How to Explain Cyber Security to the Board Using a Simple Metaphor: FIRE

Size: px
Start display at page:

Download "How to Explain Cyber Security to the Board Using a Simple Metaphor: FIRE"

Transcription

1 SESSION ID: PROF-M04 How to Explain Cyber Security to the Board Using a Simple Metaphor: FIRE John Elliott Head of Information Security Principality Building

2 Why? Smart people Time limited Non-technical Talking to the C-suite or the board is challenging brilliant Smart people Get risk Perspective Who grasp concepts quickly and can apply them to the current situation 2

3 Smart people Time limited Non-technical 3

4 But we ve spent $x million over the past n years making sure this won t happen to us What do you mean by INAMOIBW! 4

5 Why do we have fire extinguishers?

6 Smart people Get risk Perspective Who grasp concepts quickly and can apply them to the current situation 6

7 Everyone has a good sense about fire ouch

8 Everyone has a good sense about fire drill

9 Everyone has a good sense about fire not a toy

10 Everyone has a good sense about fire tell a teacher

11 Everyone has a good sense about fire also not toys

12 Everyone has a good sense about fire strict rules

13 What s this got to do with cyber security?

14 there s no such thing as common sense, just common knowledge Ira Winkler, RSA Conference 2012

15 our metaphors comprise the conceptual spectacles through which we view the world Immanuel Kant, Critique of Pure Reason 1781

16 Why is fire a great metaphor? Societal knowledge Fire is an opportunistic threat Fire does not care what you did yesterday (or plan to do tomorrow) Fire is happy to exploit the smallest vulnerability Fire does not stop until it absolutely owns everything (Until there are no more assets to compromise) 16

17 A brief history of two landmark fires 17

18 London, 1666

19 17 th Century fire-fighting techniques 19

20 Three days of fire 20

21 Effects 13,200 Homes 75,000 Homeless 80% of the City of London destroyed 10 Dead Affects the British economy for years 21

22 Chicago 1871

23 But this is horse drawn fire engines 180 fire fighters 1 pumping station (but with a wooden roof)

24 Effects 120 miles of wooden sidewalk burnt 33% of buildings destroyed 100,000 people homeless 24

25 Metaphors and lessons 25

26 A reminder I know you know this Aim: How to better explain things

27 Metaphors and lessons those who cannot remember the past are condemned to repeat it George Santayana, The Life of Reason 1905

28 Prevent Detect Respond Recover 28

29 Perfect threat storm Very dry Strong winds 29

30 Prevent London Vulnerable construction of basic components. Wood & straw No segmentation. Narrow streets, overhanging buildings Manual controls Chicago Better construction but significant vulnerabilities: tar roofing, decorative wooden cornices and advertisements Segmentation easily defeated. Wooden sidewalks, wind blew sparks across the river Manual controls 30

31 Prevent It is too late to fix architectural problems when you re on fire Unpatched applications? Flat networks Vulnerable OS? Too many admins? 31

32 Detect London Detection too late to prevent total compromise of the asset. Chicago Detection too late to prevent total compromise of the asset. 32

33 Detect There is a golden hour Treat every incident as unique 33

34 Respond London Strategy relied on sacrifice of compromised asset and neighboring assets. Unprepared to follow strategy No plan B. Everyone acted individually. Lack of skilled resources. Lost control quickly. Chicago Strategy relied on fast response to limit fire to a single asset. Too hot, wind too strong so fire spread too quickly on wind Response mechanisms vulnerable to attack. Wooden roof on pumping station 34

35 Respond Be decisive What if your response Are there known issues? mechanisms are vulnerable? 35

36 Recovery: individual Move assets London Secure assets Chicago 36

37 Attribution London Chicago 37

38 Attribution Attribution close to the event is unreliable 38

39 Comparison London Chicago Surprise! Again? 39

40 Or that men do not learn very much from the lessons of history is the most important of all the lessons of history Aldous Huxley, Collected Essays 1959

41 Comparison RSA, Google etc. Sony Surprise! Again? 41

42 What about today? 42

43 What about today? What did fire safety get right? Prevent Detect Respond Recover in depth with high maturity 43

44 Control maturity (CMMI) Fire management Optimized Quantitatively Managed Defined Managed Initial/ ad hoc 44

45 Why? fire has a low tolerance for control failure John Elliott, 2016

46 Prevent in depth with high maturity 46

47 Detect reliable almost eliminate false positives with high maturity 47

48 Respond in depth with high maturity 48

49 Recover with high maturity 49

50 Always learning When fire starts in a tall building restrict to a floor safe evacuation route sprinklers dry riser 50

51 Always learning 51

52 Fire v Cyber security Prevent Detect Respond Recover

53 How did we get better at FIRE? insurance regulation 53

54 So what? 54

55 Reminder I know you know this Aim: How to better explain things

56 How to use this when you talk to Prevent Detect Respond Recover Optimized Quantitatively Managed Defined Managed Find a story Initial/ ad hoc 56

