SlideShare une entreprise Scribd logo
1  sur  33
Télécharger pour lire hors ligne
Creating a culture of cybersecurity
November 8, 2022
Confidential Information 2
A conversation with
Frederic Rivain
Chief Technology Officer
Dashlane
Confidential Information 3
Agenda
1. Welcome!
2. The cybersecurity landscape
3. It’s all about people
4. Cybersecurity doesn’t have to be difficult
5. Q&A and wrapping up
Confidential Information 4
Welcome!
Frederic Rivain, Chief Technology Officer
Confidential Information 5
The cybersecurity landscape
Confidential Information 6
Let’s face it…
Threats are everywhere, and
cybercriminals are notoriously adaptable.
Passwords are the path of least resistance
for cybercriminals, whether you’re a large
enterprise company, a small business, or a
nonprofit organization.
Change is the only constant when it comes
to cybercriminals. But a password
management system can help.
Confidential Information 7
Password quiz
What percent of people reuse passwords?
A. 23%
B. 44%
C. 63%
D. 72%
Confidential Information 8
Password quiz
How many people admitted to reusing
passwords from their personal accounts for
their work accounts?
A. 13%
B. 22%
C. 34%
D. 50%
Confidential Information 9
The metrics speak for themselves
In 2022, 82% of
breaches involved
the human element.
63% of people
reuse passwords
for other accounts.
22% of workers
admitted to reusing
passwords from their
personal accounts for
their work accounts.
Confidential Information 10
Passwords + sticky notes =
a disaster waiting to happen
In 2018, Hawaii’s Emergency Management Agency
accidentally broadcasted a false missile warning to
islanders, blaming it on an employee who pushed
the wrong button.
Shortly after, however, a newspaper photo came to
light. It showed one of the company’s operations
officers and a sticky note with a legible password in
the background.
There’s no evidence that the photographed
password contributed to the missile alert, but the
agency’s reputation suffered, and its security
practices came into question.
41%
of individuals write
down their passwords
SOURCE: “THE 2020 STATE OF PASSWORD AND AUTHENTICATION
SECURITY BEHAVIORS REPORT,” PONEMON
Confidential Information 11
Recent breaches with big impacts,
from big brands to nonprofits
Server or
cybersecurity
breach that could
have been prevented
by building a culture
of cybersecurity
Confidential Information 12
Data breach quiz
What percent of successful data breaches
do you think involve stolen or compromised
passwords?
A. 27%
B. 39%
C. 54%
D. 81%
Confidential Information 13
Why you need a password manager
Shared networks and cloud computing are
becoming the standard
Databases are rich with a donor’s PII
information
High turnover and volunteer-based support
lead to poor password health
Board members are taking cybersecurity
more seriously
Password managers help you stay secure and
focus on your #1 priority: your mission
81%
of successful data
breaches involve stolen or
compromised passwords
SOURCE: Verizon DBIR, 2019
Confidential Information 14
It’s all about people
Confidential Information 15
For employees, managing logins for
a multitude of accounts or donors can be
agonizing.
It’s understandable why many will turn to
unsecured methods just to get it over with.
Confidential Information 16
Common password pitfalls
Sharing logins among colleagues in
unsecured ways
Using weak, easy-to-hack passwords
Storing passwords in web browsers, sticky
notes, Excel, Google Sheets & Docs, etc.
Reusing personal usernames and
passwords for business
Confidential Information 17
Password managers
help improve security
—without disrupting
the work day.
Confidential Information 18
Employees want to be part
of the solution
Help them understand their impact
Educate them on best practices
Give them tools to make it easy
79%
of respondents said they take
some personal responsibility for
the organization’s overall security
SOURCE: “THE 2020 STATE OF PASSWORD AND AUTHENTICATION SECURITY BEHAVIORS
REPORT,” PONEMON
Confidential Information 19
Password manager must-haves
Simple & easy to use
A password manager that’s simple for
admins and employees to use will
greatly improve adoption rates.
Convenient
Features such as autofill and syncing
across devices aren’t just
convenient—they increase productivity.
Robust security
Look for a password manager that has a
strong track record of security.
SSO integration
Many organizations adopt SSO for better,
safer sharing capabilities.
Dark web monitoring
Make sure the password manager monitors
the criminal underground for your logins and
immediately alerts you to change your
impacted passwords.
Password health
Look for password health features to help
employees understand their habits while
helping admins uncover gaps and take
corrective measures.
Confidential Information 20
Worry less about password hygiene. And
focus more on creating meaningful
connections with donors, volunteers, and
partners.
Confidential Information 21
Building a culture of security
doesn’t have to be difficult
Confidential Information 22
Acceptance Continuance
Adoption
3 steps to creating a culture of security
Step 1: Step 2: Step 3:
Confidential Information 23
Adoption
Ensuring the adoption of a password manager
among the existing people at the organization by
communicating the value to the mission.
Step 1:
Confidential Information 24
Acceptance
Onboard anyone new to the organization
immediately to the password manager to ensure
password health in the organization remains strong.
Remember, it only takes one compromised login to start a
breach, just like Hawaii’s Emergency Management Agency!
Step 2:
Confidential Information 25
Continuance
Monitor organizational health by utilizing Dark Web
Monitoring and Password Health scores for optimal
protection and success of your mission.
Step 3:
Confidential Information 26
Case study:
How NETA gained total password protection
& gave clients and employees peace of mind
In 2020, more people were working virtually than ever, and
security risks were at an all-time high for every organization.
NETA was no exception. Operating across multiple states,
NETA’s employees rely on a hybrid working environment, and
the organization constantly monitors its domain for threats.
While some applications that NETA relies upon require
stronger passwords, their leadership needed to see which
passwords were being reused and how they were being shared.
● Increased its company-wide Password Health
score from 70 to 86 in just three months.
● Ensures that important data is always shared
privately and securely and that authorized
employees can get the access they need
when they need it— even if the original
account owner is out of office.
● Uses unique passwords everywhere and
decreased their fear of breaches. NETA’s
clients and employees can rest assured that
information is always safe and secure.
Source: NETA Case Study
With Dashlane, NETA:
Confidential Information 27
Case study:
How VillageReach built a culture of
cybersecurity with Dashlane
VillageReach is a nonprofit with an inspiring mission to drive
equity and bring scalable, sustainable healthcare solutions to
rural areas in low-income countries.
Dashlane’s impact was felt immediately. Today, the
organization’s password health has improved by 122%, and it
continues to climb thanks to secure password sharing.
In addition to achieving those goals, implementing Dashlane
helped VillageReach foster a culture of security awareness.
d.
With Dashlane, VillageReach:
● Has more time to focus on their mission while
hands-off security monitoring secures their
tech stack
● Identified and cleaned up weak spots in their
password hygiene that posed a threat to their
donor database.
● Changed the way the entire organization
thinks about security—using Dashlane to
springboard into security awareness and
making security everyone’s responsibility
Source: VillageReach Case Study
Confidential Information 28
Wrapping up
Confidential Information 29
Securing your mission has never been
easier—and Dashlane can help!
Confidential Information 30
Take the next step today
Confidential Information 31
Q&A
Confidential Information 32
Thank you!
You have any follow-up questions about this webinar, or your plan and its features, you can email us at
community_success@dashlane.com.
For live support, a chat session can be started from 09:00 am to 06:00 pm EST, Monday through Friday by visiting the main page of our
Help Center-https://support.dashlane.com/ -, and clicking the pink icon located in the bottom-right corner of the page. team.
Copyright © 2022 Dashlane

