Protecting Your Not-For-Profit
Cyber Security
Approach
• Understand the issues
• Evaluate your risks
• Protect your company
• React to a breach
Title of Slide Deck 2
Technology Profile
• IT as a strategic asset not a cost
• IT Spending levels
• Security
• Governance
• Your place on the adoption curve
• Training
• Constituent touch points
Title of Slide Deck 3
Security Profile
• Risk aversion
• User technical expertise
• Presence of PII
• Security budget
– Outsourced services
– Equipment
• Use of remote access and
the cloud
• Number of In-house IT staff
and expertise
• Whether laptops are used
• Physical characteristics of
offices; stand alone, high
rise
• Specific password policy:
– Length
– Complexity
– Expiration
– Number of attempts before
lockout
– Lockout time length
– Number of password
changes before reuse
Title of Slide Deck 4
Anatomy Of A Breach
• Compromise credentials
• Escalate permissions
• Search and access data
• Exfiltration
• Sale of data
Cyber Security 5
Know The Basics
• Security is all about perception
• Balance – Cost, user access, protection complexity
• Physical, logical, social
• Data at rest, and data in transit
• Components – Inventory, Risk, Assessment
Title of Slide Deck 6
Security Plan Components
• Inventory
– Data
– Hardware
– Software
– Policies
– Skills and Knowledge
• Internal, consultants
• Risks
• Assessment
– Action Items
– Policy Changes
– User Education
• Breach Response Plan
• Ongoing Maintenance
– Priorities
– Accountability
Title of Slide Deck 7
Data Inventory
• Where is the data and who has access to it?
– Low risk vs. High business impact (HBI)
– Personally Identifiable Information (PII)
– Product designs
– Customer database, AR
– Financial information
– E-mail
– Vendor contracts
– Software configurations
Title of Slide Deck 8
Cloud
• Inventory
• AICPA SOC 2 report (formerly SAS70, now SSAE16 )
• Pass-through reports
• Applications’ data locations
Title of Slide Deck 9
Mobile
• Inventory
• Device encryption
• Password
• Time out
• Ability to wipe device
Title of Slide Deck 10
Mitigation Examples – Before And After
• Account retry lockout
• Pass phrases instead of complex passwords
• Signed security policies
• Two factor authentication
• Training
• Hard drive encryption
• Web site certificates
• Inactivity timeout with password required
• Disallowing personally identifiable information (PII)
Title of Slide Deck 11
Data Breach Insurance
• Identify the cause and the individuals affected
• Notification
• Credit monitoring for individuals affected
• Public relations management
• Legal expenses to work with regulators
Title of Slide Deck 12
Action Items
• Inventory personally identifiable information (PII)
• Assess the likelihood of a breach of PII
• Encrypt all laptops and other selected computers
• Have an outside security assessment performed
• Implement an Intrusion Detection System
• Purchase insurance
• Develop an after-breach plan – tech and non-tech
• Training, awareness
Title of Slide Deck 13
Questions
• peterhenley@clarknuber.com
• 425-454-4919
• http://slideshare.net/peterhenley
Title of Slide Deck 14
Resources
•
Washington state notification law:
http://apps.leg.wa.gov/rcw/default.aspx?cite=19.255
.010
• Sample privacy policy:
http://www.privacyaffiliates.com/ps/ps0709192337.
html
• Sample IT policy: http://slideshare.net/peterhenley
Title of Slide Deck 15
Logical Security Terms
• Confidentiality—who should have access to the data?
– Username and password (pass phrase)
– Encryption
• Authorization—what permissions does the user have for
working with the data?
– Data classification
• Accountability—what has the recipient done with the data?
– System logs, policy
• Integrity—how do you know if the data has been altered?
– Data attributes – time stamp, size, author
• Authenticity—how do you know where the data came from?
Title of Slide Deck 16
More Security Terms
• Physical Security, "In the Room" - the ability to
physically protect and secure systems and
components from theft
• User Security, "At the Keyboard" - the processes and
policies used to assure user authentication
• System Security, "In the Box" - the ability to protect
the integrity of a system from malicious attack
• Network Security, "On the Net" - the ability to
interact with internal and external users and remote
systems in a secure manner
Title of Slide Deck 17

