How to Explain Cyber Security to the Board Using a Simple Metaphor: FIRE
|
|
- Reynold French
- 8 years ago
- Views:
Transcription
1 SESSION ID: PROF-M04 How to Explain Cyber Security to the Board Using a Simple Metaphor: FIRE John Elliott Head of Information Security Principality Building
2 Why? Smart people Time limited Non-technical Talking to the C-suite or the board is challenging brilliant Smart people Get risk Perspective Who grasp concepts quickly and can apply them to the current situation 2
3 Smart people Time limited Non-technical 3
4 But we ve spent $x million over the past n years making sure this won t happen to us What do you mean by INAMOIBW! 4
5 Why do we have fire extinguishers?
6 Smart people Get risk Perspective Who grasp concepts quickly and can apply them to the current situation 6
7 Everyone has a good sense about fire ouch
8 Everyone has a good sense about fire drill
9 Everyone has a good sense about fire not a toy
10 Everyone has a good sense about fire tell a teacher
11 Everyone has a good sense about fire also not toys
12 Everyone has a good sense about fire strict rules
13 What s this got to do with cyber security?
14 there s no such thing as common sense, just common knowledge Ira Winkler, RSA Conference 2012
15 our metaphors comprise the conceptual spectacles through which we view the world Immanuel Kant, Critique of Pure Reason 1781
16 Why is fire a great metaphor? Societal knowledge Fire is an opportunistic threat Fire does not care what you did yesterday (or plan to do tomorrow) Fire is happy to exploit the smallest vulnerability Fire does not stop until it absolutely owns everything (Until there are no more assets to compromise) 16
17 A brief history of two landmark fires 17
18 London, 1666
19 17 th Century fire-fighting techniques 19
20 Three days of fire 20
21 Effects 13,200 Homes 75,000 Homeless 80% of the City of London destroyed 10 Dead Affects the British economy for years 21
22 Chicago 1871
23 But this is horse drawn fire engines 180 fire fighters 1 pumping station (but with a wooden roof)
24 Effects 120 miles of wooden sidewalk burnt 33% of buildings destroyed 100,000 people homeless 24
25 Metaphors and lessons 25
26 A reminder I know you know this Aim: How to better explain things
27 Metaphors and lessons those who cannot remember the past are condemned to repeat it George Santayana, The Life of Reason 1905
28 Prevent Detect Respond Recover 28
29 Perfect threat storm Very dry Strong winds 29
30 Prevent London Vulnerable construction of basic components. Wood & straw No segmentation. Narrow streets, overhanging buildings Manual controls Chicago Better construction but significant vulnerabilities: tar roofing, decorative wooden cornices and advertisements Segmentation easily defeated. Wooden sidewalks, wind blew sparks across the river Manual controls 30
31 Prevent It is too late to fix architectural problems when you re on fire Unpatched applications? Flat networks Vulnerable OS? Too many admins? 31
32 Detect London Detection too late to prevent total compromise of the asset. Chicago Detection too late to prevent total compromise of the asset. 32
33 Detect There is a golden hour Treat every incident as unique 33
34 Respond London Strategy relied on sacrifice of compromised asset and neighboring assets. Unprepared to follow strategy No plan B. Everyone acted individually. Lack of skilled resources. Lost control quickly. Chicago Strategy relied on fast response to limit fire to a single asset. Too hot, wind too strong so fire spread too quickly on wind Response mechanisms vulnerable to attack. Wooden roof on pumping station 34
35 Respond Be decisive What if your response Are there known issues? mechanisms are vulnerable? 35
36 Recovery: individual Move assets London Secure assets Chicago 36
37 Attribution London Chicago 37
38 Attribution Attribution close to the event is unreliable 38
39 Comparison London Chicago Surprise! Again? 39
40 Or that men do not learn very much from the lessons of history is the most important of all the lessons of history Aldous Huxley, Collected Essays 1959
41 Comparison RSA, Google etc. Sony Surprise! Again? 41
42 What about today? 42
43 What about today? What did fire safety get right? Prevent Detect Respond Recover in depth with high maturity 43
44 Control maturity (CMMI) Fire management Optimized Quantitatively Managed Defined Managed Initial/ ad hoc 44
45 Why? fire has a low tolerance for control failure John Elliott, 2016
46 Prevent in depth with high maturity 46
47 Detect reliable almost eliminate false positives with high maturity 47
48 Respond in depth with high maturity 48
49 Recover with high maturity 49
50 Always learning When fire starts in a tall building restrict to a floor safe evacuation route sprinklers dry riser 50
51 Always learning 51