Contenu connexe

Similaire à Creating a culture of security.pdf

BLACKOPS_USCS CyberSecurity Literacy
BLACKOPS_USCS CyberSecurity LiteracyBLACKOPS_USCS CyberSecurity Literacy
BLACKOPS_USCS CyberSecurity Literacy
Casey Fleming
 
Continuing Education Conferance
Continuing Education ConferanceContinuing Education Conferance
Continuing Education Conferance
Tommy Riggins
 
A data-centric program
A data-centric program A data-centric program
A data-centric program
at MicroFocus Italy ❖✔
 

Similaire à Creating a culture of security.pdf (20)

Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.
 
BLACKOPS_USCS CyberSecurity Literacy
BLACKOPS_USCS CyberSecurity LiteracyBLACKOPS_USCS CyberSecurity Literacy
BLACKOPS_USCS CyberSecurity Literacy
 
How to assess your Cybersecurity Vulnerability_.pdf
How to assess your Cybersecurity Vulnerability_.pdfHow to assess your Cybersecurity Vulnerability_.pdf
How to assess your Cybersecurity Vulnerability_.pdf
 
How to assess your Cybersecurity Vulnerability_.pptx
How to assess your Cybersecurity Vulnerability_.pptxHow to assess your Cybersecurity Vulnerability_.pptx
How to assess your Cybersecurity Vulnerability_.pptx
 