More Related Content

PPTX
Information security - what is going on 2016
PPTX
Fuel Good 2018: Is your Nonprofit at Risk? Security and Privacy Best Practices
PDF
Database forensics
DOCX
Data Security
PDF
Data Security
PPT
PPT
Database security
PPT
Lesson10 Database security
Information security - what is going on 2016
Fuel Good 2018: Is your Nonprofit at Risk? Security and Privacy Best Practices
Database forensics
Data Security
Data Security
Database security
Lesson10 Database security

What's hot (18)

PPT
Lecture Data Classification And Data Loss Prevention
PPT
Data Classification And Loss Prevention
PDF
Carver IT Security for Librarians
PDF
Brochure Imperva Vormetric
PPT
BOMA
PDF
Carver-IT Security for Librarians
PDF
Karel Obluk (Evolution Equity Partners) - Cybersecurity: Challenges and Oppor...
PPTX
Logs in Security and Compliance flare
PPTX
Data security
PPTX
Database security
PPTX
Data Security Explained
PPTX
Two Become One Conference Keynote: Encryption and Key Management
PDF
CISSP Prep: Ch 3. Asset Security
PPTX
Database Security Management
DOCX
Database Security Concepts | Introduction to Database Security
PPTX
Eight principles of consumer data privacy
PDF
Data Security
PPTX
Hh customer presentation web
Lecture Data Classification And Data Loss Prevention
Data Classification And Loss Prevention
Carver IT Security for Librarians
Brochure Imperva Vormetric
BOMA
Carver-IT Security for Librarians
Karel Obluk (Evolution Equity Partners) - Cybersecurity: Challenges and Oppor...
Logs in Security and Compliance flare
Data security
Database security
Data Security Explained
Two Become One Conference Keynote: Encryption and Key Management
CISSP Prep: Ch 3. Asset Security
Database Security Management
Database Security Concepts | Introduction to Database Security
Eight principles of consumer data privacy
Data Security
Hh customer presentation web
Ad

Viewers also liked (7)

PDF
NACCTFO Cyber Security Presentation 2014 New Orleans
PPTX
SolarWinds Federal Cybersecurity Survey 2016
PPTX
Cybersecurity 1. intro to cybersecurity
PPT
Introduction to Cyber Security
PPTX
Cyber security
PPTX
Cyber security presentation
PPTX
Cyber crime and security ppt
NACCTFO Cyber Security Presentation 2014 New Orleans
SolarWinds Federal Cybersecurity Survey 2016
Cybersecurity 1. intro to cybersecurity
Introduction to Cyber Security
Cyber security
Cyber security presentation
Cyber crime and security ppt
Ad

Similar to Cyber security (20)

PPTX
Cyber Security - ASGFOA
PPTX
Security Imeprative for iOS and Android Apps
PPT
Session4807.ppt
PPTX
Aligning Application Security to Compliance
PDF
Trust in a Digital World
PPTX
Presentation on Information Privacy
PDF
Widepoint orc thales webinar 111313d - nov 2013
PDF
Learning about Security and Compliance in Office 365
PPT
28_Security-Privacy-inxssudusd_Cloud.ppt
PPT
28_Security-Privacy-in_Cloud_AND_real.ppt
PPT
Securing your esi_piedmont
PPTX
Improve IT Security and Compliance with Mainframe Data in Splunk
PDF
Seattle Tech4Good meetup: Data Security and Privacy
PPTX
2011 hildebrandt institute cio forum data privacy and security presentation...
PPT
educational content,educational content,educational content,
PPTX
Protect Sensitive Data on Your IBM i (Social Distance Your IBM i/AS400)
PPTX
Identity theft and data responsibilities
PPTX
SQLCAT: Addressing Security and Compliance Issues with SQL Server 2008
PDF
Key Concepts for Protecting the Privacy of IBM i Data
PPTX
security in is.pptx
Cyber Security - ASGFOA
Security Imeprative for iOS and Android Apps
Session4807.ppt
Aligning Application Security to Compliance
Trust in a Digital World
Presentation on Information Privacy
Widepoint orc thales webinar 111313d - nov 2013
Learning about Security and Compliance in Office 365
28_Security-Privacy-inxssudusd_Cloud.ppt
28_Security-Privacy-in_Cloud_AND_real.ppt
Securing your esi_piedmont
Improve IT Security and Compliance with Mainframe Data in Splunk
Seattle Tech4Good meetup: Data Security and Privacy
2011 hildebrandt institute cio forum data privacy and security presentation...
educational content,educational content,educational content,
Protect Sensitive Data on Your IBM i (Social Distance Your IBM i/AS400)
Identity theft and data responsibilities
SQLCAT: Addressing Security and Compliance Issues with SQL Server 2008
Key Concepts for Protecting the Privacy of IBM i Data
security in is.pptx

