Real Life Scenario An employee in the Finance and Business Operations receives a targeted phishing email. Follows e-mail instructions and infects his or.

Slides:



Advertisements
Similar presentations
Why Security? A Commitment for [the Agency’s] Executives [CIO’s name] EC Presentation [date]
Advertisements

AIDS Turning the Tide Together Child Safeguarding and HIV Corinne Davey, Keeping Children Safe UK Marcy Levy, John Snow, Inc. (JSI)/AIDSTAR-One.
Cyber Security Awareness Day October 17, Welcome Dr. Amanda Lee Vice President of Instructional Services.
SECURITY CHECK Protecting Your System and Yourself Source:
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Possible Threats To Data. Objectives To understand: Types of threats Importance of security Preventative and remedial actions Personal safety This will.
SECURITY AND SOCIAL ENGINEERING US Department of Commerce Office of Security Updated 09/26/11 Security is Everyone's Responsibility – See Something, Say.
UT Wing Civil Air Patrol. Objective Identify network and cyber vulnerabilities and mitigations Social Media/Metadata/Exfil data MITM Attacks Malware Social.
Software Security Threats Threats have been an issue since computers began to be used widely by the general public.
1 July 08, 2010 Information Security Officer Meeting.
 CSUE employees and volunteers are covered under CSU liability coverage against claims when acting within the scope of their employment/volunteer responsibilities.
The Difficult Road To Cybersecurity Steve Katz, CISSP Security Risk Solutions Steve Katz, CISSP Security.
Protecting Information. Who We Are We are working on our Information Assurance MBA This is part of our curriculum; to present on information security.
 Jonathan Trull, Deputy State Auditor, Colorado Office of the State Auditor  Travis Schack, Colorado’s Information Security Officer  Chris Ingram,
Lean and (Prepared for) Mean: Application Security Program Essentials Philip J. Beyer - Texas Education Agency John B. Dickson.
Phish your victims in 5 quick steps. Phish yourself today In less than 5 minutes What is Phish5? Phish5 is a Security Awareness service With Phish5, a.
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Fundamentals of Information Systems Security.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
 The purpose of this report is to inform people that the spyware and virus threat is growing and what people can do to stop the spread of spyware and.
Georgia Department of Human Services Division of Aging Services (DAS): Data Breach Presenter:Harold Johnson Acting General Counsel Presentation to: Board.
 Two types of malware propagating through social networks, Cross Site Scripting (XSS) and Koobface worm.  How these two types of malware are propagated.
1 August 18, 2010 Disaster Recovery Coordinators’ Meeting.
 Introduction to Computing  Computer Programming  Terrorisom.
Project Scenario # 3 Daniel Gomez. I am the Information Systems Security Manager at Western Technical College. A virus has penetrated the network firewall.
Training of Information Security for Common Users Dr. Francisco Eduardo Rivera FAA SALT Conference, February 18, 2004.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Hurdles in implementation of cyber security in India.
Computer Skills and Applications Computer Security.
What are they? What do they have to with me?. Introduction  You may not know exactly what it is, but chances are you have encountered one at some point.
IT Security CS5493(74293). IT Security Q: Why do you need security? A: To protect assets.
BTEC NAT Unit 15 - Organisational Systems Security ORGANISATIONAL SYSTEMS SECURITY Unit 15 Lecture 3 OTHER DAMAGING THREATS.
MIS323 – Business Telecommunications Chapter 10 Security.
Cyber Security in the Mobile Era KEEPING ENTERPRISE DATA SAFE IN THE BYOD ERA.
Computer Security Mike Asoodeh & Ray Dejean Office of Technology Southeastern Louisiana University.
Malicious Attacks By: Jamie Woznicki Rahul-Anaadi Kurl Alexander Kaufmann Curtis Songer Daniel Cardenas Rivero.
Threats To Data 30 Threats To Data 30. Threats To Data 30 We’re now going to look at a range of different threats to people’s data: Opportunity Threats.
Strengthen Your County’s Security Posture Cyber Incident Scenario Joe Frohlich State of Montana – Enterprise Security Manager.
USDA 2016 Financial Management Training Transforming Shared Services Cyber Security Presented by Jack Blount.
The Health Insurance Portability and Accountability Act (HIPAA) requires Plumas County to train all employees in covered departments about the County’s.
Outline of this module By the end of this module, you will be able to: Understand the benefits that internet banking provides; Name the different dangers.
TOTAL POLICING LDSC: Protecting London’s Business Community. Presentation to.
Snowfensive At Snowfensive.com, we provide specialized cyber security risk assessments for organizations. We also give security awareness training for.
Information Security Officer Meeting
Cyber Warfare and Importance of Cyber Awareness
Team 2 – understand vulnerabilities
RCCU Zephyr South West Regional Cyber Crime Unit.
That could never happen to me! Think again.
Introduction to the Federal Defense Acquisition Regulation
Cyber Security Awareness Workshop
Cyber Attacks on Businesses 43% of cyber attacks target small business Only 14% of small business rate their ability to mitigate cyber risk highly.
Cybersecurity Awareness
Unfortunately, any small business could face the risk of a data breach or cyber attack. Regardless of how big or small your business is, if your data,
Mary Kummer Jim McNall PRIMA Spring Training 2018
Risk of the Internet At Home
Managing Change and Other Keys to Successful Implementation
Prepared By : Binay Tiwari
Insurance for Professionals
Keeping your data, money & reputation safe
Cyber Risk & Cyber Insurance - Overview
Cybercrime and Canadian Businesses
Steppa Cyber Security Training Tips Your Business Was Seeking For With Cyber Security Training!
Cybersecurity: Tried and True Tactics for Assessing and Managing Risks, Employee Training and Program Testing Brian Rubin, Partner, Sutherland Tee Meeks,
Business Compromise and Cyber Threat
Information Protection
Security Partner / Customer Engagement Flow
Information Protection
Lunch and Learn Module:
“Workplace Behaviour: Activating your greatest security asset”
CMGT/431 INFORMATION SYSTEMS SECURITY The Latest Version // uopcourse.com
CMGT 431 CMGT431 cmgt 431 cmgt431 Entire Course // uopstudy.com
Presentation transcript:

Real Life Scenario An employee in the Finance and Business Operations receives a targeted phishing . Follows instructions and infects his or her computer, and the virus spreads countywide Severe impacts to County agencies …

Status The state of information security at King County is GOOD! However, those with malicious intent will always be out there trying to take advantage of any vulnerability or opportunity to do harm.

Risk Sources for King County People: employees, contractors, volunteers Lack of clarity: what data needs protection and how Vulnerabiliti es in apps and systems – open to attacks Lack of Security factors in all system life cycle (SDLC) phases Minimal standards in systems & processes: “The weakest link …” Awareness!Data ModelUpgradesSDLC Standardization What needs to be done?

IT Security Improvement Roadmap

Cyber Insurance Coverage Risk Management and KCIT partner to seek agency participation in managing the County’s IT Security We and our insurance brokers are pursuing Cyber Liability Insurance Coverage Essential: IT Security Awareness Training for Employees

What do we Ask? Endorsement for IT Security Roadmap