SlideShare a Scribd company logo
1 of 15
Download to read offline
Writing an effective
     data security procedure
       in 2 pages or less.


    Licensed under the Creative Commons Attribution License
                        Danny Lieberman
    dannyl@controlpolicy.com http://www.controlpolicy.com/ 

                               
Agenda


•   Introduction and welcome
•   Defining the problem
•   Too much choice
•   Workplace ethics – the Internet
•   AUP
•   Enforcement
•   Monitoring to reinforce ethical behavior




                              
Defining the problem




                      •   Means
                           –   Multiple
                               accounts
                      •   Opportunity
                           –   Multiple
                               channels
                      •   Intent
                           –   Jérôme Kerviel
                           –   Albert Gonzales

                   
What employees have


•       1995
         –   1 Company phone
         –   1 Company mail account
         –   Mozilla 1.0
•       2009
         –   N mobile devices
         –   N accounts to M applications
         –   Web 2.0




                              
Why too much choice is bad




•   Paralysis
•   Make worse decisions
•   Doing better, feeling worse.




                      
Workplace ethics – the Internet




•   Good
     –    Internet is a great work tool
•   Bad
     –    Time waster
     –    Malware
     –    Can violate privacy of other employees
     –    Sexual harassment suits



                          
Workplace ethics – the Internet




•   Ugly
     –     Loss of proprietary information
             •   Trusted insider theft
                    –   Mail, Web, IM
                    –   Smart phones
             •   Front-door attacks
                    –   Lost passwords makes it easy
             •   Back-door attacks
                    –   Spyware, Trojans
                    –   Piggy back on legit sessions



                             
Acceptable usage policy




                       •   Reduce number
                           of options by
                           default
                            –   No “opt-in”
                                check box




                    
AUP read and understand agreement




The AUP states that:
•     The Internet is to be used to further the 
      company’s business and improve customer 
      service and not for personal entertainment or 
      gain
•     Protect company assets ­ physical and digital




                            
Digital Assets




• Any computerized information that the
  firm uses to compete or accomplish it’s
  missions
     –   Customer Lists
     –   Transaction records
     –   Strategic marketing plans
     –   Credit cards



                          
Enforcement - management




•   Corporate culture
     –   A little fear in the workplace is not a bad idea 
         (Andy Grove)


•   Everyone signs
•   Managers teach




                            
Enforcement – the AUP




•   For example:
     –   “The AUP applies to laptops, PDA’s and smart­
         phones even when you’re out of the office”
           •   No downloads
           •   No offensive content
           •   Physical, password and email/web
               security




                           
Enforcement - monitoring




•   Monitoring
     –     Monitor for policy violations
             •   To protect staff and customers against
                 unlawful disclosure of personal records
             •   Loss/abuse of assets
     –     Physical
     –     Network




                             
Coming attractions




•   Sep 24:   Write a 2 page procedure
•   Oct 1:    Home(land) security
•   Oct 8:    SME data security
•   Oct 15:   Business process & security



      http://www.controlpolicy.com/workshops 

                          
Learn more




•   Presentation materials and resources
    http://www.controlpolicy.com/workshops/data-security-workshops/


•   Includes a sample AUP read and
    understand agreement in MS Word
    format.




                              

More Related Content

What's hot

China all up in your business: Annoying Persistant Threat - Dave Ockwell-Jenn...
China all up in your business: Annoying Persistant Threat - Dave Ockwell-Jenn...China all up in your business: Annoying Persistant Threat - Dave Ockwell-Jenn...
China all up in your business: Annoying Persistant Threat - Dave Ockwell-Jenn...OWASP Ottawa
 
Selling SaaS in a product world
Selling SaaS in a product worldSelling SaaS in a product world
Selling SaaS in a product worldSVPMA
 
Technology business
Technology businessTechnology business
Technology businessfukushiisa
 
Innovation Station Digital Natives
Innovation Station   Digital NativesInnovation Station   Digital Natives
Innovation Station Digital NativesAggiechic8
 
Contemporary Communication Technologies Presentation View
Contemporary Communication Technologies Presentation ViewContemporary Communication Technologies Presentation View
Contemporary Communication Technologies Presentation ViewDena Gray-Fisher
 
COCPA Central Ontario Crime Prevention Association presentation by Steve Falk
COCPA Central Ontario Crime Prevention Association presentation by Steve FalkCOCPA Central Ontario Crime Prevention Association presentation by Steve Falk
COCPA Central Ontario Crime Prevention Association presentation by Steve FalkSteve Falk
 
