際際滷shows by User: bcaplin / http://www.slideshare.net/images/logo.gif 際際滷shows by User: bcaplin / Tue, 23 May 2017 21:30:56 GMT 際際滷Share feed for 際際滷shows by User: bcaplin Healing healthcare security /slideshow/healing-healthcare-security/76275182 healinghealthcaresecurity-170523213056
Whats the value of a stolen healthcare record? The healthcare sector has traditionally lagged behind other industry sectors in cybersecurity. HIPAA, the primary regulatory standard for healthcare, focuses on confidentiality of personal health information (PHI). Is that the right focus? In this session well cut through the hype to understand whats happening in healthcare security. However, this is not just a story about healthcarewe can apply the same lessons to any industry sector. Key learning points: What are the issues that cause the healthcare sector to lag other industry sectors in healthcare? What's wrong with HIPAA and what needs to be done? How can we use the NIST Cybersecurity Framework to build a comprehensive security program for healthcare?]]>

Whats the value of a stolen healthcare record? The healthcare sector has traditionally lagged behind other industry sectors in cybersecurity. HIPAA, the primary regulatory standard for healthcare, focuses on confidentiality of personal health information (PHI). Is that the right focus? In this session well cut through the hype to understand whats happening in healthcare security. However, this is not just a story about healthcarewe can apply the same lessons to any industry sector. Key learning points: What are the issues that cause the healthcare sector to lag other industry sectors in healthcare? What's wrong with HIPAA and what needs to be done? How can we use the NIST Cybersecurity Framework to build a comprehensive security program for healthcare?]]>
Tue, 23 May 2017 21:30:56 GMT /slideshow/healing-healthcare-security/76275182 bcaplin@slideshare.net(bcaplin) Healing healthcare security bcaplin Whats the value of a stolen healthcare record? The healthcare sector has traditionally lagged behind other industry sectors in cybersecurity. HIPAA, the primary regulatory standard for healthcare, focuses on confidentiality of personal health information (PHI). Is that the right focus? In this session well cut through the hype to understand whats happening in healthcare security. However, this is not just a story about healthcarewe can apply the same lessons to any industry sector. Key learning points: What are the issues that cause the healthcare sector to lag other industry sectors in healthcare? What's wrong with HIPAA and what needs to be done? How can we use the NIST Cybersecurity Framework to build a comprehensive security program for healthcare? <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/healinghealthcaresecurity-170523213056-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Whats the value of a stolen healthcare record? The healthcare sector has traditionally lagged behind other industry sectors in cybersecurity. HIPAA, the primary regulatory standard for healthcare, focuses on confidentiality of personal health information (PHI). Is that the right focus? In this session well cut through the hype to understand whats happening in healthcare security. However, this is not just a story about healthcarewe can apply the same lessons to any industry sector. Key learning points: What are the issues that cause the healthcare sector to lag other industry sectors in healthcare? What&#39;s wrong with HIPAA and what needs to be done? How can we use the NIST Cybersecurity Framework to build a comprehensive security program for healthcare?
Healing healthcare security from Barry Caplin
]]>
454 5 https://cdn.slidesharecdn.com/ss_thumbnails/healinghealthcaresecurity-170523213056-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Its not If but When 20160503 /bcaplin/its-not-if-but-when-20160503-62354389 itsnotifbutwhen20160503-160524174310
With new and renewed attacks against our organizations, Incident Response and Management needs to be a core part of your Information Security program. Doing only whats worked in the past and focusing on preventing breaches in not a viable tactic. We need to focus broadly on proactive, detective and responsive measures. We need to provide leadership when things go wrong. Incident Response and Management could be one of the most important parts of a security program because "when" it happens, how we respond to minimize the impact can make a huge different both for the patients/customers and the organization.]]>

With new and renewed attacks against our organizations, Incident Response and Management needs to be a core part of your Information Security program. Doing only whats worked in the past and focusing on preventing breaches in not a viable tactic. We need to focus broadly on proactive, detective and responsive measures. We need to provide leadership when things go wrong. Incident Response and Management could be one of the most important parts of a security program because "when" it happens, how we respond to minimize the impact can make a huge different both for the patients/customers and the organization.]]>
Tue, 24 May 2016 17:43:10 GMT /bcaplin/its-not-if-but-when-20160503-62354389 bcaplin@slideshare.net(bcaplin) Its not If but When 20160503 bcaplin With new and renewed attacks against our organizations, Incident Response and Management needs to be a core part of your Information Security program. Doing only whats worked in the past and focusing on preventing breaches in not a viable tactic. We need to focus broadly on proactive, detective and responsive measures. We need to provide leadership when things go wrong. Incident Response and Management could be one of the most important parts of a security program because "when" it happens, how we respond to minimize the impact can make a huge different both for the patients/customers and the organization. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/itsnotifbutwhen20160503-160524174310-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> With new and renewed attacks against our organizations, Incident Response and Management needs to be a core part of your Information Security program. Doing only whats worked in the past and focusing on preventing breaches in not a viable tactic. We need to focus broadly on proactive, detective and responsive measures. We need to provide leadership when things go wrong. Incident Response and Management could be one of the most important parts of a security program because &quot;when&quot; it happens, how we respond to minimize the impact can make a huge different both for the patients/customers and the organization.
Its not If but When 20160503 from Barry Caplin
]]>
321 4 https://cdn.slidesharecdn.com/ss_thumbnails/itsnotifbutwhen20160503-160524174310-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Dreaded Embedded sec360 5-17-16 /slideshow/dreaded-embedded-sec360-51716/62354296 dreadedembedded-sec3605-17-16-160524174031
How do you make an inanimate object smart? You put a chip in it! And then you connect it to the global internet! These chips run what is typically called an embedded operating system a Windows, unix or Linux variant, or something custom made. Because these chips are embedded in power grid equipment, medical equipment, appliances or even people, updates and patches are problematic. The Internet of Things (IoT) is growing at a rate 10-times that of standard computers. A typical hospital/clinic system may have 4-5 times as many smart connected medical devices as computers. The Dreaded Embedded refers to the proliferation of vulnerabilities associated with these devices. What are the security and privacy concerns of these devices? What about FDA and other regulatory compliance? And how do we deal with these devices as part of an information security program?]]>

