Loading presentation...

Present Remotely

Send the link below via email or IM

Copy

Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.

DeleteCancel

Make your likes visible on Facebook?

Connect your Facebook account to Prezi and let your likes appear on your timeline.
You can change this under Settings & Account at any time.

No, thanks

WGET Presentation April 2015

No description
by

R V

on 16 June 2015

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of WGET Presentation April 2015

www.commstech-hub.eisf.eu
What is the security risk we are trying to manage?

organisations

European countries

http://issuu.com/eisf/docs/eisf_security_risk_management_and_r
is committed to improving the safety and security of relief operations and staff, by strengthening risk management in a way that allows greater access to and impact for crisis-affected populations.
understanding the operational context
key takeaways
CT is changing the operational environment
Thank you!
www.eisf.eu
Raquel Vazquez Llorente
Researcher
eisf-research@eisf.eu
70
@eisf1
#AidSecurity
Communications technology and humanitarian security
challenges and opportunities for security risk management
Understanding the operational context
Impact on humanitarian programmes
Using comms tech for security risk management
virtual space
physical space
virtual space
physical space
Mapping digital actors
Change of social dynamics
Data-related attacks
Many sources --- 1 voice
Overload of information
context analysis
cyber
security risk assessment
cyber
understanding humanitarian programming
last mile mobile solutions
mobile money
crowd-seeding and low-tech
field programmes
hq
-
-
-
-
virtual space
physical space
tech
security
Humanitarian acceptance is fought as much in virtual space as in physical space
Safe access requires a SRM approach
that takes account of the risks
associated with developments in CT
Lisa Reilly
Executive Coordinator
eisf-coordinator@eisf.eu
www.commstech-hub@eisf.eu
acceptance
Full transcript