SlideShare ist ein Scribd-Unternehmen logo
1 von 32
Cyber Security
Awareness Training
Win-Pro Consultancy Pte Ltd
Ronald Soh
https://www.winpro.com.sg
What is Cyber Security?
Cyber Security is the protection of
internet-connected systems,
including hardware, software and
data, from cyberattacks.
What is Information Security?
•Protect the Confidentiality of data
•Preserve the Integrity of data
•Promote the Availability of data for authorized use
Modern Threats
•Viruses
•Worms
•Trojans
•Logic Bombs
•Root Kits
•Botnets
•Social Engineering
Viruses
•Viruses are malicious programs that hide
themselves on your computer
•May destroy your documents, format your
hard drive, send emails from your
computer or a variety of other actions
Worms
•Worms are self-replicating
•Typically propagate and exploit
through un-patched OS systems
Trojans
Masquerades as a normal program while
quietly destroying data or damaging your
system
Logic Bombs
Malware logic executes upon certain
conditions. The program is often used for
otherwise legitimate reasons.
Root Kits
•Low level programs that embed
themselves in the operating system
itself
•Difficult if not impossible to detect
Botnets
A botnet is a number of compromised computers
used to create and send spam or viruses or flood
a network with messages as a denial of service
attack.
The compromised computers are called zombies.
Social Engineering
Social engineering manipulates people into performing
actions or divulging confidential information. Similar to a
confidence trick or simple fraud, the term applies to the
use of deception to gain information, commit fraud, or
access computer systems.
Social Engineering
• People are often the weakest links
• All the technical controls in the world are worthless if you share your
password or hold the door open
• Attempts to gain
• Confidential information or credentials
• Access to sensitive areas or equipment
• Can take many forms
• In person
• Email
• Phone
• Postal Mail
How do you know you are been
Social Engineered?
• Lack of business credentials or identification
• Making small mistakes
• Trying too hard to sound more convincing
• Rushing
How to Protect Yourself Against Social
Engineering?
• Verify the visit with management
• Always request identification and credentials
• Closely monitor and observe visitors and vendors
• Never trust suspicious emails
• Do not reveal any information.
• If the visit cannot be verified, the visitor should not be granted access
Email
• Common Attacks
• Phishing
• Malicious attachments
• Spam
• Scams
• Best Practices
• Don’t open suspicious attachments
• Don’t follow links
• Don’t attempt to “unsubscribe”
Email Scams
Phishing
• Deceptive emails to trick users to click on malicious links
• Enter sensitive information
• Run applications
• Look identical to legitimate emails
• Your Bank
• PayPal
• Government
Phishing
Phishing
Phishing
https://www.virustotal.com
Strong Password Policy
Why need strong password?
• The stronger the password, the less likely it will be cracked
Cracking: Using computers to guess the password through “brute-force” methods or by
going through entire dictionary lists to guess the password
Strong Password Policy
• Never share your password with others!
• Strong passwords should be
• Minimum of 8 characters. Recommended > 12 characters
• Includes numbers 0-9
• Includes symbols !@#$%^&*()
• Includes upper and lowercase letters a-z, A-Z
• Not include personal information, such as your name or family name, previously used
passwords, important dates, FIN, NRIC, mobile numbers, car number, home address
Examples:
Strong Password: H81h@x0rZ
Weak Password: jack1
• Change your password regularly or when it is need to.
• Make sure that the login page has a timeout policy for unsuccessful retries.
How to protect your Portable Devices?
•Avoid USB Drives if you can.
•Use USB Drives with proper encryption.
•Encrypt your notebook
•Do not leave it unattended and unsecured.
•Avoid connecting to Free Wireless
•Do not download free apps from unknown
sources
•Report any loss of devices immediately.
Be Careful of your Trash…
• Dumpster Diving is the act of sorting through garbage to
find documents and information that has been improperly
discarded
• Some things we’ve found:
• Computer Harddisk
• USB Drives
• Customer information
• Internal records
• Applications
• Credit cards
• Technical documentation
• Backup tapes
• Loan applications
• Floor plans/schematics
• Copies of identification
How to Protect Your Paper Trash?
• Destroy all confidential paper data with a good office
paper shredder
• Make Cross-cut only – Straight-cut is easy to re-assemble
• Split into 2 or more different bags and disposed in different
location on different days
• Do not recycle your printed paper
How to Dispose your old PC,
Notebook or Copier?
•Remove Harddisk or some form of disk storage
from Most PC, Notebook and printers.
•Make you have wiped the data securely before
you dispose them (DOD Standards)
How do you know that you
compromised?
Possible Symptoms:
 Antivirus software detects a problem.
 Running of Disk space unexpectedly.
 More Pop-ups appearing
 Files or transactions appear that should not be there.
 PC slowing down.
 Unusual messages, sounds, or displays on your monitor.
 The mouse pointer moves by itself.
 The computer spontaneously shuts down or reboots.
 Often unrecognized or ignored problems.
What should you do when you
suspect that you are compromised?
• Disconnect any USB connection
• Disconnect any Wireless and Wired Connection
• Make sure that your antivirus is running
• Make sure that your firewall is running
• Report to your boss
13 Ways to Protect Your Company
1. Use Strong Password. Never share your passwords with others. Change
password regularly.
2. Never pre-open the door or allow strangers inside the building
3. Destroy all confidential paper with shredder.
4. Dispose IT equipment carefully.
5. Avoid using mobile devices. Encrypt Mobile Devices.
6. Wipe data securely before disposal
13 Ways to Protect Your Company
8. Wipe data securely before disposal
9. Treat Email with cautions. Do not open attachments or click suspicious
links
10.Secure all confidential information when you are not around.
11.If noticed abnormal PC behavior, then Report to Boss
12.Report suspicious activity or persons immediately
13.Always lock your workstation when you step away
Alerts and Advisories
• Cyber Security Agency of Singapore
• https://www.csa.gov.sg/
• National Cybersecurity and Communications Integration Center
• https://www.us-cert.gov/
• Microsoft:
• http://www.microsoft.com/security/
• Security Focus:
• http://www.securityfocus.com/
Questions and Answers

