Information Security and Travel-related Security

Slides:



Advertisements
Similar presentations
Pennsylvania BANNER Users Group 2007 Disaster Recover For The Financial Aid Environment.
Advertisements

GCSE ICT Networks & Security..
1 of 2 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2006 Microsoft Corporation.
Information Security Is for Everyone By Jill Burrington-Brown, MS, RHIA.
Digital Investigations of Any Kind ONE COMPANY Cyber Intelligence Response Technology (CIRT)
HIPAA Basic Training for Privacy & Information Security Vanderbilt University Medical Center VUMC HIPAA Website:
Springfield Technical Community College Security Awareness Training.
The Importance of Information Security for Parkers Office Products.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 25 & 27 November 2013.
Part 2 of Evil Lurking in Websites Data Security at the University of Wisconsin Oshkosh.
Copyright © 2014 Merck Sharp & Dohme Corp., a subsidiary of Merck & Co., Inc. All rights reserved. In practice, how do we recognize a potential Privacy.
Information Security Awareness:
Security+ Guide to Network Security Fundamentals
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 18, 20 & 25 March 2015.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Qualitative.
1 Enterprise Security Your Information Security and Privacy Responsibilities © 2008 Providence Health & Services This information may be replicated for.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
HIPAA What’s Said Here – Stays Here…. WHAT IS HIPAA  Health Insurance Portability and Accountability Act  Purpose is to protect clients (patients)
OPSEC Awareness Briefing Multi-Function Printer (MFP) Security.
Windows XP 101: Using Windows XP Professional in the Classroom.
Protecting Sensitive Information PA Turnpike Commission.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
ESCCO Data Security Training David Dixon September 2014.
Best Practices for Protecting Data. Section Overview Mobile Computing Devices Technical Procedures Data Access and Permissions Verbal Communication Paper.
PLUG IT IN 7 Protecting Your Information Assets. 1.How to Protect Your Assets: The Basics 2.Behavioral Actions to Protect Your Information Assets 3.Computer-Based.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
Privacy and Information Management ICT Guidelines.
End User Cyber Security Awareness Training. Who should complete this training This training is required for all individuals that owns a computer, mobile.
Safeguarding Your Privacy Section 1.3. Safeguarding Your Privacy 1. What is Identity Theft? 2. Research a story on identity theft and be prepared to report.
ETHICAL ISSUES SURROUND ELECTRONIC COMMUNICATIONS Unit 3.
Introduction to Computer Security PA Turnpike Commission.
STARTFINISH DisposePrint & ScanShareStore Protect information and equipment ClassifyProtect.
Information Systems Security New Faculty Orientation Day Queen’s University August 2011 George Farah, GIAC/GSEC Gold, CRISC, CISA University Information.
Mandatory online training. intro why we are doing this why you should care what we hope you get out of this.
Protecting Your Identity: Information Security Basics Presented by:Barbara D. Kissner SVP & CIO International Fidelity Insurance Company March 18, 2014.
Joel Rosenblatt Director, Computer and Network Security September 10, 2013.
Physical security By Ola Abd el-latif Abbass Hassan.
OCTOBER IS CYBER SECURITY AWARENESS MONTH. October is Cyber Security Awareness Month  Our Cyber Security Awareness Campaign focuses on topics such as.
Computer Security Sample security policy Dr Alexei Vernitski.
Staying Secure in an Insecure World NATE HOWE CHIEF INFORMATION SECURITY OFFICER Education – Partnership – Solutions.
Properly Safeguarding Personally Identifiable Information (PII) Ticket Program Manager (TPM) Social Security’s Ticket to Work Program.
PUBLIC COMPUTER SAFETY
HIPAA Privacy and Security
Personal Data Protection and Security Measures
Unit 13 IT Systems Troubleshooting and Repair Anne Sewell
E&O Risk Management: Meeting the Challenge of Change
Service Point 5 ReportWriter
Protection of CONSUMER information
Privacy & Confidentiality
Service Point 5 ReportWriter
Information Technology
Information Protection & Cyber Security
Key behavior # 1 Be Secure Awareness Quiz
DETAILED Global CYBERSECURITY SURVEY Summary RESULTS
Staying Austin College
Chapter 3: IRS and FTC Data Security Rules
Things To Avoid: 1-Never your password to anyone.
Health Insurance Portability and Accountability Act of 1996 (HIPAA)
HIPAA PRIVACY AWARENESS, COMPLIANCE and ENFORCEMENT
Welcome to the SPH Information Security Learning Module
7 IM Habits for Highly Effective People
Windows XP 101: Using Windows XP Professional in the Classroom
HIPAA SECURITY RULE Copyright © 2008, 2006, 2004 by Saunders an imprint of Elsevier Inc. All rights reserved.
Information Security Training
Premier Employee Program Version 4.0
Handling Information Securely
Why Cyber Security is important to SME? Useful Tips on how you protect and secure your business. By Ronald Soh from Win-Pro Consultancy Pte Ltd
Department of Public Safety
2019 Thales Global Cloud Security Study
Information Security in Your Office
Presentation transcript:

Information Security and Travel-related Security H3SE integration kit TCNT 1.2 module

Module objectives At the end of this module: You will know the main security risks as regards office activities You will know the main security risks related to travel and missions abroad You will know about specific arrangements to be made according to travel destinations. H3SE integration kit - TCNT 1.2 module - Information Security and Travel-related Security – V2

Some figures related to informational assets 2014: Edward Snowden reveals that the American intelligence agency targeted the Total Group and other industrialists (Thales, Siemens, etc.) 30% per annum: the increase between 2006 and 2014 of the targeted thefts of laptops containing proven sensitive information. 3: without any precautions, it is possible to obtain sensitive information through a network of only three people. 20%: percentage of attacks targeting strategic information by persons not belonging to the company but present on premises. H3SE integration kit - TCNT 1.2 module - Information Security and Travel-related Security – V2

PROTECT YOURSELF FROM INTRUSIONS (PHYSICAL AND DIGITAL) Protect access to the buildings, always wear your badge, do not open the door to a stranger. Keep sensitive data and documents locked away and put a theft protection device on your computer. Memorize your password and do not write it on a Post-it! Do not use email for messages not related to occupational activity. Never give sensitive information over the telephone.
 Be wary of any suspect email, especially if it is requesting sensitive information – do not click on links or attachments. Be discrete in public conversations. No security program is effective without everyone's participation. H3SE integration kit - TCNT 1.2 module - Information Security and Travel-related Security – V2

LEVELS OF CONFIDENTIALITY Level 0: Public, e.g. press releases. Level 1: Internal, e.g. the intranet or technical standards. Level 2: Restricted to certain authorized employees (documents related to exploration, projects or strategies) Levels 3 and 4: no precise example, it is confidential (3) (amount of bids in the invitations to tender) or secret (4)! H3SE integration kit - TCNT 1.2 module - Information Security and Travel-related Security – V2

DATA-PROCESSING REGULATIONS (1/2) Never allow a third party to connect to your workstation, or even connect a removable media to it. Always recover 
a document provided by a third party with your own USB key. Make sure that your sensitive information is placed in a virtual vault (for example, through Security Box). Make sure that no third parties can view your computer screen by installing a privacy filter on your screen. Printing documents: do not leave documents in the printer. For sensitive documents, use a USB printer in your office. H3SE integration kit - TCNT 1.2 module - Information Security and Travel-related Security – V2

DATA-PROCESSING REGULATIONS (2/2) Social networks (Facebook, Twitter, etc.): Do not communicate professional information which could be used to the detriment of the Group. 
 Use common sense and do not publish information that you would not entrust to a stranger in the street… 
 On the move, avoid carrying sensitive data: use an encrypted space on the Total network or, failing that, an encrypted USB key to keep on you at all times: this reduces the risk of a computer theft or a hard drive copy, notably at Customs (legal in the USA, China, Israel, etc.). H3SE integration kit - TCNT 1.2 module - Information Security and Travel-related Security – V2