SlideShare une entreprise Scribd logo
1  sur  49
Télécharger pour lire hors ligne
Maximizing	
  ROI	
  through	
  Security	
  
Training	
  
Who	
  am	
  I?	
  
•  VP	
  /	
  Co-­‐Founder	
  of	
  Symosis,	
  10+	
  years	
  in	
  
informaFon	
  security	
  consulFng	
  &	
  Training,	
  
USC,	
  Foundstone,	
  McAfee,	
  Accuvant,	
  C-­‐Level	
  
security,	
  etc	
  
•  Invited	
  speaker,	
  author	
  and	
  educator	
  
•  MBA,	
  MS	
  Comp	
  Sc,	
  CISM,	
  CISA,	
  CISSP	
  
Table	
  of	
  Contents	
  
•  Business	
  case	
  for	
  security	
  
•  Evolving	
  threats	
  
•  How	
  to	
  build	
  an	
  effecFve	
  training	
  program?	
  
•  Case	
  Studies	
  
The	
  Business	
  Case	
  for	
  Security	
  
	
   	
  
	
   Proper	
  security	
  enables	
  a	
  
company	
  to	
  meet	
  its	
  business	
  
objec-ve	
  by	
  providing	
  a	
  safe	
  and	
  
secure	
  environment	
  
Impact	
  of	
  Security	
  Breaches	
  
Loss	
  of	
  Revenue	
   Damage	
  to	
  ReputaFon	
  
Loss	
  or	
  Compromise	
  of	
  
Data	
  
Damage	
  to	
  Investor	
  
Confidence	
  
Legal	
  Consequences	
  
InterrupFon	
  of	
  Business	
  
Processes	
  
Damage	
  to	
  Customer	
  
Confidence	
  
Dollar	
  Amount	
  Of	
  Loss	
  
	
   The	
  cost	
  of	
  implemenFng	
  security	
  measures	
  is	
  not	
  trivial;	
  
however,	
  it	
  is	
  a	
  fracFon	
  of	
  the	
  cost	
  of	
  miFgaFng	
  security	
  
compromises	
  
*	
  CSI	
  2006	
  
Cost	
  of	
  Security	
  Breach	
  
*	
  Aberdeen	
  Group	
  August	
  2010	
  
Security	
  Breach	
  Example	
  Costs	
  
Cost	
  of	
  Recent	
  Customer	
  Records	
  Breach	
  
•  $6.5	
  Million:	
  DSW	
  Warehouse	
  Costs	
  from	
  Data	
  Thea	
  
•  $5.7	
  Million:	
  BJ’s	
  Wholesale	
  Club	
  from	
  Data	
  Breach	
  
AddiFonal	
  impact/cost	
  due	
  to	
  lost	
  customers	
  
•  20%	
  of	
  customers	
  have	
  ended	
  a	
  relaFonship	
  with	
  a	
  
company	
  aaer	
  being	
  noFfied	
  of	
  a	
  breach	
  (Ponemon	
  
InsFtute)	
  
•  58%	
  said	
  the	
  breach	
  decreased	
  their	
  sense	
  of	
  trust	
  and	
  
confidence	
  in	
  the	
  organizaFon	
  reporFng	
  the	
  incident	
  
TOC	
  
•  Business	
  case	
  for	
  security	
  
•  Evolving	
  threats	
  
•  How	
  to	
  build	
  an	
  effecFve	
  training	
  program?	
  
•  Case	
  Studies	
  
Emerging	
  Threats	
  -­‐	
  Aiack	
  Methods	
  
*	
  SANS	
  2010	
  
Emerging	
  Threats	
  -­‐	
  ApplicaFon	
  
Weaknesses	
  
*	
  SANS	
  2010	
  
Emerging	
  Threats	
  
GLOBAL
Infrastructure
Impact
REGIONAL
Networks
MULTIPLE
Networks
INDIVIDUAL
Networks
INDIVIDUAL
Computer
Target and Scope
of Damage
Rapidly Escalating Threat to Businesses
First Gen
 Boot
viruses
Weeks
Second Gen
 Macro
viruses
 Denial of
Service
Days
Third Gen
 Distributed
Denial of
Service
 Application
threats
 Malware
Minutes
Next Gen
 Flash
threats
 Massive
“bot”-driven
DDoS
 Damaging
payload
worms
Seconds
1980s 1990s Today Future
13	
  
Emerging	
  Threats	
  Categories	
  
Malware
Botnets
Threats to VOIP and
mobile convergence
Cyber warfare
Data thefts
Threats becoming increasingly difficult to detect and mitigate
THREATSEVERITY
1990 1995 2000 2005 WHAT’S NEXT?
FINANCIAL
Theft & Damage
FAME
Viruses and Malware
TESTING THE WATERS
Basic Intrusions and Viruses
TOC	
  
•  Business	
  case	
  for	
  security	
  
•  Evolving	
  threats	
  
•  How	
  to	
  build	
  an	
  effec-ve	
  training	
  program?	
  
•  Case	
  Studies	
  
Why	
  Security	
  Training	
  
•  Reduce accidental security breaches
•  Improve employee behaviour
•  Enable organization to hold employees
accountable for their actions
•  Build in-depth knowledge to design,
implement, or operate security programs for
organizations & systems
•  Develop skills & knowledge so that computer
users can perform their jobs while using IT
systems more securely
Why	
  Security	
  Training?	
  
•  Dissemination & enforcement of policy
become easier when training & awareness
programs are in place
•  Demonstrating due care & diligence can
help indemnify the institution against
lawsuits
•  By improving awareness of the need to
protect system resources
How	
  is	
  InformaFon	
  Security	
  
JusFfied?	
  
PWC	
  security	
  survey	
  2011	
  
Step	
  1:	
  Define	
  Training	
  ObjecFves	
  
•  Compliance,	
  RegulaFons	
  and	
  Governance	
  
•  Client	
  /	
  Partner	
  requirements	
  
•  Increase	
  the	
  general	
  level	
  of	
  security	
  awareness	
  
•  Reduce	
  the	
  incidences	
  of	
  computer	
  fraud,	
  waste	
  
and	
  abuse	
  
•  Create	
  a	
  more	
  security	
  savvy	
  workforce	
  	
  
•  Design,	
  develop	
  and	
  maintain	
  secure	
  IT	
  
infrastructure	
  and	
  applicaFons	
  
PCI	
  Compliance	
  
	
   All	
  service	
  providers	
  with	
  which	
  cardholder	
  
data	
  is	
  shared	
  must	
  adhere	
  to	
  the	
  PCI	
  DSS	
  
requirements	
  and	
  must	
  sign	
  an	
  agreement	
  
acknowledging	
  that	
  the	
  service	
  provider	
  is	
  
responsible	
  for	
  the	
  security	
  of	
  cardholder	
  data	
  
the	
  provider	
  possesses.	
  
PCI	
  Compliance	
  
Payment	
  Card	
  Industry	
  (PCI)	
  Data	
  Security	
  
Standard	
  mandates	
  security	
  awareness	
  
program	
  that	
  
	
   12.6.1:	
  Educate	
  employees	
  upon	
  hire	
  and	
  at	
  
least	
  annually	
  	
  
	
   12.6.2:	
  Require	
  employees	
  to	
  annually	
  
acknowledge	
  in	
  wriFng	
  that	
  they	
  have	
  read	
  
and	
  understood	
  the	
  company's	
  security	
  policy	
  
and	
  procedure	
  	
  
HIPAA	
  Compliance	
  
	
   The	
  Health	
  Insurance	
  Portability	
  and	
  
Accountability	
  Act	
  of	
  1996	
  (HIPAA)	
  mandates	
  that	
  
Covered	
  EnFFes,	
  which	
  includes	
  health	
  plans,	
  
healthcare	
  clearinghouses,	
  and	
  most	
  healthcare	
  
providers,	
  may	
  not	
  use	
  or	
  disclose	
  individuals’	
  
health	
  informaFon	
  for	
  purposes	
  unrelated	
  to	
  
providing	
  health-­‐	
  care,	
  managing	
  their	
  
organizaFon,	
  or	
  meeFng	
  their	
  obligaFons	
  under	
  
state	
  and	
  federal	
  law,	
  unless	
  individuals	
  
specifically	
  authorize	
  them	
  to	
  do	
  so.	
  	
