Content Inventory. Security Awareness & Training PROGRAM PACKAGES E-LEARNING & GAMING VIDEOS & ANIMATIONS NEWSLETTERS & ARTWORK + ADDITIONS
|
|
|
- Candace Allen
- 10 years ago
- Views:
Transcription
1 AwareGo.com In Partnership with The Company & Training Content Inventory 4Q 2015 E-LEARNING & GAMING VIDEOS & ANIMATIONS NEWSLETTERS & ARTWORK PROGRAM PACKAGES + ADDITIONS 2015 The Company TheSecurityAwarenessCompany.com All rights reserved. Prices subject to change.
2 E-LEARNING & GAMING All modules available in SCORM, AICC, TinCan, Intranet/HTML, Mobile. All modules have post-assessment quizzes available. All modules can include narration script. (Ask about languages.) Security Concepts (40 minutes) Top Ten (17 minutes) 3 Domains of Mobile (4.5 mins) BYOD (5 mins) Data Classification (6.5 mins) How to be a Human Firewall (15 mins) Laptop Security (5.5 mins) Malware (7 mins) Mobile Computing Basics (4 mins) Non-Technical Security (10 mins) Password Basics (7.5 mins) Passwords & User Authentication (17 mins) Phishing (6.5 mins) PII (15 mins) Privacy (4 mins) Proper Computer Disposal (5 mins) Secure Internet Behavior (5 mins) Security Triads (5 mins) Social Engineering (7 mins) WiFi (7 mins) DIY: Create Your Own Auto-advance or manual advance. Video-only versions available. Executive Help Desk / Call Center Security Physical Security Pretexting & Social Engineering OWASP: Secure Programming Don t see exactly what you want? Combine a variety of existing modules, games and videos to create your own custom awareness module. Need to add in company-specific policy information? Give us the script, let us create the slides! We can add specific videos, images, links, audio, and quiz questions. Please Note: Hourly production charges will apply for all custom work. Compliance FERPA (9 mins) FFIEC (13 mins) GLBA (9 mins) HIPAA (15 mins) PCI-DSS (15 mins) SarbOx (14 mins) Interactive Learning Data Classification How to Be a Human Firewall Phishing Basics Understanding & Protecting PII Trivia Games Family Feud Jeopardy Millionaire Pyramid Secret Mission Sports Themed: Skiing, Hockey, Baseball or Soccer Timed Trivia World Race or Space Race Auto-advance or manual advance. Video-only versions available. Coming 2016: EU Data Protection Directive FERC/NERC FISMA Insider Trading OFAC - Money Laundering Safe Harbor/Cross Border Data Transfer Workforce Safety Requires extensive user interaction. Acceptable Use Identifying Phishing s Social Engineering In Action 5-20 questions. Use your questions or ours. Features: SCORM compliant Music + sound effects Make awareness quizzing fun Optimized for Mobile Ask for a demo today! TheSecurityAwarenessCompany.com
3 VIDEOS & ANIMATIONS All videos provided in default.mp4 format unless otherwise specified. Videos can be combined to create a custom SCORM module. Subtitles can be added to any video. (Ask about languages.) Security Express Under 4 mins, dynamic, fast-moving, informative & eye-catching. Engaging mix of images, music, text, & narration. Advanced Persistent Threats Backup Being a Human Firewall Beyond Phishing Cyber Crime Starts with You Data Breaches Data Breaches & You Data Classification Overview Data Loss & the Insider Dumpster Diving Spoofing Examples of Insider Jobs Examples of Phishing Firewalls Free WiFi Human Firewall & Data Classification Introduction to the Cloud Laptop Security Low-Tech Hacks to Steal Your ID MDM is Not Security Mobile Cyber Crime Mobile Security Overview Mouse-Overs Non-Technical Security Skills Password Security Phishing in Action Physical Security Threats PII & Compliance Pretexting: Fake Fraud Detection Pretexting: Fake Help Desk Privacy vs. Security Proper Hard Drive Disposal Road Apples Safe Surfing #1 Safe Surfing #2 Social Engineering Definition Social Media Social Media Data Mining Spam The CIA Triad The Domains Triad The Many Lives Triad TMI What Social Engineers Look Like What is ID Theft? Why? Public vs. Private Cloud Social Networking Dos and Don ts Staying Secure on the Road The Many Lives of PII For the C-Suite Onboarding & Offboarding Executive Awareness Leadership Top Ten Security Issues for Execs Help Desk Call Center Animated Security Express Funny, modern animation style. Silent Security Express No audio, just text & images. Perfect for break-room monitors! Phishing: Contest Winner Phishing From Bank Phishing From Facebook Phishing From Netflix Pretexting: Credit Card