ORGANISATIONAL CULTURE ORGANISATION MUST PROVIDE FOR INFORMATION SECURITY FAILING TO PLAN, IS PLANNING TO FAIL ASPECTS THAT SHOULD BE ADRESSED DURING.

Slides:



Advertisements
Similar presentations
Chapter ADCS CS262/0898/V1 Chapter 1 An Introduction To Computer Security TOPICS Introduction Threats to Computer Systems –Threats, Vulnerabilities.
Advertisements

Skin cancer prevention: information, resources and environmental changes Implementing NICE guidance 2011 NICE public health guidance 32.
A centre of expertise in digital information managementwww.ukoln.ac.uk Approaches To E-Learning: Developing An E-Learning Strategy Brian Kelly UKOLN University.
Information Technology Awareness Wayne Donald IT Security Officer.
Develop an Information Strategy Plan
E.g Act as a positive role model for innovation Question the status quo Keep the focus of contribution on delivering and improving.
So You Want to Break Into the Industry… SAS No. 94 Requirements and Issues Related to IT Audits for Not-for-Profit Organizations.
Ian Freeston. ENAEE Conference, Porto, 12 and 13 November 20121/14 Ian Freeston Where is the Forefront in Accredited Engineering.
Security awareness and cultural change “…from bad apples to good eggs…” Martin Smith MBE FSyI Chairman and Founder The Security Company (International)
May 20, Compare and Contrast: Information Lifecycle Approaches to File Share and Content Karen Ehrlich Angela Amrine Carol Stainbrook.
MSIA Introduction to Information Systems Security Training and Policy Week 1 Live Session Presentation.
Security Controls – What Works
IT Retreat 2009 IT Security Controls and Initiatives.
University of California, Davis1 Draft Wireless Network Policy Administrative Computing Coordinating Council September 10, 2001.
ISO 17799: Standard for Security Ellie Myler & George Broadbent, The Information Management Journal, Nov/Dec ‘06 Presented by Bhavana Reshaboina.
Session 3 – Information Security Policies
Developing Business Practice – 302LON Preparing for a Successful Work Experience Unit: 9 Knowledgecast: 2.
Tan Jenny 23 September 2009 SESSION 4: Understanding Your IT Control Environment & Its Readiness.
Information Security Awareness Levels of TAFE South Australia Employees Hong Chan Bachelor of IT ( Honours ) Supervisor: Dr Sameera Mubarak.
SEC835 Database and Web application security Information Security Architecture.
Social Media Jeevan Kaur, Michael Mai, Jing Jiang.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Communication. Contents Methods Motivation and communication Effective communication Barriers to effective communication How to improve communication.
MARCH 1 Project Management AIM l to provide a broad and practical understanding of the practice of Project Management l to improve Project Management practices.
E-Security: 10 Steps to Protect Your School’s Network NEN – the education network.
Thomas Levy. Agenda 1.Aims: Reducing Cyber Risk 2.Information Risk Management 3.Secure Configuration 4.Network Security 5.Managing User Access 6.Education.
EITS Update BAAF / Major Threat Types Malicious Software Human Error Technology Hacks Social Engineering / 206.
Computer Security “Measures and controls that ensure confidentiality, integrity, and availability of IS assets including hardware, software, firmware,
© 2013 Cambridge Technical CommunicatorsSlide 1 ISO/IEC Standard for Information Security Management Systems.
School of Computing. The Information Security Awareness Research Group.
1 Hardware Security AbdelRahman abu_absah Teacher: Dr. Sanaa al_sayegh.
13.6 Legal Aspects Corporate IT Security Policy. Objectives Understand the need for a corporate information technology security policy and its role within.
John Carpenter & lecture & Information Security 2008 Lecture 1: Subject Introduction and Security Fundamentals.
© 2001 Change Function Ltd USER ACCEPTANCE TESTING Is user acceptance testing of technology and / or processes a task within the project? If ‘Yes’: Will.
Management of Change ► The health, safety, security, environmental, technical and other impacts of temporary and permanent changes are formally assessed,
United Nations Education, Scientific, and Cultural Organisation Education for sustainable development aims to help people to develop the attitudes, skills.
SharePoint Security Training Creating and Managing Users
Becoming a trainer – training needs analysis
Attack and Malicious Code Andrew Anaruk. Security Threats Denial of Service (DoS) Attacks Spoofing Social Engineering Attacks on Encrypted Data Software.
Stronger governance is essential for stronger schools – discuss Pete Thorpe Assistant Director: Education NLAGB AGM – 6 November.
Kathy Corbiere Service Delivery and Performance Commission
HIPAA Security Final Rule Overview
Communications & Networks National 4 & 5 Computing Science.
© 2013 Toshiba Corporation B2B PC Training Mailer - Toshiba Device Access Control.
Human Factors in Cyber Security: A Review for Research & Education P. Vigneswara Ilavarasan, PhD 1.
© 2003 McGraw-Hill Australia Pty Ltd, PPTs t/a Accounting Information & Reporting Systems by A. Aseervatham and D. Anandarajah. Slides prepared by Kaye.
Section 13 Activities. Activity 1 Complete the following table with possible reasons why ICT security might be compromised Security BreachPossible reason.
Submitted By: Tanveer Khan M.Tech(CSE) IVth sem.  The ISO 9000 standards are a collection of formal International Standards, Technical Specifications,
Threats To Data 30 Threats To Data 30. Threats To Data 30 We’re now going to look at a range of different threats to people’s data: Opportunity Threats.
6 th July 2015 Jane Mackenzie E-Safety Awareness Training.
RAGELab Violence Prevention by experimental rage-laboratory Grundtvig – Learning Partnership.
Interim Pilot Workshop Guidance European Workplace and Alcohol Berlin, 8 November 2012 Jon Dawson.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
2018 PISA Global Competency Assessment
Computer Security.
3.6 Fundamentals of cyber security
Cybersecurity - What’s Next? June 2017
RICHMOND SCHOOL & Sixth Form College
Example Stakeholder Map
E-Safety for Parents.
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Teaching Computing to GCSE
Small Internal Audit Activity Challenges
Risks & Reality Cyber Security Risks & Reality
12 STEPS TO A GDPR AWARE NETWORK
Ethical Hacking ‘Ethical hacking’ is the branch of computer science that involves cybersecurity and preventing cyberattacks. Ethical hackers are not malicious.
DSC Contract Management Committee Meeting
Backward mapping – planning template
“Workplace Behaviour: Activating your greatest security asset”
ISO 45001:2018 The importance of a Safety Management System
Presentation transcript:

ORGANISATIONAL CULTURE ORGANISATION MUST PROVIDE FOR INFORMATION SECURITY FAILING TO PLAN, IS PLANNING TO FAIL ASPECTS THAT SHOULD BE ADRESSED DURING SECURITY AWARENESS TRAINING QUESTIONS ? SCOPE

TO DEMONSTRATE THE IMPORTANCE OF SECURITY AWARENESS IN ENHANCING THE SECURITY MATURITY OF USERS AIM

ORGANISATIONAL CULTURE DETERMINES IMPORTANCE OF INFORMATION SECURITY ORGANISATION MUST PROVIDE FOR INFORMATION SECURITY: ENHANCE SECURITY KNOWLEDGE OF USERS CHANGE ATTITUDE TOWARDS SECURITY CHANGE BEHAVIOUR PATTERNS HUMANS ARE THE WEAK LINK IMPORTANCE OF SECURITY AWARENESS

FORMAL TRAINING AND EDUCATION ADDRESS KNOWLEDGE OF USERS ATTITUDE AND BEHAVIOUR CHANGES COME WITH UNDERSTANDING OF SECURITY RISKS CULTURAL CHANGE WRT INFORMATION SECURITY MUST BE ACHIEVED IMPORTANCE OF SECURITY AWARENESS

SECURITY AWARENESS TRAINING SECURITY AWARENESS TRAINING SUCCESS DEPENDS ON EFFECTIVE PLANNING. AWARENESS TRAINING PROGRAM EXTREMELY IMPORTANT MANAGEMENT APPROVAL MUST BE OBTAINED FOLLOW A LIFECYCLE TO ENSURE CONTINUOUS IMPROVEMENT

TYPICAL SECURITY AWARENESS TRAINING LIFECYCLE Threat assessment

What are the threats ? How to counteract identified threats Passwords (use, compilation, changing, secrecy) Preventing unauthorised access Malicious code/countermeasures ing Backup/DRPs Use and safeguarding of removable data media Use of “Freeware” Theft prevention Social engineering (dangers of social networks) CONTENT OF SECURITY AWARENESS TRAINING

Questions ??