Click to edit Master title style 4 lines of copy, 60 char. max

Published on
Embed video
Share video
Ask about this video

Scene 1 (0s)

[Virtual Presenter] I am not familiar with the context of the slides, so my answer might not be accurate..

Scene 2 (7s)

[Audio] We leverage social media platforms to facilitate communication and collaboration among team members. These platforms enable us to share information, ideas, and experiences, connecting with each other. By utilizing them, we build stronger relationships, streamline our workflow, and boost our overall performance. We adhere to the bank's guidelines and policies to maintain a professional online presence. Our objective is to create a positive and engaging environment that promotes creativity, innovation, and growth..

Scene 3 (39s)

[Audio] Our team advises the bank's management and provides technical leadership on all matters related to digital technologies and business transformation using emerging technologies. We lead software development, manage implementations, and drive the bank's innovation initiatives. We oversee cybersecurity operations, including the security operations center, incident response, engineering, and administration. We develop solutions that enhance decision-making by managing data lakes and warehouses, improving data accessibility across the bank. We create a business relationship management role, organized into finance, operations, monitoring, functions, and regional IT coordination. We ensure smooth operations by managing and supporting existing systems, networks, and infrastructure, while providing user service support, including managing and resolving IT incidents and problems..

Scene 4 (1m 34s)

[Audio] The screen is where we start our journey today. With a clear view, we can navigate through the world of social media. Whether it's a laptop, docking station, or sec-lock, our screen is the gateway to endless possibilities. We will explore how to use these devices effectively, ensuring our online presence is secure and private..

Scene 5 (1m 53s)

[Audio] Consultants and staff who use their own devices to access the bank's network are required to ensure that their devices meet certain specifications. These specifications include having a Windows laptop with Windows 10 Pro or 11 Pro edition, a trusted platform module installed, and Windows Defender enabled and up-to-date. Additionally, automatic updates should be enabled. For Mac devices, the minimum requirement is macOS version 13.0 or higher, while for Android devices, the minimum requirement is Android version 8.0 or higher. For iOS/iPadOS devices, the minimum requirement is iOS version 15.0 or higher. The bank allows bring-your-own-device (BYOD) at no cost, and it is the responsibility of the consultant to ensure that all standards are met. The ADB call centre will assess the devices to ensure compliance with these requirements. The devices will be updated with the latest software as needed by the bank..

Scene 6 (2m 51s)

[Audio] Bienvenue à la diapo 6 de notre présentation sur les services de médias sociaux. Aujourd'hui, nous allons discuter de l'utilisation des médias sociaux pour atteindre vos objectifs professionnels. Si vous rencontrez un problème, n'hésitez pas à contacter notre Service Desk. Vous pouvez consulter notre base de connaissances pour trouver des réponses à vos questions. Si vous avez besoin d'aide pour naviguer sur notre plateforme, notre guide Vi peut vous orienter. Notre équipe est également disponible pour répondre à vos questions spécifiques à travers notre assistance à distance. N'oubliez pas de consulter notre catalogue et nos articles pour obtenir plus d'informations sur notre plateforme. Nous sommes là pour vous aider à réussir dans le monde des médias sociaux. N'hésitez pas à poser des questions si nécessaire..

Scene 7 (3m 35s)

[Audio] The first step in resolving any issue is to contact the ADB Call Centre. We will then provide face-to-face or virtual support to address the problem. Following this, we will monitor the after-service process to ensure that the issue is fully resolved and closed..

Scene 8 (3m 51s)

[Audio] The African Development Bank uses various social media platforms including Facebook, Twitter, LinkedIn, YouTube, Instagram, and WhatsApp. These platforms enable the bank to share information, engage with stakeholders, and promote its activities. The bank utilizes these platforms to disseminate news, updates, and announcements related to its projects and initiatives. The Communications Department manages the bank's social media presence, ensuring that all posts are accurate, timely, and relevant to the target audience. Followers are encouraged to interact with the bank through likes, shares, and comments, and responses are provided promptly to any messages or queries. The bank aims to leverage social media to increase awareness and understanding of its mission and objectives, as well as to build a community of supporters who can assist in achieving its goals..

Scene 9 (4m 41s)

[Audio] Data protection is crucial in today's digital age. We use a whole-disk encryption program that encrypts data on our PCs to ensure the security of our sensitive information. Any unauthorized access attempts by individuals who do not possess the decryption key or the user's confidential code will be prevented..

