SlideShare uma empresa Scribd logo
1 de 24
Information Security In the Age of Wikileaks David Barton Principal, UHY LLP
Objectives Basics of Information Security New Threats New Techniques Back to Basics 2 © 2011 UHY LLP
Basics of Information Security Confidentiality Integrity Availability 3 © 2011 UHY LLP
Basics of Information Security Confidentiality Ensuring information is accessible only to those authorized to have access 4 © 2011 UHY LLP
Basics of Information Security Integrity assurance that data is consistent, certified and can be reconciled cannot be modified without detection 5 © 2011 UHY LLP
Basics of Information Security Availability Ensuring information is accessible and ready to use  s 6 © 2011 UHY LLP
Wikileaks international non-profit organization that publishes submissions of private, secret, and classified media from anonymous sources Founded 2006  Became household name October 2010 when they published 400,000 documents related to Iraq war 7 © 2011 UHY LLP
What’s New  New privacy legislation IP more important than ever Mobile computing Data storage Wireless computing Social Media Cloud Computing 8 © 2011 UHY LLP
What’s New  New privacy legislation almost daily April 2011 – Kerry and McCain introduce federal consumer privacy bill  December 8, 2010, the U.S. House of Representatives approved the Social Security Number Protection Act of 2010 (S. 3789) December 18, 2010, President Obama signed into law the Red Flag Program Clarification Act. California and Massachusetts have very strong personal information privacy laws, other states following  9 © 2011 UHY LLP
What’s New  Intellectual Property Estimated value of more than $5 trillion Over 33% of value of all US corporations Includes: Software Music & film Patents Formulas 10 © 2011 UHY LLP
What’s New  Mobile computing Employee owned smartphones will represent over half of business smartphones shipped by 2013 54% of employees already use their own mobile devices for business purposes (sanctioned or not)1  2/3 of IT organizations say maintaining security for mobile is primary concern2 11 1 – Yankee Group  Survey       2 – CIO / Computerworld survey © 2011 UHY LLP
What’s New  Data Storage Cell phones can store many gigabytes iPod can be used as a portable drive USB flash drives – 128 gig are common Cloud – google docs, amazon, etc.  USB portable drives – 2 Terabytes the size of pack of cigarettes 12 © 2011 UHY LLP
What’s New  Wireless computing Over the air transmission of all kinds of data including IP Almost ubiquitous Dec ‘95 – 13% Dec ‘10 – 96% Public access is not always secure 13 © 2011 UHY LLP
What’s New  Social Media – you must protect against: Disclosure of confidential data Solicitation of employees Solicitation of customers Defamation Negative publicity 14 © 2011 UHY LLP
What’s New  Cloud Computing Loss of governance (control) – no longer fully aware of who has access, where data is, roles/responsibilities Multi-tenancy – not an issue in private computing Commingling – will your data be mixed in with other clients?  How will it be segregated? Ineffective data deletion – if you change providers does your data get destroyed? Legal issues – if Company A has their data subpoenaed and your data is also on the same physical device, what happens to your data? 15 © 2011 UHY LLP
What to Do??? Risk can be: Accepted (no action taken) Transferred (bonding, insurance) Mitigated (create controls) 16 © 2011 UHY LLP
New Techniques MSSP – Managed Security Service Providers Remote perimeter management Managed security monitoring Content filtering Penetration testing DLP – Data Leak Prevention Cyberinsurance 17 © 2011 UHY LLP
Back to Basics Policies, policies, policies Data classification Invest in security Training 18 © 2011 UHY LLP
Policies Why are policies important? They ensure upper management involvement  They outline expectations  Best and least expensive way to communicate They are a permanent record of organization’s intent They enable enforcement 19 © 2011 UHY LLP
Data Classification Public or non-classified Internal use – only for use inside the organization Confidential – should be strongly protected against unauthorized use and disclosure Secret – very limited access with very strong protection 20 © 2011 UHY LLP
Invest in Security Appropriate security spend depends on data classification Understand cost / benefit Invest more to protect top secret data Invest less to protect public or internal data 21 © 2011 UHY LLP
Train your People 22 People are the weakest link Everyone is different Goals and objectives don’t always align “Why” is important Not enough to know what the policy is Also need to know why it is in place Lots of examples help reinforce Train often People forget so they have to be reminded New threats everyday
Questions? 23
David Barton, Principal UHY LLP Five Concourse Parkway Suite 2430 Atlanta, GA 30328 678-602-4490 24

Mais conteúdo relacionado

Mais procurados

Privacy in the digital space
Privacy in the digital spacePrivacy in the digital space
Privacy in the digital spaceYves Sinka
 
IoT & Big Data - A privacy-oriented view of the future
IoT & Big Data - A privacy-oriented view of the futureIoT & Big Data - A privacy-oriented view of the future
IoT & Big Data - A privacy-oriented view of the futureFacundo Mauricio
 
Chp10 public policy
Chp10 public policyChp10 public policy
Chp10 public policyEngr Razaque
 
12th July GDPR event slides
12th July GDPR event slides12th July GDPR event slides
12th July GDPR event slidesExponential_e
 
Legal instrumentation in e commerce
Legal instrumentation in e commerceLegal instrumentation in e commerce
Legal instrumentation in e commerceUjjwal Joshi
 
Legal & moral issues in e commerce
Legal & moral issues in e commerceLegal & moral issues in e commerce
Legal & moral issues in e commerceDamo Ward
 
Week 6 legal and ethical issues associated with modern technologies - anita...
Week 6   legal and ethical issues associated with modern technologies - anita...Week 6   legal and ethical issues associated with modern technologies - anita...
Week 6 legal and ethical issues associated with modern technologies - anita...mchellehemp
 
A smarter, more secure io t gartner iam summit uk 2015 - netiq - travis greene
A smarter, more secure io t  gartner iam summit uk 2015 - netiq - travis greeneA smarter, more secure io t  gartner iam summit uk 2015 - netiq - travis greene
A smarter, more secure io t gartner iam summit uk 2015 - netiq - travis greenebmcmenemy
 
Be aware of the laws in South Africa that apply to email
Be aware of the laws in South Africa that apply to emailBe aware of the laws in South Africa that apply to email
Be aware of the laws in South Africa that apply to emailLance Michalson
 
StartPad Countdown 6 - ACLU 2.0: Demand Your dotRights
StartPad Countdown 6 - ACLU 2.0: Demand Your dotRightsStartPad Countdown 6 - ACLU 2.0: Demand Your dotRights
StartPad Countdown 6 - ACLU 2.0: Demand Your dotRightsStart Pad
 
Customers in the cloud pulse final
Customers in the cloud   pulse finalCustomers in the cloud   pulse final
Customers in the cloud pulse finalFLUZO
 
Lily lim data privacy ownership and ethics
Lily lim data privacy ownership and ethicsLily lim data privacy ownership and ethics
Lily lim data privacy ownership and ethicsMassTLC
 
Privacy, Data Security and Anti-Spam Compliance
Privacy, Data Security and Anti-Spam CompliancePrivacy, Data Security and Anti-Spam Compliance
Privacy, Data Security and Anti-Spam ComplianceDan Michaluk
 
The Data Protection Act
The Data Protection ActThe Data Protection Act
The Data Protection Actburto111
 
Legal ethical issues E commerce
Legal ethical issues E commerceLegal ethical issues E commerce
Legal ethical issues E commerceWisnu Dewobroto
 
social, legal and ethical issues of e-commerce..
social, legal and ethical issues of e-commerce..social, legal and ethical issues of e-commerce..
social, legal and ethical issues of e-commerce..home based
 

Mais procurados (19)

Privacy in the digital space
Privacy in the digital spacePrivacy in the digital space
Privacy in the digital space
 
Legal Services
Legal ServicesLegal Services
Legal Services
 
IoT & Big Data - A privacy-oriented view of the future
IoT & Big Data - A privacy-oriented view of the futureIoT & Big Data - A privacy-oriented view of the future
IoT & Big Data - A privacy-oriented view of the future
 
Chp10 public policy
Chp10 public policyChp10 public policy
Chp10 public policy
 
12th July GDPR event slides
12th July GDPR event slides12th July GDPR event slides
12th July GDPR event slides
 
Legal instrumentation in e commerce
Legal instrumentation in e commerceLegal instrumentation in e commerce
Legal instrumentation in e commerce
 
Ethical issues of IS
Ethical issues of ISEthical issues of IS
Ethical issues of IS
 
Legal & moral issues in e commerce
Legal & moral issues in e commerceLegal & moral issues in e commerce
Legal & moral issues in e commerce
 
Week 6 legal and ethical issues associated with modern technologies - anita...
Week 6   legal and ethical issues associated with modern technologies - anita...Week 6   legal and ethical issues associated with modern technologies - anita...
Week 6 legal and ethical issues associated with modern technologies - anita...
 
