Security Awareness Planning. Christopher R. Johnson University of Advancing Technology May 29, 2012

Size: px
Start display at page:

Download "Security Awareness Planning. Christopher R. Johnson University of Advancing Technology May 29, 2012"

Transcription

1 Security Awareness Planning Christopher R. Johnson University of Advancing Technology May 29, 2012

2 Why is security awareness important? Security awareness is a critical part of an overall strategy to control risks. In cooperation with other safeguards and technology, awareness is an integral tool of risk avoidance. It is an imperative that awareness training and planning coincide with policy. The best policies in the world are ineffective if they are not being followed. Employees cannot be expected to follow policy or protocols that they either do not understand or are unaware off. There are many obstacles and questions that management faces when designing awareness training and creating a plan of action. A part from meeting the needs of the business model, policy and training must also comply with federal, state, and even local regulation and laws when applicable. identify different standards and legislations that require organizations to have security awareness programs i.e. ISO & ("Security awareness compliance requirements," 2011).

3 The Workforce Potential obstacles Workforce Mindset Why should I care about security? What s in it for me? Negative perceptions of security. Extra work or just another way to get wrote up. How does it affect me as an employee? What s in it for me?

4 Management Potential obstacles Managements Mindset What will it cost? It will require more man power than it s worth. If it s not broke don t fix it. Extra equipment needed. Lost production lost time to training or securing work processes.

5 Basic concepts and pre-planning Overcoming the Human obstacle Pre-planning principles Assess current level of awareness. Pre-test, questionnaires, or surveys. What awareness, training, and/or education are needed (Wilson & Hash, 2003)? Drive home the most important principles, give examples of incidents, relate the risk to reality using the intranet page, , or some other form of electronic medium. Follow the KISS rule when designing reward and discipline procedures Offer incentives for following protocols and security guidelines. Make sure that the training is relevant to the specific risk of the business Make sure the training is current and has a testing element Have visual cues and reminders such as signs and screen savers as a reminder. Make security vital through management commitment and high visibility

6 Specific action plan Create an awareness training program that fosters awareness and also increases skills (Whitman & Mattord, 2006). Determine all specific regulations and laws that are applicable to business model Determine and categorize all existing security controls and procedures Make sure that all documentation and SOP s are up to date Establish formal review procedures for all policies as they relate to security, SOP s and protocols. Draft outline for specific training for each SOP as it relates to security, internal policies, and all other regulations. Choose a delivery method or third party systems for content delivery and testing. Set a mandatory training schedule. Set a compliance date for employees to complete required training. Setup formal procedure for recognizes significant policy changes that will require new training. Incorporate Awareness training into New Hire orientations Make sure any formal agreements specify the required and mandatory awareness training.

7 Pitfalls - things to avoid Always keep in mind that behavioral changes take time. Set realistic time frames. Self-paced learning may be an option. Have a clear and well defined goal and mission statement for your plan and training. Take the time in the pre-implementation phase to determine who is the target audience, what content they need and how you will convey that information (Spitzner, 2011).

8 What is gained? The most tangible benefit in a successful security awareness plan and training program is increased security for your assets ("Benefits of an information security awareness program," 2012). Changes in attitudes towards security and training as a whole. Good training often becomes value added to an employee through increased knowledge and job skills. Reducing security incidents related to personnel save money and resources that could be spent in ways that grow your business. Prevention of negative PR caused by security incidents. Shows the world and your clients that your company has a strong security posture. Covers and protects management and the company from potential legal liabilities or law suits by incorporating documentation, federal standards, and contractual agreements in your awareness plan and training.

9 References Benefits of an information security awareness program. (2012). Retrieved June 1, 2012, from Native Intelligence, Inc.: benefits.asp. Security awareness compliance requirements. (2011, July 19). Retrieved May 31, 2012, from SANS Institute: Spitzner, L. (2011). How to build an effective information security awareness program (Information Security Management). Retrieved June 1, 2012, from Search Security: techtarget.com/magazinecontent/how-to-build-an-effective- information-security-awarenessprogram. Whitman, M. E., & Mattord, H. J. (2006). Principles of incident response and disaster recovery. Course Technology. Wilson, M., & Hash, J. (2003, October 1). Building and information technology security awareness and training program. Retrieved May 30, 2012, from NIST: gov/publications/nistpubs/800-50/nist-sp pdf.