More from Peter Henley (20)

PDF
Experion Data Breach Response Excerpts
DOC
IT Policy Template
DOCX
Advice to graduates
DOCX
Strategic role of the CIO
PPTX
eSign 2014 With IRS form 8879
PDF
Cloud Plan 2014
PPTX
Digital Signatures
DOCX
Cloud Computing Discussion Points
PPTX
Cloud Computing Classifications
PPTX
Cloud slides
PPTX
Paperless Best Practices 2014
PDF
CPA Firm CIO Job Description
PPS
2001 Terrorist Attacks On USA
PDF
Clark Nuber IT Policy
DOCX
Technology Profile of a Company
PDF
Killer Interview Questions
DOCX
CIO Role
DOCX
CIO skills evaluation
PPTX
Business continuity
PPTX
IT Decision model
Experion Data Breach Response Excerpts
IT Policy Template
Advice to graduates
Strategic role of the CIO
eSign 2014 With IRS form 8879
Cloud Plan 2014
Digital Signatures
Cloud Computing Discussion Points
Cloud Computing Classifications
Cloud slides
Paperless Best Practices 2014
CPA Firm CIO Job Description
2001 Terrorist Attacks On USA
Clark Nuber IT Policy
Technology Profile of a Company
Killer Interview Questions
CIO Role
CIO skills evaluation
Business continuity
IT Decision model

Recently uploaded (20)

PDF
Developing a website for English-speaking practice to English as a foreign la...
PDF
Improvisation in detection of pomegranate leaf disease using transfer learni...
PDF
Convolutional neural network based encoder-decoder for efficient real-time ob...
PPTX
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
PDF
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
PDF
NewMind AI Weekly Chronicles – August ’25 Week III
PPTX
The various Industrial Revolutions .pptx
PPT
What is a Computer? Input Devices /output devices
PDF
Zenith AI: Advanced Artificial Intelligence
PDF
sbt 2.0: go big (Scala Days 2025 edition)
PDF
Credit Without Borders: AI and Financial Inclusion in Bangladesh
PDF
A proposed approach for plagiarism detection in Myanmar Unicode text
PDF
Enhancing plagiarism detection using data pre-processing and machine learning...
PDF
UiPath Agentic Automation session 1: RPA to Agents
PPTX
Microsoft Excel 365/2024 Beginner's training
PDF
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
PDF
OpenACC and Open Hackathons Monthly Highlights July 2025
PDF
STKI Israel Market Study 2025 version august
PDF
Architecture types and enterprise applications.pdf
PPT
Module 1.ppt Iot fundamentals and Architecture
Developing a website for English-speaking practice to English as a foreign la...
Improvisation in detection of pomegranate leaf disease using transfer learni...
Convolutional neural network based encoder-decoder for efficient real-time ob...
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
NewMind AI Weekly Chronicles – August ’25 Week III
The various Industrial Revolutions .pptx
What is a Computer? Input Devices /output devices
Zenith AI: Advanced Artificial Intelligence
sbt 2.0: go big (Scala Days 2025 edition)
Credit Without Borders: AI and Financial Inclusion in Bangladesh
A proposed approach for plagiarism detection in Myanmar Unicode text
Enhancing plagiarism detection using data pre-processing and machine learning...
UiPath Agentic Automation session 1: RPA to Agents
Microsoft Excel 365/2024 Beginner's training
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
OpenACC and Open Hackathons Monthly Highlights July 2025
STKI Israel Market Study 2025 version august
Architecture types and enterprise applications.pdf
Module 1.ppt Iot fundamentals and Architecture

