Think IT Association. Mission: To foster professional growth and development through the power of networking and collaboration.

Size: px
Start display at page:

Download "Think IT Association. Mission: To foster professional growth and development through the power of networking and collaboration."

Transcription

1

2 Think IT Association Mission: To foster professional growth and development through the power of networking and collaboration. Think IT is a service of Think IT Association was founded in Each group meets regularly in an informal, roundtable format with a different member from the group facilitating each session. The IT Leadership group is designed for all levels of leaders within the IT space including: IT Managers, IT Directors, and VPs of IT within the Twin Cities. Additional Think IT Program: Link to Leadership Registration for our Spring session has officially opened! 6 month leadership development course that is designed and led by IT executives from across the metro Benefits Genesys Works-Twin Cities alumni through the Think IT Young Professionals Scholarship fund While there is no cost to be a member of Think IT, it is not FREE and we do ask that members invest their time and experience and be open to facilitating 2 York Solutions

3 B2E Update A big thank you to the following companies who have hired our B2E students! We will be graduating our 8 th Barriers to Entry cohort next Thursday! All students from this cohort have already been placed at clients As of 2018 we have a 90% program graduate placement rate For more information, contact: Tom at tparker@yorksolutions.net 3 York Solutions

4 A Proud Partner of To date we have raised a total of $542,495 for Genesys Works, through the Think IT Golf Invitational and our Link to Leadership program! Thank you to our 2018 Sponsors! 4 York Solutions

5 Upcoming Meetings Friday, October 19 th Quarterly Event Topic: Innovation and Digital Transformation Location: McDonald s Headquarters; 1045 W Randolph St, Chicago, IL Facilitator: Tasker Genres, CIO/CTO at ServiceNow Save the Date! Wednesday, November 7th Leadership Group Meeting Topic: People, Culture and Change Management Downtown Location: TransUnion; 555 W Adams St, Chicago, IL Suburb Location: Elkay Manufacturing; 2222 Camden Court, Oak Brook, IL Facilitator: George Wang, CIO/COO at Arx Nimbus 5 York Solutions

6 You re Invited! What: 1st Annual Business of IT Awards Presented by York Solutions When: Thursday, November 15 th 4:00pm-6:00pm Where: Peapod

7

8 Phishing 3.0 Brian Greenberg 8 York Solutions

9 October 2018 Facebook LinkedIn Twitter Blog Medium Forbes Phishing 3.0 A new type of multi-billion dollar attack on businesses that has everyone talking, and what you can do about it.

10 What is Phishing? Phishing relies on trickery to compromise a system. They are legitimate looking s that trick you to reveal user names, passwords, or credit card details. go to a web site that looks legitimate but is harmful. open an attachment that installs a virus. October 2018

11 What s at risk from Phishing attacks? Billions of dollars are at risk. 20% of C-level executives have sent sensitive data as a result of a phishing attack. Half of all organizations say their management and finance teams can t identify and stop an impersonation attempt. October 2018

12 Most common phishing subject lines. 1. Password Check Required Immediately 15% 2. Security Alert 12% 3. Change of Password Required Immediately 11% 4. A Delivery Attempt was made 10% 5. Urgent press release to all employees 10% 6. De-activation of [[ ]] in Process 10% 7. Revised Vacation & Sick Time Policy 9% 8. UPS Label Delivery, 1ZBE312TNY % 9. Staff Review % 10. Company Policies-Updates to our Fraternization Policy 7% October 2018

13 Phishing 3.0 It s time to stop laughing at Nigerian scammers, because they re stealing billions of dollars Washington Post 2017 losses doubled to $675 million Q1 of ,000 victims, $685 million in losses American businesses have lost $3.7 billion October 2018

14 Versions of Phishing v.1 Forward Payment Scams (so-called Nigerian scams) v.2 Type #1: Typo-squatting e.g. espn.cm, aol.cm, itunes.cm, qooqle.com, gooogle.com Typosquatting sites visited > 12M times in Q Type #2: Same script spoofing e.g. rn m, 0 O, l 1 v.3 Mixed script spoofing or Homographs (Internationalized Domain Names) Latin small letter o (U+006F) can be confused with Cyrillic small letter o (U+043E) October 2018

15 What is Phishing 3.0? Phishing 3.0 is different because it s very hard to spot. They are legitimate looking domain names using foreign alphabets to fool you. apple.com apple.com This example uses a Cyrillic а rather than English a Decoded, apple.com is really This is how hackers can get into your systems. October 2018

16 Phishing. 3.0 notes Not all browsers can catch this attack. Also called Punycode: A Bootstring encoding of Unicode for Internationalized Domain Names in Applications (IDNA) Not just browsers are susceptible; any app that reads URLs: e.g. clients, headless browsers, etc. You could look for Punycode entries in queries & DNS logs but there are 100 million IDNs registered You could convert Punycode to Unicode Single script detection: still thousands of Unicode confusables character combinations Detection is not going to happen in real-time: ~50ms At best, detection is after the fact October 2018

17 Reduce the risk from Phishing 3.0 Cut the Phishing lines! Mitigate the risk to your organization by getting the right technology to prevent and recover from attacks. right people trained and up to date on the latest threats. right partners to put together a plan for your organization. October 2018