Pretexting: Employee Pretexting: Execs Pretexting: IT Help Desk Protecting PII HIPAA Compliance PCI Compliance A Day of Bad Passwords Making Strong Passwords Mobile Browser Attacks Physical Security Threats Types of Social Engineering Types of Malware Mulberry Sitcom Filmed in the style of The Office. Each episode under 8 mins. AwareGo Filmed, diverse cast of actors. All videos less than 2 minutes. Episode 1: Security Overview Intro Episode 2: Passwords I Episode 3: Passwords II Episode 4: I Episode 5: II Episode 6: Phishing Episode 7: Files & Physical Security Episode 8: Policy Episode 9: Social Engineering I Episode 10: Social Engineering II Episode 11: Browsing Episode 12: Conclusion While it is recommended that the entire series be used together, in chronological order, each episode can be licensed individually or in increments. Combined total runtime of the series is 77 minutes. Clean Desk Confidential Material Free WiFi HTTPS Inappropriate s Malicious Attachments Password Handling Passwords Phishing Pop Ups Printouts Removable Media Shoulder surfing Social engineering Friendship Social engineering USB key drop Spear Phishing Spyware Tailgating Unauthorized installs WiFi at home Ask for a demo today! TheSecurityAwarenessCompany.com
4 NEWSLETTERS & ARTWORK Use PDF Newsletters as the foundation of your program. All art posters available as PDFs or JPGs (or both). Hang posters around the office. Use them in screensavers, blasts & on the company intranet and mobile devices. Annual Newsletter Subscription Photographic Art Provided at default size 11 x 17. Monthly newsletters are a great way to consistently reinforce any message! Each month, our content is written by security professionals according to the following topic list. This allows the newsletter to remain up-to-date, while focusing on relevant topics that change monthly Topic List Jan: The Many Lives of Security Feb: Social Media & Safe Surfing Mar: Identification & Authentication Apr: Phishing & Cyber Crime Update May: Understanding Cloud Computing Jun: Privacy, PII & ID Theft Jul: Nontechnical & Physical Security Aug: The A to Z of Sept: The Malware Menace Oct: Social Engineering Tactics Nov: Becoming a Human Firewall Dec: The Top 10 Best Security Practices 2016 Topic List: Jan: The 3 Domains of Security Feb: Secrets of Data Classification Mar: Personal & Home Security Apr: Spam, Scams & Hacking Social Media May: Healthy Living & Passwords Jun: The CIA Triad Jul: Mobile &the Cloud Aug: Insider Threats, APTs & Breaches Sep: Best Practices for Safe Surfing Oct: The Horror of Phishing & Malware Nov: Privacy, PII & ID Theft Dec: Nontechnical, Physical & Common Sense Security Be a Human Firewall Be Careful When Using WiFi Buckle Up Clean Up Your Act! Conscientious Facebook Posts Ctrl + Alt + Del Did You Follow Policy? Don t be Phishing Bait Did You Back Up? Downloading Apps HIPAA Penalties ID Theft Stats Know the Signs: Be Alert Know the Signs: Confused Know the Signs: No Thru Traffic Know the Signs: Report Incidents Know the Signs: Stop Know the Signs: Wrong Way Leopard Let s Get Physical Lion Losing Your Phone Lost Laptops and Mobile Devices Messy Desks are Security Risks Mobile Devices Left at Airports Navigate Internet Perils Never Share Passwords Owl Password Help Passwords Are Like Toothbrushes Passwords Are Like Underwear Phishing s Recognize/Protect PII Report Anything Unusual Report Strange Incidents Safe Surfing Shed and Shred Social Media Regulations Stolen Identity? Stop Think Connect Strong Passwords Think Before You Click (Malware) Trusting Delivery Man Watch Out for Shoulder Surfers What is the Cloud? What is Your Responsibility? When Did You Change Your Password? When in Doubt, Ask! Illustrated Art Provided at default size 11 x 17. Can be scaled to any size. Silhouettes Art Provided at default size 11 x 17. Can be scaled to any size. Do You Know Our Policies? Do You Think Before You Click? Do You Think Before Clicking? Security is a Responsibility Security is Your Responsibility Treat Passwords Like Underpants Keep a Clean Desk Devices Store Personal Data Social Engineers Target People Cloud = Another Computer Use Devices Safely Back Up Documents Badge Policy Confidential Documents Malware Man in the Middle Attack Phishing Scams Report Immediately Shred Sensitive Documents Smartphones Social Engineering Social Media Treat Passwords Like Toothbrushes USB Sticks WiFi Hot Spot Typography Art Provided at default size 11 x 17. Can be scaled to any size. Anatomy of Phishing Classic Security Triad (CIA) Human Firewall Password Security Triad Protecting PHI Security Domains Triad Security Lives Triad Custom Art Don t see exactly what you want? Tell us the messaging you need, the type of imagery you want used, and we can create something that perfectly meets your company-specific goals for your security awareness program. Hourly production charges will apply for all custom work. Ask for a demo today! TheSecurityAwarenessCompany.com
