SlideShare a Scribd company logo
Risk v Security; Defense in Depth;
and the Hierarchy of Adherence to
Rules.
An InfoSec Guide to the Care and Feeding of your Legal Team
ISSA CISO Forum
January 30, 2015
Phillip Mahan, CISSP, CIPM, CISA, CIPP/US
(c) 2013 Binary Bodyguards, Inc.
Before we begin...
It’s best knowing what you are getting
yourself into when you sit down for a
presentation.
This is a Non-Technical Presentation.
Today we’ll deal with Business concepts and not Technical
data.
This is a Right-Brained leaning presentation.
This is more Concept than Concrete, although we
have both.
(c) 2013 Binary Bodyguards, Inc.
January 30
1649 King Charles I of England is beheaded
1790 The first boat specialized as a Lifeboat is tested on the
river Tyne
1982 Richard Skrenta wrote the first PC Virus code. 400 lines
long disguised as an Apple Boot Loader. Named “Elk Cloner”
Birthdays
1935 Douglas Englebart - Inventor of the Mouse
1951 Phil Collins - Singer / Drummer
1974 Christian Bale - Batman
(c) 2013 Binary Bodyguards, Inc.
Standard Disclaimer
The instructor(s) may or may not be a lawyer, and even if they were, they are not YOUR
lawyer. Nothing that is said should be considered legal advice or opinion. The information
presented herein represents the instructor’s personal opinion and current understanding of
the issues involved. Neither the instructor(s) nor their respective organizations assume any
responsibility or liability for damages arising out of any reliance on or use of this information.
If you are viewing this presentation from a distribution rather than actually being there, some
of the slides may not make any sense out of context. If you have questions, please contact
the instructor(s) at the address provided on the contact slide.
(c) 2013 Binary Bodyguards, Inc.
The importance of Words
“The difference between the right word, and almost the right word, is
the difference between LIGHTNING and a lightning bug.” - Mark Twain
“Should” vs “Shall” in Policy:
‘Shall’ has consequences if violated.
‘Should’ is a recommendation.
Let’s eat, Grandpa. I’m hungry!
OR
Let’s eat Grandpa. I’m hungry!
Commas;
Saving lives since
the 1300s
“You should see Lord of the rings!”
-Your favorite Nerdy friend
“You shall not PASS!!”
-Gandalf to the Balrog before
knocking it into the depths
(c) 2013 Binary Bodyguards, Inc.
Songs you can’t get out of your head
Unwritten Rules :
The Laws of Nature
Individual Habits
Team “Procedures”
The spoken word travels at the
speed of sound. Sound waves fade.
If it is heard and understood, sounds
remain in our mind with ‘echoic
memory’.
(c) 2013 Binary Bodyguards, Inc.
If you have ever had a song stuck in your head, you
know about ‘echoic loops’
Let me look that up for you...
Written Rules :
Laws of Man
Corporate Policies
Department Standards
The Written word endures for as
long as people read it. It also
makes better reference material
than the spoken word.
‘Iconic memory’ is not as strong, but has a better shelf
life if you can convince people to read the manual.
You also need to be able to prove that it has been read.
(c) 2013 Binary Bodyguards, Inc.
Risk Vs Security
Some words are NOT interchangeable, but the masses
love to try to make them so.
Security conjures images of Guards in uniform,
Blankets, and people with Guns. Most people are
uncomfortable with Security on a visceral level.
Risk can be avoided, it brings images of some modicum
of control over their circumstance. A Risk Appetite
can be quantified, where Security is more nebulous for
most.
(c) 2013 Binary Bodyguards, Inc.
Hierarchy of Adherence to Rules
The Laws of Nature
The Laws of Man
Corporate Policies
Department Standards
Team Procedures
Individual Habits
The Laws of Nature
are inviolate, all others
are subject to the
individual and their
own personal codes.
You can also count on
a person’s Habits.
(c) 2013 Binary Bodyguards, Inc.
Looking at Defense in Depth
The Data is the key to the kingdom.
Know how long to keep the Data.
An unenforced policy is a suggestion.
Privacy Laws vary and need to be considered.
If a Control can’t be proved, it doesn’t exist.
Confidentiality, Integrity, Accessibility.
Know who has access to your Assets.
Know the Value of the data being protected.
7 lenses for your data.
(Plus the Data.)
(c) 2013 Binary Bodyguards, Inc.
Guten Tag
We all need to try and speak the
same language
здравствуйте
Hello
Bonjour
Source: Monty Python and the Holy Grail Source: Monty Python and the Holy Grail
Remember: Not everyone speaks “Security”
Ciao
(c) 2013 Binary Bodyguards, Inc.
Process
Facts
Logic
Numbers/News
Concretes
Definitions
--
Accounting
Forensics
Creativity
Abstractions
Play
Music / Poetry
Concepts
Symbols
--
Advertising
Privacy
Inside the Brain ( from 100k’ )
http://www.ideachampions.com/weblogs/left-brain-right-brain.jpg
(c) 2013 Binary Bodyguards, Inc.
Putting it all together
The opposite of Love is not Hate. It is
Apathy. Make sure you are loved, or hated so
you can show examples of what to do, and
what not to do.
Legal, Security, Audit, and HR make up your
4 Horsemen of the Apocalypse and should be
able to truly make a difference.
(c) 2013 Binary Bodyguards, Inc.
(c) 2013 Binary Bodyguards, Inc.
Questions?
Curiosity is Good.
Don’t be afraid
to ask questions.
Thank you for your time this morning!!
Contact me after the presentation
at pmahan.presentation@gmail.com
or on twitter @Mahan_Presents
References
“Privacy in the Information age - Revised Edition” - Harry Henderson
“IT Governance Policies & Procedures 2013 Edition” - Michael Wallace and Larry Webber
“Da Vinci and the 40 Answers: A Playbook for Creativity and Fresh Ideas” - Mark L. Fox
A guide to TRIZ methodology for Problem Solving and Creativity
“Thought Particles: Building Blocks of Perceptual Reality / Binary Code of the Mind” - Roy H Williams
This is an audio book that gives information on Particle Stack and Particle Conflict. Very useful for presentations
“Practical Guide to Computer Forensics” - David Benton & Frank Grindstaff
“Foundations of Information Privacy and Data Protection” - Peter P. Swire CIPP/US and Kenesa Ahmad CIPP/US
The “Owly” series of books - Andy Runton
This series doesn’t have anything to do with the presentation, but I wanted to put in a plug for a friend.
These are books that children love.
“Welcome to Your Brain” - Sandra Aamodt, Ph.D. and Sam Wang, Ph.D.
Why You Lose Your Car Keys but Never Forget How to Drive and Other Puzzles of Everyday Life
“On the Origin of Stories: Evolution Cognition, and Fiction” - Brian Boyd
“Pendulum” - Michael Drew & Roy H. Williams
An explanation of Research that has shown a 40 year cycle where Humanity goes from “Me” to “We” and the implications on
Communications and Marketing.
(c) 2013 Binary Bodyguards, Inc.

