Information Security Awareness Training



Similar documents
Anti-Phishing Training Modules Teach employees to recognize and avoid phishing and spear phishing attacks

Developing a Successful Security Awareness Training Program. Shea Garber, Sr. Account Executive Wombat Security Technologies, Inc.

5 Reasons Why Your Security Education Program isn t Working (and how to fix it)

How to Spot and Combat a Phishing Attack Webinar

SIMULATED ATTACKS. Evaluate Susceptibility Using PhishGuru, SmishGuru, and USBGuru MEASURE ASSESS

SANS Securing The Human

Common Cyber Threats. Common cyber threats include:

5 Reasons Why Your Security Education Program isn t Working (and how to fix it)

Is security awareness a waste of time?

Bad Ads Trend Alert: Shining a Light on Tech Support Advertising Scams. May TrustInAds.org. Keeping people safe from bad online ads

Training Employees to Recognise & Avoid Advanced Threats

Protecting your business from fraud

Cyber Security. Securing Your Mobile and Online Banking Transactions

National Cybersecurity Awareness Campaign Families Presentation

Addressing Big Data Security Challenges: The Right Tools for Smart Protection

Deception scams drive increase in financial fraud

FROM INBOX TO ACTION AND THREAT INTELLIGENCE:

DEPARTMENT OF DEFENSE 6000 DEFENSE PENTAGON WASHINGTON, D.C

SPEAR PHISHING AN ENTRY POINT FOR APTS

User Documentation Web Traffic Security. University of Stavanger

Phishing Scams Security Update Best Practices for General User

2012 NORTON CYBERCRIME REPORT

Online Cash Manager Security Guide

F-Secure Anti-Virus for Mac. User's Guide

F-Secure Anti-Virus for Mac 2015

The State of K-12 Cyberethics, Cybersafety and Cybersecurity Curriculum in the United States

Things To Do After You ve Been Hacked

SBA Cybersecurity for Small Businesses. 1.1 Introduction. 1.2 Course Objectives. 1.3 Course Topics

The following information was provided by SANS and discusses IT Security Awareness. It was last updated in 2015.

OCT Training & Technology Solutions Training@qc.cuny.edu (718)

1. For each of the 25 questions, multiply each question response risk value (1-5) by the number of times it was chosen by the survey takers.

FRAUD ALERT THESE SCAMS CAN COST YOU MONEY

Hot Topics in IT Security PREP#28 May 1, David Woska, Ph.D. OCIO Security

Deploying Continuous and Measurable Security Education for Employees. Security awareness and training methodology and best practices

HIPAA Information Security Training (v1.0 10/15/12)

THREE KEYS TO COST-EFFECTIVE SECURITY FOR YOUR SMALL BUSINESS

SPEAR PHISHING UNDERSTANDING THE THREAT

Information Security. Annual Education Information Security Mission Health System, Inc.

Connect Smart for Business SME TOOLKIT

WHY DOES MY SPEED MONITORING GRAPH SHOW -1 IN THE TOOLTIP? 2 HOW CAN I CHANGE MY PREFERENCES FOR UPTIME AND SPEED MONITORING 2

Phishing Attacks Methodology and Response GridSecCon 2012

Cyber Security. Maintaining Your Identity on the Net

Importance: From: Anthem, Inc. Communications Sent: Thursday, February 26, :40 PM Subject: Important message from Anthem, Inc.

NATIONAL CYBER SECURITY AWARENESS MONTH

With the Target breach on everyone s mind, you may find these Customer Service Q & A s helpful.

CYBERSECURITY BEST PRACTICES FOR SMALL AND MEDIUM PENNSYLVANIA UTILITIES

The SMB Cyber Security Survival Guide

How to Deploy the Survey Below are some ideas and elements to consider when deploying this survey.

SMALL BUSINESS IT SECURITY PRACTICAL GUIDE

I ve been breached! Now what?

PREP Course #25: Hot Topics in Cyber Security and Database Security. Presented by: Joe Baskin Manager, Information Security, OCIO

Deploying Continuous and Measurable Security Education for Employees. Security awareness and training methodology and best practices

Defensive Training for Social Engineering

Dissecting the Recent Cyber Security Breaches. Yu Cai School of Technology Michigan Technological University

McAfee Phishing Quiz. Partner Enablement Guide

+GAMES. Information Security Advisor. Be a Human Firewall! The Human Firewall' s Top Concerns in the Cyber, People & Physical Domains

SK International Journal of Multidisciplinary Research Hub

Scams and Schemes. objectives. Essential Question: What is identity theft, and how can you protect yourself from it? Learning Overview and Objectives

RC284. Protect Yourself Against Identity Theft

Next-Generation Penetration Testing. Benjamin Mossé, MD, Mossé Security

3 Marketing Security Risks. How to combat the threats to the security of your Marketing Database

Advanced Biometric Technology

Information Security Field Guide to Identifying Phishing and Scams

Monitoring mobile communication network, how does it work? How to prevent such thing about that?

INTERNET & COMPUTER SECURITY March 20, Scoville Library. ccayne@biblio.org

How to Justify Your Security Assessment Budget

ENABLING FAST RESPONSES THREAT MONITORING

Phishing Past, Present and Future

Retail/Consumer Client. Internet Banking Awareness and Education Program

WHITE PAPER. The Cost of Phishing: Understanding the True Cost Dynamics Behind Phishing Attacks

CYBER SECURITY. II. SCANDALOUS HACKINGS To show the seriousness of hacking we have included some very scandalous hacking incidences.

