Mobile Security and Public Networks

Size: px
Start display at page:

Download "Mobile Security and Public Networks"

Transcription

1 Mobile Security and Public Networks Victor Johnston, Future Leaders Executive Council June 7, 2016 RECORDING HERE:

2 Teleconference Settings This call is being recorded To see the slides, click on the WebEx link in your meeting invitation To submit questions, use the Chat or Q&A section on the right side of your screen. 2

3 CompTIA has a policy of strict compliance with federal and state antitrust laws. The antitrust laws prohibit competitors from engaging in actions that could result in an unreasonable restraint of trade. Consequently, you agree to avoid discussing certain topics in participating at any CompTIA events or activities, including, without limitation, any discussions relating to prices, fees, rates, profit margins, or other terms or conditions of sale (including allowances, credit terms, and warranties); allocation of markets or customers or division of territories; or refusals to deal with or boycotts of suppliers, customers or other third parties, or topics that may lead participants not to deal with a particular supplier, customer or third party. 3

4 Member Communities & Councils Industry Initiatives Research Certifications Credentials Education Training Public Policy Philanthropy 4

5 Purpose of Communities Work together to improve ourselves, our businesses, and our industry Benefit to You Networking Education Making a difference Your Role Share your experiences Listen to what others have to say Contribute & get involved

6 Introducing CompTIA Channel Standards The Definitive Best Business Practices Prescribed by Your Peers Industry guidelines for implementing IT processes and procedures Built by industry leaders, tech experts and CompTIA members Accepted and applied by service providers everywhere Access and implement the IT Solution Provider Standard today at comptia.org/standards 6

7 Accelerate your business and professional success Premier Member Benefits Networking Complimentary Event Registrations Community Voting Rights Leadership Opportunities Ability to Serve in Community Leadership Position Industry Insight Research Training Education Business Tools & Templates Contracts Finance Marketing Human Resources Affinity Partners Geico Hertz FedEx Certification Discounts 15% CyberSecure 50 free seats 10% off additional seats 7

8 Victor Johnston, Johnston IT Consulting 8

9 Is your choice of wireless network putting you at risk for data and identity theft? Session takeaways include: 1. Understanding the risks of mobile computing on a public network 2. Understanding what actions are still safe on public networks 3. Utilizing third-party, free mobile applications to bring awareness and protect data 4. What other options are available for you to avoid public networks 9

10 Key Points to be Discussed During this Communitybyte What is a public network and why is it risky What kind of activities should I avoid doing on public networks What mobile apps can help to alert me if I am on an unsafe network and protect my phone from data theft Statistics on identity theft because of mobile computing on wireless networks 10

11 What is a Public Network? Unsecured network for public use Normally found in places such as Starbucks, McDonalds, etc. Allows many users to access the same WiFi for free as a convenience to customers 11

12 Why are Public Networks Risky? People can see and explore your device on the network Traffic that you send and receive can be easily intercepted without your knowledge Identity and Data theft run rampant on these networks 12

13 What Activities Should You Avoid on a Public Network? Activities that Should be Avoided or Kept to a Minimum Logging into personal accounts you would not want others to be able to gain access to should be kept to a minimum. Personal accounts can be Social Media or Blogs. Public networks allow criminals to easily see your log in credentials and save them for later. Any banking or actions that involve personally identifiable information such as social security numbers should be avoided entirely. Common mistakes users make are checking their bank statements, checking credit card accounts, and logging into their personal and professional s through web browsers. Logging into business accounts should also be avoided on a public network. Just as with the banking, cyber criminals can intercept your credentials and access your employer s systems illegally. Sending messages over Facebook Messenger, KIK, Skype, or other instant messaging systems containing sensitive information should be kept to a minimum. These messages are transmitted without encryption and can be easily viewed. 13

14 Statistics on Mobile Device Data Theft 95.6% of survey respondents used public WiFi to carry out work tasks (Kelleher 20% of Mobile devices have absolutely no security enabled (Kelleher % of those surveyed were concerned about their data being intercepted, but still used public WiFi (Kelleher Personal Information is the number one target as value of private personal data surpasses credit cards (Intel Security % Used public WiFi for work tasks 20% Mobile devices with no security 62% Personal information was number one target 14

15 Public WiFi may be Convenient, but be Mindful Public Wifi is dangerous. You would not cross a busy street without taking precautions. You should take precautions on public WiFi connections. (Image retrieved from /william/) 15

16 Hardware is easy to protect: lock it in a room, chain it to a desk, or buy a spare. Information poses more of a problem. It can exist in more than one place; be transported halfway across the planet in seconds; and be stolen without your knowledge. -Bruce Schneier 16

17 Mobile Apps that can Help Alert and Protect You As the need for cyber security on mobile devices has become more prevalent and demanded by consumers, many application developers have responded by developing systems that offer protection against these threats. This list does not recommend any of the applications, but does bring awareness to the existence of the application and CompTIA does not formally endorse any vendors solutions. Mobile Apps and What They Do Avast! (Android and ios) Lookout Mobile Security (Android and ios) Avast! Has a tool that can scan a wireless network and let you know if it is safe Lookout is anti-malware and helps locate the device if it is missing 360 Security (Android) 360 Security is an optimizer and security application ESET Mobile Security & Antivirus (Android) Anti-virus Detective (ios) ESET has numerous features for protecting, remote wiping, and tracking devices. Anti-virus Detective can help users identify malware on their ios products 17

