Chicago area school district uses Securly’s Active Directory &
Google Authentication solutions in concert to achieve seamless user experience for 4,000 staff and students.
A quick overview of the various technologies i came across during my enterprise 2.0 research. The content for the slides comes from content shared in the Enterprise 2.0 conference and Dion Hinchcliffe as well. (I do not claim ownership of creating all the content, its more of aggregation of content and adding to it)
Chicago area school district uses Securly’s Active Directory &
Google Authentication solutions in concert to achieve seamless user experience for 4,000 staff and students.
A quick overview of the various technologies i came across during my enterprise 2.0 research. The content for the slides comes from content shared in the Enterprise 2.0 conference and Dion Hinchcliffe as well. (I do not claim ownership of creating all the content, its more of aggregation of content and adding to it)
HR summit - Social Media: ignore or embraceRick Mans
What should HR professionals do with the emergence of social media? Is it something that can be ignored, or is it something that they should embrace to improve the quality of their work?
Social Networking In The Workplace Public VersionBolin Digital
Did you know that employees who use Facebook at work are 9% more productive than those who don't? I'm often asked to present on why companies should let their employees use social media. Here is my pitch.
The 5 most trusted cyber security companies to watch.Merry D'souza
Through this latest edition of Insights Success, we wish to feature organizations that are quite adept in utilizing and adopting these tech-trends in their operations. ‘The 5 Most Trusted Cyber Security Companies to Watch,’ is an edition which will take you on a journey towards the digital security space. So, give it a read and enjoy articles curated by our in-house editorial team.
Best practices to shape and secure your 1:1 program for ChromebooksSecurly
A key requirement of a 1:1 Chromebook program is security – ensuring students are using the device safely and productively. This document addresses several aspects of the Google Apps for Education Admin Console that are important to configure correctly for a successful 1:1 experience.
This article originally appeared in Training & Development magazine June 2014 Vol 41 No 3, published by the Australian Institute of Training and Development.
The Cisco 2010 Midyear Security Report includes:
* Results and analysis from two new Cisco studies -- one focused on employee collaboration and the other on the concerns of IT decision-makers worldwide
* International trends in cyber-security and their potential impact on business
* Insight into how hackers penetrate “soft spots” in enterprise security to steal sensitive data and sell it to the highest bidder
* An update on global spam trends since late 2009 and spam volume predictions for 2010
* Guidance from Cisco security experts to help businesses improve their enterprise security by 2011
How can I develop an intranet 2.0 strategy? Which tools best suit my strategy? The number of social media tools available to organizations today can be overwhelming. With your organization’s efficiency and collaboration on the line, it’s important to pick the right one. Despite their potential impact, the best social media tools are seldom chosen by organizations looking to support their unique intranet 2.0 strategies.
Join Carmine Porco, GM and VP of Client Deliverables, as he walks through several social media tools, explaining their pros and cons, their benefits to an organization, and the ideal intranet environment to support them.
Learning outcomes:
• Learn the steps to developing an intranet 2.0 strategy (where to start)
• Learn the correct methodology to choosing the right intranet 2.0 tool
• Discover which social media tools best suit your organization
• Learn how to maintain an effective intranet 2.0 environment
• See different technologies
Information security awareness at the workplace is critical for that participated and shared accountability on insuring confidentiality, availability and integrity of information in the networked context of information creation, storing, using and sharing. The essential questions of information security has to be clearly elicited, described and analyzed with the people of decision and work. The open presentation is designed to point the searchable knowledge and solution of information security,
This article originally appeared in Training & Development magazine April 2015 Vol 42 No 2, published by the Australian Institute of Training and Development.
How to leverage BCP/DR for your Info Sec ProgramMoey
In the beginning, every Information Security professional learns about the triad: Confidentiality, Integrity, and Availability. As you grew so did your skills; you learned about controls, frameworks, compliance, and how to test your systems/applications to ensure that all your bits and bytes were safe. But what happened to the Availability? It seems that in the journey of becoming an information security professional, we stopped focusing on a third of the basic principles of Information Security.
This presentation will discuss why Availability goes well beyond DoS. It will discuss how to leverage BCP/DR for the benefit of your information security program by:
• Learning in depth the critical portions of your organizations
• Bringing your risk approach to other highly visible initiatives
• Allowing you to collaborate with teams
• Exposing you to business Executives
The Cloud Computing offers various benefits for the businesses. Here are some of the key factors for SMB's must consider all these aspects before Cloud implementations.
