Part 1 : STRATEGIC : But let s begin with WHY : Why are we doing this?

Size: px
Start display at page:

Download "Part 1 : STRATEGIC : But let s begin with WHY : Why are we doing this?"

Transcription

1 Part 1 : STRATEGIC : Why DO we care?? What is YOUR cri=cal message? And WHO do you need to reach? : I ll try and give you some pointers and ideas for where to look and how to figure that out for your cons=tuents and your ins=tu=on Part 2 : TACTICAL : Who delivers the message How : effec=ve methods for outreach, delivery, and determining effec=veness What : are some of the essen=al awareness topics to consider : But let s begin with WHY : Why are we doing this? 1

2 Why are we COMPELLED to provide Security Awareness training? WHAT is our MOTIVATION?? If you dis=ll the reasons down to their core components, it is clear, it is primal 2

3 it is not hunger (although cookies can be a persuasive mo=vator) Fear comes in many forms, it affects people differently, and it causes people to respond. It is a spectacularly effec=ve mo=vator : ( as history perpetually proves ) So : what are your Info Security fears? Your : Boss s, your students, Or your friends fears? Or your Uncle Bob what are his fears? 3

4 Think strategic level : C Levels have big picture fears Compliance with : Governance policies Laws and regula=ons Control : Informa=on Is POWER! - - actually, the FLOW of informa=on is Power, and that s what you need to control the full InfoSec CIA spectrum : Confiden=ality, Integrity, and Availability of informa=on flow : as it shapes percep=on and reputa=on So, our awareness goals should address these fears, and u=lize these fears! 4

5 What DO users fear? How are Staff fears different from student fears? And what do Faculty fear? When I ask this ques=on, frequently it is : fear of being electronically violated : computer compromised, informa=on stolen If you Find out their fears, and your awareness program addresses them, people will come and they will listen! 5

6 What do YOU fear? I fear failure or the consequences to others if I fail. OK, let s just say that LOTS of things scare me, 6

7 Use FEAR, but use it WISELY! this is classic personal safety training concept : convert their fears into situa<onal awareness, and then give them the tools to respond when crap happens. THAT Is what your Awareness Program should strive to do! 7

8 In the past, my experience with Info Sec awareness educa=on and training has been both REACTIONARY and AD HOC, That s not Bad, always good to take advantage of adversity But, it has NOT been comprehensively planned, and well designed to meet the STRATEGIC info security needs of the ins=tu=on and of our cons=tuents. SO: { What are our ins=tu=onal needs? ARE our efforts mee=ng those needs? Or the needs of our cons=tuents? } And the harder ques=on : How do we know if they are? Are there metrics or methods for assessing the effec<veness of our Awareness Educa=on and Training efforts? 8

9 I invite you to make the conscious effort to look at your Security Awareness Program" in the broader context of the overall security needs and security profile of the ins=tu=on, so that your efforts and your program most effec<vely align with those cri=cal needs One way to do this : Look at your Comprehensive WriLen Informa<on Security Program : You have one, right? (Hope it s not like my old one : write once, read never ) Lots of legal and regulatory mandates require one, so put it to use! Your Awareness and Training program should be suppor=ng this overarching goal. 9

10 Take your control structure, and look at each domain group : Note : regardless of what security control solu=ons you implement here be it a firewall rules, change management process, access control seongs, door locks, heat sensors, security cameras, phish mail blocks, vulnerability scan alerts, you name it in the end, there is a HUMAN involved in managing, maintaining, or monitoring those controls SO, again WHY are we doing this? 10

11 because PEOPLE are the weakest link in any security environment : When you look at the security walls we create with our breadth of controls and barriers, what is the universal solvent to ALL of these security control walls and barriers? its HUMANS!!! 11

12 NB: the dis=nc=on between AWARENESS Educa=on and TRAINING : ul=mately, goals of both are changing human behavior. awareness : bring issues to people that they ought to know or that would benefit them to know, but there is no impera<ve that they know it; eg, if a student s hard drive crashes, it would be god if they knew to make a backup beforehand. Training : provides knowledge that we require people to know and abide by, such as policy compliance or safe classified data handling; there may be externally imposed consequences to failure to abide, and there should be in place a means to verify that users have understood the training material. This could be as simple as an AUP click through, up to requiring that an employee become cer=fied for specific training and knowledge Awareness ini=a=ves can be both rela<vely easy, and high profile; whereas actual training will be harder to implement, harder to execute and verify, and more resource intensive. But, while awareness efforts might seem like they are a high priority, from an ins1tu1onal risk perspec1ve, you may need to focus on those areas where actual training is required NB : Business process integra=on of Info Sec into other projects : I m seeing an increase in this, as people become more familiar with both the need and my availability and exper=se. 12

13 or, coming down to ground level from 30,000 feet. Two approaches I am currently working on are : (1) Using the security framework sub- domains, extrac=ng awareness and training topics and mapping to key cons=tuency groups (A) Target awareness educa=on and training at the domains where the risk profile is highest, or where you ll get the most Risk mi<ga<on benefit for your efforts. (2) Compiling a comprehensive list of policy and regulatory compliance mandates, and again extrac=ng awareness and training topics and mapping to key cons=tuency groups My Goal : let cons=tuents take ownership of Informa=on Security issues and solu=ons on their own ini=a=ve - - and become ac=ve security prac==oners 13

14 Randall Munroe s unique perspec=ve on the weakest link 14

15 My for this part of the day : Provide some review of the day s presenta=ons, and perhaps a bit of addi=onal bits to get your thoughts and ques=ons ready for the panel discussion I was told I should. pull everyone and everything back together So, everyone, please pull yourselves and your notes from the day together while I distract you with a few more slides 15

