SlideShare a Scribd company logo
1 of 20
Personal Digital Security
Implications for the home and the office
Sponsored by
Lydia Kostopoulos, PhD
@LKCYBER
June 4, 2015
Personal Digital Security
What it entails.
What it means for you:
• As an individual
• As an employee for your company
What you can do about it
Personal Digital Security
• Protection of your identity,
communications, accounts,
assets and technology
from malicious intruders.
• Protection of personal
tools: SIM cards,
contactless credit cards,
health and digital security
devices, biometric data,
IOTs, etc.
• Read Terms of Service (ToS) and Privacy Policies before agreeing.
• Update and patch software often.
• Don’t share personal information unless absolutely necessary.
• Don’t click on suspicious links and do not open email attachments from people you don’t know.
• Be conscious of meta-data.
• Read Terms of Service (ToS) and Privacy Policies before agreeing.
• Pay attention to the site link at the top and make sure it is a secure connection.
• Avoid being a phishing victim and pay attention to email headers to make sure they are legit.
HOME
Leakage awareness!
Personal Digital Security
• Read Terms of Service (ToS) and Privacy Policies before agreeing.
• Update and patch software often.
• Don’t share personal information unless absolutely necessary.
• Don’t click on suspicious links and do not open email attachments from people you don’t know.
• Be conscious of meta-data.
• Read Terms of Service (ToS) and Privacy Policies before agreeing.
• Pay attention to the site link at the top and make sure it is a secure connection.
• Avoid being a phishing victim and pay attention to email headers to make sure they are legit.
OFFICE
Policies!
Data Loss Prevention (DLP)
Source: COMSEC Consulting: Information Security
What measures have you taken to secure the following?
Security is an evolving process.
Keep an open mind
to learning!
Awareness
is key.
Stress Reduction Kit
Bang
Head
Here
Directions:
1. Place kit on FIRM surface.
2. Follow directions in circle of kit.
3. Repeat step 2 as necessary, or until unconscious.
4. If unconscious, cease stress reduction activity.
“Digital equivalent of locking
the front door to your home and
not leaving your car keys in the
ignition”. – Marc Goodman
Avoid 85% of
common digital
threats.
Government
Cyber Security Evaluation Tool
(self-assessment)
FBI and Private Sector Partnership
Association of persons who represent businesses,
academic institutions, state and local law enforcement
agencies, and others dedicated to sharing information
and intelligence to prevent hostile acts against the U.S.
• Meetings
• Newsletters
• Briefs
https://ics-cert.us-cert.gov/Assessments
https://www.infragard.org
http://www.stopthinkconnect.org/
https://www.fcc.gov/cyberforsmallbiz
• Cyber Security Tips for Small Businesses
Guide
Keeping Your Social Media Accounts Secure
Defense Media Activity
• Protective Measures
• Checklist
• Social Media Tips
Government
Private Sector
https://www.social-engineer.com
• Social Engineering
• Physical Security
• Information Security
https://www.securingthehuman.org
• Awareness Posters/Presentations
• Newsletter
• Security Awareness Guidance
• Internet Security for Kids
Newsletter on latest phishing trendshttps://www.knowbe4.com
Non-Profit
http://www.antiphishing.org/
• In association with CyLab at Carnegie Mellon
• Education Initiative
• Phishing landing page example
• HTTPS Everywhere Add-On
https://www.eff.org/https-everywhere
https://www.staysafeonline.org/business-safe-online/
Resources for businesses
• Risk Assessment
• Threat monitoring strategies
• Reporting cyber attacks
• Implementing a cybersecurity plan
• Protecting customers
• Training employees
• Training & Videos
• Guides
• Newsletters & Tips
Everyone plays a role in corporate security.
OSAC: Personal Digital Security Presentation

More Related Content

What's hot

Chapter1 Cyber security Law & policy.pptx
Chapter1 Cyber security Law & policy.pptxChapter1 Cyber security Law & policy.pptx
Chapter1 Cyber security Law & policy.pptxNargis Parveen
 
Cybercrime a growing threat of 21 st century !!!
Cybercrime a growing threat of 21 st  century !!!Cybercrime a growing threat of 21 st  century !!!
Cybercrime a growing threat of 21 st century !!!Asma Hossain
 
Cyber crime in pakistan by zubair
Cyber crime in pakistan by zubairCyber crime in pakistan by zubair
Cyber crime in pakistan by zubairMuhammad Zubair
 
Social network and digital security
Social network and digital securitySocial network and digital security
Social network and digital securityMohammadBanjar
 
Information Privacy
Information PrivacyInformation Privacy
Information Privacyimehreenx
 
Information security / Cyber Security ppt
Information security / Cyber Security pptInformation security / Cyber Security ppt
Information security / Cyber Security pptGryffin EJ
 
The TeenSafe Parenting Guide to Tech Safety
The TeenSafe Parenting Guide to Tech SafetyThe TeenSafe Parenting Guide to Tech Safety
The TeenSafe Parenting Guide to Tech SafetyTeenSafe
 
Basics of Cyber Security
Basics of Cyber SecurityBasics of Cyber Security
Basics of Cyber SecurityNikunj Thakkar
 
Threat analysis-perception
Threat analysis-perceptionThreat analysis-perception
Threat analysis-perceptionzaffar abbasi
 
Social Media for Learning #MELSIG keynote
Social Media for Learning #MELSIG keynoteSocial Media for Learning #MELSIG keynote
Social Media for Learning #MELSIG keynoteSue Beckingham
 
The Current ICS Threat Landscape
The Current ICS Threat LandscapeThe Current ICS Threat Landscape
The Current ICS Threat LandscapeDragos, Inc.
 
