SlideShare a Scribd company logo
1 of 25
THE HUMAN ELEMENT IN SECURITY
• To err is human, but to really foul things up
requires a computer.
• Computers are unreliable, but humans are even
more unreliable. Any system which depends on
human reliability is unreliable.
In
this
world
……
In this world …. Where
You have No Perimeter
In this world ……
In this world …
In this world ……
When hackers are becoming increasingly sophisticated
Whom Can You Trust?
Information Security
processtechnology
people
ARE YOU REVEALING TOO MUCH ?
SECURITY IS A PEOPLE PROBLEM
The Human Nature
• Careless
• Lazy
• Inquisitive
• Resists Change
• Gullible – Can be deceived
• Social Animal
Human Factor – The other side
• Committed when motivated
• Result oriented
• Intelligent animal
• Sometimes unsocial
Building the Human Firewall
End User is the Key to Security
Sec U R iT y
Awareness + Accountability =
Information Security Readiness
Problem:
Human factors represent the greatest challenge.
Solution:
A Security Awareness Program
•Enables every employee to become
•Brings Accountability
Awareness Training
is no longer Optional
SECURITY AWARENESS LADDER
Climbing the AWARENESS ladder
from
• Blissful ignorance
• Growing Recognition
• Understanding
• Positive Actions -- Responsive
• “Thinking Security” - Reduced
Losses
Audience
• Everyone: All Employees, Partners and Contractors
• Separate Messages crafted for general users, management
and technical staff
• Groups of New or Existing Employee - Time Frame
Supporting Communication
Tools
Screen Savers
Reminder Cards
Posters
Social Campaign
•POSTERS
•NEWSLETTERS
•ARTWORK
•YEAR AROUND PROGRAM
Social Campaign
ARTWORK
Hard Facts
• Physical Security is no longer sufficient
• Over reliance on technology cannot protect you
• Awareness and training is a must.
• Security breach on your system affects YOU !!

More Related Content

What's hot

Kevin leversee crowdsourcing the 2012 manila floods ver5
Kevin leversee crowdsourcing the 2012 manila floods ver5Kevin leversee crowdsourcing the 2012 manila floods ver5
Kevin leversee crowdsourcing the 2012 manila floods ver5Upstarts.tv
 
Leadership and Mindfulness in a Connected Age
Leadership and Mindfulness in a Connected AgeLeadership and Mindfulness in a Connected Age
Leadership and Mindfulness in a Connected AgeAmanda Levinson
 
Digital distractions in the workplace
Digital distractions in the workplaceDigital distractions in the workplace
Digital distractions in the workplaceDavid Lavenda
 
Real-Time Ethics: Balancing Journalism and Social Media in the Digital Age
Real-Time Ethics: Balancing Journalism and Social Media in the Digital AgeReal-Time Ethics: Balancing Journalism and Social Media in the Digital Age
Real-Time Ethics: Balancing Journalism and Social Media in the Digital AgeJake Batsell
 
Reputation in Real Time
Reputation in Real TimeReputation in Real Time
Reputation in Real TimeApeland
 
Impact of computer by Anil Bhattarai (nikolavinci)
Impact of computer by Anil Bhattarai (nikolavinci)Impact of computer by Anil Bhattarai (nikolavinci)
Impact of computer by Anil Bhattarai (nikolavinci)Anil Bhattarai
 
What’s Your Tech IQ?
What’s Your Tech IQ?What’s Your Tech IQ?
What’s Your Tech IQ?Leslie Dare
 
P plesson one
P plesson oneP plesson one
P plesson oneSSoutham
 
Tech Tips 2 Defeat Distraction NAG 2020
Tech Tips 2 Defeat Distraction NAG 2020Tech Tips 2 Defeat Distraction NAG 2020
Tech Tips 2 Defeat Distraction NAG 2020Brian Housand
 
The Help Desk is Dead - MISAC 2013 - Dan Turchin
The Help Desk is Dead - MISAC 2013 - Dan TurchinThe Help Desk is Dead - MISAC 2013 - Dan Turchin
The Help Desk is Dead - MISAC 2013 - Dan TurchinPeopleReign, Inc.
 
