Oct 4, 2006Dept Security Contacts Training1 Security Roles and Responsibilities Harvard Townsend Interim University IT Security Officer

Slides:



Advertisements
Similar presentations
Pennsylvania BANNER Users Group 2007 Disaster Recover For The Financial Aid Environment.
Advertisements

Jack Schmidt and Mark Kaletka Fermilab NLIT 2009.
TECHNICOOL A Technology Safety Program © 2011 PCAV.
Glenvar Community Action Team. Who Are We and What Do We Do?  Community members (primarily students)  Help teens make good choices  Work to education.
Follow-up on an Interview & not hearing from a recruiter
SO WHAT DOES THE AUP MEAN FOR ME…??? A Presentation for Students in Grades 3-5.
Protecting children online  How can you protect your child online?  Are you aware of the dangers?  Do you know what you can put in place to protect.
Copyright 2003, Christine L. Abela, M.Ed. I’m failing… help! Straight facts to help you try to rebound!
Adult Social Care Budget Moira Wilson Interim Director of Care and Support.
Privacy and Information Security Training ( ) VUMC Privacy Website
ELOC Bank Table Top Exercise Executive Leadership of Cybersecurity Austin, TX December 3,
Know your Contractual Rights By The United School Employees of Pasco.
Role of the Coordinator. Touch the Heart of A Child 2 Coordinators Develop strategies for campaign within your campus unit Recruit Team Coordinator for.
This week is anti-bullying week.
Internet Safety/Cyber Ethics
Security Awareness Lloyd Guyot – Steelcase Ed Jaros – Tenundra Inc. July 17, 2003.
1 of 2 Going on vacation requires careful preparation and there are a number of things you should do at the office before taking extended time off. This.
ONLINE SAFETY Online safety Money Works: Level 1 Topic 3.
Role of the Coordinator. Touch the Heart of A Child 2 Coordinators Develop strategies for campaign within your campus unit Recruit Team Coordinator for.
1 of 2 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
SIRT Contact Orientation Security Incident Response Team Departmental Security Contacts April 16, 2004.
How Does it Work & Is It Right For Me?
A Freshman Seminar Workshop Developed by Computer and Telecommunication Services A Freshman Seminar Workshop Developed by Computer and Telecommunication.
Have your say? about charging Social Care and Inclusion.
E-Safety Quiz Keeping safe online! A guide for parents & children.
Grade 5 Student Assistants
CBLE Relationships with Administration, Staff, Students and Parents.
Teenangel Gabriella. AIM is an instant messaging system. You have to be thirteen years old to use AIM. Besides sending messages, AIM is also used to tell.
Security Awareness Norfolk State University Policies.
Information Security Training for Management Complying with the HIPAA Security Law.
IT Update Faculty Senate September 1, 2004 University of Houston Information Technology.
11 An Orientation Session for Individuals with Developmental Disabilities and Families What to Expect during Your ReBAR Assessment Interview.
A summary of feedback from service users and carers: Adult Social Care – what does good look like?
Personal Budgets People First Bath and North East Somerset.
By: 9E Caring Ambassadors Pleasant Unpleasant High FEELING Low ENERGY.
IT Security Essentials Lesley A. Bidwell, IT Security Administrator.
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
Frequently Asked Questions about Strikes and Job Security If the union gets in here I can’t ever lose my job because the union will get it back for me.
Safety! Jessica Brown. What Is the Point of Having an Online Space? It needs to be Safe Clean And Efficient.
By Diana Lenartiene, Ed. S.. Emoticons Polling Status/Away Raise Hand Chat Area Volume Control.
SCHOLARLY COMMUNICATION EXPRESS ALCTS Discussion ALA Annual July 28, 2014 Sherri L. Barnes Scholarly Communication Program Coordinator UC Santa.
The FAO Role in Retention EASFAA May 2010 Allene Begley Curto Springfield College.
Security and Privacy Policy The World Has Changed! Common Solutions Group Jack McCredie January 9, 2004.
Safe Computing Practices. Why would anyone want to hack me? 1 Krebs, Brian - “The Scrap Value of a Hacked PC, Revisited”, 12 Oct 2012,
BEING CYBERSMART! ABOUT ONLINE SAFETY AND SECURITY AT SCHOOLS Redelivery Part 1: The AUP.
1 Choosing the Right Wand (or for those who like boring titles – Managing Account Passwords: Policies and Best Practices) Harvard Townsend IT Security.
ME AS A LEADER BLOCK 3. I am 18 years old, I have an older brother and a younger brother, I also work as a waitress at Rams Horn and I plan to go to college.
What is it? & What can I do to prevent it?. Cyber bullying is when somebody is teasing, taunting, or harassing someone else over the computer. Whether.
Frontline Enterprise Security
1 Executive Leadership of Cybersecurity Austin, TX December 3, 2014 ELOC Bank Table Top Exercise.
Safe Computing Practices. Why would anyone want to hack me? 1 Krebs, Brian - “The Scrap Value of a Hacked PC, Revisited”, 12 Oct 2012,
INTERNAL CONTROLS What are they? Why should I care?
By John Williams. Why Secure Passwords Matter Passwords protect everything about you online. Once those passwords are discovered and used by someone else.
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
Data Security at Duke DECEMBER What happened: “At this time, we have no indication that research data or personal data managed by Harvard systems.
Library Orientation  Before School 1. Library is open by 6:30 AM 2. Do NOT need a pass 3. Will need to sign in 4. Must leave the library to.
ICT and the Law Mr Conti. Did you see anything wrong with that? Most people wouldn’t want that sort of information posted in a public place. Why? Because.
CYBERBULLYING. What kind of legacy will you choose? Last week we learned through Rachel’s Challenge how one person can have a positive impact on others.
Care and Support In-house Service Review Fact Finding Summary February 2013 Easy Read Deb Williams – Group Manager.
THE “COLLEGES I AM THINKING ABOUT” LIST IN YOUR FAMILY CONNECTIONS ACCOUNT.
Economics Vocabulary. What is Economics? The study of production (making of), distribution (selling of), and consumption of (using of) goods and services.
Designed By: Jennifer Gohn.  “Getting people to do things they wouldn’t ordinarily do for a stranger” –Kevin Mitnick  There are several different.
Haringey People First / My Rights Feb Stop punishing the vulnerable for the mistakes of politicians. Following the last PB when Beverley informed.
Aged and Disabled Waiver Conflict-Free Case Management November 1, 2015.
Adult Skills Induction. Welcome to learndirect We are a training provider with 15 years experience at helping people gain qualifications and improve their.
HIPAA Privacy What Every Staff Member Needs to Know.
 Being free from public attention that means not being watched or disturbed by other people.
Data Protection Regulation
Creating your online identity
Keeping Our Data Secure
Presentation transcript:

