Practical Cyber Security for Architects of Small Firms (1 AIA CEU)

Size: px
Start display at page:

Download "Practical Cyber Security for Architects of Small Firms (1 AIA CEU)"

Transcription

1 Practical Cyber Security for Architects of Small Firms (1 AIA CEU) with Angela Render Thunderpaw.com

2 Transforming Architecture LLC is a Registered Provider with The American Institute of Architects Continuing Education Systems. Credit earned on completion of this program will be reported to CES Records for AIA members. Certificates of Completion for non-aia members are available on request. This program is registered with the AIA/CES for continuing professional education. As such, it does not include content that may be deemed or construed to be an approval or endorsement by the AIA of any material of construction or any method or manner of handling, using, distributing, or dealing in any material or product. Questions related to specific materials, methods, and services will be addressed at the conclusion of this presentation.

3 Copyright Materials This presentation is protected by US and International Copyright laws. Reproduction, distribution, display and use of the presentation without written permission of the speaker is prohibited. Transforming Architecture LLC

4 Learning Objectives 1. Define what cyber warfare is and how it applies to individuals and small businesses. 2. Identify a cyber threat. 3. Defend against a cyber threat. 4. Respond to a cyber attack.

5 What is Cyber Warfare?

6

7 What is a Hacker?

8

9

10 Who is the Enemy?

11 Why Me?

12 I am convinced that there are only two types of companies: those that have been hacked and those that will be. And even they are converging into one category: companies that have been hacked and will be hacked again. Robert Mueller FBI Director

13 How do they attack?

14 Insider

15

16 Website

17 Attachments PDF EXE MOV DOCX PPT

18

19 SPAM

20 Social Engineering

21 Did You Know. Social Networking sites are preferred by hackers for social engineering?

22 + + + Name Street Address Picture Friend s Names Pets Hobbies Interests + = Profession Employer Phone Number Co-Workers Access to you through Groups

23 Spear Phishing From: Tim Morlock To: Subject: Nice to Meet You Dear Bill Williams, Thank you for the connection on LinkedIn. Like I mentioned, I m a new-hire at MegaCorp under Jim Pike in sales. Since he s out of town the next week and I m anxious to get to work, I wanted to know if I could get my and VPN login to the system set up. Sincerely, Tim Morlock Assistant Account Rep. MegaCorp

24 Friends

25

26

27 What can I do? + +

28

29

30 Passwords Change every 6-12 months Use long passwords that are somewhat complex Use a unique password for each account

31 Free

32 Can Be Fake paranoia pays off. It is definitely a lesson in be careful what you open... even if looks to be coming from your boss, don t open a file if you aren t expecting it. - Reid Wightman, Digital Bond

33 Encrypted WiFi

34 Keep Sensitive Data Secure

35 Dispose of Old Hardware Securely

36 Write Up a Plan

37 Object Lesson Who is asking for my information? Do I trust them? Why do they need to know? Will it be kept secure? Could it be used in social engineering?

38 How is your corporate handled? A dedicated server in our office A hosting company using our domain name (ourdomain.com) A free provider (gmail, yahoo, etc) Some other solution Don't know

39 What do I do?

40 How do I know? Flaky behavior. Suspicious contacts. (Phone, ) To you. Mentioned by your partners. Mentioned by your clients.

41 Thunderpaw.com

42 What is TA? The only franchise opportunity for registered architects in the US. 7 franchisees in Texas, Ohio, Maryland, Florida, Virginia and DC Our Mission: To build a professional community that provides clients value through Expertise, Education and Innovation.

43 Karen Pitsley, AIA TransformingArchitecture.com (301) Angela Render Thunderpaw.com (571) Thank You

Professional Certification in the Commissioning Industry. Mike Eardley, PE, CCP Director of Commissioning services Cannon Design

Professional Certification in the Commissioning Industry. Mike Eardley, PE, CCP Director of Commissioning services Cannon Design Professional Certification in the Commissioning Industry Mike Eardley, PE, CCP Director of Commissioning services Cannon Design AIA Quality Assurance The Building Commissioning Association is a Registered

More information

AIA Iowa #A203. NCARB & You: IDP, ARE, & Certification Course Number. Ryan Misner, AIA, NCARB October 15, 2015

AIA Iowa #A203. NCARB & You: IDP, ARE, & Certification Course Number. Ryan Misner, AIA, NCARB October 15, 2015 AIA Iowa #A203 NCARB & You: IDP, ARE, & Certification Course Number Ryan Misner, AIA, NCARB October 15, 2015 Credit(s) earned on completion of this course will be reported to AIA CES for AIA members. Certificates

More information

Cybersmart Buildings: Securing Your Investments in Connectivity and Automation

Cybersmart Buildings: Securing Your Investments in Connectivity and Automation Cybersmart Buildings: Securing Your Investments in Connectivity and Automation Jason Rosselot, CISSP, Director Product Cyber Security, Johnson Controls AIA Quality Assurance The Building Commissioning