5 PROGRAM PACKAGES Affordable options for organizations of all sizes. Starting prices include up to 100 users for annual unbranded internal electronic and physical distribution license. Basic: $1795 Choice: $2695 Quizmaster: $3195 Premium: $3495 Unlimited 1 module or game 12 Security Express videos 1 module or game 12 Security Express videos 4 modules and/or games 12 Security Express videos 6 modules and/or games Pick what you want, when you want it from our inventory for an entire year. Spread out your program using multiple formats, and have the freedom to use any of our content. Call for pricing. Just the News Options: $795 / $1195 / $1895 Just the News Basic: 12 Newsletters Just the News Plus: 12 Newsletters + 12 Pieces of Art Just the News Premium: 12 Newsletters + 12 Security Express Videos Security Express Packs 6 videos - $ videos - $ videos -$ videos - $2995 ALL current videos - $7995 Design Your Own Tell us what you need and we ll help make it fit your budget. Any number of videos, modules, posters, then add in a newsletter, deliver in multiple formats, add quizzes, games, LMS, languages, etc. What you want, when you want it! THEMATIC PACKAGES Affordable options for organizations of all sizes. Focus user training to fit your specific needs. Starting prices include up to 100 users for annual unbranded internal electronic and physical distribution license. No substitutions. Focus on Phishing Awareness: $2995 Focus On Phishing Digest + Annual Monthly Newsletter Subscription Focus on Personal Security: $2795 Focus On Personal Security Digest + Annual Monthly Newsletter Subscription Focus on HIPAA Compliance: $2495 Focus On HIPAA Compliance Digest + Annual Monthly Newsletter Subscription 2 Modules: Phishing Awareness Social Engineering 2 Modules: Top 10 SA Password Basics 2 Modules: Top 10 SA HIPAA Compliance 2 Interactive Modules: Phishing Phishing Identification 1 Game: Phishing Jeopardy 10 Security Express Videos Beyond Phishing Phishing: Contest Winner Spoofing Phishing: From Bank Examples of Phishing Phishing: From Facebook Mouse-Overs Phishing: From Netflix Phishing in Action Spam 4 Posters: Anatomy of Phishing Don t be Phishing Bait Phishing s Phishing Scams Call about other thematic packages such as social engineering. 2 Interactive Learning Modules: Human Firewall PII 8 Security Express Videos A Day of Bad Passwords Being a Human Firewall Cyber Crime Starts w/ You Low-Tech Hacks to Steal ID 8 Posters: Human Firewall Password Help Stolen Identity Safe Surfing Proper Hard Drive Disposal Social Media Data Mining The Many Lives Triad Phishing: Contest Winner Strong Passwords The Security Lives Triad Losing Your Phone Stop Think Connect Ask about similar packages such as mobile, professional, & exec. 2 Interactive Learning Modules: Data Classification PII 6 Security Express Videos Data Breaches Data Classification Spoofing 12 Posters HIPAA Penalties Protecting PHI Recognize & Protect PII Let s Get Physical Do Your Know Our Policies? Pretexting: Employee Pretexting: Execs Treat Passwords Like Underpants Human Firewall Anatomy of Phishing Don t be Phishing Bait Phishing s Phishing Scams Ask about similar compliance packages such as PCI & GLBA. Ask for a demo today! TheSecurityAwarenessCompany.com
