WCA WEBINAR SERIES: The Case for Cyber Security Training



Similar documents
Texas Municipal League Annual Conference October 10, 2013

Kristin Judge Executive Director Trusted Purchasing Alliance Center for Internet Security

FedVTE Training Catalog SPRING advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

Threats to Local Governments and What You Can Do to Mitigate the Risks

Access FedVTE online at: fedvte.usalearning.gov

FedVTE Training Catalog SUMMER advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

Cyber Security. Securing Your Mobile and Online Banking Transactions

Certification and Training

Security Transcends Technology

2010 AICPA Top Technology Initiatives. About the Presenter. Agenda. Presenter: Dan Schroeder, CPA/CITP Habif, Arogeti, & Wynne, LLP

Who s Doing the Hacking?

2009 Antispyware Coalition Public Workshop

RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY 229 Information Security Fundamentals

Don t Fall Victim to Cybercrime:

1. For each of the 25 questions, multiply each question response risk value (1-5) by the number of times it was chosen by the survey takers.

Legislative Council Panel on Information Technology and Broadcasting. Information Security

New York State Energy Planning Board. Cyber Security and the Energy Infrastructure

Certification for Information System Security Professional (CISSP)

Cyber Security Awareness. Internet Safety Intro.

CYBER INFORMATION SECURITY AWARENESS AND PROTECTION PRACTICES. Strengthening Your Community at the Organizational Level

U. S. Attorney Office Northern District of Texas March 2013

Security Awareness. ITS Security Training. Fall 2015

Internet threats: steps to security for your small business

Information Security and Privacy. Lynn McNulty, CISSP. Advisory Board November 2008

A New Layer of Security to Protect Critical Infrastructure from Advanced Cyber Attacks. Alex Leemon, Sr. Manager

Security and Privacy

ASK PC Certified Information Systems Security Expert - CISSE

RETHINKING CYBER SECURITY Changing the Business Conversation

Introducing... FedVTE and FedCTE

The Value of Information Security Certifications

Things To Do After You ve Been Hacked

Better protection for customers, and recurring revenue for you!

Report on CAP Cybersecurity November 5, 2015

CYBERSECURITY BEST PRACTICES FOR SMALL AND MEDIUM PENNSYLVANIA UTILITIES

Conducting an Phishing Campaign

CNA NetProtect Essential SM. 1. Do you implement virus controls and filtering on all systems? Background:

What legal aspects are needed to address specific ICT related issues?

I N T E L L I G E N C E A S S E S S M E N T

2012 NORTON CYBERCRIME REPORT

User Security Education and System Hardening

Perspectives on Cyber Security Strategies & Tactics

FedVTE Course Library

Network Security and the Small Business

Cybersecurity: A Growing Concern for All Businesses. RLI Design Professionals Design Professionals Learning Event DPLE 160 October 7, 2015

RLI PROFESSIONAL SERVICES GROUP PROFESSIONAL LEARNING EVENT PSGLE 123. Cybersecurity: A Growing Concern for Small Businesses

CONTINUING PROFESSIONAL EDUCATION (CPE) POLICIES & GUIDELINES

RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY-274 Privacy, Ethics & Computer Forensics

Research Data Security. Paul Kennedy IT Services

DON T BE A VICTIM! IS YOUR ORGANIZATION PROTECTED FROM CYBERSECURITY THREATS?

Practical Steps To Securing Process Control Networks

e-discovery Forensics Incident Response

Country Case Study on Incident Management Capabilities CERT-TCC, Tunisia

Promoting Network Security (A Service Provider Perspective)

Auditing emerging cyber threats and IT controls

How are we keeping Hackers away from our UCD networks and computer systems?

LINUX / INFORMATION SECURITY

Cyber Security & Role of CERT-In. Dr. Gulshan Rai Director General, CERT-IN Govt. of India grai@mit.gov.in

INFORMATION SECURITY FOR YOUR AGENCY

3 day Workshop on Cyber Security & Ethical Hacking

Keeping you and your computer safe in the digital world.

Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015

The Leading Provider of Endpoint Security Solutions

Get the most out of Public Sector Cyber Security Associations & Collaboration

IT Security Training. Why Security Certification? A Serious Business - Fear Drives the Demand High Demand Freedom to Make and Break Rules

Cybersecurity Awareness

Housekeeping. Twitter: #ACMWebinarSec

Common Data Breach Threats Facing Financial Institutions

2014 Entry Form (Complete one for each entry.) Fill out the entry name exactly as you want it listed in the program.

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

ONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS

Information Security solutions that protect your business

Certified Secure Computer User

+GAMES. Information Security Advisor. Be a Human Firewall! The Human Firewall' s Top Concerns in the Cyber, People & Physical Domains

How To Protect Yourself From Cyber Threats

(ISC) Career Impact Survey Executive Summary. The Double Edged Sword: Security Career Opportunities Spike While Hiring Challenges Grow

The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED

Cyber Security. An Executive Imperative for Business Owners. 77 Westport Plaza, St. Louis, MO p f

EC-Council. Certified Ethical Hacker. Program Brochure

FedVTE Course Library

Are You A Sitting Duck?

CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility

Information Security Summit 2005

Cybercrime and Identity Theft: Awareness and Protection 2015 HLC Conference

Remote Deposit Quick Start Guide

The SMB Cyber Security Survival Guide

By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015

Top 10 Baseline Cybersecurity Controls Banks Aren't Doing

Rethinking Cyber Security Threats

Cyber Security Education: My Personal Thoughts. Bharat Doshi

Cyber Security Awareness

PREPARED TESTIMONY OF THE NATIONAL CYBER SECURITY ALLIANCE MICHAEL KAISER, EXECUTIVE DIRECTOR ON THE STATE OF CYBERSECURITY AND SMALL BUSINESS

IT Security Management 100 Success Secrets

Social Media Security Training and Certifications. Stay Ahead. Get Certified. Ultimate Knowledge Institute. ultimateknowledge.com

State of the Phish 2015

Welcome. HITRUST 2014 Conference April 22, 2014 HITRUST. Health Information Trust Alliance

Certified Cyber Security Analyst VS-1160

Cybersecurity: What CFO s Need to Know

Internet Safety and Security: Strategies for Building an Internet Safety Wall

"This is a truly remarkable attack, but not. just in its scope hackers successfully. penetrated one of the most secure

Financial Implications of Cybercrime Meeting the Information Security Management Challenge in the Cyber-Age

Transcription:

WCA WEBINAR SERIES: The Case for Cyber Security Training PLEASE NOTE: IN ORDER TO HEAR THE AUDIO FOR THIS WEBCAST YOU WILL NEED TO USE YOUR TELEPHONE TO DIAL INTO THE FOLLOWING CONFERENCE LINE: Conference Line: (855) 947-8255 Passcode: 9578480# FOR QUESTIONS OR ASSISTANCE, PLEASE CONTACT THE WCA OFFICE AT (608) 663-7144.

The Case for Cyber Security Training Presenters Liz Stephens, Membership & External Affairs Director Kristin Judge, Executive Director, Trusted Purchasing Alliance for the Center for Internet Security

The Case for Cyber Security Training August 14, 2013 Wisconsin Counties Association Kristin Judge, Executive Director Trusted Purchasing Alliance Center for Internet Security WILLIAM F. PELGRIN PRESIDENT & CEO

Center for Internet Security CIS MS-ISAC Security Benchmarks Trusted Purchasing Alliance Integrated Intelligence Center

CIA, FBI and the Director of National Intelligence agree Cyber security is the top threat 3/12/13

Global Cost of Cybercrime is estimated to be $114 Billion Annually The cost of each record in a data breach is $194 County government holds data on millions of citizens

Counties Hacked

When: January 12, 2012 Where: Rutherford County, TN (pop. 262,000) What: Sheriff s Department and Election Commission Hacked by Turkish Hackers Reaction: Sheriff Robert Arnold remains concerned about the hacker's motives. "What information are they going after? What are they planting in our system? There could be the potential of them changing prison release dates," said Arnold.

When: January 22, 2012 Where: Salem County, NJ (pop. 66,058) What: Salem County $13M bank account Hacked Reaction: Wright said the hacker was able to access the county s online banking system through the Microsoft Exchange server. Exchange is an email-based collaborative communications server for businesses. They were able to jump in our account and essentially blocked us from logging on, said Wright. When they were logged in, they wired out $19,000 to an account with JP Morgan Chase out in California.

When: April 24, 2013 Where: Jefferson County, WI (pop. 262,000) What: Website defaced by hackers Reaction: Hacker s web address was from Italy. Site was compromised for 8 hours on a Thursday. All website data was deleted and needed to be recreated by staff.

When: July 12, 2013 Where: Harris County, TX (pop. 4.2M ) What: Personal information of 16,000 employees found in Vietnam Reaction: Letter sent to all affected employees. Social security numbers, dates of birth and other personal information found. State law may require ID Theft protection.

