SlideShare a Scribd company logo
Francisca Martínez
FACULTY
Francisca Martinez
PCS SF– EPS Analyst
Bachelor Degree in Business, actually making a
Master Degree in Finance. Joined Accenture in August
2016 as Project Control Services Analyst. She began
working in the invoicing process for customers as
Banorte, Goldcorp, BC Hydro, Level 3 and COX,
providing support to resources from Mexico, US,
Canada and Argentina.
In May 2017, started as PMO in TJX Inc, working as
Resource Manager providing the Staffing updates
directly to the customer, and working with resources
of different countries as US, Canada, India and UK.
She’s a big Harry Potter fan, enjoy bake different
desserts, read and spend time with her family and
friends.
3
Copyright © 2020 Accenture. All rights reserved.
COURSE OBJECTIVES
After this training, you will know
How to protect
your
equipment
Security Tips
for Home
Office
Security Tips
for Office
How to
protect your
information
How to protect my
equipment?
Accenture will provide
• Laptop
• Laptop Lock
• Headset
• Backpack
Your laptop must be always locked
Copyright © 2020 Accenture. All rights reserved.
Given the COVID-19 situation, more
Accenture people are working remotely than
ever before
When connecting to a new network, select "do not allow my computer to be discoverable by
other devices on the network" to turn off network discovery and folder sharing.
Where you have the ability to control it:
Change the default administrator password on your router to one that is both strong and
unique.
Enable WPA2 or WPA3 on your router to encrypt your online activity.
Create a strong network password of 8 characters or more and only share it with people you
trust.
Monitor your Wireless Router vendor or your Internet Service Provider (ISP) regularly for
security patches and firmware upgrades for your router device(s) and apply them when
available.
For additional information on configuring your home wireless network, reference the Home
Wireless Guidelines.
• If working in public,
• If you can, use your smartphone as a hotspot to connect to the internet.
• If you must use a public network, confirm with the establishment that the network is genuine before connecting and only navigate to sites that begin with "https"—indicating an encrypted connection.
• NOTE: Sensitive Accenture and client applications may require you to connect via VPN to access.
Copyright © 2020 Accenture. All rights reserved.
Use Secure
Devices &
Solutions
Authorized
devices,
software
and tools
Microsoft
Teams / One
drive
Family
cannot use
your devices
Protect my
Tech
Install
Updates
Be mindful
Copyright © 2020 Accenture. All rights reserved.
Laptop
• Laptop safe and locked
Alexa
• Turned off when working
Privacy
• Don’t make important calls in
an open space
Personal
information
• Don’t log into your personal
email, facebook, youtube, etc.
Copyright © 2020 Accenture. All rights reserved.
Working in
your City
In order to work in another City
different than Monterrey ATC, or if you
need to travel between México, you
need to:
• Get Lead’s approval
• Sign HR disclaimer letter
Working from another
country is not allowed, it
needs to be reviewed by
your Lead and Mobility
Team
Copyright © 2020 Accenture. All rights reserved.
Working in the Office
Copyright © 2020 Accenture. All rights reserved.
Badge
Clean Desk
Laptop Locked
Copyright © 2020 Accenture. All rights reserved.
INFORMATION SECURITY
What we do?
Protecting Accenture’s clients, our employees and Accenture’s own data and operations poses challenges that
call for the best from our own professional services, including the people, strategies, processes and
technologies found within Accenture’s Information Security function.
Copyright © 2020 Accenture. All rights reserved.
TOP TEN INFORMATION SECURITY BEHAVIORS
1 PISHING
Is a fraudulent attempt to access personal financial account information or
a corporate network.
Watch for signs of Phishing and verify emails are authentic.
• Only open expected emails from known senders
• Review the hyperlinks to ensure they are overwritten by Proofpoint's or
direct you to reputable websites
• Click the Report Phishing button in Outlook if you receive a suspicious
emails to your Accenture account.
 Mention the 4 signs of suspicions
of Phishing on this email.
Copyright © 2020 Accenture. All rights reserved.
2 USE APPROVED STORAGE
Unless provided by your client, only save sensitive information to devices or services provided by
Accenture
• Do not put sensitive information on personal devices or in public domain
• Do not email sensitive information to personal email accounts
• Do not store or transmit sensitive Accenture Information via client systems
Good Practices?
• https://mylearning.accenture.com/myl-ui/learner/activityDetails?activityID=1454679
• https://mylearning.accenture.com/myl-ui/learner/activityDetails?activityID=1230976
3 SCRUBBING
Confirm sharing of work products is permissible and scrub all sensitive data prior to distribution
• Only store documents with those who have business need
• Remove all logos and identifying features from documents
• Provide file links to data repositories, like SharePoint, rather than emailing attachments
4 RESTRICT ACCESS
Access Control, Restrict Access to work products with Accenture and client provided tools.
• Restrict Access to Accenture work products with the Permissions Toolbar, WinZip Encryption
controlled OneDriver/SharePoitn, restrict access to client work products with client provided
• Verify users who have access to your work products have business need
Copyright © 2020 Accenture. All rights reserved.
5 CHECK EMAILS BEFORE SENDING
Before sending, ensure emails are address to the correct person and only intended files are attach
• Always confirm you are sending the right information to the right people
6 CREATE UNIQUE PASSWORDS
Keep your work passwords unique and only use your Accenture Account credentials for business
Read through the following do`s and don'ts' of handling your credentials
• Do not document your passwords
• Do not use your Accenture credentials for personal websites
• Use two-factor identification whenever possible
7 ENABLE SECURITY SOFTWARE
Keep your security software's enable and restart computer regularly to keep the software current
• Do not circumvent security controls on Accenture workstation
• Do not install or use peer software
Delete all sensitive information from your storage location when rolling off on assignment
• Delete all sensitive information from your storage locations
• If you have permission to keep the files, scrub all work products.
Copyright © 2020 Accenture. All rights reserved.
9 DELETE WORK PRODUCTS AFTER ACCENTURE
Do not keep any work products if you stop working on Accenture
• Understand Accenture owns all work products during your time at Accenture
• Do not email sensitive information to personal email account
10 CALL ASOC
Call Accenture Security Operation Center (ASOC) immedialty at +1 202 728 0645 if you
cyber or personal security indecent.
For Further Security Support you can visit
-Policy 57-
https://in.accenture.com/protectingaccenture/about-is/
https://in.accenture.com/protectingaccenture/top-is-behaviors/
Copyright © 2020 Accenture. All rights reserved.
Accenture’s Social Engineering
16
AWARENESS & ENABLEMENT
Branded awareness messaging
with links to resources
Phishing Prevention and Social Engineering awareness videos
Packaged material for local
Information Security leads to
cascade
Incentivized and interactive
training on recognizing Social
Engineering attempts
Management of the
PHISHING
PROTECTION
PROGRAM (PPP)
for those who fail
multiple tests
TESTING & REPORTING
QUARTERLY
SOCIAL
ENGINEERING
tests sent to all
of Accenture
people globally
REPORT
PHISHING
PHISHME
Copyright © 2020 Accenture. All rights reserved.
IS Advocate Program
17
IS Advocates identify social
engineering attempts at a higher rate
than non-advocates.
IS Advocates consistently score
better than the rest of the
company on our bi-annual
behavior survey. IS Advocates are 50% less likely to
contribute to a security incident,
compared to the general Accenture
population.
Advocate program has grown
significantly in popularity and impact
since inception.
I have done this training and
I am very confident now that I am
following all the right ways to
protect Accenture and my client
from vulnerable attacks.
• Learning program with highly tailored, immersive scenarios that employees can relate to and learn from.
• Largest driver of real, lasting behavioral change for information security awareness and secure behavior
adoption throughout the company.
• Mandatory for all employees and accelerated for high-risk groups.
Copyright © 2020 Accenture. All rights reserved.
Questions?
18
Accenture Offices
Located in Monterrey, Nuevo León, you can find the offices in
Oficinas en el Parque, Blvd. Antonio L. Rodríguez #1884, Santa
Maria, 64650.
• Tower 1
• Floor 3 to 7
• Tower 2
• Reception - Lobby
• Floor 3
• Floor 9 to 10

