Strategy Advisory Group SA. Corporate Training. Information Security Awareness Program 1



Similar documents
How-To Guide: Cyber Security. Content Provided by

SECURITY CONSIDERATIONS FOR LAW FIRMS

Collateral Effects of Cyberwar

Cybersecurity: Protecting Your Business. March 11, 2015

A Small Business Approach to Big Business Cyber Security. Brent Bettis, CISSP 23 September, 2014

BCS IT User Syllabus IT Security for Users Level 2. Version 1.0

Emerging risks for internet users

EY Cyber Security Hacktics Center of Excellence

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

SafeBiz. Identity Theft and Data Breach Program For Small & Medium Size Businesses (SMB)

Small businesses: What you need to know about cyber security

Privacy Liability & Data Breach Management Nikos Georgopoulos Cyber Risks Advisor cyrm October 2014

Christos Douligeris cdoulig at unipi dot gr. Department of Informatics University of Piraeus

Policing Together. A quick guide for businesses to Information Security and Cyber Crime

Cyber Risks and Insurance Solutions Malaysia, November 2013

WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY

Information Security Incident Management Guidelines

White Paper. Data Breach Mitigation in the Healthcare Industry

Certified Cyber Security Analyst VS-1160

SecurityMetrics Vision whitepaper

Cybersecurity Awareness. Part 1

current and previous addresses name/ssn Medical Insurance info UNCLASSIFIED credit info family info phone & fax #

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

Saheel KHOYRATTY. Partner Technology Advisor

9. Information Assurance and Security, Protecting Information Resources. Janeela Maraj. Tutorial 9 21/11/2014 INFO 1500

Identity Theft. CHRISTOS TOPAKAS Head of Group IT Security and Control Office

CYBER SECURITY STRATEGY AN OVERVIEW

CYBERSECURITY HOT TOPICS

Small businesses: What you need to know about cyber security

The Key to Secure Online Financial Transactions

DON T BE A VICTIM! IS YOUR ORGANIZATION PROTECTED FROM CYBERSECURITY THREATS?

Internet threats: steps to security for your small business

Acceptable Use Policy

Internet Safety & Awareness. Dan Tomlinson 02/23/2013

Data Security for the Hospitality

Real World Healthcare Security Exposures. Brian Selfridge, Partner, Meditology Services

PROTECT YOUR COMPUTER AND YOUR PRIVACY!

Reliance Bank Fraud Prevention Best Practices

Online Banking Fraud Prevention Recommendations and Best Practices

PDSA Special Report. Is your Company s Security at Risk

SANS Securing The Human

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

NEW ZEALAND S CYBER SECURITY STRATEGY

Reducing Cyber Risk in Your Organization

Keeping out of harm s way in cyberspace

ISO Information Security Management Systems Foundation

Nine recommendations for alternative funds battling cyber crime. kpmg.ca/cybersecurity

Cybersecurity Report on Small Business: Study Shows Gap between Needs and Actions

Presented by Frederick J. Santarsiere

APPROPRIATE USE OF INFORMATION POLICY 3511 TECHNOLOGY RESOURCES ADOPTED: 06/17/08 PAGE 1 of 5

CYBER ATTACKS CASHING IN ON RETAILERS: A WEBINAR ON CYBERSECURITY

BEST SECURITY PRACTICES IN ONLINE BANKING PLATFORMS

ACCEPTABLE USE AND TAKEDOWN POLICY

The Cost of Phishing. Understanding the True Cost Dynamics Behind Phishing Attacks A CYVEILLANCE WHITE PAPER MAY 2015

Recession Calls for Better Change Management Separation of duties, logging paramount in times of great, rapid change

Basics of Internet Security

NATIONAL CYBER SECURITY AWARENESS MONTH

Applying the 80/20 approach for Operational Excellence. How to combat new age threats, optimize investments and increase security.

