SlideShare a Scribd company logo
With respect to information security
Topics
 Introduction
 Is K-12 Doing What We Should?

 Protecting Private Data
 Preparing Kids Well
 You probably came to see something cool

 Let‟s Work Together
Introduction – Evan Francen
• Co-founder of FRSecure
• Information security expert with 20 years of experience
• Areas of expertise include information security
governance, risk management, social engineering,
compliance, and the things nobody else likes to do
• Information security evangelist
• Nickname is “the truth”
Introduction – About FRSecure
• Information Security is all we do…
• Methodologies; we create and use a ton of „em
• Project Leaders all have 15+ years of experience
• Transparent; we value knowledge transfer
• Product agnostic means we can more easily serve
your needs without conflict
Protecting Private Data
• Types of data that K-12 is responsible for
• Types of people using our technology
How are we doing?
Protecting Private Data
Since 2005, there have been 716 breaches of
educational institutions involving more than 13
million private records*
(Source: Privacy Rights Clearinghouse - https://www.privacyrights.org/databreach/new)

These are the breaches that we know about
Protecting Private Data
• People are the greatest risk
• We can‟t fix people with technology
How comfortable are you with the mundane?
(people want the new cool thing, but how “cool” is policy?)
Protecting Private Data – Three Things
Every school should do these three things well.
• Information security governance
• Information security training & awareness
• Information security incident response

How comfortable are you with the mundane?
Protecting Private Data – Three Things
Every school should do these three things well.
Information security governance – what are the rules?
• Management commitment
• Information security policies
• Information security processes

How comfortable are you with the mundane?
Protecting Private Data – Three Things
Every school should do these three things well.
Information security training & awareness – people need to know the rules
• Training & awareness are two separate, but related initiatives
• Training – teaching the audience how to do something specific
• Awareness – keeping a specific topic “top of mind”

How comfortable are you with the mundane?
Protecting Private Data – Three Things
Every school should do these three things well.
Information security incident response – what do you do if someone breaks
the rules or if the rules are ineffective?
• If you don‟t know of an incident, it doesn‟t mean that one hasn‟t happened
• Incident response should be a formalized, step-by-step process
• An incident doesn‟t mean a breach

How comfortable are you with the mundane?
Protecting Private Data – Three Things
Common deficiencies
Information security governance
• Everybody seems to think that information security is an IT issue
• If a school has policies, they are often ineffective and critical processes are
sometimes missed
• Compliance is not measured and/or enforced

How comfortable are you with the mundane?
Protecting Private Data – Three Things
Common deficiencies
Information security training & awareness
• There isn‟t a formal training & awareness program
• People assume that there‟s common sense
• Training is confused with awareness or vice versa

How comfortable are you with the mundane?
Preparing Kids Well
For a career in information security
We have a huge shortage of good information
security professionals, and the problem is only
expected to get worse.
Preparing Kids Well
For a career in information security
Preparing Kids Well
For a career in information security
• Is there an opportunity to teach the kids real-world
information security skills in the classroom?
• Is there an opportunity to teach the kids real-world
information security skills after school?
Preparing Kids Well
For life
• Are the kids taught about identity theft and how to
protect themselves?
• Are the kids taught about regulatory
compliance, policies, password management, etc.?
Preparing Kids Well
Opportunity
FRSecure is very willing and able to work with K-12 to help
• Can we develop courses for the students?
• Can we develop after school activities for students?

How about a “Hacking Club”?
You probably came to see something cool
Didn‟t you?
Pretty basic, but still pretty cool.
1. ARP poisoning for passwords
2. Bypassing Website filtering
You probably came to see something cool
ARP Poisoning
We use ARP poisoning to audit networks, the bad guys use it to steal
passwords.
Using Cain & Abel
Want step-by-step instructions? Give me your business card and I‟ll email
you.
You probably came to see something cool
Bypassing your Web filtering
Works (almost) all the time.
Using Tor
Want step-by-step instructions? Give me your business card
and I‟ll email you.
Let’s work together!
FRSecure exists to solve difficult information security challenges
with our clients & friends.
We don’t have to do business together in order to work together.
Two things:
1. Helping you secure your information
2. Helping equip students
Questions?
FRSecure
141 West Main Street
Waconia, MN 55387

Evan Francen – evan@frsecure.com

More Related Content

What's hot

ConnectSafely's One Good Thing presentation for InSafe Vilnius meeting 2014
ConnectSafely's One Good Thing presentation for InSafe Vilnius meeting 2014ConnectSafely's One Good Thing presentation for InSafe Vilnius meeting 2014
ConnectSafely's One Good Thing presentation for InSafe Vilnius meeting 2014
ConnectSafely
 
Innovation, agility, and a fight for survival a love storyv2
Innovation, agility, and a fight for survival a love storyv2Innovation, agility, and a fight for survival a love storyv2
Innovation, agility, and a fight for survival a love storyv2
Curtis A. Carver Jr.
 
