Part 1 : STRATEGIC : But let s begin with WHY : Why are we doing this?

Size: px
Start display at page:

Download "Part 1 : STRATEGIC : But let s begin with WHY : Why are we doing this?"

Transcription

1 Part 1 : STRATEGIC : Why DO we care?? What is YOUR cri=cal message? And WHO do you need to reach? : I ll try and give you some pointers and ideas for where to look and how to figure that out for your cons=tuents and your ins=tu=on Part 2 : TACTICAL : Who delivers the message How : effec=ve methods for outreach, delivery, and determining effec=veness What : are some of the essen=al awareness topics to consider : But let s begin with WHY : Why are we doing this? 1

2 Why are we COMPELLED to provide Security Awareness training? WHAT is our MOTIVATION?? If you dis=ll the reasons down to their core components, it is clear, it is primal 2

3 it is not hunger (although cookies can be a persuasive mo=vator) Fear comes in many forms, it affects people differently, and it causes people to respond. It is a spectacularly effec=ve mo=vator : ( as history perpetually proves ) So : what are your Info Security fears? Your : Boss s, your students, Or your friends fears? Or your Uncle Bob what are his fears? 3

4 Think strategic level : C Levels have big picture fears Compliance with : Governance policies Laws and regula=ons Control : Informa=on Is POWER! - - actually, the FLOW of informa=on is Power, and that s what you need to control the full InfoSec CIA spectrum : Confiden=ality, Integrity, and Availability of informa=on flow : as it shapes percep=on and reputa=on So, our awareness goals should address these fears, and u=lize these fears! 4

5 What DO users fear? How are Staff fears different from student fears? And what do Faculty fear? When I ask this ques=on, frequently it is : fear of being electronically violated : computer compromised, informa=on stolen If you Find out their fears, and your awareness program addresses them, people will come and they will listen! 5

6 What do YOU fear? I fear failure or the consequences to others if I fail. OK, let s just say that LOTS of things scare me, 6

7 Use FEAR, but use it WISELY! this is classic personal safety training concept : convert their fears into situa<onal awareness, and then give them the tools to respond when crap happens. THAT Is what your Awareness Program should strive to do! 7

8 In the past, my experience with Info Sec awareness educa=on and training has been both REACTIONARY and AD HOC, That s not Bad, always good to take advantage of adversity But, it has NOT been comprehensively planned, and well designed to meet the STRATEGIC info security needs of the ins=tu=on and of our cons=tuents. SO: { What are our ins=tu=onal needs? ARE our efforts mee=ng those needs? Or the needs of our cons=tuents? } And the harder ques=on : How do we know if they are? Are there metrics or methods for assessing the effec<veness of our Awareness Educa=on and Training efforts? 8

9 I invite you to make the conscious effort to look at your Security Awareness Program" in the broader context of the overall security needs and security profile of the ins=tu=on, so that your efforts and your program most effec<vely align with those cri=cal needs One way to do this : Look at your Comprehensive WriLen Informa<on Security Program : You have one, right? (Hope it s not like my old one : write once, read never ) Lots of legal and regulatory mandates require one, so put it to use! Your Awareness and Training program should be suppor=ng this overarching goal. 9

10 Take your control structure, and look at each domain group : Note : regardless of what security control solu=ons you implement here be it a firewall rules, change management process, access control seongs, door locks, heat sensors, security cameras, phish mail blocks, vulnerability scan alerts, you name it in the end, there is a HUMAN involved in managing, maintaining, or monitoring those controls SO, again WHY are we doing this? 10

11 because PEOPLE are the weakest link in any security environment : When you look at the security walls we create with our breadth of controls and barriers, what is the universal solvent to ALL of these security control walls and barriers? its HUMANS!!! 11