Legal Issues in Technology
Legal Issues in TechnologyLegal Issues in Technology
Legal Issues in TechnologyDigvijay Naruka
 
Slideshareweek6
Slideshareweek6Slideshareweek6
Slideshareweek6fukushiisa
 
Digitally enabled home_office
Digitally enabled home_officeDigitally enabled home_office
Digitally enabled home_officeFraser Henderson
 
Embracing the IT Consumerization Imperitive
Embracing the IT Consumerization ImperitiveEmbracing the IT Consumerization Imperitive
Embracing the IT Consumerization ImperitiveBarry Caplin
 

What's hot (14)

China all up in your business: Annoying Persistant Threat - Dave Ockwell-Jenn...
China all up in your business: Annoying Persistant Threat - Dave Ockwell-Jenn...China all up in your business: Annoying Persistant Threat - Dave Ockwell-Jenn...
China all up in your business: Annoying Persistant Threat - Dave Ockwell-Jenn...
 
Selling SaaS in a product world
Selling SaaS in a product worldSelling SaaS in a product world
Selling SaaS in a product world
 
Technology business
Technology businessTechnology business
Technology business
 
Innovation Station Digital Natives
Innovation Station   Digital NativesInnovation Station   Digital Natives
Innovation Station Digital Natives
 
Contemporary Communication Technologies Presentation View
Contemporary Communication Technologies Presentation ViewContemporary Communication Technologies Presentation View
Contemporary Communication Technologies Presentation View
 
COCPA Central Ontario Crime Prevention Association presentation by Steve Falk
COCPA Central Ontario Crime Prevention Association presentation by Steve FalkCOCPA Central Ontario Crime Prevention Association presentation by Steve Falk
COCPA Central Ontario Crime Prevention Association presentation by Steve Falk
 
Legal Issues in Technology
Legal Issues in TechnologyLegal Issues in Technology
Legal Issues in Technology
 
Slideshareweek6
Slideshareweek6Slideshareweek6
Slideshareweek6
 
Computer
ComputerComputer
Computer
 
Yammer session
Yammer session Yammer session
Yammer session
 
Uc14 chap16
Uc14 chap16Uc14 chap16
Uc14 chap16
 
Lecture 5
Lecture 5Lecture 5
Lecture 5
 
Digitally enabled home_office
Digitally enabled home_officeDigitally enabled home_office
Digitally enabled home_office
 
Embracing the IT Consumerization Imperitive
Embracing the IT Consumerization ImperitiveEmbracing the IT Consumerization Imperitive
Embracing the IT Consumerization Imperitive
 

Similar to Writing An Effective Security Procedure in 2 pages or less and make it stick

The Loss of Intellectual Property in the Digital Age: What Companies can d…
The Loss of Intellectual Property in the Digital Age: What Companies can d…The Loss of Intellectual Property in the Digital Age: What Companies can d…
The Loss of Intellectual Property in the Digital Age: What Companies can d…Christopher Kranich
 
Health Data Encryption: The Seven Principals of Privacy
Health Data Encryption: The Seven Principals of PrivacyHealth Data Encryption: The Seven Principals of Privacy
Health Data Encryption: The Seven Principals of PrivacyCompliancy Group
 
Homeland Security - strengthening the weakest link
Homeland Security - strengthening the weakest linkHomeland Security - strengthening the weakest link
Homeland Security - strengthening the weakest linkFlaskdata.io
 
Presentation on Information Privacy
Presentation on Information PrivacyPresentation on Information Privacy
Presentation on Information PrivacyPerry Slack
 
Privacy for tech startups
Privacy for tech startups Privacy for tech startups
Privacy for tech startups Marc Gallardo
 
6. Security Threats with E-Commerce
6. Security Threats with E-Commerce6. Security Threats with E-Commerce
6. Security Threats with E-CommerceJitendra Tomar
 
Identity-Based Privacy (IBP)
Identity-Based Privacy (IBP)Identity-Based Privacy (IBP)
Identity-Based Privacy (IBP)Igor Zboran
 
DSS ITSEC CONFERENCE - Spector360 as productivity and security tool - Riga NO...
DSS ITSEC CONFERENCE - Spector360 as productivity and security tool - Riga NO...DSS ITSEC CONFERENCE - Spector360 as productivity and security tool - Riga NO...
DSS ITSEC CONFERENCE - Spector360 as productivity and security tool - Riga NO...Andris Soroka
 