#Help! mijn kind leeft online apestaartjaren - 17 mei 2018 - engels - pp le...
#Help! mijn kind leeft online   apestaartjaren - 17 mei 2018 - engels - pp le...#Help! mijn kind leeft online   apestaartjaren - 17 mei 2018 - engels - pp le...
#Help! mijn kind leeft online apestaartjaren - 17 mei 2018 - engels - pp le...Apestaartjaren
 
Top Three Challenges to Building an Organization Dedicated to Social Learning
Top Three Challenges to Building an Organization Dedicated to Social LearningTop Three Challenges to Building an Organization Dedicated to Social Learning
Top Three Challenges to Building an Organization Dedicated to Social LearningintroNetworks.com
 
Social Media may hit the target, but it's not a magic bullet!
Social Media may hit the target, but it's not a magic bullet!Social Media may hit the target, but it's not a magic bullet!
Social Media may hit the target, but it's not a magic bullet!1CallNow
 
Bart vanhaelewyn digimeter 2017 - apestaartjaren mediawijscongres -20180517
Bart vanhaelewyn   digimeter 2017 - apestaartjaren mediawijscongres -20180517Bart vanhaelewyn   digimeter 2017 - apestaartjaren mediawijscongres -20180517
Bart vanhaelewyn digimeter 2017 - apestaartjaren mediawijscongres -20180517Apestaartjaren
 

What's hot (18)

Digital natives
Digital nativesDigital natives
Digital natives
 
Kevin leversee crowdsourcing the 2012 manila floods ver5
Kevin leversee crowdsourcing the 2012 manila floods ver5Kevin leversee crowdsourcing the 2012 manila floods ver5
Kevin leversee crowdsourcing the 2012 manila floods ver5
 
Leadership and Mindfulness in a Connected Age
Leadership and Mindfulness in a Connected AgeLeadership and Mindfulness in a Connected Age
Leadership and Mindfulness in a Connected Age
 
Digital distractions in the workplace
Digital distractions in the workplaceDigital distractions in the workplace
Digital distractions in the workplace
 
Real-Time Ethics: Balancing Journalism and Social Media in the Digital Age
Real-Time Ethics: Balancing Journalism and Social Media in the Digital AgeReal-Time Ethics: Balancing Journalism and Social Media in the Digital Age
Real-Time Ethics: Balancing Journalism and Social Media in the Digital Age
 
Reputation in Real Time
Reputation in Real TimeReputation in Real Time
Reputation in Real Time
 
Impact of computer by Anil Bhattarai (nikolavinci)
Impact of computer by Anil Bhattarai (nikolavinci)Impact of computer by Anil Bhattarai (nikolavinci)
Impact of computer by Anil Bhattarai (nikolavinci)
 
What’s Your Tech IQ?
What’s Your Tech IQ?What’s Your Tech IQ?
What’s Your Tech IQ?
 
P plesson one
P plesson oneP plesson one
P plesson one
 
I T
I TI T
I T
 
Tech Tips 2 Defeat Distraction NAG 2020
Tech Tips 2 Defeat Distraction NAG 2020Tech Tips 2 Defeat Distraction NAG 2020
Tech Tips 2 Defeat Distraction NAG 2020
 
The Help Desk is Dead - MISAC 2013 - Dan Turchin
The Help Desk is Dead - MISAC 2013 - Dan TurchinThe Help Desk is Dead - MISAC 2013 - Dan Turchin
The Help Desk is Dead - MISAC 2013 - Dan Turchin
 
#Help! mijn kind leeft online apestaartjaren - 17 mei 2018 - engels - pp le...
#Help! mijn kind leeft online   apestaartjaren - 17 mei 2018 - engels - pp le...#Help! mijn kind leeft online   apestaartjaren - 17 mei 2018 - engels - pp le...
#Help! mijn kind leeft online apestaartjaren - 17 mei 2018 - engels - pp le...
 