Information Technology Risk Management

National Cyber Security Month 2015: Daily Security Awareness Tips

Maritime Insurance Cyber Security Framing the Exposure. Tony Cowie May 2015

SENIORS ONLINE SECURITY

DON T BE A VICTIM! IS YOUR INVESTMENT PROGRAM PROTECTED FROM CYBERSECURITY THREATS?

WHITE PAPER Usher Mobile Identity Platform

Cyber Security 2014 SECURE BANKING SOLUTIONS, LLC

2010 AICPA Top Technology Initiatives. About the Presenter. Agenda. Presenter: Dan Schroeder, CPA/CITP Habif, Arogeti, & Wynne, LLP

White Paper. Information Security -- Network Assessment

Information Security Policy

WHITE PAPER. The Cost of Phishing: Understanding the True Cost Dynamics Behind Phishing Attacks

Managing Cyber Risk through Insurance

Business. Security Tips. Smarter Ways To Help Protect Your Business. Safer. Smarter. Tyco. TM

BE SAFE ONLINE: Lesson Plan

GAO. INFORMATION SECURITY Persistent Weaknesses Highlight Need for Further Improvement

TYPES, PREVALENCE, AND PREVENTION OF CYBERCRIME. Haya Fetais & Mohammed Shabana. Saint Leo University COM- 510

TMCEC CYBER SECURITY TRAINING

Office of the Auditor General Performance Audit Report. Statewide UNIX Security Controls Department of Technology, Management, and Budget

CYBER SECURITY. ADVISORY SERVICES Governance Risk & Compliance. Shemrick Rodney IT Specialist Consultant Antigua & St. Kitts

10 best practice suggestions for common smartphone threats

VISA International Security Summit. Dr. Colonel Tran Van Hoa Deputy Director Viet Nam Hightech Crime Police Department

CYBER RISK SECURITY, NETWORK & PRIVACY

Cybersecurity Workshop

Statement of Qualifications Cybercrime & data breach

A Cyber Security Integrator s perspective and approach

Studying Security Weaknesses of Android System

Elevation of Mobile Security Risks in the Enterprise Threat Landscape

Best Practices Guide to Electronic Banking

Introduction. Jason Lawrence, MSISA, CISSP, CISA Manager, EY Advanced Security Center Atlanta, Georgia

Cybersecurity in SMEs: Evaluating the Risks and Possible Solutions. BANCHE E SICUREZZA 2015 Rome, Italy 5 June 2015 Arthur Brocato, UNICRI

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com

Trust the Innovator to Simplify Cloud Security

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management

Cybercrime : Malaysia. By DSP MahfuzBin Dato Ab. Majid Royal Malaysia Police

OCIE Technology Controls Program

Vulnerability Assessment & Compliance

Business ebanking Fraud Prevention Best Practices

Are your people playing an effective role in your cyber resilience?

WHY HIGH-NET-WORTH CLIENTS NEED SUPERIOR CYBER RISK AND IDENTITY PROTECTION AND HOW YOU CAN HELP

Cybercrimes NATIONAL CRIME PREVENTION COUNCIL

COMPUTER, NETWORK AND INTERNET USE POLICY

Transcription:

IT & IP Strategy Advisory Group SA Corporate Training Information Security Awareness Program 1 March 2011 - SONY : Over 100 million stolen personal data September 2011 - Mitsubishi Heavy Industries : At least 83 compromised systems October 2011-73% of Board Members send documents to their boards using private e-mail addresses October 2011 - Japanese Government : system against cyber-attacks insufficient