  
HIPAA	
  Compliance	
  
	
   Ensuring	
  all	
  employees	
  	
  including	
  
management,	
  agents	
  and	
  contractors	
  in	
  an	
  
organizaFon	
  understand	
  and	
  uphold	
  these	
  
rules	
  is	
  no	
  easy	
  task	
  and	
  is,	
  to	
  a	
  large	
  degree,	
  a	
  
training	
  and	
  management	
  problem.	
  This	
  is	
  
why	
  the	
  Department	
  of	
  Health	
  and	
  Human	
  
Services	
  (HHS)	
  has	
  mandated	
  annual	
  privacy	
  
and	
  security	
  training,	
  as	
  well	
  as	
  regular	
  
reminders	
  for	
  all	
  employees.	
  
HIPAA	
  Compliance	
  
•  Upper	
  Management	
  Training	
  
•  Security	
  Awareness	
  Day	
  
•  Security	
  Awareness	
  and	
  Ongoing	
  Training	
  for	
  
all	
  staff	
  
•  Computer	
  Users’	
  Supervisor	
  Training	
  
•  Security	
  “MarkeFng”	
  Efforts	
  
•  Annual	
  System-­‐specific	
  training	
  
•  Professional	
  EducaFon	
  Training	
  
GLBA	
  Compliance	
  
	
   Gramm-­‐Leach-­‐Bliley	
  Act	
  of	
  1999	
  Employee	
  
Training	
  Requirements	
  mandates	
  IT	
  Security	
  
Awareness	
  Training	
  for	
  all	
  employees	
  of	
  financial	
  
service	
  providers	
  (FSPs)	
  covered	
  by	
  the	
  GLB	
  act,	
  
which	
  includes	
  all	
  companies	
  "engaging	
  in	
  
financial	
  acFviFes.”	
  
GLBA	
  Compliance	
  
•  Examples	
  of	
  organizaFons	
  who	
  are	
  affected	
  by	
  
these	
  rules	
  include	
  	
  
– insurance	
  agencies	
  	
  
– tax	
  preparers	
  	
  
– finance	
  companies	
  
– collecFons	
  agencies	
  
– leasing	
  agencies	
  	
  
– travel	
  agencies	
  	
  
– financial	
  advisors	
  	
  
ISO	
  27002	
  
•  ISO	
  27002	
  is	
  an	
  internaFonally	
  recognized	
  
standard	
  published	
  by	
  the	
  InternaFonal	
  
OrganizaFon	
  for	
  StandardizaFon	
  covering	
  
informaFon	
  security	
  best	
  pracFces.	
  Many	
  global	
  
organizaFons	
  use	
  this	
  comprehensive	
  standard	
  to	
  
gauge	
  their	
  informaFon	
  security	
  programs.	
  	
  
•  Provide	
  an	
  adequate	
  level	
  of	
  security	
  educaFon	
  	
  
and	
  training	
  to	
  your	
  organizaFon’s	
  employees,	
  
contractors	
  and	
  third	
  party	
  users	
  
FISMA	
  	
  
•  Federal	
  InformaFon	
  Security	
  Management	
  Act	
  
(FISMA)	
  is	
  Title	
  III	
  of	
  the	
  E-­‐Government	
  ACT,	
  
which	
  requires	
  federal	
  agencies	
  to	
  develop,	
  
document,	
  and	
  implement	
  a	
  comprehensive	
  
agency-­‐wide	
  informaFon	
  security	
  program.	
  	
  
•  Part	
  of	
  such	
  a	
  program	
  is	
  security	
  training	
  
program	
  that	
  educates	
  personnel,	
  including	
  
contractors	
  and	
  other	
  users,	
  of	
  their	
  
responsibiliFes	
  in	
  maintaining	
  informaFon	
  
security,	
  complying	
  with	
  organizaFonal	
  policies	
  
and	
  procedures,	
  and	
  reducing	
  the	
  risks	
  associated	
  
with	
  their	
  acFviFes	
  	
  
Red	
  Flag	
  Thea	
  PrevenFon	
  
•  Under	
  the	
  new	
  Red	
  Flag	
  regulaFons,	
  financial	
  
insFtuFons	
  and	
  creditors	
  must	
  develop	
  a	
  wriien	
  
program	
  that	
  idenFfies	
  and	
  detects	
  the	
  relevant	
  
warning	
  signs	
  (Red	
  Flags)	
  of	
  idenFty	
  thea,	
  such	
  as	
  
unusual	
  account	
  acFvity,	
  fraud	
  alerts	
  on	
  a	
  
consumer	
  report,	
  or	
  aiempted	
  use	
  of	
  suspicious	
  
account	
  applicaFon	
  documents,	
  
•  Includes	
  appropriate	
  staff	
  training	
  and	
  oversight	
  
of	
  any	
  service	
  providers	
  
SOX	
  (Sarbanes	
  Oxley)	
  
•  Sarbanes	
  Oxley	
  requires	
  the	
  CEO	
  and	
  CFO	
  of	
  
publicly	
  traded	
  companies	
  to	
  be	
  held	
  accountable	
  
for	
  financial	
  statements	
  filed	
  with	
  the	
  SecuriFes	
  
and	
  Exchange	
  Commission	
  and	
  includes	
  criminal	
  
penalFes	
  for	
  false	
  cerFficaFon	
  	
  
•  Top	
  management	
  must	
  ensure	
  that	
  there	
  are	
  
adequate	
  'internal	
  controls'	
  to	
  ensure	
  reliable	
  
financial	
  reporFng	
  and	
  protect	
  financial	
  data	
  that	
  
resides	
  in	
  informaFon	
  systems	
  
Step	
  2:	
  Assess	
  Needs	
  
•  IdenFfy	
  training	
  administrator	
  	
  
– Primary	
  responsibility	
  lies	
  with	
  Chief	
  InformaFon	
  
Security	
  Officer,	
  top	
  management	
  and	
  security	
  
team	
  
Assess	
  Needs	
  
•  Who	
  needs	
  to	
  be	
  trained	
  and	
  on	
  what?	
  	