HR summit - Social Media: ignore or embraceRick Mans
What should HR professionals do with the emergence of social media? Is it something that can be ignored, or is it something that they should embrace to improve the quality of their work?
Social Networking In The Workplace Public VersionBolin Digital
Did you know that employees who use Facebook at work are 9% more productive than those who don't? I'm often asked to present on why companies should let their employees use social media. Here is my pitch.
The 5 most trusted cyber security companies to watch.Merry D'souza
Through this latest edition of Insights Success, we wish to feature organizations that are quite adept in utilizing and adopting these tech-trends in their operations. ‘The 5 Most Trusted Cyber Security Companies to Watch,’ is an edition which will take you on a journey towards the digital security space. So, give it a read and enjoy articles curated by our in-house editorial team.
Best practices to shape and secure your 1:1 program for ChromebooksSecurly
A key requirement of a 1:1 Chromebook program is security – ensuring students are using the device safely and productively. This document addresses several aspects of the Google Apps for Education Admin Console that are important to configure correctly for a successful 1:1 experience.
This article originally appeared in Training & Development magazine June 2014 Vol 41 No 3, published by the Australian Institute of Training and Development.
The Cisco 2010 Midyear Security Report includes:
* Results and analysis from two new Cisco studies -- one focused on employee collaboration and the other on the concerns of IT decision-makers worldwide
* International trends in cyber-security and their potential impact on business
* Insight into how hackers penetrate “soft spots” in enterprise security to steal sensitive data and sell it to the highest bidder
* An update on global spam trends since late 2009 and spam volume predictions for 2010
* Guidance from Cisco security experts to help businesses improve their enterprise security by 2011
How can I develop an intranet 2.0 strategy? Which tools best suit my strategy? The number of social media tools available to organizations today can be overwhelming. With your organization’s efficiency and collaboration on the line, it’s important to pick the right one. Despite their potential impact, the best social media tools are seldom chosen by organizations looking to support their unique intranet 2.0 strategies.
Join Carmine Porco, GM and VP of Client Deliverables, as he walks through several social media tools, explaining their pros and cons, their benefits to an organization, and the ideal intranet environment to support them.
Learning outcomes:
• Learn the steps to developing an intranet 2.0 strategy (where to start)
• Learn the correct methodology to choosing the right intranet 2.0 tool
• Discover which social media tools best suit your organization
• Learn how to maintain an effective intranet 2.0 environment
• See different technologies
Information security awareness at the workplace is critical for that participated and shared accountability on insuring confidentiality, availability and integrity of information in the networked context of information creation, storing, using and sharing. The essential questions of information security has to be clearly elicited, described and analyzed with the people of decision and work. The open presentation is designed to point the searchable knowledge and solution of information security,
This article originally appeared in Training & Development magazine April 2015 Vol 42 No 2, published by the Australian Institute of Training and Development.
How to leverage BCP/DR for your Info Sec ProgramMoey
In the beginning, every Information Security professional learns about the triad: Confidentiality, Integrity, and Availability. As you grew so did your skills; you learned about controls, frameworks, compliance, and how to test your systems/applications to ensure that all your bits and bytes were safe. But what happened to the Availability? It seems that in the journey of becoming an information security professional, we stopped focusing on a third of the basic principles of Information Security.
This presentation will discuss why Availability goes well beyond DoS. It will discuss how to leverage BCP/DR for the benefit of your information security program by:
• Learning in depth the critical portions of your organizations
• Bringing your risk approach to other highly visible initiatives
• Allowing you to collaborate with teams
• Exposing you to business Executives
The Cloud Computing offers various benefits for the businesses. Here are some of the key factors for SMB's must consider all these aspects before Cloud implementations.
