SlideShare uma empresa Scribd logo
1 de 38
Risk Management Using ITSG-33
Security Standards
The Smarter Everyday project is owned and operated by CTE Solutions Inc.
1
ITSG-33 Overview

Copyright 2014 Intrinsec Security

2
ITSG Contents

Copyright 2014 Intrinsec Security

3
GC Risk Management

Copyright 2014 Intrinsec Security

4
System Lifecycle

Copyright 2014 Intrinsec Security

5
System Development
Lifecycle

When does Risk Management get introduced in your department?
Copyright 2014 Intrinsec Security

6
ITSG-33 Lifecycle Approach

Copyright 2014 Intrinsec Security

7
ITSG-33 Objectives

Copyright 2014 Intrinsec Security

8
Depar tmental IT Security Risk

Copyright 2014 Intrinsec Security

9
Information System Security Risk

Copyright 2014 Intrinsec Security

10
Establishing Depar tmental
Security

Copyright 2014 Intrinsec Security

11
Defining Scope

Copyright 2014 Intrinsec Security

12
Identifying Security Needs

Copyright 2014 Intrinsec Security

13
Categorize the security

Copyright 2014 Intrinsec Security

14
TRA Methodology

Copyright 2014 Intrinsec Security

15
IT security threat assessment

Copyright 2014 Intrinsec Security

16
ITSG Deliberate Threat
Categories

Copyright 2014 Intrinsec Security

17
A note about Threat Assessments

Copyright 2014 Intrinsec Security

18
Specify security control objectives

Copyright 2014 Intrinsec Security

19
Develop departmental security control

Copyright 2014 Intrinsec Security

20
Departmental security control profiles

Copyright 2014 Intrinsec Security

21
Define business domains

Copyright 2014 Intrinsec Security

22
Define IT security approaches

Copyright 2014 Intrinsec Security

23
Depar tmental security control
profiles

Copyright 2014 Intrinsec Security

24
Approve the security control
profiles

Copyright 2014 Intrinsec Security

25
Security Controls

Copyright 2014 Intrinsec Security

26
Continuous Assessment Activities

Copyright 2014 Intrinsec Security

27
Continuous Assessment Note
•

•

Special Note regarding Continuous Assessment.
Although some activities can be performed in realtime (e.g. Security Incident and Event Management
(SIEM)), not all assessments need to be performed in
real-time and can be performed manually (e.g.
assessing backup procedures).
Further reading? NIST 800-37: ISCM for Federal
Information Systems and Organizations

Copyright 2014 Intrinsec Security

28
Security Categorization Process

Copyright 2014 Intrinsec Security

29
Categorization Levels

Copyright 2014 Intrinsec Security

30
Security Categorization Steps

Copyright 2014 Intrinsec Security

31
Categorization Step One

Copyright 2014 Intrinsec Security

32
Categorization Step Two

Copyright 2014 Intrinsec Security

33
Categorization Step Three

Copyright 2014 Intrinsec Security

34
Categorization Step Four

Copyright 2014 Intrinsec Security

35
Conclusion
•

We have spent just one hour on the ITSG-33 Security
Guidance Documentation.

• To access the ITSG-33 documentation, access:
http://www.cse-cst.gc.ca/its-sti/publications/itsgcsti/index-eng.html
•

Intrinsec Training covers all 5 appendices and has
extensive labs. For further ITSG-33 training
information, speak with your CTE Solutions
representative.

Copyright 2014 Intrinsec Security

36
TECHNICAL

Training with impact

Microsoft
VMware
Cloud Computing
IT and Cyber Security
CompTIA
Java ProgrammingLanguages
Novell
UNIX

MANAGEME BUSINESS
Change Management
TOGAF
NT
Enterprise
Architecture
ITIL
COBiT
Agile and Scrum
Business Analysis
Project
Management

37

Communication Skills
Leadership Skills
Negotiation Skills
Problem Solving Skills
Facilitation Skills
and many more…
CTE Solutions Inc. - Ottawa
11 Holland Avenue, Suite 100
Ottawa, Ontario, K1Y 4S1
 
Tel: (613) 798-5353
Toll Free: 1 (866) 635-5353
Fax: (613) 798-5574
 
 
CTE Solutions Inc. - Toronto
77 Bloor St. West, Suite 1406
Toronto, Ontario M5S 1M2
 