More information

To Document or Not to Document: That is the Question DPLE 182

To Document or Not to Document: That is the Question DPLE 182 To Document or Not to Document: That is the Question DPLE 182 RLI Design Professionals is a Registered Provider with The American Institute of Architects Continuing Education Systems. Credit earned on

More information

DISTRACTED DRIVING. The Biggest Issue in Driving Today

DISTRACTED DRIVING. The Biggest Issue in Driving Today DISTRACTED DRIVING The Biggest Issue in Driving Today RLI Design Professionals Design Professionals Learning Event DPLE 167 February 17, 2016 RLI Design Professionals RLI Design Professionals is a Registered

More information

Smart Buildings, Towns and Cities: Part 1 #NG07

Smart Buildings, Towns and Cities: Part 1 #NG07 Smart Buildings, Towns and Cities: Part 1 #NG07 Chris Gandy, Las Vegas Metro Police Dept. Ed English, CEO, ELERTS Corp. Kent Browne, Senior Security Engineer, Dell SecureWorks Steve Surfaro, Industry Liaison,

More information

5 Things to Know About Certification

5 Things to Know About Certification 5 Things to Know About Certification 5 Things to Know About Certification If you re thinking about a profession in allied health, or you re already in the field and ready to advance your career, you ve

More information

Please comply with the Lean Construction Institute s Usage Policies and Attribution Guidelines at

Please comply with the Lean Construction Institute s Usage Policies and Attribution Guidelines at Please comply with the Lean Construction Institute s Usage Policies and Attribution Guidelines at http://www.leanconstruction.org/usage.pdf when using this file. Thank you. Provider Name: Lean Construction

More information

Norton Online Reputation Report: Why Millennials should manage their online footprint

Norton Online Reputation Report: Why Millennials should manage their online footprint Norton Online Reputation Report: Why Millennials should manage their online footprint UK May 2016 Methodology A quantitative survey was conducted online among 1,000 mobile users aged 18-34 years who own

More information

Building new cybersecurity pipelines. NICE Conference 2017 November 8, Strengthening Cyber Workforce Development sans.

Building new cybersecurity pipelines. NICE Conference 2017 November 8, Strengthening Cyber Workforce Development sans. Building new cybersecurity pipelines NICE Conference 2017 November 8, 2017 Strengthening Cyber Workforce Development sans.org/cybertalent Cybersecurity: The Current State Skills Mismatch Emphasis on theory

More information

Mobile Security and Public Networks

Mobile Security and Public Networks Mobile Security and Public Networks Victor Johnston, Future Leaders Executive Council June 7, 2016 RECORDING HERE: http://bit.ly/29t0bq7 Teleconference Settings This call is being recorded To see the slides,

More information

Kronos Applicant Tracking System (ATS) Tutorial

Kronos Applicant Tracking System (ATS) Tutorial Kronos Applicant Tracking System (ATS) Tutorial KRONOS ATS: Applying Online Current CWS associates only: First time users: UserID: Current Kronos user ID (same as network login) Password: First Name Initial

More information

PARALEGAL CERTIFICATIONS. National Professional Standard for Paralegals

PARALEGAL CERTIFICATIONS. National Professional Standard for Paralegals PARALEGAL CERTIFICATIONS National Professional Standard for Paralegals 1 OUR MISSION NALA leads the paralegal profession by providing a voluntary certification program, continuing legal education, and

More information

PARALEGAL CERTIFICATIONS. National Professional Standard for Paralegals

PARALEGAL CERTIFICATIONS. National Professional Standard for Paralegals PARALEGAL CERTIFICATIONS National Professional Standard for Paralegals 1 OUR MISSION NALA leads the paralegal profession by providing a voluntary certification program, continuing legal education, and

More information

GETTING STARTED THE BASICS

GETTING STARTED THE BASICS GETTING STARTED To use LinkedIn, users must complete the free registration process. To begin, go to www.linkedin.com and follow the registration prompt on the homepage. After completing registration, users

More information

Doing More with Less: Maintaining, Operating, and Improving your BMS. Bernard Keister, V PE Senior Engineer Guttmann & Blaevoet Consulting Engineers

Doing More with Less: Maintaining, Operating, and Improving your BMS. Bernard Keister, V PE Senior Engineer Guttmann & Blaevoet Consulting Engineers Doing More with Less: Maintaining, Operating, and Improving your BMS Bernard Keister, V PE Senior Engineer Guttmann & Blaevoet Consulting Engineers AIA Quality Assurance Learning Objectives 1. Develop

More information

Dear Colleague, We are pleased to invite you to become a Charter Member of the National Association of Accessibility Consultants.