Deepweb and darkweb vinodkumar ancha
Deepweb and darkweb vinodkumar anchaDeepweb and darkweb vinodkumar ancha
Deepweb and darkweb vinodkumar anchavinod kumar
 
Cyber Security Introduction.pptx
Cyber Security Introduction.pptxCyber Security Introduction.pptx
Cyber Security Introduction.pptxANIKETKUMARSHARMA3
 
Cyber security for business
Cyber security for businessCyber security for business
Cyber security for businessDaniel Thomas
 

What's hot (20)

Chapter1 Cyber security Law & policy.pptx
Chapter1 Cyber security Law & policy.pptxChapter1 Cyber security Law & policy.pptx
Chapter1 Cyber security Law & policy.pptx
 
Cybercrime a growing threat of 21 st century !!!
Cybercrime a growing threat of 21 st  century !!!Cybercrime a growing threat of 21 st  century !!!
Cybercrime a growing threat of 21 st century !!!
 
Cyber crime in pakistan by zubair
Cyber crime in pakistan by zubairCyber crime in pakistan by zubair
Cyber crime in pakistan by zubair
 
Social network and digital security
Social network and digital securitySocial network and digital security
Social network and digital security
 
Netiquette do’s & don’ts
Netiquette do’s & don’tsNetiquette do’s & don’ts
Netiquette do’s & don’ts
 
Information Privacy
Information PrivacyInformation Privacy
Information Privacy
 
Information security / Cyber Security ppt
Information security / Cyber Security pptInformation security / Cyber Security ppt
Information security / Cyber Security ppt
 
Cybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacksCybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacks
 
The TeenSafe Parenting Guide to Tech Safety
The TeenSafe Parenting Guide to Tech SafetyThe TeenSafe Parenting Guide to Tech Safety
The TeenSafe Parenting Guide to Tech Safety
 
Basics of Cyber Security
Basics of Cyber SecurityBasics of Cyber Security
Basics of Cyber Security
 
Threat analysis-perception
Threat analysis-perceptionThreat analysis-perception
Threat analysis-perception
 
Data security
Data securityData security
Data security
 
Social Media for Learning #MELSIG keynote
Social Media for Learning #MELSIG keynoteSocial Media for Learning #MELSIG keynote
Social Media for Learning #MELSIG keynote
 
The Current ICS Threat Landscape
The Current ICS Threat LandscapeThe Current ICS Threat Landscape
The Current ICS Threat Landscape
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Deepweb and darkweb vinodkumar ancha
Deepweb and darkweb vinodkumar anchaDeepweb and darkweb vinodkumar ancha
Deepweb and darkweb vinodkumar ancha
 
Cyber Security Introduction.pptx
Cyber Security Introduction.pptxCyber Security Introduction.pptx
Cyber Security Introduction.pptx
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Information & Cyber Security Risk
Information & Cyber Security RiskInformation & Cyber Security Risk
Information & Cyber Security Risk
 
Cyber security for business
Cyber security for businessCyber security for business
Cyber security for business
 

Viewers also liked

Student organization president and vice president training
Student organization president and vice president trainingStudent organization president and vice president training
Student organization president and vice president trainingBelmontSELD
 
Pasquale & ulisses gramática da língua portuguesa - nova edição
Pasquale & ulisses   gramática da língua portuguesa - nova ediçãoPasquale & ulisses   gramática da língua portuguesa - nova edição
Pasquale & ulisses gramática da língua portuguesa - nova ediçãopardal' silva
 
O Urbanismo - de Françoise Choay
O Urbanismo - de Françoise ChoayO Urbanismo - de Françoise Choay
O Urbanismo - de Françoise ChoayAline Naue
 
الشروط والضوابط العامة للمشاركة في المؤتمر الطلابي السابع
الشروط والضوابط العامة للمشاركة في المؤتمر الطلابي السابعالشروط والضوابط العامة للمشاركة في المؤتمر الطلابي السابع
الشروط والضوابط العامة للمشاركة في المؤتمر الطلابي السابعnawal al-matary
 
Proactive Counterespionage as a Part of Business Continuity and Resiliency
Proactive Counterespionage as a Part of Business Continuity and ResiliencyProactive Counterespionage as a Part of Business Continuity and Resiliency
Proactive Counterespionage as a Part of Business Continuity and ResiliencyDr. Lydia Kostopoulos
 
Ecology of the Mind
Ecology of the MindEcology of the Mind
Ecology of the Mindpaulla86
 
Metric measurement conversions review
Metric measurement conversions reviewMetric measurement conversions review
Metric measurement conversions reviewAubrey14
 
Gym registration - 2014 Apps for Good Entry
Gym registration - 2014 Apps for Good EntryGym registration - 2014 Apps for Good Entry
Gym registration - 2014 Apps for Good Entryjackojgy
 

