Security Training & Awareness on a Budget Presented by: Calvin Weeks, (CISSP), CISM, EnCE.

Slides:



Advertisements
Similar presentations
Philippine Cybercrime Efforts
Advertisements

S outhern A nti-Terrorist R egional T raining A cademy Col Jim Bridges.
 Jurisdiction- court and police agencies authority to process a case.
Empowering Nation by Quality Education “Empowering Nation by Quality Education” CYBER SECURITY Training For Student/Individual/Corporate.
Computer Forensics and Access Data’s Ultimate Tool Kit Presented by: Kaukab ZuberiVice Chairman KRYS Dustin HulburtSenior Trainer and Manager Acces Data.
© 2005 The Trustees of Boston College & Calvin Weeks   Slide 1 UNIVERSITY OF OKLAHOMA Effective Incident Response Teams: Two Case Studies Tuesday, April.
An initiative. Agenda The Challenge The Solution The Champions The Model City.
| University of Missouri Copyright ©2006 MOREnet and The Curators of the University of Missouri Information sharing the MOREnet way: How not.
Security and Personnel
Cyber crime impact on Businesses Bogdan Manolea RITI dot-Gov.
Mumbai Cyber Lab A Joint Endeavor of Mumbai Police and NASSCOM Mumbai Cyber Lab A Joint Endeavor of Mumbai Police and NASSCOM Dr. Pradnya Saravade Dy.
The Technology Tool Kit version 2.0 August 2014 Presenter: Deborah Watson InfraGard Houston Chapter - SIG Security Guide & Tool Development Manager.
Advantages of IT Security Prof. Uldis Sukovskis, CISA Riga Information Technology Institute Secure information exchange in Electronic media Baltic IT&T.
OPM Cybersecurity Competencies by Occupation (Technical Competencies) Information Technology Management Series Electronics Engineering.
Modernizing the FCC: Communications at the Crossroads REPORT ON MANAGEMENT ACTIVITIES.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
Cyberspace and the Police Mamoru TAKAHASHI Head of Computer Forensic Center, Hi-tech Crime Technology Division National Police Agency, Japan.
Careers in IT Farrokh Alemi, Ph.D.. Course on Project Management Credit.
Forensic and Investigative Accounting Chapter 2 Forensic Accounting Education, Institutions, and Specialties © 2007 CCH. All Rights Reserved W. Peterson.
Cape May County Technical School District Law Enforcement and Public Safety Tech-Prep Program
Technology Skills and New Career Opportunities in Policing Professor Byrne Lecture Professor Byrne Lecture September 20 th, 2012 September 20 th, 2012.
1 Oregon’s Superintendent of Public Instruction Presented to the Public Officials Compensation Commission July 23, 2008 “Every Student, Every Day – A Success”
Certification and Training Presented by Sam Jeyandran.
Project Title Name: School Class your in. What is this project about? Brief description What you want to explain about this project How this will help.
1 Partnerships Lisa Gilliss, M.Ed. Manager - Technology Assisted Learning Unit Learning & Development RCMP October, 2008.
CTTSO Overview John Morgan, Deputy Director for Science and Technology, CTTSO September 2010.
1 Emergency Preparedness Update Saddleback College Irvine Valley College Advanced Technology Education Park SOCCCD Board of Trustees Meeting 6/23/08.
Designing Real Community Partnerships That Work Maureen Rubin California State University, Northridge Innovative Educators Webinar November 4, 2009.
Maureen B. Higgins Assistant Director, Agency Support & Technical Assistance Office of Personnel Management December 8, 2010.
1 Principles of Information Technology Investigating IT Employment Opportunities Copyright © Texas Education Agency, All rights reserved. IT: Principles.
UNIT 1 – LAW ENFORCEMENT Crime and Punishment. Criminal Justice  The purpose of Criminal Justice  To control crime  To prevent crime  To provide and.
Responding to a Security Incident Maryland Security Day March 2, 2004 Joy Hughes, CIO
Introduction to Security
UAB IT Security Program Sallie Wright UAB AVP, Information Technology.
Principles of Information Technology
Training and Certification. Who needs digital forensic training and professional certification? Forensic examiners Investigators Crime scene specialists.
Law Enforcement Ideal Job. Law Enforcement 1) FBI Agent 2) Police Officer 3) U.S. Marshal 4) Forensic Scientist 5) State Trooper 6) Customs Agent 7) Secret.
CITY OF NASHUA FIRE RESCUE. ADMINISTRATION Organizational Structure –Commission –Chief –Asst. Chief –Deputy Chiefs –Specialist –Suppression.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Police Reform in Mexico: Challenges and Opportunities to Strengthen Law Enforcement at the State and Local Level Edgar Mohar September 17, 2009.
March 10, 2014 Maryland Commission for Effective Community Inclusion Of Individuals with Intellectual and Developmental Disabilities.
State Information Technology Services Division SITSD Organizational Structure.
Basic Information A canine officer is a police officer who works with a specially trained dog. After a few years of being a patrol officer an officer.
Security+ Kris Madura, MBA, PMP Network, Security Program Manager Q
The Importance of Management
National Model Scanning Tour “Communications”. The Iowa Department of Public Safety administers a trusted statewide network of servers, PCs, service.
1 Computer Auditing ( What is it, what skill set do you require & how much can you earn?) John Mitchell Academic Relations Director ISACA London Chapter.
[] FHF Management Is... A process designed to achieve an organization’s objectives by using its resources effectively & efficiently in a changing environment.
Quickly Establishing A Workable IT Security Program EDUCAUSE Mid-Atlantic Regional Conference January 10-12, 2006 Copyright Robert E. Neale This.
Law Enforcement at All Levels of Government Executive Branch of Government (Enforce Laws)
Federal Law Enforcement Agencies and the FBI LAW AND JUSTICE.
Ideal Job By: Mariana Loza. Law Enforcements FBI Agents Police Officer State Police Corrections Officer Campus Law Enforcement Deputy Sheriff Federal/Special.
Housing a Prisoner. Capital Punishment $150 to the executioner $20 for the last meal $150 for a new suit for the inmate's burial $525 for the undertaker's.
FBI Phoenix Computer Crime Squad SA Tom Liffiton 10/23/2003 Maricopa Association of Governments Telecommunications Advisory Group.
CSC4003: Computer and Information Security Professor Mark Early, M.B.A., CISSP, CISM, PMP, ITILFv3, ISO/IEC 27002, CNSS/NSA 4011.
Kerala Police Why Cocon ?  What is the purpose of holding such a Conference ?
Chapter 15: Contemporary Issues in Police Administration CJ444 seminar 9.
Public Safety 2016 Budget Presentation. Public Safety – What We Do 2016 Proposed - $12,081,886 A 2.65% increase over 2015 Budget of $11,769,953 The Summit.
FSU COLLEGE OF COMMUNICATION AND INFORMATION Information Technology Information, Communication, & Technology.
DART Technology Nicole Fontayne-Bardowell, MPA Vice President & CIO
Technology Skills and New Career Opportunities in Policing
Lesson # 1 A Practical Guide to Computer Forensics Investigations
CISSP TRAINING IN.
Law Enforcement Report Writing
I have many checklists: how do I get started with cyber security?
North Port Police Department Organizational Chart
CE-Notes Law Enforcement
LO1 - Know about aspects of cyber security
Cyber Crime June 21, :30am – 2:30pm Virginia Cyber Alliance
Presentation transcript:

