Welcome to New Hire Orientation Information Security

Slides:



Advertisements
Similar presentations
Internet Safety and Cyber Bullying All info came from
Advertisements

Copyright © 2012, Big I Advantage®, Inc., and Swiss Re Corporate Solutions. All rights reserved. (Ed. 08/12 -1) E&O RISK MANAGEMENT: MEETING THE CHALLENGE.
K eep I t C onfidential Prepared by: Security Architecture Collaboration Team.
Chapter 1 We’ve Got Problems…. Four Horsemen  … of the electronic apocalypse  Spam --- unsolicited bulk o Over 70% of traffic  Bugs ---
Privacy and Information Security Training ( ) VUMC Privacy Website
Health Insurance Portability and Accountability Act HIPAA Education for Volunteers and Students.
HIPAA. What Why Who How When What Is HIPAA? Health Insurance Portability & Accountability Act of 1996.
National Health Information Privacy and Security Week Understanding the HIPAA Privacy and Security Rule.
WORKFORCE CONFIDENTIALITY HIPAA Reminders. HIPAA 101 The Health Insurance Portability and Accountability Act (HIPAA) protects patient privacy. HIPAA is.
NAU HIPAA Awareness Training
Welcome to Our Emergency Department Some reminders about Patient Confidentiality and Trust.
Professional Nursing Services.  Privacy and Security Training explains:  The requirements of the federal HIPAA/HITEC regulations, state privacy laws.
Health information security & compliance
Kelly Corning Julie Sharp.  Human-based techniques: impersonation  Computer-based techniques: malware and scams.
AmadeusCybersecurity: the essentials12 th November 2014 Alex van Someren Family Office Forum 12 th November 2014, Zurich Cybersecurity: the essentials.
Information Security Awareness Training
The Most Critical Risk Control: Human Behavior Lynn Goodendorf Director, Information Security Atlanta ISACA Chapter Meeting June 20, 2014.
Information Security Awareness April 13, Motivation Recent federal and state regulations and guidance Recent federal and state regulations and guidance.
Guide to Massachusetts Data Privacy Laws & Steps you can take towards Compliance.
Local Company Est Employees. Ex Police. Crime Prevention. CID & Drug Squad. Special Branch. Extensive Training & Experience in Preventing & Detecting.
Acceptable Use By: Keith R. Watson CoC Information Security Manager.
DHS SECURITY INCIDENT REPORTING AND RESPONSE SECURITY INCIDENT REPORTING AND RESPONSE DHS managers, employees, and other authorized information users.
Data Classification & Privacy Inventory Workshop
The Changing Face of Endpoint Security K Varadarajan Regional Manager, Enterprise Sales, Symantec Security Conference 2010_Bangalore.
Insights on the Legal Landscape for Data Privacy in Higher Education Rodney Petersen, J.D. Government Relations Officer and Security Task Force Coordinator.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
HIPAA What’s Said Here – Stays Here…. WHAT IS HIPAA  Health Insurance Portability and Accountability Act  Purpose is to protect clients (patients)
OU INFORMATION SECURITY & RISK MANAGEMENT ISA – February 4, 2015.
Session 3 – Information Security Policies
Citadel Security Software Presents Are you Vulnerable? Bill Diamond Senior Security Engineer
Information Security Information Technology and Computing Services Information Technology and Computing Services
DUSDStudent Bullying Presentation Grades What is Bullying? No student or group of students shall, through physical, written, verbal, or other means,
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
© 2009 IDBI Intech, Inc. All rights reserved.IDBI Intech Confidential 1 Information (Data) Security & Risk Mitigation.
“ Technology Working For People” Intro to HIPAA and Small Practice Implementation.
FIVE STEPS TO REDUCE THE RISK OF CYBERCRIME TO YOUR BUSINESS.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
Privacy & Security Policy Meets Technology at the Crossroads: Best Practice Methods & Approaches to Developing Organizational Frameworks to Avoid Collision.
Working with Health IT Systems Protecting Privacy, Security, and Confidentiality in HIT Systems Lecture a This material (Comp7_Unit7a) was developed by.
Understanding HIPAA (Health Insurandce Portability and Accountability Act)
Eliza de Guzman HTM 520 Health Information Exchange.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Managing your Institution-Specific HIPAA Compliance Policies and Procedures Cutting Edge Issues Thursday, December 13, 2007.
Information Security General Awareness Training Module 1 – Introduction For The UF HSC Workforce.
CYBER INTERACTION & COLLABORATION MODULE 4. LEARNING OUTCOMES By the end of this module, you should be able to: 1.Identify current digital tools for communication.
Today we are teaching the Millennial Generation!!!!
Data Security & Privacy: Fundamental Risk Mitigation Tactics 360° of IT Compliance Anthony Perkins, Shareholder Business Law Practice Group Data Security.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
FERPA & Data Security:FERPA & Data Security: Passwords and Authenticators.
NOT PROTECTIVELY MARKED The Cybercrime Problem What is cybercrime? What is the problem and how big is it? How you can protect yourself. T/DCI Tim Bower.
Reach us at Call: | Visit:
Properly Safeguarding Personally Identifiable Information (PII) Ticket Program Manager (TPM) Social Security’s Ticket to Work Program.
Surveillance and Security Systems Cyber Security Integration.
HIPAA PRIVACY & SECURITY TRAINING
October 27, 2016 Main Line Association for Continuing Education
Information Security Program
E&O Risk Management: Meeting the Challenge of Change
Privacy Education Session CMHA-WECB/CCHC Volunteers/Students
Compliance with hardening standards
Cyber Protections: First Step, Risk Assessment
Cybersecurity Awareness
Join In Be Secure Presentation
Network Security Best Practices
Steppa Cyber Security Training Tips Your Business Was Seeking For With Cyber Security Training!
Security week 1 Introductions Class website Syllabus review
Premier Employee Program Version 4.0
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
“Workplace Behaviour: Activating your greatest security asset”
School of Medicine Orientation Information Security Training
Presentation transcript:

Welcome to New Hire Orientation Information Security

Information Security Awareness Training Welcome Why is this important… Identity theft is the #1 fastest growing crime in the (world) Many of us has (direct or indirect) access to sensitive data. Custodians, data entry people, call center employees, HR, IT, Healthcare. UMMS Information Security CWM Office of Compliance & Review

What is Information Security? Info Sec is the protection of data in all forms Electronic files Static files Database files Paper documents Printed materials Hand written notes Photographs Recordings Video recordings Audio recordings Conversations Telephone Cell phone Face to face Messages Email Fax Video Instant messages Paper messages Whether or not an employee uses a computer in their job, We must consider that sensitive data can be found in many forms -Above List- Papers printed and left on the train Face-to-face conversations, FAX, telephone calls… Visible computer monitors with sensitive data can cause a reportable breach, and worse – the school may not even know it happened, much less – respond to it.

Why is this Important? A data breach could result in: Requirement to report the loss HIPAA, FERPA, MGL c.93H, PCI, SOX, others Civil and criminal penalties Damage to organizational reputation Loss of revenue Individual accountability Potential impacts of breach HIPAA fee structure $50k per record up to $1.5M $10k per record up to $250k for repeat violations $100 per record up to $25k for repeat violations Criminal, Civil fines, Organizational reputation, Lost revenue (unlike TJX), Individual accountability

Isn’t this just a technical problem? Technology defenses comprise roughly 15% of our controls Technical controls often cannot compensate for user’s behavior Cyber-criminals focus on users as a weak link in security Having a security-aware workforce is a requirement in today’s threat landscape Technology continues to keep out most “legacy” threats, (viruses, etc.) and many new ones. Users who click on SPAM eMail or who visit infected web sites invite malware inside our network perimeter Getting users to click on the “bad things” is the focus of cyber criminals. These are organized criminal syndicates. Knowing not to click on XYZ is today’s best defense.

What are the risks? Evolving “Threat Landscape” Older attacks targeted infrastructure Modern attacks target users Nature of threat landscape Over 90% of Cyber thieves are affiliated with organized crime Their sophistication rivals those of commercial software vendors Methods of infection Cyber thieves attack high-volume web sites Computers that visit the site become infected Email-borne ‘malware’ Infected machine “phones home” to say I’m infected Use the infected computer to strengthen their hold on the organization “Attacks” used to consist of mostly harmless, but annoying website defacements and viruses. These attacks were obvious and relatively unsophisticated. Today’s attacks are quiet, below the radar, and impactful. 90% are perpetrated by organized crime, and cross multiple international jurisdictions, typically those that do not have good diplomatic relations. Methods of infection: “Poisoned web site”, Email borne “badness”, each gives the attackers a ‘toe-hold’ on the target. Amateurs target systems, Professionals target users --Kevin Mitnick

What can I do? Become aware of cyber threats Understand that YOU are often the front line of defense against cyber threats Understand data sensitivity and how to manage data appropriately Safeguard information that is entrusted to you Report suspected InfoSec incidents Develop awareness of these problems Understand that YOUR computer habits can either invite or discourage “badness” Understand the sensitivity of data that is entrusted to you, and know how to handle it. Report suspected incidents…

Security Resources On-line security awareness course: http://onlinetraining.umassmed.edu/infosecreg/event/event_info.html UMMS IS Help Desk 508-856-8643 CWM Office of Compliance and Review 508-856-6547 Security Resources Awareness Course (UMMS)