57 Pick your favorite metaphors LONDON: Indecisive management This is not a problem CHICAGO: Wooden sidewalks, wooden advertisements BOTH: Sparks carried on the wind defeated firebreaks CHICAGO: Fire safes that were not PROBABILITY: Dry, strong winds, failure of manual preventative control 57

58 Understand your own environment What are your fire controls How mature are they? Can you describe your current Prevent Detect Respond Recover In respect of maturity? 58

59 How to use this when you talk to Prevent Detect Respond Recover Fire management is based on the premise that fires will happen What do you mean by INAMOIBW! false positives 59

60 How does what you propose Prevent Detect Respond Recover Optimized Quantitatively Managed Defined Managed Initial/ ad hoc 60

61 How does what you propose Prevent Detect Respond Recover What changes? Optimized Quantitatively Managed Defined Managed Initial/ ad hoc 61

62 But most importantly Get comfortable with the metaphor

63 and remember Like an attacker, fire has zero tolerance for control failure

64 Questions

Level E Placement Worksheet & Student Passage. Level 1 Placement Worksheet & Student Passage. Level 2 Placement Worksheet & Student Passage

Level E Placement Worksheet & Student Passage. Level 1 Placement Worksheet & Student Passage. Level 2 Placement Worksheet & Student Passage Placement Guide This guide will help you choose the right One Minute Reader level for your child. The ideal level is neither too easy nor too difficult. It should challenge the student without being frustrating.

More information

The Conjectural November 2015 Transcript 1 of 5

The Conjectural November 2015 Transcript 1 of 5 The Conjectural November 2015 Transcript 1 of 5 Hello and welcome to The Conjectural an experiment to figure out a better way to decide what science news is and how we should talk about science. The data

More information

NCS 330. Information Assurance Policies, Ethics and Disaster Recovery. NYC University Polices and Standards 4/15/15.

NCS 330. Information Assurance Policies, Ethics and Disaster Recovery. NYC University Polices and Standards 4/15/15. NCS 330 Information Assurance Policies, Ethics and Disaster Recovery NYC University Polices and Standards 4/15/15 Jess Yanarella Table of Contents: Introduction: Part One: Risk Analysis Threats Vulnerabilities

More information

Case Study for. The Torch Tower. Dubai Marina. Presented by; Lieutenant Colonel Ali Almutawa Operations Director Dubai Civil Defence

Case Study for. The Torch Tower. Dubai Marina. Presented by; Lieutenant Colonel Ali Almutawa Operations Director Dubai Civil Defence 2015 AGM & International Conference The Shard, London 16 th July 2015 Case Study for The Torch Tower Dubai Marina Presented by; Lieutenant Colonel Ali Almutawa Operations Director Dubai Civil Defence 179

More information

Fry Phrases Set 1. TeacherHelpForParents.com help for all areas of your child s education

Fry Phrases Set 1. TeacherHelpForParents.com help for all areas of your child s education Set 1 The people Write it down By the water Who will make it? You and I What will they do? He called me. We had their dog. What did they say? When would you go? No way A number of people One or two How

More information

Intrusion Tolerance to Mitigate Attacks that Persist

Intrusion Tolerance to Mitigate Attacks that Persist Intrusion Tolerance to Mitigate Attacks that Persist Arun Sood Professor (Computer Science) and Co-Director International Cyber Center George Mason University, Fairfax, VA asood@gmu.edu The variety and

More information

Cyber Watch. Written by Peter Buxbaum

Cyber Watch. Written by Peter Buxbaum Cyber Watch Written by Peter Buxbaum Security is a challenge for every agency, said Stanley Tyliszczak, vice president for technology integration at General Dynamics Information Technology. There needs

More information

A study of the nature of fire risks in tall buildings

A study of the nature of fire risks in tall buildings A study of the nature of fire risks in tall buildings David Charters and Carl Sherwood BRE Global 12 th March 2013 Part of the BRE Trust Overview 1. Introduction 2. Challenges of tall buildings 3. Analysis

More information

Components of a Reading Workshop Mini-Lesson

Components of a Reading Workshop Mini-Lesson Components of a Reading Workshop Mini-Lesson Mini-Lesson: The Connection How will you begin the Reading Workshop mini-lesson with a connection in which you tell students what you ll be teaching them &

More information

California Treasures High-Frequency Words Scope and Sequence K-3

California Treasures High-Frequency Words Scope and Sequence K-3 California Treasures High-Frequency Words Scope and Sequence K-3 Words were selected using the following established frequency lists: (1) Dolch 220 (2) Fry 100 (3) American Heritage Top 150 Words in English

More information

INTRODUCTION TO TEAMWORK AND GROUP DEVELOPMENT CORPORATE LEARNING COURSE TEAMBUILDING BLOCK SEMINAR 3.2

INTRODUCTION TO TEAMWORK AND GROUP DEVELOPMENT CORPORATE LEARNING COURSE TEAMBUILDING BLOCK SEMINAR 3.2 LESSON PLAN INTRODUCTION TO TEAMWORK AND GROUP DEVELOPMENT CORPORATE LEARNING COURSE TEAMBUILDING BLOCK SEMINAR 3.2 SCOPE What is teamwork? Why is teamwork important to Civil Air Patrol? This seminar provides

More information

Hidden Job Market. Remember, you are in a worksite setting! Hello, trainees. Today we will cover the hidden job market.

