Home
Search results “Information security and human resources”
Human Resources - Domain 5 - Information Security & Privacy Program
 
03:36
The Information Security & Privacy Program's Human Resources domain focuses on people -- 38,000+ employees, including academic, staff, medical residents, and temporary workers -- all of whom have a fundamental role in information security and privacy.
Views: 224 Protect IU
Human resource security requirements in ISO 27001 implementation
 
28:23
Annex A 7 of the ISO/IEC 27001 implementation - What are the requirements for the human resource security? We want to make sure that our employees and contractors understand their responsibilities and are suitable for the roles for which they are considered. What is the implementation guidance they should follow? Main points that have been covered are: • Implementation guidance • Management responsibility • Education and training in regards to the Information Security • Disciplinary process Presenter: Mr. Chandra Mohan Govindarajula’s record includes 10+ years of working experience as an Implementer, Lead Auditor, Trainer & Consultant. Chandra has worked in some big companies as a Lead Auditor, Trainer and Technical expert (i.e. TUV Rheinland, TUV India Private Limited). Currently, Chandra is working as a Lead - Information Security at ValueLabs LLP. Organizer: Ardian Berisha Date: December 14, 2016 Slides of the webinar: http://www.slideshare.net/PECBCERTIFICATION/human-resource-security-requirements-in-iso-27001-implementation ------------------------------------------------------------------------------- Find out more about ISO/IEC 27001 Information Security Management standard: Training: https://pecb.com/iso-iec-27001-training-courses Webinars: https://pecb.com/webinars Article: https://www.pecb.com/article/auditing-information-security Whitepaper: https://www.pecb.com/whitepaper/isoiec-27005-information-technology--security-techniques-information-security-risk-management ------------------------------------------------------------------------------- For more information about PECB: Website: https://pecb.com LinkedIn: https://www.linkedin.com/company/pecb Google +: https://plus.google.com/+PECBGroup Facebook: https://www.facebook.com/PECBInternational YouTube: https://www.youtube.com/PECBGroup Slideshare: http://www.slideshare.net/PECBCERTIFICATION
Views: 903 PECB
HRIS Security
 
03:11
Information privacy and security are particularly important issues for HRIS because unlike many other organizational systems, an HRIS includes a great deal of confidential data about employees.
Views: 570 Gregg Learning
Information Security Training Topics
 
05:13
Check out this presentation to explore and learn more about information security training topics.
Views: 529 CommLab India
Thinking About Cybersecurity for Human Resources Professionals
 
59:05
We are pleased to present a webinar concerning cybersecurity with Isaac Allman and Jack Graham of Wilson Worley PC. In this presentation, we will cover: 1. Cybersecurity issues as they relate to business/employment law Bring Your Own Device policies Access and Usage policies Company-owned equipment Insurance--needs and considerations 2. Public Relations--suggestions for media requests and inquiries Common point of contact Legal requirements Containment of information Communications with your staff
Views: 41 hrsimple
The Human Resource Security Policy
 
04:39
The HR or Human Resource Security Policy The HR, or Human Resource Security Policy, is something quite misunderstood by companies. We think we have HR policies, training and orientation, so those are the same or we don’t need this policy. I'm going to share some of the questions and reasons for the HR Security Policy: 1.Why do we background check people and to what degree? 2.Why is there a separate Information Security Awareness Training? 3.Why do specialized jobs need specialized Information Security training? 4.Why are terminations as important as hiring? FIRST - Why do we background check people and to what degree? - We handle lots of confidential, classified, restricted and encrypted (sometimes unencrypted) data. We background check people based on the level of classification of the data they will handle. Think about it, even your receptionist may handle more than confidential data on some occasion. We want to be sure of the background of the people handling our data or our customers data. And by the way, our customer’s may ask too! SECOND - Why is there a separate Information Security Awareness Training? –because there are specific ways we are required or would like or are required to have our data and processes handled. We need to train them on the how. THIRD - Why do specialized jobs need specialized Information Security training? –because there are jobs that touch code, encrypted or unencrypted data and we want them trained on EXACTLY what is required or we expect! FORTH - Why are terminations as important as hiring? –because if there is a termination for cause, we don’t want that person to have access for ONE MINUTE longer than they are under our employ, AND we want no accounts to accidentally be left open for a possible future breach. So, what do you need to do: 1.Establish simple rules: background check type and for whom, training type and for whom, termination processes for all accounts 2.Create simple ideas of procedures follow those subjects 3.Compare those simple rules against the push back your culture, people or vendors may have 4.Determine what you are or are not willing to do 5.Compare that to your standards, compliance or regulatory requirements 6.Gain agreement with Senior staff 7.Make it a policy 8.Teach your employees that it’s a policy and ensure they follow through! Now, anywhere along the way, if you need assistance or this doesn’t make sense to you, reach out to ADHERE. We’re experts on helping you establish policies that are appropriate! Rauchus by Twin Musicom is licensed under a Creative Commons Attribution license (https://creativecommons.org/licenses/by/4.0/) Artist: http://www.twinmusicom.org/
Views: 87 ADHERE Inc.
Cyber Security and HR
 
02:29
Cyber security may not seem like an issue for HR professionals, and you may think your IT staff is solely responsible for protecting your sensitive data. But it’s really a broader management issue, and smart employers recognize the risk of having their systems hacked and see it as a training, re-training, and reminding issue to make sure employees help you protect that information.
Views: 148 Employers Council
ISO 27001 Human Resources Security (Part 11/18)
 