A smarter, more secure io t gartner iam summit uk 2015 - netiq - travis greene
A smarter, more secure io t  gartner iam summit uk 2015 - netiq - travis greeneA smarter, more secure io t  gartner iam summit uk 2015 - netiq - travis greene
A smarter, more secure io t gartner iam summit uk 2015 - netiq - travis greene
 
Be aware of the laws in South Africa that apply to email
Be aware of the laws in South Africa that apply to emailBe aware of the laws in South Africa that apply to email
Be aware of the laws in South Africa that apply to email
 
StartPad Countdown 6 - ACLU 2.0: Demand Your dotRights
StartPad Countdown 6 - ACLU 2.0: Demand Your dotRightsStartPad Countdown 6 - ACLU 2.0: Demand Your dotRights
StartPad Countdown 6 - ACLU 2.0: Demand Your dotRights
 
Customers in the cloud pulse final
Customers in the cloud   pulse finalCustomers in the cloud   pulse final
Customers in the cloud pulse final
 
Lily lim data privacy ownership and ethics
Lily lim data privacy ownership and ethicsLily lim data privacy ownership and ethics
Lily lim data privacy ownership and ethics
 
Privacy, Data Security and Anti-Spam Compliance
Privacy, Data Security and Anti-Spam CompliancePrivacy, Data Security and Anti-Spam Compliance
Privacy, Data Security and Anti-Spam Compliance
 
The Data Protection Act
The Data Protection ActThe Data Protection Act
The Data Protection Act
 
Legal ethical issues E commerce
Legal ethical issues E commerceLegal ethical issues E commerce
Legal ethical issues E commerce
 
social, legal and ethical issues of e-commerce..
social, legal and ethical issues of e-commerce..social, legal and ethical issues of e-commerce..
social, legal and ethical issues of e-commerce..
 
E-Commerce 10
E-Commerce 10E-Commerce 10
E-Commerce 10
 

Destaque

ΕΠΙΣΚΕΨΗ ΤΗΣ ΣΤ ΤΑΞΗΣ ΣΤΟ ΚΠΕ ΒΕΛΒΕΝΤΟΥ-ΣΙΑΤΙΣΤΑΣ
ΕΠΙΣΚΕΨΗ ΤΗΣ ΣΤ ΤΑΞΗΣ ΣΤΟ ΚΠΕ ΒΕΛΒΕΝΤΟΥ-ΣΙΑΤΙΣΤΑΣΕΠΙΣΚΕΨΗ ΤΗΣ ΣΤ ΤΑΞΗΣ ΣΤΟ ΚΠΕ ΒΕΛΒΕΝΤΟΥ-ΣΙΑΤΙΣΤΑΣ
ΕΠΙΣΚΕΨΗ ΤΗΣ ΣΤ ΤΑΞΗΣ ΣΤΟ ΚΠΕ ΒΕΛΒΕΝΤΟΥ-ΣΙΑΤΙΣΤΑΣjtsiropin
 
ΕΠΙΣΚΕΨΗ ΤΗΣ Ε΄ ΤΑΞΗΣ ΣΤΟ ΚΠΕ ΕΥΕΡΓΕΤΟΥΛΑ ΛΕΣΒΟΥ
ΕΠΙΣΚΕΨΗ ΤΗΣ Ε΄ ΤΑΞΗΣ ΣΤΟ ΚΠΕ ΕΥΕΡΓΕΤΟΥΛΑ ΛΕΣΒΟΥΕΠΙΣΚΕΨΗ ΤΗΣ Ε΄ ΤΑΞΗΣ ΣΤΟ ΚΠΕ ΕΥΕΡΓΕΤΟΥΛΑ ΛΕΣΒΟΥ
ΕΠΙΣΚΕΨΗ ΤΗΣ Ε΄ ΤΑΞΗΣ ΣΤΟ ΚΠΕ ΕΥΕΡΓΕΤΟΥΛΑ ΛΕΣΒΟΥjtsiropin
 
ΕΠΙΣΚΕΨΗ ΤΗΣ ΣΤ΄ΤΑΞΗΣ ΣΤΟΝ ΠΟΛΥΧΩΡΟ "ΑΓΙΟ ΓΑΛΑΣ"
ΕΠΙΣΚΕΨΗ ΤΗΣ ΣΤ΄ΤΑΞΗΣ ΣΤΟΝ ΠΟΛΥΧΩΡΟ "ΑΓΙΟ ΓΑΛΑΣ"ΕΠΙΣΚΕΨΗ ΤΗΣ ΣΤ΄ΤΑΞΗΣ ΣΤΟΝ ΠΟΛΥΧΩΡΟ "ΑΓΙΟ ΓΑΛΑΣ"
ΕΠΙΣΚΕΨΗ ΤΗΣ ΣΤ΄ΤΑΞΗΣ ΣΤΟΝ ΠΟΛΥΧΩΡΟ "ΑΓΙΟ ΓΑΛΑΣ"jtsiropin
 
6η ΕΚΘΕΣΗ ΠΑΙΔΙΚΟΥ ΒΙΒΛΙΟΥ_32x48
6η ΕΚΘΕΣΗ ΠΑΙΔΙΚΟΥ ΒΙΒΛΙΟΥ_32x486η ΕΚΘΕΣΗ ΠΑΙΔΙΚΟΥ ΒΙΒΛΙΟΥ_32x48
6η ΕΚΘΕΣΗ ΠΑΙΔΙΚΟΥ ΒΙΒΛΙΟΥ_32x48jtsiropin
 
ΠΡΟΓΡΑΜΜΑ etwinning ΑΠΟ ΤΟΥΣ ΜΑΘΗΤΕΣ ΤΗΣ ΣΤ ΤΑΞΗΣ
ΠΡΟΓΡΑΜΜΑ etwinning ΑΠΟ ΤΟΥΣ ΜΑΘΗΤΕΣ ΤΗΣ ΣΤ ΤΑΞΗΣΠΡΟΓΡΑΜΜΑ etwinning ΑΠΟ ΤΟΥΣ ΜΑΘΗΤΕΣ ΤΗΣ ΣΤ ΤΑΞΗΣ
ΠΡΟΓΡΑΜΜΑ etwinning ΑΠΟ ΤΟΥΣ ΜΑΘΗΤΕΣ ΤΗΣ ΣΤ ΤΑΞΗΣjtsiropin
 
ΕΚΠΑΙΔΕΥΤΙΚΟ ΠΡΟΓΡΑΜΜΑ ΣΤΟ ΜΑΘΗΜΑ ΤΩΝ ΑΓΓΛΙΚΩΝ Β΄ΤΑΞΗΣ
ΕΚΠΑΙΔΕΥΤΙΚΟ ΠΡΟΓΡΑΜΜΑ ΣΤΟ ΜΑΘΗΜΑ ΤΩΝ ΑΓΓΛΙΚΩΝ Β΄ΤΑΞΗΣΕΚΠΑΙΔΕΥΤΙΚΟ ΠΡΟΓΡΑΜΜΑ ΣΤΟ ΜΑΘΗΜΑ ΤΩΝ ΑΓΓΛΙΚΩΝ Β΄ΤΑΞΗΣ
ΕΚΠΑΙΔΕΥΤΙΚΟ ΠΡΟΓΡΑΜΜΑ ΣΤΟ ΜΑΘΗΜΑ ΤΩΝ ΑΓΓΛΙΚΩΝ Β΄ΤΑΞΗΣjtsiropin
 