Weitere ähnliche Inhalte

Was ist angesagt?

Information Security Awareness Training Open
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training Open
Fred Beck MBA, CPA
 
IT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeIT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community College
Atlantic Training, LLC.
 
Information Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn HospitalInformation Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn Hospital
Atlantic Training, LLC.
 

Was ist angesagt? (20)

Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Cybersecurity Awareness Training
Cybersecurity Awareness TrainingCybersecurity Awareness Training
Cybersecurity Awareness Training
 
Employee Security Awareness Training
Employee Security Awareness TrainingEmployee Security Awareness Training
Employee Security Awareness Training
 
Information Security Awareness Training Open
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training Open
 
Cybersecurity Awareness Infographics
Cybersecurity Awareness InfographicsCybersecurity Awareness Infographics
Cybersecurity Awareness Infographics
 
14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
 
Securityawareness
SecurityawarenessSecurityawareness
Securityawareness
 
Physical security.ppt
Physical security.pptPhysical security.ppt
Physical security.ppt
 
Cyber Security Awareness Training
Cyber Security Awareness TrainingCyber Security Awareness Training
Cyber Security Awareness Training
 
IT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeIT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community College
 
User security awareness
User security awarenessUser security awareness
User security awareness
 
Security awareness
Security awarenessSecurity awareness
Security awareness
 
Awareness Training on Information Security
Awareness Training on Information SecurityAwareness Training on Information Security
Awareness Training on Information Security
 
Information Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn HospitalInformation Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn Hospital
 
New Hire Information Security Awareness
New Hire Information Security AwarenessNew Hire Information Security Awareness
New Hire Information Security Awareness
 
Physical security
Physical securityPhysical security
Physical security
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Cybersecurity: Dos and Dont's
Cybersecurity: Dos and Dont'sCybersecurity: Dos and Dont's
Cybersecurity: Dos and Dont's
 
Social engineering-Attack of the Human Behavior
Social engineering-Attack of the Human BehaviorSocial engineering-Attack of the Human Behavior
Social engineering-Attack of the Human Behavior
 

