Logging Antivirus Examples Use recent examples from media of such attacks (RSA, Epsilon, Oak Ridge...
-
Upload
jodie-york -
Category
Documents
-
view
214 -
download
0
Transcript of Logging Antivirus Examples Use recent examples from media of such attacks (RSA, Epsilon, Oak Ridge...
![Page 1: Logging Antivirus Examples Use recent examples from media of such attacks (RSA, Epsilon, Oak Ridge National Labs, HBGary). Articles in business magazines.](https://reader035.fdocuments.us/reader035/viewer/2022081516/56649eb75503460f94bc1066/html5/thumbnails/1.jpg)
SECURING OUR EMPLOYEES
![Page 2: Logging Antivirus Examples Use recent examples from media of such attacks (RSA, Epsilon, Oak Ridge National Labs, HBGary). Articles in business magazines.](https://reader035.fdocuments.us/reader035/viewer/2022081516/56649eb75503460f94bc1066/html5/thumbnails/2.jpg)
![Page 3: Logging Antivirus Examples Use recent examples from media of such attacks (RSA, Epsilon, Oak Ridge National Labs, HBGary). Articles in business magazines.](https://reader035.fdocuments.us/reader035/viewer/2022081516/56649eb75503460f94bc1066/html5/thumbnails/3.jpg)
Firewalls
IDS SSL
Authentication
Logging
Antivirus
![Page 4: Logging Antivirus Examples Use recent examples from media of such attacks (RSA, Epsilon, Oak Ridge National Labs, HBGary). Articles in business magazines.](https://reader035.fdocuments.us/reader035/viewer/2022081516/56649eb75503460f94bc1066/html5/thumbnails/4.jpg)
Examples• Use recent examples from media of such
attacks (RSA, Epsilon, Oak Ridge National Labs, HBGary).
• Articles in business magazines (WSJ, Forbes)• Record incidents (www.privacyrights.org).• Recent human incidents in your organization.• Conduct a security awareness survey or
assessment.• Compare money invested in securing a
company computer versus company employee.
![Page 5: Logging Antivirus Examples Use recent examples from media of such attacks (RSA, Epsilon, Oak Ridge National Labs, HBGary). Articles in business magazines.](https://reader035.fdocuments.us/reader035/viewer/2022081516/56649eb75503460f94bc1066/html5/thumbnails/5.jpg)
Value to Organization1. Reduce risk (get examples of risk metrics
from www.securingthehuman.org/resources/planning).
2. Remain compliant (list any specific standards your organization must be compliant with).
3. Reduce costs (freeing up security resources to focus on more advanced threats)
4. Promotes secure brand that is serious about protecting our customers.
5. Train employees on our policies, processes and standards.
![Page 6: Logging Antivirus Examples Use recent examples from media of such attacks (RSA, Epsilon, Oak Ridge National Labs, HBGary). Articles in business magazines.](https://reader035.fdocuments.us/reader035/viewer/2022081516/56649eb75503460f94bc1066/html5/thumbnails/6.jpg)
Non-Existent
Compliance Focused
Promoting Awareness & Change
Long Term Sustainment
Metrics
Security Awareness Maturity Model
![Page 7: Logging Antivirus Examples Use recent examples from media of such attacks (RSA, Epsilon, Oak Ridge National Labs, HBGary). Articles in business magazines.](https://reader035.fdocuments.us/reader035/viewer/2022081516/56649eb75503460f94bc1066/html5/thumbnails/7.jpg)
Key Points on Awareness• Most awareness programs have had
little impact because they were never designed to.
• Awareness is another control.• Long term program – lifecycle.• Not just prevention – detection and
response.• Not just about clicking on links.
![Page 8: Logging Antivirus Examples Use recent examples from media of such attacks (RSA, Epsilon, Oak Ridge National Labs, HBGary). Articles in business magazines.](https://reader035.fdocuments.us/reader035/viewer/2022081516/56649eb75503460f94bc1066/html5/thumbnails/8.jpg)
What We Need• Senior management support,
including being part of communications.
• Business unit / department support to help coordinate organization wide deployment.
• Access to resources ( such as marketing, communications, human resources, etc.)
• Budget• Sign-off on program or planning of
program.
![Page 9: Logging Antivirus Examples Use recent examples from media of such attacks (RSA, Epsilon, Oak Ridge National Labs, HBGary). Articles in business magazines.](https://reader035.fdocuments.us/reader035/viewer/2022081516/56649eb75503460f94bc1066/html5/thumbnails/9.jpg)
Summary• Humans are another operating system
but to date very little has been done to secure them.
• We can dramatically reduce risk to our organization and remain compliant by implementing an active, longer term awareness program.