The new personal computer….. The simple cell phone is a relic Laptops replace desktops personal use / business use
Implications…… The Public will expect more services from government online Management of end-user devices is an accelerating challenge. – Support – Cost – Security (information and device) Clear polices on the use of personal devices for business Proper selection of resources – Desktop vs laptop Expected Life Participate in planning future of Public Safety spectrum
Surfing – and everything else computer related – will open
Implications…… Realize program and data may reside anywhere in the world Web 2.0 applications Skills needed in Internet application development and interactive user interface Collaboration – the network indispensible Be careful choosing applications – must be able to integrate – standards Be aware of formats
IT Job Skills for 2008 What’s hot Project management skills and certifications Security experience Business process understanding Communication skills, especially writing and teaching expertise The ability to manage remote workers and virtual teams What’s not Software development and programming Quality assurance Technical certifications http://www.networkworld.com/etm/2007/122007-etm-jobs-matter.html Skills in highest demand VoIP Unified Communications Convergence Virtualization Security
12 IT Skill That Employers Can’t Say No To Machine learning Mobilizing applications Wireless networking Human-computer interface Project management General networking skills Network convergence Open-source programming Business intelligence systems Embedded security Digital home technology integration.Net, C #, C++, Java – with an edge http://www.networkworld.com/news/2007/071107-12-it-skills-that-employers.html?page=1
Attack Trends from 2007 Attacks today are often aimed at a smaller target – with the goal of monetary gain. Increased professionalization and commercialization of malicious activities Threats are increasingly tailored for specific regions. Increase in multi staged attacks. Attackers targeting victims by first exploiting trusted entities. Attackers are rapidly adapting new techniques aimed at circumventing the constant improvements in protection. The effort to find and fight these malicious techniques and strategies must also evolve. www.symantec.com/ISTR2007
Government Attack Trends from 2007 Government accounted for 26 percent of data breaches that could lead to identity theft. Of the potential infections by the top 50 malicious code samples, 65 percent were threats to confidential information. The primary cause of data breaches that could lead to identity theft was the theft or loss of a computer or other medium used for data storage or transmitting, such as a USB key. Hacking was responsible for 73 percent of identities exposed during the period. 36% of the top attacks were SMTP-based. 46% of malicious code that propagated did so in email attachments www.symantec.com/ISTR2007
Adaptive Security More than the endpoints Decisions everywhere Virtual environments
Implications…… Government records are a big source of identity threat and we must recognize that fact. Good policies and procedures are needed for all devices. Mobile devices offer additional security challenges. Mobile devices require special security training. Training in security practices needs to be ongoing. Security practices will at times be a burden but users must understand the importance.
Going Green Energy Efficient machines Machine disposal Consolidation of equipment using VM ON/OFF Switch Think before you print Archiving solutions Be honest: This is more about cutting cost than saving the planet
What really matters….. Networks matter – Metcalfe’s Law Security matters Technology advances matter Consumers really matter Sense of purpose
Big Sellers from the Future Pharma Fruit http://money.cnn.com/2006/06/08/technology/business2_bigsellers/index.htm
Big Sellers from the Future http://money.cnn.com/2006/06/08/technology/business2_bigsellers/index.htm RFID Blocker
Big Sellers from the Future http://money.cnn.com/2006/06/08/technology/business2_bigsellers/index.htm Glacier Water
Big Sellers from the Future http://money.cnn.com/2006/06/08/technology/business2_bigsellers/index.htm Reputation Accounts
Big Sellers from the Future http://money.cnn.com/2006/06/08/technology/business2_bigsellers/index.htm Social Network Movie Tickets
Tagged and Shared BoingBoing http://www.boingboing.net/http://www.boingboing.net/ Catawba County http://www.catawbacountync.gov/http://www.catawbacountync.gov/ Symantec Government Internet Security Threat Report www.symantec.com/ISTR2007 www.symantec.com/ISTR2007 The Economist http://www.economist.com/science/displaystory.cfm?story_id=104 10912 http://www.economist.com/science/displaystory.cfm?story_id=104 10912 Facebook http://www.facebook.com/http://www.facebook.com/ Flickr http://flickr.com/http://flickr.com/ My Space http://www.myspace.com/http://www.myspace.com/ YouTube http://youtube.com/http://youtube.com/ Catawba County does not promote, endorse and is not responsible for content on any of the sites or materials referenced on this page. References are for informational purposes only and the appropriateness is the sole responsibility of the individual viewing.
Research IP Surveillance: Prepare for New Demands on Network Operations, Info-Tech Advisor: Research Note, Published: January 08, 2008 2008: Leveraging the Valuable, Rejecting the Hype, Info-Tech Advisor: Catawba County does not promote, endorse and is not responsible for content on any of the sites or materials referenced on this page. References are for informational purposes only and the appropriateness is the sole responsibility of the individual viewing.