Computer Security is Good Business
8:30am Open/Welcome
8:45am Computer
Security
What is it, what is information security, why is it needed,
how much should we invest?
In this first seminar, learn how to define information security (IS) for
your organization and demonstrate the necessity of IS in your operations.
Hear examples of the most common types of threats to information security
and understand how to do a cost-benefits analysis to determine the extent
to which your organization should proactively address known threats.
10:00am Information
Security
Defining Your Needs
Learn to create a security policy that supports your organization's mission.
Understand the fundamentals of risk assessment and risk mitigation.
11:15am Common
Information Security Practices
Internet, E-mail, Desktop, Personnel - learn common Best Practices and
procedures and operate more securely. (Focus on procedures.)
Networking
Lunch
1:15pm Common Information
Security Practices (continued)
Internet, E-mail, Desktop, Personnel - Learn common Best Practices and
Procedures and operate more securely. (Focus on personnel.)
2:00pm FBI Special
Agent on Federal Computer Crime and InfraGard
Are you a victim? Would you know how to recognize a federal computer crime
or how to respond? Hear an FBI Special Agent speak on fighting federal
computer crime and federal crime prevention.
3:00pm Information
Security
The Mechanisms and Technologies
Hear an overview of current technologies used in reducing IS vulnerabilities
and learn of NIST resources available to your organization.