EXECUTIVE BEHAVIORAL INTERVIEW GUIDE

EXECUTIVE BEHAVIORAL INTERVIEW GUIDE EXECUTIVE BEHAVIORAL INTERVIEW GUIDE INTERVIEW GUIDE INSTRUCTIONS: This Interview Guide is intended to help hiring executives conduct behavioral interviews for executive classifications covered by the

More information

Achieving Security through Compliance

Achieving Security through Compliance Achieving Security through Compliance Policies, plans, and procedures Table of Contents This white paper was written by: McAfee Foundstone Professional Services Overview...3 The Rock Foundation...3 Governance...3

More information

Week 09 Assignment 9-3. William Slater. CYBR 625 Business Continuity Planning and Recovery. Bellevue University

Week 09 Assignment 9-3. William Slater. CYBR 625 Business Continuity Planning and Recovery. Bellevue University Business Continuity Planning and the Small Business 1 Week 09 Assignment 9-3 William Slater CYBR 625 Business Continuity Planning and Recovery Bellevue University Business Continuity Planning and the Small

More information

Achieving Security through Compliance

Achieving Security through Compliance White Paper Achieving Security through Compliance Policies, plans, and procedures Part I By Jeff Tucker, Principal Security Consultant McAfee Foundstone Professional Services Table of Contents Overview

More information

White Paper #6. Privacy and Security

White Paper #6. Privacy and Security The Complexity of America s Health Care Industry White Paper #6 Privacy and Security www.nextwavehealthadvisors.com 2015 Next Wave Health Advisors and Lynn Harold Vogel, Ph.D. The Complexity of America

More information

New Mexico Homeland Security and Emergency Management REQUEST TO USE FEDERAL GRANT FUNDS For Training, Conferences or Exercise Activities

New Mexico Homeland Security and Emergency Management REQUEST TO USE FEDERAL GRANT FUNDS For Training, Conferences or Exercise Activities New Mexico Homeland Security and Emergency Management REQUEST TO USE FEDERAL GRANT FUNDS For Training, Conferences or Exercise Activities NMDHSEM, State Administrative Agency (SAA) PO Box, 27111, Santa

More information

How To Write A National Cybersecurity Act

How To Write A National Cybersecurity Act ROCKEFELLER SNOWE CYBERSECURITY ACT SUBSTITUTE AMENDMENT FOR S.773 March 17, 2010 BACKGROUND & WHY THIS LEGISLATION IS IMPORTANT: Our nation is at risk. The networks that American families and businesses

More information

Social Marketing Planning Process

Social Marketing Planning Process Goal Audience Mid-Course Corrections Social Marketing Planning Process Message Pre-Testing Channels Activities, Events, Materials Creating Your Social Marketing Plan One of the RFA requirements is to develop

More information

Does Your Information Security Program Measure Up? Session #74

Does Your Information Security Program Measure Up? Session #74 Does Your Information Security Program Measure Up? Session #74 DISCLAIMER: The views and opinions expressed in this presentation are those of the author and do not necessarily represent official policy

More information

The Legal Pitfalls of Failing to Develop Secure Cloud Services

The Legal Pitfalls of Failing to Develop Secure Cloud Services SESSION ID: CSV-R03 The Legal Pitfalls of Failing to Develop Secure Cloud Services Cristin Goodwin Senior Attorney, Trustworthy Computing & Regulatory Affairs Microsoft Corporation Edward McNicholas Global

More information

Governance and Risk Management in the Public Sector. Fernando A. Fernandez Inter-American Development Bank (202) 623-1430 e-mail: fernandof@iadb.

Governance and Risk Management in the Public Sector. Fernando A. Fernandez Inter-American Development Bank (202) 623-1430 e-mail: fernandof@iadb. Governance and Risk Management in the Public Sector Fernando A. Fernandez Inter-American Development Bank (202) 623-1430 e-mail: fernandof@iadb.org 1 Agenda Governance, why is it important? Compliance

More information

Executive Management of Information Security

Executive Management of Information Security WHITE PAPER Executive Management of Information Security _experience the commitment Entire contents 2004, 2010 by CGI Group Inc. All rights reserved. Reproduction of this publication in any form without

More information

CYBERBOK Cyber Crime Security Essential Body of Knowledge: A Competency and Functional Framework for Cyber Crime Management

CYBERBOK Cyber Crime Security Essential Body of Knowledge: A Competency and Functional Framework for Cyber Crime Management CYBERBOK Security Essential Body of Knowledge: A Competency and Functional Framework for Security Workforce Development aligned with ISO 31000* risk management principles and guidelines. *Note : ISO 31000

More information

Content Sheet 18-1: Organizational Requirements for a Quality Management System

Content Sheet 18-1: Organizational Requirements for a Quality Management System Content Sheet 18-1: Organizational Requirements for a Quality Management System Definition The term organization in the context of a quality management model is used to indicate the management and the

More information

Business Information Management Reengineering (BIMR) Broadening our Reach for Greater Gains

Business Information Management Reengineering (BIMR) Broadening our Reach for Greater Gains Business Information Management Reengineering (BIMR) Broadening our Reach for Greater Gains EMC Proven Professional Knowledge Sharing October, 2007 Eugene Demigillo EMC APJ Partner Support Center Demigillo_eugene@emc.com