How do you make an inanimate object smart? You put a chip in it! And then you connect it to the global internet! These chips run what is typically called an embedded operating system a Windows, unix or Linux variant, or something custom made. Because these chips are embedded in power grid equipment, medical equipment, appliances or even people, updates and patches are problematic. The Internet of Things (IoT) is growing at a rate 10-times that of standard computers. A typical hospital/clinic system may have 4-5 times as many smart connected medical devices as computers. The Dreaded Embedded refers to the proliferation of vulnerabilities associated with these devices. What are the security and privacy concerns of these devices? What about FDA and other regulatory compliance? And how do we deal with these devices as part of an information security program?]]>
Tue, 24 May 2016 17:40:31 GMT /slideshow/dreaded-embedded-sec360-51716/62354296 bcaplin@slideshare.net(bcaplin) Dreaded Embedded sec360 5-17-16 bcaplin How do you make an inanimate object smart? You put a chip in it! And then you connect it to the global internet! These chips run what is typically called an embedded operating system a Windows, unix or Linux variant, or something custom made. Because these chips are embedded in power grid equipment, medical equipment, appliances or even people, updates and patches are problematic. The Internet of Things (IoT) is growing at a rate 10-times that of standard computers. A typical hospital/clinic system may have 4-5 times as many smart connected medical devices as computers. The Dreaded Embedded refers to the proliferation of vulnerabilities associated with these devices. What are the security and privacy concerns of these devices? What about FDA and other regulatory compliance? And how do we deal with these devices as part of an information security program? <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/dreadedembedded-sec3605-17-16-160524174031-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> How do you make an inanimate object smart? You put a chip in it! And then you connect it to the global internet! These chips run what is typically called an embedded operating system a Windows, unix or Linux variant, or something custom made. Because these chips are embedded in power grid equipment, medical equipment, appliances or even people, updates and patches are problematic. The Internet of Things (IoT) is growing at a rate 10-times that of standard computers. A typical hospital/clinic system may have 4-5 times as many smart connected medical devices as computers. The Dreaded Embedded refers to the proliferation of vulnerabilities associated with these devices. What are the security and privacy concerns of these devices? What about FDA and other regulatory compliance? And how do we deal with these devices as part of an information security program?
Dreaded Embedded sec360 5-17-16 from Barry Caplin
]]>
834 5 https://cdn.slidesharecdn.com/ss_thumbnails/dreadedembedded-sec3605-17-16-160524174031-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Its not if but when 20160503 /slideshow/its-not-if-but-when-20160503/61718581 itsnotifbutwhen20160503-160505182114
With new and renewed attacks against our organizations, Incident Response and Management needs to be a core part of your Information Security program. Doing only whats worked in the past and focusing on preventing breaches in not a viable tactic. We need to focus broadly on proactive, detective and responsive measures. We need to provide leadership when things go wrong. Incident Response and Management could be one of the most important parts of a security program because "when" it happens, how we respond to minimize the impact can make a huge different both for the patients/customers and the organization.]]>

With new and renewed attacks against our organizations, Incident Response and Management needs to be a core part of your Information Security program. Doing only whats worked in the past and focusing on preventing breaches in not a viable tactic. We need to focus broadly on proactive, detective and responsive measures. We need to provide leadership when things go wrong. Incident Response and Management could be one of the most important parts of a security program because "when" it happens, how we respond to minimize the impact can make a huge different both for the patients/customers and the organization.]]>
Thu, 05 May 2016 18:21:14 GMT /slideshow/its-not-if-but-when-20160503/61718581 bcaplin@slideshare.net(bcaplin) Its not if but when 20160503 bcaplin With new and renewed attacks against our organizations, Incident Response and Management needs to be a core part of your Information Security program. Doing only whats worked in the past and focusing on preventing breaches in not a viable tactic. We need to focus broadly on proactive, detective and responsive measures. We need to provide leadership when things go wrong. Incident Response and Management could be one of the most important parts of a security program because "when" it happens, how we respond to minimize the impact can make a huge different both for the patients/customers and the organization. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/itsnotifbutwhen20160503-160505182114-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> With new and renewed attacks against our organizations, Incident Response and Management needs to be a core part of your Information Security program. Doing only whats worked in the past and focusing on preventing breaches in not a viable tactic. We need to focus broadly on proactive, detective and responsive measures. We need to provide leadership when things go wrong. Incident Response and Management could be one of the most important parts of a security program because &quot;when&quot; it happens, how we respond to minimize the impact can make a huge different both for the patients/customers and the organization.
Its not if but when 20160503 from Barry Caplin
]]>
243 5 https://cdn.slidesharecdn.com/ss_thumbnails/itsnotifbutwhen20160503-160505182114-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Wearing Your Heart On Your Sleeve - Literally! /slideshow/wearing-your-heart-on-your-sleeve-literally/48075663 heartonsleeve-secure3605-12-15-150513003059-lva1-app6892
Wearables are all around us. From fitness trackers to smart watches, many people are using these devices to monitor their health. Of course, weve had other types of portable health devices for quite a while including automated insulin pumps and pacemakers. These devices use various communication methods but do we know what personal data is being communicated and how its shared? We will look at the current state of health and fitness wearables and portables and discuss where things are going. Discuss the current state of health and fitness wearables. Review privacy and security considerations for wearables and fitness apps. Consider the implications and futures for health and fitness devices.]]>