18 Final Takeaway Public networks are not the right place for accessing bank accounts, doing work, or sending sensitive messages. Pay careful attention to only use networks you trust for these actions and always have a plan for a possible incident. An ounce of prevention is worth a pound of cure. 18

19 Questions/Comments? VICTOR JOHNSTON, MIS, MSM Cell: Get the latest IT business and career advice from CompTIA

20 CompTIA CyberSecure Results-driven behavior modification training on Cybersecurity Self-paced approach focuses on implications of security behaviors of every employee... not just the IT department 60-minute course covers online and offline behaviors to reduce Cybersecurity risks 50 free seats per membership year 10% discount on additional purchases LMS Integration Option Available 20

21

22

23 What to Do Next..? Join us for our next community meetings: Future Leaders: July 12, 2016 IT Security: July 21, 2016 Make the most out of your CompTIA Membership Webinar June 16, :00AM CT Join our LinkedIn Groups! Ways to Get Involved: Initiatives Charity Selection Meeting Planning 23

24 Thanks for attending! - Future Leaders Community - IT Security Community

Future Leaders Community Meeting August 1, 2016, Hollywood, FL #FutureLeaders

Future Leaders Community Meeting August 1, 2016, Hollywood, FL #FutureLeaders Future Leaders Community Meeting August 1, 2016, Hollywood, FL #FutureLeaders CompTIA Antitrust http://www.comptia.org/antitrust CompTIA has a policy of strict compliance with federal and state antitrust

More information

Managed Services Community Meeting

Managed Services Community Meeting Managed Services Community Meeting How to Create Raving Fans of Your Managed Services Business Don Crawley, CSP Best Practice Exchange #CC16HallwayChat #ChannelCon16 CompTIA Anti-Trust Policy http://www.comptia.org/antitrust

More information

Keep the Door Open for Users and Closed to Hackers

Keep the Door Open for Users and Closed to Hackers Keep the Door Open for Users and Closed to Hackers A Shift in Criminal Your Web site serves as the front door to your enterprise for many customers, but it has also become a back door for fraudsters. According

More information

BRING SPEAR PHISHING PROTECTION TO THE MASSES

BRING SPEAR PHISHING PROTECTION TO THE MASSES E-Guide BRING SPEAR PHISHING PROTECTION TO THE MASSES SearchSecurity phishing. I n this expert tip, David Sherry describes how a combination of technical controls and user awareness training can help put

More information

VIETNAM CYBER-SAVVINESS REPORT 2015 CYBERSECURITY: USER KNOWLEDGE, BEHAVIOUR AND ATTITUDES IN VIETNAM

VIETNAM CYBER-SAVVINESS REPORT 2015 CYBERSECURITY: USER KNOWLEDGE, BEHAVIOUR AND ATTITUDES IN VIETNAM VIETNAM CYBER-SAVVINESS REPORT 2015 CYBERSECURITY: USER KNOWLEDGE, BEHAVIOUR AND ATTITUDES IN VIETNAM 1. Why did ESET Undertake this Report? 2. Report Methodology 3. Key Highlights 4. How Many users in

More information

BECOME TOMORROW S LEADER, TODAY. SEE WHAT S NEXT, NOW

BECOME TOMORROW S LEADER, TODAY. SEE WHAT S NEXT, NOW BECOME TOMORROW S LEADER, TODAY. SEE WHAT S NEXT, NOW BECOME AN ISACA MEMBER TODAY. Nearing its 50th year, ISACA is a global association helping individuals and enterprises achieve the positive potential

More information

SPRING 2019 INDUSTRIAL SECURITY CONFERENCE AGENDA

SPRING 2019 INDUSTRIAL SECURITY CONFERENCE AGENDA SPRING 2019 INDUSTRIAL SECURITY CONFERENCE AGENDA MONDAY, MAY 20 8:00 am 5:00 pm 9:00 10:00 am FLORIDA EXCOMM MEETING PM Industry Only Session 1:00 1:15 pm 1:15 2:45 pm 2:45 3:00 pm 3:00 4:00 pm NATIONAL

More information

Securing the SMB Cloud Generation

Securing the SMB Cloud Generation Securing the SMB Cloud Generation Intelligent Protection Against the New Generation of Threats Colin Brackman, National Distribution Manager, Consumer Sales, Symantec Christopher Covert Principal Product

More information

Multilayered technology, machine learning and human expertise working together to provide comprehensive security for all platforms.

Multilayered technology, machine learning and human expertise working together to provide comprehensive security for all platforms. SOLUTION OVERVIEW Multilayered technology, machine learning and human expertise working together to provide comprehensive security for all platforms. What is a mobile protection product? A mobile protection

More information

BENEFITS of MEMBERSHIP FOR YOUR INSTITUTION

BENEFITS of MEMBERSHIP FOR YOUR INSTITUTION PROFILE The Fiduciary and Investment Risk Management Association, Inc. (FIRMA ) is the leading provider of fiduciary and investment risk management education and networking to the fiduciary and investment

More information

Multilayered technology, machine learning and human expertise working together to provide comprehensive security for all platforms.

