• Save
University of Alabama
Upcoming SlideShare
Loading in...5
×
 

University of Alabama

on

  • 266 views

Loss Prevention & The Hotel of the Future ...

Loss Prevention & The Hotel of the Future
RHM 387 Hotel/Motel Security Management
November 15, 2011
University of Alabama

Based on the results of the 2011 Global Information Security Survey conducted by Ernst & Young

Statistics

Views

Total Views
266
Views on SlideShare
253
Embed Views
13

Actions

Likes
0
Downloads
0
Comments
0

1 Embed 13

http://www.linkedin.com 13

Accessibility

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment
  • http://www.youtube.com/watch?v=hyhmiY03zZ0
  • http://www.youtube.com/watch?v=icePl3iVHFo
  • http://venturebeat.com/2011/11/14/cloud-iaas-paas-saas/
  • http://www.youtube.com/watch?v=STeHSxoFtLo
  • http://www.youtube.com/watch?v=D3EG2OYbl_4

University of Alabama University of Alabama Presentation Transcript

  • LORIE A. TUMA, ED.D. Central Michigan University Loss Prevention RHM 387 Hotel/Motel Security Management November 15, 2011 University of AlabamaBased on the results of the 2011 Global Information Security Survey conducted by Ernst & Young
  • Loss Prevention: Are you having the conversation? Global Information Security Survey
  • • Trending topicsThe Hotel of the • Things we do at the management level to mitigat Future loss and address challenges • Videos (YouTube) • Commentary • Stories • Case Studies • Interactive Q & A
  • Even the hotel of the future will have challenges• CLOUD COMPUTING• MOBILE COMPUTING• DATA LOSS PREVENTION• BUSINESS CONTINUITY• REPUTATION MANAGEMENT
  • Cloud Computing• 61% of businesses are evaluating or planning to use cloud computing-based services within the next year.SAAS: SOFTWARE AS A SERVICEPAAS: PLATFORM AS A SERVICEIAAS: INFRASTRUCTURE AS A SERVICEWHY SWITCH TO CLOUDS?• PHYSICAL BOUNDARIES• TECHNOLOGY• OUTSOURCING
  • A cloud computing company is any company that provides its services over the Internet.
  • Risks• Compliance and privacy.. For cloud users it is often not clear where data resides, which creates challenges for privacy.• Information security and data integrity. Processing data with a cloud service provider followed by communication over the internet, as opposed to keeping it entirely within a company network, increases data and information vulnerability.• Contract and legal. Contractual risks stem primarily from the types of contracts that companies enter into with cloud service providers• Governance and risk management and assurance. Organizations need a governance model and a cloud strategy, including a cloud risk management approach.• Reliability and continuity of operations. Cloud users are depending on their cloud service providers’ business continuity program, disaster recovery capabilities, and support desk.
  • Mobile Computing• 80% of businesses are either planning, evaluating or actually using tablet computers.
  • Risks• Encryption concerns with constant access to email and corporate applications• Compromised storage of sensitive company data as well as private personal data. ** Only 7% of respondents have made policy adjustments to lessen the risks related to mobile computing devices.
  • Data Loss Prevention• 56% indicated that their current data loss prevention tools need to be modified.• 66% have not implemented data loss prevention tools• 31% indicated that they have purchased data loss prevention tools – that have failed.
  • Business Continuity• For the second consecutive year, respondents have indicated that business continuity is their top funding priority. Also known as DISASTER RECOVERY PLANS
  • Tsunami: The aftermath• 19 miles below sea bottom• 9.3 Earthquake• 994 miles of fault line slipped 50 feet• 229,866 people (42,883 still missing)• 1/3 were children• 4 times more women than men• 9,000 were tourists• People at sea; and inland• 1 out of 10 people that got wet, did not survive
  • Reputation Management• Nearly 40% rate social media-related risks as challenging.• 53% have implemented limited or no access to social media sites as a control to mitigate risks related to social media.
  • Pan Am 103
  • Ernst & Young, 2011• Bring information security into the boardroom, talk about it – have a strategy that protects you – and adds value!• Integrate information security with service and product deliver – so everyone is thinking about it at every level of operation.• Focus information security on protecting what matters most, such as customer information and intellectual property.
  • Take-Aways• “Everything you do is reputation management: from hiring and training staff to the type of linens you order for the guest rooms.”• “Imagine the hotel reviews you want, and then become the hotel that inspires them.” - Adele Gutman of HK Hotels
  • QuestionsLORIE A. TUMA, ED.D. Central Michigan University