Wearables are all around us. From fitness trackers to smart watches, many people are using these devices to monitor their health. Of course, weve had other types of portable health devices for quite a while including automated insulin pumps and pacemakers. These devices use various communication methods but do we know what personal data is being communicated and how its shared? We will look at the current state of health and fitness wearables and portables and discuss where things are going. Discuss the current state of health and fitness wearables. Review privacy and security considerations for wearables and fitness apps. Consider the implications and futures for health and fitness devices.]]>
Wed, 13 May 2015 00:30:59 GMT /slideshow/wearing-your-heart-on-your-sleeve-literally/48075663 bcaplin@slideshare.net(bcaplin) Wearing Your Heart On Your Sleeve - Literally! bcaplin Wearables are all around us. From fitness trackers to smart watches, many people are using these devices to monitor their health. Of course, weve had other types of portable health devices for quite a while including automated insulin pumps and pacemakers. These devices use various communication methods but do we know what personal data is being communicated and how its shared? We will look at the current state of health and fitness wearables and portables and discuss where things are going. Discuss the current state of health and fitness wearables. Review privacy and security considerations for wearables and fitness apps. Consider the implications and futures for health and fitness devices. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/heartonsleeve-secure3605-12-15-150513003059-lva1-app6892-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Wearables are all around us. From fitness trackers to smart watches, many people are using these devices to monitor their health. Of course, weve had other types of portable health devices for quite a while including automated insulin pumps and pacemakers. These devices use various communication methods but do we know what personal data is being communicated and how its shared? We will look at the current state of health and fitness wearables and portables and discuss where things are going. Discuss the current state of health and fitness wearables. Review privacy and security considerations for wearables and fitness apps. Consider the implications and futures for health and fitness devices.
Wearing Your Heart On Your Sleeve - Literally! from Barry Caplin
]]>
587 3 https://cdn.slidesharecdn.com/ss_thumbnails/heartonsleeve-secure3605-12-15-150513003059-lva1-app6892-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
CISOs are from Mars, CIOs are from Venus /slideshow/cisos-are-from-mars-cios-are-from-venus/36437395 cisosmarsciosvenus-140629152328-phpapp01
Most organizations have a CIO; many have a CISO. These key leadership positions often approach solutions differently and have different motivations. The CIO must deliver IT, automation, innovation and efficiency. The CISO is tasked with assuring adherence to security frameworks and regulatory standards, and protecting against, and responding to, vulnerabilities and incidents. These mandates can conflict. And often the CISO reports to the CIO. We will take a light-hearted look at questions including: What are the issues?; Are CISOs and CIOs from different planets?; Can we align to meet critical business needs, deliver value and protect the organization?]]>

Most organizations have a CIO; many have a CISO. These key leadership positions often approach solutions differently and have different motivations. The CIO must deliver IT, automation, innovation and efficiency. The CISO is tasked with assuring adherence to security frameworks and regulatory standards, and protecting against, and responding to, vulnerabilities and incidents. These mandates can conflict. And often the CISO reports to the CIO. We will take a light-hearted look at questions including: What are the issues?; Are CISOs and CIOs from different planets?; Can we align to meet critical business needs, deliver value and protect the organization?]]>
Sun, 29 Jun 2014 15:23:28 GMT /slideshow/cisos-are-from-mars-cios-are-from-venus/36437395 bcaplin@slideshare.net(bcaplin) CISOs are from Mars, CIOs are from Venus bcaplin Most organizations have a CIO; many have a CISO. These key leadership positions often approach solutions differently and have different motivations. The CIO must deliver IT, automation, innovation and efficiency. The CISO is tasked with assuring adherence to security frameworks and regulatory standards, and protecting against, and responding to, vulnerabilities and incidents. These mandates can conflict. And often the CISO reports to the CIO. We will take a light-hearted look at questions including: What are the issues?; Are CISOs and CIOs from different planets?; Can we align to meet critical business needs, deliver value and protect the organization? <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/cisosmarsciosvenus-140629152328-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Most organizations have a CIO; many have a CISO. These key leadership positions often approach solutions differently and have different motivations. The CIO must deliver IT, automation, innovation and efficiency. The CISO is tasked with assuring adherence to security frameworks and regulatory standards, and protecting against, and responding to, vulnerabilities and incidents. These mandates can conflict. And often the CISO reports to the CIO. We will take a light-hearted look at questions including: What are the issues?; Are CISOs and CIOs from different planets?; Can we align to meet critical business needs, deliver value and protect the organization?
CISOs are from Mars, CIOs are from Venus from Barry Caplin
]]>
1285 3 https://cdn.slidesharecdn.com/ss_thumbnails/cisosmarsciosvenus-140629152328-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Online Self Defense - Passwords /slideshow/online-self-defense-passwords/35611577 onlineself-defensepasswords-140607221320-phpapp02
Passwords are the main authentication method used for internet sites and applications. But passwords get stolen and have many weaknesses Here are tips you can use at home and at work to protect your information.]]>

Passwords are the main authentication method used for internet sites and applications. But passwords get stolen and have many weaknesses Here are tips you can use at home and at work to protect your information.]]>
Sat, 07 Jun 2014 22:13:20 GMT /slideshow/online-self-defense-passwords/35611577 bcaplin@slideshare.net(bcaplin) Online Self Defense - Passwords bcaplin Passwords are the main authentication method used for internet sites and applications. But passwords get stolen and have many weaknesses Here are tips you can use at home and at work to protect your information. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/onlineself-defensepasswords-140607221320-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Passwords are the main authentication method used for internet sites and applications. But passwords get stolen and have many weaknesses Here are tips you can use at home and at work to protect your information.
Online Self Defense - Passwords from Barry Caplin
]]>
501 3 https://cdn.slidesharecdn.com/ss_thumbnails/onlineself-defensepasswords-140607221320-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
The CISO Guide How Do You Spell CISO? /slideshow/the-ciso-guide-how-do-you-spell-ciso/34646087 cisoguide-secure3605-14-14-140513191412-phpapp02
I recently became a new CISO. Well, the CISO position is new to the org, as am I, but I am not new to the CISO role. I came in with a plan and am executing on that plan. This talk is targeted at: new CISOs, organizations considering a CISO position, any security professional looking to get to the next level, or anyone considering remaking their security program.]]>

