Transcript - Episode 2: When Corporate Culture Threatens Data Security

Size: px
Start display at page:

Download "Transcript - Episode 2: When Corporate Culture Threatens Data Security"

Transcription

1 Transcript - Episode 2: When Corporate Culture Threatens Data Security Guest: Phil Huggins, Vice President, Stroz Friedberg Welcome to Episode 2 of the Business of Truth podcast by Stroz Friedberg, "When corporate culture threatens data security. Our guest for this episode is Phil Huggins, a Vice President in the firm's London office. Contrary to popular belief, it's not an organization's IT function that's responsible for ensuring the security of its information. Rather, as Phil will explain, culture is today's greatest driver of cyber security. He looks at what cultural aspects and behaviors are most likely to put a company at risk, what it means to infuse security into an organization and what IT's role should be, and whether it's even possible to remain secure and take the business risks necessary to be profitable. So let's get started with episode 2 of our show, right now. Hello, Phil. Welcome to the show. Hey, thanks for having me. It's great to have you on. We have a very interesting topic. Why don't we jump right in? What aspects, Phil, of a company's culture are most likely to put its information at risk? One of the key drivers of information risk is how everybody in the organization handles the information. Some of the fundamental problems underlying this are that security needs to be everybody's responsibility. If security is just the responsibility of the security team, we see bad decisions, bad behaviors across an organizations. There's lots of reasons that would drive that. Organizations that value collaboration, organizations that value convenience, mission-driven organizations and organizations that are very agile all have incentives and drivers that push them away from security if that's not part of everybody's responsibility. For example, collaboration. It makes people less tolerant of stricter controls - controls that make it harder to collaborate. Also where there's large amounts of collaboration in an organization, we also find that people have less time to focus on their core tasks. As a result they're much less tolerant of inconvenience, leading to the next problem.

2 2 There's a lot of bad security out there. Security decisions get made in the past, they get kept, they get recycled into the future. There's a lot of security that doesn't necessarily make sense any more. That's really inconvenient. So let's be clear. Security can often inconvenience people, but it's the different between security that says no and the security that says yes, but. Mission-driven organizations are very interesting. They're very focused on the outcomes they're trying to achieve. They're very focused on the mission, where they're going, and anything that is not that mission is not incentivized. That can be a real problem for security. It means it's always deprioritized. We're starting to see agile methodologies, agile business and technology approaches, turning up in much larger businesses, which is great because there's some advantage and value to be driven out of that process - this sort of incremental fail-fast process. It has to be in context. Most start-ups fail. Most start-ups take business risks that don't work out. We need to understand that sometimes the failure of a small agile team performing a function, learning from that failure, that's great when it's just a business failure. When it's a failure of security because we're so interconnected and such a broad-based organization these days, that failure can infect all sorts of areas of the business. We also find that we end up building up security debt. Phase two of projects rarely happens. So Phil, what sort of behaviors result from all this? And what's risky about them? What we're seeing is that security isn't front and center. People, when they make risk decisions, they make risk decisions every day. When they decide whether to click a link; whether or not they're going to apply a patch now or later; whether they decide the current version of the software is good enough to be deployed in the real world; whether they decide sharing the information with the person that's asked for it seems like a good idea, seems like a friendly thing to do those are all risk decisions. If that's not incentivized, if that's not communicated, if that's not explained, then people will fall back onto the key drivers of the organization. If it's a collaborative organization they'll share. If it's an organization that wants to move quick, to be agile, they're looking for convenience. If it's a mission-driven organization they will run just straight through security because that's not contributing to the mission. Why do businesses continue to tolerate this kind of activity in light of all the recent major data breaches given what you've just described? Well, what we've known for years, it's not just a security problem. People aren't great at judging risk. Even security people like myself are not great at judging risk. They won't understand by default. It needs to be explained, it needs to be communicated. Also, often the incentives behind the risk decisions they're making are out of sync. The organization at a macro level may well not want to take those sort of risks, but at a micro level it may be rewarding behaviors which are more risky than they would otherwise want. So is the solution then to change company culture? That seems like a pretty big shift to make. Changing culture is hard. In all of the security work I've ever done, this is about the hardest thing you can ever do. The goal probably isn't to destroy an existing culture. It's not to replace an existing culture. It's to build security. It s to fuse security into the DNA of the business. It's about helping people accept responsibility for security. It's about communicating and engaging with them so that they're prepared to deal with security. And this as you say is not easy at all, right?

3 3 : No, no. This is amongst the hardest things I've had to do in my career. To date, we're still learning how to do it. There have been some great examples out there. There have been some great programs, some great successes. Making the change happen is hard. Sustaining the change, that's even harder. So let's talk about infusing security into the organization. What exactly is this? And is there something concrete that businesses should do? Absolutely. The first thing is a business needs to understand what security it wants. It needs to understand what is the risk tolerance of that business, what is the goal in terms of how much risk it wants to take. What's the trade off with the benefits they want to make? In order to do that, the people at the top need to have a strategy. They need to have really understood their appetite for risk. They need to document it. That might be a policy. It probably normally is a policy. It might be a strategy as well. It's about making sure that they understand how the statements they're making directly relate to the risk they want to manage. One of the big problems we found with policy in the past, it's pretty dry, it's pretty technical. A lot of people don't really understand it. It needs to be focused on the problems of the business. It needs to be focused on the threats, it needs to be focused on the risks. It's got to hit those compliance targets. If you've got an outside party, if you're being assessed for PCI-DSS compliance, if you've got an outside auditor, you need to make sure that you can tick the boxes that they need you to tick. But don't just list out the sorts of things that every policy has ever had because it seems like a good idea. It has to make sense for your business. The other thing, and this is key, you've got to be able to make exceptions to the policy smooth. You've got to be rigorous in how you assess those exceptions, but you have to have a smooth exception process. Otherwise people will just run rough shot around. Is this a common mistake people make? They don't have that in place? Absolutely. The two most common mistakes they would make is a big weighty technical policy that makes little sense in the modern business, combined with a process that takes months for security to tell them "no, they can't make an exception to the process. Both of those things do not help engagement, do not help the people who are making the decisions make better decisions. Okay, so what are the advantages of having a risk-based policy over one that's based on compliance as you described? One of the big ones is cost effectiveness. We only have so much money to spend in security these days. We have an increasingly worrying threat environment that we operate within. We can't protect everything. I think that's becoming accepted now. We're now focusing much more on the resilience of the business we're in. The ability to withstand attack and just survive. The cost effectiveness means we can start applying the security budget in places that matter. The other thing is, and we've mentioned it before, inconvenience. People don't like inconvenience. They work around it and they fight it. If you re going to bring some sort of inconvenience in, if it's inescapable in the process to meet that security requirement, only do it where it matters. Don't do it just because you do it in every other process. Don't do it in a process that doesn't matter. So you found that people are willing to accept inconvenience if they understand the need?

