SlideShare une entreprise Scribd logo
1  sur  17
© EXPRESSWORKS
Cyber security and Human Behaviors
Presenters: Hend Ezzeddine
Catherine Zaruba
Center for Medicare and Medicaid Services’ Security Control Oversight &
Update Training (CSCOUT) conference
Only amateurs attack machines;
professionals target people.
Bruce Schneier
Agenda
© EXPRESSWORKS
Why human error should be a
major concern?
How to integrate behavioral
change to reduce human error?
How to apply behavioral change
to reinforce cyber resilience?
4
With more connectivity comes more
risks…
Human error is a major concern
© EXPRESSWORKS
*Ponemon Institute, Fifth Annual Benchmark Study on Privacy & Security of Healthcare Data, May 2015
A comprehensive
identity-theft kit
containing a health
insurance record can be
worth as much as $1,000
Incidents among
healthcare payers and
providers soared 60%
over 2013,..an increase
that was almost double
that reported by all
industries.
Investment in
information security
increased 66% over
2013
5
Technology is not enough…
Human error is a major concern
88%
Spear phishing
70%
Biggest cyber security threat
in healthcare
40%
Root cause of the healthcare
organizations’ data breach
© EXPRESSWORKS
Cause of security
incidents
In healthcare
Employee negligence
Unintentional employee
action
*Ponemon Institute, Fifth Annual Benchmark Study on Privacy & Security of Healthcare Data, May 2015
6
Most organizations adopt a
fragmented response to cyber threats
Human error is a major concern
© EXPRESSWORKS
Use mobile devices
to exchange data
and provide
servicesHealthcare provider
The patient
Access
complete medical
records online
Healthcare payer
Lower cost and
speed payments
Security professional
Protect sensitive
data
Agenda
© EXPRESSWORKS
Why human error should be a
major concern?
How to integrate behavioral
change to reduce human error?
How to apply behavioral change
to reinforce cyber resilience?
8
Are you satisfied with every performance
aspect of your cyber security effort?
Integrating Behavioral change to reduce human error
© EXPRESSWORKS
Minimizing human errors calls
for a multi-disciplinary
approach to cyber security and
behavioral change is one of
them.
How to reduce human
errors?
Agenda
© EXPRESSWORKS
Why human error should be a
major concern?
How to integrate behavioral
change to reduce human error?
How to apply behavioral change
to reinforce cyber resilience?
10
Security related-behaviors are usually a
response to visual or informational
triggers
Applying behavioral change to reinforce cyber resilience
© EXPRESSWORKS
Train the
users to avoid
cyber
threats
Design of
Security
Technology
Reinforce
security
compliance
What human
behaviors
need to be
reinforced?
11
Apply Human Performance
engineering to your design
Applying behavioral change to reinforce cyber resilience
© EXPRESSWORKS
Active warning
Require the user to deliberately
decide accessing a web site or
downloading an attachment
Passive warning
Provide the user with a warning
message and the option to learn more
and/or disregard the warning
12
Use perceptual learning to effectively
train users
Applying behavioral change to reinforce cyber resilience
© EXPRESSWORKS
Spear phishing
training
Pay close attention to the
email address
Is the message personally
addressed to you?
Is there an immediate
action required from you?
.
Is there a link or an
attachment?
Train specific visual skills that require
split-second decisions.
13
Use “operational security” techniques
to keep your staff alert
Applying behavioral change to reinforce cyber resilience
© EXPRESSWORKS
Train them to
recognize pretexting
or social enginnering
incidents
Test them frequently
to help them
practice in real-time
and gain
consistency
Once they have
succeeded a few
times, they will
spread the word
14
Maintain compliance by promoting the
right behavior
Applying behavioral change to reinforce cyber resilience
© EXPRESSWORKS
This email is to notify you that it is
time to change your password.
Click here to change your
password.
Complying with our security
compliance will allow you to
maintain your access and keep
your data safe.
Please do your part in maintaining
that.
Did you know…
85% of our customers
comply with our
password change
policy.
Please do your part in
maintaining this high
performance compliance.
Social Proof - the
evidence of the
crowd. People’s
behavior is largely
shaped by the
behaviors of
others around
them.
Prospect
Theory- By
framing an
action as a gain
rather than a
loss makes
people more
likely to take it.
Email notification to change your
password
15
Integrating behavioral change is key to
reinforcing cyber resilience
Today’s key learning
© EXPRESSWORKS
I have diversified work
assignments and
access to the right
training.
I understand our
cybersecurity solution
and how to measure its
effectiveness.
I own cybersecurity for
myself and my
organization
I feel empowered to make
the right decisions and
can access the C-
suite/board as needed
16
Doing without doing…
Closing Comments
© EXPRESSWORKS
Once people adopt the
right behaviors,
complying with cyber
security will become a
second
nature…Everyone in
your organization will
know what to do with
minimum guidance.
Leonard Bernstein
Haydn Symphony No 88
17
We are ready for your questions…
Thank you for your attention
© EXPRESSWORKS