18 Thank you! Facebook LinkedIn Twitter Blog Medium Forbes

19 Thank You. Brian Greenberg Genesys Works & Elkay Manufacturing 19 York Solutions

FAQ. Usually appear to be sent from official address

FAQ. Usually appear to be sent from official  address FAQ 1. What is Phishing Email? A form of fraud by which an attacker masquerades as a reputable entity in order to obtain your personal information. Usually appear to be sent from official email address

More information

Evolution of Spear Phishing. White Paper

Evolution of Spear Phishing. White Paper Evolution of Spear Phishing White Paper Executive Summary Phishing is a well-known security threat, but few people understand the difference between phishing and spear phishing. Spear phishing is the latest

More information

EBOOK. Stopping Fraud. How Proofpoint Helps Protect Your Organization from Impostors, Phishers and Other Non-Malware Threats.

EBOOK. Stopping  Fraud. How Proofpoint Helps Protect Your Organization from Impostors, Phishers and Other Non-Malware Threats. EBOOK Stopping Email Fraud How Proofpoint Helps Protect Your Organization from Impostors, Phishers and Other Non-Malware Threats www.proofpoint.com EBOOK Stopping Email Fraud 2 Today s email attacks have

More information

Phishing Defense against IDN Address Spoofing Attacks.

Phishing Defense against IDN Address Spoofing Attacks. Phishing Defense against IDN Address Spoofing Attacks Viktor Krammer 1,2 1 E-Commerce Competence Center 2 Vienna University of Technology http://www.quero.at/ Qui quaerit, invenit. Biblia Vulgata, Lc 11,

More information

Cybersecurity Guidance for Small Firms Thursday, November 8 9:00 a.m. 10:00 a.m.

Cybersecurity Guidance for Small Firms Thursday, November 8 9:00 a.m. 10:00 a.m. Cybersecurity Guidance for Small Firms Thursday, November 8 9:00 a.m. 10:00 a.m. It is crucial that small financial firms take proper cybersecurity measures to protect their customers and their firm. During

More information

The 2011 IDN Homograph Attack Mitigation Survey

The 2011 IDN Homograph Attack Mitigation Survey Edith Cowan University Research Online ECU Publications 2012 2012 The 2011 IDN Homograph Attack Survey Peter Hannay Edith Cowan University Gregory Baatard Edith Cowan University This article was originally

More information

Internationalized Domain Names

Internationalized Domain Names Internationalized Domain Names Introduction & Update MENOG 1 Bahrain April 3-5, 2007 By: Baher Esmat Middle East Liaison IP and DNS Internet 207.248.168.180 ISP icann.org 192.0.34.163 ISP Backbone ISP

More information

Manually Create Phishing Page For Facebook 2014

Manually Create Phishing Page For Facebook 2014 Manually Create Phishing Page For Facebook 2014 While you are creating phishing page manually you have to do a lot of work Web Templates -- For importing premade template for Gmail, Facebook from SET.

More information

Your security on click Jobs

Your security on click Jobs Your security on click Jobs At Click Jobs is a trading name of Raspberry Recruitment Limited, we're committed to helping you find the right job in a safe and secure environment. On these pages, you can

More information

Best Practices Guide to Electronic Banking

Best Practices Guide to Electronic Banking Best Practices Guide to Electronic Banking City Bank & Trust Company offers a variety of services to our customers. As these services have evolved over time, a much higher percentage of customers have

More information

REPORT. proofpoint.com

REPORT. proofpoint.com REPORT proofpoint.com Email fraud, also known as business email compromise (BEC), is one of today s greatest cyber threats. These socially engineered attacks seek to exploit people rather than technology.

More information

Fraud and Social Engineering in Community Banks

Fraud and Social Engineering in Community Banks Fraud and Social Engineering in Community Banks Information Security Trends and Strategies October 2, 2010 1 Our perspective LarsonAllen Started in 1953 with a goal of total client service Today, industry

More information

Custom Plugin A Solution to Phishing and Pharming Attacks

Custom Plugin A Solution to Phishing and Pharming Attacks Custom Plugin A Solution to Phishing and Pharming Attacks Omer Mahmood School of Information Technology Charles Darwin University Darwin, NT, Australia Abstract - This paper proposes a new method to detect,

More information

The Cost of Phishing. Understanding the True Cost Dynamics Behind Phishing Attacks A CYVEILLANCE WHITE PAPER MAY 2015

The Cost of Phishing. Understanding the True Cost Dynamics Behind Phishing Attacks A CYVEILLANCE WHITE PAPER MAY 2015 The Cost of Phishing Understanding the True Cost Dynamics Behind Phishing Attacks A CYVEILLANCE WHITE PAPER MAY 2015 Executive Summary.... 3 The Costs... 4 How To Estimate the Cost of an Attack.... 5 Table

More information

OA Cyber Security Plan FY 2018 (Abridged)

OA Cyber Security Plan FY 2018 (Abridged) OA Cyber Security Plan FY 2018 (Abridged) 1 Table of Contents Vision... 3 Goals, Strategies, and Tactics... 5 Goal #1: Create a Culture that Fosters the Adoption of Cyber Security Best Practices... 5 1.1

More information

PROTECTING YOUR BUSINESS ASSETS

PROTECTING YOUR BUSINESS ASSETS PROTECTING YOUR BUSINESS ASSETS How to Spot Danger Before Your Computer Gets Infected, Your Site Hosts Malware, and Your Credit Card Number Gets Stolen A MyNAMS Presentation by Regina Smola @2012 Regina

More information

Position Description. Engagement Manager UNCLASSIFIED. Outreach & Engagement Information Assurance and Cyber Security Directorate.

