SlideShare a Scribd company logo
HAPPY NATIONAL
CYBERSECURITY
AWARNESS MONTH
Lake Point Consilting Services
THE POWER OF
IT SECURITY
Lake Point Consilting Services
IdrisBusari
85%
EMPLOYEES PREFER A MORE
COLLABORATIVE WORKSPACE
N E W Z E A L A N D
Creative Director
Presentations are
communication tools.
C H I N A
Head of Accounts
Presentations are
communication tools.
N I G E R I A
Business Development
Manager
Presentations are
communication tools.
INFORMATION
IS GOLDEN
We need "CIA"
protection, all the
time!
C-I-A?
CONFIDENTIALITY
Authorized
eyes only!
INTERGRITY
Data Honesty!
AVAILABILITY
Inform
ation Access!
WHO ARE THE BAD ACTORS?
What are some techniques they use?
WHAT DO WE DO?
Strong Password(MF Authentication)1.
2. File Permission, User Access Control
3. Hardware & Software maintenance
4. Encryption
Idris Busari
IT SPECIALIST
Lake Point Consilting Services
Questions?
Questions?

More Related Content

What's hot

Beyond identity soft choice tech you oughta know 03042022
Beyond identity soft choice tech you oughta know 03042022Beyond identity soft choice tech you oughta know 03042022
Beyond identity soft choice tech you oughta know 03042022Philip Moroni
 
Tech you oughta know - Illusive
Tech you oughta know - IllusiveTech you oughta know - Illusive
Tech you oughta know - IllusivePhilip Moroni
 
Managing Mobile Business Insecurities
Managing Mobile Business InsecuritiesManaging Mobile Business Insecurities
Managing Mobile Business InsecuritiesPing Identity
 
Tech you oughta know code42
Tech you oughta know   code42Tech you oughta know   code42
Tech you oughta know code42Philip Moroni
 
OOW13: Developing secure mobile applications (CON8902)
OOW13: Developing secure mobile applications (CON8902)OOW13: Developing secure mobile applications (CON8902)
OOW13: Developing secure mobile applications (CON8902)GregOracle
 
Manjula security for startups
Manjula security for startupsManjula security for startups
Manjula security for startupsKesava Reddy
 
How Aligned Are IT, Employees and Security Practices in Today's Mobile World?
How Aligned Are IT, Employees and Security Practices in Today's Mobile World?How Aligned Are IT, Employees and Security Practices in Today's Mobile World?
How Aligned Are IT, Employees and Security Practices in Today's Mobile World?Ping Identity
 
Security On The Edge - A New Way To Think About Securing the Internet of Things
Security On The Edge -  A New Way To Think About Securing the Internet of ThingsSecurity On The Edge -  A New Way To Think About Securing the Internet of Things
Security On The Edge - A New Way To Think About Securing the Internet of ThingsForgeRock
 
CIS14: Are the Enterprises Ready for Identity of Everything?
CIS14: Are the Enterprises Ready for Identity of Everything?CIS14: Are the Enterprises Ready for Identity of Everything?
CIS14: Are the Enterprises Ready for Identity of Everything?CloudIDSummit
 

What's hot (10)

Beyond identity soft choice tech you oughta know 03042022
Beyond identity soft choice tech you oughta know 03042022Beyond identity soft choice tech you oughta know 03042022
Beyond identity soft choice tech you oughta know 03042022
 
Tech you oughta know - Illusive
Tech you oughta know - IllusiveTech you oughta know - Illusive
Tech you oughta know - Illusive
 
Managing Mobile Business Insecurities
Managing Mobile Business InsecuritiesManaging Mobile Business Insecurities
Managing Mobile Business Insecurities
 
Tech you oughta know code42
Tech you oughta know   code42Tech you oughta know   code42
Tech you oughta know code42
 
OOW13: Developing secure mobile applications (CON8902)
OOW13: Developing secure mobile applications (CON8902)OOW13: Developing secure mobile applications (CON8902)
OOW13: Developing secure mobile applications (CON8902)
 
Manjula security for startups
Manjula security for startupsManjula security for startups
Manjula security for startups
 
ERA InfoTech Ltd
ERA InfoTech Ltd ERA InfoTech Ltd
ERA InfoTech Ltd
 
How Aligned Are IT, Employees and Security Practices in Today's Mobile World?
How Aligned Are IT, Employees and Security Practices in Today's Mobile World?How Aligned Are IT, Employees and Security Practices in Today's Mobile World?
How Aligned Are IT, Employees and Security Practices in Today's Mobile World?
 