52 Fire v Cyber security Prevent Detect Respond Recover
53 How did we get better at FIRE? insurance regulation 53
54 So what? 54
55 Reminder I know you know this Aim: How to better explain things
56 How to use this when you talk to Prevent Detect Respond Recover Optimized Quantitatively Managed Defined Managed Find a story Initial/ ad hoc 56
57 Pick your favorite metaphors LONDON: Indecisive management This is not a problem CHICAGO: Wooden sidewalks, wooden advertisements BOTH: Sparks carried on the wind defeated firebreaks CHICAGO: Fire safes that were not PROBABILITY: Dry, strong winds, failure of manual preventative control 57
58 Understand your own environment What are your fire controls How mature are they? Can you describe your current Prevent Detect Respond Recover In respect of maturity? 58
59 How to use this when you talk to Prevent Detect Respond Recover Fire management is based on the premise that fires will happen What do you mean by INAMOIBW! false positives 59
60 How does what you propose Prevent Detect Respond Recover Optimized Quantitatively Managed Defined Managed Initial/ ad hoc 60
61 How does what you propose Prevent Detect Respond Recover What changes? Optimized Quantitatively Managed Defined Managed Initial/ ad hoc 61
62 But most importantly Get comfortable with the metaphor
63 and remember Like an attacker, fire has zero tolerance for control failure
64 Questions
Level E Placement Worksheet & Student Passage. Level 1 Placement Worksheet & Student Passage. Level 2 Placement Worksheet & Student Passage
Placement Guide This guide will help you choose the right One Minute Reader level for your child. The ideal level is neither too easy nor too difficult. It should challenge the student without being frustrating.
More informationThe Conjectural November 2015 Transcript 1 of 5
The Conjectural November 2015 Transcript 1 of 5 Hello and welcome to The Conjectural an experiment to figure out a better way to decide what science news is and how we should talk about science. The data
More informationNCS 330. Information Assurance Policies, Ethics and Disaster Recovery. NYC University Polices and Standards 4/15/15.
NCS 330 Information Assurance Policies, Ethics and Disaster Recovery NYC University Polices and Standards 4/15/15 Jess Yanarella Table of Contents: Introduction: Part One: Risk Analysis Threats Vulnerabilities
More informationCase Study for. The Torch Tower. Dubai Marina. Presented by; Lieutenant Colonel Ali Almutawa Operations Director Dubai Civil Defence
2015 AGM & International Conference The Shard, London 16 th July 2015 Case Study for The Torch Tower Dubai Marina Presented by; Lieutenant Colonel Ali Almutawa Operations Director Dubai Civil Defence 179
More informationFry Phrases Set 1. TeacherHelpForParents.com help for all areas of your child s education
Set 1 The people Write it down By the water Who will make it? You and I What will they do? He called me. We had their dog. What did they say? When would you go? No way A number of people One or two How
More informationIntrusion Tolerance to Mitigate Attacks that Persist
Intrusion Tolerance to Mitigate Attacks that Persist Arun Sood Professor (Computer Science) and Co-Director International Cyber Center George Mason University, Fairfax, VA asood@gmu.edu The variety and
More informationCyber Watch. Written by Peter Buxbaum
Cyber Watch Written by Peter Buxbaum Security is a challenge for every agency, said Stanley Tyliszczak, vice president for technology integration at General Dynamics Information Technology. There needs
More informationA study of the nature of fire risks in tall buildings
A study of the nature of fire risks in tall buildings David Charters and Carl Sherwood BRE Global 12 th March 2013 Part of the BRE Trust Overview 1. Introduction 2. Challenges of tall buildings 3. Analysis
More informationComponents of a Reading Workshop Mini-Lesson
Components of a Reading Workshop Mini-Lesson Mini-Lesson: The Connection How will you begin the Reading Workshop mini-lesson with a connection in which you tell students what you ll be teaching them &
More informationCalifornia Treasures High-Frequency Words Scope and Sequence K-3
California Treasures High-Frequency Words Scope and Sequence K-3 Words were selected using the following established frequency lists: (1) Dolch 220 (2) Fry 100 (3) American Heritage Top 150 Words in English
More informationINTRODUCTION TO TEAMWORK AND GROUP DEVELOPMENT CORPORATE LEARNING COURSE TEAMBUILDING BLOCK SEMINAR 3.2
LESSON PLAN INTRODUCTION TO TEAMWORK AND GROUP DEVELOPMENT CORPORATE LEARNING COURSE TEAMBUILDING BLOCK SEMINAR 3.2 SCOPE What is teamwork? Why is teamwork important to Civil Air Patrol? This seminar provides
More informationHidden Job Market. Remember, you are in a worksite setting! Hello, trainees. Today we will cover the hidden job market.