03:07
This section of ISO 27001 sets out the requirements around personnel security. this video explains what this means for an organisation. Find out more at www.certificationeurope.com
Views: 6086 Certification Europe
HRIS (Human resource information system) Manager job description || HRIS Manager life in company
 
01:49
Human resources information systems (HRIS) is system software that automates processes such as payroll information and benefits, and it can also be utilized across a company as a functioning intranet for communications among employees and supervisors. An HRIS manager is in charge of implementing and maintaining the software platforms that facilitate these features for a company. hr systems coordinator hr systems manager salary hr systems project manager human resource information system software human resources information systems degree hr systems officer hr system human resource information system human resource system hr job description sample human resource information systems hr systems administrator jobs hris systems hr systems project manager jobs hr systems manager hr systems job description human resources job description sample human resource information system ppt what does a computer and information systems manager do human resource information system definition hr systems manager job description computer information systems manager hr information system hris program hr information systems hris management types of human resource information system hris program manager hris system administrator salary human resources systems analyst hris systems list human resources manager job posting example of human resource information system what is a systems manager hris management information system what is hris systems hris meaning it system management hr information systems analyst define hris hr systems analyst jobs hris full form human resource management human resources management information system hris experience project management information systems computer and information systems managers hris applications hris definition computer and information systems manager education requirements hr systems administrator job description hr information management hris description hrmanager information technology job duties hris director job description what is human resource information system careers in human resource management hr systems jobs human resources information systems analyst hris functions it manager description hris administrator information systems manager how to become an information systems manager information technology analyst job description functions of human resource information system information about human resource management computer and information systems managers job description it manager roles and responsibilities myhris portal what is hris in hr human resources project manager job description human resource executive job description computer information systems job description hr systems analyst job description information technology manager job description computer analyst job description human resources associate job description hr coordinator job description human resources director job description job description in hrm human resource management description hr manager job description human resource management definition hr supervisor job description director of information technology job description human resources job description for resume information technology administrator job description hris analyst job description hris manager job description computer systems manager technology manager job description information systems security manager job description it manager job description vp of human resources job description hr executive job description information systems manager job description senior human resources manager job description it manager job description and duties business systems manager job description human resources specialist job description human resources job description and duties human resources payroll job description human resources information systems jobs info hr hris project manager management information system definition information technology project manager job description functions of human resource management what is computer and information systems managers hr information information systems job description it systems manager job description management information systems career human resource management skills management information systems salary human resources coordinator job description human resources supervisor job description what is management information system management system definition hr manager information technology manager jobs information systems security job description hris administrator job description it management careers #selfmotivation #hr #jobprofile #selfmotivationchannel #hr #jobdescription
Views: 761 Self Motivation
Human Resources Compliance - Best Practices & Procedures
 
27:11
Managing talent and employee lifecycles can be challenging, but HR compliance is often the area that keeps HR professionals up at night. Paper-based HR departments with manual HR procedures remain commonplace in 2016, but many organizations are quickly pursuing an enterprise information platform such as OnBase to manage HR content electronically and efficiently. Join us for this upcoming 30-minute webinar where we’ll focus on some of these key ideas. Within this webinar, you’ll learn about: - Disaster Recovery - HR Audit Preparedness - I-9 Compliance - Security - HR Policies & Procedures - How to Get Started
Views: 9863 Naviant, Inc.
Human Resource HR Security Controls and Human Resource HR Security Best Practices
 
11:34
Thanks For Watching This Video, I Hope You Must Have Liked It. If yes then please hit the subscribe button as I will be uploading a lot of IT security related training videos on this channel and if you will be my subscriber then you my friend will be the first one who will be notified about all my new videos my friend. If you have any questions for the topic that I have discussed in this video then please feel free to comment my friend and I will be happy to respond back to your queries... Please note that - all ISO 27001 documents and standards are completely owned intellectual property & copyright of ISO. So in case if by any chance you are interested to study more about the standard that I have discussed here then please go to the official ISO website in order to purchase the standards. This channel is only created to generate awareness and best practices for Information Security in general and if by any chance you wish to implement any of the standards that I have discussed here then you have to first purchase them from official ISO website. This channel is only created to help anyone who is currently studying or planning to study about ISMS Information Security Management System ISO 27001 Implementation. I want to make my contribution in the information security community.This channel is only created to generate awareness and best practices for Information Security in general. Disclaimer: Since ISO 27001 is a very vast topic and the implementation varies for all organization's so I can't ever call myself an "expert" in this field, all the knowledge and information that I am sharing here is only based upon my past experience in information security field and may not be directly applicable within your organization as such. So please use your judgement before implementing anything based upon my suggestions. I request you not to rely on anything that I say here, I do my best to be as accurate and as complete information that I can provide you “but” only the published standards are definitive. Only the published ISO standards stand above any information that I have shared in any of my videos. Thanks, Your IT Security Friend Luv Johar Website : http://aajkatech.com/ iso 27001 explained, iso 27001 awareness trainings, iso 27001 free trainings online, Iso 27001 free tutorials, ISO 27001 training material free, lead auditor free training course, lead implementer free training course, ISMS training free, information security management system training free,
The Cyber Skills Gap | Chris Silvers | TEDxElonUniversity
 