Ο ΣΥΓΓΡΑΦΕΑΣ ΒΑΓΓΕΛΗΣ ΗΛΙΟΠΟΥΛΟΣ ΣΤΟ ΣΧΟΛΕΙΟ ΜΑΣ ΣΤΑ ΠΛΑΙΣΙΑ ΕΚΠΑΙΔΕΥΤΙΚΟΥ ΠΡ...
Ο ΣΥΓΓΡΑΦΕΑΣ ΒΑΓΓΕΛΗΣ ΗΛΙΟΠΟΥΛΟΣ ΣΤΟ ΣΧΟΛΕΙΟ ΜΑΣ ΣΤΑ ΠΛΑΙΣΙΑ ΕΚΠΑΙΔΕΥΤΙΚΟΥ ΠΡ...Ο ΣΥΓΓΡΑΦΕΑΣ ΒΑΓΓΕΛΗΣ ΗΛΙΟΠΟΥΛΟΣ ΣΤΟ ΣΧΟΛΕΙΟ ΜΑΣ ΣΤΑ ΠΛΑΙΣΙΑ ΕΚΠΑΙΔΕΥΤΙΚΟΥ ΠΡ...
Ο ΣΥΓΓΡΑΦΕΑΣ ΒΑΓΓΕΛΗΣ ΗΛΙΟΠΟΥΛΟΣ ΣΤΟ ΣΧΟΛΕΙΟ ΜΑΣ ΣΤΑ ΠΛΑΙΣΙΑ ΕΚΠΑΙΔΕΥΤΙΚΟΥ ΠΡ...jtsiropin
 
ΚΑΛΟΚΑΙΡΙΝΗ ΕΟΡΤΗ Α΄ ΤΑΞΗΣ ΜΕ ΘΕΜΑ ΤΗΝ ΥΓΙΕΙΝΗ ΔΙΑΤΡΟΦΗ
ΚΑΛΟΚΑΙΡΙΝΗ ΕΟΡΤΗ Α΄ ΤΑΞΗΣ ΜΕ ΘΕΜΑ ΤΗΝ ΥΓΙΕΙΝΗ ΔΙΑΤΡΟΦΗΚΑΛΟΚΑΙΡΙΝΗ ΕΟΡΤΗ Α΄ ΤΑΞΗΣ ΜΕ ΘΕΜΑ ΤΗΝ ΥΓΙΕΙΝΗ ΔΙΑΤΡΟΦΗ
ΚΑΛΟΚΑΙΡΙΝΗ ΕΟΡΤΗ Α΄ ΤΑΞΗΣ ΜΕ ΘΕΜΑ ΤΗΝ ΥΓΙΕΙΝΗ ΔΙΑΤΡΟΦΗjtsiropin
 
ΧΡΙΣΤΟΥΓΕΝΝΙΑΤΙΚΕΣ ΕΥΧΕΣ
ΧΡΙΣΤΟΥΓΕΝΝΙΑΤΙΚΕΣ ΕΥΧΕΣΧΡΙΣΤΟΥΓΕΝΝΙΑΤΙΚΕΣ ΕΥΧΕΣ
ΧΡΙΣΤΟΥΓΕΝΝΙΑΤΙΚΕΣ ΕΥΧΕΣjtsiropin
 
ΠΡΟΓΡΑΜΜΑ ΚΥΚΛΟΦΟΡΙΑΚΗΣ ΑΓΩΓΗΣ Γ΄ ΤΑΞΗΣ
ΠΡΟΓΡΑΜΜΑ ΚΥΚΛΟΦΟΡΙΑΚΗΣ ΑΓΩΓΗΣ Γ΄ ΤΑΞΗΣΠΡΟΓΡΑΜΜΑ ΚΥΚΛΟΦΟΡΙΑΚΗΣ ΑΓΩΓΗΣ Γ΄ ΤΑΞΗΣ
ΠΡΟΓΡΑΜΜΑ ΚΥΚΛΟΦΟΡΙΑΚΗΣ ΑΓΩΓΗΣ Γ΄ ΤΑΞΗΣjtsiropin
 
ΕΟΡΤΗ 25ης ΜΑΡΤΙΟΥ ΑΠΟ ΤΟΥΣ ΜΑΘΗΤΕΣ ΤΗΣ ΣΤ΄ΤΑΞΗΣ
ΕΟΡΤΗ 25ης ΜΑΡΤΙΟΥ ΑΠΟ ΤΟΥΣ ΜΑΘΗΤΕΣ ΤΗΣ ΣΤ΄ΤΑΞΗΣΕΟΡΤΗ 25ης ΜΑΡΤΙΟΥ ΑΠΟ ΤΟΥΣ ΜΑΘΗΤΕΣ ΤΗΣ ΣΤ΄ΤΑΞΗΣ
ΕΟΡΤΗ 25ης ΜΑΡΤΙΟΥ ΑΠΟ ΤΟΥΣ ΜΑΘΗΤΕΣ ΤΗΣ ΣΤ΄ΤΑΞΗΣjtsiropin
 
ΕΚΠΑΙΔΕΥΤΙΚΟ ΠΡΟΓΡΑΜΜΑ ΣΤΟ ΜΑΘΗΜΑ ΤΒΝ ΑΓΓΛΙΚΩΝ Β΄ΤΑΞΗΣ
ΕΚΠΑΙΔΕΥΤΙΚΟ ΠΡΟΓΡΑΜΜΑ ΣΤΟ ΜΑΘΗΜΑ ΤΒΝ ΑΓΓΛΙΚΩΝ Β΄ΤΑΞΗΣΕΚΠΑΙΔΕΥΤΙΚΟ ΠΡΟΓΡΑΜΜΑ ΣΤΟ ΜΑΘΗΜΑ ΤΒΝ ΑΓΓΛΙΚΩΝ Β΄ΤΑΞΗΣ
ΕΚΠΑΙΔΕΥΤΙΚΟ ΠΡΟΓΡΑΜΜΑ ΣΤΟ ΜΑΘΗΜΑ ΤΒΝ ΑΓΓΛΙΚΩΝ Β΄ΤΑΞΗΣjtsiropin
 
ΕΝΑ ΣΧΟΛΕΙΟ ΓΙΑ ΟΛΟΥΣ
ΕΝΑ ΣΧΟΛΕΙΟ ΓΙΑ ΟΛΟΥΣΕΝΑ ΣΧΟΛΕΙΟ ΓΙΑ ΟΛΟΥΣ
ΕΝΑ ΣΧΟΛΕΙΟ ΓΙΑ ΟΛΟΥΣjtsiropin
 
ΠΡΟΣΚΛΗΣΗ
ΠΡΟΣΚΛΗΣΗΠΡΟΣΚΛΗΣΗ
ΠΡΟΣΚΛΗΣΗjtsiropin
 
ΘΕΑΤΡΙΚΗ ΠΑΡΑΣΤΑΣΗ "Ο ΑΛΗΘΙΝΟΣ ΤΡΙΚΕΡΑΤΩΨ ΦΟΒΑΤΑΙ;"
ΘΕΑΤΡΙΚΗ ΠΑΡΑΣΤΑΣΗ "Ο ΑΛΗΘΙΝΟΣ ΤΡΙΚΕΡΑΤΩΨ ΦΟΒΑΤΑΙ;"ΘΕΑΤΡΙΚΗ ΠΑΡΑΣΤΑΣΗ "Ο ΑΛΗΘΙΝΟΣ ΤΡΙΚΕΡΑΤΩΨ ΦΟΒΑΤΑΙ;"
ΘΕΑΤΡΙΚΗ ΠΑΡΑΣΤΑΣΗ "Ο ΑΛΗΘΙΝΟΣ ΤΡΙΚΕΡΑΤΩΨ ΦΟΒΑΤΑΙ;"jtsiropin
 
