SlideShare a Scribd company logo
Chinatu Uzuegbu
CCISO, CISSP, CISM, CISA, CEH, ….
Managing Cyber Security Consultant
RoseTech CyberCrime Solutions Limited
Effectiveness of Cyber
Security Awareness
Chinatu Uzuegbu
https://www.linkedin.com/in/chinatu-uzuegbu-67593119/
https://de.slideshare.net/Chinatu
❖ Founder and Managing Security Consultant with RoseTech CyberCrime
Solutions Limited.
❖ Founding Past President of (ISC)2 Nigeria Chapter.
❖ Member of the global (ISC)2 Chapter Advisory Committee(CAC).
❖ Mentor with the Open Cyber Security Mentorship Program(OCMP).
❖ Top 50 Women in Cyber Security Finalist by Cyber in Africa, 2020
accolade.
❖ WomenTech Global Ambassador of WomenTech Network.
❖ Member of the Advisory board of VigiTrust, Ireland.
❖ Over 20 years wealth of experience in IT (2000 till date).
❖ Over 10 years in Cyber Security.
❖ Certifications(CCISO, CISSP, CISM, CISA, CEH, ITIL, MCSE, MCDBA and
others).
❖ London Graduate School with Common Wealth University,
2020(Leadership Summit).
❖ University of Liverpool, 2011; MSc. In Information Systems
Management(ISM).
❖ University of Port Harcourt,1998/1999; BSc. In Computer
Science/Mathematics.
❖ Professional membership with (ISC)2 and many other Information Security
Bodies and Associations.
❖ As Organizer, Speaker, Delegate or Volunteer during Technology or
Infosec Conferences.
Effectiveness of Cyber Security Awareness
• Introduction
• Our Obligations in Cyber Security.
• The Concepts of Cyber Security Awareness Month
• Statistical Report on Cyber Crimes.
• The Effective Cyber Security Awareness Program.
• Best Practices in Cyber Security Awareness.
• Conclusion
Introduction
The Digital Era
Internet of
Things
Evolvement of tech Network of Infrastructures Business Transformations Seamless flow of
Info
The Cybernetics
Mobile & Web Apps Social Media Internet Service Providers Cloud Tech
Artificial
Intelligence
Machine Learning Tech Providers
Global Village Cautious Trading
There is no Awareness without Cyber Security and no Cyber Security without the Digital Era.
Digital Identity
Metaverse
E-learning
Our Obligations in Securing the Digital Age
To assure to a reasonable extent that the Digital
workflow, processes and devices are secured and
protected from unauthorized Disclosures,
Modifications and destructions.
To connect with like-minded Professionals for
proactive collaborations, Knowledge-sharing, relevant
education and training that would inspire them to
assist others to protect their cyber space.
To ensure that the various communities and
the masses are getting enlightened and
altering their security culture accordingly
The Concepts of Cyber Security Awareness Month
Cyber security and Infrastructure Security Agency (CISA) and
National Cyber Security Alliance (NCSA) collaborated with the
concern that sensitive information of individuals could be
unduly exposed and tampered with.
The initiative was driven by the high rate of cyber related crimes
and Threats on daily basis, terribly affecting almost everyone
The high rise and evolvement of Technology especially from the
inception of the Covid-19 Pandemic , demands a high level of
security posture and consciousness.
Cyber Security Awareness is the process of impacting necessary
knowledge that would promote and alter the security culture of a
group or an individual
Statistical Report on Cyber Crimes.
Statistical report on Cyber Crimes
phishing attacks and cyber attacks now occurring
every 39 seconds
95% of all cyber attacks are caused by human error
64% of companies worldwide have experienced at least
one form of cyber attack
The global costs of cybercrime is expected to reach $10.5
trillion, annually by 2025
Ongoing Cyber Security Awareness Efforts
The growth curve is high
Impressive Awareness initiatives from both
individuals and groups of Cyber Security
Professionals .
Cyber Security Professionals take the Lead in
mobilising a security centric culture across all
departments in their organization
Impressive Collaborations among security
bodies too
But, we can do better with measurable
outcomes
Approach to Effective Cyber Security
Awareness
Drive your Awareness Program from the
Top to establish a buy-in.
Run with the SMART(Simple,
Measurable , Achievable, Realistic and
Timely) principle in mind. KPIs and KRAs
Narrow it down to a focused Audience
group, based on Job Roles and nature of
Business
Let the learning experience be more
interactive and practicable
Impromptu Campaigns driven from the
Top would be spot-on.
Outcomes could be measured from the
number of Incidents reported before and
after the Awareness program
Subject your training to align with the
Security Policies and Business Objectives of
your organization
Follow up on them with reinforcement of
knowledge through monitoring or Log-on
Banners
Do not streamline the Awareness training
to only Head Office Employees , carry
those in other remote locations along.
Employ a Risk-based Approach to tailor
the Cyber Security Awareness on high risk
areas.
Best Practices in Cyber Security Awareness.
Collaborate, Collaborate, Collaborate with
others such as NCSA, Knowbe4 .Enroll as a
Security Awareness Champion
Align with Best Practices and established
Standards such as ISO 27001 on Information
Security Management System(ISMS) and
NIST
Pay attention to Due Diligence
Align with both local and International
Regulatory bodies
Aim at the Business Value Chain of your
organisation(BIA and Risk Analysis)
Leverage on GAP Analysis to outline your
strengths and weak areas.
Make it resilient and cost-effective
Make it a regular affair, not just during the
Awareness Month
Always think outside the box for a more
productive outcome.
Carry everyone along as Cyber Security is
everyone’s responsibilities
Conclusion
To achieve an optimal level of effectiveness in Cyber
Security Awareness:
See yourself in the Cyber with a level of sensitivity and discernment
around your digital assets and those of your organization
Cyber Security Professionals should collaborate with others across all
states and local governments to evangelize Security Awareness.
we must achieve a Sustainable Digital Age without a sustainable Cyber
Security and Awareness around it.
we must be granular in our Security Awareness Outreaches, think for the
rural areas too.
Keep up the Mentee/Mentor/reverse mentoring relationships,.
Together, we can stay ahead of the Cyber Criminals
Thank You
Let’s Connect:
https://www.linkedin.com/in/chinatu-
uzuegbu-67593119/

