SlideShare une entreprise Scribd logo
1  sur  17
ElementsThat Comprise a “Secure Network”
Presenter: Ray Gasnick III
Director of IT Engineering
MilesTechnologies
 “Secure” networks aren’t just
those comprised of multi-
factor authentication
mechanisms and multiple
layers of firewalls.
 In the past 10 years per the Privacy Rights
Clearinghouse:
 534 breaches were due to insider access
 771 breaches were due to “accidental” disclosure
 1066 breaches were due to hacking or malware
 1822 breaches were due to physical loss
(electronic or non-electronic)
Source: http://www.privacyrights.org/data-breach/new
 The biggest risks to most
networks are NOT “evil”
hackers on the internet.
 Most compromises stem
from the users themselves
either misusing their
authority or “leaking” data
accidentally.
 In most organizations, access is
governed in a hierarchal fashion.
 Despite this, someone usually
has greater access due to
responsibility.
 The “honor” system is all that
governs this/these users.
 If a user isn’t entrusted with access to
sensitive data, he or she may be able to
coerce information leakage with
perceived authority.
 Examples:
 Name dropping of managers to subordinate
employees
 Downright requests for information by hiding
the real purpose
 Another very common method for
data leakage is social engineering.
 Takes on the form of:
 Calls
 Phishing Emails
 The most brazen would
show up in person
 Leverages some technique to coerce an
employee to divulge information:
 Tailgating
 Outright asking for
the information
 Perceived authority
 Assumed access
 Empathy
 All of these avenues of attack cannot be stopped
even with the most sophisticated firewalls in
the world.
 Everybody “assumes”
they could never be
duped into handing
over information from
a social attack.
 Awareness/Education
is the best method for
prevention.
 Smaller companies are less susceptible.
 There is generally a higher degree of awareness
when someone/something is out of the ordinary.
 Larger companies are more likely to fall victim to
social tactics.
 There is a higher degree of anonymity between
departments if they do not interact regularly.
 Distinguish employees from visitors
(badges, sign in sheet, etc.).
 Promote an environment where it is
acceptable to clarify when a request
sounds unusual.
 Ensure that sensitive “data” is
secured by some means.
 Ensure that those who are
custodians for sensitive data are
known.
 Employee awareness is the
best defense but it is not a
one-time deal.
 Recurring training sessions
are the best way to keep
secure practices fresh in
everyone’s minds.
Webinar: Cybersecurity Elements that Comprise a Secure Network
Webinar: Cybersecurity Elements that Comprise a Secure Network

Contenu connexe

En vedette

Brain-based webinars with Dan Yaman (omNovia's Webinar Expert Series)
Brain-based webinars with Dan Yaman (omNovia's Webinar Expert Series)Brain-based webinars with Dan Yaman (omNovia's Webinar Expert Series)
Brain-based webinars with Dan Yaman (omNovia's Webinar Expert Series)omNovia Technologies
 
Better Payroll Days Ahead with Automated, Cloud-Based Time and Attendance
Better Payroll Days Ahead with Automated, Cloud-Based Time and AttendanceBetter Payroll Days Ahead with Automated, Cloud-Based Time and Attendance
Better Payroll Days Ahead with Automated, Cloud-Based Time and Attendancenettime solutions
 
כנס מדבר יהודה לדורותיו 2005 2015 חלק שני
כנס מדבר יהודה לדורותיו 2005 2015 חלק שניכנס מדבר יהודה לדורותיו 2005 2015 חלק שני
כנס מדבר יהודה לדורותיו 2005 2015 חלק שניOmer Koreh
 
#BusinessMadeEasy
#BusinessMadeEasy#BusinessMadeEasy
#BusinessMadeEasyWinWeb
 
ATRA Expo Talk 2014 - Future Trends
ATRA Expo Talk 2014 - Future TrendsATRA Expo Talk 2014 - Future Trends
ATRA Expo Talk 2014 - Future TrendsProfitBoost
 
DMA - Art of Targeting and Personalization
DMA -  Art of Targeting and PersonalizationDMA -  Art of Targeting and Personalization
DMA - Art of Targeting and PersonalizationeClerx
 

En vedette (6)

