SlideShare a Scribd company logo
Cybersecurity
for Public
Educators
Cybersecurity is everyone’s problem
• Cybersecurity is NOT
just IT’s problem.
IT
Emergency Management
Law Enforcement
And everyone in your
organization
The threat
• Malicious vs unintentional
• Active attacks
• Data breaches
• Human error
• Cyber warfare
I never
thought it
could happen
to me!
Activity
https://haveibeenpwned.com/
Lifecycle
Prevention
• What have you done to
prepare?
• What policies are in place?
• What training is in place?
• How are the policies
enforced?
• THINGS YOU MUST HAVE
• Emergency Operations Plan
• Cybersecurity Policy
• Acceptable Use Policy
Protection
Mitigation
• What steps have you
taken?
• What steps can you take?
• Insurance
• Backups
• Redundancy
• Monitoring
• https://haveibeenpwned.com
• Early Reporting
• Training
Response
Do you have a
response plan?
Does everybody
know how to
recognize an
incident?
Does your staff
know what to do
if they suspect
an incident?
Who do you call
for help?
Recovery
What’s your recovery plan?
Beyond just the technology
Who do you call for help?
Sample Incident annex
https://1drv.ms/w/s!At2Gwcs7z-oh3Ubt7QNXAZ-HHeM2
References
• National Cyber Incident Response Plan, Department of Homeland Security,
2016
• Computer Security Incident Handling Guide (Revision 2) National Institute of
Standards and Technology, 2012
• Washington State Significant Cyber Incident Annex, Washington Military
Department – Emergency Management Division, 2015
• ISO/IEC 27032 – Information Technology – Security techniques – Guidelines for
cybersecurity, International Standards Organization, 2012
Annex Parts
Policies Sets
expectations
Situation/
Assumptions
Requires all
components to
be in place
Concept of
Operations
Will require
local discussion
Responsibilities
EM/IT/LE
Expect some
pushback
Major Cyber Incident
Checklist
• Action items
• Pre-Incident Phase
• Response Phase
• Recovery/Demob Phase
Common
Issues
Most entities lack a comprehensive
cybersecurity policy that vests
responsibility with every employee.
Those that have policies don’t enforce
them
A greater number of incidents occur than
are reported in any formal way
Lack of response plans leads to slow
recognition, response, recovery.
Lack of individual security leaves entire
organization at risk
Human Factor
Phishing, social
engineering
• Enabled by agency and
employee use of social
media and other things
Careless info
access/dissemination
• Public spaces
• Public wifi
• Unlocked computers
• Lack of caution
Security and
Privacy
• Keep personal information personal
• Never post anyone’s information
without their written consent
• Only post (with consent)
• Names
• Phone numbers
• E-mail addresses
• Remove immediately when
someone withdraws consent
• Never post
• Addresses
• Dates of birth
Activity
Find a buddy
Go online and pull up each of your
organization’s websites
Evaluate the website for privacy
issues
Be ready to report back on what is
good and what needs to be updated
Platforms
Facebook Twitter Instagram
YouTube LinkedIn Pinterest
Follow the
rules!
Rules might include
Content Contests Access rights
Type of
account/page
Don’t violate the rules!
Read the actual rules for the platform
before you sign your organization up
Social Media Privacy and Security
No photos posted without permission
No graphics used without permission That means memes too!
No personal information without permission
Even with permission, be VERY limited
Make sure the person giving permission understands the potential repercussions
Ensure employees and volunteers are not sharing organization things without permission
Ensure employees and volunteers are not sharing their own personal information
Activity
Alone or with a buddy
Search for yourself on the internet
See if there is anything that ties your name
to your organization
See if there is any personal information about
you that could be used to impersonate you.
Be ready to report back any surprises you
found
Social Media
Best Practices
• Create a record of every online account
your organization has
• Store it in an encrypted format
• Include login and password info for master
accounts
• Include who has access to the two-factor
authentication
• Ensure at least two people have access to it
Account information
Create more than one administrator
• Get everyone to use an encrypted password
manager
Don’t share admin credentials
Always use two-factor authentication
More Best Practices
• Keeps third parties from getting them and impersonating you
• Keep them non-published or dormant
Obtain accounts
even if you might
not use them
• Created by others or former employees
• May be helpful
• May be malicious
• You need control of all of them
Search for accounts
using your
organization’s name
Activity 3
• Find a buddy
• Go online and pull up each of your organization’s social media sites
• See if there are any other social media sites that might be about your
organization
• Make a list of all the sites you find
• Evaluate the official sites
• Be ready to report back on what is good and what needs to be
updated. Include any sites you need to gain control of and add any
sites you think your organization should add.
Other Examples
This Photo by Unknown Author is licensed under CC BY-NC-SA
QUESTIONS?
Contact me:
Sarah Miller, MPA, CEM
Zone 3 EM Coordinator
President, IAEM Region 10
Past Chair, IAEM Emerging Tech Caucus
sarah.miller@kingcounty.gov
twitter: @scba

