Securing the Workforce
-
Upload
barry-condrey -
Category
Technology
-
view
170 -
download
0
Transcript of Securing the Workforce
![Page 1: Securing the Workforce](https://reader033.fdocuments.us/reader033/viewer/2022052705/58f0fb0a1a28ab5a2c8b45f9/html5/thumbnails/1.jpg)
Our Cyber WorkforceApril 7th, 2016 Barry Condrey
CIO / Chesterfield County, VA
Securing The Commonwealth
“A chain is no stronger than its weakest link,
and life is after all a chain.”
William James 1842 – 1910
![Page 2: Securing the Workforce](https://reader033.fdocuments.us/reader033/viewer/2022052705/58f0fb0a1a28ab5a2c8b45f9/html5/thumbnails/2.jpg)
78%Technology
Dependence
Asset & Data Modernization
Needs
Funding Stewardship Managing cost of services to the approved budget Industry trends for cloud tech & funding models
New Technology Dynamic Technology - not just a force multiplier any longer A critical part of every aspect of government service Tipping point reached!
THEN: Technology enabled NOW: Technology dependent
Data, Data and more Data Data everywhere & transformation to information Demand for BI & analytics continues to grow Security & integrity of the data presents challenges
Sources: http://www.gartner.com/webinar/2813518IST Customer Service Survey 2015
Funding Model Shift
![Page 3: Securing the Workforce](https://reader033.fdocuments.us/reader033/viewer/2022052705/58f0fb0a1a28ab5a2c8b45f9/html5/thumbnails/3.jpg)
Cyber Security2. Hire and Retain Competent IT Personnel3. Mobility / Mobile Applications4. Open Government/ Transparency/ Open Data5. Disaster Recovery/ Continuity of Operations6. Budget and Cost Control7. Virtualization: Server, Desktop, Storage, Applications8. Shared Services9. Portal/ E-government10. Cloud Computing
Source: Survey of counties by Center for Digital Government, partnering with NACo. July, 2015
![Page 4: Securing the Workforce](https://reader033.fdocuments.us/reader033/viewer/2022052705/58f0fb0a1a28ab5a2c8b45f9/html5/thumbnails/4.jpg)
CISO / ISO
Audit
AdminRisk
Policy
USER95%
What percent of information security incidents involve human
error? DATA
![Page 5: Securing the Workforce](https://reader033.fdocuments.us/reader033/viewer/2022052705/58f0fb0a1a28ab5a2c8b45f9/html5/thumbnails/5.jpg)
A Local Hero: “I’d pin a medal on the guy”
Lives 400 meters from the police station.
1 Million Infections & $100 Million in Losses. Understated.
$3M Reward Offered.
Game Over Zeus Trojan – Botnets
Vector: Drive-bys, downloads, phishing schemes.
![Page 6: Securing the Workforce](https://reader033.fdocuments.us/reader033/viewer/2022052705/58f0fb0a1a28ab5a2c8b45f9/html5/thumbnails/6.jpg)
Vending Machines
Fleet Heavy
Equipment
Propane School Buses
Body Worn Cameras
LifesizedTelehealth
Seen the Internet lately? It’s EVERYWHERE
![Page 7: Securing the Workforce](https://reader033.fdocuments.us/reader033/viewer/2022052705/58f0fb0a1a28ab5a2c8b45f9/html5/thumbnails/7.jpg)
“If you think technology can solve your security problems, then you don’t understand the problems and you don’t understand the
technology.”– Bruce Schneier
![Page 8: Securing the Workforce](https://reader033.fdocuments.us/reader033/viewer/2022052705/58f0fb0a1a28ab5a2c8b45f9/html5/thumbnails/8.jpg)
Culture Change Requires Constant Reinforcement!!
Department Meetings
Employee Reviews
New Hire Orientation
Poster Campaigns
Newsletters
Training Plans
Budget BriefingsDon’t scare them, equip
them.
Think about all the
employee touchpoints.
![Page 9: Securing the Workforce](https://reader033.fdocuments.us/reader033/viewer/2022052705/58f0fb0a1a28ab5a2c8b45f9/html5/thumbnails/9.jpg)
![Page 10: Securing the Workforce](https://reader033.fdocuments.us/reader033/viewer/2022052705/58f0fb0a1a28ab5a2c8b45f9/html5/thumbnails/10.jpg)
Mandatory!
![Page 11: Securing the Workforce](https://reader033.fdocuments.us/reader033/viewer/2022052705/58f0fb0a1a28ab5a2c8b45f9/html5/thumbnails/11.jpg)
“Rule #6 - Where you sit determines what you see”Lt. General Jefferson “Beak” Howell
“Because I said so”
“We can’t do
that”
“It’s in the
policy”
“NO”
“Fries with
that?”
“Audit makes
us do it”
“That’s not now its done
here”
![Page 12: Securing the Workforce](https://reader033.fdocuments.us/reader033/viewer/2022052705/58f0fb0a1a28ab5a2c8b45f9/html5/thumbnails/12.jpg)
You
“One of the secrets of life is to keep our intellectual curiosity acute.” - William Lyon Phelps
![Page 13: Securing the Workforce](https://reader033.fdocuments.us/reader033/viewer/2022052705/58f0fb0a1a28ab5a2c8b45f9/html5/thumbnails/13.jpg)
What You Protect Against
What Users Can Cost You
![Page 14: Securing the Workforce](https://reader033.fdocuments.us/reader033/viewer/2022052705/58f0fb0a1a28ab5a2c8b45f9/html5/thumbnails/14.jpg)
http://www.securityweek.com/gameover-zeus-gang-leader-engaged-espionage-researchers
https://www.fbi.gov/wanted/cyber/
https://www.govloop.com/community/blog/the-weakest-link-what-to-do-about-them/
http://cio-musings.blogspot.com/
http://Cio-musings.blogspot.com