Multilayered technology, machine learning and human expertise working together to provide comprehensive security for all platforms. SOLUTION OVERVIEW Multilayered technology, machine learning and human expertise working together to provide comprehensive security for all platforms. What is a mobile protection product? A mobile protection

More information

CEdMA Certification SIG

CEdMA Certification SIG CEdMA Certification SIG Thursday July 8, 2010 8.00 am 9.00 am Pacific Association of Test Publishers Test Security Committee Update Cathy Donath, The Donath Group CEdMA Anti-Trust Warning CEdMA is a trade

More information

What is a mobile protection product?

What is a mobile protection product? What is a mobile protection product? A mobile protection product can be separated into two distinct categories: security and management. The security features range includes antimalware, anti-phishing,

More information

Security Awareness. Presented by OSU Institute of Technology

Security Awareness. Presented by OSU Institute of Technology Security Awareness Presented by OSU Institute of Technology Information Technologies Division Security Awareness Topics Social Engineering Phishing Social Networks Displaying Sensitive Information Wireless

More information

Essential Training & Education for ALL TRUCKING STAFF

Essential Training & Education for ALL TRUCKING STAFF Essential Training & Education for ALL TRUCKING STAFF Learn on your time, at your convenience Interactive webinars presented by industry experts Professional designations for career advancement In-depth

More information

Question 1: What steps can organizations take to prevent incidents of cybercrime? Answer 1:

Question 1: What steps can organizations take to prevent incidents of cybercrime? Answer 1: Cybercrime Question 1: What steps can organizations take to prevent incidents of cybercrime? Answer 1: Organizations can prevent cybercrime from occurring through the proper use of personnel, resources,

More information

<Criminal Justice Agency Name> Personally Owned Device Policy. Allowed Personally Owned Device Policy

<Criminal Justice Agency Name> Personally Owned Device Policy. Allowed Personally Owned Device Policy Policy Title: Effective Date: Revision Date: Approval(s): LASO: CSO: Agency Head: Allowed Personally Owned Device Policy Every 2 years or as needed Purpose: A personally owned information system or device

More information

Microsoft 365 Business FAQs

Microsoft 365 Business FAQs Microsoft 365 Business FAQs Last updated April 27 th, 2018 Table of Contents General... 3 What is Microsoft 365 Business?... 3 Who should consider adopting Microsoft 365 Business?... 3 How can I get Microsoft

More information

A practical guide to IT security

A practical guide to IT security Data protection A practical guide to IT security Ideal for the small business The Data Protection Act states that appropriate technical and organisational measures shall be taken against unauthorised or

More information

How Cyber-Criminals Steal and Profit from your Data

How Cyber-Criminals Steal and Profit from your Data How Cyber-Criminals Steal and Profit from your Data Presented by: Nick Podhradsky, SVP Operations SBS CyberSecurity www.sbscyber.com Consulting Network Security IT Audit Education 1 Agenda Why cybersecurity

More information

Welcome. ScrogginsGrear clients. to Cybersecurity Education Series. Password Management & Public Wi-Fi Security

Welcome. ScrogginsGrear clients. to Cybersecurity Education Series. Password Management & Public Wi-Fi Security Welcome ScrogginsGrear clients to Cybersecurity Education Series Password Management & Public Wi-Fi Security Presenter: Ray Cool, CEO PBSI Technology Solutions Webinar will begin at 1:00 Welcome ScrogginsGrear

More information

FACTS WHAT DOES FARMERS STATE BANK DO WITH YOUR PERSONAL INFORMATION? WHY? WHAT? HOW? L QUESTIONS?

FACTS WHAT DOES FARMERS STATE BANK DO WITH YOUR PERSONAL INFORMATION? WHY? WHAT? HOW? L QUESTIONS? FACTS WHAT DOES FARMERS STATE BANK DO WITH YOUR PERSONAL INFORMATION? WHY? WHAT? HOW? Financial companies choose how they share your personal information. Federal law gives consumers the right to limit

More information

Best Practices Guide to Electronic Banking

Best Practices Guide to Electronic Banking Best Practices Guide to Electronic Banking City Bank & Trust Company offers a variety of services to our customers. As these services have evolved over time, a much higher percentage of customers have

More information

Trinity Multi Academy Trust

Trinity Multi Academy Trust Trinity Multi Academy Trust Policy: Bring Your Own Device Date of review: October 2018 Date of next review: October 2020 Lead professional: Status: Director of ICT and Data Non-Statutory Page 1 of 5 Scope

More information

Partnership Information

Partnership Information SECOND INTERNATIONAL CONFERENCE ON ISO 31000 STANDARD USING ISO 31000 RISK MANAGEMENT STANDARD TO ACHIEVE OPTIMAL PERFORMANCE Conference Date: 28-29 May 2013 Master Classes Date: 30-31 May 2013 Location:

More information

,000+ What is the BCI Corporate Partnership? What are the benefits of becoming a Corporate Partner? Levels of Partnership

,000+ What is the BCI Corporate Partnership? What are the benefits of becoming a Corporate Partner? Levels of Partnership www.thebci.org 1 What is the? The enables organizations to work more closely with the BCI to help raise the profile of the discipline, and to promote the highest standards of professional competence in

More information

Wayward Wi-Fi. How Rogue Hotspots Can Hijack Your Data and Put Your Mobile Devices at Risk

