SlideShare a Scribd company logo
BSidesLondon 2011Layer 8 SecuritySecuring The Nut Between the Keyboard & Screen
What Do These Have In Common
The Dreaded APT!!
The Root Cause48% of Breaches Were Caused by Insiders- Verizon90% of Malware Requires Human Interaction- Symantec100% of Successful Attacks Compromised The Human- Mandiant64% of Orgs See Security Awareness As a Challenge- E&Y 20103 times as many breaches are caused by accidental insider activity than malicious intent- Open Security Foundation
People Are The Weakest Link
So Are People
Or Are They
Or Are They
Maybe They Are
Maybe They
Mostly They Just Are
Yet Where Do we Spend?Gartner 2010
Our Focus Is Wrong
Failure to Engage
Content Misses The Mark
Compliance Requirement
Don’t Take Local Issues Into Account
No Measurements
But Mostly
Securing The Nut
Developing A Security Awareness Program
Be Prepared
Develop A Strategy
Budget
Make Sure it is Adequate
Select Appropriate Tools
Consider Different Cultures
Hook The Audience
Communication
Continual Support
Review & Monitor Success
Maintain The Program
Remember
QuestionsBrian.honan@bhconsulting.iewww.bhconsulting.iewww.twitter.com/brianhonanwww.bhconsulting.ie/securitywatchTel : +353 – 1 - 4404065

More Related Content

PPT
Paul Henry’s 2011 Malware Trends
PPTX
4 Facts Every Business Should Know About Phishing
PPTX
Verizon Data Breach Investigations Report (DBIR) 2017
PPTX
The What If's of Hostile:Evil Personas
PPT
End User Security Awareness Presentation
PDF
The Human Side of Security
PDF
Phishing Awareness
PPTX
Fraud Detection With User Behavior Analytics
Paul Henry’s 2011 Malware Trends
4 Facts Every Business Should Know About Phishing
Verizon Data Breach Investigations Report (DBIR) 2017
The What If's of Hostile:Evil Personas
End User Security Awareness Presentation
The Human Side of Security
Phishing Awareness
Fraud Detection With User Behavior Analytics

What's hot (20)

PPTX
Social Engineering
PPTX
Phishing awareness
PDF
Security Implications of the Cloud
PDF
Cyber Security Analytics – The Weapon to Fight Cyber Crime
PDF
Cyber security awareness booklet for citizens from mahashtra cyber 10 jan2020
PDF
Security and Your Business
PDF
Mobile Security 101
PPTX
Mobile security
PDF
Human Error in Cyber Security
PDF
Phil Grimes - Penetrating the Perimeter: Tales from the Battlefield
PDF
Malware and the Cost of Inactivity
PDF
Overcoming Cyber Attacks
PPTX
Mobile security
PPTX
BUILDING AWARENESS AND AWARENESS PROGRAM - Vasil Tsvimitidze
PDF
Smartphone security issues
PDF
The Seven Kinds of Security
PDF
PhishingBox Presents 'What is Phishing' 2017
PPTX
OPSEC for OMBUDSMEN
PDF
Mobile Security
Social Engineering
Phishing awareness
Security Implications of the Cloud
Cyber Security Analytics – The Weapon to Fight Cyber Crime
Cyber security awareness booklet for citizens from mahashtra cyber 10 jan2020
Security and Your Business
Mobile Security 101
Mobile security
Human Error in Cyber Security
Phil Grimes - Penetrating the Perimeter: Tales from the Battlefield
Malware and the Cost of Inactivity
Overcoming Cyber Attacks
Mobile security
BUILDING AWARENESS AND AWARENESS PROGRAM - Vasil Tsvimitidze
Smartphone security issues
The Seven Kinds of Security
PhishingBox Presents 'What is Phishing' 2017
OPSEC for OMBUDSMEN
Mobile Security
Ad

Viewers also liked (20)

