Transcript: Cybersecurity: Stepping towards Change Cybersecurity Today The cybersecurity caucus was created in Sept 2008. Legislation passed to create a cybersecurity division under the DHS According to Symantec, between 2015 and 2017, the U.S. was the country most affected by targeted cyber attacks with 303 known large-scale attacks. Minimal Public Awareness National National Cybersecurity Protection Advancement Act of 2015 Cybersecurity Information Sharing Act (CISA) Computer Fraud and Abuse Act Gramm-Leach-Bliley Act (GLBA) Stored Communications Act CLOUD Act CALEA(Digital Telephony Act) Existing Federal Acts Existing Laws Resources for approved software on Homeland Security webpage Microsoft started offering malware protection after incidents (wannacry) Stepping towards free Anti-virus software Existing Measures Education + free resources + educated Lawmakers Required Changes Consortium of School Networking DFS- Cybersecurity Regulation (NYCRR 500)-requires organizations to maintain a cybersecurity program that protects consumer data New York Statewide California California's Consumer Privacy Act and Infromation Privacy:Connected Devices Act Precedence Division of Cyber Laws Cyberlaws come under 3 main realms: (1) Computer Fraud (2) Threat against government and national security (3) Privacy Act We have chosen to study more into threats against US and government security Created in 1980s when email was still new was meant at the time to apply specifically to email Continues to this day without modifications apt to developing technology allows government access to our personal content under ISP Example: an opened email that is over 60 days old is accessible to the govt. Storage Communications Act Storage Communications Act No standardized methods of communication or education on cybersecurity protocols Homeland security provides lists of accessible resources and software, but no educational info NY state ITS dept provides some information and classes for youth in the state Lawmakers, public, tech users, are not updated on security measures as technology grows Little Education and Resources Lack of Tech Education Case Study Notorious Cases in recent US History Equifax cyber-attack in 2017 Wannacry ransomware cyber-attack in 2017 Malicious hacker stole personal data of consumers including government identification and credit information Equifax kept it quiet with attack took place over few months 150 million users affected... Equifax Demanded bitcoin currency in ransom Self-spread without even need to click Allowed a remote hacker to hijack computers running on unpatched Microsoft Windows operating system https://thehackernews.com/2017/05/how-to-wannacry-ransomware.html Affected about 200,000 Windows PCs across 150 countries Wannacry Interviews Professional Opinions Two Critical Parts to enabling a solution and change: Legal: Why such laws exist against personal security? How can cyberlaws change? Users/ Educators: what kind of protocols are in place? What resources we have access to? Found that it is possible to change such laws if Congress wanted could happen in the matter of days Contention behind change has to do with different understandings of the Constitution -- Fourth Amendment Systems have been built off the Storage Communications Act change can cause unemployment can cause loss of ISP protection court cases could lose critical evidence Lawyers are not required to have a tech understanding or education Lawyer and Professor from Columbia Law Lawmakers Annual educational trainings about computer safety tested this learning via fake email Applications/software is auto-updated by the Cybersecurity team List of applications/webpages that are prohibited from access Prohibited port access to any computer/laptop Preventative antivirus and security software is systemized Sr Cybersecurity Analyst in ConEdison Tech Users/ Educators Campaign Promises Cybersecurity and Politics The 2020 campaign officers are being trained by DHS (two factor authentication and encrypted messaging Rep.Sheila Jackson Lee from TX has been pushing for several new legislations recently this bill introduced to create a standard for IoT devices CISPA( Cyber Intelligence Sharing and Protection Act CISPA Act a proposed law, which would allow for the sharing of Internet traffic information between the U.S. government and technology and manufacturing companies. Talking point for candidates Future Work ! Improvements and Suggestions Better basic cybersecurity education National Campaigns regarding cyber safety Introduce thorough legislation to meet current technological standards Education Awareness Legislation
