SlideShare ist ein Scribd-Unternehmen logo
1 von 10
Computers : The fraudsters friend? CFDG IT Conference 2011 William Wilkinson 08 March 2011 Copyright © February 11 BDO LLP. All rights reserved.
Introduction Computers & Risks – “the fraudsters friend” Computers & Awareness – “the best defence” Questions CFDG IT Conference 2011 Page 2
They’re everywhere… In modern society, computers literally are almost everywhere In your office In your home In your car In your pocket… CFDG IT Conference 2011 Page 3
Fraudsters and other “E-criminals” Do you have sleepless nights or office headaches caused by: ,[object Object]
Phishing
Denial of Service
Blackmail
Sensitive & Intellectual Property Theft
Confidential data loss
FraudCFDG IT Conference 2011 Page 4

Weitere ähnliche Inhalte

Was ist angesagt?

Our team _ ITG Holdings_Charles Lam
Our team _ ITG Holdings_Charles LamOur team _ ITG Holdings_Charles Lam
Our team _ ITG Holdings_Charles Lam
Charles Lam
 

Was ist angesagt? (20)

Our team _ ITG Holdings_Charles Lam
Our team _ ITG Holdings_Charles LamOur team _ ITG Holdings_Charles Lam
Our team _ ITG Holdings_Charles Lam
 
Internet of Things in 10 slides
Internet of Things in 10 slides Internet of Things in 10 slides
Internet of Things in 10 slides
 
IT Innovations Engine with Cisco Unified Data Center
IT Innovations Engine with Cisco Unified Data CenterIT Innovations Engine with Cisco Unified Data Center
IT Innovations Engine with Cisco Unified Data Center
 
Business uses for blockchain
Business uses for blockchainBusiness uses for blockchain
Business uses for blockchain
 
Mobile: the up and downside of risk
Mobile: the up and downside of riskMobile: the up and downside of risk
Mobile: the up and downside of risk
 
Data sovereignty issues: a 15 minute debrief for not-for-profits
Data sovereignty issues: a 15 minute debrief for not-for-profitsData sovereignty issues: a 15 minute debrief for not-for-profits
Data sovereignty issues: a 15 minute debrief for not-for-profits
 
IoT Security
IoT SecurityIoT Security
IoT Security
 
IoT Innovation Insights from Patents
IoT Innovation Insights from PatentsIoT Innovation Insights from Patents
IoT Innovation Insights from Patents
 
The UK's Code of Practice for Security in Consumer IoT Products and Services ...
The UK's Code of Practice for Security in Consumer IoT Products and Services ...The UK's Code of Practice for Security in Consumer IoT Products and Services ...
The UK's Code of Practice for Security in Consumer IoT Products and Services ...
 
IoT Policy and Regulatory Framework
IoT Policy and Regulatory FrameworkIoT Policy and Regulatory Framework
IoT Policy and Regulatory Framework
 
Introduction to IoT Architecture
Introduction to IoT ArchitectureIntroduction to IoT Architecture
Introduction to IoT Architecture
 
Cybersecurity | Cylus: Railway Cybersecurity
Cybersecurity | Cylus: Railway CybersecurityCybersecurity | Cylus: Railway Cybersecurity
Cybersecurity | Cylus: Railway Cybersecurity
 
Harvard GSD Exec.Ed Leading Organizations _ lecture, february 5 2014
Harvard GSD Exec.Ed Leading Organizations _ lecture, february 5 2014Harvard GSD Exec.Ed Leading Organizations _ lecture, february 5 2014
Harvard GSD Exec.Ed Leading Organizations _ lecture, february 5 2014
 
CAN BLOCKCHAIN BE A SOLUTION TO IOT TECHNICAL AND SECURITY ISSUES
CAN BLOCKCHAIN BE A SOLUTION TO IOT TECHNICAL AND SECURITY ISSUESCAN BLOCKCHAIN BE A SOLUTION TO IOT TECHNICAL AND SECURITY ISSUES
CAN BLOCKCHAIN BE A SOLUTION TO IOT TECHNICAL AND SECURITY ISSUES
 
Edge intelligence slide share
Edge intelligence slide shareEdge intelligence slide share
Edge intelligence slide share
 
