Upgrade to Pro
— share decks privately, control downloads, hide ads and more …
Speaker Deck
Features
Speaker Deck
PRO
Sign in
Sign up for free
Search
Search
People Centered Cybersecurity
Search
Sponsored
·
Your Podcast. Everywhere. Effortlessly.
Share. Educate. Inspire. Entertain. You do you. We'll handle the rest.
→
Heather Noggle
July 03, 2024
0
11
People Centered Cybersecurity
Lightning talk about the early cybersecurity work an organization undertakes is people oriented.
Heather Noggle
July 03, 2024
Tweet
Share
More Decks by Heather Noggle
See All by Heather Noggle
Corporate Transparency Act
hlnoggle
0
45
Cybersecurity and Business Analysis
hlnoggle
0
11
Cybersecurity and You
hlnoggle
0
37
Managing Your Online Footprint
hlnoggle
0
33
Featured
See All Featured
The SEO Collaboration Effect
kristinabergwall1
0
350
Future Trends and Review - Lecture 12 - Web Technologies (1019888BNR)
signer
PRO
0
3.2k
SERP Conf. Vienna - Web Accessibility: Optimizing for Inclusivity and SEO
sarafernandez
1
1.3k
Put a Button on it: Removing Barriers to Going Fast.
kastner
60
4.2k
How to make the Groovebox
asonas
2
1.9k
Easily Structure & Communicate Ideas using Wireframe
afnizarnur
194
17k
Navigating Weather and Climate Data
rabernat
0
100
How to Build an AI Search Optimization Roadmap - Criteria and Steps to Take #SEOIRL
aleyda
1
1.9k
Large-scale JavaScript Application Architecture
addyosmani
515
110k
JavaScript: Past, Present, and Future - NDC Porto 2020
reverentgeek
52
5.8k
Sam Torres - BigQuery for SEOs
techseoconnect
PRO
0
180
AI in Enterprises - Java and Open Source to the Rescue
ivargrimstad
0
1.1k
Transcript
People-Centered Cybersecurity The Key to Small Business Cybersecurity Heather Noggle
April 18, 2024
Heather Noggle •Public sector HR •Long career as full stack
developer / BA / PM •Business owner •Board leader •Cybersecurity practitioner / advocate
Foundation •Leadership Values Cybersecurity •Change Management Process •Agreement There’s Work
to be Done
Cybersecurity Defined People, processes, and technology working together to protect
the confidentiality, integrity, and availability of data. Keeping private data private and enabling proper access to other data.
Train Your People • What technology and information security mean
to business. (Continued Operation) • To value cybersecurity as necessary in our modern world. (Data Privacy) • How to do the work. (Behavior)
Cyber Hygiene (Those Behaviors) • Password Best Practices • Password
Manager • Multifactor Authentication • Update (Patch) Software • Cybersecurity Mindset (Awareness) • Antivirus/Antimalware • Know Your Devices • Back Up Your Data • Understand Social Engineering (Fraud) • Own Your Clicks
Change How We Trust • Trust the people we know
and interact with in person • Anything else – the digital – can be faked • Zero trust – for people and machines
Standards and Frameworks • NIST Cybersecurity Framework – CSF https://www.nist.gov/cyberframework
• Center for Information Security - CIS v8 https://www.cisecurity.org/controls/cis-controls-list
Parting Advice • Tech Isn’t Going Away – Secure It
• Train Your Organization! • Safer – at Home and at Work • Build Security Into Your Culture
Heather Noggle LinkedIn - https://www.linkedin.com/in/heathernoggle/ Codistac - https://codistac.com/
[email protected]