18:47
In this talk, Chris Silvers presents thoughts on the technological skills gap from his perspective in the information security industry, in which the gap is causing problems right now. He will overview resources and techniques available to help you on your journey to closing the skills gap in your field, positioning yourself as a valuable member of your community. Chris Silvers, a graduate of the Georgia Institute of Technology, has an MBA from Georgia State University and almost two decades of information security and risk management experience. As an advocate of lifelong learning, he has earned numerous security certifications in the past twenty years. Chris began his information security career while working in the Federal Reserve System. In addition to creating a nation-wide penetration testing group, he lead the incident response team for the Atlanta district. After working in the information security field, Chris founded his own company, C G Silvers Consulting, in 2014. Chris has developed and taught a wide variety of technical security and information security courses for various clients and security conferences. He also runs Open Source Intelligence CTFs at security conferences and speaks at community events about the importance of security to those outside the security industry. This talk was given at a TEDx event using the TED conference format but independently organized by a local community. Learn more at https://www.ted.com/tedx
Views: 48484 TEDx Talks
What Every HR Executive Should Know About Outsourcing and Insourcing Cyber Security
 
03:32
In this interview, Premise Health CISO Joey Johnson discusses balancing Managed Security Service Providers (MSSPs) with in-house security operations.
Views: 279 HR Exchange Network
ISO 27001 Organisation Of Information Security (Part 9/18)
 
03:17
This video explains how he organisation of your information security should be approached. Find out more at www.certificationeurope.com
Views: 5818 Certification Europe
A Brief Explanation of Cybersecurity and Why It Is Important in Business
 
03:28
IT THOUGHT FUNNEL: As an increasing number of daily business activities move online, including advertising, selling, finding new markets, reaching out to customers, recruiting staff, communicating with customers and suppliers or even carrying out financial transactions, it is becoming increasingly important for companies to ensure that no one is attempting to steal their information and money or disrupt business. The above video offers a brief explanation of cybersecurity and why it is important to business. For more on this subject, click here: https://www.techfunnel.com/information-technology/importance-cyber-security-business/ ABOUT: TechFunnel, a web brand of Bython Media, is an ambitious technology media web property dedicated to technology news, product reviews, and analyzing how technology affects business, finance, human resources, marketing, government, and everyday life.
Views: 1452 Bython Media
CETBIX® Risk Assessment and Management Dashboard (ISMS)
 
02:38
This is the CETBIX ISMS Risk assessment and management feature. This comes with the following features, multi-cloud ISMS solution, in-depth data security analysis, business progression, risk analysis, situation awareness, metrics, KPIs, CSF, 3-CETBIX-Approaches, SWOT, PEST, Benchmark, Security Maturity, Score Card, Graphs, Measurements, RACI, Data Classification, Monte Carlos analysis, Penetration Testing Evaluation, Integration control, Documentary, different report templates, Road maps, individual tasks, and Gap Closure. The Cetbix® combines both human intelligence and machine learning for organizations to make smarter decisions using data and analytic. Apart from the Cetbix Risk Assessment and Management, Cetbix has other add on such as : Asset Management; Document Management; Application Management; Vulnerability Management; Data Protection; Human Resource Management. https://www.cetbix.com
Views: 13229 CETBIX COMPANY LIMITED
Domains of ISO 27001Information Security) Standard
 
01:13:18
http://www.techgig.com/expert-speak/IT-Security-Series-Session-7-Domains-of-ISO-27001-Information-Security-Standard-354 Key discussion points: The domains covered by ISO 27001 include Security policy Organization of information security Asset management Human resources security Physical and environmental security Communications and operations management Access control Information systems acquisition, development and maintenance Information security incident management Business continuity management Regulatory compliance
Views: 12499 TechGig
Human resources security - Termination or change of employment
 
02:41
http://ytwizard.com/r/mVqM2j http://ytwizard.com/r/mVqM2j ISO/IEC 27001. Information Security Management System. Learn how your company can protect its information and get certified to ISO/IEC 27001
Views: 2 Content Channel
What is Human Resource Management?
 
01:50
Human Resource Management is the formal systems designed to manage people in an organization. Human resource management is like a pinwheel, the management of people in an organization is at the center of eight functional areas of human resource work. Human resource strategy and planning identifies and manages current and future needs to achieve organizational goals. Compliance is doing what is asked or required by federal, state and local government in the management of people. Talent management are the integrated processes to attract, motivate, and retain productive, engaged employees. Training and development is about the betterment of people and performance through information they will use. Performance management is the processes to ensure the organization connects mission with the work of employees. Total rewards are the financial and non-financial tools used to attract, motivate and retain employees. Safety and health is about ensuring the safety, health and welfare of people at work. Employee and labor relations focus on the relationship of employees with the organization and with each other. This human resource model should give you context to understand and apply the important role human resource management plays in today’s organizations.
Views: 2401 Gregg Learning
Chapter 10, 11, 12, 13, 16, 17 (Specific Topics) - HRIS Audio Lecture
 
02:17:08
THIS IS NOT MEANT FOR E-COMMERCE This is an audio recording for the following topics for the course of Human Resource Information System (HRIS): Chapter 10 - HR Administration and HRIS Self-Service Portals and HRIS (description, advantages and disadvantages) Shared Service Centers and HRIS (description, advantages and disadvantages) Outsourcing and HRIS (description, advantages and disadvantages) Offsourcing and HRIS (description, advantages and disadvantages) Chapter 11 - Talent Management Talent Management and Information Systems Chapter 12 - Recruitment and Selection in Internet Context Recruitment and Technology Online Recruitment Guidelines Selection and Technology Chapter 13 - Training and Development HRIS Applications in Training Chapter 16 - HRIS Privacy and Security Employee Privacy Components of Information Security Chapter 17 - Future of HRIS: Emerging Trends in HRM and IT Future Trends in HRIS Kavanagh, M. J., Thite, M., & Johnson, R. D. (2014). Human Resource Information Systems. SAGE Publications.
ONGC Apprentice Recruitment 2019 Trade, Technician Apprentice Posts | How to join ONGC
 