More Related Content

What's hot

Teen Hacks for Obfuscating Identity on Social Media
Teen Hacks for Obfuscating Identity on Social MediaTeen Hacks for Obfuscating Identity on Social Media
Teen Hacks for Obfuscating Identity on Social Media
SamanthaMosley3
 
Social Media Policies, Procedures
 and Governance part 1: Employees
Social Media Policies, Procedures
 and Governance part 1: EmployeesSocial Media Policies, Procedures
 and Governance part 1: Employees
Social Media Policies, Procedures
 and Governance part 1: Employees
NikComm Inc.
 
How to keep your teens safe on social media
How to keep your teens safe on social mediaHow to keep your teens safe on social media
How to keep your teens safe on social media
Kwazi Communications
 
Filters and monitoring: Panacea or band-aid
Filters and monitoring: Panacea or band-aidFilters and monitoring: Panacea or band-aid
Filters and monitoring: Panacea or band-aid
ConnectSafely
 
Cyberbullying psa
Cyberbullying psaCyberbullying psa
Cyberbullying psa
clkassien
 
Social Media and the Future of Privacy
Social Media and the Future of PrivacySocial Media and the Future of Privacy
Social Media and the Future of Privacy
julia594
 
Digital Footprint
Digital FootprintDigital Footprint
Digital Footprint
darpankambo
 
Social Media and Privacy
Social Media and PrivacySocial Media and Privacy
Social Media and Privacy
Typeset
 
Online Safety for Seniors
Online Safety for SeniorsOnline Safety for Seniors
Online Safety for Seniors
ConnectSafely
 
Cyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threats
mkinzie
 
Meaghan technology report
Meaghan technology reportMeaghan technology report
Meaghan technology report
Marq2014
 
Cyber Safety Hacks for Women and Children by Catalyst Woman Consultancy
Cyber Safety Hacks for Women and Children by Catalyst Woman ConsultancyCyber Safety Hacks for Women and Children by Catalyst Woman Consultancy
Cyber Safety Hacks for Women and Children by Catalyst Woman Consultancy
Mariam Sb
 
Social media Challenges and Advantage
Social media Challenges and AdvantageSocial media Challenges and Advantage
Social media Challenges and Advantage
Techno World 4 U
 
Social Media Safety Presentation
Social Media Safety PresentationSocial Media Safety Presentation
Social Media Safety Presentation
LJ Henshell
 
Online Privacy - Not So Private
Online Privacy - Not So PrivateOnline Privacy - Not So Private
Online Privacy - Not So Private
imdbexpert
 
Parents Guide To Social Media Sites Dangers & How Children & Adults Interact
Parents Guide To Social Media Sites Dangers & How Children & Adults InteractParents Guide To Social Media Sites Dangers & How Children & Adults Interact
Parents Guide To Social Media Sites Dangers & How Children & Adults Interact
Bradley W. Deacon
 
Social Media on Education and its Effects
Social Media on Education and its EffectsSocial Media on Education and its Effects
Social Media on Education and its Effects
Prem Kumar
 
Internet and Social Media Safety for Kids and Teens April 2014
Internet and Social Media Safety for Kids and Teens April 2014Internet and Social Media Safety for Kids and Teens April 2014
Internet and Social Media Safety for Kids and Teens April 2014
Resourceful Nonprofit
 

What's hot (18)

Teen Hacks for Obfuscating Identity on Social Media
Teen Hacks for Obfuscating Identity on Social MediaTeen Hacks for Obfuscating Identity on Social Media
Teen Hacks for Obfuscating Identity on Social Media
 