Top Three Challenges to Building an Organization Dedicated to Social Learning
Top Three Challenges to Building an Organization Dedicated to Social LearningTop Three Challenges to Building an Organization Dedicated to Social Learning
Top Three Challenges to Building an Organization Dedicated to Social Learning
 
Women in Open Source
Women in Open SourceWomen in Open Source
Women in Open Source
 
Where are your project saboteurs? webinar, 2 March 2020
Where are your project saboteurs? webinar, 2 March 2020Where are your project saboteurs? webinar, 2 March 2020
Where are your project saboteurs? webinar, 2 March 2020
 
Social Media may hit the target, but it's not a magic bullet!
Social Media may hit the target, but it's not a magic bullet!Social Media may hit the target, but it's not a magic bullet!
Social Media may hit the target, but it's not a magic bullet!
 
Bart vanhaelewyn digimeter 2017 - apestaartjaren mediawijscongres -20180517
Bart vanhaelewyn   digimeter 2017 - apestaartjaren mediawijscongres -20180517Bart vanhaelewyn   digimeter 2017 - apestaartjaren mediawijscongres -20180517
Bart vanhaelewyn digimeter 2017 - apestaartjaren mediawijscongres -20180517
 

Viewers also liked

styling_cal mag vintage black swim suit
styling_cal mag vintage black swim suitstyling_cal mag vintage black swim suit
styling_cal mag vintage black swim suitHeather Gulko
 
Six Sigma - 2. Perché utilizzarlo?
Six Sigma - 2. Perché utilizzarlo?Six Sigma - 2. Perché utilizzarlo?
Six Sigma - 2. Perché utilizzarlo?Manager.it
 
Auto-disciplina
Auto-disciplinaAuto-disciplina
Auto-disciplinaLogotel
 
Cultural Assessment Questionnaire - Capt. Franco Bosio
Cultural Assessment Questionnaire - Capt. Franco BosioCultural Assessment Questionnaire - Capt. Franco Bosio
Cultural Assessment Questionnaire - Capt. Franco BosioISOB
 
Checklist in Aeronautics - Capt- Andrea Gori
Checklist in Aeronautics - Capt- Andrea GoriChecklist in Aeronautics - Capt- Andrea Gori
Checklist in Aeronautics - Capt- Andrea GoriISOB
 
Nursing - Errore in Sanità - L’importanza che riveste l’incident reporting
Nursing - Errore in Sanità - L’importanza che riveste l’incident reportingNursing - Errore in Sanità - L’importanza che riveste l’incident reporting
Nursing - Errore in Sanità - L’importanza che riveste l’incident reportingISOB
 
Convention between ISOB-Inpatient Safety On Board and Italian Ministry of Health
Convention between ISOB-Inpatient Safety On Board and Italian Ministry of HealthConvention between ISOB-Inpatient Safety On Board and Italian Ministry of Health
Convention between ISOB-Inpatient Safety On Board and Italian Ministry of HealthISOB
 
Olismologia - Presentazione convegno inaugurale 18/2/2011
Olismologia - Presentazione convegno inaugurale 18/2/2011Olismologia - Presentazione convegno inaugurale 18/2/2011
Olismologia - Presentazione convegno inaugurale 18/2/2011Lorenzo Capello
 
Presentazione 5 S
Presentazione 5 SPresentazione 5 S
Presentazione 5 Smikfossa
 
Building self discipline in our students
Building self discipline in our studentsBuilding self discipline in our students
Building self discipline in our studentskkgmom03
 
LESSON: SELF DISCIPLINE
LESSON: SELF DISCIPLINELESSON: SELF DISCIPLINE
LESSON: SELF DISCIPLINEMomee Joi
 

Viewers also liked (14)

styling_cal mag vintage black swim suit
styling_cal mag vintage black swim suitstyling_cal mag vintage black swim suit
styling_cal mag vintage black swim suit
 
La promozione sul web
La promozione sul webLa promozione sul web
La promozione sul web
 
Gli Atteggiamenti
Gli AtteggiamentiGli Atteggiamenti
Gli Atteggiamenti
 
Six Sigma - 2. Perché utilizzarlo?
Six Sigma - 2. Perché utilizzarlo?Six Sigma - 2. Perché utilizzarlo?
Six Sigma - 2. Perché utilizzarlo?
 
