SlideShare a Scribd company logo
Creating a culture of cybersecurity
November 8, 2022
Confidential Information 2
A conversation with
Frederic Rivain
Chief Technology Officer
Dashlane
Confidential Information 3
Agenda
1. Welcome!
2. The cybersecurity landscape
3. It’s all about people
4. Cybersecurity doesn’t have to be difficult
5. Q&A and wrapping up
Confidential Information 4
Welcome!
Frederic Rivain, Chief Technology Officer
Confidential Information 5
The cybersecurity landscape
Confidential Information 6
Let’s face it…
Threats are everywhere, and
cybercriminals are notoriously adaptable.
Passwords are the path of least resistance
for cybercriminals, whether you’re a large
enterprise company, a small business, or a
nonprofit organization.
Change is the only constant when it comes
to cybercriminals. But a password
management system can help.
Confidential Information 7
Password quiz
What percent of people reuse passwords?
A. 23%
B. 44%
C. 63%
D. 72%
Confidential Information 8
Password quiz
How many people admitted to reusing
passwords from their personal accounts for
their work accounts?
A. 13%
B. 22%
C. 34%
D. 50%
Confidential Information 9
The metrics speak for themselves
In 2022, 82% of
breaches involved
the human element.
63% of people
reuse passwords
for other accounts.
22% of workers
admitted to reusing
passwords from their
personal accounts for
their work accounts.
Confidential Information 10
Passwords + sticky notes =
a disaster waiting to happen
In 2018, Hawaii’s Emergency Management Agency
accidentally broadcasted a false missile warning to
islanders, blaming it on an employee who pushed
the wrong button.
Shortly after, however, a newspaper photo came to
light. It showed one of the company’s operations
officers and a sticky note with a legible password in
the background.
There’s no evidence that the photographed
password contributed to the missile alert, but the
agency’s reputation suffered, and its security
practices came into question.
41%
of individuals write
down their passwords
SOURCE: “THE 2020 STATE OF PASSWORD AND AUTHENTICATION
SECURITY BEHAVIORS REPORT,” PONEMON
Confidential Information 11
Recent breaches with big impacts,
from big brands to nonprofits
Server or
cybersecurity
breach that could
have been prevented
by building a culture
of cybersecurity
Confidential Information 12
Data breach quiz
What percent of successful data breaches
do you think involve stolen or compromised
passwords?
A. 27%
B. 39%
C. 54%
D. 81%
Confidential Information 13
Why you need a password manager
Shared networks and cloud computing are
becoming the standard
Databases are rich with a donor’s PII
information
High turnover and volunteer-based support
lead to poor password health
Board members are taking cybersecurity
more seriously
Password managers help you stay secure and
focus on your #1 priority: your mission
81%
of successful data
breaches involve stolen or
compromised passwords
SOURCE: Verizon DBIR, 2019
Confidential Information 14
It’s all about people
Confidential Information 15
For employees, managing logins for
a multitude of accounts or donors can be
agonizing.
It’s understandable why many will turn to
unsecured methods just to get it over with.
Confidential Information 16
Common password pitfalls
Sharing logins among colleagues in
unsecured ways
Using weak, easy-to-hack passwords
Storing passwords in web browsers, sticky
notes, Excel, Google Sheets & Docs, etc.
Reusing personal usernames and
passwords for business
Confidential Information 17
Password managers
help improve security
—without disrupting
the work day.
Confidential Information 18
Employees want to be part
of the solution
Help them understand their impact
Educate them on best practices
Give them tools to make it easy
79%
of respondents said they take
some personal responsibility for
the organization’s overall security
SOURCE: “THE 2020 STATE OF PASSWORD AND AUTHENTICATION SECURITY BEHAVIORS
REPORT,” PONEMON
Confidential Information 19
Password manager must-haves
Simple & easy to use
A password manager that’s simple for
admins and employees to use will
greatly improve adoption rates.
Convenient
Features such as autofill and syncing
across devices aren’t just
convenient—they increase productivity.
Robust security
Look for a password manager that has a
strong track record of security.
SSO integration
Many organizations adopt SSO for better,
safer sharing capabilities.
Dark web monitoring
Make sure the password manager monitors
the criminal underground for your logins and
immediately alerts you to change your
impacted passwords.
Password health
Look for password health features to help
employees understand their habits while
helping admins uncover gaps and take
corrective measures.
Confidential Information 20
Worry less about password hygiene. And
focus more on creating meaningful
connections with donors, volunteers, and
partners.
Confidential Information 21
Building a culture of security
doesn’t have to be difficult
Confidential Information 22
Acceptance Continuance
Adoption
3 steps to creating a culture of security
Step 1: Step 2: Step 3:
Confidential Information 23
Adoption
Ensuring the adoption of a password manager
among the existing people at the organization by
communicating the value to the mission.
Step 1:
Confidential Information 24
Acceptance
Onboard anyone new to the organization
immediately to the password manager to ensure
password health in the organization remains strong.
Remember, it only takes one compromised login to start a
breach, just like Hawaii’s Emergency Management Agency!
Step 2:
Confidential Information 25
Continuance
Monitor organizational health by utilizing Dark Web
Monitoring and Password Health scores for optimal
protection and success of your mission.
Step 3:
Confidential Information 26
Case study:
How NETA gained total password protection
& gave clients and employees peace of mind
In 2020, more people were working virtually than ever, and
security risks were at an all-time high for every organization.
NETA was no exception. Operating across multiple states,
NETA’s employees rely on a hybrid working environment, and
the organization constantly monitors its domain for threats.
While some applications that NETA relies upon require
stronger passwords, their leadership needed to see which
passwords were being reused and how they were being shared.
● Increased its company-wide Password Health
score from 70 to 86 in just three months.
● Ensures that important data is always shared
privately and securely and that authorized
employees can get the access they need
when they need it— even if the original
account owner is out of office.
● Uses unique passwords everywhere and
decreased their fear of breaches. NETA’s
clients and employees can rest assured that
information is always safe and secure.
Source: NETA Case Study
With Dashlane, NETA:
Confidential Information 27
Case study:
How VillageReach built a culture of
cybersecurity with Dashlane
VillageReach is a nonprofit with an inspiring mission to drive
equity and bring scalable, sustainable healthcare solutions to
rural areas in low-income countries.
Dashlane’s impact was felt immediately. Today, the
organization’s password health has improved by 122%, and it
continues to climb thanks to secure password sharing.
In addition to achieving those goals, implementing Dashlane
helped VillageReach foster a culture of security awareness.
d.
With Dashlane, VillageReach:
● Has more time to focus on their mission while
hands-off security monitoring secures their
tech stack
● Identified and cleaned up weak spots in their
password hygiene that posed a threat to their
donor database.
● Changed the way the entire organization
thinks about security—using Dashlane to
springboard into security awareness and
making security everyone’s responsibility
Source: VillageReach Case Study
Confidential Information 28
Wrapping up
Confidential Information 29
Securing your mission has never been
easier—and Dashlane can help!
Confidential Information 30
Take the next step today
Confidential Information 31
Q&A
Confidential Information 32
Thank you!
You have any follow-up questions about this webinar, or your plan and its features, you can email us at
community_success@dashlane.com.
For live support, a chat session can be started from 09:00 am to 06:00 pm EST, Monday through Friday by visiting the main page of our
Help Center-https://support.dashlane.com/ -, and clicking the pink icon located in the bottom-right corner of the page. team.
Copyright © 2022 Dashlane