  
– All	
  stakeholders:	
  Security	
  Awareness	
  Training,	
  
Compliance	
  
– Program	
  Managers	
  –	
  Architecture	
  &	
  Design	
  	
  
– Architects	
  &	
  Developers	
  –	
  Threats,	
  coding	
  
mistakes,	
  secure	
  soaware	
  development	
  	
  
– Testers	
  /	
  QA	
  –	
  Security	
  Test	
  Cases	
  	
  
Assess	
  Needs
FuncFonal	
  
Background	
  
General	
  User	
  
Managerial	
  
User	
  
Technical	
  
User	
  
Skill	
  Level	
  
Novice	
  
Intermediate	
  
Expert	
  
Using wrong training
methods can:
 Hinder transfer of
knowledge
 Lead to unnecessary
expense
& frustrated, poorly
trained employees
Step	
  3:	
  Key	
  Factors	
  
•  Build	
  vs.	
  Buy	
  
•  Classroom	
  /	
  Instructor	
  Led	
  
•  CBT	
  /	
  Web	
  Based	
  
•  Generic	
  vs.	
  Customized	
  
•  HosFng	
  
Build	
  vs.	
  Buy	
  
• Business	
  needs	
  are	
  unique	
  
• Internal	
  capability	
  available	
  
• Proprietary	
  informaFon	
  or	
  
data	
  needs	
  to	
  be	
  protected;	
  
• Complexity	
  of	
  interface	
  with	
  
company's	
  LMS	
  	
  
• No	
  COTS	
  products	
  or	
  too	
  
costly	
  
Build	
  
• Reduce	
  and	
  control	
  operaFng	
  
costs	
  
• Free	
  internal	
  resources	
  	
  
• Gain	
  access	
  to	
  external	
  
capabiliFes	
  
• Resources	
  constraints	
  
• Improve	
  company	
  focus	
  
• Share	
  risks	
  
Buy	
  
Key	
  consideraFons	
  -­‐	
  cost,	
  quality,	
  and	
  timeline	
  
Costs	
  
•  “How	
  to	
  Spend	
  a	
  Dollar	
  on	
  Security”	
  recommends	
  that	
  
out	
  of	
  every	
  security	
  dollar	
  you	
  spend:	
  
– 15	
  cents:	
  Policy	
  
– 40	
  cents:	
  Awareness	
  
– 10	
  cents:	
  Risk	
  Assessment	
  	
  
– 20	
  cents:	
  Technology	
  	
  
– 15	
  cents:	
  Process	
  
•  We	
  have	
  seen	
  it	
  done	
  from	
  anywhere	
  between	
  $5K	
  to	
  
$5M	
  annual	
  costs	
  
Patrick	
  McBride	
  –	
  ComputerWorld	
  	
  
Classroom	
  /	
  Instructor	
  Led	
  
•  Study	
  away	
  from	
  the	
  office	
  at	
  another	
  locaFon	
  
with	
  Fme	
  set	
  aside	
  dedicated	
  to	
  learning	
  a	
  new	
  
course	
  (and	
  in	
  some	
  cases,	
  for	
  cerFficaFon,	
  siyng	
  
of	
  an	
  exam)	
  
•  Costs	
  are	
  more	
  expensive	
  as	
  it	
  involves	
  the	
  course	
  
fees,	
  travel,	
  accommodaFon	
  and	
  other	
  expenses	
  
•  Access	
  to	
  a	
  trainer	
  for	
  the	
  duraFon	
  of	
  the	
  course	
  
(and	
  someFmes	
  for	
  a	
  limited	
  period	
  aaer	
  the	
  
course)	
  
•  Access	
  to	
  other	
  students	
  during	
  the	
  course	
  and	
  as	
  
a	
  potenFal	
  networking	
  group	
  aaer	
  the	
  course	
  
Computer	
  /	
  Web	
  Based	
  
•  Individuals	
  can	
  study	
  at	
  their	
  own	
  Fme	
  and	
  pace	
  thereby	
  
learning	
  at	
  a	
  rate	
  that	
  they	
  are	
  comfortable	
  with	
  
•  Lower	
  costs	
  –	
  CBT	
  is	
  much	
  more	
  cost	
  effecFve	
  than	
  
classroom	
  training.	
  MulF-­‐user	
  opFon	
  allow	
  a	
  company	
  to	
  
train	
  more	
  than	
  one	
  person	
  with	
  the	
  same	
  budget	
  or	
  less	
  
than	
  sending	
  on	
  a	
  classroom	
  course	
  	
  
•  Combines	
  the	
  “best	
  bits	
  of	
  classroom	
  training”	
  such	
  as	
  the	
  
video	
  clips	
  of	
  instructor	
  sessions	
  with	
  the	
  “best	
  bits	
  of	
  
reference	
  material”	
  such	
  as	
  technical	
  informaFon	
  and	
  
pracFce	
  quesFons	
  to	
  provide	
  a	
  great	
  all	
  round	
  training	
  
experience	
  which	
  is	
  beneficial	
  to	
  both	
  student	
  and	
  
employer	
  at	
  the	
  best	
  price	
  available.	
  
Generic	
  vs.	
  Customized	
  
•  Generic	
  training	
  is	
  cost	
  effecFve	
  and	
  focuses	
  
on	
  core	
  security	
  issues,	
  OWASP	
  Top	
  10	
  threats,	
  
etc	
  
•  CustomizaFon	
  provides	
  training	
  that	
  matches	
  
specific	
  needs	
  for	
  content,	
  compleFon	
  
requirements,	
  quiz,	
  policies,	
  and	
  even	
  
employee	
  responsibility	
  acknowledgment.	
  
HosFng	
  
•  Web	
  based	
  training	
  could	
  be	
  hosted	
  internally	
  
or	
  provided	
  as	
  soaware	
  as	
  a	
  service	
  (SAAS)	
  	
  
•  Internal	
  hosFng	
  provides	
  greater	
  control	
  but	
  
could	
  be	
  resource	
  and	
  cost	
  intensive	
  
•  SAAS	
  service	
  is	
  oaen	
  turn	
  key	
  but	
  may	
  limit	
  
scalability	
  and	
  usage	
  
Step	
  4:	
  Metrics	
  
•  Quiz	
  and	
  survey	
  results	
  
•  Content	
  
•  People	
  
Metrics	
  -­‐	
  Quiz	
  and	
  survey	
  results	
  
•  Score	
  Results:	
  How	
  did	
  people	
  score?	
  
•  Answer	
  Breakdown:	
  How	
  did	
  people	
  answer?	
  
•  Aiempt	
  Detail:	
  How	
  did	
  a	
  user	
  answer?	
  
Metrics	
  -­‐	
  Content	
  
•  AcFvity:	
  What	
  was	
  the	
  acFvity	
  for	
  a	
  content	
  
item?	
  
•  Traffic:	
  How	
  oaen	
  was	
  an	
  item	
  viewed?	
  
•  Progress:	
  How	
  many	
  slides	
  did	
  people	
  view?	
  
•  Popular	
  Content:	
  Which	
  content	
  was	
  viewed	
  
the	
  most?	
  
Metrics	
  -­‐	
  People	
  
•  Group	
  AcFvity:	
  What	
  content	
  did	
  a	
  group	
  
view?	
  
•  User	
  AcFvity:	
  What	
  content	
  did	
  a	
  user	
  view?	
  
•  AcFve	
  Groups:	
  Who	
  were	
  my	
  most	
  acFve	
  
groups?	
  
•  AcFve	
  Users:	
  Who	
  were	
  my	
  most	
  acFve	
  users?	
  
•  Guestbook	
  Responses:	
  What	
  were	
  the	
  
responses	
  to	
  a	
  guestbook?	
  
TOC	
  
•  Business	
  case	
  for	
  security	
  
•  Evolving	
  threats	
  
•  How	
  to	
  build	
  an	
  effecFve	
  training	
  program?	
  