Wayward Wi-Fi. How Rogue Hotspots Can Hijack Your Data and Put Your Mobile Devices at Risk Wayward Wi-Fi How Rogue Hotspots Can Hijack Your Data and Put Your Mobile Devices at Risk 288 MILLION There are more than 288 million unique Wi-Fi networks worldwide. Source: Wireless Geographic Logging

More information

THE IMPACT OF MOBILE DEVICES ON INFORMATION SECURITY:

THE IMPACT OF MOBILE DEVICES ON INFORMATION SECURITY: June 2013 Sponsored by Introduction Mobile devices cause ongoing concern for IT teams responsible for information security. Sensitive corporate information can be easily transported and lost, while the

More information

ISACA Enterprise. Solutions and Resources

ISACA Enterprise. Solutions and Resources ISACA Enterprise Solutions and Resources About ISACA Global association serving 140,000 members and certification holders Members in 180+ countries; 210+ chapters worldwide Developed and maintains the

More information

Congratulations on Becoming an Internet Business Owner!

Congratulations on Becoming an Internet Business Owner! Congratulations on Becoming an Internet Business Owner! Those that take action receive all the rewards in life and business. Worth noting: the number one key characteristic of a successful business owner

More information

DHS Cybersecurity. Election Infrastructure as Critical Infrastructure. June 2017

DHS Cybersecurity. Election Infrastructure as Critical Infrastructure. June 2017 DHS Cybersecurity Election Infrastructure as Critical Infrastructure June 2017 Department of Homeland Security Safeguard the American People, Our Homeland, and Our Values Homeland Security Missions 1.

More information

Docker Business Partner Program Guide

Docker Business Partner Program Guide PROGRAM GUIDE / JULY 2017 Docker Business Partner Program Guide July 2017 PROGRAM GUIDE / JULY 2017 Table of Contents Welcome... 3 Overview...3 About this Guide...3 Docker Program Policies...3 Docker Program

More information

Quick Heal Total Security for Android. Anti-Theft Security. Web Security. Backup. Real-Time Protection. Safe Online Banking & Shopping.

Quick Heal Total Security for Android. Anti-Theft Security. Web Security. Backup. Real-Time Protection. Safe Online Banking & Shopping. Quick Heal Total Security for Android Anti-Theft Security. Web Security. Backup. Real-Time Protection. Safe Online Banking & Shopping. Product Highlights Complete protection for your Android device that

More information

IT Security Mandatory Solutions. Andris Soroka 2nd of July, RIGA

IT Security Mandatory Solutions. Andris Soroka 2nd of July, RIGA IT Security Mandatory Solutions Andris Soroka 2nd of July, 2014 @LPS, RIGA Data Security Solutions business card Specialization IT Security IT Security services (consulting, audit, pen-testing, market

More information

Course Outline (version 2)

Course Outline (version 2) Course Outline (version 2) Page. 1 CERTIFIED SECURE COMPUTER USER This course is aimed at end users in order to educate them about the main threats to their data s security. It also equips the students

More information

Welcome. Password Management & Public Wi-Fi Security. Hosted by: Content by:

Welcome. Password Management & Public Wi-Fi Security. Hosted by: Content by: Welcome Password Management & Public Wi-Fi Security Hosted by: Content by: Presenter: Ray Cool, CEO PBSI Technology Solutions Webinar will begin at 1:00 Welcome Foster & Motley Clients to Security Education

More information

utrgv.edu/it IT Services GETTING UTRGV

utrgv.edu/it IT Services GETTING UTRGV IT Services GETTING CONNECTED @ UTRGV IT Service Desk www.youtube.com- @utrgvit Welcome to UTRGV video IT Service Desk Need Help? Request help or report an incident IT Service Desk Edinburg / McAllen /

More information

Community Meeting #5 Practical ideas to grow your sales in 2017

Community Meeting #5 Practical ideas to grow your sales in 2017 Community Meeting #5 Practical ideas to grow your sales in 2017 Sydney - 9 November 2016 CompTIA Overview & Community Update Grant Cleary APAC Senior Marketing Manager, DocuSign / Executive Council, CompTIA

More information

KOHLS.COM - PRIVACY POLICY

KOHLS.COM - PRIVACY POLICY Welcome to Kohls.com. By using Kohls.com (including www.kohls.com, its related subdomains and microsites, Kohl s mobile website and other Kohl s tools and applications expressly linked to this Privacy

More information

Congratulations on Becoming an Internet Business Owner!

Congratulations on Becoming an Internet Business Owner! Congratulations on Becoming an Internet Business Owner! Those that take action receive all the rewards in life and business. Worth noting: the number one key characteristic of a successful business owner

More information

GM Information Security Controls

GM Information Security Controls : Table of Contents 2... 2-1 2.1 Responsibility to Maintain... 2-2 2.2 GM s Right to Monitor... 2-2 2.3 Personal Privacy... 2-3 2.4 Comply with Applicable Laws and Site Specific Restrictions... 2-3 2.5

More information

How to Build a Culture of Security

How to Build a Culture of Security How to Build a Culture of Security March 2016 Table of Contents You are the target... 3 Social Engineering & Phishing and Spear-Phishing... 4 Browsing the Internet & Social Networking... 5 Bringing Your

