Developing and Implementing Information Security Procedures and Policies
Tuesday, April 8, 2003
6pm - 8pm
Share:
Information systems security policies primarily address threats. In the absence of threats, policies would be unnecessary. Unfortunately, threats do exist and information systems security policies are necessary to provide a framework for selecting and implementing countermeasures against them.
An enforceable written policy helps ensure that everyone within the organization coherently behaves in an acceptable manner with respect to information security. A well-designed information security policy defines the objectives of the information system of an organization and outlines a strategy to achieve the objectives. Policies, standards, guidelines, and training materials that are obsolete and not enforced are particularly dangerous to an organization, organizations should regularly review, test, and discard un-enforced and otherwise obsolete rules, controls, and procedures to avoid a false sense of security.
There is a fine line between a secure information environment and an environment that is so restrictive it interferes with the daily activities if the network users. This discussion will cover the components of a secure environment, the impact of security on network usability and implementing policies that provide a balance between the protection of assets and the network user.
Featured Speaker(s)
Cheryl Lyn Granto - Cheryl has been in the IT Network and IT Network Security fields since 1982. After she graduated from the University of Florida she accepted a position with the University’s campus computing organization and then later moved on to manage the Campus network UFNet. She left Florida to accept a position in Atlanta as the Director of Security for Mindpsring/EarthLink and then moved to a tier one ISP, NetRail, Inc. Cheryl is now the supervisor of the IT Security group for Broward County Government. Cheryl’s areas of specialization are in the implementation of sound security solutions in a diverse IT environment and management of IT personnel.
Rebecca Ann Schmaus �" Becky has worked in the IT Industry since 1970. She is a graduate of Texas A&M University, and obtained her MCSE certification in 1997. Becky worked for the Eastman Kodak Corporation for 18 years implementing and maintaining networks for numerous business clients. In 1998, she joined The North Broward Preparatory Schools as the Director of Technology Services. She designed the schools’ network and is responsible for network operation, planning and network security, as well as budgeting, staffing and managing both IT and Training personnel. Becky’s areas of specialization include network design, project management and staff management. In her current position, Becky has a unique perspective on security threats; most are internal and known but she can't fire them for any havoc they may wreak.
Schedule of Events
Registration and networking reception begin at 6pm, the presentations will begin promptly at 7:00pm until 8:00pm.
Location & Details
Office Depot
2100 Old Germantown Road
Delray Beach, Florida 33445
From the South:
Take I-95 north, exit at Congress Avenue, make a right on Congress and travel north 1.2 miles to Old Germantown Road. Make a left onto Old Germantown Road and then the 2nd left into the parking lot. The 2100 Building is the center of the campus.
From the North:
Take I-95 south, exit at Linton Boulevard and head west to Congress Avenue (1st light west of I-95), make a left onto Congress Avenue and a right at Old Germantown Road and then the 2nd left into the parking lot. The 2100 Building is the center of the campus.
- $20.00 for WITI Members
- $35.00 for Non-members
Online Registration Closed