More Related Content

What's hot

Impact Report: Work-at-Home is Working in Asia
Impact Report: Work-at-Home is Working in AsiaImpact Report: Work-at-Home is Working in Asia
Impact Report: Work-at-Home is Working in Asia
Chris Greenough
 
A Super Solution Integrator Drives Business Outcomes by Orchestrating Technology
A Super Solution Integrator Drives Business Outcomes by Orchestrating TechnologyA Super Solution Integrator Drives Business Outcomes by Orchestrating Technology
A Super Solution Integrator Drives Business Outcomes by Orchestrating Technology
Insight
 
2017 Corporate Citizenship Report
2017 Corporate Citizenship Report2017 Corporate Citizenship Report
2017 Corporate Citizenship Report
accenture
 
Webinar for May 2020 - Putting people skills and cultural change at the heart...
Webinar for May 2020 - Putting people skills and cultural change at the heart...Webinar for May 2020 - Putting people skills and cultural change at the heart...
Webinar for May 2020 - Putting people skills and cultural change at the heart...
The Digital Insurer
 
Architecting the Future Digital Workplace to Create the Best Employee Experience
Architecting the Future Digital Workplace to Create the Best Employee ExperienceArchitecting the Future Digital Workplace to Create the Best Employee Experience
Architecting the Future Digital Workplace to Create the Best Employee Experience
Dave Millner
 
