SlideShare uma empresa Scribd logo
1 de 25
Live Webinar:
Webinar Audio:
You can dial the telephone numbers located on your webinar panel.
Or listen in using your headphones or computer speakers.
Welcome!
• Presentation is roughly about 30- 45 minutes
• All phone lines are muted
• If anyone has any questions during this webinar – please type them in your
Questions Box located at the bottom of your webinar panel
Webinar Details
Today’s Presenters
Steve Moisoff
Net@Work
Account Executive
Cando Wango
Net@Work
IT Solutions Architect
John Verry
Pivot Point Security
Enterprise Security Consultant
180+ Business
Technology Architects
and Consultants
IT Road
Mapping
& Strategic Planning
Business
Process Review
Ecosystem
BI, Analytics
& Reporting
Cloud & IT
Managed Services
ERP/
Accounting
Web Development
& e-Commerce
Sister Company
Payment
Processing
SWYPE
Sister Company
CRM &
Marketing
Automation
HRMS/
Employer Solutions
Document
Management
Compliance
Solutions:
Sales Tax | Fixed
Assets
Managed Print
Services
Sister Company
Net@Work
Partner Alliance
Program
Our Previous Webinar Topics
Access on our website: netatwork.com/resource
✓ Managed IT Services: What It Is and Why It Matters
✓ The Myths & Realities of Managed IT Services
✓ Uncovering the Business Value of Managed IT Services
✓ Data Recovery Best Practices - Survival of the Fittest
All Recorded Webinars Available to Watch On-Demand:
“A company that includes 1,000 employees with poor
online hygiene has 1,000 insecure endpoints.”
Anuj Goel, co-founder of Cyware Labs
Email Defense
End Point Protection
PerimeterThe Essential Elements
• Perimeter – e.g. the Firewall…inspecting data coming in and
out of your corporate network
• Email Defense – Filtering, Inspection and protection of
email boundaries
• End Point Protection – Zero Day Threat Protection, Anti-
Virus definitions
• Backup Solutions – Full Recovery of critical systems
• Training for End Users – Regular education sessions and
testing of knowledge on company standard security posture
Backup Solutions
End User Training
Overview
Do you have a Defense Strategy for Staff Accessing
Personal Email Accounts on Corporate Devices?
 Yes
 No
 Don’t think we need one
 Don’t know
Does your Company have a mobile device or
Bring Your own device strategy defined?
 Yes
 No
 Don’t think we need one
 Don’t know
Polling Questions
Why Security Awareness Education?
• What risks does it address?
Who needs Security Awareness Education?
• Different companies & roles benefit from different messaging
Security Awareness Education vs. a Program
• The common ways to effectively educate employees
Benefits and Costs (both in time and money)
• What you can expect from your investment
Agenda
By The Numbers…
Human error, not technology, is your primary risk factor:
95% of successful cyberattacks are the result of a phishing scam
These social engineering scams are hitting our businesses hard:
Over 400 businesses are targeted by spear-phishing scams every day
Phishing is the primary vector for ransomware, which is also on the rise:
4,000 ransomware attacks occurred every day in 2016, & Symantec logged a 36% increase in infections
These attacks are costing us trillions of dollars:
The cost of cybercrime is expected to hit $6 trillion in 2021 (up from $3 trillion in 2015)
Awareness training is perhaps your most powerful defense:
Investing in training can reduce the risk of a breach by as much as 70%
Why Security Awareness Education?
Management
• Senior Management is often not aware of the extent of the risk.
• “Tone at the Top” is essential to success … if management isn’t
focused, employees aren’t.
Information Technology (IT) & Information Security (IS)
• IT and/or IS are often the first places people turn with ‘real life’
questions about phishing, vishing, & potential security incidents.
End Users
• Quality education and good direction from management move End
Users from your greatest threat surface to your greatest threat
detection mechanism.
Who Needs Security Awareness Education?
What measures has your company
taken to provide security awareness
education to their employees?
 Program in place
 Being discussed
 Not on radar but want to pursue
 Not interested at this time
Polling Questions
Content
• Roll Your Own
• Use an SAE Vendor
• Customize an SAE Vendors content
Delivery Options
• Learning Management System
• Digital - Video, PowerPoint, etc.
• Human delivered
Not unusual to blend content & delivery options in a program.
Primary Options to Educate Your Employees
The Basics:
• Social Engineering
• Phishing
• Vishing
• Ransomware
Supportive Topics:
• Security Fundamentals (password mgmt., mobile device mgmt., etc.)
• Compliance Fundamentals (PCI, HIPPA, GDPR, DFS-500, 800-171, etc.)
• Security Frameworks (ISO 27001, NIST CSF, SOC 2, HITRUST, etc.)
***Social Engineering & Phishing Assessments to ensure training is working***
Key Considerations:
• Simple lessons – this is a case where less is more
• Engaging content
Education Should Include
7X Rule – If people haven’t absorbed your message 7 times,
they haven't fully grasped it.
Reinforcement is essential for successful education and
behavioral change.
Difference between SAE and a “Program”.
Options include:
• Newsletters
• Memes
• Lunch & Learns
• Posters
• Webinars
• Mention in corporate presentations
Effective Education Needs Reinforcement
Remember… Have Some Fun!
“Ponemon recently calculated the effectiveness of anti-phishing training
programs. The least effective training program still had a seven-fold return
on investment, even taking into account the loss of productivity during the
time the employees spent being training. And the average-performing
program resulted in a 37-fold return on investment.”
By Maria Korolov
Contributing Writer, CSO
csoonline.com
Benefits & Costs: ROI
• This is an investment in your company but
more importantly your people.
• Educated employees take their knowledge
home with them to their families and friends.
• The implications of successful education
means better lives for your people and
their communities.
Benefits & Costs: Your People
SAE provider costs range from
~$8 to $25 per user / per year based on:
• Total number of users
• Company you hire or resources you purchase
• Depth of content licensed
• Complete set of services you include in the package
(e.g., Phishing, posters, etc.)
Typical costs for a program focused on
Social Engineering & Security fundamentals:
$10 - $14 per user / per year range (80/20 point)
Benefits & Costs: $$$
Expected time commitment ranges based on
quantity of content:
• Basic Social Engineering is typically an hour.
• Basic Security Fundamentals is usually an hour.
• Online training provides greater flexibility to break this up and
ensure that the content is absorbed via quizzes.
• In-person training provides less flexibility but provides greater
interactivity.
Benefits & Costs: Time
Do you believe company ownership/management will
embrace a program of this type?
 Absolutely
 Possibly
 Unlikely
 Not At All Likely
How valuable do you believe this training program will be?
 Extremely valuable
 Moderate value
 Fair value
 Not valuable
Polling Questions
Summary & Recommendations
Security Awareness Education is an Important Part of Your Security “Stack”:
• Security Awareness Education minimizes the likelihood someone will make a mistake
• But when a mistake happens…
• Vulnerability & Configuration Management minimizes the impact of a mistake
• But when there is an impact…
• Network Segregation can contain the impact of a mistake
• But when an impact cannot be contained…
• Incident Response planning will let you respond quickly and efficiently
• Disaster Recovery planning allows you to recover quickly and efficiently
• Test to verify your stack is working as planned
Has your company had a security
(penetration test/vulnerability
assessment) review in the last two years?
 Yes
 No
 I have no clue
 Don’t believe we need one
Polling Questions
Please type in
your questions
Any Questions?
Thank You For Attending!
Connect with
646-293-1735
www.netatwork.com
netatwork.com/blog
Net@Work YouTube
Follow us on Twitter: @netatwork_corp
Follow Net@Work on LinkedIn
Follow Net@Work on Google+
Follow Net@Work on Facebook
Contact your Net@Work Account Manager for any questions or concerns.
Or you can reach out to us via the information below!
Steve Moisoff | Net@Work
Senior Solutions Executive
Phone: 212.997.5200 Ext. 1735
Direct: 646.293.1735
smoisoff@netatwork.com
www.netatwork.com