6 + ADDITIONS Any effective security awareness program is complete must be flexible to meet your needs. SAC offers the greatest range of content and services anywhere. LMS Hosting Recommended for companies with less than 1,000 employees who do not have their own LMS Learning Management System and must measure compliance, mandatory training or regulatory requirements. Hosted in Amazon s AWS-EC2, reliability and security is assured (SSL-TLS). Tin Can, SCORM, AICC compliant. Branded with your company details, full reporting and metrics. SAML 2.0 upgrade available for SSO from your AD. ADA & JAWS compatible. SAML 2.0 Upgrade available. For larger installations (10, ,000+ users), we can provide labels, such as Location, Department, etc. for more in-depth reporting. Please ask for a demo. A comprehensive administration console is available to your organization, or we can manage it for you. Use our quizzing and assessments or we can use your ideas and make them interactive. We are here for you. Mobile Awareness Most SAC content can be delivered to your mobile devices. Newsletters are not practical, but pushing posters and videos in messages is popular with many of our clients. Courseware can be delivered to most Android devices with an optimized player app or an ipad app. iphones do not require an app. Just specify HTML5. OWASP Coming Winter 2015! This 3+ hour technical course was created by Dennis Groves, the co-founder of OWASP itself. His legendary contribution was the OWASP Guide, which has been downloaded over 2 million times. The guide is now a reference document in the PCI DSS standard, and the de-facto standard for securing web applications. The OWASP Top Ten Security Issues begins with the history of computer security networks and then application starting with the OSI. Then Dennis works through real-world applications of OWASP Top Ten (with historical context) and concludes with a discussion of threat modeling and how it relates to the OWASP Top Ten and the security of your organization. Branding: Have it your way Add your company ID (logo, mascot), Awareness Program name, Incident Response information to any of our content. Videos get customized intro and outros with logo & incident response information. Newsletters get a color coordinated custom masthead & incident response box on the cover, and a branded footer on the inside pages. Courseware, posters and other materials can all be branded with your mascots, logos, links and company specific details. Policy & Customization Many companies like to add specific policy information to our content. This is a standard process for us, in videos, courseware and newsletters. Custom artwork, posters and other content delivery paths are available. Organizational, industry or regulatory specific content can easily be added to courseware. Languages & Translation Translation is different than localization, and we strive, in conjunction with our global clients, to emphasize the communication of ideas rather than literal word-for-word translations. Some of our inventory is already available in up to 17 languages, and we can easily translate our modules, videos & posters to meet your needs. Translated audio is an option but keep in mind that it s more cost-effective to use subtitles in videos and translated read-along scripts for training than recording audio translations. The costs of voice talent, studio time, editing, and resynchronization can be higher than most budgets allow. Please Note: Newsletter is only available in English. Many clients take the newsletter also in DOC format for their internal translation/localization. Awareness Launch Video Many companies choose to have us build a launch video to introduce and reinforce their awareness program. Typically less than 4 minutes long, this video positions your company, its leadership and dedication to cybersecurity and awareness issues. In terms of styling: How about super crisp videos in HD with professional music, voice over and sound effects? Or perhaps a humorous animation, even using your mascots and branding ID? Or some combination of the two? Let us help. This is what we do better than anyone. Ask for a demo today! TheSecurityAwarenessCompany.com
SANS Securing The Human
SANS Securing The Human Introduction Most organizations have invested in security technology to protect their information, putting in place solutions such as firewalls, encryption or IDS sensors. However,
SOMETHING PHISHY IS GOING ON!
SOMETHING PHISHY IS GOING ON! Engaging, easy to understand, memorable training. WHAT WE DO We have created a series of training episodes that are highly engaging, easy to understand and memorable. They
National Cyber Security Month 2015: Daily Security Awareness Tips
National Cyber Security Month 2015: Daily Security Awareness Tips October 1 New Threats Are Constantly Being Developed. Protect Your Home Computer and Personal Devices by Automatically Installing OS Updates.
Learn to protect yourself from Identity Theft. First National Bank can help.