I recently became a new CISO. Well, the CISO position is new to the org, as am I, but I am not new to the CISO role. I came in with a plan and am executing on that plan. This talk is targeted at: new CISOs, organizations considering a CISO position, any security professional looking to get to the next level, or anyone considering remaking their security program.]]>
Tue, 13 May 2014 19:14:12 GMT /slideshow/the-ciso-guide-how-do-you-spell-ciso/34646087 bcaplin@slideshare.net(bcaplin) The CISO Guide How Do You Spell CISO? bcaplin I recently became a new CISO. Well, the CISO position is new to the org, as am I, but I am not new to the CISO role. I came in with a plan and am executing on that plan. This talk is targeted at: new CISOs, organizations considering a CISO position, any security professional looking to get to the next level, or anyone considering remaking their security program. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/cisoguide-secure3605-14-14-140513191412-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> I recently became a new CISO. Well, the CISO position is new to the org, as am I, but I am not new to the CISO role. I came in with a plan and am executing on that plan. This talk is targeted at: new CISOs, organizations considering a CISO position, any security professional looking to get to the next level, or anyone considering remaking their security program.
The CISO Guide How Do You Spell CISO? from Barry Caplin
]]>
1004 4 https://cdn.slidesharecdn.com/ss_thumbnails/cisoguide-secure3605-14-14-140513191412-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Bullying and Cyberbullying /bcaplin/bullying-and-cyberbullying-27849499 bullyingandcyberbullying-131102225639-phpapp01
Bullying and Cyber Bullying from the classroom to the chatroom Bullying is a difficult problem that far too many kids, and their parents, face. This has been with us for a long time. Nearly every child knows someone, or knows of someone, who has been bullied. With advances in communications, technology, smartphones and digital cameras, the problem has grown to be 24x7, and follows kids home. With events like Facebooks anti-bullying campaign and well-publicized teen suicides resulting from bullying on Ask.fm, this issue has been prominent in the mainstream media. Join us for this unique discussion as we look at the psychological and technological issues surrounding modern bullying.]]>

Bullying and Cyber Bullying from the classroom to the chatroom Bullying is a difficult problem that far too many kids, and their parents, face. This has been with us for a long time. Nearly every child knows someone, or knows of someone, who has been bullied. With advances in communications, technology, smartphones and digital cameras, the problem has grown to be 24x7, and follows kids home. With events like Facebooks anti-bullying campaign and well-publicized teen suicides resulting from bullying on Ask.fm, this issue has been prominent in the mainstream media. Join us for this unique discussion as we look at the psychological and technological issues surrounding modern bullying.]]>
Sat, 02 Nov 2013 22:56:39 GMT /bcaplin/bullying-and-cyberbullying-27849499 bcaplin@slideshare.net(bcaplin) Bullying and Cyberbullying bcaplin Bullying and Cyber Bullying from the classroom to the chatroom Bullying is a difficult problem that far too many kids, and their parents, face. This has been with us for a long time. Nearly every child knows someone, or knows of someone, who has been bullied. With advances in communications, technology, smartphones and digital cameras, the problem has grown to be 24x7, and follows kids home. With events like Facebooks anti-bullying campaign and well-publicized teen suicides resulting from bullying on Ask.fm, this issue has been prominent in the mainstream media. Join us for this unique discussion as we look at the psychological and technological issues surrounding modern bullying. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/bullyingandcyberbullying-131102225639-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Bullying and Cyber Bullying from the classroom to the chatroom Bullying is a difficult problem that far too many kids, and their parents, face. This has been with us for a long time. Nearly every child knows someone, or knows of someone, who has been bullied. With advances in communications, technology, smartphones and digital cameras, the problem has grown to be 24x7, and follows kids home. With events like Facebooks anti-bullying campaign and well-publicized teen suicides resulting from bullying on Ask.fm, this issue has been prominent in the mainstream media. Join us for this unique discussion as we look at the psychological and technological issues surrounding modern bullying.
Bullying and Cyberbullying from Barry Caplin
]]>
2454 8 https://cdn.slidesharecdn.com/ss_thumbnails/bullyingandcyberbullying-131102225639-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
3 factors of fail sec360 5-15-13 /slideshow/3-factors-of-fail-sec360-51513/21225011 3factorsoffail-sec3605-15-13-130515193614-phpapp02
Passwords weakness has been in the news again lately. But we have known for some time that passwords alone are not a good authentication or access control mechanism. Strong and practical authentication is very challenging. There are strong schemes, but they often dont work well for users. Security practitioners are familiar with the 3 factors of authentication: something you know; something you have, and; something you are. Each of these have fundamental flaws. I like to think of them as: something you forgot; something you lost, and; something you were! We will take a look at the current state of authentication, examine weaknesses in authentication factors, introduce the fourth factor of authentication and consider some solutions. ]]>

Passwords weakness has been in the news again lately. But we have known for some time that passwords alone are not a good authentication or access control mechanism. Strong and practical authentication is very challenging. There are strong schemes, but they often dont work well for users. Security practitioners are familiar with the 3 factors of authentication: something you know; something you have, and; something you are. Each of these have fundamental flaws. I like to think of them as: something you forgot; something you lost, and; something you were! We will take a look at the current state of authentication, examine weaknesses in authentication factors, introduce the fourth factor of authentication and consider some solutions. ]]>
Wed, 15 May 2013 19:36:14 GMT /slideshow/3-factors-of-fail-sec360-51513/21225011 bcaplin@slideshare.net(bcaplin) 3 factors of fail sec360 5-15-13 bcaplin Passwords weakness has been in the news again lately. But we have known for some time that passwords alone are not a good authentication or access control mechanism. Strong and practical authentication is very challenging. There are strong schemes, but they often dont work well for users. Security practitioners are familiar with the 3 factors of authentication: something you know; something you have, and; something you are. Each of these have fundamental flaws. I like to think of them as: something you forgot; something you lost, and; something you were! We will take a look at the current state of authentication, examine weaknesses in authentication factors, introduce the fourth factor of authentication and consider some solutions. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/3factorsoffail-sec3605-15-13-130515193614-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Passwords weakness has been in the news again lately. But we have known for some time that passwords alone are not a good authentication or access control mechanism. Strong and practical authentication is very challenging. There are strong schemes, but they often dont work well for users. Security practitioners are familiar with the 3 factors of authentication: something you know; something you have, and; something you are. Each of these have fundamental flaws. I like to think of them as: something you forgot; something you lost, and; something you were! We will take a look at the current state of authentication, examine weaknesses in authentication factors, introduce the fourth factor of authentication and consider some solutions.
3 factors of fail sec360 5-15-13 from Barry Caplin
]]>
565 3 https://cdn.slidesharecdn.com/ss_thumbnails/3factorsoffail-sec3605-15-13-130515193614-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Tech smart preschool parent 2 13 /slideshow/tech-smart-preschool-parent-2-13/16674493 techsmartpreschoolparent2-13-130221103621-phpapp01
Tech-Smart Parents and Preschoolers There's plenty of focus on safety for teens and pre-teens online. But what about the youngest techies? Did you know that over 6% of kids in the US have social network profile... at birth! How do online technologies effect preschoolers? Well talk about: your home computer, tablets and smartphones, web surfing, games and social networks. This talk is for digital natives, digital immigrants, parents, or anyone who would like to learn more about these technologies! ]]>

