We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byHailey Gutierrez
Modified over 2 years ago
Information Security Awareness Copyright © 2011 IsecT Ltd. September 2011 Management seminar Building our security culture
Information Security Awareness Copyright © 2011 IsecT Ltd. 2 Introduction
Information Security Awareness Copyright © 2011 IsecT Ltd. 3 What do we want?
Information Security Awareness Copyright © 2011 IsecT Ltd. 4 But we already have a security culture
Information Security Awareness Copyright © 2011 IsecT Ltd. 5 Would you spot a fake like this?
Information Security Awareness Copyright © 2011 IsecT Ltd. 6 Linkedin Handles sensitive medical data College 8 colleagues to exploit Too easy! 25m more targets! Job title
Information Security Awareness Copyright © 2011 IsecT Ltd. 7 OK, so how do we get it? If you accept that a security culture is indeed a valuable goal, what would you suggest we do to establish or improve ours?
Information Security Awareness Copyright © 2011 IsecT Ltd. 8 How do we get a security culture?
Information Security Awareness Copyright © 2011 IsecT Ltd. 9 How do we know when we have it?
Information Security Awareness Copyright © 2011 IsecT Ltd. 10 Summary
Information Security Awareness Copyright © 2011 IsecT Ltd. 11 Management action plan 1.Check the security policies & procedures 2.Lead by example: demonstrate secure behaviors, place a value on security 3.Identify and reward secure behaviors 4.Encourage open discussion about security matters – talk it up a bit 5.Reap the benefits of a security culture
Information Security Awareness Copyright © 2011 IsecT Ltd. 12 Further information Information Security Policy Manual and other security awareness materials CIO or Information Security Manager Browse the intranet Security Zone Managing the Human Factor in Information Security by David Lacey and Spies Among Us by Ira Winkler Google for more!
Copyright © 2011 IsecT Ltd. Securing people Security awareness seminar for IT professionals Information Security Awareness September 2011.
Copyright © 2011 IsecT Ltd. Social engineering Spot it and stop it September 2011 Security awareness seminar.
Practice Led Commissioning A Timetable for Action Wendy Evans NHS Alliance Practice Manager Lead.
Investors in People Pre IiP Check Briefing Human Resources & Organisational Development.
1 of 19 Organization and Management New Approaches to motivating Staff IMARK Investing in Information for Development Organization and Management New Approaches.
How to Convert CPRs into AF Introductions The Hows and Whys.
How To Use OPAC 1. How To Find Books? 2 What is OPAC? 3.
. © 2003 Ownership Associates Home Standard Deal How it works Three Pieces Return on Effort The Deals Summary New Deal < Go.
Working Together Helen Haw 23 November Talk with you about a plan about how Adult Social Services will ensure it involves people who use services.
PACE-EH Action Planning Beth Siddens, Health Planner Barren River District Health Department Bowling Green, Kentucky ,
Case Management for Performance 9/25/13 “Getting It Right” Jerry Kolker.
Presented by the United Student Council. What’s the Problem With Uniforms? There is no way to ensure that EVERYONE will like the same uniform. People.
ALL ABOUT ARRAYS Finding Multiplication Combinations and Factors using arrays By: T. Logue.
Presented by: Ray McNulty and Joe Shannon Its Time to Lead.
Setting Effective Goals and Making the Most of Your Time Chapter 3.
1 of 16 Evaluating an Information Project Building Consensus © FAO 2005 IMARK Investing in Information for Development Evaluating an Information Project.
R IGHT P LACE, R IGHT T IME Genesis 2:20-25, Hebrews 13:4, Song of Solomon 2:7.
Selling Yourself: How to stand out from the crowd NIHR Trainee Conference Isabelle Read 20 th September 2011.
A centre of expertise in digital information managementwww.ukoln.ac.uk Introduction To Facebook: Opportunities and Challenges For The Institution Brian.
September 2011 | Finding digital customers and selling digital printing Finding digital print customers September
HASCAS: Dignity through Action DIGNITY THROUGH ACTION WORKSHOP PART 3 The Dignity Challenges.
FEEDBACK Krista M. Johnson, MD. Overview Definition Examples of feedback Characteristics of effective feedback Skill practice.
Welcome to Marketing Strategy 626 How to use our blog: 1 You might already be an experienced blogger. Please read this anyway to learn more about our blog.
Collecting Information about the Problem. Why should you collect information? Knowledge: Reality talks Credibility counts Awareness leads to change.
SMART GOALS The First Step Toward Improvement Dr. Anne Zeman, Director Curriculum and Professional Learning September 22, 2011.
Copyright SIEP B.V.. Making Change Last WHAT: A tool for managing and supporting the process of organisational change WHY: To ensure the success of safety.
1 PRESENTATION TITLE 1 The Streetwise Security Zone Presents Turning Swiss Cheese Into Hard Candy Scott Wright The Streetwise Security Coach
Preventing Infringement of Intellectual Property (IP) Rights in the Workplace Awareness raising to how to prevent infringement within [business name] September.
1 of 14 Information Access Management Interventions © FAO 2005 IMARK Investing in Information for Development Information Access Management Interventions.
BTEC Level 2 Reviewing a Sports Activity Session.
© 2016 SlidePlayer.com Inc. All rights reserved.