Transcript: Body Body Argument Essay Introduction A) Persuasive intro B) Discuss the issue - give a history of the issue with the traditional positions involved - the side you’re not arguing for first. C) A very clear point of your thesis. (localized issue has a more known about knowledge from your a - It will be something you will care about. Doesn’t mean you have to care about the topic at first hand. Use Amusing Anecdote At The End of the Argument Doesn’t have to go through all of it for each issue Just know where you stand Be mindful of it being coherent and sequenced with its evidence. Win your audience by persuasion, start at the bottom up If your aim is to be righteous then start w/strong arguments then add in stories You’re Arguing That It Is Superior To Do It That Way Superior to a yes or no. Has to Have Other People's Issues Notes Audience: Those that will agree with me. Why Being a Buddhist in a Westernized Country in the new world isn’t all that cracked up to be? Why Buddhist Feel like a Minority in a Western Country? An anticipatory refutation is to anticipate the best argument - Make them come to the microphone without legs Rationalize your weakest point in your argument. where you feel most vulnerable. There will be a point in your argument where you will be counter attacked and the worst you can let happen is being unaware of it. For most, end the paper with some kind of call to action Other Argument Topics Evidence Comes in a Hierarchy of Evidence (some evidence is better than others) Present it in a way that it is coherent and persuasive 1. Scientific evidence 2. Accepted fact 3. Expert testimonial 4. “I Witness” traditions, cultural mores 5. Gossip “heard…” Presentation of Evidence - not a simple matter Evidence changes in its valuation over time. Its not the same throughout all time Back it up with current evidence. Apprehend and demonstrate ie. 1800 “i witness” testimony ie. 2014 “i witness” won’t get you a conviction but DNA Arguing Template Conclusion
Transcript: INTRODUCTION Introduce your project here FIRST TOPIC Types of Cyber Threats Insert your content anywhere Types of Cyber Threats to present all the details ADD SUBTOPICS data 1 data 2 data 3 It's been a good year! MEET THE NEW TEAM Who is the Boss? MEET THE TEAM PROJECT ANALYSIS Insert Your Content Text Videos Images Symbols Change the Layout and Colors Change the Layout and Colors Change the Layout and Colors CONTACT INFORMATION How do people find you? CONTACT DETAILS
Transcript: Young people are gardening too! Reach them Interest them Engage them We are partners in their gardening success! Once we attract them, we have to keep their interest with fresh ideas & relevant content, inspire them with a catalog they want to live in, and impress them with a website they view as a trusted source of knowledge. Greater brand awareness: gardeners of all ages know who we are! Expanded customer base: our current core demographic is still loyal but comprises a smaller percentage of the whole. Increased demand: since we have added a new group of customers to our file, total demand has increased and the employee-owners are happy! Partnerships with brands our target customers love and trust Advertising where it counts As much as we know we need new customers, we also do not want to alienate our current customers. Some concepts are riskier than others so we will provide ideas of different options. Throughout our presentation, there will be a theme of three options for each major idea. They are all independent of each other, so GSC can pick and choose what we want to pursue and test. The dream: these will be the most radical ideas that carry the most risk Middle of the road: less risk than the dream, but probably not as snazzy Fail fast, fail cheap: there are ideas we are confident GSC can test without compromising the performance of our core demographic Now that we have them, we need to retain them and remain relevant as they evolve as gardeners. Our concept Fresh creative approach Relevancy emails More stories about good works and real people on our website Let's celebrate our awesome guarantee by shouting it from the rooftops! Great service should be synonymous with the GSC brand so both our experienced and new-to-gardening customers aren't afraid to fail in the garden. Results Acquisition and brand awareness Customers are the roots of a successful business. We have to do a better job of attracting and retaining the younger demographic so they can grow into the gardeners we can support for a lifetime. Foundation Our guarantee Innovative, foolproof products at various price points Increased social media presence Faster, cheaper shipping Loyalty programs
Transcript: University of Florida - Audit Report 11/30/2017 Abstract Although current procedural and reporting requirements may potentially change for University of Florida Health Science Center, the current audit performed was designed to evaluate and test compliance with established policies in the organization currently. Abstract General Provisions FOCUS AREA 1 THE PROBLEM THE PROBLEM 100 300 500 700 900 1100 1300 1500 1700 2007 2017 2012 2004 THE PLAN THE PLAN THE TIMELINE THE TIMELINE 2007 2011 2014 2017 CONTINGENCY CONTINGENCY THE PROBLEM THE PROBLEM 100 300 500 700 900 1100 1300 1500 1700 2007 2017 2012 2004 THE PLAN THE PLAN THE TIMELINE THE TIMELINE 2007 2011 2014 2017 FOCUS AREA 1 FOCUS AREA 1 THE PROBLEM THE PROBLEM 100 300 500 700 900 1100 1300 1500 1700 2007 2017 2012 2004 THE PLAN THE PLAN THE TIMELINE THE TIMELINE 2007 2011 2014 2017 FOCUS AREA 1 FOCUS AREA 1 THE PROBLEM THE PROBLEM 100 300 500 700 900 1100 1300 1500 1700 2007 2017 2012 2004 THE PLAN THE PLAN THE TIMELINE THE TIMELINE 2007 2011 2014 2017 FOCUS AREA 1 FOCUS AREA 1 THE PROBLEM THE PROBLEM 100 300 500 700 900 1100 1300 1500 1700 2007 2017 2012 2004 THE PLAN THE PLAN THE TIMELINE THE TIMELINE 2007 2011 2014 2017