Tech-Smart Parents and Preschoolers There's plenty of focus on safety for teens and pre-teens online. But what about the youngest techies? Did you know that over 6% of kids in the US have social network profile... at birth! How do online technologies effect preschoolers? Well talk about: your home computer, tablets and smartphones, web surfing, games and social networks. This talk is for digital natives, digital immigrants, parents, or anyone who would like to learn more about these technologies! ]]>
Thu, 21 Feb 2013 10:36:21 GMT /slideshow/tech-smart-preschool-parent-2-13/16674493 bcaplin@slideshare.net(bcaplin) Tech smart preschool parent 2 13 bcaplin Tech-Smart Parents and Preschoolers There's plenty of focus on safety for teens and pre-teens online. But what about the youngest techies? Did you know that over 6% of kids in the US have social network profile... at birth! How do online technologies effect preschoolers? Well talk about: your home computer, tablets and smartphones, web surfing, games and social networks. This talk is for digital natives, digital immigrants, parents, or anyone who would like to learn more about these technologies! <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/techsmartpreschoolparent2-13-130221103621-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Tech-Smart Parents and Preschoolers There&#39;s plenty of focus on safety for teens and pre-teens online. But what about the youngest techies? Did you know that over 6% of kids in the US have social network profile... at birth! How do online technologies effect preschoolers? Well talk about: your home computer, tablets and smartphones, web surfing, games and social networks. This talk is for digital natives, digital immigrants, parents, or anyone who would like to learn more about these technologies!
Tech smart preschool parent 2 13 from Barry Caplin
]]>
616 4 https://cdn.slidesharecdn.com/ss_thumbnails/techsmartpreschoolparent2-13-130221103621-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Embracing the IT Consumerization Imperative NG Security /slideshow/co-it-ng-security/15563782 coitngsecurity-121209212946-phpapp02
Consumerization and mobility in the enterprise and our daily lives is not only here to stay, but its footprint and influence is expanding. What does the broader consumerization and mobile environment look like? How do you assess the drivers for adoption and the cost/benefit of a mobile-enabled organization? Join us for this session to get an understanding of how a large state government agency took a proactive approach to enablement that ultimately set them ahead of the security challenges, rather than behind. ]]>

Consumerization and mobility in the enterprise and our daily lives is not only here to stay, but its footprint and influence is expanding. What does the broader consumerization and mobile environment look like? How do you assess the drivers for adoption and the cost/benefit of a mobile-enabled organization? Join us for this session to get an understanding of how a large state government agency took a proactive approach to enablement that ultimately set them ahead of the security challenges, rather than behind. ]]>
Sun, 09 Dec 2012 21:29:46 GMT /slideshow/co-it-ng-security/15563782 bcaplin@slideshare.net(bcaplin) Embracing the IT Consumerization Imperative NG Security bcaplin Consumerization and mobility in the enterprise and our daily lives is not only here to stay, but its footprint and influence is expanding. What does the broader consumerization and mobile environment look like? How do you assess the drivers for adoption and the cost/benefit of a mobile-enabled organization? Join us for this session to get an understanding of how a large state government agency took a proactive approach to enablement that ultimately set them ahead of the security challenges, rather than behind. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/coitngsecurity-121209212946-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Consumerization and mobility in the enterprise and our daily lives is not only here to stay, but its footprint and influence is expanding. What does the broader consumerization and mobile environment look like? How do you assess the drivers for adoption and the cost/benefit of a mobile-enabled organization? Join us for this session to get an understanding of how a large state government agency took a proactive approach to enablement that ultimately set them ahead of the security challenges, rather than behind.
Embracing the IT Consumerization Imperative NG Security from Barry Caplin
]]>
382 2 https://cdn.slidesharecdn.com/ss_thumbnails/coitngsecurity-121209212946-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Online Self Defense /slideshow/online-self-defense/14628973 onlineself-defense10-12-121007221106-phpapp01
Its an online world. Most adults, and even teens, need to have online accounts for banking, shopping, communications, entertainment and social networks. Even many children have online lives. With all this online activity, how we keep ourselves and our families safe? How can we protect our private information? In this session we will discuss the advantages and dangers of our online lives. We will review practical tips for avoiding common mistakes. We will look at passwords, website safety, email and phishing, social networks and mobile devices. You can decrease the risks in our online world!]]>

Its an online world. Most adults, and even teens, need to have online accounts for banking, shopping, communications, entertainment and social networks. Even many children have online lives. With all this online activity, how we keep ourselves and our families safe? How can we protect our private information? In this session we will discuss the advantages and dangers of our online lives. We will review practical tips for avoiding common mistakes. We will look at passwords, website safety, email and phishing, social networks and mobile devices. You can decrease the risks in our online world!]]>
Sun, 07 Oct 2012 22:11:05 GMT /slideshow/online-self-defense/14628973 bcaplin@slideshare.net(bcaplin) Online Self Defense bcaplin Its an online world. Most adults, and even teens, need to have online accounts for banking, shopping, communications, entertainment and social networks. Even many children have online lives. With all this online activity, how we keep ourselves and our families safe? How can we protect our private information? In this session we will discuss the advantages and dangers of our online lives. We will review practical tips for avoiding common mistakes. We will look at passwords, website safety, email and phishing, social networks and mobile devices. You can decrease the risks in our online world! <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/onlineself-defense10-12-121007221106-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Its an online world. Most adults, and even teens, need to have online accounts for banking, shopping, communications, entertainment and social networks. Even many children have online lives. With all this online activity, how we keep ourselves and our families safe? How can we protect our private information? In this session we will discuss the advantages and dangers of our online lives. We will review practical tips for avoiding common mistakes. We will look at passwords, website safety, email and phishing, social networks and mobile devices. You can decrease the risks in our online world!
Online Self Defense from Barry Caplin
]]>
796 3 https://cdn.slidesharecdn.com/ss_thumbnails/onlineself-defense10-12-121007221106-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Embracing the IT Consumerization Imperitive /slideshow/embracing-the-it-consumerization-imperitive-14241641/14241641 coitthesecuritystandard-120910192829-phpapp02
]]>

