Purpose “To help Ohio businesses fight back against data security threats.”
What Threat?
Goal “To create the best legal, technical, and collaborative cybersecurity environment possible in Ohio.”
Skimming http://krebsonsecurity.com/2016/06/how-to-spot-ingenico-self-checkout-skimmers/
Cyber Ohio is a collection of Initiatives
Internal Working Groups Legal Technical Training/Materials Events
Propose Legislation
Technical - Threat Information Share
Workforce Development
Small Business Focus
Trainings to come… Your Digital Footprint – LE edition Your Digital Footprint – Attorney edition HIPAA HITECH Gramm Leach Bliley Act Stored Communications Act Top Cyber Threats Overview Social Engineering 101
Cyber and Privacy Unit Legal Technical Training
External Advisory Board
CyberOhio Business Summit
Cybersecurity Practices of Small Businesses 63% Have no formal Do not feel their cybersecurity plan company would be Have experienced at affected by a cyber least one type of attack. cyber attack. 40% 79%
Common Threats Malicious Downloads, Phishing Attachments, and Links Ransomware Skimming Third Party Vendors Human Error
Human Error
Detecting Phishing
Actions of Cybersecurity 1. IDENTIFY RECOVER IDENTIFY 2. PROTECT 3. DETECT RESPOND PROTECT 4. RESPOND 5. RECOVER DETECT
Planning Ahead MONT NTH YEAR DAY • Retain & Dispose • Cybersecurity Policy & • Check & Control Procedure Permission Levels • Consult An IT Expert • Identify Your IT Experts • Check Your Locks • Employee Training • Update Passwords
Cybersecurity is a journey, not a destination…
We Want To Help!
Anil Patel anil.patel@ohioattorneygeneral.gov Jessica Stall jessica.stall@ohioattorneygeneral.gov
Kim Murnieks
Recommend
More recommend