1 Physical Security (You re Doing It Wrong) A.P. Delchi
2 # whois delchi Infosec Rasputin Defcon, HOPE, Pumpcon, Skytalks Minister of Propaganda & Revenge, Attack Research
3 # whois delchi $DIETY Grant me the serenity to accept people who will not secure their networks, the courage to face them when they blame me for their problems, and the wisdom to go out drinking afterwards
4 You re Doing It Wrong A phrase meaning that the method you are using is not creating the desired result
5 Your MissioN
6 Your MissioN Design and implement a physical security system for a new facility, to include multi-factor authentication and video surveillance.
10 Proper Previous Planning Prevents Piss Poor Performance Dick Marcinko, The Rogue Warrior
11 Physical Security
12 Physical Security Physical security describes both measures that prevent or deter attackers from accessing a facility, resource, or information stored on physical media and guidance on how to design structures to resist various hostile acts. en.wikipedia.org/wiki/physical_security
13 Physical Security Physical security describes both measures that prevent or deter attackers from accessing a facility, resource, or information stored on physical media and guidance on how to design structures to resist various hostile acts. en.wikipedia.org/wiki/physical_security Measures to reasonably ensure that source or special nuclear material will only be used for authorized purposes and to prevent theft or sabotage.
14 Physical Security Physical security describes both measures that prevent or deter attackers from accessing a facility, resource, or information stored on physical media and guidance on how to design structures to resist various hostile acts. en.wikipedia.org/wiki/physical_security Measures to reasonably ensure that source or special nuclear material will only be used for authorized purposes and to prevent theft or sabotage. The measures used to provide physical protection of resources against deliberate and accidental threats.
17 Methodology ASSESSMENT A thorough examination of the facility to be protected.
18 Methodology ASSESSMENT Scope of property to be protected Established points of entry and egress Potential points of entry and egress Existing security measures Evaluation of physical property Risk assessment
19 Methodology ASSIGNMENT Establish the required level of security for specific areas and assets within the facility.
20 Methodology ASSIGNMENT High level Data Centers Executive Offices Finance & Accounting Medium Level Entry & Egress Reception Elevators Low Level Common Areas Cubicle Farms
21 Methodology ASSIGNMENT Considerations Insurance requirements Compliance requirements Fire code requirements Business requirements
22 Methodology ARRANGEMENT Establish the most effective locations for security devices based on their requirements.
23 Methodology Cameras Field of view Redundancy Tracking ARRANGEMENT Doorways Type of locks Multi factor authentication Time based restrictions Central Control Cabling limitations Power, archiving, and disaster planning
24 Methodology APPROVAL Submit all plans, costs, schedules and related data to management.
25 Methodology APPROVAL Hardware Quotes form multiple vendors Lifetime requirements Service plans costs Plan A, B, and C Flexibility Options Schedule Time frame for completion Interference with business operations
26 Methodology ACTION Implementing the physical installation and configuration of the approved system.
27 Methodology ACTION Construction Oversee construction Oversee inspections by state / local govt Manage corrections Training Security officers Users Establishing policy & procedure Testing Ensuring the system works as planned Compliance testing
28 What Could Possibly Go Wrong?
29 "No plan of operations extends with certainty beyond the first encounter with the enemy's main strength." Count Helmuth von Moltke
32 TRAINING Methodology
33 Experience TRAINING Methodology
34 Planning Experience TRAINING Methodology
45 Management PROS : Provide Budget Set Requirements Sign your paycheck Run the show Cons : They know this
47 Strife I want a state of the art high tech system. FBI, CIA kind of security
48 Strife I want a state of the art high tech system. FBI, CIA kind of security I can do that. Based on your needs, and the floor plan it will cost $54,875.
49 Strife I want a state of the art high tech system. FBI, CIA kind of security I can do that. Based on your needs, and the floor plan it will cost $54,875. Can t you just buy something from Costco?