Mais conteúdo relacionado

Mais procurados

Cyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxCyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxDinesh582831
 
IT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptOoXair
 
Cybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by AdamCybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by AdamMohammed Adam
 
Information Security Governance and Strategy
Information Security Governance and Strategy Information Security Governance and Strategy
Information Security Governance and Strategy Dam Frank
 
End User Security Awareness Presentation
End User Security Awareness PresentationEnd User Security Awareness Presentation
End User Security Awareness PresentationCristian Mihai
 
Raising information security awareness
Raising information security awarenessRaising information security awareness
Raising information security awarenessTerranovatraining
 
Information Security Awareness Training Open
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training OpenFred Beck MBA, CPA
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness TrainingRandy Bowman
 
Cyber Security Incident Response
Cyber Security Incident ResponseCyber Security Incident Response
Cyber Security Incident ResponsePECB
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awarenessJason Murray
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness TrainingJen Ruhman
 
Cybersecurity Awareness Training
Cybersecurity Awareness TrainingCybersecurity Awareness Training
Cybersecurity Awareness TrainingDave Monahan
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness TrainingWilliam Mann
 
New Hire Information Security Awareness
New Hire Information Security AwarenessNew Hire Information Security Awareness
New Hire Information Security Awarenesshubbargf
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@R_Yanus
 

Mais procurados (20)

Cyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxCyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptx
 
