Share these talks and lectures with your colleagues
Invite colleaguesWe noted you are experiencing viewing problems
-
Check with your IT department that JWPlatform, JWPlayer and Amazon AWS & CloudFront are not being blocked by your network. The relevant domains are *.jwplatform.com, *.jwpsrv.com, *.jwpcdn.com, jwpltx.com, jwpsrv.a.ssl.fastly.net, *.amazonaws.com and *.cloudfront.net. The relevant ports are 80 and 443.
-
Check the following talk links to see which ones work correctly:
Auto Mode
HTTP Progressive Download Send us your results from the above test links at access@hstalks.com and we will contact you with further advice on troubleshooting your viewing problems. -
No luck yet? More tips for troubleshooting viewing issues
-
Contact HST Support access@hstalks.com
-
Please review our troubleshooting guide for tips and advice on resolving your viewing problems.
-
For additional help, please don't hesitate to contact HST support access@hstalks.com
We hope you have enjoyed this limited-length demo
This is a limited length demo talk; you may
login or
review methods of
obtaining more access.
Printable Handouts
Navigable Slide Index
- Introduction
- Agenda
- Cornerstones of security strategies
- Current business environment
- Focus on fast access to data
- Need to establish electronic trust
- Information security is much like home security
- Business growth vs. information security
- Paradox
- Risky business (activities)
- Who poses real security threats to companies?
- Teleworking increases every year
- Malicious activities
- Approaches to malicious attack
- Launching a malicious attack
- Categories of malware
- Spam and phishing
- Common methods for distributing malware
- Hybrid malware, since 2004
- Using zombies/bots
- Attack goals are shifting
- Home internet security study
- Implications: social marketing efforts
- Concern and PCE
- So why can't we get ahead on security?
- Data/devices are more accessible
- Increasing use of standards
- Greater data storage capacity
- Degree of asset remoteness
- New data types
- Ubiquitous public networks
- Summary of changing security landscape
- Determining security strategy
- Security architecture
- Security technology
- Security effectiveness
- Return on security investment (ROSI)
- The big picture
- Factors affecting vulnerability
- System configuration and use affects vulnerability
- Thank you
Topics Covered
- Cornerstones of security strategy
- Current business environment
- Business growth vs. Information Security
- Risky business activities
- Teleworking
- Malicious attacks
- Malware
- Spam and phishing
- Denial-of-service attacks
- Implications
- Why we can't get ahead on security
- The changing security landscape
- Security strategy
- Security architecture
- Security technology
- Return on Security Investment
Links
Series:
Categories:
Talk Citation
Ray, A. (2011, March 13). Strategically managing information security risks [Video file]. In The Business & Management Collection, Henry Stewart Talks. Retrieved November 18, 2024, from https://doi.org/10.69645/PRJH3640.Export Citation (RIS)