Jason Teo Supply Chain Business Continuity Management Case Study in Infineon ...BCM Institute
Jason Teo, Senior Director Business Continuity Asia & Japan region share his experiences through supply chain resiliency awareness training and Infineon employees are aware of the potential disruption risks associated with transport and logistics operations and the steps necessary to minimize these risks during the World Continuity Congress (WCC) Singapore 22 April 2014 at Carlton Hotel. Copyright 2014 @ World Continuity Congress www.worldcontinuitycongress.com BCM Institute www.bcm-institute.org Read more of Jason Teo @ http://www.bcmpedia.org/wiki/Jason_Teo
Business Continuity Management (BCM) is a capability to identify potential impacts that threaten objectives to effective response and safeguard the interests of its key stakeholders and customers. The implemention of a BCM programme requires the establishment of building blocks to ensure a sustained and executable response plans.
Building blocks to implement an effective BCM programme:
Block 1 – Governance and Accountability
Block 2 – Defining BCM strategies
Block 3 – Constitute team for a disruptive event
Block 4 – Assurance / Compliance and Integration
Block 5 – Embedding and continuous improvement
This presentation introduced blocking buildings to effectively and efficient implement your BCM programme. It highlighted key lessons learnt and that may assist you the development of your BCM programme.
This file was presented by me during the study circle meeting at the Mangalore Branch of Southern India Regional Council of the Institute of Chartered Accountants of India.
A short presentation of the essentials of business continuity planning. Often put on the back burner because it's seems too complex. Whereas the principles are quite straightforward.
The A to Z Guide to Business Continuity and Disaster RecoverySirius
Companies often face challenges during business continuity and disaster recovery (BC/DR) planning. One of the key challenges is to reach consensus to ensure everyone at the company is on the same page. Therefore, it is important for the business and IT to have a comprehensive discussion about its current capabilities, needs, procedures and expectations for BC/DR.
To help with these conversations, we have developed an alphabetical guide and identified 26 important terms. This list is not meant to be exhaustive, but rather a good starting point for this discussion.
"Web 2.0 artefacts in SME-networks – A qualitative approach towards an integrative conceptualization considering organizational and technical perspectives" (Nadine Blinn, Nadine Lindermann, Katrin Fäcks, Markus Nüttgens)
Reply and Hinchcliffe & Company signed an agreement for the exclusive delivery of Web 2.0 University™, the education solution developed by Hinchcliffe & Company, in strategic partnership with O’Reilly Media
Best Practices in Leveraging Virtual Environments for Learning Human Capital Media
Hear how ACS (a Xerox company) is being more cost effective and engaging by leveraging virtual environments and find out how they effectively aligned with corporate initiatives to drive business forward by enabling instant access to content, subject matter experts and peers. You’ll learn how ACS was able to leverage virtual environments to provide an array of opportunities to facilitate formal, informal and social learning and give attendees control. Thanks to interactivity, the ACS attendees learn real applied examples, not just theories.
• During this interactive session you will learn:
• An outline of a six step process in launching a virtual learning environment.
• How to track more than just attendance and tests, but actual learners’ behavior.
• How learning occurs in synchronous and asynchronous modes inside virtual environments.
• Challenges and successes with launching a virtual learning environment.
Architecture Of Participation - Enterprise2.0 adoption outlinesIsrael Blechman
The adoption of E2.0 tools and methods necessitates a new framework of thinking about work and productivity. The presentation illustrates the concepts of E2.0 and the conditions to a successful adoption process.
The presentation was created for a lecture I held at Microsoft Israel's Masters of Knowledge conference, May 2009.
This is my dissertation proposal presentation. The dissertation is "Enterprise 2.0 - Using web2.0 tools to improve collaboration and knowledge sharing in the enterprise."
Learn how you can use the CoSN SEND II Decision Tree for Education Technology to make sure that your K–12 technology initiatives create a more engaging learning experience that empowers students, teachers, and administrators alike.
View the Webcast: http://cs.co/9004B80G0
Become a Certified Information Professional (CIP), AIIM's newly-launched certification. Earning this designation demonstrates your ability to solve an organization's existing information-related problems as well as plan for the future.
Building Software Solutions Using Web 2.0 TechnologiesAspire Systems
Successful software vendors have always built products with a user-centric mindset. Traditionally, meeting the functional requirements of end-users would generally be adequate for a product\'s success. However, in today\'s Web 2.0 paradigm, it has become imperative for software vendors to design solutions that empower users in addition to addressing the basic functional needs. Hence, software vendors now build solutions that are more intuitive and allow users to access what they want instantly and at minimal number of clicks.
