National Cyber Security Awareness Month October 20, 2011 Cyber Security – Our Shared Responsibility.

Slides:



Advertisements
Similar presentations
Stop. Think. Connect. National Cybersecurity Awareness Campaign October 2010.
Advertisements

Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Helping our customers keep their computers safe.  Using your pet’s, business, family, friend’s names  Using number or letter sequences (0123, abcd)
Coxheath Primary School E-safety- Term Purpose To outline the use of the internet in school The use of the internet outside school What are the.
Social Network Security Issues: Social Engineering and Phishing Attacks Jeffrey Allen, Leon Gomez, Marlon Green, Phillip Ricciardi, Christian Sanabria.
SECURITY EVALUATION OF AN ORGANIZATION TA Md Morshedul Islam.
National Cybersecurity Awareness Campaign. Campaign Background  In May 2009, President Obama issued the Cyberspace Policy Review, which recommends the.
STOP.THINK.CONNECT™ NATIONAL CYBERSECURITY AWARENESS CAMPAIGN SMALL BUSINESS PRESENTATION.
Cyber and Internet Safety El Rodeo School September 11, 2013.
National Cyber Security and Information (Cyber) Security Awareness Prof SH (Basie) von Solms Immediate Past President : IFIP University of Johannesburg.
A Covenant University Presentation By Favour Femi-Oyewole, BSc, MSc (Computer Science), MSc (Information Security) Certified COBIT 5 Assessor /Certified.
DHS SECURITY INCIDENT REPORTING AND RESPONSE SECURITY INCIDENT REPORTING AND RESPONSE DHS managers, employees, and other authorized information users.
National Institute of Standards and Technology 1 NIST Guidance and Standards on System Level Information Security Management Dr. Alicia Clay Deputy Chief.
ICT Curriculum Evening – an introduction to Wizkid.
September 9, 2009 Michael W. McKeehan Executive Director, Internet & Technology Policy Online Safety: Protecting Consumers.
STOP.THINK.CONNECT™ A NATIONAL CYBERSECURITY AWARENESS CAMPAIGN OLDER AMERICANS PRESENTATION.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Date of Presentation Guidelines for Industry on Child Online Protection © UNICEF/NYHQ /OLIVIER ASSELIN.
© 2003, EDUCAUSE/Internet2 Computer and Network Security Task Force Computer Access, Privacy and Security: Legal Obligations and Liabilities Rodney J.
National Cybersecurity Awareness Campaign: Chatting with Kids About Being Online.
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
External Threats to Healthcare Data Joshua Spencer, CPHIMS, C | EH.
Thomas Hacker Barb Fossum Matthew Lawrence Open Science Grid May 19, 2011.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Bill Newhouse Program Lead National Initiative for Cybersecurity Education Cybersecurity R&D Coordination National Institute of Standards and Technology.
TITLE : E-SAFETY NAME : ABDUL HAFIQ ISKANDAR BIN ROZLAN PROGRAM : SR221 NO.STUDENT :
Topic: Information Security Risk Management Framework: China Aerospace Systems Engineering Corporation (Case Study) Supervisor: Dr. Raymond Choo Student:
Information Security Issues at Casinos and eGaming
St Meryl School e-Safety Presentation for Parents 16 th June 2015 Mr Davies (Computing Subject Leader)
Copyright 2009 Trend Micro Inc. Classification 9/9/ Corporate End User Study Employee Online Behavior.
An Educational Computer Based Training Program CBTCBT.
INTERNET2 COLLABORATIVE INNOVATION PROGRAM DEVELOPMENT Florence D. Hudson Senior Vice President and Chief Innovation.
Internet Security & Safety. What makes up the internet? Protecting and securing your password Protecting your identity What is social networking? Benefits.
Asif Jinnah Microsoft IT – United Kingdom. Security Challenges in an ever changing landscape Evolution of Security Controls: Microsoft’s Secure Anywhere.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
End User Cyber Security Awareness Training. Who should complete this training This training is required for all individuals that owns a computer, mobile.
April 14, A Watershed Date in HIPAA Privacy Compliance: Where Should You Be in HIPAA Security Compliance and How to Get There… John Parmigiani National.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
1 Smart Grid Cyber Security Annabelle Lee Senior Cyber Security Strategist Computer Security Division National Institute of Standards and Technology June.
Managing Data Against Insider Threats Dr. John D. Johnson, CISSP.
1 © Material United States Department of the Interior Federal Information Security Management Act (FISMA) April 2008 Larry Ruffin & Joe Seger.
Federal Information Security Management Act (FISMA) By K. Brenner OCIO Internship Summer 2013.
October 21, 2008 Jennifer Q.; Loriane M., Michelle E., Charles H. Internet Safety.
Grants Management Training 200 Cyber Security There are two kinds of people in America today: Those who have experienced a cyber-attack and know it, and.
Enterprise Cybersecurity Strategy
Grove Primary School. What is E-Safety? E-Safety is a term which means not only the internet but other ways in which young people communicate using electronic.
October 10, Better Together – The Road to Responsible Information Management Presented by Colleen Pedroza, State Information Security Officer.
UNCLASSIFIED Homeland Security Introduction to the National Cybersecurity & Communications Integration Center (NCCIC) “A Partnership for Strength” 1.
Parenting the “Net Generation.” What makes our kids “click”? Brentwood Preschool November 19, 2013,
MIS323 – Business Telecommunications Chapter 10 Security.
“How do I keep my child safe online?” Miss Johnstone Computing Co-ordinator “Parents / Carers are the one important factor in the home environment to keep.
WHEN, NOT IF THE CYBER SECURITY CHALLENGES AMONG LOCAL GOVERNMENT UMBC Public Policy Forum Baltimore Maryland April 15, 2016 Gayle B. Guilford CISO Baltimore.
Safe Computing Practices. What is behind a cyber attack? 1.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
Mobile device security Practical advice on how to keep your mobile device and the data on it safe.
Computer Science / Risk Management and Risk Assessment Nathan Singleton.
Avoiding Frauds and Scams Barbara Martin-Worley Director, Consumer Fraud Protection 18 th Judicial District Attorney’s Office Serving Arapahoe, Douglas,
Cook Children’s 1 Theresa Meadows, RN, MS, CHCIO Senior Vice President and CIO Co-Chair HHS Health Care Cyber Security Task Force July 2016 Cybersecurity:
Broadband Challenges 2017 Christopher Tamarin
Combating Identity Fraud In A Virtual World
Information Security Program
3.6 Fundamentals of cyber security
Cybersecurity Education & Awareness Overview
Data Compromises: A Tax Practitioners “Nightmare”
Introduction to the Federal Defense Acquisition Regulation
Cybersecurity Education and Workforce Development Resources
Home Internet Vulnerabilities
David J. Carter, CISO Commonwealth Office of Technology
E-Safety Workshop Tuesday 9th October 2018
Presentation transcript:

National Cyber Security Awareness Month October 20, 2011 Cyber Security – Our Shared Responsibility

Why do we care about Cyber Security ? Internet usage is a daily activity for most Americans Our young children are using computers in Pre-K Social network sites, on-line gaming, and mobile ‘techno gadgets’ such as IPODs and smart phones permeate every aspect of our teenagers’ lives ALL of our personal information is located in cyber space somewhere at all times Social media is the new social norm And according to President Obama, “…the cyber threat has become one of the most serious economic and national security challenges we face.” 2U.S. Department of Energy | Office of the Chief Information Officer

What are my risks? Common questions all Cyberspace users should ask themselves… How do I protect my children? How do I protect my identity? How do I protect my bank account? How do I protect my personal information on my home computer? How do I protect government information at work and at home? Simply put, what is my shared responsibility in protecting my daily cyberspace? 3U.S. Department of Energy | Office of the Chief Information Officer

Always STOP before using the Internet and have a firm knowledge of what you are about to do. CONNECT with confidence! 4U.S. Department of Energy | Office of the Chief Information Officer Take time to THINK about your actions and your children’s actions online and how they could impact your safety. What can I do? Stop.Think.Connect.

What about the office environment? Shared responsibility to follow required cyber policies and practices Shared responsibility to protect DOE information assets at work and at home Shared responsibility to be cyber aware of possible cyber threats A cyber-aware workforce is an empowered workforce. 5U.S. Department of Energy | Office of the Chief Information Officer

Unfortunate Circumstance An real-life example of a common social engineering cyber threat with significant consequences… Breach originated in a phishing sent to hundreds of employees at Oak Ridge National Labs. was disguised as an official from the lab’s HR department about benefit changes. Employees clicked on the embedded link in the . Malware was downloaded onto their computers. Malware exploited an unpatched flaw in MS Internet Explorer and was designed to search for and steal technical information. As a result of this breach, the lab shut down all Internet access and services. Many resource hours spent during investigation, research, and mitigation. 6U.S. Department of Energy | Office of the Chief Information Officer

DOE Risk Management Approach DOE Risk Management Approach (RMA) The OCIO has established a RMA based on NIST Special Publication (SP) that institutes a mission-centric, risk-based approach to the management of cyber security to ensure the confidentiality, integrity, and availability of DOE information and information systems. Developed as a collaborative effort between HQ, Under Secretaries, National Labs, Production Facilities, and the IMGC Advisory Group and representatives. Provides the foundation for risk-based decisions that effectively ‘balance’ security, cost and mission effectiveness as opposed to a system-level compliance approach. DOE RMA Principles – Risk is Managed in Partnership with the Mission IT, Cyber, and Departmental mission needs are effectively ‘balanced’ by the evaluation of value, affordability, and mission impact as determined by the mission owners. The IT/Cyber relationship is one of partnership, cooperation, and collaboration of common tools, best practices, centers of excellence, etc. at both the Federal and Contractor-level. Ultimate Goal of the DOE RMA The ultimate goal of the DOE RMA is to provide a structured, yet flexible approach for managing risk that is intentionally broad-based, and that protects DOE information assets in a manner commensurate with impact to mission, national security, risk, and magnitude of harm. 7U.S. Department of Energy | Office of the Chief Information Officer