Barbara McCrary Chief Information Security Officer Three C’s of Security Awareness: Culture, Change and Creativity.

Slides:



Advertisements
Similar presentations
Governance, Risk Management and Compliance: Summary of Basic Concepts & Program Goals Bob Kotic Chief Financial Officer University of Sydney.
Advertisements

Management, Leadership, & Internal Organization………..
Keys to Running a Successful United Way Campaign
Meeting Present and Emerging Strategic Human Resource Challenges
Culture and Leadership
Creating a Flexible Workplace Lori K. Long, Ph.D. Class One Employee and Labor Relations 2008.
ICGFM Working in the Field in a Time of Increased Oversight Sean Temeemi, Chief Compliance Officer, FHI 360 November 7, 2012.
Core principles in the ASX CGC document. Which one do you think is the most important and least important? Presented by Casey Chan Ethics Governance &
Preventing child abuse and neglect: the early childhood educator’s role.
7- Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall 1 Organizational Theory, Design, and Change Sixth Edition Gareth R. Jones Chapter.
Social Selling Training Session Salesfusion “We do not have a choice of whether we do social media, the question is how WELL.
Auditor General’s Office One key audit focus area – Compliance with Laws and Regulations.
Ethics Dr. Jeanette Kersten, EdD. Ethics Doing what is right in every circumstance Business ethics – Standard that guide acceptable behavior Common unethical.
Innovation Leadership Training Day Five Building an innovation culture February 20, 2009 All materials © NetCentrics 2008 unless otherwise noted.
7 Chapter Management, Leadership, and the Internal Organization
Chapter 10 Structuring and Managing the IT Function.
» Teaching an online class, what takes up most of your time?
Making Your Community “College-Ready” Louise Myrland Director of Scholarship and Evaluation, Denver Scholarship Foundation Michele Scott Taylor Chief Program.
Corporate Ethics Compliance *
Chapter 16 Organizational Change
Gap Analysis. What Is Gap Analysis? b Gap analysis is a survey instrument used to determine the gaps between a service offered and a customers expectations.
The National Cyber Security Alliance Martha J. Lockwood, CAE, APR Executive Director EDUCAUSE Live! October 6, 2004.
Dialog Practices Connections Roundtable September 2014.
249Labs Webinar: Marketing Technology Organizational Models Joseph Kurian CEO, 249Labs July 17, labs.com.
Teamwork Chapter 6.
Connecting the team with vision and strategy. The imago vision & Mission Our Vision: to be the best at what we do. Mission: to exceed customer expectations.
Module 3: Business Information Systems Chapter 11: Knowledge Management.
SNA seminar in the Caribbean Marie Brodeur Director General, Industry Statistics Branch, Statistics Canada St. Lucia February, 2014 Governance of an Integrated.
Weigand Avenue Elementary "Home of the College-Bound Tigers"
ORGANIZATIONAL DESIGN AND DEVELOPMENT INTERVENTIONS.
Identifying Clubs. OBJECTIVE Identify 2 unique characteristics of clubs.
FRAMEWORK FOR SUCCESS Chamber Executives of Ontario Facilitated by Anne Bermingham 2WA Consulting Inc.
Sustaining Improvement & Maintaining the Spirit Grace Duffy Public Health Foundation quality improvement consultant ACTION Campaign Webinar July 9, 2008.
Copyright © 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Making it Stick: Doing What’s Right in a Competitive Market
Digital Citizenship Barbara Brown, Chief Technology Officer Jody Rentfro, Emerging Technologies Specialist.
Our Journey with Family Engagement An Overview of North Penn School District’s experiences with Family Friendly Schools As part of our strategy to Engage.
System Changes and Interventions: Registry as a Clinical Practice Tool Mike Hindmarsh Improving Chronic Illness Care, a national program of the Robert.
OUCC 2015 Inspiring Innovation Enabling People to Make Website Decisions Based on Data: Experiences with Google Analytics and Yorku.ca Avalee Harlton May.
Ethical Leadership Ethical Leadership Unit 4 Ethical Awareness.
© 2008 by Prentice Hall11-1 Human Resource Management 10 th Edition Chapter 11 A SAFE AND HEALTHY WORK ENVIRONMENT.
Strategic Approaches to Improving Ethical Behavior
Thinking about Change Levels 1, 2, & 3 © Support Development Associates1.
Shaping Culture and Values
The Challenge of Non-Executive Leadership in Poland and Central Europe.
Methods of Budget Setting
Fun and Easy Web 2.O Tools By: Colleen Gibson Lynne Kenny Meg Stillman Allison Sullivan.
The Evolution, Development & Training of HIPAA Policies and Procedures in a Decentralized Health Care Environment Presented By: Sharon A. Budman, M.S.
Transmission Customer Forum Operating Agreement Update Cheryl Johnson 9/21/06.
5-1 Managing Diverse Employees Chapter Learning Objectives 1. Describe the increasing diversity of the workforce. 2. Understand the role which.
Pertemuan 16 Materi : Buku Wajib & Sumber Materi :
© 2010 South-Western/Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole.
Hertfordshire County Council Hertfordshire Local Update 12th November 2012 Claire Kueh Senior Policy Officer.
1 Book Cover Here Copyright © 2015, Elsevier Inc. All rights Reserved Chapter #18 Employee Motivation: Theory and Application Security Supervision and.
LOGO Managing Organizational Change and Learning By Daniel Damaris Novarianto S.
October 10,2011.  Formal Recognition  Monthly departmental meetings for recognition  Development of career paths for each department  Key Associate.
THERE IS A NO DEAD END TO THINKING. Who Are We? rr.
Lockheed-Martin: Leadership Brady Bradshaw, Daniel Souza, Trey Hartman.
Victorian Health Promotion Foundation The Equal Footing Program – new approaches in new sectors 23 March 2016 Renee Imbesi Principal Program Officer, Mental.
DIGITAL ACCESS AND DIVIDE. Digital Citizenship (Definition)  Can be defined as the norms of appropriate,Responsible behaviour with regard to technology.
Driving to Results: Key Changes and Leadership Behaviors: Management Systems to Deploy & Sustain the Improvements David Munch M.D. IHI Faculty Chief Clinical.
Tools of the Trade: Edition No. 2 (July 2011) Implementing the Near-Miss Program.
Organization Theory and Design
M EETING M ANAGEMENT. SNL M EETING
ValleyView Publishing.  To achieve a suitable location for the new office will be determined  To establish administrative systems  To establish an.
MGMT 452 Corporate Social Responsibility
MIS COURSE: CHAPTER 2 GLOBAL E-BUSINESS & COLLABORATION
1 Chapter Introduction 1st Week of the Semester.
Vice Chair – Strategic Partnerships
Chapter 8 Developing an Effective Ethics Program
Presentation transcript:

Barbara McCrary Chief Information Security Officer Three C’s of Security Awareness: Culture, Change and Creativity

Culture Change Creativity The Three C’s of Security Culture, change, and creativity are central to protecting an organization’s data and assets.

A Company’s Way of Life –Behavior and Practice –Standards –Habits and Routines –Traditions Culture

Behavior and Practices –Organization Silos –Communication –Productivity –Environment

Change IT’s Ideas About Effectual Security Update Standards Habits and Routines –Process pertinent data first –Simplify Automate Traditional Processes

To improve security and security awareness: Change! Change

Keys to Change Protecting data is a shared responsibility. Encourage active participation from all stakeholders.

Change Everyone’s Idea of Security Awareness Training Regular, daily, weekly, monthly campaigns that look more like conversations than training. –Focused and Small Bites –Reinforce –Applicable

Change Everyone’s Idea of Normal Inspire thought and conversation about ethical computing. –Change unethical norms. –Redesign decision processes. –Reinforce organizational ethics using reminders and currently held communication tools.

What can we really do to encourage ethical and secure corporate behavior? Get Creative! Creativity

Incorporate a Variety of Awareness Tools Add security to process training. Send info on trending and current events. Include info that applies to personal lives, families and personal finance.

Designing Security Awareness Materials Consider the differences: – generations – gender – seniority

Summing It Up To quote ― St. Francis of Assisi “Start by doing what is necessary, then what is possible, and suddenly you are doing the impossible.”

QUESTIONS?