The Evolving World of Cybersecurity
-
Upload
adnet-technologies -
Category
Technology
-
view
244 -
download
1
Transcript of The Evolving World of Cybersecurity
The Evolving World of Cybersecurity
Christopher J. Luise
Executive Vice President, ADNET Technologies, LLC
Generational Leadership
Organizational Educational
Remediation
Other23%
BYOD30%
Regulatory Compliance
21%
Cloud Computing
26%
Trends Shaping Security Strategies
Source // SC Magazine, 2014
Let’s pick on Millennials
GENERATIONALDIFFERENCES
Generational
They think the office is obsoleteWho needs a cubicle when you have a laptopand free Wi-Fi at your local Starbucks?
They’re always connected77% of adult millennials own a smartphoneThe average owner spends an average of 14.5 hours per week texting, talking and using social media.
They live their lives onlineTwo-thirds of millennials admit to having no sense of personal privacy.
Source // This Digital Life Report, Havas Worldwide
Even if they THINK of themselvesas being private by nature…
Fear-Provoking Question:If some of your employees have no sense of personal privacy, why should you expect them to value privacy of your data?
Because we can’t actually blame Millennials
CHANGING CULTURELeading by Example
Leadership
A fish rots
FROM THE HEAD
Fear-Provoking Question:Do your top executives adhere to the same security protocols as the rest of your employees are expected to?
31% of Data Breachesare caused by employees sending emails or faxes to the wrong party.
24% of Data Breachesare caused by employees losing physical records.
Only 11% of Data Breacheswere caused by spyware or malware in 2014.
Spyware and Malware Breaches Cost MoreForensic and investigative services can be 4.5x more costly than employee data disclosure.
But what about the intangible costs?
38% of Customers Affected by Breachessaid they no longer conducted business with the at-fault organization.
46% of Customers Affected by Breachessaid they would warn their family and friends against sharing data with the organization.
Six secondsThe amount of time needed for someone with a smartphone to broadcast your data to the world.
Source // vine.comCredit for Find: Connecticut Employment Law Blog, Daniel Schwartz
Infusing data privacy
INTO YOUR CULTUREAccountability and Response
Organizational
Fear-Provoking Question:Do you know what information your employees have access to? Are you sure?
Fear-Provoking Question:Do you have any way of knowing if sensitive data has left your “building?”
Self-Deluding Belief:Data security and privacy is the job of the Security Officer.
Self-Deluding Sub-Belief:We have a Security Officer, so our data must be secure.
Training is not optional
CONSTANT CHANGETo know is to survive
Educational
“Fear is like junk food –
It can sustain you for a bit, but in the long run
it’s not healthy.”
– Julie Peeler, ISC2
Fear-Provoking Question:When was the last time you conducted security awareness training for your entire firm?
Finding a balance
PRIVACY/FREEDOMGenerational needs vs. lockdown
It’s not if, it’s when
Cyber CrimeBe prepared for the inevitable
Remediation
110
MILLION
IMPACTED
CUSTOMERS
Pin Numbers
Credit + Debit Card Numbers
Email Address
Name
Mailing Address
INFORMATION STOLEN
TARGET BREACH: HOW DID IT HAPPEN?Target allowed a third party access to its networks and hackers took advantage of it.
INFORMATION SECURITY CONTROLS
INCIDENT RESPONSE – DATA SECURITY PARADIGM SHIFT
@ADNETTech
@ADNETTechnologiesLLC
@ADNETTechnologiesLLC
www.thinkADNET.com