7 Finding the Hidden Job Market step Overview OBJECTIVES \ Locate the Hidden Job Market \ Network with the Hidden Job Market \ Telemarket Yourself It is said that more than 75 percent of all jobs are never
More informationFlorida Pioneer Homes By Lance Corlew & Ron Miller
Florida Pioneer Homes By Lance Corlew & Ron Miller Summary Florida pioneer homes were simple, with few luxuries. Life was very difficult in the 1800s compared to today. In this lesson, students will have
More informationTransportation: Week 2 of 2
The Minnesota Literacy Council created this curriculum with funding from the MN Department of Education. We invite you to adapt it for your own classrooms. Beginning Level (CASAS reading scores of 181-200)
More informationFire Safety Risk Assessment Checklist for Residential Care Premises
Checklist for Residential Care Premises Name of Premises: Address of Premises: Name of Responsible Person: What area / location does the assessment cover? Does the assessment cover the whole site YES or
More informationxxx Lesson 11 1. Comprehend the writing process 2. Respond positively to the writing process
xxx Lesson 11 The Writing Process Overview: This lesson will focus on the writing process and how it relates to communication. Learners will be taught what the writing process is, its parts, and how they
More informationChapter 8. Insurance
Chapter 8 This chapter tells you: about your buildings insurance; how to make an insurance claim; how your buildings insurance premium is worked out; and about contents insurance. Buildings insurance The
More informationFLA S FIRE SAFETY INITIATIVE
Improving Workers Lives Worldwide FLA S FIRE SAFETY INITIATIVE Preventing fires and saving lives by empowering workers and factory managers SCENARIO 1 OCCURS AT FACTORY ABC, WHICH HAS NOT IMPLEMENTED NECESSARY
More informationViruses, Worms, and Trojan Horses
Viruses, Worms, and Trojan Horses Be a Power Reader Make Personal Connections As you read this article, think to yourself, How can I apply this knowledge? How will what I m learning be useful to me? You
More informationAverage producers can easily increase their production in a larger office with more market share.
The 10 Keys to Successfully Recruiting Experienced Agents by Judy LaDeur Understand whom you are hiring. Don t make the mistake of only wanting the best agents or those from offices above you in market
More informationIncident Response. Six Best Practices for Managing Cyber Breaches. www.encase.com
Incident Response Six Best Practices for Managing Cyber Breaches www.encase.com What We ll Cover Your Challenges in Incident Response Six Best Practices for Managing a Cyber Breach In Depth: Best Practices
More informationRosa Parks. Stop and think: Have you ever been fed up with a situation? What did you do? How did things change?
Rosa Parks l Reading Comprehension l 1 Read the paragraphs. Stop and think as you read. Stop and Think Good readers are active readers. Good readers stop and think about what they are reading. Active reading
More informationA Primer on Cyber Threat Intelligence
A Primer on Cyber Threat Intelligence AS ADVERTISED 2 BUZZWORD BINGO! 3 TODAY S CYBER SECURITY CHALLENGES CISOs finding it difficult to define security ROI to executives Short shelf life for CISOs Vastly
More informationIncident Response. Six Best Practices for Managing Cyber Breaches. Nick Pollard, Senior Director Professional Services EMEA / APAC, Guidance Software
Incident Response Six Best Practices for Managing Cyber Breaches Nick Pollard, Senior Director Professional Services EMEA / APAC, Guidance Software www.encase.com 2014 Guidance Software Inc., All Rights
More informationLESSON TITLE: Parable of the Workers in the Vineyard
Devotion NT255 CHILDREN S DEVOTIONS FOR THE WEEK OF: LESSON TITLE: Parable of the Workers in the Vineyard THEME: God is more concerned with our heart s attitude than our service. SCRIPTURE: Matthew 20:1-16
More information10k. 8-week training program
10k 8-week training program T H E G O A L O F T H I S P L A N I S N T T O G E T Y O U A C R O S S T H E F I N I S H L I N E, I T S T O G E T T H E B E S T V E R S I O N O F Y O U A C R O S S T H E F I
More informationDATE: What is Halloween?