More information

JAPAN CYBER-SAVVINESS REPORT 2016 CYBERSECURITY: USER KNOWLEDGE, BEHAVIOUR AND ATTITUDES IN JAPAN

JAPAN CYBER-SAVVINESS REPORT 2016 CYBERSECURITY: USER KNOWLEDGE, BEHAVIOUR AND ATTITUDES IN JAPAN JAPAN CYBER-SAVVINESS REPORT 2016 CYBERSECURITY: USER KNOWLEDGE, BEHAVIOUR AND ATTITUDES IN JAPAN 1. Why did ESET undertake this survey? 2. Survey methodology 3. Key highlights 4. User confidence in protecting

More information

SPONSORSHIP OPPORTUNITIES JULY 25-26, 2018 SANTIAGO, CHILE #ISC2CONGRESSLATAM LATAMCONGRESS.ISC2.ORG

SPONSORSHIP OPPORTUNITIES JULY 25-26, 2018 SANTIAGO, CHILE #ISC2CONGRESSLATAM LATAMCONGRESS.ISC2.ORG SPONSORSHIP OPPORTUNITIES JULY 25-26, 2018 SANTIAGO, CHILE #ISC2CONGRESSLATAM LATAMCONGRESS.ISC2.ORG THE WORLD S LEADING CYBERSECURITY AND IT SECURITY PROFESSIONAL ORGANIZATION How to face the immense

More information

2017 RIMS CYBER SURVEY

2017 RIMS CYBER SURVEY 2017 RIMS CYBER SURVEY This report marks the third year that RIMS has surveyed its membership about cyber risks and transfer practices. This is, of course, a topic that only continues to captivate the

More information

YADTEL - Privacy Information INFORMATION WE COLLECT

YADTEL - Privacy Information INFORMATION WE COLLECT YADTEL - Privacy Information As a customer of Yadtel, you are entitled to know what we do with personal information about you that we receive. We consider our treatment of such information to be a part

More information

Your security on click Jobs

Your security on click Jobs Your security on click Jobs At Click Jobs is a trading name of Raspberry Recruitment Limited, we're committed to helping you find the right job in a safe and secure environment. On these pages, you can

More information

What It Takes to be a CISO in 2017

What It Takes to be a CISO in 2017 What It Takes to be a CISO in 2017 Doug Copley Deputy CISO Sr. Security & Privacy Strategist February 2017 IMAGINE You re the CISO In Bangladesh Of a bank On a Friday when you re closed You realize 6 huge

More information

ISACA MOSCOW CHAPTER Chapter meeting 22 September 2016

ISACA MOSCOW CHAPTER Chapter meeting 22 September 2016 ISACA MOSCOW CHAPTER Chapter meeting 22 September 2016 Introduction Special guest speaker ISACA Audit committee member, Rosemary Amato Open dialog Wrap-up and close Special guest speaker CISA, CMA, CPA,

More information

SECURITY ON PUBLIC WI-FI New Zealand. A guide to help you stay safe online while using public Wi-Fi

SECURITY ON PUBLIC WI-FI New Zealand. A guide to help you stay safe online while using public Wi-Fi SECURITY ON PUBLIC WI-FI New Zealand A guide to help you stay safe online while using public Wi-Fi WHAT S YOUR WI-FI PASSWORD? Enter password for the COFFEE_TIME Wi-Fi network An all too common question

More information

GETTING STARTED GUIDE

GETTING STARTED GUIDE GETTING STARTED GUIDE ON24 SOLUTIONS AND PRODUCT CATALOG Delivering innovative solutions for engaging and high-impact webinars and digital experiences Table of Contents WEBINARS OVERVIEW ON24 Webcast Elite...2

More information

Quick Heal Mobile Security. Anti-Theft Security. Real-Time Protection. Safe Online Banking & Shopping.

Quick Heal Mobile Security. Anti-Theft Security. Real-Time Protection. Safe Online Banking & Shopping. Anti-Theft Security. Real-Time Protection. Safe Online Banking & Shopping. Product Highlights With an easy-to-update virus protection and a dynamic yet simple interface, virus removal from your mobile

More information

Table of Contents. Blog and Personal Web Site Policy

Table of Contents. Blog and Personal Web Site Policy Table of Contents Blog and Personal Web Sites Policy... 2 Policy... 2 Rights to content... 3 Option for More Restrictive License Terms... 3 Attribution... 4 Guidelines... 4 Personal Website and Blog Guidelines

More information

Webinars INSPIRING A SAFE AND SECURE CYBER WORLD Media Kit - North America

Webinars INSPIRING A SAFE AND SECURE CYBER WORLD Media Kit - North America Webinars INSPIRING A SAFE AND SECURE CYBER WORLD 2018 Media Kit - North America 1 THE (ISC) 2 SECURE WEBINARS (ISC) 2 Secure Webinars are a proven method of reaching high-level IT security executives in

More information

E-Sales. Meeting Solutions

E-Sales. Meeting Solutions E-Sales Meeting Solutions Sell more in less time. Enjoy higher close rates for less than the cost of meeting in person. Success in sales is a numbers game. The more opportunities you get to effectively

More information

Welcome to the Next Level Purchasing Association. Next Level Purchasing is absolutely delighted to have you as a member.

