SlideShare a Scribd company logo
Cyber Security In a Trump Era
Ann Lewis, MoveOn.org @ann_lewis ann.lewis@moveon.org
Matt Mitchell, Color Of Change @geminiimatt
Wake up call
Nov 9 was a rude awakening for all of us. The weekend after the election we
spent fighting DDoS attacks, hacking attempts, and received wave after wave of
hateful and prejudiced spam and threats.
We realized we are entering a world where we’ll be playing more defense, and
that we need to take a much more careful look at security: our policies, our tools,
how we protect our staff and members
How Safe Are We?
Things we discovered when we started digging into our policies and tools:
● Staff regularly shared passwords in chat, email, even google docs. One of
these google docs was inadvertently made public!
● Many of our social media accounts hadn’t had passwords changed in years
● We had 20K google docs by default shared with everyone in the org. This
meant an archive of data and strategic information would be made available
to any hacker who hacked anyone’s account
What are our biggest risks?
Every organization will have different key risks, and different strategic information
and assets that are most important to protect.
But we all have one thing in common: all of our staff are vulnerable to social
engineering:
● Phishing emails that trick you into clicking on malicious links that steal
credentials
● Emails that contain attachments that infect staff computers with malware
Social engineering is a very common attack vector: we are all vulnerable.
Adopting a security mindset
The first step in improving the overall security of your organization is to
communicate to staff that everyone needs to adopt a security mindset.
There are many ways to do this. One strategy that worked for MoveOn: we hired a
security firm to run a phishing exercise on staff, and then announced the results of
the test in a staff meeting.
● 15 (!) staff were caught in the phishing test
● Staff now realize the way they think about security now affects not just
individuals but also the entire organization, and staff are accountable for
doing their part to keep the organization safe.
Improving the Security of Email
● Enable 2-factor authentication on organizational email (
https://twofactorauth.org )
● Even better: 2-factor authentication enforcement!
● Password-protect any mobile devices that have access to org email
● Ensure the email accounts listed as the backup emails for organizational
email accounts also have 2-factor authentication enabled
● If your email provider offers backup “security questions” to grant staff access
to email when they forget their passwords, ensure that the answers to these
security questions don't match the questions and are stored in a password
manager.
● Questions?
Be aware of who / what you trust with your email
Do you trust tech companies more than you
trust your partner? If not, don’t grant them full
access to your email! This is like handing over
your email account to another person- they can
see all the emails you send and receive.
Strong Passwords
● Different accounts have different password requirements, but as a general rule the longer the
password the harder it is for hackers to guess
● Never reuse passwords across accounts
● Use only organizationally approved tools for sharing passwords.
○ Use a password manager to store & generate passwords (recommended password managers
are 1password, lastpass, dashlane, keypassx, or padlock.io)
○ Never share passwords in email or chat.
○ Never save passwords in the browser
● Regularly rotate passwords
● Top passwords for 2016 list (avoid these!):
http://www.darkreading.com/endpoint/authentication/123456-leads-the-worst-passwords-of-
2016/d/d-id/1327952
● EFF’s guide on creating strong passwords: https://ssd.eff.org/en/module/creating-strong-passwords
● Check if your email has been compromised on: https://haveibeenpwned.com/
Improving the Security of Social Media
● Enable two factor authorization (sometimes called login enforcement) on all organizational social
media accounts
● Enable two factor authorization on all personal social media accounts. ( https://twofactorauth.org )
● Audit the email accounts associated with social media accounts: is this an individual email or a
group?
● If it’s a group:
○ ensure the owner of the account understands that everyone subscribed to this group has the
power to change the password and take control of the social media account
○ use a google voice number that is linked to a shared google account set up for this purpose
● If the social media service offers backup “security questions” to grant staff access to email when
they forget their passwords, ensure that the answers to these security questions don't match the
questions and are stored in a password manager. (e.g the answer to what is your favorite color?
would be New York.)
● Questions?
Laptops and Mobile Phones
● Encrypt staff laptop hard drives: if a laptop is stolen, thieves can’t get access
to the data stored on the hard drive.
● Encrypt staff mobile phone hard drives
● Make sure all staff devices are password protected
● Staff must keep laptops and phones current with software updates: these
updates include critical security fixes
● Bonus: install software on laptops that allows for hard drives to be remotely
wiped in the event of loss or theft
● Bonus: install software on phones that allows for hard drives to be remotely
wiped in the event of loss or theft
● Questions?
Secure Communication Tools
● Assume that all staff communication can be made public, unless staff are
using secure communication tools
● Know the difference between encrypted vs unencrypted email, chat
● All cell phone conversations should be considered public.
● All phone calls can be "spoofed" (caller id can be made to display any number
including those of your contacts)"
● All SMS messages should be considered public
● All SMS messages can be "spoofed" ( made to look like they came from
anyone including your contacts )"
● Organizations can evaluate the types of communication staff engage in,
determine their risk model, and choose communication tools accordingly
● Questions?
Retention Policies
Hackers can’t steal and the government can’t subpoena information you don’t
store:
● Email retention policies: how long to keep historical email
● Document retention policies: how long to store or retain sharing permissions
● Chat retention policies: how long to keep group and individual chat
● Data retention policies: what data to include in, and how long to keep
databases, spreadsheets, and records
Staff Training
● Cyber security training is critical for staff
● Example training programs used by MoveOn:
○ Group conversations on cyber security in team meetings
○ Weekly “security bulletins” with action items sent to staff
○ Team leads track and are accountable for reports completing security training
○ Regular “phishing exercises” keep staff alert to potential threats
● SANS: Securing The Human cyber security training series
● Nonprofit organizations like Access Now, Electronic Frontier Foundation
(EFF), Tactical Technology, Freedom of The Press Foundation, offer updated
free high quality information.
● Once training is concluded schedule regular "fire drills" where teams practice
what they learned
QUESTIONS?