More information

Cybersecurity@RTD Program Overview and 2015 Outlook

Cybersecurity@RTD Program Overview and 2015 Outlook Cybersecurity@RTD Program Overview and 2015 Outlook Finance & Administration Committee Meeting February 10, 2015 Sheri Le, Manager of Cybersecurity RTD Information Technology Department of Finance & Administration

More information

Sempra Energy Utilities response Department of Commerce Inquiry on Cyber Security Incentives APR 29 2013

Sempra Energy Utilities response Department of Commerce Inquiry on Cyber Security Incentives APR 29 2013 Sempra Energy Utilities response Department of Commerce Inquiry on Cyber Security Incentives APR 29 2013 Sempra Energy s gas and electric utilities collaborate with industry leaders and a wide range of

More information

Guide to Effective Staff Performance Evaluations

Guide to Effective Staff Performance Evaluations Guide to Effective Staff Performance Evaluations Compiled by Human Resources Siemens Hall, Room 211 The research is clear. The outcome is consistent. We know with certainty that the most powerful leadership

More information

Information Management Policy CCG Policy Reference: IG 2 v4.1

Information Management Policy CCG Policy Reference: IG 2 v4.1 Information Management Policy CCG Policy Reference: IG 2 v4.1 Document Title: Policy Information Management Document Status: Final Page 1 of 15 Issue date: Nov-2015 Review date: Nov-2016 Document control

More information

GUIDE TO EFFECTIVE STAFF PERFORMANCE EVALUATIONS

GUIDE TO EFFECTIVE STAFF PERFORMANCE EVALUATIONS GUIDE TO EFFECTIVE STAFF PERFORMANCE EVALUATIONS The research is clear. The outcome is consistent. We know with certainty that the most powerful leadership tool for improving productivity and increasing

More information

Issue 1.0. UoG/ILS/IS 001. Information Security and Assurance Policy. Information Security and Compliance Manager

Issue 1.0. UoG/ILS/IS 001. Information Security and Assurance Policy. Information Security and Compliance Manager Document Reference Number Date Title Author Owning Department Version Approval Date Review Date Approving Body UoG/ILS/IS 001 January 2016 Information Security and Assurance Policy Information Security

More information

A CRO's Dilemma - The CDMS Validation Package that Failed Client Audits 19.OCT.2009 1. Disclaimer

A CRO's Dilemma - The CDMS Validation Package that Failed Client Audits 19.OCT.2009 1. Disclaimer A CRO's Dilemma - The CDMS Validation Package that Failed Client Audits Teri Stokes, Ph.D., Director GXP International Concord, MA - USA Common Sense Computer Validation 19.OCT.2009 1 Disclaimer The views

More information

How To Understand And Understand The Benefits Of A Health Insurance Risk Assessment

How To Understand And Understand The Benefits Of A Health Insurance Risk Assessment 4547 The Case For HIPAA Risk Assessment Leader s Guide IMPORTANT INFORMATION FOR EDUCATION COORDINATORS & PROGRAM FACILITATORS PLEASE NOTE: In order for this program to meet Florida course requirements,

More information

NASCIO 2014 State IT Recognition Awards

NASCIO 2014 State IT Recognition Awards NASCIO 2014 State IT Recognition Awards Project: California Cybersecurity Task Force Category: Cybersecurity Initiatives Project Initiation Date: September, 2012 Project Completion Date: May 2013 Carlos

More information

Cloud Computing in Vermont State Government

Cloud Computing in Vermont State Government Cloud Computing in Vermont State Government Analysis of Opportunities Duncan Goss, Legislative Director of Information Technology David Tucker, State CIO Introduction Legislation passed during the 2009

More information

MANAGING LEGAL RISK IN AN INTEGRATED GRC FRAMEWORK A BRIEFING PAPER. www.claytonutz.com

MANAGING LEGAL RISK IN AN INTEGRATED GRC FRAMEWORK A BRIEFING PAPER. www.claytonutz.com MANAGING LEGAL RISK IN AN INTEGRATED GRC FRAMEWORK A BRIEFING PAPER www.claytonutz.com BACKGROUND Organisations are finding that their stakeholders (particularly Boards) are seeking greater assurance of

More information

Why you should adopt the NIST Cybersecurity Framework

Why you should adopt the NIST Cybersecurity Framework Why you should adopt the NIST Cybersecurity Framework It s important to note that the Framework casts the discussion of cybersecurity in the vocabulary of risk management Stating it in terms Executive

More information

GAO. Standards for Internal Control in the Federal Government. Internal Control. United States General Accounting Office.