Viewers also liked (16)

Student organization president and vice president training
Student organization president and vice president trainingStudent organization president and vice president training
Student organization president and vice president training
 
กำเนิด
กำเนิดกำเนิด
กำเนิด
 
ฟิสิกส์พื้นฐาน
ฟิสิกส์พื้นฐานฟิสิกส์พื้นฐาน
ฟิสิกส์พื้นฐาน
 
Pasquale & ulisses gramática da língua portuguesa - nova edição
Pasquale & ulisses   gramática da língua portuguesa - nova ediçãoPasquale & ulisses   gramática da língua portuguesa - nova edição
Pasquale & ulisses gramática da língua portuguesa - nova edição
 
O Urbanismo - de Françoise Choay
O Urbanismo - de Françoise ChoayO Urbanismo - de Françoise Choay
O Urbanismo - de Françoise Choay
 
الشروط والضوابط العامة للمشاركة في المؤتمر الطلابي السابع
الشروط والضوابط العامة للمشاركة في المؤتمر الطلابي السابعالشروط والضوابط العامة للمشاركة في المؤتمر الطلابي السابع
الشروط والضوابط العامة للمشاركة في المؤتمر الطلابي السابع
 
A&a v2
A&a v2A&a v2
A&a v2
 
Lecture 9
Lecture 9Lecture 9
Lecture 9
 
สถิติอ้าง
สถิติอ้างสถิติอ้าง
สถิติอ้าง
 
Proactive Counterespionage as a Part of Business Continuity and Resiliency
Proactive Counterespionage as a Part of Business Continuity and ResiliencyProactive Counterespionage as a Part of Business Continuity and Resiliency
Proactive Counterespionage as a Part of Business Continuity and Resiliency
 
Ecology of the Mind
Ecology of the MindEcology of the Mind
Ecology of the Mind
 
Presentation1
Presentation1Presentation1
Presentation1
 
Presentation1
Presentation1Presentation1
Presentation1
 
Metric measurement conversions review
Metric measurement conversions reviewMetric measurement conversions review
Metric measurement conversions review
 
Gym registration - 2014 Apps for Good Entry
Gym registration - 2014 Apps for Good EntryGym registration - 2014 Apps for Good Entry
Gym registration - 2014 Apps for Good Entry
 
สารเคมีในเกษตรกรรมและอุตสาหกรรม
สารเคมีในเกษตรกรรมและอุตสาหกรรมสารเคมีในเกษตรกรรมและอุตสาหกรรม
สารเคมีในเกษตรกรรมและอุตสาหกรรม
 

Similar to OSAC: Personal Digital Security Presentation

How Much Do You Trust Email?
How Much Do You Trust Email?How Much Do You Trust Email?
How Much Do You Trust Email?Echoworx
 
ISMS Awareness Training (2) (1).pptx
ISMS Awareness Training (2) (1).pptxISMS Awareness Training (2) (1).pptx
ISMS Awareness Training (2) (1).pptxvasidharta
 
Internet Safety & Privacy
Internet Safety & PrivacyInternet Safety & Privacy
Internet Safety & PrivacyAlexine Marier
 
Protecting Client Data 11.09.11
Protecting Client Data 11.09.11Protecting Client Data 11.09.11
Protecting Client Data 11.09.11pdewitte
 
Information Security Awareness Training Open
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training OpenFred Beck MBA, CPA
 
Recommending information security measures
Recommending information security measuresRecommending information security measures
Recommending information security measuresManish Singh
 
Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things The Center for Identity
 
Roadshow2013 revised 2 - miis
Roadshow2013 revised 2 - miisRoadshow2013 revised 2 - miis
Roadshow2013 revised 2 - miismcgilla
 
protecting your digital personal life
protecting your digital personal lifeprotecting your digital personal life
protecting your digital personal lifeNathan Lesser
 
TheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxTheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxKevinRiley83
 
Unveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity postureUnveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity postureLourdes Paloma Gimenez
 
Cybersecurity - Webinar Session
Cybersecurity - Webinar SessionCybersecurity - Webinar Session
Cybersecurity - Webinar SessionKalilur Rahman
 
Ethics and safety measures in computing.pptx
Ethics and safety measures in computing.pptxEthics and safety measures in computing.pptx
Ethics and safety measures in computing.pptxAarush59
 
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnovProtecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnovEric Vanderburg
 

Similar to OSAC: Personal Digital Security Presentation (20)

Data Privacy
Data PrivacyData Privacy
Data Privacy
 
How Much Do You Trust Email?
How Much Do You Trust Email?How Much Do You Trust Email?
How Much Do You Trust Email?
 