End-User Security Awareness
End-User Security AwarenessEnd-User Security Awareness
End-User Security Awareness
 
IT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.ppt
 
Cybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by AdamCybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by Adam
 
Basic Security Training for End Users
Basic Security Training for End UsersBasic Security Training for End Users
Basic Security Training for End Users
 
Information Security Governance and Strategy
Information Security Governance and Strategy Information Security Governance and Strategy
Information Security Governance and Strategy
 
End User Security Awareness Presentation
End User Security Awareness PresentationEnd User Security Awareness Presentation
End User Security Awareness Presentation
 
Raising information security awareness
Raising information security awarenessRaising information security awareness
Raising information security awareness
 
Information Security Awareness Training Open
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training Open
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness Training
 
Security awareness
Security awarenessSecurity awareness
Security awareness
 
Cyber Security Incident Response
Cyber Security Incident ResponseCyber Security Incident Response
Cyber Security Incident Response
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awareness
 
Cyber security training
Cyber security trainingCyber security training
Cyber security training
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness Training
 
Cybersecurity Awareness Training
Cybersecurity Awareness TrainingCybersecurity Awareness Training
Cybersecurity Awareness Training
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
New Hire Information Security Awareness
New Hire Information Security AwarenessNew Hire Information Security Awareness
New Hire Information Security Awareness
 
information security awareness course
information security awareness courseinformation security awareness course
information security awareness course
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@
 

Semelhante a Information Security Awareness

KnowBe4-Presentation-Overview.pdf
KnowBe4-Presentation-Overview.pdfKnowBe4-Presentation-Overview.pdf
KnowBe4-Presentation-Overview.pdfahmad661583
 
Endpoint Security & Why It Matters!
Endpoint Security & Why It Matters!Endpoint Security & Why It Matters!
Endpoint Security & Why It Matters!Net at Work
 
Infocon Bangladesh 2016
Infocon Bangladesh 2016Infocon Bangladesh 2016
Infocon Bangladesh 2016Prime Infoserv
 
Fissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-trainingFissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-trainingSwati Gupta
 
Best Practices for Security Awareness and Training
Best Practices for Security Awareness and TrainingBest Practices for Security Awareness and Training
Best Practices for Security Awareness and TrainingKimberly Hood
 
Credit Union Cyber Security
Credit Union Cyber SecurityCredit Union Cyber Security
Credit Union Cyber SecurityStacy Willis
 
Why SMBs Outsource IT to MSPs
Why SMBs Outsource IT to MSPsWhy SMBs Outsource IT to MSPs
Why SMBs Outsource IT to MSPsThe TNS Group
 
Battle Tested Application Security
Battle Tested Application SecurityBattle Tested Application Security
Battle Tested Application SecurityTy Sbano
 
Security Training: Necessary Evil, Waste of Time, or Genius Move?
Security Training: Necessary Evil, Waste of Time, or Genius Move?Security Training: Necessary Evil, Waste of Time, or Genius Move?
Security Training: Necessary Evil, Waste of Time, or Genius Move?Denim Group
 
Post 11. Long term GoalThe Group’s goal is to offer attr
Post 11. Long term GoalThe Group’s goal is to offer attrPost 11. Long term GoalThe Group’s goal is to offer attr
Post 11. Long term GoalThe Group’s goal is to offer attranhcrowley
 
Social Engineering Audit & Security Awareness
Social Engineering Audit & Security AwarenessSocial Engineering Audit & Security Awareness
Social Engineering Audit & Security AwarenessCBIZ, Inc.
 
Aetna information security assurance program
Aetna information security assurance programAetna information security assurance program
Aetna information security assurance programSiddharth Janakiram
 
Cybersecurity Best Practices in Financial Services
Cybersecurity Best Practices in Financial ServicesCybersecurity Best Practices in Financial Services
Cybersecurity Best Practices in Financial ServicesJohn Rapa
 
Information Security Risks - What You Can Do To Help Your Clients Avoid Costl...
Information Security Risks - What You Can Do To Help Your Clients Avoid Costl...Information Security Risks - What You Can Do To Help Your Clients Avoid Costl...
Information Security Risks - What You Can Do To Help Your Clients Avoid Costl...Net at Work
 
GrowFL: Improve Employee and Customer Experience in a Hybrid Work Environment
GrowFL: Improve Employee and Customer Experience in a Hybrid Work EnvironmentGrowFL: Improve Employee and Customer Experience in a Hybrid Work Environment
GrowFL: Improve Employee and Customer Experience in a Hybrid Work EnvironmentAdam Levithan
 
2016 Risk Management Workshop
2016 Risk Management Workshop2016 Risk Management Workshop
2016 Risk Management WorkshopStacy Willis
 