GAO. Standards for Internal Control in the Federal Government. Internal Control. United States General Accounting Office. GAO United States General Accounting Office Internal Control November 1999 Standards for Internal Control in the Federal Government GAO/AIMD-00-21.3.1 Foreword Federal policymakers and program managers

More information

Managing Cloud Computing Risk

Managing Cloud Computing Risk Managing Cloud Computing Risk Presented By: Dan Desko; Manager, Internal IT Audit & Risk Advisory Services Schneider Downs & Co. Inc. ddesko@schneiderdowns.com Learning Objectives Understand how to identify

More information

RECORDS MANAGEMENT POLICY

RECORDS MANAGEMENT POLICY [Type text] RECORDS MANAGEMENT POLICY POLICY TITLE Academic Year: 2013/14 onwards Target Audience: Governing Body All Staff and Students Stakeholders Final approval by: CMT - 1 October 2014 Governing Body

More information

PARLIAMENTARY AND HEALTH SERVICE OMBUDSMAN. Records Management Policy. Version 4.0. Page 1 of 11 Policy PHSO Records Management Policy v4.

PARLIAMENTARY AND HEALTH SERVICE OMBUDSMAN. Records Management Policy. Version 4.0. Page 1 of 11 Policy PHSO Records Management Policy v4. PARLIAMENTARY AND HEALTH SERVICE OMBUDSMAN Records Management Policy Version 4.0 Page 1 of 11 Document Control Title: Original Author(s): Owner: Reviewed by: Quality Assured by: File Location: Approval

More information

FY 2010 Annual Action Plan

FY 2010 Annual Action Plan Focus Area: Develop a workforce that allows the City to meet strategic initiatives and run its business. Detail Objective Increase employee participation in the City training opportunities. Implement a

More information

Long-Term Care Insurance Buyer Profiles: Implications for CLASS

Long-Term Care Insurance Buyer Profiles: Implications for CLASS Long-Term Care Insurance Buyer Profiles: Implications for CLASS By Eileen J. Tell Spring 2011 No. 15 The Community Living Assistance Services and Supports (CLASS) Plan a groundbreaking component of the

More information

Looking at the SANS 20 Critical Security Controls

Looking at the SANS 20 Critical Security Controls Looking at the SANS 20 Critical Security Controls Mapping the SANS 20 to NIST 800-53 to ISO 27002 by Brad C. Johnson The SANS 20 Overview SANS has created the 20 Critical Security Controls as a way of

More information

Internal Communication The Neglected Strategy

Internal Communication The Neglected Strategy Internal Communication Strategy 1 Internal Communication The Neglected Strategy Internal planning is one of the most neglected areas of strategic planning. Most companies spend a great deal of money and

More information

Core Competencies for Strategic Leaders In the BC Public Service

Core Competencies for Strategic Leaders In the BC Public Service Core Competencies for Strategic Leaders In the BC Public Service Brought to you by the BC Public Service Agency 1 Contents Core Competencies for All Strategic Leaders... 2 Core Competency Definitions...

More information

Guide to Effective Staff Performance Evaluations

Guide to Effective Staff Performance Evaluations Guide to Effective Staff Performance Evaluations HRS Human Resource Services-Operations The research is clear. The outcome is consistent. We know with certainty that the most powerful leadership tool for

More information

Guideline. Records Management Strategy. Public Record Office Victoria PROS 10/10 Strategic Management. Version Number: 1.0. Issue Date: 19/07/2010

Guideline. Records Management Strategy. Public Record Office Victoria PROS 10/10 Strategic Management. Version Number: 1.0. Issue Date: 19/07/2010 Public Record Office Victoria PROS 10/10 Strategic Management Guideline 5 Records Management Strategy Version Number: 1.0 Issue Date: 19/07/2010 Expiry Date: 19/07/2015 State of Victoria 2010 Version 1.0

More information

Government Use of Cloud Computing Legal Challenges

Government Use of Cloud Computing Legal Challenges Government Use of Cloud Computing Legal Challenges Liesbeth Hellemans Liesbeth.hellemans@law.kuleuven.be ICRI/CIR KU Leuven IAPP Europe Data Protection Congress Agenda 1. Cloud for Europe project 2. Legal

More information

FREQUENTLY ASKED QUESTIONS

FREQUENTLY ASKED QUESTIONS FREQUENTLY ASKED QUESTIONS Continuous Monitoring 1. What is continuous monitoring? Continuous monitoring is one of six steps in the Risk Management Framework (RMF) described in NIST Special Publication

More information

c u l t u r e the building blocks of member engagement

c u l t u r e the building blocks of member engagement c u l t u r e the building blocks of member engagement building blocks: the sales culture process 01 02 creating the foundation coaching your team leadership team 03 living the brand defining needs 06

More information

Jones & Associates Consulting, Inc.