16 IT Staff : includes : User Support Services / Help desk Academic support staff yes, even occasionally, technical staff including the SNS admins from the dark dungeons of the data center Departmental staff : target technophile department liaisons, keep them engaged, feed them the Kool- aid Student works & student groups : They ve got energy, and they hear what s going on in that large target community Commisera=ng peers from surrounding ins=tu=ons form a security group Senior Staff : if you can get their public buy- in, you are GOLDEN 16

17 Just a few slides on some common Awareness hot topics : 17

18 **** A dynamic domain, as the variety and number of networkable devices grows. END POINT SECURITY : BEST PRACTICES Secure Communica=ons : Client protec=on : OS & SW updates and security patch AV, malware, spyware, ransomware, etc. protec=on Data protec=on : local encryp=on regular backups to mul=ple repositories Device protec=on : keep it secure or keep it with you access code locks 18

19 19

20 Your password, to quote Gandalf in The Fellowship of the Rings : is it secret? Is it safe? 20

21 A few of the more common outlet categories for your panel discussion thoughts 21

22 22

23 Don t forget, AWARENESS IS GOOD FOR EVERYONE not just your ins=tu=on! Possible canned speech topics : ITSec - in one sentence? client security in a nutshell safe web best prac<ces in a nutshell Top three IS issues By Tutorial I mean a short, single topic, catchy informa=on blast 23

24 You should explore ways to measure the EFFECTIVENESS of your educa=onal and training efforts NB: The last bullet item : could either be from successful C- Level awareness prosely=zing, or from money laundering, so just watch out for that. Possible training and awareness resources : EDUCause training materials SANS training resources lynda.com other.edu training op=ons that can be obtained LMS (Bb, moodle, other) training course(s) : esp. for new hires 24

25 25

Put the Magic in Your Email Marke4ng

Put the Magic in Your Email Marke4ng Put the Magic in Your Email Marke4ng April 8, 2015 Michelle Novak mnovak@presslaff.com Your Inland Wizards Put the Magic in Your Email Marke4ng Stop blas9ng messages and start crea9ng compelling engaging

More information

Security Awareness. Top Security Issues. Office of Informa(on Technology Informa5on Security Department 2011-2012 BE CYBER SAFE

Security Awareness. Top Security Issues. Office of Informa(on Technology Informa5on Security Department 2011-2012 BE CYBER SAFE Security Awareness Office of Informa(on Technology Informa5on Security Department 2011-2012 Top Security Issues BE CYBER SAFE 1 Top Security Items for 2011-2012 Passwords Social Networking Phishing Malware,

More information

Founda'onal IT Governance A Founda'onal Framework for Governing Enterprise IT Adapted from the ISACA COBIT 5 Framework

Founda'onal IT Governance A Founda'onal Framework for Governing Enterprise IT Adapted from the ISACA COBIT 5 Framework Founda'onal IT Governance A Founda'onal Framework for Governing Enterprise IT Adapted from the ISACA COBIT 5 Framework Steven Hunt Enterprise IT Governance Strategist NASA Ames Research Center Michael

More information

FUNNELBRAIN ONLINE MARKETING GET EDUCATED ON THE SITE THE DELIVERS QUALIFIED STUDENTS TO YOUR SCHOOL. FunnelBrain

FUNNELBRAIN ONLINE MARKETING GET EDUCATED ON THE SITE THE DELIVERS QUALIFIED STUDENTS TO YOUR SCHOOL. FunnelBrain FUNNELBRAIN ONLINE MARKETING GET EDUCATED ON THE SITE THE DELIVERS QUALIFIED STUDENTS TO YOUR SCHOOL FunnelBrain ABOUT FUNNELBRAIN Founded in 2008, by Internet execu4ves from REALTOR.com, WebMD and educa4onal

More information

Application of Supply Chain Concepts to the Analysis Process

Application of Supply Chain Concepts to the Analysis Process Application of Supply Chain Concepts to the Analysis Process Rob Handfield, PhD Bank of America University Distinguished Professor of Supply Chain Management Executive Director, Supply Chain Resource Cooperative

More information

Boise State University Social Media Handbook

Boise State University Social Media Handbook Boise State University Social Media Handbook A best practices and style guide for social media management and networking using the Boise State University brand Compiled by Marketing Minds and implemented

More information

Chick&me On site Training Manual. Please enjoy our workbook and use this opportunity to come prepared for our onsite training together!

Chick&me On site Training Manual. Please enjoy our workbook and use this opportunity to come prepared for our onsite training together! Chick&me On site Training Manual Please enjoy our workbook and use this opportunity to come prepared for our onsite training together! Overview Charity Partner Engagement and Talking Points for Children

More information

Reports Analyzing Your Email Performance

Reports Analyzing Your Email Performance Reports Analyzing Your Email Performance Part 2 Robert Sajan UC Berkeley University Rela?ons Web Group Copyright 2010 UC Regents. All rights reserved. Reports Analyzing Your Email Performance Some ques?ons

More information

Selling Hosted MS Exchange 2010 & SharePoint

Selling Hosted MS Exchange 2010 & SharePoint Selling Hosted MS Exchange 2010 & SharePoint Presenters: David Kidd, Senior Manager, Product Management Verio Tim Shields, President and Owner Shields Technologies Moderator: Janine Soika, Channel Market