PPTX
Greek Travel Guide
PDF
P Gross Portfolio2008
PDF
Scare Ware From Ireland
PDF
Economic Reform and Trade Liberalization- Story of India
PPT
Prezentacja Gimnazjum Integracyjnego
PDF
Nv Telecoms & It Services
PPT
Tactiek verdedigen
PDF
Hot Topics For 2010
PDF
Will Rogers IAAP May Mtg Invitation
PPT
PDF
Boardwalk Capital overview
PDF
Green building
PDF
East Side Rising
ODP
Exercici11.3
PPT
Video Game Console
PPT
Finnish baseball
PDF
Graphs healthy eating_questionnaire
PPT
Sapinaa sahkolla
PPTX
Verkkotyövälineitä kv-viestintään ja hanketyöhön
PPTX
From student to professional – my experiences - 2010
Greek Travel Guide
P Gross Portfolio2008
Scare Ware From Ireland
Economic Reform and Trade Liberalization- Story of India
Prezentacja Gimnazjum Integracyjnego
Nv Telecoms & It Services
Tactiek verdedigen
Hot Topics For 2010
Will Rogers IAAP May Mtg Invitation
Boardwalk Capital overview
Green building
East Side Rising
Exercici11.3
Video Game Console
Finnish baseball
Graphs healthy eating_questionnaire
Sapinaa sahkolla
Verkkotyövälineitä kv-viestintään ja hanketyöhön
From student to professional – my experiences - 2010
Ad

Similar to Layer 8 Security - Securing the Nut Between the Keyboard & Screen (20)

PDF
Building a culture of security
PPTX
Application Security: What do we need to know?
PDF
Security awareness-checklist 2019
PPTX
Cybersecurity in 2016
PPTX
Mind the gap
PPTX
Top 12 Threats to Enterprise
PPTX
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
PPTX
Baking Security into the Company Culture (2017)
PPT
Nonprofit Security Matters: It's Not About the Network
PPT
Bright talk intrusion prevention are we joking - henshaw july 2010 a
PPTX
Security Awareness Program
PPTX
Information Security Basics for Businesses and Individuals
PPT
Managing insider threat
PDF
Wfh security risks - Ed Adams, President, Security Innovation
PDF
A6704d01
PDF
2011 SC Magazine Insider Threat Keynote
PPT
Discovering the Value of Verifying Web Application Security Using IBM Rationa...
PDF
Anti Whaling Hardening Up Your Net Presence
PDF
Anti Whaling Hardening Up Your Net Presence
PPTX
Top 10 Measure to Mitigate Insider Security Threats.pptx
Building a culture of security
Application Security: What do we need to know?
Security awareness-checklist 2019
Cybersecurity in 2016
Mind the gap
Top 12 Threats to Enterprise
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
Baking Security into the Company Culture (2017)
Nonprofit Security Matters: It's Not About the Network
Bright talk intrusion prevention are we joking - henshaw july 2010 a
Security Awareness Program
Information Security Basics for Businesses and Individuals
Managing insider threat
Wfh security risks - Ed Adams, President, Security Innovation
A6704d01
2011 SC Magazine Insider Threat Keynote
Discovering the Value of Verifying Web Application Security Using IBM Rationa...
Anti Whaling Hardening Up Your Net Presence
Anti Whaling Hardening Up Your Net Presence
Top 10 Measure to Mitigate Insider Security Threats.pptx

More from Brian Honan (20)

PPTX
Brian honan ipexpo keynote
PPTX
GDPR & Brexit - What Does the Future Hold?
PDF
Ransomware Prevention Guide
PPTX
Brian honan
PPTX
The dark side of the internet
PPTX
Data security brian honan
PPTX
Presentation on EU Directives Impacting Cyber Security for Information Securi...
PPTX
Incident Response in the Cloud
PPTX
How to Like Social Media Network Security
PDF
Bridging the air gap
PDF
Proactive incident response
PPTX
Learning from History
PPTX
Incident response cloud
PPTX
Preparing for Failure - Best Practise for Incident Response
PPT
Best practises for log management
PPT
Cloud security
PPTX
Creating a CERT at WARP Speed
PDF
The Case for Mandatory Data Breach Disclosure Laws
PPTX
Ic Sconf2010presentation Dp Bh
PPT
Knowing Me Knowing You
Brian honan ipexpo keynote
GDPR & Brexit - What Does the Future Hold?
Ransomware Prevention Guide
Brian honan
The dark side of the internet
Data security brian honan
Presentation on EU Directives Impacting Cyber Security for Information Securi...
Incident Response in the Cloud
How to Like Social Media Network Security
Bridging the air gap
Proactive incident response
Learning from History
Incident response cloud
Preparing for Failure - Best Practise for Incident Response
Best practises for log management
Cloud security
Creating a CERT at WARP Speed
The Case for Mandatory Data Breach Disclosure Laws
Ic Sconf2010presentation Dp Bh
Knowing Me Knowing You

