SlideShare a Scribd company logo
1 of 12
SM




Modern Management and IT

      Matthew Rodriguez


      December 12, 2011




                           SOUTHERN CALIFORNIA EDISON
SM




Agenda

• Intro to Edison
• Changing landscape: Modern Landscape
• Changing concerns: Cyber Security
• Technology Areas @ SCE
• What Can Be Done
• Questions




                           •2            SOUTHERN CALIFORNIA EDISON
SM




•   Edison International, through its subsidiaries, is a generator and distributor of
    electric power and an investor in infrastructure and energy assets, including
    renewable energy.
•   Southern California Edison (SCE) is one of the largest electric utilities in
    California, serving more than 14 million people in a 50,000 square-mile area of
    central, coastal and Southern California, excluding the City of Los Angeles and
    certain other cities.
•   Edison Mission Group (EMG) is a holding company which acts through numerous
    subsidiaries to manage the competitive power generation business and other
    unregulated subsidiaries of Edison International.



                                          •3                              SOUTHERN CALIFORNIA EDISON
SM




Changing landscape: Modern Business

    • Technological systems are the essential
      backbone of modern business operations.
    • More consumers are connected via technology
    • Businesses without a digital footprint risk
      extinction
    • A changing workforce means new
      management strategies (Generation X,
      Millennials, Gen Y)
    • Management in modern business
      have a new responsibilities


                             •4                SOUTHERN CALIFORNIA EDISON
SM




   Increasing Use in Mobile Technology

   • On Cyber Monday, 10.8% of people used a mobile
     device to visit a retailer’s site, up from 3.9% in 2010.
      (Source: IBM’s fourth annual Cyber Monday Benchmark, 2011)


   • Sixty-five percent of mobile users said they used
      their mobile device to find a business to make an in-
      store purchase (Source: Google, 2011)

   • Approximately 52% of smartphone users will use their
     device to research products, redeem coupons and use
     apps to assist in their holiday gift purchase (Source: Acquity
      Group, 2011)




“Business can no longer afford a static Web strategy”


                                              •5                   SOUTHERN CALIFORNIA EDISON
SM




Changing Concerns: Cyber Security

• Number 1 growth area in Information Technology
• Cybercriminals are becoming more sophisticated
• Modern Managers need to be as vigilant about
  information security as they are about operations
• Management today needs to understand security
  threats and work to ensure employees are prepared to
  defend the front line.




                            •6                   SOUTHERN CALIFORNIA EDISON
SM




Recent Developments in Cyber Security

New developments in threat environment have raised the
importance of effective cyber security:
• Increase in sophistication and quantity of cyber attacks
• Current defenses not preventing system compromise
• Networks vacuumed on industrial-scale of valuable
  information resulting in loss of petabytes of information
• Most targeted firms and government organizations are
  not aware their systems have been compromised




                             •7                   SOUTHERN CALIFORNIA EDISON
SM




Growing Areas of Concern: Cyber Security

• In 2010, Internet Crime Complaint Center received the
  second-highest number of complaints since its
  inception.
• It reached a milestone in 2011 with its two-millionth
  complaint.
• On average it receives and processes 25,000 complaints
  per month.




                              Internet Crime Complaint Center



                            •8                    SOUTHERN CALIFORNIA EDISON
SM




  Forms of Cyber Attacks



        Cybercrime
                                  Hacktivism
                                                            Cyber-Espionage
                                                                                             Cyber
                                                                                            Warfare




Cybercrime – Unauthorized computer penetration for immediate financial gain
Hacktivisim – Use of cyber attacks as a form of politically or ideologically motivated protest
Cyber Espionage – Unauthorized computer penetration to acquire sensitive or valuable information to gain
competitive advantage.
Cyber Warfare – Use of cyber attacks to cause damage through severe disruption or damage of computer
controlled systems.




