SlideShare a Scribd company logo
1 of 25
Information Security
Training Presentation
[name] [date]
Learning objectives
 Why information security?
 What information is covered?
 Classifying information
 Information security in practice
 Our company’s information security policy
Why is information security important?
Information is valuable… Information is personal…
What information is covered?
 Personal
 Legal
 Corporate
 Operational
If it’s not in the public domain, protect it!
Risks & consequences
 The data’s value
 The added risk of a direct attack – on our people or our systems
 The cost of regulatory fines
 The cost of restoring or recreating what’s lost
 Reputational damage
When it goes wrong
Bank fined £500k
for data loss
Target loses
personal data of
70m customers
MP’s notes
photographed in
Downing Street
HIV clinic
accidentally leaks
patient details
Social worker
leaves court data
on car roof
Information Security breaches
Why do information security breaches occur?




a. Ignorance of the rules
e.g. policy violations caused by a lack of training
b. Failing to realize data was confidential
c. Insufficient methods to protect data
d. Deliberate leaks
e. User error
e.g. sending an email with data to the wrong people 
Understanding the data universe
 Data classification system
 Lifecycle
Creation Storage/Retrieval (Use) Disposal
Classifying information
1. Confidential
2. Inside
3. Internal
4. Public
You make the call: What type is it?
Last year’s
annual company report



Confidential
Inside
Internal
Public
A client’s payment
details
Confidential
Inside
Internal
Public
Our company phone
directory and handbook
Confidential
Inside
Internal
Public
Communication & information security
I forwarded the
email without
thinking. I forgot to
check what else was
further down the
thread.
I clicked on Reply to All by
accident. The message went
to all our 3,000 employees.
The system was swamped
when people replied back.
Email Instant messages
Information security & the internet
Happy Birthday to my favourite client
Lydia Clarke
In Leeds today with Magee Investments
– exciting times ahead
Bye desk – see you in 2 weeks
Information security on the move
 Eavesdropping
 Shoulder surfing
 Unsecure WiFi connections
 Loss of physical information
 Loss of equipment or devices
Opinion: Security & portable media
I lost a memory stick
after travelling to a
client meeting. The
data wasn’t
encrypted.
My laptop was
stolen on the train.
There wasn’t much
information on it but
that’s not the point.
Security in the cloud
Avoid content dumps –
copying everything as a
backup ‘just in case’
Conduct due diligence before
granting shared access
Allow shared logins
Create new folders to give
access to third parties
YES YES NO
YES
Give everyone the same
privileges and access rights
NO
Vet IT professionals who have
access to our cloud and file-
sharing services
YES
When it goes wrong
Email error blamed for
massive data breach
Security firm warns of
ransomware risk
Lightning strikes
Google’s cloud data
Greater Manchester
Police fined £120k for
memory stick robbery
Clinton used personal
email
Dropbox targeted by
Trojans
GDPR penalties are severe
4%
of global
turnover
€20 million
Scenario 1: Gloria’s holiday
What should she do?

I may be going away
but I still need to
keep on top of what’s
happening
a) Log in via remote access to access her work email account
b) Ask her colleagues to cc all the emails to her personal email
account
c) Forward emails directly to her mobile so she can pick them
up on the go
d) If it’s important, her team should call her instead – it’s more
secure
Scenario 2: Adam’s meeting
What should he do?


I’m off to
Manchester today
for a meeting and
need to take my
laptop…
a) It’s best to travel without devices to limit the risks
b) Ensure that he travels with minimal information, in case
of theft
c) Only use iOS products as they pose no security risks
d) Avoid discussing work in public places or in earshot of
others
Our Information Security Policy
 Providing information and training – raising awareness
 Carrying out regular risk assessments
 Testing our systems are secure
 Providing appropriate technology to keep information safe
 Appointing people with specific responsibility for information security
 Requiring everyone to read and implement our Information Security Policy
Do
Read our Company's Information Security Policy – make sure you understand our
rules and know what to do
Be aware of how data you use is classified
Take appropriate precautions whenever you use our information, right
throughout the lifecycle – from creation to disposal
Report any issues or breaches immediately to your manager – so we can limit our
losses
Don’t
 Assume that everyone is entitled to see the same information as you
 Leave your computer logged on or leave information unattended on your desk
 Send or store sensitive information electronically without encryption
 Forward our information to your personal devices
 Share your login with anyone else
 Let visitors walk around our offices unattended
Questions, comments
or concerns?
Next steps
Call _____ on _____ if you need information or guidance
Call _____ on _____ if you need to raise concerns
Access self-study courses on our e-learning portal for further training [or
optionally – Complete your mandatory training on our corporate e-learning
portal]
About Skillcast
 Skillcast provides digital learning content, technology
and services to help you train your staff, automate
your compliance processes and generate
management reports to help you keep track of it all.
 Our best-selling Compliance Essentials Library
provides a complete and comprehensive off-the-shelf
compliance solution for UK businesses.
Register for a free trial at
https://www.skillcast.com/free-trial
Copyright © 2022 Skillcast. All Rights Reserved.