Is Your Organization Safe? How Do You Know? Turn your weakest security link into your greatest security asset! Reduce your corporate risk by creating an organizational culture of information security. Information is a High-Value but Exposed Asset Information is one of the most critical assets of your day-to-day business. It should be part of any organization s risk and compliance strategy but also consolidated by an ongoing improvement process. Cyber Crime is a whole new criminal venue that commits fraud, exploits and steals intellectual property and costs organizations millions of dollars. Cyber Crime can include unauthorized electronic funds transfers, electronic manipulation of share markets, dissemination of misleading advertising information or offensive content, computer hacking, vandalism and viruses, theft of telecommunications and Internet services. A clear image of Information Security will help you better understand but also lower the risks linked to the growing threats against your organization s assets. Our Corporate Training Solutions Our Information Security Awareness Training is an introductory program intended for managers and employees concerned about the security of their company. An awareness program is one of the basic steps to remediate lack of information about today s threats. These sessions are not intended to sell security related tools nor hardware to your company. We provide valuable knowledge that will enable you to assess and / or minimize your company security exposure. Our programs yield immediate return on investment and will improve your general security. Direct Benefits to Your Organization Your management and staff will learn: Latest trends and developments about Cyber Crime Latest computer and internet security risks Security, and I.T. security best practices to help prevent loss to your organization Better understanding of the value of your company s information Better understanding of the weaknesses, risks and exposure that threaten your information. Better understanding of the counter-measures that your organization needs to take Our programs are the most cost effective way to increase security across your organization. Their contents satisfy the awareness training requirements of a broad range of industries. 2

Information Security Awareness Training Corporate Packages Our Information Security Awareness Training is made of two corporate packages that offer a comprehensive combination of training methods. Both courses can be set up within your organization. External location is available on request, please contact us about this. These programs are presented in English by Mr. Aldo Bloise, Deputy Manager of IT&IP Strategy Advisory Group SA (Japan) and founder of IT&IP Information Security Solutions. Aldo Bloise is a Certified Information Systems Security Professional (CISSP) who worked first as an IT engineer and then as an Information Security Consultant in a Private Bank in Switzerland for 10 years. SAFE OFFICE 1 (SO1) - 1/2 Day Core Program: Introduction to Information Security Threats, figures and trends Password Management Social Engineering Phishing, Scam & Hoax awareness Computer Viruses Safer Internet Usage Safer Email Usage Duration: 9:30 to 14:00 Registration fee for each individual participant: Up to 7 participants: 45 000, 5% tax not included 8-10 participants: 40 000, 5% tax not included 11-15 participants: 35 000, 5% tax not included 5% discount for members of Chambers of Commerce affiliated to the European Business Council in Japan, www.ebc-jp.com. Short quizzes will be provided and a certificate of participation to the training will be delivered to the participants. 3

SAFE OFFICE 2 (SO2) - 1 Day Core Program : Introduction to Information Security Threats, figures and trends Password Management Social Engineering Phishing, Scam & Hoax awareness Computer Viruses Malicious Code Safer Internet Usage Safer Email Usage Bluetooth Wireless security Social media Mobile medium Duration: 9:30 to 17:30 Registration fee for each individual participant: Up to 7 participants: 85 000, 5% tax not included 8-10 participants: 75 000, 5% tax not included 11-15 participants: 60 000, 5% tax not included 5% discount for members of Chambers of Commerce affiliated to the European Business Council in Japan, www.ebc-jp.com. Short quizzes will be provided and a certificate of participation to the training will be delivered to the participants. On request, we can arrange parts or all of the core curriculum to meet your specific needs on a tailor-made basis. Please contact us for any further inquiry and we will set up together your tailor-made Information Security Awareness Training. Please ask us also about further Security awareness training specifically targeted for executives and IT managers. Japanese contact : English contact : Ms. Yoshimura Tomomi Phone: 092 716-7626 Fax: 092 791-5156 Email: info@itip.ch Ms. Joëlle Sambuc Bloise Phone : 080 4116 2610 Email: info@itip.ch 4

IT & IP Strategy Advisory Group SA Member of the Swiss Chamber of Commerce and Industry in Japan Member of OSEC Pool of experts Member of the Italian Chamber of Commerce in Japan Switzerland (Headquarters) 11 av. Antoinette, 1234 Vessy, Switzerland Web: www.itip.ch Japan Daimyo 2-9-35-5F Chuo-ku Fukuoka City 810-0041 Project Director Aldo Bloise, CISSP Tel : + 81 (0)92 716-7626 Fax : + 81 (0)92 791-5156 Email : abloise@itip.ch