Embracing the IT Consumerization Imperitive
Embracing the IT Consumerization ImperitiveEmbracing the IT Consumerization Imperitive
Embracing the IT Consumerization ImperitiveBarry Caplin
 
Information Security: A mindset, not a product
Information Security: A mindset, not a productInformation Security: A mindset, not a product
Information Security: A mindset, not a productjaymemcree
 
The Year Ahead in Cyber Security: 2014 edition
The Year Ahead in Cyber Security: 2014 editionThe Year Ahead in Cyber Security: 2014 edition
The Year Ahead in Cyber Security: 2014 editionStephen Cobb
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness TrainingRandy Bowman
 
Ciso executive forum 2013
Ciso executive forum 2013Ciso executive forum 2013
Ciso executive forum 2013Bill Burns
 
Identity theft and data responsibilities
Identity theft and data responsibilitiesIdentity theft and data responsibilities
Identity theft and data responsibilitiesPeter Henley
 
Splunk at Aaron's Inc
Splunk at Aaron's IncSplunk at Aaron's Inc
Splunk at Aaron's IncSplunk
 
Managing Frequently Overlooked Risks & Threats (FORTS) in Corporations
Managing Frequently Overlooked Risks & Threats (FORTS) in CorporationsManaging Frequently Overlooked Risks & Threats (FORTS) in Corporations
Managing Frequently Overlooked Risks & Threats (FORTS) in CorporationsDinesh O Bareja
 
Simplitfy - Guarding your Data
Simplitfy - Guarding your DataSimplitfy - Guarding your Data
Simplitfy - Guarding your DataErick Solms
 
Service goes accessible_2013_sh
Service goes accessible_2013_shService goes accessible_2013_sh
Service goes accessible_2013_shTomppa Järvinen
 

Similar to Writing An Effective Security Procedure in 2 pages or less and make it stick (20)

The Loss of Intellectual Property in the Digital Age: What Companies can d…
The Loss of Intellectual Property in the Digital Age: What Companies can d…The Loss of Intellectual Property in the Digital Age: What Companies can d…
The Loss of Intellectual Property in the Digital Age: What Companies can d…
 
Health Data Encryption: The Seven Principals of Privacy
Health Data Encryption: The Seven Principals of PrivacyHealth Data Encryption: The Seven Principals of Privacy
Health Data Encryption: The Seven Principals of Privacy
 
Homeland Security - strengthening the weakest link
Homeland Security - strengthening the weakest linkHomeland Security - strengthening the weakest link
Homeland Security - strengthening the weakest link
 
Presentation on Information Privacy
Presentation on Information PrivacyPresentation on Information Privacy
Presentation on Information Privacy
 
Privacy for tech startups
Privacy for tech startups Privacy for tech startups
Privacy for tech startups
 
6. Security Threats with E-Commerce
6. Security Threats with E-Commerce6. Security Threats with E-Commerce
6. Security Threats with E-Commerce
 
Identity-Based Privacy (IBP)
Identity-Based Privacy (IBP)Identity-Based Privacy (IBP)
Identity-Based Privacy (IBP)
 
DSS ITSEC CONFERENCE - Spector360 as productivity and security tool - Riga NO...
DSS ITSEC CONFERENCE - Spector360 as productivity and security tool - Riga NO...DSS ITSEC CONFERENCE - Spector360 as productivity and security tool - Riga NO...
DSS ITSEC CONFERENCE - Spector360 as productivity and security tool - Riga NO...
 
Embracing the IT Consumerization Imperitive
Embracing the IT Consumerization ImperitiveEmbracing the IT Consumerization Imperitive
Embracing the IT Consumerization Imperitive
 
Information Security: A mindset, not a product
Information Security: A mindset, not a productInformation Security: A mindset, not a product
Information Security: A mindset, not a product
 
The Year Ahead in Cyber Security: 2014 edition
The Year Ahead in Cyber Security: 2014 editionThe Year Ahead in Cyber Security: 2014 edition
The Year Ahead in Cyber Security: 2014 edition
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness Training
 
Ciso executive forum 2013
Ciso executive forum 2013Ciso executive forum 2013
Ciso executive forum 2013
 
Identity theft and data responsibilities
Identity theft and data responsibilitiesIdentity theft and data responsibilities
Identity theft and data responsibilities
 
Splunk at Aaron's Inc
Splunk at Aaron's IncSplunk at Aaron's Inc
Splunk at Aaron's Inc
 
