SlideShare a Scribd company logo
THE HUMAN ELEMENT IN SECURITY
• To err is human, but to really foul things up
requires a computer.
• Computers are unreliable, but humans are even
more unreliable. Any system which depends on
human reliability is unreliable.
In
this
world
……
In this world …. Where
You have No Perimeter
In this world ……
In this world …
In this world ……
When hackers are becoming increasingly sophisticated
Whom Can You Trust?
Information Security
processtechnology
people
ARE YOU REVEALING TOO MUCH ?
SECURITY IS A PEOPLE PROBLEM
The Human Nature
• Careless
• Lazy
• Inquisitive
• Resists Change
• Gullible – Can be deceived
• Social Animal
Human Factor – The other side
• Committed when motivated
• Result oriented
• Intelligent animal
• Sometimes unsocial
Human Element In Security
Building the Human Firewall
End User is the Key to Security
Sec U R iT y
Awareness + Accountability =
Information Security Readiness
Problem:
Human factors represent the greatest challenge.
Solution:
A Security Awareness Program
•Enables every employee to become
•Brings Accountability
Awareness Training
is no longer Optional
SECURITY AWARENESS LADDER
Climbing the AWARENESS ladder
from
• Blissful ignorance
• Growing Recognition
• Understanding
• Positive Actions -- Responsive
• “Thinking Security” - Reduced
Losses
Audience
• Everyone: All Employees, Partners and Contractors
• Separate Messages crafted for general users, management
and technical staff
• Groups of New or Existing Employee - Time Frame
Supporting Communication
Tools
Screen Savers
Reminder Cards
Posters
Social Campaign
•POSTERS
•NEWSLETTERS
•ARTWORK
•YEAR AROUND PROGRAM
Social Campaign
Human Element In Security
Human Element In Security
ARTWORK
Hard Facts
• Physical Security is no longer sufficient
• Over reliance on technology cannot protect you
• Awareness and training is a must.
• Security breach on your system affects YOU !!

More Related Content

PPTX
Safety Gamification
PPTX
Judith Williams_Unconscious Bias_SXW2O
PPTX
Why Technology, Why Us, Why Now?
PDF
Community Management In A Crisis (DevRel)
PPTX
Chris Flack , Co-Founder at Unplug
PPTX
Eap in 2028 – is employee assistance “tech proof”?
PDF
Amplexor - Future of Document Management - DXM for the workplace
PPT
Documenting The Future
Safety Gamification
Judith Williams_Unconscious Bias_SXW2O
Why Technology, Why Us, Why Now?
Community Management In A Crisis (DevRel)
Chris Flack , Co-Founder at Unplug
Eap in 2028 – is employee assistance “tech proof”?
Amplexor - Future of Document Management - DXM for the workplace
Documenting The Future

What's hot (18)

PPTX
Digital natives
PPT
Kevin leversee crowdsourcing the 2012 manila floods ver5
PPTX
Leadership and Mindfulness in a Connected Age
PPTX
Digital distractions in the workplace
PPTX
Real-Time Ethics: Balancing Journalism and Social Media in the Digital Age
PPT
Reputation in Real Time
PDF
Impact of computer by Anil Bhattarai (nikolavinci)
PPT
What’s Your Tech IQ?
PPTX
P plesson one
PPT
I T
PDF
Tech Tips 2 Defeat Distraction NAG 2020
PPTX
The Help Desk is Dead - MISAC 2013 - Dan Turchin
PPTX
#Help! mijn kind leeft online apestaartjaren - 17 mei 2018 - engels - pp le...
PPTX
Top Three Challenges to Building an Organization Dedicated to Social Learning
PDF
Women in Open Source
PDF
Where are your project saboteurs? webinar, 2 March 2020
PPTX
Social Media may hit the target, but it's not a magic bullet!
PDF
Bart vanhaelewyn digimeter 2017 - apestaartjaren mediawijscongres -20180517
Digital natives
Kevin leversee crowdsourcing the 2012 manila floods ver5
Leadership and Mindfulness in a Connected Age
Digital distractions in the workplace
Real-Time Ethics: Balancing Journalism and Social Media in the Digital Age
Reputation in Real Time
Impact of computer by Anil Bhattarai (nikolavinci)
What’s Your Tech IQ?
P plesson one
I T
Tech Tips 2 Defeat Distraction NAG 2020
The Help Desk is Dead - MISAC 2013 - Dan Turchin
#Help! mijn kind leeft online apestaartjaren - 17 mei 2018 - engels - pp le...
Top Three Challenges to Building an Organization Dedicated to Social Learning
Women in Open Source
Where are your project saboteurs? webinar, 2 March 2020
Social Media may hit the target, but it's not a magic bullet!
Bart vanhaelewyn digimeter 2017 - apestaartjaren mediawijscongres -20180517
Ad