More Related Content

What's hot

Ethical hacking.
Ethical hacking.Ethical hacking.
Ethical hacking.
Khushboo Aggarwal
 
Learn Ethical Hacking in 10 Hours | Ethical Hacking Full Course | Edureka
Learn Ethical Hacking in 10 Hours | Ethical Hacking Full Course | EdurekaLearn Ethical Hacking in 10 Hours | Ethical Hacking Full Course | Edureka
Learn Ethical Hacking in 10 Hours | Ethical Hacking Full Course | Edureka
Edureka!
 
Computer security and malware by shahzad younas
Computer security and malware by shahzad younasComputer security and malware by shahzad younas
Computer security and malware by shahzad younas
Shahzad Younas
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Mohammad Affan
 
Security and privacy for journalists
Security and privacy for journalistsSecurity and privacy for journalists
Security and privacy for journalists
Jillian York
 
Full seminar report on ethical hacking
Full seminar report on ethical hackingFull seminar report on ethical hacking
Full seminar report on ethical hacking
Georgekutty Francis
 
NTXISSACSC3 - Find, Fix, Finish ... Tracking the Real Bad Guys in Cyberspace ...
NTXISSACSC3 - Find, Fix, Finish ... Tracking the Real Bad Guys in Cyberspace ...NTXISSACSC3 - Find, Fix, Finish ... Tracking the Real Bad Guys in Cyberspace ...
NTXISSACSC3 - Find, Fix, Finish ... Tracking the Real Bad Guys in Cyberspace ...
North Texas Chapter of the ISSA
 
The Human Side of Security
The Human Side of SecurityThe Human Side of Security
The Human Side of Security
Randy Earl
 
I am my worst enemy — A first person look at Insider Threat
I am my worst enemy — A first person look at Insider ThreatI am my worst enemy — A first person look at Insider Threat
I am my worst enemy — A first person look at Insider Threat
Ahmed Masud
 