                                                       •9                             SOUTHERN CALIFORNIA EDISON
SM




    Technology Areas @ SCE

    • Transmission/Distribution Operations - SCADA
    • Real-time/Day Ahead Energy Market - Regulation
    • Customer Information – Privacy
    • R&D – Patents
    • Investor Information – Market Advantage
    • Personnel Information – Employee Privacy
    • Business Operations – Transactional Integrity



“It is management’s duty to be the frontline of defense using
available technology and enforcement of company policy”

                               •10                    SOUTHERN CALIFORNIA EDISON
SM




What Can Be Done

Modern Managers need to:
• Be aware of the changing landscape of business
  operations, and consumer behavior, which are
  increasingly dependent on technology
• Be aware of emerging technological concerns that
  threaten business operations and data integrity.
• Understand the essential role technology plays in
  business, and the responsibility to safeguard that
  technology.
• Understand that technology is imperative to the success
  of any large company, and that cyber criminals are
  becoming more sophisticated.



                           •11                   SOUTHERN CALIFORNIA EDISON
SM




Thank You.




    •12      SOUTHERN CALIFORNIA EDISON

More Related Content

What's hot

Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
takahe2
 
1introtoict e-tech-171114060222
1introtoict e-tech-1711140602221introtoict e-tech-171114060222
1introtoict e-tech-171114060222
Raul Raul
 
Digital Citizenship Power Point Pres.
Digital Citizenship Power Point Pres.Digital Citizenship Power Point Pres.
Digital Citizenship Power Point Pres.
vitor94
 
Peluang masa depan bisnis it v4
Peluang masa depan bisnis it v4Peluang masa depan bisnis it v4
Peluang masa depan bisnis it v4
pramukajabar
 

What's hot (20)

Impactof IT
Impactof ITImpactof IT
Impactof IT
 
Hritik Singh
Hritik SinghHritik Singh
Hritik Singh
 
Ict And Society
Ict And SocietyIct And Society
Ict And Society
 
Information Technology (IT)
Information Technology (IT)Information Technology (IT)
Information Technology (IT)
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
The core elements of digital citizenship
The core elements of digital citizenshipThe core elements of digital citizenship
The core elements of digital citizenship
 
Beam Internets Everything: The Only Unified Messaging Platform that Connects ...
Beam Internets Everything: The Only Unified Messaging Platform that Connects ...Beam Internets Everything: The Only Unified Messaging Platform that Connects ...
Beam Internets Everything: The Only Unified Messaging Platform that Connects ...
 
9 Elements of Digital Citizenship and the 5 fluencies.
9 Elements of Digital Citizenship and the 5 fluencies.9 Elements of Digital Citizenship and the 5 fluencies.
9 Elements of Digital Citizenship and the 5 fluencies.
 
Core elements of Digital Citizenship
Core elements of Digital CitizenshipCore elements of Digital Citizenship
Core elements of Digital Citizenship
 
Essay: Eli Lilly Scholarship for BDPA Students, Gerardo Dominguez
Essay: Eli Lilly Scholarship for BDPA Students, Gerardo DominguezEssay: Eli Lilly Scholarship for BDPA Students, Gerardo Dominguez
Essay: Eli Lilly Scholarship for BDPA Students, Gerardo Dominguez
 
Collaborative Knowledge Networks Market Assessment
Collaborative Knowledge Networks  Market AssessmentCollaborative Knowledge Networks  Market Assessment
Collaborative Knowledge Networks Market Assessment
 
1introtoict e-tech-171114060222
1introtoict e-tech-1711140602221introtoict e-tech-171114060222
1introtoict e-tech-171114060222
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Q1.1
Q1.1 Q1.1
Q1.1
 
Legal Issues in Applied Technology
Legal Issues in Applied TechnologyLegal Issues in Applied Technology
Legal Issues in Applied Technology
 
Introduction of ICT
Introduction of ICTIntroduction of ICT
Introduction of ICT
 
Question 1 - Youth Presentation
Question 1 - Youth PresentationQuestion 1 - Youth Presentation
Question 1 - Youth Presentation
 
Digital Citizenship Power Point Pres.
Digital Citizenship Power Point Pres.Digital Citizenship Power Point Pres.
Digital Citizenship Power Point Pres.
 
