Upgrade to Pro
— share decks privately, control downloads, hide ads and more …
Speaker Deck
Features
Speaker Deck
PRO
Sign in
Sign up for free
Search
Search
People Centered Cybersecurity
Search
Heather Noggle
July 03, 2024
0
10
People Centered Cybersecurity
Lightning talk about the early cybersecurity work an organization undertakes is people oriented.
Heather Noggle
July 03, 2024
Tweet
Share
More Decks by Heather Noggle
See All by Heather Noggle
Corporate Transparency Act
hlnoggle
0
44
Cybersecurity and Business Analysis
hlnoggle
0
10
Cybersecurity and You
hlnoggle
0
36
Managing Your Online Footprint
hlnoggle
0
32
Featured
See All Featured
Art, The Web, and Tiny UX
lynnandtonic
303
21k
Why Our Code Smells
bkeepers
PRO
340
57k
Responsive Adventures: Dirty Tricks From The Dark Corners of Front-End
smashingmag
252
21k
Creating an realtime collaboration tool: Agile Flush - .NET Oxford
marcduiker
33
2.3k
How STYLIGHT went responsive
nonsquared
100
5.8k
Building Adaptive Systems
keathley
44
2.8k
RailsConf & Balkan Ruby 2019: The Past, Present, and Future of Rails at GitHub
eileencodes
140
34k
Save Time (by Creating Custom Rails Generators)
garrettdimon
PRO
32
1.6k
Bootstrapping a Software Product
garrettdimon
PRO
307
110k
How GitHub (no longer) Works
holman
315
140k
The Cost Of JavaScript in 2023
addyosmani
55
9k
Build The Right Thing And Hit Your Dates
maggiecrowley
37
2.9k
Transcript
People-Centered Cybersecurity The Key to Small Business Cybersecurity Heather Noggle
April 18, 2024
Heather Noggle •Public sector HR •Long career as full stack
developer / BA / PM •Business owner •Board leader •Cybersecurity practitioner / advocate
Foundation •Leadership Values Cybersecurity •Change Management Process •Agreement There’s Work
to be Done
Cybersecurity Defined People, processes, and technology working together to protect
the confidentiality, integrity, and availability of data. Keeping private data private and enabling proper access to other data.
Train Your People • What technology and information security mean
to business. (Continued Operation) • To value cybersecurity as necessary in our modern world. (Data Privacy) • How to do the work. (Behavior)
Cyber Hygiene (Those Behaviors) • Password Best Practices • Password
Manager • Multifactor Authentication • Update (Patch) Software • Cybersecurity Mindset (Awareness) • Antivirus/Antimalware • Know Your Devices • Back Up Your Data • Understand Social Engineering (Fraud) • Own Your Clicks
Change How We Trust • Trust the people we know
and interact with in person • Anything else – the digital – can be faked • Zero trust – for people and machines
Standards and Frameworks • NIST Cybersecurity Framework – CSF https://www.nist.gov/cyberframework
• Center for Information Security - CIS v8 https://www.cisecurity.org/controls/cis-controls-list
Parting Advice • Tech Isn’t Going Away – Secure It
• Train Your Organization! • Safer – at Home and at Work • Build Security Into Your Culture
Heather Noggle LinkedIn - https://www.linkedin.com/in/heathernoggle/ Codistac - https://codistac.com/
[email protected]