How to Choose the Right Security Training for You
How to Choose the Right Security Training for YouHow to Choose the Right Security Training for You
How to Choose the Right Security Training for YouCigital
 
Internal health and safety communication with SnapComms
Internal health and safety communication with SnapCommsInternal health and safety communication with SnapComms
Internal health and safety communication with SnapCommsSnapComms
 
NCSAM 2023 Webinar.pptx
NCSAM 2023 Webinar.pptxNCSAM 2023 Webinar.pptx
NCSAM 2023 Webinar.pptxInfosec
 

Semelhante a Information Security Awareness (20)

KnowBe4-Presentation-Overview.pdf
KnowBe4-Presentation-Overview.pdfKnowBe4-Presentation-Overview.pdf
KnowBe4-Presentation-Overview.pdf
 
Endpoint Security & Why It Matters!
Endpoint Security & Why It Matters!Endpoint Security & Why It Matters!
Endpoint Security & Why It Matters!
 
Infocon Bangladesh 2016
Infocon Bangladesh 2016Infocon Bangladesh 2016
Infocon Bangladesh 2016
 
Fissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-trainingFissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-training
 
Best Practices for Security Awareness and Training
Best Practices for Security Awareness and TrainingBest Practices for Security Awareness and Training
Best Practices for Security Awareness and Training
 
Credit Union Cyber Security
Credit Union Cyber SecurityCredit Union Cyber Security
Credit Union Cyber Security
 
Why SMBs Outsource IT to MSPs
Why SMBs Outsource IT to MSPsWhy SMBs Outsource IT to MSPs
Why SMBs Outsource IT to MSPs
 
Battle Tested Application Security
Battle Tested Application SecurityBattle Tested Application Security
Battle Tested Application Security
 
Security Training: Necessary Evil, Waste of Time, or Genius Move?
Security Training: Necessary Evil, Waste of Time, or Genius Move?Security Training: Necessary Evil, Waste of Time, or Genius Move?
Security Training: Necessary Evil, Waste of Time, or Genius Move?
 
Secure Iowa Oct 2016
Secure Iowa Oct 2016Secure Iowa Oct 2016
Secure Iowa Oct 2016
 
Post 11. Long term GoalThe Group’s goal is to offer attr
Post 11. Long term GoalThe Group’s goal is to offer attrPost 11. Long term GoalThe Group’s goal is to offer attr
Post 11. Long term GoalThe Group’s goal is to offer attr
 
Social Engineering Audit & Security Awareness
Social Engineering Audit & Security AwarenessSocial Engineering Audit & Security Awareness
Social Engineering Audit & Security Awareness
 
Aetna information security assurance program
Aetna information security assurance programAetna information security assurance program
Aetna information security assurance program
 
Cybersecurity Best Practices in Financial Services
Cybersecurity Best Practices in Financial ServicesCybersecurity Best Practices in Financial Services
Cybersecurity Best Practices in Financial Services
 
Information Security Risks - What You Can Do To Help Your Clients Avoid Costl...
Information Security Risks - What You Can Do To Help Your Clients Avoid Costl...Information Security Risks - What You Can Do To Help Your Clients Avoid Costl...
Information Security Risks - What You Can Do To Help Your Clients Avoid Costl...
 
GrowFL: Improve Employee and Customer Experience in a Hybrid Work Environment
GrowFL: Improve Employee and Customer Experience in a Hybrid Work EnvironmentGrowFL: Improve Employee and Customer Experience in a Hybrid Work Environment
GrowFL: Improve Employee and Customer Experience in a Hybrid Work Environment
 
2016 Risk Management Workshop
2016 Risk Management Workshop2016 Risk Management Workshop
2016 Risk Management Workshop
 
How to Choose the Right Security Training for You
How to Choose the Right Security Training for YouHow to Choose the Right Security Training for You
How to Choose the Right Security Training for You
 
Internal health and safety communication with SnapComms
Internal health and safety communication with SnapCommsInternal health and safety communication with SnapComms
Internal health and safety communication with SnapComms
 
NCSAM 2023 Webinar.pptx
NCSAM 2023 Webinar.pptxNCSAM 2023 Webinar.pptx
NCSAM 2023 Webinar.pptx
 

Mais de Net at Work

Sage HRMS Configuration and Business Response and HR Planning
Sage HRMS Configuration and Business Response and HR PlanningSage HRMS Configuration and Business Response and HR Planning
Sage HRMS Configuration and Business Response and HR PlanningNet at Work
 
Employer Update & Getting Business Back on Track
Employer Update & Getting Business Back on Track Employer Update & Getting Business Back on Track
Employer Update & Getting Business Back on Track Net at Work
 