4 4 They're a lot more willing to engage the acceptance is a much longer term cultural change issue. They're much more willing to engage with a real issue than they are with some theoretical statement of risk. Okay. So what is IT's role in all this? Cyber security and information security are very wide topics. They come across all parts of the business from finance through to HR. IT is the front line. IT is where the rubber hits the road. It's where most of the threats are initiated. Most of the problems and most of the issues we need to address are related to human behavior, but it's human behavior using the IT. Some of the great things that IT can do is come up with some good defaults. Make some of these decisions for people. Make them so it helps them do their job, it s not inconvenient. But make it so they're secure to start with. That's a great first step for IT. As I said, keeping the exceptions to policy smooth and fast, that's a big step forward. This is something we'd expect IT to do, but look after the hygiene. Don't expect the people outside of IT who are making risk decisions to have to make the sort of decisions they shouldn't have to make. Should I buy this patch or not? Most people in the business wouldn't care, they assume it's being done. IT needs to change quickly. So talking about patching, how quickly can you get those patches out? How quickly can you change the business? That's an important part of this. Don't just plan for failure, design for failures. Understand that that's going to happen. But the key thing is, advise and engage. Get out and explain what's happening, and advise people what they're doing. Help them make those decisions. Do most IT departments these days understand these things? I would say not. I would say actually most IT departments are operationally responsible for security but still sit separate from security, even if they've got the same reporting line. They still see the incentive of the IT department is to deliver benefits, it's to deliver change, it's to make the IT reliable and to work, and security is someone else's problem. This comes back to accepting responsibility and to spreading that acceptance of responsibility throughout the business. That's interesting. If a business was say, completely 100% secure, could business get done? Or is risk inherent in any kind of operation? And we just have to accept this? We'll never get rid of security risk. Security risk is a human problem. It'll always be with us like crime. I would also argue that taking risk is where we make our profit. The more we evaporate the risk the more we mitigate the risk, the less profit we're going to make. Last question, how do you know you've struck the right balance then between risk and convenience? Well there's some great work going on at the moment. There are a number of indicators and factors that we can look at around staff behaviors. We can start doing some very coarse measurements. Stuff we've done for years, but probably haven't really thought about in this way, about sorts of security decisions we can see partial equality and that sort of thing. We're starting to see the deployment of big data platforms that are doing behavioral analysis looking for bad guys. One of the things on the horizon will be the use of those platforms to measure risk decisions that our staff make and act as a platform to make feedback. That's a key part here, it's that staff need to know when they're making a good decision and when they're making a bad decision. They need to be able to pick up on that. Being able to monitor while it's happening is great, but we need to be honest. We're generally going to find out whether we've done the right thing in retrospect.

5 5 We're generally going to find out by understanding your own security events, the security events in your sector, and security events for everybody and just to look at the differences and see are you ahead of the game? Are you ahead of the curve? Interesting. Fascinating stuff, Phil. Thanks so much for your time and sharing your thoughts on this important topic. Thanks a lot. Well, that ends episode two of the Business of Truth podcast by Stroz Friedberg. Many thanks to Phil Huggins for sharing his thoughts on organizational culture and information security. As Phil explains, no business can be 100% secure, so organizations must strike a balance between risk and convenience. Thanks for joining us, please look for future episodes of our show, where we explore information security, business intelligence and investigations in a data-driven world Stroz Friedberg. All rights reserved.

Jenesis Software - Podcast Episode 2

Jenesis Software - Podcast Episode 2 Jenesis Software - Podcast Episode 2 All right, welcome to episode two with Chuck, Eddie, And Benny. And we're doing some technical talk today about network speed on episode two. Let's talk about, guys,

More information

Jenesis Software - Podcast Episode 3

Jenesis Software - Podcast Episode 3 Jenesis Software - Podcast Episode 3 Welcome to Episode 3. This is Benny speaking, and I'm with- Eddie. Chuck. Today we'll be addressing system requirements. We will also be talking about some monitor

More information

A: We really embarrassed ourselves last night at that business function.

A: We really embarrassed ourselves last night at that business function. Dialog: VIP LESSON 049 - Future of Business A: We really embarrassed ourselves last night at that business function. B: What are you talking about? A: We didn't even have business cards to hand out. We

More information

Computer Forensics for Business Leaders: Building Robust Policies and Processes Transcript

Computer Forensics for Business Leaders: Building Robust Policies and Processes Transcript Computer Forensics for Business Leaders: Building Robust Policies and Processes Transcript Part 1: Why Policy Is Key Stephanie Losi: Welcome to CERT's podcast series: Security for Business Leaders. The

More information

A: I thought you hated business. What changed your mind? A: MBA's are a dime a dozen these days. Are you sure that is the best route to take?