Hidden Job Market. Remember, you are in a worksite setting! Hello, trainees. Today we will cover the hidden job market. 7 Finding the Hidden Job Market step Overview OBJECTIVES \ Locate the Hidden Job Market \ Network with the Hidden Job Market \ Telemarket Yourself It is said that more than 75 percent of all jobs are never

More information

Florida Pioneer Homes By Lance Corlew & Ron Miller

Florida Pioneer Homes By Lance Corlew & Ron Miller Florida Pioneer Homes By Lance Corlew & Ron Miller Summary Florida pioneer homes were simple, with few luxuries. Life was very difficult in the 1800s compared to today. In this lesson, students will have

More information

Transportation: Week 2 of 2

Transportation: Week 2 of 2 The Minnesota Literacy Council created this curriculum with funding from the MN Department of Education. We invite you to adapt it for your own classrooms. Beginning Level (CASAS reading scores of 181-200)

More information

Fire Safety Risk Assessment Checklist for Residential Care Premises

Fire Safety Risk Assessment Checklist for Residential Care Premises Checklist for Residential Care Premises Name of Premises: Address of Premises: Name of Responsible Person: What area / location does the assessment cover? Does the assessment cover the whole site YES or

More information

xxx Lesson 11 1. Comprehend the writing process 2. Respond positively to the writing process

xxx Lesson 11 1. Comprehend the writing process 2. Respond positively to the writing process xxx Lesson 11 The Writing Process Overview: This lesson will focus on the writing process and how it relates to communication. Learners will be taught what the writing process is, its parts, and how they

More information

Chapter 8. Insurance

Chapter 8. Insurance Chapter 8 This chapter tells you: about your buildings insurance; how to make an insurance claim; how your buildings insurance premium is worked out; and about contents insurance. Buildings insurance The

More information

FLA S FIRE SAFETY INITIATIVE

FLA S FIRE SAFETY INITIATIVE Improving Workers Lives Worldwide FLA S FIRE SAFETY INITIATIVE Preventing fires and saving lives by empowering workers and factory managers SCENARIO 1 OCCURS AT FACTORY ABC, WHICH HAS NOT IMPLEMENTED NECESSARY

More information

Viruses, Worms, and Trojan Horses

Viruses, Worms, and Trojan Horses Viruses, Worms, and Trojan Horses Be a Power Reader Make Personal Connections As you read this article, think to yourself, How can I apply this knowledge? How will what I m learning be useful to me? You

More information

Average producers can easily increase their production in a larger office with more market share.

Average producers can easily increase their production in a larger office with more market share. The 10 Keys to Successfully Recruiting Experienced Agents by Judy LaDeur Understand whom you are hiring. Don t make the mistake of only wanting the best agents or those from offices above you in market

More information

Incident Response. Six Best Practices for Managing Cyber Breaches. www.encase.com

Incident Response. Six Best Practices for Managing Cyber Breaches. www.encase.com Incident Response Six Best Practices for Managing Cyber Breaches www.encase.com What We ll Cover Your Challenges in Incident Response Six Best Practices for Managing a Cyber Breach In Depth: Best Practices

More information

Rosa Parks. Stop and think: Have you ever been fed up with a situation? What did you do? How did things change?

Rosa Parks. Stop and think: Have you ever been fed up with a situation? What did you do? How did things change? Rosa Parks l Reading Comprehension l 1 Read the paragraphs. Stop and think as you read. Stop and Think Good readers are active readers. Good readers stop and think about what they are reading. Active reading

More information

A Primer on Cyber Threat Intelligence

A Primer on Cyber Threat Intelligence A Primer on Cyber Threat Intelligence AS ADVERTISED 2 BUZZWORD BINGO! 3 TODAY S CYBER SECURITY CHALLENGES CISOs finding it difficult to define security ROI to executives Short shelf life for CISOs Vastly

More information

Incident Response. Six Best Practices for Managing Cyber Breaches. Nick Pollard, Senior Director Professional Services EMEA / APAC, Guidance Software

Incident Response. Six Best Practices for Managing Cyber Breaches. Nick Pollard, Senior Director Professional Services EMEA / APAC, Guidance Software Incident Response Six Best Practices for Managing Cyber Breaches Nick Pollard, Senior Director Professional Services EMEA / APAC, Guidance Software www.encase.com 2014 Guidance Software Inc., All Rights

More information

LESSON TITLE: Parable of the Workers in the Vineyard

LESSON TITLE: Parable of the Workers in the Vineyard Devotion NT255 CHILDREN S DEVOTIONS FOR THE WEEK OF: LESSON TITLE: Parable of the Workers in the Vineyard THEME: God is more concerned with our heart s attitude than our service. SCRIPTURE: Matthew 20:1-16

More information

10k. 8-week training program

10k. 8-week training program 10k 8-week training program T H E G O A L O F T H I S P L A N I S N T T O G E T Y O U A C R O S S T H E F I N I S H L I N E, I T S T O G E T T H E B E S T V E R S I O N O F Y O U A C R O S S T H E F I

More information

DATE: What is Halloween?