More Related Content

Similar to Cyber Security_Training Presentation.pptx

Lecture-3.ppt
Lecture-3.pptLecture-3.ppt
Lecture-3.pptKaty Kate
 
Data breaches - Is Your Law Firm in Danger
Data breaches - Is Your Law Firm in DangerData breaches - Is Your Law Firm in Danger
Data breaches - Is Your Law Firm in DangerZitaAdlTrk
 
Hr Wcu General Security Awareness Training Ed01
Hr Wcu General Security Awareness Training Ed01Hr Wcu General Security Awareness Training Ed01
Hr Wcu General Security Awareness Training Ed01Donna Koger
 
IBM's four key steps to security and privacy for big data
IBM's four key steps to security and privacy for big dataIBM's four key steps to security and privacy for big data
IBM's four key steps to security and privacy for big dataIBM Analytics
 
Big data contains valuable information - Protect It!
Big data contains valuable information - Protect It!Big data contains valuable information - Protect It!
Big data contains valuable information - Protect It!Praveenkumar Hosangadi
 
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...cyberprosocial
 
I’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take NextI’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take NextBrian Pichman
 
VTU - MIS Module 8 - Security and Ethical Challenges
VTU - MIS Module 8 -  Security and Ethical ChallengesVTU - MIS Module 8 -  Security and Ethical Challenges
VTU - MIS Module 8 - Security and Ethical ChallengesPriya Diana Mercy
 
Intro to Information Security.ppt
Intro to Information Security.pptIntro to Information Security.ppt
Intro to Information Security.pptAnuraagAwasthi3
 
Securing Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksSecuring Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksHokme
 
How to Secure Data Privacy in 2024.pdf
How to Secure Data Privacy in 2024.pdfHow to Secure Data Privacy in 2024.pdf
How to Secure Data Privacy in 2024.pdfV2Infotech1
 
How to Secure Data Privacy in 2024.pptx
How to Secure Data Privacy in 2024.pptxHow to Secure Data Privacy in 2024.pptx
How to Secure Data Privacy in 2024.pptxV2Infotech1
 
A Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOsA Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOsgppcpa
 

Similar to Cyber Security_Training Presentation.pptx (20)

Lecture-3.ppt
Lecture-3.pptLecture-3.ppt
Lecture-3.ppt
 
Need for Data Protection Training - How E-learning Can Help?
Need for Data Protection Training - How E-learning Can Help?Need for Data Protection Training - How E-learning Can Help?
Need for Data Protection Training - How E-learning Can Help?
 
Data breaches - Is Your Law Firm in Danger
Data breaches - Is Your Law Firm in DangerData breaches - Is Your Law Firm in Danger
Data breaches - Is Your Law Firm in Danger
 
Information Security Awareness Session -2020
Information Security Awareness Session -2020Information Security Awareness Session -2020
Information Security Awareness Session -2020
 
IT Policy
IT PolicyIT Policy
IT Policy
 
Hr Wcu General Security Awareness Training Ed01
Hr Wcu General Security Awareness Training Ed01Hr Wcu General Security Awareness Training Ed01
Hr Wcu General Security Awareness Training Ed01
 
IBM's four key steps to security and privacy for big data
IBM's four key steps to security and privacy for big dataIBM's four key steps to security and privacy for big data
IBM's four key steps to security and privacy for big data
 
Big data contains valuable information - Protect It!
Big data contains valuable information - Protect It!Big data contains valuable information - Protect It!
Big data contains valuable information - Protect It!
 
