Presentation is loading. Please wait.

Presentation is loading. Please wait.

IT GOVERNANCE COMMITTEE MEETING May 15, 2008 Tidbits of Information.

Similar presentations


Presentation on theme: "IT GOVERNANCE COMMITTEE MEETING May 15, 2008 Tidbits of Information."— Presentation transcript:

1 IT GOVERNANCE COMMITTEE MEETING May 15, 2008 Tidbits of Information

2 WHO IS PROVIDING WIRELESS COVERAGE FOR THE OLYMPICS? Beijing Metro Chooses Andrew for Wireless Coverage In Advance of Olympics CommScope

3 700 MHz Channels 52 to 69 Reserve Bid $4.6 Billion Bidders: AT&T, Google, and Verizon “open access” Public Safety Access Verizon $4.7 Billion

4 G Phone Open Handset Alliance ??? Core Business

5 Linux Vista “open applications”

6

7 7

8 Tidbits that make you think or sweat! The cost of a GigaByte of storage in 2007 was $.50. It costs less to store 50 pages of printed text than the paperclip to hold them together. In two to three years the iPod could have the capacity to store every song ever recorded. 281 exabytes of information was created in 2007, that is 48 GB for every person across the globe. The cost of a transistor today is.000001 cent.

9 Tidbits that make you think or sweat! RFID chips are the size of a grain of salt. Technology exists in the Research Triangle to detect a tumor the size of that grain of salt. The US is 14 th in the world in average broadband speed and 26 th in coverage. Approximately 1/3 of Catawba County citizens do not have affordable broadband coverage.

10 Tidbits that make you think or sweat! And what if they detect the tumor? It would take years at today’s broadband speeds in the US to send the image to your doctor.

11

12 IT GOVERNANCE COMMITTEE MEETING May 15, 2008 Information Security

13 26% Percent of identity theft attributed to government.

14 A laptop containing thousands of people's personal information is missing in Cabarrus County They don’t know if it was stolen or destroyed in traffic contains names, address, phone numbers and social security numbers of approximately 28,000 people

15 The identity theft risk from a stolen Wake County EMS laptop is far worse than originally estimated 5,000 people whose personal information -- including Social Security numbers, addresses and ages -- included personal information of more than 3,400 EMS and firefighters from across the county Wake EMS officials waited eight days to officially report the loss to WakeMed police

16 $350 Average cost of clean up per account. Does not include onsite resources.

17 10% Number of Public Access Points that are not really Public Access Points

18 USB One of the two biggest sources.

19 1 Number of incidences reported to CC.

20

21 $ $ $ $ $ $ $ FINANCIALLY MOTIVATED No more glory in hacking, undetected, thief in the night ……………..

22

23 ISSUES MOVING TO THE FOREFRONT ISSUES. ISSUES. ISSUES. ISSUES.

24 The new personal computer….. The simple cell phone is a relic Laptops replace desktops personal use / business use

25 No Well Defined Slots Work is an Activity, Not a Place Old Rules Become Unrealistic Trusting People

26

27 What is attached to the network? What is the employee really doing? Programs? Stored Data?

28 Mobile Computer Equipment Policy Not enough but helpful.

29 ? ? ? What about your service providers?........ Insurance/benefits……… Are they carrying your employees around on a laptop?...

30 ? ? ? Where’s the data?........ BRIC….. What about something as simple as Anti-Virus software?........ Is it up-to- date?

31 Exercise/Discussion Do you work with an application vendor? Does this vendor have access to your system? Does the vendor abide by strict security practices? Where is your data stored? Who has access to it?

32 Shut down accounts Email Network Access Phone System Secure equipment Secure data stored on remote/mobile equipment Make sure public record files are obtained Signed statement that all data has been returned Termination……

33 Self Organizing Groups 4 groups One person with laptop Same size (within 1) Equal area representation Pick a spot and setup a work area

34 Groups Employees Citizens Vendors Crooks

35 Information Leakage Employee What could you do or fail to do to cause information theft? Remember, you represent all employees. Citizen What could you do to cause your information to be exposed? You represent the public. Vendor How could you be putting employee’s and the public’s data at risk? You represent all vendors we do business with, large and small. Crook How might you steal information from the county? Okay, you know who you represent.

36 ? ? ? ? ? ? ? WHAT CAN WE DO TO PROTECT THE PUBLIC’S DATA AND EMPLOYEE DATA? ???????????????????????????????????……………..

37 IT NEXT MEETING – JUNE 19TH Meeting Time: 1:30 – 3:30


Download ppt "IT GOVERNANCE COMMITTEE MEETING May 15, 2008 Tidbits of Information."

Similar presentations


Ads by Google