50 Strife I want a state of the art high tech system. FBI, CIA kind of security I can do that. Based on your needs, and the floor plan it will cost $54,875. Can t you just buy something from Costco? <REDACTED> CEO of Information Security Firm
53 Strife I went to Best Buy and saw a HDMI cable for $50. I went home and surfed the internet for a while and found the same cable for $2 from a web site in China. If I can do that for a cable I expect you to do the same thing for my security system.
54 Strife I went to Best Buy and saw a HDMI cable for $50. I went home and surfed the internet for a while and found the same cable for $2 from a web site in China. If I can do that for a cable I expect you to do the same thing for my security system. <REDACTED> CEO of Fortune 500 Security Firm
55 Be knowledgeable on the equipment, methodology and best practices for your industry. Understand the impact that your project will have on business & user activity Rely on facts, not speculation, theory, rumors, or maybes. Present facts, support with documentation, explain risk and impact, prove mitigation Present in a factual & respectful manner, showing your work and explaining your reasoning behind the design If you don t know, you don t know. State that you will research and return with the answers Be prepared to loose gracefully
57 SUCCESS This is one hell of a security system. Whoever did this knew what the hell they were doing.
58 SUCCESS This is one hell of a security system. Whoever did this knew what the hell they were doing. <REDACTED> Visitor, Friend of CEO of information security firm
59 Shut up, get it done, failure is not an option. Charles Rawls VP of ass kicking dorsai Embassy, Earth
62 Vendors PROS : Provide Cool Toys Will Let You PLay with The Cool Toys Have historical info on product quality Cons : Will expect you to buy From Them
63 The Ferengi Rules Of Acquisition $6.99 ISBN :
64 RULE # 1 There are many, many, many vendors out there
65 RULE # 2 You do not always need the latest, greatest state of the art item
66 RULE # 3 Always deal with vendors between 11 AM & 2 PM
68 Reality Requirements
69 Reality Requirements
70 Reality Requirements RFQ
71 Reality Requirements RFQ
72 Reality Quote Requirements RFQ
74 Never rely on a single vendor Do not get caught up in vendor wars Ensure that the vendor is knowledgeable on the products they are selling Do your own product research Beware of unnecessary up-selling Get details on all aspects... warranty, service, training... Do not be afraid to revise your RFQ Do not be afraid to READ your RFQ Keep all paperwork, quotes, and RFQ revisions
75 Prioritize your needs to make a balance between budget and equipment Look for hidden costs, cost creep, feature creep, and after contract expenses If you work with multiple vendors for components of a system it is YOUR responsibility to ensure that the products will work together Know up front if subcontracting will happen, and if so do due diligence on the sub contractors A high price support contract does not always mean high quality support
77 "There are no honorable bargains involving exchange of qualitative merchandise like souls. Just quantitative merchandise like time and money." William S. Burroughs Words Of Advice For Young People
78 People Who THINK They Know More Than You
79 People Who THINK They Know More Than You
80 People Who THINK They Know More Than You PROS : They Usually Don t Make You Look Good Annoy Management Cons : Rarely Shut Up
81 Of course the alarm says it s 105 degrees. The sensor is on the ceiling, and heat rises. It s 105 up there, but down here where the servers are it s nowhere near 105. <REDACTED> CEO, MIT MBA, Said 20 Minutes before servers automatically shut down due to thermal alarms
82 Of course the alarm says it s 105 degrees. The sensor is on the ceiling, and heat rises. It s 105 up there, but down here where the servers are it s nowhere near 105. <REDACTED> CEO, MIT MBA, Said 20 Minutes before servers automatically shut down due to thermal alarms
83 Know the difference between water cooler talk and factual discourse. Refute with facts, experience, and a even tone Do NOT use personal attacks, vulgar insults, or questionable phrases or terms If they start playing the brownie points game, stop. If they start playing politics, stop. If they cite something they heard on AM talk radio, RUN!
