Computer Security is Good Business
What is it, what is information security, why is it needed,
how much should we invest?
In this first seminar, learn how to define information security (IS) for your organization and demonstrate the necessity of IS in your operations. Hear examples of the most common types of threats to information security and understand how to do a cost-benefits analysis to determine the extent to which your organization should proactively address known threats.
Defining Your Needs
Learn to create a security policy that supports your organization's mission. Understand the fundamentals of risk assessment and risk mitigation.
Information Security Practices
Internet, E-mail, Desktop, Personnel - learn common Best Practices and procedures and operate more securely. (Focus on procedures.)
1:15pm Common Information
Security Practices (continued)
Internet, E-mail, Desktop, Personnel - Learn common Best Practices and Procedures and operate more securely. (Focus on personnel.)
2:00pm FBI Special
Agent on Federal Computer Crime and InfraGard
Are you a victim? Would you know how to recognize a federal computer crime or how to respond? Hear an FBI Special Agent speak on fighting federal computer crime and federal crime prevention.
The Mechanisms and Technologies
Hear an overview of current technologies used in reducing IS vulnerabilities and learn of NIST resources available to your organization.