Social Media Policies, Procedures
 and Governance part 1: Employees
Social Media Policies, Procedures
 and Governance part 1: EmployeesSocial Media Policies, Procedures
 and Governance part 1: Employees
Social Media Policies, Procedures
 and Governance part 1: Employees
 
How to keep your teens safe on social media
How to keep your teens safe on social mediaHow to keep your teens safe on social media
How to keep your teens safe on social media
 
Filters and monitoring: Panacea or band-aid
Filters and monitoring: Panacea or band-aidFilters and monitoring: Panacea or band-aid
Filters and monitoring: Panacea or band-aid
 
Cyberbullying psa
Cyberbullying psaCyberbullying psa
Cyberbullying psa
 
Social Media and the Future of Privacy
Social Media and the Future of PrivacySocial Media and the Future of Privacy
Social Media and the Future of Privacy
 
Digital Footprint
Digital FootprintDigital Footprint
Digital Footprint
 
Social Media and Privacy
Social Media and PrivacySocial Media and Privacy
Social Media and Privacy
 
Online Safety for Seniors
Online Safety for SeniorsOnline Safety for Seniors
Online Safety for Seniors
 
Cyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threats
 
Meaghan technology report
Meaghan technology reportMeaghan technology report
Meaghan technology report
 
Cyber Safety Hacks for Women and Children by Catalyst Woman Consultancy
Cyber Safety Hacks for Women and Children by Catalyst Woman ConsultancyCyber Safety Hacks for Women and Children by Catalyst Woman Consultancy
Cyber Safety Hacks for Women and Children by Catalyst Woman Consultancy
 
Social media Challenges and Advantage
Social media Challenges and AdvantageSocial media Challenges and Advantage
Social media Challenges and Advantage
 
Social Media Safety Presentation
Social Media Safety PresentationSocial Media Safety Presentation
Social Media Safety Presentation
 
Online Privacy - Not So Private
Online Privacy - Not So PrivateOnline Privacy - Not So Private
Online Privacy - Not So Private
 
Parents Guide To Social Media Sites Dangers & How Children & Adults Interact
Parents Guide To Social Media Sites Dangers & How Children & Adults InteractParents Guide To Social Media Sites Dangers & How Children & Adults Interact
Parents Guide To Social Media Sites Dangers & How Children & Adults Interact
 
Social Media on Education and its Effects
Social Media on Education and its EffectsSocial Media on Education and its Effects
Social Media on Education and its Effects
 
Internet and Social Media Safety for Kids and Teens April 2014
Internet and Social Media Safety for Kids and Teens April 2014Internet and Social Media Safety for Kids and Teens April 2014
Internet and Social Media Safety for Kids and Teens April 2014
 

Similar to Cybersecurity for King County Public Educators

Attorney Marketing (Ads, Social Media) / The Cloud - Concerns for Lawyers
Attorney Marketing (Ads, Social Media) / The Cloud - Concerns for LawyersAttorney Marketing (Ads, Social Media) / The Cloud - Concerns for Lawyers
Attorney Marketing (Ads, Social Media) / The Cloud - Concerns for Lawyers
Jennifer Ellis, JD, LLC
 
Cybersecurity - Defense Against The Dark Arts Harry Potter Style
Cybersecurity - Defense Against The Dark Arts Harry Potter StyleCybersecurity - Defense Against The Dark Arts Harry Potter Style
Cybersecurity - Defense Against The Dark Arts Harry Potter Style
Brian Pichman
 
CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024
Brian Pichman
 
Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...
Justin Denton
 
Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids
Nicholas Davis
 
Iconuk 2016 - IBM Connections adoption Worst practices!
Iconuk 2016 - IBM Connections adoption Worst practices!Iconuk 2016 - IBM Connections adoption Worst practices!
Iconuk 2016 - IBM Connections adoption Worst practices!
Femke Goedhart
 
Social media user guide
Social media user guideSocial media user guide
Social media user guide
Whitney Moore
 
Introduction to social media workshop - Community organisations in Havering (...
Introduction to social media workshop - Community organisations in Havering (...Introduction to social media workshop - Community organisations in Havering (...
Introduction to social media workshop - Community organisations in Havering (...
Bottom Line Ideas
 