Recently uploaded (20)

PDF
Heart disease approach using modified random forest and particle swarm optimi...
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
A comparative analysis of optical character recognition models for extracting...
PPTX
cloud_computing_Infrastucture_as_cloud_p
PDF
1 - Historical Antecedents, Social Consideration.pdf
PDF
Getting Started with Data Integration: FME Form 101
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
1. Introduction to Computer Programming.pptx
PDF
A comparative study of natural language inference in Swahili using monolingua...
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PDF
August Patch Tuesday
PPTX
A Presentation on Touch Screen Technology
PDF
Hybrid model detection and classification of lung cancer
PDF
Web App vs Mobile App What Should You Build First.pdf
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PPTX
Tartificialntelligence_presentation.pptx
PDF
WOOl fibre morphology and structure.pdf for textiles
PDF
Zenith AI: Advanced Artificial Intelligence
Heart disease approach using modified random forest and particle swarm optimi...
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
A comparative analysis of optical character recognition models for extracting...
cloud_computing_Infrastucture_as_cloud_p
1 - Historical Antecedents, Social Consideration.pdf
Getting Started with Data Integration: FME Form 101
Unlocking AI with Model Context Protocol (MCP)
1. Introduction to Computer Programming.pptx
A comparative study of natural language inference in Swahili using monolingua...
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
August Patch Tuesday
A Presentation on Touch Screen Technology
Hybrid model detection and classification of lung cancer
Web App vs Mobile App What Should You Build First.pdf
Digital-Transformation-Roadmap-for-Companies.pptx
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Group 1 Presentation -Planning and Decision Making .pptx
Tartificialntelligence_presentation.pptx
WOOl fibre morphology and structure.pdf for textiles
Zenith AI: Advanced Artificial Intelligence