More Related Content

Similar to Effectiveness of Cyber Security Awareness.pdf

Strengthening Caribbean Business against Cyber Attacks May 18.pdf
Strengthening Caribbean Business against Cyber Attacks May 18.pdfStrengthening Caribbean Business against Cyber Attacks May 18.pdf
Strengthening Caribbean Business against Cyber Attacks May 18.pdf
Symptai Consulting Limited
 
Building Cyber Resilience
Building Cyber ResilienceBuilding Cyber Resilience
Building Cyber Resilience
Committee of iCIO Community
 
Building Cyber Resilience in the Digital Economy
Building Cyber Resilience in the Digital EconomyBuilding Cyber Resilience in the Digital Economy
Building Cyber Resilience in the Digital Economy
Agus Wicaksono
 
Virtual Chief Information Security Officer | VCISO | Cyber Security
Virtual Chief Information Security Officer | VCISO | Cyber SecurityVirtual Chief Information Security Officer | VCISO | Cyber Security
Virtual Chief Information Security Officer | VCISO | Cyber Security
Cyber Security Experts
 
Regional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi Kenya
Regional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi KenyaRegional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi Kenya
Regional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi Kenya
Martin M
 
Cyber presentation spet 2019 v8sentfor upload
Cyber presentation spet 2019 v8sentfor uploadCyber presentation spet 2019 v8sentfor upload
Cyber presentation spet 2019 v8sentfor upload
savassociates1
 
Weakest links of an organization's Cybersecurity chain
Weakest links of an organization's Cybersecurity chainWeakest links of an organization's Cybersecurity chain
Weakest links of an organization's Cybersecurity chain
Sanjay Chadha, CPA, CA
 
SMi Group's 5th annual Oil & Gas Cyber Security 2015
SMi Group's 5th annual Oil & Gas Cyber Security 2015SMi Group's 5th annual Oil & Gas Cyber Security 2015
SMi Group's 5th annual Oil & Gas Cyber Security 2015
Dale Butler
 
