Top Banner
Elements That Comprise a “Secure Network” CYBER SECURITY Presenter: Ray Gasnick III Director of IT Engineering
17

Webinar: Cyber Security Elements that Comprise a Secure Network

Aug 11, 2015

Download

Technology

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Webinar: Cyber Security Elements that Comprise a Secure Network

Elements That Comprise a “Secure Network”

CYBER SECURITY

Presenter: Ray Gasnick IIIDirector of IT EngineeringMiles Technologies

Page 2: Webinar: Cyber Security Elements that Comprise a Secure Network

Awareness Example

Page 3: Webinar: Cyber Security Elements that Comprise a Secure Network

Local Network Security

“Secure” networks aren’t just those comprised of multi-factor authentication mechanisms and multiple layers of firewalls.

Page 4: Webinar: Cyber Security Elements that Comprise a Secure Network

Data Breaches: Facts & Figures

In the past 10 years per the Privacy Rights Clearinghouse: 534 breaches were due to insider access 771 breaches were due to “accidental”

disclosure 1066 breaches were due to hacking or

malware 1822 breaches were due to physical loss

(electronic or non-electronic)Source: http://www.privacyrights.org/data-breach/new

Page 5: Webinar: Cyber Security Elements that Comprise a Secure Network

Does This Look Familiar?

Page 6: Webinar: Cyber Security Elements that Comprise a Secure Network
Page 7: Webinar: Cyber Security Elements that Comprise a Secure Network

Local Network SecurityThe Human Element The biggest risks to most

networks are NOT “evil” hackers on the internet.

Most compromises stem from the users themselves either misusing their authority or “leaking” data accidentally.

Page 8: Webinar: Cyber Security Elements that Comprise a Secure Network

Misuse of Access

In most organizations, access is governed in a hierarchal fashion.

Despite this, someone usually has greater access due to responsibility.

The “honor” system is all that governs this/these users.

Page 9: Webinar: Cyber Security Elements that Comprise a Secure Network

Perceived Authority If a user isn’t entrusted with access to

sensitive data, he or she may be able to coerce information leakage with perceived authority.

Examples: Name dropping of managers to subordinate

employees Downright requests for information by hiding

the real purpose

Page 10: Webinar: Cyber Security Elements that Comprise a Secure Network

The Social Game

Another very common method for data leakage is social engineering.

Takes on the form of: Calls Phishing Emails The most brazen would

show up in person

Page 11: Webinar: Cyber Security Elements that Comprise a Secure Network

Social Engineering Leverages some technique to coerce

an employee to divulge information: Tailgating Outright asking

for the information

Perceived authority

Assumed access Empathy

All of these avenues of attack cannot be stopped even with the most sophisticated firewalls in the world.

Page 12: Webinar: Cyber Security Elements that Comprise a Secure Network

Combatting the Social Attack: Awareness

Everybody “assumes” they could never be duped into handing over information from a social attack.

Awareness/Education is the best method for prevention.

Page 13: Webinar: Cyber Security Elements that Comprise a Secure Network

Awareness Smaller companies are less susceptible.

There is generally a higher degree of awareness when someone/something is out of the ordinary.

Larger companies are more likely to fall victim to social tactics. There is a higher degree of anonymity

between departments if they do not interact regularly.

Page 14: Webinar: Cyber Security Elements that Comprise a Secure Network

Awareness/Physical Security Methods

Distinguish employees from visitors (badges, sign in sheet, etc.).

Promote an environment where it is acceptable to clarify when a request sounds unusual.

Ensure that sensitive “data” is secured by some means.

Ensure that those who are custodians for sensitive data are known.

Page 15: Webinar: Cyber Security Elements that Comprise a Secure Network

Promoting Awareness

Employee awareness is the best defense but it is not a one-time deal.

Recurring training sessions are the best way to keep secure practices fresh in everyone’s minds.

Page 16: Webinar: Cyber Security Elements that Comprise a Secure Network

Questions?

Page 17: Webinar: Cyber Security Elements that Comprise a Secure Network

Parting Gift