Presentation given by Dion Hinchcliffe at Enterprise 2.0 San Francisco 2009. Focused on climbing the maturity curve of process and methods for enterprise social computing.
Similar to ISACA AsiaPac Conf 2008 Employee Info Sec Awareness via Web 2 (20)
2. What do we cover in this session ?
• Trends in Information Security
Employee Awareness
• Using Web 2.0 technology
• Demos
• Conclusion
3. Key Message
Employees the stewards of critical organisational data and
information assets represent the most vulnerable link in the chain..
The use of Web 2.0 technologies allow effective engagement with employees,
specially the growing numbers of technology savvy generations
Web 2.0 tools are not only allow low cost, large scale deployments but also
allow effective communication of key messages on Information Security
4. Human Error – Main Reason for Security
Breaches
• Study on IT security by the Computing
Technology Industry Association (CompTIA)
finds that
– human error continues to be the main
reason for security breaches - 42% of the
IT professionals polled.
– Industry can learn from its mistakes: Two
years ago, that number was 59%.
5. Human Error – Main Reason for Security
Breaches
– "There has been a definitive shift toward
greater emphasis on making employees
aware of the threats around them..,“
– Some sectors are better prepared than
others. Financial services are most likely
to have a written policy, while fewer than
half of education institutions do.
– 81% said their policies now cover issues
specific to remote and mobile employees.
6. Human Error – Main Reason for Security
Breaches
– "data suggesting that human error
accounts for as much as 80% of
breaches..,“
– “'Processes we have to spend money
on because many regulations require us
to. Technology we have traditionally
been spending a lot of money on. Then
in terms of people, the only spend we
have is the salaries,'"So, there is a lot
of work to do in education.”
7. Human Error – Main Reason for Security
Breaches
• Security training or certification now
accounts for 12% of the total IT
budget, compared with 8% in 2005.
• The bottom line, however, is that only
45% of the IT staff members at the
companies that responded have
security-related training.
9. Sample Plan for Information Security Training
RABQSA Certified Lead Auditor in
Information Security Management
(ISO 27001:2005) Course
Demystifying Information Security
Management
Internal Auditing for Information
Security Management Systems
using ISO 27001:2005
Understanding and Implementing
Information Security Management
Systems using ISO 27001:2005
SAI Global Information Security
Awareness Model
11. Employee Awareness Channels
High Employee feedback High
Employee Engagement &
Social Networking ?
Effectiveness
Blogs with comments
Participation
e-Learning/ Podcasts
Classroom Training
Brochures & Posters
Low Info Sec Policies
Low
Awareness Behavioural Change
12. Use of Web 2.0 Technologies
Building the Web
2.0 Enterprise,
McKinsey Global
Survey
13. Use of Web 2.0 Technologies
• Slide Content
Building the Web
2.0 Enterprise,
McKinsey Global
Survey
14. Regional Satisfaction with Web 2.0 Tools
Building the Web
2.0 Enterprise,
McKinsey Global
Survey
Asia Pacific includes Australia, New Zealand, Taiwan, Hong Kong, Japan, S Korea and
Singapore
19. e-Learning
• Now a proven, scalable and cost effective
method of raising information security
awareness.
• Allows employees the flexibility to learn on
their own terms.
• Incorporate graphics and media elements
• Develop refresher courses every 6 months or
so.
20. Blogs
• More informal method of explaining
the drivers behind Information Security
policies.
• Allow employees to add moderated
comments.
• Keep the content fresh
• Choose bloggers who have the
respect of the employees not just
figures of authorities.
21. Social Networking
• Relatively new channel for
raising employee awareness.
Works the other way i.e. users
choose to access information
created by other users.
• Content framework to be
specified in a corporate
environment.
22. Information Security Employee Portals
• One stop for formal and informal
Information Security information
in the organisation.
• Use collaborative features such
as feed back and contributing
authors to engage users.
23. How Companies Adopt Web 2.0 Tools
Building the Web
2.0 Enterprise,
McKinsey Global
Survey
24. Key Message
Employees the stewards of critical organisational data and
information assets represent the most vulnerable link in the chain..
The use of Web 2.0 technologies allow effective engagement
with employees, specially
the growing numbers of technology savvy generation X & Y employees
Web 2.0 tools are not only allow low cost, large scale deployments but also
allow effective communication of key messages about Information Security