A: I thought you hated business. What changed your mind? A: MBA's are a dime a dozen these days. Are you sure that is the best route to take? Dialog: LESSON 120 - MBA A: What are you doing tomorrow? B: I'm starting my MBA. A: I thought you hated business. What changed your mind? B: I do hate it, but I need to start making more money. A: MBA's

More information

How the University of Pittsburgh Is Using the NIST Cybersecurity Framework Transcript

How the University of Pittsburgh Is Using the NIST Cybersecurity Framework Transcript How the University of Pittsburgh Is Using the NIST Cybersecurity Framework Transcript Part 1: Applicability of the NIST CSF Lisa Young: Welcome to the CERT Podcast Series: Security for Business Leaders.

More information

Show notes for today's conversation are available at the podcast website.

Show notes for today's conversation are available at the podcast website. What Business Leaders Can Expect from Security Degree Programs Transcript Part 1: Nuts and Bolts versus the Big Picture Stephanie Losi: Welcome to CERT's podcast series, Security for Business Leaders.

More information

Good CAD / Bad CAD. by Tony Richards

Good CAD / Bad CAD. by Tony Richards Good CAD / Bad CAD by Tony Richards Looking for a new computer-aided dispatch and/or records management system? Trying to figure out exactly what you should be looking for? What distinguishes good from

More information

Will Dormann: Sure. Fuzz testing is a way of testing an application in a way that you want to actually break the program.

Will Dormann: Sure. Fuzz testing is a way of testing an application in a way that you want to actually break the program. The Power of Fuzz Testing to Reduce Security Vulnerabilities Transcript Part 1: Why Fuzz Testing? Julia Allen: Welcome to CERT's podcast series: Security for Business Leaders. The CERT program is part

More information

Electronic Health Records: Challenges for Patient Privacy & Security Transcript

Electronic Health Records: Challenges for Patient Privacy & Security Transcript Electronic Health Records: Challenges for Patient Privacy & Security Transcript Part 1: Technical, Social, and Political Hurdles Julia Allen: Welcome to CERT's Podcast Series: Security for Business Leaders.

More information

How To Know If You Can Get A Court Order To Stop Being Sued And Garnished

How To Know If You Can Get A Court Order To Stop Being Sued And Garnished Five minute guide to being sued & wage garnishment First, it is important to distinguish between actually being sued and having creditors threaten to sue you. The difference is important. We have seen

More information

WhatWorks: Blocking Complex Malware Threats at Boston Financial

WhatWorks: Blocking Complex Malware Threats at Boston Financial WhatWorks: Blocking Complex Malware Threats at Boston Financial with WhatWorks is a user-to-user program in which security managers who have implemented effective internet security technologies tell why

More information

Equity Value, Enterprise Value & Valuation Multiples: Why You Add and Subtract Different Items When Calculating Enterprise Value

Equity Value, Enterprise Value & Valuation Multiples: Why You Add and Subtract Different Items When Calculating Enterprise Value Equity Value, Enterprise Value & Valuation Multiples: Why You Add and Subtract Different Items When Calculating Enterprise Value Hello and welcome to our next tutorial video here. In this lesson we're

More information

How to Choose the Right Credit Card Processing Company

How to Choose the Right Credit Card Processing Company How to Choose the Right Credit Card Processing Company How To Choose The Right Credit Card Processing Company If you're in business these days, you need to accept credit cards. The problem is, which type

More information

Okay, good. He's gonna release the computers for you and allow you to log into NSLDS.

Okay, good. He's gonna release the computers for you and allow you to log into NSLDS. Welcome to the NSLDS hands-on session. My name is Larry Parker. I'm from the Department of Education NSLDS. Today, I have with me a whole host of folks, so we're gonna make sure that if you have any questions

More information

DAN'S VAN: AN ACCIDENT STORY PART TWO

DAN'S VAN: AN ACCIDENT STORY PART TWO 'S VAN: AN ACCIDENT STORY PART TWO CHARACTERS: Dan Davis, a 28-yr-old independent construction contractor Tanya, Dan's wife, an assistant manager at Kmart Female recorded voice at Nationwide Richard, a

More information

Small Business Success Podcast: RETIREMENT PLANNING FOR SMALL BUSINESS

Small Business Success Podcast: RETIREMENT PLANNING FOR SMALL BUSINESS Small Business Success Podcast: RETIREMENT PLANNING FOR SMALL BUSINESS The SCORE Small Business Success Podcast features interviews with the best and brightest in the world of small business, covering

More information

Mark Minervini. Interview with Tim Bourquin

Mark Minervini. Interview with Tim Bourquin Mark Minervini Interview with Tim Bourquin Mark Minervini is one of America s most successful stock traders; a veteran on Wall Street with nearly 30 years of experience. He won the 1997 U.S. Investing

More information

Kobren LL Best Practice F35 JSF Part Sixteen

Kobren LL Best Practice F35 JSF Part Sixteen Welcome to the Defense Acquisition University. This material is for non-profit educational use only. Speaker's views and opinions are not necessarily those of the Department of Defense or DAU. Bill: Today

More information

Flat Rate Per Claim -vs- Percentage Billing Fees. A Devil's Advocate View

Flat Rate Per Claim -vs- Percentage Billing Fees. A Devil's Advocate View Flat Rate Per Claim -vs- Percentage Billing Fees A Devil's Advocate View Assuming a full service solution, there are basically two methods billing services use to charge for their services, either a percentage

More information

YOU WILL NOT BE EFFECTIVE READING THIS.

YOU WILL NOT BE EFFECTIVE READING THIS. This is the most effective and powerful script for securing appointment with FSBO's you will ever put to use. This scrip will increase your appointment closing ratio by 50-60%. The thing to keep in mind

More information

Using collaboration to enable the innovators in your organization. Welcome to the IBM CIO Podcast Series. I'm your host, Jeff Gluck,

Using collaboration to enable the innovators in your organization. Welcome to the IBM CIO Podcast Series. I'm your host, Jeff Gluck, IBM Global Technology Services www.ibm.com/services IBM Podcast Using collaboration to enable the innovators in your organization Welcome to the IBM CIO Podcast Series. I'm your host, Jeff Gluck, and my

More information

"Why Don't Recruitment Agencies Get Back to Me?"