Position Description. Engagement Manager UNCLASSIFIED. Outreach & Engagement Information Assurance and Cyber Security Directorate. Position Description Engagement Manager Business unit: Position purpose: Direct reports: Directorate overview: Business Unit Overview Remuneration indicator: Outreach & Engagement Information Assurance

More information

Quick recap on ing Security Recap on where to find things on Belvidere website & a look at the Belvidere Facebook page

Quick recap on  ing  Security Recap on where to find things on Belvidere website & a look at the Belvidere Facebook page Workshop #7 Email Security Previous workshops 1. Introduction 2. Smart phones & Tablets 3. All about WatsApp 4. More on WatsApp 5. Surfing the Internet 6. Emailing Quick recap on Emailing Email Security

More information

It Takes the Village to Secure the Village SM

It Takes the Village to Secure the Village SM It Takes the Village to Secure the Village SM Stan Stahl, Ph.D. President Information Systems Security Association Los Angeles Chapter September 30, 2013 2 Online Bank Fraud is Major Challenge. Victim

More information

falanx Cyber Falanx Phishing: Measure your resilience

falanx Cyber Falanx  Phishing: Measure your resilience falanx Cyber Falanx Email Phishing: Measure your resilience Contents What is Email Phishing? 3 Why should I carry out an Email Phishing exercise? 4 PhishEd Managed regular phishing 5 Single assessments

More information

THREAT MODELING IN SOCIAL NETWORKS. Molulaqhooa Maoyi Rotondwa Ratshidaho Sanele Macanda

THREAT MODELING IN SOCIAL NETWORKS. Molulaqhooa Maoyi Rotondwa Ratshidaho Sanele Macanda THREAT MODELING IN SOCIAL NETWORKS Molulaqhooa Maoyi Rotondwa Ratshidaho Sanele Macanda INTRODUCTION Social Networks popular web service. 62% adults worldwide use social media 65% of world top companies

More information

KnowBe4 is the world s largest integrated platform for awareness training combined with simulated phishing attacks.

KnowBe4 is the world s largest integrated platform for awareness training combined with simulated phishing attacks. KnowBe4 is the world s largest integrated platform for awareness training combined with simulated phishing attacks. About Us The world s most popular integrated Security Awareness Training and Simulated

More information

Phishing Attacks. Mendel Rosenblum. CS142 Lecture Notes - Phishing Attack

Phishing Attacks. Mendel Rosenblum. CS142 Lecture Notes - Phishing Attack Phishing Attacks Mendel Rosenblum Phishing Basic idea: Get unsuspecting users to visit an evil Web site Convince them that the evil Web site is actually a legitimate site (such as a bank or PayPal) Trick

More information

BUSINESS LECTURE TWO. Dr Henry Pearson. Cyber Security and Privacy - Threats and Opportunities.

BUSINESS LECTURE TWO. Dr Henry Pearson. Cyber Security and Privacy - Threats and Opportunities. BUSINESS LECTURE TWO Dr Henry Pearson Cyber Security and Privacy - Threats and Opportunities. Introduction Henry started his talk by confessing that he was definitely not a marketer, as he had been occupied

More information

Connecting Students, Faculty, and Staff with a New

Connecting Students, Faculty, and Staff with a New Spring 2014 In this issue: Learning Management System Bomgar Remote Support IT Strategic Plan Feedback Computational Research Student Employees Add Your Email Profile Picture SkyDrive is Now OneDrive Email

More information

AU Alumni Mentor Program. Registration Process for Alumni Volunteers

AU Alumni Mentor Program. Registration Process for Alumni Volunteers AU Alumni Mentor Program Registration Process for Alumni Volunteers Creating Your Account 1. Go to www.auconnect.org 2. Click Join Now Select the best option for you Join using your LinkedIn Account Join

More information

Trustwave SEG Cloud BEC Fraud Detection Basics

Trustwave SEG Cloud BEC Fraud Detection Basics .trust Trustwave SEG Cloud BEC Fraud Detection Basics Table of Contents About This Document 1 1 Background 2 2 Configuring Trustwave SEG Cloud for BEC Fraud Detection 5 2.1 Enable the Block Business Email

More information

THE TRUSTED NETWORK POWERING GLOBAL SUPPLY CHAINS AND THEIR COMMUNITIES APPROVED EDUCATION PROVIDER INFORMATION PACK

THE TRUSTED NETWORK POWERING GLOBAL SUPPLY CHAINS AND THEIR COMMUNITIES APPROVED EDUCATION PROVIDER INFORMATION PACK GAIN RECOGNITION AS AN APPROVED PROVIDER UNDER ISO/IEC 17024 AND JOIN OUR NETWORK OF TRUSTED PROVIDERS THE TRUSTED NETWORK POWERING GLOBAL SUPPLY CHAINS AND THEIR COMMUNITIES APPROVED EDUCATION PROVIDER

