Hints and Tips for Surviving the MSc Project Mark Anthony MSc ISG Summer Conference September 2014.

Slides:



Advertisements
Similar presentations
Draft Change Management Strategy Framework and Toolkit An Overview TAU Workshop: Vulindlela Academy (DBSA) 12 April 2012 Presenter: Dr Patrick Sokhela.
Advertisements

Improving the Coherency and Focus of School Statistics Products Pete Whitehouse Head of Analytical Services Unit - Learning.
PRE-AUDIT/POST AUDIT PRESENTATION
Enterprise Security A Framework For Tomorrow Christopher P. Buse, CPA, CISA, CISSP Chief Information Security Officer State of Minnesota.
CIPD Profession Map Sarah Koppen Profession Map Project Executive
Outcomes focused regulation and compliance in practice Peter Scott Peter Scott Consulting
IS4799 Information Systems and Cybersecurity Capstone Project
Internet Management Consultants and Solution Providers Outstanding CMS Projects Lessons from the Front Line.
Enabling Access Across the Generations “Disability Equality Training eLearning for transition year students” Pat Coffey Vice Chair, Local Authorities Access.
AUDIT COMMITTEE FORUM TM ACF Roundtable IT Governance – what does it mean to you as an audit committee member July 2010 The AUDIT COMMITTEE FORUM TM is.
Agile insurance carrier - What the carrier has to look like? Glenn Lottering Senior Director, EMEA Insurance Product Strategy and Sales Consulting.
Making Sense of Assessments in HE Modules (Demystifying Module Specification) Jan Anderson University Teaching Fellow L&T Coordinator SSSL
Viewpoint Consulting – Committed to your success.
MSP course 2007 Phase 0 – Setting up Kumasi, Ghana 2008 Wageningen International.
CSCE790: Security and Privacy for Emerging Ubiquitous Communication system Wenyuan Xu Department of Computer Science and Engineering University of South.
Research and Museums Galleries Scotland KT Scotland: Policy and Practice Conference 23 April 2010 Alison Turnbull Head of Research & Standards.
Report Writing Format.
Customer Service Excellence Standard – adding value for your students Helen Loughran Libraries and Learning Innovation Leeds Metropolitan University
In conjunction with Minimising Risk, Maximising Benefit - EAUC 10th Annual Conference NetRegs: Environmental Compliance Help for Universities and Colleges.
Family/Whānau Caregiver Assessment and Approval Engaging with families to achieve better outcomes for children and young people.
1 European Conference on Training Strategies Kieran Cox -NSAI Education & Promotion-
Shared Services In The NGO Sector: Lessons we can learn from other sectors Dr Cameron Newton The Australian Centre for Philanthropy and Nonprofit Studies.
Career Techniques in IT Governance / Audit January 8, 2008 Sponsored by: Presented by: Colonial Properties Trust ITAC Solutions Outplacement Consulting.
Inclusion Ireland Annual Conference 28 March 2009 “Living Life to the Full” So where do Standards come in? Niall Byrne Deputy Director Office of the Chief.
FOOTPRINTS Organisations are continuously looking for Business, Partners, Alliances and Talented People Organisations are continuously looking for Opportunities.
1 The Senior Medicare Patrol (SMP) Program: What is an SMP Volunteer?
Demystifying the Business Analysis Body of Knowledge Central Iowa IIBA Chapter December 7, 2005.
Mary Donaghy & Judith Lees Managers, Mental Health & Children Project, Health & Social Care Board, Northern Ireland Damien Kavanagh Workshop A: Putting.
1 The Auditor’s Perspective Division of Sponsored Research Research Administration Training Series Presented by: Joe Cannella Audit Manager,
Working With Health And Developing the Local Offer Council for Disabled Children, May 2014.
Marketing Management Marketing Plan Prepared by Kathleen Porter.
Authors: Sarah Murphy, Irish Hospice Foundation ( Dr. Brendan O’Shea, General Practitioner and Associate Professor.
Professional Certificate in Electoral Processes Understanding and Demonstrating Assessment Criteria Facilitator: Tony Cash.
Chapter Fourteen Communicating the Research Results and Managing Marketing Research Chapter Fourteen.
P ROPOSALS AND F ORMAL R EPORTS By: Brittney Wotruba.
Kathy Corbiere Service Delivery and Performance Commission
Grant Proposal Writing
Strategies for making evaluations more influential in supporting program management and informing decision-making Australasian Evaluation Society 2011.
Fundamentals of Governance: Parliament and Government Understanding and Demonstrating Assessment Criteria Facilitator: Tony Cash.
Getting Useful Reviews
Tools for embedding sustainable development Tanya Nash Uned Datblygu Cynaliadwy Sustainable Development Unit
The New Junior Cycle – An Introduction. Starting in September, your son/daughter will do the current Junior Certificate exam in all subjects except English.
Name of presentation Improving health in Greenwich: Linking integrated health & social care with primary care.
CHANGE READINESS ASSESSMENT Measuring stakeholder engagement and attitude to change.
PROTECTING THE INTERESTS OF CONSUMERS OF FINANCIAL SERVICES Role of Supervisory Authorities Keynote Address to the FinCoNet Open Meeting 22 April 2016.
SUPPORTING PEOPLE PROVIDER FORUMS An overview of Supporting People’s new approach to Performance Monitoring and Quality Assurance.
Research Skills for Your Essay Where to begin…. Starting the search task for real Finding and selecting the best resources are the key to any project.
… because safeguarding children is everyone’s responsibility Enfield Safeguarding Children Board (ESCB) Annual Report 2014/15 Geraldine Gavin – ESCB Independent.
Trusting your organisation UK Card Fraud Conference 2012 Keith Dewey, 28 March 2012.
Managing Corporate Reputation Sarah Williams Senior Examiner December 2013 / March 2014 Assignment Brief.
The Common Assessment Framework (CAF) & Lead Professional (LP)
Software Engineering Process - II 7.1 Unit 7: Quality Management Software Engineering Process - II.
Implementing Digital Campaigns Clive Whysall CAM Examiner Assignment brief December 2013 / March 2014.
Managing Corporate Reputation Dr Yasmin K. Sekhon Level Verifier – Post Graduate Diploma Assignment briefing June and September 2014.
QUALITY CONTROL CAIRO 12 – 14 April One of the key characteristics is the degree of independence under which post- clearance audits are carried.
Latrobe.edu.au CRICOS Provider 00115M Pathways to Implementing Recommendations: Is there a Best Practice Model? Julie Kiroluch Senior Disability & Equity.
Strategic Communications Training Crisis Communications X State MDA 1.
CII Assignment Techniques A Half-Day Practical Course Mark Butterworth Risk West Copyright: Condie Risk Consultancy Ltd.
Working Together to Safeguard Children 2013
PowerPoint to accompany:
Web Lesson Contacting Your Congressperson
CCQ next phase of Regulation
Careers in IT.
CCQ next phase of Regulation
Web Lesson Contacting Your Congressperson
ISO management systems
History and Archives: just another marketing tool
Implementing a Quality Management System Approach
Quality Framework Overview
CCQ next phase of Regulation
Presentation transcript:

Hints and Tips for Surviving the MSc Project Mark Anthony MSc ISG Summer Conference September 2014

Mark Anthony MSc CISSP CISM Working as a Security Consultant for Capita since February 2011 Background In IT Project Management \ Business Analysis \ Information Security Solely working in Information Security since 2007 Passed ISO27001 Lead Auditor Exam in February 2007 Passed CISSP Exam in July 2007 Passed CISM Exam in December 2008 Started the MSc in 2009, finished this year ! Also passed CISA Exam in July 2014, (currently awaiting Verification)

Security Consultant “The functional role of the Security Consultant is to provide internal corporate security consulting services, develop and enhance policy, architecture and processes, assess business risks, promote security awareness and strengthen relationships with business units by creating value for business stakeholders.” Working with Local Authorities, Central Government Agencies, Financial Services Organisations and both small and Large Organisations.

Capita Capita is the UK’s leading provider of customer and business process management. We play a key role in clients operations delivering customer, administration and professional support services. FTSE 100 BPO and Professional Services Group 62,000 staff spread across over 350 sites in UK, Ireland, Channel Islands and India Over 20,000 client organisations with customer retention above 90% Consistent values across all engagements - focus always on positive business outcomes Capita IT Professional Services IT Professional Services formed by combining Capita Assurance and Testing, Smiths Consulting and Technophobia providing end to end capability from Programme and Project Management through Business Analysts to development and testing services We apply technology to drive through business change. We design innovative end-to-end solutions ensuring business programmes deliver to requirements. We maximise quality and reduce cost.

The MSc Project Decide on the project subject as early as you can. Think about what you want the project to investigate. Think about what questions you are asking. Think about any development, testing, surveys etc you may want to carry out.

My Project The Rise of The “Hacktivist” : An analysis of the Impact of politically motivated Hacking. Research the emergency of Politically Motivated Hacking (What, Who, Why etc.) Research the recent emergency of Anonymous\LulzSec (Where from, Why?) Analyse the impact to businesses from such hacking (Including Case Study) (What was the impact? Direct & Indirect Impacts?, lessons learned? ) Review the legislation in place, and the difficulties in investigation (Is it suitable, does it cover the crimes correctly, compare to US Legislation) Provide commentary on the future of politically motivated hacking (Have the recent arrests dissuaded the hackers ? What if the attacks become more localised ? Is this likely to fade\burn out?)

Time Management

Index Section ICover II Index III Preamble and Thanks IV Executive Summary 1 Introduction 1.1 The History of Hacking 1.2 Hackers V's Crackers 2 Emergence of Politically Motivated Hacking 2.1 Positive impact and critical acclaim 2.2 Tools utilised by Hacktivists 3 Impact to Business 3.3 Case study 4 Legislation 5 The Future of Politically Motivated Hacking 6 Conclusion Bibliography Appendices

Braindump Create an Outline based on the Index Split into multiple Documents based on the index Dump any thoughts, comments, quotes, references and URL’S into these sections Backup !

Plan Ahead Send out letters \ Surveys early, as you can’t predict response times. Use any Contacts you can ! Expect the Unexpected Backup some more !

Resources Plan resources and don’t get caught up on “Fringe” resources Use Wikipedia, but with caution ! (Citation Needed) Don’t Blind Copy, always attribute. Follow links on pages (“Related Stories”)

Bibliography List all references & Links as you go along, don’t leave this till Later ! Seriously. Note down all links, you may not find them again ! The Bibliography is CRITICAL, you cannot state a quote or fact without attribution.

Project Writing

Try to make it interesting Use Humour (Carefully) Make it engaging Get family \ Friends to Proofread. Check (and Recheck) formatting and pagination

Thank you for Listening Any Questions? Contact Information: Mark Anthony MSc CISSP CISM