Dear Colleague, We are pleased to invite you to become a Charter Member of the National Association of Accessibility Consultants. National Association of Accessibility Consultants Dear Colleague, We are pleased to invite you to become a Charter Member of the National Association of Accessibility Consultants. Membership The National

More information

The Cyber War on Small Business

The Cyber War on Small Business The Cyber War on Small Business Dillon Behr Executive Lines Broker Risk Placement Services, Inc. Meet Our Speaker Dillon Behr Executive Lines Broker Risk Placement Services, Inc. Previously worked as Cyber

More information

Maria Hishikawa MSIX Technical Lead Sarah Storms MSIX Contractor Security

Maria Hishikawa MSIX Technical Lead Sarah Storms MSIX Contractor Security Migrant Student Information Exchange (MSIX) Security, Privacy and Account Management Webinar Deloitte Consulting LLP. February 22, 2018 Maria Hishikawa MSIX Technical Lead Sarah Storms MSIX Contractor

More information

Integrated Access Management Solutions. Access Televentures

Integrated Access Management Solutions. Access Televentures Integrated Access Management Solutions Access Televentures Table of Contents OVERCOMING THE AUTHENTICATION CHALLENGE... 2 1 EXECUTIVE SUMMARY... 2 2 Challenges to Providing Users Secure Access... 2 2.1

More information

Too Little Too Late: Top Reasons Why You Got Hacked

Too Little Too Late: Top Reasons Why You Got Hacked TUESDAY MAY 23,2017 2:00-3:15 PM Too Little Too Late: Top Reasons Why You Got Hacked MODERATOR SPEAKERS John Gross Director of Financial Management, City of Long Beach, CA Chad Alvarado Supervisory Special

More information

Getting Started with Real Magnet

Getting Started with Real Magnet Getting Started with Real Magnet Welcome to the Real Magnet community! Our commitment to you is to provide powerful email and social marketing services that are backed by excellent customer support and

More information

Cybersecurity in 2016 and Lessons learned

Cybersecurity in 2016 and Lessons learned Cybersecurity in 2016 and Lessons learned Dr. Yu Cai Associate Professor Program Chair, Computer Network & System Administration School of Technology Michigan Technological University cai@mtu.edu A Quick

More information

Cybersecurity Guidance for Small Firms Thursday, November 8 9:00 a.m. 10:00 a.m.

Cybersecurity Guidance for Small Firms Thursday, November 8 9:00 a.m. 10:00 a.m. Cybersecurity Guidance for Small Firms Thursday, November 8 9:00 a.m. 10:00 a.m. It is crucial that small financial firms take proper cybersecurity measures to protect their customers and their firm. During

More information

Welcome. ScrogginsGrear clients. to Cybersecurity Education Series. Password Management & Public Wi-Fi Security

Welcome. ScrogginsGrear clients. to Cybersecurity Education Series. Password Management & Public Wi-Fi Security Welcome ScrogginsGrear clients to Cybersecurity Education Series Password Management & Public Wi-Fi Security Presenter: Ray Cool, CEO PBSI Technology Solutions Webinar will begin at 1:00 Welcome ScrogginsGrear

More information

The CERT Top 10 List for Winning the Battle Against Insider Threats

The CERT Top 10 List for Winning the Battle Against Insider Threats The CERT Top 10 List for Winning the Battle Against Insider Threats Dawn Cappelli CERT Insider Threat Center Software Engineering Institute Carnegie Mellon University Session ID: STAR-203 Session Classification:

More information

Kutztown University of Pennsylvania PASSHE Alumni Satisfaction Survey Results Population: Alumni who graduated in

Kutztown University of Pennsylvania PASSHE Alumni Satisfaction Survey Results Population: Alumni who graduated in Kutztown University of Pennsylvania PASSHE Alumni Satisfaction Survey Results Population: Alumni who graduated in 2011-12 Alumni Responders Response Rate Kutztown 1,802 250 14% Notes: Alumni who had no

More information

Trends in Data Center Energy Efficiency

Trends in Data Center Energy Efficiency Trends in Data Center Energy Efficiency Presented by: Todd Boucher Better Building by Design 2012 1 Efficiency Vermont is a Registered Provider with The American Institute of Architects Continuing Education

More information

How to Build a Culture of Security

How to Build a Culture of Security How to Build a Culture of Security March 2016 Table of Contents You are the target... 3 Social Engineering & Phishing and Spear-Phishing... 4 Browsing the Internet & Social Networking... 5 Bringing Your

More information

How Cyber-Criminals Steal and Profit from your Data

How Cyber-Criminals Steal and Profit from your Data How Cyber-Criminals Steal and Profit from your Data Presented by: Nick Podhradsky, SVP Operations SBS CyberSecurity www.sbscyber.com Consulting Network Security IT Audit Education 1 Agenda Why cybersecurity

More information

Cyber Security. February 13, 2018 (webinar) February 15, 2018 (in-person)

Cyber Security. February 13, 2018 (webinar) February 15, 2018 (in-person) Cyber Security Presenters: - Brian Everest, Chief Technology Officer, Starport Managed Services - Susan Pawelek, Accountant, Compliance and Registrant Regulation February 13, 2018 (webinar) February 15,