Lomma Kommun
Lomma Kommun Lomma Kommun
Lomma Kommun
 
Best Blockchain Development Company - Blockchaindevelopments
Best Blockchain Development Company - BlockchaindevelopmentsBest Blockchain Development Company - Blockchaindevelopments
Best Blockchain Development Company - Blockchaindevelopments
 
Drones and logistics - What legal issues and how to handle them
Drones and logistics - What legal issues and how to handle themDrones and logistics - What legal issues and how to handle them
Drones and logistics - What legal issues and how to handle them
 
Li.finance pitchdeck - no request
Li.finance   pitchdeck - no requestLi.finance   pitchdeck - no request
Li.finance pitchdeck - no request
 
5 IoT challenges to be faced in 2018- Infographic
5 IoT challenges to be faced in 2018- Infographic5 IoT challenges to be faced in 2018- Infographic
5 IoT challenges to be faced in 2018- Infographic
 

Andere mochten auch

4B Steps to CRM success
4B Steps to CRM success4B Steps to CRM success
4B Steps to CRM success
CFG
 
2B Maggie's Cloud Infrastructure
2B Maggie's Cloud Infrastructure2B Maggie's Cloud Infrastructure
2B Maggie's Cloud Infrastructure
CFG
 
1C – GROWING SUSTAINABILITY: INCREASING INCOME AND SOCIAL IMPACT: LEYF STORY ...
1C – GROWING SUSTAINABILITY: INCREASING INCOME AND SOCIAL IMPACT: LEYF STORY ...1C – GROWING SUSTAINABILITY: INCREASING INCOME AND SOCIAL IMPACT: LEYF STORY ...
1C – GROWING SUSTAINABILITY: INCREASING INCOME AND SOCIAL IMPACT: LEYF STORY ...
CFG
 
3D – CHOOSING YOUR ACCOUNTING SOFTWARE PROVIDER
3D – CHOOSING YOUR ACCOUNTING SOFTWARE PROVIDER3D – CHOOSING YOUR ACCOUNTING SOFTWARE PROVIDER
3D – CHOOSING YOUR ACCOUNTING SOFTWARE PROVIDER
CFG
 
4B - Is the cloud safe - Ed Zedlewski
4B - Is the cloud safe - Ed Zedlewski4B - Is the cloud safe - Ed Zedlewski
4B - Is the cloud safe - Ed Zedlewski
CFG
 

Andere mochten auch (20)

4B Steps to CRM success
4B Steps to CRM success4B Steps to CRM success
4B Steps to CRM success
 
The Startup's Quickstart Guide To: Albania
The Startup's Quickstart Guide To: AlbaniaThe Startup's Quickstart Guide To: Albania
The Startup's Quickstart Guide To: Albania
 
Keth.barbosa_catálogo_clearchannelclearview2005
Keth.barbosa_catálogo_clearchannelclearview2005Keth.barbosa_catálogo_clearchannelclearview2005
Keth.barbosa_catálogo_clearchannelclearview2005
 
Why Branded Mobile Apps fail?
Why Branded Mobile Apps fail?Why Branded Mobile Apps fail?
Why Branded Mobile Apps fail?
 
Presentazione
PresentazionePresentazione
Presentazione
 
El siete
El sieteEl siete
El siete
 
2B Maggie's Cloud Infrastructure
2B Maggie's Cloud Infrastructure2B Maggie's Cloud Infrastructure
2B Maggie's Cloud Infrastructure
 
Report ncj195171
Report ncj195171Report ncj195171
Report ncj195171
 
Cinco consejos sobre los libros de texto
Cinco consejos sobre los libros de textoCinco consejos sobre los libros de texto
Cinco consejos sobre los libros de texto
 
Understanding Strategy in Times of Austerity, Sally O'Neill, Royal Opera House
Understanding Strategy in Times of Austerity, Sally O'Neill, Royal Opera HouseUnderstanding Strategy in Times of Austerity, Sally O'Neill, Royal Opera House
Understanding Strategy in Times of Austerity, Sally O'Neill, Royal Opera House
 
TimbaLabs Introduction
TimbaLabs IntroductionTimbaLabs Introduction
TimbaLabs Introduction
 
