PPT-Information Security Awareness and Training Program:

Author : pasty-toler | Published Date : 2015-10-23

Taking your program from training to awareness By Chandos J Carrow CISSP System Office Information Security Officer Virginia Community College System Question Why

Presentation Embed Code

Download Presentation

Download Presentation The PPT/PDF document "Information Security Awareness and Train..." is the property of its rightful owner. Permission is granted to download and print the materials on this website for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.

Information Security Awareness and Training Program:: Transcript


Taking your program from training to awareness By Chandos J Carrow CISSP System Office Information Security Officer Virginia Community College System Question Why is October important for Information Security Awareness and Training. Cultural and Situational . Awareness. Current a/o 15 Aug 12. Chapter 8 in DCC Handbook. 2. Overview. Key Points. Cultural Awareness. Situational Awareness. Communication with Vendors (Elicitation, Espionage, and Subversion) . CJIS Security Policy v5.5. Policy area 5.2. What. The protection of Criminal Justice Information (CJI) originating from the Department of Justice (FBI CJIS data).. When. Basic security awareness training shall be required within six months of initial assignment, and biennially thereafter, for all personnel who have access to CJI.. Section 1: . Overview . Welcoming Remarks and Introductions . Community Awareness Program (CAP). Goals and Objectives. Knowledge Check I . COMMUNITY AWARENESS PROGRAM. TM. 1.1.b. CAP Goals & Objectives . Security Training Program. Kevin Hayes, CISSP, CISM. Information Security . Officer. Geoff Nathan. Faculty Liaison. Wayne State University. Computing & Information Technology. Agenda. Background. SCI Security Policy VTC. 28 . Sep 2011 . UNCLASSIFIED. 1. UNCLASSIFIED. UNCLASSIFIED. AGENDA. . Welcome/Introduction/Remarks . Policy Updates. - G-2 Memos, Clarifying Guidance for the Operation of Temporary/Tactical Sensitive Compartmented Information Facilities/(T-SCIF). Stakes. Customers. expectations & . Maturity. Cost. . Reduction. Responsiveness. Flexibility. Quality. Implementation. of . processes. and . tools. Career. and . skills. management. Tools. Methodology. M.Boujettif (. Italtel. , boujettif@yahoo.com) . & Y.Wang . (. UCCC). BWCCA 2010. Fukuoka Institute of Technology, Fukuoka, Japan. Abstract. The application a unique approach to enhancing information security awareness amongst employees, in effort to improve information security. Combating the ENEMY Within. Mike Kalinowski. Facility Security Officer. iGov Technologies Tampa FL. 1. Insider Threat Briefing. Purpose of Briefing. What is an Insider Threat?. Milestones. Training Requirements. Cultural and Situational . Awareness. Current a/o 15 Aug 12. Chapter 8 in DCC Handbook. 2. Overview. Key Points. Cultural Awareness. Situational Awareness. Communication with Vendors (Elicitation, Espionage, and Subversion) . Security Awareness Training, Influence, and Personality Walk into a Bar… Karla Carter | @ rptrpn | karla.carter@bellevue.edu “Social engineering techniques rely on influencing the victim to do something that is against their best interest, but different influence techniques work better on different victims, because everyone has different personalities, strengths and weaknesses. Research has shown a correlation between the five-factor personality measure (“The Big 5”) and cybersecurity behaviors. While it’s impractical to set up personalized security awareness training programs for each individual, it’s possible to create a program that will speak to multiple types of personalities and the influence risks those imply. Come explore ways to help users resist social engineering by designing security awareness training programs that align employees’ risk of influence factors (authority, social proof, scarcity, consistency/commitment, likability, and reciprocation) with their Big 5 personality profiles.” INSIDER THREAT AWARENESS Combating the ENEMY Within Mike Kalinowski Facility Security Officer iGov Technologies Tampa FL 1 Insider Threat Briefing Purpose of Briefing What is an Insider Threat? Milestones Security Awareness Training CJIS Security Policy v5.5 Policy area 5.2 What The protection of Criminal Justice Information (CJI) originating from the Department of Justice (FBI CJIS data). When Basic security awareness training shall be required within six months of initial assignment, and biennially thereafter, for all personnel who have access to CJI. B Training must be provided to miners such as drillers or blasters who move from one mine to another mine while remaining employed by the same production-operator or independent corator Section 4611c Reinforcing the Requirements for Security Awareness Training. . Dr. Ron Ross. Computer Security Division. Information Technology Laboratory. Today’s Climate. Highly interactive environment of powerful computing devices and interconnected systems...

Download Document

Here is the link to download the presentation.
"Information Security Awareness and Training Program:"The content belongs to its owner. You may download and print it for personal use, without modification, and keep all copyright notices. By downloading, you agree to these terms.

Related Documents