More Related Content

Similar to Creating a culture of security.pdf

Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.
jayceewong1
 
BLACKOPS_USCS CyberSecurity Literacy
BLACKOPS_USCS CyberSecurity LiteracyBLACKOPS_USCS CyberSecurity Literacy
BLACKOPS_USCS CyberSecurity Literacy
Casey Fleming
 
How to assess your Cybersecurity Vulnerability_.pdf
How to assess your Cybersecurity Vulnerability_.pdfHow to assess your Cybersecurity Vulnerability_.pdf
How to assess your Cybersecurity Vulnerability_.pdf
Metaorange
 
How to assess your Cybersecurity Vulnerability_.pptx
How to assess your Cybersecurity Vulnerability_.pptxHow to assess your Cybersecurity Vulnerability_.pptx
How to assess your Cybersecurity Vulnerability_.pptx
Metaorange
 
Information Security Analyst Resume. When seeking
Information Security Analyst Resume. When seekingInformation Security Analyst Resume. When seeking
Information Security Analyst Resume. When seeking
Danielle Bowers
 
6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back
MTG IT Professionals
 
Cultivate a stronger corporate culture to enhance cybersecurity
Cultivate a stronger corporate culture to enhance cybersecurityCultivate a stronger corporate culture to enhance cybersecurity
Cultivate a stronger corporate culture to enhance cybersecurity
David X Martin
 
Common Cybersecurity Mistakes
Common Cybersecurity MistakesCommon Cybersecurity Mistakes
Common Cybersecurity Mistakes
mxotech
 
