49

PowerPoint Presentation · Data Leakage Common Threats Unintentional release of secure informatiop to an untrust d epùitonmdnts., Loss of data storing dev( es such as laptops, tnumb

  • Upload
    others

  • View
    20

  • Download
    0

Embed Size (px)

Citation preview

Page 1: PowerPoint Presentation · Data Leakage Common Threats Unintentional release of secure informatiop to an untrust d epùitonmdnts., Loss of data storing dev( es such as laptops, tnumb
Page 2: PowerPoint Presentation · Data Leakage Common Threats Unintentional release of secure informatiop to an untrust d epùitonmdnts., Loss of data storing dev( es such as laptops, tnumb
Page 3: PowerPoint Presentation · Data Leakage Common Threats Unintentional release of secure informatiop to an untrust d epùitonmdnts., Loss of data storing dev( es such as laptops, tnumb
Page 4: PowerPoint Presentation · Data Leakage Common Threats Unintentional release of secure informatiop to an untrust d epùitonmdnts., Loss of data storing dev( es such as laptops, tnumb
Page 5: PowerPoint Presentation · Data Leakage Common Threats Unintentional release of secure informatiop to an untrust d epùitonmdnts., Loss of data storing dev( es such as laptops, tnumb
Page 6: PowerPoint Presentation · Data Leakage Common Threats Unintentional release of secure informatiop to an untrust d epùitonmdnts., Loss of data storing dev( es such as laptops, tnumb
Page 7: PowerPoint Presentation · Data Leakage Common Threats Unintentional release of secure informatiop to an untrust d epùitonmdnts., Loss of data storing dev( es such as laptops, tnumb
Page 8: PowerPoint Presentation · Data Leakage Common Threats Unintentional release of secure informatiop to an untrust d epùitonmdnts., Loss of data storing dev( es such as laptops, tnumb
Page 9: PowerPoint Presentation · Data Leakage Common Threats Unintentional release of secure informatiop to an untrust d epùitonmdnts., Loss of data storing dev( es such as laptops, tnumb
Page 10: PowerPoint Presentation · Data Leakage Common Threats Unintentional release of secure informatiop to an untrust d epùitonmdnts., Loss of data storing dev( es such as laptops, tnumb
Page 11: PowerPoint Presentation · Data Leakage Common Threats Unintentional release of secure informatiop to an untrust d epùitonmdnts., Loss of data storing dev( es such as laptops, tnumb
Page 12: PowerPoint Presentation · Data Leakage Common Threats Unintentional release of secure informatiop to an untrust d epùitonmdnts., Loss of data storing dev( es such as laptops, tnumb
Page 13: PowerPoint Presentation · Data Leakage Common Threats Unintentional release of secure informatiop to an untrust d epùitonmdnts., Loss of data storing dev( es such as laptops, tnumb
Page 14: PowerPoint Presentation · Data Leakage Common Threats Unintentional release of secure informatiop to an untrust d epùitonmdnts., Loss of data storing dev( es such as laptops, tnumb
Page 15: PowerPoint Presentation · Data Leakage Common Threats Unintentional release of secure informatiop to an untrust d epùitonmdnts., Loss of data storing dev( es such as laptops, tnumb
Page 16: PowerPoint Presentation · Data Leakage Common Threats Unintentional release of secure informatiop to an untrust d epùitonmdnts., Loss of data storing dev( es such as laptops, tnumb
Page 17: PowerPoint Presentation · Data Leakage Common Threats Unintentional release of secure informatiop to an untrust d epùitonmdnts., Loss of data storing dev( es such as laptops, tnumb
Page 18: PowerPoint Presentation · Data Leakage Common Threats Unintentional release of secure informatiop to an untrust d epùitonmdnts., Loss of data storing dev( es such as laptops, tnumb
Page 19: PowerPoint Presentation · Data Leakage Common Threats Unintentional release of secure informatiop to an untrust d epùitonmdnts., Loss of data storing dev( es such as laptops, tnumb
Page 20: PowerPoint Presentation · Data Leakage Common Threats Unintentional release of secure informatiop to an untrust d epùitonmdnts., Loss of data storing dev( es such as laptops, tnumb
Page 21: PowerPoint Presentation · Data Leakage Common Threats Unintentional release of secure informatiop to an untrust d epùitonmdnts., Loss of data storing dev( es such as laptops, tnumb
Page 22: PowerPoint Presentation · Data Leakage Common Threats Unintentional release of secure informatiop to an untrust d epùitonmdnts., Loss of data storing dev( es such as laptops, tnumb
Page 23: PowerPoint Presentation · Data Leakage Common Threats Unintentional release of secure informatiop to an untrust d epùitonmdnts., Loss of data storing dev( es such as laptops, tnumb
Page 24: PowerPoint Presentation · Data Leakage Common Threats Unintentional release of secure informatiop to an untrust d epùitonmdnts., Loss of data storing dev( es such as laptops, tnumb
Page 25: PowerPoint Presentation · Data Leakage Common Threats Unintentional release of secure informatiop to an untrust d epùitonmdnts., Loss of data storing dev( es such as laptops, tnumb
Page 26: PowerPoint Presentation · Data Leakage Common Threats Unintentional release of secure informatiop to an untrust d epùitonmdnts., Loss of data storing dev( es such as laptops, tnumb