Viewers also liked (13)

PDF
styling_cal mag vintage black swim suit
PPTX
La promozione sul web
PPS
Gli Atteggiamenti
PPT
Six Sigma - 2. Perché utilizzarlo?
PDF
Cultural Assessment Questionnaire - Capt. Franco Bosio
PDF
Checklist in Aeronautics - Capt- Andrea Gori
PDF
Nursing - Errore in Sanità - L’importanza che riveste l’incident reporting
PDF
Convention between ISOB-Inpatient Safety On Board and Italian Ministry of Health
PPT
Olismologia - Presentazione convegno inaugurale 18/2/2011
PPT
Modulo 5 S
PPT
Presentazione 5 S
PPT
Building self discipline in our students
PPTX
LESSON: SELF DISCIPLINE
styling_cal mag vintage black swim suit
La promozione sul web
Gli Atteggiamenti
Six Sigma - 2. Perché utilizzarlo?
Cultural Assessment Questionnaire - Capt. Franco Bosio
Checklist in Aeronautics - Capt- Andrea Gori
Nursing - Errore in Sanità - L’importanza che riveste l’incident reporting
Convention between ISOB-Inpatient Safety On Board and Italian Ministry of Health
Olismologia - Presentazione convegno inaugurale 18/2/2011
Modulo 5 S
Presentazione 5 S
Building self discipline in our students
LESSON: SELF DISCIPLINE
Ad

Similar to Human Element In Security (20)

PDF
"Security on the Brain" Security & Risk Psychology Workshop Nov 2013
PDF
The Hacking Team Hack: Lessons Learned for Enterprise Security
PPTX
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...
PPTX
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...
PPTX
Digital transformation: introduction to cyber risk
PPTX
Information Security & Manufacturing
PDF
Evolving it security Threats and Solutions
PPTX
Information security / Cyber Security ppt
PPTX
The difference between the Reality and Feeling of Security
PPTX
Keeping you and your library safe and secure
PPTX
Digi securitypres
PPTX
Managing Risk or Reacting to Compliance
PPTX
Conference about Social Engineering (by Wh0s)
PDF
Banning Whining, Avoiding Cyber Wolves, and Creating Warrior
PPTX
Security Awareness - Defined, Managed and Measured
PDF
Developing The Human Firewall
PPTX
David Bond, Thiess, presents at the OHS Leaders Summit 2013
PDF
The Difference Between the Reality and Feeling of Security by Thomas Kurian
PPTX
GRRCON 2013: Imparting security awareness to all levels of users
PPTX
How to Spend Your Cloud Security Dollar
"Security on the Brain" Security & Risk Psychology Workshop Nov 2013
The Hacking Team Hack: Lessons Learned for Enterprise Security
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...
Digital transformation: introduction to cyber risk
Information Security & Manufacturing
Evolving it security Threats and Solutions
Information security / Cyber Security ppt
The difference between the Reality and Feeling of Security
Keeping you and your library safe and secure
Digi securitypres
Managing Risk or Reacting to Compliance
Conference about Social Engineering (by Wh0s)
Banning Whining, Avoiding Cyber Wolves, and Creating Warrior
Security Awareness - Defined, Managed and Measured
Developing The Human Firewall
David Bond, Thiess, presents at the OHS Leaders Summit 2013
The Difference Between the Reality and Feeling of Security by Thomas Kurian
GRRCON 2013: Imparting security awareness to all levels of users
How to Spend Your Cloud Security Dollar

More from Vineet Sood (12)

PPTX
Customer success when you have millions of customers
PPTX
Building influence for 1st time mgrs
PDF
Vineet Sood - thinker & planner 2019
PPTX
Adobe connectED donation program
PPT
Partner matrices & model by Vineet Sood
PPTX
Activity based Sales Process
PPTX
Growing the Adobe business
PPTX
The New frontiers in Information Security
PPT
My Role @ Symantec
PDF
Unleash your potential final
PPT
Amazon Web Service Sales Role Play - Case Study
PPT
Do Dooni Char - The Force Multipliers In Your Value Chain
Customer success when you have millions of customers
Building influence for 1st time mgrs
Vineet Sood - thinker & planner 2019
Adobe connectED donation program
Partner matrices & model by Vineet Sood
Activity based Sales Process
Growing the Adobe business
The New frontiers in Information Security
My Role @ Symantec
Unleash your potential final
Amazon Web Service Sales Role Play - Case Study
Do Dooni Char - The Force Multipliers In Your Value Chain