5 Security Tips to Protect Your Login Credentials and More
5 Security Tips to Protect Your Login Credentials and More5 Security Tips to Protect Your Login Credentials and More
5 Security Tips to Protect Your Login Credentials and More
Community IT Innovators
 
6 Ways to Fight the Data Loss Gremlins
6 Ways to Fight the Data Loss Gremlins6 Ways to Fight the Data Loss Gremlins
6 Ways to Fight the Data Loss Gremlins
Intronis MSP Solutions by Barracuda
 
Responding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for MerchantsResponding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for Merchants
- Mark - Fullbright
 
The Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
The Cloud 9 - Threat & Solutions 2016 by Bobby DominguezThe Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
The Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
EC-Council
 
Keep Up with the Demands of IT Security on a Nonprofit Budget
Keep Up with the Demands of IT Security on a Nonprofit BudgetKeep Up with the Demands of IT Security on a Nonprofit Budget
Keep Up with the Demands of IT Security on a Nonprofit Budget
BVU
 
Azure Security.pdf
Azure Security.pdfAzure Security.pdf
Azure Security.pdf
Cloudthat Technologies Private
 
Azure security
Azure securityAzure security
Continuing Education Conferance
Continuing Education ConferanceContinuing Education Conferance
Continuing Education Conferance
Tommy Riggins
 
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptxTop_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
infosec train
 
A data-centric program
A data-centric program A data-centric program
A data-centric program
at MicroFocus Italy ❖✔
 
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...
Troy Marshall
 
How to Connect Your Server Room to the Board Room – Before a Data Breach Occurs
How to Connect Your Server Room to the Board Room – Before a Data Breach OccursHow to Connect Your Server Room to the Board Room – Before a Data Breach Occurs
How to Connect Your Server Room to the Board Room – Before a Data Breach Occurs
SurfWatch Labs
 

Similar to Creating a culture of security.pdf (20)

Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.
 
BLACKOPS_USCS CyberSecurity Literacy
BLACKOPS_USCS CyberSecurity LiteracyBLACKOPS_USCS CyberSecurity Literacy
BLACKOPS_USCS CyberSecurity Literacy
 
How to assess your Cybersecurity Vulnerability_.pdf
How to assess your Cybersecurity Vulnerability_.pdfHow to assess your Cybersecurity Vulnerability_.pdf
How to assess your Cybersecurity Vulnerability_.pdf
 
How to assess your Cybersecurity Vulnerability_.pptx
How to assess your Cybersecurity Vulnerability_.pptxHow to assess your Cybersecurity Vulnerability_.pptx
How to assess your Cybersecurity Vulnerability_.pptx
 
Information Security Analyst Resume. When seeking
Information Security Analyst Resume. When seekingInformation Security Analyst Resume. When seeking
Information Security Analyst Resume. When seeking
 
6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back
 
Cultivate a stronger corporate culture to enhance cybersecurity
Cultivate a stronger corporate culture to enhance cybersecurityCultivate a stronger corporate culture to enhance cybersecurity
Cultivate a stronger corporate culture to enhance cybersecurity
 
Common Cybersecurity Mistakes
Common Cybersecurity MistakesCommon Cybersecurity Mistakes
Common Cybersecurity Mistakes
 
5 Security Tips to Protect Your Login Credentials and More
5 Security Tips to Protect Your Login Credentials and More5 Security Tips to Protect Your Login Credentials and More
5 Security Tips to Protect Your Login Credentials and More
 
6 Ways to Fight the Data Loss Gremlins
6 Ways to Fight the Data Loss Gremlins6 Ways to Fight the Data Loss Gremlins
6 Ways to Fight the Data Loss Gremlins
 
Responding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for MerchantsResponding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for Merchants
 
The Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
The Cloud 9 - Threat & Solutions 2016 by Bobby DominguezThe Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
The Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
 
Keep Up with the Demands of IT Security on a Nonprofit Budget
Keep Up with the Demands of IT Security on a Nonprofit BudgetKeep Up with the Demands of IT Security on a Nonprofit Budget
Keep Up with the Demands of IT Security on a Nonprofit Budget
 
Azure Security.pdf
Azure Security.pdfAzure Security.pdf
Azure Security.pdf
 
Azure security
Azure securityAzure security
Azure security
 
Continuing Education Conferance
Continuing Education ConferanceContinuing Education Conferance
Continuing Education Conferance
 
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptxTop_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
 
A data-centric program
A data-centric program A data-centric program
A data-centric program
 
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...
 