More information

Email/Endpoint Security and More Rondi Jamison

Email/Endpoint Security and More Rondi Jamison Email/Endpoint Security and More Rondi Jamison Sr. Marke)ng Manager - Enterprise Security Strategy Agenda 1 Why Symantec? 2 Partnership 3 APS2 Packages 4 What s next Copyright 2014 Symantec Corpora)on

More information

Phone Systems Buyer s Guide

Phone Systems Buyer s Guide Phone Systems Buyer s Guide Contents How Cri(cal is Communica(on to Your Business? 3 Fundamental Issues 4 Phone Systems Basic Features 6 Features for Users with Advanced Needs 10 Key Ques(ons for All Buyers

More information

A wiki is nothing more than a website that is op-mized for easy edi-ng,

A wiki is nothing more than a website that is op-mized for easy edi-ng, Welcome to Collabora-on Tools 105, Using Wikis and Online Project Management Tools in Poverty Law. We re going to spend the next 90 minutes discussing what exactly these tools are, how they re being used

More information

Academic Career Paths and Job Search

Academic Career Paths and Job Search Academic Career Paths and Job Search Padma Raghavan, Penn State Susan Rodger, Duke University Modified Slides from Margaret Martonosi, Mary Lou Soffa, Tiffani Williams and Erin Solovey About this session

More information

Developing a Full- Spectrum Security Training Program

Developing a Full- Spectrum Security Training Program Developing a Full- Spectrum Security Training Program Wayne State University Compu3ng & Informa3on Kevin Hayes, CISSP, CISM Informa)on Security Officer Geoff Nathan Faculty Liason Agenda Background Our

More information

How To Perform a SaaS Applica7on Inventory in. 5Simple Steps. A Guide for Informa7on Security Professionals. Share this ebook

How To Perform a SaaS Applica7on Inventory in. 5Simple Steps. A Guide for Informa7on Security Professionals. Share this ebook How To Perform a SaaS Applica7on Inventory in 5Simple Steps A Guide for Informa7on Security Professionals WHY SHOULD I READ THIS? This book will help you, the person in the organiza=on who cares deeply

More information

Reneaué Railton Sr. Informa2on Security Analyst, Duke Medicine Cyber Defense & Response

Reneaué Railton Sr. Informa2on Security Analyst, Duke Medicine Cyber Defense & Response Reneaué Railton Sr. Informa2on Security Analyst, Duke Medicine Cyber Defense & Response Incident Response What is the most importance component of an Incident Response Program? Tools? Processes? Governance?

More information

Information Security for the Rest of Us

Information Security for the Rest of Us Secure Your Way Forward. AuditWest.com Information Security for the Rest of Us Practical Advice for Small Businesses Brian Morkert President and Chief Consultant 1 Introduction President Audit West IT

More information

NATIONAL CYBER SECURITY AWARENESS MONTH

NATIONAL CYBER SECURITY AWARENESS MONTH NATIONAL CYBER SECURITY AWARENESS MONTH Tip 1: Security is everyone s responsibility. Develop an awareness framework that challenges, educates and empowers your customers and employees to be part of the

More information

Cyber Threat Intelligence Sharing: Lessons Learned, ObservaMons, RecommendaMons

Cyber Threat Intelligence Sharing: Lessons Learned, ObservaMons, RecommendaMons Cyber Threat Intelligence Sharing: Lessons Learned, ObservaMons, RecommendaMons Bob Gourley, Partner, Cognitio September 9, 2015 How we think. Disclaimer There is a great deal of text on these slides.

More information

(Why) Should Research Universi6es Have Schools of Educa6on?

(Why) Should Research Universi6es Have Schools of Educa6on? Spencer F!ndation Annual Lecture (Why) Should Research Universi6es Have Schools of Educa6on? Deborah Loewenberg Ball April 14, 2009 San Diego, California A closer look at the ques6on It s a real ques6on...

More information

Update on the Cloud Demonstration Project

Update on the Cloud Demonstration Project Update on the Cloud Demonstration Project Khalil Yazdi and Steven Wallace Spring Member Meeting April 19, 2011 Project Par4cipants BACKGROUND Eleven Universi1es: Caltech, Carnegie Mellon, George Mason,

More information

How To Protect Virtualized Data From Security Threats

How To Protect Virtualized Data From Security Threats S24 Virtualiza.on Security from the Auditor Perspec.ve Rob Clyde, CEO, Adap.ve Compu.ng; former CTO, Symantec David Lu, Senior Product Manager, Trend Micro Hemma Prafullchandra, CTO/SVP Products, HyTrust

More information

UAB Cyber Security Ini1a1ve

UAB Cyber Security Ini1a1ve UAB Cyber Security Ini1a1ve Purpose of the Cyber Security Ini1a1ve? To provide a secure Compu1ng Environment Individual Mechanisms Single Source for Inventory and Asset Management Current Repor1ng Environment

More information

Data Privacy and Data Security in Telemedicine Applica5ons. Patrick Harpes www.monitor it.lu

Data Privacy and Data Security in Telemedicine Applica5ons. Patrick Harpes www.monitor it.lu Data Privacy and Data Security in Telemedicine Applica5ons Patrick Harpes www.monitor it.lu Agenda Right to privacy Data/Informa@on security Data security measures Risks using telemedicine Composi@on of

More information

Security Protocols: SSH. Michael E. Locasto University of Calgary

Security Protocols: SSH. Michael E. Locasto University of Calgary Security Protocols: SSH Michael E. Locasto University of Calgary Agenda Philosophy: data protec?on on the network Discussion of SSH SSH history Authen?ca?on Mechanisms SSH2 design overview / architecture

More information

Mul: channel communica:on increases your chances of reaching and mo:va:ng more of your audience.