Tips on the IRS & DOL Employer Tax Credits & Loans
Tips on the IRS & DOL Employer Tax Credits & LoansTips on the IRS & DOL Employer Tax Credits & Loans
Tips on the IRS & DOL Employer Tax Credits & LoansNet at Work
 
Sage 100: Enabling Your Team to Work Remotely with the Impact from COVID-19 &...
Sage 100: Enabling Your Team to Work Remotely with the Impact from COVID-19 &...Sage 100: Enabling Your Team to Work Remotely with the Impact from COVID-19 &...
Sage 100: Enabling Your Team to Work Remotely with the Impact from COVID-19 &...Net at Work
 
The New Remote Workforce & The Case for Hosting Your Sage Solution in the Cloud
The New Remote Workforce & The Case for Hosting Your Sage Solution in the CloudThe New Remote Workforce & The Case for Hosting Your Sage Solution in the Cloud
The New Remote Workforce & The Case for Hosting Your Sage Solution in the CloudNet at Work
 
MIP Webinar: Working Remotely with the Impact of COVID-19 & Planning for FFCRA
MIP Webinar: Working Remotely with the Impact of COVID-19 & Planning for FFCRAMIP Webinar: Working Remotely with the Impact of COVID-19 & Planning for FFCRA
MIP Webinar: Working Remotely with the Impact of COVID-19 & Planning for FFCRANet at Work
 
Managing Through COVID-19
Managing Through COVID-19Managing Through COVID-19
Managing Through COVID-19Net at Work
 
Tax Compliance in the Wake of COVID-19 What’s Changed
Tax Compliance in the Wake of COVID-19 What’s ChangedTax Compliance in the Wake of COVID-19 What’s Changed
Tax Compliance in the Wake of COVID-19 What’s ChangedNet at Work
 
Fixed Assets are Suddenly Mobile “At Home” Assets
Fixed Assets are Suddenly Mobile “At Home” AssetsFixed Assets are Suddenly Mobile “At Home” Assets
Fixed Assets are Suddenly Mobile “At Home” AssetsNet at Work
 
Sage 300 Webinar: Enabling Your Team to Work Remotely with the Impact from CO...
Sage 300 Webinar: Enabling Your Team to Work Remotely with the Impact from CO...Sage 300 Webinar: Enabling Your Team to Work Remotely with the Impact from CO...
Sage 300 Webinar: Enabling Your Team to Work Remotely with the Impact from CO...Net at Work
 
Coping with Covid-19: Keeping the Workplace Moving
Coping with Covid-19: Keeping the Workplace Moving Coping with Covid-19: Keeping the Workplace Moving
Coping with Covid-19: Keeping the Workplace Moving Net at Work
 
Coronavirus Payroll Continuity
Coronavirus Payroll ContinuityCoronavirus Payroll Continuity
Coronavirus Payroll ContinuityNet at Work
 
How Engaged Employees Affect the Bottom Line
How Engaged Employees Affect the Bottom Line How Engaged Employees Affect the Bottom Line
How Engaged Employees Affect the Bottom Line Net at Work
 
Transformative HR Technology For Nonprofits
Transformative HR Technology For Nonprofits  Transformative HR Technology For Nonprofits
Transformative HR Technology For Nonprofits Net at Work
 
Document Capture: Never Touch a Document Again
Document Capture: Never Touch a Document AgainDocument Capture: Never Touch a Document Again
Document Capture: Never Touch a Document AgainNet at Work
 
Benefits of Abila MIP Payroll
Benefits of Abila MIP PayrollBenefits of Abila MIP Payroll
Benefits of Abila MIP PayrollNet at Work
 
Sage Intelligence for Sage 100
Sage Intelligence for Sage 100Sage Intelligence for Sage 100
Sage Intelligence for Sage 100Net at Work
 
How the IRS 2019 Form W-4 Will Change Payroll
How the IRS 2019 Form W-4 Will Change PayrollHow the IRS 2019 Form W-4 Will Change Payroll
How the IRS 2019 Form W-4 Will Change PayrollNet at Work
 
Cloud-based Payroll Outsourcing: Why The Shift?
Cloud-based Payroll Outsourcing:  Why The Shift?Cloud-based Payroll Outsourcing:  Why The Shift?
Cloud-based Payroll Outsourcing: Why The Shift?Net at Work
 
Digital Marketing Automation Built for Microsoft Dynamics 365
Digital Marketing Automation Built for Microsoft Dynamics 365Digital Marketing Automation Built for Microsoft Dynamics 365
Digital Marketing Automation Built for Microsoft Dynamics 365Net at Work
 

Mais de Net at Work (20)

Sage HRMS Configuration and Business Response and HR Planning
Sage HRMS Configuration and Business Response and HR PlanningSage HRMS Configuration and Business Response and HR Planning
Sage HRMS Configuration and Business Response and HR Planning
 