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
I’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take NextI’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take Next
 
VTU - MIS Module 8 - Security and Ethical Challenges
VTU - MIS Module 8 -  Security and Ethical ChallengesVTU - MIS Module 8 -  Security and Ethical Challenges
VTU - MIS Module 8 - Security and Ethical Challenges
 
Intro to Information Security.ppt
Intro to Information Security.pptIntro to Information Security.ppt
Intro to Information Security.ppt
 
unit-1-is1.pptx
unit-1-is1.pptxunit-1-is1.pptx
unit-1-is1.pptx
 
Securing Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksSecuring Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP Leaks
 
How to Secure Data Privacy in 2024.pdf
How to Secure Data Privacy in 2024.pdfHow to Secure Data Privacy in 2024.pdf
How to Secure Data Privacy in 2024.pdf
 
How to Secure Data Privacy in 2024.pptx
How to Secure Data Privacy in 2024.pptxHow to Secure Data Privacy in 2024.pptx
How to Secure Data Privacy in 2024.pptx
 
Types of Cyber Crimes and Security Threats
Types of Cyber Crimes and Security ThreatsTypes of Cyber Crimes and Security Threats
Types of Cyber Crimes and Security Threats
 
Shailendra Pandey.ppt
Shailendra Pandey.pptShailendra Pandey.ppt
Shailendra Pandey.ppt
 
A Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOsA Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOs
 

Recently uploaded

Ioannis Tzachristas Self-Presentation for MBA.pdf
Ioannis Tzachristas Self-Presentation for MBA.pdfIoannis Tzachristas Self-Presentation for MBA.pdf
Ioannis Tzachristas Self-Presentation for MBA.pdfjtzach
 
Dubai Call Girls Naija O525547819 Call Girls In Dubai Home Made
Dubai Call Girls Naija O525547819 Call Girls In Dubai Home MadeDubai Call Girls Naija O525547819 Call Girls In Dubai Home Made
Dubai Call Girls Naija O525547819 Call Girls In Dubai Home Madekojalkojal131
 
Storytelling, Ethics and Workflow in Documentary Photography
Storytelling, Ethics and Workflow in Documentary PhotographyStorytelling, Ethics and Workflow in Documentary Photography
Storytelling, Ethics and Workflow in Documentary PhotographyOrtega Alikwe
 
Business Development and Product Strategy for a SME named SARL based in Leban...
Business Development and Product Strategy for a SME named SARL based in Leban...Business Development and Product Strategy for a SME named SARL based in Leban...
Business Development and Product Strategy for a SME named SARL based in Leban...Soham Mondal
 
VIP Call Girls in Cuttack Aarohi 8250192130 Independent Escort Service Cuttack
VIP Call Girls in Cuttack Aarohi 8250192130 Independent Escort Service CuttackVIP Call Girls in Cuttack Aarohi 8250192130 Independent Escort Service Cuttack
VIP Call Girls in Cuttack Aarohi 8250192130 Independent Escort Service CuttackSuhani Kapoor
 
Call Girls Mukherjee Nagar Delhi reach out to us at ☎ 9711199012
Call Girls Mukherjee Nagar Delhi reach out to us at ☎ 9711199012Call Girls Mukherjee Nagar Delhi reach out to us at ☎ 9711199012
Call Girls Mukherjee Nagar Delhi reach out to us at ☎ 9711199012rehmti665
 
Gurgaon Call Girls: Free Delivery 24x7 at Your Doorstep G.G.N = 8377087607
Gurgaon Call Girls: Free Delivery 24x7 at Your Doorstep G.G.N = 8377087607Gurgaon Call Girls: Free Delivery 24x7 at Your Doorstep G.G.N = 8377087607
Gurgaon Call Girls: Free Delivery 24x7 at Your Doorstep G.G.N = 8377087607dollysharma2066
 
PM Job Search Council Info Session - PMI Silver Spring Chapter
PM Job Search Council Info Session - PMI Silver Spring ChapterPM Job Search Council Info Session - PMI Silver Spring Chapter
PM Job Search Council Info Session - PMI Silver Spring ChapterHector Del Castillo, CPM, CPMM
 
阿德莱德大学本科毕业证成绩单咨询(书英文硕士学位证)
阿德莱德大学本科毕业证成绩单咨询(书英文硕士学位证)阿德莱德大学本科毕业证成绩单咨询(书英文硕士学位证)
阿德莱德大学本科毕业证成绩单咨询(书英文硕士学位证)obuhobo
 
NPPE STUDY GUIDE - NOV2021_study_104040.pdf
NPPE STUDY GUIDE - NOV2021_study_104040.pdfNPPE STUDY GUIDE - NOV2021_study_104040.pdf
NPPE STUDY GUIDE - NOV2021_study_104040.pdfDivyeshPatel234692
 
定制(UOIT学位证)加拿大安大略理工大学毕业证成绩单原版一比一
 定制(UOIT学位证)加拿大安大略理工大学毕业证成绩单原版一比一 定制(UOIT学位证)加拿大安大略理工大学毕业证成绩单原版一比一
定制(UOIT学位证)加拿大安大略理工大学毕业证成绩单原版一比一Fs sss
 