Mul: channel communica:on increases your chances of reaching and mo:va:ng more of your audience. Direct Mail Heavy compe--on for share of mailbox. Direct Mail Spending $19.2 Billion $19.1 Billion (projected) 2009 2010 Source: July 19, 2010, Directmag.com $19.6 Billion (projected) 2011 Mobile Mobile

More information

Drupal for the Masses - Building a Sustainable Distribu7on for Technical and Non- Technical Folks

Drupal for the Masses - Building a Sustainable Distribu7on for Technical and Non- Technical Folks Atlanta DrupalCamp Drupal for the Masses - Building a Sustainable Distribu7on for Technical and Non- Technical Folks Nancy Flowers- Mangs User Experience and Web Services, Yale University ITS Saturday,

More information

Intro Fun. S#ck- figure strip humor sourced and courtesy of h8p://xkcd.com and is provided for informa#ve use only.

Intro Fun. S#ck- figure strip humor sourced and courtesy of h8p://xkcd.com and is provided for informa#ve use only. Intro Fun S#ck- figure strip humor sourced and courtesy of h8p://xkcd.com and is provided for informa#ve use only. Security & Trust Trends on security and trust within the Internet A focus on Phishing

More information

2013 Copyright ComFit Learning Prep

2013 Copyright ComFit Learning Prep 1 2 We at ComFit share with you a common objec=ve: to help your students be more successful in their academic lives and their personal lives. We seek to accomplish this objec=ve by helping you address

More information

Big Data. The Big Picture. Our flexible and efficient Big Data solu9ons open the door to new opportuni9es and new business areas

Big Data. The Big Picture. Our flexible and efficient Big Data solu9ons open the door to new opportuni9es and new business areas Big Data The Big Picture Our flexible and efficient Big Data solu9ons open the door to new opportuni9es and new business areas What is Big Data? Big Data gets its name because that s what it is data that

More information

Beyond Strategy: Building Your Mobile Capabili6es

Beyond Strategy: Building Your Mobile Capabili6es Beyond Strategy: Building Your Mobile Capabili6es TASSCC Technology Educa6on Conference April 10, 2015 Presented by: Raj Polikepa6 Director of App Development Texas.gov Agenda ê Objec6ves of Mobile Strategy

More information

B2B Offerings. Helping businesses op2mize. Infolob s amazing b2b offerings helps your company achieve maximum produc2vity

B2B Offerings. Helping businesses op2mize. Infolob s amazing b2b offerings helps your company achieve maximum produc2vity B2B Offerings Helping businesses op2mize Infolob s amazing b2b offerings helps your company achieve maximum produc2vity What is B2B? B2B is shorthand for the sales prac4ce called business- to- business

More information

89% of Alaska schools see broadband needs rising in the next five years.

89% of Alaska schools see broadband needs rising in the next five years. Key Findings 89% of Alaska schools see broadband needs rising in the next five years. Nearly three out of four rural Alaska schools (73%) say they would offer more educa0onal opportuni0es to their students

More information

How to Create an Easy Breezy Coaching Business! 5 Critical Keys Most Coaches Miss That Keep Them Locked In Overwhelm & Out of the Money Zone!

How to Create an Easy Breezy Coaching Business! 5 Critical Keys Most Coaches Miss That Keep Them Locked In Overwhelm & Out of the Money Zone! How to Create an Easy Breezy Coaching Business! 5 Critical Keys Most Coaches Miss That Keep Them Locked In Overwhelm & Out of the Money Zone! The Quest For Building Your Business Just Got Easier! Meet

More information

Special Report. RESULTS BASED Onboarding Evalua/on Tools and Metrics. Sign up to get your free report today!

Special Report. RESULTS BASED Onboarding Evalua/on Tools and Metrics. Sign up to get your free report today! Special Report Sign up to get your free report today! RESULTS BASED Onboarding Evalua/on Tools and Metrics By Robert C. Bilotti, Managing Director Novita Training Need to get a bigger bang for your buck

More information

How to write a Bachelor s Thesis in Cogni4ve and Decision Sciences? Gilles Du4lh

How to write a Bachelor s Thesis in Cogni4ve and Decision Sciences? Gilles Du4lh How to write a Bachelor s Thesis in Cogni4ve and Decision Sciences? Gilles Du4lh Who I Am Gilles Du4lh, 32 Psychology at University of Amsterdam Master Psychological Methods Got my PhD in mathema4cal psychology

More information

Argand Energy Monitoring Systems

Argand Energy Monitoring Systems Argand Energy Monitoring Solu,ons All your u/li/es & renewables Real- /me & web- enabled Supported by our experts Savings with confidence Our driving philosophy Everything we do is focused on helping clients

More information

NETWORK DEVICE SECURITY AUDITING

NETWORK DEVICE SECURITY AUDITING E-SPIN PROFESSIONAL BOOK VULNERABILITY MANAGEMENT NETWORK DEVICE SECURITY AUDITING ALL THE PRACTICAL KNOW HOW AND HOW TO RELATED TO THE SUBJECT MATTERS. NETWORK DEVICE SECURITY, CONFIGURATION AUDITING,

More information

Corporate Account Takeover (CATO) Risk Assessment

Corporate Account Takeover (CATO) Risk Assessment Corporate Account Takeover (CATO) Risk Assessment As a business, you want to be sure you have a strong process in place for monitoring and managing who has access to your ECorp services and how the information