More information

Social Engineering: We are the target Sponsor Guide

Social Engineering: We are the target Sponsor Guide Lead Sponsor Social Engineering: We are the target Sponsor Guide ISfL Annual Cyber Security Conference Wednesday 8th November 2017 ųƚÿƌåú ƵĜƋĘ ŅĵŅųųŅƵ This ISfL Conference has been made possible by the

More information

Topics Include: #ITROADMAP. August Oak Brook, IL The Hyatt Lodge at McDonald s Campus

Topics Include: #ITROADMAP. August Oak Brook, IL The Hyatt Lodge at McDonald s Campus IT PLANNING FORUM 2013 August 15-16 Oak Brook, IL The Hyatt Lodge at McDonald s Campus Building Your IT Roadmap for Success! Topics Include: Data Collection & Measurement Processes for DR Planning Architecting

More information

Webomania Solutions Pvt. Ltd. 2017

Webomania Solutions Pvt. Ltd. 2017 The other name for link manipulation is Phishing or you can say link manipulation is type of phishing attack done generally to mislead the user to a replica website or a looka-like of some well-known site.

More information

Mission: Continuity BUILDING RESILIENCE AGAINST UNPLANNED SERVICE INTERRUPTIONS

Mission: Continuity BUILDING RESILIENCE AGAINST UNPLANNED SERVICE INTERRUPTIONS Mission: Continuity BUILDING RESILIENCE AGAINST UNPLANNED SERVICE INTERRUPTIONS Stephanie Poe, DNP, RN-BC CNIO, The Johns Hopkins Hospital and Health System Discussion Topics The Age of Acceleration Cyber

More information

Phishing. What do phishing s do?

Phishing. What do phishing  s do? Phishing We have become all too familiar with phishing emails but if that s the case, why do we as a community still fall victim? In this newsletter our goal is to provide you with some basic information

More information

Moving Your Business Forward

Moving Your Business Forward Moving Your Business Forward D.C. METRO AREA JUNE 3 The Ritz-Carlton Tysons Corner NEW YORK CITY SEPTEMBER 18 Millennium Broadway Hotel BOSTON OCTOBER 9 Boston Marriott Cambridge OFFICIAL MEDIA PARTNER

More information

South Central Power Stop Scams

South Central Power Stop Scams Don t get tricked. People around the country have been receiving emails and phone calls from scammers. South Central Power wants to help you keep your money and prevent scams. Review the helpful tips below.

More information

Office 365 External Sharing Webinar November 7, 2017

Office 365 External Sharing Webinar November 7, 2017 Office 365 External Sharing Webinar November 7, 2017 Introductions Peter Carson President, Extranet User Manager and Envision IT SharePoint MVP Partner Seller, Microsoft Canada peter.carson@extranetusermanager.com

More information

ICGI Recommendations for Federal Public Websites

ICGI Recommendations for Federal Public Websites Get Email Updates Change Text Size A - Z Index Contact Us About Us Site Policies Suggest Content WEB CONTENT SOCIAL MEDIA MOBILE CHALLENGES & CONTESTS CONTACT CENTERS CUSTOMER Training EXPERIENCE Communities

More information

Measuring Cyber Risk Understanding the Right Data Sources. Sponsored By:

Measuring Cyber Risk Understanding the Right Data Sources. Sponsored By: Measuring Cyber Risk Understanding the Right Data Sources Sponsored By: Measuring Cyber Risk Understanding the Right Data Sources Visit www.advisenltd.com at the end of this webinar to download: Copy of

More information

What can we lose not implementing proper security in our IT environment? Aleksandar Pavlovic Security Account Manager Cisco

What can we lose not implementing proper security in our IT environment? Aleksandar Pavlovic Security Account Manager Cisco What can we lose not implementing proper security in our IT environment? Aleksandar Pavlovic Security Account Manager Cisco Increasing Digital Traffic Creates a Greater Attack Surface Global IP Traffic

More information

How to Build a Culture of Security

How to Build a Culture of Security How to Build a Culture of Security March 2016 Table of Contents You are the target... 3 Social Engineering & Phishing and Spear-Phishing... 4 Browsing the Internet & Social Networking... 5 Bringing Your

More information

DMARC ADOPTION AMONG

DMARC ADOPTION AMONG DMARC ADOPTION AMONG US and UK Nonprofit Organizations Q2 2018 Featuring Matthew Vernhout (CIPP/C) Director of Privacy, 250ok TABLE OF CONTENTS Introduction... 03 Research Overview... 04 US and UK Nonprofit

More information

The State of Hacked Accounts

The State of Hacked Accounts October 2011 Overview The use of compromised (e.g. stolen credentials or hacked) accounts to send spam and scams has increased throughout 2011 to become a growing percentage of the unwanted email that

More information

Internationalized Domain Names. 21 June 2009 Tina Dam Sr. Director, IDNs

Internationalized Domain Names. 21 June 2009 Tina Dam Sr. Director, IDNs Internationalized Domain Names 21 June 2009 Tina Dam Sr. Director, IDNs Agenda Where are we and where are we headed IDN TLD Processes IDN Definitions How does IDNs work including examples of applications

More information

REQUEST FOR PROPOSALS: ARTIST TRUST WEBSITE REDESIGN

REQUEST FOR PROPOSALS: ARTIST TRUST WEBSITE REDESIGN REQUEST FOR PROPOSALS: ARTIST TRUST WEBSITE REDESIGN March 30, 2018 PROJECT OVERVIEW Artist Trust is looking for a website developer to redesign and build our new website. The ideal developer will work

More information

Why Should I become a Member?