Cyber security

  • 2. Approach • Understand the issues • Evaluate your risks • Protect your company • React to a breach Title of Slide Deck 2
  • 3. Technology Profile • IT as a strategic asset not a cost • IT Spending levels • Security • Governance • Your place on the adoption curve • Training • Constituent touch points Title of Slide Deck 3
  • 4. Security Profile • Risk aversion • User technical expertise • Presence of PII • Security budget – Outsourced services – Equipment • Use of remote access and the cloud • Number of In-house IT staff and expertise • Whether laptops are used • Physical characteristics of offices; stand alone, high rise • Specific password policy: – Length – Complexity – Expiration – Number of attempts before lockout – Lockout time length – Number of password changes before reuse Title of Slide Deck 4
  • 5. Anatomy Of A Breach • Compromise credentials • Escalate permissions • Search and access data • Exfiltration • Sale of data Cyber Security 5
  • 6. Know The Basics • Security is all about perception • Balance – Cost, user access, protection complexity • Physical, logical, social • Data at rest, and data in transit • Components – Inventory, Risk, Assessment Title of Slide Deck 6
  • 7. Security Plan Components • Inventory – Data – Hardware – Software – Policies – Skills and Knowledge • Internal, consultants • Risks • Assessment – Action Items – Policy Changes – User Education • Breach Response Plan • Ongoing Maintenance – Priorities – Accountability Title of Slide Deck 7
  • 8. Data Inventory • Where is the data and who has access to it? – Low risk vs. High business impact (HBI) – Personally Identifiable Information (PII) – Product designs – Customer database, AR – Financial information – E-mail – Vendor contracts – Software configurations Title of Slide Deck 8
  • 9. Cloud • Inventory • AICPA SOC 2 report (formerly SAS70, now SSAE16 ) • Pass-through reports • Applications’ data locations Title of Slide Deck 9
  • 10. Mobile • Inventory • Device encryption • Password • Time out • Ability to wipe device Title of Slide Deck 10
  • 11. Mitigation Examples – Before And After • Account retry lockout • Pass phrases instead of complex passwords • Signed security policies • Two factor authentication • Training • Hard drive encryption • Web site certificates • Inactivity timeout with password required • Disallowing personally identifiable information (PII) Title of Slide Deck 11
  • 12. Data Breach Insurance • Identify the cause and the individuals affected • Notification • Credit monitoring for individuals affected • Public relations management • Legal expenses to work with regulators Title of Slide Deck 12
  • 13. Action Items • Inventory personally identifiable information (PII) • Assess the likelihood of a breach of PII • Encrypt all laptops and other selected computers • Have an outside security assessment performed • Implement an Intrusion Detection System • Purchase insurance • Develop an after-breach plan – tech and non-tech • Training, awareness Title of Slide Deck 13
  • 14. Questions • peterhenley@clarknuber.com • 425-454-4919 • http://slideshare.net/peterhenley Title of Slide Deck 14
  • 15. Resources • Washington state notification law: http://apps.leg.wa.gov/rcw/default.aspx?cite=19.255 .010 • Sample privacy policy: http://www.privacyaffiliates.com/ps/ps0709192337. html • Sample IT policy: http://slideshare.net/peterhenley Title of Slide Deck 15
  • 16. Logical Security Terms • Confidentiality—who should have access to the data? – Username and password (pass phrase) – Encryption • Authorization—what permissions does the user have for working with the data? – Data classification • Accountability—what has the recipient done with the data? – System logs, policy • Integrity—how do you know if the data has been altered? – Data attributes – time stamp, size, author • Authenticity—how do you know where the data came from? Title of Slide Deck 16
  • 17. More Security Terms • Physical Security, "In the Room" - the ability to physically protect and secure systems and components from theft • User Security, "At the Keyboard" - the processes and policies used to assure user authentication • System Security, "In the Box" - the ability to protect the integrity of a system from malicious attack • Network Security, "On the Net" - the ability to interact with internal and external users and remote systems in a secure manner Title of Slide Deck 17