Copyright 2011 FUJITSU.

Slides:



Advertisements
Similar presentations
Human Factors in Flight Operations A CAA Perspective
Advertisements

Rob Kella - Chief Risk Officer
1 Introduction Welcome! Format of day Response to previous requests from clients Amendment to schedule Using Information Security for Business Advantage.
David Palmer Head of Policy & Review LSP REVIEW 2013.
Respond Deliver & Enable Governance Effectiveness Framework Royal Devon and Exeter NHS Foundation Trust.
Global Cyber Security Capacity Maturity Model - CMM WSIS Forum 2015 – Geneva Dr Maria Bada 25/05/2015.
1 Pertemuan 17 Organisational Back Up Matakuliah:A0334/Pengendalian Lingkungan Online Tahun: 2005 Versi: 1/1.
Dr Deirdre Anderson Cranfield International Centre for Women Leaders The Female FTSE Board Report 2014 Is change really happening?
Preparing Scotland’s first Records Management Plan Ava Wieclawska Records Manager.
© Use by permission. © 2 © 3 © 4 Source: McAfee.
EAST MIDLANDS PUBLIC SECTOR APPRENTICESHIPS SUMMIT HOW TO MAKE APPRENTICESHIPS WORK FOR YOU 25 MARCH 2009.
Inspire Personal Skills Interpersonal & Organisational Awareness Developing People Deliver Creative Thinking & Problem Solving Decision Making, Prioritising,
Logging Antivirus Examples Use recent examples from media of such attacks (RSA, Epsilon, Oak Ridge National Labs, HBGary). Articles in business magazines.
©2008 RightFit Consulting Overview of Services. ©2010 RightFit Consulting About RightFit Consulting Providing consulting services to businesses across.
1 Cloud Computing and Security Prof. Ravi Sandhu Executive Director and Endowed Chair April 19, © Ravi Sandhu.
Promoting Workplace Well-Being David Craigie Chartered Psychologist supporting
Accelerating Implementation Methodology: key points Planned, conscious, skilled enterprise Engage ALL stakeholders - Targets, Agents, Sponsors & champions.
ORGANISATIONAL CULTURE ORGANISATION MUST PROVIDE FOR INFORMATION SECURITY FAILING TO PLAN, IS PLANNING TO FAIL ASPECTS THAT SHOULD BE ADRESSED DURING.
The new Culture Club: building resilience from within Jacinthe A Galpin, Chief Risk & Audit Officer, Department of Justice & Regulation.
Towards a Better World “… handling risk and relationships – Board and Management Perspectives” Nick Chipman PricewaterhouseCoopers Second Summit on Non.
Small acorns to mighty oaks Abersychan school group.
Program Overview and 2015 Outlook Finance & Administration Committee Meeting February 10, 2015 Sheri Le, Manager of Cybersecurity RTD.
Colonel Chaipun Nilvises Deputy Director, Office of ASEAN Affairs Office of Policy and Planning Ministry of Defence of Thailand.
1 Integrating information security into enterprise risk management (and how a common framework can be used to satisfy SOX compliance) Michael Sullivan,
Rivervale. Objectives Cyber Wellness refers to the positive well-being of Internet users. It involves an understanding of the risks of.
Norfolk Arts and Wellbeing Programme. A major arts and well-being Action Research project across Norfolk to support local arts organisations to pilot.
State-of-the-States: CIO Priorities, Trends and Opportunities
Collaborative & Interpersonal Leadership
Cyber Risk Presentation to the Board of Directors
26th September 2007 Des Prichard – Human Resource Director
STRENGTHS WEAKNESSES OPPORTUNITIES THREATS SWOT - ANALYSIS
Changing People’s Expectations (ChaPE)
Good, Good Father.
Governance & Control in ERP Systems
Diversity and Inclusion
Values This programme is about values-based management. This means a style of management, particular to Canterbury College, which turns the values into.
one sasol SHE excellence approach
Project proposal for ISO 27001:2013 implementation
Copyrights apply.
IAG - The Road Ahead.
Diversity and Inclusion: 5 Practical Steps
Building a Culture of Accountability and High Performance
What issues keep you up at night?
The Role of Risk Management in VAT Administration
Title By Name(s) CS 478 Network Security
Good Good Father.
Introduction to Lesson 3 The hidden roles in business
Leadership Behaviours Model
The new Culture Club: building resilience from within
Change Management and COBIT®. ISACA London Chapter Presentation
Title By Name(s) CS 478 Network Security
Learning from near misses
Coach Approach Culture
IS Risk Management Framework Overview
ACT Evaluation Capability We’ve talked the talk
Digital Defence Diplomacy
GRC, A holistic Road Map for Information Security Transformation
I’ve heard a thousand stories of what they think You’re like
Looking at care opinion from both sides
DSC Contract Management Committee Meeting
Joint PRESENTATION: IPID AND CSPS
CYBER SECURITY SPACE OPERATIONS AND RESILIENCY.
CYBERSECURITY IS A Business Issue
NextGenRail 2017 – Keeping Change On Track
Public Health Scotland Target Operating Model 1.0
Innovation through the Eyes of a Health Board
Communication Webinar Thursday 12th September 2019
Realistic Prescribing Pathways
LAB2-R04 Achieving and Measuring Success with the Security Awareness Maturity Model Lance Spitzner Director SANS Securing The
Presentation transcript:

Copyright 2011 FUJITSU

Securing The Human Factor – People Are Your Biggest Risk! Haroon Malik, Director – Cyber Security Consulting Copyright 2011 FUJITSU

Key points Cyber threats are changing Its not all about the technology Awareness maturity framework The way forward 1 2 3 4

The story so far…

Dig a little deeper….

Technology – still the best ‘first line of Defence’?

Who me?

How do we engage our people?

Where does your organisation fit? Metrics framework Cultural change Promoting awareness & behavioural change Compliance-focused Non existent

Executive level support and sponsorship

Empower people

The best firewall

Doing without doing

Copyright 2011 FUJITSU