How to Connect Your Server Room to the Board Room – Before a Data Breach Occurs
How to Connect Your Server Room to the Board Room – Before a Data Breach OccursHow to Connect Your Server Room to the Board Room – Before a Data Breach Occurs
How to Connect Your Server Room to the Board Room – Before a Data Breach Occurs
 

More from TechSoup

Accounting for Restricted Grants When and How To Record Properly
Accounting for Restricted Grants  When and How To Record ProperlyAccounting for Restricted Grants  When and How To Record Properly
Accounting for Restricted Grants When and How To Record Properly
TechSoup
 
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
TechSoup
 
Recruiting and Engaging an All-Star Board with Governance Technology.pdf
Recruiting and Engaging an All-Star Board with Governance Technology.pdfRecruiting and Engaging an All-Star Board with Governance Technology.pdf
Recruiting and Engaging an All-Star Board with Governance Technology.pdf
TechSoup
 
Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
TechSoup
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
TechSoup
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
TechSoup
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
Advancing Impact Measurement | Public Good App House
Advancing Impact Measurement | Public Good App HouseAdvancing Impact Measurement | Public Good App House
Advancing Impact Measurement | Public Good App House
TechSoup
 
Keeping Your Information Safe with Centralized Security Services
Keeping Your Information Safe with Centralized Security ServicesKeeping Your Information Safe with Centralized Security Services
Keeping Your Information Safe with Centralized Security Services
TechSoup
 
Telling Your Story_ Simple Steps to Build Your Nonprofit's Brand Webinar.pdf
Telling Your Story_ Simple Steps to Build Your Nonprofit's Brand Webinar.pdfTelling Your Story_ Simple Steps to Build Your Nonprofit's Brand Webinar.pdf
Telling Your Story_ Simple Steps to Build Your Nonprofit's Brand Webinar.pdf
TechSoup
 
Securing the Future | Public Good App House
Securing the Future | Public Good App HouseSecuring the Future | Public Good App House
Securing the Future | Public Good App House
TechSoup
 
Introduction to TechSoup’s Digital Marketing Services and Use Cases
Introduction to TechSoup’s Digital Marketing  Services and Use CasesIntroduction to TechSoup’s Digital Marketing  Services and Use Cases
Introduction to TechSoup’s Digital Marketing Services and Use Cases
TechSoup
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
TechSoup
 
Executive Directors Chat Embracing Diversity and Cultural Differences
Executive Directors Chat  Embracing Diversity and Cultural DifferencesExecutive Directors Chat  Embracing Diversity and Cultural Differences
Executive Directors Chat Embracing Diversity and Cultural Differences
TechSoup
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
TechSoup
 
Building the Commons: Community Archiving & Decentralized Storage
Building the Commons: Community Archiving & Decentralized StorageBuilding the Commons: Community Archiving & Decentralized Storage
Building the Commons: Community Archiving & Decentralized Storage
TechSoup
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
TechSoup
 
Welcome to TechSoup - New Member Orientation and Q & A (April 2024)
Welcome to TechSoup - New Member Orientation and Q & A (April 2024)Welcome to TechSoup - New Member Orientation and Q & A (April 2024)
Welcome to TechSoup - New Member Orientation and Q & A (April 2024)
TechSoup
 
Executive Directors Chat Initiating Equity for Impact.pdf
Executive Directors Chat  Initiating Equity for Impact.pdfExecutive Directors Chat  Initiating Equity for Impact.pdf
Executive Directors Chat Initiating Equity for Impact.pdf
TechSoup
 

More from TechSoup (20)

Accounting for Restricted Grants When and How To Record Properly
Accounting for Restricted Grants  When and How To Record ProperlyAccounting for Restricted Grants  When and How To Record Properly
Accounting for Restricted Grants When and How To Record Properly
 
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
 
Recruiting and Engaging an All-Star Board with Governance Technology.pdf
Recruiting and Engaging an All-Star Board with Governance Technology.pdfRecruiting and Engaging an All-Star Board with Governance Technology.pdf
Recruiting and Engaging an All-Star Board with Governance Technology.pdf
 
Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
Advancing Impact Measurement | Public Good App House
Advancing Impact Measurement | Public Good App HouseAdvancing Impact Measurement | Public Good App House
Advancing Impact Measurement | Public Good App House
 
Keeping Your Information Safe with Centralized Security Services
Keeping Your Information Safe with Centralized Security ServicesKeeping Your Information Safe with Centralized Security Services
Keeping Your Information Safe with Centralized Security Services
 