Scene 10 (4m 59s)

[Audio] The username is a combination of three characters from your full name and six digits from your PER Number, issued by the HR department. For instance, if your full name is Smith, John, and your PER Number is 123456, your username would be SMJ123456. This username is used for authentication purposes across all applications. To log in, press the Ctrl-Alt-Del keys on your Windows computer. Furthermore, passwords must be at least eight characters long and comprise a mix of lowercase and uppercase letters, numbers, and special characters. It is advisable to modify your Windows password every 90 days for security reasons..

Scene 11 (5m 46s)

[Audio] The SAP password and the Windows password are the two passwords we need to remember. While all other applications use single sign-on, SAP requires a separate login credential. We must change our Windows password every 90 days to maintain security. We can manage our Windows password through the self-service portal at http://selfservice.afdb.org. By keeping our passwords complex and regularly updated, we reduce the risk of vulnerabilities and keep our systems secure..

Scene 12 (6m 15s)

Office 365 for Communication | Outlook Email. 12.

Scene 13 (6m 22s)

[Audio] Azure Information Protection is a data protection system that helps staff work with the Bank's sensitive information securely by classifying and protecting the Bank's critical data appropriately..

Scene 14 (6m 33s)

[Audio] The Phish Alert Button, or PAB, is an add-in on Outlook that enables bank users to report suspicious emails to the cybersecurity team for review and response. Using this button provides an early warning to the bank's cybersecurity team of potential phishing attacks and malicious emails, allowing them to take appropriate action to protect the bank's information assets. If you receive an email that concerns you, please use the PAB to inform the cybersecurity team. Reported emails will be automatically deleted from your inbox and forwarded to the cybersecurity team and email system administrators for analysis..

Scene 15 (7m 10s)

Microsoft Teams for Corporate Communications. 15.

Scene 16 (7m 18s)

[Audio] OneDrive backs up all data in a single, secure location. The cloud service enables secure sharing among authorized users and can be accessed from any authorized device connected to the bank network. Daily activation of OneDrive is necessary for automatic laptop backup, ensuring successful restoration in case of damage or laptop failure. All employees must participate in the OneDrive training course to learn how to securely store Bank data and information..

Scene 17 (7m 46s)

[Audio] Microsoft Intune provides multiple layers of protection for enhanced security. The first layer involves identifying and authorizing the user to access any information or tools on the platform. This can be achieved through methods like two-factor authentication or biometric scans. The second layer consists of device policies, which regulate the use and access of company devices, restricting downloads of unauthorized apps and access to unsecured networks. The third layer is application policies, controlling the flow of sensitive data on applications by limiting access to certain features or requiring encryption for data transfer. The fourth layer is content policies, protecting against the transfer of confidential information by monitoring and blocking certain types of content or enforcing data loss prevention measures. Finally, the Enterprise Mobility Suite simplifies these layers of protection by offering a centralized platform for managing and securing all devices, applications, and content..

Scene 18 (8m 48s)

[Audio] The African Development Bank (AfDB) has a Documents and Records Management System (DARMS). This system allows users to search, evaluate, and collaborate on documents. The bank also uses SharePoint as a collaboration platform. Additionally, there is a database called "Quality Platform" which tracks the Integrated Quality Assurance Plan. Furthermore, the bank utilizes Citrix ShareFile for document sharing and storage. Other platforms used include Knowledge & Virtual Resources (KVRC), Smart Office 365, Trust Funds & Co-Financing Finder, and NSO Project. The bank also has an e-Banking system called eBank, which offers workflow automation. Finally, the bank provides training on cyber security, unified communication, and other IT-related topics through its Learning Management System (LMS)..

Scene 19 (9m 44s)

[Audio] Please note that the provided slides do not contain any text that needs rewriting into English. The slides appear to be a collection of images with some text in French, which does not require translation. Therefore, there is no text to rewrite..

Scene 20 (10m 0s)

[Audio] Virtual meetings require proper etiquette to ensure effective communication. To achieve this, one should ensure a quiet environment, free from distractions, and use a stable internet connection. It is essential to mute oneself when not speaking and wear appropriate clothing. Additionally, one should enable their video, pay attention, and look into the camera. Participants should avoid interrupting each other and instead wait for the previous speaker to finish before contributing. Questions can be written in the chat window or raised virtually. The host should facilitate the discussion and ensure everyone's participation..

Scene 21 (10m 36s)

[Audio] The e-Bank platform offers various services such as workflow automation, document management, and news updates. The platform also provides access to corporate applications like SAP, project procurement workflows, and lending activities. Furthermore, users can find information about trust funds and financing options. Additionally, there are sections for staff corner, organization directory, and recent content. Users can also access training materials and checklists for cybersecurity, unified communication, and other topics. The platform also allows users to register themselves for IT security training and manage their Windows passwords. Finally, users can reach out to the IT department for any technical issues..