C3 Presentation - Oct 2015
C3 Presentation - Oct 2015C3 Presentation - Oct 2015
C3 Presentation - Oct 2015
emilyensign
 
Ethics for IT Professionals
Ethics for IT ProfessionalsEthics for IT Professionals
Ethics for IT Professionals
Prof. Erwin Globio
 
Employee monitoring updated
Employee monitoring updatedEmployee monitoring updated
Employee monitoring updated
Advent IM Ltd
 
The HIghland Council E-Safety Approach
The HIghland Council E-Safety ApproachThe HIghland Council E-Safety Approach
The HIghland Council E-Safety Approach
Louise Jones
 
Any of these folks work with you?
Any of these folks work with you?Any of these folks work with you?
Any of these folks work with you?
Kevin O'Connor
 
The Hacking Team Hack: Lessons Learned for Enterprise Security
The Hacking Team Hack: Lessons Learned for Enterprise SecurityThe Hacking Team Hack: Lessons Learned for Enterprise Security
The Hacking Team Hack: Lessons Learned for Enterprise Security
Stephen Cobb
 
Intellectual Security, Learning for the learning industry from the Yahoo Cybe...
Intellectual Security, Learning for the learning industry from the Yahoo Cybe...Intellectual Security, Learning for the learning industry from the Yahoo Cybe...
Intellectual Security, Learning for the learning industry from the Yahoo Cybe...
Enhance Systems Pvt. Ltd.
 
BlueHat Seattle 2019 || Keynote
BlueHat Seattle 2019 || KeynoteBlueHat Seattle 2019 || Keynote
BlueHat Seattle 2019 || Keynote
BlueHat Security Conference
 
WANTED – People Committed to Solving our Information Security Language Problem
WANTED – People Committed to Solving our Information Security Language ProblemWANTED – People Committed to Solving our Information Security Language Problem
WANTED – People Committed to Solving our Information Security Language Problem
Evan Francen
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
bigblackschlong
 
eSafety Presentation
eSafety PresentationeSafety Presentation
eSafety Presentation
Mr_Elliott
 
Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525
chadolivard
 
Question 1
Question 1Question 1
Question 1
thamt5
 
Considerations for ICT in Learning
Considerations for ICT in Learning Considerations for ICT in Learning
Considerations for ICT in Learning
Louise Jones
 
Making the Most out of Social Media!
Making the Most out of Social Media!Making the Most out of Social Media!
Making the Most out of Social Media!
Louise Jones
 
Security and Wearables: Success starts with security
Security and Wearables: Success starts with securitySecurity and Wearables: Success starts with security
Security and Wearables: Success starts with security
Stephen Cobb
 
Big Challenges in Data Modeling: Ethical Data Modeling
Big Challenges in Data Modeling: Ethical Data ModelingBig Challenges in Data Modeling: Ethical Data Modeling
Big Challenges in Data Modeling: Ethical Data Modeling
DATAVERSITY
 
Digital citizenship presentation
Digital citizenship presentationDigital citizenship presentation
Digital citizenship presentation
Casey McDaniel
 

What's hot (20)

ConnectSafely's One Good Thing presentation for InSafe Vilnius meeting 2014
ConnectSafely's One Good Thing presentation for InSafe Vilnius meeting 2014ConnectSafely's One Good Thing presentation for InSafe Vilnius meeting 2014
ConnectSafely's One Good Thing presentation for InSafe Vilnius meeting 2014
 
Innovation, agility, and a fight for survival a love storyv2
Innovation, agility, and a fight for survival a love storyv2Innovation, agility, and a fight for survival a love storyv2
Innovation, agility, and a fight for survival a love storyv2
 
C3 Presentation - Oct 2015
C3 Presentation - Oct 2015C3 Presentation - Oct 2015
C3 Presentation - Oct 2015
 
Ethics for IT Professionals
Ethics for IT ProfessionalsEthics for IT Professionals
Ethics for IT Professionals
 
Employee monitoring updated
Employee monitoring updatedEmployee monitoring updated
Employee monitoring updated
 
The HIghland Council E-Safety Approach
The HIghland Council E-Safety ApproachThe HIghland Council E-Safety Approach
The HIghland Council E-Safety Approach
 
Any of these folks work with you?
Any of these folks work with you?Any of these folks work with you?
Any of these folks work with you?
 