More information

BEST PRACTICES FOR PERSONAL Security

BEST PRACTICES FOR PERSONAL  Security BEST PRACTICES FOR PERSONAL Email Security Sometimes it feels that the world of email and internet communication is fraught with dangers: malware, viruses, cyber attacks and so on. There are some simple

More information

Getting Started with Cybersecurity

Getting Started with Cybersecurity 2 Incidents per week: Since 2016, U.S. K-12 school districts have experienced more than two cyber incidents per week on average. Fastest growing cyber incidents in K12 schools Most common cyber incidents

More information

An Introduction to the CFA Institute. All Rights Reserved

An Introduction to the CFA Institute. All Rights Reserved An Introduction to the 2015 CFA Institute. All Rights Reserved AGENDA 1. CFA INSTITUTE 2. BUILD UNDERSTANDING WITH THE CLARITAS PROGRAM 3. WHAT YOU WILL LEARN 4. THE CLARITAS EXPERIENCE 2 ABOUT CFA INSTITUTE

More information

Caribbean Cyber Security: Not Only Government s Responsibility

Caribbean Cyber Security: Not Only Government s Responsibility Caribbean Cyber Security: Not Only Government s Responsibility AWARENESS AND VIGILANCE IS EVERYBODY S RESPONSIBILITY Preseted at: ICT Symposium Antigua and Barbuda March 2017 Caribbean Cyber Security Events

More information

2018 GLOBAL CHANNEL PARTNER SURVEY THYCOTIC CHANNEL PARTNER SURVEY REPORT

2018 GLOBAL CHANNEL PARTNER SURVEY THYCOTIC CHANNEL PARTNER SURVEY REPORT 2018 GLOBAL CHANNEL PARTNER SURVEY THYCOTIC CHANNEL PARTNER SURVEY REPORT THYCOTIC 2018 GLOBAL CHANNEL PARTNER SURVEY Channel Partner survey highlights client cybersecurity concerns and opportunities for

More information

Data Protection in Practice

Data Protection in Practice ANNUAL CPD BOARD CONFERENCE Data Protection in Practice 6 & 13 DECEMBER 2016 There are only two types of companies: those that have been hacked, and those that will be. Robert Mueller, FBI Director There

More information

The Insider Threat Center: Thwarting the Evil Insider

The Insider Threat Center: Thwarting the Evil Insider The Insider Threat Center: Thwarting the Evil Insider The CERT Top 10 List for Winning the Battle Against Insider Threats Randy Trzeciak 14 June 2012 2007-2012 Carnegie Mellon University Notices 2011 Carnegie

More information

Governance Ideas Exchange

Governance Ideas Exchange www.pwc.com.au Anatomy of a Hack Governance Ideas Exchange Robert Di Pietro October 2018 Cyber Security Anatomy of a Hack Cyber Security Introduction Who are the bad guys? Profiling the victim Insights

More information

Getting Started 1. Welcome... Unsure of how to navigate your way through the Careers area of our website?

Getting Started 1. Welcome... Unsure of how to navigate your way through the Careers area of our website? Getting Started 1 Welcome... Unsure of how to navigate your way through the Careers area of our website? Our Candidate User Guide will guide you with complete, step-by-step instructions to assist you in

More information

Security Practices & File Encryption

Security Practices & File Encryption Welcome Clients of Mariner Wealth Advisors Cybersecurity Education Series Email Security Practices & File Encryption Content provided by Presenter: Ray Cool, CEO PBSI Technology Solutions Webinar will

More information

COUNTERING CYBER CHAOS WITH HIPAA COMPLIANCE. Presented by Paul R. Hales, J.D. May 8, 2017

COUNTERING CYBER CHAOS WITH HIPAA COMPLIANCE. Presented by Paul R. Hales, J.D. May 8, 2017 COUNTERING CYBER CHAOS WITH HIPAA COMPLIANCE Presented by Paul R. Hales, J.D. May 8, 2017 1 HIPAA Rules Combat Cyber Crime HIPAA Rules A Blueprint to Combat Cyber Crime 2 HIPAA Rules Combat Cyber Crime

More information

How to Complete Your Online Recertification

How to Complete Your Online Recertification How to Complete Your Online Recertification Glossary American Association of Tissue Banks: AATB Certified Tissue Banking Specialist: CTBS Certified Reproductive Cryotechnology Specialist: CRCS Continuing

More information

Manually Create Phishing Page For Facebook 2014

Manually Create Phishing Page For Facebook 2014 Manually Create Phishing Page For Facebook 2014 While you are creating phishing page manually you have to do a lot of work Web Templates -- For importing premade template for Gmail, Facebook from SET.