Jones & Associates Consulting, Inc. Jones & Associates Consulting, Inc. Jones & Associates Consulting, Inc. is a diversity and organizational change consulting firm based in San Diego, California. Founded in 1993, our mission is to develop

More information

Strategic Plan On-Demand Services April 2, 2015

Strategic Plan On-Demand Services April 2, 2015 Strategic Plan On-Demand Services April 2, 2015 1 GDCS eliminates the fears and delays that accompany trying to run an organization in an unsecured environment, and ensures that our customers focus on

More information

Table of Contents. Part 1 The Office in the Business World... 1

Table of Contents. Part 1 The Office in the Business World... 1 Table of Contents Part 1 The Office in the Business World............. 1 CHAPTER 1 The Office in a Changing Business World............... 2 Topic 1-1 The Office Today.................. 3 Offices Are Information

More information

Dear Vendor: ADDITIONAL RESOURCES COMPLYWORKS

Dear Vendor: ADDITIONAL RESOURCES COMPLYWORKS Dear Vendor: At IPAC Services we expect all contractors, service providers and suppliers who provide services or goods to any of our sites or projects to be familiar with and uphold the practices we follow

More information

fs viewpoint www.pwc.com/fsi

fs viewpoint www.pwc.com/fsi fs viewpoint www.pwc.com/fsi June 2013 02 11 16 21 24 Point of view Competitive intelligence A framework for response How PwC can help Appendix It takes two to tango: Managing technology risk is now a

More information

Bridging the HIPAA/HITECH Compliance Gap

Bridging the HIPAA/HITECH Compliance Gap CyberSheath Healthcare Compliance Paper www.cybersheath.com -65 Bridging the HIPAA/HITECH Compliance Gap Security insights that help covered entities and business associates achieve compliance According

More information

Succession Planning Developing Georgia s Future Leaders

Succession Planning Developing Georgia s Future Leaders Workforce Services Succession Planning Developing Georgia s Future Leaders Objectives Today s session will provide foundational information related to a basic succession planning model. At the end of the

More information

Over the course of our 16 years of marketing for higher education, we have identified five key characteristics of an effective brand.

Over the course of our 16 years of marketing for higher education, we have identified five key characteristics of an effective brand. Branding Two-Year Colleges By Brenda Foster and Domenica Genovese, GCF Reprinted from Admissions Marketing Report, Vol. XXI, No. XII, December 2005 With liberal open enrollment policies, most two-year

More information

An Overview of Information Security Frameworks. Presented to TIF September 25, 2013

An Overview of Information Security Frameworks. Presented to TIF September 25, 2013 An Overview of Information Security Frameworks Presented to TIF September 25, 2013 What is a framework? A framework helps define an approach to implementing, maintaining, monitoring, and improving information

More information

Basic underlying assumptions

Basic underlying assumptions Organisational culture Broadly speaking there are two schools of thought on organisational culture. The first, suggests that culture is tangible and exists in much the same way an organisation chart can

More information

Canadian ISO 17799 User Group Conference. Sun Life Financial s Experience with Security Governance & ISO 17799

Canadian ISO 17799 User Group Conference. Sun Life Financial s Experience with Security Governance & ISO 17799 Canadian ISO 17799 User Group Conference Sun Life Financial s Experience with Security Governance & ISO 17799 Deloitte & Touche, 79 Wellington West, 20th Floor Toronto, ON 30 January 2004 D.A. Stolovitch,

More information

Guidance on Risk Analysis Requirements under the HIPAA Security Rule

Guidance on Risk Analysis Requirements under the HIPAA Security Rule Guidance on Risk Analysis Requirements under the HIPAA Security Rule Introduction The Office for Civil Rights (OCR) is responsible for issuing annual guidance on the provisions in the HIPAA Security Rule.

More information

Information Governance Management Framework

Information Governance Management Framework Information Governance Management Framework Responsible Officer Author Business Planning & Resources Director Governance Manager Date effective from October 2015 Date last amended October 2015 Review date

More information

TalOp s End-to-End Employee Life Cycle Process. HowattHR 2011-13

TalOp s End-to-End Employee Life Cycle Process. HowattHR 2011-13 TalOp s End-to-End Employee Life Cycle Process HowattHR 2011-13 Contents Overview of Integrated Performance System Position Profiling & Analysis Aligning Competencies for Talent & Operations Competency-Driven

More information

INFORMATION SECURITY STRATEGIC PLAN

INFORMATION SECURITY STRATEGIC PLAN INFORMATION SECURITY STRATEGIC PLAN UNIVERSITY OF CONNECTICUT INFORMATION SECURITY OFFICE 4/20/10 University of Connecticut / Jason Pufahl, CISSP, CISM 1 1 MISSION STATEMENT The mission of the Information

More information

RiskManagement ESIEE 06/03/2012. Aloysius John March 2012

RiskManagement ESIEE 06/03/2012. Aloysius John March 2012 RiskManagement MOTIS ESIEE 06/03/2012 Aloysius John March 2012 Risk Management is a Introduction Process for Project manager to identify factors that may more or less affect the success or the achievement