Why Don't Recruitment Agencies Get Back to Me? Special In-Depth Articles Title: "Why Don't Recruitment Agencies Get Back to Me?" Dealing with a recruitment agency can be frustrating. Here's the brutal truth from an insider on how they work and why

More information

731-04-joel_maloff-phone.com-cloud_based_phone_service Page 1 of 5

731-04-joel_maloff-phone.com-cloud_based_phone_service Page 1 of 5 731-04-joel_maloff-phone.com-cloud_based_phone_service Page 1 of 5 Ranked the #1 radio show in the Boston Market in its time-slot, and with more than 5,500,000 Podcast downloads, Tech Talk With Craig Peterson

More information

Introduction to Open Atrium s workflow

Introduction to Open Atrium s workflow Okay welcome everybody! Thanks for attending the webinar today, my name is Mike Potter and we're going to be doing a demonstration today of some really exciting new features in open atrium 2 for handling

More information

Podcast Transcription Session 20: Renaud Laplanche

Podcast Transcription Session 20: Renaud Laplanche Podcast Transcription Session 20: Renaud Laplanche Peter Renton: Welcome the Lend Academy Podcast, session number 20. This is your host, Peter Renton, founder of Lend Academy. [music] Peter: So we have

More information

SARS_20131230_173118 Page 1 of 6

SARS_20131230_173118 Page 1 of 6 Speaker 1: In this episode, I want to discuss how to describe things in your personal statements or in your application materials when you have to talk about something that's a bad thing from your past,

More information

The Challenge of Helping Adults Learn: Principles for Teaching Technical Information to Adults

The Challenge of Helping Adults Learn: Principles for Teaching Technical Information to Adults The Challenge of Helping Adults Learn: Principles for Teaching Technical Information to Adults S. Joseph Levine, Ph.D. Michigan State University levine@msu.edu One of a series of workshop handouts made

More information

>> Hello, everyone. My name is LeTiana Ridgell and I would like to welcome you to Note Taking Strategies. We designed this workshop to give you the

>> Hello, everyone. My name is LeTiana Ridgell and I would like to welcome you to Note Taking Strategies. We designed this workshop to give you the >> Hello, everyone. My name is LeTiana Ridgell and I would like to welcome you to Note Taking Strategies. We designed this workshop to give you the necessary tools and information 1 in order to become

More information

The Skeleton Project Fletcher Jones Phil Smith, CEO, Fletcher Jones

The Skeleton Project Fletcher Jones Phil Smith, CEO, Fletcher Jones TRANSCRIPT The Skeleton Project Fletcher Jones Phil Smith, CEO, Fletcher Jones Hi. I'm Phil Smith and I'm the CEO of Fletcher Jones. Fletcher Jones is an apparel retail organisation that's been around

More information

Demystifying Quality Score with Brad Geddes

Demystifying Quality Score with Brad Geddes Demystifying Quality Score with Brad Geddes Group: Hi, everybody. How are you all doing? Good. Good, excellent. Thank you all for coming to Hero Conf today, we really appreciate it. We're very excited

More information

Transcription. Crashplan vs Backblaze. Which service should you pick the short version

Transcription. Crashplan vs Backblaze. Which service should you pick the short version Transcription Crashplan vs Backblaze Hey and welcome to cloudwards.net and another exciting video of two major unlimited online backup services namely Backblaze and CrashPlan or CrashPlan or Backblaze.

More information

BACKGROUND CONFERENCE CALL WITH SENIOR ADMINISTRATION OFFICIALS ON THE CONSEQUENCES OF ALLOWING THE PROTECT AMERICA ACT TO EXPIRE

BACKGROUND CONFERENCE CALL WITH SENIOR ADMINISTRATION OFFICIALS ON THE CONSEQUENCES OF ALLOWING THE PROTECT AMERICA ACT TO EXPIRE BACKGROUND CONFERENCE CALL WITH SENIOR ADMINISTRATION OFFICIALS ON THE CONSEQUENCES OF ALLOWING THE PROTECT AMERICA ACT TO EXPIRE February 22, 2008-6:00 P.M. MR. ROEHRKASSE (Department of Justice): This

More information

The single biggest mistake many people make when starting a business is they'll create a product...

The single biggest mistake many people make when starting a business is they'll create a product... Killer Keyword Strategies - Day 1 "A Guaranteed Way To Find A Starving Crowd Using The Power Of Keyword Research..." The single biggest mistake many people make when starting a business is they'll create

More information

B: He's getting a divorce and says he won't be able to pay for it after he pays alimony and child support.

B: He's getting a divorce and says he won't be able to pay for it after he pays alimony and child support. Dialog: VIP LESSON 001 - Alimony A: Why is Kevin selling his house? B: He's getting a divorce and says he won't be able to pay for it after he pays alimony and child support. A: Why is he getting a divorce?

More information

BBBT Podcast Transcript

BBBT Podcast Transcript BBBT Podcast Transcript About the BBBT Vendor: The Boulder Brain Trust, or BBBT, was founded in 2006 by Claudia Imhoff. Its mission is to leverage business intelligence for industry vendors, for its members,

More information

LIST BUILDING PROFITS

LIST BUILDING PROFITS LIST BUILDING PROFITS BUILD YOUR LIST THE RIGHT WAY Jonathan Leger COURTESY OF LEARNFROMJON.COM - PRIVATE BUSINESS COACHING FROM A MULTI-MILLION DOLLAR INTERNET MARKETER + ACCESS TO PREMIUM AND EXCLUSIVE

More information

Real Estate Investing Podcast Episode # 74 The ABCs of Finding and Training a Virtual Assistant Hosted by: Joe McCall and Alex Joungblood

Real Estate Investing Podcast Episode # 74 The ABCs of Finding and Training a Virtual Assistant Hosted by: Joe McCall and Alex Joungblood Real Estate Investing Podcast Episode # 74 The ABCs of Finding and Training a Virtual Assistant Hosted by: Joe McCall and Alex Joungblood Jesse: Hey, welcome back. This is Real Estate Investing Mastery.