Employer Update & Getting Business Back on Track
Employer Update & Getting Business Back on Track Employer Update & Getting Business Back on Track
Employer Update & Getting Business Back on Track
 
Tips on the IRS & DOL Employer Tax Credits & Loans
Tips on the IRS & DOL Employer Tax Credits & LoansTips on the IRS & DOL Employer Tax Credits & Loans
Tips on the IRS & DOL Employer Tax Credits & Loans
 
Sage 100: Enabling Your Team to Work Remotely with the Impact from COVID-19 &...
Sage 100: Enabling Your Team to Work Remotely with the Impact from COVID-19 &...Sage 100: Enabling Your Team to Work Remotely with the Impact from COVID-19 &...
Sage 100: Enabling Your Team to Work Remotely with the Impact from COVID-19 &...
 
The New Remote Workforce & The Case for Hosting Your Sage Solution in the Cloud
The New Remote Workforce & The Case for Hosting Your Sage Solution in the CloudThe New Remote Workforce & The Case for Hosting Your Sage Solution in the Cloud
The New Remote Workforce & The Case for Hosting Your Sage Solution in the Cloud
 
MIP Webinar: Working Remotely with the Impact of COVID-19 & Planning for FFCRA
MIP Webinar: Working Remotely with the Impact of COVID-19 & Planning for FFCRAMIP Webinar: Working Remotely with the Impact of COVID-19 & Planning for FFCRA
MIP Webinar: Working Remotely with the Impact of COVID-19 & Planning for FFCRA
 
Managing Through COVID-19
Managing Through COVID-19Managing Through COVID-19
Managing Through COVID-19
 
Tax Compliance in the Wake of COVID-19 What’s Changed
Tax Compliance in the Wake of COVID-19 What’s ChangedTax Compliance in the Wake of COVID-19 What’s Changed
Tax Compliance in the Wake of COVID-19 What’s Changed
 
Fixed Assets are Suddenly Mobile “At Home” Assets
Fixed Assets are Suddenly Mobile “At Home” AssetsFixed Assets are Suddenly Mobile “At Home” Assets
Fixed Assets are Suddenly Mobile “At Home” Assets
 
Sage 300 Webinar: Enabling Your Team to Work Remotely with the Impact from CO...
Sage 300 Webinar: Enabling Your Team to Work Remotely with the Impact from CO...Sage 300 Webinar: Enabling Your Team to Work Remotely with the Impact from CO...
Sage 300 Webinar: Enabling Your Team to Work Remotely with the Impact from CO...
 
Coping with Covid-19: Keeping the Workplace Moving
Coping with Covid-19: Keeping the Workplace Moving Coping with Covid-19: Keeping the Workplace Moving
Coping with Covid-19: Keeping the Workplace Moving
 
Coronavirus Payroll Continuity
Coronavirus Payroll ContinuityCoronavirus Payroll Continuity
Coronavirus Payroll Continuity
 
How Engaged Employees Affect the Bottom Line
How Engaged Employees Affect the Bottom Line How Engaged Employees Affect the Bottom Line
How Engaged Employees Affect the Bottom Line
 
Transformative HR Technology For Nonprofits
Transformative HR Technology For Nonprofits  Transformative HR Technology For Nonprofits
Transformative HR Technology For Nonprofits
 
Document Capture: Never Touch a Document Again
Document Capture: Never Touch a Document AgainDocument Capture: Never Touch a Document Again
Document Capture: Never Touch a Document Again
 
Benefits of Abila MIP Payroll
Benefits of Abila MIP PayrollBenefits of Abila MIP Payroll
Benefits of Abila MIP Payroll
 
Sage Intelligence for Sage 100
Sage Intelligence for Sage 100Sage Intelligence for Sage 100
Sage Intelligence for Sage 100
 
How the IRS 2019 Form W-4 Will Change Payroll
How the IRS 2019 Form W-4 Will Change PayrollHow the IRS 2019 Form W-4 Will Change Payroll
How the IRS 2019 Form W-4 Will Change Payroll
 
Cloud-based Payroll Outsourcing: Why The Shift?
Cloud-based Payroll Outsourcing:  Why The Shift?Cloud-based Payroll Outsourcing:  Why The Shift?
Cloud-based Payroll Outsourcing: Why The Shift?
 
