hum w25 hum-w25

22
Session ID: Session Classification: Lance Spitzner SANS Securing The Human HUM-W25 Intermediate MITIGATING THE TOP HUMAN RISKS

Upload: selectedpresentations

Post on 15-Jul-2015

36 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Hum w25 hum-w25

Session ID:

Session Classification:

Lance Spitzner SANS Securing The Human

HUM-W25

Intermediate

MITIGATING THE TOP HUMAN RISKS

Page 2: Hum w25 hum-w25
Page 3: Hum w25 hum-w25

HumanOS Computers

Res

ourc

es

Page 4: Hum w25 hum-w25

1 in 251,800,000

Page 5: Hum w25 hum-w25

1 in 112,000,000

Page 6: Hum w25 hum-w25

► Community Analysis ► Carnegie Mellon University ► iSightPartners ► MITRE ► SecureWorks ► Mandiant ► Virginia Tech

► Phishing / Spear Phishing ► Password reuse ► Unpatched or poorly configured devices (BYOD) ► Mobile media ► Data leakage via Social Networking ► Lack of situational awareness ► Accidental disclosure / loss

Top 7 Human Risks

Page 7: Hum w25 hum-w25

► Awareness does not work

► Someone always falls victim

► Awareness is only about prevention

Common Misconceptions

Page 8: Hum w25 hum-w25

Security Awareness Maturity Model

Non-Existent

Compliance Focused

Promoting Awareness & Change

Long Term Sustainment

Metrics

Page 9: Hum w25 hum-w25
Page 10: Hum w25 hum-w25

► Who is in charge?

► What is the scope?

► What are you specific goals?

► When will training start?

Project Charter

Page 11: Hum w25 hum-w25

► Team of 5-10 volunteers to build, maintain and measure your program.

► Not only guides but ambassadors. ► Have a mix of departments and roles. ► Can meet and coordinate virtually (maillist).

Steering Committee

Page 12: Hum w25 hum-w25

► Who are you targeting in your program. Different targets often require different training. ► Employees / contractors

► IT Staff / Developers / Database admins

► Help Desk

► Senior management

WHO

Page 13: Hum w25 hum-w25

► Use a modular approach for your awareness training. Each awareness topic is a separate module, each with its own learning objectives.

► Goal is to teach the fewest topics that have the greatest impact. ► You are a target ► Phishing / Spear Phishing ► Password reuse ► Keep devices updated ► Mobile media ► Data leakage via Social Networking ► Accidental disclosure / loss

WHAT

Page 14: Hum w25 hum-w25

► This is where most programs fail, you need to engage. Goal is training so valuable employees ask how their family/friends can take it. ► Focus on how people benefit. 75% of your topics apply

to both personal and work lives. ► Focus on how you are enabling technology. ► Create content people can consume on their own

schedule.

► Training should be continuous throughout the year (patch management for the HumanOS)

HOW

Page 15: Hum w25 hum-w25
Page 16: Hum w25 hum-w25
Page 17: Hum w25 hum-w25

► Once you answer key questions including WHO, WHAT & HOW put together draft plan with Steering Committee.

► Have management review, update and approve plan.

► Execute plan.

Deployment Plan

Page 18: Hum w25 hum-w25

► Your technology, business requirements, and threats are constantly changing.

► Update content at least once a year with Steering Committee.

Update Content

Page 19: Hum w25 hum-w25
Page 20: Hum w25 hum-w25

► Give yourself time for planning (1-3 months) ► Don’t try everything at once, you have years

to develop your program ► If people do not like the training it will fail ► Share success stories

Key Lessons Learned

Page 21: Hum w25 hum-w25

► Humans are another operating system, one that nothing has been done to secure to date.

► By taking some basic steps you can go a long way in securing people by changing key behaviors.

Summary

Page 22: Hum w25 hum-w25

► Awareness Roadmap & Program Planning Kit ► Phishing Planning Kit ► Monthly OUCH! awareness newsletter ► Monthly awareness video ► Awareness presentations & posters ► Resources for gaining management support

www.securingthehuman.org/resources

Free Community Resources