Social Media in the Work Place
Social Media in the Work PlaceSocial Media in the Work Place
Social Media in the Work Place
brandextract
 
ISMS Awareness Training (2) (1).pptx
ISMS Awareness Training (2) (1).pptxISMS Awareness Training (2) (1).pptx
ISMS Awareness Training (2) (1).pptx
vasidharta
 
Cybersecurity for Emergency Managers
Cybersecurity for Emergency ManagersCybersecurity for Emergency Managers
Cybersecurity for Emergency Managers
Sarah K Miller
 
Social engineering
Social engineeringSocial engineering
Social engineering
Robert Hood
 
Crisis communication in the social media age
Crisis communication in the social media age Crisis communication in the social media age
Crisis communication in the social media age
Andrea Walker
 
It security in healthcare
It security in healthcareIt security in healthcare
It security in healthcare
Nicholas Davis
 
Personal Threat Models
Personal Threat ModelsPersonal Threat Models
Personal Threat Models
Geoffrey Vaughan
 
Securing & Safeguarding Your Library Setup.pptx
Securing & Safeguarding Your Library Setup.pptxSecuring & Safeguarding Your Library Setup.pptx
Securing & Safeguarding Your Library Setup.pptx
Brian Pichman
 
Janitor vs cleaner
Janitor vs cleanerJanitor vs cleaner
Janitor vs cleaner
John Stauffacher
 
Cybersecurity for Emergency Managers
Cybersecurity for Emergency ManagersCybersecurity for Emergency Managers
Cybersecurity for Emergency Managers
Sarah K Miller
 
Securing and Safeguarding Your Library Setup
Securing and Safeguarding Your Library SetupSecuring and Safeguarding Your Library Setup
Securing and Safeguarding Your Library Setup
Brian Pichman
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Stephen Cobb
 

Similar to Cybersecurity for King County Public Educators (20)

Attorney Marketing (Ads, Social Media) / The Cloud - Concerns for Lawyers
Attorney Marketing (Ads, Social Media) / The Cloud - Concerns for LawyersAttorney Marketing (Ads, Social Media) / The Cloud - Concerns for Lawyers
Attorney Marketing (Ads, Social Media) / The Cloud - Concerns for Lawyers
 
Cybersecurity - Defense Against The Dark Arts Harry Potter Style
Cybersecurity - Defense Against The Dark Arts Harry Potter StyleCybersecurity - Defense Against The Dark Arts Harry Potter Style
Cybersecurity - Defense Against The Dark Arts Harry Potter Style
 
CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024
 
Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...
 
Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids
 
Iconuk 2016 - IBM Connections adoption Worst practices!
Iconuk 2016 - IBM Connections adoption Worst practices!Iconuk 2016 - IBM Connections adoption Worst practices!
Iconuk 2016 - IBM Connections adoption Worst practices!
 
Social media user guide
Social media user guideSocial media user guide
Social media user guide
 
Introduction to social media workshop - Community organisations in Havering (...
Introduction to social media workshop - Community organisations in Havering (...Introduction to social media workshop - Community organisations in Havering (...
Introduction to social media workshop - Community organisations in Havering (...
 
Social Media in the Work Place
Social Media in the Work PlaceSocial Media in the Work Place
Social Media in the Work Place
 
ISMS Awareness Training (2) (1).pptx
ISMS Awareness Training (2) (1).pptxISMS Awareness Training (2) (1).pptx
ISMS Awareness Training (2) (1).pptx
 
Cybersecurity for Emergency Managers
Cybersecurity for Emergency ManagersCybersecurity for Emergency Managers
Cybersecurity for Emergency Managers
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Crisis communication in the social media age
Crisis communication in the social media age Crisis communication in the social media age
Crisis communication in the social media age
 
It security in healthcare
It security in healthcareIt security in healthcare
It security in healthcare
 
Personal Threat Models
Personal Threat ModelsPersonal Threat Models
Personal Threat Models
 
Securing & Safeguarding Your Library Setup.pptx
Securing & Safeguarding Your Library Setup.pptxSecuring & Safeguarding Your Library Setup.pptx
Securing & Safeguarding Your Library Setup.pptx
 