Learn to protect yourself from Identity Theft. First National Bank can help. Your identity is one of the most valuable things you own. It s important to keep your identity from being stolen by someone
WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY
SMALL BUSINESSES WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY ONE CLICK CAN CHANGE EVERYTHING SMALL BUSINESSES My reputation was ruined by malicious emails ONE CLICK CAN CHANGE EVERYTHING Cybercrime comes
+GAMES. Information Security Advisor. Be a Human Firewall! The Human Firewall' s Top Concerns in the Cyber, People & Physical Domains
Information Security Advisor December 2015 Be a Human Firewall! The Human Firewall' s Top Concerns in the Cyber, People & Physical Domains +GAMES Spot the insider & Human firewall Filtering EXerCISE Good
Internet threats: steps to security for your small business
Internet threats: 7 steps to security for your small business Proactive solutions for small businesses A restaurant offers free WiFi to its patrons. The controller of an accounting firm receives a confidential
Malware & Botnets. Botnets
- 2 - Malware & Botnets The Internet is a powerful and useful tool, but in the same way that you shouldn t drive without buckling your seat belt or ride a bike without a helmet, you shouldn t venture online
Everyone s online, but not everyone s secure. It s up to you to make sure that your family is.
TrendLabs Everyone s online, but not everyone s secure. It s up to you to make sure that your family is. We live out our digital lives on the Internet. There, communication is quicker and easier, and our
Identity Theft Protection
Identity Theft Protection Email Home EDUCATION on DANGER ZONES Internet Payments Telephone ID theft occurs when someone uses your personal information with out your knowledge to commit fraud. Some terms
Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training - Session One
Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training - Session One End User Security, IS Control Evaluation & Self- Assessment Information Security Trends and Countermeasures
NC DPH: Computer Security Basic Awareness Training
NC DPH: Computer Security Basic Awareness Training Introduction and Training Objective Our roles in the Division of Public Health (DPH) require us to utilize our computer resources in a manner that protects
Small businesses: What you need to know about cyber security
Small businesses: What you need to know about cyber security March 2015 Contents page What you need to know about cyber security... 3 Why you need to know about cyber security... 4 Getting the basics right...
10 Smart Ideas for. Keeping Data Safe. From Hackers
0100101001001010010001010010101001010101001000000100101001010101010010101010010100 0100101001001010010001010010101001010101001000000100101001010101010010101010010100000 0100101001001010010001010010101001010101001000000100101001010101010010101010010100000
AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com
AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS ftrsecure.com Can You Separate Myths From Facts? Many Internet myths still persist that could leave you vulnerable to internet crimes. Check out
Certified Secure Computer User
Certified Secure Computer User Exam Info Exam Name CSCU (112-12) Exam Credit Towards Certification Certified Secure Computer User (CSCU). Students need to pass the online EC-Council exam to receive the
1. Any email requesting personal information, or asking you to verify an account, is usually a scam... even if it looks authentic.
Your identity is one of the most valuable things you own. It s important to keep your identity from being stolen by someone who can potentially harm your good name and financial well-being. Identity theft
Protect Yourself in the Cloud Age
Protect Yourself in the Cloud Age Matthew Wu Consultant Hong Kong Computer Emergency Response Team Coordination Centre About HKCERT HKCERT ( 香 港 電 腦 保 安 事 故 協 調 中 心 ) Established in 2001 Funding & Operation
Intro. Tod Ferran, CISSP, QSA. SecurityMetrics. 2 years PCI and HIPAA security consulting, performing entity compliance audits
HIPAA Security Rule & Live Hack Tod Ferran, CISSP, QSA Intro Tod Ferran, CISSP, QSA 25 years working with IT and physical security 2 years PCI and HIPAA security consulting, performing entity compliance
Universities and Schools Under Cyber-Attack: How to Protect Your Institution of Excellence
Universities and Schools Under Cyber-Attack: How to Protect Your Institution of Excellence About ERM About The Speaker Information Security Expert at ERM B.S. Software Engineering and Information Technology
[Company Name] HIPAA Security Awareness and Workforce Training Program Manual
[Company Name] HIPAA Security Awareness and Workforce Training Program Manual The Importance of Security Awareness Training 4 Data Security Breaches 5 What is Information Security? 6 Roles and Responsibilities
IT TRENDS AND FUTURE CONSIDERATIONS. Paul Rainbow CPA, CISA, CIA, CISSP, CTGA
IT TRENDS AND FUTURE CONSIDERATIONS Paul Rainbow CPA, CISA, CIA, CISSP, CTGA AGENDA BYOD Cloud Computing PCI Fraud Internet Banking Questions The Mobile Explosion Mobile traffic data in 2011 was nearly
10 Quick Tips to Mobile Security
10 Quick Tips to Mobile Security 10 Quick Tips to Mobile Security contents 03 Introduction 05 Mobile Threats and Consequences 06 Important Mobile Statistics 07 Top 10 Mobile Safety Tips 19 Resources 22
platforms Android BlackBerry OS ios Windows Phone NOTE: apps But not all apps are safe! malware essential
Best Practices for Smartphone Apps A smartphone is basically a computer that you can carry in the palm of your hand. Like computers, smartphones have operating systems that are often called platforms.