Linkedin for business
Linkedin for businessLinkedin for business
Linkedin for business
Robert Powers
 
Highlights from the Voices.com 2021 Trends Report
Highlights from the Voices.com 2021 Trends ReportHighlights from the Voices.com 2021 Trends Report
Highlights from the Voices.com 2021 Trends Report
Voices
 
Reimagining the World of Work in Public Service
Reimagining the World of Work in Public ServiceReimagining the World of Work in Public Service
Reimagining the World of Work in Public Service
accenture
 
Analyzing the College Experience: The Power of Data
Analyzing the College Experience: The Power of DataAnalyzing the College Experience: The Power of Data
Analyzing the College Experience: The Power of Data
accenture
 
Accenture Getting To Equal 2020 Research Presentation
Accenture Getting To Equal 2020 Research Presentation Accenture Getting To Equal 2020 Research Presentation
Accenture Getting To Equal 2020 Research Presentation
accenture
 
Seeking New Leadership
Seeking New LeadershipSeeking New Leadership
Seeking New Leadership
accenture
 
The CIO & CMO – Adversaries No More
The CIO & CMO – Adversaries No MoreThe CIO & CMO – Adversaries No More
The CIO & CMO – Adversaries No More
Vala Afshar
 
Human Services: Lead with Impact
Human Services: Lead with ImpactHuman Services: Lead with Impact
Human Services: Lead with Impact
accenture
 
Accenture Public Service Citizen Survey: Public Administration
Accenture Public Service Citizen Survey: Public AdministrationAccenture Public Service Citizen Survey: Public Administration
Accenture Public Service Citizen Survey: Public Administration
accenture
 
The Role of the CIO and CMO in the Digital Transformation of Education
The Role of the CIO and CMO in the Digital Transformation of EducationThe Role of the CIO and CMO in the Digital Transformation of Education
The Role of the CIO and CMO in the Digital Transformation of Education
Vala Afshar
 
startup-accelerator-programmes-a-practice-guide
 startup-accelerator-programmes-a-practice-guide startup-accelerator-programmes-a-practice-guide
startup-accelerator-programmes-a-practice-guide
Hop Trieu Sung
 
Conversational AI in Higher Education
Conversational AI in Higher EducationConversational AI in Higher Education
Conversational AI in Higher Education
accenture
 
Wealthtech trends from the T3 2019 Advisor Conference
Wealthtech trends from the T3 2019 Advisor ConferenceWealthtech trends from the T3 2019 Advisor Conference
Wealthtech trends from the T3 2019 Advisor Conference
craigezra
 
Rethinking Work: the Next Chapter in Social Collaboration - Sameer Patel
Rethinking Work: the Next Chapter in Social Collaboration -  Sameer PatelRethinking Work: the Next Chapter in Social Collaboration -  Sameer Patel
Rethinking Work: the Next Chapter in Social Collaboration - Sameer Patel
OpenKnowledge srl
 
Next Generation Digital Procurement | Accenture
Next Generation Digital Procurement | AccentureNext Generation Digital Procurement | Accenture
Next Generation Digital Procurement | Accenture
Accenture Operations
 

What's hot (20)

Impact Report: Work-at-Home is Working in Asia
Impact Report: Work-at-Home is Working in AsiaImpact Report: Work-at-Home is Working in Asia
Impact Report: Work-at-Home is Working in Asia
 
A Super Solution Integrator Drives Business Outcomes by Orchestrating Technology
A Super Solution Integrator Drives Business Outcomes by Orchestrating TechnologyA Super Solution Integrator Drives Business Outcomes by Orchestrating Technology
A Super Solution Integrator Drives Business Outcomes by Orchestrating Technology
 
2017 Corporate Citizenship Report
2017 Corporate Citizenship Report2017 Corporate Citizenship Report
2017 Corporate Citizenship Report
 
Webinar for May 2020 - Putting people skills and cultural change at the heart...
Webinar for May 2020 - Putting people skills and cultural change at the heart...Webinar for May 2020 - Putting people skills and cultural change at the heart...
Webinar for May 2020 - Putting people skills and cultural change at the heart...
 