84 Cut sheets from the vendor are a better point of reference than something told to a coworker by their barber who heard it from his cousin who works on the loading dock where the publish that technology magazine. Do not play buzzword bingo Know what the terms, acronyms, and technological phrases you use mean. Let them kiss ass, while you kick ass.
86 What about biometrics?
87 What about biometrics? Biometric three phase multi-homed active authentication is the best!
88 What about biometrics? Biometric three phase multi-homed active authentication is the best! I am not paid to listen to this drivel. You are a terminal fool.
89 What about biometrics? Biometric three phase multi-homed active authentication is the best! I am not paid to listen to this drivel. You are a terminal fool. *Ahem*
90 What about biometrics? Biometric three phase multi-homed active authentication is the best! *Ahem*
92 What about biometrics?
93 What about biometrics? Biometric three phase multi-homed active authentication is the best!
94 What about biometrics? Biometric three phase multi-homed active authentication is the best! As per your requirements the RFQ contains two factor authentication with an option for biometrics as a third, pending budgetary constraints. The cut sheets are in your copy of the RFQ.
97 CONSTRUCTION WORKERS
98 CONSTRUCTION WORKERS
99 CONSTRUCTION WORKERS PROS : Reliable Timing Know Trade Secrets Tell Good Jokes Cons : Will Do EXACTLY what You Tell Them To Do
100 Know the work schedule for the construction team Meet the foreman. Get his contact information. Read the blueprints. Read the blueprints again, with the foreman. Supervise the construction. Look for things that are not quite right. Expect to find surprises. Expect to pay to fix them.
101 Construction workers and their foreman are the first line of defense when it comes to building inspections. They know what needs to be done, and why. They deal with the same state/ county/city building inspectors on multiple projects. Listen to them. Do what they say. This is their area of expertise, even if the only adjective they know is fucking The fucking wiring is not hooked up to the fucking switch correctly, so it s not going to fucking work. It s fucked. -NJ construction worker
102 Construction workers on your project may not speak English. If this is a problem, deal with it before work begins. Consult with HR before bringing up the subject. If you can not communicate with each other there is no way to indicate problems, make changes, or share dirty jokes
104 Things WIll Go wrong
105 Not all problems can be solved with a clever work-around. A quick fix today can be a problem tomorrow.
106 Pizza and beer is cheaper than overtime.
109 USERS PROS : The Reason You Are Here Love To Take Classes Attracted To New Tech Cons : Will Expect Your System To Act The Way They Want It To
110 "If you have responsibility for security but have no authority to set rules or punish violators, your own role in the organization is to take the blame when something big goes wrong." Professor Gene Spafford "Practical Unix and Internet Security"
111 "Be comforted that in the face of all aridity and disillusionment, and despite the changing fortunes of time, There is always a big future in computer maintenance." "Deteriorata" - National Lampoon, 1972
LI_M_POPO PROVINCIAL GOVERNMENT :;:ED.JBl-C ()F SO"';-H AFR;IC. ':.,. DEPARTMENT OF CO-OPERATIVE GOVERNANCE, HUMAN SETTLEMENTS & TRADITIONAL AFFAIRS REVIEWED ICT DATA CENTRE PHYSICAL ACCESS AND ENVIROMENTAL
MARULENG LOCAL MUNICIPALITY Data Centre Physical Access and Environmental Control Policy Draft: Data Centre Access Control and Environmental Policy Page 1 Version Control Version Date Author(s) Details
We Do It Better. Contents Introduction...3 Service and Support...3 Data Center Details...4 Security...4 Location...4 Power...4 Humidification...5 AC...5 Cooling...6 Datacenter Features...6 SAS 70...6 PCI
PROGRAM PLAN STATUS and OIT BEST PRACTICES 2016-016 Approved Program Plan? N/A Date Approved: The university says that the project design follows best practices set forth by the datacenter equipment manufacturers