Telling Your Story_ Simple Steps to Build Your Nonprofit's Brand Webinar.pdf
Telling Your Story_ Simple Steps to Build Your Nonprofit's Brand Webinar.pdfTelling Your Story_ Simple Steps to Build Your Nonprofit's Brand Webinar.pdf
Telling Your Story_ Simple Steps to Build Your Nonprofit's Brand Webinar.pdf
 
Securing the Future | Public Good App House
Securing the Future | Public Good App HouseSecuring the Future | Public Good App House
Securing the Future | Public Good App House
 
Introduction to TechSoup’s Digital Marketing Services and Use Cases
Introduction to TechSoup’s Digital Marketing  Services and Use CasesIntroduction to TechSoup’s Digital Marketing  Services and Use Cases
Introduction to TechSoup’s Digital Marketing Services and Use Cases
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Executive Directors Chat Embracing Diversity and Cultural Differences
Executive Directors Chat  Embracing Diversity and Cultural DifferencesExecutive Directors Chat  Embracing Diversity and Cultural Differences
Executive Directors Chat Embracing Diversity and Cultural Differences
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Building the Commons: Community Archiving & Decentralized Storage
Building the Commons: Community Archiving & Decentralized StorageBuilding the Commons: Community Archiving & Decentralized Storage
Building the Commons: Community Archiving & Decentralized Storage
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
Welcome to TechSoup - New Member Orientation and Q & A (April 2024)
Welcome to TechSoup - New Member Orientation and Q & A (April 2024)Welcome to TechSoup - New Member Orientation and Q & A (April 2024)
Welcome to TechSoup - New Member Orientation and Q & A (April 2024)
 
Executive Directors Chat Initiating Equity for Impact.pdf
Executive Directors Chat  Initiating Equity for Impact.pdfExecutive Directors Chat  Initiating Equity for Impact.pdf
Executive Directors Chat Initiating Equity for Impact.pdf
 

Recently uploaded

KHUSWANT SINGH.pptx ALL YOU NEED TO KNOW ABOUT KHUSHWANT SINGH
KHUSWANT SINGH.pptx ALL YOU NEED TO KNOW ABOUT KHUSHWANT SINGHKHUSWANT SINGH.pptx ALL YOU NEED TO KNOW ABOUT KHUSHWANT SINGH
KHUSWANT SINGH.pptx ALL YOU NEED TO KNOW ABOUT KHUSHWANT SINGH
shreyassri1208
 
How to Manage Reception Report in Odoo 17
How to Manage Reception Report in Odoo 17How to Manage Reception Report in Odoo 17
How to Manage Reception Report in Odoo 17
Celine George
 
Bossa N’ Roll Records by Ismael Vazquez.
Bossa N’ Roll Records by Ismael Vazquez.Bossa N’ Roll Records by Ismael Vazquez.
Bossa N’ Roll Records by Ismael Vazquez.
IsmaelVazquez38
 
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
ImMuslim
 
Standardized tool for Intelligence test.
Standardized tool for Intelligence test.Standardized tool for Intelligence test.
Standardized tool for Intelligence test.
deepaannamalai16
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
Jyoti Chand
 
MDP on air pollution of class 8 year 2024-2025
MDP on air pollution of class 8 year 2024-2025MDP on air pollution of class 8 year 2024-2025
MDP on air pollution of class 8 year 2024-2025
khuleseema60
 
CIS 4200-02 Group 1 Final Project Report (1).pdf
CIS 4200-02 Group 1 Final Project Report (1).pdfCIS 4200-02 Group 1 Final Project Report (1).pdf
CIS 4200-02 Group 1 Final Project Report (1).pdf
blueshagoo1
 
Simple-Present-Tense xxxxxxxxxxxxxxxxxxx
Simple-Present-Tense xxxxxxxxxxxxxxxxxxxSimple-Present-Tense xxxxxxxxxxxxxxxxxxx
Simple-Present-Tense xxxxxxxxxxxxxxxxxxx
RandolphRadicy
 
The basics of sentences session 7pptx.pptx
The basics of sentences session 7pptx.pptxThe basics of sentences session 7pptx.pptx
The basics of sentences session 7pptx.pptx
heathfieldcps1
 
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.ppt
Level 3 NCEA - NZ: A  Nation In the Making 1872 - 1900 SML.pptLevel 3 NCEA - NZ: A  Nation In the Making 1872 - 1900 SML.ppt
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.ppt
Henry Hollis
 
Data Structure using C by Dr. K Adisesha .ppsx
Data Structure using C by Dr. K Adisesha .ppsxData Structure using C by Dr. K Adisesha .ppsx
Data Structure using C by Dr. K Adisesha .ppsx
Prof. Dr. K. Adisesha
 
