Operated by Los Alamos National Security, LLC for NNSA U N C L A S S I F I E D Operated by Los Alamos National Security, LLC for NNSA U N C L A S S I F.

Slides:



Advertisements
Similar presentations
Operated by Los Alamos National Security, LLC for the U.S. Department of Energys NNSA U N C L A S S I F I E D Slide 1 Review and Release Safebox Frances.
Advertisements

INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Guide to Massachusetts Data Privacy Laws & Steps you can take towards Compliance.
U N C L A S S I F I E D LA-UR LANL Exchange / Blackberry Deployment June 2, 2009 Anil Karmel Solutions Architect Network and Infrastructure Engineering.
CAH Technology Office Technology Office Technology Support Web, Programming and Communication Network and Security Support Research Provides hardware.
Operated by Los Alamos National Security, LLC for NNSA U N C L A S S I F I E D LANS Company Sensitive — unauthorized release or dissemination prohibited.
Operated by Los Alamos National Security, LLC for NNSA U N C L A S S I F I E D Slide 1 Roles Based Network Access Controls James R. Clifford Los Alamos.
Cybersecurity Summit 2004 Andrea Norris Deputy Chief Information Officer/ Director of Division of Information Systems.
Data Security Issues in IR Eileen Driscoll Institutional Planning and Research Cornell University
Contact Center Security Strategies Grant Sainsbury Practice Director, Dimension Data.
Physical and Cyber Attacks1. 2 Inspirational Quote Country in which there are precipitous cliffs with torrents running between, deep natural hollows,
Bullet-Proofing Your Wireless Router By Steve Janss.
Patch Management Module 13. Module You Are Here VMware vSphere 4.1: Install, Configure, Manage – Revision A Operations vSphere Environment Introduction.
Comprehensive IT Consulting Services an innovative approach to business.
Website Hardening HUIT IT Security | Sep
Security Guide for Interconnecting Information Technology Systems
User Services. Services Desktop Support Technical Support Help Desk User Services Customer Relationship Management.
Module 9 Configuring Server Security Compliance. Module Overview Securing a Windows Infrastructure Overview of EFS Configuring an Audit Policy Overview.
Cyber Patriot Training
General Awareness Training
11 SECURITY TEMPLATES AND PLANNING Chapter 7. Chapter 7: SECURITY TEMPLATES AND PLANNING2 OVERVIEW  Understand the uses of security templates  Explain.
© 2010 VMware Inc. All rights reserved Patch Management Module 13.
IT Security Essentials Lesley A. Bidwell, IT Security Administrator.
© British Telecommunications plc BT Managed Services Innovate
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Troubleshooting Windows Vista Security Chapter 4.
Operated by Los Alamos National Security, LLC for the U.S. Department of Energy’s NNSA U N C L A S S I F I E D Slide 1 Nick Salazar Operations Support.
Operated by Los Alamos National Security, LLC for the U.S. Department of Energy’s NNSA U N C L A S S I F I E D Lessons Learned: Certification and Accreditation.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
PCI Compliance: The Gateway to Paradise PCI Compliance: The Gateway to Paradise.
Unit 6b System Security Procedures and Standards Component 8 Installation and Maintenance of Health IT Systems This material was developed by Duke University,
ICT development office ICT research, planning and training dept. Network development and administration dept. System development and operation dept. President.
Your Name Your Title Here Your phone number Insert your photo here.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
TAX-AIDE Security 2013 Regional Meetings1. TAX-AIDE Security ● This year in the AARP Foundation Tax-Aide program there were: Two(2)confirmed laptops reported.
Joel Rosenblatt Director, Computer and Network Security September 10, 2013.
Chapter 2 Securing Network Server and User Workstations.
Network Security & Accounting
Introduction TO Network Administration
Configuring, Managing and Maintaining Windows Server® 2008 Servers Course 6419A.
Personal System Administration CS5493. SA SA is a Systems Administrator The SA is responsible for maintaining the overall wellbeing of a computing system.
IOAP Setup and Maintenance of Assessment Laptop. Introduction In order to have smooth functioning of laptops during ion assessments, a few setup activities.
.  Hubs send data from one computer to all other computers on the network. They are low-cost and low-function and typically operate at Layer 1 of the.
IOAP Setup and Maintenance of Assessment Laptop. Introduction In order to have smooth functioning of laptops during ion assessments, a few setup activities.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Operated by Los Alamos National Security, LLC for NNSA U N C L A S S I F I E D Slide 1 Managing Network Threat Information  Giri Raichur, Network Services.
IOAP Setup and Maintenance of Assessment Laptop. Introduction In order to have smooth functioning of laptops during ion assessments, a few setup activities.
Agenda Last class: Computer Software Today: –Task Manager, Control Panel.
Cyber Security: Today’s Threats and Mitigations Jonathan Homer, Cyber Security Analyst Idaho National Laboratory.
Labs. Session 1 Lab: Installing and Configuring Windows 7 Exercise 1: Migrating Settings by Using Windows Easy Transfer Exercise 2: Configuring a Reference.
Professional Technicians Do Provide Support For Guardian Not Scanning In Windows8 or In Other Windows. Professional Technicians Do Provide Support For.
Operated by Los Alamos National Security, LLC for DOE/NNSA LANS Company Sensitive — unauthorized release or dissemination prohibited U N C L A S S I F.
Operated by Los Alamos National Security, LLC for NNSA U N C L A S S I F I E D Slide 1 Windows Desktop Deployment Service at LANL Mark Wingard Central.
Technology Requirements for Online Testing Training Module Please refer to the revision log on the last slide of this presentation, updated August.
SoCal Cybersecurity Community College Consortium
An Introduction to Attendance on Demand
Introduction to the Federal Defense Acquisition Regulation
IBM Software Group | Tivoli Brand Software
Information Technology (IT) Department
CIS 349 Competitive Success/snaptutorial.com
CIS 349 Education for Service/snaptutorial.com
CIS 349 Teaching Effectively-- snaptutorial.com
Relate to Clients on a business level
MIS.
Radoslaw Jedynak, PhD Poland, Technical University of Radom
Bethesda Cybersecurity Club
PLANNING A SECURE BASELINE INSTALLATION
Technology Maintenance
Presentation transcript:

Operated by Los Alamos National Security, LLC for NNSA U N C L A S S I F I E D Operated by Los Alamos National Security, LLC for NNSA U N C L A S S I F I E D Slide 1 Laptops on Foreign Travel (LoFT) Vera Vigil - LANL Operated by Los Alamos National Security, LLC for DOE/NNSA U N C L A S S I F I E D LA-UR

Operated by Los Alamos National Security, LLC for NNSA U N C L A S S I F I E D Operated by Los Alamos National Security, LLC for NNSA U N C L A S S I F I E D Slide 2 Laptops on Foreign Travel (LoFT) By Vera Vigil DCAC team, CTN-2 Los Alamos National Laboratory

Operated by Los Alamos National Security, LLC for NNSA U N C L A S S I F I E D Operated by Los Alamos National Security, LLC for NNSA U N C L A S S I F I E D Slide 3 Introduction Background Development Implementation Loan Process Walk-thru Customer Feedback Future Improvements

Operated by Los Alamos National Security, LLC for NNSA U N C L A S S I F I E D Operated by Los Alamos National Security, LLC for NNSA U N C L A S S I F I E D Slide 4 Background Government laptops taken on foreign travel pose special risks –Data and/or equipment loss or stolen Risk Mitigation –Federal information security requirements for protecting Sensitive Unclassified Information (SUI)

Operated by Los Alamos National Security, LLC for NNSA U N C L A S S I F I E D Operated by Los Alamos National Security, LLC for NNSA U N C L A S S I F I E D Slide 5 LoFT Development Chief Security Officer (CSO) tasked Computing, Telecommunication (CTN), and Networking Division to create a lending pool Consulted with Sandia National Laboratory Consulted with LANL Partners –Property –Cyber Security –Office of Counterintelligence (OCI) –Foreign Travel Office –Technical Surveillance Countermeasures (TSCM) –Customs Office –CTN-2 Organizational Computer Security Representative (OCSR)

Operated by Los Alamos National Security, LLC for NNSA U N C L A S S I F I E D Operated by Los Alamos National Security, LLC for NNSA U N C L A S S I F I E D Slide 6 LoFT Development Acquired hardware, software, other misc items Configured two servers Developed LoFT Database Created on-line Request Form