ISACA Ethical Hacking Presentation 10/2011
ISACA Ethical Hacking Presentation 10/2011ISACA Ethical Hacking Presentation 10/2011
ISACA Ethical Hacking Presentation 10/2011
Xavier Mertens
 
7 Cybersecurity Sins When Working From Home
7 Cybersecurity Sins When Working From Home7 Cybersecurity Sins When Working From Home
7 Cybersecurity Sins When Working From Home
DallasHaselhorst
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Nitheesh Adithyan
 
ethical hacking
ethical hackingethical hacking
ethical hacking
samprada123
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
SVishnupriya5
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
BugRaptors
 
Inside Attacker: An Overview
Inside Attacker: An OverviewInside Attacker: An Overview
Inside Attacker: An Overview
Dustin Collins
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Punit Goswami
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Kunal Gawade, CFE
 
Cybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppCybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureApp
WeSecureApp
 
Hackers
HackersHackers

What's hot (20)

Ethical hacking.
Ethical hacking.Ethical hacking.
Ethical hacking.
 
Learn Ethical Hacking in 10 Hours | Ethical Hacking Full Course | Edureka
Learn Ethical Hacking in 10 Hours | Ethical Hacking Full Course | EdurekaLearn Ethical Hacking in 10 Hours | Ethical Hacking Full Course | Edureka
Learn Ethical Hacking in 10 Hours | Ethical Hacking Full Course | Edureka
 
Computer security and malware by shahzad younas
Computer security and malware by shahzad younasComputer security and malware by shahzad younas
Computer security and malware by shahzad younas
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Security and privacy for journalists
Security and privacy for journalistsSecurity and privacy for journalists
Security and privacy for journalists
 
Full seminar report on ethical hacking
Full seminar report on ethical hackingFull seminar report on ethical hacking
Full seminar report on ethical hacking
 
NTXISSACSC3 - Find, Fix, Finish ... Tracking the Real Bad Guys in Cyberspace ...
NTXISSACSC3 - Find, Fix, Finish ... Tracking the Real Bad Guys in Cyberspace ...NTXISSACSC3 - Find, Fix, Finish ... Tracking the Real Bad Guys in Cyberspace ...
NTXISSACSC3 - Find, Fix, Finish ... Tracking the Real Bad Guys in Cyberspace ...
 
The Human Side of Security
The Human Side of SecurityThe Human Side of Security
The Human Side of Security
 
I am my worst enemy — A first person look at Insider Threat
I am my worst enemy — A first person look at Insider ThreatI am my worst enemy — A first person look at Insider Threat
I am my worst enemy — A first person look at Insider Threat
 
ISACA Ethical Hacking Presentation 10/2011
ISACA Ethical Hacking Presentation 10/2011ISACA Ethical Hacking Presentation 10/2011
ISACA Ethical Hacking Presentation 10/2011
 
7 Cybersecurity Sins When Working From Home
7 Cybersecurity Sins When Working From Home7 Cybersecurity Sins When Working From Home
7 Cybersecurity Sins When Working From Home
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
ethical hacking
ethical hackingethical hacking
ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Inside Attacker: An Overview
Inside Attacker: An OverviewInside Attacker: An Overview
Inside Attacker: An Overview
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Cybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppCybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureApp
 
Hackers
HackersHackers
Hackers
 

Similar to Cyber security in a trump era [1/15/2017]

FHSU CITI CS Training.pptx
FHSU CITI CS Training.pptxFHSU CITI CS Training.pptx
FHSU CITI CS Training.pptx
LaurieAnnFrazier
 
Executive Directors Chat:It's easy to stay safe online.pdf
Executive Directors Chat:It's easy to stay safe online.pdfExecutive Directors Chat:It's easy to stay safe online.pdf
Executive Directors Chat:It's easy to stay safe online.pdf
TechSoup
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness Training
Jen Ruhman
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness Training
Jen Ruhman
 
