Phishing
The biggest security threat to your organization are the people. Attackers commonly send crafted emails to trick users to open up links or other attachments inside of emails. When a user opens up the link, malware or other malicious content can be downloaded to the user’s machine. This can allow the attacker to gain access to the user’s machine and possibly the user’s entire company.
The best way to learn cyber security, is to actively participate. I set up a phishing campaign service that I can use to run phishing campaigns for an organization.
These campaigns show senior leadership statistics of how well the employees react to cyber threats and also help train the employees through actual tests so that they are more cyber conscious when a real attack comes.
- Reports of how well employees evade phishing attacks
- Train through real phishing campaigns
- Gain better understanding of phishing and its effect on an organization
Cyber Governance - 2017 AIS case study
Green Star Bank in Michigan recently lost $1.2 million due to fraudulent transfers. These transfers were successful because of poor processes inside of the organization and because of a spear phishing campaign that targeted bank employees.
I helped lead a team of 5 to create recommendations and policies based on the COBIT 5 methodology of preventative, detective, and corrective controls. A summary of these recommendations can be viewed in the video: Additionally, the full report of our recommendations and policies can be viewed at the link below:
Our team was awarded first place at the Association for Information Systems international security competition.
Cyber Governance - 2016 AIS case study
NOLA Life is a mutual insurance company that employs field agents to gather sensitive data from their clients. The data in transmission and at rest must be properly protected as it must remain HIPAA compliant.
I helped formulate and create the recommendations for NOLA life to harden and secure their system. Our recommendations include the hardware, software, transmission protocols, and user processes of the secure system.
Our team was awarded first place at the Association for Information Systems international security competition.