrorism, #CyberDefence, #CyberCrime
  • 5. Of hundreds discovered during previous trainings, and incidents resulting of exploited vulnerabilities… WWW.LARSHILSE.COM 
 Global Thought Leader in #DigitalStrategy, #CyberSecurity, #CyberTerrorism, #CyberDefence, #CyberCrime
  • 6. Example: Family Vacation Mexico // Target’s teenage son posts a picture of the fantastic view at the luxury resort to social media // including precise geo-location Avoidable Result // Location of wealthy family unveiled // A kidnapping + ransom attempt ensued WWW.LARSHILSE.COM 
 Global Thought Leader in #DigitalStrategy, #CyberSecurity, #CyberTerrorism, #CyberDefence, #CyberCrime
  • 7. Example: Unattended Mobile Brazil // Target’s phone is in their office to ensure undisturbed meetings // Office breached by means of social engineering // Malware planted on unattended phone Avoidable Result // Target’s personal information accessible by criminals // Target fell victim to extortion due to sensitive material on their mobile phone WWW.LARSHILSE.COM 
 Global Thought Leader in #DigitalStrategy, #CyberSecurity, #CyberTerrorism, #CyberDefence, #CyberCrime
  • 8. Example: Business Trip China // Host invites Target out for the night // Target’s laptop is left behind in hotel room // Maid enters room // installs malware Avoidable Result // Corporate network breached // Privilege escalation gave criminals full access to all corporate secrets, assets, communication, etc. // Personal information about the Target was also accessible WWW.LARSHILSE.COM 
 Global Thought Leader in #DigitalStrategy, #CyberSecurity, #CyberTerrorism, #CyberDefence, #CyberCrime
  • 9. Example: Travel Japan // Target is on business travel // Organisation’s email has been monitored for months by hackers // Hackers impersonate Target Avoidable Result // Hackers trick CFO to wire USD $ 14 million to their account // The assets are unrecoverable // Organisation is forced to file for bankruptcy WWW.LARSHILSE.COM 
 Global Thought Leader in #DigitalStrategy, #CyberSecurity, #CyberTerrorism, #CyberDefence, #CyberCrime
  • 10. Example: USD $1 billion theft Bangladesh // Bangladesh Bank (national bank) // Despite tight security employee login credentials obtained by hackers // Privilege escalation // Access to SWIFT terminal Avoidable Result // 35 wire orders totalling USD $1 billion issued // four wires processed exceeding USD $ 80 million executed // Despite extensive investigative work not all funds have been recovered WWW.LARSHILSE.COM 
 Global Thought Leader in #DigitalStrategy, #CyberSecurity, #CyberTerrorism, #CyberDefence, #CyberCrime
  • 11. Humans are still the weakest link “Training employees to think and act with security in mind is the most underfunded activity in cybersecurity budgets” — Accenture: Ninth annual cost of cybercrime study WWW.LARSHILSE.COM 
 Global Thought Leader in #DigitalStrategy, #CyberSecurity, #CyberTerrorism, #CyberDefence, #CyberCrime
  • 12. Personal Cyber Hygiene What does it achieve? Decreases vulnerabilities and makes the lives of (cyber-) criminals significantly harder Increases difficulty of Profile Building // Reduces Risk of Social Engineering Attacks // Hardens Gatekeeping Mechanisms // Improves Personal Security of Executives, and their Families // Trains usage of secure access protocols // Reduction of CEO-Fraud-Risk // Secures Families and Acquaintances WWW.LARSHILSE.COM 
 Global Thought Leader in #DigitalStrategy, #CyberSecurity, #CyberTerrorism, #CyberDefence, #CyberCrime
  • 13. Personal Cyber Hygiene Why is it important? Crime still pays exceptionally, and is therefore flourishing // Cybercrime = USD $6+ trillion (est. 2022) // CEO-Fraud = USD $3.5 billion // Kidnapping & Ransom = USD $1.5 billion (2010) WWW.LARSHILSE.COM 
 Global Thought Leader in #DigitalStrategy, #CyberSecurity, #CyberTerrorism, #CyberDefence, #CyberCrime
  • 14. Personal Cyber Hygiene Goals To understand all vulnerabilities, to avoid their exploitation, and live safely in the cyber world // Keeping yourself safe // Keeping your family safe // Keeping your assets safe // Keeping your organisation safe // In a connected world WWW.LARSHILSE.COM 
 Global Thought Leader in #DigitalStrategy, #CyberSecurity, #CyberTerrorism, #CyberDefence, #CyberCrime
  • 15. Personal Cyber Hygiene Delivery Tailored trainings in comfortable settings for everyone involved // One on one & group trainings with senior executives, their families, personnel, and acquaintances // Development & rollout of organisation-wide trainings // Development of security protocols & inclusion into existing procedures // Group trainings with leadership personnel (most vulnerable) WWW.LARSHILSE.COM 
 Global Thought Leader in #DigitalStrategy, #CyberSecurity, #CyberTerrorism, #CyberDefence, #CyberCrime
  • 16. Personal Cyber Hygiene Importance of cyber Modern communication bears significant benefits, and also has pitfalls // Social media & the internet have become an integral tool for kidnappers & criminals to profile Targets // Even if Target itself doesn’t use social media, family & acquaintances can become threats & victims // Internet used to launch sophisticated attacks on Target’s assets, family, etc. WWW.LARSHILSE.COM 
 Global Thought Leader in #DigitalStrategy, #CyberSecurity, #CyberTerrorism, #CyberDefence, #CyberCrime
  • 17. Personal Cyber Hygiene How does it work? All variables within the framework are individualised // Trainings deliverable everywhere // Even in vacation settings // A detailed risk-assessment precedes // Acts as foundation for delivery // Current security protocol vetted in preliminary research WWW.LARSHILSE.COM 
 Global Thought Leader in #DigitalStrategy, #CyberSecurity, #CyberTerrorism, #CyberDefence, #CyberCrime
  • 18. WWW.LARSHILSE.COM 
 Global Thought Leader in #DigitalStrategy, #CyberSecurity, #CyberTerrorism, #CyberDefence, #CyberCrime Personal Cyber Hygiene Questions? Reach out today! I’m happy to provide any answer you need. // Phone +49 (0)4835 9513027 // Email lars.hilse@gmail.com // PGP Key ID 17FFC660