04:39
Welcome to TECHNICAL SUPPORT BY RAHUL SAHANI ===================================================== All about technical concepts, technical subject , and mobile application. #ongccareers, #ongcrecruitment, #ongc recruitment 2019, #ongcdirector, #ongcsubsidiaries, #ongcmumbai, #ongcshare, Gear up to work with Oil and Natural Gas Corporation Limited (ONGC), a company with a global vision and noble mission to provide the best oil and gas jobs in India. With its diverse and exciting approach to human resource development, it gives an exclusive opportunity for 360 degree learning from peers and seniors through on-the-job experiences. ONGC offers a remuneration package that compares with the best in the Indian Industry in Cost-to-Company terms. It also extends a generous social support system which not only takes care of the employees but also their families. As our organization grows at a fast pace, we invite you to join hands for best PSU and Oil rig jobs in India and undertake a journey to even greater success and build a rewarding career. ====================================================== Multiple career streams available to you in ONGC are: Business Development Corporate Planning Corporate Affairs Marketing Corporate Communication Corporate Social Responsibility Materials Management Civil Exploration & Production Finance Human Resource Legal Operations & Maintenance IT & Information Security Electronic & Communication Petrochemical Projects Onshore/Offshore Engineering Services Research & Development at our 12 world class Institutes Security ====================================================== how to apply ongc company, ongc selection process, ongc joining process, ongc job, ongc diploma job, ongc iti pass job, ongc b.tech job, ongc apprentice vacancy, ongc benefits,ongc iti passout, ongc job oil and natural gas corporation, oil and natural gas corporation, about ongc company, ongc company history ongc recruitment 2019, ongc recruitment 2019 without gate, ongc भर्ती-2019, ongc भर्ती-2019 गुजरात स्टेट, ongc western sector gujarat state recruitment 2019., sarkari naukri, govt jobs, ongc recruitment, ongc recruitment 2019 in assam, ongc recruitment 2019 through gate, ongc recruitment 2019 tamil ongccareers ongcrecruitment ongc recruitment 2019 ongc director ongc subsidiaries ongc mumbai ongc share ===================================================== ------------------------------------------------------------------------------------------------- never forget follow my facebook page link below https://www.facebook.com/Technical-Support-By-Rahul-Sahani-141143686454359/ For more videos please | LIKE , SUBSCRIBE, SHARE, COMMENT |
How to invest and manage cyber security on a budget
 
44:34
A panel discussion facilitated by Tom Cheshire, Sky News Technology Correspondent at the CBI's Cyber Security Conference. Taking part: Nick Wilding, General Manager, AXELOS RESILIA; Jonathan Knight, Chief Operating Officer, Board Intelligence; Andrew Rogoyski, Vice President of Cyber Security, CGI UK; Karen Weatherburn, Director of Human Resources, Northern Powergrid; David Damato, Chief Security Officer, Tanium.
human resource information system (HRIS) PHR SPHR Human Resources License Exam VocabUBee.com
 
01:39
human resource information system (HRIS) database designed specifically for HR functions The general meaning of an information system is a networked computer system that contains relevant information for the business. In HR, the relevant information is information on people, their backgrounds, values, skill sets, tax information, retirement information, performance review information and compliance information. Immediately, security comes to mind. All of these issues require privacy and protection. If security can be guaranteed, then the issue of usability comes into mind. Can the system further the goals of the organization through its people and the people it is trying to attract? Ultimately, information systems are databases. A Human Resource Information System (HRIS) is a sophisticated database for managing specific HR information. Multiple Choice Question human resource information system (HRIS) A hiring detectives to find truth about candidate backgrounds B database designed specifically for HR functions C analyzing external factors which potentially threaten plans D single function software like Word, Excel, and Powerpoint Correct Answer: b If you would like to suggest corrections to this word, email us at [email protected] Thank you. This word appears in the book Vocab-U-Bee PHR SPHR Professional In Human Resources License Exam Top Pass Words PHR and SPHR are registered trademarks of Human Resources Certification Institute Find links to all our playlists at VocabUBee.com Vocab-U-Bee Values: Consistency First, One Small Step Each Day and the 42 Bee March Thank You! and Good Luck!
Views: 4214 Act Level 42
GDPR Fundamentals: Data Security Requirements
 
