1 Copyright © 2010 MediaPro, Inc. MediaPro Introduction 5/15/2015 Gary Tidd – Pacific Northwest Rainmakers.

Slides:



Advertisements
Similar presentations
How Compliance Fits Sandra Dolson Wholesale Compliance Manager SLF Canada.
Advertisements

Innovation or Necessity? ISM 158 By: Sepehr Saeb.
Copyright © 2012, Big I Advantage®, Inc., and Swiss Re Corporate Solutions. All rights reserved. (Ed. 08/12 -1) E&O RISK MANAGEMENT: MEETING THE CHALLENGE.
Red Flag Rules: What they are? & What you need to do
Outsourcing HR Steve Wilner, MBA Over 20 years in the HR outsourcing industry Has helped hundreds of businesses achieve the benefits and ROI of outsourcing.
The Financial Modernization Act of 1999, also known as the Gramm-Leach-Bliley Act (GLBA) UNDERSTANDING AND DEVELOPING A STRATEGIC PLAN TO BECOME COMPLIANT.
KDE Employee Training. What IS a Data Breach? Unauthorized release (loss or theft) of Sensitive or Confidential Data, such as PII, PHI, etc. On site or.
BBB Technology and Computers Connection Group Presented by: Cary M. Root Root-InfoTech.com.
Sponsored by Lumension Ponemon Institute© Private & Confidential Document Page Security Mega Trends Survey Independently conducted by Ponemon Institute.
1 6 - Outsourcing Outsourcing. © Robert G Parker – UW-CISA 2010 Dealing with issues when a portion or all of the provision of technology services is performed.
1 3M Privacy Filters Justification Toolkit: How to Use The following presentation is meant to provide you with the most impactful data points to help you.
Information & Communication Technologies NMSU All About Discovery! Risk-Based Information Security Program at NMSU presented by Norma Grijalva.
© Chery F. Kendrick & Kendrick Technical Services.
What’s Next What We believe Who We Are Cloud Computing Big data Mobility Social Enterprise.
16254_08_2002 © 2002, Cisco Systems, Inc. All rights reserved. Cisco’s Security Vision Mario Mazzola Chief Development Officer August 29, 2002.
The Changing Face of Endpoint Security K Varadarajan Regional Manager, Enterprise Sales, Symantec Security Conference 2010_Bangalore.
WHY CHOOSE CEO-PE?  We employ International Association of Privacy Professionals (IAPP) Certified and Health Insurance Portability & Accountability Act.
SilentWhistle Overview June 22, Allegiance at a Glance Headquarters: Salt Lake City, Utah 700+ companies; 3 million+ employees & students Global.
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Security Policies and Implementation Issues.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
Saks Gloweli Capital Saks Gloweli Capital is the Banking and Finance division of Saks Gloweli Consulting. It offers clients a range of financial advisory.
Solution Briefing Business Productivity in Action Keynote.
Company LOGO Copyright Carrie Kerskie Data Breach & Identity Theft By Carrie Kerskie Kerskie Group, Inc.
Information Security Information Technology and Computing Services Information Technology and Computing Services
External Threats to Healthcare Data Joshua Spencer, CPHIMS, C | EH.
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
Social Media Jeevan Kaur, Michael Mai, Jing Jiang.
David Overton Head of Small Business Technology – Head of Small Business Technology – Microsoft solutions for.
Copyright © IRI, Confidential and proprietary. Expanding Your Training Outlook with E-Learning IRI eSuite See - Act – Win.
BITS Proprietary and Confidential © BITS Security and Technology Risks: Risk Mitigation Activities of US Financial Institutions John Carlson Senior.
Copyright © 2009, Synygy Inc., All Rights Reserved. Confidential Information.
STANDARD 5.3 Objective 3 Students will explain and understand the need for confidentiality.
ENCRYPTION Team 2.0 Pamela Dornan, Thomas Malone, David Kotar, Nayan Thakker, and Eddie Gallon.
Pg 1 of 25 AGI IP-Based Network Solutions Phil Flores Major Account Manager – Cisco Systems, inc.
R ed F lag R ule Training for the Medical Industry © Chery F. Kendrick & Kendrick Technical Services.
Managing Data Against Insider Threats Dr. John D. Johnson, CISSP.
Protecting Your Business! SBA Ft. Lauderdale November 15, 2006 Gregory Levine, Sr. Director Marketing.
Protecting Your Organization Identity Theft and Data Breach.
Kellie E. Tomeo, Esq Rampart International, LLC. AdvantageChallenge Increase existing security personnel productivity Increase existing facility personnel.
Put your company logo here Confidential Data Upgrade from 8.x to 9.0.
IT Professionalism Ethics Modified by Andrew Poon.
Cloud Computing Security Keep Your Head and Other Data Secure in the Cloud Lynne Pizzini, CISSP, CISM, CIPP Information Systems Security Officer Information.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Fraud and Risk in the Electronic Payment Space Michelle Marshall-Thompson VP, Fraud/Risk Officer FirstMerit Merchant Bankcard.
Deming’s 14 Principles W. EDWARDS DEMING. THE DEMING CHAIN REACTION Improve Quality Costs decrease because of less reword, fewer mistakes, fewer delays,
Managing your Institution-Specific HIPAA Compliance Policies and Procedures Cutting Edge Issues Thursday, December 13, 2007.
Information Security General Awareness Training Module 1 – Introduction For The UF HSC Workforce.
Strong Security for Your Weak Link: Implementing People-Centric Security Jennifer Cheng, Director of Product Marketing.
Restaurant 1. 2 There are several different types of restaurant classifications, including: Family Style Fine Dining Fast Food Buffet.
Cyber Security in the Mobile Era KEEPING ENTERPRISE DATA SAFE IN THE BYOD ERA.
Legal, Regulations, Investigations, and Compliance Chapter 9 Part 2 Pages 1006 to 1022.
Current risk and compliance priorities for law firms PETER SCOTT CONSULTING.
1© Copyright 2012 EMC Corporation. All rights reserved. Next Generation Authentication Bring Your Own security impact Tim Dumas – Technology Consultant.
Copyright © 2013, SAS Institute Inc. All rights reserved. INTRODUCTION A review of the key industry threats and responses ahead Survey of 250 respondents.
Welcome to the ICT Department Unit 3_5 Security Policies.
Retail & Service 1. 2 The Retail & Service industry encompasses a wide variety of businesses. This segment includes: Businesses engaged in selling goods.
LINKAGES BETWEEN INSTITUTIONS OF HE, VET AND LABOUR MARKET MR NIKOS IOANNOU.
Kansas overseas careers reviews
Combating Identity Fraud In A Virtual World
Information Security Program
An Update on FERPA and Student Privacy
E&O Risk Management: Meeting the Challenge of Change
Lessons Learned in Managing IT Risk
Forensics Week 11.
Information Security based on International Standard ISO 27001
Cyber Issues Facing Medical Practice Managers
Clemson University Red Flags Rule Training
Compliance in the Cloud
Guidelines for building security policies. Building a successful set of security policies will ensure that your business stands the best possible chance.
Presentation transcript:

1 Copyright © 2010 MediaPro, Inc. MediaPro Introduction 5/15/2015 Gary Tidd – Pacific Northwest Rainmakers

Our Value Proposition Founded in 1993, over 17 years experience Innovative instructional design & performance-based instructional strategies Developed with well-known SME and industry consortium Award-Winning Courseware Design -over 100 awards for courseware excellence 22 Copyright © 2010 MediaPro, Inc. About MediaPro

Our Value Proposition “Seattle Fraud Spree” – 11/29/2010 “Cleveland Federal Reserve Hacked” – 11/19/2010 “37 Money Mules Arrested” – (Malware) “ID Theft – It’s Who You Know” – 12/01/ Situation Today

Our Value Proposition “An information security awareness training program to be an essential tool for all companies, regardless of size.” - Gartner “Lack of IT security awareness training is the main obstacle to an efficient security program” - Ernst & Young “Nearly 90 percent of organizations that have implemented awareness training for remote and mobile workers believe that the number of security breaches they’ve encountered has been reduced.” – CompTIA “80-90% of all security failures are the result of human error, incompetence or poor procedures.” Andrew M. Plato, CISSP, CISM “Data protection training is not an option – it’s a necessity!” - TRUSTe 44 The Human Element

Our Value Proposition Get Compliant Refresh and Upgrade Protect Reputation / Earn Trust Lower Risk / Avoid Fines Complete the Security Strategy 55 Copyright © 2010 MediaPro, Inc. Why onGuard Training?

66 Copyright © 2010 MediaPro, Inc.  Security Basics  Privacy Awareness  Privacy Awareness - COPPA  Privacy Role-Based Awareness  Human Resources  IT Professionals  Call Centers  Sales & Marketing  Complying with HIPAA  Security Awareness  Security Awareness with Privacy Principles  PCI Awareness  Identity Theft Red Flags  Medical Identity Theft Red Flags  Remote and Mobile Computing  Responsible Social Networking Partial onGuard Courseware Library

onGuard Awareness Materials 77 Reinforce The Message Supplemental awareness materials will reinforce the message and the training.

Our Value Proposition “Employee negligence (42%) and broken business processes (33%) are considered the top two threats to data.” – Ponemom Institute and Vontu, “U.S. Confidential Data at Risk Survey” “Employee misconduct and unintentional actions, like errors and omissions, are the greatest cause of data security breaches.”- Deloitte & Touche “According to a recent study of over 700 IT security practitioners, 71% believe that their employees frequently put their organization’s confidential data at risk.” – Dell Computer “Technology alone cannot address one of the most difficult problems to manage in security: the human factor.” – Forrester Research “Investing time and money into securing the organization and its customers can be completely undermined if employees don’t understand their role in the security plan.” - Luis Navarro, Sr. Security Consultant, Symantec 88 Industry Confirmation of Need 8

Some of Our Satisfied Clients 99 Copyright © 2010 MediaPro, Inc.

Our Value Proposition Questions? 10

Our Value Proposition For more information: Contact: Gary PNWRainmakers.com Phone: Pacific Northwest Rainmakers 11