1 / 10

Finding Your Balance: Usability vs Security vs Policy ResNet ‘11

Finding Your Balance: Usability vs Security vs Policy ResNet ‘11. http:// www.facebook.com/home.php?sk=group_151992411539098 (right… Go to facebook.com search for “Finding Your Balance”) www.resnetsymposium.org/rspm/evaluation/. Saturday, June 18 2:00pm WLH 207. Find Your Balance:.

Download Presentation

Finding Your Balance: Usability vs Security vs Policy ResNet ‘11

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Finding Your Balance:Usability vs Security vs PolicyResNet ‘11 • http://www.facebook.com/home.php?sk=group_151992411539098(right… Go to facebook.com search for “Finding Your Balance”) • www.resnetsymposium.org/rspm/evaluation/ Saturday, June 18 2:00pmWLH 207

  2. Find Your Balance: Usability vs. Security vs. Policy

  3. Perspective • Attitude • Mind set • Shift

  4. Communicate • Listen / Learn • Share / Teach • Make the effort • Be Open

  5. Trade-Offs • Mine • Yours • Not Yours

  6. Follow Up • Schedule follow ups • Plan on re-evaluating decisions

  7. Follow Thru • Do it • Reschedule and re-communicate ASAP • Report the Results

  8. Tips… (leave them in the jar) Security • Monitor outbound traffic • Logs – look at them! • Streamline reporting Usability • Ask why you are restricted? • Articulate your needs – be prepared to explore alternate solutions • Understand your IT dept is not responsible for killing Word Perfect. Policy • Ask not what you can do for your country? • A good policy will adjust, never done…

  9. Examples • Desktop Security • NAC @ Denison • NAC @ Columbus State • Wireless – WPA, 802.1X • Printing • File Encryption • Personal Password Policy (http://www.schneier.com/essay-328.html)

  10. Thank you, Evaluation, References • www.resnetsymposium.org/rspm/evaluation/(Saturday 2pm WLH Room 207 - Find Your Balance) • General • http://lifehacker.com/ • http://the99percent.com/ • http://hbr.org • http://www.pauldotcom.com/ • http://blog.commandlinekungfu.com/ (highly technical) • Communicate • http://gigaom.com/collaboration/get-more-done-by-being-a-better-listener/ • http://newschoolsecurity.com/2011/06/are-lulz-our-best-practice/ • Trade Offs • http://www.schneier.com/ • http://www.schneier.com/blog/archives/2011/01/whitelisting_vs.html • http://www.pelicancrossing.net/theotherglass/2011/05/when-theat-models-collide.html • http://www.itworld.com/cloud-computing/174967/business-users-abandoning-it-quicker-self-serve-cloud-apps • Follow Up • http://www.focus.com/posts/10-tips-be-assertive-rather-aggressive/ • http://blogs.hbr.org/schwartz/ • http://blogs.hbr.org/cs/2011/02/nine_things_successful_people.html

More Related