How to Fix [Errno 98] address already in use
How to Fix [Errno 98] address already in useHow to Fix [Errno 98] address already in use
How to Fix [Errno 98] address already in use
Celine George
 
skeleton System.pdf (skeleton system wow)
skeleton System.pdf (skeleton system wow)skeleton System.pdf (skeleton system wow)
skeleton System.pdf (skeleton system wow)
Mohammad Al-Dhahabi
 
HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.
deepaannamalai16
 
A Free 200-Page eBook ~ Brain and Mind Exercise.pptx
A Free 200-Page eBook ~ Brain and Mind Exercise.pptxA Free 200-Page eBook ~ Brain and Mind Exercise.pptx
A Free 200-Page eBook ~ Brain and Mind Exercise.pptx
OH TEIK BIN
 
How to Setup Default Value for a Field in Odoo 17
How to Setup Default Value for a Field in Odoo 17How to Setup Default Value for a Field in Odoo 17
How to Setup Default Value for a Field in Odoo 17
Celine George
 
78 Microsoft-Publisher - Sirin Sultana Bora.pptx
78 Microsoft-Publisher - Sirin Sultana Bora.pptx78 Microsoft-Publisher - Sirin Sultana Bora.pptx
78 Microsoft-Publisher - Sirin Sultana Bora.pptx
Kalna College
 
How to Download & Install Module From the Odoo App Store in Odoo 17
How to Download & Install Module From the Odoo App Store in Odoo 17How to Download & Install Module From the Odoo App Store in Odoo 17
How to Download & Install Module From the Odoo App Store in Odoo 17
Celine George
 
Bonku-Babus-Friend by Sathyajith Ray (9)
Bonku-Babus-Friend by Sathyajith Ray  (9)Bonku-Babus-Friend by Sathyajith Ray  (9)
Bonku-Babus-Friend by Sathyajith Ray (9)
nitinpv4ai
 

Recently uploaded (20)

KHUSWANT SINGH.pptx ALL YOU NEED TO KNOW ABOUT KHUSHWANT SINGH
KHUSWANT SINGH.pptx ALL YOU NEED TO KNOW ABOUT KHUSHWANT SINGHKHUSWANT SINGH.pptx ALL YOU NEED TO KNOW ABOUT KHUSHWANT SINGH
KHUSWANT SINGH.pptx ALL YOU NEED TO KNOW ABOUT KHUSHWANT SINGH
 
How to Manage Reception Report in Odoo 17
How to Manage Reception Report in Odoo 17How to Manage Reception Report in Odoo 17
How to Manage Reception Report in Odoo 17
 
Bossa N’ Roll Records by Ismael Vazquez.
Bossa N’ Roll Records by Ismael Vazquez.Bossa N’ Roll Records by Ismael Vazquez.
Bossa N’ Roll Records by Ismael Vazquez.
 
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
 
Standardized tool for Intelligence test.
Standardized tool for Intelligence test.Standardized tool for Intelligence test.
Standardized tool for Intelligence test.
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
 
MDP on air pollution of class 8 year 2024-2025
MDP on air pollution of class 8 year 2024-2025MDP on air pollution of class 8 year 2024-2025
MDP on air pollution of class 8 year 2024-2025
 
CIS 4200-02 Group 1 Final Project Report (1).pdf
CIS 4200-02 Group 1 Final Project Report (1).pdfCIS 4200-02 Group 1 Final Project Report (1).pdf
CIS 4200-02 Group 1 Final Project Report (1).pdf
 
Simple-Present-Tense xxxxxxxxxxxxxxxxxxx
Simple-Present-Tense xxxxxxxxxxxxxxxxxxxSimple-Present-Tense xxxxxxxxxxxxxxxxxxx
Simple-Present-Tense xxxxxxxxxxxxxxxxxxx
 
The basics of sentences session 7pptx.pptx
The basics of sentences session 7pptx.pptxThe basics of sentences session 7pptx.pptx
The basics of sentences session 7pptx.pptx
 
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.ppt
Level 3 NCEA - NZ: A  Nation In the Making 1872 - 1900 SML.pptLevel 3 NCEA - NZ: A  Nation In the Making 1872 - 1900 SML.ppt
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.ppt
 
Data Structure using C by Dr. K Adisesha .ppsx
Data Structure using C by Dr. K Adisesha .ppsxData Structure using C by Dr. K Adisesha .ppsx
Data Structure using C by Dr. K Adisesha .ppsx
 
How to Fix [Errno 98] address already in use
How to Fix [Errno 98] address already in useHow to Fix [Errno 98] address already in use
How to Fix [Errno 98] address already in use
 
skeleton System.pdf (skeleton system wow)
skeleton System.pdf (skeleton system wow)skeleton System.pdf (skeleton system wow)
skeleton System.pdf (skeleton system wow)
 
HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.
 
