The Carebear Stare and The Reading Rainbow Using childhood philosophies against adult threats, minimizing and eliminating insider threats through loyalty.

Slides:



Advertisements
Similar presentations
The Seven Basic Rules of Management. 1. Attract/recruit, hire, train, and retain the right people. – The first, most important task of management is hiring.
Advertisements

How to Have a Conversation
Gallup Q12 Definitions Notes to Managers
What does the job market requires in our days Spyros Michaloulis – Nikos Pavlakos Orientum-Career Counselors.
Lesson 10: Dealing with Criticism
© 2014 wheresjenny.com ROLE PLAY STAFF IN CALL CENTERS AND TELEMARKETING FIRMS.
Compiled by Julie Blackmon
Maintaining Industrial Harmony at Work
Bring Success in Beliefs. You don’t have to wait for someone to accept, to promote, to select... to somehow "discover." Access is nearly unlimited;
Getting ripped off by SAP consultants? Not getting the desired effect from COTS? Read on to discover why COTS systems or expensive management consultants.
BCMS What Is Bullying.
WHEN CHRISTIANS GET IT WRONG. There are 613 laws or commandments (Mitzvot) in the Old Testament. People often pick and choose which ones they want to.
Financial CHANGE Program 2010 – 2011 COACH TRAINING October 12, 2010.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
Leadership & Team Building
 Holden is very lonely, and most of the novel shows him attempting to find company or dwelling on the fact that he is lonely- “practically the whole.
Termination Process Team 1: Anuj Kumar Agrawal Mohaammed Al-baqmi
Employee Engagement Survey
NEW EMPLOYEE ORIENTATION Starting on the Right Foot!
/0503 © Business & Legal Reports, Inc. BLR’s Human Resources Training Presentations Exit Interviews.
CUSTOMER SERVICE Diana Piraquive. CIS
Get Job Orders Now! Marketing Scripts and Strategies that Work.
Aaronic Priesthood Activities. What are the purposes and key elements of Aaronic Priesthood activities?
Interrupting Generational Poverty
© 2007 by Nelson, a division of Thomson Canada Limited. Ch Chapter 14 Employment Interviewing and Follow-up Messages.
Why People Leave You can improve your employee retention if you have a higher sensitivity about why people leave their jobs. Here are five principal reasons.
Chapter 15 Closing the Sale
Leadership The ability to lead effectively is based on a number of key skills. These skills are highly sought after by employers as they involve dealing.
Finding and Retaining Volunteers (Based on Steve Peyrot Presentation) Gabe Goldberg APCUG Region 2 Advisor CPCUG APCUG Representative
The Leadership Series: Making the Transition to Supervisor.
English Only Is it right for you?.
Recruiting Chapter Leadership Work Smarter – Not Harder.
Buddha has said this beautifully, "All that we are is the result of what we have thought". 100 Beliefs.
KAREN PHELPS Spontaneous Sponsoring. Your Home Presentations “A Valuable Source for Recruits”
APPROACH AND CONTACT (STEP 2 OF THE SYSTEM MANUAL)
Career Tips on Teaching, Presenting and Publishing From Norm Miller
Building Relationships with Departments and Leaders By William Miller Miller Consulting.
9 Simple Steps to Building A Strong and Inspiring “Why or I” Story
Successful Interviewing. Objective Students will be able to anticipate and articulate key job skills and be prepared for a real job interview.
/0903 © 2003 Business & Legal Reports, Inc. BLR’s Human Resources Training Presentations Coaching Techniques.
Decatur City Schools Parental Involvement Program Brookhaven Middle School 2005 Parenting Day “Celebrating Parents – A Child’s Lifetime Teacher” Title:
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Basic concept of customer service Basic communication skills of dealing with customers.
For Agent training purpose only. Not for sales presentations.LNL THE KEY TO RETENTION.
Motivation. If you want to make things happen the ability to motivate yourself and others is a crucial skill.
presented by Louis Feuer, MA, MSW AHIP Virtual Seminar
Communications Skills for Managers
Everyone Communicates Few Connect
Become A Better Speaker
Introduction to Public Speaking
Strengthening Your Interpersonal Relationships. 1. Don’t criticize, condemn, or complain about people.  There’s no faster way create resentment toward.
BES-t Practices Training Interviewing with Purpose So why is interviewing important? Or is it?
Leadership By: Nick Meress. What is a leader? Being a leader comes from how you were born and raised. It doesn’t mean you might be the president of the.
Student Feedback--Dale Carnegie in the College Classroom Dr. David Urban June 25, 2015.
By Lauren Hanna. I believe HRD is a very valuable resource to have in an organization. A recognized and enjoyable fact about HRD is it enhances all business.
Developing a growth mindset in the face of challenge
NATIONAL CONVENTION AUGUST 30, 2012 The Power of Yes: Motivating Yourself & Your Team Lou Ann Sabatier Sabatier Consulting.
1. Don’t criticize, condemn, or complain about people. There’s no faster way create resentment toward you than to criticize or complain about a person.
Tell me a little about yourself. Are you from the area originally? Brothers? Sisters? Married? Any kids? So what have you done for work since high school?
EPHESIANS 1:15-23 I have not stopped giving thanks for you, remembering you in my prayers. 15 For this reason, ever since I heard about your faith in.
Chapter 5 – Lesson Planning and Classroom Survival
Strategies for Improving Concentration & Memory -Knowledge Zone.
Culture Snapshot Card Sort Analysis Video Questions.
Remember, it costs five times as much to bring in one new family as it takes to keep an existing one happy.
Tell me a little about yourself. Are you from the area originally? Brothers? Sisters? Married? Any kids? Tell me about your accomplishments, but do me.
Economic Well Being PSHE April / May 2016.
CHAPTER 8 MOTIVATION.
maintenance Activities in hrm concerned with maintaining employee commitment and loyalty to the organization.
Mario Sadikaj Basic Network Marketing Info All Marketers Should Know
Emotional and Social Development of a Preschooler
Presentation transcript:

The Carebear Stare and The Reading Rainbow Using childhood philosophies against adult threats, minimizing and eliminating insider threats through loyalty and education

Types of Insider Threats Infiltrators- Those who sought employment in the company for the purpose of exploiting Disgruntled Employees- Those who feel wronged by their company and will exploit their position for revenge, gain or both. Financially Strained Employees- Employees suffering from crushing financial responsibilities, possibly from medical bills, gambling debts, coke habits, loan sharks, world of warcraft, an amazon prime account, etc. A Delphi study in The Journal of the Naval Postgraduate School Center for Homeland Defense and Security suggests Infiltrators, not career employees, are the more likely threat. This is an interesting point as researchers initially expected the opposite, that career employees were the major threat. Citation 2

Sources of Insider Threats Motivations for insider threats according to a CERT report published in 2012 Financial gain was a motive in 81% of cases, Revenge in 23% of cases Financial difficulties 27% cases Here we can see where our career employees do come into play, finances can account for infiltrators or employees. Revenge, however indicates a personal motivation, unlikely in an infiltrator. Unless your company specializes in giving cancer to babies, in which case pretty much everyone hates you. Citation 1

What can we learn from this? Your employees are not the enemy Your “insider threat” is more likely an outsider pretending to be one of you If one of your employees does become the enemy, it may be your fault Your employees are your greatest asset in every sense, for profits, productivity and security. Bringing your workforce on board your security team gives you security at every level of the company and more information than any monitoring software could ever hope to achieve. By showing and earning trust you can add loyalty to your defenses, a trait which, when strong enough, can overcome greed, theft, and slights real or imagined.