Security Awareness Presentation Fall 2013
Security Awareness Presentation Fall 2013Security Awareness Presentation Fall 2013
Security Awareness Presentation Fall 2013
 
ISMS Awareness Training (2) (1).pptx
ISMS Awareness Training (2) (1).pptxISMS Awareness Training (2) (1).pptx
ISMS Awareness Training (2) (1).pptx
 
Personal Threat Models
Personal Threat ModelsPersonal Threat Models
Personal Threat Models
 
Internet Safety & Privacy
Internet Safety & PrivacyInternet Safety & Privacy
Internet Safety & Privacy
 
Protecting Client Data 11.09.11
Protecting Client Data 11.09.11Protecting Client Data 11.09.11
Protecting Client Data 11.09.11
 
Information Security Awareness Training Open
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training Open
 
Recommending information security measures
Recommending information security measuresRecommending information security measures
Recommending information security measures
 
Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things
 
Cybersecurity and data privacy
Cybersecurity and data privacyCybersecurity and data privacy
Cybersecurity and data privacy
 
Roadshow2013 revised 2 - miis
Roadshow2013 revised 2 - miisRoadshow2013 revised 2 - miis
Roadshow2013 revised 2 - miis
 
protecting your digital personal life
protecting your digital personal lifeprotecting your digital personal life
protecting your digital personal life
 
TheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxTheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptx
 
Unveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity postureUnveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity posture
 
Idenity Theft
Idenity TheftIdenity Theft
Idenity Theft
 
Cybersecurity - Webinar Session
Cybersecurity - Webinar SessionCybersecurity - Webinar Session
Cybersecurity - Webinar Session
 
Ethics and safety measures in computing.pptx
Ethics and safety measures in computing.pptxEthics and safety measures in computing.pptx
Ethics and safety measures in computing.pptx
 
E commerce
E commerce E commerce
E commerce
 
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnovProtecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
 

More from Dr. Lydia Kostopoulos

Versatility at the Tip of the Spear: Food Security and the Utility of SOF
Versatility at the  Tip of the Spear:  Food Security and  the Utility of SOFVersatility at the  Tip of the Spear:  Food Security and  the Utility of SOF
Versatility at the Tip of the Spear: Food Security and the Utility of SOFDr. Lydia Kostopoulos
 
The Corporate Social Responsibility of Artificial Intelligence
The Corporate Social Responsibility  of Artificial IntelligenceThe Corporate Social Responsibility  of Artificial Intelligence
The Corporate Social Responsibility of Artificial IntelligenceDr. Lydia Kostopoulos
 
The Longevity Dividend: What advancements in longevity science mean for indiv...
The Longevity Dividend: What advancements in longevity science mean for indiv...The Longevity Dividend: What advancements in longevity science mean for indiv...
The Longevity Dividend: What advancements in longevity science mean for indiv...Dr. Lydia Kostopoulos
 
Concept: Metaverse Center for Women's Human Performance, Healthy Aging and Lo...
Concept: Metaverse Center for Women's Human Performance, Healthy Aging and Lo...Concept: Metaverse Center for Women's Human Performance, Healthy Aging and Lo...
Concept: Metaverse Center for Women's Human Performance, Healthy Aging and Lo...Dr. Lydia Kostopoulos
 
Imagination Performance: Thinking Beyond GPT
Imagination Performance: Thinking Beyond GPT Imagination Performance: Thinking Beyond GPT
Imagination Performance: Thinking Beyond GPT Dr. Lydia Kostopoulos
 
Decoupling Human Characteristics from Algorithmic Capabilities
Decoupling Human Characteristics from Algorithmic CapabilitiesDecoupling Human Characteristics from Algorithmic Capabilities
Decoupling Human Characteristics from Algorithmic CapabilitiesDr. Lydia Kostopoulos
 
Micro Journaling - Intermediate Cycle Tracker
Micro Journaling - Intermediate Cycle TrackerMicro Journaling - Intermediate Cycle Tracker
Micro Journaling - Intermediate Cycle TrackerDr. Lydia Kostopoulos
 
Decoupling Human Characteristics from Algorithmic Capabilities
Decoupling Human Characteristics from Algorithmic CapabilitiesDecoupling Human Characteristics from Algorithmic Capabilities
Decoupling Human Characteristics from Algorithmic CapabilitiesDr. Lydia Kostopoulos
 
Strategic Foresight: Sense-making in an Era of Rapid Change
Strategic Foresight: Sense-making in an Era of Rapid ChangeStrategic Foresight: Sense-making in an Era of Rapid Change
Strategic Foresight: Sense-making in an Era of Rapid ChangeDr. Lydia Kostopoulos
 
Technological Surrogacy & Predictive Powers
Technological Surrogacy & Predictive PowersTechnological Surrogacy & Predictive Powers
Technological Surrogacy & Predictive PowersDr. Lydia Kostopoulos
 
Humans over Hardware: Posturing SOF for the Future
Humans over Hardware:  Posturing SOF for the FutureHumans over Hardware:  Posturing SOF for the Future
Humans over Hardware: Posturing SOF for the FutureDr. Lydia Kostopoulos
 
The Mindset to Thrive in Uncertain, Turbulent & Exponential Times
The Mindset to Thrive in Uncertain, Turbulent & Exponential TimesThe Mindset to Thrive in Uncertain, Turbulent & Exponential Times
The Mindset to Thrive in Uncertain, Turbulent & Exponential TimesDr. Lydia Kostopoulos
 
Leadx: Public-Private Partnership Exercise Handout
Leadx: Public-Private Partnership Exercise HandoutLeadx: Public-Private Partnership Exercise Handout
Leadx: Public-Private Partnership Exercise HandoutDr. Lydia Kostopoulos
 
