We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byHailey Gutierrez
Modified over 3 years ago
Information Security Awareness Copyright © 2011 IsecT Ltd. September 2011 Management seminar Building our security culture
Information Security Awareness Copyright © 2011 IsecT Ltd. 2 Introduction
Information Security Awareness Copyright © 2011 IsecT Ltd. 3 What do we want?
Information Security Awareness Copyright © 2011 IsecT Ltd. 4 But we already have a security culture
Information Security Awareness Copyright © 2011 IsecT Ltd. 5 Would you spot a fake like this?
Information Security Awareness Copyright © 2011 IsecT Ltd. 6 Linkedin Handles sensitive medical data College 8 colleagues to exploit Too easy! 25m more targets! Job title
Information Security Awareness Copyright © 2011 IsecT Ltd. 7 OK, so how do we get it? If you accept that a security culture is indeed a valuable goal, what would you suggest we do to establish or improve ours?
Information Security Awareness Copyright © 2011 IsecT Ltd. 8 How do we get a security culture?
Information Security Awareness Copyright © 2011 IsecT Ltd. 9 How do we know when we have it?
Information Security Awareness Copyright © 2011 IsecT Ltd. 10 Summary
Information Security Awareness Copyright © 2011 IsecT Ltd. 11 Management action plan 1.Check the security policies & procedures 2.Lead by example: demonstrate secure behaviors, place a value on security 3.Identify and reward secure behaviors 4.Encourage open discussion about security matters – talk it up a bit 5.Reap the benefits of a security culture
Information Security Awareness Copyright © 2011 IsecT Ltd. 12 Further information Information Security Policy Manual and other security awareness materials CIO or Information Security Manager Browse the intranet Security Zone Managing the Human Factor in Information Security by David Lacey and Spies Among Us by Ira Winkler Google for more!
Copyright © 2011 IsecT Ltd. Securing people Security awareness seminar for IT professionals Information Security Awareness September 2011.
Copyright © 2011 IsecT Ltd. Social engineering Spot it and stop it September 2011 Security awareness seminar.
Preventing Infringement of Intellectual Property (IP) Rights in the Workplace Awareness raising to how to prevent infringement within [business name] September.
Preventing Infringement of Intellectual Property (IP) Rights in the Workplace Awareness raising to prevent infringement within [business name] September.
Security Awareness Lloyd Guyot – Steelcase Ed Jaros – Tenundra Inc. July 17, 2003.
Results compiled by Iliyana Kuneva and Daniel Gross, BGS Interns BGS 2011 Focus Group Survey One: First Impressions.
Chapter 10: Employee Communication Copyright © 2012 McGraw-Hill Companies. All Rights Reserved. McGraw-Hill/Irwin Introduction to Public Relations.
Introduction Managing time in organizations is difficult because time flows at the same rate for everyone and cannot be 'managed' like other resources.
1 Functional strategies – Human Resource Management Geoff Leese November 2006, revised July 2007, August 2009.
©Evergreen Public Schools /31/2011 Systems of Inequalities Teacher Notes Supplies: Notes: Vocabulary:
Knowledge Management at the Gordon – Staff Portal Project Presented by Deirdre Carmichael 12 September 2008.
Copyright © 2011, Elsevier Inc. All rights reserved. Chapter 7 Author: Julia Richards and R. Scott Hawley.
Is Leadership in Your Next Step?. 2 Objectives What is Development Planning? Defining Leadership and Executive Presence Is a Leadership role right for.
ObjectivesObjectives 1.A definition of the term group as used in the context of management 2.A thorough understanding of the difference between formal.
Listen UP! The Pitfalls of Failed Conversations A Workshop for the Public Risk Management Association September 12,
COM Data Dashboard Planning, Research and Institutional Effectiveness 1.
Women in Investing Network of Philadelphia LinkedIn Workshop – Your Best Profile and Why It’s So Important! Presented by:Jen Gerney Molly Linhart Date:April.