More information

HOW TO CREATE APPS FOR TRAINING. A step- by- step guide to crea2ng a great training app for your company

HOW TO CREATE APPS FOR TRAINING. A step- by- step guide to crea2ng a great training app for your company HOW TO CREATE APPS FOR TRAINING A step- by- step guide to crea2ng a great training app for your company From compliance and health & safety to employee induction and self-assessment, there are endless

More information

Paul Nguyen. 2014 CSG Interna0onal

Paul Nguyen. 2014 CSG Interna0onal Paul Nguyen 2014 CSG Interna0onal Security is Top- of- Mind Everywhere High- profile breaches: 2K+ breaches expose nearly 1B records in 2013 Increased regulatory pressure State- sponsored hacking around

More information

Can Cloud Hos+ng Providers Really Replace. Your Cri(cal IT Infrastructure?

Can Cloud Hos+ng Providers Really Replace. Your Cri(cal IT Infrastructure? Can Cloud Hos+ng Providers Really Replace Your Cri(cal IT Infrastructure? Housekeeping Welcome to Align s Webinar Can Cloud Hos+ng Providers Really Replace Your Cri(cal IT Infrastructure? Informa+on for

More information

Computer Security Basics For UW-Madison Emeritus Faculty and Staff Oakwood Village University Woods September 17, 2014

Computer Security Basics For UW-Madison Emeritus Faculty and Staff Oakwood Village University Woods September 17, 2014 Computer Security Basics For UW-Madison Emeritus Faculty and Staff Oakwood Village University Woods September 17, 2014 Presented by Nicholas Davis, CISA, CISSP UW-Madison, Division of Information Technology

More information

Are you Smarter than a Scam Artist? 2015 AASC National Conference Nashville, Tennessee

Are you Smarter than a Scam Artist? 2015 AASC National Conference Nashville, Tennessee Are you Smarter than a Scam Artist? 2015 AASC National Conference Nashville, Tennessee Government Grants The government gives grants to special people like you! Stimulus money is still available through

More information

Change Management Strategies to Increase Adop5on of Systems, Programs and Processes

Change Management Strategies to Increase Adop5on of Systems, Programs and Processes Change Management Strategies to Increase Adop5on of Systems, Programs and Processes Theresa Rabe, Deputy Director of HR, County of San Mateo Jay Krishnan, Director, Product Marke5ng, GuideSpark October

More information

Landmark Company Overview

Landmark Company Overview Landmark Company Overview Landmark is an interna4onal personal and professional growth, training and development company a global educa4onal enterprise commi>ed to the fundamental principle that people

More information

Ohio University Computer Services Center October, 2004 Spyware, Adware, and Virus Guide

Ohio University Computer Services Center October, 2004 Spyware, Adware, and Virus Guide Ohio University Computer Services Center October, 2004 Spyware, Adware, and Virus Guide Definitions Malware is term meaning malicious software. Malware is software designed to disrupt a computer system.

More information

Governance as Leadership: Reframing the Work of Nonprofit Boards

Governance as Leadership: Reframing the Work of Nonprofit Boards Governance as Leadership: Reframing the Work of Nonprofit Boards Tradi

More information

WSECU Cyber Security Journey. David Luchtel VP IT Infrastructure & Opera:ons

WSECU Cyber Security Journey. David Luchtel VP IT Infrastructure & Opera:ons WSECU Cyber Security Journey David Luchtel VP IT Infrastructure & Opera:ons Objec:ve of Presenta:on Share WSECU s journey Overview of WSECU s Security Program approach Overview of WSECU s self- assessment

More information

Project Por)olio Management

Project Por)olio Management Project Por)olio Management Important markers for IT intensive businesses Rest assured with Infolob s project management methodologies What is Project Por)olio Management? Project Por)olio Management (PPM)

More information

Research Data Networks: Privacy- Preserving Sharing of Protected Health Informa>on

Research Data Networks: Privacy- Preserving Sharing of Protected Health Informa>on Research Data Networks: Privacy- Preserving Sharing of Protected Health Informa>on Lucila Ohno-Machado, MD, PhD Division of Biomedical Informatics University of California San Diego PCORI Workshop 7/2/12

More information

Building an Effec.ve Cloud Security Program

Building an Effec.ve Cloud Security Program Building an Effec.ve Cloud Security Program Laura Posey Senior Security Strategist, Microso3 Corpora6on Co- Chair, CSA CAIQ Programming Chair, NY Metro CSA Chapter Is Cloud worth it? Yes! Pla?orm for Innova.on

More information

David S. Lee, MPH. Campus sexual violence preven;on: An overview of opportuni;es and challenges in policy and programs

David S. Lee, MPH. Campus sexual violence preven;on: An overview of opportuni;es and challenges in policy and programs David S. Lee, MPH Campus sexual violence preven;on: An overview of opportuni;es and challenges in policy and programs APHA Annual Mee+ng, Chicago, IL, November 2015 Disclosures I have no disclosures to

More information

Understanding Cloud Compu2ng Services. Rain in business success with amazing solu2ons in Cloud technology

Understanding Cloud Compu2ng Services. Rain in business success with amazing solu2ons in Cloud technology Understanding Cloud Compu2ng Services Rain in business success with amazing solu2ons in Cloud technology What is Cloud Compu2ng? Cloud compu2ng encompasses various services and ac2vi2es carried out over

More information

Disaster Recovery Planning and Implementa6on. Chris Russel Director, IT Infrastructure and ISO Compu6ng and Network Services York University