1B - Measuring your impact - Sue Holloway and Laura Blazey
1B - Measuring your impact - Sue Holloway and Laura Blazey1B - Measuring your impact - Sue Holloway and Laura Blazey
1B - Measuring your impact - Sue Holloway and Laura Blazey
 
3B - The importance of branding - Paul Breckell & Emma Harrison
3B - The importance of branding - Paul Breckell & Emma Harrison3B - The importance of branding - Paul Breckell & Emma Harrison
3B - The importance of branding - Paul Breckell & Emma Harrison
 
25 years & the future - Andrew Hind
25 years & the future - Andrew Hind25 years & the future - Andrew Hind
25 years & the future - Andrew Hind
 
1C – GROWING SUSTAINABILITY: INCREASING INCOME AND SOCIAL IMPACT: LEYF STORY ...
1C – GROWING SUSTAINABILITY: INCREASING INCOME AND SOCIAL IMPACT: LEYF STORY ...1C – GROWING SUSTAINABILITY: INCREASING INCOME AND SOCIAL IMPACT: LEYF STORY ...
1C – GROWING SUSTAINABILITY: INCREASING INCOME AND SOCIAL IMPACT: LEYF STORY ...
 
3D – CHOOSING YOUR ACCOUNTING SOFTWARE PROVIDER
3D – CHOOSING YOUR ACCOUNTING SOFTWARE PROVIDER3D – CHOOSING YOUR ACCOUNTING SOFTWARE PROVIDER
3D – CHOOSING YOUR ACCOUNTING SOFTWARE PROVIDER
 
Educar a los hijos
Educar a los hijosEducar a los hijos
Educar a los hijos
 
4B - Is the cloud safe - Ed Zedlewski
4B - Is the cloud safe - Ed Zedlewski4B - Is the cloud safe - Ed Zedlewski
4B - Is the cloud safe - Ed Zedlewski
 
Be Careful what you Wish for, Lucy Caldicott and Rachel Williams, CLIC Sargent
Be Careful what you Wish for, Lucy Caldicott and Rachel Williams, CLIC SargentBe Careful what you Wish for, Lucy Caldicott and Rachel Williams, CLIC Sargent
Be Careful what you Wish for, Lucy Caldicott and Rachel Williams, CLIC Sargent
 
The Startup's Quickstart Guide To: Angola
The Startup's Quickstart Guide To: AngolaThe Startup's Quickstart Guide To: Angola
The Startup's Quickstart Guide To: Angola
 

Ähnlich wie 2A Computers: The fraudsters friend?

Integrated Secure Networking - Fortinet
Integrated Secure Networking - FortinetIntegrated Secure Networking - Fortinet
Integrated Secure Networking - Fortinet
Harry Gunns
 
IT Security for the Physical Security Professional
IT Security for the Physical Security ProfessionalIT Security for the Physical Security Professional
IT Security for the Physical Security Professional
ciso_insights
 
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
RakeshPatel583282
 

Ähnlich wie 2A Computers: The fraudsters friend? (20)

Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
 
PaloAlto Enterprise Security Solution
PaloAlto Enterprise Security SolutionPaloAlto Enterprise Security Solution
PaloAlto Enterprise Security Solution
 
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
 
Cybersecurity in an IoT and Mobile World
Cybersecurity in an IoT and Mobile WorldCybersecurity in an IoT and Mobile World
Cybersecurity in an IoT and Mobile World
 
Symantec Data Loss Prevention 9
Symantec Data Loss Prevention 9Symantec Data Loss Prevention 9
Symantec Data Loss Prevention 9
 
Overview of IoT and Security issues
Overview of IoT and Security issuesOverview of IoT and Security issues
Overview of IoT and Security issues
 
Spotlight on Technology 2017
Spotlight on Technology 2017Spotlight on Technology 2017
Spotlight on Technology 2017
 
Szalai_Gemalto
Szalai_GemaltoSzalai_Gemalto
Szalai_Gemalto
 
Integrated Secure Networking - Fortinet
Integrated Secure Networking - FortinetIntegrated Secure Networking - Fortinet
Integrated Secure Networking - Fortinet
 
Art Hathaway - Artificial Intelligence - Real Threat Prevention
Art Hathaway - Artificial Intelligence - Real Threat PreventionArt Hathaway - Artificial Intelligence - Real Threat Prevention
Art Hathaway - Artificial Intelligence - Real Threat Prevention
 