Why Should I become a Member? KC PMI Mid-America Chapter Welcome to the Kansas City PMI Mid-America Chapter Information Session Why Should I become a Member? KC PMI Mid-America Chapter Event Agenda 2:00 pm - 2:15 pm Ice Breaker/Networking

More information

Internationalized Domain Names an introduction

Internationalized Domain Names an introduction Internationalized Domain Names an introduction Tina Dam Director, IDN Program 1 March 2009 Agenda Where are we and where are we headed IDN TLD Processes IDN Definitions How does IDNs work including examples

More information

CLICK TO EDIT MASTER TITLE STYLE Fraud Overview and Mitigation Strategies

CLICK TO EDIT MASTER TITLE STYLE Fraud Overview and Mitigation Strategies Fraud Overview and Mitigation Strategies SUNTRUST TEAM: DOUG HICKMAN SENIOR VICE PRESIDENT FOUNDATIONS AND ENDOWMENTS SPECIALTY PRACTICE JAMES BERNAL ASSISTANT VICE PRESIDENT FOUNDATIONS AND ENDOWMENTS

More information

SPOOFING. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006

SPOOFING. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006 SPOOFING Information Security in Systems & Networks Public Development Program Sanjay Goel University at Albany, SUNY Fall 2006 1 Learning Objectives Students should be able to: Determine relevance of

More information

City of San José 2017 Coyote Creek Flood After-Action Review & Improvement Recommendations Report

City of San José 2017 Coyote Creek Flood After-Action Review & Improvement Recommendations Report City of San José 2017 Coyote Creek Flood After-Action Review & Improvement Recommendations Report SAN JOSÉ CITY COUNCIL MEETING, 08-AUG 2017 BRAD GAIR, SENIOR MANAGING DIRECTOR, WITT O BRIEN S About Witt

More information

IRONSCALES Federation Combines Human Intelligence with Machine Learning to Discover & Stop Spear-Phishing Attacks

IRONSCALES Federation Combines Human Intelligence with Machine Learning to Discover & Stop Spear-Phishing Attacks IRONSCALES Federation Combines Human Intelligence with Machine Learning to Discover & Stop Spear-Phishing Attacks Phishing attacks have evolved in sophistication and frequency since they first originated

More information

3.5 SECURITY. How can you reduce the risk of getting a virus?

3.5 SECURITY. How can you reduce the risk of getting a virus? 3.5 SECURITY 3.5.4 MALWARE WHAT IS MALWARE? Malware, short for malicious software, is any software used to disrupt the computer s operation, gather sensitive information without your knowledge, or gain

More information

Maintaining Trust: Visa Inc. Payment Security Strategy

Maintaining Trust: Visa Inc. Payment Security Strategy Maintaining Trust: Visa Inc Payment Security Strategy Ellen Richey 2010 Payments Conference Chicago Federal Reserve Global Electronic Payments Protecting the payment system is a shared responsibility among

More information

Newcomer Finances Toolkit. Fraud. Worksheets

Newcomer Finances Toolkit. Fraud. Worksheets Newcomer Finances Toolkit Fraud Worksheets Ottawa Community Loan Fund Fonds d emprunt Communautaire d Ottawa 22 O Meara St., Causeway Work Centre, Ottawa, ON K1Y 4N6 Tel: 613-594-3535 Fax: 613-594-8118

More information

Panda Security 2010 Page 1

Panda Security 2010 Page 1 Panda Security 2010 Page 1 Executive Summary The malware economy is flourishing and affecting both consumers and businesses of all sizes. The reality is that cybercrime is growing exponentially in frequency

More information

CHARTERED INSTITUTE OF MARKETING. Strathmore Institute of Management & Technology

CHARTERED INSTITUTE OF MARKETING. Strathmore Institute of Management & Technology CHARTERED INSTITUTE OF MARKETING Strathmore Institute of Management & Technology CIM PROGRAM AT STRATHMORE UNIVERSITY The Chartered Institute of Marketing (CIM) is the largest and most successful professional

More information

Five Reasons It s Time For Secure Single Sign-On

Five Reasons It s Time For Secure Single Sign-On Five Reasons It s Time For Secure Single Sign-On From improved security to increased customer engagement, secure single sign-on is a smart choice. Executive Overview While cloud-based applications provide

More information

Train employees to avoid inadvertent cyber security breaches

Train employees to avoid inadvertent cyber security breaches Train employees to avoid inadvertent cyber security breaches TRAIN EMPLOYEES TO AVOID INADVERTENT CYBER SECURITY BREACHES PAGE 2 How much do you know about cyber security? Small business owners often lack