Who Is Behind The Threats? Cyber Criminals Corporate Espionage Hacktivists Nation States

Phishing scams entice email recipients into clicking on a link or attachment which is malicious. WELL WRITTEN APPEARS CREDIBLE ENTICING OR SHOCKING SUBJECT APPARENT TRUSTED SOURCE

Employee Training is Critical United States Computer Emergency Readiness Team (USCERT) Data Processed 107,655 incident reports 2011 51.2% or 55,153 of those were phishing attacks Combining the use of web filtering, antivirus signature protection, proactive malware protection, firewalls, strong security policies and employee training significantly lowers the risk of infection. FCC Small Biz Cyber Planning Guide

A new partnership WCA and the Center for Internet Security have established a new Partnership to help Wisconsin Counties get the training they need at a cost they can afford This partnership will allow counties to save up to 92% off the cost of training Training includes both user awareness training and training for information technology professionals

Four Great Partners Two types of training End User Awareness IT Professional

End User Awareness Training

SANS Securing the Human for End Users

65 Minutes of Training

Reinforcement of Training

NYSAC and Center for Internet Security Partnership Videos: Minimum purchase $2,000 to train up to 1,250 people for one year $3,500 to train up to 1,250 people for two years 92% Off List Price Support Materials (Posters/Newsletters/Screensaver Package): $2,500 with videos, $5,000 solo 50% discount

Inspired elearning

Safe Computing Best Practices Creation of Strong Passwords Avoiding Malware Protecting Mobile Data Outwitting Social Engineers and Phishers Data Security (Retention and Storage) Physical Security Following Acceptable Use Policies Reporting of Security Incidents www.inspiredelearning.com info@inspiredelearning.com

www.inspiredelearning.com info@inspiredelearning.com

Never Deploy the Same Course Any Two Years in Row Year One Train Everyone with Basic Awareness Course Train Managers S-110 Train IT S-120, S-125 Year Two All New Hires Basic Awareness Course Incumbents Refresher course Year Three Train Everyone with Basic Awareness Course Year Four All New Hires Basic Awareness Course Incumbents Refresher course Human Firewall Theme Strongest Link Theme

Chunk Learning spread out over a period of time Quarter One Hackers Target You Outwitting Phishers Privacy and Legal Issues Quarter Two Acceptable Use What is Info Security Data Snoopers & Eavesdroppers Quarter Three Password Mgmt Malware, Viruses, Worms Mobile Data & Devices Quarter Four Protect Home PC Physical Security Social Engineering Select your modules Select your time frame

Inspired elearning Pricing Pick One Class $1,369 minimum purchase to train up to 249 staff members for one year $2,399 minimum purchase to train up to 249 staff members for two years Pick Three Classes $2,191 minimum purchase to train up to 249 staff members for one year $3,838 minimum purchase to train up to 249 staff members for two years

IT Professional Training

SANS OnDemand Courses & GIAC Certification Exams OnDemand technical training (June/July) Order Online: www.sans.org/cis/ondemand Pricing SANS OnDemand Courses = $1,350 (24+ CPE/CMU per class) GIAC = $579 Minimum order size per transaction: $4,000 Delivery Format All courses and exams credits hosted in SANS online SANS Voucher Credit program (sort of an online checking account) Customer has 1-Year to allocate credits (assign courses and exams) Once allocated, student will have four months to complete the training and exam All training is done online at the student s own pace

Carnegie Mellon Software Engineering Institute CERT STEPfwd SEI CERT STEPfwd (Security Training Evaluation Platform) classes designed for DHS 253 hours of training: On-Demand Lectures, Hands-on Labs, Quizzes, Private Learning Communities, Progress Reporting 26 classes and growing: Classes range from 1hr to 59hrs One account allows access to all classes for one year $1,500/account or $1,250/account when purchasing 5+ Demo accounts available Good through 2014 Purchase directly from CIS

(ISC)² (ISC) 2 s Certification Process Pass a rigorous exam to assess their knowledge, skills, and abilities relevant to the common body of knowledge (CBK) Endorsement by another member of (ISC)² Subscribe to the (ISC)² Code of Ethics Earn a minimum number of Continuing Professional Education (CPEs) every year and renew every three years to maintain the certification Hands on experience in several of the domains

(ISC)² Qualifying employees get 25% Off any of the following official (ISC)² CBK Training Seminars: CISSP (ISSAP, ISSEP, ISSMP) - Certified Information Systems Security Professional CSSLP - Certified Secure Software Lifecycle Professional SSCP - Systems Security Certified Practitioner CAP - Certified Authorization Professional

Next Steps 1. Have a conversation with IT staff, administration and elected officials 2. Identify needs 3. Request demo accounts to see the different options 4. Work with CIS to purchase the training to meet your county s needs

Center for Internet Security We are Here To Help!! info@cisalliance.org 518-266-3460 alliance.cisecurity.org Cyber Security is our Shared Responsibility