Practical Cyber Security for Architects of Small Firms (1 AIA CEU)

Similar documents
Professional Certification in the Commissioning Industry. Mike Eardley, PE, CCP Director of Commissioning services Cannon Design

AIA Iowa #A203. NCARB & You: IDP, ARE, & Certification Course Number. Ryan Misner, AIA, NCARB October 15, 2015

Cybersmart Buildings: Securing Your Investments in Connectivity and Automation

To Document or Not to Document: That is the Question DPLE 182

DISTRACTED DRIVING. The Biggest Issue in Driving Today

Smart Buildings, Towns and Cities: Part 1 #NG07

5 Things to Know About Certification

Please comply with the Lean Construction Institute s Usage Policies and Attribution Guidelines at

Norton Online Reputation Report: Why Millennials should manage their online footprint

Building new cybersecurity pipelines. NICE Conference 2017 November 8, Strengthening Cyber Workforce Development sans.

Mobile Security and Public Networks

Kronos Applicant Tracking System (ATS) Tutorial

PARALEGAL CERTIFICATIONS. National Professional Standard for Paralegals

PARALEGAL CERTIFICATIONS. National Professional Standard for Paralegals

GETTING STARTED THE BASICS

Doing More with Less: Maintaining, Operating, and Improving your BMS. Bernard Keister, V PE Senior Engineer Guttmann & Blaevoet Consulting Engineers

Dear Colleague, We are pleased to invite you to become a Charter Member of the National Association of Accessibility Consultants.

The Cyber War on Small Business

Maria Hishikawa MSIX Technical Lead Sarah Storms MSIX Contractor Security

Integrated Access Management Solutions. Access Televentures

Too Little Too Late: Top Reasons Why You Got Hacked

Getting Started with Real Magnet

Cybersecurity in 2016 and Lessons learned

Cybersecurity Guidance for Small Firms Thursday, November 8 9:00 a.m. 10:00 a.m.

Welcome. ScrogginsGrear clients. to Cybersecurity Education Series. Password Management & Public Wi-Fi Security

The CERT Top 10 List for Winning the Battle Against Insider Threats

Kutztown University of Pennsylvania PASSHE Alumni Satisfaction Survey Results Population: Alumni who graduated in

Trends in Data Center Energy Efficiency

How to Build a Culture of Security

How Cyber-Criminals Steal and Profit from your Data

Cyber Security. February 13, 2018 (webinar) February 15, 2018 (in-person)

BEST PRACTICES FOR PERSONAL Security

Getting Started with Cybersecurity

An Introduction to the CFA Institute. All Rights Reserved

Caribbean Cyber Security: Not Only Government s Responsibility

2018 GLOBAL CHANNEL PARTNER SURVEY THYCOTIC CHANNEL PARTNER SURVEY REPORT

Data Protection in Practice

The Insider Threat Center: Thwarting the Evil Insider

Governance Ideas Exchange

Getting Started 1. Welcome... Unsure of how to navigate your way through the Careers area of our website?

Security Practices & File Encryption

COUNTERING CYBER CHAOS WITH HIPAA COMPLIANCE. Presented by Paul R. Hales, J.D. May 8, 2017

How to Complete Your Online Recertification

Manually Create Phishing Page For Facebook 2014

Managing IT Risk: What Now and What to Look For. Presented By Tina Bode IT Assurance Services

Could the BIGGEST Threat to Your Business be INSIDE Your Company?

Ages Donʼt Fall for Fake: Activity 1 Don t bite that phishing hook! Goals for children. Letʼs talk

Quick Base Certification Overview

Overall Mission of Social Media Team

9 Steps to Protect Against Ransomware

Cybersecurity Panel: Cutting through Cybersecurity Hype with Practical Tips to Protect your Bank

Joe Stocker, CISSP, MCITP, VTSP Patriot Consulting

Give Me 5 Understanding Cyber Security Part 1: How Cyber Security is Impacting Your Business

Cyber security tips and self-assessment for business

A Comedy of Errors: Assessing and Managing the Human Element of Cyber Risk

PPAI Certification Information Session. Rachel Robichaud Director of Professional Development

The Credential Phishing Handbook. Why It Still Works and 4 Steps to Prevent It

STAY LINKED IN. #TrendingNow: Get Linked In on the Latest in Labor and Employment News NOV. Thursday, November 10, :00 am 5:00 pm

Restech. User Security AVOIDING LOSS GAINING CONFIDENCE IN THE FACE OF TODAY S THREATS

IT & DATA SECURITY BREACH PREVENTION

IASA CONTINUING EDUCATION UNITS

Critical Facilities Existing Building Commissioning (EBCx)

Getting Started with Social Media

Meaningful Use or Meltdown: Is Your Electronic Health Record System Secure?

Suicide Prevention: Putting Techniques into Practice and Case Conceptualization Half Day Workshops via Adobe Connect

Plenary Session: Branch Cybersecurity Controls Thursday, February 22 1:15 p.m. 2:15 p.m.