•  Case	
  Studies	
  
Case	
  Study	
  1	
  -­‐	
  Project	
  management	
  
and	
  custom	
  soaware	
  company	
  
•  Challenge:	
  	
  
– Ensure	
  secure	
  coding	
  elements	
  have	
  been	
  taught	
  	
  
– Prevent	
  top	
  10	
  threats	
  and	
  miFgaFon	
  techniques	
  
– Meet	
  a	
  Fme	
  sensiFve	
  requirement	
  under	
  a	
  DoD	
  
contract	
  	
  
•  SoluFon:	
  	
  	
  
– Implement	
  best	
  pracFces	
  soaware	
  security	
  training	
  
for	
  Java	
  
– Provide	
  access	
  to	
  training	
  on	
  demand	
  from	
  a	
  SaaS	
  
model	
  
•  Challenge	
  
– Improve	
  soaware	
  quality	
  by	
  eliminaFng	
  common	
  
mistakes	
  
– Provide	
  foundaFon	
  for	
  everyone	
  to	
  ‘own’	
  security	
  
•  SoluFon	
  
– Create	
  custom	
  course	
  based	
  on	
  previously	
  idenFfied	
  
risk	
  and	
  miFgaFon	
  
– Integrate	
  security	
  cases	
  into	
  QA	
  lifecycle	
  
– Measure	
  year	
  over	
  year	
  declines	
  in	
  security	
  related	
  
CRs	
  
•  Challenge:	
  	
  
– Meet	
  PCI	
  compliance	
  for	
  integraFng	
  secure	
  coding	
  
pracFces	
  
•  SoluFon	
  
– Implement	
  JAVA/.NET	
  secure	
  coding	
  pracFces	
  
– Address	
  PCI	
  Cardholder	
  Data	
  requirements	
  within	
  
applicaFon	
  development	
  
Thanks	
  for	
  listening…	
  
QuesFons?	
  
Try	
  out	
  free	
  Symosis	
  training	
  at	
  hip://
www.symosis.com	
  	
  

Contenu connexe

Tendances

Cyber Security Tips and Resources for Financial Institutions
Cyber Security Tips and Resources for Financial InstitutionsCyber Security Tips and Resources for Financial Institutions
Cyber Security Tips and Resources for Financial InstitutionsColleen Beck-Domanico
 
CTPAT and Cybersecurity.
CTPAT and Cybersecurity.  CTPAT and Cybersecurity.
CTPAT and Cybersecurity. Dan Petrosini
 
Preparing to recover from a cyber attack
Preparing to recover from a cyber attackPreparing to recover from a cyber attack
Preparing to recover from a cyber attackAllan Cytryn
 
Risk Management
Risk ManagementRisk Management
Risk Managementijtsrd
 
Security Risk Management: ovvero come mitigare e gestire i rischi dei dati at...
Security Risk Management: ovvero come mitigare e gestire i rischi dei dati at...Security Risk Management: ovvero come mitigare e gestire i rischi dei dati at...
Security Risk Management: ovvero come mitigare e gestire i rischi dei dati at...festival ICT 2016
 
Cyber-risk Oversight Handbook for Corporate Boards
Cyber-risk Oversight Handbook for Corporate BoardsCyber-risk Oversight Handbook for Corporate Boards
Cyber-risk Oversight Handbook for Corporate BoardsCheffley White
 
How To Set Security Awareness Strategic Goals, KPIs and Metrics
How To Set Security Awareness Strategic Goals, KPIs and MetricsHow To Set Security Awareness Strategic Goals, KPIs and Metrics
How To Set Security Awareness Strategic Goals, KPIs and MetricsTerranova Security
 
What CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber SecurityWhat CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber SecurityKaryl Scott
 
Man and Machine -- Forming a Perfect Union to Mature Security Programs -- Key...
Man and Machine -- Forming a Perfect Union to Mature Security Programs -- Key...Man and Machine -- Forming a Perfect Union to Mature Security Programs -- Key...
Man and Machine -- Forming a Perfect Union to Mature Security Programs -- Key...Inno Eroraha [NetSecurity]
 
Archer Users Group / Southern Risk Council 2016 Enterprise Risk Management an...
Archer Users Group / Southern Risk Council 2016 Enterprise Risk Management an...Archer Users Group / Southern Risk Council 2016 Enterprise Risk Management an...
Archer Users Group / Southern Risk Council 2016 Enterprise Risk Management an...Phil Agcaoili
 
Shaping Your Future in Banking Cybersecurity
Shaping Your Future in Banking Cybersecurity Shaping Your Future in Banking Cybersecurity
Shaping Your Future in Banking Cybersecurity Dawn Yankeelov
 
Cyber Client Alert
Cyber Client AlertCyber Client Alert
Cyber Client AlertGraeme Cross
 
Construction Cyber Risks
Construction Cyber RisksConstruction Cyber Risks
Construction Cyber RisksGraeme Cross
 
Regional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi Kenya
Regional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi KenyaRegional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi Kenya
Regional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi KenyaMartin M
 
Cyber Security Strategies and Approaches
Cyber Security Strategies and ApproachesCyber Security Strategies and Approaches
Cyber Security Strategies and Approachesvngundi
 

Tendances (20)

Cyber Security Tips and Resources for Financial Institutions
Cyber Security Tips and Resources for Financial InstitutionsCyber Security Tips and Resources for Financial Institutions
Cyber Security Tips and Resources for Financial Institutions
 
CTPAT and Cybersecurity.
CTPAT and Cybersecurity.  CTPAT and Cybersecurity.
CTPAT and Cybersecurity.
 
Preparing to recover from a cyber attack
Preparing to recover from a cyber attackPreparing to recover from a cyber attack
Preparing to recover from a cyber attack
 
Risk Management
Risk ManagementRisk Management
Risk Management
 
Security Risk Management: ovvero come mitigare e gestire i rischi dei dati at...
Security Risk Management: ovvero come mitigare e gestire i rischi dei dati at...Security Risk Management: ovvero come mitigare e gestire i rischi dei dati at...
Security Risk Management: ovvero come mitigare e gestire i rischi dei dati at...
 
Cyber-risk Oversight Handbook for Corporate Boards
Cyber-risk Oversight Handbook for Corporate BoardsCyber-risk Oversight Handbook for Corporate Boards
Cyber-risk Oversight Handbook for Corporate Boards
 
How To Set Security Awareness Strategic Goals, KPIs and Metrics
How To Set Security Awareness Strategic Goals, KPIs and MetricsHow To Set Security Awareness Strategic Goals, KPIs and Metrics
How To Set Security Awareness Strategic Goals, KPIs and Metrics
 
CRI Cyber Board Briefing
CRI Cyber Board Briefing CRI Cyber Board Briefing
CRI Cyber Board Briefing
 
What CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber SecurityWhat CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber Security
 
Man and Machine -- Forming a Perfect Union to Mature Security Programs -- Key...
Man and Machine -- Forming a Perfect Union to Mature Security Programs -- Key...Man and Machine -- Forming a Perfect Union to Mature Security Programs -- Key...
Man and Machine -- Forming a Perfect Union to Mature Security Programs -- Key...
 
Archer Users Group / Southern Risk Council 2016 Enterprise Risk Management an...
Archer Users Group / Southern Risk Council 2016 Enterprise Risk Management an...Archer Users Group / Southern Risk Council 2016 Enterprise Risk Management an...
Archer Users Group / Southern Risk Council 2016 Enterprise Risk Management an...
 
Cyber threat forecast 2018..
Cyber threat forecast 2018..Cyber threat forecast 2018..
Cyber threat forecast 2018..
 