ISACA Vancouver Risk IT Workshop - April 15 2010
ISACA Vancouver Risk IT Workshop - April 15 2010ISACA Vancouver Risk IT Workshop - April 15 2010
ISACA Vancouver Risk IT Workshop - April 15 2010guestc6f137f
 
ISACA Vancouver Risk IT Workshop - April 15 2010
ISACA Vancouver Risk IT Workshop - April 15 2010ISACA Vancouver Risk IT Workshop - April 15 2010
ISACA Vancouver Risk IT Workshop - April 15 2010pgpmikey
 
Ask the Experts final
Ask the Experts finalAsk the Experts final
Ask the Experts finalDaren Dunkel
 
Cyber Security Infographic
Cyber Security InfographicCyber Security Infographic
Cyber Security Infographic
Booz Allen Hamilton
 
Enhancing Cyber Security Awareness: Building a Safer Digital World
Enhancing Cyber Security Awareness: Building a Safer Digital WorldEnhancing Cyber Security Awareness: Building a Safer Digital World
Enhancing Cyber Security Awareness: Building a Safer Digital World
cyberprosocial
 
Raise The Cybersecurity Curtain! Be The Voice!
Raise The Cybersecurity Curtain! Be The Voice!Raise The Cybersecurity Curtain! Be The Voice!
Raise The Cybersecurity Curtain! Be The Voice!
Ludmila Morozova-Buss
 
A Look at Cyber Insurance -- A Corporate Perspective
A Look at Cyber Insurance -- A Corporate  PerspectiveA Look at Cyber Insurance -- A Corporate  Perspective
A Look at Cyber Insurance -- A Corporate Perspective
Dawn Yankeelov
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
Anil
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
Anil
 
Understanding the Importance of Security Testing in Safeguarding Your Digital...
Understanding the Importance of Security Testing in Safeguarding Your Digital...Understanding the Importance of Security Testing in Safeguarding Your Digital...
Understanding the Importance of Security Testing in Safeguarding Your Digital...
Afour tech
 

Similar to Effectiveness of Cyber Security Awareness.pdf (20)

Strengthening Caribbean Business against Cyber Attacks May 18.pdf
Strengthening Caribbean Business against Cyber Attacks May 18.pdfStrengthening Caribbean Business against Cyber Attacks May 18.pdf
Strengthening Caribbean Business against Cyber Attacks May 18.pdf
 
Building Cyber Resilience
Building Cyber ResilienceBuilding Cyber Resilience
Building Cyber Resilience
 
Building Cyber Resilience in the Digital Economy
Building Cyber Resilience in the Digital EconomyBuilding Cyber Resilience in the Digital Economy
Building Cyber Resilience in the Digital Economy
 
CRI-Corporate-Profile (1)
CRI-Corporate-Profile (1)CRI-Corporate-Profile (1)
CRI-Corporate-Profile (1)
 
Virtual Chief Information Security Officer | VCISO | Cyber Security
Virtual Chief Information Security Officer | VCISO | Cyber SecurityVirtual Chief Information Security Officer | VCISO | Cyber Security
Virtual Chief Information Security Officer | VCISO | Cyber Security
 
Regional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi Kenya
Regional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi KenyaRegional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi Kenya
Regional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi Kenya
 
Cyber presentation spet 2019 v8sentfor upload
Cyber presentation spet 2019 v8sentfor uploadCyber presentation spet 2019 v8sentfor upload
Cyber presentation spet 2019 v8sentfor upload
 
Weakest links of an organization's Cybersecurity chain
Weakest links of an organization's Cybersecurity chainWeakest links of an organization's Cybersecurity chain
Weakest links of an organization's Cybersecurity chain
 
SMi Group's 5th annual Oil & Gas Cyber Security 2015
SMi Group's 5th annual Oil & Gas Cyber Security 2015SMi Group's 5th annual Oil & Gas Cyber Security 2015
SMi Group's 5th annual Oil & Gas Cyber Security 2015
 
ISACA Vancouver Risk IT Workshop - April 15 2010
ISACA Vancouver Risk IT Workshop - April 15 2010ISACA Vancouver Risk IT Workshop - April 15 2010
ISACA Vancouver Risk IT Workshop - April 15 2010
 