DATE: What is Halloween? Questions: What do you already know about Halloween? Read the article below and then answer the questions. What is Halloween? Halloween is a traditional celebration that began in Europe hundreds of years

More information

Cyber Security Threats

Cyber Security Threats Cyber Security Threats What keeps us up at night? Doug Jacobson Information Assurance Center www.iac.iastate.edu Information Assurance Center Iowa State University 1 Outline Who are the players The good,

More information

THE VICTORIANS ON THE CANALS

THE VICTORIANS ON THE CANALS THE VICTORIANS ON THE CANALS An education pack for Key Stage 2 The London Canal Museum, 12-13 New Wharf Road, London N1 9RT. ( (020) 7713 0836 Introduction The London Canal Museum is an interactive, hands-on

More information

Bible for Children. presents JOSHUA TAKES CHARGE

Bible for Children. presents JOSHUA TAKES CHARGE Bible for Children presents JOSHUA TAKES CHARGE Written by: Edward Hughes Illustrated by: Janie Forest Adapted by: Ruth Klassen Produced by: Bible for Children www.m1914.org 2007 Bible for Children, Inc.

More information

Co-authored by: Michelle Frechette Ames, MBA. Marketing Diva www.marketedbymichelle.com

Co-authored by: Michelle Frechette Ames, MBA. Marketing Diva www.marketedbymichelle.com Michelle Frechette Ames & Christine Baker Marriage Co-authored by: Michelle Frechette Ames, MBA Marketing Diva www.marketedbymichelle.com Christine Baker Marriage, LMT Business Mentor for Bodyworkers and

More information

Security Awareness for Social Media in Business. Scott Wright

Security Awareness for Social Media in Business. Scott Wright Security Awareness for Social Media in Business Scott Wright Security Perspectives Inc COUNTERMEASURE 2012 10/29/2012 Copyright 2012. Security Perspectives Inc. 1 10/29/2012 Copyright 2012. Security Perspectives

More information

Enterprise Cybersecurity: Building an Effective Defense

Enterprise Cybersecurity: Building an Effective Defense Enterprise Cybersecurity: Building an Effective Defense Chris Williams Oct 29, 2015 14 Leidos 0224 1135 About the Presenter Chris Williams is an Enterprise Cybersecurity Architect at Leidos, Inc. He has

More information

Testing Your Security A Security Testing How To From Someone Who s Likely Broken Into An Organization Just Like Yours

Testing Your Security A Security Testing How To From Someone Who s Likely Broken Into An Organization Just Like Yours Testing Your Security A Security Testing How To From Someone Who s Likely Broken Into An Organization Just Like Yours Tom Liston Senior Security Consultant InGuardians, Inc. Director InGuardians Labs tom@inguardians.com

More information

6 SECRETS TO OFFERING EXCEPTIONAL CUSTOMER SERVICE

6 SECRETS TO OFFERING EXCEPTIONAL CUSTOMER SERVICE 6 SECRETS TO OFFERING EXCEPTIONAL CUSTOMER SERVICE Introduction THE SERVICE GAP The vast majority of people are not experiencing great service. Nearly a third of consumers believe that businesses are now

More information

Earn Money Sharing YouTube Videos

Earn Money Sharing YouTube Videos Earn Money Sharing YouTube Videos Get Started FREE! Make money every time you share a video, also make money every time the videos you have shared get watched! Unleash The Viral Power of Social Media To

More information

Trends in Malware DRAFT OUTLINE. Wednesday, October 10, 12

Trends in Malware DRAFT OUTLINE. Wednesday, October 10, 12 Trends in Malware DRAFT OUTLINE Presentation Synopsis Security is often a game of cat and mouse as security professionals and attackers each vie to stay one step ahead of the other. In this race for dominance,

More information

Calling for Help in an Emergency

Calling for Help in an Emergency Calling for Help in an Emergency In an emergency, the ability to call for help quickly and effectively can mean the difference between minor property damage and total devastation, or even between life

More information

God is Eternal Lesson 1

God is Eternal Lesson 1 Preschool Curriculum (4K / 5K) August 15 th & 16 th, 2009 God is Eternal Lesson 1 Divine Attribute: Heart Response: God is Eternal Be Amazed Memory Verse: Jesus Christ is the same yesterday, today and

More information

How to Evaluate DDoS Mitigation Providers:

How to Evaluate DDoS Mitigation Providers: Akamai White Paper How to Evaluate DDoS Mitigation Providers: Four Critical Criteria How to Evaluate DDoS Mitigation Providers 2 TABLE OF CONTENTS INTRODUCTION 3 CRITERIA #1: THREAT INTELLIGENCE 3 CRITERIA

More information

My friends and neighbors refer to the cabin as the Miracle Cabin because it has survived two wildfires.