Ähnlich wie Cyber Security Awareness Training by Win-Pro

Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness Training
Randy Bowman
 
Online reputation
Online reputationOnline reputation
Online reputation
esl2m
 
E business internet fraud
E business internet fraudE business internet fraud
E business internet fraud
Radiant Minds
 
Anti Whaling Hardening Up Your Net Presence
Anti   Whaling   Hardening Up Your Net PresenceAnti   Whaling   Hardening Up Your Net Presence
Anti Whaling Hardening Up Your Net Presence
gueste0b5fe
 

Ähnlich wie Cyber Security Awareness Training by Win-Pro (20)

Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness Training
 
It security in healthcare
It security in healthcareIt security in healthcare
It security in healthcare
 
Recommending information security measures
Recommending information security measuresRecommending information security measures
Recommending information security measures
 
CyberSecurity Cyber24x7.pdf
CyberSecurity Cyber24x7.pdfCyberSecurity Cyber24x7.pdf
CyberSecurity Cyber24x7.pdf
 
Cyber security
Cyber security Cyber security
Cyber security
 
Online Self Defense
Online Self DefenseOnline Self Defense
Online Self Defense
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Online reputation
Online reputationOnline reputation
Online reputation
 
Online reputation
Online reputationOnline reputation
Online reputation
 
IT Security DOs and DON'Ts
IT Security DOs and DON'TsIT Security DOs and DON'Ts
IT Security DOs and DON'Ts
 
Personal Threat Models
Personal Threat ModelsPersonal Threat Models
Personal Threat Models
 
Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....
 
Security Best Practices for Regular Users
Security Best Practices for Regular UsersSecurity Best Practices for Regular Users
Security Best Practices for Regular Users
 
Security best practices for regular users
Security best practices for regular usersSecurity best practices for regular users
Security best practices for regular users
 
Personal Internet Security Practice
Personal Internet Security PracticePersonal Internet Security Practice
Personal Internet Security Practice
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptx
 
E business internet fraud
E business internet fraudE business internet fraud
E business internet fraud
 
Anti Whaling Hardening Up Your Net Presence
Anti   Whaling   Hardening Up Your Net PresenceAnti   Whaling   Hardening Up Your Net Presence
Anti Whaling Hardening Up Your Net Presence
 

Kürzlich hochgeladen

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 

Kürzlich hochgeladen (20)