Office Move Checklist Plan your entire office move from start to finish with this definitive Moving Office Checklist. It guides you through each step of the planning process and is loaded with top tips
WAR IN IRAQ AND ONGOING THREAT OF TERRORISM COMPEL NEW URGENCY TO MISSION OF SECURITY AND PROTECTION C-level Executives, Companies Should Take Specific Actions to Protect Employees and Help Ensure Business
Information Security By Bhupendra Ratha, Lecturer School of Library & Information Science D.A.V.V., Indore E-mail:firstname.lastname@example.org Outline of Information Security Introduction Impact of information Need
SECURITY RISK MANAGEMENT ISACA Atlanta Chapter, Geek Week August 20, 2013 Scott Ritchie, Manager, HA&W Information Assurance Services Scott Ritchie CISSP, CISA, PCI QSA, ISO 27001 Auditor Manager, HA&W
Hedge Funds & the Cloud: The Pros, Cons and Considerations By Mary Beth Hamilton, Director of Marketing, Eze Castle Integration The increased use of cloud-based services is undeniable. Analyst firm Forrester
White Paper Co-location. Co-location. Co-location. Considerations That Impact Your Business Your Business is Dynamic - Is your IT Infrastructure Keeping Pace? Whether you operate a small or medium-sized
How to Select a Managed Service Provider Compliments of: 557 Cranbury Road, Suite 16 East Brunswick, NJ 08816 P: 732-204-7100 F: 270-916-4358 1 Table of Contents INTRODUCTION... 3 AVOID THE COMMON MISTAKES...
The Practice of Internal Controls Cornell Municipal Clerks School July 16, 2014 Page 1 July 18, 2014 Cash Receipts (Collection procedures) Centralize cash collections within a department or for the local
Finally, An Easy Way To Never Have To Deal with Computer Problems Again! Finally, An Easy Way To Keep Your Computers Running Faster, Cleaner, And Problem Free Without The Expense Of A Full-Time IT Staff
Andy Pratico Business Development Mgr How to select ERP software and not lose your mind, (or your job) Agenda Discuss commonly used strategies for evaluating ERP and their current results Discuss an alternative
What You Need to Know in Planning and Budgeting for Digital Signage in Healthcare Before you buy This document serves as a guide for what to look for and what to ask of vendors when budgeting and planning
BURGLAR ALARM FAQ I have had my burglar alarm for years, why do I have to get a permit now? On March 1 st of 2006, the City of Lansing updated it s out dated alarm Ordinance. Any burglar alarm installed
Security Defense Strategy Basics Joseph E. Cannon, PhD Professor of Computer and Information Sciences Harrisburg University of Science and Technology Only two things in the water after dark. Gators and
FREE REPORT: Answers To The Top 5 Questions Business Owners Have About Cloud Computing Discover What Most IT Consultants Don t Know Or Won t Tell You About Moving Your Company s Network To The Cloud By
ST. CLOUD STATE UNIVERSITY INSTALLATION AND USE OF VIDEO SURVEILLANCE TYPE OF PROCEDURE: ADMINISTRATIVE EQUIPMENT PROCEDURE Title: Installation and Use of Video Surveillance Equipment Procedures Related
E n g i n e e r e d S y s t e m s Security l Communication l Automation About Bri-Tech Bri-Tech is a leading designer and integrator of high-end commercial automation systems including fire alarm, intrusion,
Benefits of Cloud Computing - Pros of Cloud Computing - Arguments for Cloud Computing Choosing a Cloud Computing Company 1. With Cloud Computing, employee's computers will cost less, because essentially
Data Backup for Small and Medium Businesses: Priorities, Current Practices, and Risks November 12, 2008 How safe is small business data? As the power of computers continues to grow, more and more of the
2 Information Security can often seem difficult and confusing. There are new threats almost every day. That means we all struggle to stay aware within both our online and physical environments. New threats
Small Business Security Issues (Research Project) Introduction Small companies have a gamete of security problems or issues in today s competitive market place including vulnerabilities, threats, and risks.