12 NB: the dis=nc=on between AWARENESS Educa=on and TRAINING : ul=mately, goals of both are changing human behavior. awareness : bring issues to people that they ought to know or that would benefit them to know, but there is no impera<ve that they know it; eg, if a student s hard drive crashes, it would be god if they knew to make a backup beforehand. Training : provides knowledge that we require people to know and abide by, such as policy compliance or safe classified data handling; there may be externally imposed consequences to failure to abide, and there should be in place a means to verify that users have understood the training material. This could be as simple as an AUP click through, up to requiring that an employee become cer=fied for specific training and knowledge Awareness ini=a=ves can be both rela<vely easy, and high profile; whereas actual training will be harder to implement, harder to execute and verify, and more resource intensive. But, while awareness efforts might seem like they are a high priority, from an ins1tu1onal risk perspec1ve, you may need to focus on those areas where actual training is required NB : Business process integra=on of Info Sec into other projects : I m seeing an increase in this, as people become more familiar with both the need and my availability and exper=se. 12

13 or, coming down to ground level from 30,000 feet. Two approaches I am currently working on are : (1) Using the security framework sub- domains, extrac=ng awareness and training topics and mapping to key cons=tuency groups (A) Target awareness educa=on and training at the domains where the risk profile is highest, or where you ll get the most Risk mi<ga<on benefit for your efforts. (2) Compiling a comprehensive list of policy and regulatory compliance mandates, and again extrac=ng awareness and training topics and mapping to key cons=tuency groups My Goal : let cons=tuents take ownership of Informa=on Security issues and solu=ons on their own ini=a=ve - - and become ac=ve security prac==oners 13

14 Randall Munroe s unique perspec=ve on the weakest link 14

15 My for this part of the day : Provide some review of the day s presenta=ons, and perhaps a bit of addi=onal bits to get your thoughts and ques=ons ready for the panel discussion I was told I should. pull everyone and everything back together So, everyone, please pull yourselves and your notes from the day together while I distract you with a few more slides 15

16 IT Staff : includes : User Support Services / Help desk Academic support staff yes, even occasionally, technical staff including the SNS admins from the dark dungeons of the data center Departmental staff : target technophile department liaisons, keep them engaged, feed them the Kool- aid Student works & student groups : They ve got energy, and they hear what s going on in that large target community Commisera=ng peers from surrounding ins=tu=ons form a security group Senior Staff : if you can get their public buy- in, you are GOLDEN 16

17 Just a few slides on some common Awareness hot topics : 17

18 **** A dynamic domain, as the variety and number of networkable devices grows. END POINT SECURITY : BEST PRACTICES Secure Communica=ons : Client protec=on : OS & SW updates and security patch AV, malware, spyware, ransomware, etc. protec=on Data protec=on : local encryp=on regular backups to mul=ple repositories Device protec=on : keep it secure or keep it with you access code locks 18

19 19

20 Your password, to quote Gandalf in The Fellowship of the Rings : is it secret? Is it safe? 20

21 A few of the more common outlet categories for your panel discussion thoughts 21

22 22

23 Don t forget, AWARENESS IS GOOD FOR EVERYONE not just your ins=tu=on! Possible canned speech topics : ITSec - in one sentence? client security in a nutshell safe web best prac<ces in a nutshell Top three IS issues By Tutorial I mean a short, single topic, catchy informa=on blast 23

24 You should explore ways to measure the EFFECTIVENESS of your educa=onal and training efforts NB: The last bullet item : could either be from successful C- Level awareness prosely=zing, or from money laundering, so just watch out for that. Possible training and awareness resources : EDUCause training materials SANS training resources lynda.com other.edu training op=ons that can be obtained LMS (Bb, moodle, other) training course(s) : esp. for new hires 24

25 25

Founda'onal IT Governance A Founda'onal Framework for Governing Enterprise IT Adapted from the ISACA COBIT 5 Framework

Founda'onal IT Governance A Founda'onal Framework for Governing Enterprise IT Adapted from the ISACA COBIT 5 Framework Founda'onal IT Governance A Founda'onal Framework for Governing Enterprise IT Adapted from the ISACA COBIT 5 Framework Steven Hunt Enterprise IT Governance Strategist NASA Ames Research Center Michael