More information

2018 GLOBAL CHANNEL PARTNER SURVEY THYCOTIC CHANNEL PARTNER SURVEY REPORT

2018 GLOBAL CHANNEL PARTNER SURVEY THYCOTIC CHANNEL PARTNER SURVEY REPORT 2018 GLOBAL CHANNEL PARTNER SURVEY THYCOTIC CHANNEL PARTNER SURVEY REPORT THYCOTIC 2018 GLOBAL CHANNEL PARTNER SURVEY Channel Partner survey highlights client cybersecurity concerns and opportunities for

More information

Security Awareness. Chapter 2 Personal Security

Security Awareness. Chapter 2 Personal Security Security Awareness Chapter 2 Personal Security Objectives After completing this chapter, you should be able to do the following: Define what makes a weak password Describe the attacks against passwords

More information

BRING SPEAR PHISHING PROTECTION TO THE MASSES

BRING SPEAR PHISHING PROTECTION TO THE MASSES E-Guide BRING SPEAR PHISHING PROTECTION TO THE MASSES SearchSecurity phishing. I n this expert tip, David Sherry describes how a combination of technical controls and user awareness training can help put

More information

Welcome Guide for KT Series Token

Welcome Guide for KT Series Token Welcome Guide for KT Series Token Protecting Your On-line Identity Authentication Service Delivery Made EASY Copyright 2012 SafeNet, Inc. All rights reserved. All attempts have been made to make the information

More information

October 21 22, 2014 Introduction to CompTIA, Communities, and ITSS

October 21 22, 2014 Introduction to CompTIA, Communities, and ITSS October 21 22, 2014 Introduction to CompTIA, Communities, and ITSS CompTIA Big View CompTIA Member Communities IT Services & Support Who is CompTIA? Global, Not for Profit, IT Industry Trade Association

More information

WHAT IS CORPORATE ACCOUNT TAKEOVER? HOW DOES IT HAPPEN?

WHAT IS CORPORATE ACCOUNT TAKEOVER? HOW DOES IT HAPPEN? WHAT IS CORPORATE ACCOUNT TAKEOVER? Corporate Account Takeover (also referred to as CATO) is a type of fraud where criminals gain access to a business financial accounts to make unauthorized transactions.

More information

HOW TO SELECT A SECURITY-BASED MESSAGING PARTNER. Six key features to consider when choosing a mission-critical messaging partner for your business.

HOW TO SELECT A SECURITY-BASED MESSAGING PARTNER. Six key features to consider when choosing a mission-critical messaging partner for your business. HOW TO SELECT A SECURITY-BASED MESSAGING PARTNER Six key features to consider when choosing a mission-critical messaging partner for your business. MESSAGING MEANS BUSINESS Text messaging (or SMS) is a

More information

Building a Threat Intelligence Program

Building a Threat Intelligence Program WHITE PAPER Building a Threat Intelligence Program Research findings on best practices and impact www. Building a Threat Intelligence Program 2 Methodology FIELD DATES: March 30th - April 4th 2018 351

More information

Employee Privacy in the Electronic Workplace

Employee Privacy in the Electronic Workplace Employee Privacy in the Electronic Workplace Jane Shea and Michael Severini Today s Speakers Jane Hils Shea, Esq. Member & Chair of Data Privacy and Information Security Practice Group Frost Brown Todd

More information

IDN - what s up? Patrik Fältström

IDN - what s up? Patrik Fältström IDN - what s up? Patrik Fältström paf@cisco.com 1 Old stuff (what is IDNA) What is it? What implications do we get? IDNA uses Unicode 3.2 2 Protocol issues Old protocols can only handle a subset of US-

More information

HOW SAFE IS YOUR DATA? Micho Schumann, KPMG, Cayman Islands

HOW SAFE IS YOUR DATA? Micho Schumann, KPMG, Cayman Islands HOW SAFE IS YOUR DATA? Micho Schumann, KPMG, Cayman Islands HOW SAFE IS YOUR DATA? 16 November 2017 kpmg.ky Agenda Introduction Cyber Security presentation Q&A 3 Why this presentation? 4 The CIA Triad

More information

EBOOK. Stopping Fraud. How Proofpoint Helps Protect Your Organisation from Impostors, Phishers and Other Non-Malware Threats.

EBOOK. Stopping  Fraud. How Proofpoint Helps Protect Your Organisation from Impostors, Phishers and Other Non-Malware Threats. EBOOK Stopping Email Fraud How Proofpoint Helps Protect Your Organisation from Impostors, Phishers and Other Non-Malware Threats www.proofpoint.com EBOOK Stopping Email Fraud 2 Today s email attacks have

More information

Wayward Wi-Fi. How Rogue Hotspots Can Hijack Your Data and Put Your Mobile Devices at Risk

Wayward Wi-Fi. How Rogue Hotspots Can Hijack Your Data and Put Your Mobile Devices at Risk Wayward Wi-Fi How Rogue Hotspots Can Hijack Your Data and Put Your Mobile Devices at Risk 288 MILLION There are more than 288 million unique Wi-Fi networks worldwide. Source: Wireless Geographic Logging

More information

The 2017 State of Endpoint Security Risk

The 2017 State of Endpoint Security Risk The 2017 State of Endpoint Security Risk Attacks are evolving. As a result, today s organizations are struggling to secure their endpoints, and paying a steep cost for each successful attack. To discover

More information

Key Findings from the Global State of Information Security Survey 2017 Indonesian Insights

Key Findings from the Global State of Information Security Survey 2017 Indonesian Insights www.pwc.com/id Key Findings from the State of Information Security Survey 2017 n Insights Key Findings from the State of Information Security Survey 2017 n Insights By now, the numbers have become numbing.