The Hacking Team Hack: Lessons Learned for Enterprise Security
The Hacking Team Hack: Lessons Learned for Enterprise SecurityThe Hacking Team Hack: Lessons Learned for Enterprise Security
The Hacking Team Hack: Lessons Learned for Enterprise Security
 
Intellectual Security, Learning for the learning industry from the Yahoo Cybe...
Intellectual Security, Learning for the learning industry from the Yahoo Cybe...Intellectual Security, Learning for the learning industry from the Yahoo Cybe...
Intellectual Security, Learning for the learning industry from the Yahoo Cybe...
 
BlueHat Seattle 2019 || Keynote
BlueHat Seattle 2019 || KeynoteBlueHat Seattle 2019 || Keynote
BlueHat Seattle 2019 || Keynote
 
WANTED – People Committed to Solving our Information Security Language Problem
WANTED – People Committed to Solving our Information Security Language ProblemWANTED – People Committed to Solving our Information Security Language Problem
WANTED – People Committed to Solving our Information Security Language Problem
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
eSafety Presentation
eSafety PresentationeSafety Presentation
eSafety Presentation
 
Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525
 
Question 1
Question 1Question 1
Question 1
 
Considerations for ICT in Learning
Considerations for ICT in Learning Considerations for ICT in Learning
Considerations for ICT in Learning
 
Making the Most out of Social Media!
Making the Most out of Social Media!Making the Most out of Social Media!
Making the Most out of Social Media!
 
Security and Wearables: Success starts with security
Security and Wearables: Success starts with securitySecurity and Wearables: Success starts with security
Security and Wearables: Success starts with security
 
Big Challenges in Data Modeling: Ethical Data Modeling
Big Challenges in Data Modeling: Ethical Data ModelingBig Challenges in Data Modeling: Ethical Data Modeling
Big Challenges in Data Modeling: Ethical Data Modeling
 
Digital citizenship presentation
Digital citizenship presentationDigital citizenship presentation
Digital citizenship presentation
 

Viewers also liked

Diapositivas ruth 01 (1)
Diapositivas ruth 01 (1)Diapositivas ruth 01 (1)
Diapositivas ruth 01 (1)
Ruth Magaly Atanacio Romero
 
SENSUS INDUSTRI KREATIF DIGITAL KOTA MAKASSAR 2014
SENSUS INDUSTRI KREATIF DIGITAL KOTA MAKASSAR 2014SENSUS INDUSTRI KREATIF DIGITAL KOTA MAKASSAR 2014
SENSUS INDUSTRI KREATIF DIGITAL KOTA MAKASSAR 2014
Leanskill.com
 
Maneras de transferir conocimiento de forma digital
Maneras de transferir conocimiento de forma digitalManeras de transferir conocimiento de forma digital
Maneras de transferir conocimiento de forma digital
farfan93
 
Evolución del derecho colectivo
Evolución del derecho colectivoEvolución del derecho colectivo
Evolución del derecho colectivo
Marbelis Perez
 
Características de la Población de Quemados Adultos Hospitalizados
Características de la Población de Quemados Adultos Hospitalizados Características de la Población de Quemados Adultos Hospitalizados
Características de la Población de Quemados Adultos Hospitalizados
Dr. Cristóbal Longton
 
Documentación Proyecto # 62 Premios Eureka 2011 Mención Innovatividad Técnica
Documentación Proyecto # 62 Premios Eureka 2011 Mención Innovatividad TécnicaDocumentación Proyecto # 62 Premios Eureka 2011 Mención Innovatividad Técnica
Documentación Proyecto # 62 Premios Eureka 2011 Mención Innovatividad Técnica
Proyecto Red Eureka
 
Diseño instruccional
Diseño instruccionalDiseño instruccional
Diseño instruccional
psicdaniel13
 
Alemanha
AlemanhaAlemanha
5.guia amplificacion y reduccion
5.guia amplificacion y reduccion5.guia amplificacion y reduccion
5.guia amplificacion y reduccion
Claudia Paris Barriga
 
Desforramiento de extremidades inferiores en pediatría
Desforramiento de extremidades inferiores en pediatríaDesforramiento de extremidades inferiores en pediatría
Desforramiento de extremidades inferiores en pediatría
Sebastian Villegas
 
