SlideShare a Scribd company logo
1 of 17
ElementsThat Comprise a “Secure Network”
Presenter: Ray Gasnick III
Director of IT Engineering
MilesTechnologies
 “Secure” networks aren’t just
those comprised of multi-
factor authentication
mechanisms and multiple
layers of firewalls.
 In the past 10 years per the Privacy Rights
Clearinghouse:
 534 breaches were due to insider access
 771 breaches were due to “accidental” disclosure
 1066 breaches were due to hacking or malware
 1822 breaches were due to physical loss
(electronic or non-electronic)
Source: http://www.privacyrights.org/data-breach/new
 The biggest risks to most
networks are NOT “evil”
hackers on the internet.
 Most compromises stem
from the users themselves
either misusing their
authority or “leaking” data
accidentally.
 In most organizations, access is
governed in a hierarchal fashion.
 Despite this, someone usually
has greater access due to
responsibility.
 The “honor” system is all that
governs this/these users.
 If a user isn’t entrusted with access to
sensitive data, he or she may be able to
coerce information leakage with
perceived authority.
 Examples:
 Name dropping of managers to subordinate
employees
 Downright requests for information by hiding
the real purpose
 Another very common method for
data leakage is social engineering.
 Takes on the form of:
 Calls
 Phishing Emails
 The most brazen would
show up in person
 Leverages some technique to coerce an
employee to divulge information:
 Tailgating
 Outright asking for
the information
 Perceived authority
 Assumed access
 Empathy
 All of these avenues of attack cannot be stopped
even with the most sophisticated firewalls in
the world.
 Everybody “assumes”
they could never be
duped into handing
over information from
a social attack.
 Awareness/Education
is the best method for
prevention.
 Smaller companies are less susceptible.
 There is generally a higher degree of awareness
when someone/something is out of the ordinary.
 Larger companies are more likely to fall victim to
social tactics.
 There is a higher degree of anonymity between
departments if they do not interact regularly.
 Distinguish employees from visitors
(badges, sign in sheet, etc.).
 Promote an environment where it is
acceptable to clarify when a request
sounds unusual.
 Ensure that sensitive “data” is
secured by some means.
 Ensure that those who are
custodians for sensitive data are
known.
 Employee awareness is the
best defense but it is not a
one-time deal.
 Recurring training sessions
are the best way to keep
secure practices fresh in
everyone’s minds.
Webinar: Cybersecurity Elements that Comprise a Secure Network
Webinar: Cybersecurity Elements that Comprise a Secure Network

More Related Content

Viewers also liked

Brain-based webinars with Dan Yaman (omNovia's Webinar Expert Series)
Brain-based webinars with Dan Yaman (omNovia's Webinar Expert Series)Brain-based webinars with Dan Yaman (omNovia's Webinar Expert Series)
Brain-based webinars with Dan Yaman (omNovia's Webinar Expert Series)omNovia Technologies
 
Better Payroll Days Ahead with Automated, Cloud-Based Time and Attendance
Better Payroll Days Ahead with Automated, Cloud-Based Time and AttendanceBetter Payroll Days Ahead with Automated, Cloud-Based Time and Attendance
Better Payroll Days Ahead with Automated, Cloud-Based Time and Attendancenettime solutions
 
כנס מדבר יהודה לדורותיו 2005 2015 חלק שני
כנס מדבר יהודה לדורותיו 2005 2015 חלק שניכנס מדבר יהודה לדורותיו 2005 2015 חלק שני
כנס מדבר יהודה לדורותיו 2005 2015 חלק שניOmer Koreh
 
#BusinessMadeEasy
#BusinessMadeEasy#BusinessMadeEasy
#BusinessMadeEasyWinWeb
 
ATRA Expo Talk 2014 - Future Trends
ATRA Expo Talk 2014 - Future TrendsATRA Expo Talk 2014 - Future Trends
ATRA Expo Talk 2014 - Future TrendsProfitBoost
 
DMA - Art of Targeting and Personalization
DMA -  Art of Targeting and PersonalizationDMA -  Art of Targeting and Personalization
DMA - Art of Targeting and PersonalizationeClerx
 

Viewers also liked (6)