56 Key Profit Building Lessons I Learned from Jay Abraham s MasterMind Marketing Training. Jay Abraham is a man you should all know. If you do not - go to the library and start learning - just do it! He
NCS 330 Information Assurance Policies, Ethics and Disaster Recovery NYC University Polices and Standards 4/15/15 Jess Yanarella Table of Contents: Introduction: Part One: Risk Analysis Threats Vulnerabilities
E-Banking Regulatory Update Hal R. Paretchan, CISA, CISSP, CFE Information Technology Specialist Federal Reserve Bank of Boston Supervision, Regulation & Credit (617) 973-5971 email@example.com
Continuous Program Improvement (CPI) CPI Support Call Analyzing CPI Qualitative Data Wednesday February 11 th & Thursday February 12 th, 2009 ETR Associates BA Laris, Lisa Unti, Kris Freiwald, Gina Lepore
P2000 SECURITY management SYSTEM More control means more freedom More freedom to achieve More freedom to reduce costs How can you keep people safe and productive, while reducing costs and staying compliant
Introduction The Electronic Safety and Security Design Reference Manual (ESSDRM) is designed to educate and inform professionals in the safety and security arena. The ESSDRM discusses trends and expertise
KirkpatrickPrice Assessment Guide Designed Exclusively for PRISM International Members KirkpatrickPrice. innovation. integrity. delivered. KirkpatrickPrice Assessment Guide 2 Document Purpose The Assessment
CONTINUOUS MONITORING Managing the Unpredictable Human Element of Cybersecurity A WHITE PAPER PRESENTED BY: May 2014 PREPARED BY MARKET CONNECTIONS, INC. 14555 AVION PARKWAY, SUITE 125 CHANTILLY, VA 20151
We deliver technology support and solutions that enable smart business. IT Systems www.tristora.com T 905.232.7667 F 289.232.8206 E firstname.lastname@example.org Enabling Your Business Smart business is about getting
Cloud Computing: Legal Risks and Best Practices A Bennett Jones Presentation Toronto, Ontario Lisa Abe-Oldenburg, Partner Bennett Jones LLP November 7, 2012 Introduction Security and Data Privacy Recent
PERFECTLY PROTECTED HIGHLY SOPHISTICATED MONITORING Yachts are masterpieces of design and technology with thousands of functions providing the highest level of comfort. Besecke s automation and circuitry
Greater Lafayette Security Professionals, January 2011 Keith A. Watson, CISSP CISA CERIAS, Purdue University The need Policy Safe versus Security Design of Physical Protection Systems Assessments Penetration
The IT Department for the University at Buffalo s Faculty Student Association sets up future-proof security platform with a Milestone IP video solution running as a service for multiple campus locations
ITS Service Level Agreement Last Changed: July 31, 2014 Co-Location Service What is Co Location? Co Location is an ITS service that allows departments and researchers at the University of Hawaii to locate
9.1 USE SECURITY AREAS TO PROTECT FACILITIES 1 GOAL Do you use physical methods to prevent unauthorized access to your organization s information and premises? 2 GOAL Do you use physical methods to prevent
C24 - Inside the Data Center Andrew J. Luca Inside the Data Center What an auditor needs to know Course Objectives Understand the looks and feel of a data center Know what to look for and what questions