Security On The Edge - A New Way To Think About Securing the Internet of Things
Security On The Edge -  A New Way To Think About Securing the Internet of ThingsSecurity On The Edge -  A New Way To Think About Securing the Internet of Things
Security On The Edge - A New Way To Think About Securing the Internet of Things
 
CIS14: Are the Enterprises Ready for Identity of Everything?
CIS14: Are the Enterprises Ready for Identity of Everything?CIS14: Are the Enterprises Ready for Identity of Everything?
CIS14: Are the Enterprises Ready for Identity of Everything?
 

Similar to Examining it security in todays business world - The Power of IT Security

Security Opening Keynote Address: Security Drives DIGITAL TRANSFORMATION in...
Security Opening Keynote Address: Security Drives DIGITAL TRANSFORMATION in...Security Opening Keynote Address: Security Drives DIGITAL TRANSFORMATION in...
Security Opening Keynote Address: Security Drives DIGITAL TRANSFORMATION in...CA Technologies
 
The 10 most trusted authentication solution providers of 2021
The 10 most trusted authentication solution providers of 2021The 10 most trusted authentication solution providers of 2021
The 10 most trusted authentication solution providers of 2021CIO Look Magazine
 
The 10 most intelligent identity & access management solution providers 2020.
The 10 most intelligent identity & access management solution providers  2020.The 10 most intelligent identity & access management solution providers  2020.
The 10 most intelligent identity & access management solution providers 2020.Merry D'souza
 
Freeing Minds - Reduce waste, improve efficiency
Freeing Minds - Reduce waste, improve efficiencyFreeing Minds - Reduce waste, improve efficiency
Freeing Minds - Reduce waste, improve efficiencySolarwinds N-able
 
State of Cyber: Views from an Industry Insider
State of Cyber: Views from an Industry InsiderState of Cyber: Views from an Industry Insider
State of Cyber: Views from an Industry InsiderBen Johnson
 
Contextual Cyber Security for IoT
Contextual Cyber Security for IoTContextual Cyber Security for IoT
Contextual Cyber Security for IoTMONICA-Project
 
HDI Capital Area Meeting May 2019 Cybersecurity Planning for the Modern Techn...
HDI Capital Area Meeting May 2019 Cybersecurity Planning for the Modern Techn...HDI Capital Area Meeting May 2019 Cybersecurity Planning for the Modern Techn...
HDI Capital Area Meeting May 2019 Cybersecurity Planning for the Modern Techn...hdicapitalarea
 
Cleared Job Fair Job Seeker Handbook March 7, BWI, MD
Cleared Job Fair Job Seeker Handbook March 7, BWI, MDCleared Job Fair Job Seeker Handbook March 7, BWI, MD
Cleared Job Fair Job Seeker Handbook March 7, BWI, MDClearedJobs.Net
 
Cleared Job Fair Job Seeker Handbook Feb 6, 2014, Tysons Corner, Va
Cleared Job Fair Job Seeker Handbook Feb 6, 2014, Tysons Corner, VaCleared Job Fair Job Seeker Handbook Feb 6, 2014, Tysons Corner, Va
Cleared Job Fair Job Seeker Handbook Feb 6, 2014, Tysons Corner, VaClearedJobs.Net
 
Tackling data security
Tackling data securityTackling data security
Tackling data securityPeter Bassill
 
50 most valuable brands of the year 2019
50 most valuable brands of the year 201950 most valuable brands of the year 2019
50 most valuable brands of the year 2019Pavan Kumar
 
HDI Capital Area Slides August 17, 2018
HDI Capital Area Slides August 17, 2018HDI Capital Area Slides August 17, 2018
HDI Capital Area Slides August 17, 2018hdicapitalarea
 
Better Do What They Told Ya
Better Do What They Told YaBetter Do What They Told Ya
Better Do What They Told Yaurma
 
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Cizo Technology Services
 
Multi-Factor Authentication of zOS (Steven Ringelberg - VANGUARD Integrity Pr...
Multi-Factor Authentication of zOS (Steven Ringelberg - VANGUARD Integrity Pr...Multi-Factor Authentication of zOS (Steven Ringelberg - VANGUARD Integrity Pr...
Multi-Factor Authentication of zOS (Steven Ringelberg - VANGUARD Integrity Pr...BodeGeorge
 

Similar to Examining it security in todays business world - The Power of IT Security (20)

Security Opening Keynote Address: Security Drives DIGITAL TRANSFORMATION in...
Security Opening Keynote Address: Security Drives DIGITAL TRANSFORMATION in...Security Opening Keynote Address: Security Drives DIGITAL TRANSFORMATION in...
Security Opening Keynote Address: Security Drives DIGITAL TRANSFORMATION in...
 