Auto-disciplina
Auto-disciplinaAuto-disciplina
Auto-disciplina
 
Cultural Assessment Questionnaire - Capt. Franco Bosio
Cultural Assessment Questionnaire - Capt. Franco BosioCultural Assessment Questionnaire - Capt. Franco Bosio
Cultural Assessment Questionnaire - Capt. Franco Bosio
 
Checklist in Aeronautics - Capt- Andrea Gori
Checklist in Aeronautics - Capt- Andrea GoriChecklist in Aeronautics - Capt- Andrea Gori
Checklist in Aeronautics - Capt- Andrea Gori
 
Nursing - Errore in Sanità - L’importanza che riveste l’incident reporting
Nursing - Errore in Sanità - L’importanza che riveste l’incident reportingNursing - Errore in Sanità - L’importanza che riveste l’incident reporting
Nursing - Errore in Sanità - L’importanza che riveste l’incident reporting
 
Convention between ISOB-Inpatient Safety On Board and Italian Ministry of Health
Convention between ISOB-Inpatient Safety On Board and Italian Ministry of HealthConvention between ISOB-Inpatient Safety On Board and Italian Ministry of Health
Convention between ISOB-Inpatient Safety On Board and Italian Ministry of Health
 
Olismologia - Presentazione convegno inaugurale 18/2/2011
Olismologia - Presentazione convegno inaugurale 18/2/2011Olismologia - Presentazione convegno inaugurale 18/2/2011
Olismologia - Presentazione convegno inaugurale 18/2/2011
 
Modulo 5 S
Modulo 5 SModulo 5 S
Modulo 5 S
 
Presentazione 5 S
Presentazione 5 SPresentazione 5 S
Presentazione 5 S
 
Building self discipline in our students
Building self discipline in our studentsBuilding self discipline in our students
Building self discipline in our students
 
LESSON: SELF DISCIPLINE
LESSON: SELF DISCIPLINELESSON: SELF DISCIPLINE
LESSON: SELF DISCIPLINE
 

Similar to Human Element In Security

"Security on the Brain" Security & Risk Psychology Workshop Nov 2013
"Security on the Brain" Security & Risk Psychology Workshop Nov 2013"Security on the Brain" Security & Risk Psychology Workshop Nov 2013
"Security on the Brain" Security & Risk Psychology Workshop Nov 2013Adrian Wright
 
The Hacking Team Hack: Lessons Learned for Enterprise Security
The Hacking Team Hack: Lessons Learned for Enterprise SecurityThe Hacking Team Hack: Lessons Learned for Enterprise Security
The Hacking Team Hack: Lessons Learned for Enterprise SecurityStephen Cobb
 
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...Matt Hathaway
 
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...Alexandre Sieira
 
Digital transformation: introduction to cyber risk
Digital transformation: introduction to cyber riskDigital transformation: introduction to cyber risk
Digital transformation: introduction to cyber riskMosoco Ltd
 
Information Security & Manufacturing
Information Security & ManufacturingInformation Security & Manufacturing
Information Security & ManufacturingEvan Francen
 
Information security / Cyber Security ppt
Information security / Cyber Security pptInformation security / Cyber Security ppt
Information security / Cyber Security pptGryffin EJ
 
The difference between the Reality and Feeling of Security
The difference between the Reality and Feeling of SecurityThe difference between the Reality and Feeling of Security
The difference between the Reality and Feeling of SecurityAnup Narayanan
 
Keeping you and your library safe and secure
Keeping you and your library safe and secureKeeping you and your library safe and secure
Keeping you and your library safe and secureLYRASIS
 
Digi securitypres
Digi securitypresDigi securitypres
Digi securitypresFairSay
 
Managing Risk or Reacting to Compliance
Managing Risk or Reacting to ComplianceManaging Risk or Reacting to Compliance
Managing Risk or Reacting to ComplianceEvan Francen
 