Scene 22 (11m 24s)

[Audio] The virtual private network, or VPN, enables us to connect to the bank's network securely, allowing us to access applications hosted internally within the bank. To guarantee the security of this connection, we demand dual factor authentication, comprising a dual password system, to safeguard our access over the internet..

Scene 23 (11m 45s)

[Audio] The use of mobile devices should be limited to official bank business. Employees have a responsibility to exercise diligence and maintain a high level of accountability when utilizing these devices. They should strive to keep their communication costs within the allocated limits and ensure that their phone bills accurately reflect official business transactions. By doing so, they demonstrate their commitment to responsible usage and adherence to established guidelines..

Scene 24 (12m 13s)

[Audio] All participants to meetings will receive a link to join a meeting, which is https://afdb.zoom.us/j/99169954784?pwd=ZEM2eUhkWk4rQ0VtbnduM0lmeUdjQT09. The Meeting ID is 991 6995 4784 and the Passcode is 908567. To join the meeting, click on the link inserted in the invitation. A web browser page will open automatically on your computer or smart phone/tablet. If the Zoom app is already installed, please click "Open Zoom Meetings" if you see the system dialog..

Scene 25 (12m 59s)

[Audio] The Zoom App will launch automatically on your device, asking you to join with or without video. You should click "Join with Video" and then "Join with Computer Audio" to connect to the audio..

Scene 26 (13m 10s)

[Audio] If Zoom App is not installed in your device, click on "download and run Zoom". The app will launch automatically, prompting you to enter your name. Select "Remember my name for future meetings" and click on "Join Meeting". You can choose to join with or without video by clicking on "Join with Video". Finally, click on "Join with Computer Audio" to connect to the audio..

Scene 27 (13m 31s)

[Audio] Be sure you are in a quiet area free from unnecessary distractions. Mute yourself when not speaking. Use a stable internet connection - wired connection or find the best spot for a strong and consistent WIFI signal. Keep your phone on silent and away from your computer/speakers to prevent feedback. Ensure your technology works correctly - have the right light and frame the camera correctly. Wear work-appropriate clothing. Be on time - even if it means joining the meeting a little early. Enable your video - it's nice to see everyone, and some participants may be hearing impaired. Pay attention and look into the camera. Wait until someone has finished speaking before speaking yourself. Write questions in the chat window or raise your hand to ask them. If bandwidth is low, turn off your video. Use technology to fully engage with participants..

Scene 28 (14m 17s)

[Audio] Virtual meetings require proper etiquette. To ensure a successful virtual meeting, participants should be in a quiet area with minimal distractions. Muting oneself when not speaking is recommended. A stable internet connection is essential, whether through a wired connection or a reliable Wi-Fi signal. Participants should also ensure their phones are on silent mode and kept away from their computers or speakers to prevent feedback. Technology checks are crucial, including ensuring the correct lighting and framing the camera correctly. Wearing appropriate attire is also necessary. Punctuality is vital, and participants should join the meeting a few minutes early. Enabling video is encouraged, as it allows participants to see each other and helps those who are hearing-impaired. During the meeting, participants should pay attention and maintain eye contact with the camera. It's essential to avoid interrupting others and allow them to finish speaking before responding. Questions can be asked by writing them in the chat window or raising a virtual hand. The bank provides various trainings and resources to support employees. These include cyber security training, which is mandatory for all staff. The bank also offers training on unified communication, Microsoft Teams, Zoom meetings, and SAP business applications. Employees can access these trainings through the Learning Management System (LMS). The bank uses a document management system called DARMS, which enables employees to search, store, and share documents. DARMS provides features such as collaboration, document sharing, and version control. Employees can access DARMS through the SharePoint portal. Finally, the bank offers follow-up sessions and webinars to provide additional support and training to employees. These sessions are available on a group or one-on-one basis and can be scheduled as needed..

Scene 29 (16m 6s)

[Audio] Virtual meetings require proper etiquette. Ensure you are in a quiet area with no distractions. Mute yourself when not speaking and use a stable internet connection. Keep your phone on silent mode and away from your computer or speakers to prevent feedback. Dress appropriately and arrive on time, even if it's a few minutes early. Enable your video as it helps those who are hearing-impaired. Pay attention and look into the camera lens. Avoid interrupting others and use the chat window or "raise hand" feature if you have a question..