Architecting the Future Digital Workplace to Create the Best Employee Experience
Architecting the Future Digital Workplace to Create the Best Employee ExperienceArchitecting the Future Digital Workplace to Create the Best Employee Experience
Architecting the Future Digital Workplace to Create the Best Employee Experience
 
Linkedin for business
Linkedin for businessLinkedin for business
Linkedin for business
 
Highlights from the Voices.com 2021 Trends Report
Highlights from the Voices.com 2021 Trends ReportHighlights from the Voices.com 2021 Trends Report
Highlights from the Voices.com 2021 Trends Report
 
Reimagining the World of Work in Public Service
Reimagining the World of Work in Public ServiceReimagining the World of Work in Public Service
Reimagining the World of Work in Public Service
 
Analyzing the College Experience: The Power of Data
Analyzing the College Experience: The Power of DataAnalyzing the College Experience: The Power of Data
Analyzing the College Experience: The Power of Data
 
Accenture Getting To Equal 2020 Research Presentation
Accenture Getting To Equal 2020 Research Presentation Accenture Getting To Equal 2020 Research Presentation
Accenture Getting To Equal 2020 Research Presentation
 
Seeking New Leadership
Seeking New LeadershipSeeking New Leadership
Seeking New Leadership
 
The CIO & CMO – Adversaries No More
The CIO & CMO – Adversaries No MoreThe CIO & CMO – Adversaries No More
The CIO & CMO – Adversaries No More
 
Human Services: Lead with Impact
Human Services: Lead with ImpactHuman Services: Lead with Impact
Human Services: Lead with Impact
 
Accenture Public Service Citizen Survey: Public Administration
Accenture Public Service Citizen Survey: Public AdministrationAccenture Public Service Citizen Survey: Public Administration
Accenture Public Service Citizen Survey: Public Administration
 
The Role of the CIO and CMO in the Digital Transformation of Education
The Role of the CIO and CMO in the Digital Transformation of EducationThe Role of the CIO and CMO in the Digital Transformation of Education
The Role of the CIO and CMO in the Digital Transformation of Education
 
startup-accelerator-programmes-a-practice-guide
 startup-accelerator-programmes-a-practice-guide startup-accelerator-programmes-a-practice-guide
startup-accelerator-programmes-a-practice-guide
 
Conversational AI in Higher Education
Conversational AI in Higher EducationConversational AI in Higher Education
Conversational AI in Higher Education
 
Wealthtech trends from the T3 2019 Advisor Conference
Wealthtech trends from the T3 2019 Advisor ConferenceWealthtech trends from the T3 2019 Advisor Conference
Wealthtech trends from the T3 2019 Advisor Conference
 
Rethinking Work: the Next Chapter in Social Collaboration - Sameer Patel
Rethinking Work: the Next Chapter in Social Collaboration -  Sameer PatelRethinking Work: the Next Chapter in Social Collaboration -  Sameer Patel
Rethinking Work: the Next Chapter in Social Collaboration - Sameer Patel
 
Next Generation Digital Procurement | Accenture
Next Generation Digital Procurement | AccentureNext Generation Digital Procurement | Accenture
Next Generation Digital Procurement | Accenture
 

Similar to Pcs security waves

Secure End User
Secure End UserSecure End User
Secure End User
Muhammad Salahuddien
 
Cyber Security Seminar
Cyber Security SeminarCyber Security Seminar
Cyber Security Seminar
Jeremy Quadri
 
6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back
MTG IT Professionals
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02amiinaaa
 
Basic Security Training for End Users
Basic Security Training for End UsersBasic Security Training for End Users
Basic Security Training for End Users
Community IT Innovators
 
FCC Guidelines on Cyber Security
FCC Guidelines on Cyber SecurityFCC Guidelines on Cyber Security
FCC Guidelines on Cyber Security
Meg Weber
 
Building a culture of security
Building a culture of securityBuilding a culture of security
Building a culture of security
Courion Corporation
 
The top 5 basics fundamentals of network security cyberhunter solutions
The top 5 basics fundamentals of network security    cyberhunter solutionsThe top 5 basics fundamentals of network security    cyberhunter solutions
The top 5 basics fundamentals of network security cyberhunter solutions
Cyberhunter Cyber Security
 
Information and Cyber Warfare
Information and Cyber WarfareInformation and Cyber Warfare
Information and Cyber Warfare
Swapnil Jagtap
 
ISMS Awareness Training (2) (1).pptx
ISMS Awareness Training (2) (1).pptxISMS Awareness Training (2) (1).pptx
ISMS Awareness Training (2) (1).pptx
vasidharta
 
Cybersecurity for CRM v0219-3
Cybersecurity for CRM v0219-3Cybersecurity for CRM v0219-3
Cybersecurity for CRM v0219-3
Caston Thomas
 
COVID-19: Strategies to Stay Secure and Ensure Business Continuity
COVID-19: Strategies to Stay Secure and Ensure Business ContinuityCOVID-19: Strategies to Stay Secure and Ensure Business Continuity
COVID-19: Strategies to Stay Secure and Ensure Business Continuity
Optiv Security
 