03:41
Learn more at https://kirkpatrickprice.com/video/gdpr-fundamentals-data-security-requirements/ While GDPR is primarily a data privacy law, it also includes elements of data security. But of course, GDPR is ambiguous so it’s not very prescriptive when it comes to data security requirements for processing personal data. The law requires each organization to evaluate its own data security based risk, processing activities, and its organizational structure. By putting this in the hands of the organization, the organization can determine what’s an appropriate control. organizations are also allowed to consider the ability and resources of an organization to implement a control. Just because a control is a possibility for mitigating risk doesn’t mean that it’s an appropriate control. What’s appropriate for one organization may be too expensive, impractical, or not secure enough for another organization. Appropriate organizational and technical data security controls include risk assessments, encryption, pseudonymization, and documented policies of things like business continuity, physical security, logical access, configuration management, human resources, and management oversight. There should also be a process to monitor and test the effectiveness of data security controls, which is where internal and third-party auditing comes into play. These will serve as an effective way of demonstrating that thought and objectivity has been considered when it comes to what is appropriate for an organization. There have been unofficial attempts to map GDPR requirements to other information security frameworks, but they may be incomplete with respect to data security and privacy elements. Stay Connected Twitter: https://twitter.com/KPAudit LinkedIn: https://www.linkedin.com/company/kirkpatrickprice-llc Facebook: https://www.facebook.com/kirkpatrickprice/ More Free Resources Blog: https://kirkpatrickprice.com/blog/ Webinars: https://kirkpatrickprice.com/webinars/ Videos: https://kirkpatrickprice.com/video/ White Papers: https://kirkpatrickprice.com/white-papers/ About Us KirkpatrickPrice is a licensed CPA firm, PCI QSA, and a HITRUST CSF Assessor, registered with the PCAOB, providing assurance services to clients in more than 48 states, Canada, Asia, and Europe. The firm has over 13 years of experience in information security and compliance assurance by performing assessments, audits, and tests that strengthen information security and internal controls. KirkpatrickPrice most commonly provides advice on SOC 1, SOC 2, PCI DSS, HIPAA, HITRUST CSF, GDPR, ISO 27001, FISMA, and CFPB frameworks. For more about KirkpatrickPrice: https://kirkpatrickprice.com/ Contact us today: 800-770-2701 https://kirkpatrickprice.com/contact/
Views: 198 KirkpatrickPrice
Information Security Management System Improvement-ISO 27001 (Part 6/18)
 
02:51
This video explains the importance of continual improvement with operating an information security management system. Achieving improvements is central and core to getting the value from your management system. Find out more on www.certificationeurope.com
Views: 9197 Certification Europe
Accountri - Accountability Management Software
 
01:12
The white-label SaaS based organizational Accountability tool built with Intelligent Module that integrates Work Orders, Projects, Contracts, Billing, Profitability, Quality, Information Security Controls, Human Resources and Governance
Views: 66 Accountri
HR Basics: Human Resource Information Systems 2e
 
06:53
HR Basics is a series of short courses, designed to highlight what you need to know about a particular human resource management topic. In today’s HR Basics, we explore human resource information systems, technology used to assist the systematic processes that mange people in organizations. Put simply, HRIS systems keep track of your employees and information about them. A Human Resources Information System is a software solution that is used for data entry, data tracking and the data management of an organization's people. HRIS is an abbreviation for Human Resource Information System. HRIS is also known as: HRMS - Human Resource Management System, HCMS - Human Capital Management System, or HRIMS - Human Resource Information Management System. To understand the key role human resource technology plays, you need to understand data, information, and knowledge in organizations. Data is critical to an organization. Data represent the “facts” of transactions that occur on a daily basis. Information, on the other hand, is the interpretation of these data. Knowledge is information that has been given meaning. Human Resource Information systems help organizations efficiently and effectively complete administrative and operational tasks to focus time and energy on linking human resource stagey with organizational mission and the work of people in the organization. HRIS furthers the strategic focus on present day human resource management.
Views: 523 Gregg Learning
2009-10-21 CERIAS - Information Security Management and IT Executives in a Top Management Team
 
46:41
Recorded: 10/21/2009 CERIAS Security Seminar at Purdue University Information Security Management and IT Executives in a Top Management Team Juhee Kwon, Purdue University As information assets have become a critical factor for enterprises to stay competitive, there is an increasing awareness of information security management. However, they are easily overlooked by those who focus only on the IT side, failing to see that human resources and policies are the most likely cause of information risks, which need to become real enterprise-wide and strategic issues. This paper examines the impacts of an IT executive�s structural status in Top Management Teams (TMTs) on information security risk management. E-Business has made it imperative for IT executives to adopt cross-functional roles due to the increased importance of securing and managing risks to information assets across the enterprise. Therefore, IT executive representation and status in a TMT is necessary to strategically and operationally conduct liaison activities between IT groups and other business units. However, there is little empirical research examining the effects of IT executives� structural status on managing information security risks. We employ logistical regression to examine the data from 2003 to 2008 with information security breach reports and executive compensation data. We augment this data with IT internal controls information provided by external auditors. Our results demonstrate high IT executive engagement and fair compensation are associated with reduced levels of both IT internal controls weaknesses and reported information security breaches. Second, we find that pay dispersion in a TMT increases the probability of information security breaches, while IT executive turnover is not significantly associated with breaches. As a comprehensive analysis across the accounting, human resources, and information systems literature, this study gives firms new insights into how they set IT executive compensation strategies as well as delegate authority and responsibility for ensuring confidentiality, integrity, and availability of information assets. Juhee Kwon is currently a Ph.D. candidate of Management Information Systems at Krannert School of Management, Purdue University. Her primary research interests cover Information Security and Privacy. Although the primary interest is in information security, her research interest spans e-Commerce, Accounting Information Systems, and Telecommunication with cross-selling. (Visit: www.cerias.purude.edu)
Views: 359 ceriaspurdue
User Awareness - The Big Security Challenge, today.
 