Questions: What do you already know about Halloween? Read the article below and then answer the questions. What is Halloween? Halloween is a traditional celebration that began in Europe hundreds of years
More informationCyber Security Threats
Cyber Security Threats What keeps us up at night? Doug Jacobson Information Assurance Center www.iac.iastate.edu Information Assurance Center Iowa State University 1 Outline Who are the players The good,
More informationTHE VICTORIANS ON THE CANALS
THE VICTORIANS ON THE CANALS An education pack for Key Stage 2 The London Canal Museum, 12-13 New Wharf Road, London N1 9RT. ( (020) 7713 0836 Introduction The London Canal Museum is an interactive, hands-on
More informationBible for Children. presents JOSHUA TAKES CHARGE
Bible for Children presents JOSHUA TAKES CHARGE Written by: Edward Hughes Illustrated by: Janie Forest Adapted by: Ruth Klassen Produced by: Bible for Children www.m1914.org 2007 Bible for Children, Inc.
More informationCo-authored by: Michelle Frechette Ames, MBA. Marketing Diva www.marketedbymichelle.com
Michelle Frechette Ames & Christine Baker Marriage Co-authored by: Michelle Frechette Ames, MBA Marketing Diva www.marketedbymichelle.com Christine Baker Marriage, LMT Business Mentor for Bodyworkers and
More informationSecurity Awareness for Social Media in Business. Scott Wright
Security Awareness for Social Media in Business Scott Wright Security Perspectives Inc COUNTERMEASURE 2012 10/29/2012 Copyright 2012. Security Perspectives Inc. 1 10/29/2012 Copyright 2012. Security Perspectives
More informationEnterprise Cybersecurity: Building an Effective Defense
Enterprise Cybersecurity: Building an Effective Defense Chris Williams Oct 29, 2015 14 Leidos 0224 1135 About the Presenter Chris Williams is an Enterprise Cybersecurity Architect at Leidos, Inc. He has
More informationTesting Your Security A Security Testing How To From Someone Who s Likely Broken Into An Organization Just Like Yours
Testing Your Security A Security Testing How To From Someone Who s Likely Broken Into An Organization Just Like Yours Tom Liston Senior Security Consultant InGuardians, Inc. Director InGuardians Labs tom@inguardians.com
More information6 SECRETS TO OFFERING EXCEPTIONAL CUSTOMER SERVICE
6 SECRETS TO OFFERING EXCEPTIONAL CUSTOMER SERVICE Introduction THE SERVICE GAP The vast majority of people are not experiencing great service. Nearly a third of consumers believe that businesses are now
More informationEarn Money Sharing YouTube Videos
Earn Money Sharing YouTube Videos Get Started FREE! Make money every time you share a video, also make money every time the videos you have shared get watched! Unleash The Viral Power of Social Media To
More informationTrends in Malware DRAFT OUTLINE. Wednesday, October 10, 12
Trends in Malware DRAFT OUTLINE Presentation Synopsis Security is often a game of cat and mouse as security professionals and attackers each vie to stay one step ahead of the other. In this race for dominance,
More informationCalling for Help in an Emergency
Calling for Help in an Emergency In an emergency, the ability to call for help quickly and effectively can mean the difference between minor property damage and total devastation, or even between life
More informationGod is Eternal Lesson 1
Preschool Curriculum (4K / 5K) August 15 th & 16 th, 2009 God is Eternal Lesson 1 Divine Attribute: Heart Response: God is Eternal Be Amazed Memory Verse: Jesus Christ is the same yesterday, today and
More informationHow to Evaluate DDoS Mitigation Providers:
Akamai White Paper How to Evaluate DDoS Mitigation Providers: Four Critical Criteria How to Evaluate DDoS Mitigation Providers 2 TABLE OF CONTENTS INTRODUCTION 3 CRITERIA #1: THREAT INTELLIGENCE 3 CRITERIA
More informationMy friends and neighbors refer to the cabin as the Miracle Cabin because it has survived two wildfires.