Web Protection for Your Business, Customers and Data
WHITE PAPER: WEB PROTECTION FOR YOUR BUSINESS, CUSTOMERS............ AND.... DATA........................ Web Protection for Your Business, Customers and Data Who should read this paper For security decision
Cybersecurity Best Practices
Ten Essential Cybersecurity Best Practices Banking Business Employees Brought to you by: 1 Did you know? One in five small-to-medium-sized companies were the victims of cyber breaches in 2013.1 In 76%
Retail/Consumer Client. Internet Banking Awareness and Education Program
Retail/Consumer Client Internet Banking Awareness and Education Program Table of Contents Securing Your Environment... 3 Unsolicited Client Contact... 3 Protecting Your Identity... 3 E-mail Risk... 3 Internet
Cybercrime Prevention and Awareness
April, 2014 Cybercrime Prevention and Awareness Basic Security Principles to Help You Better Navigate Through Cyberspace To join conference call dial (305) 433-6663 option 4 PIN # 42014 Presented by: Miguel
How-To Guide: Cyber Security. Content Provided by
How-To Guide: Cyber Security Content Provided by Who needs cyber security? Businesses that have, use, or support computers, smartphones, email, websites, social media, or cloudbased services. Businesses
PCI Data Security Standard 3.0
SECURELY ENABLING BUSINESS PCI Data Security Standard 3.0 Training Strategies That Work Presented by Doug Hall May 20, 2014 AGENDA PCI DSS 3.0 Training Strategies That Work PCI DSS 3.0 Overview PCI Training
I m getting MFA, you re getting MFA, we re ALL getting MFA. Richard Biever ([email protected]) Chuck Kesler (chuck.kesler@duke.
I m getting MFA, you re getting MFA, we re ALL getting MFA Richard Biever ([email protected]) Chuck Kesler ([email protected]) Durham, we have a problem Passwords are the most used way to secure
PRIVACY + SECURITY TRAINING PROGRAM CATALOG
PRIVACY + SECURITY TRAINING PROGRAM CATALOG TeachPrivacy 261 Old York Rd., Suite 518 P.O. Box 706 Jenkintown, PA 19046 Phone: Fax: (215) 886-1909 DATA ABOUT TEACHPRIVACY The TeachPrivacy Advantage Expertise
DATA SECURITY HACKS, HIPAA AND HUMAN RISKS
DATA SECURITY HACKS, HIPAA AND HUMAN RISKS MSCPA HEALTH CARE SERVICES SEMINAR Ken Miller, CPA, CIA, CRMA, CHC, CISA Senior Manager, Healthcare HORNE LLP September 25, 2015 AGENDA 2015 The Year of the Healthcare
Secure Your Mobile Workplace
Secure Your Mobile Workplace Sunny Leung Senior System Engineer Symantec 3th Dec, 2013 1 Agenda 1. The Threats 2. The Protection 3. Q&A 2 The Mobile Workplaces The Threats 4 Targeted Attacks up 42% in
Information Security It s Everyone s Responsibility
Information Security It s Everyone s Responsibility Developed By The University of Texas at Dallas (ISO) Purpose of Training As an employee, you are often the first line of defense protecting valuable
Network Security & Privacy Landscape
Network Security & Privacy Landscape Presented By: Greg Garijanian Senior Underwriter Professional Liability 1 Agenda Network Security Overview -Latest Threats - Exposure Trends - Regulations Case Studies
THREE KEYS TO COST-EFFECTIVE SECURITY FOR YOUR SMALL BUSINESS
THREE KEYS TO COST-EFFECTIVE SECURITY FOR YOUR SMALL BUSINESS Learn more about Symantec security here OVERVIEW Data and communication protection isn t a problem limited to large enterprises. Small and
ADMINISTRATORS SERIES PRIVACY AND SECURITY AT UF. Cheryl Granto Information Security Manager, UFIT Information Security
ADMINISTRATORS SERIES PRIVACY AND SECURITY AT UF Susan Blair Chief Privacy Officer Cheryl Granto Information Security Manager, UFIT Information Security RULES OF THE ROAD Information Highway Danger Zones
Introduction to Computer Security
Introduction to Computer Security Rev. Sept 2015 What is Computer Security? 2 Computer Security is the protection of computing systems and the data that they store or access 3 Why is Computer Security
SECURITY AWARENESS TRAINING. July 2015
