Upgrade to PRO for Only $50/Year—Limited-Time Offer! 🔥
Speaker Deck
Features
Speaker Deck
PRO
Sign in
Sign up for free
Search
Search
People Centered Cybersecurity
Search
Heather Noggle
July 03, 2024
0
11
People Centered Cybersecurity
Lightning talk about the early cybersecurity work an organization undertakes is people oriented.
Heather Noggle
July 03, 2024
Tweet
Share
More Decks by Heather Noggle
See All by Heather Noggle
Corporate Transparency Act
hlnoggle
0
44
Cybersecurity and Business Analysis
hlnoggle
0
11
Cybersecurity and You
hlnoggle
0
37
Managing Your Online Footprint
hlnoggle
0
33
Featured
See All Featured
Building an army of robots
kneath
306
46k
Information Architects: The Missing Link in Design Systems
soysaucechin
0
720
The AI Revolution Will Not Be Monopolized: How open-source beats economies of scale, even for LLMs
inesmontani
PRO
3
2.8k
The World Runs on Bad Software
bkeepers
PRO
72
12k
Winning Ecommerce Organic Search in an AI Era - #searchnstuff2025
aleyda
0
1.8k
[RailsConf 2023 Opening Keynote] The Magic of Rails
eileencodes
31
9.8k
Utilizing Notion as your number one productivity tool
mfonobong
2
190
What’s in a name? Adding method to the madness
productmarketing
PRO
24
3.8k
Build The Right Thing And Hit Your Dates
maggiecrowley
38
3k
Chasing Engaging Ingredients in Design
codingconduct
0
84
Pawsitive SEO: Lessons from My Dog (and Many Mistakes) on Thriving as a Consultant in the Age of AI
davidcarrasco
0
38
Practical Orchestrator
shlominoach
190
11k
Transcript
People-Centered Cybersecurity The Key to Small Business Cybersecurity Heather Noggle
April 18, 2024
Heather Noggle •Public sector HR •Long career as full stack
developer / BA / PM •Business owner •Board leader •Cybersecurity practitioner / advocate
Foundation •Leadership Values Cybersecurity •Change Management Process •Agreement There’s Work
to be Done
Cybersecurity Defined People, processes, and technology working together to protect
the confidentiality, integrity, and availability of data. Keeping private data private and enabling proper access to other data.
Train Your People • What technology and information security mean
to business. (Continued Operation) • To value cybersecurity as necessary in our modern world. (Data Privacy) • How to do the work. (Behavior)
Cyber Hygiene (Those Behaviors) • Password Best Practices • Password
Manager • Multifactor Authentication • Update (Patch) Software • Cybersecurity Mindset (Awareness) • Antivirus/Antimalware • Know Your Devices • Back Up Your Data • Understand Social Engineering (Fraud) • Own Your Clicks
Change How We Trust • Trust the people we know
and interact with in person • Anything else – the digital – can be faked • Zero trust – for people and machines
Standards and Frameworks • NIST Cybersecurity Framework – CSF https://www.nist.gov/cyberframework
• Center for Information Security - CIS v8 https://www.cisecurity.org/controls/cis-controls-list
Parting Advice • Tech Isn’t Going Away – Secure It
• Train Your Organization! • Safer – at Home and at Work • Build Security Into Your Culture
Heather Noggle LinkedIn - https://www.linkedin.com/in/heathernoggle/ Codistac - https://codistac.com/
[email protected]