Home >Documents >Information Security Awareness Copyright © 2011 IsecT Ltd. September 2011 Management seminar...

Information Security Awareness Copyright © 2011 IsecT Ltd. September 2011 Management seminar...

Date post:26-Mar-2015
Category:
View:214 times
Download:0 times
Share this document with a friend
Transcript:
  • Slide 1

Information Security Awareness Copyright 2011 IsecT Ltd. September 2011 Management seminar Building our security culture Slide 2 Information Security Awareness Copyright 2011 IsecT Ltd. 2 Introduction Slide 3 Information Security Awareness Copyright 2011 IsecT Ltd. 3 What do we want? Slide 4 Information Security Awareness Copyright 2011 IsecT Ltd. 4 But we already have a security culture Slide 5 Information Security Awareness Copyright 2011 IsecT Ltd. 5 Would you spot a fake email like this? Slide 6 Information Security Awareness Copyright 2011 IsecT Ltd. 6 Linkedin Handles sensitive medical data College 8 colleagues to exploit Too easy! 25m more targets! Job title Slide 7 Information Security Awareness Copyright 2011 IsecT Ltd. 7 OK, so how do we get it? If you accept that a security culture is indeed a valuable goal, what would you suggest we do to establish or improve ours? Slide 8 Information Security Awareness Copyright 2011 IsecT Ltd. 8 How do we get a security culture? Slide 9 Information Security Awareness Copyright 2011 IsecT Ltd. 9 How do we know when we have it? Slide 10 Information Security Awareness Copyright 2011 IsecT Ltd. 10 Summary Slide 11 Information Security Awareness Copyright 2011 IsecT Ltd. 11 Management action plan 1.Check the security policies & procedures 2.Lead by example: demonstrate secure behaviors, place a value on security 3.Identify and reward secure behaviors 4.Encourage open discussion about security matters talk it up a bit 5.Reap the benefits of a security culture Slide 12 Information Security Awareness Copyright 2011 IsecT Ltd. 12 Further information Information Security Policy Manual and other security awareness materials CIO or Information Security Manager Browse the intranet Security Zone Managing the Human Factor in Information Security by David Lacey and Spies Among Us by Ira Winkler Google for more!

Popular Tags:

Click here to load reader

Reader Image
Embed Size (px)
Recommended