Recently uploaded (20)

PDF
Review of recent advances in non-invasive hemoglobin estimation
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Approach and Philosophy of On baking technology
PDF
Empathic Computing: Creating Shared Understanding
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
A comparative analysis of optical character recognition models for extracting...
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Electronic commerce courselecture one. Pdf
PPTX
Machine Learning_overview_presentation.pptx
PDF
Machine learning based COVID-19 study performance prediction
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
sap open course for s4hana steps from ECC to s4
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
Spectroscopy.pptx food analysis technology
Review of recent advances in non-invasive hemoglobin estimation
20250228 LYD VKU AI Blended-Learning.pptx
Approach and Philosophy of On baking technology
Empathic Computing: Creating Shared Understanding
MIND Revenue Release Quarter 2 2025 Press Release
A comparative analysis of optical character recognition models for extracting...
Mobile App Security Testing_ A Comprehensive Guide.pdf
MYSQL Presentation for SQL database connectivity
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
The Rise and Fall of 3GPP – Time for a Sabbatical?
Electronic commerce courselecture one. Pdf
Machine Learning_overview_presentation.pptx
Machine learning based COVID-19 study performance prediction
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Programs and apps: productivity, graphics, security and other tools
Spectral efficient network and resource selection model in 5G networks
Diabetes mellitus diagnosis method based random forest with bat algorithm
sap open course for s4hana steps from ECC to s4
Advanced methodologies resolving dimensionality complications for autism neur...
Spectroscopy.pptx food analysis technology

Human Element In Security

Editor's Notes

  • #3: IT people are remembered all the time when things go wrong AND Murphys law applies to all IT people.
  • #5: "The world isn’t run by weapons anymore, or energy, or money. It’s run by little ones and zeros, little bits of data... There’s a war out there... and it’s not about who’s got the most bullets. It’s about who controls the information.“ Where GothsVandals Talibans were earlier reqd to bring down the infrastructure Today a lean geek can cause the similar damage with few strokes of zeros and ones.
  • #6: CISOs have spent the past few years perfecting digging moats around the corporate castle. Now, as they lift their heads out of the trenches, they find themselves living in the age of bomber planes and guided missiles
  • #7: A single worm can cause a chaos and cost lot of money
  • #8: By bringing in blended threats reducing the exploit time and Use of new technology….targeted attacks, ….modular threat vectors.
  • #9: Who ? Who ? ………….. Your consultant, or your vendor or your IT staff ……………….it is you yourself……….each one of you. The answer is your employees: Employees are the ones who use the information assets – they are the one who are the closest to these assets – they are the one who gets most affected by security incident -- hence the onus of protection falls on them first. They can be the human firewall -- your organization needs for protection against the numerous threats out in the open.
  • #10: <number> It’s all about People, Process and Technology – Technology is the smallest part and the easiest to control!! Neither process nor technology will do any good if the people are not adequately trained. People need to be aware of what the current threats are, and what to do about them. They need to know what protection mechanisms are in place, be they a technical solution or a process.
  • #11: Tell a man there are 300 billion stars in the universe and he'll believe you. Tell him a bench has wet paint on it and he'll have to touch to be sure. PEOPLE PROBLEM All technical people view computer security as a technology problem. They use sophisticated hardware and software solutions to control access and prevent fraud. The reality is that computer security is a people problem.
  • #15: Human Firewall -- Most vulnerable – they are prone accidents and can make mistakes/errors and may even have malicious intents sometimes. Employees are greatest threats to information security. Caused by: Inexperience Improper training Incorrect assumptions Other circumstances HOW CAN WE CLOSE GAPS IN THIS HUMAN FIREWALL -- ?
  • #17: Security awareness must be delivered through an ongoing, continuous program, as opposed to a finite set of activities. Despite significant investment in technology and infrastructure, Human factors represent the greatest challenge. in achieving information security readiness
  • #20: <number>
  • #21: Campaign Raising awareness is similar to commercial advertising or social marketing, such as the campaigns to reduce smoking or decrease the use of alcohol. Behavioral change is what we are aiming at.