More information

Managed Services in a Month - Part Five

Managed Services in a Month - Part Five Managed Services in a Month 59 Managed Services in a Month - Part Five Where we've been: Topic One: Start making a plan Topic Two: Create a three-tiered pricing structure Topic Three: Weed your client

More information

关 于 台 词 的 备 注 : 请 注 意 这 不 是 广 播 节 目 的 逐 字 稿 件 本 文 稿 可 能 没 有 体 现 录 制 编 辑 过 程 中 对 节 目 做 出 的 改 变

关 于 台 词 的 备 注 : 请 注 意 这 不 是 广 播 节 目 的 逐 字 稿 件 本 文 稿 可 能 没 有 体 现 录 制 编 辑 过 程 中 对 节 目 做 出 的 改 变 BBC Learning English 15 Minute Programmes 15 分 钟 节 目 About this script Please note that this is not a word for word transcript of the programme as broadcast. In the recording and editing process, changes

More information

MS Learn Online Feature Presentation Managing Symptoms: Vision Nancy Holland, Ed.D, RN, MSCN. Tom>> Welcome to MS Learn Online, I m Tom Kimball

MS Learn Online Feature Presentation Managing Symptoms: Vision Nancy Holland, Ed.D, RN, MSCN. Tom>> Welcome to MS Learn Online, I m Tom Kimball Page 1 MS Learn Online Feature Presentation Managing Symptoms: Vision Nancy Holland, Ed.D, RN, MSCN Tom>> Welcome to MS Learn Online, I m Tom Kimball Tracey>> And I m Tracey Kimball. People living with

More information

Social Media Measurement & Metrics Master Class

Social Media Measurement & Metrics Master Class Social Media Measurement & Metrics Master Class Hello and welcome to Creating Fame Classroom: Social Media Measurement & Metrics Master Class. I'm Laura Roeder and here is what you're about to learn today:

More information

Refog. Maxim Ananov, REFOG Help Desk

Refog. Maxim Ananov, REFOG Help Desk Refog Maxim Ananov, REFOG Help Desk 1. How does it work? Is it installed locally or does it work in the cloud? System administrator installs Refog Monitor on a computer that is to be used to. Installation

More information

Using our Club website to manage team Practice Schedules

Using our Club website to manage team Practice Schedules Login to www.somersethillslacrosse.com Parents who are new to our programs often ask How do you schedule practices, coach? and for most of us the answer is Make sure I have your correct email address!

More information

SCHRODERS Q1 Interim Management Statement 2015 Conference Call. Michael Dobson: Thursday 30 April 2015 9:00 a.m. BST

SCHRODERS Q1 Interim Management Statement 2015 Conference Call. Michael Dobson: Thursday 30 April 2015 9:00 a.m. BST SCHRODERS Q1 Interim Management Statement 2015 Conference Call Michael Dobson Thursday 30 April 2015 9:00 a.m. BST Good morning. Thank you for standing by, and welcome to the Q1 interim management statement

More information

How to Get of Debt in 24 Months

How to Get of Debt in 24 Months www.steamenginefinancialcoaching.com How to Get of Debt in 24 Months by John Bonesio, Financial Coach How to Get Out of Debt in 24 Months There are lots of debt solutions out there. You may have heard

More information

A Conversation with Chris Denninger RIT Director of Public Safety Facilitated by Luke Auburn

A Conversation with Chris Denninger RIT Director of Public Safety Facilitated by Luke Auburn A Conversation with Chris Denninger RIT Director of Public Safety Facilitated by Luke Auburn [ Music ] Luke Auburn: You're listening to the RIT professional development podcast series. I'm your host Luke

More information

Date. Hello, Good Afternoon and Welcome to Pegasus Racing! I cordially invite you to join me...

Date. Hello, Good Afternoon and Welcome to Pegasus Racing! I cordially invite you to join me... "I m One Of The UK s Top Horse Racing Tipsters & I m Going To Show You My Closely Guarded Secrets Of How I Make Thousands From Horse Racing So You Can Too!" Date Hello, Good Afternoon and Welcome to Pegasus

More information

Penetration Testing Walkthrough

Penetration Testing Walkthrough Penetration Testing Walkthrough Table of Contents Penetration Testing Walkthrough... 3 Practical Walkthrough of Phases 2-5... 4 Chose Tool BackTrack (Armitage)... 5 Choose Target... 6 Phase 2 - Basic Scan...

More information

Podcast Interview Episode 108 SEO is EASIER today than it has EVER been - With Court Tuttle

Podcast Interview Episode 108 SEO is EASIER today than it has EVER been - With Court Tuttle Presents: Podcast Interview Episode 108 SEO is EASIER today than it has EVER been - With Court Tuttle By: Leslie Samuel Copyright 2013. All Rights Reserved. www.becomeablogger.com - Page 1 This Transcript

More information

App Development Checklist

App Development Checklist App Development Checklist 10 Essential steps for making your app a success 1. Don't take yes for an answer Believe it or not, sometimes the worst thing you can hear from a developer is the word "Yes".

