the evolving world of cybersecurity

32
The Evolving World of Cybersecurity Christopher J. Luise Executive Vice President, ADNET Technologies, LLC

Upload: adnet-technologies

Post on 16-Apr-2017

243 views

Category:

Technology


1 download

TRANSCRIPT

Page 1: The Evolving World of Cybersecurity

The Evolving World of Cybersecurity

Christopher J. Luise

Executive Vice President, ADNET Technologies, LLC

Page 2: The Evolving World of Cybersecurity

Generational Leadership

Organizational Educational

Remediation

Page 3: The Evolving World of Cybersecurity

Other23%

BYOD30%

Regulatory Compliance

21%

Cloud Computing

26%

Trends Shaping Security Strategies

Source // SC Magazine, 2014

Page 4: The Evolving World of Cybersecurity

Let’s pick on Millennials

GENERATIONALDIFFERENCES

Generational

Page 5: The Evolving World of Cybersecurity

They think the office is obsoleteWho needs a cubicle when you have a laptopand free Wi-Fi at your local Starbucks?

Page 6: The Evolving World of Cybersecurity

They’re always connected77% of adult millennials own a smartphoneThe average owner spends an average of 14.5 hours per week texting, talking and using social media.

Page 7: The Evolving World of Cybersecurity

They live their lives onlineTwo-thirds of millennials admit to having no sense of personal privacy.

Source // This Digital Life Report, Havas Worldwide

Page 8: The Evolving World of Cybersecurity

Even if they THINK of themselvesas being private by nature…

Page 9: The Evolving World of Cybersecurity

Fear-Provoking Question:If some of your employees have no sense of personal privacy, why should you expect them to value privacy of your data?

Page 10: The Evolving World of Cybersecurity

Because we can’t actually blame Millennials

CHANGING CULTURELeading by Example

Leadership

Page 11: The Evolving World of Cybersecurity

A fish rots

FROM THE HEAD

Page 12: The Evolving World of Cybersecurity

Fear-Provoking Question:Do your top executives adhere to the same security protocols as the rest of your employees are expected to?

Page 13: The Evolving World of Cybersecurity

31% of Data Breachesare caused by employees sending emails or faxes to the wrong party.

24% of Data Breachesare caused by employees losing physical records.

Page 14: The Evolving World of Cybersecurity

Only 11% of Data Breacheswere caused by spyware or malware in 2014.

Page 15: The Evolving World of Cybersecurity

Spyware and Malware Breaches Cost MoreForensic and investigative services can be 4.5x more costly than employee data disclosure.

But what about the intangible costs?

Page 16: The Evolving World of Cybersecurity

38% of Customers Affected by Breachessaid they no longer conducted business with the at-fault organization.

46% of Customers Affected by Breachessaid they would warn their family and friends against sharing data with the organization.

Page 17: The Evolving World of Cybersecurity

Six secondsThe amount of time needed for someone with a smartphone to broadcast your data to the world.

Source // vine.comCredit for Find: Connecticut Employment Law Blog, Daniel Schwartz

Page 18: The Evolving World of Cybersecurity

Infusing data privacy

INTO YOUR CULTUREAccountability and Response

Organizational

Page 19: The Evolving World of Cybersecurity

Fear-Provoking Question:Do you know what information your employees have access to? Are you sure?

Page 20: The Evolving World of Cybersecurity

Fear-Provoking Question:Do you have any way of knowing if sensitive data has left your “building?”

Page 21: The Evolving World of Cybersecurity

Self-Deluding Belief:Data security and privacy is the job of the Security Officer.

Self-Deluding Sub-Belief:We have a Security Officer, so our data must be secure.

Page 22: The Evolving World of Cybersecurity

Training is not optional

CONSTANT CHANGETo know is to survive

Educational

Page 23: The Evolving World of Cybersecurity

“Fear is like junk food –

It can sustain you for a bit, but in the long run

it’s not healthy.”

– Julie Peeler, ISC2

Page 24: The Evolving World of Cybersecurity

Fear-Provoking Question:When was the last time you conducted security awareness training for your entire firm?

Page 25: The Evolving World of Cybersecurity

Finding a balance

PRIVACY/FREEDOMGenerational needs vs. lockdown

Page 26: The Evolving World of Cybersecurity

It’s not if, it’s when

Cyber CrimeBe prepared for the inevitable

Remediation

Page 27: The Evolving World of Cybersecurity

110

MILLION

IMPACTED

CUSTOMERS

Pin Numbers

Credit + Debit Card Numbers

Email Address

Name

Mailing Address

INFORMATION STOLEN

Page 28: The Evolving World of Cybersecurity

TARGET BREACH: HOW DID IT HAPPEN?Target allowed a third party access to its networks and hackers took advantage of it.

Page 29: The Evolving World of Cybersecurity

INFORMATION SECURITY CONTROLS

Page 30: The Evolving World of Cybersecurity

INCIDENT RESPONSE – DATA SECURITY PARADIGM SHIFT

Page 31: The Evolving World of Cybersecurity

Talk To Me

@ITwithValue

@ChristopherLuise

[email protected]

@TechWorx

Page 32: The Evolving World of Cybersecurity

@ADNETTech

@ADNETTechnologiesLLC

@ADNETTechnologiesLLC

www.thinkADNET.com