Contenu connexe

Tendances

04-1 E-commerce Security slides
04-1 E-commerce Security slides04-1 E-commerce Security slides
04-1 E-commerce Security slides
monchai sopitka
 
Cybersecurity Awareness Training Presentation v2021.08
Cybersecurity Awareness Training Presentation v2021.08Cybersecurity Awareness Training Presentation v2021.08
Cybersecurity Awareness Training Presentation v2021.08
DallasHaselhorst
 
Spoofing
SpoofingSpoofing
Spoofing
Sanjeev
 
Cyber Security –PPT
Cyber Security –PPTCyber Security –PPT
Cyber Security –PPT
Rajat Kumar
 
CCNA Security - Chapter 1
CCNA Security - Chapter 1CCNA Security - Chapter 1
CCNA Security - Chapter 1
Irsandi Hasan
 
Importance Of A Security Policy
Importance Of A Security PolicyImportance Of A Security Policy
Importance Of A Security Policy
charlesgarrett
 

Tendances (20)

04-1 E-commerce Security slides
04-1 E-commerce Security slides04-1 E-commerce Security slides
04-1 E-commerce Security slides
 
Cybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppCybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureApp
 
Secure coding practices
Secure coding practicesSecure coding practices
Secure coding practices
 
Cybersecurity Awareness Training Presentation v2021.08
Cybersecurity Awareness Training Presentation v2021.08Cybersecurity Awareness Training Presentation v2021.08
Cybersecurity Awareness Training Presentation v2021.08
 
Spoofing
SpoofingSpoofing
Spoofing
 
Hiring for cybersecurity
Hiring for cybersecurityHiring for cybersecurity
Hiring for cybersecurity
 
Security architecture
Security architectureSecurity architecture
Security architecture
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
 
Cyber Security –PPT
Cyber Security –PPTCyber Security –PPT
Cyber Security –PPT
 
Secure coding practices
Secure coding practicesSecure coding practices
Secure coding practices
 
Cyber Security Best Practices
Cyber Security Best PracticesCyber Security Best Practices
Cyber Security Best Practices
 
Introduction to Software Security and Best Practices
Introduction to Software Security and Best PracticesIntroduction to Software Security and Best Practices
Introduction to Software Security and Best Practices
 
E Commerce security
E Commerce securityE Commerce security
E Commerce security
 
CCNA Security - Chapter 1
CCNA Security - Chapter 1CCNA Security - Chapter 1
CCNA Security - Chapter 1
 
Cybersecurity & Project Management
Cybersecurity & Project ManagementCybersecurity & Project Management
Cybersecurity & Project Management
 
Digital signature(Cryptography)
Digital signature(Cryptography)Digital signature(Cryptography)
Digital signature(Cryptography)
 
Importance Of A Security Policy
Importance Of A Security PolicyImportance Of A Security Policy
Importance Of A Security Policy
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Information security governance
Information security governanceInformation security governance
Information security governance
 
Cloud security Presentation
Cloud security PresentationCloud security Presentation
Cloud security Presentation
 

En vedette

DissertaRoberto Suse versão final
DissertaRoberto Suse versão finalDissertaRoberto Suse versão final
DissertaRoberto Suse versão final
Roberto Suse
 