More information

Transcription. Founder Interview - Panayotis Vryonis Talks About BigStash Cloud Storage. Media Duration: 28:45

Transcription. Founder Interview - Panayotis Vryonis Talks About BigStash Cloud Storage. Media Duration: 28:45 Transcription Founder Interview - Panayotis Vryonis Talks About BigStash Cloud Storage Media Duration: 28:45 Feel free to quote any passage from this interview for your articles. Please reference cloudwards.net

More information

Next Generation Tech-Talk. Cloud Based Business Collaboration with Cisco Spark

Next Generation Tech-Talk. Cloud Based Business Collaboration with Cisco Spark Next Generation Tech-Talk Cloud Based Business Collaboration with Cisco Spark 2 [music] 00:06 Phil Calzadilla: Hello, hello! Welcome. This is Phil Calzadilla founder and CEO of NextNet Partners, and I'd

More information

BBBT Podcast Transcript

BBBT Podcast Transcript BBBT Podcast Transcript About the BBBT Vendor: The Boulder Brain Trust, or BBBT, was founded in 2006 by Claudia Imhoff. Its mission is to leverage business intelligence for industry vendors, for its members,

More information

PRE-TOURNAMENT INTERVIEW TRANSCRIPT: Tuesday, January 27, 2015

PRE-TOURNAMENT INTERVIEW TRANSCRIPT: Tuesday, January 27, 2015 PRE-TOURNAMENT INTERVIEW TRANSCRIPT: Tuesday, January 27, 2015 LYDIA KO MODERATOR: Happy to be joined in the media center by Rolex Rankings No. 2, Lydia Ko. Lydia, you're coming off winning the CME last

More information

Become Debt Free. $1,000 to start an Emergency Fund. Pay off all debt using the Debt Snowball. 3 to 6 months of expenses in savings

Become Debt Free. $1,000 to start an Emergency Fund. Pay off all debt using the Debt Snowball. 3 to 6 months of expenses in savings Become Debt Free $1,000 to start an Emergency Fund Pay off all debt using the Debt Snowball 3 to 6 months of expenses in savings Invest 15% of household income into Roth IRAs and pre-tax retirement College

More information

Janet E. Helms, Ph.D. Augustus Long Professor, Department of Counseling, Boston College

Janet E. Helms, Ph.D. Augustus Long Professor, Department of Counseling, Boston College Janet E. Helms, Ph.D. Augustus Long Professor, Department of Counseling, Boston College Interviewed by Carlos P. Zalaquett, Ph.D., L.M.H.C Department of Psychological & Social Foundations University of

More information

Short Selling Tutorial

Short Selling Tutorial Short Selling Tutorial http://www.investopedia.com/university/shortselling/ Thanks very much for downloading the printable version of this tutorial. As always, we welcome any feedback or suggestions. http://www.investopedia.com/investopedia/contact.asp

More information

Tom>> In an interview with medical correspondent Kate Milliken, Dr. LaRocca explains what health services research is and what they ve been learning.

Tom>> In an interview with medical correspondent Kate Milliken, Dr. LaRocca explains what health services research is and what they ve been learning. MS Learn Online Feature Presentation Health Services Research Nicholas LaRocca, PhD Tracey>> Hello, I m Tracey Kimball Tom>> And I m Tom Kimball. Welcome to MS Learn Online. When we talk about MS research

More information

Profiles of Civil Engineers

Profiles of Civil Engineers Profiles of Civil Engineers Kelly D. Payne, P.E. Project Engineer HDR Engineering, Inc. Austin, TX Education: B.S. Civil Engineering, Texas A&M University M.S. Civil and Environmental Engineering, Cornell

More information

Create Irresistible Lead Magnets That Make Your Prospects Eager to Buy From You

Create Irresistible Lead Magnets That Make Your Prospects Eager to Buy From You Create Irresistible Lead Magnets That Make Your Prospects Eager to Buy From You Introduction... 1 Chapter 1 What Is a Lead Magnet?... 1 Chapter 2 Find the One Thing They're Hungry For... 3 Chapter 3 Give

More information

TRANSCRIPT. Fred.: The basic definition of a cyber-trap is a real world legal issue that kids can get into through the use of electronics.

TRANSCRIPT. Fred.: The basic definition of a cyber-trap is a real world legal issue that kids can get into through the use of electronics. Across the Fence University of Vermont Extension 106 High Point Center, Suite 300 Colchester, Vermont 05446-8800 802-656-5059 or 888-283-3430 www.uvm.edu/extension/atfblog/ TRANSCRIPT EPISODE DATE: 7/18/12

More information

How To Clean Your Credit In 60 Days... Or Less!

How To Clean Your Credit In 60 Days... Or Less! Credit Repair Kit Easy To Read - Easy To Use Step-By-Step Method How To Clean Your Credit In 60 Days... Or Less! This Guidebook Will Show You How You Can Have Perfect Credit With Very Little Effort FREE

More information

This is Tray Thompson. Today we ll be having our first. webinar of the semester, Credit cards versus Debit

This is Tray Thompson. Today we ll be having our first. webinar of the semester, Credit cards versus Debit 1 1 1 1 0 1 Credit cards versus Debit cards This is Tray Thompson. Today we ll be having our first webinar of the semester, Credit cards versus Debit Cards. As you know we have a Chat feature in this as

More information

How to Write a Marketing Plan: Identifying Your Market

How to Write a Marketing Plan: Identifying Your Market How to Write a Marketing Plan: Identifying Your Market (Part 1 of 5) Any good marketing student will tell you that marketing consists of the four functions used to create a sale: The right product to the

More information

Jared Roberts (PelotonU)

Jared Roberts (PelotonU) p.1 Jared Roberts (PelotonU) Jared Roberts: Hello Dave. David Cutler: Hey, is this Jared? Jared: Yes, it is, how are you doing? David: I'm doing great, Jared. Thank you so much for speaking with me, I

More information

How to Perform a Break-Even Analysis in a Retail Store A Step by Step Guide

How to Perform a Break-Even Analysis in a Retail Store A Step by Step Guide How to Perform a Break-Even Analysis in a Retail Store A Step by Step Guide By BizMove Management Training Institute Other free books by BizMove that may interest you: Free starting a business books Free