Oct 4, 2006Dept Security Contacts Training1 Security Roles and Responsibilities Harvard Townsend Interim University IT Security Officer College Court 114

Oct 4, 2006Dept Security Contacts Training2 sent to IT help desk: “I have spent an unprecedented ammount of money attending K-State. Some of this money went to maintaing my . It is my account. I pay for it. I should get to make the decisions on when to change my password. This is a communist policy. I no longer support you in anything you do. If I want to let someone hack my account by leaving my password the same, so be it. That is the beauty of living in America, CHOICE. You have stolen my rights. I could not be more furious. This has gone too far. You people have violated my rights again and again. I won't stand for it!!! I want to have control of my own account. This is not nazi germany, this is not communist china.

Oct 4, 2006Dept Security Contacts Training3 I am a grown adult capable of making my own decisions. Take your mandatory password change and cram it directly up your communist a….!!! This America, LAND OF THE FREE AND HOME OF THE BRAVE!!! I should be free to make my own informed decisions on when and how to manage my own account and I'm d… sure brave enough to tell you how obsurd your mandates are!!! Give the students the responcibility to make our own decisions that effect ONLY US!!! You should have no say in what I do, or what I choose not to do. College is the time to learn how to live effectivly. Who do you think you are? My mom? Are you gonna be there to hold my hand when things go wrong for me in the future? Give me a f….. break!!! Remove these policies, at least for me and anyone else who requests it. It's my account and I will manage it however I see fit.”

