Top Banner
Information Security Awareness Copyright © 2011 IsecT Ltd. September 2011 Management seminar Building our security culture
12

Information Security Awareness Copyright © 2011 IsecT Ltd. September 2011 Management seminar Building our security culture.

Mar 26, 2015

Download

Documents

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Information Security Awareness Copyright © 2011 IsecT Ltd. September 2011 Management seminar Building our security culture.

Information Security Awareness

Copyright © 2011 IsecT Ltd.

September 2011

Management seminar

Building our security culture

Page 2: Information Security Awareness Copyright © 2011 IsecT Ltd. September 2011 Management seminar Building our security culture.

Information Security AwarenessCopyright © 2011 IsecT Ltd.

2

Introduction

Sec

uri

ty c

ult

ure

What do we want?

How do we get it?

How do we know when we have it?

Page 3: Information Security Awareness Copyright © 2011 IsecT Ltd. September 2011 Management seminar Building our security culture.

Information Security AwarenessCopyright © 2011 IsecT Ltd.

3

What do we want?

Sec

uri

ty c

ult

ure

What do we want?

Intolerance for insecurity

Secure by default

Proactive security

How do we get it?

How do we know when we have it?

Fewer/less costly security incidents

Free security!

Page 4: Information Security Awareness Copyright © 2011 IsecT Ltd. September 2011 Management seminar Building our security culture.

Information Security AwarenessCopyright © 2011 IsecT Ltd.

4

But we already have a security culture

Do you really th

ink so?

Do you really th

ink so?

Page 5: Information Security Awareness Copyright © 2011 IsecT Ltd. September 2011 Management seminar Building our security culture.

Information Security AwarenessCopyright © 2011 IsecT Ltd.

5

Would you spot a fake email like this?

Page 6: Information Security Awareness Copyright © 2011 IsecT Ltd. September 2011 Management seminar Building our security culture.

Information Security AwarenessCopyright © 2011 IsecT Ltd.

6

Linkedin

Handles sensitive medical data

College

8

colleagues

to exploit

Too easy

!

25m more

targets!

Job title

Page 7: Information Security Awareness Copyright © 2011 IsecT Ltd. September 2011 Management seminar Building our security culture.

Information Security AwarenessCopyright © 2011 IsecT Ltd.

7

OK, so how do we get it?

If you accept that a security culture is indeed a valuable goal, what would

you suggest we do to establish or improve ours?

Page 8: Information Security Awareness Copyright © 2011 IsecT Ltd. September 2011 Management seminar Building our security culture.

Information Security AwarenessCopyright © 2011 IsecT Ltd.

8

How do we get a security culture?

Sec

uri

ty c

ult

ure

What do we want?

How do we get it?

How do we know when we have it?

Leadership, direction

Evident support

Persuasion, motivation

Awareness, training & education

Policies, procedures, guidelines

Reward & punishment

Page 9: Information Security Awareness Copyright © 2011 IsecT Ltd. September 2011 Management seminar Building our security culture.

Information Security AwarenessCopyright © 2011 IsecT Ltd.

9

How do we know when we have it?

Sec

uri

ty c

ult

ure

What do we want?

People do the right thing, even when not being told or watched

How do we get it?

How do we know when we have it?

Behavioral metrics

Page 10: Information Security Awareness Copyright © 2011 IsecT Ltd. September 2011 Management seminar Building our security culture.

Information Security AwarenessCopyright © 2011 IsecT Ltd.

10

Summary

Sec

uri

ty c

ult

ure

What do we want?

Intolerance for insecurity

Secure by default

Proactive security

People do the right thing, even when not being told or watched

How do we get it?

How do we know when we have it?

Behavioral metrics

Leadership, direction

Evident support

Persuasion, motivation

Awareness, training & education

Policies, procedures, guidelines

Reward & punishment

Fewer/less costly security incidents

Free security!

Page 11: Information Security Awareness Copyright © 2011 IsecT Ltd. September 2011 Management seminar Building our security culture.

Information Security AwarenessCopyright © 2011 IsecT Ltd.

11

Management action plan

1. Check the security policies & procedures

2. Lead by example: demonstrate secure behaviors, place a value on security

3. Identify and reward secure behaviors

4. Encourage open discussion about security matters – talk it up a bit

5. Reap the benefits of a security culture

Page 12: Information Security Awareness Copyright © 2011 IsecT Ltd. September 2011 Management seminar Building our security culture.

Information Security AwarenessCopyright © 2011 IsecT Ltd.

12

Further information

• Information Security Policy Manual and

other security awareness materials

• CIO or Information Security Manager

• Browse the intranet Security Zone

• Managing the Human Factor in

Information Security by David Lacey

and Spies Among Us by Ira Winkler

• Google for more!