think before you link - cpni.gov.uk · (dv) how? approaching individuals online offering...

9
Think before you link + + + + Senior briefing pack Branding

Upload: others

Post on 25-May-2020

3 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Think before you link - cpni.gov.uk · (DV) How? Approaching individuals online offering ‘unique’ business opportunities Paul Dawson Accept Ignore More… Don’t Data Engineer

Think beforeyou link

+

+

+

+

Senior briefing pack

Branding

Page 2: Think before you link - cpni.gov.uk · (DV) How? Approaching individuals online offering ‘unique’ business opportunities Paul Dawson Accept Ignore More… Don’t Data Engineer

1. What is the threat?2. Key advice3. Benefits of the campaign4. Campaign materials5. Time and resourcing

Overview

Page 3: Think before you link - cpni.gov.uk · (DV) How? Approaching individuals online offering ‘unique’ business opportunities Paul Dawson Accept Ignore More… Don’t Data Engineer

The Threat

What? Hostile actors using online platforms to approach individuals.

Why? Recruitment of UK and Western nationals to act as agents to provide them with sensitive intelligence.

Who? Those who:• Identify as an employee or member

of HMG or Civil Service• Identify as working in the private

sector or academia with access to classified or commercially sensitive technology or research either directly or indirectly (such as the defence industry)

• Mention that they have security clearances, especially Security Cleared (SC) or Developed Vetting (DV)

How? Approaching individuals online offering ‘unique’ business opportunities

Paul Dawson

Accept Ignore More…

Don’t

Data Engineer at FGH DefenceLondon, Greater London, United Kingdom

Government

Ashby School

See contact info

460 contacts

Page 4: Think before you link - cpni.gov.uk · (DV) How? Approaching individuals online offering ‘unique’ business opportunities Paul Dawson Accept Ignore More… Don’t Data Engineer

Advice given– the 4 R’s

Also how to not make yourself a target online in the first place.

R ecognisethe profile?

R

R

R

ealisethe potential threat

eportto your Security Manager

emovethem from your network

Page 5: Think before you link - cpni.gov.uk · (DV) How? Approaching individuals online offering ‘unique’ business opportunities Paul Dawson Accept Ignore More… Don’t Data Engineer

Why is this relevent to you?

• It raises awareness of the threat amongst staff

• Motivates users to be vigilant and take appropriate action

• Encourages users to take action to prevent making themselves a target online

• The consequences of engaging with these profiles can be extremely damaging

• It makes it harder for malicious profiles to use social and professional networks to target individuals.

Page 6: Think before you link - cpni.gov.uk · (DV) How? Approaching individuals online offering ‘unique’ business opportunities Paul Dawson Accept Ignore More… Don’t Data Engineer

Campaign materials

Think beforeyou link

+

++

+

Guide for organisations

Branding

©2018 AML Group . 101 St John St, Clerkenwell, London EC1M 4AS, UK . 020 3056 7080 . aml-group.com Simple ideas for complicated businessesCPNI0043-malicious-profiles

Wallet cards

Guidance for staff

Guidance for organisations

Staff slide decks

Poster sets

Wallet cards

Case studies

Think beforeyou link

+

+

+

+

Online networking guidance

Branding

Crown copyright

Crown copyright

©2018 AML Group . 101 St John St, Clerkenwell, London EC1M 4AS, UK . 020 3056 7080 . aml-group.com Simple ideas for complicated businessesCPNI0043-malicious-profiles

logos here

Think beforeyou link

+

++

+

Connecting with unknown profiles on social media can put you and your organisation at risk. To stay safe from suspect profiles, remember the 4Rs:

Poster

Recognise the profile?Realise the potential threat.Report to your Security Manager.Remove them from your network.

Page 7: Think before you link - cpni.gov.uk · (DV) How? Approaching individuals online offering ‘unique’ business opportunities Paul Dawson Accept Ignore More… Don’t Data Engineer

Time and resources

Pre-campaign Live campaign Post-campaign4-6 weeks 12 weeks 4 weeks post-campaign

Activities Resources Activities Resources Activities Resources

• Stakeholder engagement • Senior Briefing packs • Briefings to key staff • Staff briefing packs • Evaluate reporting statistics • CPNI Embedding Security Behaviours Using the 5Es

• Gain senior Buy-in • Organisation guide • Communications from senior figures/relevant experts

• Posters • Post-campaign surveys or focus groups

• CPNI Guidance: Evaluation Guide for Internal Security Behaviour Campaigns

• Develop a communications plan

• CPNI Embedding Security Behaviours Using the 5Es

• Launch poster materials • Staff guide • Monitor other feedback channels

• Organisation Guide

• Prepare or adapt materials • Embed briefings and materials into existing delivery mechanisms (e.g. new joiners)

• Flyer • Maintain upkeep of campaign materials for ongoing security briefings (e.g. induction, leavers).

• Review reporting mechanisms

• Case studies

• Baseline evaluation metrics • Supporting materials

Page 8: Think before you link - cpni.gov.uk · (DV) How? Approaching individuals online offering ‘unique’ business opportunities Paul Dawson Accept Ignore More… Don’t Data Engineer

Posters with 4 R’s

©2018 AML Group . 101 St John St, Clerkenwell, London EC1M 4AS, UK . 020 3056 7080 . aml-group.com Simple ideas for complicated businessesCPNI0043-malicious-profiles

logos here

Think beforeyou link

+

++

+

Connecting with unknown profiles on social media can put you and your organisation at risk. To stay safe from suspect profiles, remember the 4Rs:

Poster

Recognise the profile?Realise the potential threat.Report to your Security Manager.Remove them from your network.

©2018 AML Group . 101 St John St, Clerkenwell, London EC1M 4AS, UK . 020 3056 7080 . aml-group.com Simple ideas for complicated businessesCPNI0043-malicious-profiles

logos here

Connection or con?

+

+

+

Your new connections aren’t always who they say, and this can put you and your organisation at risk. To stay safe from suspect profiles, remember the 4Rs:

Recognise the profile?Realise the potential threat.Report to your Security Manager.Remove them from your network.

+

+

+

Page 9: Think before you link - cpni.gov.uk · (DV) How? Approaching individuals online offering ‘unique’ business opportunities Paul Dawson Accept Ignore More… Don’t Data Engineer

Any questions?