Time
2 hours 13 minutes
Difficulty
Beginner
CEU/CPE
2

Video Transcription

00:06
Welcome to the Apollo, out to a network Cyber Security Academy, Secure Business Systems Administration presentation on employee cybersecurity challenges and how to effectively respond to those challenges.
00:18
It's generally accepted that employees present the most significant cybersecurity threat as they're already trusted, and there are already able to access. Resource is from within the company's boundaries.
00:33
The pervasive use of personal devices and employee collaboration via personal social media accounts presents significant cybersecurity risks that a security administrator must address.
00:49
Employees also present security challenges as they may often ignore or try to circumvent existing security protocols.
00:57
Cultural trends also impact employees. Cyber security awareness and adoption of best practices.
01:03
New entrance into the appointment arena may not focus enough on cyber security.
01:08
As employees age through their employment careers, they generally tend to become more cautious. The questions to address for a cyber security administrator relate to how they can effectively meet all of these employees. Cyber security challenges
01:23
Administrators need to have a more focused approach to internal security. Additional tools that can be employed can help with data loss prevention and content filtering and also enterprise services should be employed that can support riel time response
01:38
enhanced security policies and procedures also need to be implemented. They need to deliver more stringent access controls. An authentic Cashion, especially when securing mobile devices and working with remote users who are accessing company resource is
01:53
internal advanced. Persistent threats that need to be addressed include not only device patching and hardening for these removable devices, but also overall for enterprise storage management and the prevention of data distraction.
02:07
Employee training and awareness as well as on boarding should include confidentiality agreements and acceptable use policies.
02:22
Employees Security training must also be persistent and it must be focused directly at employees activities.
02:32
Successful employee security training should also include assessments and simulations.
02:42
Security compliance needs to be stressed as beneficial for everyone.
02:46
The company cybersecurity culture should be clearly identified and reinforced whenever possible.
02:53
Cybersecurity training and awareness also needs to be a core responsibility, not just amongst the cyber security team, but it should also be supported by HR and business level decision makers.
03:09
H. Arkin support employees cybersecurity training by integrating legal and industry compliance standards into the employee training processes
03:23
employees cybersecurity training needs to explain processes for reporting security breaches and events, and also help employees understand incident response.
03:38
H R and I T teams also need to work closely together when employees policy violations occur.
03:45
Coordinated actions need to be taken to effectively reduce risk, including management of employees, property, employee data and accounts.
03:55
During an exit interview, the company needs to take the opportunity to remind the employees about confidentiality and acceptable use and other agreed to companies security policies.
04:10
An exit interview is also an opportunity to communicate with the employee what steps the company will take to protect their personally identifiable information.

Up Next