More information

FUNNELBRAIN ONLINE MARKETING GET EDUCATED ON THE SITE THE DELIVERS QUALIFIED STUDENTS TO YOUR SCHOOL. FunnelBrain

FUNNELBRAIN ONLINE MARKETING GET EDUCATED ON THE SITE THE DELIVERS QUALIFIED STUDENTS TO YOUR SCHOOL. FunnelBrain FUNNELBRAIN ONLINE MARKETING GET EDUCATED ON THE SITE THE DELIVERS QUALIFIED STUDENTS TO YOUR SCHOOL FunnelBrain ABOUT FUNNELBRAIN Founded in 2008, by Internet execu4ves from REALTOR.com, WebMD and educa4onal

More information

Reports Analyzing Your Email Performance

Reports Analyzing Your Email Performance Reports Analyzing Your Email Performance Part 2 Robert Sajan UC Berkeley University Rela?ons Web Group Copyright 2010 UC Regents. All rights reserved. Reports Analyzing Your Email Performance Some ques?ons

More information

Selling Hosted MS Exchange 2010 & SharePoint

Selling Hosted MS Exchange 2010 & SharePoint Selling Hosted MS Exchange 2010 & SharePoint Presenters: David Kidd, Senior Manager, Product Management Verio Tim Shields, President and Owner Shields Technologies Moderator: Janine Soika, Channel Market

More information

Email/Endpoint Security and More Rondi Jamison

Email/Endpoint Security and More Rondi Jamison Email/Endpoint Security and More Rondi Jamison Sr. Marke)ng Manager - Enterprise Security Strategy Agenda 1 Why Symantec? 2 Partnership 3 APS2 Packages 4 What s next Copyright 2014 Symantec Corpora)on

More information

Phone Systems Buyer s Guide

Phone Systems Buyer s Guide Phone Systems Buyer s Guide Contents How Cri(cal is Communica(on to Your Business? 3 Fundamental Issues 4 Phone Systems Basic Features 6 Features for Users with Advanced Needs 10 Key Ques(ons for All Buyers

More information

How To Perform a SaaS Applica7on Inventory in. 5Simple Steps. A Guide for Informa7on Security Professionals. Share this ebook

How To Perform a SaaS Applica7on Inventory in. 5Simple Steps. A Guide for Informa7on Security Professionals. Share this ebook How To Perform a SaaS Applica7on Inventory in 5Simple Steps A Guide for Informa7on Security Professionals WHY SHOULD I READ THIS? This book will help you, the person in the organiza=on who cares deeply

More information

Reneaué Railton Sr. Informa2on Security Analyst, Duke Medicine Cyber Defense & Response

Reneaué Railton Sr. Informa2on Security Analyst, Duke Medicine Cyber Defense & Response Reneaué Railton Sr. Informa2on Security Analyst, Duke Medicine Cyber Defense & Response Incident Response What is the most importance component of an Incident Response Program? Tools? Processes? Governance?

More information

Information Security for the Rest of Us

Information Security for the Rest of Us Secure Your Way Forward. AuditWest.com Information Security for the Rest of Us Practical Advice for Small Businesses Brian Morkert President and Chief Consultant 1 Introduction President Audit West IT

More information

NATIONAL CYBER SECURITY AWARENESS MONTH

NATIONAL CYBER SECURITY AWARENESS MONTH NATIONAL CYBER SECURITY AWARENESS MONTH Tip 1: Security is everyone s responsibility. Develop an awareness framework that challenges, educates and empowers your customers and employees to be part of the

More information

Cyber Threat Intelligence Sharing: Lessons Learned, ObservaMons, RecommendaMons

Cyber Threat Intelligence Sharing: Lessons Learned, ObservaMons, RecommendaMons Cyber Threat Intelligence Sharing: Lessons Learned, ObservaMons, RecommendaMons Bob Gourley, Partner, Cognitio September 9, 2015 How we think. Disclaimer There is a great deal of text on these slides.