The Cost of Phishing. Understanding the True Cost Dynamics Behind Phishing Attacks A CYVEILLANCE WHITE PAPER MAY 2015

Recurrent Patterns Detection Technology. White Paper

Fighting Off an Advanced Persistent Threat & Defending Infrastructure and Data. Dave Shackleford February, 2012

Tax-Related Identity Theft: IRS Efforts to Assist Victims and Combat IDT Fraud

Identity Theft Prevention Presented by: Matt Malone Assero Security

Transcription:

Information Security Awareness Training Various Methods and their effectiveness at New Paltz SUNY Technology Conference Lake Placid - June 2014 Paul Chauvet

Why the focus on training? Only amateurs attack machines; professionals target people - Bruce Schneier There is only one way to keep your product plans safe and that is by having a trained, aware, and conscientious workforce. This involves training on the policies and procedures, but also - and probably even more important - an ongoing awareness program - Kevin Mitnick

Why the focus on training? Targeting individuals instead of systems, can bypass some or all of your protection measures. Dollar for dollar, will have a huge benefit for security.

Who needs security training? Ideally, everyone - students, faculty, staff, and contractors. Realistically? Review laws, contracts, etc. for who is required to receive training (specifically PCI, GLBA, HIPAA)

What are the goals of the training? Getting users to understand and recognize the risks. Training users to change their instinctual responses. Making users recognize that they are at risk. Educate users as to impact to the college of a successful scam.

What topics should be covered? Password safety Malware Social Engineering Physical Security Security Policy Electronic & Physical security

Psychological Issues Fast and Slow Thinking Fast, quick judgements, relies on heuristics Slow, thoughtful, lazy Availability Heuristic Representativeness Availability Evaluation of risk Users exaggerate risks that are rare, sudden, are out of their control, or affect them personally. Users downplay risks that are common, affect others, or that are under their control.

Compliance motivation One method is via Expectancy Theory Expectancy Instrumentality Valence Make sure employees know the consequences to the college of security lapses.

Training methods Email communications Can be newsletters or specific advisories. Can easily be overwhelming when too frequent. Will be ignored by a large amount of people. If they are too long or contain too much technical jargon, they will be ignored by a larger amount of people. Posters and flyers Should be catchy while still being informative Should change frequently

Flyers

Flyers

Newsletter Periodic communication about security issues. Meant to communicate specific issues or to keep security issues on people s minds.

In-person training Initially conducted by an external security consulting firm. Transitioned to internal training the following year. Conducted annually - employees with sensitive data access such as Banner are required to attend. All other employees are strongly encouraged to attend.

Don t just rely on IT Take advantage of Security Evangelists outside of IT. Use their power and status to extend the reach of security messaging. Get administration support & buy-in.

Online Training Conducted via an external firm (Wombat Security). Training is interactive. Users cannot just click next, next, next. Users are scored on training. Topics include Email Security, URL Training, and Safer Web Browsing.

Online Training Required & Recommended groups. Compliance Rates ~ 60% Passing score required to be compliant.

Online Training Per-user reports Can be used to review users who have fallen for (or are suspected of falling for) phishing scams. Users who fall for phishing scams (and malware) are much more likely to have not taken the training. Not taking the training changes our response postmalware/phishing Most missed report Shows questions users have problems with. Helps adjust messaging to emphasize certain issues for all users (not just those included in the training).

Phishing Simulations We phish our own users. Done through an external service. Can use actual scam emails (with modified links to a site we control). Can also use custom emails/spear phishing. Victims who submit data are brought to a training page. When users fall for it, it breaks them out of the immunity fallacy. Works through altering the Availability Heuristic. Some users will be confused.

Phishing Simulations

Phishing Simulations

Phishing Simulations

Phishing responses Try to be patient with the users. Security is not their job. Don t allow the training to be ignored completely though. When someone ignores the training and is a repeat offender, their supervisor is notified.

Training results Significant drop in number of phishing victims Average phishing victims per month was 4-5. Number of victims year-to-date (2014) is now 4. Large increase in users reporting suspicious emails. Significant decrease in submit rate for our phishing simulations. Generally positive reactions from faculty and staff. Some negative/apathetic reactions. Compliance rate is higher among non-teaching faculty & staff.

Remaining challenges Keeping users vigilant and avoiding complacency Training needs to stay relevant and fresh Reducing training costs Reducing per-user costs to include more users Creating in-house (or in-suny?) training Including students in active training methods Including students in training Secure programming/coding training Effectiveness of more sophisticated methods still is an issue (spear phishing, other social engineering methods)

Resources Psychology & Information Security course at Albany (Dr. Kevin Williams) Bruce Schneier - Psychology of Security protect.iu.edu (Indiana University) Stop, Think, Connect (stopthinkconnect.org) Internet 2 Cyber Security Awareness Resource Library (https://wiki.internet2. edu/confluence/display/itsg2/cybersecurity+awareness+re source+library)

Questions? Comments?

Evaluation site: http://www.cvent.com/d/p4qxwg?dvce=2