Why Privacy & Security Awareness Training?. Why is privacy & security awareness training required?

Slides:



Advertisements
Similar presentations
CISSP Seeks CIPP Object: Mutual Compliance Marriage of Privacy and Security Professionals Under HIPAA David B. Nelson, CISSP Yolo County Woodland, California.
Advertisements

Darton College Information Systems Use Policies. Introduction Dartons Information Systems are critical resources. The Information Systems Use Policies.
Evolution of Data Use and Stewardship Recent University-wide Data Stewardship Enhancements Integrated System Data Stewardship Shirley C. Payne, CISSP,
Information Technology Awareness Wayne Donald IT Security Officer.
Red Flags Rule BAS Forum August 18, What is the Red Flags Rule? Requires implementation of a written Identity Theft Prevention Program designed.
Government Information Assurance (GIA) Policy. 2 Current Scenario  It is a connected world!  More and More services are being provided online  Continuous.
Invasion of Smart Phones in Clinical Areas Chrissy Kyak Privacy Officer University of Maryland Upper Chesapeake Health.
Springfield Technical Community College Security Awareness Training.
Internet Safety James Fuller Internet Rules To Remember When asked by friends or strangers, online or offline, never share Account IDs and Passwords.
SL21 Information Security Board Mission, Goals and Guiding Principles.
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
Part 2 of Evil Lurking in Websites Data Security at the University of Wisconsin Oshkosh.
McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Chapter 8 Threats and Safeguards Chapter 8 PROTECTING PEOPLE AND INFORMATION Threats.
Data Security At Cornell Steve Schuster. Questions I’d like to Answer ► Why do we care about data security? ► What are our biggest challenges at Cornell?
9 99 CHAPTER Privacy and Security - FAQ’s. 9 © The McGraw-Hill Companies, Inc Privacy How secure is data –On system –On Internet Private network.
Fundamentals of Information Systems, Second Edition 1 Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter 9.
Session 3 – Information Security Policies
Comptroller of the Currency Administrator of National Banks E- Security Risk Mitigation: A Supervisor’s Perspective Global Dialogue World Bank Group September.
ICT School Policies 6 th November Suggested Policies for Schools Not always a requirement, but useful to cover you, your school and the students.
HIPAA Privacy & Security EVMS Health Services 2004 Training.
TRACs Security Awareness FY2009 Office of Information Technology Security 1.
Security Awareness Norfolk State University Policies.
Information Security Technological Security Implementation and Privacy Protection.
Slide 1 City of Seattle 8 October 2004 Nine Tough Questions Bill Schrier, CTO, City of Seattle Nine Tough Questions Mayors Should Ask Their Geeks For Mayors’
CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate.
Kholoud AlSafadi Ethical Issues in Information Systems and the Internet.
Copyright 2009 Trend Micro Inc. Classification 9/9/ Corporate End User Study Employee Online Behavior.
ISMS for Mobile Devices Page 1 ISO/IEC Information Security Management System (ISMS) for Mobile Devices Why apply ISMS to Mobile Devices? Overview.
Information Security and YOU!. Information Assurance Outreach Information Security Online Security Remote Access with Demonstration The Cloud Social.
Privacy and Security of Protected Health Information NorthPoint Health & Wellness Center 2011.
Security Aspects of Web Site Design Office of Enterprise Security (What we look for in web applications and Why)
IT Security Essentials Lesley A. Bidwell, IT Security Administrator.
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
Review 2 Chapters 7, 8, 9. 2  Define a network and its purpose.  Explain how communications technologies are used in our every day lives.  Understand.
In the Crossfire International Cooperation and Computer Crime Stewart Baker.
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
8/2: Managing IT: Security & Ethics Security: Controls –Information Systems controls Input, processing (hardware, software), output, storage –Facility.
CAN I GET IN TROUBLE USING A... COMPUTER? Or do computers solve all of life’s problems?
Joel Rosenblatt Director, Computer and Network Security September 10, 2013.
Desktop Security: Making Sure Your Office Environment is Secure.
Last Minute Security Compliance - Tips for Those Just Starting 10 th National HIPAA Summit April 7, 2005 Chris Apgar, CISSP – President Apgar &
Chap1: Is there a Security Problem in Computing?.
Enterprise Cybersecurity Strategy
Security Awareness – Essential Part of Security Management Ilze Murane.
IT Security in Nepal: Issues and challenges Rajan R. Pant ITSERT-NP.
Security and Ethics Safeguards and Codes of Conduct.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
MIS323 – Business Telecommunications Chapter 10 Security.
An Overview of Legislation and Board Policy. Federal Legislation (CIPA, COPPA) WCPSS Board of Education ◦ Policy 2313, 3013, and 4013 Federally Mandated.
Education – Partnership – Solutions Information Security Office of Budget and Finance Christopher Giles Governance Risk Compliance Specialist The Internet.
Computer Security Mike Asoodeh & Ray Dejean Office of Technology Southeastern Louisiana University.
Montgomery College Acceptable Use Policy (AUP). 2 This Acceptable Use Policy (AUP) PowerPoint presentation was developed by the Office of the Information.
Information Technology Acceptable Use An Overview CSTMC All Staff Meeting February 10, 2014.
Contingency Management Indiana University of Pennsylvania John P. Draganosky.
THE OFFICE OF THE LEGAL SERVICES COMMISSIONER The Ethics of Cloud Computing Community Legal Centres 21 May 2013.
Building Our IT Security Lines of Defense Working together to protect Government’s IT systems.
Privacy and Security Challenge Just Browsing Keep out - Private! Pushing IT You sound like a broken record Legal Beagles
Technology and Business Continuity
Information Technology Acceptable Use An Overview
Information Security Program
Add video notes to lecture
East Carolina University
Louisiana State University
Responding to Intrusions
Teaching Internet Safety
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Red Flags Rule An Introduction County College of Morris
Support and requirements for Research and Innovation
Presentation transcript:

Why Privacy & Security Awareness Training?

Why is privacy & security awareness training required?

Changing Threat Landscape Then Amateur hackers Web site defacement Viruses Infrequent attacks Now Organized crime SQL Injections Identity theft Constant threat + Amateur hackers Web site defacement Viruses

Why is privacy & security awareness training required? Threats to data, systems, and networks are increasing. Attacks are more sophisticated. Technology can’t do the job alone. National Association of State Chief Information Officers and other leading organizations have said this is a high priority.

Why is privacy & security awareness training required? Louisiana public servants have a responsibility to safeguard data and other IT resources. OIT policies require it. 

What are my responsibilities? Be privacy & security minded.  Privacy & security considerations are necessities, not burdens.  Consider the impact your actions could have on the security of data and other IT resources.

What are my responsibilities? Be willing to learn.  Understand the privacy and security requirements of the networks, systems, devices, and data that are part of your job.  Know what data you have.  Know with whom you are communicating.  Question Question Question “Do we need this data for a business function?” “Should I have access to this data?” “Should I share this data with others?”

What are my responsibilities? Be proactive.  Adopt good privacy and security practices at work and at home.  Report unusual events.

What are my responsibilities? Seek help and advice.  Become familiar with the policies, procedures, and standards that apply to your work environment.  When in doubt, ask!

How do I know what to do? Federal & state law University Policies University Procedures University Work Rules Procedures or standards specific to a program or deapartment Your team lead, supervisor, or manager Security Officer or Data Privacy Point of Contact

Where can I get information? Michael Graham Chief Information Technology Officer 

Where do I start? IT Best Practices  Acceptable Use  Password-PIN  Mobile Computing  Data Classification  Security Education and Awareness  Incident Response  And more

Where do I start? Special Areas of Concern  Sensitive data   Portable computing devices  Storage media – electronic and non-electronic  Internet & Usage  Physical security  Exit procedures  Incident response

Remember Privacy & Security are everybody’s business!

Questions???