Digital Marketing Automation Built for Microsoft Dynamics 365
Digital Marketing Automation Built for Microsoft Dynamics 365Digital Marketing Automation Built for Microsoft Dynamics 365
Digital Marketing Automation Built for Microsoft Dynamics 365
 

Último

WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open SourceWSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open SourceWSO2
 
%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in soweto%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in sowetomasabamasaba
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2
 
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...masabamasaba
 
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...Bert Jan Schrijver
 
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfonteinmasabamasaba
 
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...masabamasaba
 
WSO2Con2024 - Enabling Transactional System's Exponential Growth With Simplicity
WSO2Con2024 - Enabling Transactional System's Exponential Growth With SimplicityWSO2Con2024 - Enabling Transactional System's Exponential Growth With Simplicity
WSO2Con2024 - Enabling Transactional System's Exponential Growth With SimplicityWSO2
 
WSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go PlatformlessWSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go PlatformlessWSO2
 
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024VictoriaMetrics
 
Announcing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK SoftwareAnnouncing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK SoftwareJim McKeeth
 
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...Jittipong Loespradit
 
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...masabamasaba
 
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park %in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park masabamasaba
 
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...WSO2
 
AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplatePresentation.STUDIO
 
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyviewmasabamasaba
 
Architecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the pastArchitecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the pastPapp Krisztián
 
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...WSO2
 

Último (20)

WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open SourceWSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
 
%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in soweto%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in soweto
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
 
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
 
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
 
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
 
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
 
WSO2Con2024 - Enabling Transactional System's Exponential Growth With Simplicity
WSO2Con2024 - Enabling Transactional System's Exponential Growth With SimplicityWSO2Con2024 - Enabling Transactional System's Exponential Growth With Simplicity
WSO2Con2024 - Enabling Transactional System's Exponential Growth With Simplicity
 
WSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go PlatformlessWSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go Platformless
 
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
 
Announcing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK SoftwareAnnouncing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK Software
 
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
 
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
 
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park %in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
 
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
 
AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation Template
 
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
 
Architecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the pastArchitecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the past
 
