IT Security vs Office Administration Efficiency Office Administration Efficiency Date: 27.11.2015 João Stott.

Slides:



Advertisements
Similar presentations
Govern the Flow of Data: Moving from Chaos to Control
Advertisements

Data Encryption Data In Transit / Data At Rest. Learning Outcomes How to: – encrypt data on an USB key – encrypt a document – a document safely.
Financial Services Workshop Margaret Umphrey ECU Information Security Officer March 12, IT Security, East Carolina University.
Ethics, Privacy and Information Security
Security, Privacy and the Cloud Connecticut Community Providers’ Association June 20, 2014 Steven R Bulmer, VP of Professional Services.
Data Encryption Data In Transit / Data At Rest. Learning Outcomes How to: – encrypt data on an USB key – encrypt a document – a document safely.
IEEE Computer Society Name Title, IEEE Computer Society The community for technology leaders.
Technology How Can You Use Technology Better. Intro - I am a technology expert I am a boss I have an EA.
All rights reserved © 2005, Alcatel Risk Awareness in Enterprise IT Processes and Networks  Dr. Stephan Rupp.
Barracuda Backup Service Data Backup and Disaster Recovery.
Chapter 15: Managing Information and Technology 1.Data Versus Information 2.Managing Data 3.Types of Information Systems 4.Computer Networks 5.Data Communication.
Finalize RESTful Application Programming Interface (API) Security Recommendations Transport & Security Standards Workgroup January 28, 2014.
Office 365 – Our Journey Madhavan GG,
WINGNUT TECHNOLOGIES CUSTOM ENGINEERING SOLUTIONS.
Barracuda Networks Confidential1 Barracuda Backup Service Integrated Local & Offsite Data Backup.
Managing BYOD Legal IT’s Next Great Challenge. Agenda  The BYOD Trend – benefits and risks  Best practices for managing mobile device usage  Overview.
Technology Moves: See How Technology is Changing the Way We Move.
The Growing Role of E- commerce & Cloud Applications Oregon Small Business Development Center Network Oregon Connections Conference October 24, 2013 Presented.
Treasury in the Cloud Bob Stark – Vice President, Strategy September 17, 2014.
© 2011 IBM Corporation Smarter Software for a Smarter Planet The Capabilities of IBM Software Borislav Borissov SWG Manager, IBM.
CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate.
Information Security and YOU!. Information Assurance Outreach Information Security Online Security Remote Access with Demonstration The Cloud Social.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
{ Active Directory Security Why bother?.   Law #1: Nobody believes anything bad can happen to them, until it does   Law #2: Security only works if.
GOOGLE APPS IN SCHOOLS. Overview Google apps addresses all of a school’s communication and collaboration needs. – , calendaring, document creation.
Video Communication Market Trends Rafi Anuar Director, Product Management.
Student Service Delivery Project (Flinders Connect Project) (Student Experience Project) (CRM Project) Office of Pro Vice Chancellor (Information Services)
STARTFINISH DisposePrint & ScanShareStore Protect information and equipment ClassifyProtect.
Careers in Information Technology Milton Ramer & Courtney Lisenbee.
ITS ePrimer Module 14: Emerging Opportunities and Challenges September 2013 Intelligent Transportation Systems Joint Program Office Research and Innovative.
IT Internal Audit “Hot Topics” April 2011 Agenda Survey Overview Survey Results IT Internal Audit Hot Topics Overview – Social Media and Social Networking.
Creating the Connected Campus OUCC Conference June 3 rd, 2015.
Emerging Security Trends & Technologies Presented by Santhosh Koratt Head Consulting & Compliance SecureSynergy Pvt.Ltd.
Information Systems Security New Faculty Orientation Day Queen’s University August 2011 George Farah, GIAC/GSEC Gold, CRISC, CISA University Information.
Using Technology to Enable Smarter Working. Agenda Advances in GIS mapping Interactive websites QR Codes Mobile optimised websites Apps NFC Technology.
TRUENORTH TECHNOLOGY POLICIES OVERVIEW. This includes but is not limited to : – Games – Non-work related software – Streaming media applications – Mobile.
Written by: Saiprasad Setty Milton Ramer Courtney Lisenbee Presented by: _______________.
Cybersecurity Test Review Introduction to Digital Technology.
Enw / Name. What is a on-line / paper based data capture form Can you give an example where each are used? Automated data capture systems are used around.
BizSmart Lunch & Learn Webinar Information Security and Protecting your business With the increased risk of some sort of cyber- attack over the past few.
Team Spirit Company: LifeApps sp. z o.o. LIFE APPS LifeApps Sp. z o.o. is a mobile software development company focus on SAP technology. We have been.
What’s the importance of technical support in business? Technical Support Services is an attempt to provide the users of technology assistance with specific.
Internet of Things, Are You Ready?. Contents ●Introduction ●IoT Examples? ●IoT Benefits ○For Industries ○The Internet of Things In Organizations ○The.
IMOBDEV Technologies to exhibit their modern IT CeBIT 2016.
NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholder to insert your own image. CLOUD.
Digital Identity and My Data as Business Enablers 1 My Pekka Turpeinen, Business Architect.
To Encrypt or Not Encrypt
Digital Agility October 2017.
Gareth Johns IT Skills Development Advisor
Some Methods Phishing Database & Password Exploits Social Engineering & Networking Weak Controls Default Accounts & Passwords Dated Software & Patch.
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Page 1 Fundamentals of Information Systems.
B2B Application for the Global ICT Partnership Program
The Microsoft UC Experience
Make Your Management and Board Meetings More Effective and Paperless with Microsoft Office 365, SharePoint, and the Pervasent Board Papers App Partner.
Dr Paul Lewis Chief Technology Officer
IOT ppt
Beginning Office 365 and One Drive Basics
Yahoo Users Face Various Issues. Yahoo Account Login Issue Call Toll Free:
Content Management lifecycle
Technology Management- A CIO Perspective
Threat Landscape for Data Security
Securing the Internet of Things: Key Insights and Best Practices Across the Industry Theresa Bui Revon IoT Cloud Strategy.
Prepared By : Binay Tiwari
IIA District Conference Seminar Presenter David Cole, CPA, CISA, CRISC
Collaborative Business Solutions
12 STEPS TO A GDPR AWARE NETWORK
Gareth Johns IT Skills Development Advisor
Positive and negative effects of electronic devices.
Ethical Hacking ‘Ethical hacking’ is the branch of computer science that involves cybersecurity and preventing cyberattacks. Ethical hackers are not malicious.
IP Addresses & Ports IP Addresses – identify a device on a network
Presentation transcript:

IT Security vs Office Administration Efficiency Office Administration Efficiency Date: João Stott

João Stott, CISA, CRISC, has over 10 years of experience in Information Security, Technology Risk Management and governance Areas, started his career as software engineer in a start-up software company, moved to a technology security and technology risk at a multinational financial institution and currently is the Chief Security Officer at a global provider of connectivity enablement for Mobile solutions. Present Myself

Agenda 17:35 Do we care about efficiency when ******** happens?(10 min) 17:45 Hot topics to consider before Office Administration Efficiency (15 min) 18:00 Physical Security(20 min) Piggybacking Shoulder surfing 18:20 Electronic Communication efficiency (30 min) Access Management ( Data Transfer Shares, …) Pen Drives & Encryption agents Skype / Electronic Chats 18:50 Mobile Communication efficiency(20 min) Mobile world reality The need for Encryption Apps vulnerability 19:10 Cloud & IOT efficiency(10 min) DropBox and cloud share IOT Vulnerabilities of everything that is new 19:20 Wrap Up(10 min)

Efficiency?

Hot Topics to consider Efficiency Information classification Backups InternetIntranetSocial Networks Physical Transportation of Media PasswordsIOTAnti virusCloudCryptographyRecertification

Physical Security

Piggybacking

Shoulder surfing

Electronic Communication efficiency

Password – “stott”

Password – “stott123”

Password – “Eugostodebolos”

Electronic Communication efficiency

Mobile Communication efficiency

The End Thank you…