we16 - cyber security - security is everyone's responsibility

Post on 08-Jan-2017

43 Views

Category:

Engineering

4 Downloads

Preview:

Click to see full reader

TRANSCRIPT

Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.

Cyber Security Security is Everyone’s Responsibility

Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.

The Who, Where and Why.

3Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.

But you still need to be aware of the internal threat.

Attackers are usually external to the victim’s organization.

4Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.

Nobody is immune.

Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement. 5

Attackers are typically after the money.

Financial

Espionage

80%

9%

6Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.

What happens next is determined by the attacker’s end game.

Many breaches share the same threat actions in the early stages of the attack.

Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.

Social Engineering – it’s not just for email

In 2015, Social Engineering was the #1 attack technique. People replaced exploits as attackers’ favorite way to beat Cybersecurity. Proof Point

Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.

Layered Defense

Perimeter

Network

Device

Application

Data

Prac

ticesPolicies

People

Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.

Building a Cyber Defensive Workforce

Safeguard

Passwords

Be Suspicio

usManage access

Design for

Resilience

Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.

Behaviors travel

Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.

Quick tips for everyone

Look our for links in unsolicited emailsPasswords – no sharing, and change them oftenSet passcode locks on your mobile devicesWatch what you share on social media Download software/apps only from safe sources

top related