A Free 200-Page eBook ~ Brain and Mind Exercise.pptx
A Free 200-Page eBook ~ Brain and Mind Exercise.pptxA Free 200-Page eBook ~ Brain and Mind Exercise.pptx
A Free 200-Page eBook ~ Brain and Mind Exercise.pptx
 
How to Setup Default Value for a Field in Odoo 17
How to Setup Default Value for a Field in Odoo 17How to Setup Default Value for a Field in Odoo 17
How to Setup Default Value for a Field in Odoo 17
 
78 Microsoft-Publisher - Sirin Sultana Bora.pptx
78 Microsoft-Publisher - Sirin Sultana Bora.pptx78 Microsoft-Publisher - Sirin Sultana Bora.pptx
78 Microsoft-Publisher - Sirin Sultana Bora.pptx
 
How to Download & Install Module From the Odoo App Store in Odoo 17
How to Download & Install Module From the Odoo App Store in Odoo 17How to Download & Install Module From the Odoo App Store in Odoo 17
How to Download & Install Module From the Odoo App Store in Odoo 17
 
Bonku-Babus-Friend by Sathyajith Ray (9)
Bonku-Babus-Friend by Sathyajith Ray  (9)Bonku-Babus-Friend by Sathyajith Ray  (9)
Bonku-Babus-Friend by Sathyajith Ray (9)
 