ΤΟ ΧΡΙΣΤΟΥΓΕΝΝΙΑΤΙΚΟ ΠΑΖΑΡΙ ΤΟΥ ΣΧΟΛΕΙΟΥ ΜΑΣ
ΤΟ ΧΡΙΣΤΟΥΓΕΝΝΙΑΤΙΚΟ ΠΑΖΑΡΙ ΤΟΥ ΣΧΟΛΕΙΟΥ ΜΑΣΤΟ ΧΡΙΣΤΟΥΓΕΝΝΙΑΤΙΚΟ ΠΑΖΑΡΙ ΤΟΥ ΣΧΟΛΕΙΟΥ ΜΑΣ
ΤΟ ΧΡΙΣΤΟΥΓΕΝΝΙΑΤΙΚΟ ΠΑΖΑΡΙ ΤΟΥ ΣΧΟΛΕΙΟΥ ΜΑΣjtsiropin
 
ΕΟΡΤΗ 17ης ΝΟΕΜΒΡΙΟΥ (ΕΠΕΤΕΙΟΣ ΠΟΛΥΤΕΧΝΕΙΟΥ)
ΕΟΡΤΗ 17ης ΝΟΕΜΒΡΙΟΥ (ΕΠΕΤΕΙΟΣ ΠΟΛΥΤΕΧΝΕΙΟΥ)ΕΟΡΤΗ 17ης ΝΟΕΜΒΡΙΟΥ (ΕΠΕΤΕΙΟΣ ΠΟΛΥΤΕΧΝΕΙΟΥ)
ΕΟΡΤΗ 17ης ΝΟΕΜΒΡΙΟΥ (ΕΠΕΤΕΙΟΣ ΠΟΛΥΤΕΧΝΕΙΟΥ)jtsiropin
 
ΕΚΠΑΙΔΕΥΤΙΚΟ ΠΡΟΓΡΑΜΜΑ "ΟΤΑΝ Η ΓΗ ΘΥΜΩΝΕΙ..."
ΕΚΠΑΙΔΕΥΤΙΚΟ ΠΡΟΓΡΑΜΜΑ "ΟΤΑΝ Η ΓΗ ΘΥΜΩΝΕΙ..."ΕΚΠΑΙΔΕΥΤΙΚΟ ΠΡΟΓΡΑΜΜΑ "ΟΤΑΝ Η ΓΗ ΘΥΜΩΝΕΙ..."
ΕΚΠΑΙΔΕΥΤΙΚΟ ΠΡΟΓΡΑΜΜΑ "ΟΤΑΝ Η ΓΗ ΘΥΜΩΝΕΙ..."jtsiropin
 
ΕΟΡΤΗ 11ης ΝΟΕΜΒΡΙΟΥ
ΕΟΡΤΗ 11ης ΝΟΕΜΒΡΙΟΥΕΟΡΤΗ 11ης ΝΟΕΜΒΡΙΟΥ
ΕΟΡΤΗ 11ης ΝΟΕΜΒΡΙΟΥjtsiropin
 

Destaque (20)

ΕΠΙΣΚΕΨΗ ΤΗΣ ΣΤ ΤΑΞΗΣ ΣΤΟ ΚΠΕ ΒΕΛΒΕΝΤΟΥ-ΣΙΑΤΙΣΤΑΣ
ΕΠΙΣΚΕΨΗ ΤΗΣ ΣΤ ΤΑΞΗΣ ΣΤΟ ΚΠΕ ΒΕΛΒΕΝΤΟΥ-ΣΙΑΤΙΣΤΑΣΕΠΙΣΚΕΨΗ ΤΗΣ ΣΤ ΤΑΞΗΣ ΣΤΟ ΚΠΕ ΒΕΛΒΕΝΤΟΥ-ΣΙΑΤΙΣΤΑΣ
ΕΠΙΣΚΕΨΗ ΤΗΣ ΣΤ ΤΑΞΗΣ ΣΤΟ ΚΠΕ ΒΕΛΒΕΝΤΟΥ-ΣΙΑΤΙΣΤΑΣ
 
ΕΠΙΣΚΕΨΗ ΤΗΣ Ε΄ ΤΑΞΗΣ ΣΤΟ ΚΠΕ ΕΥΕΡΓΕΤΟΥΛΑ ΛΕΣΒΟΥ
ΕΠΙΣΚΕΨΗ ΤΗΣ Ε΄ ΤΑΞΗΣ ΣΤΟ ΚΠΕ ΕΥΕΡΓΕΤΟΥΛΑ ΛΕΣΒΟΥΕΠΙΣΚΕΨΗ ΤΗΣ Ε΄ ΤΑΞΗΣ ΣΤΟ ΚΠΕ ΕΥΕΡΓΕΤΟΥΛΑ ΛΕΣΒΟΥ
ΕΠΙΣΚΕΨΗ ΤΗΣ Ε΄ ΤΑΞΗΣ ΣΤΟ ΚΠΕ ΕΥΕΡΓΕΤΟΥΛΑ ΛΕΣΒΟΥ
 
ΕΠΙΣΚΕΨΗ ΤΗΣ ΣΤ΄ΤΑΞΗΣ ΣΤΟΝ ΠΟΛΥΧΩΡΟ "ΑΓΙΟ ΓΑΛΑΣ"
ΕΠΙΣΚΕΨΗ ΤΗΣ ΣΤ΄ΤΑΞΗΣ ΣΤΟΝ ΠΟΛΥΧΩΡΟ "ΑΓΙΟ ΓΑΛΑΣ"ΕΠΙΣΚΕΨΗ ΤΗΣ ΣΤ΄ΤΑΞΗΣ ΣΤΟΝ ΠΟΛΥΧΩΡΟ "ΑΓΙΟ ΓΑΛΑΣ"
ΕΠΙΣΚΕΨΗ ΤΗΣ ΣΤ΄ΤΑΞΗΣ ΣΤΟΝ ΠΟΛΥΧΩΡΟ "ΑΓΙΟ ΓΑΛΑΣ"
 
6η ΕΚΘΕΣΗ ΠΑΙΔΙΚΟΥ ΒΙΒΛΙΟΥ_32x48
6η ΕΚΘΕΣΗ ΠΑΙΔΙΚΟΥ ΒΙΒΛΙΟΥ_32x486η ΕΚΘΕΣΗ ΠΑΙΔΙΚΟΥ ΒΙΒΛΙΟΥ_32x48
6η ΕΚΘΕΣΗ ΠΑΙΔΙΚΟΥ ΒΙΒΛΙΟΥ_32x48
 
ΠΡΟΓΡΑΜΜΑ etwinning ΑΠΟ ΤΟΥΣ ΜΑΘΗΤΕΣ ΤΗΣ ΣΤ ΤΑΞΗΣ
ΠΡΟΓΡΑΜΜΑ etwinning ΑΠΟ ΤΟΥΣ ΜΑΘΗΤΕΣ ΤΗΣ ΣΤ ΤΑΞΗΣΠΡΟΓΡΑΜΜΑ etwinning ΑΠΟ ΤΟΥΣ ΜΑΘΗΤΕΣ ΤΗΣ ΣΤ ΤΑΞΗΣ
ΠΡΟΓΡΑΜΜΑ etwinning ΑΠΟ ΤΟΥΣ ΜΑΘΗΤΕΣ ΤΗΣ ΣΤ ΤΑΞΗΣ
 
ΕΚΠΑΙΔΕΥΤΙΚΟ ΠΡΟΓΡΑΜΜΑ ΣΤΟ ΜΑΘΗΜΑ ΤΩΝ ΑΓΓΛΙΚΩΝ Β΄ΤΑΞΗΣ
ΕΚΠΑΙΔΕΥΤΙΚΟ ΠΡΟΓΡΑΜΜΑ ΣΤΟ ΜΑΘΗΜΑ ΤΩΝ ΑΓΓΛΙΚΩΝ Β΄ΤΑΞΗΣΕΚΠΑΙΔΕΥΤΙΚΟ ΠΡΟΓΡΑΜΜΑ ΣΤΟ ΜΑΘΗΜΑ ΤΩΝ ΑΓΓΛΙΚΩΝ Β΄ΤΑΞΗΣ
ΕΚΠΑΙΔΕΥΤΙΚΟ ΠΡΟΓΡΑΜΜΑ ΣΤΟ ΜΑΘΗΜΑ ΤΩΝ ΑΓΓΛΙΚΩΝ Β΄ΤΑΞΗΣ
 