Tel: (416) 284-2700
Toll Free: 1 (866) 635-5353
Fax: (416) 284-6797

38

Mais conteúdo relacionado

Mais procurados

Análise comparativa entre as versões 3 e 4 do protocolo nfs em arquiteturas n...
Análise comparativa entre as versões 3 e 4 do protocolo nfs em arquiteturas n...Análise comparativa entre as versões 3 e 4 do protocolo nfs em arquiteturas n...
Análise comparativa entre as versões 3 e 4 do protocolo nfs em arquiteturas n...
Joao Galdino Mello de Souza
 
2.2 cycles de vie
2.2 cycles de vie2.2 cycles de vie
2.2 cycles de vie
Harun Mouad
 

Mais procurados (20)

Introduction à la certification itil foundation
Introduction à la certification itil foundationIntroduction à la certification itil foundation
Introduction à la certification itil foundation
 
Análise comparativa entre as versões 3 e 4 do protocolo nfs em arquiteturas n...
Análise comparativa entre as versões 3 e 4 do protocolo nfs em arquiteturas n...Análise comparativa entre as versões 3 e 4 do protocolo nfs em arquiteturas n...
Análise comparativa entre as versões 3 e 4 do protocolo nfs em arquiteturas n...
 
Presentation test de_charge_jmeter
Presentation test de_charge_jmeterPresentation test de_charge_jmeter
Presentation test de_charge_jmeter
 
Génie Logiciel.pptx
Génie Logiciel.pptxGénie Logiciel.pptx
Génie Logiciel.pptx
 
Chp1 - Introduction à l'AGL
Chp1 - Introduction à l'AGLChp1 - Introduction à l'AGL
Chp1 - Introduction à l'AGL
 
IBM MobileFirst Reference Architecture 1512 v3 2015
IBM MobileFirst Reference Architecture 1512 v3 2015IBM MobileFirst Reference Architecture 1512 v3 2015
IBM MobileFirst Reference Architecture 1512 v3 2015
 
Cours Génie Logiciel 2016
Cours Génie Logiciel 2016Cours Génie Logiciel 2016
Cours Génie Logiciel 2016
 
Exigences de qualité des systèmes / logiciels
Exigences de qualité des systèmes / logicielsExigences de qualité des systèmes / logiciels
Exigences de qualité des systèmes / logiciels
 
Schema directeur et urbanisation du si
Schema directeur et urbanisation du siSchema directeur et urbanisation du si
Schema directeur et urbanisation du si
 
Guide d'utilisation de l'outil AUDITSec basé sur la nouvelle norme ISO 27002 ...
Guide d'utilisation de l'outil AUDITSec basé sur la nouvelle norme ISO 27002 ...Guide d'utilisation de l'outil AUDITSec basé sur la nouvelle norme ISO 27002 ...
Guide d'utilisation de l'outil AUDITSec basé sur la nouvelle norme ISO 27002 ...
 
Cobit
CobitCobit
Cobit
 
Cobit5 - Outil de la performance
Cobit5   - Outil de la performanceCobit5   - Outil de la performance
Cobit5 - Outil de la performance
 
Tp1 - Eclipse
Tp1 - EclipseTp1 - Eclipse
Tp1 - Eclipse
 
Test de logiciels
Test de logiciels Test de logiciels
Test de logiciels
 
Modele mvc
Modele mvcModele mvc
Modele mvc
 
2.2 cycles de vie
2.2 cycles de vie2.2 cycles de vie
2.2 cycles de vie
 
Tp2 - OPEN ERP (2)
Tp2 - OPEN ERP (2)Tp2 - OPEN ERP (2)
Tp2 - OPEN ERP (2)
 
Integrated Project and Solution Delivery And Business Engagement Model
Integrated Project and Solution Delivery And Business Engagement ModelIntegrated Project and Solution Delivery And Business Engagement Model
Integrated Project and Solution Delivery And Business Engagement Model
 
TDD com Python
TDD com PythonTDD com Python
TDD com Python
 
Méthodologie de tests et qualité
Méthodologie de tests et qualitéMéthodologie de tests et qualité
Méthodologie de tests et qualité
 

Destaque

chips PROFILE
chips PROFILEchips PROFILE
chips PROFILE
Hendra TC
 
Presentazione c.z.gavazzi 10 aprile 13
Presentazione  c.z.gavazzi 10 aprile 13Presentazione  c.z.gavazzi 10 aprile 13
Presentazione c.z.gavazzi 10 aprile 13
Carola G.
 
