MGD 426
Risk Management for Digital Industries . A 4th year course at the University of Toronto at Mississauga - Monday 5:10 - 7:00pm in the IB Bldg.2nd floor, room 250 For the section(s) taught by Prof. W. Tim G. Richardson |
Jan | Feb | Feb / March | March / April | ||||||
tips
specific to earning class participation / contribution marks
noted briefly Jan 2nd read on your own ------------------------------- www.schneier.com he has a great blog ------------------------------ Risks associated with 4Ps and 6Es 4Ps are things you can control 6Es are things you cannot control did Jan 2nd ------------------------------ Difference between Regular Crime and Cyber Crime 41 sec. did Jan 2nd - watcn again and make comments through YouTube ------------------------------- Risk and Threat for I.T. Intro - fundamentals for Jan 9th Vulnerability can exist in many forms - pancake story Asymetrical Cyber Security. Asymmetrical Cyber Security relationship to Guerilla Warfare noted briefly Jan 2nd read on your own noted briefly Jan 2nd read on your own -------------------------------
-------------------------------
R=TxVxC
o Email
filtering
- Patches
video
|
went down the
class list and had everone report on "progress" on
Assignment 1 -------------------------------- Competitor Intelligence - Humint - Teckint - Osint - Geoint - read through completely on your own again . Difference between Information and intelligence did Jan 9 -------------------------------- Arthur Weiss four stages in monitoring competitors - the four "C"s you may have missed this in the Competitor Intelligence section, make sure you read it 1. Collecting the info 2. Convert info into intelligence - Collate and catalogue it, - Verify authenticity - Interpret it and Analyse it 3. Communicating the intelligence. - to decision makers 4. Countering any adverse competitor actions. -------------------------------- view videos on SOURCES of COMPETITOR INTELLIGENCE - add comments, - agree - disagree - new suggestions of sources . a branded consumer product make comments . a branded consumer service noted ... make comments . an industrial product noted ... make comments . an industrial service noted .... make comments o Competitor
Intelligence-Asia
Geographic
weather extremes
o DoS
Attacks
HR
risks
intro
credit card fraud
discussed
scenario of "account takeover" of Credit Card Fraud
--------------------------------------
Video 6 hacking Contingency
planning and Risk Analysis
|
C.C.C.
be Calm Cool and Collected in an emergency - which is because you had a contingency plan noted .... with emphasis on "why" you have a contingency plan . video of what WTGR explained in class .... ---------------------------------- 4T's of Hazard Risks Tolerate Treat Transfer Terminate ----------------------------------- Political Environment ISO 31000 compliance n Political Risk d OECD OECD Principles of corporate governance d Financial Risk - debt / ---------------------------- Text Chpt 7 Risk Management Strategy Prevention
Countermeasures
Insurance
Bureau of Canada
the
ID theft page includes many interesting student videos
also
o Firewalls
Stakeholders
defined
|
Text
Chpt 30
Supply Chain Risk Infrastructure Risk - physical infrastructure - technological infra.. Outsourcing
Third
Party Risks
-------------------------
DRONES
VIDEO
How
To Do Presentations
Prof. Richardson talking
in early March 2011 about class participation
marks.
general tips and help
. Presentations 2017 March 20th
2.Rogers
3. Freedom Mobile
- - - -
- - - - -
|
||||||
2017
Jan 2 Jan 9 Jan 16 |
Jan 23
Feb 6 Assignment 1 due Feb 13 Feb 20 holiday Feb 21-24 Break Week |
Feb 27
Mar 6 Mar 13 Guest speaker Mar 13 Assignment 2 duenoted Feb 13 |
Mar 20 presentations
Mar 27 presentations Mar 31 classes end Final
Group Project
|
Group Work Video
# 6
- what the Report should look like - binding, pages, table of contents - uploaded 2013 March 8 |
15 percent assignment
1
15 percent assignment
2
20 Participation / Contribution
- which allows for more "impact" to be recognized by student contributions
50 Percent Research Report
- 30 percent
written report
- 20 percent
presentation to class - sharing teachable points and things you learned
that are "useful and interesting" in the context of the overall course
topics
Text used in 2013
- not used in 2016 Fundamentals of Risk Management: Understanding, Evaluating and Implementing Effective Risk Management by Paul Hopkin |
384 pages, paperback
http://www.amazon.ca/Fundamentals -Risk-Management-Understanding- Implementing/dp/0749459425 2nd or 3rd edition is OK
WTGR has the 2nd edition available on Kindle $42 |
Sept | Oct | Nov | Nov / Dec |
Sept 9
2016
Sept 16 Sept 23 |
Sept 30
Oct 7 Assignment 1 due Oct 10 Thanksgiving Holiday Oct 11-14 Break Week Oct 21 |
Oct 21
Oct 28 Nov 4 Assignment 2 due (mentioned Oct 9) |
Nov
11 no class
Nov 11 is Remembrance Day Nov 18 presentations
|
Sept 11 2015
Sept 18 Sept 25 powerpoint Oct 2 |
Oct 2
Oct 9 Oct 16 Assignment 1 due Oct 23 |
Oct 23
Oct 30 guest speaker RItesh Kotak, TPS Nov 6 Assignment 2 due (mentioned Oct 9) |
Nov 13 guest speaker
Nov 20 presentations Nov 27 presentations Final Group Project Details 2015 |
Sept 11
2014
Sept 25 powerpoint Oct 2 |
Oct 2
Oct 9 Oct 16 Assignment 1 due Oct 23 |
Oct 23
Oct 30 guest speaker George Platsis Nov 6 guest speaker Nov 6 Assignment 2 due (mentioned Oct 16) |
Nov 13 guest
speaker
Nov 20 presentations Nov 27 presentations |
Bruce Schneier's
"Secrets and Lies..Digital Security in a Networked World" ISBN 0-471-25311-1 Schneier is extremely well known as an IT Security professional and author www.schneier.com |
|
|
CONTACT I MAIN PAGE I NEWS GALLERY I E-BIZ SHORTCUTS I INT'L BIZ SHORTCUTS I MKTG&BUSINESS SHORTCUTS I TEACHING SCHEDULE |
. | |
MISTAKES ITEXTS USED I IMAGES I RANK IDISCLAIMER I STUDENT CONTRIBUTORS I FORMER STUDENTS I PUBLICATIONS I TIPS I | |
. |