More information

How to Create Winning Joint Ventures

How to Create Winning Joint Ventures How to Create Winning Joint Ventures Jim Ingersoll here with another segment on private lender financing and your private lending course. I'm excited to have you along. Now that you know why you want to

More information

Moderator: Sharon Burton March 19, 2008 2:00 PM ET

Moderator: Sharon Burton March 19, 2008 2:00 PM ET Moderator Sharon Burton 3/19/2008-200 PM ET Page 1 Moderator Sharon Burton March 19, 2008 200 PM ET And this is the Office of Safe and Drug Free Schools Partnerships in Character Grant Competition Conference

More information

Secrets From OfflineBiz.com Copyright 2010 Andrew Cavanagh all rights reserved

Secrets From OfflineBiz.com Copyright 2010 Andrew Cavanagh all rights reserved Secrets From OfflineBiz.com Copyright 2010 Andrew Cavanagh all rights reserved The Lucrative Gold Mine In Brick And Mortar Businesses If you've studied internet marketing for 6 months or more then there's

More information

Job Interview Questions About the New Job and the Company

Job Interview Questions About the New Job and the Company Job Interview Questions About the New Job and the Company Q. What interests you about this job? A. When you're asked what interests you about the job you are being interviewed for, the best way to answer

More information

22Most Common. Mistakes You Must Avoid When Investing in Stocks! FREE e-book

22Most Common. Mistakes You Must Avoid When Investing in Stocks! FREE e-book 22Most Common Mistakes You Must Avoid When Investing in s Keep the cost of your learning curve down Respect fundamental principles of successful investors. You Must Avoid When Investing in s Mistake No.

More information

Multi-Factor Authentication: Do I Need It, and How Do I Get Started? [And If I Do Need It, Why Aren't Folks Deploying It?]

Multi-Factor Authentication: Do I Need It, and How Do I Get Started? [And If I Do Need It, Why Aren't Folks Deploying It?] Multi-Factor Authentication: Do I Need It, and How Do I Get Started? [And If I Do Need It, Why Aren't Folks Deploying It?] Joe St Sauver, Ph.D. (joe@internet2.edu) Internet2 Global Summit, Denver Colorado

More information

Thank you so much for having me. I m really excited to be here today.

Thank you so much for having me. I m really excited to be here today. Welcome to The Boomer Business Owner. My guest today is Ty Crandall. Ty is an honorary Baby Boomer, internationally known speaker, author, and business credit expert. With over 16 years of financial experience,

More information

Part 3 focuses on ways families can help keep teens from using or abusing alcohol and tobacco.

Part 3 focuses on ways families can help keep teens from using or abusing alcohol and tobacco. W Part 3: Alcohol and Tobacco Rules Are Family Matters elcome to Part 3 of FAMILY MATTERS Alcohol and Tobacco Rules Are Family Matters. FAMILY MATTERS is a program to help families prevent young teens

More information

So, let's dive right into what you need to do to start.

So, let's dive right into what you need to do to start. Welcome to the WADS System. This document contains the recommended steps to take in order to learn to trade. I created it with one thought in mind... making this as fun and easy to learn as possible. For

More information

Student Learning Center Collection. Ok, here we go. Managing your time before it manages you, ok.

Student Learning Center Collection. Ok, here we go. Managing your time before it manages you, ok. Ok, here we go. Managing your time before it manages you, ok. 1 Time management is the number one skill that every student should master in college. If you can master your time, you can pass your classes,

More information

w w w. d a v i s c o s. c o m

w w w. d a v i s c o s. c o m Think you know what works when hiring a new employee? Experts say: think again. Most managers skimp on time and energy needed to find the hest candidates for a job. You run your own company. You've grown

More information

December 10, 2012 - What You Want It to Be (154)

December 10, 2012 - What You Want It to Be (154) December 10, 2012 - What You Want It to Be (154) Welcome to Mom Enough. [Background Music] With your co-hosts, developmental psychologist, Dr. Marti Erickson and Erin Erickson, maternal child health specialist.

More information

Noble Transcription Services - Entrepreneur Delivers For Multiple Industries

Noble Transcription Services - Entrepreneur Delivers For Multiple Industries Noble Transcription Services - Entrepreneur Delivers For Multiple Industries Welcome, and you're listening to The Struggling Entrepreneur, the podcast where we address the challenges that you face when

More information

Profiles of Mechanical Engineers

Profiles of Mechanical Engineers Profiles of Mechanical Engineers Beth Lemen Site Operations Manager, P&G Pharmaceuticals Procter & Gamble Cincinnati, OH Education: BS, Mechanical Engineering, Clarkson University Job Description: Site

More information

The Next Royal Gold. June 22, 2011

The Next Royal Gold. June 22, 2011 The Next Royal Gold June 22, 2011 Home Print Edition Close Window Frank Curzio: Hello. Welcome to the Phase I Next Royal Gold conference call. I'm Frank Curzio, editor of the Phase I Investor newsletter

More information

Mainly, non-muslims information on Islam is based on what they see on television and in the movies.

Mainly, non-muslims information on Islam is based on what they see on television and in the movies. Why Islam I think Islam is the most misunderstood religion in the world. Not just by non-muslims, but by Muslims as well. Mainly, non-muslims information on Islam is based on what they see on television

More information

DIVORCE LAWYER JEREMY SUTTON ON CHILD SUPPORT WITH KARYN HAY

DIVORCE LAWYER JEREMY SUTTON ON CHILD SUPPORT WITH KARYN HAY DIVORCE LAWYER JEREMY SUTTON ON CHILD SUPPORT WITH KARYN HAY Very good thanks very much. Hi and good evening and we'll kick straight into it with your law tonight with Jeremy Sutton who is a family law

More information

Transcript of Episode #8. DDoS Attacks

Transcript of Episode #8. DDoS Attacks Transcript of Episode #8 DDoS Attacks Description: Distributed Denial of Service (DDoS) attacks are occurring with ever-greater frequency every day. Although these damaging attacks are often used to extort

More information

Telephone conversation between President Kennedy and Governor Ross Barnett September 29, 1962, 2:00 P.M.