Security Training & Awareness on a Budget Presented by: Calvin Weeks, (CISSP), CISM, EnCE

Calvin Weeks CertificationsCertified Information System Manager (CISM) Certified Information System Security Professional (CISSP) EnCase Certified Forensic Examiner (EnCE) Certified Police Officer VP of High Tech Computer Investigators Association (HTCIA) 20+ years computer and communication technology Past 10 years in computer, network, and electronic media security 14+ years involvement in Law Enforcement, Investigations, and Security and currently hold a commission as a Reserve Deputy Sheriff with the Oklahoma County Sheriff's Office. Held top secret position in the Federal Government, securing top secret information. Specialize in computer forensics, securing web solutions, servers, PC's, networks, applications, and databases both at the physical level and the electronic level.

Summary Why? The T3 (Train The Trainer) Program Lessons Learned Organizational Partnership

Why? Major Security Incidents Budget Reductions Hiring Freezes Best Practice

SECURITY AWARENESS TRAINING EDUCATION

T3 – Train The Trainer Training, Education, and Awareness Courses are Short No Charge for Classes Courses cover Non-Technical, Technical, and Management.

Lessons Learned Training & Education Raise Security Awareness Raise Security Standards Raise Technical Expertise Standards Recognition of Achievements Conduit for Sharing Leading Edge Technology

Organizations Partnerships Academics Oklahoma State University Law Enforcement (FBI, OSBI, OUPD) Associations (HTCIA, ISACA, InfraGard)

Review Why We Need This Training Best Practice T3 – Train The Trainer What the Results Were Partnership Opportunities

Questions?