Disaster Recovery Planning and Implementa6on. Chris Russel Director, IT Infrastructure and ISO Compu6ng and Network Services York University Disaster Recovery Planning and Implementa6on Chris Russel Director, IT Infrastructure and ISO Compu6ng and Network Services York University Agenda Background for York s I.T. Disaster Recovery Planning

More information

MAXIMIZING THE SUCCESS OF YOUR E-PROCUREMENT TECHNOLOGY INVESTMENT. How to Drive Adop.on, Efficiency, and ROI for the Long Term

MAXIMIZING THE SUCCESS OF YOUR E-PROCUREMENT TECHNOLOGY INVESTMENT. How to Drive Adop.on, Efficiency, and ROI for the Long Term MAXIMIZING THE SUCCESS OF YOUR E-PROCUREMENT TECHNOLOGY INVESTMENT How to Drive Adop.on, Efficiency, and ROI for the Long Term What We Will Cover Today Presenta(on Agenda! Who We Are! Our History! Par7al

More information

The Advantages of Network Research and Knowledge Sharing

The Advantages of Network Research and Knowledge Sharing Public Health Networks Project Recap Section 1: Project Summary Section 2: Results dissemination presentations to individual networks Section 3: Presentation at CAHSPR (CPHA presentation not included to

More information

Exchange of experience from a SuccessFactors LMS Implementa9on

Exchange of experience from a SuccessFactors LMS Implementa9on Exchange of experience from a SuccessFactors LMS Implementa9on Seen from a user perspective Hanne Vasshus Ask Competency Management Cau9onary Statement The following presenta9on includes forward- looking

More information

A Guide to Information Technology Security in Trinity College Dublin

A Guide to Information Technology Security in Trinity College Dublin A Guide to Information Technology Security in Trinity College Dublin Produced by The IT Security Officer & Training and Publications 2003 Web Address: www.tcd.ie/itsecurity Email: ITSecurity@tcd.ie 1 2

More information

Design considera-ons and Guiding Principles for Implemen-ng Cloud Security. William Stearns Security Analyst CloudPassage

Design considera-ons and Guiding Principles for Implemen-ng Cloud Security. William Stearns Security Analyst CloudPassage Design considera-ons and Guiding Principles for Implemen-ng Cloud Security William Stearns Security Analyst CloudPassage In a nutshell How do Cloud Servers differ from Data Center Servers? How do the differences

More information

SMALL BUSINESS IT SECURITY PRACTICAL GUIDE

SMALL BUSINESS IT SECURITY PRACTICAL GUIDE SMALL BUSINESS IT SECURITY PRACTICAL GUIDE How to make sure your business has comprehensive IT security protection #protectmybiz Small businesses come in all shapes and sizes. But in today s world, no

More information

H O W T O D R A M AT I C A L LY I N C R E A S E P R O F I T S U S I N G A B D C A N D C A L L M O N I T O R I N G

H O W T O D R A M AT I C A L LY I N C R E A S E P R O F I T S U S I N G A B D C A N D C A L L M O N I T O R I N G H O W T O D R A M AT I C A L LY I N C R E A S E P R O F I T S U S I N G A B D C A N D C A L L M O N I T O R I N G Revealed in our study of the data behind 29,000 phone calls to auto dealerships. 1954 Greenspring

More information

Developing Your Roadmap The Association of Independent Colleges and Universities of Massachusetts. October 3, 2013

Developing Your Roadmap The Association of Independent Colleges and Universities of Massachusetts. October 3, 2013 Developing Your Roadmap The Association of Independent Colleges and Universities of Massachusetts October 3, 2013 Agenda 1. Introductions 2. Higher Ed Industry Trends 3. Technology Trends in Higher Ed

More information

National Cyber Security Month 2015: Daily Security Awareness Tips

National Cyber Security Month 2015: Daily Security Awareness Tips National Cyber Security Month 2015: Daily Security Awareness Tips October 1 New Threats Are Constantly Being Developed. Protect Your Home Computer and Personal Devices by Automatically Installing OS Updates.

More information

SMALL BUSINESS IT SECURITY PRACTICAL GUIDE

SMALL BUSINESS IT SECURITY PRACTICAL GUIDE SMALL BUSINESS IT SECURITY PRACTICAL GUIDE How to make sure your business has comprehensive IT security protection #protectmybiz Small businesses come in all shapes and sizes. But in today s world, no

More information

Why Buy Eaton: Trusted Source to Manage Power

Why Buy Eaton: Trusted Source to Manage Power Why Buy Eaton: Trusted Source to Manage Power If you are responsible for power protec0on for small or medium data centers, Eaton can help you deliver a reliable power source for your business. Target Markets:

More information

Update on the Cloud Demonstration Project

Update on the Cloud Demonstration Project Update on the Cloud Demonstration Project Steven Wallace Joint Techs Summer 2011 13- July- 2011 Project Par4cipants BACKGROUND Twelve Universi,es: Caltech, Carnegie Mellon,Cornell George Mason, Indiana

More information

Successful Change Management

Successful Change Management Successful Change Management Key Principles and Insights for Super Funds Ma; Hardy, Right Lane Consul@ng Types of change Barriers and pidalls Today s session Change experiences in our own industry Principles

More information

How To Manage A Mobile Device Management At Harvard

How To Manage A Mobile Device Management At Harvard Demys&fying Mobile Device Management Challenges Indir Avdagic Director of Informa.on Security and Risk Management, SEAS Objec&ves Our hope is that this conversa0on will get people thinking about mobile