Janitor vs cleaner
Janitor vs cleanerJanitor vs cleaner
Janitor vs cleaner
 
Cybersecurity for Emergency Managers
Cybersecurity for Emergency ManagersCybersecurity for Emergency Managers
Cybersecurity for Emergency Managers
 
Securing and Safeguarding Your Library Setup
Securing and Safeguarding Your Library SetupSecuring and Safeguarding Your Library Setup
Securing and Safeguarding Your Library Setup
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
 

More from Sarah K Miller

Secure your stuff
Secure your stuffSecure your stuff
Secure your stuff
Sarah K Miller
 
DEFCON - Ethics of technology in humanitarian and disaster response
DEFCON - Ethics of technology in humanitarian and disaster responseDEFCON - Ethics of technology in humanitarian and disaster response
DEFCON - Ethics of technology in humanitarian and disaster response
Sarah K Miller
 
IAEM cybersecurity 101
IAEM cybersecurity 101IAEM cybersecurity 101
IAEM cybersecurity 101
Sarah K Miller
 
Cybersecurity for IAEM Region 4
Cybersecurity for IAEM Region 4Cybersecurity for IAEM Region 4
Cybersecurity for IAEM Region 4
Sarah K Miller
 
Utilizing social media to sustain your club - Soroptimist edition
Utilizing social media to sustain your club - Soroptimist editionUtilizing social media to sustain your club - Soroptimist edition
Utilizing social media to sustain your club - Soroptimist edition
Sarah K Miller
 
Using Social Media for Club Recruiting and Engagement
Using Social Media for Club Recruiting and EngagementUsing Social Media for Club Recruiting and Engagement
Using Social Media for Club Recruiting and Engagement
Sarah K Miller
 
Using Social Media in an Emergency
Using Social Media in an EmergencyUsing Social Media in an Emergency
Using Social Media in an Emergency
Sarah K Miller
 
How to use social media in an emergency
How to use social media in an emergencyHow to use social media in an emergency
How to use social media in an emergency
Sarah K Miller
 
You can get there from here! Professional development through all career stag...
You can get there from here! Professional development through all career stag...You can get there from here! Professional development through all career stag...
You can get there from here! Professional development through all career stag...
Sarah K Miller
 
Writing a winning resume
Writing a winning resumeWriting a winning resume
Writing a winning resume
Sarah K Miller
 
ICS and you
ICS and youICS and you
ICS and you
Sarah K Miller
 
Utilizing social media to build your program
Utilizing social media to build your programUtilizing social media to build your program
Utilizing social media to build your program
Sarah K Miller
 
Social media privacy and safety
Social media privacy and safetySocial media privacy and safety
Social media privacy and safety
Sarah K Miller
 
INWEM Gender and Diversity Survey - 2010
INWEM Gender and Diversity Survey - 2010INWEM Gender and Diversity Survey - 2010
INWEM Gender and Diversity Survey - 2010
Sarah K Miller
 
Gaining situational awareness using social media
Gaining situational awareness using social mediaGaining situational awareness using social media
Gaining situational awareness using social media
Sarah K Miller
 
Generational differences in organizations.
Generational differences in organizations. Generational differences in organizations.
Generational differences in organizations.
Sarah K Miller
 
Emergency Preparedness: This is no time to gamble.
Emergency Preparedness: This is no time to gamble.Emergency Preparedness: This is no time to gamble.
Emergency Preparedness: This is no time to gamble.
Sarah K Miller
 
Recruiting and retaining radio volunteers
Recruiting and retaining radio volunteersRecruiting and retaining radio volunteers
Recruiting and retaining radio volunteers
Sarah K Miller
 
Overcoming barriers: The Role of Gender in Disaster
Overcoming barriers: The Role of Gender in DisasterOvercoming barriers: The Role of Gender in Disaster
Overcoming barriers: The Role of Gender in Disaster
Sarah K Miller
 
Interpersonal Communications in the EOC
Interpersonal Communications in the EOCInterpersonal Communications in the EOC
Interpersonal Communications in the EOC
Sarah K Miller
 

More from Sarah K Miller (20)

Secure your stuff
Secure your stuffSecure your stuff
Secure your stuff
 
DEFCON - Ethics of technology in humanitarian and disaster response
DEFCON - Ethics of technology in humanitarian and disaster responseDEFCON - Ethics of technology in humanitarian and disaster response
DEFCON - Ethics of technology in humanitarian and disaster response
 