The 10 most trusted authentication solution providers of 2021
The 10 most trusted authentication solution providers of 2021The 10 most trusted authentication solution providers of 2021
The 10 most trusted authentication solution providers of 2021
 
The 10 most intelligent identity & access management solution providers 2020.
The 10 most intelligent identity & access management solution providers  2020.The 10 most intelligent identity & access management solution providers  2020.
The 10 most intelligent identity & access management solution providers 2020.
 
Freeing Minds - Reduce waste, improve efficiency
Freeing Minds - Reduce waste, improve efficiencyFreeing Minds - Reduce waste, improve efficiency
Freeing Minds - Reduce waste, improve efficiency
 
State of Cyber: Views from an Industry Insider
State of Cyber: Views from an Industry InsiderState of Cyber: Views from an Industry Insider
State of Cyber: Views from an Industry Insider
 
Contextual Cyber Security for IoT
Contextual Cyber Security for IoTContextual Cyber Security for IoT
Contextual Cyber Security for IoT
 
HDI Capital Area Meeting May 2019 Cybersecurity Planning for the Modern Techn...
HDI Capital Area Meeting May 2019 Cybersecurity Planning for the Modern Techn...HDI Capital Area Meeting May 2019 Cybersecurity Planning for the Modern Techn...
HDI Capital Area Meeting May 2019 Cybersecurity Planning for the Modern Techn...
 
Cleared Job Fair Job Seeker Handbook March 7, BWI, MD
Cleared Job Fair Job Seeker Handbook March 7, BWI, MDCleared Job Fair Job Seeker Handbook March 7, BWI, MD
Cleared Job Fair Job Seeker Handbook March 7, BWI, MD
 
Ping Identity
Ping IdentityPing Identity
Ping Identity
 
The 10 most reliable authentication solution providers 2021
The 10 most reliable authentication solution providers 2021The 10 most reliable authentication solution providers 2021
The 10 most reliable authentication solution providers 2021
 
Cleared Job Fair Job Seeker Handbook Feb 6, 2014, Tysons Corner, Va
Cleared Job Fair Job Seeker Handbook Feb 6, 2014, Tysons Corner, VaCleared Job Fair Job Seeker Handbook Feb 6, 2014, Tysons Corner, Va
Cleared Job Fair Job Seeker Handbook Feb 6, 2014, Tysons Corner, Va
 
Tackling data security
Tackling data securityTackling data security
Tackling data security
 
Faith Call Center
Faith Call CenterFaith Call Center
Faith Call Center
 
50 most valuable brands of the year 2019
50 most valuable brands of the year 201950 most valuable brands of the year 2019
50 most valuable brands of the year 2019
 
HDI Capital Area Slides August 17, 2018
HDI Capital Area Slides August 17, 2018HDI Capital Area Slides August 17, 2018
HDI Capital Area Slides August 17, 2018
 
Better Do What They Told Ya
Better Do What They Told YaBetter Do What They Told Ya
Better Do What They Told Ya
 
Better Do What They Told Ya
Better Do What They Told YaBetter Do What They Told Ya
Better Do What They Told Ya
 
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
 
Multi-Factor Authentication of zOS (Steven Ringelberg - VANGUARD Integrity Pr...
Multi-Factor Authentication of zOS (Steven Ringelberg - VANGUARD Integrity Pr...Multi-Factor Authentication of zOS (Steven Ringelberg - VANGUARD Integrity Pr...
Multi-Factor Authentication of zOS (Steven Ringelberg - VANGUARD Integrity Pr...
 
2014 Conference Brochure - GRC 2.0 Breaking Down the Silos
2014 Conference Brochure - GRC 2.0 Breaking Down the Silos2014 Conference Brochure - GRC 2.0 Breaking Down the Silos
2014 Conference Brochure - GRC 2.0 Breaking Down the Silos
 

More from ResQ Records | PiKture Time Films and Photography | Horizon Alliance Technologies

More from ResQ Records | PiKture Time Films and Photography | Horizon Alliance Technologies (7)

Accessibility and Earning Potentials for Disabled Artists in Indiana USA
Accessibility and Earning Potentials for Disabled Artists in Indiana USAAccessibility and Earning Potentials for Disabled Artists in Indiana USA
Accessibility and Earning Potentials for Disabled Artists in Indiana USA
 
Horizon Alliance Technologies LLC Pitch Deck
Horizon Alliance Technologies LLC Pitch DeckHorizon Alliance Technologies LLC Pitch Deck
Horizon Alliance Technologies LLC Pitch Deck
 
Horizon Alliance Technologies - Your End-of-Life Data Security Company.
Horizon Alliance Technologies - Your End-of-Life Data Security Company.Horizon Alliance Technologies - Your End-of-Life Data Security Company.
Horizon Alliance Technologies - Your End-of-Life Data Security Company.
 