Conference about Social Engineering (by Wh0s)
Conference about Social Engineering (by Wh0s)Conference about Social Engineering (by Wh0s)
Conference about Social Engineering (by Wh0s)Marta Barrio Marcos
 
Banning Whining, Avoiding Cyber Wolves, and Creating Warrior
Banning Whining, Avoiding Cyber Wolves, and Creating WarriorBanning Whining, Avoiding Cyber Wolves, and Creating Warrior
Banning Whining, Avoiding Cyber Wolves, and Creating WarriorSandra (Sandy) Dunn
 
Security Awareness - Defined, Managed and Measured
Security Awareness - Defined, Managed and MeasuredSecurity Awareness - Defined, Managed and Measured
Security Awareness - Defined, Managed and MeasuredChris Merkel
 
Developing The Human Firewall
Developing The Human FirewallDeveloping The Human Firewall
Developing The Human FirewallFwintle
 
David Bond, Thiess, presents at the OHS Leaders Summit 2013
David Bond, Thiess, presents at the OHS Leaders Summit 2013David Bond, Thiess, presents at the OHS Leaders Summit 2013
David Bond, Thiess, presents at the OHS Leaders Summit 2013Media Corp International
 
The Difference Between the Reality and Feeling of Security by Thomas Kurian
The Difference Between the Reality and Feeling of Security by Thomas KurianThe Difference Between the Reality and Feeling of Security by Thomas Kurian
The Difference Between the Reality and Feeling of Security by Thomas KurianClubHack
 
GRRCON 2013: Imparting security awareness to all levels of users
GRRCON 2013: Imparting security awareness to all levels of usersGRRCON 2013: Imparting security awareness to all levels of users
GRRCON 2013: Imparting security awareness to all levels of usersJoel Cardella
 
How to Spend Your Cloud Security Dollar
How to Spend Your Cloud Security DollarHow to Spend Your Cloud Security Dollar
How to Spend Your Cloud Security DollarHostway|HOSTING
 

Similar to Human Element In Security (20)

"Security on the Brain" Security & Risk Psychology Workshop Nov 2013
"Security on the Brain" Security & Risk Psychology Workshop Nov 2013"Security on the Brain" Security & Risk Psychology Workshop Nov 2013
"Security on the Brain" Security & Risk Psychology Workshop Nov 2013
 
The Hacking Team Hack: Lessons Learned for Enterprise Security
The Hacking Team Hack: Lessons Learned for Enterprise SecurityThe Hacking Team Hack: Lessons Learned for Enterprise Security
The Hacking Team Hack: Lessons Learned for Enterprise Security
 
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...
 
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...
 
Digital transformation: introduction to cyber risk
Digital transformation: introduction to cyber riskDigital transformation: introduction to cyber risk
Digital transformation: introduction to cyber risk
 
Information Security & Manufacturing
Information Security & ManufacturingInformation Security & Manufacturing
Information Security & Manufacturing
 
Evolving it security Threats and Solutions
Evolving it security  Threats and SolutionsEvolving it security  Threats and Solutions
Evolving it security Threats and Solutions
 
Information security / Cyber Security ppt
Information security / Cyber Security pptInformation security / Cyber Security ppt
Information security / Cyber Security ppt
 
The difference between the Reality and Feeling of Security
The difference between the Reality and Feeling of SecurityThe difference between the Reality and Feeling of Security
The difference between the Reality and Feeling of Security
 
Keeping you and your library safe and secure
Keeping you and your library safe and secureKeeping you and your library safe and secure
Keeping you and your library safe and secure
 
Digi securitypres
Digi securitypresDigi securitypres
Digi securitypres
 
Managing Risk or Reacting to Compliance
Managing Risk or Reacting to ComplianceManaging Risk or Reacting to Compliance
Managing Risk or Reacting to Compliance
 
Conference about Social Engineering (by Wh0s)
Conference about Social Engineering (by Wh0s)Conference about Social Engineering (by Wh0s)
Conference about Social Engineering (by Wh0s)
 