More information

2015-2018 Human Resources Strategic Plan

2015-2018 Human Resources Strategic Plan 2015-2018 Human Resources Strategic Plan Welcome to the 2015-2018 Human Resources Strategic Plan. The purpose of this plan is to stabilize and modernize the Human Resources system (people, processes, organization)

More information

Reputation. Further excellence. business continuity. risk management. Data security

Reputation. Further excellence. business continuity. risk management. Data security Reputation competitive advantage speed to market safety Further excellence trust Data security risk management business continuity HOW CAN YOU CREATE AND SECURE SUSTAINABLE BUSINESS? SOLUTIONS FOR MANAGING

More information

TELLING STORY WITH DATA: GAINING SENIOR- LEVEL SUPPORT FOR ANALYTICS AND PLANNING

TELLING STORY WITH DATA: GAINING SENIOR- LEVEL SUPPORT FOR ANALYTICS AND PLANNING MERCER WEBCAST TELLING STORY WITH DATA: GAINING SENIOR- LEVEL SUPPORT FOR ANALYTICS AND PLANNING 24 September 2013 Astik Ranade, Principal Julia Howes, Principal Today s Presenters Julia Howes Principal,

More information

Controls Over EPA s Compass Financial System Need to Be Improved

Controls Over EPA s Compass Financial System Need to Be Improved U.S. ENVIRONMENTAL PROTECTION AGENCY OFFICE OF INSPECTOR GENERAL Controls Over EPA s Compass Financial System Need to Be Improved Report No. 13-P-0359 August 23, 2013 Scan this mobile code to learn more

More information

Emergency Management Coordinator

Emergency Management Coordinator Career Service Authority Emergency Management Coordinator Page 1 of 6 GENERAL STATEMENT OF CLASS DUTIES Performs full performance professional level emergency management work including developing, coordinating,

More information

Yes No. Management of Policy Development in the Metropolitan Police Service (MPS) - Standard Operating Procedures (SOPs). Version Version 3 Summary

Yes No. Management of Policy Development in the Metropolitan Police Service (MPS) - Standard Operating Procedures (SOPs). Version Version 3 Summary Freedom of Information Act Publication Scheme Protective Marking Not Protectively Marked Publication Scheme Y/N Title Yes No Management of Policy Development in the Metropolitan Police Service (MPS) -

More information

Random Widget Works: Information Security Policy

Random Widget Works: Information Security Policy Random Widget Works: Information Security Policy Eric ISA 3300 W-01 Whitman Summer Semester 6/21/2013 Table of Contents Organization Overview... 4 Organization Overview... 5 Information Security Policy

More information

MEETING OF TRUST BOARD EXECUTIVE SUMMARY AGENDA ITEM 4.2

MEETING OF TRUST BOARD EXECUTIVE SUMMARY AGENDA ITEM 4.2 MEETING OF TRUST BOARD EXECUTIVE SUMMARY TITLE & DATE: AGENDA ITEM 4.2 National NHS Staff Survey and Trust Staff Satisfaction Survey 2013 Action Plan 27 February 2014 This paper is for: Approval x Decision

More information

DRAFT. Six Recommendations to MasterCard and Visa to Improve Credit and Debit Cardholder Security. Presented by

DRAFT. Six Recommendations to MasterCard and Visa to Improve Credit and Debit Cardholder Security. Presented by DRAFT Six Recommendations to MasterCard and Visa to Improve Credit and Debit Cardholder Security Presented by The American Bankers Association National Bank Card Fraud Task Force in an effort to give consumers

More information

Automated Risk Management Using SCAP Vulnerability Scanners

Automated Risk Management Using SCAP Vulnerability Scanners Automated Risk Management Using SCAP Vulnerability Scanners The management of risks to the security and availability of private information is a key element of privacy legislation under the Federal Information

More information

Supporting FISMA and NIST SP 800-53 with Secure Managed File Transfer

Supporting FISMA and NIST SP 800-53 with Secure Managed File Transfer IPSWITCH FILE TRANSFER WHITE PAPER Supporting FISMA and NIST SP 800-53 with Secure Managed File Transfer www.ipswitchft.com Adherence to United States government security standards can be complex to plan

More information

National Cyber Security Policy -2013

National Cyber Security Policy -2013 National Cyber Security Policy -2013 Preamble 1. Cyberspace 1 is a complex environment consisting of interactions between people, software and services, supported by worldwide distribution of information

More information

Governance, Risk, and Compliance (GRC) White Paper

Governance, Risk, and Compliance (GRC) White Paper Governance, Risk, and Compliance (GRC) White Paper Table of Contents: Purpose page 2 Introduction _ page 3 What is GRC _ page 3 GRC Concepts _ page 4 Integrated Approach and Methodology page 4 Diagram:

More information

NLN VISION: TRANSFORMING RESEARCH IN NURSING EDUCATION A Living Document from the National League for Nursing. NLN Board of Governors November 2012