Free_business_IT_security_policy_template_v5.pdf
Free_business_IT_security_policy_template_v5.pdfFree_business_IT_security_policy_template_v5.pdf
Free_business_IT_security_policy_template_v5.pdf
klodianelezi1
 
Securing Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksSecuring Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP Leaks
Hokme
 
The State Of Information and Cyber Security in 2016
The State Of Information and Cyber Security in 2016The State Of Information and Cyber Security in 2016
The State Of Information and Cyber Security in 2016
Shannon G., MBA
 
Securing your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSecuring your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSonny Hashmi
 
Securing your digital world cybersecurity for sb es
Securing your digital world   cybersecurity for sb esSecuring your digital world   cybersecurity for sb es
Securing your digital world cybersecurity for sb es
Sonny Hashmi
 
Security Features and Securing Your Data in TurboRater and InsurancePro - Kel...
Security Features and Securing Your Data in TurboRater and InsurancePro - Kel...Security Features and Securing Your Data in TurboRater and InsurancePro - Kel...
Security Features and Securing Your Data in TurboRater and InsurancePro - Kel...
Insurance Technologies Corporation (ITC)
 
Creating Trust for the Internet of Things
Creating Trust for the Internet of ThingsCreating Trust for the Internet of Things
Creating Trust for the Internet of Things
PECB
 
Cyber security for small businesses
Cyber security for small businessesCyber security for small businesses
Cyber security for small businesses
B2BPlanner Ltd.
 

Similar to Pcs security waves (20)

Secure End User
Secure End UserSecure End User
Secure End User
 
Cyber Security Seminar
Cyber Security SeminarCyber Security Seminar
Cyber Security Seminar
 
6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
 
Basic Security Training for End Users
Basic Security Training for End UsersBasic Security Training for End Users
Basic Security Training for End Users
 
FCC Guidelines on Cyber Security
FCC Guidelines on Cyber SecurityFCC Guidelines on Cyber Security
FCC Guidelines on Cyber Security
 
Building a culture of security
Building a culture of securityBuilding a culture of security
Building a culture of security
 
The top 5 basics fundamentals of network security cyberhunter solutions
The top 5 basics fundamentals of network security    cyberhunter solutionsThe top 5 basics fundamentals of network security    cyberhunter solutions
The top 5 basics fundamentals of network security cyberhunter solutions
 
Information and Cyber Warfare
Information and Cyber WarfareInformation and Cyber Warfare
Information and Cyber Warfare
 
ISMS Awareness Training (2) (1).pptx
ISMS Awareness Training (2) (1).pptxISMS Awareness Training (2) (1).pptx
ISMS Awareness Training (2) (1).pptx
 
Cybersecurity for CRM v0219-3
Cybersecurity for CRM v0219-3Cybersecurity for CRM v0219-3
Cybersecurity for CRM v0219-3
 
COVID-19: Strategies to Stay Secure and Ensure Business Continuity
COVID-19: Strategies to Stay Secure and Ensure Business ContinuityCOVID-19: Strategies to Stay Secure and Ensure Business Continuity
COVID-19: Strategies to Stay Secure and Ensure Business Continuity
 
Free_business_IT_security_policy_template_v5.pdf
Free_business_IT_security_policy_template_v5.pdfFree_business_IT_security_policy_template_v5.pdf
Free_business_IT_security_policy_template_v5.pdf
 
Securing Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksSecuring Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP Leaks
 
The State Of Information and Cyber Security in 2016
The State Of Information and Cyber Security in 2016The State Of Information and Cyber Security in 2016
The State Of Information and Cyber Security in 2016
 
Securing your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSecuring your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEs
 
Securing your digital world cybersecurity for sb es
Securing your digital world   cybersecurity for sb esSecuring your digital world   cybersecurity for sb es
Securing your digital world cybersecurity for sb es
 
Security Features and Securing Your Data in TurboRater and InsurancePro - Kel...
Security Features and Securing Your Data in TurboRater and InsurancePro - Kel...Security Features and Securing Your Data in TurboRater and InsurancePro - Kel...
Security Features and Securing Your Data in TurboRater and InsurancePro - Kel...
 
Creating Trust for the Internet of Things
Creating Trust for the Internet of ThingsCreating Trust for the Internet of Things
Creating Trust for the Internet of Things
 
Cyber security for small businesses
Cyber security for small businessesCyber security for small businesses
Cyber security for small businesses
 

More from Hugo Ivan Arellano Ibarra

Julian
Julian Julian
Introduction to innovation at accenture mar 2021
Introduction to innovation at accenture mar 2021Introduction to innovation at accenture mar 2021
Introduction to innovation at accenture mar 2021
Hugo Ivan Arellano Ibarra
 
Monica
MonicaMonica
Presentation coderdojoFinal
Presentation coderdojoFinalPresentation coderdojoFinal
Presentation coderdojoFinal
Hugo Ivan Arellano Ibarra
 

