Join In Be Secure Presentation

Slides:



Advertisements
Similar presentations
PGCPS Security Awareness Summary L2-ME Heading: SummaryPage GUID: L2-LO-89880Page Number: Gfx GUID: L2-ME Body Text:
Advertisements

Computer Fraud Chapter 5.
Copyright © 2012, SAS Institute Inc. All rights reserved. Cyber Security threats to Open Government Data Vishal Marria April 2014.
Information Security Awareness Training
Midterm Review Questions SOEN321 – Information-Systems Security.
Information Security Policies and Standards
Welcome to New Hire Orientation Information Security
Physical and Cyber Attacks1. 2 Inspirational Quote Country in which there are precipitous cliffs with torrents running between, deep natural hollows,
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
Comptroller of the Currency Administrator of National Banks E- Security Risk Mitigation: A Supervisor’s Perspective Global Dialogue World Bank Group September.
1. Agenda Service Utilization Service Level Metrics Service Performance Review Incident Review Current / Future Service Plan Service Improvement Plan.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
1 Figure 1-17: Security Management Security is a Primarily a Management Issue, not a Technology Issue Top-to-Bottom Commitment  Top-management commitment.
Thomas Levy. Agenda 1.Aims: Reducing Cyber Risk 2.Information Risk Management 3.Secure Configuration 4.Network Security 5.Managing User Access 6.Education.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
Information Systems Security Operational Control for Information Security.
FLOOR CANDY.
Note1 (Admi1) Overview of administering security.
Federal Information Security Management Act (FISMA) By K. Brenner OCIO Internship Summer 2013.
Working with HIT Systems
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
Security and Assurance in IT organization Name: Mai Hoang Nguyen Class: INFO 609 Professor: T. Rohm.
Computer Security Status Update FOCUS Meeting, 28 March 2002 Denise Heagerty, CERN Computer Security Officer.
Computer Security By Duncan Hall.
Physical security By Ola Abd el-latif Abbass Hassan.
TOP 10 DHS IT SECURITY & PRIVACY BEST PRACTICES #10 Contact The Office of Systems & Technology for appropriate ways to proceed if you need access to.
Cyber Security in the Mobile Era KEEPING ENTERPRISE DATA SAFE IN THE BYOD ERA.
Dr. Mark Gaynor, Dr. Feliciano Yu, Bryan Duepner.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Building Our IT Security Lines of Defense Working together to protect Government’s IT systems.
YJT1 - Application of Effective Comm (UG 0914) Task 2: Presentation Kody M. Hackbusch.
Guest Wireless Service Overview Andrew Rader November, 2013.
In this tutorial, you will be shown security considerations that you should keep in mind while accessing or using any GW systems, including GWeb. Remember.
Information Security Standards 2016 Update IIPS Security Standards Committee Roderick Brower - Chair.
September 20, 2016 How to Defend Your Organization from a Cyber Breach LTC Tim Bloechl (U.S. Army, Ret.) Director, Cyber Security Business.
How to Enable Account Key Sign Instead Of Password In Yahoo? For more details:
Online Safety The Campion School.
ISMS Information Security Management System
Information Protection & Cyber Security
Advanced Endpoint Security Data Connectors-Charlotte January 2016
Information Technology Acceptable Use An Overview
“Be Secure” – How to implement the 9 key behaviors in your team
3.6 Fundamentals of cyber security
Team 1 – Incident Response
Administrative Practices Outcome 1
Computer Data Security & Privacy
Information Protection & Cyber Security
LAND RECORDS INFORMATION SYSTEMS DIVISION
Securing the Law Firm Myth vs. Reality vs. Practicality:
Key behavior # 1 Be Secure Awareness Quiz
Cyber Security What’s really going on in ‘Cyber space’ & Why security matters Gary Hibberd Managing Director of Agenci & Cyber Geek
Home Computer Security
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Cyber Security in Ports Business as Usual?
Dear Students,   The school holidays are just around the corner. When spending time online during the school holidays, you should be aware of good practices.
Navigating Security Seas in a Small Ship with a Limited Crew
Based on Oil & Gas Industry Averages
Security Essentials for Small Businesses
STOPPING INTELLECTUAL PROPERTY LOSS BEGINS WITH YOU
Information Security Awareness
The MobileIron® Threat Detection difference:
WELCOME AOI Tech Solutions Get Instant Tech Help & Support.
WELCOME AOI Tech Solutions - Network Security.
Cyber Security in a Risk Management Framework
Information Protection
Information Protection
Why Cyber Security is important to SME? Useful Tips on how you protect and secure your business. By Ronald Soh from Win-Pro Consultancy Pte Ltd
“Workplace Behaviour: Activating your greatest security asset”
Digitization complicates visibility Market demands have taken the network beyond your perimeter Threats are more numerous and complex Threats are using.
AIR-T11 What We’ve Learned Building a Cyber Security Operation Center: du Case Study Tamer El Refaey Senior Director, Security Monitoring and Operations.
Presentation transcript:

Join In Be Secure Presentation Information Protection & Cyber Security Internal

Why Should I Be Secure? Cyber Security and Information Protection play an increasingly important role in everyday work as our interconnected world harbors many risks. We are detecting new types of threats every day. Attacks on BASF have more than doubled in one year! Information is our advantage and must be protected. IT systems cannot do this alone: Every employee plays an active role in protecting our information – every day. Join in and adopt the 9 secure behaviors to have an impact on Information Protection and Cyber Security within BASF Group. Internal

Secure Behaviors Everyday, users are confronted with situations in which their actions have an impact on security and Information Protection at BASF. The following behaviors will help to handle each of them in a secure way. 1. 2. 3. 4. Starting the machine Accessing information Handling information Sharing information Join in: Your behavior makes the difference Use strong passwords Classify information Respect the Need-to-know principle 9. 8. 7. 6. 5. Questions or incidents Working outside the office Using devices Opening files and hyperlinks Using web services Get help from IS Service Desk and your IPO Connect to BASF network when working outside the office Only connect authorized devices and use encryption Check received files and hyperlinks before opening Use public web services carefully Internal

Join In: Your behavior makes the difference Your behavior is the most important security asset at BASF! You make a huge impact on Information Protection and Cyber Security by joining in to protect our information. Take your physical and digital environment into account Take security warnings and updates seriously Be aware of the impact of your actions inside and outside of work While… 80% is Human Effort BASF has IT systems in place to provide Cyber Security and protect our information… but we should never rely on them exclusively. Effective Information Protection and Cyber Security follows the 80/20 principle: You Only… 20% Technology Internal

Further information Be Secure including videos, infographics, FAQs and e-learnings Information Protection Minimum Requirements Do you need more information? Contact us: Your Information Protection Officer Be Secure (be-secure@basf.com) Internal