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 

Cyber Security Awareness Training by Win-Pro

  • 1. Cyber Security Awareness Training Win-Pro Consultancy Pte Ltd Ronald Soh https://www.winpro.com.sg
  • 2. What is Cyber Security? Cyber Security is the protection of internet-connected systems, including hardware, software and data, from cyberattacks.
  • 3. What is Information Security? •Protect the Confidentiality of data •Preserve the Integrity of data •Promote the Availability of data for authorized use
  • 5. Viruses •Viruses are malicious programs that hide themselves on your computer •May destroy your documents, format your hard drive, send emails from your computer or a variety of other actions
  • 6. Worms •Worms are self-replicating •Typically propagate and exploit through un-patched OS systems
  • 7. Trojans Masquerades as a normal program while quietly destroying data or damaging your system
  • 8. Logic Bombs Malware logic executes upon certain conditions. The program is often used for otherwise legitimate reasons.
  • 9. Root Kits •Low level programs that embed themselves in the operating system itself •Difficult if not impossible to detect
  • 10. Botnets A botnet is a number of compromised computers used to create and send spam or viruses or flood a network with messages as a denial of service attack. The compromised computers are called zombies.
  • 11. Social Engineering Social engineering manipulates people into performing actions or divulging confidential information. Similar to a confidence trick or simple fraud, the term applies to the use of deception to gain information, commit fraud, or access computer systems.
  • 12. Social Engineering • People are often the weakest links • All the technical controls in the world are worthless if you share your password or hold the door open • Attempts to gain • Confidential information or credentials • Access to sensitive areas or equipment • Can take many forms • In person • Email • Phone • Postal Mail
  • 13. How do you know you are been Social Engineered? • Lack of business credentials or identification • Making small mistakes • Trying too hard to sound more convincing • Rushing
  • 14. How to Protect Yourself Against Social Engineering? • Verify the visit with management • Always request identification and credentials • Closely monitor and observe visitors and vendors • Never trust suspicious emails • Do not reveal any information. • If the visit cannot be verified, the visitor should not be granted access
  • 15. Email • Common Attacks • Phishing • Malicious attachments • Spam • Scams • Best Practices • Don’t open suspicious attachments • Don’t follow links • Don’t attempt to “unsubscribe”
  • 17. Phishing • Deceptive emails to trick users to click on malicious links • Enter sensitive information • Run applications • Look identical to legitimate emails • Your Bank • PayPal • Government
  • 21. Strong Password Policy Why need strong password? • The stronger the password, the less likely it will be cracked Cracking: Using computers to guess the password through “brute-force” methods or by going through entire dictionary lists to guess the password
  • 22. Strong Password Policy • Never share your password with others! • Strong passwords should be • Minimum of 8 characters. Recommended > 12 characters • Includes numbers 0-9 • Includes symbols !@#$%^&*() • Includes upper and lowercase letters a-z, A-Z • Not include personal information, such as your name or family name, previously used passwords, important dates, FIN, NRIC, mobile numbers, car number, home address Examples: Strong Password: H81h@x0rZ Weak Password: jack1 • Change your password regularly or when it is need to. • Make sure that the login page has a timeout policy for unsuccessful retries.
  • 23. How to protect your Portable Devices? •Avoid USB Drives if you can. •Use USB Drives with proper encryption. •Encrypt your notebook •Do not leave it unattended and unsecured. •Avoid connecting to Free Wireless •Do not download free apps from unknown sources •Report any loss of devices immediately.
  • 24. Be Careful of your Trash… • Dumpster Diving is the act of sorting through garbage to find documents and information that has been improperly discarded • Some things we’ve found: • Computer Harddisk • USB Drives • Customer information • Internal records • Applications • Credit cards • Technical documentation • Backup tapes • Loan applications • Floor plans/schematics • Copies of identification
  • 25. How to Protect Your Paper Trash? • Destroy all confidential paper data with a good office paper shredder • Make Cross-cut only – Straight-cut is easy to re-assemble • Split into 2 or more different bags and disposed in different location on different days • Do not recycle your printed paper
  • 26. How to Dispose your old PC, Notebook or Copier? •Remove Harddisk or some form of disk storage from Most PC, Notebook and printers. •Make you have wiped the data securely before you dispose them (DOD Standards)
  • 27. How do you know that you compromised? Possible Symptoms:  Antivirus software detects a problem.  Running of Disk space unexpectedly.  More Pop-ups appearing  Files or transactions appear that should not be there.  PC slowing down.  Unusual messages, sounds, or displays on your monitor.  The mouse pointer moves by itself.  The computer spontaneously shuts down or reboots.  Often unrecognized or ignored problems.
  • 28. What should you do when you suspect that you are compromised? • Disconnect any USB connection • Disconnect any Wireless and Wired Connection • Make sure that your antivirus is running • Make sure that your firewall is running • Report to your boss
  • 29. 13 Ways to Protect Your Company 1. Use Strong Password. Never share your passwords with others. Change password regularly. 2. Never pre-open the door or allow strangers inside the building 3. Destroy all confidential paper with shredder. 4. Dispose IT equipment carefully. 5. Avoid using mobile devices. Encrypt Mobile Devices. 6. Wipe data securely before disposal
  • 30. 13 Ways to Protect Your Company 8. Wipe data securely before disposal 9. Treat Email with cautions. Do not open attachments or click suspicious links 10.Secure all confidential information when you are not around. 11.If noticed abnormal PC behavior, then Report to Boss 12.Report suspicious activity or persons immediately 13.Always lock your workstation when you step away
  • 31. Alerts and Advisories • Cyber Security Agency of Singapore • https://www.csa.gov.sg/ • National Cybersecurity and Communications Integration Center • https://www.us-cert.gov/ • Microsoft: • http://www.microsoft.com/security/ • Security Focus: • http://www.securityfocus.com/

Hinweis der Redaktion

  1. Never to plug in any portable devices with approval from IS director.