Concept Presentation Philip Robbins - August 1, 2012 University of Phoenix Hawaii Campus Information Systems Security Management.

Slides:



Advertisements
Similar presentations
Information Technology Management (ITM101) Week 01: Introduction Matthew W. Stephan: CISM, CISSP, CGEIT, CRISC, PMP.
Advertisements

WHAT DOES IT MEAN TO YOU? Information Technology.
Presented by Heorot.net. Your instructor Course material Structure of the course Individual Penetration Test Effort (PTE)
Defining Leadership Roles and Delegation
Corporate Connections An Overview of the Industry-to-Student Mentoring Program Cal Poly, SLO Multicultural Engineering Program.
Federal Work-Study Program.  …For taking part in the Federal Work-Study Program.  It is an excellent opportunity for the student to gain experience.
Project Communication Project Communication Management is the lighthouse in the storm of uncertainty Doug Forsell, PMP Director of Project Management.
Implementing Assistive Technology in School and Beyond 1.
1 Information Sharing and Assessment Systems How to find out whether you need to apply for Children Index access or attend to CAF training Next slide Click.
Hospital Best Practices: Engaging Everyone When Spreading the Checklist.
Summer IAVA1 NATIONAL INFORMATION ASSURANCE TRAINING STANDARD FOR SYSTEM ADMINISTRATORS (SA) Minimum.
How Not To Be Left Behind Last Update Copyright Kenneth M. Chipps Ph.D. 1.
Introduction to the Child & Adolescent Needs and Strengths Assessment (CANS) Our Community. Our Kids. Dr. Gary Buff, Ed.D. President and COO.
© 2003 Turoff 1 The Nature of Information Systems and Employment in IS Murray Turoff Information Systems Department.
Engineering Orientation Class EGG101 and EGG101L Lecture Instructor Robert Abella Ph.D. Associate Dean Undergraduate Studies Class 3
Keys to Success College is as easy as A, B, C. A -- Attend Class __________________.
Certified Information System Security Professional (CISSP)
The Northern California Forum for Diversity in Graduate Education Hosted by Mills College Saturday, October 28, 2006.
Graduate Program Review Where We Are, Where We Are Headed and Why Duane K. Larick, Associate Graduate Dean Presentation to Directors of Graduate Programs.
The OWASP Foundation Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under.
Engineering Interviews Chris Hogan 10/18/08. I interviewed… ► Bob Ekman ► Dr. A ► Larry Schwartz Human- Computer Interface And Chose… Larry Schwartz.
1 “Third Group Training Course In Application of Information and Communication Technology to Production and Dissemination of Official statistics” 10 May.
Wimba Voice Critical to Successful Online Speech Language Pathology Assistant Courses Amy Heck, MA CCC-SLP Program Director Kari Watson, MA CCC-SLP Adjunct.
Promoting Research and Application of Information Assurance and Cybersecurity 6 th Annual Security Summit May 20, 2009 Mark Weatherford, Chief Information.
Computer Information Systems. Overview  What is Information Systems (IS)?  Computer Information Systems (CIS) Major  Careers in CIS/IT.
Society for Information Management SIM Outreach and STEM Goals and Plans for 2013 Jana Markowitz Director, Outreach/STEM Initiatives.
Career Opportunities in Information Technology There are four main categories of IT jobs, grouped by the main focus of the job: Sales and support Software.
NMS Certification and Accreditation (C&A) Removal of Material Weakness for NMS Security and Access Controls Jim Craft USAID ISSO.
Assessment Presentation Philip Robbins - July 14, 2012 University of Phoenix Hawaii Campus Fundamentals of Information Systems Security.
Informational Interviews Creating Professional Connections.
Professional Advocacy “Down the rabbit hole”. Contacts to Congress have exploded source: Congressional Management Foundation, 2008.
AY Year  The administration period runs for two weeks in the 14 –weeks sessions (fall and spring) and six calendar days in other sessions. 
Big Ideas IS 101Y/CMSC 101 September 3, 2013 Carolyn Seaman Susan Martin University of Maryland Baltimore County.
Hosted by Employee Monitoring Balancing Best Practices and Privacy by Kevin Beaver, CISSP founder and principal consultant Principle Logic, LLC
Security+ Brian E. Brzezicki. About Me Instructor Brian E. Brzezicki Bachelor of Science, Computer.
Visions of our Profession Student Forum 2011 Utrecht.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
WELCOME TO CE 100 Preparing for a Career in Early Childhood Development –Unit 4 Class will start at the top of the hour! Please turn the volume up on your.
Prevent Information and Overview Updated October 2013, Education Office.
Computer Science and Information Technology, B.S. In School of Information Technology and Communications Design (ITCD) California State University Monterey.
Center for Cybersecurity Research and Education (CCRE)
HO © 2012 Fluor. All rights reserved. Quick Wins in Vulnerability Management Classification: Confidential Owner: Michael Holcomb Approver: Phil.
ELECTRICAL ENGINEERS KENDALL HIMEL INTRO TO ENGINEERING 4TH.
Engineering and Related STEM Careers BY MITCHELL PARTLOW.
Prepared by the Honor Committee Honor in Everyday Life HONOR 4-6 Honor in everyday life.
By: Noah Stowers 5 th Period.   Aerospace Engineers have anything and everything to do with aviation.  They design and build just about anything that.
Select Slides… Spring 2013 Training Strengthening Teaching and Learning through the Results of Your Student Assessment of Instruction (SAI) For Faculty.
Seminar 1IT484 - Network Security1 Welcome To IT484 Network Security Dr. David Teneyuca, CISSP Instructor.
Michael Lucas, Scott Tillett, Joshua Mendez, and Eric Clark.
1 As a Project Manager Are You Investing Enough in Yourself Peg Duggan, PMP July 18, PO Box 4496, Portsmouth, NH Building Professionalism.
Career Exploration: Informational Interviews CRER 137 – Life and Career Planning Instructor: Daryan Chan.
Professional Development CS5493. Professional Standards Development College Degree Professional Association Professional Exam Licensing/Certification.
Job offer IT Infrastructure Specialist We are currently looking for an IT infrastructure specialist in order to respond to one key-account customer demand.
A: Your supervisor is explaining the wristband that every patient wears. B: The patient will get a wristband when he enters the medical center and it.
Software Engineer By: Imran Abdulselam TEJ2M0-02/14/12.
© ITT Educational Services, Inc. All rights reserved. IS4680 Security Auditing for Compliance Unit 1 Information Security Compliance.
«My future profession»
Advanced Software Engineering
Dr. Ir. Yeffry Handoko Putra
Team 1 – Incident Response
ISA 400 Management Information Security
Technology, Careers, and Job Hunting
Keys to Continuous Testing using the Public Cloud April 4, 2017
IS4550 Security Policies and Implementation
Introduction to the role of Sector Official/Marshal in Charge
CONCURRENT ENROLLMENT
Credentials Name: Matthew Robson
IST346: What Is IT?.
DID YOU KNOW??? Science - Technology - Engineering - Mathematics
The Basics of Selling Oils
Presentation transcript:

Concept Presentation Philip Robbins - August 1, 2012 University of Phoenix Hawaii Campus Information Systems Security Management

Who am I? Information Systems Authorizing Official Representative -United States Pacific Command (USPACOM) -Risk Management Field -Assessments to USPACOM Authorizing Official / CIO Bachelor of Science in Electrical Engineering Master of Science in Information Systems Ph.D. Student in Communication & Information Sciences Certified Information Systems Security Professional (CISSP) and Project Management Professional (PMP)

Concept 1: Info Security & Assurance You leave your job at ACME, Inc. to become the new Information Systems Security Manager (ISSM) for University of University College (UUC). The CIO of UUC drops by your office to let you know that they have no ISS program at UUC! A meeting with the Board of Directors is scheduled and you are asked by the CIO to attend. The Board wants to hear your considerations on how to start the new ISS program spanning all national and international networks. What are you going to tell them? As an ISSM, what would you consider first? What types of questions would you ask the Board and/or to the CIO?

Concept 2: Physical & Logical ISS First day on the job and you find yourself already meeting with the local Physical Security and IT Services Managers at UUC. You introduce yourself as the new ISSM and both managers eagerly ask you “what can we do to help?” What do you tell these Managers? What types of questions would you ask the Managers? As an ISSM, what are some IT, computer, and network security issues you consider important to a new ISS program at UUC? What about your meeting with the Board of Directors earlier? How does it apply here?

Concept 3: Risk At the end of your first 30-days on the job, as an ISSM, you have been able to sUUCessfully develop and implement an ISS program for UUC. You decide to update the CIO on the progress of the UUC ISS program via when all of a sudden the entire internal network goes down! Your Computer Network Defense Team is able to determine the source of the disruption to an unknown vulnerability that was exploited on a generic perimeter router. The CIO calls you into his office and indicates to you that he is “concerned about the Risk to the networks at UUC” and ‘wants a risk assessment conducted’ ASAP. What does the CIO mean by “Risk to the networks at UUC”? As a ISSM, how would you conduct a risk assessment for the CIO? How is risk measured and why is it important?

Concept Overview

Thank you! Questions?