Hackers
HackersHackers
Hackers
 
Managing Frequently Overlooked Risks & Threats (FORTS) in Corporations
Managing Frequently Overlooked Risks & Threats (FORTS) in CorporationsManaging Frequently Overlooked Risks & Threats (FORTS) in Corporations
Managing Frequently Overlooked Risks & Threats (FORTS) in Corporations
 
Simplitfy - Guarding your Data
Simplitfy - Guarding your DataSimplitfy - Guarding your Data
Simplitfy - Guarding your Data
 
Wipo smes ge_08_topic07
Wipo smes ge_08_topic07Wipo smes ge_08_topic07
Wipo smes ge_08_topic07
 
Service goes accessible_2013_sh
Service goes accessible_2013_shService goes accessible_2013_sh
Service goes accessible_2013_sh
 

More from Flaskdata.io

Flaskdata - Observability for clinical data
Flaskdata - Observability for clinical dataFlaskdata - Observability for clinical data
Flaskdata - Observability for clinical dataFlaskdata.io
 
The travel industry does real-time. Why doesn't clinical research?
The travel industry does real-time. Why doesn't clinical research?The travel industry does real-time. Why doesn't clinical research?
The travel industry does real-time. Why doesn't clinical research?Flaskdata.io
 
Flaskdata.io automated monitoring for clinical trials
Flaskdata.io automated monitoring for clinical trialsFlaskdata.io automated monitoring for clinical trials
Flaskdata.io automated monitoring for clinical trialsFlaskdata.io
 
How to write secure code
How to write secure codeHow to write secure code
How to write secure codeFlaskdata.io
 
The insights that will help your medtech clinical trial succeed
The insights that will help your medtech clinical trial succeedThe insights that will help your medtech clinical trial succeed
The insights that will help your medtech clinical trial succeedFlaskdata.io
 
2017 02-05 en-eu-data-security_v2
2017 02-05 en-eu-data-security_v22017 02-05 en-eu-data-security_v2
2017 02-05 en-eu-data-security_v2Flaskdata.io
 
Quick user guide to the Clear Clinica Cloud EDC system
Quick user guide to the Clear Clinica Cloud EDC systemQuick user guide to the Clear Clinica Cloud EDC system
Quick user guide to the Clear Clinica Cloud EDC systemFlaskdata.io
 
Killed by code 2015
Killed by code 2015Killed by code 2015
Killed by code 2015Flaskdata.io
 
Killed by code 2015
Killed by code 2015Killed by code 2015
Killed by code 2015Flaskdata.io
 
Pathcare: Patient-issue oriented healthcare
Pathcare: Patient-issue oriented healthcarePathcare: Patient-issue oriented healthcare
Pathcare: Patient-issue oriented healthcareFlaskdata.io
 
Will Web 2.0 applications break the cloud?
Will Web 2.0 applications break the cloud?Will Web 2.0 applications break the cloud?
Will Web 2.0 applications break the cloud?Flaskdata.io
 
Killed by code - mobile medical devices
Killed by code - mobile medical devicesKilled by code - mobile medical devices
Killed by code - mobile medical devicesFlaskdata.io
 
Data Security For Compliance 2
Data Security For Compliance 2Data Security For Compliance 2
Data Security For Compliance 2Flaskdata.io
 
Data Security Metricsa Value Based Approach
Data Security Metricsa Value Based ApproachData Security Metricsa Value Based Approach
Data Security Metricsa Value Based ApproachFlaskdata.io
 
Selling Data Security Technology
Selling Data Security TechnologySelling Data Security Technology
Selling Data Security TechnologyFlaskdata.io
 

More from Flaskdata.io (17)

Flaskdata - Observability for clinical data
Flaskdata - Observability for clinical dataFlaskdata - Observability for clinical data
Flaskdata - Observability for clinical data
 
The travel industry does real-time. Why doesn't clinical research?
The travel industry does real-time. Why doesn't clinical research?The travel industry does real-time. Why doesn't clinical research?
The travel industry does real-time. Why doesn't clinical research?
 