ISACA Vancouver Risk IT Workshop - April 15 2010
ISACA Vancouver Risk IT Workshop - April 15 2010ISACA Vancouver Risk IT Workshop - April 15 2010
ISACA Vancouver Risk IT Workshop - April 15 2010
 
Ask the Experts final
Ask the Experts finalAsk the Experts final
Ask the Experts final
 
Cyber Security Infographic
Cyber Security InfographicCyber Security Infographic
Cyber Security Infographic
 
2014 Conference Brochure - GRC 2.0 Breaking Down the Silos
2014 Conference Brochure - GRC 2.0 Breaking Down the Silos2014 Conference Brochure - GRC 2.0 Breaking Down the Silos
2014 Conference Brochure - GRC 2.0 Breaking Down the Silos
 
Enhancing Cyber Security Awareness: Building a Safer Digital World
Enhancing Cyber Security Awareness: Building a Safer Digital WorldEnhancing Cyber Security Awareness: Building a Safer Digital World
Enhancing Cyber Security Awareness: Building a Safer Digital World
 
Raise The Cybersecurity Curtain! Be The Voice!
Raise The Cybersecurity Curtain! Be The Voice!Raise The Cybersecurity Curtain! Be The Voice!
Raise The Cybersecurity Curtain! Be The Voice!
 
A Look at Cyber Insurance -- A Corporate Perspective
A Look at Cyber Insurance -- A Corporate  PerspectiveA Look at Cyber Insurance -- A Corporate  Perspective
A Look at Cyber Insurance -- A Corporate Perspective
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
 
Understanding the Importance of Security Testing in Safeguarding Your Digital...
Understanding the Importance of Security Testing in Safeguarding Your Digital...Understanding the Importance of Security Testing in Safeguarding Your Digital...
Understanding the Importance of Security Testing in Safeguarding Your Digital...
 

More from Chinatu Uzuegbu

Business Process Revamp is Paramount in 2024.pdf
Business Process Revamp is Paramount in 2024.pdfBusiness Process Revamp is Paramount in 2024.pdf
Business Process Revamp is Paramount in 2024.pdf
Chinatu Uzuegbu
 
Preventing Cloud Data Breaches.pdf
Preventing Cloud Data Breaches.pdfPreventing Cloud Data Breaches.pdf
Preventing Cloud Data Breaches.pdf
Chinatu Uzuegbu
 
Securing The Clouds Proactively-BlackisTech.pptx
Securing The Clouds Proactively-BlackisTech.pptxSecuring The Clouds Proactively-BlackisTech.pptx
Securing The Clouds Proactively-BlackisTech.pptx
Chinatu Uzuegbu
 
Securing The Clouds with The Standard Best Practices-1.pdf
Securing The Clouds with The Standard Best Practices-1.pdfSecuring The Clouds with The Standard Best Practices-1.pdf
Securing The Clouds with The Standard Best Practices-1.pdf
Chinatu Uzuegbu
 
World Password Management Day, 2023.pdf
World Password Management Day, 2023.pdfWorld Password Management Day, 2023.pdf
World Password Management Day, 2023.pdf
Chinatu Uzuegbu
 
The Nigerian Cybersecurity Space-How Regulated Are We?
The Nigerian Cybersecurity Space-How Regulated Are We?The Nigerian Cybersecurity Space-How Regulated Are We?
The Nigerian Cybersecurity Space-How Regulated Are We?
Chinatu Uzuegbu
 
Fundamentals for Stronger Cloud Security2.pdf
Fundamentals for Stronger Cloud Security2.pdfFundamentals for Stronger Cloud Security2.pdf
Fundamentals for Stronger Cloud Security2.pdf
Chinatu Uzuegbu
 
What The Cyber Entails-2.pdf
What The Cyber Entails-2.pdfWhat The Cyber Entails-2.pdf
What The Cyber Entails-2.pdf
Chinatu Uzuegbu
 
What The Cyber Entails-1.pdf
What The Cyber Entails-1.pdfWhat The Cyber Entails-1.pdf
What The Cyber Entails-1.pdf
Chinatu Uzuegbu
 
