Presentation is loading. Please wait.

Presentation is loading. Please wait.

YJT1 - Application of Effective Comm (UG 0914) Task 2: Presentation Kody M. Hackbusch.

Similar presentations


Presentation on theme: "YJT1 - Application of Effective Comm (UG 0914) Task 2: Presentation Kody M. Hackbusch."— Presentation transcript:

1 YJT1 - Application of Effective Comm (UG 0914) Task 2: Presentation Kody M. Hackbusch

2 Imagine for a moment…

3 “Only 1 in 10 people who regularly use a computer or other digital device to connect to the Internet have received any kind of cyber security training in the last 12 months, and more than two thirds have never had any such training.” (Cobb, 2012) “Only 20% of IT security professionals are confident their organizations have made adequate investments in educating users on how to avoid phishing attacks.” (Shephard, 2015)

4 Data shows that despite the ever growing adoption of interconnected and mobile technologies in business there is a lack of cyber-threat awareness among users. This indicates the need for executives and managers to have a high level understanding of the current digital landscape so they can evaluate current infrastructure and readiness.

5  What does awareness mean?  What are some of the common threats?  Cost/Benefit Analysis Overview

6  Awareness is understanding what to look for, common pitfalls and how our actions can affect the organization as a whole.  Awareness is about being mindful and respectful of how we interact with the technology that provides us with the productivity enhancements that we all appreciate and have come to rely upon.  Awareness is about responsibility from the executive level down to the temp worker. Awareness

7  Spear Phishing  Whaling  Crypto Ransoming  Rogue Insiders  Social Media  BYOD Threats

8  Loss of productivity  Breach goes undetected  Loss of future revenue  Affects interconnected partner systems  Intellectual Property  Sensitive/confidential data Costs of cyber attack Cost/Benefit Analysis lists derived from (Brink, 2014) (K Rudolph, 2015)

9  Be seen as a leader  Reduced threat of incidents  Decreased down-time  Protection of assets, more confidence  Improved compliance  Improved morale  Protection against users Benefits of training Cost/Benefit Analysis lists derived from (Brink, 2014) (K Rudolph, 2015)

10 Recap Data shows that despite the ever growing adoption of interconnected and mobile technologies in business there is a lack of cyber-threat awareness among users. This indicates the need for executives and managers to have a high level understanding of the current digital landscape so they can evaluate current infrastructure and readiness.

11 Recap  What does awareness mean?  What are some of the common threats?  Cost/Benefit Analysis

12 PWC 2015 US CEO Survey

13 Understanding that one of the largest security weaknesses in businesses today is user actions should prompt you to take a closer look at how your organization handles not just the technology you employ but those who use it. Conclusion

14 References Brink, D. E. (2014, November). The last mile in IT security: changing user behaviors. (Aberdeen Group) Retrieved from www.aberdeen.com: http://v1.aberdeen.com/launch/report/research_report/9910-RR- Changing-User-Behaviors.asp http://v1.aberdeen.com/launch/report/research_report/9910-RR- Changing-User-Behaviors.asphttp://v1.aberdeen.com/launch/report/research_report/9910-RR- Changing-User-Behaviors.asp Burg, D. (2015). Concern over cyber threats has CEOs warming. (Pricewaterhouse Coopers LLP) Retrieved from PWC 2015 US CEO Survey: http://www.pwc.com/us/en/ceo-survey/secure-assets.jhtml http://www.pwc.com/us/en/ceo-survey/secure-assets.jhtml Cobb, S. (2012, October 10). Study finds 90 percent have no recent cybersecurity training. (ESET Anti- Virus) Retrieved from www.welivesecurity.com: http://www.welivesecurity.com/2012/10/10/study-finds- 90-percent-have-no-recent-cybersecurity-training/ http://www.welivesecurity.com/2012/10/10/study-finds- 90-percent-have-no-recent-cybersecurity-training/http://www.welivesecurity.com/2012/10/10/study-finds- 90-percent-have-no-recent-cybersecurity-training/ K Rudolph. (2015). Benefits of an Information Security Awareness Program. Retrieved from Native Intelligence Inc: http://www.nativeintelligence.com/ni-programs/ni-benefits.asp http://www.nativeintelligence.com/ni-programs/ni-benefits.asp Shephard, D. (2015, March 16). 84 Fascinating & Scary IT Security Statistics. Retrieved from www.netiq.com: https://www.netiq.com/communities/cool-solutions/netiq-views/84-fascinating-it-security- statistics/ https://www.netiq.com/communities/cool-solutions/netiq-views/84-fascinating-it-security- statistics/https://www.netiq.com/communities/cool-solutions/netiq-views/84-fascinating-it-security- statistics/


Download ppt "YJT1 - Application of Effective Comm (UG 0914) Task 2: Presentation Kody M. Hackbusch."

Similar presentations


Ads by Google