Transcript: Scheduled to be printed within the next week Scheduled to be recorded after thanksgiving break Danielle Flynn Wordpress will be an ongoing process Posters Eddie Young Slogans Three Poster Idea's Spoke With Transportation Services we are on top of it Designed the posters Shannon Mellen Jon Taylor or Coming soon Commercials Two Idea's Lion King Websites Our Marketing projects will help: Organized who's doing what Two people talking about the nights plan Create a buz about the Center Provide sample advertising for future performances and shows Convince surounding towns that the Tre Ponti Center will be a benifitial addition to the area's local entertainment Tre-ponti center Bridging the gap between the seacoast and popular entertainment Please direct any questions to steve and ryan are important General poster about the center What we have done so far Logo's Facebook will be completed by the end of the week Thought of a few Slogans Broadway Show Logo's Gordon O’Hearne Facebook Page Alexa Dufault Tre Ponti Kenny Chesney Sierra Thresher Pamphlets Wordpress preview Tre-ponti center - Bridging the gap of seacoast entertainment Concert poster Project Outline Thought of commercial ideas Tre-ponti center bridging together the seacoast and performaing arts Taylor Hodges Conclusion
Transcript: Japanese Cybersecurity Policy What is the government's role? Introduction Basic Cybersecurity Act Japanese Government's Role in Cybersecurity Article 15: Requires the state to promote awareness of the importance of cybersecurity Government needs to provide necessary information, advice and other necessary measures to private business operators and educational and research institutions to protect the intellectual property information held by them Article 14: Requires the state to take necessary measures such as developing basic standards to be followed, providing drills, training and promoting information sharing and other voluntary efforts What is the private sector's view? Japan: 55% US: 80% Japan: 27% US: 78% Cost: 63% Investment: 18% How much do they invest in cybersecurity? 1. Not a requirement to ensure cybersecurity Government don't have the power to impose any mandatory obligations on private business operators to ensure cybersecurity. Why isn't it working ? 2. Not a requirement to report any cyberattacks There is no law or regulation that requires a private business to report any cyberattacks. No penalty is imposed on it in the event of a failure to make such report. Challenges Challenge 1. The government cannot make the regulation legally binding 2. Not all businesses are aware of the importance of cybersecurity Areas for growth • Promote importance of cybersecurity to the senior executives • Create a culture that investment in cybersecurity is a norm • Increase amount of information-sharing platforms that are government entities • Both government and private sectors can benefit • Increase amount of money invested in R&D for cybersecurity Recommendation Raise awareness of cybersecurity in Japan, explain the cyberthreat landscape and best practices 1. Make business executives aware Describe potential risks from business strategy and risk management perspectives by using simple, easy-to-digest terms. Example: Government conducting programs for businesses executives NYSE analyzes companies cybersecurity during the M&A process Low cybersecurity = lower price 1. Need more Information Sharing and Analysis Centers (ISACs) Japan has 6 ISACs (Auto ISAC, NCC/ Communication ISAC, Financial Services ISAC, Information Technology ISAC, Electricity ISAC, and ICT ISAC) US has 23 ISACs 2. Information Sharing To strengthen cybersecurity, sharing information between public and private sectors and across different sectors in various forms of communication is necessary 2. Create more cross-sector industry forums Japan: 48 companies are working to increase cybersecurity capacity Japanese government should invest more into R&D for cybersecurity 3. Investment in R&D The U.S. government has traditionally been effective in using R&D funding to stimulate innovation and has established effective ways of technology expansion. The Japanese government needs to be more committed to its domestic cybersecurity industry and can learn how to do so by studying the U.S. experience. Become part of government official or lawyer to change the Basic Cyber Act What can YOU do? Work for a company and inform the importance of investing in cybersecurity Vote for government officials who are aware of the importance of cybersecurity Questions? Thank you! Reference