IPOs from the "Tech Bubble" ('99 - '00)
IPOs from the "Tech Bubble" ('99 - '00) IPOs from the "Tech Bubble" ('99 - '00)
IPOs from the "Tech Bubble" ('99 - '00)
Bill Tai
 
Colaboración en Revista médica del Maule
Colaboración en Revista médica del Maule  Colaboración en Revista médica del Maule
Colaboración en Revista médica del Maule
Dr. Cristóbal Longton
 
Microencapsulation presentation
Microencapsulation presentationMicroencapsulation presentation
Microencapsulation presentation
MSPalan
 
TECNOLOGÍA DE SELLADO DE VASOS
TECNOLOGÍA DE SELLADO DE VASOSTECNOLOGÍA DE SELLADO DE VASOS
TECNOLOGÍA DE SELLADO DE VASOS
Ivan Vojvodic Hernández
 
Kuliah 2 teori otak triune teori split brain dan multiple in
Kuliah 2 teori otak triune teori split brain dan multiple inKuliah 2 teori otak triune teori split brain dan multiple in
Kuliah 2 teori otak triune teori split brain dan multiple inZuzan Michael Japang
 
Introduction to Phase Change Materials #PSBPcomfort
Introduction to Phase Change Materials #PSBPcomfortIntroduction to Phase Change Materials #PSBPcomfort
Introduction to Phase Change Materials #PSBPcomfort
Su Butcher
 
Manejo de paciente quemado
Manejo de paciente quemadoManejo de paciente quemado
Manejo de paciente quemado
DorIta Bojórquez
 
La Evaluacion en el Aula
La Evaluacion en el AulaLa Evaluacion en el Aula
La Evaluacion en el Aula
Narda de la Garza
 
Electroplating
ElectroplatingElectroplating
Electroplating
Abhishek Sharma
 
STS Resume DEC 3
STS Resume DEC 3STS Resume DEC 3
STS Resume DEC 3
Sara Tempest
 

Viewers also liked (20)

Diapositivas ruth 01 (1)
Diapositivas ruth 01 (1)Diapositivas ruth 01 (1)
Diapositivas ruth 01 (1)
 
SENSUS INDUSTRI KREATIF DIGITAL KOTA MAKASSAR 2014
SENSUS INDUSTRI KREATIF DIGITAL KOTA MAKASSAR 2014SENSUS INDUSTRI KREATIF DIGITAL KOTA MAKASSAR 2014
SENSUS INDUSTRI KREATIF DIGITAL KOTA MAKASSAR 2014
 
Maneras de transferir conocimiento de forma digital
Maneras de transferir conocimiento de forma digitalManeras de transferir conocimiento de forma digital
Maneras de transferir conocimiento de forma digital
 
Evolución del derecho colectivo
Evolución del derecho colectivoEvolución del derecho colectivo
Evolución del derecho colectivo
 
Características de la Población de Quemados Adultos Hospitalizados
Características de la Población de Quemados Adultos Hospitalizados Características de la Población de Quemados Adultos Hospitalizados
Características de la Población de Quemados Adultos Hospitalizados
 
Documentación Proyecto # 62 Premios Eureka 2011 Mención Innovatividad Técnica
Documentación Proyecto # 62 Premios Eureka 2011 Mención Innovatividad TécnicaDocumentación Proyecto # 62 Premios Eureka 2011 Mención Innovatividad Técnica
Documentación Proyecto # 62 Premios Eureka 2011 Mención Innovatividad Técnica
 
Diseño instruccional
Diseño instruccionalDiseño instruccional
Diseño instruccional
 
Alemanha
AlemanhaAlemanha
Alemanha
 
5.guia amplificacion y reduccion
5.guia amplificacion y reduccion5.guia amplificacion y reduccion
5.guia amplificacion y reduccion
 
Desforramiento de extremidades inferiores en pediatría
Desforramiento de extremidades inferiores en pediatríaDesforramiento de extremidades inferiores en pediatría
Desforramiento de extremidades inferiores en pediatría
 
IPOs from the "Tech Bubble" ('99 - '00)
IPOs from the "Tech Bubble" ('99 - '00) IPOs from the "Tech Bubble" ('99 - '00)
IPOs from the "Tech Bubble" ('99 - '00)
 
Colaboración en Revista médica del Maule
Colaboración en Revista médica del Maule  Colaboración en Revista médica del Maule
Colaboración en Revista médica del Maule
 
Microencapsulation presentation
Microencapsulation presentationMicroencapsulation presentation
Microencapsulation presentation
 