Welcome to the Next Level Purchasing Association. Next Level Purchasing is absolutely delighted to have you as a member. 0 Table of Contents Introduction... 1 Logging In... 2 Courses... 3 Accessing & Enrolling in Courses... 3 Attending Courses... 4 SPSM Family of Certifications: Exams... 4 SPSM Family of Certifications:

More information

Chapter 12. Information Security Management

Chapter 12. Information Security Management Chapter 12 Information Security Management We Have to Design It for Privacy... and Security. Tension between Maggie and Ajit regarding terminology to use with Dr. Flores. Overly technical communication

More information

CYBERSECURITY HOW IT IS TRANSFORMING THE IT ASSURANCE FIELD

CYBERSECURITY HOW IT IS TRANSFORMING THE IT ASSURANCE FIELD CYBERSECURITY HOW IT IS TRANSFORMING THE IT ASSURANCE FIELD December 2014 KEVIN GROOM ISACA Involvement (Middle Tennessee Chapter) Treasurer (2009 2011) Vice President (2011 2013) President (2013 present)

More information

GEORGIA CYBERSECURITY WORKFORCE ACADEMY. NASCIO 2018 State IT Recognition Awards

GEORGIA CYBERSECURITY WORKFORCE ACADEMY. NASCIO 2018 State IT Recognition Awards GEORGIA CYBERSECURITY WORKFORCE ACADEMY NASCIO 2018 State IT Recognition Awards Title: Georgia Cybersecurity Workforce Academy Category: Cybersecurity State: Georgia Contact: Stanton Gatewood Stan.Gatewood@gta.ga.gov

More information

Developing Issues in Breach Notification and Privacy Regulations: Risk Managers Are you having the right conversation with the C Suite?

Developing Issues in Breach Notification and Privacy Regulations: Risk Managers Are you having the right conversation with the C Suite? Developing Issues in Breach Notification and Privacy Regulations: Risk Managers Are you having the right conversation with the C Suite? Minnesota RIMS 39 th Annual Seminar Risk 2011-2012: Can You Hack

More information

SY

SY SY0-401 CompTIA Security+ SY0-401 The CompTIA Security+ certification is an internationally recognized validation of foundation-level security skills and knowledge. The exam will certify that the successful

More information

Bring Your Own Device (BYOD) Best Practices & Technologies

Bring Your Own Device (BYOD) Best Practices & Technologies Experience the Eide Bailly Difference Bring Your Own Device (BYOD) Best Practices & Technologies Ross McKnight Sr. Network Engineer 406.867.4160 rmcknight@eidebailly.com Agenda Best Practices for BYOD

More information

Bowie Senior Center Surfing the Web

Bowie Senior Center Surfing the Web Bowie Senior Center Surfing the Web (Without a wetsuit) Introduction Surfing the web is just another term for the activity of searching the Internet for web sites of interest. The Internet is a very powerful

More information

Main area: Security Additional areas: Digital Access, Information Literacy, Privacy and Reputation

Main area: Security Additional areas: Digital Access, Information Literacy, Privacy and Reputation Public Wi Fi Created: March 2016 Last Updated: July 2018 Estimated time: Group or individual activity: Ages: 60 minutes [10 minutes] Activity #1 [15 minutes] Activity #2 [10 minutes] Activity #3 [10 minutes]

More information

WEBINARS INSPIRING A SAFE AND SECURE CYBER WORLD Media Kit - North America

WEBINARS INSPIRING A SAFE AND SECURE CYBER WORLD Media Kit - North America INSPIRING A SAFE AND SECURE CYBER WORLD 2019 Media Kit - North America THE (ISC) 2 (ISC) 2 Webinars are a proven method of reaching high-level IT security executives in an intimate setting. Members advance

More information

Participating in a VAX University Webinar

Participating in a VAX University Webinar Participating in a VAX University Webinar Education is a cornerstone of success for travel professionals and VAX is dedicated to providing access to quality online training, including live supplier webinars,

More information

Cyber Risks in the Boardroom Conference

Cyber Risks in the Boardroom Conference Cyber Risks in the Boardroom Conference Managing Business, Legal and Reputational Risks Perspectives for Directors and Executive Officers Preparing Your Company to Identify, Mitigate and Respond to Risks

More information

Building a Business Case for Cyber Threat Intelligence. 5Reasons Your. Organization Needs a Risk-Based 5Approach to Cybersecurity

Building a Business Case for Cyber Threat Intelligence. 5Reasons Your. Organization Needs a Risk-Based 5Approach to Cybersecurity Building a Business Case for Cyber Threat Intelligence 5Reasons Your Organization Needs a Risk-Based 5Approach to Cybersecurity 5 Reasons for a Risk-Based Approach to Cybersecurity The Bad Guys are Winning

More information

Mobile Device Management: A Real Need for the Mobile World

Mobile Device Management: A Real Need for the Mobile World Mobile Device Management: A Real Need for the Mobile World In today s modern workplace, employees are utilizing a variety of mobile devices both in and out of the office. Gone are the days when employees

More information

Supplier Info Pack. Light Account PUBLIC. Rev. 07/20/2017

Supplier Info Pack. Light Account PUBLIC. Rev. 07/20/2017 Supplier Info Pack Light Account Rev. 07/20/2017 Learn About Ariba Network, light account What is a light account? Can I upgrade my light account? What do I do next? Where do I go for help? How does a

More information

How To Remove Personal Antivirus Security Pro Virus

How To Remove Personal Antivirus Security Pro Virus How To Remove Personal Antivirus Security Pro Virus When hackers break into government servers to steal your personal data, there's not a The independent labs uniformly heap praise on Kaspersky Anti-Virus

More information

Frequently Asked Questions (FAQ)

Frequently Asked Questions (FAQ) Your personal information and account security is important to us. This product employs a Secure Sign On process that includes layers of protection at time of product log in to mitigate risk, and thwart

More information

October 21 22, 2014 Introduction to CompTIA, Communities, and ITSS

October 21 22, 2014 Introduction to CompTIA, Communities, and ITSS October 21 22, 2014 Introduction to CompTIA, Communities, and ITSS CompTIA Big View CompTIA Member Communities IT Services & Support Who is CompTIA? Global, Not for Profit, IT Industry Trade Association

More information

You WILL NOT be soliciting pledges but instead taking incoming calls from persons who have already decided to make a donation.