More Related Content

Viewers also liked

The Great Firewall of China
The Great Firewall of ChinaThe Great Firewall of China
The Great Firewall of Chinaguest00df536
 
The human factor
The human factorThe human factor
The human factor
Koen Maris
 
Defense in Depth - Lessons Learned from Securing over 100,000 Drupal Sites
Defense in Depth - Lessons Learned from Securing over 100,000 Drupal SitesDefense in Depth - Lessons Learned from Securing over 100,000 Drupal Sites
Defense in Depth - Lessons Learned from Securing over 100,000 Drupal Sites
Pantheon
 
Virginia Tech - New Employee Orientation - Computer security
Virginia Tech - New Employee Orientation - Computer securityVirginia Tech - New Employee Orientation - Computer security
Virginia Tech - New Employee Orientation - Computer securityvt-hr-service-center
 
2012 FEPA Presentation: Larry Hjalmarson
2012 FEPA Presentation: Larry Hjalmarson2012 FEPA Presentation: Larry Hjalmarson
2012 FEPA Presentation: Larry HjalmarsonFloridaPipeTalk
 
DC970 Presents: Defense in Depth
DC970 Presents: Defense in DepthDC970 Presents: Defense in Depth
DC970 Presents: Defense in Depth
IceQUICK
 
Cyber security training for Non-IT Staff
Cyber security training for Non-IT StaffCyber security training for Non-IT Staff
Cyber security training for Non-IT Staff
Rajneesh G
 
Defense in Depth – Your Security Castle
Defense in Depth – Your Security CastleDefense in Depth – Your Security Castle
Defense in Depth – Your Security Castle
Coastal Pet Products, Inc.
 
