DC GOVERNMENT EMPLOYEES NOT YET OFFERED CYBER SECURITY TRAINING.

Slides:



Advertisements
Similar presentations
Cybersecurity and UAV Issues John Rose, Deputy-Director, Public Policy, Region VI.
Advertisements

Cybersecurity Update December 5, Agenda Cybersecurity – A growing problem Cybersecurity in other states (NASCIO/Deloitte Study) Structure Challenges.
Cyber Security and the Global Business Environment Jeremy Schaar:)
National Cybersecurity Awareness Campaign. Campaign Background  In May 2009, President Obama issued the Cyberspace Policy Review, which recommends the.
SECURITY AND SOCIAL ENGINEERING US Department of Commerce Office of Security Updated 09/26/11 Security is Everyone's Responsibility – See Something, Say.
CHINESE HACKERS. Where do they come from? In 2007 private security firm Mandiant was hired by the New York Times to trace cyber-attacks on their network.
David A. Brown Chief Information Security Officer State of Ohio
PEOPLE’S REPUBLIC OF HACKING By: Lani N, Ashley R, Michael R, Gregory R.
STOP.THINK.CONNECT™ NATIONAL CYBERSECURITY AWARENESS CAMPAIGN SMALL BUSINESS PRESENTATION.
Infotex Awareness Training Tools. m.infotex.com/tools Information Security Tools.
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
2015 Predicted Threats C YBER S ECURITY I NTELLIGENCE You got to be careful if you don’t know where you’re going, because you might not get there. – Yogi.
2015 GLOBAL CYBERSECURITY STATUS REPORT Global Cybersecurity Status Report Companies and government organizations worldwide are focusing on cybersecurity.
Security Issues on Campus: Government Initiatives Rodney J. Petersen University of Maryland Educause/Internet2 Security Task Force Copyright Rodney J.
National Cybersecurity Awareness Campaign: Chatting with Kids About Being Online.
Electronic Records Management: What Management Needs to Know May 2009.
Module 3 Develop the Plan Planning for Emergencies – For Small Business –
BITS Proprietary and Confidential © BITS Security and Technology Risks: Risk Mitigation Activities of US Financial Institutions John Carlson Senior.
CYBER TERRORISM BY: ASHLEIGH AUSTIN AND HUNTER BURKETT.
Network Security Resources from the Department of Homeland Security National Cyber Security Division.
Cybersecurity and the Department of Justice Vincent A. Citro, Assistant United States Attorney July 9-10, 2014 Unclassified – For Public Use.
Case Study: Department of Revenue Data Breach National Association of State Auditors, Comptrollers and Treasurers March 21, 2013.
Self-Assessment and Formulation of a National Cyber security/ciip Strategy: culture of security.
IAEA International Atomic Energy Agency IAEA Nuclear Security Programme Enhancing cybersecurity in nuclear infrastructure TWG-NPPIC – IAEA May 09 – A.
1 Secure Commonwealth Panel Health and Medical Subpanel Debbie Condrey - Chief Information Officer Virginia Department of Health December 16, 2013 Virginia.
Threat Assessment in a Logical Environment U.S. Financial Infrastructure Physical to Logical environment Protection and Threat Assessment Safe School.
National Cyber Security Awareness Month October 20, 2011 Cyber Security – Our Shared Responsibility.
Family Educational Rights and Privacy Act. From the moment a child enters the school system, sensitive information is collected about the child (and even.
Cyber Security Nevada Businesses Overview June, 2014.
℠ Pryvos ℠ Computer Security and Forensic Services May 27, 2015 Copyright © 2015 Pryvos, Inc. 1.
International Telecommunication Union Geneva, 9(pm)-10 February 2009 BEST PRACTICES FOR ORGANIZING NATIONAL CYBERSECURITY EFFORTS James Ennis US Department.
PMC Update on Cyber Sprint June 18, Overview: 30-Day Cyber Sprint 1.Interagency Cyber Sprint Team: Launched June 11 and executing against the.
Sample only Order at Security Awareness Training A threat awareness briefing. A defensive security briefing. An overview of the.
U.S. Small Business Administration Answers | Resources | Support For Your Small Business Cybersecurity Awareness Cybersecurity Awareness Signs You’ve Been.
Data Security & Privacy: Fundamental Risk Mitigation Tactics 360° of IT Compliance Anthony Perkins, Shareholder Business Law Practice Group Data Security.
INTRODUCTION & QUESTIONS.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Identity Theft PD Identity Theft Identity theft is a serious crime which can: Cost you time and money Destroy your.
The Federal Telework Program U.S. Office of Personnel Management.
BMMS CYBER PATRIOTS /4/2016. CyberPatriot National Cyber Defense Competition What do following have in common? TargetConnected CarsAdobe Sony.
HHS Security and Improvement Recommendations Insert Name CSIA 412 Final Project Final Project.
Activu-Powered Video Wall Prominently Featured during President Obama’s Visit to the National Cybersecurity and Communications Integration Center On January.
USDA 2016 Financial Management Training Transforming Shared Services Cyber Security Presented by Jack Blount.
March 23, 2015 Missouri Public Service Commission | Jefferson City, MO.
Protecting Houses of Worship Security Plan Development Considerations Glenn Moore Protective Security Advisor – Oklahoma District National Protection and.
Filling Our Talent Pipeline
Protecting Your Assets By Preventing Identity Theft
Law Firm Data Security: What In-house Counsel Need to Know
Why is this called “the ostrich effect”?
Information Security Program
Chapter 2 Modern Private Security
Iowa Communications Alliance
Educause/Internet 2 Computer and Network Security Task Force
Managing a Data Breach Prevention-Detection-Mitigation
Managing a Data Breach Prevention-Detection-Mitigation
Forensics Week 11.
Presented by: Brendan Walsh Manager, Security and Access Management
Cyber Security Experts
Presidential Approaches to Cybersecurity
Higher Education Privacy Update
Network Security Best Practices
Move this to online module slides 11-56
Compliance….GlobalSearch……WHAT?!?!
Identity Theft Prevention Program Training
Cybersecurity ATD technical
Continuity of Operations Planning
LO1 - Know about aspects of cyber security
Data Breach of United States Office of Personnel Management
Data Breach of United States Office of Personnel Management
Presentation transcript:

DC GOVERNMENT EMPLOYEES NOT YET OFFERED CYBER SECURITY TRAINING

WASHINGTON (AP) — Leaders from across the District of Columbia municipal government gathered last April for a summit on cybersecurity, where they agreed in writing on the need to improve computer safety training for its workers. Yet nearly a year later, no organized, across-the-board training is offered for employees even though electronic data theft from governments is on the rise. Information technology experts see training as a vital component of cybersecurity and D.C. officials acknowledge their own employees should be better educated on computer use, especially as governments face increasingly sophisticated cyber-threats and as human errors have contributed to widespread data breaches. But officials say they’ve put plans for such training on the back-burner while they continue efforts to improve network security, including through new tools and products as well as additional levels of monitoring and inspection. Those improvements are more efficient and longer-lasting than educating thousands of workers who may not be in their jobs permanently, contends Rob Mancini, the District’s chief technology officer “You don’t start talking about what people should do unless you know you’ve got protections in place to help,” Mancini said in an interview. “You don’t go educating users until you’ve got something behind it.” The federal government has identified cybersecurity as a critical priority, unveiling new efforts to fight the theft of trade secrets and discourage intellectual property theft. In his State of the Union address, President Barack Obama urged Congress to pass legislation to help protect computer networks from attack and warned that American enemies are exploring ways to sabotage the power grid, financial institutions and air traffic control system. Companies including Facebook, Twitter, Microsoft and Apple have been recently hacked, as have financial services companies that maintain credit card account information.

State governments, repositories of personnel information, financial data, emergency operations plans, health care records and other documents, are particularly vulnerable targets. A 2012 study by the Deloitte consulting firm and the National Association of State Chief Information Officers found that less than a quarter of the state information security chiefs felt confident in their state’s ability to protect data from an outside threat. D.C. officials, recognizing the problem, organized an exercise last April to gauge the government’s cyber-attack readiness. A section of the after-action report, obtained by The Associated Press through a public records request and marked “exercise sensitive,” identified as a primary area for improvement “cyber-security training for District employees at the awareness, performance, and management levels” and said participants had agreed on the need to raise employee workforce education efforts. But in responding to follow-up requests for written cybersecurity training materials that are provided to employees, neither the office of chief technology officer nor the homeland security agency said they had documents to produce. Click here 2 continue : employees-not-yet-offered-cybersecurity-training/ employees-not-yet-offered-cybersecurity-training/