Brain-based webinars with Dan Yaman (omNovia's Webinar Expert Series)
Brain-based webinars with Dan Yaman (omNovia's Webinar Expert Series)Brain-based webinars with Dan Yaman (omNovia's Webinar Expert Series)
Brain-based webinars with Dan Yaman (omNovia's Webinar Expert Series)
 
Better Payroll Days Ahead with Automated, Cloud-Based Time and Attendance
Better Payroll Days Ahead with Automated, Cloud-Based Time and AttendanceBetter Payroll Days Ahead with Automated, Cloud-Based Time and Attendance
Better Payroll Days Ahead with Automated, Cloud-Based Time and Attendance
 
כנס מדבר יהודה לדורותיו 2005 2015 חלק שני
כנס מדבר יהודה לדורותיו 2005 2015 חלק שניכנס מדבר יהודה לדורותיו 2005 2015 חלק שני
כנס מדבר יהודה לדורותיו 2005 2015 חלק שני
 
#BusinessMadeEasy
#BusinessMadeEasy#BusinessMadeEasy
#BusinessMadeEasy
 
ATRA Expo Talk 2014 - Future Trends
ATRA Expo Talk 2014 - Future TrendsATRA Expo Talk 2014 - Future Trends
ATRA Expo Talk 2014 - Future Trends
 
DMA - Art of Targeting and Personalization
DMA -  Art of Targeting and PersonalizationDMA -  Art of Targeting and Personalization
DMA - Art of Targeting and Personalization
 

Dernier

MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 

Dernier (20)

MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 

Webinar: Cybersecurity Elements that Comprise a Secure Network

  • 1. ElementsThat Comprise a “Secure Network” Presenter: Ray Gasnick III Director of IT Engineering MilesTechnologies
  • 2.
  • 3.  “Secure” networks aren’t just those comprised of multi- factor authentication mechanisms and multiple layers of firewalls.
  • 4.  In the past 10 years per the Privacy Rights Clearinghouse:  534 breaches were due to insider access  771 breaches were due to “accidental” disclosure  1066 breaches were due to hacking or malware  1822 breaches were due to physical loss (electronic or non-electronic) Source: http://www.privacyrights.org/data-breach/new
  • 5.
  • 6.
  • 7.  The biggest risks to most networks are NOT “evil” hackers on the internet.  Most compromises stem from the users themselves either misusing their authority or “leaking” data accidentally.
  • 8.  In most organizations, access is governed in a hierarchal fashion.  Despite this, someone usually has greater access due to responsibility.  The “honor” system is all that governs this/these users.
  • 9.  If a user isn’t entrusted with access to sensitive data, he or she may be able to coerce information leakage with perceived authority.  Examples:  Name dropping of managers to subordinate employees  Downright requests for information by hiding the real purpose
  • 10.  Another very common method for data leakage is social engineering.  Takes on the form of:  Calls  Phishing Emails  The most brazen would show up in person
  • 11.  Leverages some technique to coerce an employee to divulge information:  Tailgating  Outright asking for the information  Perceived authority  Assumed access  Empathy  All of these avenues of attack cannot be stopped even with the most sophisticated firewalls in the world.
  • 12.  Everybody “assumes” they could never be duped into handing over information from a social attack.  Awareness/Education is the best method for prevention.
  • 13.  Smaller companies are less susceptible.  There is generally a higher degree of awareness when someone/something is out of the ordinary.  Larger companies are more likely to fall victim to social tactics.  There is a higher degree of anonymity between departments if they do not interact regularly.
  • 14.  Distinguish employees from visitors (badges, sign in sheet, etc.).  Promote an environment where it is acceptable to clarify when a request sounds unusual.  Ensure that sensitive “data” is secured by some means.  Ensure that those who are custodians for sensitive data are known.
  • 15.  Employee awareness is the best defense but it is not a one-time deal.  Recurring training sessions are the best way to keep secure practices fresh in everyone’s minds.

Notes de l'éditeur

  1. and other such electronic counter measures
  2. AllClearID is $14.95/month or roughly $180/year/person. If all 35k from the Lowes breach were to utilize it, for 1 year it would have cost Lowes $6.2M
  3. social engineering (not to be confused with social networking)
  4. Not really true though since most victims will never even known that such an attack was underway
  5. Ensure that those who are custodians for sensitive data are known Also understand their degree of access