Peluang masa depan bisnis it v4
Peluang masa depan bisnis it v4Peluang masa depan bisnis it v4
Peluang masa depan bisnis it v4
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 

Similar to Role of it in management at SCE

20101012 isa larry_clinton
20101012 isa larry_clinton20101012 isa larry_clinton
20101012 isa larry_clinton
CIONET
 
BIS "Is Your Company at Risk for a Security Breach?"
BIS "Is Your Company at Risk for a Security Breach?"BIS "Is Your Company at Risk for a Security Breach?"
BIS "Is Your Company at Risk for a Security Breach?"
ChristiAKannapel
 
Disruptive Technologies: Impact on Strategic Alliances, Partnerships & Channels
Disruptive Technologies: Impact on Strategic Alliances, Partnerships & ChannelsDisruptive Technologies: Impact on Strategic Alliances, Partnerships & Channels
Disruptive Technologies: Impact on Strategic Alliances, Partnerships & Channels
Phil Hogg
 
Cyber Security at CTX15, London
Cyber Security at CTX15, LondonCyber Security at CTX15, London
Cyber Security at CTX15, London
John Palfreyman
 

Similar to Role of it in management at SCE (20)

Cybercrime: Radically Rethinking the Global Threat
Cybercrime:  Radically Rethinking the Global ThreatCybercrime:  Radically Rethinking the Global Threat
Cybercrime: Radically Rethinking the Global Threat
 
20101012 isa larry_clinton
20101012 isa larry_clinton20101012 isa larry_clinton
20101012 isa larry_clinton
 
Symantec 2011 State of Security Survey Global Findings
Symantec 2011 State of Security Survey Global FindingsSymantec 2011 State of Security Survey Global Findings
Symantec 2011 State of Security Survey Global Findings
 
Cyber Security in Manufacturing
Cyber Security in ManufacturingCyber Security in Manufacturing
Cyber Security in Manufacturing
 
Top 10 Cybersecurity Predictions for 2015
Top 10 Cybersecurity Predictions for 2015Top 10 Cybersecurity Predictions for 2015
Top 10 Cybersecurity Predictions for 2015
 
BIS "Is Your Company at Risk for a Security Breach?"
BIS "Is Your Company at Risk for a Security Breach?"BIS "Is Your Company at Risk for a Security Breach?"
BIS "Is Your Company at Risk for a Security Breach?"
 
Disruptors in Payments Webinar
Disruptors in Payments Webinar Disruptors in Payments Webinar
Disruptors in Payments Webinar
 
Future of Business 19th June Plymouth
Future of Business 19th June Plymouth Future of Business 19th June Plymouth
Future of Business 19th June Plymouth
 
Cyber security general perspective a
Cyber security general perspective aCyber security general perspective a
Cyber security general perspective a
 
Guarding Indias Digital Fortress The Vulnerability to Zero Day Attacks.pptx
Guarding Indias Digital Fortress The Vulnerability to Zero Day Attacks.pptxGuarding Indias Digital Fortress The Vulnerability to Zero Day Attacks.pptx
Guarding Indias Digital Fortress The Vulnerability to Zero Day Attacks.pptx
 
Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012
 
Cyber War ( World War 3 )
Cyber War ( World War 3 )Cyber War ( World War 3 )
Cyber War ( World War 3 )
 
Disruptive Technologies: Impact on Strategic Alliances, Partnerships & Channels
Disruptive Technologies: Impact on Strategic Alliances, Partnerships & ChannelsDisruptive Technologies: Impact on Strategic Alliances, Partnerships & Channels
Disruptive Technologies: Impact on Strategic Alliances, Partnerships & Channels
 
Information Security for Small Business
Information Security for Small BusinessInformation Security for Small Business
Information Security for Small Business
 
Information Security for Small Business
Information Security for Small BusinessInformation Security for Small Business
Information Security for Small Business
 
