19
opyright 2011 (ISC)² , Inc. All Rights Reserved. 1 Making the Cyber World Safer Making the Cyber World Safer One Child at a Time One Child at a Time

© Copyright 2011 (ISC)², Inc. All Rights Reserved. 1

Embed Size (px)

Citation preview

Page 1: © Copyright 2011 (ISC)², Inc. All Rights Reserved. 1

© Copyright 2011 (ISC)² , Inc. All Rights Reserved. 1

Making the Cyber World Safer Making the Cyber World Safer One Child at a TimeOne Child at a Time

Page 2: © Copyright 2011 (ISC)², Inc. All Rights Reserved. 1

© Copyright 2011 (ISC)² , Inc. All Rights Reserved. 2

• 80,000+ certified members in 135 countries

• Code of Ethics

• Have enhanced the security-consciousness of over 65,000 children worldwide through (ISC)²’s Safe and Secure Online program

Who We AreOur Mission:

We make society safer by improving productivity, efficiency and resilience of information-dependent economies through education and certification

Page 3: © Copyright 2011 (ISC)², Inc. All Rights Reserved. 1

© Copyright 2011 (ISC)² , Inc. All Rights Reserved. 3

Our Mission:

The (ISC)2 Foundation is devoted to making the cyber world a safer place for everyone by supporting cyber security education and awareness in the community through:

• The Safe and Secure Online Program

• Information Security Scholarships

• Industry Research

Who We Are

Page 4: © Copyright 2011 (ISC)², Inc. All Rights Reserved. 1

© Copyright 2011 (ISC)² , Inc. All Rights Reserved. 4

Source: Patterns of risk and safety online-In-depth analyses from the EU Kids Online survey of 9- to 16-year-olds and theirparents in 25 European countries – London School Economics August 2011

Page 5: © Copyright 2011 (ISC)², Inc. All Rights Reserved. 1

© Copyright 2011 (ISC)² , Inc. All Rights Reserved. 5© Copyright 2009 (ISC)² , Inc. All Rights Reserved. confidential

How often do you use the

Internet?

Page 6: © Copyright 2011 (ISC)², Inc. All Rights Reserved. 1

© Copyright 2011 (ISC)² , Inc. All Rights Reserved. 6© Copyright 2009 (ISC)² , Inc. All Rights Reserved. confidential

If you use the Internet how many

hours do you use it for?

Page 7: © Copyright 2011 (ISC)², Inc. All Rights Reserved. 1

© Copyright 2011 (ISC)² , Inc. All Rights Reserved. 7© Copyright 2009 (ISC)² , Inc. All Rights Reserved. confidential

What is the latest you have been

online on a school night?

Page 8: © Copyright 2011 (ISC)², Inc. All Rights Reserved. 1

© Copyright 2011 (ISC)² , Inc. All Rights Reserved. 8

• Over 95% of educators, school administrators and technology coordinators believe that cyberethics, cybersafety and cybersecurity should be taught in schools.

• Nearly 30% of teachers do not believe they are prepared, and nearly 25% believe they are only somewhat prepared to discuss subjects such as cyberbullying, malware, phishing scams, sexting and data backups in the classroom.

• Nearly 30% of teachers said their school district does not do an adequate job of preparing students regarding cyberethics, safety and security issues: 44% say that their school district only somewhat prepares students.

*U.S.-based organization

*National Cyber Security Alliance (NCSA) 2010 National K-12 Baseline Study

Page 9: © Copyright 2011 (ISC)², Inc. All Rights Reserved. 1

© Copyright 2011 (ISC)² , Inc. All Rights Reserved. 9

• Code of Ethics

• Receive training on communicating with/engaging kids

• Must submit recent criminal background check

• Sign (ISC)² waiver form

Safe and Secure Online Volunteers

Page 10: © Copyright 2011 (ISC)², Inc. All Rights Reserved. 1

© Copyright 2011 (ISC)² , Inc. All Rights Reserved. 10

• Programs in Canada, Hong Kong, the U.S. and U.K.

