FBI Phoenix Computer Crime Squad SA Tom Liffiton 10/23/2003 Maricopa Association of Governments Telecommunications Advisory Group.

Slides:



Advertisements
Similar presentations
IT Web Application Audit Principles Presented by: James Ritchie, CISA, CISSP….
Advertisements

Security Controls – What Works
Information Security Policies and Standards
OPM Cybersecurity Competencies by Occupation (Technical Competencies) Information Technology Management Series Electronics Engineering.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Cybersecurity Summit 2004 Andrea Norris Deputy Chief Information Officer/ Director of Division of Information Systems.
IS 380 OME 1 Fall 2010 Class 1. Administrative Roster Syllabus Review Class overview 10 domains overview.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Creation of Policies, Part.
Computer Security: Principles and Practice
Copyright © Center for Systems Security and Information Assurance Lesson Eight Security Management.
Oklahoma Chapter Information Systems Security Association Oklahoma Chapter, Tulsa Oklahoma City Chapter, OKC Student Chapter, Okmulgee Oklahoma Chapter,
Certification and Training Presented by Sam Jeyandran.
Information Security Compliance System Owner Training Richard Gadsden Information Security Office Office of the CIO – Information Services Sharon Knowles.
Information Security Research Program Henry Lee Manager, Security Policy and Research Office of the Chief Information Officer December 2007.
Securing Information Systems
Auditing for Security Management By Cyril Onwubiko Network Security Analyst at COLT Telecom Invited Guest Lecture delivered at London Metropolitan University,
Information Security Training for Management Complying with the HIPAA Security Law.
General Awareness Training
Thomas Levy. Agenda 1.Aims: CIAN 2.Common Business Attacks 3.Information Security & Risk Management 4.Access Control 5.Cryptography 6.Physical Security.
Evolving IT Framework Standards (Compliance and IT)
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Confidentiality Integrity Accountability Communications Data Hardware Software Next.
FBI’s InfraGard.
© 2001 Carnegie Mellon University S8A-1 OCTAVE SM Process 8 Develop Protection Strategy Workshop A: Protection Strategy Development Software Engineering.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #6 Forensics Services September 10, 2007.
Thomas Levy. Agenda 1.Aims: Reducing Cyber Risk 2.Information Risk Management 3.Secure Configuration 4.Network Security 5.Managing User Access 6.Education.
Undergraduate Technology Programs John Baker Johns Hopkins University Carey Business School
Can your team outwit, outplay and outlast your opponents to be the ultimate CyberSurvivor?
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
Web Security for Network and System Administrators1 Chapter 2 Security Processes.
Supervision of Information Security and Technology Risk Barbara Yelcich, Federal Reserve Bank of New York Presentation to the World Bank September 10,
Information Systems Security Operations Security Domain #9.
Advanced Accounting Information Systems Day 20 Control and Security Frameworks October 9, 2009.
Security is not just… 1 A Compliance Exercise Certification and Accreditation FISMA.
A PRACTICAL GUIDE TO RESPONDING TO A HEALTHCARE DATA SECURITY BREACH May 19, 2011 | State College, PA Matthew H. Meade Stephanie Winer-Schreiber.
Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
January 6, 2003 A Gathering of Networks. Network Security Issues & Developments.
Note1 (Admi1) Overview of administering security.
Knowing What You Missed Forensic Techniques for Investigating Network Traffic.
Ali Alhamdan, PhD National Information Center Ministry of Interior
InfraGard A Government and Private Sector Alliance Information sharing begins with human relationships – people talking with people whom they trust. Information.
Scott Charney Cybercrime and Risk Management PwC.
Dr. Hilton CHAN Technology Crime Division Commercial Crime Bureau
Agency Name Security Program FY 2009 John Q. Public Agency Director/CIO/ISO.
T.A 2013/2014. Wake Up Call! Malware hijacks your , sends death threats. Found in Japan (Oct 2012) Standford University Recent Network Hack May Cost.
E NGINEERING STUDIES IN T ELECOMMUNICATIONS S ECURITY School of Communication Engineering.
What is “national security”?  No longer defined only by threat of arms  It really is the economy  Infrastructure not controlled by the government.
International Cyber Warfare & Security and B2B Conference Participation of Brazilian Cyber Defense Centre ( )
National Model Scanning Tour “Communications”. The Iowa Department of Public Safety administers a trusted statewide network of servers, PCs, service.
Configuring Electronic Health Records Privacy and Security in the US Lecture a This material (Comp11_Unit7a) was developed by Oregon Health & Science University.
The Art of Information Security: A Strategy Brief Uday Ali Pabrai, CISSP, CHSS.
Information Security tools for records managers Frank Rankin.
The Health Insurance Portability and Accountability Act of 1996 “HIPAA” Public Law
CSC4003: Computer and Information Security Professor Mark Early, M.B.A., CISSP, CISM, PMP, ITILFv3, ISO/IEC 27002, CNSS/NSA 4011.
FBI Phoenix Computer Crime Squad SA Tom Liffiton 10/23/2003 Maricopa Association of Governments Telecommunications Advisory Group.
OFFICE OF VA ENTERPRISE ARCHITECTURE VA EA Cybersecurity Content Line of Sight Report April 29, 2016.
Welcome Information Security Office Services Available to Counties Security Operations Center Questions.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
Donald JG Chiarella, PhD, CISM, CDMP, PEM, CHS-CIA, MBA.
Cybersecurity - What’s Next? June 2017
CMGT 582 STUDY Lessons in Excellence--cmgt582study.com.
Network Intrusion Responder Program
FBI Phoenix Incident Response Planning, Law Enforcement Issues,
Cybersecurity Special Public Meeting/Commission Workshop for Natural Gas Utilities September 27, 2018.
IS4550 Security Policies and Implementation
Introduction to the PACS Security
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Presentation transcript:

FBI Phoenix Computer Crime Squad SA Tom Liffiton 10/23/2003 Maricopa Association of Governments Telecommunications Advisory Group

FBI Phoenix Computer Crime Squad Cyber Front Status Report

FBI Phoenix – Computer Crime Squad

social engineering

FBI Phoenix – Computer Crime Squad vulnerabilities tech

FBI strategy Computer Crime Squad Network Security Issues

FBI Phoenix – Computer Crime Squad FBI Priorities Post 9/11/2001 counterterrorism counterintelligence computer crime investigations prevention

FBI Phoenix – Computer Crime Squad unauthorized access malicious code denial of service Investigation - Computer Intrusion Program

FBI Phoenix – Computer Crime Squad Active investigations Developing intelligence Sharing intelligence Investigation - Computer Intrusion Program

FBI Phoenix – Computer Crime Squad InfraGard Chapters Outreach Presentations Information Sharing Prevention - InfraGard Program

FBI Phoenix – Computer Crime Squad CSI/FBI 1996 – 2003 COMPUTER CRIME AND SECURITY SURVEY

Unauthorized use of computer systems within the last 12 months? CSI/FBI 2001 Computer Crime and Security Survey Source: Computer Security Institute 2001: 532 Respondents/99.6% 2000: 585 Respondents/91% 1999: 512 Respondents/98% 1998: 515 Respondents/99% 1997: 391 Respondents/69% 1996: 410 Respondents/96% YESNODON’T KNOW Percentage of Respondents

FBI Phoenix – Computer Crime Squad

FBI Phoenix – Computer Crime Squad 56 FBI offices 79 chapters members information sharing

FBI Phoenix – Computer Crime Squad SA Tom Liffiton x contact

FBI Phoenix – Computer Crime Squad

ISO STANDARDS Security Policy Security Organization Asset classification and control Personnel Security Physical and environmental security Communications and operations management Access Control Systems Development and maintenance Business Continuity Management Compliance (HIPAA) (Gramm-Leach-Bliley)

Implementing the National Strategy Congress and Conference InfraGard 2003 Washington, DC June 23-25, 2003

FBI Phoenix – Computer Crime Squad wireless vulnerabilities pbx vulnerabilities incident response intrusion detection computer forensics encrypted storage disaster recovery local presentations

FBI Phoenix – Computer Crime Squad have a relationship with law enforcement adopt info assurance best practices develop incident response plan educate users on security participate in InfraGArd maintain audit logs think evidence practice due diligence to do to do to do to do to do

FBI Phoenix – Computer Crime Squad SA Tom Liffiton x contact