Due Diligence Considerations for Scientists, Commanders, and Politicians As T...
Due Diligence Considerations for Scientists, Commanders, and Politicians As T...Due Diligence Considerations for Scientists, Commanders, and Politicians As T...
Due Diligence Considerations for Scientists, Commanders, and Politicians As T...Dr. Lydia Kostopoulos
 
Part IV: Workwear Fashion, Human Anatomy, Transparency & Technology
Part IV: Workwear Fashion, Human Anatomy, Transparency & TechnologyPart IV: Workwear Fashion, Human Anatomy, Transparency & Technology
Part IV: Workwear Fashion, Human Anatomy, Transparency & TechnologyDr. Lydia Kostopoulos
 
Part III: Workwear Fashion, Human Anatomy, Transparency & Technology
Part III: Workwear Fashion, Human Anatomy, Transparency & TechnologyPart III: Workwear Fashion, Human Anatomy, Transparency & Technology
Part III: Workwear Fashion, Human Anatomy, Transparency & TechnologyDr. Lydia Kostopoulos
 
Part II: Workwear Fashion, Human Anatomy, Transparency & Technology
Part II: Workwear Fashion, Human Anatomy, Transparency & TechnologyPart II: Workwear Fashion, Human Anatomy, Transparency & Technology
Part II: Workwear Fashion, Human Anatomy, Transparency & TechnologyDr. Lydia Kostopoulos
 
Part I: Workwear Fashion, Human Anatomy, Transparency & Technology
Part I: Workwear Fashion, Human Anatomy, Transparency & TechnologyPart I: Workwear Fashion, Human Anatomy, Transparency & Technology
Part I: Workwear Fashion, Human Anatomy, Transparency & TechnologyDr. Lydia Kostopoulos
 
#ArtAboutAI - The First Pieces [Digital Exhibit]
#ArtAboutAI - The First Pieces [Digital Exhibit]#ArtAboutAI - The First Pieces [Digital Exhibit]
#ArtAboutAI - The First Pieces [Digital Exhibit]Dr. Lydia Kostopoulos
 

More from Dr. Lydia Kostopoulos (20)

Versatility at the Tip of the Spear: Food Security and the Utility of SOF
Versatility at the  Tip of the Spear:  Food Security and  the Utility of SOFVersatility at the  Tip of the Spear:  Food Security and  the Utility of SOF
Versatility at the Tip of the Spear: Food Security and the Utility of SOF
 
The Corporate Social Responsibility of Artificial Intelligence
The Corporate Social Responsibility  of Artificial IntelligenceThe Corporate Social Responsibility  of Artificial Intelligence
The Corporate Social Responsibility of Artificial Intelligence
 
The Longevity Dividend: What advancements in longevity science mean for indiv...
The Longevity Dividend: What advancements in longevity science mean for indiv...The Longevity Dividend: What advancements in longevity science mean for indiv...
The Longevity Dividend: What advancements in longevity science mean for indiv...
 
Letter from the Frontline in 2050
Letter from the Frontline in 2050Letter from the Frontline in 2050
Letter from the Frontline in 2050
 
Concept: Metaverse Center for Women's Human Performance, Healthy Aging and Lo...
Concept: Metaverse Center for Women's Human Performance, Healthy Aging and Lo...Concept: Metaverse Center for Women's Human Performance, Healthy Aging and Lo...
Concept: Metaverse Center for Women's Human Performance, Healthy Aging and Lo...
 
Imagination Performance: Thinking Beyond GPT
Imagination Performance: Thinking Beyond GPT Imagination Performance: Thinking Beyond GPT
Imagination Performance: Thinking Beyond GPT
 
Decoupling Human Characteristics from Algorithmic Capabilities
Decoupling Human Characteristics from Algorithmic CapabilitiesDecoupling Human Characteristics from Algorithmic Capabilities
Decoupling Human Characteristics from Algorithmic Capabilities
 
Micro Journaling - Intermediate Cycle Tracker
Micro Journaling - Intermediate Cycle TrackerMicro Journaling - Intermediate Cycle Tracker
Micro Journaling - Intermediate Cycle Tracker
 
Decoupling Human Characteristics from Algorithmic Capabilities
Decoupling Human Characteristics from Algorithmic CapabilitiesDecoupling Human Characteristics from Algorithmic Capabilities
Decoupling Human Characteristics from Algorithmic Capabilities
 
Strategic Foresight: Sense-making in an Era of Rapid Change
Strategic Foresight: Sense-making in an Era of Rapid ChangeStrategic Foresight: Sense-making in an Era of Rapid Change
Strategic Foresight: Sense-making in an Era of Rapid Change
 
Technological Surrogacy & Predictive Powers
Technological Surrogacy & Predictive PowersTechnological Surrogacy & Predictive Powers
Technological Surrogacy & Predictive Powers
 
Humans over Hardware: Posturing SOF for the Future
Humans over Hardware:  Posturing SOF for the FutureHumans over Hardware:  Posturing SOF for the Future
Humans over Hardware: Posturing SOF for the Future
 
The Mindset to Thrive in Uncertain, Turbulent & Exponential Times
The Mindset to Thrive in Uncertain, Turbulent & Exponential TimesThe Mindset to Thrive in Uncertain, Turbulent & Exponential Times
The Mindset to Thrive in Uncertain, Turbulent & Exponential Times
 
Leadx: Public-Private Partnership Exercise Handout
Leadx: Public-Private Partnership Exercise HandoutLeadx: Public-Private Partnership Exercise Handout
Leadx: Public-Private Partnership Exercise Handout
 
Due Diligence Considerations for Scientists, Commanders, and Politicians As T...
Due Diligence Considerations for Scientists, Commanders, and Politicians As T...Due Diligence Considerations for Scientists, Commanders, and Politicians As T...
Due Diligence Considerations for Scientists, Commanders, and Politicians As T...
 