Aalto cyber-10.4.18
Aalto cyber-10.4.18Aalto cyber-10.4.18
Aalto cyber-10.4.18
 
The Politics of IT Security: Laptop Theft in the Public Sector
The Politics of IT Security: Laptop Theft in the Public SectorThe Politics of IT Security: Laptop Theft in the Public Sector
The Politics of IT Security: Laptop Theft in the Public Sector
 
Cyber Six: Managing Security in Internet
Cyber Six: Managing Security in InternetCyber Six: Managing Security in Internet
Cyber Six: Managing Security in Internet
 
IoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsIoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and Solutions
 
1_IoT and Its Interfacing Techniques.pdf
1_IoT and Its Interfacing Techniques.pdf1_IoT and Its Interfacing Techniques.pdf
1_IoT and Its Interfacing Techniques.pdf
 
IT Security for the Physical Security Professional
IT Security for the Physical Security ProfessionalIT Security for the Physical Security Professional
IT Security for the Physical Security Professional
 
Cyren cybersecurity of things
Cyren cybersecurity of thingsCyren cybersecurity of things
Cyren cybersecurity of things
 
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's ProblemsDevil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
 
SecureMag 2015 :: Volume 7
SecureMag 2015 :: Volume 7SecureMag 2015 :: Volume 7
SecureMag 2015 :: Volume 7
 
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
 

Mehr von CFG

WORKSHOP 2 – CHANGE MANAGEMENT
WORKSHOP 2 – CHANGE MANAGEMENTWORKSHOP 2 – CHANGE MANAGEMENT
WORKSHOP 2 – CHANGE MANAGEMENT
CFG
 
4D – PERFORMANCE AND REWARDS
4D – PERFORMANCE AND REWARDS4D – PERFORMANCE AND REWARDS
4D – PERFORMANCE AND REWARDS
CFG
 
3C – PAYMENT BY RESULTS
3C – PAYMENT BY RESULTS3C – PAYMENT BY RESULTS
3C – PAYMENT BY RESULTS
CFG
 
3B – GOVERNANCE DISCLOSURES: BEST PRACTICE
3B – GOVERNANCE DISCLOSURES: BEST PRACTICE3B – GOVERNANCE DISCLOSURES: BEST PRACTICE
3B – GOVERNANCE DISCLOSURES: BEST PRACTICE
CFG
 
3A – DATA PROTECTION: ADVICE
3A – DATA PROTECTION: ADVICE3A – DATA PROTECTION: ADVICE
3A – DATA PROTECTION: ADVICE
CFG
 
WORKSHOP 1 – TURNING STRATEGY INTO GREAT PERFORMANCE
WORKSHOP 1 – TURNING STRATEGY INTO GREAT PERFORMANCEWORKSHOP 1 – TURNING STRATEGY INTO GREAT PERFORMANCE
WORKSHOP 1 – TURNING STRATEGY INTO GREAT PERFORMANCE
CFG
 
2C – SOCIAL INVESTMENT
2C – SOCIAL INVESTMENT2C – SOCIAL INVESTMENT
2C – SOCIAL INVESTMENT
CFG
 
2B – ACCOUNTABILITY OF FINANCE PROFESSIONALS
2B –   ACCOUNTABILITY OF FINANCE PROFESSIONALS2B –   ACCOUNTABILITY OF FINANCE PROFESSIONALS
2B – ACCOUNTABILITY OF FINANCE PROFESSIONALS
CFG
 
2A – AUTO ENROLMENT: LESSONS LEARNT
2A – AUTO ENROLMENT: LESSONS LEARNT2A – AUTO ENROLMENT: LESSONS LEARNT
2A – AUTO ENROLMENT: LESSONS LEARNT
CFG
 
2D – BUILDING STRONGER CHARITIES THROUGH IMPROVED FINANCIAL MANAGEMENT
2D – BUILDING STRONGER CHARITIES THROUGH IMPROVED FINANCIAL MANAGEMENT2D – BUILDING STRONGER CHARITIES THROUGH IMPROVED FINANCIAL MANAGEMENT
2D – BUILDING STRONGER CHARITIES THROUGH IMPROVED FINANCIAL MANAGEMENT
CFG
 
