Title: What if?
1 What if?
2- An employee has an online Blog which discloses
confidential or sensitive information.
3 What if?
4- A racist email is sent around your office.
5 What if?
6- An employee brings a virus into your I.T systems
while trying to print his kids project.
7(No Transcript)
8- The impact on your organisation
- Reputational risk
- Financial loss
- Regulatory scrutiny
- Competitive disadvantage
- Management distraction
9- Three steps to meeting these challenges
- Make a start communicate what you have
- Take a best practice approach such as BS7799 (now
ISO27001) - Automate your processes
10Three steps to meeting these challenges
- Make a start communicate what you have
- Take a best practice approach such as BS7799 (now
ISO27001) - Automate your processes
11Todays 4 Biggest Business Concerns According to
IDC
Special Study Navigating the client Security
Fog Final Report, Feb. 05, IDC 05C4375
12Todays 4 Biggest Business Concerns According to
IDC
Special Study Navigating the client Security
Fog Final Report, Feb. 05, IDC 05C4375
13I.T Security
Government Legislation
Regulatory Compliance
Employee Behaviour
14Surveys policy understanding
Creates audit trail
Allows feedback
Enforces affirmation
Electronically delivers company Policies
15(No Transcript)
16(No Transcript)
17(No Transcript)
18(No Transcript)
19Public Service Announcements
20Policy communication workflow
Company Information Messages
- Individual Employees
- Groups of Employees
- All Employees
Disemination
21Policy communication workflow
- Company Standards
- Employee handbooks
- Policies
- Instructions
- Reminders
- Information
- Company updates
Affirmation
Communication
Understanding
Action
Employee
Logging Auditing
Company
22Policy communication workflow
- Company Standards
- Employee handbooks
- Policies
- Instructions
- Reminders
- Information
- Company updates
Affirmation
Understanding
Action
Employee
Company