TECNOLOGÍA DE SELLADO DE VASOS
TECNOLOGÍA DE SELLADO DE VASOSTECNOLOGÍA DE SELLADO DE VASOS
TECNOLOGÍA DE SELLADO DE VASOS
 
Kuliah 2 teori otak triune teori split brain dan multiple in
Kuliah 2 teori otak triune teori split brain dan multiple inKuliah 2 teori otak triune teori split brain dan multiple in
Kuliah 2 teori otak triune teori split brain dan multiple in
 
Introduction to Phase Change Materials #PSBPcomfort
Introduction to Phase Change Materials #PSBPcomfortIntroduction to Phase Change Materials #PSBPcomfort
Introduction to Phase Change Materials #PSBPcomfort
 
Manejo de paciente quemado
Manejo de paciente quemadoManejo de paciente quemado
Manejo de paciente quemado
 
La Evaluacion en el Aula
La Evaluacion en el AulaLa Evaluacion en el Aula
La Evaluacion en el Aula
 
Electroplating
ElectroplatingElectroplating
Electroplating
 
STS Resume DEC 3
STS Resume DEC 3STS Resume DEC 3
STS Resume DEC 3
 

Similar to TIES 2013 Education Technology Conference

People are the biggest risk
People are the biggest riskPeople are the biggest risk
People are the biggest risk
Evan Francen
 
Common ethical issues
Common ethical issuesCommon ethical issues
Data Protection – How Not to Panic and Make it a Positive
Data Protection – How Not to Panic and Make it a PositiveData Protection – How Not to Panic and Make it a Positive
Data Protection – How Not to Panic and Make it a Positive
TargetX
 
Online safety Ofsted 2015
Online safety Ofsted 2015Online safety Ofsted 2015
Online safety Ofsted 2015
bellla33
 
Information Security & Manufacturing
Information Security & ManufacturingInformation Security & Manufacturing
Information Security & Manufacturing
Evan Francen
 
Internet privacy ethics and online security
Internet privacy ethics and online securityInternet privacy ethics and online security
Internet privacy ethics and online security
Paul Berryman
 
005. Ethics, Privacy and Security
005. Ethics, Privacy and Security005. Ethics, Privacy and Security
005. Ethics, Privacy and Security
Arianto Muditomo
 
Slide Deck - CISSP Mentor Program Class Session 1
Slide Deck - CISSP Mentor Program Class Session 1Slide Deck - CISSP Mentor Program Class Session 1
Slide Deck - CISSP Mentor Program Class Session 1
FRSecure
 
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptxTop_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
infosec train
 
Information Security is NOT an IT Issue
Information Security is NOT an IT IssueInformation Security is NOT an IT Issue
Information Security is NOT an IT Issue
Evan Francen
 
Assessing Your security
Assessing Your securityAssessing Your security
Esafety for Ofsted
Esafety for OfstedEsafety for Ofsted
Esafety for Ofsted
bellla33
 
In Class Learning Activity
In Class Learning ActivityIn Class Learning Activity
In Class Learning Activity
guest09fcd1
 
Internet Issues (How to Deal on Internet Security)
Internet Issues (How to Deal on Internet Security)Internet Issues (How to Deal on Internet Security)
Internet Issues (How to Deal on Internet Security)
Hannah Jane del Castillo
 
Banning Whining, Avoiding Cyber Wolves, and Creating Warrior
Banning Whining, Avoiding Cyber Wolves, and Creating WarriorBanning Whining, Avoiding Cyber Wolves, and Creating Warrior
Banning Whining, Avoiding Cyber Wolves, and Creating Warrior
Sandra (Sandy) Dunn
 
Managing Risk or Reacting to Compliance
Managing Risk or Reacting to ComplianceManaging Risk or Reacting to Compliance
Managing Risk or Reacting to Compliance
Evan Francen
 
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
mulingoh
 
Group1 Ppt
Group1 PptGroup1 Ppt
Group1 Ppt
jessica mellert
 
ISACA talk - cybersecurity and security culture
ISACA talk - cybersecurity and security cultureISACA talk - cybersecurity and security culture
ISACA talk - cybersecurity and security culture
Craig McGill
 
Online Safety
Online SafetyOnline Safety
Online Safety
JEcomputing
 

Similar to TIES 2013 Education Technology Conference (20)

People are the biggest risk
People are the biggest riskPeople are the biggest risk
People are the biggest risk
 
Common ethical issues
Common ethical issuesCommon ethical issues
Common ethical issues
 