My friends and neighbors refer to the cabin as the Miracle Cabin because it has survived two wildfires. & Insurance Wildfire is a growing threat in the Rocky Mountain Region, where the population is booming in the mountains and foothills. People often don t realize the dangers of living in the Red Zone (dangerous

More information

Cyber Security :: Insights & Recommendations for Secure Operations. N-Dimension Solutions, Inc.

Cyber Security :: Insights & Recommendations for Secure Operations. N-Dimension Solutions, Inc. Cyber Security :: Insights & Recommendations for Secure Operations N-Dimension Solutions, Inc. Cyber Security Protection for Critical Infrastructure Assets Agenda: Cyber Landscape Cyber Threats to Your

More information

miracles of jesus 1. LEADER PREPARATION

miracles of jesus 1. LEADER PREPARATION miracles of jesus Week 1: Jesus Heals a Paralyzed Man This includes: 1. Leader Preparation 2. Lesson Guide 1. LEADER PREPARATION LESSON OVERVIEW One night, Jesus is teaching to a crowded home. Friends

More information

Cambridge ESOL Entry 3 Certificate in ESOL Skills for Life

Cambridge ESOL Entry 3 Certificate in ESOL Skills for Life Centre Number Candidate Number Candidate Name *2290400733* UNIVERSITY OF CAMBRIDGE ESOL EXAMINATIONS English for Speakers of Other Languages Cambridge ESOL Entry 3 Certificate in ESOL Skills for Life [Reading]

More information

GET READY FOR A BUSH FIRE FOUR SIMPLE STEPS TO MAKING YOUR BUSH FIRE SURVIVAL PLAN

GET READY FOR A BUSH FIRE FOUR SIMPLE STEPS TO MAKING YOUR BUSH FIRE SURVIVAL PLAN DISCUSS PREPARE KNOW KEEP GET READY FOR A BUSH FIRE FOUR SIMPLE STEPS TO MAKING YOUR BUSH FIRE SURVIVAL PLAN Getting ready for a bush fire is easier than you think. By taking 20 minutes with your family

More information

Palliser Regional Schools. Summary of feedback

Palliser Regional Schools. Summary of feedback Palliser Regional Schools Palliser Centre #101, 3305-18 Avenue North, Lethbridge, AB T1H 5S1 Phone: 403-328-4111 Toll-free: 877-667-1234 Fax: 403-380-6890 www.pallisersd.ab.ca Summary of feedback Community

More information

5 Traits of Companies Successfully Preventing Fraud and How to Apply Them in Your Business. An IDology, Inc. Whitepaper

5 Traits of Companies Successfully Preventing Fraud and How to Apply Them in Your Business. An IDology, Inc. Whitepaper 5 Traits of Companies Successfully Preventing Fraud and How to Apply Them in Your Business An IDology, Inc. Whitepaper No matter how big your company is or what industry you are in, every business typically

More information

Sunflowers. Name. Level and grade. PrimaryTools.co.uk

Sunflowers. Name. Level and grade. PrimaryTools.co.uk Sunflowers Name Score Level and grade 2012 Contents Billy s Sunflower... 3 A story by Nicola Moon So Many Sunflowers!... 14 Vincent Van Gogh... 15 Information about the artist Making a Paper Sunflower...

More information

LESSON TITLE: Jesus is the Way, the Truth, and the Life

LESSON TITLE: Jesus is the Way, the Truth, and the Life Devotion NT271 CHILDREN S DEVOTIONS FOR THE WEEK OF: LESSON TITLE: Jesus is the Way, the Truth, and the Life THEME: We can always trust Jesus. SCRIPTURE: John 14:1-6 Dear Parents Welcome to Bible Time

More information

ONLINE SAFETY TEACHER S GUIDE:

ONLINE SAFETY TEACHER S GUIDE: TEACHER S GUIDE: ONLINE SAFETY LEARNING OBJECTIVES Students will learn how to use the Internet safely and effectively. Students will understand that people online are not always who they say they are.

More information

How To Optimize your Marketing Strategy with Smart WiFi

How To Optimize your Marketing Strategy with Smart WiFi How To Optimize your Marketing Strategy with Smart WiFi The Case for Smart WiFi When it comes to acquiring fans, large corporations like Nike may be at an advantage compared to a neighborhood ice cream

More information

Lifecycle Vulnerability Management and Continuous Monitoring with Rapid7 Nexpose

Lifecycle Vulnerability Management and Continuous Monitoring with Rapid7 Nexpose Lifecycle Vulnerability Management and Continuous Monitoring with Rapid7 Nexpose SPONSORED BY WhatWorks is a user-to-user program in which security managers who have implemented effective Internet security

More information

Buyer Beware: How To Be a Better Consumer of Security Maturity Models

Buyer Beware: How To Be a Better Consumer of Security Maturity Models Buyer Beware: How To Be a Better Consumer of Security Maturity Models SESSION ID: GRC-R01 Julia Allen Software Engineering Institute Carnegie Mellon University jha@sei.cmu.edu Nader Mehravari Software