More from Hugo Ivan Arellano Ibarra (7)

Julian
Julian Julian
Julian
 
Introduction to innovation at accenture mar 2021
Introduction to innovation at accenture mar 2021Introduction to innovation at accenture mar 2021
Introduction to innovation at accenture mar 2021
 
Monica
MonicaMonica
Monica
 
Pcs academy october_2020_security
Pcs academy october_2020_securityPcs academy october_2020_security
Pcs academy october_2020_security
 
Presentation coderdojoFinal
Presentation coderdojoFinalPresentation coderdojoFinal
Presentation coderdojoFinal
 
Presentation test
Presentation testPresentation test
Presentation test
 
Pptaltspace
PptaltspacePptaltspace
Pptaltspace
 

Recently uploaded

Brand Analysis for an artist named Struan
Brand Analysis for an artist named StruanBrand Analysis for an artist named Struan
Brand Analysis for an artist named Struan
sarahvanessa51503
 
The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...
Adam Smith
 
The-McKinsey-7S-Framework. strategic management
The-McKinsey-7S-Framework. strategic managementThe-McKinsey-7S-Framework. strategic management
The-McKinsey-7S-Framework. strategic management
Bojamma2
 
Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...
dylandmeas
 
Business Valuation Principles for Entrepreneurs
Business Valuation Principles for EntrepreneursBusiness Valuation Principles for Entrepreneurs
Business Valuation Principles for Entrepreneurs
Ben Wann
 
Attending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learnersAttending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learners
Erika906060
 
Enterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdfEnterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdf
KaiNexus
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
Cynthia Clay
 
falcon-invoice-discounting-a-premier-platform-for-investors-in-india
falcon-invoice-discounting-a-premier-platform-for-investors-in-indiafalcon-invoice-discounting-a-premier-platform-for-investors-in-india
falcon-invoice-discounting-a-premier-platform-for-investors-in-india
Falcon Invoice Discounting
 
Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)
Lviv Startup Club
 
Kseniya Leshchenko: Shared development support service model as the way to ma...
Kseniya Leshchenko: Shared development support service model as the way to ma...Kseniya Leshchenko: Shared development support service model as the way to ma...
Kseniya Leshchenko: Shared development support service model as the way to ma...
Lviv Startup Club
 
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBdCree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
creerey
 
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
BBPMedia1
 
VAT Registration Outlined In UAE: Benefits and Requirements
VAT Registration Outlined In UAE: Benefits and RequirementsVAT Registration Outlined In UAE: Benefits and Requirements
VAT Registration Outlined In UAE: Benefits and Requirements
uae taxgpt
 
Skye Residences | Extended Stay Residences Near Toronto Airport
Skye Residences | Extended Stay Residences Near Toronto AirportSkye Residences | Extended Stay Residences Near Toronto Airport
Skye Residences | Extended Stay Residences Near Toronto Airport
marketingjdass
 
ikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdfikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdf
agatadrynko
 
BeMetals Presentation_May_22_2024 .pdf
BeMetals Presentation_May_22_2024   .pdfBeMetals Presentation_May_22_2024   .pdf
BeMetals Presentation_May_22_2024 .pdf
DerekIwanaka1
 
Digital Transformation and IT Strategy Toolkit and Templates
Digital Transformation and IT Strategy Toolkit and TemplatesDigital Transformation and IT Strategy Toolkit and Templates
Digital Transformation and IT Strategy Toolkit and Templates
Aurelien Domont, MBA
 
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdfMeas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
dylandmeas
 
Project File Report BBA 6th semester.pdf
Project File Report BBA 6th semester.pdfProject File Report BBA 6th semester.pdf
Project File Report BBA 6th semester.pdf
RajPriye
 

Recently uploaded (20)

Brand Analysis for an artist named Struan
Brand Analysis for an artist named StruanBrand Analysis for an artist named Struan
Brand Analysis for an artist named Struan
 
The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...
 
The-McKinsey-7S-Framework. strategic management
The-McKinsey-7S-Framework. strategic managementThe-McKinsey-7S-Framework. strategic management
The-McKinsey-7S-Framework. strategic management
 
Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...
 
Business Valuation Principles for Entrepreneurs
Business Valuation Principles for EntrepreneursBusiness Valuation Principles for Entrepreneurs
Business Valuation Principles for Entrepreneurs
 
Attending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learnersAttending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learners
 
Enterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdfEnterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdf
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
 
falcon-invoice-discounting-a-premier-platform-for-investors-in-india
falcon-invoice-discounting-a-premier-platform-for-investors-in-indiafalcon-invoice-discounting-a-premier-platform-for-investors-in-india
falcon-invoice-discounting-a-premier-platform-for-investors-in-india
 
Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)
 
Kseniya Leshchenko: Shared development support service model as the way to ma...
Kseniya Leshchenko: Shared development support service model as the way to ma...Kseniya Leshchenko: Shared development support service model as the way to ma...
Kseniya Leshchenko: Shared development support service model as the way to ma...
 
