O slideshow foi denunciado.
Utilizamos seu perfil e dados de atividades no LinkedIn para personalizar e exibir anúncios mais relevantes. Altere suas preferências de anúncios quando desejar.

WE16 - Cyber Security - Security is Everyone's Responsibility

113 visualizações

Publicada em

Cyber Security - Security is Everyone's Responsibility

Publicada em: Engenharia
  • Seja o primeiro a comentar

  • Seja a primeira pessoa a gostar disto

WE16 - Cyber Security - Security is Everyone's Responsibility

  1. 1. Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement. Cyber Security Security is Everyone’s Responsibility
  2. 2. Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement. The Who, Where and Why.
  3. 3. Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement. But you still need to be aware of the internal threat. Attackers are usually external to the victim’s organization.
  4. 4. Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement. Nobody is immune.
  5. 5. Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement. Attackers are typically after the money. Financial Espionage 80% 9%
  6. 6. Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement. What happens next is determined by the attacker’s end game. Many breaches share the same threat actions in the early stages of the attack.
  7. 7. Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement. Social Engineerin g – it’s not just for email In 2015, Social Engineering was the #1 attack technique. People replaced exploits as attackers’ favorite way to beat Cybersecurity. Proof Point
  8. 8. Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement. Perimeter Network Device Application Data Layered Defense Practices Policies People
  9. 9. Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement. Safeguard Password s Be Suspiciou s Manage access Design for Resilience Building a Cyber Defensive Workforce
  10. 10. Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement. Behaviors travel
  11. 11. Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement. Quick tips for everyone Look our for links in unsolicited emails Passwords – no sharing, and change them often Set passcode locks on your mobile devices Watch what you share on social media Download software/apps only from safe sources

×