More information

Managing IT Risk: What Now and What to Look For. Presented By Tina Bode IT Assurance Services

Managing IT Risk: What Now and What to Look For. Presented By Tina Bode IT Assurance Services Managing IT Risk: What Now and What to Look For Presented By Tina Bode IT Assurance Services Agenda 1 2 WHAT TOP TEN IT SECURITY RISKS YOU CAN DO 3 QUESTIONS 2 IT S ALL CONNECTED Introduction All of our

More information

Could the BIGGEST Threat to Your Business be INSIDE Your Company?

Could the BIGGEST Threat to Your Business be INSIDE Your Company? Could the BIGGEST Threat to Your Business be INSIDE Your Company? Presented By: Cheryl W. Snead, Banneker Industries, Inc. Rick Avery, Securitas Security Inc. Cheryl W. Snead President/CEO/Facility Security

More information

Ages Donʼt Fall for Fake: Activity 1 Don t bite that phishing hook! Goals for children. Letʼs talk

Ages Donʼt Fall for Fake: Activity 1 Don t bite that phishing hook! Goals for children. Letʼs talk Ages 11-14 Donʼt Fall for : Activity 1 Don t bite that phishing hook! Children play a game where they study various emails and texts and try to decide which messages are legit and which are phishing scams.

More information

Quick Base Certification Overview

Quick Base Certification Overview Quick Base Certification Overview Get the Most Value Out of Quick Base, Demonstrate Your Expertise and Bolster Your Career The Quick Base Certification Program validates Quick Base mastery at two levels:

More information

Overall Mission of Social Media Team

Overall Mission of Social Media Team Table of Contents Overall mission 2 Status updates and Article posting 3 LinkedIn invitations & responses 4 Voicemail messages 6 Infusionsoft Campaign 7 Pepdigest 8 1 Overall Mission of Social Media Team

More information

9 Steps to Protect Against Ransomware

9 Steps to Protect Against Ransomware 9 Steps to Protect Against Ransomware IT Support Analyst Task Overview Security Manager Security Dashboard Self Service log Secur Devices With Vulnerabilities Critical Important/High Moderate/Medium 40

More information

Cybersecurity Panel: Cutting through Cybersecurity Hype with Practical Tips to Protect your Bank

Cybersecurity Panel: Cutting through Cybersecurity Hype with Practical Tips to Protect your Bank Cybersecurity Panel: Cutting through Cybersecurity Hype with Practical Tips to Protect your Bank NJ Bankers Association Annual Convention May 19, 2017 Presented by: Jeremy Burris, Principal, S.R. Snodgrass,

More information

Joe Stocker, CISSP, MCITP, VTSP Patriot Consulting

Joe Stocker, CISSP, MCITP, VTSP Patriot Consulting Joe Stocker, CISSP, MCITP, VTSP Patriot Consulting Microsoft Cloud Evangelist at Patriot Consulting Principal Systems Architect with 17 Years of experience Technical certifications: MCSE, MCITP Office

More information

Give Me 5 Understanding Cyber Security Part 1: How Cyber Security is Impacting Your Business

Give Me 5 Understanding Cyber Security Part 1: How Cyber Security is Impacting Your Business Give Me 5 Understanding Cyber Security Part 1: How Cyber Security is Impacting Your Business Women Impacting Public Policy (WIPP) is a nonprofit, membership organization working to increase the economic

More information

Cyber security tips and self-assessment for business

Cyber security tips and self-assessment for business Cyber security tips and self-assessment for business Last year one in five New Zealand SMEs experienced a cyber-attack, so it s essential to be prepared. Our friends at Deloitte have put together this

More information

A Comedy of Errors: Assessing and Managing the Human Element of Cyber Risk

A Comedy of Errors: Assessing and Managing the Human Element of Cyber Risk SESSION ID: GRC-T10 A Comedy of Errors: Assessing and Managing the Human Element of Cyber Risk R Jason Straight Sr. VP, Chief Privacy Officer UnitedLex Corp. Has anyone seen this man? 2 3 4 We re getting

More information

PPAI Certification Information Session. Rachel Robichaud Director of Professional Development

PPAI Certification Information Session. Rachel Robichaud Director of Professional Development PPAI Certification Information Session Rachel Robichaud Director of Professional Development What s The Enhanced Value of Certification? Why Certification? PPAI Certification at a Glance Top 7 Questions

More information

The Credential Phishing Handbook. Why It Still Works and 4 Steps to Prevent It

The Credential Phishing Handbook. Why It Still Works and 4 Steps to Prevent It The Credential Phishing Handbook Why It Still Works and 4 Steps to Prevent It Introduction Phishing is more than 20 years old, but still represents more than 90% of targeted attacks. The reason is simple:

More information

STAY LINKED IN. #TrendingNow: Get Linked In on the Latest in Labor and Employment News NOV. Thursday, November 10, :00 am 5:00 pm