& Insurance Wildfire is a growing threat in the Rocky Mountain Region, where the population is booming in the mountains and foothills. People often don t realize the dangers of living in the Red Zone (dangerous
More informationCyber Security :: Insights & Recommendations for Secure Operations. N-Dimension Solutions, Inc.
Cyber Security :: Insights & Recommendations for Secure Operations N-Dimension Solutions, Inc. Cyber Security Protection for Critical Infrastructure Assets Agenda: Cyber Landscape Cyber Threats to Your
More informationmiracles of jesus 1. LEADER PREPARATION
miracles of jesus Week 1: Jesus Heals a Paralyzed Man This includes: 1. Leader Preparation 2. Lesson Guide 1. LEADER PREPARATION LESSON OVERVIEW One night, Jesus is teaching to a crowded home. Friends
More informationCambridge ESOL Entry 3 Certificate in ESOL Skills for Life
Centre Number Candidate Number Candidate Name *2290400733* UNIVERSITY OF CAMBRIDGE ESOL EXAMINATIONS English for Speakers of Other Languages Cambridge ESOL Entry 3 Certificate in ESOL Skills for Life [Reading]
More informationGET READY FOR A BUSH FIRE FOUR SIMPLE STEPS TO MAKING YOUR BUSH FIRE SURVIVAL PLAN
DISCUSS PREPARE KNOW KEEP GET READY FOR A BUSH FIRE FOUR SIMPLE STEPS TO MAKING YOUR BUSH FIRE SURVIVAL PLAN Getting ready for a bush fire is easier than you think. By taking 20 minutes with your family
More informationPalliser Regional Schools. Summary of feedback
Palliser Regional Schools Palliser Centre #101, 3305-18 Avenue North, Lethbridge, AB T1H 5S1 Phone: 403-328-4111 Toll-free: 877-667-1234 Fax: 403-380-6890 www.pallisersd.ab.ca Summary of feedback Community
More information5 Traits of Companies Successfully Preventing Fraud and How to Apply Them in Your Business. An IDology, Inc. Whitepaper
5 Traits of Companies Successfully Preventing Fraud and How to Apply Them in Your Business An IDology, Inc. Whitepaper No matter how big your company is or what industry you are in, every business typically
More informationSunflowers. Name. Level and grade. PrimaryTools.co.uk
Sunflowers Name Score Level and grade 2012 Contents Billy s Sunflower... 3 A story by Nicola Moon So Many Sunflowers!... 14 Vincent Van Gogh... 15 Information about the artist Making a Paper Sunflower...
More informationLESSON TITLE: Jesus is the Way, the Truth, and the Life
Devotion NT271 CHILDREN S DEVOTIONS FOR THE WEEK OF: LESSON TITLE: Jesus is the Way, the Truth, and the Life THEME: We can always trust Jesus. SCRIPTURE: John 14:1-6 Dear Parents Welcome to Bible Time
More informationONLINE SAFETY TEACHER S GUIDE:
TEACHER S GUIDE: ONLINE SAFETY LEARNING OBJECTIVES Students will learn how to use the Internet safely and effectively. Students will understand that people online are not always who they say they are.
