User Awareness Information Forum

Slides:



Advertisements
Similar presentations
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Advertisements

SP Business Suite Deployment Kick-off
Introduction to Web-Based Training Stacy Pritt, DVM, MBA Director, Animal Welfare & Regulatory Compliance Covance Research Products, Inc.
Enterprise Content Management Pre-Proposal Conference for RFP No. ISD2006ECM-SS December 6, 2006 California Administrative Office of the Courts Information.
Getting Started in Blackboard. You will need… A web browser, preferably Internet Explorer, version 4.0 or higher An account and the knowledge of.
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
OHIO OFFICE OF INFORMATION TECHNOLOGY. Even the agents are suffering…
Fullerton Joint Union High School District 9 th Annual Parent Leaders Welcome Back Meeting August 22, 2014 Google Apps for Education Information 1.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
SATERN for Supervisors May Session Objectives At the end of the session, participants will be able to:  Describe the benefits of SATERN.  Log.
TRAIN Policies An Overview Karen K. Ngowe, MA, MI-TRAIN Administrator Phone:
TrainingFinder Real-time Affiliate Integrated Network (TRAIN) The nation’s premier learning resource for professionals who protect the health and safety.
1 CADE Finance and HR Reports Administrative Staff Leadership Conference Presenter: Mary Jo Kuffner, Assistant Director Administration.
Portal and AQAS-Philadelphia University 21-22/6/2011 AVCI Platform in PU Dr. Abdel-Rahman Al-Qawasmi Philadelphia University Director of Computer Center.
myGuruji Powered by technology, used by Scholars
DHCH IT Orientation Introduction to DHCH Computer and Information Systems.
Essential CCHS Computing Information Computer Applications September 2009.
Enterprise Learning Management Project Team: Theme Grenz Brandy Meng.
1 User Awareness Information Forum Theresa A. Masse, State Chief Information Security Officer Department of Administrative Services Enterprise Security.
Introducing The eLearning solution for the Archdiocese of Brisbane Building the capability of our people through flexible learning.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
The KnowledgeNET is an unparalleled New Zealand learning management system. Communicate, The KnowledgeNET is a world class innovation, initiated by teachers,
WA SECURES Training Spring Welcome As a volunteer of the Department of Health Emergency Operations Center or RSS Task Force you must be prepared.
What’s New in the QAD Learning Center? Bernadette Bagley, March 2014 MWUG Spring Conference.
What’s New in the QAD Learning Center? Bernadette Bagley, November 18, 2014 West Coast User Group.
Google Apps (Education Edition) A step guide to a successful deployment January 10 th, 2008 California Technology Assistance Project
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Learning Management System Training Workshop IIUM, PJ campus 24 – 25 May 2010 Assoc Prof Dr Kamal Basha b. Madarsha, Inst of Education.
Utah State University Extension Civil Rights Compliance Self-Assessment Tool Dr Dallas L. Holmes Institutional Research 2005 National Diversity Conference.
Fraud and corruption prevention on-line tools and techniques Dr Robert Lang Chief Executive Officer.
Realtime Results Product Recall Services Effective Contact Centers / Efficient Recall Services Prepared by: Realtime Results 2054 Westport Center Drive.
Local AIMSweb® Manager: Taking the Role An introduction to: Course Overview Role of a Local AIMSweb Manager (LAM) Skills needed to become a successful.
Module 1: Overview of Microsoft Office SharePoint Server 2007.
Organizing a Privacy Program: Administrative Infrastructure and Reporting Relationships Presented by: Samuel P. Jenkins, Director Defense Privacy Office.
April 14, 2003 – HIPAA Privacy Audioconference The Importance of April 14, 2003: Where you should be regarding HIPAA privacy policies and procedures and.
State Construction Conference March 2, 2017
Agency for Persons with Disabilities TRAIN Florida/Training
UW-Madison Guidelines for Managing the Records of Departing Employees*
Acceptable Use Policy (Draft)
Deia Roberts Educational Specialist
Data and database administration
New Hire IT Orientation
Streamline your HR document management processes
TUSK - Faculty Overview
of our Partners and Customers
The California Early Care & Education Workforce Registry
Security Aspects of Web Site Design
ECOLAB & ALCHEMY PARTNERSHIP OVERVIEW
Office 365 Security Assessment Workshop
LEARNING MANAGEMENT SYSTEM
Red Flags Rule An Introduction County College of Morris
What You Don’t Know About the QAD Learning Center
How businesses use information systems (Part 2)
The California Early Care & Education Workforce Registry
CompTIA Security+ Study Guide (SY0-401)
Lippincott Procedures Training Tour for General Users
Contents subject to change.
Securing Windows 7 Lesson 10.
New employee induction for new staff and managers
Annual Corporate Training
Netop Vision Product presentation Göteborg 1.
Creating a University IT Service Portfolio
Data Security Awareness
Training Tour for General Users
Introduction to the PACS Security
Colorado “Protections For Consumer Data Privacy” Law
LEARNING MANAGEMENT SYSTEM
Chapter 6 Innovative Systems: From E-Government and E-Learning to C2C E-Commerce and Collaborative Commerce.
Presentation transcript:

User Awareness Information Forum Theresa A. Masse, State Chief Information Security Officer Department of Administrative Services Enterprise Security Office

