Cyber Readiness Training
[Company Name]
becyberready.com
cyberreadinessinstitute.org
What is Cyber Readiness?
Taking practical steps to prevent cyber attacks by focusing on human behavior related to four core issues and knowing what to do if an incident occurs. The goal is to create a culture of cyber readiness in your organization.
2
becyberready.com
cyberreadinessinstitute.org
Learning Objectives
3
becyberready.com
cyberreadinessinstitute.org
Meet your Cyber Leader
INSERT CYBER LEADER CONTACT INFO
As the Cyber Leader, my role is to positively influence human behavior, build awareness and gain your commitment to create a culture of cyber readiness from top to bottom.
4
becyberready.com
cyberreadinessinstitute.org
Introduction to the Core Four
Our cyber policies are focused on four key policy areas because they are both the cause of most cyber issues and easiest to prevent.
These requirements are meant to apply to all employees and contractors accessing company systems and networks on all devices including computers, phones, and tablets. This applies to company-issued devices and personal devices.
5
becyberready.com
cyberreadinessinstitute.org
Passwords+
The first line of defense against opportunistic hackers is strong authentication, consisting of long passwords and the use of multi-factor authentication (MFA). Enabling strong authentication takes just a few moments and is a key part of good cyber hygiene. An organizational commitment to using strong authentication practices will ensure only the right people have access to the right systems, resources, and information.
Passwords+ Facts:
Here’s a short video that will tell you about the importance of a strong password and the use of multi-factor authentication.
6
becyberready.com
cyberreadinessinstitute.org
ORG NAME Passwords+ Policy
Insert your organizations Passwords+ Policy
7
becyberready.com
cyberreadinessinstitute.org
Software Updates
Most cyber-attacks target systems with known vulnerabilities. Regularly updating your software ensures that the latest security features are working for you.
Software Update Facts:
Here’s a short video that will tell you about the importance of software updates.
8
becyberready.com
cyberreadinessinstitute.org
ORG NAME Software Update Policy
Insert your organizations Software Updates Policy
9
becyberready.com
cyberreadinessinstitute.org
Phishing
Phishing uses deceptive messages to gain access to an organization’s network and data. Anyone with an email account or smartphone can put your organization at risk by clicking on links in phishing messages. To decrease the risk of a successful phishing attempt employees must complete proper awareness training on a regular basis to stay updated on the evolving nature of this threat.
Phishing Stats:
Here’s a short video that will tell you about the importance of making your workforce aware of phishing emails and how to spot them.
10
becyberready.com
cyberreadinessinstitute.org
ORG NAME Phishing Policy
Insert your organizations Phishing policy
11
becyberready.com
cyberreadinessinstitute.org
Secure Storage & Sharing
USBs and other forms of removable media are a common carrier of viruses and malware. Setting strong policies and guidance for USBs and removable media will help keep data secure and avoid unnecessary attacks. With cloud storage, your organization can store data on the Internet through a provider who manages and operates data storage as a service.
Secure Storage and Sharing Facts:
Here’s a short video that will tell you about the importance of secure file sharing and some of the common dangers of using USBs and removable media.
12
becyberready.com
cyberreadinessinstitute.org
ORG NAME Secure Storage & Sharing Policy
Insert your organizations Secure Storage & Sharing policy
13
becyberready.com
cyberreadinessinstitute.org
Business Continuity Plan
A business continuity plan provides a company the opportunity to plan for the capability of your company to continue the delivery of products and services within acceptable time frames at predefined capacity during a disruption. Our plan will support strategic objectives, protect our reputation and credibility, and enable you to remain resilient in the face of a cyber attack.
Developing this plan will helps us get ahead of the threat. There are three main elements to your incident response:
Some questions you will need to ask when developing your plan include:
14
becyberready.com
cyberreadinessinstitute.org
Why we need a Business Continuity Plan?
Business Continuity Plan Stats:
Here’s a short video that will tell you about the importance of a business continuity plan.
15
becyberready.com
cyberreadinessinstitute.org
Cyber Readiness Quiz
16
becyberready.com
cyberreadinessinstitute.org
ORG NAME Cyber Leader Contact Information
Insert Cyber Leader Contact Information
17
becyberready.com
cyberreadinessinstitute.org