How To Promote Security Awareness In Your Company
How To Promote Security Awareness In Your CompanyHow To Promote Security Awareness In Your Company
How To Promote Security Awareness In Your Companydanielblander
 
Network security - Defense in Depth
Network security - Defense in DepthNetwork security - Defense in Depth
Network security - Defense in Depth
Dilum Bandara
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Stephen Cobb
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and security
Alisha Korpal
 
Cyber Security - The New Threats to Internal Controls
Cyber Security - The New Threats to Internal ControlsCyber Security - The New Threats to Internal Controls
Cyber Security - The New Threats to Internal Controls
DecosimoCPAs
 
FireWall
FireWallFireWall
FireWallrubal_9
 
Cyber Security for the Employee - AFP Annual Conference 2016
Cyber Security for the Employee - AFP Annual Conference 2016Cyber Security for the Employee - AFP Annual Conference 2016
Cyber Security for the Employee - AFP Annual Conference 2016
Brad Deflin
 
End User Security Awareness Presentation
End User Security Awareness PresentationEnd User Security Awareness Presentation
End User Security Awareness Presentation
Cristian Mihai
 

Viewers also liked (17)

The Great Firewall of China
The Great Firewall of ChinaThe Great Firewall of China
The Great Firewall of China
 
The human factor
The human factorThe human factor
The human factor
 
Defense in Depth - Lessons Learned from Securing over 100,000 Drupal Sites
Defense in Depth - Lessons Learned from Securing over 100,000 Drupal SitesDefense in Depth - Lessons Learned from Securing over 100,000 Drupal Sites
Defense in Depth - Lessons Learned from Securing over 100,000 Drupal Sites
 
Virginia Tech - New Employee Orientation - Computer security
Virginia Tech - New Employee Orientation - Computer securityVirginia Tech - New Employee Orientation - Computer security
Virginia Tech - New Employee Orientation - Computer security
 
2012 FEPA Presentation: Larry Hjalmarson
2012 FEPA Presentation: Larry Hjalmarson2012 FEPA Presentation: Larry Hjalmarson
2012 FEPA Presentation: Larry Hjalmarson
 
TechCoastRodriguezFinal
TechCoastRodriguezFinalTechCoastRodriguezFinal
TechCoastRodriguezFinal
 
DC970 Presents: Defense in Depth
DC970 Presents: Defense in DepthDC970 Presents: Defense in Depth
DC970 Presents: Defense in Depth
 
Cyber security training for Non-IT Staff
Cyber security training for Non-IT StaffCyber security training for Non-IT Staff
Cyber security training for Non-IT Staff
 
Defense in Depth – Your Security Castle
Defense in Depth – Your Security CastleDefense in Depth – Your Security Castle
Defense in Depth – Your Security Castle
 
How To Promote Security Awareness In Your Company
How To Promote Security Awareness In Your CompanyHow To Promote Security Awareness In Your Company
How To Promote Security Awareness In Your Company
 
Network security - Defense in Depth
Network security - Defense in DepthNetwork security - Defense in Depth
Network security - Defense in Depth
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and security
 
Cyber Security - The New Threats to Internal Controls
Cyber Security - The New Threats to Internal ControlsCyber Security - The New Threats to Internal Controls
Cyber Security - The New Threats to Internal Controls
 
FireWall
FireWallFireWall
FireWall
 
Cyber Security for the Employee - AFP Annual Conference 2016
Cyber Security for the Employee - AFP Annual Conference 2016Cyber Security for the Employee - AFP Annual Conference 2016
Cyber Security for the Employee - AFP Annual Conference 2016
 
End User Security Awareness Presentation
End User Security Awareness PresentationEnd User Security Awareness Presentation
End User Security Awareness Presentation
 

Similar to ISSA_CISO_Forum_2015_Distribution

Brain Hacking: Using behavioural economics and consumer psychology to improve...
Brain Hacking: Using behavioural economics and consumer psychology to improve...Brain Hacking: Using behavioural economics and consumer psychology to improve...
Brain Hacking: Using behavioural economics and consumer psychology to improve...
David Greenwood
 
Great Essay Writing
Great Essay WritingGreat Essay Writing
Great Essay Writing
Tammy Lacy
 
Marketing Information AASL 2009
Marketing Information AASL 2009Marketing Information AASL 2009
Marketing Information AASL 2009
Paige Jaeger
 
The Psychology Behind Security - ISSA Journal Abril 2010
The Psychology Behind Security - ISSA Journal Abril 2010The Psychology Behind Security - ISSA Journal Abril 2010
The Psychology Behind Security - ISSA Journal Abril 2010
Spark Security
 
