CustomProperty
This presentation seeks to educate the attendees about the various IT and Physical Security risks that affect their businesses. In addition, it provides preliminary exposure to business interruption considerations and how they affect a business. The first section of the presentation involves the risks to a company's IT system. These include USB devices, portable storage, Bluetooth connectivity and Cloud storage. Other issues such as employee access protocols and operating procedures are also discussed. For each of the risk areas, the problem as well as a solution is presented giving the attendee positive actions to implement to remediate those risks. The second section of the presentation involves a brief discussion about passwords and the various issues involving weak password control by a company. A discussion about Physical Security is presented next involving both building access, possible external risks as well as matters involving employees and their work habits. The final section of the presentation involves a brief exposure to Business Interruption considerations and thoughts to remediate the risks including the use of insurance. This presentation is recommended for C-suite personnel, business managers and even line employees that have heard about "IT risks or Cyber threats" but has neither the time or opportunity to find out the actual risks to their company. IT personnel may find this material a bit basic However, given the complexity of the various threats and cross functional remediation required, an IT alone solution is not the answer and must be addressed by the highest authority(s) within a company.

Information Technology and Physical Security Risks, Threats

This presentation seeks to educate the attendees about the various IT and Physical Security risks that affect their businesses. In addition, it provides preliminary exposure to business interruption considerations and how they affect a business. The first section of the presentation involves the risks to a company's IT system. These include USB devices, portable storage, Bluetooth connectivity and Cloud storage. Other issues such as employee access protocols and operating procedures are also discussed.
For each of the risk areas, the problem as well as a solution is presented giving the attendee positive actions to implement to remediate those risks. The second section of the presentation involves a brief discussion about passwords and the various issues involving weak password control by a company. A discussion about Physical Security is presented next involving both building access, possible external risks as well as matters involving employees and their work habits. The final section of the presentation involves a brief exposure to Business Interruption considerations and thoughts to remediate the risks including the use of insurance.
This presentation is recommended for C-suite personnel, business managers and even line employees that have heard about "IT risks or Cyber threats" but has neither the time or opportunity to find out the actual risks to their company. IT personnel may find this material a bit basic However, given the complexity of the various threats and cross functional remediation required, an IT alone solution is not the answer and must be addressed by the highest authority(s) within a company.
Discounted member price: 0.00
159.00
You could save: 100.0%