How to Safeguard your Information by Destroying your Hard Disk Drive
How to Safeguard your Information by Destroying your Hard Disk Drive How to Safeguard your Information by Destroying your Hard Disk Drive
How to Safeguard your Information by Destroying your Hard Disk Drive
 
Become A Professional On-Air Announcer Now (Be a radio announcer now)
Become A Professional On-Air Announcer Now (Be a radio announcer now)Become A Professional On-Air Announcer Now (Be a radio announcer now)
Become A Professional On-Air Announcer Now (Be a radio announcer now)
 
Idris Busari - My Native Country, Nigeria
Idris Busari  - My Native Country, NigeriaIdris Busari  - My Native Country, Nigeria
Idris Busari - My Native Country, Nigeria
 
The man and his craft: Bryan Chris photography
The man and his craft: Bryan Chris photographyThe man and his craft: Bryan Chris photography
The man and his craft: Bryan Chris photography
 

Recently uploaded

The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxlaozhuseo02
 
Article writing on excessive use of internet.pptx
Article writing on excessive use of internet.pptxArticle writing on excessive use of internet.pptx
Article writing on excessive use of internet.pptxabhinandnam9997
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesSanjeev Rampal
 
ER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAEER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAEHimani415946
 
一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理
一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理
一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理aagad
 
How Do I Begin the Linksys Velop Setup Process?
How Do I Begin the Linksys Velop Setup Process?How Do I Begin the Linksys Velop Setup Process?
How Do I Begin the Linksys Velop Setup Process?Linksys Velop Login
 
The AI Powered Organization-Intro to AI-LAN.pdf
The AI Powered Organization-Intro to AI-LAN.pdfThe AI Powered Organization-Intro to AI-LAN.pdf
The AI Powered Organization-Intro to AI-LAN.pdfSiskaFitrianingrum
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shoplaozhuseo02
 
The Use of AI in Indonesia Election 2024: A Case Study
The Use of AI in Indonesia Election 2024: A Case StudyThe Use of AI in Indonesia Election 2024: A Case Study
The Use of AI in Indonesia Election 2024: A Case StudyDamar Juniarto
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxGal Baras
 
Pvtaan Social media marketing proposal.pdf
Pvtaan Social media marketing proposal.pdfPvtaan Social media marketing proposal.pdf
Pvtaan Social media marketing proposal.pdfPvtaan
 

Recently uploaded (12)

The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
 
Article writing on excessive use of internet.pptx
Article writing on excessive use of internet.pptxArticle writing on excessive use of internet.pptx
Article writing on excessive use of internet.pptx
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
 
ER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAEER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAE
 
The Best AI Powered Software - Intellivid AI Studio
The Best AI Powered Software - Intellivid AI StudioThe Best AI Powered Software - Intellivid AI Studio
The Best AI Powered Software - Intellivid AI Studio
 
一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理
一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理
一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理
 
How Do I Begin the Linksys Velop Setup Process?
How Do I Begin the Linksys Velop Setup Process?How Do I Begin the Linksys Velop Setup Process?
How Do I Begin the Linksys Velop Setup Process?
 
The AI Powered Organization-Intro to AI-LAN.pdf
The AI Powered Organization-Intro to AI-LAN.pdfThe AI Powered Organization-Intro to AI-LAN.pdf
The AI Powered Organization-Intro to AI-LAN.pdf
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
 
The Use of AI in Indonesia Election 2024: A Case Study
The Use of AI in Indonesia Election 2024: A Case StudyThe Use of AI in Indonesia Election 2024: A Case Study
The Use of AI in Indonesia Election 2024: A Case Study
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
 
Pvtaan Social media marketing proposal.pdf
Pvtaan Social media marketing proposal.pdfPvtaan Social media marketing proposal.pdf
Pvtaan Social media marketing proposal.pdf
 

Examining it security in todays business world - The Power of IT Security