More informationHow To Optimize your Marketing Strategy with Smart WiFi
How To Optimize your Marketing Strategy with Smart WiFi The Case for Smart WiFi When it comes to acquiring fans, large corporations like Nike may be at an advantage compared to a neighborhood ice cream
More informationLifecycle Vulnerability Management and Continuous Monitoring with Rapid7 Nexpose
Lifecycle Vulnerability Management and Continuous Monitoring with Rapid7 Nexpose SPONSORED BY WhatWorks is a user-to-user program in which security managers who have implemented effective Internet security
More informationBuyer Beware: How To Be a Better Consumer of Security Maturity Models
Buyer Beware: How To Be a Better Consumer of Security Maturity Models SESSION ID: GRC-R01 Julia Allen Software Engineering Institute Carnegie Mellon University jha@sei.cmu.edu Nader Mehravari Software
More informationCREATIVE S SKETCHBOOK
Session Plan for Creative Directors CREATIVE S SKETCHBOOK THIS SKETCHBOOK BELONGS TO: @OfficialSYP 1 WELCOME YOUNG CREATIVE If you re reading this, it means you ve accepted the We-CTV challenge and are
More informationInternet of Things (IoT): Security Awareness. Sandra Liepkalns, CRISC sandra.liepkalns@netrus.com
Internet of Things (IoT): Security Awareness Sandra Liepkalns, CRISC sandra.liepkalns@netrus.com So What is the Internet of Things Network of physical objects embedded with: Electronics, software, sensors
More informationUser s Guide. Security Systems D220
User s Guide Security Systems D220 Table of Contents About This User s Guide... 3 Introduction... 3 Security System Basics... 4 Controlled Points... 5 24-Hour Points... 6 Keypad Keys... 6 Keypad Lights...
More information* Dry Cleaning and Laundry Services Picked Up and Delivered to Your Home or Business
Consumer Guide to Delivery Dry Cleaning Services * Dry Cleaning and Laundry Services Picked Up and Delivered to Your Home or Business * By David Whitehurst A Consumer Education Message That Gives You:
More informationBuying Duplexes & Other Income Type Properties in London and South West Ontario
Buying Duplexes & Other Income Type Properties in London and South West Ontario I have spent a lot of time studying and working with wealthy real estate investors and I am not talking about the flashy
More informationexit routes and fire protection
exit routes and fire protection OSHA 11 Exit Routes and Fire Protection Osha 11 Exit Routes and Fire Protection Exit routes and fire protection Learning Objectives By the end of this lesson, students will
More informationWhy Your Business Needs a Website: Ten Reasons. Contact Us: 727.542.3592 Info@intensiveonlinemarketers.com
Why Your Business Needs a Website: Ten Reasons Contact Us: 727.542.3592 Info@intensiveonlinemarketers.com Reason 1: Does Your Competition Have a Website? As the owner of a small business, you understand
More informationMultiplication Rules! Tips to help your child learn their times tables
Multiplication Rules! Tips to help your child learn their times tables 1. Have fun! We want relaxed kids and plenty of giggles. 2. Go slowly and relax. 3. Do the preliminary review, all the preliminary
More informationWhat s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.
What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things. AGENDA Current State of Information Security Data Breach Statics Data Breach Case Studies Why current
More informationHazard Identification and Risk Assessment
Wildfires Risk Assessment This plan is an update of the 2004 City of Redmond Hazard Mitigation Plan (HMP). Although it is an update, this document has been redesigned so that it looks, feels, and reads
More informationHow to fill every seat in the house. An event manager s guide to SMS Marketing
How to fill every seat in the house An event manager s guide to SMS Marketing - Why should you use SMS messaging? When was the last time you didn t have your mobile? Chances are you can t remember (because
More informationSecurity Defense Strategy Basics
Security Defense Strategy Basics Joseph E. Cannon, PhD Professor of Computer and Information Sciences Harrisburg University of Science and Technology Only two things in the water after dark. Gators and
More informationAvailability and Disaster Recovery: Basic Principles
Availability and Disaster Recovery: Basic Principles by Chuck Petch, WVS Senior Technical Writer At first glance availability and recovery may seem like opposites. Availability involves designing computer
More informationThis presentation will introduce you to the concepts and terminology related to disaster recovery planning for businesses.
1. An Introduction This presentation will introduce you to the concepts and terminology related to disaster recovery planning for businesses. This presentation was prepared by the South Central Economic
More informationLesson 1.1 P.WRITE, Gr. 2 & 3, 08-09. PWRITE: POW + TREE: LESSON # 1 Part 1
PWRITE: POW + TREE: LESSON # 1 Part 1 Purpose: Develop Background Knowledge, Discuss It Objectives: Introduction to POW, writing to persuade, and TREE; identification of TREE parts in essay example Materials:
More informationAcronis Digital Assets Research Findings: Unveiling Backup & Recovery Practices across Europe
Acronis Digital Assets Research Findings: Unveiling Backup & Recovery Practices across Europe March 2010 Contents - Executive Summary: Count the cost of a lost day - Methodology - Research Finding 1: Companies
More information6 SECRETS TO OFFERING EXCEPTIONAL CUSTOMER SERVICE. 2013 salesforce.com, inc. All rights reserved.