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBdCree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
 
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
 
VAT Registration Outlined In UAE: Benefits and Requirements
VAT Registration Outlined In UAE: Benefits and RequirementsVAT Registration Outlined In UAE: Benefits and Requirements
VAT Registration Outlined In UAE: Benefits and Requirements
 
Skye Residences | Extended Stay Residences Near Toronto Airport
Skye Residences | Extended Stay Residences Near Toronto AirportSkye Residences | Extended Stay Residences Near Toronto Airport
Skye Residences | Extended Stay Residences Near Toronto Airport
 
ikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdfikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdf
 
BeMetals Presentation_May_22_2024 .pdf
BeMetals Presentation_May_22_2024   .pdfBeMetals Presentation_May_22_2024   .pdf
BeMetals Presentation_May_22_2024 .pdf
 
Digital Transformation and IT Strategy Toolkit and Templates
Digital Transformation and IT Strategy Toolkit and TemplatesDigital Transformation and IT Strategy Toolkit and Templates
Digital Transformation and IT Strategy Toolkit and Templates
 
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdfMeas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
 
Project File Report BBA 6th semester.pdf
Project File Report BBA 6th semester.pdfProject File Report BBA 6th semester.pdf
Project File Report BBA 6th semester.pdf
 

Pcs security waves

  • 2. FACULTY Francisca Martinez PCS SF– EPS Analyst Bachelor Degree in Business, actually making a Master Degree in Finance. Joined Accenture in August 2016 as Project Control Services Analyst. She began working in the invoicing process for customers as Banorte, Goldcorp, BC Hydro, Level 3 and COX, providing support to resources from Mexico, US, Canada and Argentina. In May 2017, started as PMO in TJX Inc, working as Resource Manager providing the Staffing updates directly to the customer, and working with resources of different countries as US, Canada, India and UK. She’s a big Harry Potter fan, enjoy bake different desserts, read and spend time with her family and friends.
  • 3. 3 Copyright © 2020 Accenture. All rights reserved. COURSE OBJECTIVES After this training, you will know How to protect your equipment Security Tips for Home Office Security Tips for Office How to protect your information
  • 4. How to protect my equipment? Accenture will provide • Laptop • Laptop Lock • Headset • Backpack Your laptop must be always locked Copyright © 2020 Accenture. All rights reserved.
  • 5. Given the COVID-19 situation, more Accenture people are working remotely than ever before When connecting to a new network, select "do not allow my computer to be discoverable by other devices on the network" to turn off network discovery and folder sharing. Where you have the ability to control it: Change the default administrator password on your router to one that is both strong and unique. Enable WPA2 or WPA3 on your router to encrypt your online activity. Create a strong network password of 8 characters or more and only share it with people you trust. Monitor your Wireless Router vendor or your Internet Service Provider (ISP) regularly for security patches and firmware upgrades for your router device(s) and apply them when available. For additional information on configuring your home wireless network, reference the Home Wireless Guidelines. • If working in public, • If you can, use your smartphone as a hotspot to connect to the internet. • If you must use a public network, confirm with the establishment that the network is genuine before connecting and only navigate to sites that begin with "https"—indicating an encrypted connection. • NOTE: Sensitive Accenture and client applications may require you to connect via VPN to access. Copyright © 2020 Accenture. All rights reserved.
  • 6. Use Secure Devices & Solutions Authorized devices, software and tools Microsoft Teams / One drive Family cannot use your devices Protect my Tech Install Updates Be mindful Copyright © 2020 Accenture. All rights reserved.
  • 7. Laptop • Laptop safe and locked Alexa • Turned off when working Privacy • Don’t make important calls in an open space Personal information • Don’t log into your personal email, facebook, youtube, etc. Copyright © 2020 Accenture. All rights reserved.
  • 8. Working in your City In order to work in another City different than Monterrey ATC, or if you need to travel between México, you need to: • Get Lead’s approval • Sign HR disclaimer letter Working from another country is not allowed, it needs to be reviewed by your Lead and Mobility Team Copyright © 2020 Accenture. All rights reserved.
  • 9. Working in the Office Copyright © 2020 Accenture. All rights reserved.
  • 10. Badge Clean Desk Laptop Locked Copyright © 2020 Accenture. All rights reserved.
  • 11. INFORMATION SECURITY What we do? Protecting Accenture’s clients, our employees and Accenture’s own data and operations poses challenges that call for the best from our own professional services, including the people, strategies, processes and technologies found within Accenture’s Information Security function. Copyright © 2020 Accenture. All rights reserved.
