Information Technology Awareness Wayne Donald IT Security Officer.

Slides:



Advertisements
Similar presentations
Are you Resilient? Diane Howorth Business Development Manager European Telecommunications Resilience & Recovery Association.
Advertisements

Information Management and Technology
School Leadership that Works:
Darton College Information Systems Use Policies. Introduction Dartons Information Systems are critical resources. The Information Systems Use Policies.
Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.
Stay Safe Online in Six Steps Presented by: Scott Rhinehart 540 Lake Center Parkway, Suite 102 Cumming, GA Office: ext Fax:
Mountain Lion Security Mac OS X Strong Passwords Every Mac needs a login name and password Every user on every Mac should have their own account.
Information Technology Control Day IV Afternoon Sessions.
Information Security Awareness April 13, Motivation Recent federal and state regulations and guidance Recent federal and state regulations and guidance.
Defense-in-Depth Against Malicious Software Jeff Alexander IT Pro Evangelist Microsoft Australia
University of California, Davis1 Draft Wireless Network Policy Administrative Computing Coordinating Council September 10, 2001.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 6 Enterprise Security.
University of Guelph IT Security Policy Doug Blain Manager, IT Security ISC, April 27th.
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
Database Administration
15 1 Chapter 15 Database Administration Database Systems: Design, Implementation, and Management, Seventh Edition, Rob and Coronel.
Factors to be taken into account when designing ICT Security Policies
Small Business Security By Donatas Sumyla. Content Introduction Tools Symantec Corp. Company Overview Symantec.com Microsoft Company Overview Small Business.
Information Technology Audit Process Business Practices Seminar Paul Toffenetti, CISA Internal Audit 29 February 2008.
SAU #53 Serving the School Districts of Allenstown, Chichester, Deerfield, Epsom, and Pembroke Action Plan
1 Institutions as Allies in the Security Challenge Wayne Donald, Virginia Tech Cathy Hubbs, George Mason University Darlene Quackenbush, James Madison.
Database Administration Chapter 16. Need for Databases  Data is used by different people, in different departments, for different reasons  Interpretation.
1 Fighting Back With An Alliance For Secure Computing And Networking Wayne Donald, Virginia Tech Cathy Hubbs, George Mason University Darlene Quackenbush,
Protecting ICT Systems
Module 9 Configuring Server Security Compliance. Module Overview Securing a Windows Infrastructure Overview of EFS Configuring an Audit Policy Overview.
Conservation Districts in New York Training Module 1.
Security Threats Connecting Computers Copyright Law & Ethics Storage & Memory Computer System
Current Job Components Information Technology Department Network Systems Administration Telecommunications Database Design and Administration.
Thomas Levy. Agenda 1.Aims: Reducing Cyber Risk 2.Information Risk Management 3.Secure Configuration 4.Network Security 5.Managing User Access 6.Education.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Internal Communication Team Task  Identify better communication methods for university internal audiences  Evaluate construction of internal communication.
Donald Constant. Digital Citizenship  For teachers and students, digital citizenship changes as new technology tools are used by the educational world.
Computer Security 2 Keeping your computer safe. Computer Security 2 Computer Security 2 includes two lessons:  Lesson 3: Protecting yourself and your.
October 17, 2012 Connie S. Sorrell Chief of Systems Operations.
Social Networking Presentation to Department Heads January 21, 2010.
Playing Safely in the Cloud Marie Greenberg, CISSP, IAM, IEM Information Security Manager Virginia State Corporation Commission.
The OCIO/PSCD, in collaboration with the Advisory Board’s Long Range Planning Committee, developed this Strategic Plan to foster the leadership and.
UPDATING RIGHT OF WAY MANUALS FLORIDA’S PROCEDURES.
Database Administration
The Direction of Information Security and Privacy in State Government Presented by Colleen Pedroza Chief Information Security Officer California State.
Module 11: Designing Security for Network Perimeters.
Networked Systems Survivability CERT ® Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA © 2002 Carnegie.
ORGANISATIONAL CULTURE ORGANISATION MUST PROVIDE FOR INFORMATION SECURITY FAILING TO PLAN, IS PLANNING TO FAIL ASPECTS THAT SHOULD BE ADRESSED DURING.
Unit 8: Implementation, Part II Seminar Wednesday pm ET.
Computer Policy and Security Report to Faculty Council Jeanne Smythe ATN Director for Computing Policy March 26,2004.
CPT 123 Internet Skills Class Notes Internet Security Session B.
Presented by Eliot Christian, USGS Accessibility, usability, and preservation of government information (Section 207 of the E-Government Act) April 28,
Week 7 Lecture Part 2 Introduction to Database Administration Samuel S. ConnSamuel S. Conn, Asst Professor.
Why Privacy & Security Awareness Training?. Why is privacy & security awareness training required?
Security Threats Caela Harris. What is a Virus A computer virus or a computer worm is a malicious software program that can self replicate on computer.
Foundation year Lec.4: Lec.4: Communication Software Internet & Security Lecturer: Dalia Mirghani Year : 2014/2015.
ASSESSMENT TOOL The assessment tool comprises 3 sections: o Infrastructure o Policy o Practice Schools self-assess two-yearly, and for each assessment.
Implementing a Security Policy JISC – ICT Security Threats & Promises, April 2002 Mick Ismail ICT Services Manager City of Wolverhampton College.
BTEC NAT Unit 15 - Organisational Systems Security ORGANISATIONAL SYSTEMS SECURITY Unit 15 Lecture 7 EMPLOYMENT CONTRACTS & CODES OF CONDUCT.
Information Security in Laurier Grant Li Wilfrid Laurier University.
Safety Management Systems Session Four Safety Promotion APTA Webinar June 9, 2016.
Philip J. Beyer, Information Security Officer John P. Skaarup, Sr. Security Engineer Texas Education Agency Information Security.
Privacy and Security Challenge Just Browsing Keep out - Private! Pushing IT You sound like a broken record Legal Beagles
UNIT V Security Management of Information Technology.
Blackboard Security System
I S P S loss Prevention.
Call For Norton Customer Service. customerservice.com/norton- customer-service.html.
CYB 110 Competitive Success/snaptutorial.com
CYB 110 Education Begins / Snaptutorial.com. CYB 110 All Assignments For more classes visit CYB 110 Week 1 Individual Protecting.
CYB 110 Teaching Effectively-- snaptutorial.com
Security Awareness Training: System Owners
Information Security Awareness
Unit 4 IT Security Kerris Davies.
Database Administration
What is Information Security?
Presentation transcript:

Information Technology Awareness Wayne Donald IT Security Officer

Why Education and Awareness There is a mentality that theres nothing important on the machine There is a mentality that theres nothing important on the machine There is a misconception that technology alone can solve the security problems There is a misconception that technology alone can solve the security problems There is an increase in social engineering - deceptive practices to obtain information There is an increase in social engineering - deceptive practices to obtain information There is a need to recognize internal threats as well as the external threats There is a need to recognize internal threats as well as the external threats

Education and Awareness Create an awareness among our user community Create an awareness among our user community Change beliefs, attitudes, and the behavior of users Change beliefs, attitudes, and the behavior of users The central support organization needs to hear from users The central support organization needs to hear from users

IT Security Office Typical Mission Statement: ……to provide technology tools, education, awareness, and guidance necessary for the agency to work towards a safe and secure technology environment for teaching and learning, research, outreach, and the conduct of university business.

IT Security Office Ensure educational and promotional programs Ensure educational and promotional programs Provide technology tools Provide technology tools Maintain a central web site Maintain a central web site Work closely with other support offices Work closely with other support offices Evaluate policies and procedures Evaluate policies and procedures Coordinate BIA/RA process Coordinate BIA/RA process Coordinate Business Recovery Plans Coordinate Business Recovery Plans

Security Awareness Program Implement a regular backup routine Implement a regular backup routine Consider physical security a priority Consider physical security a priority Install anti-virus software for protection Install anti-virus software for protection Know the web sites you utilize Know the web sites you utilize Select a password that ensures privacy Select a password that ensures privacy Be aware of exposures and danger Be aware of exposures and danger

Security Web Site Site at VA Scan Security WWW site Site at VA Scan Security WWW siteVA Scan Security WWW siteVA Scan Security WWW site Four main sections: Four main sections: –Know The Rules –Play It Safe –Lock It Down –Go To Class Daily security updates and news Daily security updates and news Reference to security organizations Reference to security organizations

Whats In The Future Expand the security programs and offerings Expand the security programs and offerings Continue with awareness and education Continue with awareness and education New and improved system and security tools New and improved system and security tools Review policies and procedures Review policies and procedures Improve offerings on the security web site Improve offerings on the security web site Seek input from our user community Seek input from our user community SECURITY IS EVERYBODYS BUSINESS