ELEMENT 3 - EMPLOYEE INVOLVEMENT 20. ____ There is a process designed to involve employees in safety and health issues. Enough can't be said about the.
David Coleman Consultant Children and Learning 21 st June 2012 Southend-on-Sea Borough Council Children & Learning Times are changing, but Apprenticeships.
Slide 1 Assessing Learning Module 25 Training Advisers.
Copyright © 1999 Harcourt Brace & Company Canada, Ltd. Chapter 8 Orientation Falkenberg, Stone, and Meltz Human Resource Management in Canada Fourth Edition.
Copyright © 2011, Elsevier Inc. All rights reserved. Chapter 1 Author: Julia Richards and R. Scott Hawley.
Welcome To Halton Youth Service. What is a C-CARD Scheme? A C-Card (Condom Card) Scheme is a coordinated free condom distribution network. It provides.
Copyright © 2016 Pearson Education, Inc Chapter 12 Maintaining Positive Employee Relations 12-2 Copyright © 2016 Pearson Education, Inc.
Evaluating teaching styles: a different approach to bench-marking zoo education? Andy Moss, Chester Zoo.
September, 2006Cuesta Multicultural Consulting1 Community Connections: The Trustee’s Role in Developing a Culturally Responsive Library New Jersey State.
VIETNAM TRAFFIC PROBLEMS HA, TUYET THUONG. In 2010, traffic accident: -11,499 dead people -30 dead people/day -25% is children.
1 Providing Feedback. Why is Feedback Important? Essential to an individuals learning process Provides the participant information about their performance.
1 Welcome Summary - First visit Delhi Integra A/S Independent consultancy company Headquarter located in Copenhagen, Denmark Working worldwide.
May 2010Your Partner for Successful Solutions 1 Cash Handling and Management Guideline # 4.1 – Cash Handling and Management
A&S Staff Survey Fall 2014 Results. 1. Competence.
Chapter 5 Transfer of Training Copyright © 2010 by the McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin.
September 2011 | Getting Started on LinkedIn Join The Largest Online Professional Social Network September
Embedding Equality and Diversity. What is Equality? Equality is ensuring that individuals have equal opportunities in order to make the most of their.
8-1 Copyright © 2013 McGraw-Hill Education (Australia) Pty Ltd Hill, Hill, Perlitz, Professional Training & Assessment, 1e C HAPTER 8 TAEASS502B Design.
Copyright ©2014 Pearson Education, Inc Chapter 16 Organizational Culture Essentials of Organizational Behavior 12e Stephen P. Robbins & Timothy A.
1 Copyright © 2013 Elsevier Inc. All rights reserved. Chapter 14.
Lesson 2: Workplace Digital Communication. Examine the use of digital communication in the workplace Evaluate application of workplace policies and code.
1 Copyright © 2010, Elsevier Inc. All rights Reserved Fig 3.1 Chapter 3.
The Intranet: Is it the primary source of information for ev3 employees? Melanie Anderson.
Major Gift Staff: Finding, Hiring, and Motivating.
© May not be reproduced without permission of Financial Ombudsman Service Ltd 1 what is “information risk” and what should we be doing about it? Christina.
SNDT Women's University Introduction to Evaluation and Assessments Presented by Kathleen (Kat) Miller, Senior Consultant with Booz Allen Hamilton 4.
Feedback to students (Formative assessment) HE in FE.
5.9 + = 10 a)3.6 b)4.1 c)5.3 Question 1: Good Answer!! Well Done!! = 10 Question 1:
1 California Preschool Learning Foundations. 2 Outcomes Increase your understanding of the California Preschool Learning Foundations, including: why they.
How To Use Google Forms to Create A Test Quick Easy Self-Graded!! Instant Reports.
Action Item Manager Creating a Culture of Accountability.
ALSTOM GRID Technical Institute Rusty Rae, Alstom Grid Technical Institute MARCOM What is it all about?
New Business Development Also called “Access” for new workplace-giving campaigns.
© 2017 SlidePlayer.com Inc. All rights reserved.