ΕΥΧΕΣ
ΕΥΧΕΣΕΥΧΕΣ
ΕΥΧΕΣ
 
Ο ΣΥΓΓΡΑΦΕΑΣ ΒΑΓΓΕΛΗΣ ΗΛΙΟΠΟΥΛΟΣ ΣΤΟ ΣΧΟΛΕΙΟ ΜΑΣ ΣΤΑ ΠΛΑΙΣΙΑ ΕΚΠΑΙΔΕΥΤΙΚΟΥ ΠΡ...
Ο ΣΥΓΓΡΑΦΕΑΣ ΒΑΓΓΕΛΗΣ ΗΛΙΟΠΟΥΛΟΣ ΣΤΟ ΣΧΟΛΕΙΟ ΜΑΣ ΣΤΑ ΠΛΑΙΣΙΑ ΕΚΠΑΙΔΕΥΤΙΚΟΥ ΠΡ...Ο ΣΥΓΓΡΑΦΕΑΣ ΒΑΓΓΕΛΗΣ ΗΛΙΟΠΟΥΛΟΣ ΣΤΟ ΣΧΟΛΕΙΟ ΜΑΣ ΣΤΑ ΠΛΑΙΣΙΑ ΕΚΠΑΙΔΕΥΤΙΚΟΥ ΠΡ...
Ο ΣΥΓΓΡΑΦΕΑΣ ΒΑΓΓΕΛΗΣ ΗΛΙΟΠΟΥΛΟΣ ΣΤΟ ΣΧΟΛΕΙΟ ΜΑΣ ΣΤΑ ΠΛΑΙΣΙΑ ΕΚΠΑΙΔΕΥΤΙΚΟΥ ΠΡ...
 
ΚΑΛΟΚΑΙΡΙΝΗ ΕΟΡΤΗ Α΄ ΤΑΞΗΣ ΜΕ ΘΕΜΑ ΤΗΝ ΥΓΙΕΙΝΗ ΔΙΑΤΡΟΦΗ
ΚΑΛΟΚΑΙΡΙΝΗ ΕΟΡΤΗ Α΄ ΤΑΞΗΣ ΜΕ ΘΕΜΑ ΤΗΝ ΥΓΙΕΙΝΗ ΔΙΑΤΡΟΦΗΚΑΛΟΚΑΙΡΙΝΗ ΕΟΡΤΗ Α΄ ΤΑΞΗΣ ΜΕ ΘΕΜΑ ΤΗΝ ΥΓΙΕΙΝΗ ΔΙΑΤΡΟΦΗ
ΚΑΛΟΚΑΙΡΙΝΗ ΕΟΡΤΗ Α΄ ΤΑΞΗΣ ΜΕ ΘΕΜΑ ΤΗΝ ΥΓΙΕΙΝΗ ΔΙΑΤΡΟΦΗ
 
ΧΡΙΣΤΟΥΓΕΝΝΙΑΤΙΚΕΣ ΕΥΧΕΣ
ΧΡΙΣΤΟΥΓΕΝΝΙΑΤΙΚΕΣ ΕΥΧΕΣΧΡΙΣΤΟΥΓΕΝΝΙΑΤΙΚΕΣ ΕΥΧΕΣ
ΧΡΙΣΤΟΥΓΕΝΝΙΑΤΙΚΕΣ ΕΥΧΕΣ
 
ΠΡΟΓΡΑΜΜΑ ΚΥΚΛΟΦΟΡΙΑΚΗΣ ΑΓΩΓΗΣ Γ΄ ΤΑΞΗΣ
ΠΡΟΓΡΑΜΜΑ ΚΥΚΛΟΦΟΡΙΑΚΗΣ ΑΓΩΓΗΣ Γ΄ ΤΑΞΗΣΠΡΟΓΡΑΜΜΑ ΚΥΚΛΟΦΟΡΙΑΚΗΣ ΑΓΩΓΗΣ Γ΄ ΤΑΞΗΣ
ΠΡΟΓΡΑΜΜΑ ΚΥΚΛΟΦΟΡΙΑΚΗΣ ΑΓΩΓΗΣ Γ΄ ΤΑΞΗΣ
 
ΕΟΡΤΗ 25ης ΜΑΡΤΙΟΥ ΑΠΟ ΤΟΥΣ ΜΑΘΗΤΕΣ ΤΗΣ ΣΤ΄ΤΑΞΗΣ
ΕΟΡΤΗ 25ης ΜΑΡΤΙΟΥ ΑΠΟ ΤΟΥΣ ΜΑΘΗΤΕΣ ΤΗΣ ΣΤ΄ΤΑΞΗΣΕΟΡΤΗ 25ης ΜΑΡΤΙΟΥ ΑΠΟ ΤΟΥΣ ΜΑΘΗΤΕΣ ΤΗΣ ΣΤ΄ΤΑΞΗΣ
ΕΟΡΤΗ 25ης ΜΑΡΤΙΟΥ ΑΠΟ ΤΟΥΣ ΜΑΘΗΤΕΣ ΤΗΣ ΣΤ΄ΤΑΞΗΣ
 
ΕΚΠΑΙΔΕΥΤΙΚΟ ΠΡΟΓΡΑΜΜΑ ΣΤΟ ΜΑΘΗΜΑ ΤΒΝ ΑΓΓΛΙΚΩΝ Β΄ΤΑΞΗΣ
ΕΚΠΑΙΔΕΥΤΙΚΟ ΠΡΟΓΡΑΜΜΑ ΣΤΟ ΜΑΘΗΜΑ ΤΒΝ ΑΓΓΛΙΚΩΝ Β΄ΤΑΞΗΣΕΚΠΑΙΔΕΥΤΙΚΟ ΠΡΟΓΡΑΜΜΑ ΣΤΟ ΜΑΘΗΜΑ ΤΒΝ ΑΓΓΛΙΚΩΝ Β΄ΤΑΞΗΣ
ΕΚΠΑΙΔΕΥΤΙΚΟ ΠΡΟΓΡΑΜΜΑ ΣΤΟ ΜΑΘΗΜΑ ΤΒΝ ΑΓΓΛΙΚΩΝ Β΄ΤΑΞΗΣ
 
ΕΝΑ ΣΧΟΛΕΙΟ ΓΙΑ ΟΛΟΥΣ
ΕΝΑ ΣΧΟΛΕΙΟ ΓΙΑ ΟΛΟΥΣΕΝΑ ΣΧΟΛΕΙΟ ΓΙΑ ΟΛΟΥΣ
ΕΝΑ ΣΧΟΛΕΙΟ ΓΙΑ ΟΛΟΥΣ
 
ΠΡΟΣΚΛΗΣΗ
ΠΡΟΣΚΛΗΣΗΠΡΟΣΚΛΗΣΗ
ΠΡΟΣΚΛΗΣΗ
 
ΘΕΑΤΡΙΚΗ ΠΑΡΑΣΤΑΣΗ "Ο ΑΛΗΘΙΝΟΣ ΤΡΙΚΕΡΑΤΩΨ ΦΟΒΑΤΑΙ;"
ΘΕΑΤΡΙΚΗ ΠΑΡΑΣΤΑΣΗ "Ο ΑΛΗΘΙΝΟΣ ΤΡΙΚΕΡΑΤΩΨ ΦΟΒΑΤΑΙ;"ΘΕΑΤΡΙΚΗ ΠΑΡΑΣΤΑΣΗ "Ο ΑΛΗΘΙΝΟΣ ΤΡΙΚΕΡΑΤΩΨ ΦΟΒΑΤΑΙ;"
ΘΕΑΤΡΙΚΗ ΠΑΡΑΣΤΑΣΗ "Ο ΑΛΗΘΙΝΟΣ ΤΡΙΚΕΡΑΤΩΨ ΦΟΒΑΤΑΙ;"
 