Oct 4, 2006Dept Security Contacts Training4 Who is responsible for IT security? “Security is not just the CIO’s problem; it is everyone’s problem. And everyone is responsible for the solution.” Diane Oblinger Brian Hawkins

Oct 4, 2006Dept Security Contacts Training5 sent to IT help desk: “I have spent an unprecedented ammount of money attending K-State. Some of this money went to maintaing my . It is my account. I pay for it. I should get to make the decisions on when to change my password. This is a communist policy. I no longer support you in anything you do. If I want to let someone hack my account by leaving my password the same, so be it. That is the beauty of living in America, CHOICE. You have stolen my rights. I could not be more furious. This has gone too far. You people have violated my rights again and again. I won't stand for it!!! I want to have control of my own account. This is not nazi germany, this is not communist china.

Oct 4, 2006Dept Security Contacts Training6 I am a grown adult capable of making my own decisions. Take your mandatory password change and cram it directly up your communist a….!!! This America, LAND OF THE FREE AND HOME OF THE BRAVE!!! I should be free to make my own informed decisions on when and how to manage my own account and I'm d… sure brave enough to tell you how obsurd your mandates are!!! Give the students the responcibility to make our own decisions that effect ONLY US!!! You should have no say in what I do, or what I choose not to do. College is the time to learn how to live effectivly. Who do you think you are? My mom? Are you gonna be there to hold my hand when things go wrong for me in the future? Give me a f….. break!!! Remove these policies, at least for me and anyone else who requests it. It's my account and I will manage it however I see fit.”

Oct 4, 2006Dept Security Contacts Training7 I am a grown adult capable of making my own decisions. Take your mandatory password change and cram it directly up your communist a….!!! This America, LAND OF THE FREE AND HOME OF THE BRAVE!!! I should be free to make my own informed decisions on when and how to manage my own account and I'm d… sure brave enough to tell you how obsurd your mandates are!!! Give the students the responcibility to make our own decisions that effect ONLY US!!! You should have no say in what I do, or what I choose not to do. College is the time to learn how to live effectivly. Who do you think you are? My mom? Are you gonna be there to hold my hand when things go wrong for me in the future? Give me a f….. break!!! Remove these policies, at least for me and anyone else who requests it. It's my account and I will manage it however I see fit.”

Oct 4, 2006Dept Security Contacts Training8 Cyber Security Awareness Month Oct. 4 – departmental security contact training IT Tuesday articles Promoting the IT security awareness student video competition “Ask a security geek” table in the Union Oct. 11/18

Oct 4, 2006Dept Security Contacts Training9 IT Security Responsibilities CIO IT Security Officer Network Security analyst SIRT Departmental security contact IT support staff iTAC Users

Oct 4, 2006Dept Security Contacts Training10 IT Security Responsibilities CIO IT Security Officer Network Security analyst SIRT Departmental security contact IT support staff iTAC IRMC Users

Oct 4, 2006Dept Security Contacts Training11 SIRT Responsibilities Proactive, reactive, and advisory roles Incident response Coordinate/communicate with college/unit Request restoration of network access for blocked computers Develop policies, procedures, standards,etc. Assist with training, awareness And…

Oct 4, 2006Dept Security Contacts Training12 IT Security Responsibilities CIO IT Security Officer Network Security analyst SIRT Departmental security contact IT support staff iTAC IRMC Users

Oct 4, 2006Dept Security Contacts Training13 Departmental Security Contacts Liaison between department and SIRT Facilitating: –Communication, user awareness –Preventative measures –Incident response Watch block notifications, help remediate Stay informed Know your SIRT representative

Oct 4, 2006Dept Security Contacts Training14 IT Security Responsibilities CIO IT Security Officer Network Security analyst SIRT Departmental security contact IT support staff iTAC IRMC Users

Oct 4, 2006Dept Security Contacts Training15 IT Support Staff Departmental and central IT Manage technologies Support users Implement preventative measures Implement policies Assist with incident response

Oct 4, 2006Dept Security Contacts Training16 iTAC IT Help Desk IT Tuesday newsletter Campus communications Training

Oct 4, 2006Dept Security Contacts Training17 IRMC Information Resource Management Council Recommend policy Process available at VPAST can designate interim policies

Oct 4, 2006Dept Security Contacts Training18 Users Protect information –Personal information –University information Protect eID password Protect personal computer Use good security practices – Know and follow policies and laws –