More information

CREATIVE S SKETCHBOOK

CREATIVE S SKETCHBOOK Session Plan for Creative Directors CREATIVE S SKETCHBOOK THIS SKETCHBOOK BELONGS TO: @OfficialSYP 1 WELCOME YOUNG CREATIVE If you re reading this, it means you ve accepted the We-CTV challenge and are

More information

Internet of Things (IoT): Security Awareness. Sandra Liepkalns, CRISC sandra.liepkalns@netrus.com

Internet of Things (IoT): Security Awareness. Sandra Liepkalns, CRISC sandra.liepkalns@netrus.com Internet of Things (IoT): Security Awareness Sandra Liepkalns, CRISC sandra.liepkalns@netrus.com So What is the Internet of Things Network of physical objects embedded with: Electronics, software, sensors

More information

User s Guide. Security Systems D220

User s Guide. Security Systems D220 User s Guide Security Systems D220 Table of Contents About This User s Guide... 3 Introduction... 3 Security System Basics... 4 Controlled Points... 5 24-Hour Points... 6 Keypad Keys... 6 Keypad Lights...

More information

* Dry Cleaning and Laundry Services Picked Up and Delivered to Your Home or Business

* Dry Cleaning and Laundry Services Picked Up and Delivered to Your Home or Business Consumer Guide to Delivery Dry Cleaning Services * Dry Cleaning and Laundry Services Picked Up and Delivered to Your Home or Business * By David Whitehurst A Consumer Education Message That Gives You:

More information

Buying Duplexes & Other Income Type Properties in London and South West Ontario

Buying Duplexes & Other Income Type Properties in London and South West Ontario Buying Duplexes & Other Income Type Properties in London and South West Ontario I have spent a lot of time studying and working with wealthy real estate investors and I am not talking about the flashy

More information

exit routes and fire protection

exit routes and fire protection exit routes and fire protection OSHA 11 Exit Routes and Fire Protection Osha 11 Exit Routes and Fire Protection Exit routes and fire protection Learning Objectives By the end of this lesson, students will

More information

Why Your Business Needs a Website: Ten Reasons. Contact Us: 727.542.3592 Info@intensiveonlinemarketers.com

Why Your Business Needs a Website: Ten Reasons. Contact Us: 727.542.3592 Info@intensiveonlinemarketers.com Why Your Business Needs a Website: Ten Reasons Contact Us: 727.542.3592 Info@intensiveonlinemarketers.com Reason 1: Does Your Competition Have a Website? As the owner of a small business, you understand

More information

Multiplication Rules! Tips to help your child learn their times tables

Multiplication Rules! Tips to help your child learn their times tables Multiplication Rules! Tips to help your child learn their times tables 1. Have fun! We want relaxed kids and plenty of giggles. 2. Go slowly and relax. 3. Do the preliminary review, all the preliminary

More information

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things. What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things. AGENDA Current State of Information Security Data Breach Statics Data Breach Case Studies Why current

More information

Hazard Identification and Risk Assessment

Hazard Identification and Risk Assessment Wildfires Risk Assessment This plan is an update of the 2004 City of Redmond Hazard Mitigation Plan (HMP). Although it is an update, this document has been redesigned so that it looks, feels, and reads

More information

How to fill every seat in the house. An event manager s guide to SMS Marketing

How to fill every seat in the house. An event manager s guide to SMS Marketing How to fill every seat in the house An event manager s guide to SMS Marketing - Why should you use SMS messaging? When was the last time you didn t have your mobile? Chances are you can t remember (because

More information

Security Defense Strategy Basics

Security Defense Strategy Basics Security Defense Strategy Basics Joseph E. Cannon, PhD Professor of Computer and Information Sciences Harrisburg University of Science and Technology Only two things in the water after dark. Gators and

More information

Availability and Disaster Recovery: Basic Principles

Availability and Disaster Recovery: Basic Principles Availability and Disaster Recovery: Basic Principles by Chuck Petch, WVS Senior Technical Writer At first glance availability and recovery may seem like opposites. Availability involves designing computer

More information

This presentation will introduce you to the concepts and terminology related to disaster recovery planning for businesses.

This presentation will introduce you to the concepts and terminology related to disaster recovery planning for businesses. 1. An Introduction This presentation will introduce you to the concepts and terminology related to disaster recovery planning for businesses. This presentation was prepared by the South Central Economic

More information

Lesson 1.1 P.WRITE, Gr. 2 & 3, 08-09. PWRITE: POW + TREE: LESSON # 1 Part 1

Lesson 1.1 P.WRITE, Gr. 2 & 3, 08-09. PWRITE: POW + TREE: LESSON # 1 Part 1 PWRITE: POW + TREE: LESSON # 1 Part 1 Purpose: Develop Background Knowledge, Discuss It Objectives: Introduction to POW, writing to persuade, and TREE; identification of TREE parts in essay example Materials:

More information

Acronis Digital Assets Research Findings: Unveiling Backup & Recovery Practices across Europe

Acronis Digital Assets Research Findings: Unveiling Backup & Recovery Practices across Europe Acronis Digital Assets Research Findings: Unveiling Backup & Recovery Practices across Europe March 2010 Contents - Executive Summary: Count the cost of a lost day - Methodology - Research Finding 1: Companies