]]>
Mon, 10 Sep 2012 19:28:28 GMT /slideshow/embracing-the-it-consumerization-imperitive-14241641/14241641 bcaplin@slideshare.net(bcaplin) Embracing the IT Consumerization Imperitive bcaplin <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/coitthesecuritystandard-120910192829-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br>
Embracing the IT Consumerization Imperitive from Barry Caplin
]]>
275 3 https://cdn.slidesharecdn.com/ss_thumbnails/coitthesecuritystandard-120910192829-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Embracing the IT Consumerization Imperitive /slideshow/embracing-the-it-consumerization-imperitive/14241575 coitthesecuritystandard-120910192112-phpapp01
]]>

]]>
Mon, 10 Sep 2012 19:21:09 GMT /slideshow/embracing-the-it-consumerization-imperitive/14241575 bcaplin@slideshare.net(bcaplin) Embracing the IT Consumerization Imperitive bcaplin <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/coitthesecuritystandard-120910192112-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br>
Embracing the IT Consumerization Imperitive from Barry Caplin
]]>
241 2 https://cdn.slidesharecdn.com/ss_thumbnails/coitthesecuritystandard-120910192112-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Stuff my ciso says /slideshow/stuff-my-ciso-says/12857890 stuffmycisosays-120508224422-phpapp01
Many CISOs come from more of a technical, rather than a business, background. However, we need to be able to communicate with Senior Management, business-area leaders and users who are usually not technologists. In this talk we will look at some of the common topics CISOs need to cover and discuss how to rephrase the messages to better reach a business-oriented audience. We will discuss: How to think about security risks in a way business personnel do; How to translate technical security topics into more business-friendly language, and; How to reach a broader audience with the information security message.]]>

Many CISOs come from more of a technical, rather than a business, background. However, we need to be able to communicate with Senior Management, business-area leaders and users who are usually not technologists. In this talk we will look at some of the common topics CISOs need to cover and discuss how to rephrase the messages to better reach a business-oriented audience. We will discuss: How to think about security risks in a way business personnel do; How to translate technical security topics into more business-friendly language, and; How to reach a broader audience with the information security message.]]>
Tue, 08 May 2012 22:44:21 GMT /slideshow/stuff-my-ciso-says/12857890 bcaplin@slideshare.net(bcaplin) Stuff my ciso says bcaplin Many CISOs come from more of a technical, rather than a business, background. However, we need to be able to communicate with Senior Management, business-area leaders and users who are usually not technologists. In this talk we will look at some of the common topics CISOs need to cover and discuss how to rephrase the messages to better reach a business-oriented audience. We will discuss: How to think about security risks in a way business personnel do; How to translate technical security topics into more business-friendly language, and; How to reach a broader audience with the information security message. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/stuffmycisosays-120508224422-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Many CISOs come from more of a technical, rather than a business, background. However, we need to be able to communicate with Senior Management, business-area leaders and users who are usually not technologists. In this talk we will look at some of the common topics CISOs need to cover and discuss how to rephrase the messages to better reach a business-oriented audience. We will discuss: How to think about security risks in a way business personnel do; How to translate technical security topics into more business-friendly language, and; How to reach a broader audience with the information security message.
Stuff my ciso says from Barry Caplin
]]>
471 3 https://cdn.slidesharecdn.com/ss_thumbnails/stuffmycisosays-120508224422-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
IT Consumerization iPading the Enterprise or BYO Malware? /slideshow/it-consumerization-ipading-the-enterprise-or-byo-malware/12828903 byod2-120507072330-phpapp02
Companies are increasingly encouraging employees to purchase their own devices such as smartphones, tablets and laptops to use at work according to a recent survey by CIO magazine. The acronyms BYOC and BYOD (like Bring Your Own Beer - Bring Your Own Computer/Device) have become mainstream technology terms. But what does BYOD mean for the enterprise? Can we mix personally owned devices and enterprise workstations/cellphones in our environment? How do we control configuration and data on personal devices? What about malware and other security concerns? What about improper disclosure of private data and intellectual property? And how will staff get work done when they are busy playing Angry Birds? Is BYOD the flavor of the week or is the future of end-user hardware? Regardless of how security leaders may feel about the concept, we need to be prepared. We must understand what is driving BYOD, how it may, or may not, fit our environments, and have policy and tools ready. In this interactive session we will discuss: What is IT Consumerization/BYOD? What are the benefits and concerns? Is there a cost savings? What are the Security concerns - BYOMalware? How do we protect data? And how can I start BYOD in my organization? And yes, you can Bring Your Own Devices to this session! Secure360 05-13-2013.]]>

