Purpose To help Ohio businesses fight back against data security - - PowerPoint PPT Presentation

purpose to help ohio businesses fight back against data
SMART_READER_LITE
LIVE PREVIEW

Purpose To help Ohio businesses fight back against data security - - PowerPoint PPT Presentation

Purpose To help Ohio businesses fight back against data security threats. What Threat? Goal To create the best legal, technical, and collaborative cybersecurity environment possible in Ohio. Skimming


slide-1
SLIDE 1
slide-2
SLIDE 2

Purpose “To help Ohio businesses fight back against data security threats.”

slide-3
SLIDE 3

What Threat?

slide-4
SLIDE 4

Goal “To create the best legal, technical, and collaborative cybersecurity environment possible in Ohio.”

slide-5
SLIDE 5

Skimming

http://krebsonsecurity.com/2016/06/how-to-spot-ingenico-self-checkout-skimmers/

slide-6
SLIDE 6

Cyber Ohio is a collection of Initiatives

slide-7
SLIDE 7

Internal Working Groups

Legal Technical Training/Materials Events

slide-8
SLIDE 8

Propose Legislation

slide-9
SLIDE 9

Technical - Threat Information Share

slide-10
SLIDE 10

Workforce Development

slide-11
SLIDE 11

Small Business Focus

slide-12
SLIDE 12

Trainings to come…

Your Digital Footprint – LE edition Your Digital Footprint – Attorney edition HIPAA HITECH Gramm Leach Bliley Act Stored Communications Act Top Cyber Threats Overview Social Engineering 101

slide-13
SLIDE 13

Cyber and Privacy Unit

Legal Technical Training

slide-14
SLIDE 14

External Advisory Board

slide-15
SLIDE 15

CyberOhio Business Summit

slide-16
SLIDE 16

Cybersecurity Practices of Small Businesses

Have no formal cybersecurity plan Have experienced at least one type of cyber attack. Do not feel their company would be affected by a cyber attack.

79% 40% 63%

slide-17
SLIDE 17

Common Threats

Phishing Malicious Downloads, Attachments, and Links Ransomware Skimming Third Party Vendors Human Error

slide-18
SLIDE 18

Human Error

slide-19
SLIDE 19

Detecting Phishing

slide-20
SLIDE 20

IDENTIFY PROTECT DETECT RESPOND RECOVER

Actions of Cybersecurity

  • 1. IDENTIFY
  • 2. PROTECT
  • 3. DETECT
  • 4. RESPOND
  • 5. RECOVER
slide-21
SLIDE 21

Planning Ahead

DAY

  • Check & Control

Permission Levels

  • Check Your Locks
  • Update Passwords

MONT NTH

  • Retain & Dispose
  • Consult An IT Expert
  • Employee Training

YEAR

  • Cybersecurity Policy &

Procedure

  • Identify Your IT Experts
slide-22
SLIDE 22

Cybersecurity is a journey, not a destination…

slide-23
SLIDE 23

We Want To Help!

slide-24
SLIDE 24

Anil Patel anil.patel@ohioattorneygeneral.gov Jessica Stall jessica.stall@ohioattorneygeneral.gov

slide-25
SLIDE 25

Kim Murnieks