6 SECRETS TO OFFERING EXCEPTIONAL CUSTOMER SERVICE 2013 salesforce.com, inc. All rights reserved. > Intro INTRODUCTION The vast majority of people are not experiencing great service. Nearly a third of
More informationUsing a Concept Definition Map
Lesson Plan Using a Concept Definition Map 1. Set Expectations Print Disaster on the board. Tell students, You are going to come up with as many words as you can that are related to the word disaster,
More informationPREVENTING ZERO-DAY ATTACKS IN MOBILE DEVICES
PREVENTING ZERO-DAY ATTACKS IN MOBILE DEVICES Ira Winkler Codenomicon Session ID: MBS-W05 Session Classification: Intermediate Zero Day Attacks Zero day attacks are rising in prominence They tend to be
More informationB1 certification. March 2016. Reading and Writing
B1 certification March 2016 B1 certification March 2016 Reading and Writing You have 1 hour and 30 minutes to complete both parts. Please keep your eyes on your exam only. Copying or cheating will result
More informationThe NIST Cybersecurity Framework (CSF) Unlocking CSF - An Educational Session
The NIST Cybersecurity Framework (CSF) Unlocking CSF - An Educational Session Robert Smith Systemwide IT Policy Director Compliance & Audit Educational Series 5/5/2016 1 Today s reality There are two kinds
More informationSailing the 7 C s The C of Commitment: Noah
Sailing the 7 C s The C of Commitment: Noah LESSON OVERVIEW Key Point: Go against the flow Obey God. Bible Story: Noah Bible Reference: Genesis 6:9-22 Challenge Verse: For all have sinned and fall short
More informationWELCOME TEAM CAPTAINS!
WELCOME TEAM CAPTAINS! Thank you for joining the online fundraiser for (org name)! This kit is designed to provide you with the tools you will need to make your team s experience fun, successful and rewarding.
More informationFamily Emergency Preparedness Plan
Family plan should address the following: Evacuation routes Family communications Utility shut-off and safety Insurance and vital records Evacuation plan Caring for animals Evacuation routes Draw a floor
More informationThe 9 Ugliest Mistakes Made with Data Backup and How to Avoid Them
The 9 Ugliest Mistakes Made with Data Backup and How to Avoid Them If your data is important to your business and you cannot afford to have your operations halted for days even weeks due to data loss or
More informationwww.lawpracticeadvisor.com
12 Characteristics of Successful Personal Injury Lawyers By Ken Hardison President of Law Practice Advisor Kenneth L. Hardison, 2009 There s a theory that many successful lawyers and entrepreneurs admittedly
More informationThe Challenge of Helping Adults Learn: Principles for Teaching Technical Information to Adults
The Challenge of Helping Adults Learn: Principles for Teaching Technical Information to Adults S. Joseph Levine, Ph.D. Michigan State University levine@msu.edu One of a series of workshop handouts made
More informationWhy Crisis Response and Business Continuity Plans Fail
Why Crisis Response and Business Continuity Plans Fail 10 Lessons Learned from Real-World Experience Many organizations invest considerable time, money and effort in developing Crisis Response and Business
More informationInformation Security for the Rest of Us
Secure Your Way Forward. AuditWest.com Information Security for the Rest of Us Practical Advice for Small Businesses Brian Morkert President and Chief Consultant 1 Introduction President Audit West IT
More informationThe Psychology of (In)Security
The Psychology of (In)Security Security Myths Create Risk Adversity to Change Executive Summary The most high-profile data breaches were at organizations that failed to make the proper investments to properly
More informationBUSINESS CONTINUITY PLAN
BUSINESS CONTINUITY PLAN Business Name: Phone # Cell # Emergency Contact Information: Dial 9-1-1 in an Emergency Non-Emergency: Police: Fire: Insurance Provider: Emergency Planning Team: I. CRITICAL OPERATIONS
More informationCan you afford to lose your information?