The internet
The internetThe internet
The internet
eshell12
 
Total Manufacturing Excellence Conference - Eqypt
Total Manufacturing Excellence Conference  - EqyptTotal Manufacturing Excellence Conference  - Eqypt
Total Manufacturing Excellence Conference - Eqypt
Syed Ashar Ali
 
Tesi di Laurea Triennale preview
Tesi di Laurea Triennale previewTesi di Laurea Triennale preview
Tesi di Laurea Triennale preview
Enrica Fontana
 
Brains, Games & Behavior Change
Brains, Games & Behavior ChangeBrains, Games & Behavior Change
Brains, Games & Behavior Change
Dustin DiTommaso
 
What Is CareBooker? The Service Provider Edition
What Is CareBooker? The Service Provider EditionWhat Is CareBooker? The Service Provider Edition
What Is CareBooker? The Service Provider Edition
CareBooker.com
 

En vedette (20)

Austin Bsides March 2016 Cyber Presentation
Austin Bsides March 2016 Cyber PresentationAustin Bsides March 2016 Cyber Presentation
Austin Bsides March 2016 Cyber Presentation
 
Design for behavioral change (by David Pas)
Design for behavioral change (by David Pas)Design for behavioral change (by David Pas)
Design for behavioral change (by David Pas)
 
Autism Network for Global Education and Lifelong Support
Autism Network for Global Education and Lifelong SupportAutism Network for Global Education and Lifelong Support
Autism Network for Global Education and Lifelong Support
 
DissertaRoberto Suse versão final
DissertaRoberto Suse versão finalDissertaRoberto Suse versão final
DissertaRoberto Suse versão final
 
FISICA - caceda , chavarry
FISICA - caceda , chavarryFISICA - caceda , chavarry
FISICA - caceda , chavarry
 
Business Today: Tomorrow's Goliaths
Business Today:  Tomorrow's GoliathsBusiness Today:  Tomorrow's Goliaths
Business Today: Tomorrow's Goliaths
 
Charity Drive Report
Charity Drive ReportCharity Drive Report
Charity Drive Report
 
The internet
The internetThe internet
The internet
 
Awareness is only the first step
Awareness is only the first stepAwareness is only the first step
Awareness is only the first step
 
Total Manufacturing Excellence Conference - Eqypt
Total Manufacturing Excellence Conference  - EqyptTotal Manufacturing Excellence Conference  - Eqypt
Total Manufacturing Excellence Conference - Eqypt
 
Measuring Sustainability Performance
Measuring Sustainability PerformanceMeasuring Sustainability Performance
Measuring Sustainability Performance
 
Tesi di Laurea Triennale preview
Tesi di Laurea Triennale previewTesi di Laurea Triennale preview
Tesi di Laurea Triennale preview
 
Brains, Games & Behavior Change
Brains, Games & Behavior ChangeBrains, Games & Behavior Change
Brains, Games & Behavior Change
 
Shaping Behavior by Design SxSW 2016
Shaping Behavior by Design SxSW 2016Shaping Behavior by Design SxSW 2016
Shaping Behavior by Design SxSW 2016
 
Don’t judge a book by its cover
Don’t judge a book by its coverDon’t judge a book by its cover
Don’t judge a book by its cover
 
Agile concepts and opportunities for contract management r walters
Agile concepts and opportunities for contract management  r walters Agile concepts and opportunities for contract management  r walters
Agile concepts and opportunities for contract management r walters
 
Cancheck
CancheckCancheck
Cancheck
 
Rj1
Rj1Rj1
Rj1
 
What Is CareBooker? The Service Provider Edition
What Is CareBooker? The Service Provider EditionWhat Is CareBooker? The Service Provider Edition
What Is CareBooker? The Service Provider Edition
 
ICP DAS USA Full Catalog
ICP DAS USA Full CatalogICP DAS USA Full Catalog
ICP DAS USA Full Catalog
 

Similaire à Expressworks Perspective on Human Behavior and Cyber Security

Cyber resilience itsm academy_april2015
Cyber resilience itsm academy_april2015Cyber resilience itsm academy_april2015
Cyber resilience itsm academy_april2015
ITSM Academy, Inc.
 
