Answered 67w ago · Author has 232 answers and 160. 5k answer viewsThe same way you give a presentation to anyone.

Building better security presentations – scott j roberts – medium

Use examples from your real life, or stories that you have heard and know to be true.

Talk about a real phishing attack and what happened. Find an example with Ransomware and where somebody lost files that were precious to them.

Tell the story of who that person is, why the things are precious, and what was the cyber security failure. Story is how we reach people, not by presentation.

8k answer viewsI like to use stories that they can relate to when explaining technical aspects of cyber security 26 Oct 2017 - Building Better Security Presentations. I'm a Now I'm very aware step one should of course be doing all the research and then building the In order to help myself out and keep myself from fiddling I switched to Deckset..

How do i give a presentation on cyber security to non-tech people

I used the analogy of an apartment building were each apartment was a ‘port’.

A bad guy ‘scanned’ the apartment by going door-to-door and seeing if it was unlocked. Simple and it creates a picture in a persons mind.

The more you can create a picture, the easier it is to communicate a concept.

Security workshop (part 1)

7k answer viewsA whole LOT of pictures :) The reality is that anyone in cyber security usually knows how their product works at an extreme level. However, someone who is coming from a business background - they may barely know how to send email.

Most people that are non-technical can still be fairly technical if explained properly. I would consider telling us what the presentation is about, even if at a high level.

I'd be willing to help but sadly, I have very little to go on. Additionally, I do not know how “non-tech” the people are you are presenting to.

One additional note: What kind of presentation is this? Not the subject matter, just whether this is a sales pitch or a salary position which you have to present a topic to someone 28 Mar 2017 - This presentation provides an overview and guidance and good Poor security can cause personal, social and reputational damage. D, If necessary, organisations have a duty to create new information in order to meet a .

Years ago, I spoke at HostingCon and had no idea that many of the people I was speaking to, truly had no idea about the topic I was talking about.

Cyber security presentation - kpmg

If you do not reply, just remember that you have to know your market. Know their knowledge, know their skill sets, and above all - know your product intimately.

You never know who may actually understand what you're talking about and they may ask a very technical question. You will need to know whether they understand the question asked and how to answer it so they understand the answer.

Answered 67w ago · Author has 210 answers and 186. 9k answer viewsFor Non-tech people, all the terms and concept of Cyber security are very new as well as difficult to understand. Because they are not familiar with the cyber world, networking, Computer industry and overall things related to internet.

Prepare some ‘power point presentation’ and ‘info-graphic images’, so they can easily understand what you are telling to them What do we mean by “Computer Security solutions shall be tied to business processes. “Treat security as an Who is that merchant I am going to to buy from? difficult to authenticate… Nightmare Market Trends: Guest Presentations..

7 brilliant ways successful leaders start presentations | world

I post you some info-graphic images for your use. Answered 67w ago · Author has 726 answers and 203. 8k answer viewsDon’t shoot the messenger, not trying to be an arrogant ass here…Buckminster Fuller (if you don’t know the name, look it up) once said (sorry, paraphrasing): If you really know your subject, you can explain Relativity Theory to a kindergarten kid.

One of the problems in our field is that we constantly have to prove how bright we are, how much better we are than the “other” person (our competitor, our peer, or the criminal trying to crack our firewall). One way we do this is through language, disarming people with words and ideas put forth in a way that may be just out of their comfort zone. This becomes the status quo, and we forget that though the technology and protocols (and even the wiring) can become profoundly difficult to follow, what it is all doing is really easy, with every day, understandable examples.

For example: Stateful Packet Inspection Firewall…The physical world example may be an invitation-only party. If someone arrives at your door with an invitation, you check the invitation to verify it is real, and if so, let the guest in. If someone arrives at the door without an invitation, or the invitation isn’t what you sent out, they don’t get past the door.

Make it PersonalIf they don’t understand why, and it’s not relevant to them, they’ll ignore it. The more relevant examples that you can tie back to them the betterFocus on the WHYAs Simon Sinek says, WHY is the most important.

:-)Tell it with storiesI’ve done some contract phishing and social engineering attacks 2 Jul 2015 - That's a tall order for any speaker — and it requires us to develop and Or you can tell a story about another person who the audience can .

It makes fantastic illustrations of what’s possible. People GET it when you explain it through storiesMost people are visual learnersKeep your powerpoint sildes to a minimum of points.

Instead, build upon these points with your stories and experience.

Be passionate and engagingA key part of any presentation is having the room feel your energy and be drawn into the stories. Use videoThere are some GREAT videos on YouTube that illustrate some of the threats.

Take advantage of them!I have a full Security Awareness Training for non-techies course (as well). 5 hours) session, and reinforce with the online course and testing. People forget everything … so the online course allows repetition.

You can see the outline at Security Awareness Training. I’d be happy to answer any questions about what I cover (so you can copy … leverage!)- Mike