NLN VISION: TRANSFORMING RESEARCH IN NURSING EDUCATION A Living Document from the National League for Nursing. NLN Board of Governors November 2012 NLN VISION: TRANSFORMING RESEARCH IN NURSING EDUCATION A Living Document from the National League for Nursing NLN Board of Governors November 2012 Purpose The health of the nation through improved patient

More information

Information Management Advice 35: Implementing Information Security Part 1: A Step by Step Approach to your Agency Project

Information Management Advice 35: Implementing Information Security Part 1: A Step by Step Approach to your Agency Project Information Management Advice 35: Implementing Information Security Part 1: A Step by Step Approach to your Agency Project Introduction This Advice provides an overview of the steps agencies need to take

More information

SCOPE; ENFORCEMENT; AUTHORITY; EXCEPTIONS

SCOPE; ENFORCEMENT; AUTHORITY; EXCEPTIONS Title: DRAFT USG Continuity of Operation Plan Policy Policy Number: 2009-Julian Date Topical Security Area: Document Type: Standard Pages: Words: Lines: 5 1,387 182 Issue Date: May-09 Effective Date: Immediately

More information

Role of Awareness and Training for Successful InfoSec Security Program 1

Role of Awareness and Training for Successful InfoSec Security Program 1 Role of Awareness and Training for Successful InfoSec Security Program 1 Role of Awareness and Training for Successful Information Systems Security Program Venkata Siva, Jose R Velez Saint Leo University

More information

Building Customer Relationships

Building Customer Relationships CHAPTER OUTLINE Spotlight: United Supermarkets LLC (http://www.unitedtexas.com) 1 What Is Customer Relationship Management? Define customer relationship management CRM broader marketing effort Focuses

More information

Increasing the Speed and Effi ciency of Providing Disaster Housing Assistance

Increasing the Speed and Effi ciency of Providing Disaster Housing Assistance Strengthening the Disaster Housing Assistance Program Increasing the Speed and Effi ciency of Providing Disaster Housing Assistance A CohnReznick Government White Paper Strengthening the Disaster Housing

More information

STEEL FIRE EQUIPMENT. Integrated Fire Safety Solutions

STEEL FIRE EQUIPMENT. Integrated Fire Safety Solutions Integrated Fire Safety Solutions Intellectual Property Patent applications filed Sept. 13 th, 2004 Patents Pending in Canada and U.S.A. Software development started Dec. 2002. Application now has 61 man-months

More information

Article. Developing Statistics New Zealand s Respondent Load Strategy. by Stuart Pitts

Article. Developing Statistics New Zealand s Respondent Load Strategy. by Stuart Pitts Component of Statistics Canada Catalogue no. 11-522-X Statistics Canada s International Symposium Series: Proceedings Article Symposium 2008: Data Collection: Challenges, Achievements and New Directions

More information

People services operations manager

People services operations manager People services operations manager Role brief Directorate Operations and governance Base location Bristol Grade Grade K ection Date May 2015 Reports to Group director for people Responsible for People

More information

Information Management

Information Management G i Information Management Information Management Planning March 2005 Produced by Information Management Branch Open Government Service Alberta 3 rd Floor, Commerce Place 10155 102 Street Edmonton, Alberta,

More information

CERTIFIED BUSINESS RELATIONSHIP MANAGER

CERTIFIED BUSINESS RELATIONSHIP MANAGER CERTIFIED BUSINESS RELATIONSHIP MANAGER Leadership Stream Management, Business and Stakeholder Relationship personnel This Program is designed to provide graduates with a Nationally Accredited Professional

More information

Service Children s Education

Service Children s Education Service Children s Education Data Handling and Security Information Security Audit Issued January 2009 2009 - An Agency of the Ministry of Defence Information Security Audit 2 Information handling and

More information

RBA Start Up Your Own Recruitment Agency programme outline Duration: Aims & Objectives: Objectives:

RBA Start Up Your Own Recruitment Agency programme outline Duration: Aims & Objectives: Objectives: RBA Start Up Your Own Recruitment Agency programme outline The Recruitment Business Academy (RBA) is one of the most respected and widely recognised training providers in the recruitment industry. We make

More information

RECORDS MANAGEMENT POLICY

RECORDS MANAGEMENT POLICY RECORDS MANAGEMENT POLICY PURPOSE The purpose of this policy is to: Assist departments in effective utilization of space and efficient information retrieval; Establish guidelines for disposal of records;

More information

Introduction to Social Marketing for Water Outreach

Introduction to Social Marketing for Water Outreach Introduction to Social Marketing for Water Outreach NH Water and Watersheds Conference 2011 March 25 26, 2011 Plymouth State University, NH Julia Peterson NH Sea Grant and UNH Cooperative Extension Julia.peterson@unh.edu