Data Protection – How Not to Panic and Make it a Positive
Data Protection – How Not to Panic and Make it a PositiveData Protection – How Not to Panic and Make it a Positive
Data Protection – How Not to Panic and Make it a Positive
 
Online safety Ofsted 2015
Online safety Ofsted 2015Online safety Ofsted 2015
Online safety Ofsted 2015
 
Information Security & Manufacturing
Information Security & ManufacturingInformation Security & Manufacturing
Information Security & Manufacturing
 
Internet privacy ethics and online security
Internet privacy ethics and online securityInternet privacy ethics and online security
Internet privacy ethics and online security
 
005. Ethics, Privacy and Security
005. Ethics, Privacy and Security005. Ethics, Privacy and Security
005. Ethics, Privacy and Security
 
Slide Deck - CISSP Mentor Program Class Session 1
Slide Deck - CISSP Mentor Program Class Session 1Slide Deck - CISSP Mentor Program Class Session 1
Slide Deck - CISSP Mentor Program Class Session 1
 
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptxTop_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
 
Information Security is NOT an IT Issue
Information Security is NOT an IT IssueInformation Security is NOT an IT Issue
Information Security is NOT an IT Issue
 
Assessing Your security
Assessing Your securityAssessing Your security
Assessing Your security
 
Esafety for Ofsted
Esafety for OfstedEsafety for Ofsted
Esafety for Ofsted
 
In Class Learning Activity
In Class Learning ActivityIn Class Learning Activity
In Class Learning Activity
 
Internet Issues (How to Deal on Internet Security)
Internet Issues (How to Deal on Internet Security)Internet Issues (How to Deal on Internet Security)
Internet Issues (How to Deal on Internet Security)
 
Banning Whining, Avoiding Cyber Wolves, and Creating Warrior
Banning Whining, Avoiding Cyber Wolves, and Creating WarriorBanning Whining, Avoiding Cyber Wolves, and Creating Warrior
Banning Whining, Avoiding Cyber Wolves, and Creating Warrior
 
Managing Risk or Reacting to Compliance
Managing Risk or Reacting to ComplianceManaging Risk or Reacting to Compliance
Managing Risk or Reacting to Compliance
 
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
ET 509 Portfolio Assignment Internet Safety PPT Presentation for Staff Profes...
 
Group1 Ppt
Group1 PptGroup1 Ppt
Group1 Ppt
 
ISACA talk - cybersecurity and security culture
ISACA talk - cybersecurity and security cultureISACA talk - cybersecurity and security culture
ISACA talk - cybersecurity and security culture
 
Online Safety
Online SafetyOnline Safety
Online Safety
 

More from Evan Francen

WANTED - People Committed to Solving Our Information Security Language Problem
WANTED - People Committed to Solving Our Information Security Language ProblemWANTED - People Committed to Solving Our Information Security Language Problem
WANTED - People Committed to Solving Our Information Security Language Problem
Evan Francen
 
Keynote @ ISC2 Cyber Aware Dallas
Keynote @ ISC2 Cyber Aware DallasKeynote @ ISC2 Cyber Aware Dallas
Keynote @ ISC2 Cyber Aware Dallas
Evan Francen
 
Harrisburg BSides Presentation - 100219
Harrisburg BSides Presentation - 100219Harrisburg BSides Presentation - 100219
Harrisburg BSides Presentation - 100219
Evan Francen
 
Managing Third-Party Risk Effectively
Managing Third-Party Risk EffectivelyManaging Third-Party Risk Effectively
Managing Third-Party Risk Effectively
Evan Francen
 
Step Up Your Data Security Against Third-Party Risks
Step Up Your Data Security Against Third-Party RisksStep Up Your Data Security Against Third-Party Risks
Step Up Your Data Security Against Third-Party Risks
Evan Francen
 
Simple Training for Information Security and Payment Fraud
Simple Training for Information Security and Payment FraudSimple Training for Information Security and Payment Fraud
Simple Training for Information Security and Payment Fraud
Evan Francen
 
MHTA Social Engineering Presentation - 050917
MHTA Social Engineering Presentation - 050917MHTA Social Engineering Presentation - 050917
MHTA Social Engineering Presentation - 050917
Evan Francen
 
People. The Social Engineer's Dream - TechPulse 2017
People.  The Social Engineer's Dream - TechPulse 2017People.  The Social Engineer's Dream - TechPulse 2017
People. The Social Engineer's Dream - TechPulse 2017
Evan Francen
 