Writing Portfolio
Writing PortfolioWriting Portfolio
Writing Portfolio
Perry Ah
 

Similaire à Expressworks Perspective on Human Behavior and Cyber Security (20)

Cyber resilience itsm academy_april2015
Cyber resilience itsm academy_april2015Cyber resilience itsm academy_april2015
Cyber resilience itsm academy_april2015
 
End User Security Awareness Presentation
End User Security Awareness PresentationEnd User Security Awareness Presentation
End User Security Awareness Presentation
 
Writing Portfolio
Writing PortfolioWriting Portfolio
Writing Portfolio
 
Trustwave: 7 Experts on Transforming Your Threat Detection & Response Strategy
Trustwave: 7 Experts on Transforming Your Threat Detection & Response StrategyTrustwave: 7 Experts on Transforming Your Threat Detection & Response Strategy
Trustwave: 7 Experts on Transforming Your Threat Detection & Response Strategy
 
Enhancing Cyber Security Awareness: Building a Safer Digital World
Enhancing Cyber Security Awareness: Building a Safer Digital WorldEnhancing Cyber Security Awareness: Building a Safer Digital World
Enhancing Cyber Security Awareness: Building a Safer Digital World
 
5 Best Practices For Network Security
5 Best Practices For Network Security5 Best Practices For Network Security
5 Best Practices For Network Security
 
ISACA talk - cybersecurity and security culture
ISACA talk - cybersecurity and security cultureISACA talk - cybersecurity and security culture
ISACA talk - cybersecurity and security culture
 
WeDo Technologies Blog 2014
WeDo Technologies Blog 2014WeDo Technologies Blog 2014
WeDo Technologies Blog 2014
 
Securing Wearable Device Data
Securing Wearable Device DataSecuring Wearable Device Data
Securing Wearable Device Data
 
10 Ways For Mitigating Cybersecurity Risks In Project Management.docx
10 Ways For Mitigating Cybersecurity Risks In Project Management.docx10 Ways For Mitigating Cybersecurity Risks In Project Management.docx
10 Ways For Mitigating Cybersecurity Risks In Project Management.docx
 
The Science of Security
The Science of SecurityThe Science of Security
The Science of Security
 
10 Most Important Strategies for Cybersecurity Risk Mitigation.pdf
10 Most Important Strategies for Cybersecurity Risk Mitigation.pdf10 Most Important Strategies for Cybersecurity Risk Mitigation.pdf
10 Most Important Strategies for Cybersecurity Risk Mitigation.pdf
 
Employee Awareness in Cyber Security - Kloudlearn
Employee Awareness in Cyber Security - KloudlearnEmployee Awareness in Cyber Security - Kloudlearn
Employee Awareness in Cyber Security - Kloudlearn
 
KnowBe4-Presentation-Overview.pdf
KnowBe4-Presentation-Overview.pdfKnowBe4-Presentation-Overview.pdf
KnowBe4-Presentation-Overview.pdf
 
Protecting the Core of Your Network
Protecting the Core of Your Network Protecting the Core of Your Network
Protecting the Core of Your Network
 
Under cyber attack: EY's Global information security survey 2013
Under cyber attack: EY's Global information security survey 2013Under cyber attack: EY's Global information security survey 2013
Under cyber attack: EY's Global information security survey 2013
 
Information Security Awareness And Training Business Case For Web Based Solut...
Information Security Awareness And Training Business Case For Web Based Solut...Information Security Awareness And Training Business Case For Web Based Solut...
Information Security Awareness And Training Business Case For Web Based Solut...
 