More information

Introducing BRAD - the New Standard for Print on Demand

Introducing BRAD - the New Standard for Print on Demand Presenta0on materials and video replay will be provided within one week. Have ques0ons? Use the ques0ons panel during the Q&A recap at the end of the call. we ll field them as we go and Introducing BRAD

More information

Out of Many, One: Four Perspec4ves on Managing Limited Submission Programs

Out of Many, One: Four Perspec4ves on Managing Limited Submission Programs Out of Many, One: Four Perspec4ves on Managing Limited Submission Programs Pollyanne Frantz, Appalachian State University Kimberly Gray, Georgia Regents University Carol AshcraF, North Carolina State University

More information

How to Use Windows Firewall With User Account Control (UAC)

How to Use Windows Firewall With User Account Control (UAC) Keeping Windows 8.1 safe and secure 14 IN THIS CHAPTER, YOU WILL LEARN HOW TO Work with the User Account Control. Use Windows Firewall. Use Windows Defender. Enhance the security of your passwords. Security

More information

NSF/Intel Partnership on Cyber- Physical Systems Security and Privacy (CPS- Security)

NSF/Intel Partnership on Cyber- Physical Systems Security and Privacy (CPS- Security) NSF Webinar on NSF Solicita9on 14-571 NSF/Intel Partnership on Cyber- Physical Systems Security and Privacy (CPS- Security) Farnam Jahanian, Keith Marzullo, Angelos D. Keromy9s, David Corman Jeremy Epstein,

More information

IT Change Management Process Training

IT Change Management Process Training IT Change Management Process Training Before you begin: This course was prepared for all IT professionals with the goal of promo9ng awareness of the process. Those taking this course will have varied knowledge

More information

CFITS Industry Partners

CFITS Industry Partners UNIVERSITY OF SOUTH ALABAMA Les Barnett, Director 2015 CFITS Industry Partners INDUSTRY PARTNER PROGRAM CENTER FOR FORENSICS, INFORMATION TECHNOLOGY, AND SECURITY with the SCHOOL OF COMPUTING INDUSTRY

More information

Member Municipality Security Awareness Training. End- User Informa/on Security Awareness Training

Member Municipality Security Awareness Training. End- User Informa/on Security Awareness Training End- User Informa/on Security Awareness Training 1 Why Awareness Training? NCLM sanc:oned mul:ple Security Risk Assessments for a broad spectrum of member municipali:es The assessments iden:fied areas

More information

Encrypted Email Opening and Replying to a Secure Message

Encrypted Email Opening and Replying to a Secure Message First Time User Registration Opening a Secure Encrypted Email Where to go for Help Frequently Asked Questions Information Technology Encrypted Email Opening and Replying to a Secure Message First Time

More information

Migrating to Hosted Telephony. Your ultimate guide to migrating from on premise to hosted telephony. www.ucandc.com

Migrating to Hosted Telephony. Your ultimate guide to migrating from on premise to hosted telephony. www.ucandc.com Migrating to Hosted Telephony Your ultimate guide to migrating from on premise to hosted telephony Intro What is covered in this guide? A professional and reliable business telephone system is a central

More information

Oracle Solu?ons for Higher Educa?on

Oracle Solu?ons for Higher Educa?on Presented with Oracle Solu?ons for Higher Educa?on Cole Clark Global Vice President Oracle, Educa?on & Research June 12, 2014 Oracle Confiden?al Internal/Restricted/Highly Restricted Safe Harbor Statement

More information

An Integrated Approach to Manage IT Network Traffic - An Overview Click to edit Master /tle style

An Integrated Approach to Manage IT Network Traffic - An Overview Click to edit Master /tle style An Integrated Approach to Manage IT Network Traffic - An Overview Click to edit Master /tle style Agenda A quick look at ManageEngine Tradi/onal Traffic Analysis Techniques & Tools Changing face of Network

More information

The 10 step communication plan

The 10 step communication plan The 10 step communication plan Follow these 10 suggested steps and you will be successful at launching the Specops password reset service. Step 1 Activity: Intranet texts explaining the service Suggested

More information

Managed Services. An essen/al set of tools for today's businesses

Managed Services. An essen/al set of tools for today's businesses Managed Services An essen/al set of tools for today's businesses Manage your enterprise better with a holis/c solu/on to all your IT worries only at Infolob What are Managed Services? By far the most cu/ng

More information

Change Leadership A view from the front seat

Change Leadership A view from the front seat Change Leadership A view from the front seat Bruce Burrell Consul,ng Incorporated What we will cover Building an Effec

More information

Reali9es of Being PCI Compliant

Reali9es of Being PCI Compliant Reali9es of Being PCI Compliant Miguel (Mike) O. Villegas CISA, CISSP, GSEC, CEH, QSA, PA- QSA, ASV Vice President- K3DES LLC Professional Strategies S23 CRISC CGEIT CISM CISA Abstract PCI DSS compliance

More information

Hint: Best actions: Find out more in videos and FAQ: Hint: Best actions: Find out more in videos and FAQ:

Hint: Best actions: Find out more in videos and FAQ: Hint: Best actions: Find out more in videos and FAQ: Game Cheatsheet This is a spam email, an unsolicited and unwanted email from an unknown sender. Hint: Does this offer seem too good to be true? Perhaps you need to know more? Best actions: Delete, Check

More information

Balancing Usability and Security for Medical Devices

Balancing Usability and Security for Medical Devices Balancing Usability and Security for Medical Devices Ken Hoyme Adven&um Labs ken.hoyme@adven8umlabs.com Robert North, LLC bnorth@humancenteredstrategies.com March 17, 2014 3/17/2014 2014 Adven8um Labs