STAY LINKED IN. #TrendingNow: Get Linked In on the Latest in Labor and Employment News NOV. Thursday, November 10, :00 am 5:00 pm Phelps Mobile 8:00 AM - 5:00 PM 99% (( STAY LINKED IN NOV 10 #TrendingNow: Get Linked In on the Latest in Labor and Employment News Interested Going Not Going More Thursday, November 10, 2016 8:00 am 5:00

More information

Restech. User Security AVOIDING LOSS GAINING CONFIDENCE IN THE FACE OF TODAY S THREATS

Restech. User Security AVOIDING LOSS GAINING CONFIDENCE IN THE FACE OF TODAY S THREATS Restech User Security AVOIDING LOSS GAINING CONFIDENCE IN THE FACE OF TODAY S THREATS Your presenter: Vince Gremillion, CISSP 30+ years technical and customer service experience Founder/Co-Owner RESTECH

More information

IT & DATA SECURITY BREACH PREVENTION

IT & DATA SECURITY BREACH PREVENTION IT & DATA SECURITY BREACH PREVENTION A PRACTICAL GUIDE Part 1: Reducing Employee and Application Risks CONTENTS EMPLOYEES: IT security hygiene best practice APPLICATIONS: Make patching a priority AS CORPORATE

More information

IASA CONTINUING EDUCATION UNITS

IASA CONTINUING EDUCATION UNITS IASA CONTINUING EDUCATION UNITS This manual serves to outline the requirements, reporting structure, and options for earning your continuing education units. CONTENTS Overview... 2 Requirements... 2 Reporting...

More information

Critical Facilities Existing Building Commissioning (EBCx)

Critical Facilities Existing Building Commissioning (EBCx) Critical Facilities Existing Building Commissioning (EBCx) Tony DiLeonardo LEED AP, CxA President Wick Fisher White Tracey Jumper CCP President Jump Start Building Commissioning, LLC AIA Quality Assurance

More information

Getting Started with Social Media

Getting Started with Social Media Getting Started with Social Media Step 1: Go to www.facebook.com Step 2: Fill out the Sign Up form located on the homepage, including full name, e-mail address, a password and birthday, to start a free

More information

Meaningful Use or Meltdown: Is Your Electronic Health Record System Secure?

Meaningful Use or Meltdown: Is Your Electronic Health Record System Secure? SESSION ID: PDAC-R03 Meaningful Use or Meltdown: Is Your Electronic Health Record System Secure? Gib Sorebo Chief Cybersecurity Strategist Leidos @gibsorebo High Cost of Healthcare Data Breaches Source:

More information

Suicide Prevention: Putting Techniques into Practice and Case Conceptualization Half Day Workshops via Adobe Connect

Suicide Prevention: Putting Techniques into Practice and Case Conceptualization Half Day Workshops via Adobe Connect Suicide Prevention: Putting Techniques into Practice and Case Conceptualization Half Day Workshops via Adobe Connect Presented by the Center for Deployment Psychology for military/dod/gs providers only.

More information

Plenary Session: Branch Cybersecurity Controls Thursday, February 22 1:15 p.m. 2:15 p.m.

Plenary Session: Branch Cybersecurity Controls Thursday, February 22 1:15 p.m. 2:15 p.m. Plenary Session: Branch Cybersecurity Controls Thursday, February 22 1:15 p.m. 2:15 p.m. Cybersecurity is a top priority for the financial services industry. Firms dedicate significant resources every

More information

CYBERSECURITY IN THE POST ACUTE ARENA AGENDA

CYBERSECURITY IN THE POST ACUTE ARENA AGENDA CYBERSECURITY IN THE POST ACUTE ARENA AGENDA 2 Introductions 3 Assessing Your Organization 4 Prioritizing Your Review 5 206 Benchmarks and Breaches 6 Compliance 0 & Cybersecurity 0 7 Common Threats & Vulnerabilities

More information

Radiation Physics and Protection Series Units 1 12 DVD Format

Radiation Physics and Protection Series Units 1 12 DVD Format Radiation Physics and Protection Series Units 1 12 DVD Format Prepared by: Carolyn J. Frigmanski, M.A., B.S.R.T. Founder, S.T.A.R.S. All post tests must be returned for the designated number of Ohio Department

More information

Personal Cybersecurity

Personal Cybersecurity Personal Cybersecurity The Basic Principles Jeremiah School, CEO How big is the issue? 9 8 7 6 5 4 3 2 1 Estimated global damages in 2018 0 2016 2018 2020 2022 2024 2026 2028 2030 Internet Users Billions

More information

CYBERSECURITY HOW IT IS TRANSFORMING THE IT ASSURANCE FIELD

CYBERSECURITY HOW IT IS TRANSFORMING THE IT ASSURANCE FIELD CYBERSECURITY HOW IT IS TRANSFORMING THE IT ASSURANCE FIELD December 2014 KEVIN GROOM ISACA Involvement (Middle Tennessee Chapter) Treasurer (2009 2011) Vice President (2011 2013) President (2013 present)