Symantec cyber-resilience
Symantec cyber-resilienceSymantec cyber-resilience
Symantec cyber-resilience
 
Cultivate a stronger corporate culture to enhance cybersecurity
Cultivate a stronger corporate culture to enhance cybersecurityCultivate a stronger corporate culture to enhance cybersecurity
Cultivate a stronger corporate culture to enhance cybersecurity
 
Ey giss-under-cyber-attack
Ey giss-under-cyber-attackEy giss-under-cyber-attack
Ey giss-under-cyber-attack
 

Dernier

Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
dlhescort
 
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
amitlee9823
 
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
daisycvs
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
Abortion pills in Kuwait Cytotec pills in Kuwait
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
amitlee9823
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
dollysharma2066
 
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
amitlee9823
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
lizamodels9
 
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Anamikakaur10
 
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service NoidaCall Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
dlhescort
 
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
lizamodels9
 

Dernier (20)

Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
 
Malegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Malegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceMalegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Malegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
 
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
 
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
 
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
 
(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7
(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7
(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
Business Model Canvas (BMC)- A new venture concept
Business Model Canvas (BMC)-  A new venture conceptBusiness Model Canvas (BMC)-  A new venture concept
Business Model Canvas (BMC)- A new venture concept
 
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
 
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
PHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation Final
 
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service NoidaCall Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
 
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
 
JAYNAGAR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
JAYNAGAR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLJAYNAGAR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
JAYNAGAR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
 

Expressworks Perspective on Human Behavior and Cyber Security

  • 1. © EXPRESSWORKS Cyber security and Human Behaviors Presenters: Hend Ezzeddine Catherine Zaruba Center for Medicare and Medicaid Services’ Security Control Oversight & Update Training (CSCOUT) conference
  • 2. Only amateurs attack machines; professionals target people. Bruce Schneier
  • 3. Agenda © EXPRESSWORKS Why human error should be a major concern? How to integrate behavioral change to reduce human error? How to apply behavioral change to reinforce cyber resilience?
  • 4. 4 With more connectivity comes more risks… Human error is a major concern © EXPRESSWORKS *Ponemon Institute, Fifth Annual Benchmark Study on Privacy & Security of Healthcare Data, May 2015 A comprehensive identity-theft kit containing a health insurance record can be worth as much as $1,000 Incidents among healthcare payers and providers soared 60% over 2013,..an increase that was almost double that reported by all industries. Investment in information security increased 66% over 2013
  • 5. 5 Technology is not enough… Human error is a major concern 88% Spear phishing 70% Biggest cyber security threat in healthcare 40% Root cause of the healthcare organizations’ data breach © EXPRESSWORKS Cause of security incidents In healthcare Employee negligence Unintentional employee action *Ponemon Institute, Fifth Annual Benchmark Study on Privacy & Security of Healthcare Data, May 2015
  • 6. 6 Most organizations adopt a fragmented response to cyber threats Human error is a major concern © EXPRESSWORKS Use mobile devices to exchange data and provide servicesHealthcare provider The patient Access complete medical records online Healthcare payer Lower cost and speed payments Security professional Protect sensitive data
  • 7. Agenda © EXPRESSWORKS Why human error should be a major concern? How to integrate behavioral change to reduce human error? How to apply behavioral change to reinforce cyber resilience?
  • 8. 8 Are you satisfied with every performance aspect of your cyber security effort? Integrating Behavioral change to reduce human error © EXPRESSWORKS Minimizing human errors calls for a multi-disciplinary approach to cyber security and behavioral change is one of them. How to reduce human errors?
  • 9. Agenda © EXPRESSWORKS Why human error should be a major concern? How to integrate behavioral change to reduce human error? How to apply behavioral change to reinforce cyber resilience?
  • 10. 10 Security related-behaviors are usually a response to visual or informational triggers Applying behavioral change to reinforce cyber resilience © EXPRESSWORKS Train the users to avoid cyber threats Design of Security Technology Reinforce security compliance What human behaviors need to be reinforced?
  • 11. 11 Apply Human Performance engineering to your design Applying behavioral change to reinforce cyber resilience © EXPRESSWORKS Active warning Require the user to deliberately decide accessing a web site or downloading an attachment Passive warning Provide the user with a warning message and the option to learn more and/or disregard the warning
  • 12. 12 Use perceptual learning to effectively train users Applying behavioral change to reinforce cyber resilience © EXPRESSWORKS Spear phishing training Pay close attention to the email address Is the message personally addressed to you? Is there an immediate action required from you? . Is there a link or an attachment? Train specific visual skills that require split-second decisions.
  • 13. 13 Use “operational security” techniques to keep your staff alert Applying behavioral change to reinforce cyber resilience © EXPRESSWORKS Train them to recognize pretexting or social enginnering incidents Test them frequently to help them practice in real-time and gain consistency Once they have succeeded a few times, they will spread the word
  • 14. 14 Maintain compliance by promoting the right behavior Applying behavioral change to reinforce cyber resilience © EXPRESSWORKS This email is to notify you that it is time to change your password. Click here to change your password. Complying with our security compliance will allow you to maintain your access and keep your data safe. Please do your part in maintaining that. Did you know… 85% of our customers comply with our password change policy. Please do your part in maintaining this high performance compliance. Social Proof - the evidence of the crowd. People’s behavior is largely shaped by the behaviors of others around them. Prospect Theory- By framing an action as a gain rather than a loss makes people more likely to take it. Email notification to change your password
  • 15. 15 Integrating behavioral change is key to reinforcing cyber resilience Today’s key learning © EXPRESSWORKS I have diversified work assignments and access to the right training. I understand our cybersecurity solution and how to measure its effectiveness. I own cybersecurity for myself and my organization I feel empowered to make the right decisions and can access the C- suite/board as needed
  • 16. 16 Doing without doing… Closing Comments © EXPRESSWORKS Once people adopt the right behaviors, complying with cyber security will become a second nature…Everyone in your organization will know what to do with minimum guidance. Leonard Bernstein Haydn Symphony No 88
  • 17. 17 We are ready for your questions… Thank you for your attention © EXPRESSWORKS

