keys to the kingdom: the importance of digital security
TRANSCRIPT
![Page 1: Keys to the Kingdom: The Importance of Digital Security](https://reader033.vdocument.in/reader033/viewer/2022051720/58adc5731a28ab56468b5ce7/html5/thumbnails/1.jpg)
Keys to the Kingdom
Creating a System of Protection
Presented By: Christina Wallace, William Wallace, PaulyTighe, Don Curtis and John Conner
![Page 2: Keys to the Kingdom: The Importance of Digital Security](https://reader033.vdocument.in/reader033/viewer/2022051720/58adc5731a28ab56468b5ce7/html5/thumbnails/2.jpg)
Retail
![Page 3: Keys to the Kingdom: The Importance of Digital Security](https://reader033.vdocument.in/reader033/viewer/2022051720/58adc5731a28ab56468b5ce7/html5/thumbnails/3.jpg)
Establishing Controls
Polices set by company executives and management
![Page 4: Keys to the Kingdom: The Importance of Digital Security](https://reader033.vdocument.in/reader033/viewer/2022051720/58adc5731a28ab56468b5ce7/html5/thumbnails/4.jpg)
Internal Controls
1 Employee
ID
2Access Control
3Name Tags
![Page 5: Keys to the Kingdom: The Importance of Digital Security](https://reader033.vdocument.in/reader033/viewer/2022051720/58adc5731a28ab56468b5ce7/html5/thumbnails/5.jpg)
Internal Controls
Monitor Sales
Track Hours
Differentiate Employees
1 Employee
ID
![Page 6: Keys to the Kingdom: The Importance of Digital Security](https://reader033.vdocument.in/reader033/viewer/2022051720/58adc5731a28ab56468b5ce7/html5/thumbnails/6.jpg)
Internal Controls
Limited Access
Accurate Accounting
Organization
2Access Control
![Page 7: Keys to the Kingdom: The Importance of Digital Security](https://reader033.vdocument.in/reader033/viewer/2022051720/58adc5731a28ab56468b5ce7/html5/thumbnails/7.jpg)
Internal Controls
Identifies Employees
Compartmentalizes
Denotes Positions
3Name Tags
![Page 8: Keys to the Kingdom: The Importance of Digital Security](https://reader033.vdocument.in/reader033/viewer/2022051720/58adc5731a28ab56468b5ce7/html5/thumbnails/8.jpg)
Financial Services
![Page 9: Keys to the Kingdom: The Importance of Digital Security](https://reader033.vdocument.in/reader033/viewer/2022051720/58adc5731a28ab56468b5ce7/html5/thumbnails/9.jpg)
Establishing Controls
Polices set by company in accordance with SEC
Standards
![Page 10: Keys to the Kingdom: The Importance of Digital Security](https://reader033.vdocument.in/reader033/viewer/2022051720/58adc5731a28ab56468b5ce7/html5/thumbnails/10.jpg)
Internal Controls
1 Checks & Balance
2File
Reviews
3Check Logs
![Page 11: Keys to the Kingdom: The Importance of Digital Security](https://reader033.vdocument.in/reader033/viewer/2022051720/58adc5731a28ab56468b5ce7/html5/thumbnails/11.jpg)
Internal Controls
Local Office Oversight
National Oversight
Reports and Notes
1 Checks & Balance
![Page 12: Keys to the Kingdom: The Importance of Digital Security](https://reader033.vdocument.in/reader033/viewer/2022051720/58adc5731a28ab56468b5ce7/html5/thumbnails/12.jpg)
Internal Controls
Internal Review
Independent Audit
Annual Review
2File
Reviews
![Page 13: Keys to the Kingdom: The Importance of Digital Security](https://reader033.vdocument.in/reader033/viewer/2022051720/58adc5731a28ab56468b5ce7/html5/thumbnails/13.jpg)
Internal Controls
Track Possession
Accountability
Safeguard
3Check Logs
![Page 14: Keys to the Kingdom: The Importance of Digital Security](https://reader033.vdocument.in/reader033/viewer/2022051720/58adc5731a28ab56468b5ce7/html5/thumbnails/14.jpg)
Law Enforcement
![Page 15: Keys to the Kingdom: The Importance of Digital Security](https://reader033.vdocument.in/reader033/viewer/2022051720/58adc5731a28ab56468b5ce7/html5/thumbnails/15.jpg)
Establishing Controls
Policies set by Police Chief
![Page 16: Keys to the Kingdom: The Importance of Digital Security](https://reader033.vdocument.in/reader033/viewer/2022051720/58adc5731a28ab56468b5ce7/html5/thumbnails/16.jpg)
Internal Controls
