SlideShare a Scribd company logo
Writing an effective
     data security procedure
       in 2 pages or less.


    Licensed under the Creative Commons Attribution License
                        Danny Lieberman
    dannyl@controlpolicy.com http://www.controlpolicy.com/ 

                               
Agenda


•   Introduction and welcome
•   Defining the problem
•   Too much choice
•   Workplace ethics – the Internet
•   AUP
•   Enforcement
•   Monitoring to reinforce ethical behavior




                              
Defining the problem




                      •   Means
                           –   Multiple
                               accounts
                      •   Opportunity
                           –   Multiple
                               channels
                      •   Intent
                           –   Jérôme Kerviel
                           –   Albert Gonzales

                   
What employees have


•       1995
         –   1 Company phone
         –   1 Company mail account
         –   Mozilla 1.0
•       2009
         –   N mobile devices
         –   N accounts to M applications
         –   Web 2.0




                              
Why too much choice is bad




•   Paralysis
•   Make worse decisions
•   Doing better, feeling worse.




                      
Workplace ethics – the Internet




•   Good
     –    Internet is a great work tool
•   Bad
     –    Time waster
     –    Malware
     –    Can violate privacy of other employees
     –    Sexual harassment suits



                          
Workplace ethics – the Internet




•   Ugly
     –     Loss of proprietary information
             •   Trusted insider theft
                    –   Mail, Web, IM
                    –   Smart phones
             •   Front-door attacks
                    –   Lost passwords makes it easy
             •   Back-door attacks
                    –   Spyware, Trojans
                    –   Piggy back on legit sessions



                             
Acceptable usage policy




                       •   Reduce number
                           of options by
                           default
                            –   No “opt-in”
                                check box




                    
AUP read and understand agreement




The AUP states that:
•     The Internet is to be used to further the 
      company’s business and improve customer 
      service and not for personal entertainment or 
      gain
•     Protect company assets ­ physical and digital




                            
Digital Assets




• Any computerized information that the
  firm uses to compete or accomplish it’s
  missions
     –   Customer Lists
     –   Transaction records
     –   Strategic marketing plans
     –   Credit cards



                          
Enforcement - management




•   Corporate culture
     –   A little fear in the workplace is not a bad idea 
         (Andy Grove)


•   Everyone signs
•   Managers teach




                            
Enforcement – the AUP




•   For example:
     –   “The AUP applies to laptops, PDA’s and smart­
         phones even when you’re out of the office”
           •   No downloads
           •   No offensive content
           •   Physical, password and email/web
               security




                           
Enforcement - monitoring




•   Monitoring
     –     Monitor for policy violations
             •   To protect staff and customers against
                 unlawful disclosure of personal records
             •   Loss/abuse of assets
     –     Physical
     –     Network




                             
Coming attractions




•   Sep 24:   Write a 2 page procedure
•   Oct 1:    Home(land) security
•   Oct 8:    SME data security
•   Oct 15:   Business process & security



      http://www.controlpolicy.com/workshops 

                          
Learn more




•   Presentation materials and resources
    http://www.controlpolicy.com/workshops/data-security-workshops/


•   Includes a sample AUP read and
    understand agreement in MS Word
    format.




                              

More Related Content

PDF
Data Security For SMB - Fly first class on a budget
PPT
Ch12
PDF
Week 6
PPTX
1. intro ict
PPTX
Information Technologies in Communication
PDF
Digital citizenship
PPTX
Chap1 introducing today's technologies
PPTX
Technology in business communications
Data Security For SMB - Fly first class on a budget
Ch12
Week 6
1. intro ict
Information Technologies in Communication
Digital citizenship
Chap1 introducing today's technologies
Technology in business communications

What's hot (14)

PPTX
China all up in your business: Annoying Persistant Threat - Dave Ockwell-Jenn...
PDF
Selling SaaS in a product world
PDF
Technology business
ODP
Innovation Station Digital Natives
PDF
Contemporary Communication Technologies Presentation View
PPTX
COCPA Central Ontario Crime Prevention Association presentation by Steve Falk
PPTX
Legal Issues in Technology
PDF
Slideshareweek6
PPTX
Yammer session
PPTX
Uc14 chap16
PDF
Lecture 5
PPTX
Digitally enabled home_office
PPT
Embracing the IT Consumerization Imperitive
China all up in your business: Annoying Persistant Threat - Dave Ockwell-Jenn...
Selling SaaS in a product world
Technology business
Innovation Station Digital Natives
Contemporary Communication Technologies Presentation View
COCPA Central Ontario Crime Prevention Association presentation by Steve Falk
Legal Issues in Technology
Slideshareweek6
Yammer session
Uc14 chap16
Lecture 5
Digitally enabled home_office
Embracing the IT Consumerization Imperitive
Ad

Similar to Writing An Effective Security Procedure in 2 pages or less and make it stick (20)