You WILL NOT be soliciting pledges but instead taking incoming calls from persons who have already decided to make a donation. Cornerstone has partnered with great work from home companies like KahlCenter and ACD Direct to source dynamic customer service agents for pledge processing and fundraising for Non-Profit organizations

More information

Methodology USA UK AUSTRALIA CANADA JAPAN N=1,008 MOE=+/-3% N=1,044 MOE=+/- 3% N=1,028 MOE=+/- 3% N=1,025 MOE=+/- 3% N=1,005 MOE=+/- 3%

Methodology USA UK AUSTRALIA CANADA JAPAN N=1,008 MOE=+/-3% N=1,044 MOE=+/- 3% N=1,028 MOE=+/- 3% N=1,025 MOE=+/- 3% N=1,005 MOE=+/- 3% Norton by Symantec commissioned an online survey across nine countries in order to better understand consumers public Wi-Fi perceptions and practices, unveiling consumer misconceptions and worries about

More information

Quick Heal Mobile Security. Free protection for your Android phone against virus attacks, unwanted calls, and theft.

Quick Heal Mobile Security. Free protection for your Android phone against virus attacks, unwanted calls, and theft. Quick Heal Mobile Security Free protection for your Android phone against virus attacks, unwanted calls, and theft. Product Highlights Complete protection for your Android device that simplifies security

More information

icohere Unified Learning System System Highlights

icohere Unified Learning System System Highlights Page 1 icohere Unified Learning System System Highlights Based on 15 years of real world experience supporting organizations of all sizes & stripes, icohere s modular design enables you to implement a

More information

CWNE - Application INSTRUCTIONS FOR APPLICANT. Page 1 of 6

CWNE - Application INSTRUCTIONS FOR APPLICANT. Page 1 of 6 CWNE - Application INSTRUCTIONS FOR APPLICANT Thank you for your interest in applying for the CWNE certification. The fact that you qualify to become a CWNE professional shows that you have accomplished

More information

Could the BIGGEST Threat to Your Business be INSIDE Your Company?

Could the BIGGEST Threat to Your Business be INSIDE Your Company? Could the BIGGEST Threat to Your Business be INSIDE Your Company? Presented By: Cheryl W. Snead, Banneker Industries, Inc. Rick Avery, Securitas Security Inc. Cheryl W. Snead President/CEO/Facility Security

More information

Adelaide Fringe is committed to protecting the privacy of its artists, employees, prospective employees, venues and the general public.

Adelaide Fringe is committed to protecting the privacy of its artists, employees, prospective employees, venues and the general public. Adelaide Fringe Privacy Statement Revised 16 July 2018 Our Commitment Adelaide Fringe is committed to protecting the privacy of its artists, employees, prospective employees, venues and the general public.

More information

T H E U N I V E R S I T Y O F T E X A S A T E L P A S O. College of Business Administration. Information Systems

T H E U N I V E R S I T Y O F T E X A S A T E L P A S O. College of Business Administration. Information Systems T H E U N I V E R S I T Y O F T E X A S A T E L P A S O College of Business Administration Information Systems What is Computer Information Systems? A field of studying computers and algorithmic processes.

More information

MemSQL Partner Program Guide

MemSQL Partner Program Guide MemSQL Partner Program Guide April 2018 Introduction As the world changes and it s changing faster than ever you need to be adapting to it. You need to be anticipating problems before they occur. You need

More information

Data Security Essentials

Data Security Essentials Data Security Essentials Strategies to Protect Non-public Personal Information Oct. 28, 2015 alta.org/titletopics Speakers Chris Gulotta Real Estate Data Shield Chris Hacker ShortTrack Todd Hougaard BeesPath

More information

Technology Basics and Social Networking Presented by Gina Lobdell Graduate Student at Purdue University

Technology Basics and Social Networking Presented by Gina Lobdell Graduate Student at Purdue University Technology Basics and Social Networking Presented by Gina Lobdell Graduate Student at Purdue University Photo Copyright 2012 AgVenture. All Rights Reserved. Welcome Goals of the workshop: Gain a better

More information

Credit Union Cyber Crisis: Gaining Awareness and Combatting Cyber Threats Without Breaking the Bank

Credit Union Cyber Crisis: Gaining Awareness and Combatting Cyber Threats Without Breaking the Bank Credit Union Cyber Crisis: Gaining Awareness and Combatting Cyber Threats Without Breaking the Bank Introduction The 6,331 credit unions in the United States face a unique challenge when it comes to cybersecurity.