Sonam +91-9537192988-Mind-blowing skills and techniques of Ahmedabad Call Girls
Sonam +91-9537192988-Mind-blowing skills and techniques of Ahmedabad Call GirlsSonam +91-9537192988-Mind-blowing skills and techniques of Ahmedabad Call Girls
Sonam +91-9537192988-Mind-blowing skills and techniques of Ahmedabad Call GirlsNiya Khan
 
加利福尼亚艺术学院毕业证文凭证书( 咨询 )证书双学位
加利福尼亚艺术学院毕业证文凭证书( 咨询 )证书双学位加利福尼亚艺术学院毕业证文凭证书( 咨询 )证书双学位
加利福尼亚艺术学院毕业证文凭证书( 咨询 )证书双学位obuhobo
 
VIP Call Girls Service Saharanpur Aishwarya 8250192130 Independent Escort Ser...
VIP Call Girls Service Saharanpur Aishwarya 8250192130 Independent Escort Ser...VIP Call Girls Service Saharanpur Aishwarya 8250192130 Independent Escort Ser...
VIP Call Girls Service Saharanpur Aishwarya 8250192130 Independent Escort Ser...Suhani Kapoor
 
VIP Call Girls Service Jamshedpur Aishwarya 8250192130 Independent Escort Ser...
VIP Call Girls Service Jamshedpur Aishwarya 8250192130 Independent Escort Ser...VIP Call Girls Service Jamshedpur Aishwarya 8250192130 Independent Escort Ser...
VIP Call Girls Service Jamshedpur Aishwarya 8250192130 Independent Escort Ser...Suhani Kapoor
 
VIP Russian Call Girls Amravati Chhaya 8250192130 Independent Escort Service ...
VIP Russian Call Girls Amravati Chhaya 8250192130 Independent Escort Service ...VIP Russian Call Girls Amravati Chhaya 8250192130 Independent Escort Service ...
VIP Russian Call Girls Amravati Chhaya 8250192130 Independent Escort Service ...Suhani Kapoor
 
Black and White Minimalist Co Letter.pdf
Black and White Minimalist Co Letter.pdfBlack and White Minimalist Co Letter.pdf
Black and White Minimalist Co Letter.pdfpadillaangelina0023
 

Recently uploaded (20)

Call Girls In Prashant Vihar꧁❤ 🔝 9953056974🔝❤꧂ Escort ServiCe
Call Girls In Prashant Vihar꧁❤ 🔝 9953056974🔝❤꧂ Escort ServiCeCall Girls In Prashant Vihar꧁❤ 🔝 9953056974🔝❤꧂ Escort ServiCe
Call Girls In Prashant Vihar꧁❤ 🔝 9953056974🔝❤꧂ Escort ServiCe
 
Ioannis Tzachristas Self-Presentation for MBA.pdf
Ioannis Tzachristas Self-Presentation for MBA.pdfIoannis Tzachristas Self-Presentation for MBA.pdf
Ioannis Tzachristas Self-Presentation for MBA.pdf
 
Dubai Call Girls Naija O525547819 Call Girls In Dubai Home Made
Dubai Call Girls Naija O525547819 Call Girls In Dubai Home MadeDubai Call Girls Naija O525547819 Call Girls In Dubai Home Made
Dubai Call Girls Naija O525547819 Call Girls In Dubai Home Made
 
Young Call~Girl in Pragati Maidan New Delhi 8448380779 Full Enjoy Escort Service
Young Call~Girl in Pragati Maidan New Delhi 8448380779 Full Enjoy Escort ServiceYoung Call~Girl in Pragati Maidan New Delhi 8448380779 Full Enjoy Escort Service
Young Call~Girl in Pragati Maidan New Delhi 8448380779 Full Enjoy Escort Service
 
Storytelling, Ethics and Workflow in Documentary Photography
Storytelling, Ethics and Workflow in Documentary PhotographyStorytelling, Ethics and Workflow in Documentary Photography
Storytelling, Ethics and Workflow in Documentary Photography
 
Business Development and Product Strategy for a SME named SARL based in Leban...
Business Development and Product Strategy for a SME named SARL based in Leban...Business Development and Product Strategy for a SME named SARL based in Leban...
Business Development and Product Strategy for a SME named SARL based in Leban...
 
