Download presentation
Presentation is loading. Please wait.
Published byGarey Conley Modified over 9 years ago
1
Jeremy Hilton and Anas Tawileh
2
“Relevant” security Identifying critical information Identifying the risks Developing the controls Sharing control information
4
Yesterday (C) Cardiff University
5
Today (C) Cardiff University
6
Tomorrow (C) Cardiff University
7
“Relevant” Security (C) Cardiff University
10
© Brian Wilson (Used with permission.)
13
Adaptive Enterprise Security (C) Cardiff University
15
A system operated by appropriately skilled and experienced staff, partner producers, appropriate external parties and selected suppliers to build Delicia’s presence as a major participant in the dairy commodity markets by providing an effective and unique sourcing option, product innovation and developing, marketing and delivering branded speciality and healthy living products, and ongoing commodity trading to major multiple retailers, food service organisations and food manufacturers.
19
Critical Information Requirements at Delicia ActivityInformation Requirements Sourcing 4Determine Effectiveness of Existing Souring OptionsInformation about Participants in the Dairy Market Knowledge about Existing Sourcing Options Definition of Effectiveness 5Decide on How to Make the Provided Sourcing Option EffectiveEvaluation of the Effectiveness of Existing Sourcing Options Partnerships 23Assess Relationships with External PartnersPartners Information 24 Decide on How to Develop Relationships with External Partners to Support the Company’s Market Presence Assessment of Customer Relations 29Assess Relationships with External PartnersPartners Information 30Identify Requirements to Meet External Partners’ RequirementsEvaluation of Existing Capabilities Branding 37Define InnovationNA 38Decide on How to Measure the Company’s Reputation as an InnovatorDefinition of Innovation 39Baseline the Company’s ReputationReputation Measurement Criteria 40Evaluate the Company’s Reputation as an InnovatorReputation Measurement Criteria
26
Managers of SMEs are busy running their company, trying to survive in a very competitive environment They rarely address anything that is not a legislative or regulatory requirement, and even then will often only comply if there is a penalty for not doing so Will avoid spending money, and time is money, training is money Rarely buy in expertise, staff left to help each other and ‘learn on the job’
27
When developing policy(rules), it is critical to consider if and how they can be implemented. For example, if the policy is that: employees who breach a security rule, say, disclose information to someone unauthorised to see it, then they will be fired
28
People generally do what they want to do, even at work. Hopefully this aligns with the organisation’s needs incentivising ; or applying suitable sanctions. May achieve short term benefit, but the change is short-lived unless fundamental change is achieved staff have a belief in the desired result
30
Staff need to be involved, trained and supported. Tools will be required in order to enable the desired controls on information and analysis/audit of use Accountability and responsibility of staff must be clearly defined and agreed. Tell me and I’ll forget Show me and I’ll remember Involve me and I’ll understand Old Chinese saying
32
Traffic Light Protocol Philosophy mapped to the Business Impact and Control Categories Developed to control information sharing between G8 countries, Business Impact levels added.
34
( 34 ) How to Use the Creative Commons Licenses Creative Commons
35
A set of classifications that are flexible enough to enable to define and communicate the controls to be applied to your information May be combined with creative commons licenses Expressed in 3 different formats: Security Officer-readable Human-readable Machine readable
36
Confidentiality Authentication Use Integrity CA – Community Access RA – Restricted Access PI – Personal Information OO – Organisation Only ND – Non-Disclosure CG – Corporate Governance SD – Safe Disposal CU – Controlled Until AB – Authorised By ND – Non-Derivatives BY – Attribution cc
37
The information may be shared within the organisation, but is not to be disclosed outside Organisation Only
38
The information is restricted to members of a community; generally multi-agency Though it may change, membership of the community is controlled All members of the community agree to specific terms and conditions Community Access
39
The information contains personal information and consideration must be made before sharing the information This classification is likely to be used in conjunction with other labels such as Personal Information cc
40
The information has been received under non-disclosure The label will link to the specific terms of the NDA This classification is likely to be used in conjunction with other labels such as Non-Disclosure cc
41
Medical Record Personnel record Patent under development Published Patent Draft Annual Report Approved report prior to release Post Release cc DTG cc
42
Thank You
43
“Others inspire us, information feeds us, practice improves our performance, but we need quiet time to figure things out, to emerge with new discoveries, to unearth original answers.” - Esther Buchholz
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.