Transcript: CyberSecurity With TotalAV Simpsons did it Hook, Introductions and Agenda Introduction Did you know that Cofense’s Phishing Threat and Malware Review of 2019 found that almost 74% of phishing attacks between October 2018 and March 2019 involved credential phishing, which is the stealing of usernames and passwords. These attacks can be difficult to stop as the emails typically show no signs of being malicious. And many actually originate from hijacked business email accounts. We are team Simpsons did it, we are comprised of: Eric Mangual Antonio Libertino Kenny Cowley Faith Paddon Ryan Rice Today we will be discussing: Our Clients business The current issues with the business Our recommended technology and why The cost, training, and implementation Closing and Re-cap Leslie's Lucky Leprechauns The reason we choose Leslie's was because her business was compromised due to lack of cybersecurity She then had to salvage her customer’s relationships and retain her business. Clients Name So she hired us and our purpose is to bring a relevant technology to Leslie and her business, at a reasonable price It will be feasible for a SME in order to prevent future hackers! And we wanted to earn that Pot of Gold! Clients Business and Current Issue Clients Business and Current Issue Leslie’s Lucky Leprechauns is a gardening tent that sells living four leaf clovers nestled in planting pots shortly before St. Patrick’s Day she also serves the most amazing clover tea (which happens to be illegal in 15 states) Her current issue is her business was recently a victim of a phishing scam and her customer data was compromised! The technology we choose is....... Tech: TotalAV Our Technology: TotalAV We recommend TotalAV because it was the #1 Ranked Anti-virus March 2020. Fast, Award Winning Anti-virus, Removes All Viruses, Malware, Ad-ware & Spy-ware. Includes Internet Security, Ransom-ware, & Phishing Protection. TotalAV is feasible for SME because blocks the latest phishing URLs to protect you against the scams, which Leslie's has had a major problem with Deals in protection against Ad-ware & Spy-ware as well which defends you from software, designed to steal personal information such as card info, login info, etc. Cost/Training/Implementation Cost Currently $29, for 3 devices regularly it is $99, you're saving $70! if you buy now! Currently $39,devices regularly it is $119, you're saving $80! if you buy now! Currently $59, for 6 devices regularly it is $149, you're saving $90! if you buy now! BEST DEAL! Packages per Plan! Training/Implementing Simple Interface that you just have to download on all devices and review their easy to follow interactive website, essentially, no training required and you get great results We will implement the simple to use application, on all available devices, iPhone,iPad, Android, Mac and Windows that our client may have For small to medium businesses add on for 15 additional devices for just $30 Closing Closing Today we discussed: Our Clients business, Leslie's Lucky Leprechauns The current issues with the business, being the lack of cybersecurity and phishing Our recommended technology and why, TotalAV because it was the #1 ranked anti-virus in March of 2020 and provides a system that blocks the latest phishing URLs to protect you against the scams, which is the reason Leslie hired us for our services. The cost, which the best deal is currently $59 for 6 devices and there is an added plan for SME businesses that provides an additional 15 devices for $30 currently The training and implementation, which is an easy to easy application that just has to be downloaded on all devices Closing Statement • “if there are any points that require further clarification, we’ll address those now, if not, thank you for your time!”
Description: Rise way above the stacks and stacks of two-dimensional paper resumes on the hiring manager’s desk with a Prezi resume template. Simply personalize this Prezi presentation template to create your very own “Prezume” and impress them with your dynamism, originality, and cool.
Description: A well-organized lesson plan is the difference between getting things done and things getting out of hand. This vibrant, customizable, easy-to-use Prezi presentation template features a sticky note theme, so you'll be able to keep track of topics, assignments, exams, and more without missing a beat.
Description: How do you stand out from the stacks of resumes on your prospective employer’s desk? With a Prezi resume template, of course! Create your own “Prezume” and and impress them with your cutting-edge dynamism and cool. All Prezi presentation templates are easy to customize.
Description: For program proposals, grant requests, or any other nonprofit or education presentation, this beautiful world map-inspired creative Prezi template will engage and captivate your audience. All Prezi education templates and Prezi nonprofit templates are easy to customize.
Now you can make any subject more engaging and memorable