VIP Call Girls in Cuttack Aarohi 8250192130 Independent Escort Service Cuttack
VIP Call Girls in Cuttack Aarohi 8250192130 Independent Escort Service CuttackVIP Call Girls in Cuttack Aarohi 8250192130 Independent Escort Service Cuttack
VIP Call Girls in Cuttack Aarohi 8250192130 Independent Escort Service Cuttack
 
Call Girls Mukherjee Nagar Delhi reach out to us at ☎ 9711199012
Call Girls Mukherjee Nagar Delhi reach out to us at ☎ 9711199012Call Girls Mukherjee Nagar Delhi reach out to us at ☎ 9711199012
Call Girls Mukherjee Nagar Delhi reach out to us at ☎ 9711199012
 
Gurgaon Call Girls: Free Delivery 24x7 at Your Doorstep G.G.N = 8377087607
Gurgaon Call Girls: Free Delivery 24x7 at Your Doorstep G.G.N = 8377087607Gurgaon Call Girls: Free Delivery 24x7 at Your Doorstep G.G.N = 8377087607
Gurgaon Call Girls: Free Delivery 24x7 at Your Doorstep G.G.N = 8377087607
 
PM Job Search Council Info Session - PMI Silver Spring Chapter
PM Job Search Council Info Session - PMI Silver Spring ChapterPM Job Search Council Info Session - PMI Silver Spring Chapter
PM Job Search Council Info Session - PMI Silver Spring Chapter
 
阿德莱德大学本科毕业证成绩单咨询(书英文硕士学位证)
阿德莱德大学本科毕业证成绩单咨询(书英文硕士学位证)阿德莱德大学本科毕业证成绩单咨询(书英文硕士学位证)
阿德莱德大学本科毕业证成绩单咨询(书英文硕士学位证)
 
NPPE STUDY GUIDE - NOV2021_study_104040.pdf
NPPE STUDY GUIDE - NOV2021_study_104040.pdfNPPE STUDY GUIDE - NOV2021_study_104040.pdf
NPPE STUDY GUIDE - NOV2021_study_104040.pdf
 
定制(UOIT学位证)加拿大安大略理工大学毕业证成绩单原版一比一
 定制(UOIT学位证)加拿大安大略理工大学毕业证成绩单原版一比一 定制(UOIT学位证)加拿大安大略理工大学毕业证成绩单原版一比一
定制(UOIT学位证)加拿大安大略理工大学毕业证成绩单原版一比一
 
Sonam +91-9537192988-Mind-blowing skills and techniques of Ahmedabad Call Girls
Sonam +91-9537192988-Mind-blowing skills and techniques of Ahmedabad Call GirlsSonam +91-9537192988-Mind-blowing skills and techniques of Ahmedabad Call Girls
Sonam +91-9537192988-Mind-blowing skills and techniques of Ahmedabad Call Girls
 
加利福尼亚艺术学院毕业证文凭证书( 咨询 )证书双学位
加利福尼亚艺术学院毕业证文凭证书( 咨询 )证书双学位加利福尼亚艺术学院毕业证文凭证书( 咨询 )证书双学位
加利福尼亚艺术学院毕业证文凭证书( 咨询 )证书双学位
 
FULL ENJOY Call Girls In Gautam Nagar (Delhi) Call Us 9953056974
FULL ENJOY Call Girls In Gautam Nagar (Delhi) Call Us 9953056974FULL ENJOY Call Girls In Gautam Nagar (Delhi) Call Us 9953056974
FULL ENJOY Call Girls In Gautam Nagar (Delhi) Call Us 9953056974
 
VIP Call Girls Service Saharanpur Aishwarya 8250192130 Independent Escort Ser...
VIP Call Girls Service Saharanpur Aishwarya 8250192130 Independent Escort Ser...VIP Call Girls Service Saharanpur Aishwarya 8250192130 Independent Escort Ser...
VIP Call Girls Service Saharanpur Aishwarya 8250192130 Independent Escort Ser...
 
VIP Call Girls Service Jamshedpur Aishwarya 8250192130 Independent Escort Ser...
VIP Call Girls Service Jamshedpur Aishwarya 8250192130 Independent Escort Ser...VIP Call Girls Service Jamshedpur Aishwarya 8250192130 Independent Escort Ser...
VIP Call Girls Service Jamshedpur Aishwarya 8250192130 Independent Escort Ser...
 
VIP Russian Call Girls Amravati Chhaya 8250192130 Independent Escort Service ...
VIP Russian Call Girls Amravati Chhaya 8250192130 Independent Escort Service ...VIP Russian Call Girls Amravati Chhaya 8250192130 Independent Escort Service ...
VIP Russian Call Girls Amravati Chhaya 8250192130 Independent Escort Service ...
 