Notes de l'éditeur

  1. People’s behaviors are currently a major source of cyber security threats.
  2. Source: 1. PwC, The Global State of Information Security Survey, 2015 2. Dell SecureWorks, Hackers Sell Health Insurance Credentials, Bank Accounts, SSNs and Counterfeit Documents, for over $1,000 Per Dossier, July 15, 2013 3. PwC, The Global State of Information Security Survey, 2015
  3. A closer look at the nature of cyber security incidents pinpoints that relying on technology is not enough. Most of incidents are not caused by a technological failure, but human errors that could have been prevented through a more holistic approach.
  4. Technology-centric and compliance-driven cybersecurity initiatives deepen the gap between the need to protect company assets and the reliance on connectivity to thrive as a business. This gap is what drives the wrong human behavior and increase human errors, putting the entire organization at risk. When the solutions include the people side, cybersecurity becomes everyone’s responsibility.
  5. Software and Hardware performance is what most companies focus on Human performance relates to adopting the right culture, expressed through safe behaviors Process Performance relates to the operating model of your cyber security approach Leadership performance relates to the commitment and support provided by the C-suite and the board
  6. Focusing on human behavior when designing cyber security technologies, training users on cyber threats and reinforcing compliance is widely recognized as a key element of success. When users are given the tools to recognize cyber threats, they are able to behave in the right way.
  7. Consider which type of security warnings will be most effective in triggering the right behaviors. For example, active warnings will require the user to deliberately decide accessing a web site or downloading an attachment.
  8. Perceptual learning in humans occurs when a person is repeatedly exposed to specific stimuli (information). Perceptual learning involves long lasting and amazing changes to the human perceptual system that incredibly improve one’s ability to respond to the environment.
  9. When training your users or your business partners, use scenario based training that puts individuals under the test. By training them frequently, you will use the effect of “being watched” to your advantage: users are more alert and want to pass the test every single time.
  10. When behavioral science is applied to your communication, you will be able to maximize the effectiveness of your message
  11. Video: Leonard conducting w/o moving a figure because everyone already knows what to do… (from TEDTalk on leadership – he’s there and moving his head, but it’s not very intense. Make sure you link back with the very first slide as we opened up the presentation with one of his quotes ***If you’re on a Mac*** Watch from 2:22s to 3:32s : https://www.youtube.com/watch?v=oU0Ubs2KYUI
  12. Video: Leonard conducting w/o moving a figure because everyone already knows what to do… (from TEDTalk on leadership – he’s there and moving his head, but it’s not very intense. Make sure you link back with the very first slide as we opened up the presentation with one of his quotes ***If you’re on a Mac*** Watch from 2:22s to 3:32s : https://www.youtube.com/watch?v=oU0Ubs2KYUI