Combating Cyber Crimes Proactively.pdf
Combating Cyber Crimes Proactively.pdfCombating Cyber Crimes Proactively.pdf
Combating Cyber Crimes Proactively.pdf
Chinatu Uzuegbu
 
Identity & Access Management Day 2022.pdf
Identity & Access Management Day 2022.pdfIdentity & Access Management Day 2022.pdf
Identity & Access Management Day 2022.pdf
Chinatu Uzuegbu
 
Understanding Identity Management and Security.
Understanding Identity Management and Security.Understanding Identity Management and Security.
Understanding Identity Management and Security.
Chinatu Uzuegbu
 
Practical approach to combating cyber crimes
Practical approach to combating cyber crimesPractical approach to combating cyber crimes
Practical approach to combating cyber crimes
Chinatu Uzuegbu
 
Cyber Security Awareness Month 2017-Wrap-Up
Cyber Security Awareness Month 2017-Wrap-UpCyber Security Awareness Month 2017-Wrap-Up
Cyber Security Awareness Month 2017-Wrap-Up
Chinatu Uzuegbu
 
Cyber Security Awareness Month 2017-Nugget 6
Cyber Security Awareness Month 2017-Nugget 6Cyber Security Awareness Month 2017-Nugget 6
Cyber Security Awareness Month 2017-Nugget 6
Chinatu Uzuegbu
 
Cyber crime (prohibition,prevention,etc)_act,_2015
Cyber crime (prohibition,prevention,etc)_act,_2015Cyber crime (prohibition,prevention,etc)_act,_2015
Cyber crime (prohibition,prevention,etc)_act,_2015
Chinatu Uzuegbu
 
Cyber Security Awareness Month 2017-Nugget 3
Cyber Security Awareness Month 2017-Nugget 3Cyber Security Awareness Month 2017-Nugget 3
Cyber Security Awareness Month 2017-Nugget 3
Chinatu Uzuegbu
 
Cyber Security Awareness Month 2017- Nugget2
Cyber Security Awareness Month 2017- Nugget2Cyber Security Awareness Month 2017- Nugget2
Cyber Security Awareness Month 2017- Nugget2
Chinatu Uzuegbu
 
Cyber Security Awareness Month 2017
Cyber Security Awareness Month 2017Cyber Security Awareness Month 2017
Cyber Security Awareness Month 2017
Chinatu Uzuegbu
 

More from Chinatu Uzuegbu (19)

Business Process Revamp is Paramount in 2024.pdf
Business Process Revamp is Paramount in 2024.pdfBusiness Process Revamp is Paramount in 2024.pdf
Business Process Revamp is Paramount in 2024.pdf
 
Preventing Cloud Data Breaches.pdf
Preventing Cloud Data Breaches.pdfPreventing Cloud Data Breaches.pdf
Preventing Cloud Data Breaches.pdf
 
Securing The Clouds Proactively-BlackisTech.pptx
Securing The Clouds Proactively-BlackisTech.pptxSecuring The Clouds Proactively-BlackisTech.pptx
Securing The Clouds Proactively-BlackisTech.pptx
 
Securing The Clouds with The Standard Best Practices-1.pdf
Securing The Clouds with The Standard Best Practices-1.pdfSecuring The Clouds with The Standard Best Practices-1.pdf
Securing The Clouds with The Standard Best Practices-1.pdf
 
World Password Management Day, 2023.pdf
World Password Management Day, 2023.pdfWorld Password Management Day, 2023.pdf
World Password Management Day, 2023.pdf
 
The Nigerian Cybersecurity Space-How Regulated Are We?
The Nigerian Cybersecurity Space-How Regulated Are We?The Nigerian Cybersecurity Space-How Regulated Are We?
The Nigerian Cybersecurity Space-How Regulated Are We?
 