Banning Whining, Avoiding Cyber Wolves, and Creating Warrior
Banning Whining, Avoiding Cyber Wolves, and Creating WarriorBanning Whining, Avoiding Cyber Wolves, and Creating Warrior
Banning Whining, Avoiding Cyber Wolves, and Creating Warrior
 
Security Awareness - Defined, Managed and Measured
Security Awareness - Defined, Managed and MeasuredSecurity Awareness - Defined, Managed and Measured
Security Awareness - Defined, Managed and Measured
 
Developing The Human Firewall
Developing The Human FirewallDeveloping The Human Firewall
Developing The Human Firewall
 
David Bond, Thiess, presents at the OHS Leaders Summit 2013
David Bond, Thiess, presents at the OHS Leaders Summit 2013David Bond, Thiess, presents at the OHS Leaders Summit 2013
David Bond, Thiess, presents at the OHS Leaders Summit 2013
 
The Difference Between the Reality and Feeling of Security by Thomas Kurian
The Difference Between the Reality and Feeling of Security by Thomas KurianThe Difference Between the Reality and Feeling of Security by Thomas Kurian
The Difference Between the Reality and Feeling of Security by Thomas Kurian
 
GRRCON 2013: Imparting security awareness to all levels of users
GRRCON 2013: Imparting security awareness to all levels of usersGRRCON 2013: Imparting security awareness to all levels of users
GRRCON 2013: Imparting security awareness to all levels of users
 
How to Spend Your Cloud Security Dollar
How to Spend Your Cloud Security DollarHow to Spend Your Cloud Security Dollar
How to Spend Your Cloud Security Dollar
 

More from Vineet Sood

Customer success when you have millions of customers
Customer success when you have millions of customersCustomer success when you have millions of customers
Customer success when you have millions of customersVineet Sood
 
Building influence for 1st time mgrs
Building influence for 1st time mgrsBuilding influence for 1st time mgrs
Building influence for 1st time mgrsVineet Sood
 
Vineet Sood - thinker & planner 2019
Vineet Sood - thinker & planner 2019Vineet Sood - thinker & planner 2019
Vineet Sood - thinker & planner 2019Vineet Sood
 
Adobe connectED donation program
Adobe connectED donation programAdobe connectED donation program
Adobe connectED donation programVineet Sood
 
Partner matrices & model by Vineet Sood
Partner matrices & model by Vineet SoodPartner matrices & model by Vineet Sood
Partner matrices & model by Vineet SoodVineet Sood
 
Activity based Sales Process
Activity based Sales ProcessActivity based Sales Process
Activity based Sales ProcessVineet Sood
 
Growing the Adobe business
Growing the Adobe business Growing the Adobe business
Growing the Adobe business Vineet Sood
 
The New frontiers in Information Security
The New frontiers in Information SecurityThe New frontiers in Information Security
The New frontiers in Information SecurityVineet Sood
 
My Role @ Symantec
My Role @ SymantecMy Role @ Symantec
My Role @ SymantecVineet Sood
 
Unleash your potential final
Unleash your potential finalUnleash your potential final
Unleash your potential finalVineet Sood
 
Amazon Web Service Sales Role Play - Case Study
Amazon Web Service Sales Role Play - Case StudyAmazon Web Service Sales Role Play - Case Study
Amazon Web Service Sales Role Play - Case StudyVineet Sood
 
Do Dooni Char - The Force Multipliers In Your Value Chain
Do Dooni Char -  The Force Multipliers In Your Value ChainDo Dooni Char -  The Force Multipliers In Your Value Chain
Do Dooni Char - The Force Multipliers In Your Value ChainVineet Sood
 

More from Vineet Sood (12)

Customer success when you have millions of customers
Customer success when you have millions of customersCustomer success when you have millions of customers
Customer success when you have millions of customers
 
Building influence for 1st time mgrs
Building influence for 1st time mgrsBuilding influence for 1st time mgrs
Building influence for 1st time mgrs
 