Creating a culture of security.pdf

  • 1. Creating a culture of cybersecurity November 8, 2022
  • 2. Confidential Information 2 A conversation with Frederic Rivain Chief Technology Officer Dashlane
  • 3. Confidential Information 3 Agenda 1. Welcome! 2. The cybersecurity landscape 3. It’s all about people 4. Cybersecurity doesn’t have to be difficult 5. Q&A and wrapping up
  • 4. Confidential Information 4 Welcome! Frederic Rivain, Chief Technology Officer
  • 5. Confidential Information 5 The cybersecurity landscape
  • 6. Confidential Information 6 Let’s face it… Threats are everywhere, and cybercriminals are notoriously adaptable. Passwords are the path of least resistance for cybercriminals, whether you’re a large enterprise company, a small business, or a nonprofit organization. Change is the only constant when it comes to cybercriminals. But a password management system can help.
  • 7. Confidential Information 7 Password quiz What percent of people reuse passwords? A. 23% B. 44% C. 63% D. 72%
  • 8. Confidential Information 8 Password quiz How many people admitted to reusing passwords from their personal accounts for their work accounts? A. 13% B. 22% C. 34% D. 50%
  • 9. Confidential Information 9 The metrics speak for themselves In 2022, 82% of breaches involved the human element. 63% of people reuse passwords for other accounts. 22% of workers admitted to reusing passwords from their personal accounts for their work accounts.
  • 10. Confidential Information 10 Passwords + sticky notes = a disaster waiting to happen In 2018, Hawaii’s Emergency Management Agency accidentally broadcasted a false missile warning to islanders, blaming it on an employee who pushed the wrong button. Shortly after, however, a newspaper photo came to light. It showed one of the company’s operations officers and a sticky note with a legible password in the background. There’s no evidence that the photographed password contributed to the missile alert, but the agency’s reputation suffered, and its security practices came into question. 41% of individuals write down their passwords SOURCE: “THE 2020 STATE OF PASSWORD AND AUTHENTICATION SECURITY BEHAVIORS REPORT,” PONEMON
  • 11. Confidential Information 11 Recent breaches with big impacts, from big brands to nonprofits Server or cybersecurity breach that could have been prevented by building a culture of cybersecurity
  • 12. Confidential Information 12 Data breach quiz What percent of successful data breaches do you think involve stolen or compromised passwords? A. 27% B. 39% C. 54% D. 81%
  • 13. Confidential Information 13 Why you need a password manager Shared networks and cloud computing are becoming the standard Databases are rich with a donor’s PII information High turnover and volunteer-based support lead to poor password health Board members are taking cybersecurity more seriously Password managers help you stay secure and focus on your #1 priority: your mission 81% of successful data breaches involve stolen or compromised passwords SOURCE: Verizon DBIR, 2019
  • 15. Confidential Information 15 For employees, managing logins for a multitude of accounts or donors can be agonizing. It’s understandable why many will turn to unsecured methods just to get it over with.
  • 16. Confidential Information 16 Common password pitfalls Sharing logins among colleagues in unsecured ways Using weak, easy-to-hack passwords Storing passwords in web browsers, sticky notes, Excel, Google Sheets & Docs, etc. Reusing personal usernames and passwords for business
  • 17. Confidential Information 17 Password managers help improve security —without disrupting the work day.
  • 18. Confidential Information 18 Employees want to be part of the solution Help them understand their impact Educate them on best practices Give them tools to make it easy 79% of respondents said they take some personal responsibility for the organization’s overall security SOURCE: “THE 2020 STATE OF PASSWORD AND AUTHENTICATION SECURITY BEHAVIORS REPORT,” PONEMON
  • 19. Confidential Information 19 Password manager must-haves Simple & easy to use A password manager that’s simple for admins and employees to use will greatly improve adoption rates. Convenient Features such as autofill and syncing across devices aren’t just convenient—they increase productivity. Robust security Look for a password manager that has a strong track record of security. SSO integration Many organizations adopt SSO for better, safer sharing capabilities. Dark web monitoring Make sure the password manager monitors the criminal underground for your logins and immediately alerts you to change your impacted passwords. Password health Look for password health features to help employees understand their habits while helping admins uncover gaps and take corrective measures.
  • 20. Confidential Information 20 Worry less about password hygiene. And focus more on creating meaningful connections with donors, volunteers, and partners.
  • 21. Confidential Information 21 Building a culture of security doesn’t have to be difficult
  • 22. Confidential Information 22 Acceptance Continuance Adoption 3 steps to creating a culture of security Step 1: Step 2: Step 3:
  • 23. Confidential Information 23 Adoption Ensuring the adoption of a password manager among the existing people at the organization by communicating the value to the mission. Step 1:
  • 24. Confidential Information 24 Acceptance Onboard anyone new to the organization immediately to the password manager to ensure password health in the organization remains strong. Remember, it only takes one compromised login to start a breach, just like Hawaii’s Emergency Management Agency! Step 2:
  • 25. Confidential Information 25 Continuance Monitor organizational health by utilizing Dark Web Monitoring and Password Health scores for optimal protection and success of your mission. Step 3:
  • 26. Confidential Information 26 Case study: How NETA gained total password protection & gave clients and employees peace of mind In 2020, more people were working virtually than ever, and security risks were at an all-time high for every organization. NETA was no exception. Operating across multiple states, NETA’s employees rely on a hybrid working environment, and the organization constantly monitors its domain for threats. While some applications that NETA relies upon require stronger passwords, their leadership needed to see which passwords were being reused and how they were being shared. ● Increased its company-wide Password Health score from 70 to 86 in just three months. ● Ensures that important data is always shared privately and securely and that authorized employees can get the access they need when they need it— even if the original account owner is out of office. ● Uses unique passwords everywhere and decreased their fear of breaches. NETA’s clients and employees can rest assured that information is always safe and secure. Source: NETA Case Study With Dashlane, NETA:
  • 27. Confidential Information 27 Case study: How VillageReach built a culture of cybersecurity with Dashlane VillageReach is a nonprofit with an inspiring mission to drive equity and bring scalable, sustainable healthcare solutions to rural areas in low-income countries. Dashlane’s impact was felt immediately. Today, the organization’s password health has improved by 122%, and it continues to climb thanks to secure password sharing. In addition to achieving those goals, implementing Dashlane helped VillageReach foster a culture of security awareness. d. With Dashlane, VillageReach: ● Has more time to focus on their mission while hands-off security monitoring secures their tech stack ● Identified and cleaned up weak spots in their password hygiene that posed a threat to their donor database. ● Changed the way the entire organization thinks about security—using Dashlane to springboard into security awareness and making security everyone’s responsibility Source: VillageReach Case Study
  • 29. Confidential Information 29 Securing your mission has never been easier—and Dashlane can help!
  • 30. Confidential Information 30 Take the next step today
  • 32. Confidential Information 32 Thank you! You have any follow-up questions about this webinar, or your plan and its features, you can email us at community_success@dashlane.com. For live support, a chat session can be started from 09:00 am to 06:00 pm EST, Monday through Friday by visiting the main page of our Help Center-https://support.dashlane.com/ -, and clicking the pink icon located in the bottom-right corner of the page. team.
  • 33. Copyright © 2022 Dashlane