Presentation is loading. Please wait.

Presentation is loading. Please wait.

E. Gelbstein A. Kamal Information Insecurity Part IV: The Recommendations Next slide: PgDn or Click Previous slide: PgUp To quit the presentation: Esc.

Similar presentations


Presentation on theme: "E. Gelbstein A. Kamal Information Insecurity Part IV: The Recommendations Next slide: PgDn or Click Previous slide: PgUp To quit the presentation: Esc."— Presentation transcript:

1 E. Gelbstein A. Kamal Information Insecurity Part IV: The Recommendations Next slide: PgDn or Click Previous slide: PgUp To quit the presentation: Esc 1 of 9 The Recommendations

2 E. Gelbstein A. Kamal Information Insecurity Part IV: The Recommendations Next slide: PgDn or Click Previous slide: PgUp To quit the presentation: Esc 2 of 9 Recommendations 1.Become aware of the problem 2.Devise an information security strategy 3.Implement some remedial procedures immediately 4.Seek professional help without delay 5.Adopt international standards and best practices 6.Identify the gaps in national legislation 7.Encourage the United Nations to embark urgently on a Law of Cyberspace

3 E. Gelbstein A. Kamal Information Insecurity Part IV: The Recommendations Next slide: PgDn or Click Previous slide: PgUp To quit the presentation: Esc 3 of 9 Awareness Information Security is NOT just a technical problem Everyone has a role to play You cannot manage what you do not understand

4 E. Gelbstein A. Kamal Information Insecurity Part IV: The Recommendations Next slide: PgDn or Click Previous slide: PgUp To quit the presentation: Esc 4 of 9 Security Strategy Assign responsibility for strategy Ensure that strategy matches needs Re-evaluate strategy frequently

5 E. Gelbstein A. Kamal Information Insecurity Part IV: The Recommendations Next slide: PgDn or Click Previous slide: PgUp To quit the presentation: Esc 5 of 9 Remedial Procedures Do the simple things first Do them NOW Advice is readily available and it is free

6 E. Gelbstein A. Kamal Information Insecurity Part IV: The Recommendations Next slide: PgDn or Click Previous slide: PgUp To quit the presentation: Esc 6 of 9 Professional Help Employ “ethical hackers” Involve Auditors and Consultants Consult Professional Associations

7 E. Gelbstein A. Kamal Information Insecurity Part IV: The Recommendations Next slide: PgDn or Click Previous slide: PgUp To quit the presentation: Esc 7 of 9 Standards and Best Practices Adopt ISO 17799 or equivalent Do not reinvent the wheel Ensure compliance with adopted standards

8 E. Gelbstein A. Kamal Information Insecurity Part IV: The Recommendations Next slide: PgDn or Click Previous slide: PgUp To quit the presentation: Esc 8 of 9 Gaps in Legislation Gaps will be exploited by the Bad Guys Understanding the gaps will encourage legislation Legislation will level the playing field

9 E. Gelbstein A. Kamal Information Insecurity Part IV: The Recommendations Next slide: PgDn or Click Previous slide: PgUp To quit the presentation: Esc 9 of 9 Law of Cyber-Space A global comprehensive consensus among all stake-holders It cannot wait Only the United Nations can do it


Download ppt "E. Gelbstein A. Kamal Information Insecurity Part IV: The Recommendations Next slide: PgDn or Click Previous slide: PgUp To quit the presentation: Esc."

Similar presentations


Ads by Google