Black and White Minimalist Co Letter.pdf
Black and White Minimalist Co Letter.pdfBlack and White Minimalist Co Letter.pdf
Black and White Minimalist Co Letter.pdf
 

Cyber Security_Training Presentation.pptx

  • 2. Learning objectives  Why information security?  What information is covered?  Classifying information  Information security in practice  Our company’s information security policy
  • 3. Why is information security important? Information is valuable… Information is personal…
  • 4. What information is covered?  Personal  Legal  Corporate  Operational If it’s not in the public domain, protect it!
  • 5. Risks & consequences  The data’s value  The added risk of a direct attack – on our people or our systems  The cost of regulatory fines  The cost of restoring or recreating what’s lost  Reputational damage
  • 6. When it goes wrong Bank fined £500k for data loss Target loses personal data of 70m customers MP’s notes photographed in Downing Street HIV clinic accidentally leaks patient details Social worker leaves court data on car roof
  • 7. Information Security breaches Why do information security breaches occur?     a. Ignorance of the rules e.g. policy violations caused by a lack of training b. Failing to realize data was confidential c. Insufficient methods to protect data d. Deliberate leaks e. User error e.g. sending an email with data to the wrong people 
  • 8. Understanding the data universe  Data classification system  Lifecycle Creation Storage/Retrieval (Use) Disposal
  • 9. Classifying information 1. Confidential 2. Inside 3. Internal 4. Public
  • 10. You make the call: What type is it? Last year’s annual company report    Confidential Inside Internal Public A client’s payment details Confidential Inside Internal Public Our company phone directory and handbook Confidential Inside Internal Public
  • 11. Communication & information security I forwarded the email without thinking. I forgot to check what else was further down the thread. I clicked on Reply to All by accident. The message went to all our 3,000 employees. The system was swamped when people replied back. Email Instant messages
  • 12. Information security & the internet Happy Birthday to my favourite client Lydia Clarke In Leeds today with Magee Investments – exciting times ahead Bye desk – see you in 2 weeks
  • 13. Information security on the move  Eavesdropping  Shoulder surfing  Unsecure WiFi connections  Loss of physical information  Loss of equipment or devices
  • 14. Opinion: Security & portable media I lost a memory stick after travelling to a client meeting. The data wasn’t encrypted. My laptop was stolen on the train. There wasn’t much information on it but that’s not the point.
  • 15. Security in the cloud Avoid content dumps – copying everything as a backup ‘just in case’ Conduct due diligence before granting shared access Allow shared logins Create new folders to give access to third parties YES YES NO YES Give everyone the same privileges and access rights NO Vet IT professionals who have access to our cloud and file- sharing services YES
  • 16. When it goes wrong Email error blamed for massive data breach Security firm warns of ransomware risk Lightning strikes Google’s cloud data Greater Manchester Police fined £120k for memory stick robbery Clinton used personal email Dropbox targeted by Trojans
  • 17. GDPR penalties are severe 4% of global turnover €20 million
  • 18. Scenario 1: Gloria’s holiday What should she do?  I may be going away but I still need to keep on top of what’s happening a) Log in via remote access to access her work email account b) Ask her colleagues to cc all the emails to her personal email account c) Forward emails directly to her mobile so she can pick them up on the go d) If it’s important, her team should call her instead – it’s more secure
  • 19. Scenario 2: Adam’s meeting What should he do?   I’m off to Manchester today for a meeting and need to take my laptop… a) It’s best to travel without devices to limit the risks b) Ensure that he travels with minimal information, in case of theft c) Only use iOS products as they pose no security risks d) Avoid discussing work in public places or in earshot of others
  • 20. Our Information Security Policy  Providing information and training – raising awareness  Carrying out regular risk assessments  Testing our systems are secure  Providing appropriate technology to keep information safe  Appointing people with specific responsibility for information security  Requiring everyone to read and implement our Information Security Policy
  • 21. Do Read our Company's Information Security Policy – make sure you understand our rules and know what to do Be aware of how data you use is classified Take appropriate precautions whenever you use our information, right throughout the lifecycle – from creation to disposal Report any issues or breaches immediately to your manager – so we can limit our losses
  • 22. Don’t  Assume that everyone is entitled to see the same information as you  Leave your computer logged on or leave information unattended on your desk  Send or store sensitive information electronically without encryption  Forward our information to your personal devices  Share your login with anyone else  Let visitors walk around our offices unattended
  • 24. Next steps Call _____ on _____ if you need information or guidance Call _____ on _____ if you need to raise concerns Access self-study courses on our e-learning portal for further training [or optionally – Complete your mandatory training on our corporate e-learning portal]
  • 25. About Skillcast  Skillcast provides digital learning content, technology and services to help you train your staff, automate your compliance processes and generate management reports to help you keep track of it all.  Our best-selling Compliance Essentials Library provides a complete and comprehensive off-the-shelf compliance solution for UK businesses. Register for a free trial at https://www.skillcast.com/free-trial Copyright © 2022 Skillcast. All Rights Reserved.