1 Internal Affairs
2Police
Reports
3Evidence Handling
![Page 17: Keys to the Kingdom: The Importance of Digital Security](https://reader033.vdocument.in/reader033/viewer/2022051720/58adc5731a28ab56468b5ce7/html5/thumbnails/17.jpg)
1 Internal Affairs
Internal Controls
Complaint Initiated
Investigation
Verdict Delivered
![Page 18: Keys to the Kingdom: The Importance of Digital Security](https://reader033.vdocument.in/reader033/viewer/2022051720/58adc5731a28ab56468b5ce7/html5/thumbnails/18.jpg)
Internal Controls
Major/Minor Disturbance
Officer’s Activities
Reviewed by Superiors
2Police
Reports
![Page 19: Keys to the Kingdom: The Importance of Digital Security](https://reader033.vdocument.in/reader033/viewer/2022051720/58adc5731a28ab56468b5ce7/html5/thumbnails/19.jpg)
Internal Controls
Evidence Collection
Evidence Handling
Evidence Storage
3Evidence Handling
![Page 20: Keys to the Kingdom: The Importance of Digital Security](https://reader033.vdocument.in/reader033/viewer/2022051720/58adc5731a28ab56468b5ce7/html5/thumbnails/20.jpg)
Naval Special Warfare
![Page 21: Keys to the Kingdom: The Importance of Digital Security](https://reader033.vdocument.in/reader033/viewer/2022051720/58adc5731a28ab56468b5ce7/html5/thumbnails/21.jpg)
Establishing Controls
Policies set by Commanding Officer in accordance with
DOD Policy
![Page 22: Keys to the Kingdom: The Importance of Digital Security](https://reader033.vdocument.in/reader033/viewer/2022051720/58adc5731a28ab56468b5ce7/html5/thumbnails/22.jpg)
Internal Controls
1 Access
2Info
Storage
3Inspect
![Page 23: Keys to the Kingdom: The Importance of Digital Security](https://reader033.vdocument.in/reader033/viewer/2022051720/58adc5731a28ab56468b5ce7/html5/thumbnails/23.jpg)
Internal Controls
Getting onto Base
Security Badge
Watch
1 Access
![Page 24: Keys to the Kingdom: The Importance of Digital Security](https://reader033.vdocument.in/reader033/viewer/2022051720/58adc5731a28ab56468b5ce7/html5/thumbnails/24.jpg)
Internal Controls
Removable Hard Drives
Shared Drives
External Memory
2Info
Storage
![Page 25: Keys to the Kingdom: The Importance of Digital Security](https://reader033.vdocument.in/reader033/viewer/2022051720/58adc5731a28ab56468b5ce7/html5/thumbnails/25.jpg)
Internal Controls
Internal
External
Evaluation
3Inspect
![Page 26: Keys to the Kingdom: The Importance of Digital Security](https://reader033.vdocument.in/reader033/viewer/2022051720/58adc5731a28ab56468b5ce7/html5/thumbnails/26.jpg)
Air Squadron
![Page 27: Keys to the Kingdom: The Importance of Digital Security](https://reader033.vdocument.in/reader033/viewer/2022051720/58adc5731a28ab56468b5ce7/html5/thumbnails/27.jpg)
Establishing Controls
Polices set by Command level authority
![Page 28: Keys to the Kingdom: The Importance of Digital Security](https://reader033.vdocument.in/reader033/viewer/2022051720/58adc5731a28ab56468b5ce7/html5/thumbnails/28.jpg)
Internal Controls
1 Manuals
2Checklist
3Contain
![Page 29: Keys to the Kingdom: The Importance of Digital Security](https://reader033.vdocument.in/reader033/viewer/2022051720/58adc5731a28ab56468b5ce7/html5/thumbnails/29.jpg)
Internal Controls
Establish Procedures
Safety Regulations
Review Process
1 Manuals
![Page 30: Keys to the Kingdom: The Importance of Digital Security](https://reader033.vdocument.in/reader033/viewer/2022051720/58adc5731a28ab56468b5ce7/html5/thumbnails/30.jpg)
Internal Controls
Identify Concerns
Offers Alternatives
Stringent Audit
2Checklist
![Page 31: Keys to the Kingdom: The Importance of Digital Security](https://reader033.vdocument.in/reader033/viewer/2022051720/58adc5731a28ab56468b5ce7/html5/thumbnails/31.jpg)
Internal Controls
Handling Hazards
Safety Equipment
Disposal
3Contain
![Page 32: Keys to the Kingdom: The Importance of Digital Security](https://reader033.vdocument.in/reader033/viewer/2022051720/58adc5731a28ab56468b5ce7/html5/thumbnails/32.jpg)
Just One More
Thing…