• Over 400 volunteers

• Over 65,000 children reached to date

Protecting and Empowering Kids

Page 11: © Copyright 2011 (ISC)², Inc. All Rights Reserved. 1

© Copyright 2011 (ISC)² , Inc. All Rights Reserved. 11

7-10 and 11-14 Year Old Presentation

Page 12: © Copyright 2011 (ISC)², Inc. All Rights Reserved. 1

© Copyright 2011 (ISC)² , Inc. All Rights Reserved. 12© Copyright 2009 (ISC)² , Inc. All Rights Reserved. confidential

Volunteers in Hong Kong Train

Police• SSO volunteers in Hong Kong asked to train police – reached over 200 officers

• Volunteers were asked to come back to provide additional training

Page 13: © Copyright 2011 (ISC)², Inc. All Rights Reserved. 1

© Copyright 2011 (ISC)² , Inc. All Rights Reserved. 13© Copyright 2009 (ISC)² , Inc. All Rights Reserved. 13

Feedback from Teachers

A Day in the Life of a SSO Volunteer

“The Safe and Secure Online initiative is an outstanding program that engages kids and helps them to recognize the potential dangers on the Internet. It’s the best program I’ve ever seen in all my years of teaching.”

“Made them realise the seriousness of chatting…it’s good for outsiders to present to them.”

Page 14: © Copyright 2011 (ISC)², Inc. All Rights Reserved. 1

© Copyright 2011 (ISC)² , Inc. All Rights Reserved. 14© Copyright 2009 (ISC)² , Inc. All Rights Reserved. 14

Feedback from Students (14yrs)

A Day in the Life of a SSO Volunteer

“I might change some of my passwords.”

“Make sure you know the person you are talking to, and if you are not sure, don’t talk to them.”

“I now know not to trust as many Websites.”

Page 15: © Copyright 2011 (ISC)², Inc. All Rights Reserved. 1

© Copyright 2011 (ISC)² , Inc. All Rights Reserved. 15© Copyright 2009 (ISC)² , Inc. All Rights Reserved. 15

Feedback from Students (12yrs)

A Day in the Life of a SSO Volunteer

“It gave us a lot of good information and told us that we should think before we do something on the Internet ... The film helped me understand as it showed reality, and that it might be happening to you.”

“I will put the websites (for help) on my favourites.”

Page 16: © Copyright 2011 (ISC)², Inc. All Rights Reserved. 1

© Copyright 2011 (ISC)² , Inc. All Rights Reserved. 16© Copyright 2009 (ISC)² , Inc. All Rights Reserved. 16

A Day in the Life of a SSO VolunteerFeedback from Volunteer

“I feel that every single child that we manage to protect though [this] initiative is an immense and immeasurable achievement considering the increasing threats of paedophiles, pornography, violence, financial fraud, etc. through electronic highways (Internet and smart-phones).

Of course in many ways, Internet is also the most convenient and rich means for learning, and our intentions are to incorporate the safe conduct at an early age.”

Page 17: © Copyright 2011 (ISC)², Inc. All Rights Reserved. 1

© Copyright 2011 (ISC)² , Inc. All Rights Reserved. 17

Organizational Endorsers of SSO

Page 18: © Copyright 2011 (ISC)², Inc. All Rights Reserved. 1

© Copyright 2011 (ISC)² , Inc. All Rights Reserved. 18

• For more information about the Safe and Secure Online program, please visit: http://cyberexchange.isc2.org/safeandsecure.

• For more information about the (ISC)2 Foundation, please visit https://www.isc2.org/foundation/Default.aspx

• Or contact (ISC)² at [email protected].

More Information

Page 19: © Copyright 2011 (ISC)², Inc. All Rights Reserved. 1

© Copyright 2011 (ISC)² , Inc. All Rights Reserved. 19

Making the Cyber World Safer Making the Cyber World Safer One User at a TimeOne User at a Time