More information

PALO ALTO SAFE APPLICATION ENABLEMENT

PALO ALTO SAFE APPLICATION ENABLEMENT PALO ALTO SAFE APPLICATION ENABLEMENT 1 Palo Alto Networks Product Overview James Sherlow SE Manager WEUR & Africa jsherlow@paloaltonetworks.com @jsherlow Palo Alto Networks at a Glance Corporate Highlights

More information

Out of the Frying Pan and Into the Fire: Protecting the Security of Research Data. Vice Chancellor for IT & CIO July 19, 2011 UNC Chapel Hill

Out of the Frying Pan and Into the Fire: Protecting the Security of Research Data. Vice Chancellor for IT & CIO July 19, 2011 UNC Chapel Hill Out of the Frying Pan and Into the Fire: Protecting the Security of Research Data Larry Conrad ISTS Dartmouth College Vice Chancellor for IT & CIO July 19, 2011 UNC Chapel Hill First the Context: Information

More information

Retail Pharmacy Clinical Services: Influence of ACOs & Healthcare Financing Models

Retail Pharmacy Clinical Services: Influence of ACOs & Healthcare Financing Models Retail Pharmacy Clinical Services: Influence of ACOs & Healthcare Financing Models Tim Kosty, R.Ph., MBA President Pharmacy Healthcare Solu

More information

Next. CDS 2015 Survey Module 7 Information Security Survey Errata

Next. CDS 2015 Survey Module 7 Information Security Survey Errata 1 CDS 2015 Survey Survey Errata This module includes questions about the IT security organization, staffing, policies, and practices related to information technology security. This is an optional module.

More information

DDC Sequencing and Redundancy

DDC Sequencing and Redundancy DDC Sequencing and Redundancy Presenter Sequencing Importance of sequencing Essen%al piece to designing and delivering a successful project Defines how disparate components interact to make up a system

More information

Franciscan University of Steubenville Information Security Policy

Franciscan University of Steubenville Information Security Policy Franciscan University of Steubenville Information Security Policy Scope This policy is intended for use by all personnel, contractors, and third parties assisting in the direct implementation, support,

More information

Defensive Training for Social Engineering

Defensive Training for Social Engineering FISSEA 2009 22nd Annual Conference Defensive Training for Social Engineering Stacey Banks, CISSP, CCO, CSM Background Oxford Federal, LLC Information security solutions and services company providing certification

More information

Information Security Basics: Starting a Security Awareness Program at your Station. Seton R. Droppers, CISSP PBS

Information Security Basics: Starting a Security Awareness Program at your Station. Seton R. Droppers, CISSP PBS Information Security Basics: Starting a Security Awareness Program at your Station Seton R. Droppers, CISSP PBS Who am I Seton R. Droppers PBS 1986 and 2004 MCI/UUNET 1998 VMS, Unix system Internet Security

More information

Next. CDS 2015 Survey Module 7 Information Security Survey Errata

Next. CDS 2015 Survey Module 7 Information Security Survey Errata CDS 2015 Survey Survey Errata This module includes questions about the IT security organization, staffing, policies, and practices related to information technology security. This is an optional module.

More information

Online Enrollment Op>ons - Sales Training. 2011. Benefi+ocus.com, Inc. All rights reserved. Confiden>al and Proprietary 1

Online Enrollment Op>ons - Sales Training. 2011. Benefi+ocus.com, Inc. All rights reserved. Confiden>al and Proprietary 1 Online Enrollment Op>ons - Sales Training 2011. Benefi+ocus.com, Inc. All rights reserved. Confiden>al and Proprietary 1 Agenda Understand Why This is Important Enrollment Op>ons Available EDI Blues Enroll

More information

Bill Sieglein, Founder CSO Breakfast Club PLATINUM SPONSOR: SOLUTIONARY

Bill Sieglein, Founder CSO Breakfast Club PLATINUM SPONSOR: SOLUTIONARY AGENDA 8:00 8:30 Breakfast and Social Networking 8:30 8:45 Welcome & Introduc@ons, Bill Sieglein, Founder CSO Breakfast Club 8:45 9:15 Keynote: Don Gray, Chief Security Strategist PLATINUM SPONSOR: SOLUTIONARY

More information

HSyE HIPAA Training. Summer 2015

HSyE HIPAA Training. Summer 2015 HSyE HIPAA Training Summer 2015 Agenda What is HIPAA PII Electronic Security Data Files Desktops Internet Security Home/Outside Network Security Personal Laptops Cell Phones/ Tablets Physical Security

More information

Challenges of PM in Albania and a New. Professional Perspec8ve. Prepared by: Dritan Mezini, MBA, MPM B.S. CS

Challenges of PM in Albania and a New. Professional Perspec8ve. Prepared by: Dritan Mezini, MBA, MPM B.S. CS Challenges of PM in Albania and a New Professional Perspec8ve Prepared by: Dritan Mezini, MBA, MPM B.S. CS Table of contents Presenter s brief introduc8on General Concepts What is a project? What is Project

More information

Internet Security Protecting Your Business. Hayden Johnston & Rik Perry WYSCOM

Internet Security Protecting Your Business. Hayden Johnston & Rik Perry WYSCOM Internet Security Protecting Your Business Hayden Johnston & Rik Perry WYSCOM Introduction Protecting Your Network Securing Your Information Standards & Best Practices Tools & Options Into The Future Creating

More information