More information

(Why) Should Research Universi6es Have Schools of Educa6on?

(Why) Should Research Universi6es Have Schools of Educa6on? Spencer F!ndation Annual Lecture (Why) Should Research Universi6es Have Schools of Educa6on? Deborah Loewenberg Ball April 14, 2009 San Diego, California A closer look at the ques6on It s a real ques6on...

More information

How To Protect Virtualized Data From Security Threats

How To Protect Virtualized Data From Security Threats S24 Virtualiza.on Security from the Auditor Perspec.ve Rob Clyde, CEO, Adap.ve Compu.ng; former CTO, Symantec David Lu, Senior Product Manager, Trend Micro Hemma Prafullchandra, CTO/SVP Products, HyTrust

More information

UAB Cyber Security Ini1a1ve

UAB Cyber Security Ini1a1ve UAB Cyber Security Ini1a1ve Purpose of the Cyber Security Ini1a1ve? To provide a secure Compu1ng Environment Individual Mechanisms Single Source for Inventory and Asset Management Current Repor1ng Environment

More information

Big Data. The Big Picture. Our flexible and efficient Big Data solu9ons open the door to new opportuni9es and new business areas

Big Data. The Big Picture. Our flexible and efficient Big Data solu9ons open the door to new opportuni9es and new business areas Big Data The Big Picture Our flexible and efficient Big Data solu9ons open the door to new opportuni9es and new business areas What is Big Data? Big Data gets its name because that s what it is data that

More information

Special Report. RESULTS BASED Onboarding Evalua/on Tools and Metrics. Sign up to get your free report today!

Special Report. RESULTS BASED Onboarding Evalua/on Tools and Metrics. Sign up to get your free report today! Special Report Sign up to get your free report today! RESULTS BASED Onboarding Evalua/on Tools and Metrics By Robert C. Bilotti, Managing Director Novita Training Need to get a bigger bang for your buck

More information

NETWORK DEVICE SECURITY AUDITING

NETWORK DEVICE SECURITY AUDITING E-SPIN PROFESSIONAL BOOK VULNERABILITY MANAGEMENT NETWORK DEVICE SECURITY AUDITING ALL THE PRACTICAL KNOW HOW AND HOW TO RELATED TO THE SUBJECT MATTERS. NETWORK DEVICE SECURITY, CONFIGURATION AUDITING,

More information

Corporate Account Takeover (CATO) Risk Assessment

Corporate Account Takeover (CATO) Risk Assessment Corporate Account Takeover (CATO) Risk Assessment As a business, you want to be sure you have a strong process in place for monitoring and managing who has access to your ECorp services and how the information

More information

HOW TO CREATE APPS FOR TRAINING. A step- by- step guide to crea2ng a great training app for your company

HOW TO CREATE APPS FOR TRAINING. A step- by- step guide to crea2ng a great training app for your company HOW TO CREATE APPS FOR TRAINING A step- by- step guide to crea2ng a great training app for your company From compliance and health & safety to employee induction and self-assessment, there are endless

More information

Are you Smarter than a Scam Artist? 2015 AASC National Conference Nashville, Tennessee

Are you Smarter than a Scam Artist? 2015 AASC National Conference Nashville, Tennessee Are you Smarter than a Scam Artist? 2015 AASC National Conference Nashville, Tennessee Government Grants The government gives grants to special people like you! Stimulus money is still available through

More information

Landmark Company Overview

Landmark Company Overview Landmark Company Overview Landmark is an interna4onal personal and professional growth, training and development company a global educa4onal enterprise commi>ed to the fundamental principle that people

More information

Governance as Leadership: Reframing the Work of Nonprofit Boards

Governance as Leadership: Reframing the Work of Nonprofit Boards Governance as Leadership: Reframing the Work of Nonprofit Boards Tradi