Opening Remarks Kris Kautz, Interim Director Department of Administrative Services

Agenda Welcome and introductions Employee Security Policy Security Awareness Resources Recommended Level of Security Awareness modules Enterprise Learning Management System Information Security Resource Center Q&A Demonstration of tools

Employee Security Policy

Employee Security Policy Recommended Level of Security Awareness (RLSA) modules are designed to meet the requirements of the policy

Security Awareness Resources Eva Doud, Business Analyst Department of Administrative Services Enterprise Security Office

RLSA Background Assessment conducted in 2006 Project to research, plan, and implement a core program, targeted at numerous audiences, available to multiple agencies Recommended minimum level of information security knowledge for a typical state employee with access to information technology or sensitive information

RLSA Background (continued) Designed to be delivered electronically (over the Web) to reach the largest audience Interagency work group oversaw the development of the course material and look-and-feel Judicial, Administrative Services, Consumer and Business Services, Treasury, Lottery, Secretary of State, and Justice

RLSA Design Cover at least 80% of state staff Not meant to cover agency-specific business requirements, policies or regulations 30 minute “seat time” per module Interactive Benefit users in both work and home situations

RLSA Modules Six modules created in initial suite Can be customized to meet agency-specific requirements using a readily-available course authoring tool One “refresher” course per year

RLSA - Modules IS101 – An Introduction to Information Security What is information security Basic principles Policies, standards and procedures

RLSA - Modules IS201 – Securing Your Computer – Part 1 Computer viruses Spyware IS202 – Securing Your Computer – Part 2 Choosing strong passwords Protecting your passwords Safe use of the Internet Physically secure your computer

RLSA - Modules IS203 – Using E-Mail Introduction E-mail content and etiquette Keeping your e-mail private E-mail from other people

RLSA - Modules IS204 – Dealing with Documents Basic document security Requests for information Retaining documents Destroying documents

RLSA Modules IS205 – When You’re Out of the Office Introduction General guidelines Mobile devices Laptop computers USB flash drives Cell phones

An Introduction to Information Security RLSA - Demonstration An Introduction to Information Security We handle a great deal of sensitive information every day: customers' account numbers, Social Security numbers and credit card details; as well as internal information such as health records, payroll data, network information, ... Information security is critical to business at the State of Oregon. In addition, learning about information security will also help you to keep yourself safe at home as identity theft and fraud become increasingly common.

Implementation Agencies have access to source files, and to versions compiled in SCORM, LM-Light and HTML formats Can customize content using a readily-available course authoring tool Can be integrated into learning management systems, which will then track student completion and generate reports Courses also can be run on an intranet with student completion tracked manually

RLSA – Modifying the Content Dr. Steve Addison Cosaint, Inc. Mount Vernon, WA 18 18

Modifying the Content Our aim is to use one common set of source files to generate courses in multiple formats: SCORM LM-Light HTML 19 Source files stored in the RLSA Warehouse at https://or.cosaint.net 19

Modifying the Content We achieve this by using a commercial e-learning authoring tool called Lectora Lectora is an easy-to-use tool that allows you to develop/change content without a detailed knowledge of HTML, JavaScript, etc. Can handle static and dynamic content Can develop/modify tests and quizzes 20 20

Lectora Course Authoring Tool 21 More information at http://www.trivantis.com 21

Modifying the Content To customize a module, you must have access to a copy of Lectora (or a consultant with Lectora) Then: Download the source files from the RLSA warehouse (contact Eva Doud, DAS ESO for logon information) Modify as required Compile into SCORM, LM-Light or HTML format Upload to an LMS (SCORM & LM-Light) or to an intranet (HTML) 22 22

eLMS Initiative Theme Grenz, Project Manager Department of Administrative Services Human Resources Services

eLMS Initiative Business Case Deliver the “right” training at the “right” time Leverage technology to help identify learning needs at the individual and organizational level and deliver training which is directly tied to skill gaps Support Workforce Development efforts Position learning as a critical component of an organization’s ability to respond to changing workforce demands

eLMS - What’s in it for me? As a student: Access a robust on-line course catalog (eLearning, classroom) Register/track course enrollments/completions Receive real-time class notifications (registration confirmation, and reminder emails) Transcript tracking

eLMS - What’s in it for me? As a manager: Track key workforce metrics in real-time Manage the entire performance management process (IDP/360 reviews) Efficiently track training expenditures across the entire agency

RLSA – Accessing the Modules Courses are available today on the oregon.gov intranet: https://intranet.egov.oregon.gov/egov/myportal Select the “State” tab

RLSA – Accessing the Modules

Other Resources Information Security Resource Center Public-facing Web site Links to many resources on a variety of information security topics Can be used to supplement training and awareness efforts http://secureinfo.oregon.gov

Information Security Resource Ctr.

Questions?

For further information … Eva Doud, DAS Enterprise Security Office (503) 378-3071 eva.doud@state.or.us Theme Grenz, DAS HRSD (503) 378-6213 theme.grenz@state.or.us Theresa Masse, DAS Enterprise Security Office (503) 378-4896 theresa.a.masse@state.or.us

Next Forum … Acceptable Use Policy Overview Panel Presentation March 31, 2008

Tools Demonstration