Information Security Analyst Resume. When seeking
Information Security Analyst Resume. When seekingInformation Security Analyst Resume. When seeking
Information Security Analyst Resume. When seeking
 
6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back
 
Cultivate a stronger corporate culture to enhance cybersecurity
Cultivate a stronger corporate culture to enhance cybersecurityCultivate a stronger corporate culture to enhance cybersecurity
Cultivate a stronger corporate culture to enhance cybersecurity
 
Common Cybersecurity Mistakes
Common Cybersecurity MistakesCommon Cybersecurity Mistakes
Common Cybersecurity Mistakes
 
5 Security Tips to Protect Your Login Credentials and More
5 Security Tips to Protect Your Login Credentials and More5 Security Tips to Protect Your Login Credentials and More
5 Security Tips to Protect Your Login Credentials and More
 
6 Ways to Fight the Data Loss Gremlins
6 Ways to Fight the Data Loss Gremlins6 Ways to Fight the Data Loss Gremlins
6 Ways to Fight the Data Loss Gremlins
 
Responding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for MerchantsResponding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for Merchants
 
The Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
The Cloud 9 - Threat & Solutions 2016 by Bobby DominguezThe Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
The Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
 
Keep Up with the Demands of IT Security on a Nonprofit Budget
Keep Up with the Demands of IT Security on a Nonprofit BudgetKeep Up with the Demands of IT Security on a Nonprofit Budget
Keep Up with the Demands of IT Security on a Nonprofit Budget
 
Azure Security.pdf
Azure Security.pdfAzure Security.pdf
Azure Security.pdf
 
Azure security
Azure securityAzure security
Azure security
 
Continuing Education Conferance
Continuing Education ConferanceContinuing Education Conferance
Continuing Education Conferance
 
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptxTop_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
 
A data-centric program
A data-centric program A data-centric program
A data-centric program
 
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...
 
How to Connect Your Server Room to the Board Room – Before a Data Breach Occurs
How to Connect Your Server Room to the Board Room – Before a Data Breach OccursHow to Connect Your Server Room to the Board Room – Before a Data Breach Occurs
How to Connect Your Server Room to the Board Room – Before a Data Breach Occurs
 

Plus de TechSoup

Plus de TechSoup (20)

Introduction to TechSoup’s Digital Marketing Services and Use Cases
Introduction to TechSoup’s Digital Marketing  Services and Use CasesIntroduction to TechSoup’s Digital Marketing  Services and Use Cases
Introduction to TechSoup’s Digital Marketing Services and Use Cases
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Executive Directors Chat Embracing Diversity and Cultural Differences
Executive Directors Chat  Embracing Diversity and Cultural DifferencesExecutive Directors Chat  Embracing Diversity and Cultural Differences
Executive Directors Chat Embracing Diversity and Cultural Differences
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Building the Commons: Community Archiving & Decentralized Storage
Building the Commons: Community Archiving & Decentralized StorageBuilding the Commons: Community Archiving & Decentralized Storage
Building the Commons: Community Archiving & Decentralized Storage
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
Welcome to TechSoup - New Member Orientation and Q & A (April 2024)
Welcome to TechSoup - New Member Orientation and Q & A (April 2024)Welcome to TechSoup - New Member Orientation and Q & A (April 2024)
Welcome to TechSoup - New Member Orientation and Q & A (April 2024)
 
Executive Directors Chat Initiating Equity for Impact.pdf
Executive Directors Chat  Initiating Equity for Impact.pdfExecutive Directors Chat  Initiating Equity for Impact.pdf
Executive Directors Chat Initiating Equity for Impact.pdf
 
Set the Path Forward with Smart Technology Decisions.pdf
Set the Path Forward with Smart Technology Decisions.pdfSet the Path Forward with Smart Technology Decisions.pdf
Set the Path Forward with Smart Technology Decisions.pdf
 
What is the Future of QuickBooks DeskTop?
What is the Future of QuickBooks DeskTop?What is the Future of QuickBooks DeskTop?
What is the Future of QuickBooks DeskTop?
 