More information

WSECU Cyber Security Journey. David Luchtel VP IT Infrastructure & Opera:ons

WSECU Cyber Security Journey. David Luchtel VP IT Infrastructure & Opera:ons WSECU Cyber Security Journey David Luchtel VP IT Infrastructure & Opera:ons Objec:ve of Presenta:on Share WSECU s journey Overview of WSECU s Security Program approach Overview of WSECU s self- assessment

More information

Project Por)olio Management

Project Por)olio Management Project Por)olio Management Important markers for IT intensive businesses Rest assured with Infolob s project management methodologies What is Project Por)olio Management? Project Por)olio Management (PPM)

More information

Building an Effec.ve Cloud Security Program

Building an Effec.ve Cloud Security Program Building an Effec.ve Cloud Security Program Laura Posey Senior Security Strategist, Microso3 Corpora6on Co- Chair, CSA CAIQ Programming Chair, NY Metro CSA Chapter Is Cloud worth it? Yes! Pla?orm for Innova.on

More information

Understanding Cloud Compu2ng Services. Rain in business success with amazing solu2ons in Cloud technology

Understanding Cloud Compu2ng Services. Rain in business success with amazing solu2ons in Cloud technology Understanding Cloud Compu2ng Services Rain in business success with amazing solu2ons in Cloud technology What is Cloud Compu2ng? Cloud compu2ng encompasses various services and ac2vi2es carried out over

More information

MAXIMIZING THE SUCCESS OF YOUR E-PROCUREMENT TECHNOLOGY INVESTMENT. How to Drive Adop.on, Efficiency, and ROI for the Long Term

MAXIMIZING THE SUCCESS OF YOUR E-PROCUREMENT TECHNOLOGY INVESTMENT. How to Drive Adop.on, Efficiency, and ROI for the Long Term MAXIMIZING THE SUCCESS OF YOUR E-PROCUREMENT TECHNOLOGY INVESTMENT How to Drive Adop.on, Efficiency, and ROI for the Long Term What We Will Cover Today Presenta(on Agenda! Who We Are! Our History! Par7al

More information

Exchange of experience from a SuccessFactors LMS Implementa9on

Exchange of experience from a SuccessFactors LMS Implementa9on Exchange of experience from a SuccessFactors LMS Implementa9on Seen from a user perspective Hanne Vasshus Ask Competency Management Cau9onary Statement The following presenta9on includes forward- looking

More information

A Guide to Information Technology Security in Trinity College Dublin

A Guide to Information Technology Security in Trinity College Dublin A Guide to Information Technology Security in Trinity College Dublin Produced by The IT Security Officer & Training and Publications 2003 Web Address: www.tcd.ie/itsecurity Email: [email protected] 1 2

More information

SMALL BUSINESS IT SECURITY PRACTICAL GUIDE

SMALL BUSINESS IT SECURITY PRACTICAL GUIDE SMALL BUSINESS IT SECURITY PRACTICAL GUIDE How to make sure your business has comprehensive IT security protection #protectmybiz Small businesses come in all shapes and sizes. But in today s world, no

More information

Developing Your Roadmap The Association of Independent Colleges and Universities of Massachusetts. October 3, 2013

Developing Your Roadmap The Association of Independent Colleges and Universities of Massachusetts. October 3, 2013 Developing Your Roadmap The Association of Independent Colleges and Universities of Massachusetts October 3, 2013 Agenda 1. Introductions 2. Higher Ed Industry Trends 3. Technology Trends in Higher Ed

More information

National Cyber Security Month 2015: Daily Security Awareness Tips

National Cyber Security Month 2015: Daily Security Awareness Tips National Cyber Security Month 2015: Daily Security Awareness Tips October 1 New Threats Are Constantly Being Developed. Protect Your Home Computer and Personal Devices by Automatically Installing OS Updates.

