Top Banner
I GOVERNANCE COMMITTEE MEETING February 19, 2008
31
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: IT GOVERNANCE COMMITTEE MEETING February 19, 2008.

ITGOVERNANCE COMMITTEE MEETINGFebruary 19, 2008

Page 2: IT GOVERNANCE COMMITTEE MEETING February 19, 2008.
Page 3: IT GOVERNANCE COMMITTEE MEETING February 19, 2008.

ITGOVERNANCE COMMITTEE MEETINGFebruary 19, 2008

Page 4: IT GOVERNANCE COMMITTEE MEETING February 19, 2008.

PROJECT UPDATEWhat’s going on in Catawba County……………..

Page 5: IT GOVERNANCE COMMITTEE MEETING February 19, 2008.

PROJECT UPDATEWhat’s going on in Catawba County……………..

• E911 Telephone Replacement• E911 CAD Upgrade• E911 Mapping Project• AVL and Mobile for EMS and Law Enforcement• Emergency Services Badging• Maintenance Work Order System• Unified Payment System

Page 6: IT GOVERNANCE COMMITTEE MEETING February 19, 2008.

PROJECT UPDATEWhat’s going on in Catawba County……………..

• eConnect/Tidemark Replacement• Tax Mapping Project• Land Records Upgrade• Internet Bandwidth Increase• Wireless Connectivity• Firewall Upgrade• SAN Expanded• CAS (Citizens Alert System)

Page 7: IT GOVERNANCE COMMITTEE MEETING February 19, 2008.

PROJECT UPDATEWhat’s going on in Catawba County……………..

• Local Update of Census Addresses(LUCA)• PeopleSoft Enterprise Initiative– Special Needs/Critical Care Database– Portal Implementation– Workflow Implementation– Online Expense Reporting

• Day to Day – Keep it Running• Webpage…….Update…….Again………

Page 8: IT GOVERNANCE COMMITTEE MEETING February 19, 2008.

???????PROJECT UPDATEWhat’s going on in Catawba County……………..

Page 9: IT GOVERNANCE COMMITTEE MEETING February 19, 2008.

ViewNew York City Headquarters

in the Positive

Page 10: IT GOVERNANCE COMMITTEE MEETING February 19, 2008.

Reception……………..

Page 11: IT GOVERNANCE COMMITTEE MEETING February 19, 2008.

Cafe

teria

Page 12: IT GOVERNANCE COMMITTEE MEETING February 19, 2008.

snack stations throughout

Micro kitchens &

Page 13: IT GOVERNANCE COMMITTEE MEETING February 19, 2008.

Writer Elizabeth Gilbert talks

about her latest book Eat, Pray, Love

Page 14: IT GOVERNANCE COMMITTEE MEETING February 19, 2008.

Office Space…………..

Page 15: IT GOVERNANCE COMMITTEE MEETING February 19, 2008.

Massage chair………….

…………………….in gaming area

Page 16: IT GOVERNANCE COMMITTEE MEETING February 19, 2008.

Google Engineer of the Future

Creativity training……….

Page 17: IT GOVERNANCE COMMITTEE MEETING February 19, 2008.

Bouncing an exercise ball….

Page 18: IT GOVERNANCE COMMITTEE MEETING February 19, 2008.

Work Space…………..

Page 19: IT GOVERNANCE COMMITTEE MEETING February 19, 2008.

Massages too??????

Page 20: IT GOVERNANCE COMMITTEE MEETING February 19, 2008.

ViewWhat can we learn from ……

in the Positive

Page 21: IT GOVERNANCE COMMITTEE MEETING February 19, 2008.

MOBILE COMPUTER EQUIPMENT POLICY

Protecting Our Resources……………..

Page 22: IT GOVERNANCE COMMITTEE MEETING February 19, 2008.

The new personal computer…..

The simple cell phone is a relic

Laptops replace desktops

personal use / business use

Page 23: IT GOVERNANCE COMMITTEE MEETING February 19, 2008.

Government Attack Trends from 2007

• Government accounted for 26 percent of data breaches that could lead to identity theft.

• Of the potential infections by the top 50 malicious code samples, 65 percent were threats to confidential information.

• The primary cause of data breaches that could lead to identity theft was the theft or loss of a computer or other medium used for data storage or transmitting , such as a USB key.

• Hacking was responsible for 73 percent of identities exposed during the period.

• 36% of the top attacks were SMTP-based.

• 46% of malicious code that propagated did so in email attachments

www.symantec.com/ISTR2007

Page 24: IT GOVERNANCE COMMITTEE MEETING February 19, 2008.
Page 25: IT GOVERNANCE COMMITTEE MEETING February 19, 2008.

They don’t know if it was stolen or destroyed in traffic

Page 26: IT GOVERNANCE COMMITTEE MEETING February 19, 2008.
Page 27: IT GOVERNANCE COMMITTEE MEETING February 19, 2008.

Implications……• Government records are a big source of identity

threat and we must recognize that fact.• Good policies and procedures are needed for all

devices. Mobile devices offer additional security challenges.

• Mobile devices require special security training.• Training in security practices needs to be

ongoing.• Security practices will at times be a burden but

users must understand the importance.

Page 28: IT GOVERNANCE COMMITTEE MEETING February 19, 2008.

MOBILE COMPUTER EQUIPMENT POLICY

Reviewing the Draft……………..

Issues

Page 29: IT GOVERNANCE COMMITTEE MEETING February 19, 2008.

?Reviewing the Draft……………..

•Hands-free devices, how do they fit in? (ie, inspectors with cell phones)•Streaming of non-business related news, music, ballgames – Should it be added•Employees sharing equipment on an infrequent basis.•Guest speakers using equipment•“Employee use cannot be in violations with good public policy or employment” What does that mean?

DOES THE POLICY ADDRESS THE ISSUES?

Page 30: IT GOVERNANCE COMMITTEE MEETING February 19, 2008.

DOES THE POLICY ADDRESS THE ISSUES?

Reviewing the Draft……………..

Issues

Page 31: IT GOVERNANCE COMMITTEE MEETING February 19, 2008.

ITNEXT MEETING – MARCH 20THNotice the Time Change: 2:30

Time Change for April: 1:30 – 3:00

TIME CHANGE FOR APRIL 17TH