Shaping Your Future in Banking Cybersecurity
Shaping Your Future in Banking Cybersecurity Shaping Your Future in Banking Cybersecurity
Shaping Your Future in Banking Cybersecurity
 
Cyber Client Alert
Cyber Client AlertCyber Client Alert
Cyber Client Alert
 
Construction Cyber Risks
Construction Cyber RisksConstruction Cyber Risks
Construction Cyber Risks
 
Ch2 cism 2014
Ch2 cism 2014Ch2 cism 2014
Ch2 cism 2014
 
Regional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi Kenya
Regional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi KenyaRegional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi Kenya
Regional Cyber Security Summit 2016 May 11th-13th Weston Hotel Nairobi Kenya
 
Maximizing Security Training ROI
Maximizing Security Training ROIMaximizing Security Training ROI
Maximizing Security Training ROI
 
Cyber Security Strategies and Approaches
Cyber Security Strategies and ApproachesCyber Security Strategies and Approaches
Cyber Security Strategies and Approaches
 
CRI-Exec-Cyber-Briefings (1)
CRI-Exec-Cyber-Briefings (1)CRI-Exec-Cyber-Briefings (1)
CRI-Exec-Cyber-Briefings (1)
 

En vedette

Viaje a otavalo
Viaje a otavaloViaje a otavalo
Viaje a otavalojunqui
 
78 fh sreunion2
78 fh sreunion278 fh sreunion2
78 fh sreunion2pamcarrier
 
2009 Chart Ro Ioption1
2009 Chart Ro Ioption12009 Chart Ro Ioption1
2009 Chart Ro Ioption1pyros11
 
78 fh sreunion1
78 fh sreunion178 fh sreunion1
78 fh sreunion1pamcarrier
 
Swat team pie day relay for life
Swat team pie day   relay for lifeSwat team pie day   relay for life
Swat team pie day relay for lifebfgunter
 
Effective Human Detection & Tracking Security Using Machine Vision
Effective Human Detection & Tracking Security Using Machine VisionEffective Human Detection & Tracking Security Using Machine Vision
Effective Human Detection & Tracking Security Using Machine Visionmarshallbutler
 

En vedette (7)

Viaje a otavalo
Viaje a otavaloViaje a otavalo
Viaje a otavalo
 
Losing Control to the Cloud
Losing Control to the CloudLosing Control to the Cloud
Losing Control to the Cloud
 
78 fh sreunion2
78 fh sreunion278 fh sreunion2
78 fh sreunion2
 
2009 Chart Ro Ioption1
2009 Chart Ro Ioption12009 Chart Ro Ioption1
2009 Chart Ro Ioption1
 
78 fh sreunion1
78 fh sreunion178 fh sreunion1
78 fh sreunion1
 
Swat team pie day relay for life
Swat team pie day   relay for lifeSwat team pie day   relay for life
Swat team pie day relay for life
 
Effective Human Detection & Tracking Security Using Machine Vision
Effective Human Detection & Tracking Security Using Machine VisionEffective Human Detection & Tracking Security Using Machine Vision
Effective Human Detection & Tracking Security Using Machine Vision
 

Similaire à Maximizing ROI through Security Training (for Developers)

Cybersecurity Risk Management for Financial Institutions
Cybersecurity Risk Management for Financial InstitutionsCybersecurity Risk Management for Financial Institutions
Cybersecurity Risk Management for Financial InstitutionsSarah Cirelli
 
Meraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldMeraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldnooralmousa
 
What Not-for-Profits Can Do To Prevent "Uninspired" Theft
What Not-for-Profits Can Do To Prevent "Uninspired" TheftWhat Not-for-Profits Can Do To Prevent "Uninspired" Theft
What Not-for-Profits Can Do To Prevent "Uninspired" TheftCBIZ, Inc.
 
Implementing a Security Management Framework
Implementing a Security Management FrameworkImplementing a Security Management Framework
Implementing a Security Management FrameworkJoseph Wynn
 
Cyber presentation spet 2019 v8sentfor upload
Cyber presentation spet 2019 v8sentfor uploadCyber presentation spet 2019 v8sentfor upload
Cyber presentation spet 2019 v8sentfor uploadsavassociates1
 
Weakest links of an organization's Cybersecurity chain
Weakest links of an organization's Cybersecurity chainWeakest links of an organization's Cybersecurity chain
Weakest links of an organization's Cybersecurity chainSanjay Chadha, CPA, CA
 
Information Security Awareness And Training Business Case For Web Based Solut...
Information Security Awareness And Training Business Case For Web Based Solut...Information Security Awareness And Training Business Case For Web Based Solut...
Information Security Awareness And Training Business Case For Web Based Solut...Michael Kaishar, MSIA | CISSP
 
A to Z of Information Security Management
A to Z of Information Security ManagementA to Z of Information Security Management
A to Z of Information Security ManagementMark Conway
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security GovernancePriyanka Aash
 
Csmp overview may 14
Csmp overview may 14Csmp overview may 14
Csmp overview may 14Jock ANDRE
 
Training Catalogue - CyberSec_Technocracy.pdf
Training Catalogue - CyberSec_Technocracy.pdfTraining Catalogue - CyberSec_Technocracy.pdf
Training Catalogue - CyberSec_Technocracy.pdfdotco
 
Cyber Defence - Service portfolio
Cyber Defence - Service portfolioCyber Defence - Service portfolio
Cyber Defence - Service portfolioKaloyan Krastev
 
A CIRO's-eye view of Digital Risk Management
A CIRO's-eye view of Digital Risk ManagementA CIRO's-eye view of Digital Risk Management
A CIRO's-eye view of Digital Risk ManagementDaren Dunkel
 
Importance of Cybersecurity in BFSI Sector in India.pdf
Importance of Cybersecurity in BFSI Sector in India.pdfImportance of Cybersecurity in BFSI Sector in India.pdf
Importance of Cybersecurity in BFSI Sector in India.pdfMobibizIndia1
 
Fissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-trainingFissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-trainingSwati Gupta
 
PROTECTING YOUR BUSINESS AND CLIENT INFORMATION IN A DIGITAL WORLD - Mitch Ta...
PROTECTING YOUR BUSINESS AND CLIENT INFORMATION IN A DIGITAL WORLD - Mitch Ta...PROTECTING YOUR BUSINESS AND CLIENT INFORMATION IN A DIGITAL WORLD - Mitch Ta...
PROTECTING YOUR BUSINESS AND CLIENT INFORMATION IN A DIGITAL WORLD - Mitch Ta...IFG Network marcus evans
 
Supplement To Student Guide Seminar 03 A 3 Nov09
Supplement To Student Guide   Seminar 03 A 3 Nov09Supplement To Student Guide   Seminar 03 A 3 Nov09
Supplement To Student Guide Seminar 03 A 3 Nov09Tammy Clark
 
Isa Prog Need L
Isa Prog Need LIsa Prog Need L
Isa Prog Need LR_Yanus
 
Top 6 Web Application Security Best Practices.pdf
Top 6 Web Application Security Best Practices.pdfTop 6 Web Application Security Best Practices.pdf
Top 6 Web Application Security Best Practices.pdfSolviosTechnology
 
Managing Risk and Compliance - 14th October 2020
Managing Risk and Compliance - 14th October 2020Managing Risk and Compliance - 14th October 2020
Managing Risk and Compliance - 14th October 2020Morlai Kargbo, FCCA
 

Similaire à Maximizing ROI through Security Training (for Developers) (20)

Cybersecurity Risk Management for Financial Institutions
Cybersecurity Risk Management for Financial InstitutionsCybersecurity Risk Management for Financial Institutions
Cybersecurity Risk Management for Financial Institutions
 
Meraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldMeraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless world
 
What Not-for-Profits Can Do To Prevent "Uninspired" Theft
What Not-for-Profits Can Do To Prevent "Uninspired" TheftWhat Not-for-Profits Can Do To Prevent "Uninspired" Theft
What Not-for-Profits Can Do To Prevent "Uninspired" Theft
 
Implementing a Security Management Framework
Implementing a Security Management FrameworkImplementing a Security Management Framework
Implementing a Security Management Framework
 
Cyber presentation spet 2019 v8sentfor upload
Cyber presentation spet 2019 v8sentfor uploadCyber presentation spet 2019 v8sentfor upload
Cyber presentation spet 2019 v8sentfor upload
 
Weakest links of an organization's Cybersecurity chain
Weakest links of an organization's Cybersecurity chainWeakest links of an organization's Cybersecurity chain
Weakest links of an organization's Cybersecurity chain
 
Information Security Awareness And Training Business Case For Web Based Solut...
Information Security Awareness And Training Business Case For Web Based Solut...Information Security Awareness And Training Business Case For Web Based Solut...
Information Security Awareness And Training Business Case For Web Based Solut...
 