More information

Cyber Security Risk Management and Identity Theft

Cyber Security Risk Management and Identity Theft Cyber Security Risk Management and Identity Theft 2017 MD SHRM State Conference Presented by Robert Bob Olsen, Chief Executive Officer MS ITS, MBA, CISSP, CISM October 16, 2017 This presentation may not

More information

Internationalized Domain Names New gtld Program

Internationalized Domain Names New gtld Program Internationalized Domain Names New gtld Program Doug Brent Chief Operating Officer Hong Kong 24 July 2009 Karla Valente Director New gtld Program 0 Agenda Internationalized Domain Names (IDNs) defined

More information

NYSVMS WEBSITE PRIVACY POLICY

NYSVMS WEBSITE PRIVACY POLICY Your Privacy Rights Effective Date: June 16, 2016 NYSVMS WEBSITE PRIVACY POLICY The New York State Veterinary Medical Society, Inc. and its affiliates ( NYSVMS, we, and us ) recognize the importance of

More information

Webroot Phishing Threat Trends

Webroot Phishing Threat Trends December 2016 Webroot Phishing Threat Trends An update to the 2016 Threat Brief Introduction Who would ever fall for that? That s what many people think when they see a phishing attempt, since less advanced

More information

Frauds & Scams. Why is the Internet so attractive to scam artists? 2006 Internet Fraud Trends. Fake Checks. Nigerian Scam

Frauds & Scams. Why is the Internet so attractive to scam artists? 2006 Internet Fraud Trends. Fake Checks. Nigerian Scam Frauds & Scams Why is the Internet so attractive to scam artists? Anonymity Low cost Rapid growth Easy to adapt Be Cyber Savvy with C-SAFE 118 2006 Internet Fraud Trends Average Loss Online Auctions 34%

More information

Members App User Guide

Members App User Guide Members App User Guide 1. Personal Details: User can see and edit his/her own personal details from the app. 2. Contact details: User can see and edit his/her contact details from the app like Email id,

More information

Securing Your Business Against the Diversifying Targeted Attacks Leonard Sim

Securing Your Business Against the Diversifying Targeted Attacks Leonard Sim Securing Your Business Against the Diversifying Targeted Attacks Leonard Sim Manager, Client & Partner Services, Asia 1 Agenda 2010 Threats Targeted Attacks Defense Against Targeted Attacks Questions 2

More information

SOCIAL NETWORKING IN TODAY S BUSINESS WORLD

SOCIAL NETWORKING IN TODAY S BUSINESS WORLD SOCIAL NETWORKING IN TODAY S BUSINESS WORLD AGENDA Review the use of social networking applications within the business environment Review current trends in threats, attacks and incidents Understand how

More information

The Credential Phishing Handbook. Why It Still Works and 4 Steps to Prevent It

The Credential Phishing Handbook. Why It Still Works and 4 Steps to Prevent It The Credential Phishing Handbook Why It Still Works and 4 Steps to Prevent It Introduction Phishing is more than 20 years old, but still represents more than 90% of targeted attacks. The reason is simple:

More information

Cross-site request forgery Cross-site scripting Man-in-the-browser Session hijacking Malware Man-in-the-middle DNS cache poisoning DNS spoofing DNS hijacking Dictionary attacks DDoS DDoS Eavesdropping

More information

PHISHING ATTACK TARGETING UNIVERSITY STUDENTS MAY 2016

PHISHING ATTACK TARGETING UNIVERSITY STUDENTS MAY 2016 PHISHING ATTACK TARGETING UNIVERSITY STUDENTS MAY 2016 Page 1 of 5 PURPOSE OF THE ALERT The information contained within this alert is based on the reports received by Action Fraud and the National Fraud

More information

DMARC ADOPTION AMONG

DMARC ADOPTION AMONG DMARC ADOPTION AMONG Top US Colleges and Universities Q1 2018 Featuring Matthew Vernhout (CIPP/C) Director of Privacy, 250ok TABLE OF CONTENTS Introduction... 03 Research Overview... 04 Top US Colleges

More information

Berner Fachhochschule Haute cole spcialise bernoise Berne University of Applied Sciences 2

Berner Fachhochschule Haute cole spcialise bernoise Berne University of Applied Sciences 2 Table of Contents Hacking Web Sites Broken Authentication Emmanuel Benoist Spring Term 2018 Introduction Examples of Attacks Brute Force Session Spotting Replay Attack Session Fixation Attack Session Hijacking

More information

Training Opportunities

Training Opportunities July September 2014 Training Opportunities Meeting Your Training Needs and CPE Requirements Group-Live Course Group Internet-Based Course To learn more or register for any of these events, visit www.gfoa.org.

More information

Q1 Meetings are currently held at the Seattle JTF, would you like to see the location of the meeting changed or rotated to improve attendance?