Companies are increasingly encouraging employees to purchase their own devices such as smartphones, tablets and laptops to use at work according to a recent survey by CIO magazine. The acronyms BYOC and BYOD (like Bring Your Own Beer - Bring Your Own Computer/Device) have become mainstream technology terms. But what does BYOD mean for the enterprise? Can we mix personally owned devices and enterprise workstations/cellphones in our environment? How do we control configuration and data on personal devices? What about malware and other security concerns? What about improper disclosure of private data and intellectual property? And how will staff get work done when they are busy playing Angry Birds? Is BYOD the flavor of the week or is the future of end-user hardware? Regardless of how security leaders may feel about the concept, we need to be prepared. We must understand what is driving BYOD, how it may, or may not, fit our environments, and have policy and tools ready. In this interactive session we will discuss: What is IT Consumerization/BYOD? What are the benefits and concerns? Is there a cost savings? What are the Security concerns - BYOMalware? How do we protect data? And how can I start BYOD in my organization? And yes, you can Bring Your Own Devices to this session! Secure360 05-13-2013.]]>
Mon, 07 May 2012 07:23:29 GMT /slideshow/it-consumerization-ipading-the-enterprise-or-byo-malware/12828903 bcaplin@slideshare.net(bcaplin) IT Consumerization iPading the Enterprise or BYO Malware? bcaplin Companies are increasingly encouraging employees to purchase their own devices such as smartphones, tablets and laptops to use at work according to a recent survey by CIO magazine. The acronyms BYOC and BYOD (like Bring Your Own Beer - Bring Your Own Computer/Device) have become mainstream technology terms. But what does BYOD mean for the enterprise? Can we mix personally owned devices and enterprise workstations/cellphones in our environment? How do we control configuration and data on personal devices? What about malware and other security concerns? What about improper disclosure of private data and intellectual property? And how will staff get work done when they are busy playing Angry Birds? Is BYOD the flavor of the week or is the future of end-user hardware? Regardless of how security leaders may feel about the concept, we need to be prepared. We must understand what is driving BYOD, how it may, or may not, fit our environments, and have policy and tools ready. In this interactive session we will discuss: What is IT Consumerization/BYOD? What are the benefits and concerns? Is there a cost savings? What are the Security concerns - BYOMalware? How do we protect data? And how can I start BYOD in my organization? And yes, you can Bring Your Own Devices to this session! Secure360 05-13-2013. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/byod2-120507072330-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Companies are increasingly encouraging employees to purchase their own devices such as smartphones, tablets and laptops to use at work according to a recent survey by CIO magazine. The acronyms BYOC and BYOD (like Bring Your Own Beer - Bring Your Own Computer/Device) have become mainstream technology terms. But what does BYOD mean for the enterprise? Can we mix personally owned devices and enterprise workstations/cellphones in our environment? How do we control configuration and data on personal devices? What about malware and other security concerns? What about improper disclosure of private data and intellectual property? And how will staff get work done when they are busy playing Angry Birds? Is BYOD the flavor of the week or is the future of end-user hardware? Regardless of how security leaders may feel about the concept, we need to be prepared. We must understand what is driving BYOD, how it may, or may not, fit our environments, and have policy and tools ready. In this interactive session we will discuss: What is IT Consumerization/BYOD? What are the benefits and concerns? Is there a cost savings? What are the Security concerns - BYOMalware? How do we protect data? And how can I start BYOD in my organization? And yes, you can Bring Your Own Devices to this session! Secure360 05-13-2013.
IT Consumerization iPading the Enterprise or BYO Malware? from Barry Caplin
]]>
599 6 https://cdn.slidesharecdn.com/ss_thumbnails/byod2-120507072330-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Toys in the office 11 /slideshow/toys-in-the-office-11-sec360/7917240 toysintheoffice11-sec360-110510211242-phpapp02
2011 may be the "year of the handheld". That is unless 2010 was! iPad sales exceeded all expectations in 2010. For the holiday season, many manufacturers came out with (and are coming out with) tablets. iPhones and Android devices can be seen everywhere... including the office. That means that people want to use these personal devices for work for a variety of reasons: they are more convenient; might be more powerful than company-issued gear; easy interfaces; they can carry less equipment, but, perhaps most importantly; these devices are finally like "real" computers. But use of these personally owned devices bring all kinds of security concerns including data leakage and vulnerabilities in these newer operating systems and apps. We'll take a look at the convergence of mobile and desktop computing devices, security concerns and discuss some potential solutions. Session Learning Objectives: 1. Define the convergence of mobile and desktop computing devices. 2. Discuss the tablet phenomenon. 3. Review security concerns with the use of these devices, particularly employee-owned. 4. Discuss possible solutions.]]>

2011 may be the "year of the handheld". That is unless 2010 was! iPad sales exceeded all expectations in 2010. For the holiday season, many manufacturers came out with (and are coming out with) tablets. iPhones and Android devices can be seen everywhere... including the office. That means that people want to use these personal devices for work for a variety of reasons: they are more convenient; might be more powerful than company-issued gear; easy interfaces; they can carry less equipment, but, perhaps most importantly; these devices are finally like "real" computers. But use of these personally owned devices bring all kinds of security concerns including data leakage and vulnerabilities in these newer operating systems and apps. We'll take a look at the convergence of mobile and desktop computing devices, security concerns and discuss some potential solutions. Session Learning Objectives: 1. Define the convergence of mobile and desktop computing devices. 2. Discuss the tablet phenomenon. 3. Review security concerns with the use of these devices, particularly employee-owned. 4. Discuss possible solutions.]]>
Tue, 10 May 2011 21:12:37 GMT /slideshow/toys-in-the-office-11-sec360/7917240 bcaplin@slideshare.net(bcaplin) Toys in the office 11 bcaplin 2011 may be the "year of the handheld". That is unless 2010 was! iPad sales exceeded all expectations in 2010. For the holiday season, many manufacturers came out with (and are coming out with) tablets. iPhones and Android devices can be seen everywhere... including the office. That means that people want to use these personal devices for work for a variety of reasons: they are more convenient; might be more powerful than company-issued gear; easy interfaces; they can carry less equipment, but, perhaps most importantly; these devices are finally like "real" computers. But use of these personally owned devices bring all kinds of security concerns including data leakage and vulnerabilities in these newer operating systems and apps. We'll take a look at the convergence of mobile and desktop computing devices, security concerns and discuss some potential solutions. Session Learning Objectives: 1. Define the convergence of mobile and desktop computing devices. 2. Discuss the tablet phenomenon. 3. Review security concerns with the use of these devices, particularly employee-owned. 4. Discuss possible solutions. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/toysintheoffice11-sec360-110510211242-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> 2011 may be the &quot;year of the handheld&quot;. That is unless 2010 was! iPad sales exceeded all expectations in 2010. For the holiday season, many manufacturers came out with (and are coming out with) tablets. iPhones and Android devices can be seen everywhere... including the office. That means that people want to use these personal devices for work for a variety of reasons: they are more convenient; might be more powerful than company-issued gear; easy interfaces; they can carry less equipment, but, perhaps most importantly; these devices are finally like &quot;real&quot; computers. But use of these personally owned devices bring all kinds of security concerns including data leakage and vulnerabilities in these newer operating systems and apps. We&#39;ll take a look at the convergence of mobile and desktop computing devices, security concerns and discuss some potential solutions. Session Learning Objectives: 1. Define the convergence of mobile and desktop computing devices. 2. Discuss the tablet phenomenon. 3. Review security concerns with the use of these devices, particularly employee-owned. 4. Discuss possible solutions.
Toys in the office 11 from Barry Caplin
]]>
309 1 https://cdn.slidesharecdn.com/ss_thumbnails/toysintheoffice11-sec360-110510211242-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Accidental Insider /slideshow/accidental-insider-it-symp-1210/6149367 accidentalinsider-itsymp12-10-101213154229-phpapp01
While insider threat is a reality, more problems are caused by mistakes. Workers are stressed and need to get the job done. These accidental insiders may be dealing with unclear process, security controls that arent well planned, or are just trying to get something done for the customer. In this session we will discuss: How internal process, policy and technical environment can lead to mistakes; Appropriate levels of access control, and; What we can do proactively to prevent these kinds of problems. Secure360 5-11-11 Capella University webcast 3-18-13]]>