A to Z of Information Security Management
A to Z of Information Security ManagementA to Z of Information Security Management
A to Z of Information Security Management
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
 
Csmp overview may 14
Csmp overview may 14Csmp overview may 14
Csmp overview may 14
 
Training Catalogue - CyberSec_Technocracy.pdf
Training Catalogue - CyberSec_Technocracy.pdfTraining Catalogue - CyberSec_Technocracy.pdf
Training Catalogue - CyberSec_Technocracy.pdf
 
Cyber Defence - Service portfolio
Cyber Defence - Service portfolioCyber Defence - Service portfolio
Cyber Defence - Service portfolio
 
A CIRO's-eye view of Digital Risk Management
A CIRO's-eye view of Digital Risk ManagementA CIRO's-eye view of Digital Risk Management
A CIRO's-eye view of Digital Risk Management
 
Importance of Cybersecurity in BFSI Sector in India.pdf
Importance of Cybersecurity in BFSI Sector in India.pdfImportance of Cybersecurity in BFSI Sector in India.pdf
Importance of Cybersecurity in BFSI Sector in India.pdf
 
Fissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-trainingFissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-training
 
PROTECTING YOUR BUSINESS AND CLIENT INFORMATION IN A DIGITAL WORLD - Mitch Ta...
PROTECTING YOUR BUSINESS AND CLIENT INFORMATION IN A DIGITAL WORLD - Mitch Ta...PROTECTING YOUR BUSINESS AND CLIENT INFORMATION IN A DIGITAL WORLD - Mitch Ta...
PROTECTING YOUR BUSINESS AND CLIENT INFORMATION IN A DIGITAL WORLD - Mitch Ta...
 
Supplement To Student Guide Seminar 03 A 3 Nov09
Supplement To Student Guide   Seminar 03 A 3 Nov09Supplement To Student Guide   Seminar 03 A 3 Nov09
Supplement To Student Guide Seminar 03 A 3 Nov09
 
Isa Prog Need L
Isa Prog Need LIsa Prog Need L
Isa Prog Need L
 
Top 6 Web Application Security Best Practices.pdf
Top 6 Web Application Security Best Practices.pdfTop 6 Web Application Security Best Practices.pdf
Top 6 Web Application Security Best Practices.pdf
 
Managing Risk and Compliance - 14th October 2020
Managing Risk and Compliance - 14th October 2020Managing Risk and Compliance - 14th October 2020
Managing Risk and Compliance - 14th October 2020
 

Plus de Rochester Security Summit

Dealing with Web Application Security, Regulation Style
Dealing with Web Application Security, Regulation StyleDealing with Web Application Security, Regulation Style
Dealing with Web Application Security, Regulation StyleRochester Security Summit
 
A Plan to Control and Protect Data in the Private and Public Cloud
A Plan to Control and Protect Data in the Private and Public CloudA Plan to Control and Protect Data in the Private and Public Cloud
A Plan to Control and Protect Data in the Private and Public CloudRochester Security Summit
 
State Data Breach Laws - A National Patchwork Quilt
State Data Breach Laws - A National Patchwork QuiltState Data Breach Laws - A National Patchwork Quilt
State Data Breach Laws - A National Patchwork QuiltRochester Security Summit
 
You Know You Need PCI Compliance Help When…
You Know You Need PCI Compliance Help When…You Know You Need PCI Compliance Help When…
You Know You Need PCI Compliance Help When…Rochester Security Summit
 
A Security Testing Methodology that Fits Every IT Budget
A Security Testing Methodology that Fits Every IT BudgetA Security Testing Methodology that Fits Every IT Budget
A Security Testing Methodology that Fits Every IT BudgetRochester Security Summit
 
Business Impact and Risk Assessments in Business Continuity and Disaster Reco...
Business Impact and Risk Assessments in Business Continuity and Disaster Reco...Business Impact and Risk Assessments in Business Continuity and Disaster Reco...
Business Impact and Risk Assessments in Business Continuity and Disaster Reco...Rochester Security Summit
 

Plus de Rochester Security Summit (15)

IPv6 Can No Longer Be Ignored
IPv6 Can No Longer Be IgnoredIPv6 Can No Longer Be Ignored
IPv6 Can No Longer Be Ignored
 
Radio Reconnaissance in Penetration Testing
Radio Reconnaissance in Penetration TestingRadio Reconnaissance in Penetration Testing
Radio Reconnaissance in Penetration Testing
 
Real Business Threats!
Real Business Threats!Real Business Threats!
Real Business Threats!
 
Dealing with Web Application Security, Regulation Style
Dealing with Web Application Security, Regulation StyleDealing with Web Application Security, Regulation Style
Dealing with Web Application Security, Regulation Style
 
Application Threat Modeling
Application Threat ModelingApplication Threat Modeling
Application Threat Modeling
 
Dissecting the Hack: Malware Analysis 101
Dissecting the Hack: Malware Analysis 101 Dissecting the Hack: Malware Analysis 101
Dissecting the Hack: Malware Analysis 101
 
GRC– The Way Forward
GRC– The Way ForwardGRC– The Way Forward
GRC– The Way Forward
 
A Plan to Control and Protect Data in the Private and Public Cloud
A Plan to Control and Protect Data in the Private and Public CloudA Plan to Control and Protect Data in the Private and Public Cloud
A Plan to Control and Protect Data in the Private and Public Cloud
 
Finding Patterns in Data Breaches
Finding Patterns in Data BreachesFinding Patterns in Data Breaches
Finding Patterns in Data Breaches
 
State Data Breach Laws - A National Patchwork Quilt
State Data Breach Laws - A National Patchwork QuiltState Data Breach Laws - A National Patchwork Quilt
State Data Breach Laws - A National Patchwork Quilt
 
It's All About the Data!
It's All About the Data!It's All About the Data!
It's All About the Data!
 
You Know You Need PCI Compliance Help When…
You Know You Need PCI Compliance Help When…You Know You Need PCI Compliance Help When…
You Know You Need PCI Compliance Help When…
 
A Security Testing Methodology that Fits Every IT Budget
A Security Testing Methodology that Fits Every IT BudgetA Security Testing Methodology that Fits Every IT Budget
A Security Testing Methodology that Fits Every IT Budget
 
Business Impact and Risk Assessments in Business Continuity and Disaster Reco...
Business Impact and Risk Assessments in Business Continuity and Disaster Reco...Business Impact and Risk Assessments in Business Continuity and Disaster Reco...
Business Impact and Risk Assessments in Business Continuity and Disaster Reco...
 