IAEM cybersecurity 101
IAEM cybersecurity 101IAEM cybersecurity 101
IAEM cybersecurity 101
 
Cybersecurity for IAEM Region 4
Cybersecurity for IAEM Region 4Cybersecurity for IAEM Region 4
Cybersecurity for IAEM Region 4
 
Utilizing social media to sustain your club - Soroptimist edition
Utilizing social media to sustain your club - Soroptimist editionUtilizing social media to sustain your club - Soroptimist edition
Utilizing social media to sustain your club - Soroptimist edition
 
Using Social Media for Club Recruiting and Engagement
Using Social Media for Club Recruiting and EngagementUsing Social Media for Club Recruiting and Engagement
Using Social Media for Club Recruiting and Engagement
 
Using Social Media in an Emergency
Using Social Media in an EmergencyUsing Social Media in an Emergency
Using Social Media in an Emergency
 
How to use social media in an emergency
How to use social media in an emergencyHow to use social media in an emergency
How to use social media in an emergency
 
You can get there from here! Professional development through all career stag...
You can get there from here! Professional development through all career stag...You can get there from here! Professional development through all career stag...
You can get there from here! Professional development through all career stag...
 
Writing a winning resume
Writing a winning resumeWriting a winning resume
Writing a winning resume
 
ICS and you
ICS and youICS and you
ICS and you
 
Utilizing social media to build your program
Utilizing social media to build your programUtilizing social media to build your program
Utilizing social media to build your program
 
Social media privacy and safety
Social media privacy and safetySocial media privacy and safety
Social media privacy and safety
 
INWEM Gender and Diversity Survey - 2010
INWEM Gender and Diversity Survey - 2010INWEM Gender and Diversity Survey - 2010
INWEM Gender and Diversity Survey - 2010
 
Gaining situational awareness using social media
Gaining situational awareness using social mediaGaining situational awareness using social media
Gaining situational awareness using social media
 
Generational differences in organizations.
Generational differences in organizations. Generational differences in organizations.
Generational differences in organizations.
 
Emergency Preparedness: This is no time to gamble.
Emergency Preparedness: This is no time to gamble.Emergency Preparedness: This is no time to gamble.
Emergency Preparedness: This is no time to gamble.
 
Recruiting and retaining radio volunteers
Recruiting and retaining radio volunteersRecruiting and retaining radio volunteers
Recruiting and retaining radio volunteers
 
Overcoming barriers: The Role of Gender in Disaster
Overcoming barriers: The Role of Gender in DisasterOvercoming barriers: The Role of Gender in Disaster
Overcoming barriers: The Role of Gender in Disaster
 
Interpersonal Communications in the EOC
Interpersonal Communications in the EOCInterpersonal Communications in the EOC
Interpersonal Communications in the EOC
 

Recently uploaded

How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Project Management Semester Long Project - Acuity
Project Management Semester Long Project - AcuityProject Management Semester Long Project - Acuity
Project Management Semester Long Project - Acuity
jpupo2018
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
David Brossard
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Jeffrey Haguewood
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 

Recently uploaded (20)

How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Project Management Semester Long Project - Acuity
Project Management Semester Long Project - AcuityProject Management Semester Long Project - Acuity
Project Management Semester Long Project - Acuity
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 