28:04
Topic Abstract: He is speaking about, User Awareness: The big security challenge, today! Every day we find news and about one or more information security flaws. A personnel information or a business data lost or stolen, virus, malwares, hackers, etc. Day after day, the Information Security professionals need to be more proactive and efficient. Even when this is the reality for most of us, a number of organizations are not considering the value of employees (and human resource in general) being aware in terms of information security. This webinar is meant to wake up the security professionals, and to remember them, that the most efficient firewall are users with security awareness; and that even the most advanced electronic device, with the latest generation technologies, is nothing before a combination of a threat and a user without security knowledge. We will understand the threats and determine how we can proceed in order to mitigate them. Speaker Bio: Sergio Pohlmann is a Computer Engineer, Experienced in the IT area since the 80’s. He was a security consultant to various banks and business, and the principal teacher of multiple disciplines of the National University in Paraguay, where he lived for seventeen years. In the year 2016 he returned to Brazil, his country.
Views: 333 EC Council
“The Challenges of Hiring Good Cyber Security Personnel in Today’s Workforce”
 
53:33
Miguel Rivera, Program Manager at the Human Resources Command of Excellence in the Personnel Information Systems Directorate (PERSINSD) speaks on the challenges of attracting and retaining quality cyber security personnel in today's marketplace. From May 27, 2016 KYISC2 Meeting.
Views: 26 Ky Infosec
16 ISO 27001 2013 A7 HR security Part 1
 
11:51
This video focuses on the annexure controls of ISO 27001:2013 standards. The annexure control A7 relates to 'Human Resource Security'. Ref: http://www.ifour-consultancy.com http://www.ifourtechnolab.com Custom software development companies #ISO #SoftwareDevelopmentCompanies #CustomEcommerceServiceProvider #CustomeCommerceWebsiteDevelopment
Views: 934 Hitarth Shah
Manage Your Human Resource (HR) Department - Paperless Processes and Workflow  Automation
 
35:31
Paper-based Human Resource departments with manual processes remain commonplace. Shuffling through the piles of content associated with each employee, applicant, policy, handbook, etc. is annoying, time-consuming, and inefficient. Worst of all – can you say, with 100% certainty, your documents are in compliance? Are confidential files secure? Don’t let work keep you up at night anymore. Feel confident in your personnel document management with the security, organization, and efficiency an OnBase Human Resource solution can provide you. In return, you will have more time and energy in your day to focus on employee satisfaction and engagement throughout your organization. This video focuses on managing the lifecycle of an employee, HR compliance made easy, and secure employee documentation. Pre-Employment Document Sharing and Employee Onboarding Using a cloud-based document sharing solution like Hyland's ShareBase, you are able to securely share content with employees inside and outside of your organization. This allows you to easily share pre-employment documentation. As the HR Manager, you are able to create a secure link (can even be password protected) to send to send important documentation to new employees, manage the read/edit capabilities of the document, as well as create an expire period for the link to make sure documents are not out for too long. The best part is the ability to sync with ECM HR workflow to send out automatic notifications, quickly see what documents or steps are completed and what still needs to be followed-up on. Personnel Data Storage A paperless HR system allows you to manage all employee files digitally. It is essentially a digital filing cabinet, but with many benefits over the clunky, space consuming, filing cabinets you may be using today. You can set up security to restrict certain documents from others to see and allow managers to access the non-confidential pieces that they may need. All documents are assigned a date and this makes it much easier to follow a document retention protocol with a paperless HR solution. Document Review Compliance Document management for human resources like distributing and tracking all policies, procedures, notifications, and legal notices has historically been a massive headache and worry over compliance. With an HR document management software, you are able to distribute these types of documents electronically to employees. Employees will receive an email notification with a link to review the document you sent. The employee then clicks the link, reviews the document, and needs to mark the document as acknowledged. This whole paperless human resources process makes it much easier for your team to manage the distribution and compliance of important information. Performance Management Create digital performance reviews to be completed annual or quarterly, or whatever works for your organization with managers and their employees. This paperless process helps keep records of these conversations in one central and secure location making it easier to manage and keep track of employee performance reviews. An ECM HR solution also provides notifications and reminders automatically to managers taking the administration of these reviews off of your plate. Departures Employee departures can be a sensitive time for employees and employers. You can create an employee departure checklist in your HR records management software to make sure you complete all necessary steps every time. You can document what the tasks are as well as who completed them and on what date. An HR workflow for your departures can automatically send notifications to all people necessary to complete a departure and again, insurance that you have completed all necessary tasks.
Views: 257 Naviant, Inc.
3 Things You Should Know About Cyber Security Insurance
 
02:19
FINANCE THOUGHT FUNNEL: With numerous reports of cyber security threats and data breaches, cyber security insurance has become a necessary and vital tool to assist companies in warding off or quickly recovering from destructive and damaging attacks. Although there are financial benefits to cyber security insurance, there are specific things to take into consideration when choosing one plan over another. For more on this subject, click here: https://www.techfunnel.com/information-technology/3-things-know-cybersecurity-insurance/ ABOUT: TechFunnel, a web brand of Bython Media, is an ambitious technology media web property dedicated to technology news, product reviews, and analyzing how technology affects business, finance, human resources, marketing, government, and everyday life.
Views: 45 Bython Media
Cyber Beat Live: I'm In! When insiders threaten our security
 