Editor's Notes

  1. Welcome to this session on Information Security. Thank you for attending. This session should take us around 20 mins.
  2. In this session we’ll look at: Why information security? What information is covered? Classifying information Information security in practice Our company’s information security policy
  3. [Ask delegates] Why is information security important? Every day we generate and consume ever-increasing amounts of information. Much of this information is of immense value to our business and the cost of losing it or having it stolen is hard to quantify. The information we use often relates to individuals too. It’s vital that we take extra care to safeguard personal information. If we fail, it can have disastrous consequences. That's why it's crucial that we protect all our information from those who shouldn't see it, from unauthorised use or access, from illegal copying, viewing, and deletion.
  4. So, what information do we need to protect? The main types are: Personal information – eg about our customers or our employees, including their names, addresses, birthdates, contact details, bank or payment details, buying preferences, etc Legal information – eg contracts and agreements with third parties, including our suppliers, partners, affiliates, customers, consultants, and employees Corporate information – eg relating to our financial position, our strategy or corporate plans (expansions, mergers and acquisitions), and especially including anything which is not already in the public domain Operational information – eg information about our internal processes or procedures, and how we operate; market intelligence But, don't be fooled into thinking that it's just online information that's at risk. Physical documents are every bit as vulnerable. Security is important for all our data - whether it's held physically or electronically, whether it's created by us or provided to us by third parties. If it's not in the public domain, it needs protecting.
  5. To understand the importance of information security, think about what impact it would have if any of our information was lost. The consequences would be serious – both for our customers and our company. We can assess the overall impact by considering: The data’s value The added risk of a direct attack – on people or systems The cost of regulatory fines The cost of restoring or recreating what’s lost Reputational damage
  6. Despite the obvious reputational damage, companies still get it wrong. Here are some examples of cases that have hit the headlines recently. [As an add-on, discuss other recent cases, if required.]
  7. [Ask delegates] Why do you think information security breaches occur? [Allow time for reading and reflection before clicking next.] In summary: There are many reasons why information security breaches occur. The most common ones include: Failure to appreciate the importance of information security Malicious attacks by hackers Accidental loss Negligence Deliberate policy violations by internal staff (think Edward Snowden)
  8. One of the best ways of safeguarding our information is to understand our entire data universe – ie what data we're dealing with - and then deciding what's appropriate. We use a classification system to help us understand data sensitivity and ensure that our information is always given the right level of protection. And, that classification also governs what we can do with it – whether it can be shared and with whom, how it should be stored, who can see it, what they can do with it, etc. By looking at the entire lifecycle, from the moment data is captured or created, its storage and retrieval, right through to disposal, we can ensure that we're taking the right action – at every stage - to safeguard it.
  9. Any information we create or receive is classified, based on its value or criticality to us. Of course, some of our information is publicly available and freely disclosed without restrictions, whereas others are strictly confidential and therefore subject to tighter controls. There are 4 ways in which we classify information: 1. Confidential – This applies to information that is only available to those who have a 'need to know'. It includes customer account details and HR records. Compromising confidential information could lead to significant financial or reputational damage. 2. Inside – This is a sub-set of confidential information. It relates to the value of publicly traded securities, eg unpublished financial accounts, information on the progress of large projects, pending mergers, etc. Releasing inside information inappropriately is a criminal offence punishable by imprisonment and fines. 3. Internal only – This can be freely shared with all members of staff but not released to third parties. It includes internal telephone directories and most of our compliance policies and procedures. 4. Public – This can be released to anyone outside our Company without restrictions. Examples include press releases, marketing material and some research produced by our Company.
  10. Take a look at this example and decide what type of information it is. [Allow for thinking time before clicking next] By understanding how information is classified and its value to our business, you'll find it easier to protect it.
  11. Like most companies, we rely on technology, especially for communication and to share information across our Company and beyond. Everything from email and instant messaging, to online conferencing, forums and smartphones. But, the speed in which we communicate today can sometimes put data at risk, as these examples show. [Include other examples from your own experience – corporate anecdotes – and allow time for discussion.]
  12. Using the internet can also sometimes compromise information security, if we’re not careful and don't take precautions. You’ll need to watch what you share, particularly when using social media. Oversharing information can cause serious problems. For example: Even the mere mention of a meeting with a company may breach our confidentiality agreements or privacy. And, a seemingly harmless tweet about being in a certain place to 'seal a deal' with a kindred company may allow others to 'piece together the jigsaw' and forewarn of a merger. It’s important to let our PR/Media department handle all official disclosures and public announcements. Refrain from sharing corporate information online unless it’s part of your job.