More information

Action Plan towards Open Access to Publications

Action Plan towards Open Access to Publications OOAAction Plan Draft Version, 17.01.2013 Action Plan towards Open Access to Publications endorsed during the 2 nd Annual Global Meeting, 27 29 May 2013, Berlin / Germany Assuming that providing research

More information

RUTLAND COUNTY COUNCIL

RUTLAND COUNTY COUNCIL JOB DESCRIPTION Position Title: Grade: Directorate: Department: Responsible to: Responsible for: Customer Service Manager PO3 Resources Governance Head of Corporate Governance 7 Customer Services Advisors

More information

UNITED STATES DEPARTMENT OF EDUCATION OFFICE OF INSPECTOR GENERAL. September 24, 2010

UNITED STATES DEPARTMENT OF EDUCATION OFFICE OF INSPECTOR GENERAL. September 24, 2010 UNITED STATES DEPARTMENT OF EDUCATION OFFICE OF INSPECTOR GENERAL September 24, 2010 AUDIT SERVICES FINAL ALERT MEMORANDUM TO: Danny Harris Chief Information Officer Office of the Chief Information Officer

More information

Information Governance Policy (incorporating IM&T Security)

Information Governance Policy (incorporating IM&T Security) (incorporating IM&T Security) ONCE PRINTED OFF, THIS IS AN UNCONTROLLED DOCUMENT. PLEASE CHECK THE INTRANET FOR THE MOST UP TO DATE COPY Target Audience: All staff employed or working on behalf of the

More information

Policy Title: HIPAA Security Awareness and Training

Policy Title: HIPAA Security Awareness and Training Policy Title: HIPAA Security Awareness and Training Number: TD-QMP-7011 Subject: HIPAA Security Awareness and Training Primary Department: TennDent/Quality Monitoring/Improvement Effective Date of Policy:

More information

EXHIBIT CC. Identifying Management Level Knowledge, Skills and Abilities. Executive Core Competencies (ECCs)

EXHIBIT CC. Identifying Management Level Knowledge, Skills and Abilities. Executive Core Competencies (ECCs) EXHIBIT CC Identifying Management Level Knowledge, Skills and Abilities Executive Core Competencies (ECCs) ECC One: Leading Change ECC Two: Leading People ECC Three: Results Driven ECC Four: Business Acumen

More information

How To Be A Successful Supervisor

How To Be A Successful Supervisor Quick Guide For Administrators Based on TIP 52 Clinical Supervision and Professional Development of the Substance Abuse Counselor Contents Why a Quick Guide?...2 What Is a TIP?...3 Benefits and Rationale...4

More information

DESIGNING A BUSINESS CONTINUITY TRAINING PROGRAM TO MAXIMIZE VALUE & MINIMIZE COST

DESIGNING A BUSINESS CONTINUITY TRAINING PROGRAM TO MAXIMIZE VALUE & MINIMIZE COST CONTENTS A Brief Introduction... 3 Where is the Value?... 3 How Can We Control Costs?... 5 The Delivery Mechanism... 7 Strategies to Deliver Training and Awareness... 8 Proving Training/Awareness Program

More information

Data Governance. Unlocking Value and Controlling Risk. Data Governance. www.mindyourprivacy.com

Data Governance. Unlocking Value and Controlling Risk. Data Governance. www.mindyourprivacy.com Data Governance Unlocking Value and Controlling Risk 1 White Paper Data Governance Table of contents Introduction... 3 Data Governance Program Goals in light of Privacy... 4 Data Governance Program Pillars...

More information

* * * 1. Specify which of the following applications are used in your law firm to support work management:

* * * 1. Specify which of the following applications are used in your law firm to support work management: Document Management, Knowledge Management and Quality Control Information Technology has a decisive impact on organizational structures, also in law firms. Document management is a unified system of managing

More information

HITRUST CSF Assurance Program You Need a HITRUST CSF Assessment Now What?

HITRUST CSF Assurance Program You Need a HITRUST CSF Assessment Now What? HITRUST CSF Assurance Program You Need a HITRUST CSF Assessment Now What? Introduction This material is designed to answer some of the commonly asked questions by business associates and other organizations

More information

How to Create an Annual Sales Plan. An Interview with Anwar Allen, Managing Partner at

How to Create an Annual Sales Plan. An Interview with Anwar Allen, Managing Partner at How to Create an Annual Sales Plan An Interview with Anwar Allen, Managing Partner at 0 ContentsiCCs a test Introduction 4 Why not just go with what is working? 5 When is the best time to create an annual

More information

Pragmatic Approach to Utility Industry Cyber Security

Pragmatic Approach to Utility Industry Cyber Security Pragmatic Approach to Utility Industry Cyber Security Erich W. Gunther erich@enernex.com GridSec 2012 We Have the Technology And the geeks to apply it The problem is that us geeks are also The only ones

More information