Title: Governance Committee Meeting
1Governance Committee Meeting
IT
2(No Transcript)
3Governance Committee Meeting
IT
4Project update
- Whats going on in Catawba County..
5PROJECT UPDATEWhats going on in Catawba
County..
- E911 Telephone Replacement
- E911 CAD Upgrade
- E911 Mapping Project
- AVL and Mobile for EMS and Law Enforcement
- Emergency Services Badging
- Maintenance Work Order System
- Unified Payment System
6PROJECT UPDATEWhats going on in Catawba
County..
- eConnect/Tidemark Replacement
- Tax Mapping Project
- Land Records Upgrade
- Internet Bandwidth Increase
- Wireless Connectivity
- Firewall Upgrade
- SAN Expanded
- CAS (Citizens Alert System)
7PROJECT UPDATEWhats going on in Catawba
County..
- Local Update of Census Addresses(LUCA)
- PeopleSoft Enterprise Initiative
- Special Needs/Critical Care Database
- Portal Implementation
- Workflow Implementation
- Online Expense Reporting
- Day to Day Keep it Running
- Webpage.Update.Again
8Project update
?
?
?
?
?
?
?
- Whats going on in Catawba County..
9View
in the Positive
New York City Headquarters
10Reception..
11Cafeteria
12Micro kitchens
snack stations throughout
13Writer Elizabeth Gilbert talks
about her latest book Eat, Pray, Love
14Office Space..
15Massage chair.
.in gaming area
16Creativity training.
Google Engineer of the Future
17Bouncing an exercise ball.
18Work Space..
19Massages too??????
20View
in the Positive
What can we learn from
21Mobile Computer equipment Policy
- Protecting Our Resources..
22The new personal computer..
The simple cell phone is a relic
Laptops replace desktops
personal use / business use
23Government Attack Trends from 2007
- Government accounted for 26 percent of data
breaches that could lead to identity theft. - Of the potential infections by the top 50
malicious code samples, 65 percent were threats
to confidential information. - The primary cause of data breaches that could
lead to identity theft was the theft or loss of a
computer or other medium used for data storage or
transmitting , such as a USB key. - Hacking was responsible for 73 percent of
identities exposed during the period. - 36 of the top attacks were SMTP-based.
- 46 of malicious code that propagated did so in
email attachments
www.symantec.com/ISTR2007
24(No Transcript)
25(No Transcript)
26(No Transcript)
27Implications
- Government records are a big source of identity
threat and we must recognize that fact. - Good policies and procedures are needed for all
devices. Mobile devices offer additional security
challenges. - Mobile devices require special security training.
- Training in security practices needs to be
ongoing. - Security practices will at times be a burden but
users must understand the importance.
28Mobile Computer equipment Policy
Issues
29?
- Hands-free devices, how do they fit in? (ie,
inspectors with cell phones) - Streaming of non-business related news, music,
ballgames Should it be added - Employees sharing equipment on an infrequent
basis. - Guest speakers using equipment
- Employee use cannot be in violations with good
public policy or employment What does that mean?
Does the policy address the issues?
30Does the policy address the issues?
Issues
31Next Meeting March 20th
IT
- Notice the Time Change 230
Time Change for April 130 300
Time change for April 17th