it governance committee meeting may 15, 2008 tidbits of information
TRANSCRIPT
ITGOVERNANCE COMMITTEE MEETINGMay 15, 2008
Tidbits of Information
WHO IS PROVIDING WIRELESS COVERAGE FOR THE OLYMPICS?
Beijing Metro Chooses Andrew for Wireless Coverage In Advance of Olympics
CommScope
700
MHz
Channels 52 to 69
Reserve Bid $4.6 Billion
Bidders: AT&T, Google, and Verizon
“open access”
Public Safety Access
Verizon $4.7 Billion
Linux
Vista“open applications”
7
•
Tidbits that make you think or sweat!
• The cost of a GigaByte of storage in 2007 was $.50.
• It costs less to store 50 pages of printed text than the paperclip to hold them together.
• In two to three years the iPod could have the capacity to store every song ever recorded.
• 281 exabytes of information was created in 2007, that is 48 GB for every person across the globe.
• The cost of a transistor today is .000001 cent.
Tidbits that make you think or sweat!
• RFID chips are the size of a grain of salt. • Technology exists in the Research Triangle to
detect a tumor the size of that grain of salt. • The US is 14th in the world in average
broadband speed and 26th in coverage. • Approximately 1/3 of Catawba County citizens
do not have affordable broadband coverage.
Tidbits that make you think or sweat!
• And what if they detect the tumor? • It would take years at today’s broadband
speeds in the US to send the image to your doctor.
ITGOVERNANCE COMMITTEE MEETINGMay 15, 2008
Information Security
26%Percent of identity theft attributed to government.
They don’t know if it was stolen or destroyed in traffic
$350Average cost of clean up per account.
Does not include onsite resources.
10%Number of Public Access Points
that are not really Public Access Points
USBOne of the two biggest sources.
1Number of incidences reported to CC.
$$$$$$$FINANCIALLY MOTIVATEDNo more glory in hacking, undetected, thief in the night ……………..
ISSUES MOVING TO THE FOREFRONT
ISSUES.
ISSUES.
ISSUES.
ISSUES.
The new personal computer…..
The simple cell phone is a relic
Laptops replace desktops
personal use / business use
No Well Defined Slots
Work is an Activity, Not a Place
Old Rules Become Unrealistic
Trusting People
What is attached to the network?What is the employee really doing?Programs?Stored Data?
Mobile Computer Equipment Policy
Not enough but helpful.
???What about your service providers?........
Insurance/benefits………
Are they carrying your employees around on a laptop?...
???Where’s the data?........
BRIC….. What about something
as simple as Anti-Virus software?........ Is it up-to-date?
Exercise/Discussion
• Do you work with an application vendor?• Does this vendor have access to your system?• Does the vendor abide by strict security
practices?• Where is your data stored?• Who has access to it?
• Shut down accounts• Email• Network Access• Phone System
• Secure equipment• Secure data stored on remote/mobile equipment• Make sure public record files are obtained• Signed statement that all data has been returned
Termination……
Self Organizing Groups
• 4 groups• One person with laptop• Same size (within 1)• Equal area representation• Pick a spot and setup a work area
Groups• Employees• Citizens• Vendors• Crooks
Information Leakage
EmployeeWhat could
you do or fail to do to cause
information theft?
Remember, you represent all employees.
CitizenWhat could you do to
cause your information to be exposed?
You represent the public.
VendorHow could you
be putting employee’s
and the public’s data at risk? You represent all
vendors we do business with,
large and small.
CrookHow might you steal
information from the
county? Okay, you know who you represent.
???????WHAT CAN WE DO TO PROTECT THE PUBLIC’S DATA AND EMPLOYEE DATA?
???????????????????????????????????……………..
ITNEXT MEETING – JUNE 19THMeeting Time: 1:30 – 3:30