Steel Point Solutions IAS Track 3 "Sustaining a Cyber Workforce" by L.T. Hawkins
Steel Point Solutions IAS Track 3 "Sustaining a Cyber Workforce" by L.T. HawkinsSteel Point Solutions IAS Track 3 "Sustaining a Cyber Workforce" by L.T. Hawkins
Steel Point Solutions IAS Track 3 "Sustaining a Cyber Workforce" by L.T. Hawkins
 
Why Cyber Security Is Needed.pdf
Why Cyber Security Is Needed.pdfWhy Cyber Security Is Needed.pdf
Why Cyber Security Is Needed.pdf
 
Cyber Security at CTX15, London
Cyber Security at CTX15, LondonCyber Security at CTX15, London
Cyber Security at CTX15, London
 
Cyber Security and possible cyber attacks in organizations
Cyber Security and possible cyber attacks in organizations Cyber Security and possible cyber attacks in organizations
Cyber Security and possible cyber attacks in organizations
 
Adam Maskatiya - Redefining Security in an Era of Digital Transformation #mid...
Adam Maskatiya - Redefining Security in an Era of Digital Transformation #mid...Adam Maskatiya - Redefining Security in an Era of Digital Transformation #mid...
Adam Maskatiya - Redefining Security in an Era of Digital Transformation #mid...
 

Recently uploaded

Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
daisycvs
 
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al MizharAl Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
allensay1
 
Mckinsey foundation level Handbook for Viewing
Mckinsey foundation level Handbook for ViewingMckinsey foundation level Handbook for Viewing
Mckinsey foundation level Handbook for Viewing
Nauman Safdar
 
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
daisycvs
 
Structuring and Writing DRL Mckinsey (1).pdf
Structuring and Writing DRL Mckinsey (1).pdfStructuring and Writing DRL Mckinsey (1).pdf
Structuring and Writing DRL Mckinsey (1).pdf
laloo_007
 

Recently uploaded (20)

Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
 
Pre Engineered Building Manufacturers Hyderabad.pptx
Pre Engineered  Building Manufacturers Hyderabad.pptxPre Engineered  Building Manufacturers Hyderabad.pptx
Pre Engineered Building Manufacturers Hyderabad.pptx
 
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 MonthsSEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
 
PHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation Final
 
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All TimeCall 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentation
 
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
 
Falcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to ProsperityFalcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to Prosperity
 
Over the Top (OTT) Market Size & Growth Outlook 2024-2030
Over the Top (OTT) Market Size & Growth Outlook 2024-2030Over the Top (OTT) Market Size & Growth Outlook 2024-2030
Over the Top (OTT) Market Size & Growth Outlook 2024-2030
 
Cannabis Legalization World Map: 2024 Updated
Cannabis Legalization World Map: 2024 UpdatedCannabis Legalization World Map: 2024 Updated
Cannabis Legalization World Map: 2024 Updated
 
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al MizharAl Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
 
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
 
Mckinsey foundation level Handbook for Viewing
Mckinsey foundation level Handbook for ViewingMckinsey foundation level Handbook for Viewing
Mckinsey foundation level Handbook for Viewing
 
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
 
Falcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business Growth
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
 
Structuring and Writing DRL Mckinsey (1).pdf
Structuring and Writing DRL Mckinsey (1).pdfStructuring and Writing DRL Mckinsey (1).pdf
Structuring and Writing DRL Mckinsey (1).pdf
 
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGParadip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 