Building Trust and Goodwill Educate Employees Let them know they aren’t an enemy Teach them to identify potential threats Teach them secure practices Teach them how this benefits them personally Open Door in IT Do not be condescending to “users” Encourage IT to be viewed as a friendly resource Actually listen Cut Invasive Measures Weigh all security measures against invasiveness Be discrete with policies deemed necessary Morale and HR Build solid lines of communication with HR and Management Take an active interest in morale building

Employee Education Let them know they aren’t an enemy Be open with your employees that you don’t consider them an enemy. Let them know you’re on a team fighting against outside threats and infiltrators. Teach them to identify potential threats Educate employees on how to identify infiltrators, or just something that feels off. Encourage them to voice concerns without fear of being blown off or “getting someone in trouble”. Teach them secure practices Obvious yes, and you likely already have this in place to some extent. Consider though if your training needs an overhaul, or if some of your current security measures could be cut in favor of more extensive training. Teach them how this benefits them personally When you educate on secure passwords, cover the whys and draw real world examples of how they can use this knowledge in their personal life, say for keeping their bank account secure for example. Engaging employees on a personal level will result in better knowledge retention and inspires goodwill.

Open Door in IT Do not be condescending to “users” It’s hard, sometimes people ask terrible questions or throw fits over things of insignificant proportions, but they are still people and they are still part of your team. Learn to appreciate the skills they bring to the company and try to share knowledge rather than belittle. Encourage IT to be viewed as a friendly resource Make the IT department open door, encourage employees to voice concerns. IT is in a unique position to listen, they aren’t management or HR, there is not stigma of “tattling”, and they can make the best of information received, through discrete monitoring and threat assessment. Actually listen Once you have employees willing to talk, actually listen or they’ll never bother talking to you again.

Cut Invasive Measures Weigh all security measures against invasiveness Start with all the policies you have in place, weigh their success against perceived invasiveness, get feedback on what employees dislike most. Be vocal when you retire a known policy, share with employees your desire to trust them. Explain you would rather spend the budget on raises and bonuses than any superfluous security measures and encourage their aid in making that happen. When a new security measure is considered, always take impact on employees into consideration and if necessary explain why an new measure is being adopted. Be discrete with policies deemed necessary Keep little known policies little known, don’t try to scare employees by reminding them you can read their s or that you track server usage. Fear will not inspire trust and is an insufficient deterrent to the angry or desperate.

Morale and HR Build solid lines of communication with HR and Management When a concern does arise over a possibly disgruntled or struggling employee, IT should hear that concern immediately. This doesn’t require sharing sensitive or private information about an employee. A simple request to increase monitoring or a number code to indicate level of concern is sufficient. Take an active interest in morale building IT departments should keep a close eye on the company’s general morale, and make efforts to keep security a continuous topic on everyone’s mind. Hold a security contest. Call employees and try to social sensitive information, recruit your security team to attempt to follow employees in through key card access doors. Publicly reward those who handle it successfully, provide one on one training for failures, not disciplinary action. Handled properly, regular contests can be entertaining and will sharpen skills while keeping security threats on everyone’s mind but not in an oppressive way.

The Organizational Golden Rule In the end this all comes down to the golden rule, the more loyalty you build and the better you educate the better your chances of eliminating threats that stem from ill will or ignorance. Harming you becomes difficult for me because the two of us are part of We. Cultivating the We mindset benefits employees and the company from a financial and security standpoint

Why Carebears And Reading Rainbow?

Carebear Stare & Reading Rainbow Carebears specialize in defeating their enemies by making them allies with the Carebear Stare, in other words love and friendship. Reading Rainbow seeks to make education entertaining and accessible to the general public. It got your attention… or you realized this time slot is empty in track one. So hey, no competition.

Citations 1.SEI- Cummings, Adam; Lewellen, Todd; McIntire, David; Moore, Andrew; & Trzeciak, Randall. Insider Threat Study: Illicit Cyber Activity Involving Fraud in the U.S. Financial Services Sector (CMU/SEI-2012-SR-004). Software Engineering Institute, Carnegie Mellon University, view.cfm?AssetID= view.cfm?AssetID= Homeland Security Affairs- The Journal of the Naval PostGraduate School Center for Homeland Defense and Security — Volume VI No. 2: May 2010 — No Dark Corners: A Different Answer to Insider Threats - Nick Catrantzos— Volume VI No. 2: May 2010 —No Dark Corners: A Different Answer to Insider Threats - Nick Catrantzos