1B – DASH BOARDS, BALANCED SCORECARDS AND KPIS
1B – DASH BOARDS, BALANCED SCORECARDS AND KPIS1B – DASH BOARDS, BALANCED SCORECARDS AND KPIS
1B – DASH BOARDS, BALANCED SCORECARDS AND KPIS
CFG
 
1A - Handouts for CHARITIES SORP 2015: WHAT YOU NEED TO KNOW
1A - Handouts for CHARITIES SORP 2015: WHAT YOU NEED TO KNOW1A - Handouts for CHARITIES SORP 2015: WHAT YOU NEED TO KNOW
1A - Handouts for CHARITIES SORP 2015: WHAT YOU NEED TO KNOW
CFG
 
1A - CHARITIES SORP 2015: WHAT YOU NEED TO KNOW
1A - CHARITIES SORP 2015: WHAT YOU NEED TO KNOW1A - CHARITIES SORP 2015: WHAT YOU NEED TO KNOW
1A - CHARITIES SORP 2015: WHAT YOU NEED TO KNOW
CFG
 
Opening plenary – The future of the sector - Dan Corry
Opening plenary – The future of the sector - Dan CorryOpening plenary – The future of the sector - Dan Corry
Opening plenary – The future of the sector - Dan Corry
CFG
 
Session 1B – Fraud - Collin Belcher
Session 1B – Fraud - Collin BelcherSession 1B – Fraud - Collin Belcher
Session 1B – Fraud - Collin Belcher
CFG
 
2B - Business IT Investment Risks - Richard Moulds
2B - Business IT Investment Risks - Richard Moulds2B - Business IT Investment Risks - Richard Moulds
2B - Business IT Investment Risks - Richard Moulds
CFG
 
4A - Working remotely - Richard Craig
4A - Working remotely - Richard Craig4A - Working remotely - Richard Craig
4A - Working remotely - Richard Craig
CFG
 
3B - How to effectively engage users and managers in IT projects - Richard Co...
3B - How to effectively engage users and managers in IT projects - Richard Co...3B - How to effectively engage users and managers in IT projects - Richard Co...
3B - How to effectively engage users and managers in IT projects - Richard Co...
CFG
 
1B - Outsourcing - Kevin Calder & Peter Wainman
1B - Outsourcing - Kevin Calder & Peter Wainman1B - Outsourcing - Kevin Calder & Peter Wainman
1B - Outsourcing - Kevin Calder & Peter Wainman
CFG
 
1A - The Cloud: Was it manna from heaven or just a tin of rice pudding? Roger...
1A - The Cloud: Was it manna from heaven or just a tin of rice pudding? Roger...1A - The Cloud: Was it manna from heaven or just a tin of rice pudding? Roger...
1A - The Cloud: Was it manna from heaven or just a tin of rice pudding? Roger...
CFG
 

Mehr von CFG (20)

WORKSHOP 2 – CHANGE MANAGEMENT
WORKSHOP 2 – CHANGE MANAGEMENTWORKSHOP 2 – CHANGE MANAGEMENT
WORKSHOP 2 – CHANGE MANAGEMENT
 
4D – PERFORMANCE AND REWARDS
4D – PERFORMANCE AND REWARDS4D – PERFORMANCE AND REWARDS
4D – PERFORMANCE AND REWARDS
 
3C – PAYMENT BY RESULTS
3C – PAYMENT BY RESULTS3C – PAYMENT BY RESULTS
3C – PAYMENT BY RESULTS
 
3B – GOVERNANCE DISCLOSURES: BEST PRACTICE
3B – GOVERNANCE DISCLOSURES: BEST PRACTICE3B – GOVERNANCE DISCLOSURES: BEST PRACTICE
3B – GOVERNANCE DISCLOSURES: BEST PRACTICE
 
3A – DATA PROTECTION: ADVICE
3A – DATA PROTECTION: ADVICE3A – DATA PROTECTION: ADVICE
3A – DATA PROTECTION: ADVICE
 
WORKSHOP 1 – TURNING STRATEGY INTO GREAT PERFORMANCE
WORKSHOP 1 – TURNING STRATEGY INTO GREAT PERFORMANCEWORKSHOP 1 – TURNING STRATEGY INTO GREAT PERFORMANCE
WORKSHOP 1 – TURNING STRATEGY INTO GREAT PERFORMANCE
 