  13. Keeping in touch with what's happening back at the office when you're on the move (for example, when travelling or working in different locations) is essential for most of us. But, there are risks too. You may have to take calls, respond to emails, refer to corporate information on our internal servers, and more as you work at a distance. You’ll need to take precautions and ‘think information security’ whenever you travel. What can you do? [Allow time for discussion before continuing] Check over your shoulder before having a conversation on your mobile or using a laptop or tablet – who else is within earshot or can see it? Move somewhere private or offer to call them back to maintain confidentiality. Set up password protection on all your devices – including Touch ID, two-factor authentication – before you travel Keep data to a minimum when travelling, especially when travelling abroad on business Don’t access our network or sensitive information using public WiFi connections - they aren’t secure
  14. We often insist on having all our information at our fingertips whenever and wherever we need it. Different types of media have helped make our data more portable, including DVDs, CDs, SD cards and USB memory sticks, and most store vast amounts of data. But, there are risks here too. Portable devices may be lost easily There can be problems keeping it up-to-date – especially if it was downloaded some time ago Malware can be spread easily by USBs and other portable media. [Hold a discussion with delegates, before continuing. Are portable media allowed? If so, what precautions do they take? What more can they do?] [Note: USBs containing malicious software are often dropped by cyber criminals outside company offices. Accessing them via our network can lead to serious cyber security breaches.]
  15. Cloud storage and file-sharing sites (such as iCloud, Dropbox, Google Drive, Mega, and OneDrive) have revolutionised information storage and use, allowing us to access and exchange corporate information wherever and whenever we like. Add to that the ability to make real-time synced changes to information, and it's not hard to see why they're so popular. But, there are risks too so we need to take precautions. [Allow time for discussion before clicking next to identify best practice.]
  16. Whenever and wherever we use information, we must prioritise security. Information security breaches are serious. There may be devastating consequences for the individuals involved, not to mention significant damage to our reputation and fines. Yet, companies are still failing to do enough to protect information. [As an add-on, discuss other recent cases, if required.]
  17. But, now, there’s an even greater incentive to get this right. Under the General Data Protection Regulation there’s a much stricter regime and the fines have increased dramatically. Companies now face fines of up to 4% of global turnover or €20 million (whichever is the higher). So, it’s time to up our game and take this more seriously… [Download our other presentation on GDPR for more.]
  18. Gloria’s taking annual leave. She’s off to the South of France for a few days. But the project she’s working on is at a critical phase – she wants to keep on top of her emails while she’s away. What should she do? [Allow for discussion and thinking time before clicking next again] Business emails must not be forwarded to your mobile or personal email address - this creates a security risk.
  19. Adam’s going to a meeting in Manchester. He needs access to key statistical information so he’s taking his laptop with him. Then, after the meeting, he’ll need to call the office on his way home to give a progress report. What action should he take to maintain information security? [Allow for discussion and thinking time before clicking next again] Travel can sometimes increase the risk of security breaches. For example, there may be eavesdropping on the train, you may leave documents at a client office in error, or use an unsecured connection as you take a break in a coffee shop. You can't avoid travel, but you must at least limit the risks.
  20. Our Information Security Policy outlines our rules, processes and procedures. We demonstrate our commitment to information security by: Providing information and training – raising awareness Carrying out regular risk assessments Testing our systems are secure Providing appropriate technology to keep information safe Appointing people with specific responsibility for information security Requiring everyone to read and implement our Information Security Policy [As an add-on, provide everyone with a copy of your Information Security Policy and explain the key points. You might also introduce your Information Security/Data Protection Officer in the session giving them a 5-min slot to explain their work and offer advice.]
  21. We can’t do this alone. Here's what you should do: Read our Company's Information Security Policy – make sure you understand our rules and know what to do Be aware of how data you use is classified Take appropriate precautions whenever you use our information, right throughout the lifecycle – from creation to disposal Report any issues or breaches immediately to your manager – so we can limit our losses Talk to your manager if you have any concerns or if you have any suggestions on how we can improve data security.
  22. Don't: Assume that everyone is entitled to see the same information as you Leave your computer logged on or leave information unattended on your desk Send or store sensitive information electronically without encryption Forward our information to your personal devices Share your login with anyone else Let visitors walk around our offices unattended
  23. Do you have any questions?
  24. You can get more help and information on this issue from these contacts. Or, for a more in-depth look at this topic, access our self-study course.