SECURITY AWARENESS TRAINING July 2015 Agenda Overview Modules Supporting Collateral Customization/Language Options Consumption Models Administration and Reporting Confidential and Proprietary 2 Information
Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines
Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines 1. Implement anti-virus software An anti-virus program is necessary to protect your computer from malicious programs,
Building The Human Firewall. Andy Sawyer, CISM, C CISO Director of Security Locke Lord
Building The Human Firewall Andy Sawyer, CISM, C CISO Director of Security Locke Lord Confidentiality, Integrity, Availability Benchmarks of Cybersecurity: Confidentiality Information is protected against
How To Protect Your Information From Being Hacked By A Hacker
DOL New Hire Training: Computer Security and Privacy Table of Contents Introduction Lesson One: Computer Security Basics Lesson Two: Protecting Personally Identifiable Information (PII) Lesson Three: Appropriate
HFS DATA SECURITY TRAINING WITH TECHNOLOGY COMES RESPONSIBILITY
HFS DATA SECURITY TRAINING WITH TECHNOLOGY COMES RESPONSIBILITY Illinois Department of Healthcare and Family Services Training Outline: Training Goals What is the HIPAA Security Rule? What is the HFS Identity
Protect Yourself. Who is asking? What information are they asking for? Why do they need it?
Protect Yourself Your home computer serves many purposes: email, shopping, social networking and more. As you surf the Internet, you should be aware of the various ways to protect yourself. Of primary
Is security awareness a waste of time?
Is security awareness a waste of time? New York State Cyber Security Conference June 5, 2013 Scott Gréaux Vice President Product Management and Services, PhishMe, Inc. They are exploiting human vulnerabilities
Management and Storage of Sensitive Information UH Information Security Team (InfoSec)
Management and Storage of Sensitive Information UH Information Security Team (InfoSec) Who Are We? UH Information Security Team Jodi Ito - Information Security Officer Deanna Pasternak & Taylor Summers
Cyber Security. John Leek Chief Strategist
Cyber Security John Leek Chief Strategist AGENDA The Changing Business Landscape Acknowledge cybersecurity as an enterprise-wide risk management issue not just an IT issue How to develop a cybersecurity
SBA Cybersecurity for Small Businesses. 1.1 Introduction. 1.2 Course Objectives. 1.3 Course Topics
SBA Cybersecurity for Small Businesses 1.1 Introduction Welcome to SBA s online training course: Cybersecurity for Small Businesses. SBA s Office of Entrepreneurship Education provides this self-paced
Why you need. McAfee. Multi Acess PARTNER SERVICES
Why you need McAfee Multi Acess PARTNER SERVICES McAfee Multi Access is an online security app that protects all types of devices. All at once. The simple monthly subscription covers up to five devices
AT&T Global Network Client for Windows Product Support Matrix January 29, 2015
AT&T Global Network Client for Windows Product Support Matrix January 29, 2015 Product Support Matrix Following is the Product Support Matrix for the AT&T Global Network Client. See the AT&T Global Network
Marlon R Clarke, Ph. D., CISSP, CISM Director Network Operations and Services, NSU 10-17-2013
Marlon R Clarke, Ph. D., CISSP, CISM Director Network Operations and Services, NSU 10-17-2013 Todays Discussion Overview of Computer and Internet Security What is Computer and Internet Security Who Should
PREP Course #25: Hot Topics in Cyber Security and Database Security. Presented by: Joe Baskin Manager, Information Security, OCIO JBaskin@nshs.
PREP Course #25: Hot Topics in Cyber Security and Database Security Presented by: Joe Baskin Manager, Information Security, OCIO [email protected] Objectives Discuss hot topics in cyber security and database
The following information was provided by SANS and discusses IT Security Awareness. It was last updated in 2015.