More information

Seven secrets to making the most of your computer system. Chris Jeffery Proprietor/Chief Guru CyberGuru

Seven secrets to making the most of your computer system. Chris Jeffery Proprietor/Chief Guru CyberGuru Seven secrets to making the most of your computer system Chris Jeffery Proprietor/Chief Guru CyberGuru 1. Backups If your computer died tomorrow how would your business cope? The cost of data recovery

More information

OPERATIONS CENTER. Keep your client s data safe and business going & growing with SOC continuous protection

OPERATIONS CENTER. Keep your client s data safe and business going & growing with SOC continuous protection SECURITY OPERATIONS CENTER Keep your client s data safe and business going & growing with SOC continuous protection Business Need of Security Operations Center SOC Benefits NOC vs SOC UnderDefense Incident

More information

Welcome. Password Management & Public Wi-Fi Security. Hosted by: Content by:

Welcome. Password Management & Public Wi-Fi Security. Hosted by: Content by: Welcome Password Management & Public Wi-Fi Security Hosted by: Content by: Presenter: Ray Cool, CEO PBSI Technology Solutions Webinar will begin at 1:00 Welcome Foster & Motley Clients to Security Education

More information

OPERATIONS CERTIFICATE ENTRANCE EXAM

OPERATIONS CERTIFICATE ENTRANCE EXAM Welcome to the Apexus Advanced 340B Operations Certificate Program. Congratulations on choosing to validate your 340B expertise with the leading certification program in the industry. This user s guide

More information

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS WELCOME SANS Institute is presenting the SANS VetSuccess Immersion Academy in the DC Metro area. For transitioning

More information

Optimizing the Existing Building Cx Process:

Optimizing the Existing Building Cx Process: Optimizing the Existing Building Cx Process: Integrating EBCx into ESPCs Lia Webster, P.E. Senior Engineer Portland Energy Conservation, Inc. AIA Quality Assurance Learning Objectives 1. Identify ways

More information

National Crime Prevention Specialist

National Crime Prevention Specialist National Crime Prevention Specialist Certification Guidelines National Crime Prevention Association 2614 Chapel Lake Drive Suite B Gambrills, MD 21054 Tel: 443-292-4565 National Crime Prevention Association

More information

Security at the Digital Cocktail Party. Social Networking meets IAM

Security at the Digital Cocktail Party. Social Networking meets IAM Security at the Digital Cocktail Party Social Networking meets IAM What I m going to talk about Social Networking and its benefits Social Networking is an Identity Management System But not always a very

More information

Active Social Engineering Defense (ASED)

Active Social Engineering Defense (ASED) Active Social Engineering Defense (ASED) Wade Shen/I2O Approved for Public Release, Distribution Unlimited 1 ASED Goal Automatically identify, disrupt and investigate spear-phishing and social engineering

More information

The GenCyber Program. By Chris Ralph

The GenCyber Program. By Chris Ralph The GenCyber Program By Chris Ralph The Mission of GenCyber Provide a cybersecurity camp experience for students and teachers at the K-12 level. The primary goal of the program is to increase interest

More information

How to tell if you are being cyber stalked or hacked BCS, September 2017

How to tell if you are being cyber stalked or hacked BCS, September 2017 How to tell if you are being cyber stalked or hacked BCS, September 2017 Paul Vlissidis - Technical Director, Senior Advisor paul.vlissidis@nccgroup.trust Welcome Speaker Paul Vlissidis, Technical Director,

More information

Protecting Your Business From Hackers

Protecting Your Business From Hackers Protecting Your Business From Hackers Technology Has Changed Real Estate Today, consumers have access to vast troves of information that enable them to make decisions faster than ever before Real estate

More information

Security Awareness. Presented by OSU Institute of Technology

Security Awareness. Presented by OSU Institute of Technology Security Awareness Presented by OSU Institute of Technology Information Technologies Division Security Awareness Topics Social Engineering Phishing Social Networks Displaying Sensitive Information Wireless

More information

Using Recert to Track Your Recertification Progress

Using Recert to Track Your Recertification Progress Using Recert to Track Your Recertification Progress Prehospital recertification requirements are constantly evolving and can be difficult to track. Recert is an online continuing education service designed

More information

CYBER THREATS: REAL ESTATE FRAUD ADVISORY COUNCIL

CYBER THREATS: REAL ESTATE FRAUD ADVISORY COUNCIL CYBER THREATS: REAL ESTATE FRAUD ADVISORY COUNCIL RAHUL GUPTA SENIOR DEPUTY DISTRICT ATTORNEY ORANGE COUNTY DISTRICT ATTORNEYS OFFICE CELL: 714-345-7722 EMAIL: rahul.gupta@da.ocgov.com DAVE WHITE INVESTIGATOR

More information

Fraud and Social Engineering in Community Banks

Fraud and Social Engineering in Community Banks Fraud and Social Engineering in Community Banks Information Security Trends and Strategies October 2, 2010 1 Our perspective LarsonAllen Started in 1953 with a goal of total client service Today, industry