More information

SMALL BUSINESS IT SECURITY PRACTICAL GUIDE

SMALL BUSINESS IT SECURITY PRACTICAL GUIDE SMALL BUSINESS IT SECURITY PRACTICAL GUIDE How to make sure your business has comprehensive IT security protection #protectmybiz Small businesses come in all shapes and sizes. But in today s world, no

More information

How To Manage A Mobile Device Management At Harvard

How To Manage A Mobile Device Management At Harvard Demys&fying Mobile Device Management Challenges Indir Avdagic Director of Informa.on Security and Risk Management, SEAS Objec&ves Our hope is that this conversa0on will get people thinking about mobile

More information

Introducing BRAD - the New Standard for Print on Demand

Introducing BRAD - the New Standard for Print on Demand Presenta0on materials and video replay will be provided within one week. Have ques0ons? Use the ques0ons panel during the Q&A recap at the end of the call. we ll field them as we go and Introducing BRAD

More information

How to Use Windows Firewall With User Account Control (UAC)

How to Use Windows Firewall With User Account Control (UAC) Keeping Windows 8.1 safe and secure 14 IN THIS CHAPTER, YOU WILL LEARN HOW TO Work with the User Account Control. Use Windows Firewall. Use Windows Defender. Enhance the security of your passwords. Security

More information

NSF/Intel Partnership on Cyber- Physical Systems Security and Privacy (CPS- Security)

NSF/Intel Partnership on Cyber- Physical Systems Security and Privacy (CPS- Security) NSF Webinar on NSF Solicita9on 14-571 NSF/Intel Partnership on Cyber- Physical Systems Security and Privacy (CPS- Security) Farnam Jahanian, Keith Marzullo, Angelos D. Keromy9s, David Corman Jeremy Epstein,

More information

IT Change Management Process Training

IT Change Management Process Training IT Change Management Process Training Before you begin: This course was prepared for all IT professionals with the goal of promo9ng awareness of the process. Those taking this course will have varied knowledge

More information

Member Municipality Security Awareness Training. End- User Informa/on Security Awareness Training

Member Municipality Security Awareness Training. End- User Informa/on Security Awareness Training End- User Informa/on Security Awareness Training 1 Why Awareness Training? NCLM sanc:oned mul:ple Security Risk Assessments for a broad spectrum of member municipali:es The assessments iden:fied areas

More information

Encrypted Email Opening and Replying to a Secure Message

Encrypted Email Opening and Replying to a Secure Message First Time User Registration Opening a Secure Encrypted Email Where to go for Help Frequently Asked Questions Information Technology Encrypted Email Opening and Replying to a Secure Message First Time

More information

Migrating to Hosted Telephony. Your ultimate guide to migrating from on premise to hosted telephony. www.ucandc.com

Migrating to Hosted Telephony. Your ultimate guide to migrating from on premise to hosted telephony. www.ucandc.com Migrating to Hosted Telephony Your ultimate guide to migrating from on premise to hosted telephony Intro What is covered in this guide? A professional and reliable business telephone system is a central

More information

An Integrated Approach to Manage IT Network Traffic - An Overview Click to edit Master /tle style

An Integrated Approach to Manage IT Network Traffic - An Overview Click to edit Master /tle style An Integrated Approach to Manage IT Network Traffic - An Overview Click to edit Master /tle style Agenda A quick look at ManageEngine Tradi/onal Traffic Analysis Techniques & Tools Changing face of Network

More information

The 10 step communication plan

The 10 step communication plan The 10 step communication plan Follow these 10 suggested steps and you will be successful at launching the Specops password reset service. Step 1 Activity: Intranet texts explaining the service Suggested

More information

Hint: Best actions: Find out more in videos and FAQ: Hint: Best actions: Find out more in videos and FAQ:

Hint: Best actions: Find out more in videos and FAQ: Hint: Best actions: Find out more in videos and FAQ: Game Cheatsheet This is a spam email, an unsolicited and unwanted email from an unknown sender. Hint: Does this offer seem too good to be true? Perhaps you need to know more? Best actions: Delete, Check