Cybersecurity for King County Public Educators

  • 1.
  • 3.
  • 4. Cybersecurity is everyone’s problem • Cybersecurity is NOT just IT’s problem. IT Emergency Management Law Enforcement And everyone in your organization
  • 5. The threat • Malicious vs unintentional • Active attacks • Data breaches • Human error • Cyber warfare
  • 6. I never thought it could happen to me!
  • 7.
  • 8.
  • 10.
  • 11.
  • 13. Prevention • What have you done to prepare? • What policies are in place? • What training is in place? • How are the policies enforced? • THINGS YOU MUST HAVE • Emergency Operations Plan • Cybersecurity Policy • Acceptable Use Policy
  • 14.
  • 16. Mitigation • What steps have you taken? • What steps can you take? • Insurance • Backups • Redundancy • Monitoring • https://haveibeenpwned.com • Early Reporting • Training
  • 17. Response Do you have a response plan? Does everybody know how to recognize an incident? Does your staff know what to do if they suspect an incident? Who do you call for help?
  • 18. Recovery What’s your recovery plan? Beyond just the technology Who do you call for help?
  • 20. References • National Cyber Incident Response Plan, Department of Homeland Security, 2016 • Computer Security Incident Handling Guide (Revision 2) National Institute of Standards and Technology, 2012 • Washington State Significant Cyber Incident Annex, Washington Military Department – Emergency Management Division, 2015 • ISO/IEC 27032 – Information Technology – Security techniques – Guidelines for cybersecurity, International Standards Organization, 2012
  • 21. Annex Parts Policies Sets expectations Situation/ Assumptions Requires all components to be in place Concept of Operations Will require local discussion Responsibilities EM/IT/LE Expect some pushback
  • 22. Major Cyber Incident Checklist • Action items • Pre-Incident Phase • Response Phase • Recovery/Demob Phase
  • 23. Common Issues Most entities lack a comprehensive cybersecurity policy that vests responsibility with every employee. Those that have policies don’t enforce them A greater number of incidents occur than are reported in any formal way Lack of response plans leads to slow recognition, response, recovery. Lack of individual security leaves entire organization at risk
  • 24. Human Factor Phishing, social engineering • Enabled by agency and employee use of social media and other things Careless info access/dissemination • Public spaces • Public wifi • Unlocked computers • Lack of caution
  • 25. Security and Privacy • Keep personal information personal • Never post anyone’s information without their written consent • Only post (with consent) • Names • Phone numbers • E-mail addresses • Remove immediately when someone withdraws consent • Never post • Addresses • Dates of birth
  • 26. Activity Find a buddy Go online and pull up each of your organization’s websites Evaluate the website for privacy issues Be ready to report back on what is good and what needs to be updated
  • 28. Follow the rules! Rules might include Content Contests Access rights Type of account/page Don’t violate the rules! Read the actual rules for the platform before you sign your organization up
  • 29. Social Media Privacy and Security No photos posted without permission No graphics used without permission That means memes too! No personal information without permission Even with permission, be VERY limited Make sure the person giving permission understands the potential repercussions Ensure employees and volunteers are not sharing organization things without permission Ensure employees and volunteers are not sharing their own personal information
  • 30. Activity Alone or with a buddy Search for yourself on the internet See if there is anything that ties your name to your organization See if there is any personal information about you that could be used to impersonate you. Be ready to report back any surprises you found
  • 31. Social Media Best Practices • Create a record of every online account your organization has • Store it in an encrypted format • Include login and password info for master accounts • Include who has access to the two-factor authentication • Ensure at least two people have access to it Account information Create more than one administrator • Get everyone to use an encrypted password manager Don’t share admin credentials Always use two-factor authentication
  • 32. More Best Practices • Keeps third parties from getting them and impersonating you • Keep them non-published or dormant Obtain accounts even if you might not use them • Created by others or former employees • May be helpful • May be malicious • You need control of all of them Search for accounts using your organization’s name
  • 33. Activity 3 • Find a buddy • Go online and pull up each of your organization’s social media sites • See if there are any other social media sites that might be about your organization • Make a list of all the sites you find • Evaluate the official sites • Be ready to report back on what is good and what needs to be updated. Include any sites you need to gain control of and add any sites you think your organization should add.
  • 34. Other Examples This Photo by Unknown Author is licensed under CC BY-NC-SA
  • 35. QUESTIONS? Contact me: Sarah Miller, MPA, CEM Zone 3 EM Coordinator President, IAEM Region 10 Past Chair, IAEM Emerging Tech Caucus sarah.miller@kingcounty.gov twitter: @scba

Editor's Notes

  1. Poll Title: What words do you associate with cybersecurity? https://www.polleverywhere.com/free_text_polls/0yexgKQfSmSrEK7P9Es3W
  2. Poll Title: Has your organization experienced any kind of cybersecurity incident? https://www.polleverywhere.com/multiple_choice_polls/5duZ2QUozy9NfTmzgIMN1
  3. Poll Title: How do you store your passwords? https://www.polleverywhere.com/multiple_choice_polls/F73lcLT0hkG9gjuJxnAv4