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdf
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdfMaximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdf
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdf
 
Hitting the Inbox: Email Authentication Changes and What You Need to Know
Hitting the Inbox: Email Authentication Changes and What You Need to KnowHitting the Inbox: Email Authentication Changes and What You Need to Know
Hitting the Inbox: Email Authentication Changes and What You Need to Know
 
Welcome to TechSoup New Member Orientation March 2024
Welcome to TechSoup New Member Orientation March 2024Welcome to TechSoup New Member Orientation March 2024
Welcome to TechSoup New Member Orientation March 2024
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Celebrate National Library Lovers Month with TechSoup! We love libraries!.pdf
Celebrate National Library Lovers Month with TechSoup! We love libraries!.pdfCelebrate National Library Lovers Month with TechSoup! We love libraries!.pdf
Celebrate National Library Lovers Month with TechSoup! We love libraries!.pdf
 
Google Ad Grants Services at TechSoup.pdf
Google Ad Grants Services at TechSoup.pdfGoogle Ad Grants Services at TechSoup.pdf
Google Ad Grants Services at TechSoup.pdf
 
Techsoup_ Prompt Strategy _ Template.docx.pdf
Techsoup_ Prompt Strategy _ Template.docx.pdfTechsoup_ Prompt Strategy _ Template.docx.pdf
Techsoup_ Prompt Strategy _ Template.docx.pdf
 
Ask the Exerts - Focus on AI Prompt Engineering.pdf
Ask the Exerts - Focus on AI Prompt Engineering.pdfAsk the Exerts - Focus on AI Prompt Engineering.pdf
Ask the Exerts - Focus on AI Prompt Engineering.pdf
 
Introduction to TechSoup’s Digital Marketing Services and Use Cases
Introduction to TechSoup’s Digital Marketing  Services and Use CasesIntroduction to TechSoup’s Digital Marketing  Services and Use Cases
Introduction to TechSoup’s Digital Marketing Services and Use Cases
 
Grantseeking Solo- Securing Awards with Limited Staff PDF.pdf
Grantseeking Solo- Securing Awards with Limited Staff  PDF.pdfGrantseeking Solo- Securing Awards with Limited Staff  PDF.pdf
Grantseeking Solo- Securing Awards with Limited Staff PDF.pdf
 

Dernier

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 

Dernier (20)

INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 

Creating a culture of security.pdf

  • 1. Creating a culture of cybersecurity November 8, 2022
  • 2. Confidential Information 2 A conversation with Frederic Rivain Chief Technology Officer Dashlane
  • 3. Confidential Information 3 Agenda 1. Welcome! 2. The cybersecurity landscape 3. It’s all about people 4. Cybersecurity doesn’t have to be difficult 5. Q&A and wrapping up
  • 4. Confidential Information 4 Welcome! Frederic Rivain, Chief Technology Officer
  • 5. Confidential Information 5 The cybersecurity landscape
  • 6. Confidential Information 6 Let’s face it… Threats are everywhere, and cybercriminals are notoriously adaptable. Passwords are the path of least resistance for cybercriminals, whether you’re a large enterprise company, a small business, or a nonprofit organization. Change is the only constant when it comes to cybercriminals. But a password management system can help.
  • 7. Confidential Information 7 Password quiz What percent of people reuse passwords? A. 23% B. 44% C. 63% D. 72%
  • 8. Confidential Information 8 Password quiz How many people admitted to reusing passwords from their personal accounts for their work accounts? A. 13% B. 22% C. 34% D. 50%
  • 9. Confidential Information 9 The metrics speak for themselves In 2022, 82% of breaches involved the human element. 63% of people reuse passwords for other accounts. 22% of workers admitted to reusing passwords from their personal accounts for their work accounts.
  • 10. Confidential Information 10 Passwords + sticky notes = a disaster waiting to happen In 2018, Hawaii’s Emergency Management Agency accidentally broadcasted a false missile warning to islanders, blaming it on an employee who pushed the wrong button. Shortly after, however, a newspaper photo came to light. It showed one of the company’s operations officers and a sticky note with a legible password in the background. There’s no evidence that the photographed password contributed to the missile alert, but the agency’s reputation suffered, and its security practices came into question. 41% of individuals write down their passwords SOURCE: “THE 2020 STATE OF PASSWORD AND AUTHENTICATION SECURITY BEHAVIORS REPORT,” PONEMON
  • 11. Confidential Information 11 Recent breaches with big impacts, from big brands to nonprofits Server or cybersecurity breach that could have been prevented by building a culture of cybersecurity
  • 12. Confidential Information 12 Data breach quiz What percent of successful data breaches do you think involve stolen or compromised passwords? A. 27% B. 39% C. 54% D. 81%
  • 13. Confidential Information 13 Why you need a password manager Shared networks and cloud computing are becoming the standard Databases are rich with a donor’s PII information High turnover and volunteer-based support lead to poor password health Board members are taking cybersecurity more seriously Password managers help you stay secure and focus on your #1 priority: your mission 81% of successful data breaches involve stolen or compromised passwords SOURCE: Verizon DBIR, 2019
  • 15. Confidential Information 15 For employees, managing logins for a multitude of accounts or donors can be agonizing. It’s understandable why many will turn to unsecured methods just to get it over with.
  • 16. Confidential Information 16 Common password pitfalls Sharing logins among colleagues in unsecured ways Using weak, easy-to-hack passwords Storing passwords in web browsers, sticky notes, Excel, Google Sheets & Docs, etc. Reusing personal usernames and passwords for business
  • 17. Confidential Information 17 Password managers help improve security —without disrupting the work day.
  • 18. Confidential Information 18 Employees want to be part of the solution Help them understand their impact Educate them on best practices Give them tools to make it easy 79% of respondents said they take some personal responsibility for the organization’s overall security SOURCE: “THE 2020 STATE OF PASSWORD AND AUTHENTICATION SECURITY BEHAVIORS REPORT,” PONEMON
  • 19. Confidential Information 19 Password manager must-haves Simple & easy to use A password manager that’s simple for admins and employees to use will greatly improve adoption rates. Convenient Features such as autofill and syncing across devices aren’t just convenient—they increase productivity. Robust security Look for a password manager that has a strong track record of security. SSO integration Many organizations adopt SSO for better, safer sharing capabilities. Dark web monitoring Make sure the password manager monitors the criminal underground for your logins and immediately alerts you to change your impacted passwords. Password health Look for password health features to help employees understand their habits while helping admins uncover gaps and take corrective measures.
  • 20. Confidential Information 20 Worry less about password hygiene. And focus more on creating meaningful connections with donors, volunteers, and partners.
  • 21. Confidential Information 21 Building a culture of security doesn’t have to be difficult
  • 22. Confidential Information 22 Acceptance Continuance Adoption 3 steps to creating a culture of security Step 1: Step 2: Step 3:
  • 23. Confidential Information 23 Adoption Ensuring the adoption of a password manager among the existing people at the organization by communicating the value to the mission. Step 1:
  • 24. Confidential Information 24 Acceptance Onboard anyone new to the organization immediately to the password manager to ensure password health in the organization remains strong. Remember, it only takes one compromised login to start a breach, just like Hawaii’s Emergency Management Agency! Step 2:
  • 25. Confidential Information 25 Continuance Monitor organizational health by utilizing Dark Web Monitoring and Password Health scores for optimal protection and success of your mission. Step 3:
  • 26. Confidential Information 26 Case study: How NETA gained total password protection & gave clients and employees peace of mind In 2020, more people were working virtually than ever, and security risks were at an all-time high for every organization. NETA was no exception. Operating across multiple states, NETA’s employees rely on a hybrid working environment, and the organization constantly monitors its domain for threats. While some applications that NETA relies upon require stronger passwords, their leadership needed to see which passwords were being reused and how they were being shared. ● Increased its company-wide Password Health score from 70 to 86 in just three months. ● Ensures that important data is always shared privately and securely and that authorized employees can get the access they need when they need it— even if the original account owner is out of office. ● Uses unique passwords everywhere and decreased their fear of breaches. NETA’s clients and employees can rest assured that information is always safe and secure. Source: NETA Case Study With Dashlane, NETA:
  • 27. Confidential Information 27 Case study: How VillageReach built a culture of cybersecurity with Dashlane VillageReach is a nonprofit with an inspiring mission to drive equity and bring scalable, sustainable healthcare solutions to rural areas in low-income countries. Dashlane’s impact was felt immediately. Today, the organization’s password health has improved by 122%, and it continues to climb thanks to secure password sharing. In addition to achieving those goals, implementing Dashlane helped VillageReach foster a culture of security awareness. d. With Dashlane, VillageReach: ● Has more time to focus on their mission while hands-off security monitoring secures their tech stack ● Identified and cleaned up weak spots in their password hygiene that posed a threat to their donor database. ● Changed the way the entire organization thinks about security—using Dashlane to springboard into security awareness and making security everyone’s responsibility Source: VillageReach Case Study
  • 29. Confidential Information 29 Securing your mission has never been easier—and Dashlane can help!
  • 30. Confidential Information 30 Take the next step today
  • 32. Confidential Information 32 Thank you! You have any follow-up questions about this webinar, or your plan and its features, you can email us at community_success@dashlane.com. For live support, a chat session can be started from 09:00 am to 06:00 pm EST, Monday through Friday by visiting the main page of our Help Center-https://support.dashlane.com/ -, and clicking the pink icon located in the bottom-right corner of the page. team.
  • 33. Copyright © 2022 Dashlane