More information

6 SECRETS TO OFFERING EXCEPTIONAL CUSTOMER SERVICE. 2013 salesforce.com, inc. All rights reserved.

6 SECRETS TO OFFERING EXCEPTIONAL CUSTOMER SERVICE. 2013 salesforce.com, inc. All rights reserved. 6 SECRETS TO OFFERING EXCEPTIONAL CUSTOMER SERVICE 2013 salesforce.com, inc. All rights reserved. > Intro INTRODUCTION The vast majority of people are not experiencing great service. Nearly a third of

More information

Using a Concept Definition Map

Using a Concept Definition Map Lesson Plan Using a Concept Definition Map 1. Set Expectations Print Disaster on the board. Tell students, You are going to come up with as many words as you can that are related to the word disaster,

More information

PREVENTING ZERO-DAY ATTACKS IN MOBILE DEVICES

PREVENTING ZERO-DAY ATTACKS IN MOBILE DEVICES PREVENTING ZERO-DAY ATTACKS IN MOBILE DEVICES Ira Winkler Codenomicon Session ID: MBS-W05 Session Classification: Intermediate Zero Day Attacks Zero day attacks are rising in prominence They tend to be

More information

B1 certification. March 2016. Reading and Writing

B1 certification. March 2016. Reading and Writing B1 certification March 2016 B1 certification March 2016 Reading and Writing You have 1 hour and 30 minutes to complete both parts. Please keep your eyes on your exam only. Copying or cheating will result

More information

The NIST Cybersecurity Framework (CSF) Unlocking CSF - An Educational Session

The NIST Cybersecurity Framework (CSF) Unlocking CSF - An Educational Session The NIST Cybersecurity Framework (CSF) Unlocking CSF - An Educational Session Robert Smith Systemwide IT Policy Director Compliance & Audit Educational Series 5/5/2016 1 Today s reality There are two kinds

More information

Sailing the 7 C s The C of Commitment: Noah

Sailing the 7 C s The C of Commitment: Noah Sailing the 7 C s The C of Commitment: Noah LESSON OVERVIEW Key Point: Go against the flow Obey God. Bible Story: Noah Bible Reference: Genesis 6:9-22 Challenge Verse: For all have sinned and fall short

More information

WELCOME TEAM CAPTAINS!

WELCOME TEAM CAPTAINS! WELCOME TEAM CAPTAINS! Thank you for joining the online fundraiser for (org name)! This kit is designed to provide you with the tools you will need to make your team s experience fun, successful and rewarding.

More information

Family Emergency Preparedness Plan

Family Emergency Preparedness Plan Family plan should address the following: Evacuation routes Family communications Utility shut-off and safety Insurance and vital records Evacuation plan Caring for animals Evacuation routes Draw a floor

More information

The 9 Ugliest Mistakes Made with Data Backup and How to Avoid Them

The 9 Ugliest Mistakes Made with Data Backup and How to Avoid Them The 9 Ugliest Mistakes Made with Data Backup and How to Avoid Them If your data is important to your business and you cannot afford to have your operations halted for days even weeks due to data loss or

More information

www.lawpracticeadvisor.com

www.lawpracticeadvisor.com 12 Characteristics of Successful Personal Injury Lawyers By Ken Hardison President of Law Practice Advisor Kenneth L. Hardison, 2009 There s a theory that many successful lawyers and entrepreneurs admittedly

More information

The Challenge of Helping Adults Learn: Principles for Teaching Technical Information to Adults

The Challenge of Helping Adults Learn: Principles for Teaching Technical Information to Adults The Challenge of Helping Adults Learn: Principles for Teaching Technical Information to Adults S. Joseph Levine, Ph.D. Michigan State University levine@msu.edu One of a series of workshop handouts made

More information

Why Crisis Response and Business Continuity Plans Fail

Why Crisis Response and Business Continuity Plans Fail Why Crisis Response and Business Continuity Plans Fail 10 Lessons Learned from Real-World Experience Many organizations invest considerable time, money and effort in developing Crisis Response and Business

More information

Information Security for the Rest of Us

Information Security for the Rest of Us Secure Your Way Forward. AuditWest.com Information Security for the Rest of Us Practical Advice for Small Businesses Brian Morkert President and Chief Consultant 1 Introduction President Audit West IT

More information

The Psychology of (In)Security

The Psychology of (In)Security The Psychology of (In)Security Security Myths Create Risk Adversity to Change Executive Summary The most high-profile data breaches were at organizations that failed to make the proper investments to properly

More information

BUSINESS CONTINUITY PLAN

BUSINESS CONTINUITY PLAN BUSINESS CONTINUITY PLAN Business Name: Phone # Cell # Emergency Contact Information: Dial 9-1-1 in an Emergency Non-Emergency: Police: Fire: Insurance Provider: Emergency Planning Team: I. CRITICAL OPERATIONS

More information

Can you afford to lose your information?