Layer 8 Security - Securing the Nut Between the Keyboard & Screen

Editor's Notes

  • #3: All these companies have been very publicly breached creating headlines around the world
  • #4: The common theme across those companies is that they were the victims of what has been dubbed the Advanced Persistent Threat.Each of these companies have very active and large security programmes in place
  • #5: So why were they breached?While each of the breaches may have involved some cool hack, such as a 0 day exploit (or oday for our American friends), the common denominator across them all has been each breach involved human interaction to facilitate the attack.The Google hack was the result of an employee clicking on a link embedded in an email. This link brought them to an infected website that used an exploit within IE6 and providing the attackers with a foothold within Google. Now why Google was using IE6 rather than Chrome is another issues The RSA hack was the result of an email with an MS Excel spreadsheet attachment which when opened exploited a vulnerability in Adobe Flash – which again gave the attackers the foothold they needed.
  • #6: So obviously people are the weakest link
  • #7: So why are these attacks so successful.Are your fellow workers Stupid ? They must be if they are gullible to these ruses?
  • #8: People are the weakest linkOr maybe they just are lazy and don’t want the hassle that security brings into their lives
  • #9: Perhaps they are so arrogant and cocky that they think that They will never fall for a scamThey are too important to worry about information security, that is IT’s job.They are too important to have their work interrupted by security
  • #10: Perhaps they choose to ignore the risks.After all it is not their problem
  • #11: Or simply they may not care.After all it is not their job to worry about security, they have other things to be worried about.
  • #12: But mostly they are just trying to get their job done.Most people are quite busy surviving their day jobAnd in this current climate, surviving is all they care about.Their focus is on their job and not necessarily on security. Whatever it takes to get their job done, that is what they will doThey will often view security as an obstacle to how they get their job done.They not only have to worry about information security, but they also have other programmes they need to keep up with;Health and SafetyEthicalProfessional DevelopmentCompany policiesHR Issues.
  • #13: So if people are the main issue then surely that is where most of our security investment is going?The opposite is throughA recent survey by Gartner shows that information security budgets in companies with a MATURE information security programme in place spent approximately 10% of their overall IT budget on information security.Of that 10%37% is on Personnel, salaries etc.25% is on software20% is on Hardware10% on outsourcing services9% on consulting, which includes sec awareness training.
  • #14: If people are the main cause of breaches why are we spending so little on security awareness?Clearly our focus is in the wrong area.So it is important to not only revise where we spend our money but more importantly that we spent that money wisely
  • #15: The content of many security awareness programmes can be very boring to the ordinary person.While we may find information about viruses, exploit, hacks to be riveting stuff – in reality it reduces most people to glazed out drooling zombies who would rather be thinking about something else. Often the content is boringThe trainers may not be knowledgeable enough about the topic, or indeed may not be good trainers. You may be an excellent security professional but can you engage an audience on something they do not care about?The delivery mechanism may be wrong.Online courses can often be ineffective if not addressing the core needs of the audience or is viewed as a game to see who can answer the questions as quickly as possible
  • #16: Most security awareness programmes fail because they fail to meet the deliverables, if they are deliverables defined in the first place
  • #17: Many security awareness programs are simply there to fulfil a compliance requirementTherefore the cheapest solution to meet that requirement is what is selected, rather than what is most effective.On a more individual basis some companies think that by Coercing people into completing their security awareness as part of their annual review is the way to get it done
  • #18: A big failure is programmes not being relevant.How many people in this room who have taken security awareness programmes that refere to laws or regulations not relevant to them? E.g. US laws.
  • #19: Others fail because they do not measure how effective their programmes have been.Often no benchmarks or goals have been identified t measure the success of the programSo when looking for additional budget or to re-run the programme it is hard to prove to management what the return of investment or success rate of the programme has been
  • #20: But mostly we simply select a solution and hope for the best
  • #21: So how do we go about securing the nut between the keyboard and the screen?We need to develop a solution that is continually improving itself over time as our needs changeSimilar to the Plan Do Check Act cycle within ISO 27001 and other quality standards.
  • #22: Get Management SupportNot just on paperActive participation
  • #23: Be preparedIdentify the business needs of your organisationHow disperse is the audience? Are they spread over remote offices.Have you got remote workers to consider?Technology Profile Of Users IT vs. End Users Profile of UsersManagersMobile Workers
  • #24: What are the Organisational Phycology/Motivational DriversIdentify the audienceDifferent content for different profilesWhat are the drivers for each group, e.g. sales v HR v AccountsTiming of courses to fit in with business needs. Don’t schedule the course for sales at the end of a quarter when they are focused on meeting key sales figures.What will be the age/social profile of the audience? Young and tech savvy or old and techphobic?
  • #25: You will need budget to do run your program
  • #26: It should be a set budget and not what remains over from the IT security budgetTry and get an annually allocated budget
  • #27: Delivery MechanismsClassroom/lecture StyleWorkshopIntegrated in Induction TrainingWeb BasedRole PlaysGamesInternal vs. External MaterialWhat Are the Main Differences?Internal vs. External TrainersWhy Choose One Over the Other?
  • #28: Size of OrganisationsHow Many Locations?International IssuesRemote WorkersWhat are the Drivers?Regulatory?Good Practise?
  • #29: Provide a hook for the audienceE.g. computers at home, impact of information loss in real terms
  • #30: On-going CommunicationUse Expertise Elsewhere in CompanyMarketing DepartmentHRPR DepartmentTrack AttendanceSeek Feedback
  • #31: ReinforcementPostersMouse matsLogin MessagesRegular TestingCould be Integrate with Annual reviewsSpot Checks/Tests
  • #32: Monitor Success of ProgramMonitoring ToolsTestsEnd of SessionOn-going TestsFeedback from AttendeesFeedback from ManagersBudgetOn Target?As % of Overall Infosec BudgetAttendanceDid All Employees/Depts Attend?Is there a pattern?Did Program Complete on Time?Ideally Try to Benchmark BeforehandIncrease/Decrease in IncidentsParadoxically reported incidents will rise after a courseIncrease/Decrease in Password ResetsIncrease in Visits to Intranet Site for InfosecTrend in Lost Laptops & Mobile Devices
  • #33: Review Regulatory RequirementsChanges in TechnologyMobile TechnologiesSocial MediaChanges in BusinessMergers & AcquisitionsNew MarketsChanges In Staff Profiles/KnowledgeDon’t give same course to same people repeatedlyChanges in WorkforceFull Time vs. Part TimeRemote and Teleworking Employing New Locations