Fundamentals for Stronger Cloud Security2.pdf
Fundamentals for Stronger Cloud Security2.pdfFundamentals for Stronger Cloud Security2.pdf
Fundamentals for Stronger Cloud Security2.pdf
 
What The Cyber Entails-2.pdf
What The Cyber Entails-2.pdfWhat The Cyber Entails-2.pdf
What The Cyber Entails-2.pdf
 
What The Cyber Entails-1.pdf
What The Cyber Entails-1.pdfWhat The Cyber Entails-1.pdf
What The Cyber Entails-1.pdf
 
Combating Cyber Crimes Proactively.pdf
Combating Cyber Crimes Proactively.pdfCombating Cyber Crimes Proactively.pdf
Combating Cyber Crimes Proactively.pdf
 
Identity & Access Management Day 2022.pdf
Identity & Access Management Day 2022.pdfIdentity & Access Management Day 2022.pdf
Identity & Access Management Day 2022.pdf
 
Understanding Identity Management and Security.
Understanding Identity Management and Security.Understanding Identity Management and Security.
Understanding Identity Management and Security.
 
Practical approach to combating cyber crimes
Practical approach to combating cyber crimesPractical approach to combating cyber crimes
Practical approach to combating cyber crimes
 
Cyber Security Awareness Month 2017-Wrap-Up
Cyber Security Awareness Month 2017-Wrap-UpCyber Security Awareness Month 2017-Wrap-Up
Cyber Security Awareness Month 2017-Wrap-Up
 
Cyber Security Awareness Month 2017-Nugget 6
Cyber Security Awareness Month 2017-Nugget 6Cyber Security Awareness Month 2017-Nugget 6
Cyber Security Awareness Month 2017-Nugget 6
 
Cyber crime (prohibition,prevention,etc)_act,_2015
Cyber crime (prohibition,prevention,etc)_act,_2015Cyber crime (prohibition,prevention,etc)_act,_2015
Cyber crime (prohibition,prevention,etc)_act,_2015
 
Cyber Security Awareness Month 2017-Nugget 3
Cyber Security Awareness Month 2017-Nugget 3Cyber Security Awareness Month 2017-Nugget 3
Cyber Security Awareness Month 2017-Nugget 3
 
Cyber Security Awareness Month 2017- Nugget2
Cyber Security Awareness Month 2017- Nugget2Cyber Security Awareness Month 2017- Nugget2
Cyber Security Awareness Month 2017- Nugget2
 
Cyber Security Awareness Month 2017
Cyber Security Awareness Month 2017Cyber Security Awareness Month 2017
Cyber Security Awareness Month 2017
 

Recently uploaded

GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 

Recently uploaded (20)

GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 

Effectiveness of Cyber Security Awareness.pdf

  • 1. Chinatu Uzuegbu CCISO, CISSP, CISM, CISA, CEH, …. Managing Cyber Security Consultant RoseTech CyberCrime Solutions Limited Effectiveness of Cyber Security Awareness
  • 2. Chinatu Uzuegbu https://www.linkedin.com/in/chinatu-uzuegbu-67593119/ https://de.slideshare.net/Chinatu ❖ Founder and Managing Security Consultant with RoseTech CyberCrime Solutions Limited. ❖ Founding Past President of (ISC)2 Nigeria Chapter. ❖ Member of the global (ISC)2 Chapter Advisory Committee(CAC). ❖ Mentor with the Open Cyber Security Mentorship Program(OCMP). ❖ Top 50 Women in Cyber Security Finalist by Cyber in Africa, 2020 accolade. ❖ WomenTech Global Ambassador of WomenTech Network. ❖ Member of the Advisory board of VigiTrust, Ireland. ❖ Over 20 years wealth of experience in IT (2000 till date). ❖ Over 10 years in Cyber Security. ❖ Certifications(CCISO, CISSP, CISM, CISA, CEH, ITIL, MCSE, MCDBA and others). ❖ London Graduate School with Common Wealth University, 2020(Leadership Summit). ❖ University of Liverpool, 2011; MSc. In Information Systems Management(ISM). ❖ University of Port Harcourt,1998/1999; BSc. In Computer Science/Mathematics. ❖ Professional membership with (ISC)2 and many other Information Security Bodies and Associations. ❖ As Organizer, Speaker, Delegate or Volunteer during Technology or Infosec Conferences.
  • 3. Effectiveness of Cyber Security Awareness • Introduction • Our Obligations in Cyber Security. • The Concepts of Cyber Security Awareness Month • Statistical Report on Cyber Crimes. • The Effective Cyber Security Awareness Program. • Best Practices in Cyber Security Awareness. • Conclusion
  • 4. Introduction The Digital Era Internet of Things Evolvement of tech Network of Infrastructures Business Transformations Seamless flow of Info The Cybernetics Mobile & Web Apps Social Media Internet Service Providers Cloud Tech Artificial Intelligence Machine Learning Tech Providers Global Village Cautious Trading There is no Awareness without Cyber Security and no Cyber Security without the Digital Era. Digital Identity Metaverse E-learning
  • 5. Our Obligations in Securing the Digital Age To assure to a reasonable extent that the Digital workflow, processes and devices are secured and protected from unauthorized Disclosures, Modifications and destructions. To connect with like-minded Professionals for proactive collaborations, Knowledge-sharing, relevant education and training that would inspire them to assist others to protect their cyber space. To ensure that the various communities and the masses are getting enlightened and altering their security culture accordingly
  • 6. The Concepts of Cyber Security Awareness Month Cyber security and Infrastructure Security Agency (CISA) and National Cyber Security Alliance (NCSA) collaborated with the concern that sensitive information of individuals could be unduly exposed and tampered with. The initiative was driven by the high rate of cyber related crimes and Threats on daily basis, terribly affecting almost everyone The high rise and evolvement of Technology especially from the inception of the Covid-19 Pandemic , demands a high level of security posture and consciousness. Cyber Security Awareness is the process of impacting necessary knowledge that would promote and alter the security culture of a group or an individual
  • 7. Statistical Report on Cyber Crimes.
  • 8. Statistical report on Cyber Crimes phishing attacks and cyber attacks now occurring every 39 seconds 95% of all cyber attacks are caused by human error 64% of companies worldwide have experienced at least one form of cyber attack The global costs of cybercrime is expected to reach $10.5 trillion, annually by 2025
  • 9. Ongoing Cyber Security Awareness Efforts The growth curve is high Impressive Awareness initiatives from both individuals and groups of Cyber Security Professionals . Cyber Security Professionals take the Lead in mobilising a security centric culture across all departments in their organization Impressive Collaborations among security bodies too But, we can do better with measurable outcomes
  • 10. Approach to Effective Cyber Security Awareness Drive your Awareness Program from the Top to establish a buy-in. Run with the SMART(Simple, Measurable , Achievable, Realistic and Timely) principle in mind. KPIs and KRAs Narrow it down to a focused Audience group, based on Job Roles and nature of Business Let the learning experience be more interactive and practicable Impromptu Campaigns driven from the Top would be spot-on. Outcomes could be measured from the number of Incidents reported before and after the Awareness program Subject your training to align with the Security Policies and Business Objectives of your organization Follow up on them with reinforcement of knowledge through monitoring or Log-on Banners Do not streamline the Awareness training to only Head Office Employees , carry those in other remote locations along. Employ a Risk-based Approach to tailor the Cyber Security Awareness on high risk areas.
  • 11. Best Practices in Cyber Security Awareness. Collaborate, Collaborate, Collaborate with others such as NCSA, Knowbe4 .Enroll as a Security Awareness Champion Align with Best Practices and established Standards such as ISO 27001 on Information Security Management System(ISMS) and NIST Pay attention to Due Diligence Align with both local and International Regulatory bodies Aim at the Business Value Chain of your organisation(BIA and Risk Analysis) Leverage on GAP Analysis to outline your strengths and weak areas. Make it resilient and cost-effective Make it a regular affair, not just during the Awareness Month Always think outside the box for a more productive outcome. Carry everyone along as Cyber Security is everyone’s responsibilities
  • 12. Conclusion To achieve an optimal level of effectiveness in Cyber Security Awareness: See yourself in the Cyber with a level of sensitivity and discernment around your digital assets and those of your organization Cyber Security Professionals should collaborate with others across all states and local governments to evangelize Security Awareness. we must achieve a Sustainable Digital Age without a sustainable Cyber Security and Awareness around it. we must be granular in our Security Awareness Outreaches, think for the rural areas too. Keep up the Mentee/Mentor/reverse mentoring relationships,. Together, we can stay ahead of the Cyber Criminals