Q1 Meetings are currently held at the Seattle JTF, would you like to see the location of the meeting changed or rotated to improve attendance? Q1 Meetings are currently held at the Seattle JTF, would you like to see the location of the meeting changed or rotated to improve attendance? If yes, please subm it suggestion. If yes, please submit a

More information

Who We Are! Natalie Timpone

Who We Are! Natalie Timpone Who We Are! Natalie Timpone Manager of Security Business Management Office Enterprise Security Awareness Manager Carmelo Walsh Security, Risk, and Compliance Security Awareness Subject Matter Expert Who

More information

WHITEPAPER. Protecting Against Account Takeover Based Attacks

WHITEPAPER. Protecting Against Account Takeover Based  Attacks WHITEPAPER Protecting Against Account Takeover Based Email Attacks Executive Summary The onslaught of targeted email attacks such as business email compromise, spear phishing, and ransomware continues

More information

Phishing Stories. Shaun Jones

Phishing Stories. Shaun Jones Phishing Stories Shaun Jones Agenda What is Phishing? Phishing Story I Intranets are actually pretty useful Phishing Story II Why do I need two factor auth Phishing Story III Everybody gets shells! What

More information

Tim Cohn TimWCohn

Tim Cohn TimWCohn Tim Cohn www.marketingprinciples.com 1-866-TimWCohn How To Get More Leads, Prospects and Sales Without Hiring New Employees or Going Broke! The Only 3 Ways To Grow Your Business Increase the number of

More information

Part 1: How Can I Make Next Year s Event More Successful? November 15, 2010 Presenters: Amy Braiterman, Blackbaud Kim Romaszewski, Blackbaud

Part 1: How Can I Make Next Year s Event More Successful? November 15, 2010 Presenters: Amy Braiterman, Blackbaud Kim Romaszewski, Blackbaud Part 1: How Can I Make Next Year s Event More Successful? November 15, 2010 Presenters: Amy Braiterman, Blackbaud Kim Romaszewski, Blackbaud Events Boot Camp Series Events Boot Camp, Part 1: How Can I

More information

MultiPlan Selects CyrusOne for Exceptional Colocation and Flexible Solutions

MultiPlan Selects CyrusOne for Exceptional Colocation and Flexible Solutions CASE STUDY MultiPlan Selects CyrusOne for Exceptional Scalable, secure and reliable data center solution keeps healthcare company operating seamlessly MultiPlan Inc., the industry s most comprehensive

More information

Cybersecurity Fundamentals Paul Jones CIO Clerk & Comptroller Palm Beach County CISSP, ITIL Expert, Security+, Project+

Cybersecurity Fundamentals Paul Jones CIO Clerk & Comptroller Palm Beach County CISSP, ITIL Expert, Security+, Project+ Cybersecurity Fundamentals Paul Jones CIO Clerk & Comptroller Palm Beach County CISSP, ITIL Expert, Security+, Project+ NOT SO LONG AGO 1981 IS IT FUNNY OR WHAT? THE BALANCING ACT Ease of Use Maintenance

More information

Altitude Software. Data Protection Heading 2018

Altitude Software. Data Protection Heading 2018 Altitude Software Data Protection Heading 2018 How to prevent our Contact Centers from Data Leaks? Why is this a priority for Altitude? How does it affect the Contact Center environment? How does this

More information

Operating Level Agreement for NYU Login Service

Operating Level Agreement for NYU Login Service Operating Level Agreement for NYU Login Service This Operating Level Agreement (OLA) documents the agreement regarding support of Single Sign-On (SSO) services for the (Partner Service), which has been

More information

JOB INFORMATION: EXAMINATIONS ADMINISTRATOR

JOB INFORMATION: EXAMINATIONS ADMINISTRATOR JOB INFORMATION: EXAMINATIONS ADMINISTRATOR The National Council for the Training of Journalists delivers the premier training scheme for journalists in the UK. Established in 1951, it is dedicated to

More information

Webinar Award Winners

Webinar Award Winners 2017 Webinar Award Winners Table of Contents Most Innovative 01 Best Webinar Series 06 Best Use of Video 02 Best Branded 07 30 30 August Edition 03 Best On-Demand Performance 08 Most International Reach

More information

You ve Been Hacked Now What? Incident Response Tabletop Exercise

You ve Been Hacked Now What? Incident Response Tabletop Exercise You ve Been Hacked Now What? Incident Response Tabletop Exercise Date or subtitle Jeff Olejnik, Director Cybersecurity Services 1 Agenda Incident Response Planning Mock Tabletop Exercise Exercise Tips

More information

Top Ten IT Security Risks CHRISTOPHER S. ELLINGWOOD SENIOR MANAGER, IT ASSURANCE SERVICES

Top Ten IT Security Risks CHRISTOPHER S. ELLINGWOOD SENIOR MANAGER, IT ASSURANCE SERVICES Top Ten IT Security Risks - 2017 CHRISTOPHER S. ELLINGWOOD SENIOR MANAGER, IT ASSURANCE SERVICES INTRODUCTION IT S ALL CONNECTED IN 2017. All of our Top 10 risks impact both us as consumers and as professionals

More information