1 / 9

Cyber Security Awareness

SONITROL PARTNERSHIP. Cyber Security Awareness. Cyber Security Considerations. WELCOME DR. CHRISTINE SPRINGER Director - Executive Master of Science in Crisis and Emergency Management (ECEM) University of Nevada, Las Vegas (UNLV ). Cyber Security Things to Consider.

alexandrial
Download Presentation

Cyber Security Awareness

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. SONITROL PARTNERSHIP Cyber Security Awareness

  2. Cyber Security Considerations WELCOME DR. CHRISTINE SPRINGER Director - Executive Master of Science in Crisis and Emergency Management (ECEM)University of Nevada, Las Vegas (UNLV)

  3. Cyber Security Things to Consider Employee Cyber Awareness and Education Practices Presented by Maureen Wilson -Sonitrol Security admin@sonitrolnv.com Cyber Crimes Awareness Presented by Mary Siero- IT Innovations CEO/President msiero@iitlasvegas.com Information Security is More than IT Security Presented by Joe McDonald- Switch CSO- CPP, PSP, CMAS Jmcdonald@switchlv.com

  4. Employee Awareness and Education • Public Sector vs. Private Sector • Employee Education and Awareness (Temporary Employees and Sub- Contractors) • Protecting Your Assets/Risks to Consider • Cyber Emergency Are You Prepared?

  5. Cyber Crime Awareness • Cyber crime is about opportunity -not being targeted • Implement simple controls to reduce your risk  • Most victims do not know they have been hacked • Mobile devices are the new frontier of attacks

  6. Information Security Is More Than IT Security • Holistic set of processes • Configuration Management • Education / Training  • Information Classification (Based on Risk/Use)  • Make a set of rules (Policy/Procedure)  Resiliency is the goal

  7. REFERENCES • NIST 800 • MS White Pages • Norton Cybercrime Report • Verizon Data Breach Investigation Report • Trustwave Global Security Report • SANS-STORM CENTER • INFRAGUARD, ASIS, ISSA, ISACA • CIAS

  8. REFERENCES • U.S. Computer Emergency Readiness Team http://www.us-cert.gov/home-and-business/ • (ISSA, ISACA, ) • https://www.southernnevadainfragard.org • http://lv.issa.org • http://www.isaca.org/chapters3/Las-Vegas • NIST – National Initiative for Cybersecurity Education (NICE) http://csrc.nist.gov/nice/education.htm • U.S. Computer Emergency Readiness Team http://www.us-cert.gov/

  9. Thank You

More Related