Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

IS/DPP for staff #2 - Why?

47 views

Published on

An example of how the staff training on information security, data protection and privacy (IS/DPP) could look.
This part is on the reason why we should live up to the rules of IS/DPP, from a "negative" perspective (what do we want to avoid?) and from a "positive" perspective (what do we want to accomplish?).
The slides come with notes that in short explain the visuals on the slides.

Published in: Education
  • Be the first to comment

  • Be the first to like this

IS/DPP for staff #2 - Why?

  1. 1. - Internal - IS/DPP Baseline Training E-learning – Part 2 – Why?
  2. 2. 2 - Internal - Page Why are we doing this?
  3. 3. 3 - Internal - Page Avoid the Bad
  4. 4. 4 - Internal - Page Legal Sanctions
  5. 5. 5 - Internal - Page Litigation with Competitors or Customers
  6. 6. 6 - Internal - Page Competition Stealing our Ideas, Customer Data,…
  7. 7. 7 - Internal - Page Reputational Damage
  8. 8. 8 - Internal - Page Reputational Damage
  9. 9. 9 - Internal - Page Reputational Damage
  10. 10. 10 - Internal - Page Reputational Damage
  11. 11. 11 - Internal - Page Practical Impact
  12. 12. 12 - Internal - Page It Can and Does Happen To Us Email from the CIO (the day after) I am please to inform you that the virus infection we suffered yesterday is now resolved an the file servers are back online. The cause of the issue was an infected attachement in an email that appeared to be from a trusted external organisation but was actually spam. I would like to remind everyone to be aware of the threat of what can often appear to be legitimate emails. We have the latest and completely up-to-date virus checking software installed in the organisation, but the hackers are one step ahead. So it is impossible to automatically detect everything. We need you to be vigilant. If you receive anything fro external sources with attachments that you are either not expecting or appears in any way suspicious, please, shut down your pc immediately and contact the helpdesk. The impact of this particular incident was 24,000 files were encrypted on the file server and could no longer be opened. The IT team was working all night to restore the situation.
  13. 13. 13 - Internal - Page Practical Impact
  14. 14. 14 - Internal - Page Practical Impact
  15. 15. 15 - Internal - Page Pick up the Good
  16. 16. 16 - Internal - Page Trust
  17. 17. 17 - Internal - Page Trust
  18. 18. 18 - Internal - Page Information Management
  19. 19. 19 - Internal - Page Clean(er) Data
  20. 20. 20 - Internal - Page Better Customer Experience
  21. 21. 21 - Internal - Page More and Better Use of Data
  22. 22. 22 - Internal - Page Key Takeaways  We avoid the bad.  No sanctions.  No negative financial impact.  No negative reputational impact.  No negative practical impact.  We try to capture the good.  Be trustworthy.  Manage our data.  Lower our cost.  Support the customer experience.  Be future proof. 30 sec IS/DPP survival kit WrapUp

×