Upgrade to Pro — share decks privately, control downloads, hide ads and more …

Cybersecurity and You

Cybersecurity and You

A cybersecurity behavior and knowledge presentation for members of a local Rotary Club.

Heather Noggle

July 03, 2024
Tweet

More Decks by Heather Noggle

Other Decks in Technology

Transcript

  1. Heather Noggle •Public sector HR •Long career as Software Developer

    / Business Analyst / Project Manager •Writer •Business owner •Board leader •Cybersecurity practitioner / advocate
  2. Cybersecurity Defined People, processes, and technology working together to protect

    the confidentiality, integrity, and availability of data. Keeping private data private and enabling proper access to other data.
  3. Cyber Hygiene (Behaviors) • Password Best Practices • Password Manager

    • Multifactor Authentication • Update (Patch) Software • Cybersecurity Mindset (Awareness) • Antivirus/Antimalware • Know Your Devices • Back Up Your Data • Understand Social Engineering (Fraud) • Own Your Clicks
  4. Train Your People • What technology and information security mean

    to business. (Continued Operation) • To value cybersecurity as necessary in our modern world. (Data Privacy) • How to do the work. (Behavior)
  5. Change How We Trust • Trust the people we know

    and interact with in person • Anything else – the digital – can be faked • Zero trust – for people and machines
  6. Another Princess, Another Castle (Levels) • Cybersecurity is part of

    modern business • You’re never done • Small and medium-sized organizations DO get breached and with great impact. They don’t tend to make the news, though. • Small changes and choices in the early levels are people-oriented, behavior. • Those small changes can gain your organization great impact. • Integrate cybersecurity as early and as pervasively as you can in your organization
  7. Standards and Frameworks • NIST Cybersecurity Framework – CSF https://www.nist.gov/cyberframework

    • Center for Information Security - CIS v8 https://www.cisecurity.org/controls/cis-controls-list
  8. Cybersecurity Assessment • What do we have? (Assets) • What

    are our risks? (Risk Posture) • What are we doing? (Current State) • What do we need to do? (Desirable State) • What are the gaps? (The Work)
  9. Missouri Cybersecurity Center of Excellence • Non-profit located in the

    Jordan Valley Innovation Center • Training the workforce in cybersecurity • Helping with job placement • Securing the region – cybersecurity services at all levels • Also, the best kept secret in Southwest Missouri – working to change that. • I’m employed part time here. https://www.mccoe.org
  10. Parting Advice • Tech Isn’t Going Away – Secure It

    • Train Your Organization! • Safer – at Home and at Work • Build Security Into Your Culture
  11. Discussion Questions • What is your organization’s risk posture? Is

    cybersecurity considered among its risks today? • How often do you talk about cybersecurity? What about fraud? • Where do you see the opportunity (and need) to improve in your organization? • What’s the first step? Engage!