Building a culture of security
Building a culture of securityBuilding a culture of security
Building a culture of security
Courion Corporation
 
Cybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptxCybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptx
Mustafa Amiri
 
An Ultimate Guide On Cyber Security Solutions.pdf
An Ultimate Guide On Cyber Security Solutions.pdfAn Ultimate Guide On Cyber Security Solutions.pdf
An Ultimate Guide On Cyber Security Solutions.pdf
basilmph
 
Cyber Security & User's Privacy Invasion
Cyber Security & User's Privacy InvasionCyber Security & User's Privacy Invasion
Cyber Security & User's Privacy Invasion
Isaiah Edem
 
12990739.ppt
12990739.ppt12990739.ppt
12990739.ppt
MuhammadShahidulIsla8
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
Animesh Roy
 
CyberSecurity.ppt
CyberSecurity.pptCyberSecurity.ppt
CyberSecurity.ppt
Fork6
 
Basic Digital Security
Basic Digital SecurityBasic Digital Security
Basic Digital Security
Ujjwal Acharya
 
6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back
MTG IT Professionals
 
Cyber security.docx
Cyber security.docxCyber security.docx
Cyber security.docx
saivarun91
 
Protecting Corporete Credentials Against Threats 4 48159 wgw03071_usen
Protecting Corporete Credentials Against Threats 4 48159 wgw03071_usenProtecting Corporete Credentials Against Threats 4 48159 wgw03071_usen
Protecting Corporete Credentials Against Threats 4 48159 wgw03071_usen
CMR WORLD TECH
 
Working from home- How secure is it.pdf
Working from home- How secure is it.pdfWorking from home- How secure is it.pdf
Working from home- How secure is it.pdf
Fiyona Nourin
 
iSchoolConnect_Information Security User Awareness Training_16th Nov 2021.ppt...
iSchoolConnect_Information Security User Awareness Training_16th Nov 2021.ppt...iSchoolConnect_Information Security User Awareness Training_16th Nov 2021.ppt...
iSchoolConnect_Information Security User Awareness Training_16th Nov 2021.ppt...
RIYAJAIN179446
 
Digital Security and safety for journalists
Digital Security and safety for journalistsDigital Security and safety for journalists
Digital Security and safety for journalists
antoniokisembo
 
How to Bulletproof Your Data Defenses Locally & In the Cloud
How to Bulletproof Your Data Defenses Locally & In the CloudHow to Bulletproof Your Data Defenses Locally & In the Cloud
How to Bulletproof Your Data Defenses Locally & In the Cloud
Nordic Backup
 
ISMS Awareness Training (2) (1).pptx
ISMS Awareness Training (2) (1).pptxISMS Awareness Training (2) (1).pptx
ISMS Awareness Training (2) (1).pptx
vasidharta
 

Similar to Cyber security in a trump era [1/15/2017] (20)

FHSU CITI CS Training.pptx
FHSU CITI CS Training.pptxFHSU CITI CS Training.pptx
FHSU CITI CS Training.pptx
 
Executive Directors Chat:It's easy to stay safe online.pdf
Executive Directors Chat:It's easy to stay safe online.pdfExecutive Directors Chat:It's easy to stay safe online.pdf
Executive Directors Chat:It's easy to stay safe online.pdf
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness Training
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness Training
 
Building a culture of security
Building a culture of securityBuilding a culture of security
Building a culture of security
 
Cybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptxCybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptx
 
An Ultimate Guide On Cyber Security Solutions.pdf
An Ultimate Guide On Cyber Security Solutions.pdfAn Ultimate Guide On Cyber Security Solutions.pdf
An Ultimate Guide On Cyber Security Solutions.pdf
 
Cyber Security & User's Privacy Invasion
Cyber Security & User's Privacy InvasionCyber Security & User's Privacy Invasion
Cyber Security & User's Privacy Invasion
 
