Cyber Hygiene and User Factors
Cybersecurity starts with all of us, and yet what the industry tells us to do about cybersecurity is often confusing, seems contradictory, and in some cases actually makes people more prone to mistakes. The best cyber hygiene advice tends to flow from physical security parallels and allows people to analyze new situations more objectively.
Ideally good hygiene is something we are taught from a young age, and is something that can stick with us our whole life. Both health and cyber hygiene involves three basic principles: using products and tools that help create or encourage better hygiene, performing these hygienic tasks correctly, and establishing a routine.
Join us as we talk with everyday users but with cybersecurity backgrounds, including students and professionals, as they talk about what techniques, philosophies, and tips they use to think about cybersecurity hygiene.
Thirteen year old Brandon Holland is a cyber-enthusiast. He has been going to cyber security conferences for the past 5 years and embraces every learning opportunity he gets. He won his first security competition when he was 11. This past year at the 2020 virtual Defcon he competed in two different security competitions. One was a teens-only competition which he won; the other was an adult competition in which he was the captain of the winning team. Outside of security, his fifth grade science fair project was Decrypting Cyphers with Python Programming. He has competed in many math and science competitions every year. He recently won the Academic Excellence award for his grade at school. Brandon has also been a key component in his basketball clubs for four years. He enjoys playing basketball, spending time with friends and family and, as expected, gaming.
Ms. Greene-Horace has extensive professional experience and has served leadership roles in both the federal government and private industry, in healthcare, privacy, cybersecurity, IT capital planning, audit, assessment, business continuity, and new program development.
She established the first federal Cybersecurity and Privacy office, for the establishment of the initial seventeen stand-alone State-Based Marketplaces (SBM), under the Affordable Care Act (ACA). She has developed federal compliance standard awareness training, in Cybersecurity and Privacy. The training was targeted at business entities, including health insurance carriers and web brokers, seeking to do business with the federal government, in order to offer enrollment services under the ACA. She also co-chaired the “Health” Plan Management Committee for the Commonwealth of Maryland, towards forming the Health Care Law, establishing the Maryland Health Connection, as commissioned by the Lieutenant Governor’s Office.
Ms. Greene-Horace earned a Bachelors in Health Care Administration from the Pennsylvania State University, a Master in Health Administration from Cornell University and an Executive Masters in Cybersecurity from Brown University. She serves as a volunteer to expose youth to professions within STEM, critical security languages, health care, and emerging tech fields.
Diana joined Bace Cybersecurity Institute to help honor and continue the legacy of security leadership and visionary work that Becky Bace directly inspired. Diana has been in cybersecurity for over 20 years, focusing on cutting edge research in both consulting areas (like penetration testing and security architecture design) as well as product research, resulting in multiple patents and commercial software packages. Those research efforts have been focused on both specialized problems including work for the government, as well as universal issues, like eliminating passwords and making security easier to use, that impact everyone. As executive director of BCI, Diana is the chief volunteer helping bring together our amazing members, experts, and volunteers to make the Internet safer for everyone.
Responding to COVID-19 Changing the Cybersecurity Landscape
Since the start of the COVID-19 pandemic we have seen a massive increase in cyber-attacks. In this webinar we discuss some of the measures people have taken to help those attacked while disabling some of the attacks. This is being done by companies and also by individual volunteers who have come together to create a taskforce to protect the people and institutions fighting these invisible attackers.
What We Can Learn to Better Prepare for the Next One
In this week's webinar, we discuss innovative methods we can use to gather a complete data set on these attacks, analysis techniques that might be useful in examining this data set and potential recommendations that will arise as a result of the analysis process, and what data is available now and why it's not enough. We also touch on how you can get involved to help now and what we can do to prepare for the future.