Part IV: Workwear Fashion, Human Anatomy, Transparency & Technology
Part IV: Workwear Fashion, Human Anatomy, Transparency & TechnologyPart IV: Workwear Fashion, Human Anatomy, Transparency & Technology
Part IV: Workwear Fashion, Human Anatomy, Transparency & Technology
 
Part III: Workwear Fashion, Human Anatomy, Transparency & Technology
Part III: Workwear Fashion, Human Anatomy, Transparency & TechnologyPart III: Workwear Fashion, Human Anatomy, Transparency & Technology
Part III: Workwear Fashion, Human Anatomy, Transparency & Technology
 
Part II: Workwear Fashion, Human Anatomy, Transparency & Technology
Part II: Workwear Fashion, Human Anatomy, Transparency & TechnologyPart II: Workwear Fashion, Human Anatomy, Transparency & Technology
Part II: Workwear Fashion, Human Anatomy, Transparency & Technology
 
Part I: Workwear Fashion, Human Anatomy, Transparency & Technology
Part I: Workwear Fashion, Human Anatomy, Transparency & TechnologyPart I: Workwear Fashion, Human Anatomy, Transparency & Technology
Part I: Workwear Fashion, Human Anatomy, Transparency & Technology
 
#ArtAboutAI - The First Pieces [Digital Exhibit]
#ArtAboutAI - The First Pieces [Digital Exhibit]#ArtAboutAI - The First Pieces [Digital Exhibit]
#ArtAboutAI - The First Pieces [Digital Exhibit]
 

Recently uploaded

mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 

Recently uploaded (20)

mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 

OSAC: Personal Digital Security Presentation

  • 1. Personal Digital Security Implications for the home and the office Sponsored by Lydia Kostopoulos, PhD @LKCYBER June 4, 2015
  • 2. Personal Digital Security What it entails. What it means for you: • As an individual • As an employee for your company What you can do about it
  • 3. Personal Digital Security • Protection of your identity, communications, accounts, assets and technology from malicious intruders. • Protection of personal tools: SIM cards, contactless credit cards, health and digital security devices, biometric data, IOTs, etc.
  • 4.
  • 5. • Read Terms of Service (ToS) and Privacy Policies before agreeing. • Update and patch software often. • Don’t share personal information unless absolutely necessary. • Don’t click on suspicious links and do not open email attachments from people you don’t know. • Be conscious of meta-data. • Read Terms of Service (ToS) and Privacy Policies before agreeing. • Pay attention to the site link at the top and make sure it is a secure connection. • Avoid being a phishing victim and pay attention to email headers to make sure they are legit. HOME Leakage awareness!
  • 7. • Read Terms of Service (ToS) and Privacy Policies before agreeing. • Update and patch software often. • Don’t share personal information unless absolutely necessary. • Don’t click on suspicious links and do not open email attachments from people you don’t know. • Be conscious of meta-data. • Read Terms of Service (ToS) and Privacy Policies before agreeing. • Pay attention to the site link at the top and make sure it is a secure connection. • Avoid being a phishing victim and pay attention to email headers to make sure they are legit. OFFICE Policies!
  • 9. Source: COMSEC Consulting: Information Security
  • 10. What measures have you taken to secure the following?
  • 11.
  • 12.
  • 13. Security is an evolving process. Keep an open mind to learning! Awareness is key. Stress Reduction Kit Bang Head Here Directions: 1. Place kit on FIRM surface. 2. Follow directions in circle of kit. 3. Repeat step 2 as necessary, or until unconscious. 4. If unconscious, cease stress reduction activity.
  • 14. “Digital equivalent of locking the front door to your home and not leaving your car keys in the ignition”. – Marc Goodman Avoid 85% of common digital threats.
  • 15. Government Cyber Security Evaluation Tool (self-assessment) FBI and Private Sector Partnership Association of persons who represent businesses, academic institutions, state and local law enforcement agencies, and others dedicated to sharing information and intelligence to prevent hostile acts against the U.S. • Meetings • Newsletters • Briefs https://ics-cert.us-cert.gov/Assessments https://www.infragard.org http://www.stopthinkconnect.org/ https://www.fcc.gov/cyberforsmallbiz • Cyber Security Tips for Small Businesses Guide Keeping Your Social Media Accounts Secure Defense Media Activity • Protective Measures • Checklist • Social Media Tips
  • 17. Private Sector https://www.social-engineer.com • Social Engineering • Physical Security • Information Security https://www.securingthehuman.org • Awareness Posters/Presentations • Newsletter • Security Awareness Guidance • Internet Security for Kids Newsletter on latest phishing trendshttps://www.knowbe4.com
  • 18. Non-Profit http://www.antiphishing.org/ • In association with CyLab at Carnegie Mellon • Education Initiative • Phishing landing page example • HTTPS Everywhere Add-On https://www.eff.org/https-everywhere https://www.staysafeonline.org/business-safe-online/ Resources for businesses • Risk Assessment • Threat monitoring strategies • Reporting cyber attacks • Implementing a cybersecurity plan • Protecting customers • Training employees • Training & Videos • Guides • Newsletters & Tips
  • 19. Everyone plays a role in corporate security.