57:12
How does your organization work to prevent insider threats? Listen as leading cybersecurity experts discuss the following questions while describing how companies can reorient their security posture to thrive in an age in which trust seems inadequate: • How much damage could an insider do? • How can we avoid hiring employees who are likely to pose an insider threat? What indicators should we look for? Are these evident in screening? • What organizational roles are most likely to be sources of insider threat? • How can the human resources department and the chief information security officer help prevent insider attacks? • What are the dangers of thinking about insider threats as merely a technological problem? • Can training alone prevent insider threats? What more can we do to mitigate insider threats? • In an age when information can be disconcertingly easy to steal, and in which trust seems inadequate, how can we prevent insider threats? • How can we identify and counter external cyber threats that might be linked to insiders’ internal cyber threat activities? • What primary motivations drive people to pose an insider threat? Host Bob Stasio is a senior product manager for cyber analysis with IBM i2 Safer Planet. He draws on nearly 14 years of expertise fighting top-tier malicious actors in the intelligence community, the US military, the National Security Agency and the commercial sector. Stasio also served as an initial member of the US Cyber Command staff. During the troop surge of 2007, his intelligence unit supported the detention of more than 450 high-value targets. Guests Morgan Wright is an internationally recognized expert on cybersecurity strategy, cyber terrorism, identity theft and privacy whose landmark congressional testimony about Healthcare.gov changed how the government collected personally identifiable information. He has spoken about cybersecurity to audiences around the world in hundreds of appearances on national news programs and radio broadcasts, as well as in print and online. Scott N. Schober, a cybersecurity expert, is president and CEO of Berkeley Varitronics Systems, Inc., a 40-year-old provider of advanced wireless radio frequency test and security solutions. Schober has overseen the development of numerous cell phone detection tools used to enforce “no cell phone” policies in corporate, correctional, law enforcement, military, secured government and university facilities. He regularly appears on Arise TV, Bloomberg TV and Canadian TV News and has made numerous appearances as a cybersecurity expert on Al Jazeera America, CCTV America, CNBC, CNN, Fox Business Channel, Fox News, Inside Edition, MSNBC, One America News (OAN), PIX11 and TheBlaze, among other outlets. Schober has also presented as a subject-matter expert discussing cybersecurity and corporate espionage at numerous conferences worldwide. Paul Janes, CISSP, GIAC GISP is president of CoreTriad, LLC, a locally owned company that specializes in vulnerability assessments for small businesses while also developing online training for cybersecurity professionals. He has been involved as a subject-matter expert in the development of an accredited Cyber First Responder Certification and is in demand as a speaker at industry security conferences. Paul draws on more than 19 years of experience in IT security with a Fortune 500 company. His areas of expertise include vulnerability assessments, penetration tests, data loss prevention (DLP), risk management, project management and server management. Paul graduated with distinction from Capella University, earning a master’s degree in information assurance, and holds a bachelor’s degree in computer and information studies from Syracuse University.
Views: 161 IBM Analytics
Breaking Into Cybersecurity -  Juliet 'Jules' Okafor
 
33:23
This webinar series was created to share stories of how the most recent cybersecurity professionals are breaking into the industry. We hope this helps you in your quest to break into cybersecurity as well. This webinar series is co-hosted by Renee Brown Small and Christophe Foulon, CISSP. _____________________________________________________________________________ About the hosts: Renee Small is the CEO of Cyber Human Capital, one of the leading human resources business partners in the field of cyber security, and author of the Amazon #1 best-selling book, Magnetic Hiring: Your Company's Secret Weapon to Attracting Top Cyber Security Talent. She is committed to helping leaders close the cybersecurity talent gap by hiring from within and helping more people get into the lucrative cyber security profession. https://www.linkedin.com/in/reneebrownsmall/ Download a free copy of her book at: magnetichiring.com/book Christophe Foulon focuses on helping to secure people and process with a solid understanding of the technology involved. He has over 10 years as an experienced Information Security Manager and Cybersecurity Strategist with a passion for customer service, process improvement and information security. He has significant experience in optimizing the use of technology, while balancing the implications to people, process and information security by using a consultative approach. https://www.linkedin.com/in/christophefoulon/ https://cpfcoaching.wordpress.com
Breaking Into Cybersecurity -   Charles Karanja
 
31:42
This webinar series was created to share stories of how the most recent cybersecurity professionals are breaking into the industry. We hope this helps you in your quest to break into cybersecurity as well. This webinar series is co-hosted by Renee Brown Small and Christophe Foulon, CISSP. _____________________________________________________________________________ About the hosts: Renee Small is the CEO of Cyber Human Capital, one of the leading human resources business partners in the field of cyber security, and author of the Amazon #1 best-selling book, Magnetic Hiring: Your Company's Secret Weapon to Attracting Top Cyber Security Talent. She is committed to helping leaders close the cybersecurity talent gap by hiring from within and helping more people get into the lucrative cyber security profession. https://www.linkedin.com/in/reneebrownsmall/ Download a free copy of her book at: magnetichiring.com/book Christophe Foulon focuses on helping to secure people and process with a solid understanding of the technology involved. He has over 10 years as an experienced Information Security Manager and Cybersecurity Strategist with a passion for customer service, process improvement and information security. He has significant experience in optimizing the use of technology, while balancing the implications to people, process and information security by using a consultative approach. https://www.linkedin.com/in/christophefoulon/ https://cpfcoaching.wordpress.com
Cybersecurity 101: Part 1 - Why HR Needs to Care
 
04:43
Cybersecurity isn't just an IT issue. It needs to be baked into the core of an organization's culture. In this current digital age, digital hacks, and data breeches are a scary reality, especially to an HR department that handles sensitive employee information. In part 1 of our series, we discuss why HR needs to put cybersecurity on top of their list. This video and transcript originally appeared here: https://blog.businessolver.com/cybersecurity101-why-hr-needs-to-care-part-1
Views: 231 Businessolver
Probing DHS's Botched Management of the Human Resources Information Technology Program
 
01:13:48
The hearing will review findings by the Government Accountability Office (GAO) regarding the Department of Homeland Security’s failure to oversee and update key human capital systems and processes. The GAO report will be released at this hearing.
Security Service Federal Credit Union Human Resources Video
 
01:05
Learn why Security Service is consistently rated a top workplace. We are Security Service Federal Credit Union. Since 1956, we've been dedicated to improving lives of people in the communities we serve. People helping people. For more information, visit https://www.ssfcu.org today!
3 Difficult Issues in Moving a Traditional Network Security Perimeter to the Cloud
 