While insider threat is a reality, more problems are caused by mistakes. Workers are stressed and need to get the job done. These accidental insiders may be dealing with unclear process, security controls that arent well planned, or are just trying to get something done for the customer. In this session we will discuss: How internal process, policy and technical environment can lead to mistakes; Appropriate levels of access control, and; What we can do proactively to prevent these kinds of problems. Secure360 5-11-11 Capella University webcast 3-18-13]]>
Mon, 13 Dec 2010 15:42:25 GMT /slideshow/accidental-insider-it-symp-1210/6149367 bcaplin@slideshare.net(bcaplin) Accidental Insider bcaplin While insider threat is a reality, more problems are caused by mistakes. Workers are stressed and need to get the job done. These accidental insiders may be dealing with unclear process, security controls that arent well planned, or are just trying to get something done for the customer. In this session we will discuss: How internal process, policy and technical environment can lead to mistakes; Appropriate levels of access control, and; What we can do proactively to prevent these kinds of problems. Secure360 5-11-11 Capella University webcast 3-18-13 <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/accidentalinsider-itsymp12-10-101213154229-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> While insider threat is a reality, more problems are caused by mistakes. Workers are stressed and need to get the job done. These accidental insiders may be dealing with unclear process, security controls that arent well planned, or are just trying to get something done for the customer. In this session we will discuss: How internal process, policy and technical environment can lead to mistakes; Appropriate levels of access control, and; What we can do proactively to prevent these kinds of problems. Secure360 5-11-11 Capella University webcast 3-18-13
Accidental Insider from Barry Caplin
]]>
697 7 https://cdn.slidesharecdn.com/ss_thumbnails/accidentalinsider-itsymp12-10-101213154229-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Teens 2.0 - Teens and Social Networks /slideshow/teens-20-11610/5696286 teens2-0-11-6-10-101107151111-phpapp02
Cell phones, smart phones, tablets FaceBook, Twitter, texting the Internet and social networks are hardly new to our kids. New sites and features are being created all the time. New phones make these sites and services available to our kids anywhere, anytime. In this interactive talk we will discuss the basics of internet social networks, how our kids interact online, how they use mobile technology, and what we need to know to keep up. ]]>

Cell phones, smart phones, tablets FaceBook, Twitter, texting the Internet and social networks are hardly new to our kids. New sites and features are being created all the time. New phones make these sites and services available to our kids anywhere, anytime. In this interactive talk we will discuss the basics of internet social networks, how our kids interact online, how they use mobile technology, and what we need to know to keep up. ]]>
Sun, 07 Nov 2010 14:50:19 GMT /slideshow/teens-20-11610/5696286 bcaplin@slideshare.net(bcaplin) Teens 2.0 - Teens and Social Networks bcaplin Cell phones, smart phones, tablets FaceBook, Twitter, texting the Internet and social networks are hardly new to our kids. New sites and features are being created all the time. New phones make these sites and services available to our kids anywhere, anytime. In this interactive talk we will discuss the basics of internet social networks, how our kids interact online, how they use mobile technology, and what we need to know to keep up. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/teens2-0-11-6-10-101107151111-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Cell phones, smart phones, tablets FaceBook, Twitter, texting the Internet and social networks are hardly new to our kids. New sites and features are being created all the time. New phones make these sites and services available to our kids anywhere, anytime. In this interactive talk we will discuss the basics of internet social networks, how our kids interact online, how they use mobile technology, and what we need to know to keep up.
Teens 2.0 - Teens and Social Networks from Barry Caplin
]]>
1025 1 https://cdn.slidesharecdn.com/ss_thumbnails/teens2-0-11-6-10-101107151111-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://cdn.slidesharecdn.com/profile-photo-bcaplin-48x48.jpg?cb=1719360668 Barry is the first Chief Information Security Officer for Fairview Health Systems. He joined Fairview in 2013 and is responsible for enterprise information security and the security technologies, including the development and implementation of organization-wide security policy, security architecture, and consistent standards and procedures. This is a balancing act, supporting business objectives with the many difficult security challenges and compliance efforts relating to federal and state statutory and regulatory requirements, such as HIPAA and PCI. Barry has 30 years of experience in information technology, the last 20 of which has been focused on information security. He has worked .. www.bjb.org https://cdn.slidesharecdn.com/ss_thumbnails/healinghealthcaresecurity-170523213056-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/healing-healthcare-security/76275182 Healing healthcare sec... https://cdn.slidesharecdn.com/ss_thumbnails/itsnotifbutwhen20160503-160524174310-thumbnail.jpg?width=320&height=320&fit=bounds bcaplin/its-not-if-but-when-20160503-62354389 Its not If but When 2... https://cdn.slidesharecdn.com/ss_thumbnails/dreadedembedded-sec3605-17-16-160524174031-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/dreaded-embedded-sec360-51716/62354296 Dreaded Embedded sec...