Editor's Notes

  1. Image source: http://blockandnation.com/office/cms/wp-content/uploads/presentation.png
  2. Image source: https://ec.europa.eu/digital-agenda/sites/digital-agenda/files/cybersecurity.jpg
  3. Image source: http://deloitteblog.co.za.www102.cpt1.host-h.net/wp-content/uploads/2012/11/Cyber-Crime-Security.png http://utc.fsu.edu/images/memlog.png http://icons.iconarchive.com/icons/icons-land/vista-people/256/Office-Customer-Female-Dark-icon.png http://www2.psd100.com/ppp/2013/11/2801/Women-business-users-1128025128.png http://i.kinja-img.com/gawker-media/image/upload/s--bscpo9YZ--/c_fit,fl_progressive,q_80,w_320/187xkwy3ipvo4png.png https://securitycentric.com.au/images/articles/byod.png http://www.thearcnlc.org/images/WAI/ss-card.png http://www.trinitychristian.info/sites/default/files/calendar_icon.png http://shoppingdarbar.com/images/credit-card.png https://e2e.ti.com/cfs-file/__key/communityserver-blogs-components-weblogfiles/00-00-00-04-89/2248.Remote-home-control-shutterstock_5F00_143542750.jpg https://cdn1.iconfinder.com/data/icons/credit-card-icons/512/cards.png http://jerryching.no-ip.org/Software/Photo/Icon/Windows%207%20Blue%20Icons%20&%20Cursors/PNG/Folders/Documents.png http://icons.iconarchive.com/icons/visualpharm/finance/256/credit-card-icon.png http://images.sodahead.com/polls/002325777/5831125244_game_consoles_h_xlarge.png http://icons.iconarchive.com/icons/itzikgur/my-seven/512/Pictures-Canon-icon.png http://www.outsideline.co.uk/blog/wp-content/uploads/2012/10/newsletterOSL_13.101258.jpg
  4. Image source: http://i.dailymail.co.uk/i/pix/2013/03/29/article-2300976-18FD128D000005DC-500_634x631.jpg http://buttehumane.org/page/_files/dog_cat.png https://blogs.sans.org/securingthehuman/files/2011/06/STH-BinaryFamily1.png http://gallery.yopriceville.com/var/albums/Free-Clipart-Pictures/Happy-Birthday-PNG/Happy_BirthdayCake_PNG_Clipart_Picture.png?m=1421925579
  5. Image source: http://www.computerexpressohio.com/images/Computer_Security.png http://atoztolet.com/images/privacypolicy.png http://www.computing.co.uk/IMG/830/208830/362-ca-03-phishing-emails-illo.jpg https://www.hallaminternet.com/assets/https.jpg https://cdn.tutsplus.com/psd/uploads/legacy/psdtutsarticles/roundup_2009_12_1/5.jpg
  6. Image source: http://www.proximex.com/sites/default/files/header_sol_corpsecurity.png http://cdn2.hubspot.net/hub/30658/file-25638968-jpg/images/corporate_security-resized-600.jpg https://newpagedigital.files.wordpress.com/2013/04/pdf-jpg-word-icons2.jpg http://www.verypdf.com/wordpress/wp-content/uploads/2014/04/image_thumb21.png
  7. Image source: http://www.computerexpressohio.com/images/Computer_Security.png http://atoztolet.com/images/privacypolicy.png http://www.computing.co.uk/IMG/830/208830/362-ca-03-phishing-emails-illo.jpg https://www.hallaminternet.com/assets/https.jpg http://policytool.net/images/privacy-policy-graphic.jpg
  8. Image source: http://cdn.socialh.com/wp-content/uploads/2013/03/data-leakage.jpg
  9. Source: http://blog.comsecglobal.com/2011/02/evolution-of-data-loss-prevention.html Image source: Image source: http://i.i.cbsi.com/cnwk.1d/i/tim2/2013/08/30/TrashIconX.png http://www.wpclipart.com/office/trash/paper_shredder.png http://totaltechnology.ae/totaltechnology/mob-site-total/services/icons_services/socialmedia.png https://billmullins.files.wordpress.com/2010/08/image11.png http://now.symassets.com/now/en/GB_SITE/pu/images/Non-Product/Misc/img_cyber_criminal_283x229.png
  10. Image source: http://corporateserver.cortado.com/portals/24/images/ProductTour/MDM/mc_controlpanel_circles.png
  11. Image source: http://res.cloudinary.com/hacksurfer/image/upload/v1399329154/wd9nwlfy9nekmgrtavkt.png
  12. Image source: http://3.bp.blogspot.com/-5-JrXm4uhTU/T4cd_4M14CI/AAAAAAAAAh0/3uIyohJ8Qns/s1600/9240672-a-metal-toggle-switch-with-plate-reading-open-mind-and-closed-mind-flipped-into-the-open-minded-posi.jpg https://badgeville.com/sites/default/files/styles/612x336_blog/public/blog/plants.jpg?itok=hfY1jId8 http://previewcf.turbosquid.com/Preview/2014/05/25__23_00_00/skelton_key2.pnga6f30a1e-9692-4e91-8ca9-2ad6e7da364eLarger.jpg
