The Evolving World of Cybersecurity

Preview:

Citation preview

The Evolving World of Cybersecurity

Christopher J. Luise

Executive Vice President, ADNET Technologies, LLC

Generational Leadership

Organizational Educational

Remediation

Other23%

BYOD30%

Regulatory Compliance

21%

Cloud Computing

26%

Trends Shaping Security Strategies

Source // SC Magazine, 2014

Let’s pick on Millennials

GENERATIONALDIFFERENCES

Generational

They think the office is obsoleteWho needs a cubicle when you have a laptopand free Wi-Fi at your local Starbucks?

They’re always connected77% of adult millennials own a smartphoneThe average owner spends an average of 14.5 hours per week texting, talking and using social media.

They live their lives onlineTwo-thirds of millennials admit to having no sense of personal privacy.

Source // This Digital Life Report, Havas Worldwide

Even if they THINK of themselvesas being private by nature…

Fear-Provoking Question:If some of your employees have no sense of personal privacy, why should you expect them to value privacy of your data?

Because we can’t actually blame Millennials

CHANGING CULTURELeading by Example

Leadership

A fish rots

FROM THE HEAD

Fear-Provoking Question:Do your top executives adhere to the same security protocols as the rest of your employees are expected to?

31% of Data Breachesare caused by employees sending emails or faxes to the wrong party.

24% of Data Breachesare caused by employees losing physical records.

Only 11% of Data Breacheswere caused by spyware or malware in 2014.

Spyware and Malware Breaches Cost MoreForensic and investigative services can be 4.5x more costly than employee data disclosure.

But what about the intangible costs?

38% of Customers Affected by Breachessaid they no longer conducted business with the at-fault organization.

46% of Customers Affected by Breachessaid they would warn their family and friends against sharing data with the organization.

Six secondsThe amount of time needed for someone with a smartphone to broadcast your data to the world.

Source // vine.comCredit for Find: Connecticut Employment Law Blog, Daniel Schwartz

Infusing data privacy

INTO YOUR CULTUREAccountability and Response

Organizational

Fear-Provoking Question:Do you know what information your employees have access to? Are you sure?

Fear-Provoking Question:Do you have any way of knowing if sensitive data has left your “building?”

Self-Deluding Belief:Data security and privacy is the job of the Security Officer.

Self-Deluding Sub-Belief:We have a Security Officer, so our data must be secure.

Training is not optional

CONSTANT CHANGETo know is to survive

Educational

“Fear is like junk food –

It can sustain you for a bit, but in the long run

it’s not healthy.”

– Julie Peeler, ISC2

Fear-Provoking Question:When was the last time you conducted security awareness training for your entire firm?

Finding a balance

PRIVACY/FREEDOMGenerational needs vs. lockdown

It’s not if, it’s when

Cyber CrimeBe prepared for the inevitable

Remediation

110

MILLION

IMPACTED

CUSTOMERS

Pin Numbers

Credit + Debit Card Numbers

Email Address

Name

Mailing Address

INFORMATION STOLEN

TARGET BREACH: HOW DID IT HAPPEN?Target allowed a third party access to its networks and hackers took advantage of it.

INFORMATION SECURITY CONTROLS

INCIDENT RESPONSE – DATA SECURITY PARADIGM SHIFT

Talk To Me

@ITwithValue

@ChristopherLuise

CLuise@thinkADNET.com

@TechWorx

@ADNETTech

@ADNETTechnologiesLLC

@ADNETTechnologiesLLC

www.thinkADNET.com

Recommended