AFCOM - Information Security State of the Union
AFCOM - Information Security State of the UnionAFCOM - Information Security State of the Union
AFCOM - Information Security State of the Union
Evan Francen
 
Mobile Information Security
Mobile Information SecurityMobile Information Security
Mobile Information Security
Evan Francen
 
Information security challenges in today’s banking environment
Information security challenges in today’s banking environmentInformation security challenges in today’s banking environment
Information security challenges in today’s banking environment
Evan Francen
 
Information Security in a Compliance World
Information Security in a Compliance WorldInformation Security in a Compliance World
Information Security in a Compliance World
Evan Francen
 
Information Security For Leaders, By a Leader
Information Security For Leaders, By a LeaderInformation Security For Leaders, By a Leader
Information Security For Leaders, By a Leader
Evan Francen
 
FRSecure's Ten Security Principles to Live (or die) By
FRSecure's Ten Security Principles to Live (or die) ByFRSecure's Ten Security Principles to Live (or die) By
FRSecure's Ten Security Principles to Live (or die) By
Evan Francen
 
Meaningful Use and Security Risk Analysis
Meaningful Use and Security Risk AnalysisMeaningful Use and Security Risk Analysis
Meaningful Use and Security Risk Analysis
Evan Francen
 
An Introduction to Information Security
An Introduction to Information SecurityAn Introduction to Information Security
An Introduction to Information Security
Evan Francen
 
FRSecure Sales Deck
FRSecure Sales DeckFRSecure Sales Deck
FRSecure Sales Deck
Evan Francen
 

More from Evan Francen (17)

WANTED - People Committed to Solving Our Information Security Language Problem
WANTED - People Committed to Solving Our Information Security Language ProblemWANTED - People Committed to Solving Our Information Security Language Problem
WANTED - People Committed to Solving Our Information Security Language Problem
 
Keynote @ ISC2 Cyber Aware Dallas
Keynote @ ISC2 Cyber Aware DallasKeynote @ ISC2 Cyber Aware Dallas
Keynote @ ISC2 Cyber Aware Dallas
 
Harrisburg BSides Presentation - 100219
Harrisburg BSides Presentation - 100219Harrisburg BSides Presentation - 100219
Harrisburg BSides Presentation - 100219
 
Managing Third-Party Risk Effectively
Managing Third-Party Risk EffectivelyManaging Third-Party Risk Effectively
Managing Third-Party Risk Effectively
 
Step Up Your Data Security Against Third-Party Risks
Step Up Your Data Security Against Third-Party RisksStep Up Your Data Security Against Third-Party Risks
Step Up Your Data Security Against Third-Party Risks
 
Simple Training for Information Security and Payment Fraud
Simple Training for Information Security and Payment FraudSimple Training for Information Security and Payment Fraud
Simple Training for Information Security and Payment Fraud
 
MHTA Social Engineering Presentation - 050917
MHTA Social Engineering Presentation - 050917MHTA Social Engineering Presentation - 050917
MHTA Social Engineering Presentation - 050917
 
People. The Social Engineer's Dream - TechPulse 2017
People.  The Social Engineer's Dream - TechPulse 2017People.  The Social Engineer's Dream - TechPulse 2017
People. The Social Engineer's Dream - TechPulse 2017
 
AFCOM - Information Security State of the Union
AFCOM - Information Security State of the UnionAFCOM - Information Security State of the Union
AFCOM - Information Security State of the Union
 
Mobile Information Security
Mobile Information SecurityMobile Information Security
Mobile Information Security
 
Information security challenges in today’s banking environment
Information security challenges in today’s banking environmentInformation security challenges in today’s banking environment
Information security challenges in today’s banking environment
 
Information Security in a Compliance World
Information Security in a Compliance WorldInformation Security in a Compliance World
Information Security in a Compliance World
 
Information Security For Leaders, By a Leader
Information Security For Leaders, By a LeaderInformation Security For Leaders, By a Leader
Information Security For Leaders, By a Leader
 
FRSecure's Ten Security Principles to Live (or die) By
FRSecure's Ten Security Principles to Live (or die) ByFRSecure's Ten Security Principles to Live (or die) By
FRSecure's Ten Security Principles to Live (or die) By
 
Meaningful Use and Security Risk Analysis
Meaningful Use and Security Risk AnalysisMeaningful Use and Security Risk Analysis
Meaningful Use and Security Risk Analysis
 
An Introduction to Information Security
An Introduction to Information SecurityAn Introduction to Information Security
An Introduction to Information Security
 