Page 27: PowerPoint Presentation · Data Leakage Common Threats Unintentional release of secure informatiop to an untrust d epùitonmdnts., Loss of data storing dev( es such as laptops, tnumb
Page 28: PowerPoint Presentation · Data Leakage Common Threats Unintentional release of secure informatiop to an untrust d epùitonmdnts., Loss of data storing dev( es such as laptops, tnumb
Page 29: PowerPoint Presentation · Data Leakage Common Threats Unintentional release of secure informatiop to an untrust d epùitonmdnts., Loss of data storing dev( es such as laptops, tnumb
Page 30: PowerPoint Presentation · Data Leakage Common Threats Unintentional release of secure informatiop to an untrust d epùitonmdnts., Loss of data storing dev( es such as laptops, tnumb
Page 31: PowerPoint Presentation · Data Leakage Common Threats Unintentional release of secure informatiop to an untrust d epùitonmdnts., Loss of data storing dev( es such as laptops, tnumb
Page 32: PowerPoint Presentation · Data Leakage Common Threats Unintentional release of secure informatiop to an untrust d epùitonmdnts., Loss of data storing dev( es such as laptops, tnumb
Page 33: PowerPoint Presentation · Data Leakage Common Threats Unintentional release of secure informatiop to an untrust d epùitonmdnts., Loss of data storing dev( es such as laptops, tnumb
Page 34: PowerPoint Presentation · Data Leakage Common Threats Unintentional release of secure informatiop to an untrust d epùitonmdnts., Loss of data storing dev( es such as laptops, tnumb
Page 35: PowerPoint Presentation · Data Leakage Common Threats Unintentional release of secure informatiop to an untrust d epùitonmdnts., Loss of data storing dev( es such as laptops, tnumb
Page 36: PowerPoint Presentation · Data Leakage Common Threats Unintentional release of secure informatiop to an untrust d epùitonmdnts., Loss of data storing dev( es such as laptops, tnumb
Page 37: PowerPoint Presentation · Data Leakage Common Threats Unintentional release of secure informatiop to an untrust d epùitonmdnts., Loss of data storing dev( es such as laptops, tnumb
Page 38: PowerPoint Presentation · Data Leakage Common Threats Unintentional release of secure informatiop to an untrust d epùitonmdnts., Loss of data storing dev( es such as laptops, tnumb
Page 39: PowerPoint Presentation · Data Leakage Common Threats Unintentional release of secure informatiop to an untrust d epùitonmdnts., Loss of data storing dev( es such as laptops, tnumb
Page 40: PowerPoint Presentation · Data Leakage Common Threats Unintentional release of secure informatiop to an untrust d epùitonmdnts., Loss of data storing dev( es such as laptops, tnumb
Page 41: PowerPoint Presentation · Data Leakage Common Threats Unintentional release of secure informatiop to an untrust d epùitonmdnts., Loss of data storing dev( es such as laptops, tnumb
Page 42: PowerPoint Presentation · Data Leakage Common Threats Unintentional release of secure informatiop to an untrust d epùitonmdnts., Loss of data storing dev( es such as laptops, tnumb
Page 43: PowerPoint Presentation · Data Leakage Common Threats Unintentional release of secure informatiop to an untrust d epùitonmdnts., Loss of data storing dev( es such as laptops, tnumb
Page 44: PowerPoint Presentation · Data Leakage Common Threats Unintentional release of secure informatiop to an untrust d epùitonmdnts., Loss of data storing dev( es such as laptops, tnumb
Page 45: PowerPoint Presentation · Data Leakage Common Threats Unintentional release of secure informatiop to an untrust d epùitonmdnts., Loss of data storing dev( es such as laptops, tnumb
Page 47: PowerPoint Presentation · Data Leakage Common Threats Unintentional release of secure informatiop to an untrust d epùitonmdnts., Loss of data storing dev( es such as laptops, tnumb
Page 48: PowerPoint Presentation · Data Leakage Common Threats Unintentional release of secure informatiop to an untrust d epùitonmdnts., Loss of data storing dev( es such as laptops, tnumb
Page 49: PowerPoint Presentation · Data Leakage Common Threats Unintentional release of secure informatiop to an untrust d epùitonmdnts., Loss of data storing dev( es such as laptops, tnumb

Certificate of Completion

Security Awareness Training

I certify that I have completed the Security Awareness training course and that I will comply with the requirements.

Date: _______________________________________________________

Signature: ___________________________________________________

Printed Name: ________________________________________________

Company (Vendor) Name: _______________________________________ Print and complete two (2) copies of this certification. Keep one for your records. Forward the other copy to your management or appropriate representative within your company.

Please note that you are required to complete this training within 30 days of the date you begin providing contract services for CenterPoint Energy and repeat as mandated thereafter. You and/or your company may be required to produce this certification upon request as evidence of your compliance with this requirement.