INSTALLING GPS TRACKING DEVICES: Which Method is Best? In any fleet tracking implementation, the most important step is to ensure devices are installed correctly so your business can start seeing the benefits
Information Technology Security for Small Business (video script) Descriptive Text for the Visually Impaired August 11, 2009 By Joan Porter Visual: Images related to computer and internet use and images
Research Imperatives Areas of Research Needed in Information Security Julie J.C.H. Ryan, D.Sc. Assistant Professor The George Washington University What We Know Technology Fabulous research going on in
N Stage Authentication with Biometric Devices Presented by: Nate Rotschafer Sophomore Peter Kiewit Institute Revised: July 8, 2002 N Stage Authentication Outline Background on Authentication General Network
GATES, GUARDS, AND GADGETS: AN INTRODUCTION TO THE PHYSICAL SECURITY OF IT Kai Axford, MBA, CPP, CISSP, ACE Manager, IT Security Services Accretive Solutions email@example.com THIS SESSION
blackhat.com July 2015 2015 Black Hat Attendee Survey 2015: Time to Rethink Enterprise IT Security In first-ever survey, sophisticated security professionals say enterprise security priorities don t address
REAL SECURITY IS DIRTY INFORMATION SECURITY AND RISK MANAGEMENT ARE PURSUITS OF BRUTAL SELF- REFLECTION. The most logical business decisions come from facing ugly truths. Before any business spends a dime
Advances in Networks, Computing and Communications 6 Abstract Network Security, Guidelines to Build a Security Perimeter for SMEs S.Godon and P.S.Dowland Centre for Information Security and Network Research,
WHY DO I NEED DATA PROTECTION SERVICES? Data processing operations have evolved with breathtaking speed over the past few years, expanding from very large mainframe operations to small business networks.
SECURITY RISK MANAGEMENT FROM TECHNOLOGY VISION TO MARKET REALITY Avi Corfas, VP EMEA Skybox Security FIRST 2007 Seville, Spain Topics The Risk Assessment Challenge What Is IT Security Risk Management?
The Five Habits of Highly Secure Organizations Ben Rothke, CISSP, CISA Information Security Wyndham Worldwide Corp. Session ID: STU-R35B Session Classification: Intermediate Agenda Discussion of effective
DOORS, WINDOWS, AND OPENINGS: Are all entrance doors clearly visible from either the parking lot or the street? Do all entrances doors have shatterproof windows that allow a person to look outside before
Intelligent Infrastructure Management Update Frank Velleca Market Manager - Siemon What is Intelligent Infrastructure Management (IIM)? A combination of hardware and software designed to help better manage
1 of 6 10/20/2013 9:15 PM Home How Access Control Fits into Multi-Tenant Housing Security Budgets While video gets all the press, access control can be the key to incident prevention in housing facilities.
HOW TO LOWER YOUR GENERAL LIABILITY INSURANCE BY THOUSANDS OF DOLLARS! AN INSIDER'S GUIDE TO GETTING THE BEST POLICY AT THE LOWEST PRICE AVAILABLE If you are a small contractor, you or your wife have to
Why you should opt for an external data centre: 10 no-brainers LCL WHITE PAPER LCL, your partner in data center outsourcing 1 A data centre, even a small one, is a huge investment for any organisation.
2 If you lost all of your data right now... What would you do?... Backup Plan For Home Users and Very Small Businesses As the Story Goes... At seven pm, I received a distraught phone call on my cellphone...