Brain-based webinars with Dan Yaman (omNovia's Webinar Expert Series)
Brain-based webinars with Dan Yaman (omNovia's Webinar Expert Series)Brain-based webinars with Dan Yaman (omNovia's Webinar Expert Series)
Brain-based webinars with Dan Yaman (omNovia's Webinar Expert Series)
 
Better Payroll Days Ahead with Automated, Cloud-Based Time and Attendance
Better Payroll Days Ahead with Automated, Cloud-Based Time and AttendanceBetter Payroll Days Ahead with Automated, Cloud-Based Time and Attendance
Better Payroll Days Ahead with Automated, Cloud-Based Time and Attendance
 
כנס מדבר יהודה לדורותיו 2005 2015 חלק שני
כנס מדבר יהודה לדורותיו 2005 2015 חלק שניכנס מדבר יהודה לדורותיו 2005 2015 חלק שני
כנס מדבר יהודה לדורותיו 2005 2015 חלק שני
 
#BusinessMadeEasy
#BusinessMadeEasy#BusinessMadeEasy
#BusinessMadeEasy
 
ATRA Expo Talk 2014 - Future Trends
ATRA Expo Talk 2014 - Future TrendsATRA Expo Talk 2014 - Future Trends
ATRA Expo Talk 2014 - Future Trends
 
DMA - Art of Targeting and Personalization
DMA -  Art of Targeting and PersonalizationDMA -  Art of Targeting and Personalization
DMA - Art of Targeting and Personalization
 

Recently uploaded

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 

Recently uploaded (20)

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 

Webinar: Cybersecurity Elements that Comprise a Secure Network

  • 1. ElementsThat Comprise a “Secure Network” Presenter: Ray Gasnick III Director of IT Engineering MilesTechnologies
  • 2.
  • 3.  “Secure” networks aren’t just those comprised of multi- factor authentication mechanisms and multiple layers of firewalls.
  • 4.  In the past 10 years per the Privacy Rights Clearinghouse:  534 breaches were due to insider access  771 breaches were due to “accidental” disclosure  1066 breaches were due to hacking or malware  1822 breaches were due to physical loss (electronic or non-electronic) Source: http://www.privacyrights.org/data-breach/new
  • 5.
  • 6.
  • 7.  The biggest risks to most networks are NOT “evil” hackers on the internet.  Most compromises stem from the users themselves either misusing their authority or “leaking” data accidentally.
  • 8.  In most organizations, access is governed in a hierarchal fashion.  Despite this, someone usually has greater access due to responsibility.  The “honor” system is all that governs this/these users.
  • 9.  If a user isn’t entrusted with access to sensitive data, he or she may be able to coerce information leakage with perceived authority.  Examples:  Name dropping of managers to subordinate employees  Downright requests for information by hiding the real purpose
  • 10.  Another very common method for data leakage is social engineering.  Takes on the form of:  Calls  Phishing Emails  The most brazen would show up in person
  • 11.  Leverages some technique to coerce an employee to divulge information:  Tailgating  Outright asking for the information  Perceived authority  Assumed access  Empathy  All of these avenues of attack cannot be stopped even with the most sophisticated firewalls in the world.
  • 12.  Everybody “assumes” they could never be duped into handing over information from a social attack.  Awareness/Education is the best method for prevention.
  • 13.  Smaller companies are less susceptible.  There is generally a higher degree of awareness when someone/something is out of the ordinary.  Larger companies are more likely to fall victim to social tactics.  There is a higher degree of anonymity between departments if they do not interact regularly.
  • 14.  Distinguish employees from visitors (badges, sign in sheet, etc.).  Promote an environment where it is acceptable to clarify when a request sounds unusual.  Ensure that sensitive “data” is secured by some means.  Ensure that those who are custodians for sensitive data are known.
  • 15.  Employee awareness is the best defense but it is not a one-time deal.  Recurring training sessions are the best way to keep secure practices fresh in everyone’s minds.

Editor's Notes

  1. and other such electronic counter measures
  2. AllClearID is $14.95/month or roughly $180/year/person. If all 35k from the Lowes breach were to utilize it, for 1 year it would have cost Lowes $6.2M
  3. social engineering (not to be confused with social networking)
  4. Not really true though since most victims will never even known that such an attack was underway
  5. Ensure that those who are custodians for sensitive data are known Also understand their degree of access