Flaskdata.io automated monitoring for clinical trials
Flaskdata.io automated monitoring for clinical trialsFlaskdata.io automated monitoring for clinical trials
Flaskdata.io automated monitoring for clinical trials
 
How to write secure code
How to write secure codeHow to write secure code
How to write secure code
 
The insights that will help your medtech clinical trial succeed
The insights that will help your medtech clinical trial succeedThe insights that will help your medtech clinical trial succeed
The insights that will help your medtech clinical trial succeed
 
2017 02-05 en-eu-data-security_v2
2017 02-05 en-eu-data-security_v22017 02-05 en-eu-data-security_v2
2017 02-05 en-eu-data-security_v2
 
Quick user guide to the Clear Clinica Cloud EDC system
Quick user guide to the Clear Clinica Cloud EDC systemQuick user guide to the Clear Clinica Cloud EDC system
Quick user guide to the Clear Clinica Cloud EDC system
 
Killed by code 2015
Killed by code 2015Killed by code 2015
Killed by code 2015
 
Killed by code 2015
Killed by code 2015Killed by code 2015
Killed by code 2015
 
Pathcare: Patient-issue oriented healthcare
Pathcare: Patient-issue oriented healthcarePathcare: Patient-issue oriented healthcare
Pathcare: Patient-issue oriented healthcare
 
The Tao of GRC
The Tao of GRCThe Tao of GRC
The Tao of GRC
 
Will Web 2.0 applications break the cloud?
Will Web 2.0 applications break the cloud?Will Web 2.0 applications break the cloud?
Will Web 2.0 applications break the cloud?
 
Killed by code - mobile medical devices
Killed by code - mobile medical devicesKilled by code - mobile medical devices
Killed by code - mobile medical devices
 
Grc tao.4
Grc tao.4Grc tao.4
Grc tao.4
 
Data Security For Compliance 2
Data Security For Compliance 2Data Security For Compliance 2
Data Security For Compliance 2
 
Data Security Metricsa Value Based Approach
Data Security Metricsa Value Based ApproachData Security Metricsa Value Based Approach
Data Security Metricsa Value Based Approach
 
Selling Data Security Technology
Selling Data Security TechnologySelling Data Security Technology
Selling Data Security Technology
 

Writing An Effective Security Procedure in 2 pages or less and make it stick

  • 1. Writing an effective data security procedure in 2 pages or less. Licensed under the Creative Commons Attribution License Danny Lieberman dannyl@controlpolicy.com http://www.controlpolicy.com/     
  • 2. Agenda • Introduction and welcome • Defining the problem • Too much choice • Workplace ethics – the Internet • AUP • Enforcement • Monitoring to reinforce ethical behavior    
  • 3. Defining the problem • Means – Multiple accounts • Opportunity – Multiple channels • Intent – Jérôme Kerviel – Albert Gonzales    
  • 4. What employees have • 1995 – 1 Company phone – 1 Company mail account – Mozilla 1.0 • 2009 – N mobile devices – N accounts to M applications – Web 2.0    
  • 5. Why too much choice is bad • Paralysis • Make worse decisions • Doing better, feeling worse.    
  • 6. Workplace ethics – the Internet • Good – Internet is a great work tool • Bad – Time waster – Malware – Can violate privacy of other employees – Sexual harassment suits    
  • 7. Workplace ethics – the Internet • Ugly – Loss of proprietary information • Trusted insider theft – Mail, Web, IM – Smart phones • Front-door attacks – Lost passwords makes it easy • Back-door attacks – Spyware, Trojans – Piggy back on legit sessions    
  • 8. Acceptable usage policy • Reduce number of options by default – No “opt-in” check box    
  • 9. AUP read and understand agreement The AUP states that: • The Internet is to be used to further the  company’s business and improve customer  service and not for personal entertainment or  gain • Protect company assets ­ physical and digital    
  • 10. Digital Assets • Any computerized information that the firm uses to compete or accomplish it’s missions – Customer Lists – Transaction records – Strategic marketing plans – Credit cards    
  • 11. Enforcement - management • Corporate culture – A little fear in the workplace is not a bad idea  (Andy Grove) • Everyone signs • Managers teach    
  • 12. Enforcement – the AUP • For example: – “The AUP applies to laptops, PDA’s and smart­ phones even when you’re out of the office” • No downloads • No offensive content • Physical, password and email/web security    
  • 13. Enforcement - monitoring • Monitoring – Monitor for policy violations • To protect staff and customers against unlawful disclosure of personal records • Loss/abuse of assets – Physical – Network    
  • 14. Coming attractions • Sep 24: Write a 2 page procedure • Oct 1: Home(land) security • Oct 8: SME data security • Oct 15: Business process & security http://www.controlpolicy.com/workshops     
  • 15. Learn more • Presentation materials and resources http://www.controlpolicy.com/workshops/data-security-workshops/ • Includes a sample AUP read and understand agreement in MS Word format.