Researchers, Discovery and the Internet: What Next?
Researchers, Discovery and the Internet: What Next?Researchers, Discovery and the Internet: What Next?
Researchers, Discovery and the Internet: What Next?
David Smith
 
Short Essay On My Hobby Painting. Online assignment writing service.
Short Essay On My Hobby Painting. Online assignment writing service.Short Essay On My Hobby Painting. Online assignment writing service.
Short Essay On My Hobby Painting. Online assignment writing service.
Nancy Ross
 
Essay On Eyeglasses
Essay On EyeglassesEssay On Eyeglasses
Essay On Eyeglasses
Christy Williams
 
Ap English Language And Composition Essay Scoring Rubric
Ap English Language And Composition Essay Scoring RubricAp English Language And Composition Essay Scoring Rubric
Ap English Language And Composition Essay Scoring Rubric
Tracy Walker
 
Essay Introduce About Yourself
Essay Introduce About YourselfEssay Introduce About Yourself
Essay Introduce About Yourself
Heather Lopez
 
Simple Presentation Rubric Middle School
Simple Presentation Rubric Middle SchoolSimple Presentation Rubric Middle School
Simple Presentation Rubric Middle School
Sandra Long
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
Kermit Agbas
 
Richard Dyer White Essays On Race And Culture
Richard Dyer White Essays On Race And CultureRichard Dyer White Essays On Race And Culture
Richard Dyer White Essays On Race And Culture
Kristin Thomas
 
Management of Organizations-Part I
Management of Organizations-Part IManagement of Organizations-Part I
Management of Organizations-Part I
Ramnath Srinivasan
 
Sample Interview Questions And Keywords. Online assignment writing service.
Sample Interview Questions And Keywords. Online assignment writing service.Sample Interview Questions And Keywords. Online assignment writing service.
Sample Interview Questions And Keywords. Online assignment writing service.
Angie Flores
 
Unit on intelligence
Unit on intelligenceUnit on intelligence
Unit on intelligence
Carlos & Irene
 
Talking Tech - the art and science of communicating complex ideas (Bristech2...
Talking Tech  - the art and science of communicating complex ideas (Bristech2...Talking Tech  - the art and science of communicating complex ideas (Bristech2...
Talking Tech - the art and science of communicating complex ideas (Bristech2...
Cecilia Thirlway
 
School Essay Sample Photo Essay
School Essay Sample Photo EssaySchool Essay Sample Photo Essay
School Essay Sample Photo Essay
Linda Garcia
 
Psychology Research Essay Sample. Online assignment writing service.
Psychology Research Essay Sample. Online assignment writing service.Psychology Research Essay Sample. Online assignment writing service.
Psychology Research Essay Sample. Online assignment writing service.
Yolanda Allrich
 
The Best Essay Hooks Infographics
The Best Essay Hooks  InfographicsThe Best Essay Hooks  Infographics
The Best Essay Hooks Infographics
Jaclyn Creedon
 
Seductive security - Art of seduction
Seductive security - Art of seductionSeductive security - Art of seduction
Seductive security - Art of seduction
b coatesworth
 

Similar to ISSA_CISO_Forum_2015_Distribution (20)

Brain Hacking: Using behavioural economics and consumer psychology to improve...
Brain Hacking: Using behavioural economics and consumer psychology to improve...Brain Hacking: Using behavioural economics and consumer psychology to improve...
Brain Hacking: Using behavioural economics and consumer psychology to improve...
 
Great Essay Writing
Great Essay WritingGreat Essay Writing
Great Essay Writing
 
Marketing Information AASL 2009
Marketing Information AASL 2009Marketing Information AASL 2009
Marketing Information AASL 2009
 
The Psychology Behind Security - ISSA Journal Abril 2010
The Psychology Behind Security - ISSA Journal Abril 2010The Psychology Behind Security - ISSA Journal Abril 2010
The Psychology Behind Security - ISSA Journal Abril 2010
 
Researchers, Discovery and the Internet: What Next?
Researchers, Discovery and the Internet: What Next?Researchers, Discovery and the Internet: What Next?
Researchers, Discovery and the Internet: What Next?
 
Short Essay On My Hobby Painting. Online assignment writing service.
Short Essay On My Hobby Painting. Online assignment writing service.Short Essay On My Hobby Painting. Online assignment writing service.
Short Essay On My Hobby Painting. Online assignment writing service.
 