Can you afford to lose your information? It is inevitable that you will encounter an incident where you will experience the loss of critical business information. Can you survive it? CyberSecure - backup
More informationShooting Uphill and Downhill. Major John L. Plaster, USAR (ret) Of all the ways a precision rifleman must compensate when firing such as for distance,
Shooting Uphill and Downhill By Major John L. Plaster, USAR (ret) Of all the ways a precision rifleman must compensate when firing such as for distance, for wind and for target movement the most confounding
More informationLesson 35. The Tabernacle. Exodus 25 27. God lives among his people
Gospel Story Curriculum (OT) lower Lower elementary Lesson 35 The Tabernacle Exodus 25 27 Bible Truth God lives among his people l e s s o n snapshot 1. Opening review.... 5 min Use last week s lesson
More informationin: (R) Luke 18: 31 33
Relentless Jesus resolutely set out for Jerusalem [12.23.12] [I came across] the most amazing Christmas passage ~ I think you are going to love it! (R) Luke 9: 51 or p. 791 in pew Bible as His time drew
More informationContinuity of Operations Planning. A step by step guide for business
What is a COOP? Continuity of Operations Planning A step by step guide for business A Continuity Of Operations Plan (COOP) is a MANAGEMENT APPROVED set of agreed-to preparations and sufficient procedures
More informationTen Strategies to Encourage Academic Integrity in Large Lecture Classes
Ten Strategies to Encourage Academic Integrity in Large Lecture Classes Brian Udermann and Karrie Lamers Introduction Academic integrity has been and continues to be a lively topic of discussion on most
More informationChristmas Theme: The Light of the World
Christmas Theme: The Light of the World (NOTE: Some of the activities in this lesson are also used in Jesus, Our Lord: Lesson 2 Jesus is the Light. ) OVERVIEW Key Point: Jesus is the Light who Guides Repeat
More informationCyber Threats Insights from history and current operations. Prepared by Cognitio May 5, 2015
Cyber Threats Insights from history and current operations Prepared by Cognitio May 5, 2015 About Cognitio Cognitio is a strategic consulting and engineering firm led by a team of former senior technology
More informationJames R. Quiter, P.E., Senior Vice President Rolf Jensen & Associates, Inc.
AT THE STRATOSPHERE TOWER, LAS VEGAS NEVADA By: James R. Quiter, P.E., Senior Vice President Rolf Jensen & Associates, Inc. INTRODUCTION This paper discusses the performance based approach to fire protection
More informationPenetration Testing //Vulnerability Assessment //Remedy
A Division Penetration Testing //Vulnerability Assessment //Remedy In Penetration Testing, part of a security assessment practice attempts to simulate the techniques adopted by an attacker in compromising
More informationDisaster Recovery Plan Checklist
Disaster Recovery Plan Checklist Your guide for setting up or updating a Disaster Recovery Plan for your business. ArcSource Disaster Recovery Plan Checklist 1. Compile Your Internal Contacts Information
More informationDevelopment of a Risk-Based Decision Support Tool to Assist Fire Departments in Managing Unwanted Alarms SupDet 2013 Conference
Development of a Risk-Based Decision Support Tool to Assist Fire Departments in Managing Unwanted Alarms SupDet 2013 Conference John R. Hall, Jr. Fire Analysis & Research Division National Fire Protection
More informationFive Core Principles of Successful Business Architecture. STA Group, LLC Revised: May 2013
Five Core Principles of Successful Business Architecture STA Group, LLC Revised: May 2013 Executive Summary This whitepaper will provide readers with important principles and insights on business architecture
More informationNine Steps to Smart Security for Small Businesses
Nine Steps to Smart Security for Small Businesses by David Lacey Co-Founder, Jericho Forum Courtesy of TABLE OF CONTENTS INTRODUCTION... 1 WHY SHOULD I BOTHER?... 1 AREN T FIREWALLS AND ANTI-VIRUS ENOUGH?...
More informationCheck Point and Security Best Practices. December 2013 Presented by David Rawle
Check Point and Security Best Practices December 2013 Presented by David Rawle Housekeeping o Mobiles on Silent o No File Alarms planned o Fire exits are in front and behind and down the stairs o Downstairs
More information