More information

Preventing and Identifying Phishing Scams January 31, 2017

Preventing and Identifying Phishing Scams January 31, 2017 Preventing and Identifying Phishing Scams January 31, 2017 Agenda What is phishing? Does this really happen? Getting Caught in Phishing Scam Is it covered by insurance? Preventing phishing scams Available

More information

SECTION 2: PROGRAM IDENTIFICATION

SECTION 2: PROGRAM IDENTIFICATION UTAH REGISTRY FOR PROFESSIONAL DEVELOPMENT PROFESSIONAL DEVELOPMENT INCENTIVE APPLICATION SECTION 1: CANDIDATE IDENTIFICATION (Use through 7/1/2017 5/31/2018) DATE OF BIRTH / / FILL OUT PAGE 1 OF THE ATTACHED

More information

INSTRUCTOR CERTIFICATION PROGRAM

INSTRUCTOR CERTIFICATION PROGRAM ADDA International 105 East Main Street Newbern, TN 38059 Telephone 731-627-0802 INSTRUCTOR CERTIFICATION PROGRAM The ADDA Instructor Certification Program is designed to provide professional recognition

More information

YOUR CERTIFICATION IS ABOUT TO EXPIRE!

YOUR CERTIFICATION IS ABOUT TO EXPIRE! Certification Board for Sterile Processing and Distribution, Inc. 148 Main Street, Suite D-1, Lebanon, NJ 08833 Phone: 1-800-555-9765, E-mail: mailbox@sterileprocessing.org Web: www.sterileprocessing.org

More information

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS WELCOME SANS Institute is presenting the SANS VetSuccess Immersion Academy in San Diego. For transitioning

More information

I VE BEEN INFECTED! Ellen Freedman, CLM 2016 Freedman Consulting, Inc.

I VE BEEN INFECTED! Ellen Freedman, CLM 2016 Freedman Consulting, Inc. ! Ellen Freedman, CLM 2016 Two recent articles in ABA Journal entitled Lawyer resigns himself to paying ransom for release of computer files and Ransomware software attacks stymie law firms made their

More information

GUIDE TO KEEPING YOUR SOCIAL MEDIA ACCOUNTS SECURE

GUIDE TO KEEPING YOUR SOCIAL MEDIA ACCOUNTS SECURE GUIDE TO KEEPING YOUR SOCIAL MEDIA ACCOUNTS SECURE TABLE OF CONTENTS PROTECTIVE MEASURES... 2 PREPARATION CHECKLIST... 2 IF YOU SUSPECT YOUR ACCOUNT IS COMPROMISED, THE FOLLOWING ACTIONS ARE ADVISED:...

More information

Recognizing & Protecting Against Fraud

Recognizing & Protecting Against Fraud Fraud Mitigation and Cyber Strategies for Public Entities April 209 Recognizing & Protecting Against Fraud 2 Why is it Important to Remain Vigilant? Fraud does not discriminate it occurs everywhere, and

More information

Who We Are! Natalie Timpone

Who We Are! Natalie Timpone Who We Are! Natalie Timpone Manager of Security Business Management Office Enterprise Security Awareness Manager Carmelo Walsh Security, Risk, and Compliance Security Awareness Subject Matter Expert Who

More information

Electronic Communication of Personal Health Information

Electronic Communication of Personal Health Information Electronic Communication of Personal Health Information A presentation to the Porcupine Health Unit (Timmins, Ontario) May 11 th, 2017 Nicole Minutti, Health Policy Analyst Agenda 1. Protecting Privacy

More information

CSci530 Final Exam. Fall 2014

CSci530 Final Exam. Fall 2014 CSci530 Final Exam Fall 2014 Instructions: Show all work. No electronic devices are allowed. This exam is open book, open notes. You have 120 minutes to complete the exam. Please prepare your answers on

More information

Webomania Solutions Pvt. Ltd. 2017

Webomania Solutions Pvt. Ltd. 2017 The other name for link manipulation is Phishing or you can say link manipulation is type of phishing attack done generally to mislead the user to a replica website or a looka-like of some well-known site.

More information

SACPCMP GETTING STARTED GUIDE. Copyright PrivySeal Limited

SACPCMP GETTING STARTED GUIDE. Copyright PrivySeal Limited SACPCMP GETTING STARTED GUIDE GETTING STARTED Welcome to PrivySeal s Digital Accreditation Service. We verify your professional qualification to prove your expertise, build trust and help you win and retain

More information

OFFICE OF THE MEMBERSHIP SECRETARY

OFFICE OF THE MEMBERSHIP SECRETARY CA Department of Justice, Missing Persons DNA Program 1001 West Cutting Blvd, Suite 110 (510) 620-3571 FAX (510) 231-8744 email: Michelle.Halsing@doj.ca.gov Dear Applicant, Enclosed is the necessary application

More information