Presentation ON Cybersecurity Awareness
Presentation ON Cybersecurity Awareness
AWARENESS
Agenda:
● Introductions
● Current Local Trends
● Common Types of Cyber Attacks
● Best Practices
● Resources
● Questions
Presenters
Captain Lawrence
San Diego Sheriff City of Encinitas
Jessica Contreras
City of Encinitas IT Director
Infragard SD Cyber Council
Darren Bennett
Former FBI Cyber / San Diego CISO
Infragard SD Cyber Council
Cameron Matthews
Nth Generation
Virtual CISO
Introduction to Cybersecurity
Cybersecurity is the process of protecting your digital information and
computer systems from cybercriminals.
● The average cost of recovering from a cyber incident was over $1.8M in 2022
(Forbes)
In 2022, over 800,000 complaints were received by the FBI’s Internet Crime Complaint Center (IC3). This is a 5% decrease from 2021. However, the total loss as grown from $6.9
billion in 2021 to more than $10.2 billion in 2022.
Supply chain attacks are a major concern - SolarWinds Attack has over 30,000 victim organizations to date
Cloud Security Misconfiguration is a growing trend - If you store your data in the Cloud, you may still be responsible for its security
Threats from Nation State Actors is on the rise - Russian, North Korean, Iranian and Chinese - affiliated groups are using ransomware to fund war, nuclear programs and gather
intelligence.
● NIST 800-53
https://nvlpubs.nist.gov/nistpubs/SpecialPublications
/NIST.SP.800-53r5.pdf
@fterTheB3@chW33@tBurritos
Multi Factor Authentication (MFA)
MFA requires a minimum of two pieces of information to access a system
such as a password and a code texted to your phone.
● Vendor Name
● Vendor Contact Information
● Make/Model
● Version
● What is AI?
● AI is a double edged sword
● It is VERY difficult (if not impossible) to
get back sensitive information once
entered into ChatGPT/Google Bard
● Need governance and policies in place
● Users need guidance on what is ok to
share with AI systems and what is not.
Checkout AI policy frameworks shared
online - Google “AI policy examples”
Training
The methods that will most effectively minimize the ability of intruders to compromise
information security are comprehensive user training and education. - Kevin Mitnick
● Make sure to train yourself & your staff on these best practices!
● CISA | StopRansomware.gov
● Local Colleges
Cybersecurity Resources
CISA www.cisa.gov
https://www.cisa.gov/cyber-guidance-small-businesses
Action plan for small and medium sized businesses to create a secure environment and security culture within their companies.
https://www.cisa.gov/audiences/small-and-medium-businesses
Free tools and information that will help get your business into what we call a more secure cyber posture.
https://www.cisa.gov/about/regions/region-9
StopRansomware.gov
one stop location for tools and resources to combat ransomware