Firewall Defense against Covert Channels
Firewall Defense against Covert Channels Firewall Defense against Covert Channels
Firewall Defense against Covert Channels
 

Dernier

Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 

Dernier (20)

Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 

Maximizing ROI through Security Training (for Developers)

  • 1. Maximizing  ROI  through  Security   Training  
  • 2. Who  am  I?   •  VP  /  Co-­‐Founder  of  Symosis,  10+  years  in   informaFon  security  consulFng  &  Training,   USC,  Foundstone,  McAfee,  Accuvant,  C-­‐Level   security,  etc   •  Invited  speaker,  author  and  educator   •  MBA,  MS  Comp  Sc,  CISM,  CISA,  CISSP  
  • 3. Table  of  Contents   •  Business  case  for  security   •  Evolving  threats   •  How  to  build  an  effecFve  training  program?   •  Case  Studies  
  • 4. The  Business  Case  for  Security         Proper  security  enables  a   company  to  meet  its  business   objec-ve  by  providing  a  safe  and   secure  environment  
  • 5. Impact  of  Security  Breaches   Loss  of  Revenue   Damage  to  ReputaFon   Loss  or  Compromise  of   Data   Damage  to  Investor   Confidence   Legal  Consequences   InterrupFon  of  Business   Processes   Damage  to  Customer   Confidence  
  • 6. Dollar  Amount  Of  Loss     The  cost  of  implemenFng  security  measures  is  not  trivial;   however,  it  is  a  fracFon  of  the  cost  of  miFgaFng  security   compromises   *  CSI  2006  
  • 7. Cost  of  Security  Breach   *  Aberdeen  Group  August  2010  
  • 8. Security  Breach  Example  Costs   Cost  of  Recent  Customer  Records  Breach   •  $6.5  Million:  DSW  Warehouse  Costs  from  Data  Thea   •  $5.7  Million:  BJ’s  Wholesale  Club  from  Data  Breach   AddiFonal  impact/cost  due  to  lost  customers   •  20%  of  customers  have  ended  a  relaFonship  with  a   company  aaer  being  noFfied  of  a  breach  (Ponemon   InsFtute)   •  58%  said  the  breach  decreased  their  sense  of  trust  and   confidence  in  the  organizaFon  reporFng  the  incident  
  • 9. TOC   •  Business  case  for  security   •  Evolving  threats   •  How  to  build  an  effecFve  training  program?   •  Case  Studies  
  • 10. Emerging  Threats  -­‐  Aiack  Methods   *  SANS  2010  
  • 11. Emerging  Threats  -­‐  ApplicaFon   Weaknesses   *  SANS  2010  
  • 12. Emerging  Threats   GLOBAL Infrastructure Impact REGIONAL Networks MULTIPLE Networks INDIVIDUAL Networks INDIVIDUAL Computer Target and Scope of Damage Rapidly Escalating Threat to Businesses First Gen  Boot viruses Weeks Second Gen  Macro viruses  Denial of Service Days Third Gen  Distributed Denial of Service  Application threats  Malware Minutes Next Gen  Flash threats  Massive “bot”-driven DDoS  Damaging payload worms Seconds 1980s 1990s Today Future
  • 13. 13   Emerging  Threats  Categories   Malware Botnets Threats to VOIP and mobile convergence Cyber warfare Data thefts
  • 14. Threats becoming increasingly difficult to detect and mitigate THREATSEVERITY 1990 1995 2000 2005 WHAT’S NEXT? FINANCIAL Theft & Damage FAME Viruses and Malware TESTING THE WATERS Basic Intrusions and Viruses
  • 15. TOC   •  Business  case  for  security   •  Evolving  threats   •  How  to  build  an  effec-ve  training  program?   •  Case  Studies  
  • 16. Why  Security  Training   •  Reduce accidental security breaches •  Improve employee behaviour •  Enable organization to hold employees accountable for their actions •  Build in-depth knowledge to design, implement, or operate security programs for organizations & systems •  Develop skills & knowledge so that computer users can perform their jobs while using IT systems more securely
  • 17. Why  Security  Training?   •  Dissemination & enforcement of policy become easier when training & awareness programs are in place •  Demonstrating due care & diligence can help indemnify the institution against lawsuits •  By improving awareness of the need to protect system resources
  • 18. How  is  InformaFon  Security   JusFfied?   PWC  security  survey  2011  
  • 19. Step  1:  Define  Training  ObjecFves   •  Compliance,  RegulaFons  and  Governance   •  Client  /  Partner  requirements   •  Increase  the  general  level  of  security  awareness   •  Reduce  the  incidences  of  computer  fraud,  waste   and  abuse   •  Create  a  more  security  savvy  workforce     •  Design,  develop  and  maintain  secure  IT   infrastructure  and  applicaFons  
  • 20. PCI  Compliance     All  service  providers  with  which  cardholder   data  is  shared  must  adhere  to  the  PCI  DSS   requirements  and  must  sign  an  agreement   acknowledging  that  the  service  provider  is   responsible  for  the  security  of  cardholder  data   the  provider  possesses.  
  • 21. PCI  Compliance   Payment  Card  Industry  (PCI)  Data  Security   Standard  mandates  security  awareness   program  that     12.6.1:  Educate  employees  upon  hire  and  at   least  annually       12.6.2:  Require  employees  to  annually   acknowledge  in  wriFng  that  they  have  read   and  understood  the  company's  security  policy   and  procedure    
  • 22. HIPAA  Compliance     The  Health  Insurance  Portability  and   Accountability  Act  of  1996  (HIPAA)  mandates  that   Covered  EnFFes,  which  includes  health  plans,   healthcare  clearinghouses,  and  most  healthcare   providers,  may  not  use  or  disclose  individuals’   health  informaFon  for  purposes  unrelated  to   providing  health-­‐  care,  managing  their   organizaFon,  or  meeFng  their  obligaFons  under   state  and  federal  law,  unless  individuals   specifically  authorize  them  to  do  so.    
  • 23. HIPAA  Compliance     Ensuring  all  employees    including   management,  agents  and  contractors  in  an   organizaFon  understand  and  uphold  these   rules  is  no  easy  task  and  is,  to  a  large  degree,  a   training  and  management  problem.  This  is   why  the  Department  of  Health  and  Human   Services  (HHS)  has  mandated  annual  privacy   and  security  training,  as  well  as  regular   reminders  for  all  employees.  
  • 24. HIPAA  Compliance   •  Upper  Management  Training   •  Security  Awareness  Day   •  Security  Awareness  and  Ongoing  Training  for   all  staff   •  Computer  Users’  Supervisor  Training   •  Security  “MarkeFng”  Efforts   •  Annual  System-­‐specific  training   •  Professional  EducaFon  Training  
  • 25. GLBA  Compliance     Gramm-­‐Leach-­‐Bliley  Act  of  1999  Employee   Training  Requirements  mandates  IT  Security   Awareness  Training  for  all  employees  of  financial   service  providers  (FSPs)  covered  by  the  GLB  act,   which  includes  all  companies  "engaging  in   financial  acFviFes.”  
  • 26. GLBA  Compliance   •  Examples  of  organizaFons  who  are  affected  by   these  rules  include     – insurance  agencies     – tax  preparers     – finance  companies   – collecFons  agencies   – leasing  agencies     – travel  agencies     – financial  advisors    
  • 27. ISO  27002   •  ISO  27002  is  an  internaFonally  recognized   standard  published  by  the  InternaFonal   OrganizaFon  for  StandardizaFon  covering   informaFon  security  best  pracFces.  Many  global   organizaFons  use  this  comprehensive  standard  to   gauge  their  informaFon  security  programs.     •  Provide  an  adequate  level  of  security  educaFon     and  training  to  your  organizaFon’s  employees,   contractors  and  third  party  users  