More information

USING RMA XCHANGE: How Chapter Board Members Should Use It. Matt Bryant Frost Bank Texas Regional Chapter

USING RMA XCHANGE: How Chapter Board Members Should Use It. Matt Bryant Frost Bank Texas Regional Chapter 1 USING RMA XCHANGE: How Chapter Board Members Should Use It Speakers: Matt Bryant Frost Bank Texas Regional Chapter Jennifer Welch New Bridge Bank Carolina-Virginias Regional Chapter Cindee Munro - RMA

More information

Bachelor of Information Technology

Bachelor of Information Technology Higher Education Northern Sydney Institute Bachelor of Information Technology [ Network security ] www.nsi.tafensw.edu.au/itsecuritydegree Bachelor of Information Technology [ Network security ] Cybercrime

More information

IBM Security Intelligence on Cloud

IBM Security Intelligence on Cloud Service Description IBM Security Intelligence on Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means and includes the company, its authorized users or recipients

More information

Security. Bob Shantz Director of Infrastructure & Cloud Services Computer Guidance Corporation. All Rights Reserved.

Security. Bob Shantz Director of Infrastructure & Cloud Services Computer Guidance Corporation. All Rights Reserved. Security Bob Shantz Director of Infrastructure & Cloud Services 2016 Computer Guidance Corporation. All Rights Reserved. CPE Credits To receive your CPE Credits:. Complete a survey for each session attended.

More information

Unit 2 Essentials of cyber security

Unit 2 Essentials of cyber security 2016 Suite Cambridge TECHNICALS LEVEL 2 IT Unit 2 Essentials of cyber security A/615/1352 Guided learning hours: 30 Version 1 September 2016 ocr.org.uk/it LEVEL 2 UNIT 2: Essentials of cyber security A/615/1352

More information

PCI Compliance. What is it? Who uses it? Why is it important?

PCI Compliance. What is it? Who uses it? Why is it important? PCI Compliance What is it? Who uses it? Why is it important? Definitions: PCI- Payment Card Industry DSS-Data Security Standard Merchants Anyone who takes a credit card payment 3 rd party processors companies

More information

Cyber Security. February 13, 2018 (webinar) February 15, 2018 (in-person)

Cyber Security. February 13, 2018 (webinar) February 15, 2018 (in-person) Cyber Security Presenters: - Brian Everest, Chief Technology Officer, Starport Managed Services - Susan Pawelek, Accountant, Compliance and Registrant Regulation February 13, 2018 (webinar) February 15,

More information

Effective Cyber Incident Response in Insurance Companies

Effective Cyber Incident Response in Insurance Companies August 2017 Effective Cyber Incident Response in Insurance Companies An article by Raj K. Chaudhary, CRISC, CGEIT; Troy M. La Huis; and Lucas J. Morris, CISSP Audit / Tax / Advisory / Risk / Performance

More information

University of Pittsburgh Security Assessment Questionnaire (v1.7)

University of Pittsburgh Security Assessment Questionnaire (v1.7) Technology Help Desk 412 624-HELP [4357] technology.pitt.edu University of Pittsburgh Security Assessment Questionnaire (v1.7) Directions and Instructions for completing this assessment The answers provided

More information

Supplies Network & CompTIA Membership and Trustmark Initiative

Supplies Network & CompTIA Membership and Trustmark Initiative Supplies Network & CompTIA Membership and Trustmark Initiative Welcome & Agenda Your hosts today: Miles Jobgen, Director, Trustmarks CompTIA Sarah Custer, MPS Solutions & Equipment Managed, SuppliesNetwork

More information

2019 UTC Region 3 Spring Meeting and EXPO Columbia, SC, March 6-8, 2019

2019 UTC Region 3 Spring Meeting and EXPO Columbia, SC, March 6-8, 2019 2019 UTC Region 3 Spring Meeting and EXPO Columbia, SC, March 6-8, 2019 As the UTC Region 3 Vendor Liaison and on behalf of the Utilities Technology Council, I would like to invite you to participate in

More information

ISACA MANILA CHAPTER CALENDAR OF ACTIVITIES

ISACA MANILA CHAPTER CALENDAR OF ACTIVITIES MANILA CHAPTER 2017 CALENDAR OF ACTIVITIES 2017 MANILA CALENDAR OF ACTIVITIES GMM Professionals Night Public Trainings Reviews Conferences Technical Session & MANILA PROFILE HISTORY AND MISSION Who we

More information

mhealth SECURITY: STATS AND SOLUTIONS

mhealth SECURITY: STATS AND SOLUTIONS mhealth SECURITY: STATS AND SOLUTIONS www.eset.com WHAT IS mhealth? mhealth (also written as m-health) is an abbreviation for mobile health, a term used for the practice of medicine and public health supported

More information

An Introduction to the CFA Institute. All Rights Reserved

An Introduction to the CFA Institute. All Rights Reserved An Introduction to the 2015 CFA Institute. All Rights Reserved AGENDA 1. CFA INSTITUTE 2. BUILD UNDERSTANDING WITH THE CLARITAS PROGRAM 3. WHAT YOU WILL LEARN 4. THE CLARITAS EXPERIENCE 2 ABOUT CFA INSTITUTE

More information

IBM Resilient Incident Response Platform On Cloud

IBM Resilient Incident Response Platform On Cloud Service Description IBM Resilient Incident Response Platform On Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means the contracting party and its authorized

More information