IT GOVERNANCE COMMITTEE MEETING February 19, 2008.

Slides:



Advertisements
Similar presentations
Mobile device security Practical advice on how to keep your mobile device and the data on it safe.
Advertisements

INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Copyright © 2012, Big I Advantage®, Inc., and Swiss Re Corporate Solutions. All rights reserved. (Ed. 08/12 -1) E&O RISK MANAGEMENT: MEETING THE CHALLENGE.
What is HIPAA? This presentation was created by The University of Arizona Privacy Office, The Office for the Responsible Conduct of Research on March 5,
Trends for 2008 And Trivia from 2007 Terry Bledsoe January 17, 2008.
1 Electronic Information Security – What Researchers Need to Know University of California Office of the President Office of Research May 2005.
For further information computersecurity.wlu.ca
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Emerging Internet Threats Graham Connolly Websense Territory Manager Australia & New Zealand.
Copyright © 2014 Merck Sharp & Dohme Corp., a subsidiary of Merck & Co., Inc. All rights reserved. In practice, how do we recognize a potential Privacy.
Safety Meeting Cell Phone Safety EDM Services, Inc. May 2008.
DHS SECURITY INCIDENT REPORTING AND RESPONSE SECURITY INCIDENT REPORTING AND RESPONSE DHS managers, employees, and other authorized information users.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Policies.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Brian Bradley.  Data is any type of stored digital information.  Security is about the protection of assets.  Prevention: measures taken to protect.
HIPAA What’s Said Here – Stays Here…. WHAT IS HIPAA  Health Insurance Portability and Accountability Act  Purpose is to protect clients (patients)
Mobile Internet By Louise and Laura. Mobile Internet Traditionally, access to the Web has been via fixed- line services on laptops and desktop computers.
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
Morris Bennett Altman Director of Network Services Internet Security Officer Queens College, CUNY Are You Exposed? Network Security.
Office 365: Efficient Cloud Solutions Wednesday March 12, 9AM Chaz Vossburg / Gabe Laushbaugh.
Company LOGO Copyright Carrie Kerskie Data Breach & Identity Theft By Carrie Kerskie Kerskie Group, Inc.
Personnel Trends Terry Bledsoe March 31, 2008.
SEC835 Database and Web application security Information Security Architecture.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Copyright 2009 Trend Micro Inc. Classification 9/9/ Corporate End User Study Employee Online Behavior.
MANAGEMENT INFORMATION SYSTEMS Data Raw facts and figures. Information Knowledge gained from processing data. Management information system (MIS) Organized.
Anderson School of Management University of New Mexico.
Case Study: Department of Revenue Data Breach National Association of State Auditors, Comptrollers and Treasurers March 21, 2013.
T ECHNOLOGY IN C ATAWBA C OUNTY R EPORT TO THE C ATAWBA C OUNTY B OARD OF C OMMISSIONERS P REPARED B Y T HE T ECHNOLOGY D EPARTMENT F EBRUARY 2009.
Security considerations for mobile devices in GoRTT
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
Cloud Computing Characteristics A service provided by large internet-based specialised data centres that offers storage, processing and computer resources.
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
Federated or Not: Secure Identity Management Janemarie Duh Identity Management Systems Architect Chair, Security Working Group ITS, Lafayette College.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
Managing Data Against Insider Threats Dr. John D. Johnson, CISSP.
New Identity Theft Rules Rodney J. Petersen, J.D. Government Relations Officer Security Task Force Coordinator EDUCAUSE.
Kevin Kesterson, Chair, Dane County Board of Supervisors Diann Danielsen, Manager, Dane County Land Information Office WLIA Annual Conference March 14,
Computer Viruses and Worms By: Monika Gupta Monika Gupta.
IT GOVERNANCE COMMITTEE MEETING May 15, 2008 Tidbits of Information.
Small Business Security Keith Slagle April 24, 2007.
Data Breach: How to Get Your Campus on the Front Page of the Chronicle?
Topic 5: Basic Security.
Desktop Security: Making Sure Your Office Environment is Secure.
Last Minute Security Compliance - Tips for Those Just Starting 10 th National HIPAA Summit April 7, 2005 Chris Apgar, CISSP – President Apgar &
Texas Technology Forum The Future of Mobile Technology Trends and Issues July 16, 2009.
Lessons Learned from Recent HIPAA Breaches HHS Office for Civil Rights.
Session 13 Cyber-security and cybercrime. Contents  What’s the issue?  Why should we care?  What are the risks?  How do they do it?  How do we protect.
 Computer News  Identity Guard  One meeting a month (2 nd Wednesday)  Website &  
Cyber Security in the Mobile Era KEEPING ENTERPRISE DATA SAFE IN THE BYOD ERA.
IS3220 Information Technology Infrastructure Security
Computer Security Sample security policy Dr Alexei Vernitski.
Mobile Device Security Management Leyna Belinsky.
Mobile device security Practical advice on how to keep your mobile device and the data on it safe.
2014 From Phish to Phraud Kat Seymour October 10, 2014 #GHC
Visibook is instant, simple, and dynamic appointment booking We're headquartered in San Francisco, California "Visibook is awesome. My entire studio was.
Properly Safeguarding Personally Identifiable Information (PII) Ticket Program Manager (TPM) Social Security’s Ticket to Work Program.
Combating Identity Fraud In A Virtual World
E&O Risk Management: Meeting the Challenge of Change
Information Technology 2016 Budget Presentation
Information Security Seminar
Securing Information Systems
© EIT, Author Gay Robertson, 2017
Technology Topics & Trends
Data Protection Scenarios
Red Flags Rule An Introduction County College of Morris
Introduction to the PACS Security
Cybersecurity at WAJ What is it? Are we at risk?.
School of Medicine Orientation Information Security Training
Presentation transcript:

IT GOVERNANCE COMMITTEE MEETING February 19, 2008

IT GOVERNANCE COMMITTEE MEETING February 19, 2008

PROJECT UPDATE What’s going on in Catawba County……………..

PROJECT UPDATE What’s going on in Catawba County…………….. E911 Telephone Replacement E911 CAD Upgrade E911 Mapping Project AVL and Mobile for EMS and Law Enforcement Emergency Services Badging Maintenance Work Order System Unified Payment System

PROJECT UPDATE What’s going on in Catawba County…………….. eConnect/Tidemark Replacement Tax Mapping Project Land Records Upgrade Internet Bandwidth Increase Wireless Connectivity Firewall Upgrade SAN Expanded CAS (Citizens Alert System)

PROJECT UPDATE What’s going on in Catawba County…………….. Local Update of Census Addresses(LUCA) PeopleSoft Enterprise Initiative – Special Needs/Critical Care Database – Portal Implementation – Workflow Implementation – Online Expense Reporting Day to Day – Keep it Running Webpage…….Update…….Again………

? ? ? ? ? ? ? PROJECT UPDATE What’s going on in Catawba County……………..

View New York City Headquarters in the Positive

Reception……………..

Cafeteria

snack stations throughout Micro kitchens &

Writer Elizabeth Gilbert talks about her latest book Eat, Pray, Love

Office Space…………..

Massage chair…………. …………………….in gaming area

Google Engineer of the Future Creativity training……….

Bouncing an exercise ball….

Work Space…………..

Massages too??????

View What can we learn from …… in the Positive

MOBILE COMPUTER EQUIPMENT POLICY Protecting Our Resources……………..

The new personal computer….. The simple cell phone is a relic Laptops replace desktops personal use / business use

Government Attack Trends from 2007 Government accounted for 26 percent of data breaches that could lead to identity theft. Of the potential infections by the top 50 malicious code samples, 65 percent were threats to confidential information. The primary cause of data breaches that could lead to identity theft was the theft or loss of a computer or other medium used for data storage or transmitting, such as a USB key. Hacking was responsible for 73 percent of identities exposed during the period. 36% of the top attacks were SMTP-based. 46% of malicious code that propagated did so in attachments

A laptop containing thousands of people's personal information is missing in Cabarrus County They don’t know if it was stolen or destroyed in traffic contains names, address, phone numbers and social security numbers of approximately 28,000 people

The identity theft risk from a stolen Wake County EMS laptop is far worse than originally estimated 5,000 people whose personal information -- including Social Security numbers, addresses and ages -- included personal information of more than 3,400 EMS and firefighters from across the county Wake EMS officials waited eight days to officially report the loss to WakeMed police

Implications…… Government records are a big source of identity threat and we must recognize that fact. Good policies and procedures are needed for all devices. Mobile devices offer additional security challenges. Mobile devices require special security training. Training in security practices needs to be ongoing. Security practices will at times be a burden but users must understand the importance.

MOBILE COMPUTER EQUIPMENT POLICY Reviewing the Draft…………….. Issues

? Reviewing the Draft…………….. Hands-free devices, how do they fit in? (ie, inspectors with cell phones) Streaming of non-business related news, music, ballgames – Should it be added Employees sharing equipment on an infrequent basis. Guest speakers using equipment “Employee use cannot be in violations with good public policy or employment” What does that mean? DOES THE POLICY ADDRESS THE ISSUES?

Reviewing the Draft…………….. Issues

IT NEXT MEETING – MARCH 20TH Notice the Time Change: 2:30 Time Change for April: 1:30 – 3:00 TIME CHANGE FOR APRIL 17TH