Loading presentation...

Present Remotely

Send the link below via email or IM

Copy

Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.

DeleteCancel

Make your likes visible on Facebook?

Connect your Facebook account to Prezi and let your likes appear on your timeline.
You can change this under Settings & Account at any time.

No, thanks

IT Management and Professional Skills

No description
by

Sarah Philp

on 6 December 2012

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of IT Management and Professional Skills

By Sarah Philp, Blake Bessell, Callum Denyer,
Yanis Georgiadis & Robert Parker. CYBER SECURITY What is cyber security? Cyber Crime Case Studies “Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction.” Mike T`urner Lecture Structure “The state of being protected against the criminal or unauthorised use of electronic data, or the measures taken to achieve this.” The overall cost to the UK economy from cyber crime is £27bn per year. Business bares the lion’s share of the cost (£21bn per year).With the number of IT systems growing around the world, it means that cyber security is becoming more and more important. Evidence Positives -
Professional
Consistent template
Some good visual aids

Negatives -
Overcrowded slides Guru lecturer Mike Turner began his presentation by saying: “This presentation will be very much my thoughts and my experience in this field”.

Definitions with no sources or evidence.

Only one reference in the presentation, quoting the Foreign Secretary William Hague on BBC's Andrew Marr Show. Who is he? Capgemini Mike Turner is the head of Security & Risk Management at Capgemini Is a French multinational corporation with its headquarters in Paris, France.

It provides IT services and one of the world's largest management consulting, outsourcing and professional services companies with a staff of 121,026 operating in 40 countries Conclusion Cloud Computing G Cloud The Challenge - Capgemini UK PLC + Government Procurement Service (GPS) framework agreement
- By 2015, Government wants cloud computing to constitute 50% of IT spending - Government cuts
- Data sensitivity
- Data privacy and protection
- Cross-departmental and international collaboration -Cybercrime
Business/IT Risk -Budget
-Potential benefits
Operational Efficiency Introduction The Challenge Future Investment Conclusion/Summary Slide Structure -Innovative Ideas

-Reduce costs
-Competitive business advantage CIOs Strategy Directors Marketing Directors CFOs Innovation Directors CEOs The Future 1. Himself 2. Key Message of the Lecture 3. Capgemini Mission (enabling transformation) and Vision 4. Services and Sectors 5. Capgemini (Global Workforce) 6. His work (HMRC) Risk vs Operational Efficiency Details of 3 main challenges Efficient investment to beat cyber crime We support over 1,500 technologies
Over 1,000 business applications 20 million citizens & residents access HMRC’s on-line services
We run over 600 systems on over 7000 servers many real time, many requiring 99.999% availability
We run systems protecting citizen data ranging from UNCLASSIFIED to SECRET 80,000 HMRC staff
2 ‘agencies’
700 locations, (incl ships) 4m Enterprises Our Customers HMRC - UK Department for Revenue (tax) and Customs (freight, duty) © 2010 Capgemini. All rights reserved. Our Credentials In Cyber Security 65m National Insurance Records Our Services 90,000 desktops supported across approx 700 sites
8,000 laptops with hard disk encryption, 10,000 printers
1,000 local File and Print servers 25m UK Citizens Tone Speed We support over 1,500 technologies
Over 1,000 business applications 20 million citizens & residents access HMRC’s on-line services
We run over 600 systems on over 7000 servers many real time, many requiring 99.999% availability
We run systems protecting citizen data ranging from UNCLASSIFIED to SECRET 80,000 HMRC staff
2 ‘agencies’
700 locations, (incl ships) 4m Enterprises Our Customers HMRC - UK Department for Revenue (tax) and Customs (freight, duty) © 2010 Capgemini. All rights reserved. Our Credentials In Cyber Security 65m National Insurance Records Our Services 90,000 desktops supported across approx 700 sites
8,000 laptops with hard disk encryption, 10,000 printers
1,000 local File and Print servers 25m UK Citizens The Key Principles of Cyber Security:

Identify and secure the IT assets themselves.
Build a hard-nosed culture of security.
Pay close attention to application security.
Check and double-check user identity.
Get smart about mobile device security.
Develop acute situational awareness. “ What can enterprises do to protect themselves from Cyber-Crime?”
 
Accenture recommends a proactive approach, focused on anticipating new threats, identifying security elements that can address those threats and weaving those features throughout the enterprise.
Consumer Cybercrime Costs the UK economy more than £1.8 billion
566 million victims
1.5 million become Cyber Crime victims every day
15 per cent of social network users reported someone had hacked into their profile and pretended to be them
31 per cent of mobile users received a fake text messages to retrieve a “voicemail”
27 per cent report having been notified to change their password for a compromised email account Annual Norton Cybercrime Report 2012 The Symantec’ predicts about the top five threats in the cyber security next year (2013):
 
1) 'Saber rattling'
2) 'Ransomware'
3) 'Madware'
4) Threats against social networks
5) Mobile and the cloud services ”” – Cyber Crime will become "the norm" in 2013 - with conflicts between nations,
organisations and individuals playing a key role in the cyber world. “”
(Kevin Haley)
Symantec director of Security Computer Security Software Corporation Oxford Dictionary (US National Institute for Standards and Technology (NIST)) NCC Group reports:

Hacking attempts will pass one billion in the final quarter of 2012. Contents Who is Mike Turner?
Who is Capgemini?
What is Cyber Security?
Past Cases
Future of Cyber crime

Structure/Style
Evidence
Assumptions
What did he miss?
Do we agree?
Conclusion Summary ... but use animations to help  The conclusions of the 2011-2012 report:
  Assumptions On slide 6, Mike has CSR on his slide with no explanation of what it is.

He assumes the audience know what the terms phishing, botent and trojans are on slide 9. 1970, bomb in Wisconsin destroys $16 million of data
25 years of research was lost 2004 ChoicePoint lost 130,000 peoples data, fines $15 million
5,000 cases of identity fraud were reported as a result of this attack 2007 T K Maxx lost 45,000,000 credit card details, considered the first large attack on the public
45 million debit and credit card users at risk 2010 The stuxnet worm released, Open source the most costly virus ever.
cost an estimated $1 million to design
Capable of causing physical damage to nuclear power plants
Can be modified and re released due to open source nature Mike varied his speed of his voice from really fast to really slow, the could be viewed as off putting and distracts the audience from the content
The lecture started off very slow which meant the start was hard to get into
Doesn't allow much time for the audience to think about his points
Finished just under 40 minutes in He projected his voice
Understandable

Voice quite drowning
Voice wasn't lively and upbeat to grab attention
His longer sentences lacked flow Who is Mike Turner?
Who is Capgemini?
What is Cyber Security?
Past Cases
Future of Cyber crime

Structure/Style
Evidence
Assumptions
What did he miss?
Do we agree?

Conclusion There will always be a need to have firms to combat cyber crime
Cyber security will continue to be a massive topic What he missed Do we Agree? Cyber security will continue to be important as our society becomes more dependent on technology
Combined business skills and technology needed

But informative nature made it difficult to disagree/agree Business minded view
Cyber espionage

But it was a broad topic ?
Full transcript