1 / 12

Welcome

Welcome. Cyber Security for Small and Medium Business, Not for Profit Organisation and You. Program. 0715 – 0745 Networking and Introduction 0745 – 0815 Kevin Jeffery 0815 – 0830 Michael Phillips 0830 – 0840 Break 0840 – 0920 Roger Smith 0920 – 0925 Break 0925 – 1000 Allan Mouawad

denis
Download Presentation

Welcome

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Welcome Cyber Security for Small and Medium Business, Not for Profit Organisation and You.

  2. Program 0715 – 0745 Networking and Introduction 0745 – 0815 Kevin Jeffery 0815 – 0830 Michael Phillips 0830 – 0840 Break 0840 – 0920 Roger Smith 0920 – 0925 Break 0925 – 1000 Allan Mouawad 1000 Close

  3. Adrian Tatham Alacrity’s Founder and CEO, Adrian Tatham, has been specialising in interactive communications for the past seven years and has decades of experience in the public and private sectors, both in Australia and internationally. In 1999, Adrian’s dedication to addressing the need for real-time interactive business communication led him to create Alacrity technologies to develop the core technologies that today underpin the innovative CLEW communications platform. Alacrity

  4. Senior consultant, business analyst and project manager in electronic commerce, electronic service delivery and information management with extensive experience in government strategy development, requirements analysis and tender development and evaluation. Completed over 300 projects for Australian Federal and all state governments. Kevin was a project manager on a number of large implementations.Kevin has been primarily providing business analysis services in the fraud detection, surveillance and intelligence fields, both for the development and commercialisation of new technologies and the implementation of large-scale commercial solutions. Kevin Jeffery Solid Data

  5. 4 Corners on Monday 27/5 - Hacked! • Something worth taking the time to look at. • If the professionals have these sort of problems how can small and medium business and not for profit organisations hope to protect themselves. • The principles are the same – the bad guys always target the easiest opportunities.

  6. Michael Phillips Current Position: Manager, eGov Cluster, NICTA. Responsible for fostering innovative Australian ICT in government; to advance both the industry and public administration. Previously: Senior sales and business management roles in both the private and public sectors. 30 years working in and around government ICT. Qualifications in Surveying; Computing and Public Administration. NICTA

  7. “Cybercrime has developed in the last few years into a major concern, not just for the consumers and businesses that are victims. but also for governments around the world. ” Dennis Fisher - Microsoft

  8. Roger Smith is an independent ICT and business security consultant, security trainer, and author that specialises in inexpensive and highly effective security strategies for small and medium businesses and not for profit organisations. He has developed and authored the SME Security Framework and the Security Policy Training Course which are considered to be the definitive guides to helping SME's protect their organisation using the principles of Technology, Management, Adaptability and Compliance. This vast experience has given Roger a broad knowledge of hundreds of ICT and Security tactics used by some of the most successful and well protected organisations in the world. Roger Smith R & I ICT Consulting Services

  9. Hacking Is Not that Hard • More than 90% of successful breaches required only the most basic techniques. • Only 3% of breaches were unavoidable without difficult or expensive actions. • Outsiders were responsible for most breaches. • 85% of breaches took months to be discovered; the average time is five months. • 96% of successful breaches could have been avoided if the victim had put in place simple or intermediate controls. • 75% of attacks use publicly known vulnerabilities in commercial software that could be prevented by regular patching.

  10. Allan Mouawad Allan is the resident Fortinet Security Engineer at Whitegold Solutions. With over 6 years’ experience as a Security Engineer at Avnet, IBM and WhiteGold, he specialises in the design and implementation of perimeter based security solutions. Allan’s certifications include CISSP, Juniper’s JNCIA and Fortinet’s FCNSP. Fortinet Security Engineer

  11. Cyberspace is the Wild West. Governments have not agreed on the “rules” that should apply to cyberspace, or how to apply existing “rules” for espionage, crime, and warfare. Smart hackers take advantage of borders and the Internet’s ability to cross them with ease and without fear of punishment. They live in countries that tolerate or encourage their activities; they are often outside the grasp of national law enforcement. James A. Lewis

More Related