2C – SOCIAL INVESTMENT
2C – SOCIAL INVESTMENT2C – SOCIAL INVESTMENT
2C – SOCIAL INVESTMENT
 
2B – ACCOUNTABILITY OF FINANCE PROFESSIONALS
2B –   ACCOUNTABILITY OF FINANCE PROFESSIONALS2B –   ACCOUNTABILITY OF FINANCE PROFESSIONALS
2B – ACCOUNTABILITY OF FINANCE PROFESSIONALS
 
2A – AUTO ENROLMENT: LESSONS LEARNT
2A – AUTO ENROLMENT: LESSONS LEARNT2A – AUTO ENROLMENT: LESSONS LEARNT
2A – AUTO ENROLMENT: LESSONS LEARNT
 
2D – BUILDING STRONGER CHARITIES THROUGH IMPROVED FINANCIAL MANAGEMENT
2D – BUILDING STRONGER CHARITIES THROUGH IMPROVED FINANCIAL MANAGEMENT2D – BUILDING STRONGER CHARITIES THROUGH IMPROVED FINANCIAL MANAGEMENT
2D – BUILDING STRONGER CHARITIES THROUGH IMPROVED FINANCIAL MANAGEMENT
 
1B – DASH BOARDS, BALANCED SCORECARDS AND KPIS
1B – DASH BOARDS, BALANCED SCORECARDS AND KPIS1B – DASH BOARDS, BALANCED SCORECARDS AND KPIS
1B – DASH BOARDS, BALANCED SCORECARDS AND KPIS
 
1A - Handouts for CHARITIES SORP 2015: WHAT YOU NEED TO KNOW
1A - Handouts for CHARITIES SORP 2015: WHAT YOU NEED TO KNOW1A - Handouts for CHARITIES SORP 2015: WHAT YOU NEED TO KNOW
1A - Handouts for CHARITIES SORP 2015: WHAT YOU NEED TO KNOW
 
1A - CHARITIES SORP 2015: WHAT YOU NEED TO KNOW
1A - CHARITIES SORP 2015: WHAT YOU NEED TO KNOW1A - CHARITIES SORP 2015: WHAT YOU NEED TO KNOW
1A - CHARITIES SORP 2015: WHAT YOU NEED TO KNOW
 
Opening plenary – The future of the sector - Dan Corry
Opening plenary – The future of the sector - Dan CorryOpening plenary – The future of the sector - Dan Corry
Opening plenary – The future of the sector - Dan Corry
 
Session 1B – Fraud - Collin Belcher
Session 1B – Fraud - Collin BelcherSession 1B – Fraud - Collin Belcher
Session 1B – Fraud - Collin Belcher
 
2B - Business IT Investment Risks - Richard Moulds
2B - Business IT Investment Risks - Richard Moulds2B - Business IT Investment Risks - Richard Moulds
2B - Business IT Investment Risks - Richard Moulds
 
4A - Working remotely - Richard Craig
4A - Working remotely - Richard Craig4A - Working remotely - Richard Craig
4A - Working remotely - Richard Craig
 
3B - How to effectively engage users and managers in IT projects - Richard Co...
3B - How to effectively engage users and managers in IT projects - Richard Co...3B - How to effectively engage users and managers in IT projects - Richard Co...
3B - How to effectively engage users and managers in IT projects - Richard Co...
 
1B - Outsourcing - Kevin Calder & Peter Wainman
1B - Outsourcing - Kevin Calder & Peter Wainman1B - Outsourcing - Kevin Calder & Peter Wainman
1B - Outsourcing - Kevin Calder & Peter Wainman
 
1A - The Cloud: Was it manna from heaven or just a tin of rice pudding? Roger...
1A - The Cloud: Was it manna from heaven or just a tin of rice pudding? Roger...1A - The Cloud: Was it manna from heaven or just a tin of rice pudding? Roger...
1A - The Cloud: Was it manna from heaven or just a tin of rice pudding? Roger...
 

2A Computers: The fraudsters friend?