CYBERSECURITY IN THE POST ACUTE ARENA AGENDA

Radiation Physics and Protection Series Units 1 12 DVD Format

Personal Cybersecurity

CYBERSECURITY HOW IT IS TRANSFORMING THE IT ASSURANCE FIELD

Seven secrets to making the most of your computer system. Chris Jeffery Proprietor/Chief Guru CyberGuru

OPERATIONS CENTER. Keep your client s data safe and business going & growing with SOC continuous protection

Welcome. Password Management & Public Wi-Fi Security. Hosted by: Content by:

OPERATIONS CERTIFICATE ENTRANCE EXAM

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS

Optimizing the Existing Building Cx Process:

National Crime Prevention Specialist

Security at the Digital Cocktail Party. Social Networking meets IAM

Active Social Engineering Defense (ASED)

The GenCyber Program. By Chris Ralph

How to tell if you are being cyber stalked or hacked BCS, September 2017

Protecting Your Business From Hackers

Security Awareness. Presented by OSU Institute of Technology

Using Recert to Track Your Recertification Progress

CYBER THREATS: REAL ESTATE FRAUD ADVISORY COUNCIL

Fraud and Social Engineering in Community Banks

Preventing and Identifying Phishing Scams January 31, 2017

SECTION 2: PROGRAM IDENTIFICATION

INSTRUCTOR CERTIFICATION PROGRAM

YOUR CERTIFICATION IS ABOUT TO EXPIRE!

The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS

I VE BEEN INFECTED! Ellen Freedman, CLM 2016 Freedman Consulting, Inc.

GUIDE TO KEEPING YOUR SOCIAL MEDIA ACCOUNTS SECURE

Recognizing & Protecting Against Fraud

Who We Are! Natalie Timpone

Electronic Communication of Personal Health Information

CSci530 Final Exam. Fall 2014

Webomania Solutions Pvt. Ltd. 2017

SACPCMP GETTING STARTED GUIDE. Copyright PrivySeal Limited

OFFICE OF THE MEMBERSHIP SECRETARY

Transcription:

Practical Cyber Security for Architects of Small Firms (1 AIA CEU) with Angela Render Thunderpaw.com 571-331-5941

Transforming Architecture LLC is a Registered Provider with The American Institute of Architects Continuing Education Systems. Credit earned on completion of this program will be reported to CES Records for AIA members. Certificates of Completion for non-aia members are available on request. This program is registered with the AIA/CES for continuing professional education. As such, it does not include content that may be deemed or construed to be an approval or endorsement by the AIA of any material of construction or any method or manner of handling, using, distributing, or dealing in any material or product. Questions related to specific materials, methods, and services will be addressed at the conclusion of this presentation.

Copyright Materials This presentation is protected by US and International Copyright laws. Reproduction, distribution, display and use of the presentation without written permission of the speaker is prohibited. Transforming Architecture LLC 2009-12

Learning Objectives 1. Define what cyber warfare is and how it applies to individuals and small businesses. 2. Identify a cyber threat. 3. Defend against a cyber threat. 4. Respond to a cyber attack.

What is Cyber Warfare?

What is a Hacker?

Who is the Enemy?

Why Me?

I am convinced that there are only two types of companies: those that have been hacked and those that will be. And even they are converging into one category: companies that have been hacked and will be hacked again. Robert Mueller FBI Director

How do they attack?

Insider

Website

Email Attachments PDF EXE MOV DOCX PPT

SPAM

Social Engineering

Did You Know. Social Networking sites are preferred by hackers for social engineering?

+ + + Name Email Street Address Picture Friend s Names Pets Hobbies Interests + = Profession Employer Phone Number Co-Workers Access to you through Groups

Spear Phishing From: Tim Morlock (tim.morlock@yahoo.com) To: bill.williams@megacorp.com Subject: Nice to Meet You Dear Bill Williams, Thank you for the connection on LinkedIn. Like I mentioned, I m a new-hire at MegaCorp under Jim Pike in sales. Since he s out of town the next week and I m anxious to get to work, I wanted to know if I could get my email and VPN login to the system set up. Sincerely, Tim Morlock Assistant Account Rep. MegaCorp

Friends

What can I do? + +

Passwords Change every 6-12 months Use long passwords that are somewhat complex Use a unique password for each account

Free Email

Email Can Be Fake paranoia pays off. It is definitely a lesson in be careful what you open... even if looks to be coming from your boss, don t open a file if you aren t expecting it. - Reid Wightman, Digital Bond

Encrypted WiFi

Keep Sensitive Data Secure

Dispose of Old Hardware Securely

Write Up a Plan

Object Lesson Who is asking for my information? Do I trust them? Why do they need to know? Will it be kept secure? Could it be used in social engineering?

How is your corporate email handled? A dedicated server in our office A hosting company using our domain name (ourdomain.com) A free email provider (gmail, yahoo, etc) Some other solution Don't know

What do I do?

How do I know? Flaky behavior. Suspicious contacts. (Phone, Email) To you. Mentioned by your partners. Mentioned by your clients.

http://www.surveymonkey.com/s/j2n75hr Thunderpaw.com 571-331-5941

What is TA? The only franchise opportunity for registered architects in the US. 7 franchisees in Texas, Ohio, Maryland, Florida, Virginia and DC Our Mission: To build a professional community that provides clients value through Expertise, Education and Innovation.

Karen Pitsley, AIA Karen@TransformingArchitecture.com TransformingArchitecture.com (301) 776-2666 Angela Render Lioness@Thunderpaw.com Thunderpaw.com (571) 331-5941 Thank You