Capítulo 5 vocab 1
Capítulo 5 vocab 1Capítulo 5 vocab 1
Capítulo 5 vocab 1
srtasherman
 
24th anniversary cbcvbalciv global
24th anniversary cbcvbalciv global24th anniversary cbcvbalciv global
24th anniversary cbcvbalciv global
VeteransBraintrust
 
Dossier de prensa el hierro
Dossier de prensa el hierroDossier de prensa el hierro
Dossier de prensa el hierro
Mel Pérez
 
Tirant versemblança marta, marc, david, quim
Tirant versemblança marta, marc, david, quimTirant versemblança marta, marc, david, quim
Tirant versemblança marta, marc, david, quim
imsosu
 

Destaque (20)

chips PROFILE
chips PROFILEchips PROFILE
chips PROFILE
 
Presentazione c.z.gavazzi 10 aprile 13
Presentazione  c.z.gavazzi 10 aprile 13Presentazione  c.z.gavazzi 10 aprile 13
Presentazione c.z.gavazzi 10 aprile 13
 
21 Cool Gallery Walls
21 Cool Gallery Walls21 Cool Gallery Walls
21 Cool Gallery Walls
 
Open Text And Timberland
Open Text And TimberlandOpen Text And Timberland
Open Text And Timberland
 
What makes Tikona's new broadband plans irresistible?
What makes Tikona's new broadband plans irresistible?What makes Tikona's new broadband plans irresistible?
What makes Tikona's new broadband plans irresistible?
 
Kinooze November 2012 Issue - News And Facts For Kids
Kinooze November 2012 Issue - News And Facts For KidsKinooze November 2012 Issue - News And Facts For Kids
Kinooze November 2012 Issue - News And Facts For Kids
 
Make Your Data Come Alive: Visual Design's Role in Creating Compelling Visual...
Make Your Data Come Alive: Visual Design's Role in Creating Compelling Visual...Make Your Data Come Alive: Visual Design's Role in Creating Compelling Visual...
Make Your Data Come Alive: Visual Design's Role in Creating Compelling Visual...
 
Capítulo 5 vocab 1
Capítulo 5 vocab 1Capítulo 5 vocab 1
Capítulo 5 vocab 1
 
24th anniversary cbcvbalciv global
24th anniversary cbcvbalciv global24th anniversary cbcvbalciv global
24th anniversary cbcvbalciv global
 
Directorio de Empresas Diciembre 2009
Directorio de Empresas Diciembre 2009Directorio de Empresas Diciembre 2009
Directorio de Empresas Diciembre 2009
 
Arte geroscri.html
Arte geroscri.htmlArte geroscri.html
Arte geroscri.html
 
Social CRM am CRM Forum 2014
Social CRM am CRM Forum 2014Social CRM am CRM Forum 2014
Social CRM am CRM Forum 2014
 
Mercer Hotel
Mercer HotelMercer Hotel
Mercer Hotel
 
Dossier de prensa el hierro
Dossier de prensa el hierroDossier de prensa el hierro
Dossier de prensa el hierro
 
Webwinkelvakdagen - Softlution - Plutosport - Copernica
Webwinkelvakdagen - Softlution - Plutosport - CopernicaWebwinkelvakdagen - Softlution - Plutosport - Copernica
Webwinkelvakdagen - Softlution - Plutosport - Copernica
 
Hipoxia.adipo
Hipoxia.adipoHipoxia.adipo
Hipoxia.adipo
 
Tema 5 el islam
Tema 5 el islamTema 5 el islam
Tema 5 el islam
 
Storytelling für die Energiewende
Storytelling für die EnergiewendeStorytelling für die Energiewende
Storytelling für die Energiewende
 
Week of april_19th
Week of april_19thWeek of april_19th
Week of april_19th
 
Tirant versemblança marta, marc, david, quim
Tirant versemblança marta, marc, david, quimTirant versemblança marta, marc, david, quim
Tirant versemblança marta, marc, david, quim
 

Semelhante a Risk Management using ITSG-33

Ch2 Introduction to Information Security (3).pdf
Ch2 Introduction to Information Security (3).pdfCh2 Introduction to Information Security (3).pdf
Ch2 Introduction to Information Security (3).pdf
mominabotayea1997
 

Semelhante a Risk Management using ITSG-33 (20)

ClicQA Security Testing Services GDPR
ClicQA Security Testing Services GDPRClicQA Security Testing Services GDPR
ClicQA Security Testing Services GDPR
 