PPTX
The Loss of Intellectual Property in the Digital Age: What Companies can d…
PDF
Health Data Encryption: The Seven Principals of Privacy
PDF
Homeland Security - strengthening the weakest link
PPTX
Presentation on Information Privacy
PPTX
Privacy for tech startups
PPT
6. Security Threats with E-Commerce
PPTX
Identity-Based Privacy (IBP)
PDF
DSS ITSEC CONFERENCE - Spector360 as productivity and security tool - Riga NO...
PPT
Embracing the IT Consumerization Imperitive
PDF
Information Security: A mindset, not a product
PPTX
The Year Ahead in Cyber Security: 2014 edition
PDF
Information Security Awareness Training
PDF
Ciso executive forum 2013
PPTX
Identity theft and data responsibilities
PPTX
Splunk at Aaron's Inc
PPTX
645Unit-1-INFORMATION TECHNOLOGY FOR BUSINESS (2).pptx
PPT
PDF
Managing Frequently Overlooked Risks & Threats (FORTS) in Corporations
PPTX
Simplitfy - Guarding your Data
PPT
Wipo smes ge_08_topic07
The Loss of Intellectual Property in the Digital Age: What Companies can d…
Health Data Encryption: The Seven Principals of Privacy
Homeland Security - strengthening the weakest link
Presentation on Information Privacy
Privacy for tech startups
6. Security Threats with E-Commerce
Identity-Based Privacy (IBP)
DSS ITSEC CONFERENCE - Spector360 as productivity and security tool - Riga NO...
Embracing the IT Consumerization Imperitive
Information Security: A mindset, not a product
The Year Ahead in Cyber Security: 2014 edition
Information Security Awareness Training
Ciso executive forum 2013
Identity theft and data responsibilities
Splunk at Aaron's Inc
645Unit-1-INFORMATION TECHNOLOGY FOR BUSINESS (2).pptx
Managing Frequently Overlooked Risks & Threats (FORTS) in Corporations
Simplitfy - Guarding your Data
Wipo smes ge_08_topic07
Ad

More from Flaskdata.io (17)

PDF
Flaskdata - Observability for clinical data
PDF
The travel industry does real-time. Why doesn't clinical research?
PDF
Flaskdata.io automated monitoring for clinical trials
PPTX
How to write secure code
PDF
The insights that will help your medtech clinical trial succeed
PDF
2017 02-05 en-eu-data-security_v2
PPTX
Quick user guide to the Clear Clinica Cloud EDC system
PPTX
Killed by code 2015
PPTX
Killed by code 2015
PPTX
Pathcare: Patient-issue oriented healthcare
PPTX
The Tao of GRC
PDF
Will Web 2.0 applications break the cloud?
PPTX
Killed by code - mobile medical devices
PPTX
Grc tao.4
PPT
Data Security For Compliance 2
PDF
Data Security Metricsa Value Based Approach
PDF
Selling Data Security Technology
Flaskdata - Observability for clinical data
The travel industry does real-time. Why doesn't clinical research?
Flaskdata.io automated monitoring for clinical trials
How to write secure code
The insights that will help your medtech clinical trial succeed
2017 02-05 en-eu-data-security_v2
Quick user guide to the Clear Clinica Cloud EDC system
Killed by code 2015
Killed by code 2015
Pathcare: Patient-issue oriented healthcare
The Tao of GRC
Will Web 2.0 applications break the cloud?
Killed by code - mobile medical devices
Grc tao.4
Data Security For Compliance 2
Data Security Metricsa Value Based Approach
Selling Data Security Technology

Writing An Effective Security Procedure in 2 pages or less and make it stick

  • 1. Writing an effective data security procedure in 2 pages or less. Licensed under the Creative Commons Attribution License Danny Lieberman dannyl@controlpolicy.com http://www.controlpolicy.com/     
  • 2. Agenda • Introduction and welcome • Defining the problem • Too much choice • Workplace ethics – the Internet • AUP • Enforcement • Monitoring to reinforce ethical behavior    
  • 3. Defining the problem • Means – Multiple accounts • Opportunity – Multiple channels • Intent – Jérôme Kerviel – Albert Gonzales    
  • 4. What employees have • 1995 – 1 Company phone – 1 Company mail account – Mozilla 1.0 • 2009 – N mobile devices – N accounts to M applications – Web 2.0    
  • 5. Why too much choice is bad • Paralysis • Make worse decisions • Doing better, feeling worse.    
  • 6. Workplace ethics – the Internet • Good – Internet is a great work tool • Bad – Time waster – Malware – Can violate privacy of other employees – Sexual harassment suits    
  • 7. Workplace ethics – the Internet • Ugly – Loss of proprietary information • Trusted insider theft – Mail, Web, IM – Smart phones • Front-door attacks – Lost passwords makes it easy • Back-door attacks – Spyware, Trojans – Piggy back on legit sessions    
  • 8. Acceptable usage policy • Reduce number of options by default – No “opt-in” check box    
  • 9. AUP read and understand agreement The AUP states that: • The Internet is to be used to further the  company’s business and improve customer  service and not for personal entertainment or  gain • Protect company assets ­ physical and digital    
  • 10. Digital Assets • Any computerized information that the firm uses to compete or accomplish it’s missions – Customer Lists – Transaction records – Strategic marketing plans – Credit cards    
  • 11. Enforcement - management • Corporate culture – A little fear in the workplace is not a bad idea  (Andy Grove) • Everyone signs • Managers teach    
  • 12. Enforcement – the AUP • For example: – “The AUP applies to laptops, PDA’s and smart­ phones even when you’re out of the office” • No downloads • No offensive content • Physical, password and email/web security    
  • 13. Enforcement - monitoring • Monitoring – Monitor for policy violations • To protect staff and customers against unlawful disclosure of personal records • Loss/abuse of assets – Physical – Network    
  • 14. Coming attractions • Sep 24: Write a 2 page procedure • Oct 1: Home(land) security • Oct 8: SME data security • Oct 15: Business process & security http://www.controlpolicy.com/workshops     
  • 15. Learn more • Presentation materials and resources http://www.controlpolicy.com/workshops/data-security-workshops/ • Includes a sample AUP read and understand agreement in MS Word format.