Cloud Computing and Your Future Steve McEvoy UNC Webinar July 12 th, 2013 Goals To discuss technology in a way that might actually be useful to you in your future Practice Talk will be available online
Questions and Responses Q: Are Cefas open to looking at alternative vendors for the Access Points and surrounding solution? R: We are open to alternative vendors for the Access Points, but replacing the
GLOSSARY overhead the money a company spends to run its business * Moving to a bigger office building will mean an increase in the company s overhead for upcoming years. to outsource to have company business
Cambridge TECHNICALS OCR LEVEL 3 CAMBRIDGE TECHNICAL CERTIFICATE/DIPLOMA IN IT NETWORKED SYSTEMS SECURITY J/601/7332 LEVEL 3 UNIT 28 GUIDED LEARNING HOURS: 60 UNIT CREDIT VALUE: 10 NETWORKED SYSTEMS SECURITY
The Flood. 8501 West Higgins 8501 West Higgins Day 1 The total rainfall at O'Hare -- 6.91 inches as of about 6:50 a.m. -- is the largest single-day rainfall since records began in 1871. At 4:15 a.m. Property
National Infrastructure Protection Center Risk Management: An Essential Guide to Protecting Critical Assets November 2002 Summary As organizations increase security measures and attempt to identify vulnerabilities
Fixed-fee IT for your business. Grassroot was founded in July 2009 as a true fixed-fee IT managed services provider. By offering fixed-fee support contracts, we allow our clients to properly budget for
Any office move requires a great deal of planning and careful thought beforehand - and strong commitment all round, both before and during the move. This definitive Moving Office Checklist covers every
White Paper Are SaaS and Cloud Computing Your Best Bets? Understanding SaaS and Cloud Computing and Service Delivery Options for Real Estate Technology Solutions Joseph Valeri, MBA, MS President, Lucernex
What You Should Know Before You Hire An Auto Repair Shop by JC Auto Repair Disclaimers / Legal Information All rights reserved. No part of this book may be reproduced, stored in a retrieval system or transmitted
CIP A Business View Rolf Schulz CEO Definition critical infrastructure: 1. Elements of a system that are so vital that disabling any of them would incapacitate the entire system. 2. [In security,] those
zeus eus magazine Examining the Digital Technology Industry and Innovations in Oil & Gas Where s the Money Being Made Eyes in the Sky GIS Full Speed Ahead SaaS Takes Off in a Cloud Volume 4 Number 4 April
Industrial Engineering Dr. D.K. Dwivedi Department of Mechanical & Industrial Engineering Indian Institute of Technology, Roorkee Module - 03 Lecture - 04 Work Study and Human Component and Method Study
In Business You re Only As Good as Your Connections. Ours are the BEST! AMSYS-ASP is the smart place to co-locate your servers or host your web site. We maintain state-of-the-art co-location facilities
DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the
A Primer in Internet Audience Measurement By Bruce Jeffries-Fox Introduction There is a growing trend toward people using the Internet to get their news and to investigate particular issues and organizations.
California Association of Independent Schools 2014 Trustee & School Head Conference Technology: Strategic IT Planning, Risk Assessment & Asset Protection Presenters: James Busby, The Buckley School Denise
Building a Business Case for Learning Management Systems By David Wentworth Senior Analyst, Brandon Hall Group August, 2012 The Situation It all starts with a bright idea. By acquiring a learning management
Data Center Relocation Take One! Joseph E. Ford, RCDD Craig A. Lowe, RCDD/OSP,LEED AP Robert G. Hall, MCSD Bala Consulting Engineers, Inc. Target Enterprise One or more of the following: Data center over
A Case for Managed IT Services How Community Banks Can Stabilize Information Technology And Assure Bank Examination Readiness Inside this White Paper Bank s Strategic Advantages Top Reasons to Hire MSP
From the Lab to the Boardroom: How to perform a Security Risk Assessment Like a Professional Doug Landoll, CISSP, CISA General Manager, Security Services En Pointe Technologies firstname.lastname@example.org (512)
Winning Initiatives and Best Practices for Physical Security Today s Presentation 1. Using a risk-based strategy for security 2. The balanced security approach 3. Concentric circles of protection concept
Business Uses for Web 2.0: How Companies Can Help Their Customers and Their Employees While Cutting Costs: (A transcript from the Businomics Audio Magazine, September 2007.) By Dr. Bill Conerly, author
The self-defending network a resilient network By Steen Pedersen Ementor, Denmark The self-defending network - a resilient network What is required of our internal networks? Available, robust, fast and
GMS GRAPHICAL MANAGEMENT SYSTEM 1 GMS The integrated security management system for multi-site organizations. Pacom s Graphical Management System (GMS) is the modular client-server application that integrates
1 Cyber-attacks frequently take advantage of software weaknesses unintentionally created during development. This presentation discusses some ways that improved acquisition practices can reduce the likelihood