Role of it in management at SCE

  • 1. SM Modern Management and IT Matthew Rodriguez December 12, 2011 SOUTHERN CALIFORNIA EDISON
  • 2. SM Agenda • Intro to Edison • Changing landscape: Modern Landscape • Changing concerns: Cyber Security • Technology Areas @ SCE • What Can Be Done • Questions •2 SOUTHERN CALIFORNIA EDISON
  • 3. SM • Edison International, through its subsidiaries, is a generator and distributor of electric power and an investor in infrastructure and energy assets, including renewable energy. • Southern California Edison (SCE) is one of the largest electric utilities in California, serving more than 14 million people in a 50,000 square-mile area of central, coastal and Southern California, excluding the City of Los Angeles and certain other cities. • Edison Mission Group (EMG) is a holding company which acts through numerous subsidiaries to manage the competitive power generation business and other unregulated subsidiaries of Edison International. •3 SOUTHERN CALIFORNIA EDISON
  • 4. SM Changing landscape: Modern Business • Technological systems are the essential backbone of modern business operations. • More consumers are connected via technology • Businesses without a digital footprint risk extinction • A changing workforce means new management strategies (Generation X, Millennials, Gen Y) • Management in modern business have a new responsibilities •4 SOUTHERN CALIFORNIA EDISON
  • 5. SM Increasing Use in Mobile Technology • On Cyber Monday, 10.8% of people used a mobile device to visit a retailer’s site, up from 3.9% in 2010. (Source: IBM’s fourth annual Cyber Monday Benchmark, 2011) • Sixty-five percent of mobile users said they used their mobile device to find a business to make an in- store purchase (Source: Google, 2011) • Approximately 52% of smartphone users will use their device to research products, redeem coupons and use apps to assist in their holiday gift purchase (Source: Acquity Group, 2011) “Business can no longer afford a static Web strategy” •5 SOUTHERN CALIFORNIA EDISON
  • 6. SM Changing Concerns: Cyber Security • Number 1 growth area in Information Technology • Cybercriminals are becoming more sophisticated • Modern Managers need to be as vigilant about information security as they are about operations • Management today needs to understand security threats and work to ensure employees are prepared to defend the front line. •6 SOUTHERN CALIFORNIA EDISON
  • 7. SM Recent Developments in Cyber Security New developments in threat environment have raised the importance of effective cyber security: • Increase in sophistication and quantity of cyber attacks • Current defenses not preventing system compromise • Networks vacuumed on industrial-scale of valuable information resulting in loss of petabytes of information • Most targeted firms and government organizations are not aware their systems have been compromised •7 SOUTHERN CALIFORNIA EDISON
  • 8. SM Growing Areas of Concern: Cyber Security • In 2010, Internet Crime Complaint Center received the second-highest number of complaints since its inception. • It reached a milestone in 2011 with its two-millionth complaint. • On average it receives and processes 25,000 complaints per month. Internet Crime Complaint Center •8 SOUTHERN CALIFORNIA EDISON
  • 9. SM Forms of Cyber Attacks Cybercrime Hacktivism Cyber-Espionage Cyber Warfare Cybercrime – Unauthorized computer penetration for immediate financial gain Hacktivisim – Use of cyber attacks as a form of politically or ideologically motivated protest Cyber Espionage – Unauthorized computer penetration to acquire sensitive or valuable information to gain competitive advantage. Cyber Warfare – Use of cyber attacks to cause damage through severe disruption or damage of computer controlled systems. •9 SOUTHERN CALIFORNIA EDISON
  • 10. SM Technology Areas @ SCE • Transmission/Distribution Operations - SCADA • Real-time/Day Ahead Energy Market - Regulation • Customer Information – Privacy • R&D – Patents • Investor Information – Market Advantage • Personnel Information – Employee Privacy • Business Operations – Transactional Integrity “It is management’s duty to be the frontline of defense using available technology and enforcement of company policy” •10 SOUTHERN CALIFORNIA EDISON
  • 11. SM What Can Be Done Modern Managers need to: • Be aware of the changing landscape of business operations, and consumer behavior, which are increasingly dependent on technology • Be aware of emerging technological concerns that threaten business operations and data integrity. • Understand the essential role technology plays in business, and the responsibility to safeguard that technology. • Understand that technology is imperative to the success of any large company, and that cyber criminals are becoming more sophisticated. •11 SOUTHERN CALIFORNIA EDISON
  • 12. SM Thank You. •12 SOUTHERN CALIFORNIA EDISON