Telephone conversation between President Kennedy and Governor Ross Barnett September 29, 1962, 2:00 P.M. Telephone conversation between President Kennedy and Governor Ross Barnett September 29, 1962, 2:00 P.M. President Kennedy: Hello? Hello, Governor? Governor Barnett: All right. Yes. JFK: How are you? RB:

More information

The Media Image of the Diabetic. the news says is "diabetes," "diabetics," and "obesity," so will my friends think I'm diabetic

The Media Image of the Diabetic. the news says is diabetes, diabetics, and obesity, so will my friends think I'm diabetic McCarthy 1 Bethany McCarthy Mrs. Tasha Bowlin English 100 Writing 1 13 Mar. 2013 The Media Image of the Diabetic As a type one diabetic, being diagnosed at the age of five years old, I've always known

More information

Center for Law and Social Policy December 11, 2009 12:30 p.m. EST

Center for Law and Social Policy December 11, 2009 12:30 p.m. EST Center for Law and Social Policy December 11, 2009 12:30 p.m. EST OPERATOR: I would now like to turn the floor over to the Center for Law and Social Policy. JODIE LEVIN EPSTEIN: Thank you and welcome,

More information

Introducing GPS Tracking Technology to Employees

Introducing GPS Tracking Technology to Employees Introducing GPS Tracking Technology to Employees Contents Overview... 2 The following five steps have proven to be highly effective in helping employees embrace change.... 2 Points for Introducing Our

More information

A Case for Variable Rate Mortgages ( P. d. Last Fall's Policy Changes: A Sound Program for Reducing Inflation < P. 5) Winter 1979

A Case for Variable Rate Mortgages ( P. d. Last Fall's Policy Changes: A Sound Program for Reducing Inflation < P. 5) Winter 1979 Federal Reserve Bank of Minneapolis Q u a r t e r l y R e v i e w Winter 1979 A Case for Variable Rate Mortgages ( P. d Last Fall's Policy Changes: A Sound Program for Reducing Inflation < P. 5) District

More information

Advice on Using Dada Mail

Advice on Using Dada Mail Advice on Using Dada Mail Advice on Using Dada Mail Table of Contents Advice on Using Dada Mail...1 A Public Announce-Only List and Why Closed-Loop Opt-in Is So Important...1 Subscriptions...1 Why Close-Loop

More information

Managing User Accounts and User Groups

Managing User Accounts and User Groups Managing User Accounts and User Groups Contents Managing User Accounts and User Groups...2 About User Accounts and User Groups... 2 Managing User Groups...3 Adding User Groups... 3 Managing Group Membership...

More information

Google Lead Generation For Attorneys - Leverage The Power Of Adwords To Grow Your Law Business FAST. The Foundation of Google AdWords

Google Lead Generation For Attorneys - Leverage The Power Of Adwords To Grow Your Law Business FAST. The Foundation of Google AdWords Google Lead Generation For Attorneys - Leverage The Power Of Adwords To Grow Your Law Business FAST You re about to discover the secrets of fast legal practice success with Google AdWords. Google AdWords

More information

Set internet safety parental controls with Windows

Set internet safety parental controls with Windows How to Microsoft lets parents set up internet safety settings on a Windows computer for their kids, using Family Safety. Family Safety provides a website and a free program that you install on the computers

More information

Audience: Audience: Tim Sain: Audience:

Audience: Audience: Tim Sain: Audience: My name is Tim Sain, and you guys are in a budgeting workshop. Has anyone ever done any kind of financial literacy? No. Budgeting? Workshop? Talked about money? Has anybody ever showed you how to spend

More information

"Setting up a business"

Setting up a business "Setting up a business" EPISODE 7 : "Planning the budget" AUTHOR: Erick-Hector HOUNKPE EDITORS: Yann Durand, Aude Gensbittel, Adrian Kriesch TRANSLATOR: Anne Thomas PROOFREADER: Charlotte Collins Characters

More information

COLOPLAST. Moderator: Lars Rasmussen September 22, 2015 5:00 p.m. GMT

COLOPLAST. Moderator: Lars Rasmussen September 22, 2015 5:00 p.m. GMT Page 1 COLOPLAST September 22, 2015 5:00 p.m. GMT This is conference # 955389. Lars Rasmussen: Good evening. I am Lars Rasmussen, CEO of Coloplast and I'm joined by our CFO Anders Lonning-Skovgaard and

More information

APAC PRESS & SP SUMMIT

APAC PRESS & SP SUMMIT NETEVENTS APAC PRESS & SP SUMMIT First Draft Welcome Address Manek Dubash Editorial Director Good morning,. You're very quiet this morning. Good morning,. Hey that's better. It's so nice to see some familiar

More information

Warmest Regards, Josh Nelson President PlumberSEO Toll Free: 866-610- 4647 http://www.plumberseo.net Email: josh@plumberseo.net

Warmest Regards, Josh Nelson President PlumberSEO Toll Free: 866-610- 4647 http://www.plumberseo.net Email: josh@plumberseo.net Foreword Hi. This is Josh Nelson. Thank you very much for your request. I'm grateful for the opportunity to provide you with information about Search Engine Optimization (SO) and helping you choose a SEO

More information

Supply Chain Risk Management: Managing Third Party and External Dependency Risk Transcript

Supply Chain Risk Management: Managing Third Party and External Dependency Risk Transcript Supply Chain Risk Management: Managing Third Party and External Dependency Risk Transcript Part 1: Why SCRM Is Increasingly Critical Julia Allen: Welcome to CERT's Podcast Series: Security for Business

More information