Register   |   Print Page   |   Contact Us   |   Report Abuse   |   Sign In
Bross Group - IT Simplifier: How to improve your security through associates (Part 1 of 3) – Develop
Tell a Friend About This EventTell a Friend
Bross Group - IT Simplifier: How to improve your security through associates (Part 1 of 3) – Develop

When: March 4, 2014
Tuesday, March 4, 2014
Where: Webinar
Contact: Justin Kraft

« Go to Upcoming Event List  

Does your company have IT security gaps?

In this Webinar we will discuss and give examples on developing your security policy

Common issues:
  • Too many people have inappropriate access to proprietary information
  • Workflows for data are not established
  • Unauthorized applications are used
  • Associates don’t have proper training

The security of corporate information is critical to ensure compliance with government-mandated privacy rules and financial data confidentiality regulations, and to maintain a competitive edge. Information must be kept secure from business competition, from potential hackers looking for customer data and from employees without the need to access sensitive information. Developing a corporate information security policy requires understanding the flow of data in a company, determining the information access needs of different employee groups and establishing the technology framework for a secure corporate infrastructure.

What you will learn?

  • Top 3 security risks caused by associates
  • How to write an effective explicit security policy
  • How to help associates follow security policy
  • How to reinforce your security plan

Cindy Photo
About the Expert:Cindy Gibson - Security Program Director (Bross Group)
Combining a business-minded approach with strong technical acumen, Cindy is a certified Project Management Professional (PMP), Certified Agile Scrum Master (CSM), Certified Six-Sigma Green Belt, Certified Information Systems Security Professional (CISSP), and offers knowledge in COBIT processes, ITIL foundations and SDLC.

Her skills and interest include:
  • Information Security
  • Business Management
  • Governance and Compliance
  • Business Process Improvement
  • Change Management & End User Support
  • Training & Documentation
  • Team Facilitation & SCRUM
  • Identity & Access Management
  • Program & Project Management
This is a unique opportunity to learn and discuss security gaps within organizations.


Association Management Software Powered by®  ::  Legal