More information

PALO ALTO SAFE APPLICATION ENABLEMENT

PALO ALTO SAFE APPLICATION ENABLEMENT PALO ALTO SAFE APPLICATION ENABLEMENT 1 Palo Alto Networks Product Overview James Sherlow SE Manager WEUR & Africa [email protected] @jsherlow Palo Alto Networks at a Glance Corporate Highlights

More information

Retail Pharmacy Clinical Services: Influence of ACOs & Healthcare Financing Models

Retail Pharmacy Clinical Services: Influence of ACOs & Healthcare Financing Models Retail Pharmacy Clinical Services: Influence of ACOs & Healthcare Financing Models Tim Kosty, R.Ph., MBA President Pharmacy Healthcare Solu

More information

Next. CDS 2015 Survey Module 7 Information Security Survey Errata

Next. CDS 2015 Survey Module 7 Information Security Survey Errata 1 CDS 2015 Survey Survey Errata This module includes questions about the IT security organization, staffing, policies, and practices related to information technology security. This is an optional module.

More information

DDC Sequencing and Redundancy

DDC Sequencing and Redundancy DDC Sequencing and Redundancy Presenter Sequencing Importance of sequencing Essen%al piece to designing and delivering a successful project Defines how disparate components interact to make up a system

More information

Franciscan University of Steubenville Information Security Policy

Franciscan University of Steubenville Information Security Policy Franciscan University of Steubenville Information Security Policy Scope This policy is intended for use by all personnel, contractors, and third parties assisting in the direct implementation, support,

More information

Defensive Training for Social Engineering

Defensive Training for Social Engineering FISSEA 2009 22nd Annual Conference Defensive Training for Social Engineering Stacey Banks, CISSP, CCO, CSM Background Oxford Federal, LLC Information security solutions and services company providing certification

More information

Next. CDS 2015 Survey Module 7 Information Security Survey Errata

Next. CDS 2015 Survey Module 7 Information Security Survey Errata CDS 2015 Survey Survey Errata This module includes questions about the IT security organization, staffing, policies, and practices related to information technology security. This is an optional module.

More information

Online Enrollment Op>ons - Sales Training. 2011. Benefi+ocus.com, Inc. All rights reserved. Confiden>al and Proprietary 1

Online Enrollment Op>ons - Sales Training. 2011. Benefi+ocus.com, Inc. All rights reserved. Confiden>al and Proprietary 1 Online Enrollment Op>ons - Sales Training 2011. Benefi+ocus.com, Inc. All rights reserved. Confiden>al and Proprietary 1 Agenda Understand Why This is Important Enrollment Op>ons Available EDI Blues Enroll

More information

HSyE HIPAA Training. Summer 2015

HSyE HIPAA Training. Summer 2015 HSyE HIPAA Training Summer 2015 Agenda What is HIPAA PII Electronic Security Data Files Desktops Internet Security Home/Outside Network Security Personal Laptops Cell Phones/ Tablets Physical Security

More information

Challenges of PM in Albania and a New. Professional Perspec8ve. Prepared by: Dritan Mezini, MBA, MPM B.S. CS

Challenges of PM in Albania and a New. Professional Perspec8ve. Prepared by: Dritan Mezini, MBA, MPM B.S. CS Challenges of PM in Albania and a New Professional Perspec8ve Prepared by: Dritan Mezini, MBA, MPM B.S. CS Table of contents Presenter s brief introduc8on General Concepts What is a project? What is Project

More information

Internet Security Protecting Your Business. Hayden Johnston & Rik Perry WYSCOM

Internet Security Protecting Your Business. Hayden Johnston & Rik Perry WYSCOM Internet Security Protecting Your Business Hayden Johnston & Rik Perry WYSCOM Introduction Protecting Your Network Securing Your Information Standards & Best Practices Tools & Options Into The Future Creating

More information