  13. http://www.futurecrimesbook.com/protect-yourself-the-update-protocol http://www.futurecrimesbook.com/wp-content/uploads/2015/02/futurecrimes_bookshot2.png
  14. DHS – CSET https://ics-cert.us-cert.gov/Assessments Infragard - https://www.infragard.org/ http://affiliate-101.com/wp-content/uploads/2015/04/free-resources-to-learn-affiliate-marketing.jpg DOD - http://www.defense.gov/documents/WEB_Guide_to_Keeping_Your_Social_Media_Accounts_Secure_2015.pdf Stop Think Connect: http://www.stopthinkconnect.org/ FCC https://www.fcc.gov/cyberforsmallbiz SANS – Secure the Human http://www.securingthehuman.org/ Social-Engineer.com Podcasts https://www.social-engineer.com/ http://www.social-engineer.org/category/podcast/ KnowBe4 - http://www.knowbe4.com http://www.knowbe4.com/cyberheist-news/ Image source: http://upload.wikimedia.org/wikipedia/commons/thumb/8/8a/Seal_of_the_United_States_Department_of_Homeland_Security.svg/1027px-Seal_of_the_United_States_Department_of_Homeland_Security.svg.png http://www.fbi.gov/about-us/history/seal-motto/image/fbi_seal.jpg https://pbs.twimg.com/profile_images/148495155/infragard_seal-full.jpg https://ics-cert.us-cert.gov/sites/default/files/cset_banner_noVersion.png https://www.offensive-security.com/wp-content/uploads/2009/09/se400.jpg http://fhmin.org/wp-content/uploads/sites/2/2013/11/podcast.jpg http://web.usca.edu/dotAsset/e60c99ae-fd76-4eb3-8315-66cef7affa31.gif http://www.plus91.in/wp-content/themes/twentytwelve/images/news.png http://thedailyjournalist.com/wp-content/uploads/2012/04/Infragard-1.jpg http://www.eci.com/blog/images/3-6-12%20tabletop%20meeting.jpg http://readysouthflorida.org/wp-content/uploads/2013/10/stop-think-connect.gif
  15. Poster From: http://www.stopthinkconnect.org/resources/f
  16. DHS – CSET https://ics-cert.us-cert.gov/Assessments Infragard - https://www.infragard.org/ http://affiliate-101.com/wp-content/uploads/2015/04/free-resources-to-learn-affiliate-marketing.jpg SANS – Secure the Human http://www.securingthehuman.org/ Social-Engineer.com Podcasts https://www.social-engineer.com/ http://www.social-engineer.org/category/podcast/ KnowBe4 - http://www.knowbe4.com http://www.knowbe4.com/cyberheist-news/ Image source: http://upload.wikimedia.org/wikipedia/commons/thumb/8/8a/Seal_of_the_United_States_Department_of_Homeland_Security.svg/1027px-Seal_of_the_United_States_Department_of_Homeland_Security.svg.png http://www.fbi.gov/about-us/history/seal-motto/image/fbi_seal.jpg https://pbs.twimg.com/profile_images/148495155/infragard_seal-full.jpg https://ics-cert.us-cert.gov/sites/default/files/cset_banner_noVersion.png https://www.offensive-security.com/wp-content/uploads/2009/09/se400.jpg http://fhmin.org/wp-content/uploads/sites/2/2013/11/podcast.jpg http://web.usca.edu/dotAsset/e60c99ae-fd76-4eb3-8315-66cef7affa31.gif http://webbiquity.com/wp-content/uploads/2011/02/Email-Icon.jpg
  17. Stay Safe Online https://www.staysafeonline.org/business-safe-online/ Center for Internet Security https://msisac.cisecurity.org/ https://msisac.cisecurity.org/resources/videos/free-training.cfm Anti-Phishing Working Group http://www.antiphishing.org/ http://education.apwg.org/safety-messaging-convention/ https://www.eff.org/https-everywhere Image source: http://docs.apwg.org/images/logo.gif http://siliconangle.com/files/2011/06/electronicfrontierfoundation.png http://www.paritynews.com/wp-content/uploads/2013/08/https-everywhere.jpg
  18. Image source: http://eccitsolutions.com/wp-content/uploads/2013/01/computer-network-security.png
  19. https://blog.cyveillance.com/wp-content/uploads/2011/02/batman-robin-fourwhere-agent-x-comic.jpg http://3.bp.blogspot.com/-93eMF7KJDVE/UtgH01MGiRI/AAAAAAAAA_o/6quKMAvTzAs/s1600/140116-questions.jpg