Essay On Eyeglasses
Essay On EyeglassesEssay On Eyeglasses
Essay On Eyeglasses
 
Ap English Language And Composition Essay Scoring Rubric
Ap English Language And Composition Essay Scoring RubricAp English Language And Composition Essay Scoring Rubric
Ap English Language And Composition Essay Scoring Rubric
 
Essay Introduce About Yourself
Essay Introduce About YourselfEssay Introduce About Yourself
Essay Introduce About Yourself
 
Simple Presentation Rubric Middle School
Simple Presentation Rubric Middle SchoolSimple Presentation Rubric Middle School
Simple Presentation Rubric Middle School
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Richard Dyer White Essays On Race And Culture
Richard Dyer White Essays On Race And CultureRichard Dyer White Essays On Race And Culture
Richard Dyer White Essays On Race And Culture
 
Management of Organizations-Part I
Management of Organizations-Part IManagement of Organizations-Part I
Management of Organizations-Part I
 
Sample Interview Questions And Keywords. Online assignment writing service.
Sample Interview Questions And Keywords. Online assignment writing service.Sample Interview Questions And Keywords. Online assignment writing service.
Sample Interview Questions And Keywords. Online assignment writing service.
 
Unit on intelligence
Unit on intelligenceUnit on intelligence
Unit on intelligence
 
Talking Tech - the art and science of communicating complex ideas (Bristech2...
Talking Tech  - the art and science of communicating complex ideas (Bristech2...Talking Tech  - the art and science of communicating complex ideas (Bristech2...
Talking Tech - the art and science of communicating complex ideas (Bristech2...
 
School Essay Sample Photo Essay
School Essay Sample Photo EssaySchool Essay Sample Photo Essay
School Essay Sample Photo Essay
 
Psychology Research Essay Sample. Online assignment writing service.
Psychology Research Essay Sample. Online assignment writing service.Psychology Research Essay Sample. Online assignment writing service.
Psychology Research Essay Sample. Online assignment writing service.
 
The Best Essay Hooks Infographics
The Best Essay Hooks  InfographicsThe Best Essay Hooks  Infographics
The Best Essay Hooks Infographics
 
Seductive security - Art of seduction
Seductive security - Art of seductionSeductive security - Art of seduction
Seductive security - Art of seduction
 