12990739.ppt
12990739.ppt12990739.ppt
12990739.ppt
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
 
CyberSecurity.ppt
CyberSecurity.pptCyberSecurity.ppt
CyberSecurity.ppt
 
Basic Digital Security
Basic Digital SecurityBasic Digital Security
Basic Digital Security
 
6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back
 
Cyber security.docx
Cyber security.docxCyber security.docx
Cyber security.docx
 
Protecting Corporete Credentials Against Threats 4 48159 wgw03071_usen
Protecting Corporete Credentials Against Threats 4 48159 wgw03071_usenProtecting Corporete Credentials Against Threats 4 48159 wgw03071_usen
Protecting Corporete Credentials Against Threats 4 48159 wgw03071_usen
 
Working from home- How secure is it.pdf
Working from home- How secure is it.pdfWorking from home- How secure is it.pdf
Working from home- How secure is it.pdf
 
iSchoolConnect_Information Security User Awareness Training_16th Nov 2021.ppt...
iSchoolConnect_Information Security User Awareness Training_16th Nov 2021.ppt...iSchoolConnect_Information Security User Awareness Training_16th Nov 2021.ppt...
iSchoolConnect_Information Security User Awareness Training_16th Nov 2021.ppt...
 
Digital Security and safety for journalists
Digital Security and safety for journalistsDigital Security and safety for journalists
Digital Security and safety for journalists
 
How to Bulletproof Your Data Defenses Locally & In the Cloud
How to Bulletproof Your Data Defenses Locally & In the CloudHow to Bulletproof Your Data Defenses Locally & In the Cloud
How to Bulletproof Your Data Defenses Locally & In the Cloud
 
ISMS Awareness Training (2) (1).pptx
ISMS Awareness Training (2) (1).pptxISMS Awareness Training (2) (1).pptx
ISMS Awareness Training (2) (1).pptx
 

Recently uploaded

GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Zilliz
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 

Recently uploaded (20)

GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 

Cyber security in a trump era [1/15/2017]