Can you afford to lose your information? Can you afford to lose your information? It is inevitable that you will encounter an incident where you will experience the loss of critical business information. Can you survive it? CyberSecure - backup

More information

Shooting Uphill and Downhill. Major John L. Plaster, USAR (ret) Of all the ways a precision rifleman must compensate when firing such as for distance,

Shooting Uphill and Downhill. Major John L. Plaster, USAR (ret) Of all the ways a precision rifleman must compensate when firing such as for distance, Shooting Uphill and Downhill By Major John L. Plaster, USAR (ret) Of all the ways a precision rifleman must compensate when firing such as for distance, for wind and for target movement the most confounding

More information

Lesson 35. The Tabernacle. Exodus 25 27. God lives among his people

Lesson 35. The Tabernacle. Exodus 25 27. God lives among his people Gospel Story Curriculum (OT) lower Lower elementary Lesson 35 The Tabernacle Exodus 25 27 Bible Truth God lives among his people l e s s o n snapshot 1. Opening review.... 5 min Use last week s lesson

More information

in: (R) Luke 18: 31 33

in: (R) Luke 18: 31 33 Relentless Jesus resolutely set out for Jerusalem [12.23.12] [I came across] the most amazing Christmas passage ~ I think you are going to love it! (R) Luke 9: 51 or p. 791 in pew Bible as His time drew

More information

Continuity of Operations Planning. A step by step guide for business

Continuity of Operations Planning. A step by step guide for business What is a COOP? Continuity of Operations Planning A step by step guide for business A Continuity Of Operations Plan (COOP) is a MANAGEMENT APPROVED set of agreed-to preparations and sufficient procedures

More information

Ten Strategies to Encourage Academic Integrity in Large Lecture Classes

Ten Strategies to Encourage Academic Integrity in Large Lecture Classes Ten Strategies to Encourage Academic Integrity in Large Lecture Classes Brian Udermann and Karrie Lamers Introduction Academic integrity has been and continues to be a lively topic of discussion on most

More information

Christmas Theme: The Light of the World

Christmas Theme: The Light of the World Christmas Theme: The Light of the World (NOTE: Some of the activities in this lesson are also used in Jesus, Our Lord: Lesson 2 Jesus is the Light. ) OVERVIEW Key Point: Jesus is the Light who Guides Repeat

More information

Cyber Threats Insights from history and current operations. Prepared by Cognitio May 5, 2015

Cyber Threats Insights from history and current operations. Prepared by Cognitio May 5, 2015 Cyber Threats Insights from history and current operations Prepared by Cognitio May 5, 2015 About Cognitio Cognitio is a strategic consulting and engineering firm led by a team of former senior technology

More information

James R. Quiter, P.E., Senior Vice President Rolf Jensen & Associates, Inc.

James R. Quiter, P.E., Senior Vice President Rolf Jensen & Associates, Inc. AT THE STRATOSPHERE TOWER, LAS VEGAS NEVADA By: James R. Quiter, P.E., Senior Vice President Rolf Jensen & Associates, Inc. INTRODUCTION This paper discusses the performance based approach to fire protection

More information

Penetration Testing //Vulnerability Assessment //Remedy

Penetration Testing //Vulnerability Assessment //Remedy A Division Penetration Testing //Vulnerability Assessment //Remedy In Penetration Testing, part of a security assessment practice attempts to simulate the techniques adopted by an attacker in compromising

More information

Disaster Recovery Plan Checklist

Disaster Recovery Plan Checklist Disaster Recovery Plan Checklist Your guide for setting up or updating a Disaster Recovery Plan for your business. ArcSource Disaster Recovery Plan Checklist 1. Compile Your Internal Contacts Information

More information

Development of a Risk-Based Decision Support Tool to Assist Fire Departments in Managing Unwanted Alarms SupDet 2013 Conference

Development of a Risk-Based Decision Support Tool to Assist Fire Departments in Managing Unwanted Alarms SupDet 2013 Conference Development of a Risk-Based Decision Support Tool to Assist Fire Departments in Managing Unwanted Alarms SupDet 2013 Conference John R. Hall, Jr. Fire Analysis & Research Division National Fire Protection

More information

Five Core Principles of Successful Business Architecture. STA Group, LLC Revised: May 2013

Five Core Principles of Successful Business Architecture. STA Group, LLC Revised: May 2013 Five Core Principles of Successful Business Architecture STA Group, LLC Revised: May 2013 Executive Summary This whitepaper will provide readers with important principles and insights on business architecture

More information

Nine Steps to Smart Security for Small Businesses

Nine Steps to Smart Security for Small Businesses Nine Steps to Smart Security for Small Businesses by David Lacey Co-Founder, Jericho Forum Courtesy of TABLE OF CONTENTS INTRODUCTION... 1 WHY SHOULD I BOTHER?... 1 AREN T FIREWALLS AND ANTI-VIRUS ENOUGH?...

More information

Check Point and Security Best Practices. December 2013 Presented by David Rawle

Check Point and Security Best Practices. December 2013 Presented by David Rawle Check Point and Security Best Practices December 2013 Presented by David Rawle Housekeeping o Mobiles on Silent o No File Alarms planned o Fire exits are in front and behind and down the stairs o Downstairs

More information