  • 12. TOP TEN INFORMATION SECURITY BEHAVIORS 1 PISHING Is a fraudulent attempt to access personal financial account information or a corporate network. Watch for signs of Phishing and verify emails are authentic. • Only open expected emails from known senders • Review the hyperlinks to ensure they are overwritten by Proofpoint's or direct you to reputable websites • Click the Report Phishing button in Outlook if you receive a suspicious emails to your Accenture account.  Mention the 4 signs of suspicions of Phishing on this email. Copyright © 2020 Accenture. All rights reserved.
  • 13. 2 USE APPROVED STORAGE Unless provided by your client, only save sensitive information to devices or services provided by Accenture • Do not put sensitive information on personal devices or in public domain • Do not email sensitive information to personal email accounts • Do not store or transmit sensitive Accenture Information via client systems Good Practices? • https://mylearning.accenture.com/myl-ui/learner/activityDetails?activityID=1454679 • https://mylearning.accenture.com/myl-ui/learner/activityDetails?activityID=1230976 3 SCRUBBING Confirm sharing of work products is permissible and scrub all sensitive data prior to distribution • Only store documents with those who have business need • Remove all logos and identifying features from documents • Provide file links to data repositories, like SharePoint, rather than emailing attachments 4 RESTRICT ACCESS Access Control, Restrict Access to work products with Accenture and client provided tools. • Restrict Access to Accenture work products with the Permissions Toolbar, WinZip Encryption controlled OneDriver/SharePoitn, restrict access to client work products with client provided • Verify users who have access to your work products have business need Copyright © 2020 Accenture. All rights reserved.
  • 14. 5 CHECK EMAILS BEFORE SENDING Before sending, ensure emails are address to the correct person and only intended files are attach • Always confirm you are sending the right information to the right people 6 CREATE UNIQUE PASSWORDS Keep your work passwords unique and only use your Accenture Account credentials for business Read through the following do`s and don'ts' of handling your credentials • Do not document your passwords • Do not use your Accenture credentials for personal websites • Use two-factor identification whenever possible 7 ENABLE SECURITY SOFTWARE Keep your security software's enable and restart computer regularly to keep the software current • Do not circumvent security controls on Accenture workstation • Do not install or use peer software Delete all sensitive information from your storage location when rolling off on assignment • Delete all sensitive information from your storage locations • If you have permission to keep the files, scrub all work products. Copyright © 2020 Accenture. All rights reserved.
  • 15. 9 DELETE WORK PRODUCTS AFTER ACCENTURE Do not keep any work products if you stop working on Accenture • Understand Accenture owns all work products during your time at Accenture • Do not email sensitive information to personal email account 10 CALL ASOC Call Accenture Security Operation Center (ASOC) immedialty at +1 202 728 0645 if you cyber or personal security indecent. For Further Security Support you can visit -Policy 57- https://in.accenture.com/protectingaccenture/about-is/ https://in.accenture.com/protectingaccenture/top-is-behaviors/ Copyright © 2020 Accenture. All rights reserved.
  • 16. Accenture’s Social Engineering 16 AWARENESS & ENABLEMENT Branded awareness messaging with links to resources Phishing Prevention and Social Engineering awareness videos Packaged material for local Information Security leads to cascade Incentivized and interactive training on recognizing Social Engineering attempts Management of the PHISHING PROTECTION PROGRAM (PPP) for those who fail multiple tests TESTING & REPORTING QUARTERLY SOCIAL ENGINEERING tests sent to all of Accenture people globally REPORT PHISHING PHISHME Copyright © 2020 Accenture. All rights reserved.
  • 17. IS Advocate Program 17 IS Advocates identify social engineering attempts at a higher rate than non-advocates. IS Advocates consistently score better than the rest of the company on our bi-annual behavior survey. IS Advocates are 50% less likely to contribute to a security incident, compared to the general Accenture population. Advocate program has grown significantly in popularity and impact since inception. I have done this training and I am very confident now that I am following all the right ways to protect Accenture and my client from vulnerable attacks. • Learning program with highly tailored, immersive scenarios that employees can relate to and learn from. • Largest driver of real, lasting behavioral change for information security awareness and secure behavior adoption throughout the company. • Mandatory for all employees and accelerated for high-risk groups. Copyright © 2020 Accenture. All rights reserved.
  • 19.
  • 20. Accenture Offices Located in Monterrey, Nuevo León, you can find the offices in Oficinas en el Parque, Blvd. Antonio L. Rodríguez #1884, Santa Maria, 64650. • Tower 1 • Floor 3 to 7 • Tower 2 • Reception - Lobby • Floor 3 • Floor 9 to 10