  • 1. Cyber Security In a Trump Era Ann Lewis, MoveOn.org @ann_lewis ann.lewis@moveon.org Matt Mitchell, Color Of Change @geminiimatt
  • 2. Wake up call Nov 9 was a rude awakening for all of us. The weekend after the election we spent fighting DDoS attacks, hacking attempts, and received wave after wave of hateful and prejudiced spam and threats. We realized we are entering a world where we’ll be playing more defense, and that we need to take a much more careful look at security: our policies, our tools, how we protect our staff and members
  • 3. How Safe Are We? Things we discovered when we started digging into our policies and tools: ● Staff regularly shared passwords in chat, email, even google docs. One of these google docs was inadvertently made public! ● Many of our social media accounts hadn’t had passwords changed in years ● We had 20K google docs by default shared with everyone in the org. This meant an archive of data and strategic information would be made available to any hacker who hacked anyone’s account
  • 4. What are our biggest risks? Every organization will have different key risks, and different strategic information and assets that are most important to protect. But we all have one thing in common: all of our staff are vulnerable to social engineering: ● Phishing emails that trick you into clicking on malicious links that steal credentials ● Emails that contain attachments that infect staff computers with malware Social engineering is a very common attack vector: we are all vulnerable.
  • 5. Adopting a security mindset The first step in improving the overall security of your organization is to communicate to staff that everyone needs to adopt a security mindset. There are many ways to do this. One strategy that worked for MoveOn: we hired a security firm to run a phishing exercise on staff, and then announced the results of the test in a staff meeting. ● 15 (!) staff were caught in the phishing test ● Staff now realize the way they think about security now affects not just individuals but also the entire organization, and staff are accountable for doing their part to keep the organization safe.
  • 6. Improving the Security of Email ● Enable 2-factor authentication on organizational email ( https://twofactorauth.org ) ● Even better: 2-factor authentication enforcement! ● Password-protect any mobile devices that have access to org email ● Ensure the email accounts listed as the backup emails for organizational email accounts also have 2-factor authentication enabled ● If your email provider offers backup “security questions” to grant staff access to email when they forget their passwords, ensure that the answers to these security questions don't match the questions and are stored in a password manager. ● Questions?
  • 7. Be aware of who / what you trust with your email Do you trust tech companies more than you trust your partner? If not, don’t grant them full access to your email! This is like handing over your email account to another person- they can see all the emails you send and receive.
  • 8. Strong Passwords ● Different accounts have different password requirements, but as a general rule the longer the password the harder it is for hackers to guess ● Never reuse passwords across accounts ● Use only organizationally approved tools for sharing passwords. ○ Use a password manager to store & generate passwords (recommended password managers are 1password, lastpass, dashlane, keypassx, or padlock.io) ○ Never share passwords in email or chat. ○ Never save passwords in the browser ● Regularly rotate passwords ● Top passwords for 2016 list (avoid these!): http://www.darkreading.com/endpoint/authentication/123456-leads-the-worst-passwords-of- 2016/d/d-id/1327952 ● EFF’s guide on creating strong passwords: https://ssd.eff.org/en/module/creating-strong-passwords ● Check if your email has been compromised on: https://haveibeenpwned.com/
  • 9. Improving the Security of Social Media ● Enable two factor authorization (sometimes called login enforcement) on all organizational social media accounts ● Enable two factor authorization on all personal social media accounts. ( https://twofactorauth.org ) ● Audit the email accounts associated with social media accounts: is this an individual email or a group? ● If it’s a group: ○ ensure the owner of the account understands that everyone subscribed to this group has the power to change the password and take control of the social media account ○ use a google voice number that is linked to a shared google account set up for this purpose ● If the social media service offers backup “security questions” to grant staff access to email when they forget their passwords, ensure that the answers to these security questions don't match the questions and are stored in a password manager. (e.g the answer to what is your favorite color? would be New York.) ● Questions?
  • 10. Laptops and Mobile Phones ● Encrypt staff laptop hard drives: if a laptop is stolen, thieves can’t get access to the data stored on the hard drive. ● Encrypt staff mobile phone hard drives ● Make sure all staff devices are password protected ● Staff must keep laptops and phones current with software updates: these updates include critical security fixes ● Bonus: install software on laptops that allows for hard drives to be remotely wiped in the event of loss or theft ● Bonus: install software on phones that allows for hard drives to be remotely wiped in the event of loss or theft ● Questions?
  • 11. Secure Communication Tools ● Assume that all staff communication can be made public, unless staff are using secure communication tools ● Know the difference between encrypted vs unencrypted email, chat ● All cell phone conversations should be considered public. ● All phone calls can be "spoofed" (caller id can be made to display any number including those of your contacts)" ● All SMS messages should be considered public ● All SMS messages can be "spoofed" ( made to look like they came from anyone including your contacts )" ● Organizations can evaluate the types of communication staff engage in, determine their risk model, and choose communication tools accordingly ● Questions?
  • 12. Retention Policies Hackers can’t steal and the government can’t subpoena information you don’t store: ● Email retention policies: how long to keep historical email ● Document retention policies: how long to store or retain sharing permissions ● Chat retention policies: how long to keep group and individual chat ● Data retention policies: what data to include in, and how long to keep databases, spreadsheets, and records
  • 13. Staff Training ● Cyber security training is critical for staff ● Example training programs used by MoveOn: ○ Group conversations on cyber security in team meetings ○ Weekly “security bulletins” with action items sent to staff ○ Team leads track and are accountable for reports completing security training ○ Regular “phishing exercises” keep staff alert to potential threats ● SANS: Securing The Human cyber security training series ● Nonprofit organizations like Access Now, Electronic Frontier Foundation (EFF), Tactical Technology, Freedom of The Press Foundation, offer updated free high quality information. ● Once training is concluded schedule regular "fire drills" where teams practice what they learned