ISSA_CISO_Forum_2015_Distribution

  • 1. Risk v Security; Defense in Depth; and the Hierarchy of Adherence to Rules. An InfoSec Guide to the Care and Feeding of your Legal Team ISSA CISO Forum January 30, 2015 Phillip Mahan, CISSP, CIPM, CISA, CIPP/US (c) 2013 Binary Bodyguards, Inc.
  • 2. Before we begin... It’s best knowing what you are getting yourself into when you sit down for a presentation. This is a Non-Technical Presentation. Today we’ll deal with Business concepts and not Technical data. This is a Right-Brained leaning presentation. This is more Concept than Concrete, although we have both. (c) 2013 Binary Bodyguards, Inc.
  • 3. January 30 1649 King Charles I of England is beheaded 1790 The first boat specialized as a Lifeboat is tested on the river Tyne 1982 Richard Skrenta wrote the first PC Virus code. 400 lines long disguised as an Apple Boot Loader. Named “Elk Cloner” Birthdays 1935 Douglas Englebart - Inventor of the Mouse 1951 Phil Collins - Singer / Drummer 1974 Christian Bale - Batman (c) 2013 Binary Bodyguards, Inc.
  • 4. Standard Disclaimer The instructor(s) may or may not be a lawyer, and even if they were, they are not YOUR lawyer. Nothing that is said should be considered legal advice or opinion. The information presented herein represents the instructor’s personal opinion and current understanding of the issues involved. Neither the instructor(s) nor their respective organizations assume any responsibility or liability for damages arising out of any reliance on or use of this information. If you are viewing this presentation from a distribution rather than actually being there, some of the slides may not make any sense out of context. If you have questions, please contact the instructor(s) at the address provided on the contact slide. (c) 2013 Binary Bodyguards, Inc.
  • 5. The importance of Words “The difference between the right word, and almost the right word, is the difference between LIGHTNING and a lightning bug.” - Mark Twain “Should” vs “Shall” in Policy: ‘Shall’ has consequences if violated. ‘Should’ is a recommendation. Let’s eat, Grandpa. I’m hungry! OR Let’s eat Grandpa. I’m hungry! Commas; Saving lives since the 1300s “You should see Lord of the rings!” -Your favorite Nerdy friend “You shall not PASS!!” -Gandalf to the Balrog before knocking it into the depths (c) 2013 Binary Bodyguards, Inc.
  • 6. Songs you can’t get out of your head Unwritten Rules : The Laws of Nature Individual Habits Team “Procedures” The spoken word travels at the speed of sound. Sound waves fade. If it is heard and understood, sounds remain in our mind with ‘echoic memory’. (c) 2013 Binary Bodyguards, Inc. If you have ever had a song stuck in your head, you know about ‘echoic loops’
  • 7. Let me look that up for you... Written Rules : Laws of Man Corporate Policies Department Standards The Written word endures for as long as people read it. It also makes better reference material than the spoken word. ‘Iconic memory’ is not as strong, but has a better shelf life if you can convince people to read the manual. You also need to be able to prove that it has been read. (c) 2013 Binary Bodyguards, Inc.
  • 8. Risk Vs Security Some words are NOT interchangeable, but the masses love to try to make them so. Security conjures images of Guards in uniform, Blankets, and people with Guns. Most people are uncomfortable with Security on a visceral level. Risk can be avoided, it brings images of some modicum of control over their circumstance. A Risk Appetite can be quantified, where Security is more nebulous for most. (c) 2013 Binary Bodyguards, Inc.
  • 9. Hierarchy of Adherence to Rules The Laws of Nature The Laws of Man Corporate Policies Department Standards Team Procedures Individual Habits The Laws of Nature are inviolate, all others are subject to the individual and their own personal codes. You can also count on a person’s Habits. (c) 2013 Binary Bodyguards, Inc.
  • 10. Looking at Defense in Depth The Data is the key to the kingdom. Know how long to keep the Data. An unenforced policy is a suggestion. Privacy Laws vary and need to be considered. If a Control can’t be proved, it doesn’t exist. Confidentiality, Integrity, Accessibility. Know who has access to your Assets. Know the Value of the data being protected. 7 lenses for your data. (Plus the Data.) (c) 2013 Binary Bodyguards, Inc.
  • 11. Guten Tag We all need to try and speak the same language здравствуйте Hello Bonjour Source: Monty Python and the Holy Grail Source: Monty Python and the Holy Grail Remember: Not everyone speaks “Security” Ciao (c) 2013 Binary Bodyguards, Inc.
  • 12. Process Facts Logic Numbers/News Concretes Definitions -- Accounting Forensics Creativity Abstractions Play Music / Poetry Concepts Symbols -- Advertising Privacy Inside the Brain ( from 100k’ ) http://www.ideachampions.com/weblogs/left-brain-right-brain.jpg (c) 2013 Binary Bodyguards, Inc.
  • 13. Putting it all together The opposite of Love is not Hate. It is Apathy. Make sure you are loved, or hated so you can show examples of what to do, and what not to do. Legal, Security, Audit, and HR make up your 4 Horsemen of the Apocalypse and should be able to truly make a difference. (c) 2013 Binary Bodyguards, Inc.
  • 14. (c) 2013 Binary Bodyguards, Inc. Questions? Curiosity is Good. Don’t be afraid to ask questions. Thank you for your time this morning!! Contact me after the presentation at pmahan.presentation@gmail.com or on twitter @Mahan_Presents
  • 15. References “Privacy in the Information age - Revised Edition” - Harry Henderson “IT Governance Policies & Procedures 2013 Edition” - Michael Wallace and Larry Webber “Da Vinci and the 40 Answers: A Playbook for Creativity and Fresh Ideas” - Mark L. Fox A guide to TRIZ methodology for Problem Solving and Creativity “Thought Particles: Building Blocks of Perceptual Reality / Binary Code of the Mind” - Roy H Williams This is an audio book that gives information on Particle Stack and Particle Conflict. Very useful for presentations “Practical Guide to Computer Forensics” - David Benton & Frank Grindstaff “Foundations of Information Privacy and Data Protection” - Peter P. Swire CIPP/US and Kenesa Ahmad CIPP/US The “Owly” series of books - Andy Runton This series doesn’t have anything to do with the presentation, but I wanted to put in a plug for a friend. These are books that children love. “Welcome to Your Brain” - Sandra Aamodt, Ph.D. and Sam Wang, Ph.D. Why You Lose Your Car Keys but Never Forget How to Drive and Other Puzzles of Everyday Life “On the Origin of Stories: Evolution Cognition, and Fiction” - Brian Boyd “Pendulum” - Michael Drew & Roy H. Williams An explanation of Research that has shown a 40 year cycle where Humanity goes from “Me” to “We” and the implications on Communications and Marketing. (c) 2013 Binary Bodyguards, Inc.