ΤΟ ΧΡΙΣΤΟΥΓΕΝΝΙΑΤΙΚΟ ΠΑΖΑΡΙ ΤΟΥ ΣΧΟΛΕΙΟΥ ΜΑΣ
ΤΟ ΧΡΙΣΤΟΥΓΕΝΝΙΑΤΙΚΟ ΠΑΖΑΡΙ ΤΟΥ ΣΧΟΛΕΙΟΥ ΜΑΣΤΟ ΧΡΙΣΤΟΥΓΕΝΝΙΑΤΙΚΟ ΠΑΖΑΡΙ ΤΟΥ ΣΧΟΛΕΙΟΥ ΜΑΣ
ΤΟ ΧΡΙΣΤΟΥΓΕΝΝΙΑΤΙΚΟ ΠΑΖΑΡΙ ΤΟΥ ΣΧΟΛΕΙΟΥ ΜΑΣ
 
ΕΟΡΤΗ 17ης ΝΟΕΜΒΡΙΟΥ (ΕΠΕΤΕΙΟΣ ΠΟΛΥΤΕΧΝΕΙΟΥ)
ΕΟΡΤΗ 17ης ΝΟΕΜΒΡΙΟΥ (ΕΠΕΤΕΙΟΣ ΠΟΛΥΤΕΧΝΕΙΟΥ)ΕΟΡΤΗ 17ης ΝΟΕΜΒΡΙΟΥ (ΕΠΕΤΕΙΟΣ ΠΟΛΥΤΕΧΝΕΙΟΥ)
ΕΟΡΤΗ 17ης ΝΟΕΜΒΡΙΟΥ (ΕΠΕΤΕΙΟΣ ΠΟΛΥΤΕΧΝΕΙΟΥ)
 
ΕΚΠΑΙΔΕΥΤΙΚΟ ΠΡΟΓΡΑΜΜΑ "ΟΤΑΝ Η ΓΗ ΘΥΜΩΝΕΙ..."
ΕΚΠΑΙΔΕΥΤΙΚΟ ΠΡΟΓΡΑΜΜΑ "ΟΤΑΝ Η ΓΗ ΘΥΜΩΝΕΙ..."ΕΚΠΑΙΔΕΥΤΙΚΟ ΠΡΟΓΡΑΜΜΑ "ΟΤΑΝ Η ΓΗ ΘΥΜΩΝΕΙ..."
ΕΚΠΑΙΔΕΥΤΙΚΟ ΠΡΟΓΡΑΜΜΑ "ΟΤΑΝ Η ΓΗ ΘΥΜΩΝΕΙ..."
 
ΕΟΡΤΗ 11ης ΝΟΕΜΒΡΙΟΥ
ΕΟΡΤΗ 11ης ΝΟΕΜΒΡΙΟΥΕΟΡΤΗ 11ης ΝΟΕΜΒΡΙΟΥ
ΕΟΡΤΗ 11ης ΝΟΕΜΒΡΙΟΥ
 

Semelhante a Information Security in the Age of Wikileaks

eMetrics Summit Boston 2014 - Big Data for Marketing - Privacy Principles & P...
eMetrics Summit Boston 2014 - Big Data for Marketing - Privacy Principles & P...eMetrics Summit Boston 2014 - Big Data for Marketing - Privacy Principles & P...
eMetrics Summit Boston 2014 - Big Data for Marketing - Privacy Principles & P...Aurélie Pols
 
A Framework of Purpose and Consent for Data Security and Consumer Privacy
A Framework of Purpose and Consent for Data Security and Consumer PrivacyA Framework of Purpose and Consent for Data Security and Consumer Privacy
A Framework of Purpose and Consent for Data Security and Consumer PrivacyAurélie Pols
 
Cybersecurity and Data Privacy
Cybersecurity and Data PrivacyCybersecurity and Data Privacy
Cybersecurity and Data PrivacyWilmerHale
 
Storm on the Horizon: Data Governance & Security vs. Employee Privacy
Storm on the Horizon: Data Governance & Security vs. Employee PrivacyStorm on the Horizon: Data Governance & Security vs. Employee Privacy
Storm on the Horizon: Data Governance & Security vs. Employee PrivacyAurélie Pols
 
ICAANZ VPDSS presentation by Paul O'Connor
ICAANZ VPDSS presentation by Paul O'ConnorICAANZ VPDSS presentation by Paul O'Connor
ICAANZ VPDSS presentation by Paul O'ConnorPaul O'Connor
 
LexisNexis Webinar: Mobile Privacy: An Overview of Legal and Legislative Deve...
LexisNexis Webinar: Mobile Privacy: An Overview of Legal and Legislative Deve...LexisNexis Webinar: Mobile Privacy: An Overview of Legal and Legislative Deve...
LexisNexis Webinar: Mobile Privacy: An Overview of Legal and Legislative Deve...VALLOYD
 
Accellion - The European Information Security Summit, London
Accellion - The European Information Security Summit, LondonAccellion - The European Information Security Summit, London
Accellion - The European Information Security Summit, LondonProofpoint
 
Malcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
Malcolm Crompton, IIS Partners Irish Future Internet Forum - SocioeconomicsMalcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
Malcolm Crompton, IIS Partners Irish Future Internet Forum - SocioeconomicsIrish Future Internet Forum
 
Security And Legal In The Cloud Ats V2
Security And Legal In The Cloud Ats V2Security And Legal In The Cloud Ats V2
Security And Legal In The Cloud Ats V2dbarton944
 
Guide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secureGuide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secureCalgary Scientific Inc.
 
Legal and ethical issues modern technologies
Legal and ethical issues                            modern technologiesLegal and ethical issues                            modern technologies
Legal and ethical issues modern technologiesrgermosen
 
Where In The World Is Your Sensitive Data?
Where In The World Is Your Sensitive Data?Where In The World Is Your Sensitive Data?
Where In The World Is Your Sensitive Data?Druva
 
Top 10 Security Trends of 2012
Top 10 Security Trends of 2012Top 10 Security Trends of 2012
Top 10 Security Trends of 2012IDT911
 
Chapter 2PrivacyBased on slides prepared by Cyndi C.docx
Chapter 2PrivacyBased on slides prepared by Cyndi C.docxChapter 2PrivacyBased on slides prepared by Cyndi C.docx
Chapter 2PrivacyBased on slides prepared by Cyndi C.docxwalterl4
 
Compliance audit under the Information Technology Act, 2000
Compliance audit under the Information Technology Act, 2000Compliance audit under the Information Technology Act, 2000
Compliance audit under the Information Technology Act, 2000Sagar Rahurkar
 
Smarter comm"The Future of Privacy". Aurélie Pols at IBM Smarter Commerce Glo...
Smarter comm"The Future of Privacy". Aurélie Pols at IBM Smarter Commerce Glo...Smarter comm"The Future of Privacy". Aurélie Pols at IBM Smarter Commerce Glo...
Smarter comm"The Future of Privacy". Aurélie Pols at IBM Smarter Commerce Glo...FLUZO
 
6102015 1 McGraw-Hill-Ryerson ©2015 The McGraw-Hill .docx
6102015 1 McGraw-Hill-Ryerson ©2015 The McGraw-Hill .docx6102015 1 McGraw-Hill-Ryerson ©2015 The McGraw-Hill .docx
6102015 1 McGraw-Hill-Ryerson ©2015 The McGraw-Hill .docxevonnehoggarth79783
 
Don't Panic. Making Progress on the 'Going Dark' Debate
Don't Panic. Making Progress on the 'Going Dark' DebateDon't Panic. Making Progress on the 'Going Dark' Debate
Don't Panic. Making Progress on the 'Going Dark' DebateFabio Chiusi
 
Big data contains valuable information - Protect It!
Big data contains valuable information - Protect It!Big data contains valuable information - Protect It!
Big data contains valuable information - Protect It!Praveenkumar Hosangadi
 

Semelhante a Information Security in the Age of Wikileaks (20)

eMetrics Summit Boston 2014 - Big Data for Marketing - Privacy Principles & P...
eMetrics Summit Boston 2014 - Big Data for Marketing - Privacy Principles & P...eMetrics Summit Boston 2014 - Big Data for Marketing - Privacy Principles & P...
eMetrics Summit Boston 2014 - Big Data for Marketing - Privacy Principles & P...
 