Vineet Sood - thinker & planner 2019
Vineet Sood - thinker & planner 2019Vineet Sood - thinker & planner 2019
Vineet Sood - thinker & planner 2019
 
Adobe connectED donation program
Adobe connectED donation programAdobe connectED donation program
Adobe connectED donation program
 
Partner matrices & model by Vineet Sood
Partner matrices & model by Vineet SoodPartner matrices & model by Vineet Sood
Partner matrices & model by Vineet Sood
 
Activity based Sales Process
Activity based Sales ProcessActivity based Sales Process
Activity based Sales Process
 
Growing the Adobe business
Growing the Adobe business Growing the Adobe business
Growing the Adobe business
 
The New frontiers in Information Security
The New frontiers in Information SecurityThe New frontiers in Information Security
The New frontiers in Information Security
 
My Role @ Symantec
My Role @ SymantecMy Role @ Symantec
My Role @ Symantec
 
Unleash your potential final
Unleash your potential finalUnleash your potential final
Unleash your potential final
 
Amazon Web Service Sales Role Play - Case Study
Amazon Web Service Sales Role Play - Case StudyAmazon Web Service Sales Role Play - Case Study
Amazon Web Service Sales Role Play - Case Study
 
Do Dooni Char - The Force Multipliers In Your Value Chain
Do Dooni Char -  The Force Multipliers In Your Value ChainDo Dooni Char -  The Force Multipliers In Your Value Chain
Do Dooni Char - The Force Multipliers In Your Value Chain
 

Recently uploaded

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 

Recently uploaded (20)

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 

Human Element In Security

Editor's Notes

  1. IT people are remembered all the time when things go wrong AND Murphys law applies to all IT people.
  2. "The world isn’t run by weapons anymore, or energy, or money. It’s run by little ones and zeros, little bits of data... There’s a war out there... and it’s not about who’s got the most bullets. It’s about who controls the information.“ Where GothsVandals Talibans were earlier reqd to bring down the infrastructure Today a lean geek can cause the similar damage with few strokes of zeros and ones.
  3. CISOs have spent the past few years perfecting digging moats around the corporate castle. Now, as they lift their heads out of the trenches, they find themselves living in the age of bomber planes and guided missiles
  4. A single worm can cause a chaos and cost lot of money
  5. By bringing in blended threats reducing the exploit time and Use of new technology….targeted attacks, ….modular threat vectors.
  6. Who ? Who ? ………….. Your consultant, or your vendor or your IT staff ……………….it is you yourself……….each one of you. The answer is your employees: Employees are the ones who use the information assets – they are the one who are the closest to these assets – they are the one who gets most affected by security incident -- hence the onus of protection falls on them first. They can be the human firewall -- your organization needs for protection against the numerous threats out in the open.
  7. <number> It’s all about People, Process and Technology – Technology is the smallest part and the easiest to control!! Neither process nor technology will do any good if the people are not adequately trained. People need to be aware of what the current threats are, and what to do about them. They need to know what protection mechanisms are in place, be they a technical solution or a process.
  8. Tell a man there are 300 billion stars in the universe and he'll believe you. Tell him a bench has wet paint on it and he'll have to touch to be sure. PEOPLE PROBLEM All technical people view computer security as a technology problem. They use sophisticated hardware and software solutions to control access and prevent fraud. The reality is that computer security is a people problem.
  9. Human Firewall -- Most vulnerable – they are prone accidents and can make mistakes/errors and may even have malicious intents sometimes. Employees are greatest threats to information security. Caused by: Inexperience Improper training Incorrect assumptions Other circumstances HOW CAN WE CLOSE GAPS IN THIS HUMAN FIREWALL -- ?
  10. Security awareness must be delivered through an ongoing, continuous program, as opposed to a finite set of activities. Despite significant investment in technology and infrastructure, Human factors represent the greatest challenge. in achieving information security readiness
  11. <number>
  12. Campaign Raising awareness is similar to commercial advertising or social marketing, such as the campaigns to reduce smoking or decrease the use of alcohol. Behavioral change is what we are aiming at.