PPT-Security Awareness
Author : marina-yarberry | Published Date : 2016-09-02
Protecting Sensitive Information Objectives 2 Whats so important Universities hold massive quantities of confidential data and are traditionally seen as easy targets
Presentation Embed Code
Download Presentation
Download Presentation The PPT/PDF document "Security Awareness" is the property of its rightful owner. Permission is granted to download and print the materials on this website for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.
Security Awareness: Transcript
Protecting Sensitive Information Objectives 2 Whats so important Universities hold massive quantities of confidential data and are traditionally seen as easy targets for data theft We must understand the types of data that we hold and related business processes . nbcamorg reast cancer is the second most common kind of cancer in women About 1 in 8 women born today in the United States will get breast cancer at some point The good news is that many women can survive breast cancer if its found and treated earl Cultural and Situational . Awareness. Current a/o 15 Aug 12. Chapter 8 in DCC Handbook. 2. Overview. Key Points. Cultural Awareness. Situational Awareness. Communication with Vendors (Elicitation, Espionage, and Subversion) . Tuning in………. Phonemic awareness. Awareness of individual sounds.. Phonics. Knowledge of letter-sound patterns; linking sounds with letter. . Orthographic knowledge. Patterns of letters used in written English to write words (graphemes), letter- cluster knowledge (diagraphs).. Carl. os A. Sánchez. 03/04/2008. Agenda. CONCEPTS. Historical Perspective . 40,000 B.C.. BABBLE - LOOPS . (IBM Social Computing Lab). Knowledge Management Application. Social Translucence . AWARE . Samantha Manke. Chief Knowledge Officer. SECURITY AWARENESS LESSONS LEARNED AS A TEENAGE GIRL. My father is an IT/Security guy. His intentions were good. But the draw of . Neopets. and Harry Potter was too great. Continuous Monitoring’. www.jackbe.com. John Crupi, CTO. Rick Smith, Cyber Consultant . About JackBe. Leading Solution Provider of Real-Time Operational Intelligence for Government Agencies & Enterprise Businesses. Chief Information Security Officer. Three C’s of . Security Awareness:. Culture, Change and Creativity. Culture . Change . Creativity. The Three C’s of Security. Culture, . change, . and . creativity are central to protecting an organization’s data and assets.. The Power of the OODA Loop. This is the Readers Digest Version. Situational Awareness. Awareness of self, others and surrounding. Lack of Situational Awareness (SA) is a National Epidemic. Many have traded virtual awareness for situational awareness. Stakes. Customers. expectations & . Maturity. Cost. . Reduction. Responsiveness. Flexibility. Quality. Implementation. of . processes. and . tools. Career. and . skills. management. Tools. Methodology. Christopher Sheppard. 10 Nov 2015. CHRIS. SHEPPARD. Apple Desktop Engineer. cshepp@fnal.gov. @cshepp11. 11/6/2015. Chris Sheppard | Mobile Device Security. 2. AGENDA. Best Practices and Recommendations. UNCLASSIFIED. Customizable DoD Command Brief. Insider Threat Awareness. DRAFT Command Brief – Insider Threat Awareness Training. UNCLASSIFIED. Your Name and Seal Here. Insider Threat Awareness. At the end of this . Security Awareness Training, Influence, and Personality Walk into a Bar… Karla Carter | @ rptrpn | karla.carter@bellevue.edu “Social engineering techniques rely on influencing the victim to do something that is against their best interest, but different influence techniques work better on different victims, because everyone has different personalities, strengths and weaknesses. Research has shown a correlation between the five-factor personality measure (“The Big 5”) and cybersecurity behaviors. While it’s impractical to set up personalized security awareness training programs for each individual, it’s possible to create a program that will speak to multiple types of personalities and the influence risks those imply. Come explore ways to help users resist social engineering by designing security awareness training programs that align employees’ risk of influence factors (authority, social proof, scarcity, consistency/commitment, likability, and reciprocation) with their Big 5 personality profiles.” Month Week One General Cybersecurity Awareness 5 Years of StopThinkConnectWebinar Recording and Evaluation SurveyThis webinar is being recorded and will be made available online to view lateroRecordin Advice for Individuals and Businesses. (based on training from the Digital Police Community Support Officer). Presentation Contents. Need for Cyber Security. Threats:. Hacking. Malware. Phishing. Stay Secure.
Download Document
Here is the link to download the presentation.
"Security Awareness"The content belongs to its owner. You may download and print it for personal use, without modification, and keep all copyright notices. By downloading, you agree to these terms.
Related Documents