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
 
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
 

Information Security Awareness

  • 1. Live Webinar: Webinar Audio: You can dial the telephone numbers located on your webinar panel. Or listen in using your headphones or computer speakers. Welcome!
  • 2. • Presentation is roughly about 30- 45 minutes • All phone lines are muted • If anyone has any questions during this webinar – please type them in your Questions Box located at the bottom of your webinar panel Webinar Details
  • 3. Today’s Presenters Steve Moisoff Net@Work Account Executive Cando Wango Net@Work IT Solutions Architect John Verry Pivot Point Security Enterprise Security Consultant
  • 4. 180+ Business Technology Architects and Consultants IT Road Mapping & Strategic Planning Business Process Review Ecosystem BI, Analytics & Reporting Cloud & IT Managed Services ERP/ Accounting Web Development & e-Commerce Sister Company Payment Processing SWYPE Sister Company CRM & Marketing Automation HRMS/ Employer Solutions Document Management Compliance Solutions: Sales Tax | Fixed Assets Managed Print Services Sister Company Net@Work Partner Alliance Program
  • 5. Our Previous Webinar Topics Access on our website: netatwork.com/resource ✓ Managed IT Services: What It Is and Why It Matters ✓ The Myths & Realities of Managed IT Services ✓ Uncovering the Business Value of Managed IT Services ✓ Data Recovery Best Practices - Survival of the Fittest All Recorded Webinars Available to Watch On-Demand:
  • 6. “A company that includes 1,000 employees with poor online hygiene has 1,000 insecure endpoints.” Anuj Goel, co-founder of Cyware Labs
  • 7. Email Defense End Point Protection PerimeterThe Essential Elements • Perimeter – e.g. the Firewall…inspecting data coming in and out of your corporate network • Email Defense – Filtering, Inspection and protection of email boundaries • End Point Protection – Zero Day Threat Protection, Anti- Virus definitions • Backup Solutions – Full Recovery of critical systems • Training for End Users – Regular education sessions and testing of knowledge on company standard security posture Backup Solutions End User Training Overview
  • 8. Do you have a Defense Strategy for Staff Accessing Personal Email Accounts on Corporate Devices?  Yes  No  Don’t think we need one  Don’t know Does your Company have a mobile device or Bring Your own device strategy defined?  Yes  No  Don’t think we need one  Don’t know Polling Questions
  • 9. Why Security Awareness Education? • What risks does it address? Who needs Security Awareness Education? • Different companies & roles benefit from different messaging Security Awareness Education vs. a Program • The common ways to effectively educate employees Benefits and Costs (both in time and money) • What you can expect from your investment Agenda
  • 10. By The Numbers… Human error, not technology, is your primary risk factor: 95% of successful cyberattacks are the result of a phishing scam These social engineering scams are hitting our businesses hard: Over 400 businesses are targeted by spear-phishing scams every day Phishing is the primary vector for ransomware, which is also on the rise: 4,000 ransomware attacks occurred every day in 2016, & Symantec logged a 36% increase in infections These attacks are costing us trillions of dollars: The cost of cybercrime is expected to hit $6 trillion in 2021 (up from $3 trillion in 2015) Awareness training is perhaps your most powerful defense: Investing in training can reduce the risk of a breach by as much as 70% Why Security Awareness Education?
  • 11. Management • Senior Management is often not aware of the extent of the risk. • “Tone at the Top” is essential to success … if management isn’t focused, employees aren’t. Information Technology (IT) & Information Security (IS) • IT and/or IS are often the first places people turn with ‘real life’ questions about phishing, vishing, & potential security incidents. End Users • Quality education and good direction from management move End Users from your greatest threat surface to your greatest threat detection mechanism. Who Needs Security Awareness Education?
  • 12. What measures has your company taken to provide security awareness education to their employees?  Program in place  Being discussed  Not on radar but want to pursue  Not interested at this time Polling Questions
  • 13. Content • Roll Your Own • Use an SAE Vendor • Customize an SAE Vendors content Delivery Options • Learning Management System • Digital - Video, PowerPoint, etc. • Human delivered Not unusual to blend content & delivery options in a program. Primary Options to Educate Your Employees
  • 14. The Basics: • Social Engineering • Phishing • Vishing • Ransomware Supportive Topics: • Security Fundamentals (password mgmt., mobile device mgmt., etc.) • Compliance Fundamentals (PCI, HIPPA, GDPR, DFS-500, 800-171, etc.) • Security Frameworks (ISO 27001, NIST CSF, SOC 2, HITRUST, etc.) ***Social Engineering & Phishing Assessments to ensure training is working*** Key Considerations: • Simple lessons – this is a case where less is more • Engaging content Education Should Include
  • 15. 7X Rule – If people haven’t absorbed your message 7 times, they haven't fully grasped it. Reinforcement is essential for successful education and behavioral change. Difference between SAE and a “Program”. Options include: • Newsletters • Memes • Lunch & Learns • Posters • Webinars • Mention in corporate presentations Effective Education Needs Reinforcement
  • 17. “Ponemon recently calculated the effectiveness of anti-phishing training programs. The least effective training program still had a seven-fold return on investment, even taking into account the loss of productivity during the time the employees spent being training. And the average-performing program resulted in a 37-fold return on investment.” By Maria Korolov Contributing Writer, CSO csoonline.com Benefits & Costs: ROI
  • 18. • This is an investment in your company but more importantly your people. • Educated employees take their knowledge home with them to their families and friends. • The implications of successful education means better lives for your people and their communities. Benefits & Costs: Your People
  • 19. SAE provider costs range from ~$8 to $25 per user / per year based on: • Total number of users • Company you hire or resources you purchase • Depth of content licensed • Complete set of services you include in the package (e.g., Phishing, posters, etc.) Typical costs for a program focused on Social Engineering & Security fundamentals: $10 - $14 per user / per year range (80/20 point) Benefits & Costs: $$$
  • 20. Expected time commitment ranges based on quantity of content: • Basic Social Engineering is typically an hour. • Basic Security Fundamentals is usually an hour. • Online training provides greater flexibility to break this up and ensure that the content is absorbed via quizzes. • In-person training provides less flexibility but provides greater interactivity. Benefits & Costs: Time
  • 21. Do you believe company ownership/management will embrace a program of this type?  Absolutely  Possibly  Unlikely  Not At All Likely How valuable do you believe this training program will be?  Extremely valuable  Moderate value  Fair value  Not valuable Polling Questions
  • 22. Summary & Recommendations Security Awareness Education is an Important Part of Your Security “Stack”: • Security Awareness Education minimizes the likelihood someone will make a mistake • But when a mistake happens… • Vulnerability & Configuration Management minimizes the impact of a mistake • But when there is an impact… • Network Segregation can contain the impact of a mistake • But when an impact cannot be contained… • Incident Response planning will let you respond quickly and efficiently • Disaster Recovery planning allows you to recover quickly and efficiently • Test to verify your stack is working as planned
  • 23. Has your company had a security (penetration test/vulnerability assessment) review in the last two years?  Yes  No  I have no clue  Don’t believe we need one Polling Questions
  • 24. Please type in your questions Any Questions?
  • 25. Thank You For Attending! Connect with 646-293-1735 www.netatwork.com netatwork.com/blog Net@Work YouTube Follow us on Twitter: @netatwork_corp Follow Net@Work on LinkedIn Follow Net@Work on Google+ Follow Net@Work on Facebook Contact your Net@Work Account Manager for any questions or concerns. Or you can reach out to us via the information below! Steve Moisoff | Net@Work Senior Solutions Executive Phone: 212.997.5200 Ext. 1735 Direct: 646.293.1735 smoisoff@netatwork.com www.netatwork.com