Nagios Conference 2014 - Jorge Higueros - SNAPS
Nagios Conference 2014 - Jorge Higueros - SNAPSNagios Conference 2014 - Jorge Higueros - SNAPS
Nagios Conference 2014 - Jorge Higueros - SNAPS
 
ITrust Cybersecurity Services - Datasheet EN
ITrust Cybersecurity Services - Datasheet ENITrust Cybersecurity Services - Datasheet EN
ITrust Cybersecurity Services - Datasheet EN
 
Safety & Security in OT Environments - Cliff Martin, Principal Engineer, BAE ...
Safety & Security in OT Environments - Cliff Martin, Principal Engineer, BAE ...Safety & Security in OT Environments - Cliff Martin, Principal Engineer, BAE ...
Safety & Security in OT Environments - Cliff Martin, Principal Engineer, BAE ...
 
Security Fundamentals and Threat Modelling
Security Fundamentals and Threat ModellingSecurity Fundamentals and Threat Modelling
Security Fundamentals and Threat Modelling
 
Make things come alive in a secure way - Sigfox
Make things come alive in a secure way - SigfoxMake things come alive in a secure way - Sigfox
Make things come alive in a secure way - Sigfox
 
Information Assurance And Security - Chapter 1 - Lesson 4
Information Assurance And Security - Chapter 1 - Lesson 4Information Assurance And Security - Chapter 1 - Lesson 4
Information Assurance And Security - Chapter 1 - Lesson 4
 
Ch2 Introduction to Information Security (3).pdf
Ch2 Introduction to Information Security (3).pdfCh2 Introduction to Information Security (3).pdf
Ch2 Introduction to Information Security (3).pdf
 
information security management
information security managementinformation security management
information security management
 
Null application security in an agile world
Null application security in an agile worldNull application security in an agile world
Null application security in an agile world
 
Security architecture principles isys 0575general att
Security architecture principles isys 0575general attSecurity architecture principles isys 0575general att
Security architecture principles isys 0575general att
 
Cyber Security Awareness of Critical Infrastructures in North East of Italy S...
Cyber Security Awareness of Critical Infrastructures in North East of Italy S...Cyber Security Awareness of Critical Infrastructures in North East of Italy S...
Cyber Security Awareness of Critical Infrastructures in North East of Italy S...
 
All About Cyber Security Orientation Program (Foundational Level).pptx
All About Cyber Security Orientation Program (Foundational Level).pptxAll About Cyber Security Orientation Program (Foundational Level).pptx
All About Cyber Security Orientation Program (Foundational Level).pptx
 
Cloud Security Issues and Challenge.pptx
Cloud Security Issues and Challenge.pptxCloud Security Issues and Challenge.pptx
Cloud Security Issues and Challenge.pptx
 
All About Cyber Security Orientation Program (Foundational Level).pptx
All About Cyber Security Orientation Program (Foundational Level).pptxAll About Cyber Security Orientation Program (Foundational Level).pptx
All About Cyber Security Orientation Program (Foundational Level).pptx
 
Se project-methodology-for-security-project-web
Se project-methodology-for-security-project-webSe project-methodology-for-security-project-web
Se project-methodology-for-security-project-web
 
Information security.pptx
Information security.pptxInformation security.pptx
Information security.pptx
 
Securezy - A Penetration Testing Toolbox
Securezy - A Penetration Testing ToolboxSecurezy - A Penetration Testing Toolbox
Securezy - A Penetration Testing Toolbox
 
Assurance-Level Driven Method for Integrating Security into SDLC Process
Assurance-Level Driven Method for Integrating Security into SDLC ProcessAssurance-Level Driven Method for Integrating Security into SDLC Process
Assurance-Level Driven Method for Integrating Security into SDLC Process
 
Shift Left Security - The What, Why and How
Shift Left Security - The What, Why and HowShift Left Security - The What, Why and How
Shift Left Security - The What, Why and How
 

Mais de CTE Solutions Inc.

Ba why development projects fail
Ba   why development projects failBa   why development projects fail
Ba why development projects fail
CTE Solutions Inc.
 
Hyper-v for Windows Server 2012 Live Migration
Hyper-v for Windows Server 2012 Live MigrationHyper-v for Windows Server 2012 Live Migration
Hyper-v for Windows Server 2012 Live Migration
CTE Solutions Inc.
 

