This document discusses cyber fear and obstacles to information sharing. It provides a disclaimer and copyright information, then lists several recent examples of data breaches and privacy issues. These include airport security files found on the street, doctors using Snapchat to send medical files, and personal information of 1 billion Equifax users being leaked. It notes that increased awareness, education, and integrated security practices are needed for effective risk management and behavior change. The presentation aims to discuss overcoming obstacles to information sharing without causing undue fear.
1 of 45
More Related Content
Cyber fear obstacles to info sharing-Version 2
1. Cyber Fear
Obstacle to information sharing
Dubai 10th April, 2018, Dubai, UAE
Jorge Sebastiao, CISSP
CTO Eco-system
Huawei
http://linkedin.com/in/sebastiao/
Twitter: @4jorge
2. Disclaimer & Copyright
Please note that this presentation is for informational, knowledge sharing and educational purposes only. Any
comments or statements made herein do not necessarily reflect the views of Huawei. The information is intended
for the recipient's use only and should not be cited, reproduced or distributed to any third party without the prior
consent of the authors. Although great care is taken to ensure accuracy of information neither the author, nor
Huawei can be held responsible for any decision made on the basis of the information cited.
The content of this presentation is based on information gathered in good faith from both primary and
secondary sources and is believed to be correct at the time of publication. The author can however provide no
guarantee regarding the accuracy of this content and therefore accepts no liability whatsoever for any actions
taken that subsequently prove incorrect.
The practices listed in the document are provided as is and as guidance and the author and Huawei do not claim
that these comprise the only practices to be followed. The readers are urged to make informed decisions in their
usage.
The information presented in this presentation is not intended to be, and should not be construed as, an offer to
sell any products or services or a solicitation of an offer to buy any products or services . Any such offer or sale will
be made pursuant to, and the information presented at this meeting is qualified in its entirety by, authorized
offering documents and related disclosure schedules or similar disclosure documentation.
All logos and brand names belong to their respective owners and we do not claim any relationship or association,
implied or otherwise, with them.
Use of any materials by virtue of relationships and associations, if any, are mentioned explicitly.
Author has taken care to attribute all sources for external materials used in this presentation, and any oversight is
regretted. If you, as owner, or as viewer, find any reason to dispute the use of these materials kindly communicate
the same to author.
Any omissions, in terms of attribution, may be due to an error of author and not intentional.
39. Awareness - Changing Behavior
Will do it?
B =
BEHAVIOR
Want
to do it?
M
MOTIVATION
Ability to
do it?
ABILITY
T
TRIGGER
A
All 3 for behavior change
41. Final Goal Is
Total Integrated Security
With Awareness
Information
Security
Management
IoT, Device
Security
Management
Education
Training
Awareness