A Framework of Purpose and Consent for Data Security and Consumer Privacy
A Framework of Purpose and Consent for Data Security and Consumer PrivacyA Framework of Purpose and Consent for Data Security and Consumer Privacy
A Framework of Purpose and Consent for Data Security and Consumer Privacy
 
Cybersecurity and Data Privacy
Cybersecurity and Data PrivacyCybersecurity and Data Privacy
Cybersecurity and Data Privacy
 
Storm on the Horizon: Data Governance & Security vs. Employee Privacy
Storm on the Horizon: Data Governance & Security vs. Employee PrivacyStorm on the Horizon: Data Governance & Security vs. Employee Privacy
Storm on the Horizon: Data Governance & Security vs. Employee Privacy
 
Abubakar munir iisf2011
Abubakar munir iisf2011Abubakar munir iisf2011
Abubakar munir iisf2011
 
ICAANZ VPDSS presentation by Paul O'Connor
ICAANZ VPDSS presentation by Paul O'ConnorICAANZ VPDSS presentation by Paul O'Connor
ICAANZ VPDSS presentation by Paul O'Connor
 
LexisNexis Webinar: Mobile Privacy: An Overview of Legal and Legislative Deve...
LexisNexis Webinar: Mobile Privacy: An Overview of Legal and Legislative Deve...LexisNexis Webinar: Mobile Privacy: An Overview of Legal and Legislative Deve...
LexisNexis Webinar: Mobile Privacy: An Overview of Legal and Legislative Deve...
 
Accellion - The European Information Security Summit, London
Accellion - The European Information Security Summit, LondonAccellion - The European Information Security Summit, London
Accellion - The European Information Security Summit, London
 
Malcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
Malcolm Crompton, IIS Partners Irish Future Internet Forum - SocioeconomicsMalcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
Malcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
 
Security And Legal In The Cloud Ats V2
Security And Legal In The Cloud Ats V2Security And Legal In The Cloud Ats V2
Security And Legal In The Cloud Ats V2
 
Guide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secureGuide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secure
 
Legal and ethical issues modern technologies
Legal and ethical issues                            modern technologiesLegal and ethical issues                            modern technologies
Legal and ethical issues modern technologies
 
Where In The World Is Your Sensitive Data?
Where In The World Is Your Sensitive Data?Where In The World Is Your Sensitive Data?
Where In The World Is Your Sensitive Data?
 
Top 10 Security Trends of 2012
Top 10 Security Trends of 2012Top 10 Security Trends of 2012
Top 10 Security Trends of 2012
 
Chapter 2PrivacyBased on slides prepared by Cyndi C.docx
Chapter 2PrivacyBased on slides prepared by Cyndi C.docxChapter 2PrivacyBased on slides prepared by Cyndi C.docx
Chapter 2PrivacyBased on slides prepared by Cyndi C.docx
 
Compliance audit under the Information Technology Act, 2000
Compliance audit under the Information Technology Act, 2000Compliance audit under the Information Technology Act, 2000
Compliance audit under the Information Technology Act, 2000
 
Smarter comm"The Future of Privacy". Aurélie Pols at IBM Smarter Commerce Glo...
Smarter comm"The Future of Privacy". Aurélie Pols at IBM Smarter Commerce Glo...Smarter comm"The Future of Privacy". Aurélie Pols at IBM Smarter Commerce Glo...
Smarter comm"The Future of Privacy". Aurélie Pols at IBM Smarter Commerce Glo...
 
6102015 1 McGraw-Hill-Ryerson ©2015 The McGraw-Hill .docx
6102015 1 McGraw-Hill-Ryerson ©2015 The McGraw-Hill .docx6102015 1 McGraw-Hill-Ryerson ©2015 The McGraw-Hill .docx
6102015 1 McGraw-Hill-Ryerson ©2015 The McGraw-Hill .docx
 
Don't Panic. Making Progress on the 'Going Dark' Debate
Don't Panic. Making Progress on the 'Going Dark' DebateDon't Panic. Making Progress on the 'Going Dark' Debate
Don't Panic. Making Progress on the 'Going Dark' Debate
 
Big data contains valuable information - Protect It!
Big data contains valuable information - Protect It!Big data contains valuable information - Protect It!
Big data contains valuable information - Protect It!
 

Information Security in the Age of Wikileaks

  • 1. Information Security In the Age of Wikileaks David Barton Principal, UHY LLP
  • 2. Objectives Basics of Information Security New Threats New Techniques Back to Basics 2 © 2011 UHY LLP
  • 3. Basics of Information Security Confidentiality Integrity Availability 3 © 2011 UHY LLP
  • 4. Basics of Information Security Confidentiality Ensuring information is accessible only to those authorized to have access 4 © 2011 UHY LLP
  • 5. Basics of Information Security Integrity assurance that data is consistent, certified and can be reconciled cannot be modified without detection 5 © 2011 UHY LLP
  • 6. Basics of Information Security Availability Ensuring information is accessible and ready to use s 6 © 2011 UHY LLP
  • 7. Wikileaks international non-profit organization that publishes submissions of private, secret, and classified media from anonymous sources Founded 2006 Became household name October 2010 when they published 400,000 documents related to Iraq war 7 © 2011 UHY LLP
  • 8. What’s New New privacy legislation IP more important than ever Mobile computing Data storage Wireless computing Social Media Cloud Computing 8 © 2011 UHY LLP
  • 9. What’s New New privacy legislation almost daily April 2011 – Kerry and McCain introduce federal consumer privacy bill December 8, 2010, the U.S. House of Representatives approved the Social Security Number Protection Act of 2010 (S. 3789) December 18, 2010, President Obama signed into law the Red Flag Program Clarification Act. California and Massachusetts have very strong personal information privacy laws, other states following 9 © 2011 UHY LLP
  • 10. What’s New Intellectual Property Estimated value of more than $5 trillion Over 33% of value of all US corporations Includes: Software Music & film Patents Formulas 10 © 2011 UHY LLP
  • 11. What’s New Mobile computing Employee owned smartphones will represent over half of business smartphones shipped by 2013 54% of employees already use their own mobile devices for business purposes (sanctioned or not)1 2/3 of IT organizations say maintaining security for mobile is primary concern2 11 1 – Yankee Group Survey 2 – CIO / Computerworld survey © 2011 UHY LLP
  • 12. What’s New Data Storage Cell phones can store many gigabytes iPod can be used as a portable drive USB flash drives – 128 gig are common Cloud – google docs, amazon, etc. USB portable drives – 2 Terabytes the size of pack of cigarettes 12 © 2011 UHY LLP
  • 13. What’s New Wireless computing Over the air transmission of all kinds of data including IP Almost ubiquitous Dec ‘95 – 13% Dec ‘10 – 96% Public access is not always secure 13 © 2011 UHY LLP
  • 14. What’s New Social Media – you must protect against: Disclosure of confidential data Solicitation of employees Solicitation of customers Defamation Negative publicity 14 © 2011 UHY LLP
  • 15. What’s New Cloud Computing Loss of governance (control) – no longer fully aware of who has access, where data is, roles/responsibilities Multi-tenancy – not an issue in private computing Commingling – will your data be mixed in with other clients? How will it be segregated? Ineffective data deletion – if you change providers does your data get destroyed? Legal issues – if Company A has their data subpoenaed and your data is also on the same physical device, what happens to your data? 15 © 2011 UHY LLP
  • 16. What to Do??? Risk can be: Accepted (no action taken) Transferred (bonding, insurance) Mitigated (create controls) 16 © 2011 UHY LLP
  • 17. New Techniques MSSP – Managed Security Service Providers Remote perimeter management Managed security monitoring Content filtering Penetration testing DLP – Data Leak Prevention Cyberinsurance 17 © 2011 UHY LLP
  • 18. Back to Basics Policies, policies, policies Data classification Invest in security Training 18 © 2011 UHY LLP
  • 19. Policies Why are policies important? They ensure upper management involvement They outline expectations Best and least expensive way to communicate They are a permanent record of organization’s intent They enable enforcement 19 © 2011 UHY LLP
  • 20. Data Classification Public or non-classified Internal use – only for use inside the organization Confidential – should be strongly protected against unauthorized use and disclosure Secret – very limited access with very strong protection 20 © 2011 UHY LLP
  • 21. Invest in Security Appropriate security spend depends on data classification Understand cost / benefit Invest more to protect top secret data Invest less to protect public or internal data 21 © 2011 UHY LLP
  • 22. Train your People 22 People are the weakest link Everyone is different Goals and objectives don’t always align “Why” is important Not enough to know what the policy is Also need to know why it is in place Lots of examples help reinforce Train often People forget so they have to be reminded New threats everyday
  • 24. David Barton, Principal UHY LLP Five Concourse Parkway Suite 2430 Atlanta, GA 30328 678-602-4490 24