  • 28. FISMA     •  Federal  InformaFon  Security  Management  Act   (FISMA)  is  Title  III  of  the  E-­‐Government  ACT,   which  requires  federal  agencies  to  develop,   document,  and  implement  a  comprehensive   agency-­‐wide  informaFon  security  program.     •  Part  of  such  a  program  is  security  training   program  that  educates  personnel,  including   contractors  and  other  users,  of  their   responsibiliFes  in  maintaining  informaFon   security,  complying  with  organizaFonal  policies   and  procedures,  and  reducing  the  risks  associated   with  their  acFviFes    
  • 29. Red  Flag  Thea  PrevenFon   •  Under  the  new  Red  Flag  regulaFons,  financial   insFtuFons  and  creditors  must  develop  a  wriien   program  that  idenFfies  and  detects  the  relevant   warning  signs  (Red  Flags)  of  idenFty  thea,  such  as   unusual  account  acFvity,  fraud  alerts  on  a   consumer  report,  or  aiempted  use  of  suspicious   account  applicaFon  documents,   •  Includes  appropriate  staff  training  and  oversight   of  any  service  providers  
  • 30. SOX  (Sarbanes  Oxley)   •  Sarbanes  Oxley  requires  the  CEO  and  CFO  of   publicly  traded  companies  to  be  held  accountable   for  financial  statements  filed  with  the  SecuriFes   and  Exchange  Commission  and  includes  criminal   penalFes  for  false  cerFficaFon     •  Top  management  must  ensure  that  there  are   adequate  'internal  controls'  to  ensure  reliable   financial  reporFng  and  protect  financial  data  that   resides  in  informaFon  systems  
  • 31. Step  2:  Assess  Needs   •  IdenFfy  training  administrator     – Primary  responsibility  lies  with  Chief  InformaFon   Security  Officer,  top  management  and  security   team  
  • 32. Assess  Needs   •  Who  needs  to  be  trained  and  on  what?     – All  stakeholders:  Security  Awareness  Training,   Compliance   – Program  Managers  –  Architecture  &  Design     – Architects  &  Developers  –  Threats,  coding   mistakes,  secure  soaware  development     – Testers  /  QA  –  Security  Test  Cases    
  • 33. Assess  Needs FuncFonal   Background   General  User   Managerial   User   Technical   User   Skill  Level   Novice   Intermediate   Expert   Using wrong training methods can:  Hinder transfer of knowledge  Lead to unnecessary expense & frustrated, poorly trained employees
  • 34. Step  3:  Key  Factors   •  Build  vs.  Buy   •  Classroom  /  Instructor  Led   •  CBT  /  Web  Based   •  Generic  vs.  Customized   •  HosFng  
  • 35. Build  vs.  Buy   • Business  needs  are  unique   • Internal  capability  available   • Proprietary  informaFon  or   data  needs  to  be  protected;   • Complexity  of  interface  with   company's  LMS     • No  COTS  products  or  too   costly   Build   • Reduce  and  control  operaFng   costs   • Free  internal  resources     • Gain  access  to  external   capabiliFes   • Resources  constraints   • Improve  company  focus   • Share  risks   Buy   Key  consideraFons  -­‐  cost,  quality,  and  timeline  
  • 36. Costs   •  “How  to  Spend  a  Dollar  on  Security”  recommends  that   out  of  every  security  dollar  you  spend:   – 15  cents:  Policy   – 40  cents:  Awareness   – 10  cents:  Risk  Assessment     – 20  cents:  Technology     – 15  cents:  Process   •  We  have  seen  it  done  from  anywhere  between  $5K  to   $5M  annual  costs   Patrick  McBride  –  ComputerWorld    
  • 37. Classroom  /  Instructor  Led   •  Study  away  from  the  office  at  another  locaFon   with  Fme  set  aside  dedicated  to  learning  a  new   course  (and  in  some  cases,  for  cerFficaFon,  siyng   of  an  exam)   •  Costs  are  more  expensive  as  it  involves  the  course   fees,  travel,  accommodaFon  and  other  expenses   •  Access  to  a  trainer  for  the  duraFon  of  the  course   (and  someFmes  for  a  limited  period  aaer  the   course)   •  Access  to  other  students  during  the  course  and  as   a  potenFal  networking  group  aaer  the  course  
  • 38. Computer  /  Web  Based   •  Individuals  can  study  at  their  own  Fme  and  pace  thereby   learning  at  a  rate  that  they  are  comfortable  with   •  Lower  costs  –  CBT  is  much  more  cost  effecFve  than   classroom  training.  MulF-­‐user  opFon  allow  a  company  to   train  more  than  one  person  with  the  same  budget  or  less   than  sending  on  a  classroom  course     •  Combines  the  “best  bits  of  classroom  training”  such  as  the   video  clips  of  instructor  sessions  with  the  “best  bits  of   reference  material”  such  as  technical  informaFon  and   pracFce  quesFons  to  provide  a  great  all  round  training   experience  which  is  beneficial  to  both  student  and   employer  at  the  best  price  available.  
  • 39. Generic  vs.  Customized   •  Generic  training  is  cost  effecFve  and  focuses   on  core  security  issues,  OWASP  Top  10  threats,   etc   •  CustomizaFon  provides  training  that  matches   specific  needs  for  content,  compleFon   requirements,  quiz,  policies,  and  even   employee  responsibility  acknowledgment.  
  • 40. HosFng   •  Web  based  training  could  be  hosted  internally   or  provided  as  soaware  as  a  service  (SAAS)     •  Internal  hosFng  provides  greater  control  but   could  be  resource  and  cost  intensive   •  SAAS  service  is  oaen  turn  key  but  may  limit   scalability  and  usage  
  • 41. Step  4:  Metrics   •  Quiz  and  survey  results   •  Content   •  People  
  • 42. Metrics  -­‐  Quiz  and  survey  results   •  Score  Results:  How  did  people  score?   •  Answer  Breakdown:  How  did  people  answer?   •  Aiempt  Detail:  How  did  a  user  answer?  
  • 43. Metrics  -­‐  Content   •  AcFvity:  What  was  the  acFvity  for  a  content   item?   •  Traffic:  How  oaen  was  an  item  viewed?   •  Progress:  How  many  slides  did  people  view?   •  Popular  Content:  Which  content  was  viewed   the  most?  
  • 44. Metrics  -­‐  People   •  Group  AcFvity:  What  content  did  a  group   view?   •  User  AcFvity:  What  content  did  a  user  view?   •  AcFve  Groups:  Who  were  my  most  acFve   groups?   •  AcFve  Users:  Who  were  my  most  acFve  users?   •  Guestbook  Responses:  What  were  the   responses  to  a  guestbook?  
  • 45. TOC   •  Business  case  for  security   •  Evolving  threats   •  How  to  build  an  effecFve  training  program?   •  Case  Studies  
  • 46. Case  Study  1  -­‐  Project  management   and  custom  soaware  company   •  Challenge:     – Ensure  secure  coding  elements  have  been  taught     – Prevent  top  10  threats  and  miFgaFon  techniques   – Meet  a  Fme  sensiFve  requirement  under  a  DoD   contract     •  SoluFon:       – Implement  best  pracFces  soaware  security  training   for  Java   – Provide  access  to  training  on  demand  from  a  SaaS   model  
  • 47. •  Challenge   – Improve  soaware  quality  by  eliminaFng  common   mistakes   – Provide  foundaFon  for  everyone  to  ‘own’  security   •  SoluFon   – Create  custom  course  based  on  previously  idenFfied   risk  and  miFgaFon   – Integrate  security  cases  into  QA  lifecycle   – Measure  year  over  year  declines  in  security  related   CRs  
  • 48. •  Challenge:     – Meet  PCI  compliance  for  integraFng  secure  coding   pracFces   •  SoluFon   – Implement  JAVA/.NET  secure  coding  pracFces   – Address  PCI  Cardholder  Data  requirements  within   applicaFon  development  
  • 49. Thanks  for  listening…   QuesFons?   Try  out  free  Symosis  training  at  hip:// www.symosis.com