FRSecure Sales Deck
FRSecure Sales DeckFRSecure Sales Deck
FRSecure Sales Deck
 

Recently uploaded

Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
Zilliz
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 

Recently uploaded (20)

Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 

TIES 2013 Education Technology Conference

  • 1. With respect to information security
  • 2. Topics  Introduction  Is K-12 Doing What We Should?  Protecting Private Data  Preparing Kids Well  You probably came to see something cool  Let‟s Work Together
  • 3. Introduction – Evan Francen • Co-founder of FRSecure • Information security expert with 20 years of experience • Areas of expertise include information security governance, risk management, social engineering, compliance, and the things nobody else likes to do • Information security evangelist • Nickname is “the truth”
  • 4. Introduction – About FRSecure • Information Security is all we do… • Methodologies; we create and use a ton of „em • Project Leaders all have 15+ years of experience • Transparent; we value knowledge transfer • Product agnostic means we can more easily serve your needs without conflict
  • 5. Protecting Private Data • Types of data that K-12 is responsible for • Types of people using our technology How are we doing?
  • 7. Since 2005, there have been 716 breaches of educational institutions involving more than 13 million private records* (Source: Privacy Rights Clearinghouse - https://www.privacyrights.org/databreach/new) These are the breaches that we know about
  • 8. Protecting Private Data • People are the greatest risk • We can‟t fix people with technology How comfortable are you with the mundane? (people want the new cool thing, but how “cool” is policy?)
  • 9. Protecting Private Data – Three Things Every school should do these three things well. • Information security governance • Information security training & awareness • Information security incident response How comfortable are you with the mundane?
  • 10. Protecting Private Data – Three Things Every school should do these three things well. Information security governance – what are the rules? • Management commitment • Information security policies • Information security processes How comfortable are you with the mundane?
  • 11. Protecting Private Data – Three Things Every school should do these three things well. Information security training & awareness – people need to know the rules • Training & awareness are two separate, but related initiatives • Training – teaching the audience how to do something specific • Awareness – keeping a specific topic “top of mind” How comfortable are you with the mundane?
  • 12. Protecting Private Data – Three Things Every school should do these three things well. Information security incident response – what do you do if someone breaks the rules or if the rules are ineffective? • If you don‟t know of an incident, it doesn‟t mean that one hasn‟t happened • Incident response should be a formalized, step-by-step process • An incident doesn‟t mean a breach How comfortable are you with the mundane?
  • 13. Protecting Private Data – Three Things Common deficiencies Information security governance • Everybody seems to think that information security is an IT issue • If a school has policies, they are often ineffective and critical processes are sometimes missed • Compliance is not measured and/or enforced How comfortable are you with the mundane?
  • 14. Protecting Private Data – Three Things Common deficiencies Information security training & awareness • There isn‟t a formal training & awareness program • People assume that there‟s common sense • Training is confused with awareness or vice versa How comfortable are you with the mundane?
  • 15. Preparing Kids Well For a career in information security We have a huge shortage of good information security professionals, and the problem is only expected to get worse.
  • 16. Preparing Kids Well For a career in information security
  • 17. Preparing Kids Well For a career in information security • Is there an opportunity to teach the kids real-world information security skills in the classroom? • Is there an opportunity to teach the kids real-world information security skills after school?
  • 18. Preparing Kids Well For life • Are the kids taught about identity theft and how to protect themselves? • Are the kids taught about regulatory compliance, policies, password management, etc.?
  • 19. Preparing Kids Well Opportunity FRSecure is very willing and able to work with K-12 to help • Can we develop courses for the students? • Can we develop after school activities for students? How about a “Hacking Club”?
  • 20. You probably came to see something cool Didn‟t you? Pretty basic, but still pretty cool. 1. ARP poisoning for passwords 2. Bypassing Website filtering
  • 21. You probably came to see something cool ARP Poisoning We use ARP poisoning to audit networks, the bad guys use it to steal passwords. Using Cain & Abel Want step-by-step instructions? Give me your business card and I‟ll email you.
  • 22. You probably came to see something cool Bypassing your Web filtering Works (almost) all the time. Using Tor Want step-by-step instructions? Give me your business card and I‟ll email you.
  • 23. Let’s work together! FRSecure exists to solve difficult information security challenges with our clients & friends. We don’t have to do business together in order to work together. Two things: 1. Helping you secure your information 2. Helping equip students
  • 24. Questions? FRSecure 141 West Main Street Waconia, MN 55387 Evan Francen – evan@frsecure.com