The following information was provided by SANS and discusses IT Security Awareness. It was last updated in 2015. By completing this module and the quiz, you will receive credit for CW 170, which is required
How to Spot and Combat a Phishing Attack Webinar
How to Spot and Combat a Phishing Attack Webinar October 20 th, 2015 Kevin Patel Sr Director of Information Security, Compliance & IT Risk Mgmt [email protected] Agenda 1) National Cyber Security
Training Employees to Recognise & Avoid Advanced Threats
Training Employees to Recognise & Avoid Advanced Threats Joe Ferrara, President & CEO, Wombat Security Technologies Rashmi Knowles, Chief Security Architect EMEA, RSA The Security Division of EMC Session
Information Security Training. Jason Belford Jimmy Lummis
Information Security Training Jason Belford Jimmy Lummis Presenters Who are these guys? Jason Belford Principal Information Security Engineer Jimmy Lummis Information Security Policy and Compliance Manager
What are the common online dangers?
ONLINE SECURITY GUIDELINES Internet Banking is convenient and times saving. You can do remittances, place online deposit and other transactions through online banking with the convenience and privacy of
Using big data analytics to identify malicious content: a case study on spam emails
Using big data analytics to identify malicious content: a case study on spam emails Mamoun Alazab & Roderic Broadhurst [email protected] http://cybercrime.anu.edu.au 2 Outline Background Cybercrime
Incident Response. Proactive Incident Management. Sean Curran Director
Incident Response Proactive Incident Management Sean Curran Director Agenda Incident Response Overview 3 Drivers for Incident Response 5 Incident Response Approach 11 Proactive Incident Response 17 2 2013
OCT Training & Technology Solutions [email protected] (718) 997-4875
OCT Training & Technology Solutions [email protected] (718) 997-4875 Understanding Information Security Information Security Information security refers to safeguarding information from misuse and theft,
Exactly the Same, but Different
Exactly the Same, but Different 1 Shayne Champion, CISSP, CISA, GSEC, ABCP Program Manager GO Cyber Security TVA v1.0 Agenda Define Mobile Device Security o o Similarities Differences Things you Should
HOW TO STAY SAFE. Smartphones
HOW TO STAY SAFE Smartphones Smartphones provide a variety of interesting activities and ways for young people to engage with their friends and families. However, it is important to be aware of what these
Know the Risks. Protect Yourself. Protect Your Business.
Protect while you connect. Know the Risks. Protect Yourself. Protect Your Business. GETCYBERSAFE TIPS FOR S MALL AND MEDIUM BUSINESSES If you re like most small or medium businesses in Canada, the Internet
WHAT EVERY CEO, CIO AND CFO NEEDS TO KNOW ABOUT CYBER SECURITY.
WHAT EVERY CEO, CIO AND CFO NEEDS TO KNOW ABOUT CYBER SECURITY. A guide for IT security from BIOS The Problem SME s, Enterprises and government agencies are under virtually constant attack today. There
Desktop and Laptop Security Policy
Desktop and Laptop Security Policy Appendix A Examples of Desktop and Laptop standards and guidelines 1. Implement anti-virus software An anti-virus program is necessary to protect your computer from malicious
Cybersecurity: Protecting Your Business. March 11, 2015
Cybersecurity: Protecting Your Business March 11, 2015 Grant Thornton. All LLP. rights All reserved. rights reserved. Agenda Introductions Presenters Cybersecurity Cybersecurity Trends Cybersecurity Attacks
Hot Topics in IT Security PREP#28 May 1, 2014. David Woska, Ph.D. OCIO Security
Hot Topics in IT Security PREP#28 May 1, 2014 David Woska, Ph.D. OCIO Security CME Disclosure Statement The North Shore LIJ Health System adheres to the ACCME s new Standards for Commercial Support. Any
Ed McMurray, CISA, CISSP, CTGA CoNetrix
Ed McMurray, CISA, CISSP, CTGA CoNetrix AGENDA Introduction Cybersecurity Recent News Regulatory Statements NIST Cybersecurity Framework FFIEC Cybersecurity Assessment Questions Information Security Stats
Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted.
Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted. Administrative Awareness Case Study: Government Offices Certification and Accreditation:
NATIONAL CYBER SECURITY AWARENESS MONTH
NATIONAL CYBER SECURITY AWARENESS MONTH Tip 1: Security is everyone s responsibility. Develop an awareness framework that challenges, educates and empowers your customers and employees to be part of the
Mobile Security & BYOD Policy
Mobile Security & BYOD Policy Sarkis Daglian Assistant Manager, Desktop Support Office of Information Technology Isaac Straley UCI Information Security Officer Office of Information Technology Speakers