Mais de CTE Solutions Inc. (20)

Java 8 - New Updates and Why It Matters?
Java 8 - New Updates and Why It Matters?Java 8 - New Updates and Why It Matters?
Java 8 - New Updates and Why It Matters?
 
Understanding Lean IT
Understanding Lean ITUnderstanding Lean IT
Understanding Lean IT
 
Understanding Lean IT
Understanding Lean IT Understanding Lean IT
Understanding Lean IT
 
Exchange @ The Core with CTE Solutions
Exchange @ The Core with CTE SolutionsExchange @ The Core with CTE Solutions
Exchange @ The Core with CTE Solutions
 
Microsoft SharePoint in the Workplace
Microsoft SharePoint in the WorkplaceMicrosoft SharePoint in the Workplace
Microsoft SharePoint in the Workplace
 
Ba why development projects fail
Ba   why development projects failBa   why development projects fail
Ba why development projects fail
 
Prince2 & PMBOK Comparison Demystified
Prince2 & PMBOK Comparison DemystifiedPrince2 & PMBOK Comparison Demystified
Prince2 & PMBOK Comparison Demystified
 
Development Projects Failing? What can the Business Analyst Do?
Development Projects Failing?  What can the Business Analyst Do?Development Projects Failing?  What can the Business Analyst Do?
Development Projects Failing? What can the Business Analyst Do?
 
Project Management Essentials: Stakeholder Management
Project Management Essentials: Stakeholder ManagementProject Management Essentials: Stakeholder Management
Project Management Essentials: Stakeholder Management
 
Canadian Cloud Webcast from CTE Solutions part of Smarter Everyday Project
Canadian Cloud Webcast from CTE Solutions part of Smarter Everyday ProjectCanadian Cloud Webcast from CTE Solutions part of Smarter Everyday Project
Canadian Cloud Webcast from CTE Solutions part of Smarter Everyday Project
 
Top 5 Mistakes during ITIL implementations by CTE Solutions
Top 5 Mistakes during ITIL implementations by CTE SolutionsTop 5 Mistakes during ITIL implementations by CTE Solutions
Top 5 Mistakes during ITIL implementations by CTE Solutions
 
Business and ITSM on the same page at last! ITIL, TOGAF and COBIT working to...
Business and ITSM on the same page at last!  ITIL, TOGAF and COBIT working to...Business and ITSM on the same page at last!  ITIL, TOGAF and COBIT working to...
Business and ITSM on the same page at last! ITIL, TOGAF and COBIT working to...
 
What's New for Developers in SharePoint 2013
What's New for Developers in SharePoint 2013What's New for Developers in SharePoint 2013
What's New for Developers in SharePoint 2013
 
What's New for IT Professionals in SharePoint Server 2013
What's New for IT Professionals in SharePoint Server 2013What's New for IT Professionals in SharePoint Server 2013
What's New for IT Professionals in SharePoint Server 2013
 
The Many A's in Entperise Architecture: Archaeology, Anthropology, Analysis a...
The Many A's in Entperise Architecture: Archaeology, Anthropology, Analysis a...The Many A's in Entperise Architecture: Archaeology, Anthropology, Analysis a...
The Many A's in Entperise Architecture: Archaeology, Anthropology, Analysis a...
 
Hyper-v for Windows Server 2012 Live Migration
Hyper-v for Windows Server 2012 Live MigrationHyper-v for Windows Server 2012 Live Migration
Hyper-v for Windows Server 2012 Live Migration
 
The future of agile in organizations
The future of agile in organizationsThe future of agile in organizations
The future of agile in organizations
 
IIBA Ottawa Kick-Off Meeting: Change Management with Sandee Vincent
IIBA Ottawa Kick-Off Meeting: Change Management with Sandee VincentIIBA Ottawa Kick-Off Meeting: Change Management with Sandee Vincent
IIBA Ottawa Kick-Off Meeting: Change Management with Sandee Vincent
 
Session 3 - Windows Server 2012 with Jared Thibodeau
Session 3 - Windows Server 2012 with Jared ThibodeauSession 3 - Windows Server 2012 with Jared Thibodeau
Session 3 - Windows Server 2012 with Jared Thibodeau
 
Session 1: Windows 8 with Gerry Tessier
Session 1: Windows 8 with Gerry TessierSession 1: Windows 8 with Gerry Tessier
Session 1: Windows 8 with Gerry Tessier
 

Último

Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 

Último (20)

Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Magic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxMagic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 

Risk Management using ITSG-33