SME Security. Articulate the major security risks and legal compliance issues for an SME.Explain and justify approaches of investment on InfoSec controls,

Slides:



Advertisements
Similar presentations
Module 1 Evaluation Overview © Crown Copyright (2000)
Advertisements

Fieldwork assessment The difference between AS and A2 David Redfern
PhoenixPro Procurement. technology. contracts. projects.
Information Technology – Guidelines for the Management of IT Security
Senior Secondary Reform Team, DECS Curriculum Services Task design – SACE Stage 2 Workshop term Part 1.
1 Introduction Welcome! Format of day Response to previous requests from clients Amendment to schedule Using Information Security for Business Advantage.
Add client logo Elliot Harris FCA DChA Charities Partner Trustees - The Roles, Responsibilities and Challenges a presentation.
Short presentation of a project proposal for the 6 th call Space in FP7 „Draft proposal title“ Name, Organisation type of organisation (SME, research centre,
© 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential 14854_10_2008_c1 1 Holistic Approach to Information Security Greg Carter, Cisco Security.
Determining CLIMASP Competencies Jerash University Development of Interdisciplinary Program on Climate Change and Sustainability Policy- CLIMASP Development.
Integrated Coastal Zone Management Unit 7: Integrated coastal planning.
Risk Management a Case Study DATALAWS Information Technology Law Consultants Presented by F. F Akinsuyi (MSc, LLM)MBCS.
OAUG SOX Panel Krista Ladd Oracle Applications Manager Silicon Image, Inc.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Creation of Policies, Part.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Creation of Policies, Part.
Overview and Introduction
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
SecureAware Building an Information Security Management System.
Discussing “Risk Analysis in Software Design” 1 FEB Joe Combs.
Managing Risk. What is Risk Risk is the chance of things happening that could have an impact on the outcomes it achieves, or on the objectives of the.
CMGT400 Intro to Information Assurance and Security (University of Phoenix) Lecture, Week 5 Tom Olzak, MBA, CISSP.
INFORMATION ASSURANCE USING C OBI T MEYCOR C OBI T CSA & MEYCOR C OBI T AG TOOLS.
SSD: Cryptography. Learning Outcomes After the scenario has been completed, you are expected to be able to: Explain the relative strengths of encryption.
© 2013 Cambridge Technical CommunicatorsSlide 1 ISO/IEC Standard for Information Security Management Systems.
Systems and Software Consortium | 2214 Rock Hill Road, Herndon, VA Phone: (703) | FAX: (703) Best.
Muhammad Waqas Event Management Lecture 29. Muhammad Waqas Recap I.Public Relations Planning II.Public Relations Tools III.Effectiveness and PR Excellence.
Why do we have projects Three stages of a project Defining and analysing the problem 04/05/11 Projects.
IT Strategy for Business © Oxford University Press 2008 All rights reserved Chapter 12 IT Security Strategies.
© Pearson Education Limited 2015
McGraw-Hill/Irwin © 2013 The McGraw-Hill Companies, Inc., All Rights Reserved. Chapter 11 Computer Crime and Information Technology Security.
Energize Your Workflow! ©2006 Merge eMed. All Rights Reserved User Group Meeting “Energize Your Workflow” May 7-9, Security.
Quality Management Process Model
South Wales Cyber Security Cluster A networking group with a purpose Membership Open to anyone with an interest in Cyber Security.
SecSDLC Chapter 2.
International Security Management Standards. BS ISO/IEC 17799:2005 BS ISO/IEC 27001:2005 First edition – ISO/IEC 17799:2000 Second edition ISO/IEC 17799:2005.
Aarhus Convention Task Force on Electronic Information Tools Geneva, January 2004 Chris Jarvis Information Policy Manager.
Chapter 8 Process Implementation Reference: Tan, A. (2007). Business Process Reengineering in Asia: A Practical Approach, Pearson Education, Singapore.
Regional Quality Environmental Management Support.
Visibility. Intelligence. response Information Security: Risk Management or Business Enablement? Mike Childs Vice President Rook Security.
© Plan Plan’s Security Framework – A Refresher. © Plan Understanding Ourselves Values - Child Rights, Impartial, Neutral, Sensitive Mandate - Child Centred,
CYBER SECURITY PRACTICES: AN EXPERT PANEL DISCUSSION February 12, 2015 Harvard Business School Association of Boston.
Session 12 Information management and security. 1 Contents Part 1: Introduction Part 2: Legal and regulatory responsibilities Part 3: Our Procedures Part.
Cyber Exposure – what it is and how to manage it Narrated by Doug Nagan Understanding Cyber Exposure ©2015 all rights reserved – Nagan Research Group.
1.  1. Introduction  2. Policy  3. Why Policy should be developed.  4. www policies 2.
BP Centro Introduction and market entry to North-East Europe.
Primary Steps for Achieving ISO Certification.
On completion of the scenario, students will be able to: Learning Outcomes 1 Critically analyse and prioritise information security risks. 2 Systematically.
Articulate the major security risks and legal compliance issues for a Fire and Rescue Service. Identify and justify technical controls for securing remote.
MGT 448 Week 2 Learning Team Comprehensive Analysis Outline and Presentation (Includes Both Powerpoint And Paper) To purchase this material click below.
Understanding Standards: Nominee Training Event
Security Management in Practice
IS YOUR ORGANISATION’S INFORMATION SECURE?
On-Line Meeting 2 October 25, 2016.
Office 365 Security Assessment Workshop
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Strategic Marketing, 3rd edition
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Managing Director and Head of Group Legal & Secretariat DBS Bank
Report Writing.
Task design – SACE Stage 2
GDPR Awareness and Training Workshop
Information Security based on International Standard ISO 27001
IS4550 Security Policies and Implementation
EC Strategy, Globalization, and SMEs
Must cost less than possible Impact
Cyber Risk & Cyber Insurance - Overview
RISK MANAGEMENT MARKET & SOCIAL RESEARCH
Apply.
Click Summary Value Button to Show Source of Integral or Time
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Presentation transcript:

SME Security

Articulate the major security risks and legal compliance issues for an SME.Explain and justify approaches of investment on InfoSec controls, including ROSI.Explain the key features of ISO and risk assessment. Explain key features and requirements for an Information Security culture and suggest activities for developing it. Analyse and discuss the relevance of Cyber Essentials and BMIS to the scenario.Identify and outline key policies required and HR processes. Identify and justify technical controls for securing remote access and data governance. Learning Outcomes

1.Information security concepts / controls including: Confidentiality, integrity, availability Information assets, threat, vulnerability, impact, likelihood, risk 2.Teamwork. Pre-Requisite Knowledge

Quiz Introduction

Quiz Click the Quiz button to edit this quiz

SME Security Leading Edge Removals is an SME based locally in Skelmersdale. Provides high quality services both to and from the UK and international destinations. Grown from a local and regional removals company to starting international removals. The company is ambitious and sees opportunities to expand. SME Security

Information Security The management team does not fully appreciate the information security risks or the measures needed. The company has limited financial and technical resources and the most important thing for them is their need must fit their revenue. Security Measures in place Leading Edge Removals Adequate Security Information Security: Not Appreciated?

Interview Video Transcript

Your Task: Stage 1

Your Task: Stage 2

You have articulated the major security risks and legal compliance issues for an SME. Explained and justified the approaches of investment on InfoSec controls, including ROSI. Explained the key features of ISO and Risk Assessment. Explained key features and requirements for an Information Security culture and suggest activities for developing it. Analysed and discussed the relevance of Cyber Essentials and BMIS to the scenario.Identified and outlined key policies required and HR processes. Identified and justified technical controls for securing remote access and data governance. Summary