Operated by Los Alamos National Security, LLC for NNSA U N C L A S S I F I E D Operated by Los Alamos National Security, LLC for NNSA U N C L A S S I F I E D Slide 7 LoFT Development Laptops maintained in an access controlled environment Mac Address Control (MAC) Customer Information Packet LoFT Technician Operations Guide

Operated by Los Alamos National Security, LLC for NNSA U N C L A S S I F I E D Operated by Los Alamos National Security, LLC for NNSA U N C L A S S I F I E D Slide 8 LoFT Implementation System Configuration –Standard Images –Sanitization –User Accounts

Operated by Los Alamos National Security, LLC for NNSA U N C L A S S I F I E D Operated by Los Alamos National Security, LLC for NNSA U N C L A S S I F I E D Slide 9 LoFT Implementation Data Protection –Partner with OCI –Partner with TSCM –Encryption –Wireless and Bluetooth are turned off when system is on-site

Operated by Los Alamos National Security, LLC for NNSA U N C L A S S I F I E D Operated by Los Alamos National Security, LLC for NNSA U N C L A S S I F I E D Slide 10 LoFT Implementation Data Protection continued –CTN Managed Firewall –Only information that is necessary for the specific trip should be placed onto the laptop –Current Anti-virus software with auto- protection option enabled –Current Ad-Aware and Window Defender

Operated by Los Alamos National Security, LLC for NNSA U N C L A S S I F I E D Operated by Los Alamos National Security, LLC for NNSA U N C L A S S I F I E D Slide 11 Loan Process Walk-thru Customer initiates request using on-line request form

Operated by Los Alamos National Security, LLC for NNSA U N C L A S S I F I E D Operated by Los Alamos National Security, LLC for NNSA U N C L A S S I F I E D Slide 12 Loan Process Walk-thru LoFT issue created

Operated by Los Alamos National Security, LLC for NNSA U N C L A S S I F I E D Operated by Los Alamos National Security, LLC for NNSA U N C L A S S I F I E D Slide 13 Loan Process Walk-thru LoFT Technician –contacts customer with LoFT Information Packet –notifies Property Agents of new loan request –schedules scanning of system going to sensitive country with OCI –configures and test system, applications, and user accounts

Operated by Los Alamos National Security, LLC for NNSA U N C L A S S I F I E D Operated by Los Alamos National Security, LLC for NNSA U N C L A S S I F I E D Slide 14 Loan Process Walk-thru LoFT Technician continued – meets with customer after OCI scanning of systems –update information in LoFT Database –notifies Property Agents each time system changes hands –updates issue in issue tracking system

Operated by Los Alamos National Security, LLC for NNSA U N C L A S S I F I E D Operated by Los Alamos National Security, LLC for NNSA U N C L A S S I F I E D Slide 15 Loan Process Walk-thru Check-in Process –LoFT Technician schedule system return with customer complete check-in form verify system is in good working order checks event logs

Operated by Los Alamos National Security, LLC for NNSA U N C L A S S I F I E D Operated by Los Alamos National Security, LLC for NNSA U N C L A S S I F I E D Slide 16 Loan Process Walk-thru Check-in Process –LoFT Technician continued if system was taken to sensitive country takes it to both OCI and TSCM for scanning Updates LoFT Database and closes LoFT issue

Operated by Los Alamos National Security, LLC for NNSA U N C L A S S I F I E D Operated by Los Alamos National Security, LLC for NNSA U N C L A S S I F I E D Slide 17 Customer Feedback Provide light weight systems Image should have Complete install of software instead of Typical Provide a mouse with system

Operated by Los Alamos National Security, LLC for NNSA U N C L A S S I F I E D Operated by Los Alamos National Security, LLC for NNSA U N C L A S S I F I E D Slide 18 Future Improvements On-site forensic scanning of systems Customized images for frequent travelers On-site wireless access for testing and training Make available Linux Configurations and VMware

Operated by Los Alamos National Security, LLC for NNSA U N C L A S S I F I E D Operated by Los Alamos National Security, LLC for NNSA U N C L A S S I F I E D Slide 19 Questions? Vera Vigil ext Thank you for attending this presentation!!