01:55
The above video explains 3 Difficult Issues in Moving a Traditional Network Security Perimeter to the Cloud The above video highlights five ways digital HR can help businesses capitalize on their advantages. For more information on this subject, download the white paper here: https://www.onlinewhitepapers.com/information-technology/3-difficult-issues-in-moving-a-traditional-network-security-perimeter-to-the-cloud/ ABOUT: Online White Papers, a web brand of Bython Media, helps company executives and IT decision-makers identify the problem areas of their business as well as strategies, techniques, and technologies to inform employees, give insight and support where needed, and to streamline the business process. A vast repository of professional resources from leaders in the IT, finance, marketing, and human resources industries brings solutions to your fingertips. Find out more at OnlineWhitePapers.com.
Views: 11 Bython Media
Homeland Security Information Network - Cybersecurity
 
02:29
This video focuses on how HSIN is used to share information related to cybersecurity threats. There are highlights as to how analysts, investigators and private sector partners collaborate across the nation.
Breaking Into Cybersecurity -  Katia Dean
 
28:18
This webinar series was created to share stories of how the most recent cybersecurity professionals are breaking into the industry. We hope this helps you in your quest to break into cybersecurity as well. This webinar series is co-hosted by Renee Brown Small and Christophe Foulon, CISSP. _____________________________________________________________________________ About the hosts: Renee Small is the CEO of Cyber Human Capital, one of the leading human resources business partners in the field of cyber security, and author of the Amazon #1 best-selling book, Magnetic Hiring: Your Company's Secret Weapon to Attracting Top Cyber Security Talent. She is committed to helping leaders close the cybersecurity talent gap by hiring from within and helping more people get into the lucrative cyber security profession. https://www.linkedin.com/in/reneebrownsmall/ Download a free copy of her book at: magnetichiring.com/book Christophe Foulon focuses on helping to secure people and process with a solid understanding of the technology involved. He has over 10 years as an experienced Information Security Manager and Cybersecurity Strategist with a passion for customer service, process improvement and information security. He has significant experience in optimizing the use of technology, while balancing the implications to people, process and information security by using a consultative approach. https://www.linkedin.com/in/christophefoulon/ https://cpfcoaching.wordpress.com
ISO 27001 Information Security Incident Management (Part 16/18)
 
03:41
This video covers Section A.13 of ISO 27001. This refers to the reporting of information security events and weaknesses and the management of information security incidents and improvements. Find out more at www.certificationeurope.com
Views: 7126 Certification Europe
Information System Security Planning tutorial
 
03:51
Information Security Tutorials
Views: 120 Talent Group
Breaking Into Cybersecurity   Alexander Schindler
 
28:35
This webinar series was created to share stories of how the most recent cybersecurity professionals are breaking into the industry. We hope this helps you in your quest to break into cybersecurity as well. This webinar series is co-hosted by Renee Brown Small and Christophe Foulon, CISSP. _ About the hosts: Renee Small is the CEO of Cyber Human Capital, one of the leading human resources business partners in the field of cyber security, and author of the Amazon #1 best-selling book, Magnetic Hiring: Your Company's Secret Weapon to Attracting Top Cyber Security Talent. She is committed to helping leaders close the cybersecurity talent gap by hiring from within and helping more people get into the lucrative cyber security profession. https://www.linkedin.com/in/reneebrownsmall/ Download a free copy of her book at: magnetichiring.com/book Christophe Foulon focuses on helping to secure people and process with a solid understanding of the technology involved. He has over 10 years as an experienced Information Security Manager and Cybersecurity Strategist with a passion for customer service, process improvement and information security. He has significant experience in optimizing the use of technology, while balancing the implications to people, process and information security by using a consultative approach. https://www.linkedin.com/in/christophefoulon/ https://cpfcoaching.wordpress.com
Accountri Product Overview
 
06:09
The white-label SaaS based organizational Accountability tool built with Intelligent Module that integrates Work Orders, Projects, Contracts, Billing, Profitability, Quality, Information Security Controls, Human Resources and Governance.
Views: 43 Accountri
webinar on "Improve Human Resource Security using ISO 27001:2013"
 
22:59
webinar on "Improve Human Resource Security using ISO 27001:2013" for more info- www.cunixinfotech.com
Views: 51 CUNIX
Breaking Into Cybersecurity - Cat Murdock
 
31:41
This webinar series was created to share stories of how the most recent cybersecurity professionals are breaking into the industry. We hope this helps you in your quest to break into cybersecurity as well. This webinar series is co-hosted by Renee Brown Small and Christophe Foulon, CISSP. _____________________________________________________________________________ About the hosts: Renee Small is the CEO of Cyber Human Capital, one of the leading human resources business partners in the field of cyber security, and author of the Amazon #1 best-selling book, Magnetic Hiring: Your Company's Secret Weapon to Attracting Top Cyber Security Talent. She is committed to helping leaders close the cybersecurity talent gap by hiring from within and helping more people get into the lucrative cyber security profession. https://www.linkedin.com/in/reneebrownsmall/ Download a free copy of her book at: magnetichiring.com/book Christophe Foulon focuses on helping to secure people and process with a solid understanding of the technology involved. He has over 10 years as an experienced Information Security Manager and Cybersecurity Strategist with a passion for customer service, process improvement and information security. He has significant experience in optimizing the use of technology, while balancing the implications to people, process and information security by using a consultative approach. https://www.linkedin.com/in/christophefoulon/ https://cpfcoaching.wordpress.com