Governance Committee Meeting - PowerPoint PPT Presentation

1 / 37
About This Presentation
Title:

Governance Committee Meeting

Description:

In two to three years the iPod could have the capacity to store every ... Do you work with an application vendor? Does this vendor have access to your system? ... – PowerPoint PPT presentation

Number of Views:61
Avg rating:3.0/5.0
Slides: 38
Provided by: Tble2
Category:

less

Transcript and Presenter's Notes

Title: Governance Committee Meeting


1
Governance Committee Meeting
IT
  • May 15, 2008

Tidbits of Information
2
Who is providing wireless coverage for the
Olympics?
Beijing Metro Chooses Andrew for Wireless
Coverage In Advance of Olympics
CommScope
3
700
Channels 52 to 69
open access
MHz
Reserve Bid 4.6 Billion
Bidders ATT, Google, and Verizon
Public Safety Access
Verizon 4.7 Billion
4
G
Open Handset Alliance
??? Core Business
Phone
5
open applications
Vista
Linux
6
(No Transcript)
7

8
Tidbits that make you think or sweat!
  • The cost of a GigaByte of storage in 2007 was
    .50.
  • It costs less to store 50 pages of printed text
    than the paperclip to hold them together.
  • In two to three years the iPod could have the
    capacity to store every song ever recorded.
  • 281 exabytes of information was created in 2007,
    that is 48 GB for every person across the globe.
  • The cost of a transistor today is .000001 cent.

9
Tidbits that make you think or sweat!
  • RFID chips are the size of a grain of salt.
  • Technology exists in the Research Triangle to
    detect a tumor the size of that grain of salt.
  • The US is 14th in the world in average broadband
    speed and 26th in coverage.
  • Approximately 1/3 of Catawba County citizens do
    not have affordable broadband coverage.

10
Tidbits that make you think or sweat!
  • And what if they detect the tumor?
  • It would take years at todays broadband speeds
    in the US to send the image to your doctor.

11
(No Transcript)
12
Governance Committee Meeting
IT
  • May 15, 2008

Information Security
13
26
  • Percent of identity theft attributed to
    government.

14
(No Transcript)
15
(No Transcript)
16
350
  • Average cost of clean up per account.
  • Does not include onsite resources.

17
10
  • Number of Public Access Points
  • that are not really Public Access Points

18
USB
  • One of the two biggest sources.

19
1
  • Number of incidences reported to CC.

20
(No Transcript)
21
Financially Motivated






  • No more glory in hacking, undetected, thief in
    the night ..

22
(No Transcript)
23
Issues Moving to the Forefront
  • ISSUES
  • .
  • ISSUES
  • .
  • ISSUES
  • .
  • ISSUES
  • .

24
The new personal computer..
The simple cell phone is a relic
Laptops replace desktops
personal use / business use
25
No Well Defined Slots
Trusting People
Old Rules Become Unrealistic
Work is an Activity, Not a Place
26
(No Transcript)
27
What is attached to the network? What is the
employee really doing? Programs? Stored Data?
28
Mobile Computer Equipment Policy
  • Not enough but helpful.

29
?
?
?
What about your service providers?........
Insurance/benefits Are they carrying your
employees around on a laptop?...
30
?
?
?
Wheres the data?........
BRIC..
What about something as simple as Anti-Virus
software?........ Is it up-to-date?
31
Exercise/Discussion
  • Do you work with an application vendor?
  • Does this vendor have access to your system?
  • Does the vendor abide by strict security
    practices?
  • Where is your data stored?
  • Who has access to it?

32
Termination
  • Shut down accounts
  • Email
  • Network Access
  • Phone System
  • Secure equipment
  • Secure data stored on remote/mobile equipment
  • Make sure public record files are obtained
  • Signed statement that all data has been returned

33
Self Organizing Groups
  • 4 groups
  • One person with laptop
  • Same size (within 1)
  • Equal area representation
  • Pick a spot and setup a work area

34
Groups
  • Employees
  • Citizens
  • Vendors
  • Crooks

35
Information Leakage
  • Citizen
  • Vendor
  • Crook
  • Employee
  • What could you do or fail to do to cause
    information theft? Remember, you represent all
    employees.
  • What could you do to cause your information to be
    exposed? You represent the public.
  • How could you be putting employees and the
    publics data at risk? You represent all vendors
    we do business with, large and small.
  • How might you steal information from the county?
    Okay, you know who you represent.

36
What can we do to protect the publics data and
employee Data?
?
?
?
?
?
?
?
  • ???????????????????????????????????..

37
Next Meeting June 19th
IT
  • Meeting Time 130 330
Write a Comment
User Comments (0)
About PowerShow.com