the secure communicator: protect yourself and your client, stc summit 2015

26
The Secure Communicator Protect Yourself and Your Client Ben Woelk, CISSP Program Manager Information Security Office Rochester Institute of Technology

Upload: ben-woelk-cissp

Post on 07-Aug-2015

176 views

Category:

Business


0 download

TRANSCRIPT

Page 1: The Secure Communicator: Protect Yourself and Your Client,  STC Summit 2015

The Secure CommunicatorProtect Yourself and Your Client

Ben Woelk, CISSP

Program ManagerInformation Security Office

Rochester Institute of Technology

Page 2: The Secure Communicator: Protect Yourself and Your Client,  STC Summit 2015

Ben Woelk--The Secure Communicator 2

Why Worry?

Page 3: The Secure Communicator: Protect Yourself and Your Client,  STC Summit 2015

Ben Woelk--The Secure Communicator 3

Overview

• Threat Landscape• Solutions• Cool Tools• Q&A

Page 4: The Secure Communicator: Protect Yourself and Your Client,  STC Summit 2015

Ben Woelk--The Secure Communicator 4

THREAT LANDSCAPE 2015

Page 5: The Secure Communicator: Protect Yourself and Your Client,  STC Summit 2015

Ben Woelk--The Secure Communicator 5

Wh

at’

s S

tole

n?

Page 6: The Secure Communicator: Protect Yourself and Your Client,  STC Summit 2015

Ben Woelk--The Secure Communicator 6

Value?

Page 7: The Secure Communicator: Protect Yourself and Your Client,  STC Summit 2015

Ben Woelk--The Secure Communicator 7

Social Media

Page 8: The Secure Communicator: Protect Yourself and Your Client,  STC Summit 2015

Ben Woelk--The Secure Communicator 8

Mobile

Page 9: The Secure Communicator: Protect Yourself and Your Client,  STC Summit 2015

Ben Woelk--The Secure Communicator 9

Ransomware

Page 10: The Secure Communicator: Protect Yourself and Your Client,  STC Summit 2015

Ben Woelk--The Secure Communicator 10

Page 11: The Secure Communicator: Protect Yourself and Your Client,  STC Summit 2015

Ben Woelk--The Secure Communicator 11

Solutions

Page 12: The Secure Communicator: Protect Yourself and Your Client,  STC Summit 2015

Ben Woelk--The Secure Communicator 12

Protecting Your Computer• Anti-virus• Firewalls• Patching

Page 13: The Secure Communicator: Protect Yourself and Your Client,  STC Summit 2015

Ben Woelk--The Secure Communicator 13

Protecting Your

Reputation

Page 14: The Secure Communicator: Protect Yourself and Your Client,  STC Summit 2015

Ben Woelk--The Secure Communicator 14

Protecting Your

Information

Page 15: The Secure Communicator: Protect Yourself and Your Client,  STC Summit 2015

Ben Woelk--The Secure Communicator 15

Protecting Your Identity

Page 16: The Secure Communicator: Protect Yourself and Your Client,  STC Summit 2015

Ben Woelk--The Secure Communicator 16

Passwords

Page 17: The Secure Communicator: Protect Yourself and Your Client,  STC Summit 2015

Ben Woelk--The Secure Communicator 17

Passphrase

It was a dark and stormy night

becomes

ItwasaDark215&StormyNight

Length > complexity

Page 18: The Secure Communicator: Protect Yourself and Your Client,  STC Summit 2015

Ben Woelk--The Secure Communicator 18

Cool Tools

• Password Safes• Google Dashboard• Browser Plugins

– Netcraft– McAfee Site Advisor

• Secunia PSI• Mobile Security Apps

Page 19: The Secure Communicator: Protect Yourself and Your Client,  STC Summit 2015

Ben Woelk--The Secure Communicator 19

Password Safes

Page 20: The Secure Communicator: Protect Yourself and Your Client,  STC Summit 2015

Ben Woelk--The Secure Communicator 20

Google Dashboard

Monitor use of your name

Page 21: The Secure Communicator: Protect Yourself and Your Client,  STC Summit 2015

Ben Woelk--The Secure Communicator 21

Browser Plugins

– Netcraft

Page 22: The Secure Communicator: Protect Yourself and Your Client,  STC Summit 2015

Ben Woelk--The Secure Communicator 22

– McAfee Site Advisor

Browser Plugins

Page 23: The Secure Communicator: Protect Yourself and Your Client,  STC Summit 2015

Ben Woelk--The Secure Communicator 23

SecuniaPSI

Page 24: The Secure Communicator: Protect Yourself and Your Client,  STC Summit 2015

Ben Woelk--The Secure Communicator 24

Mobile Security Apps

• Lookout Security & Antivirus (Android, iOS)

• Avast Mobile Security (Android)• Avast SecureMe (iOS)• Google Authenticator (Android, iOS)• Find My iPhone (iOS)• iVault (iOS)

Page 25: The Secure Communicator: Protect Yourself and Your Client,  STC Summit 2015

Ben Woelk--The Secure Communicator 25

Resources

• Goodreads Cyber Security Libraryhttps://www.goodreads.com/search?q=cyber+security+library

• Infosec Communicator Blogbenwoelk.com

• Shockproofing Your Use of Social Media eBook (free 6/21–6/25)http://amzn.com/B00OJMK4T2

• ISTR20 Internet Security Threat Report, April 2015, Symantechttp://www.symantec.com/security_response/publications/threatreport.jsp

Page 26: The Secure Communicator: Protect Yourself and Your Client,  STC Summit 2015

Ben Woelk--The Secure Communicator 26

Questions (and maybe some answers)

Ben Woelk

[email protected]

Benwoelk.com

@benwoelk

www.linkedin.com/in/benwoelk/