Scene 30 (16m 38s)

[Audio] The importance of corporate applications cannot be overstated. With numerous features and functionalities, they are a crucial platform for employees to access various services. As we navigate this digital landscape, it's essential to maintain a professional online presence through corporate applications. By creating engaging content, we can build brand awareness, drive website traffic, and ultimately generate leads. Whether it's Microsoft Teams, SAP, or other corporate applications, our strategy should be tailored to our unique goals and objectives. By leveraging these platforms effectively, we can increase our visibility, credibility, and reputation. Let's focus on crafting a compelling narrative that resonates with our audience. We'll explore how to create shareable content, engage with our followers, and measure our success. With the right approach, we can turn corporate applications into a powerful tool for driving business results..

Scene 31 (17m 34s)

[Audio] In today's digital age, social media plays a crucial role in our daily lives. Maintaining a professional online presence is essential as it has a vast reach and influence. Our actions online can have real-world consequences, whether we're sharing personal thoughts, engaging in discussions, or simply browsing. It's crucial to do so responsibly and respectfully, building trust, fostering connections, and promoting a positive online environment. We should strive to use social media wisely and effectively..

Scene 32 (18m 5s)

Board Papers. Board papers Sort by: Date (oldest first) Date (newest first) Name Board/Committee, Name portfolio/Meeting 14 Board Meeting 14 July 2023 - 10:00 VHOLE V Jully 202 i rd nived 12 Board Mee July 2023 -.

Scene 33 (18m 17s)

[Audio] The African Development Bank's mission is to promote economic growth, reduce poverty, and improve living standards across Africa. To achieve this goal, the bank focuses on mobilizing resources, providing financial assistance, and promoting private sector development. Through its various initiatives, the bank aims to empower local communities, foster regional integration, and support sustainable development. By participating in the bank's social media activities, individuals can stay informed about the latest developments, share their thoughts and ideas, and contribute to shaping a brighter future for Africa..

Scene 34 (18m 54s)

[Audio] Please note that the provided slides do not contain any text that needs rewriting into English. The slides appear to be a collection of images, logos, and navigation menus from various systems and applications used by the African Development Bank. There are no sentences that require translation or rewriting..

Scene 35 (19m 12s)

[Audio] Today's calendar includes important information for executive directors regarding travel and absence management. The key points in managing your schedule and responsibilities will be outlined. Firstly, travel procedures will be reviewed. Booking flights, accommodations, and transportation, as well as necessary visa or documentation requirements, must be done in advance to ensure smooth and cost-effective travel. Reporting absences, whether planned or unplanned, will also be covered. Requesting time off, providing proper documentation, and communicating with your team about necessary coverage are essential steps. By following these procedures, effective time management and smooth role operation can be ensured. As executive directors, being mindful of one's schedule and taking appropriate measures for any absences is crucial..

Scene 36 (20m 1s)

[Audio] The African Development Bank's corporate applications include various platforms such as intranet, e-banking, documents and records management systems, and SAP applications. These platforms provide real-time monitoring and reporting of board recommendations, ensuring transparency and accountability throughout the decision-making process. Advanced data analytics and visualization tools enable stakeholders to track progress, identify trends, and make informed decisions. The user-friendly interface and customizable dashboards empower users to stay informed and engaged throughout the entire recommendation lifecycle. From initiation to implementation, these platforms streamline the bank's workflow, fostering collaboration and efficiency..

Scene 37 (20m 46s)

[Audio] The Board Recommendations Monitoring System is designed to provide real-time monitoring and reporting of board recommendations. This system enables stakeholders to track progress, identify trends, and make data-driven decisions. Users can access critical information, such as recommendation status, implementation timelines, and performance metrics. Transparency and visibility are empowered through this system, allowing organizations to optimize their decision-making processes and improve overall governance..

Scene 38 (21m 17s)

[Audio] Cyber security training is essential for all employees to ensure the protection of our bank's systems and data. We recommend using unified communication tools like Microsoft Teams and Zoom meetings to stay connected and productive. Additionally, we suggest utilizing the SAP business application, Microsoft OneDrive, and Microsoft Office 365 to streamline work processes. Set up your VPN and use BitLocker to secure devices. Finally, register yourself for IT security training through our Learning Management System. This comprehensive list covers all necessary steps to get started with our IT services..

Scene 39 (21m 57s)

[Audio] Cyber security training is mandatory for all members of the workforce. Emails inviting all users for the required training are sent out periodically. Furthermore, follow-up sessions are available on a group or one-on-one basis to provide face-to-face training and handholding support. Moreover, webinars are also available and can be scheduled for all members of the workforce as needed..

Scene 40 (22m 20s)

Une image contenant Bleu Majorelle, léger Description générée automatiquement.