Notas do Editor

  1. Thank AITP for having me.
  2. That means read, update, write, delete.
  3. Everyone wants their data to be consistent. No one wants their checking account balance or their mortgage balance to fluctuate day to day unless they are writing checks. You don’t want your resume on Monster to change unless you change it.
  4. You want your information and data to be there when you need it. Ever go to your favorite website only to be told “Under maintenance, please check back later”. Imagine you go to Gmail one day and ALL of your email is gone. You have a “welcome to Gmail” message and that’s it. That’s what happened to 144,000 gmail users a few months back.
  5. I only put this slide up because this website is what got a lot of businesses and government agencies thinking about their information security.
  6. would require companies to notify consumers in clear language when their data is being collected and oblige them to keep that information safe from hackers. The bill, if it becomes law, would require companies to tell consumers why data was being collected, whom it would be shared with and how it would be safeguarded. (GrahamLeachBliley?)Epsilon marketing data breach – how many got emails?RedflagProgram Clarification: The Red Flags Rule requires many businesses and organizations to implement a written Identity Theft Prevention Program to detect the warning signs — or "red flags" — of identity theft in their day-to-day operations.Huge compliance implications particularly for large national or international organizations
  7. As we have moved from agrarian to industrial to knowledge and service based economy, IP has become our most important asset collectivelyIP isn’t new but it’s importance and value may not be readily recognized by most companiesBig exception – Coca-Cola. The formula has remained secret for 125 years.
  8. Employee is at son’s soccer game. Project team sends an email. If employee can access email via mobile device, question gets answered almost immediately – no delayIf employee cannot get email – decision is delayed until next business dayIf employee is hourly and is answering email after hours that employee may be eligible for overtime.
  9. Easy to conceal – high capacity1 Gb894,784 pages of plaintext (1,200 characters) 4,473 books (200 pages or 240,000 characters) 341 digital pictures (with 3MB average file size) 256 MP3 audio files (with 4MB average file size)1 Tb916,259,689 pages of plaintext (1,200 characters) 4,581,298 books (200 pages or 240,000 characters) 349,525 digital pictures (with 3MB average file size) 262,144 MP3 audio files (with 4MB average file size) 1,613 650MB CD's 233 4.38GB DVD'sNot only for extraction of data – can also be used as keyloggers
  10. WiFi is everywhereNow a theory that it is killing honey beesSure makes it easy to communicate
  11. Social MediaDo your employees have the right to post whatever they want on Facebook, Twitter, etc.?Not a lot of legal precedentLabor law is biggest area of concernEmployee rights vs. employer rights – free speech, IP protection, etc.
  12. Governance – you can’t walk down the hall and ask who has access. Can’t walk down the hall to get help. Where is your data? Is your data in USA? Europe? India? South America? Privacy laws are different in those countries..As CP grows, roles and resp. will change? Will you be aware of changes as they occur? Multi tenancy – virtualization means your data and infrastructure may be on shared physical devices. Processors, Disk drives, network segments. Complexity in virtualization increases risk of mistakes.Recent issue with major US bank whereby customers with similar last names were able to log in and see info for others due to database glitch. Easy for this to occur in the cloud as well.Commingling – SaaS works by sharing the app and infrastructure. How will your data be segregated? Separate database? Key database field? How will this impact your ability to move your data? Data deletion – change providers, transfer data to new provider, what happens to data at old provider. In many cases it may be mixed in with other customers (Salesforce.com, Bullhorn, etc.) Will CP really go to trouble to fully delete all your records? Or merely deactivate them? If you don’t pay your bill, can the CP delete your app, data, etc.?Legal-If your data is on a shared SAN with another customer whose data gets subpoenaed, will agency make copy for you to continue using your data? Probably not….. Will probably result in downtime.
  13. Acceptance means you better have a good response and recovery programTransfer – cyber insurance becoming quite popularDifferent from business interuption insuranceMitigate – develop controls in line with risks using cost/benefit analysis
  14. MSSP – think of it as “cloud based security” DLP – very complex systems intended to reduce the threat of wikileaksHighly process orientedHighly dependent on data classification and security architectureCyberinsuranceBusiness interuption insurance will not cover costs associated with data breachYou are still in businessCosts can be astronomicalPrivacy and security liabilityCrisis managementCyber extortionMedia or web content liability
  15. These are the basics of information securityInexpensive, effective, largely ignoredNo silver bullet
  16. - Without a written document all you really have is hearsay. If policies are formalized and integrated into organizational culture, then any non-compliance can be dealt with according to pre-established guidelines that the employee has signed off on. - Policies help ensure consistent behavior by clearly communicating what is acceptable, clearly assigning responsibility and, equally important, defining the consequences of non-compliance. - empower security staff to enforce management intent that may not be popular with system users. How many times have you thanked the security team for implementing firewall rules that don’t allow you to check Facebook several times a day? - Must be updated! does your organization have a formal policy regarding the use of internet data storage like Google docs or Microsoft Windows Live? What about a policy regarding the use of USB memory sticks? Does your company or organization have a formal policy regarding the use of unsecured wi-fi networks using your company laptop? All of these are examples of recent technology trends that have created new security threats. Most organizations have not updated their policies to address these new threats.
  17. Defining data classifications allows relative value to be placed on different types of data. It also helps to reduce the likelihood of unauthorized theft or disclosure of data since confidential and secret data should be better protected.
  18. It does not make economic sense to protect product marketing brochures that are available on the company website at the same level as draft merger and acquisition contracts.If you spend too little, you risk loss or disclosure of information as a result of inadequate security. If you spend too much, you are wasting money that could be spent in other areas such as updating plant and equipment or at the very least, having a negative impact on productivity as employees waste time navigating unnecessary security measures and recovering overly complex forgotten passwords.How much is the Coca-cola formula worth? How much would they spend to protect it?What is your company’s IP worth? What would a data breach cost your company?
  19. People are different and have different goals and objectives, many of which are not concerned with maintaining the security of an organization’s data. If the CFO’s Administrative Assistant has been told that the auditors “have to have this spreadsheet in their email by 5pm”, but the corporate email system won’t allow the attachment because it is too large, he will use whatever means necessary to accomplish that objective. Security be damned. He may use his personal email that has no size restrictions on attachments. He may place the spreadsheet out on Google docs in order to share it with the auditor. He may place the spreadsheet on a USB memory stick and hand it to the auditor. All of these methods may be in direct violation of the security policies (if they exist). Security policies have to be constantly reinforced with training and real world examples in order to be effective. Otherwise they are soon forgotten, like the chemistry formulas memorized the night before a test.