Information Security and Technology Overview Presented By: Enterprise Risk Management (ERM) Division Jill Martucci, CISA, SSCP, Senior Allison Hall, Experienced.

Slides:



Advertisements
Similar presentations
.. PCI Payment Card Industry Compliance October 2012 Presented By: Jason P. Rusch.
Advertisements

Target Data Breach – Cost of the Learning Curve Discuss the recent Target data breach and its impact on the industry as well as individuals January 29/30,
© 2014 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual.
Bank Crime Investigation Techniques by means of Forensic IT
Certification and Training Presented by Sam Jeyandran.
IT-Partners Limited © 2011 IT Partners Limited Y OUR IT SOLUTION P ARTNERS Managing Director Confidential Data Loss Prevention Sunny Ho 1.
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Building Your Security Strategy with 3D.
Information Security– SNO International Zanzibar, Tanzania Joe Beaulac, Sr. Manager – Cyber Defense Center & Risk/Vulnerability Management 23 September.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
InformationWeek 2014 Strategic Security Survey Research Findings © 2014 Property of UBM Tech; All Rights Reserved.
1 Group-IB: Digital investigations and forensic Ilya Sachkov Group-IB
Agenda Do You Need to Be Concerned? Information Risk at Nationwide
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
Mobile Technology and Cyber Threats Deon Woods Bell Office of International Affairs The Fifth Annual African Consumer Protection Dialogue Conference Livingstone,
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
Chapter 1: Accounting Information Systems and the Accountant
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Security considerations for mobile devices in GoRTT
Kevin Casady Hanna Short BJ Rollinson.  Centralized and Structured collection of data stored in a computer system  An electronic filing system  Easy.
Nata Raju Gurrapu Agenda What is Information and Security. Industry Standards Job Profiles Certifications Tips.
JAMIE S. HERMAN, C|CISO, CISM, CISSP MANAGER OF INFORMATION SECURITY ROPES & GRAY LLP.
Data Security: Steps to Improved Information Security September 22, 2015 Presented by: Alex Henderson General Counsel and Chief Administrative Officer.
Cyber Security Nevada Businesses Overview June, 2014.
Mobile Banking By: Chenyu Gong, Jalal Hafidi, Harika Malineni.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Data Security and Payment Card Acceptance Presented by: Brian Ridder Senior Vice President First National September 10, 2009.
Insurance of the risk Policy covers & underwriting issues Stephen Ridley, Senior Development Underwriter.
Frontline Enterprise Security
Tamra Pawloski Jeff Miller. The views, information, and content expressed herein are those of the authors and do not necessarily represent the views of.
Financial Sector Cyber Attacks Malware Types & Remediation Best Practices
Internal Audit Considerations for Cybersecurity Risks Posed by Vendors October th, 2015 Chicago IIA Chapter’s 2 nd Annual IIA Chicago IT Hacking.
IT Security Policy: Case Study March 2008 Copyright , All Rights Reserved.
Cyber Security and Incident Response
Develop your Legal Practice using “Cloud” applications, but … Make sure your data is safe! Tuesday 17 November 2015 The Law Society, London Allan Carton,
INTRODUCTION & QUESTIONS.
BUSINESS CLARITY ™ PCI – The Pathway to Compliance.
Friday 22nd April 2016 DS Chris Greatorex SEROCU
Security Outsourcing Melissa Karolewski. Overview Introduction Definitions Offshoring MSSP Outsourcing Advice Vendors MSSPs Benefits & Risks Security.
External Threats Internal Threats Nation States Cyber Terrorists Hacktivists Organised criminal networks Independent insider Insider planted by external.
Law Firm Data Security: What In-house Counsel Need to Know
Increasing Information and Data Security in Today’s Cybersecurity World 2017 Conference Review 6/6/2017.
CYBERSECURITY SOLUTIONS
EAST AFRICAN DATA HANDLERS DATA SECURITY/MOBILITY
An Update on FERPA and Student Privacy
Cyber Security Zafar Sadik
Case Study - Target.
Demystifying cybersecurity: Best practices to help strengthen your program Chris Candela Senior Consultant Business Consulting Services Charles Schwab.
Identity Theft Presentation
Data Compromises: A Tax Practitioners “Nightmare”
Cyber Attacks on Businesses 43% of cyber attacks target small business Only 14% of small business rate their ability to mitigate cyber risk highly.
Making a Holiday Special For All The Right Reasons
Presented by Security Management Partners Waltham, MA
Cybersecurity Awareness
CMGT 230Competitive Success/snaptutorial.com
CMGT 230 Education for Service-- snaptutorial.com
CMGT 230 Teaching Effectively-- snaptutorial.com.
Cyber Issues Facing Medical Practice Managers
cyberopsalliance.com |
Cyber Trends and Market Update
National Cyber Security
Securing the Threats of Tomorrow, Today.
CONTENTS BACKGROUND CLOUD MODELS SECURITY CONSIDERATIONS MANAGING RISK.
Anatomy of a Large Scale Attack
Forensic and Investigative Accounting
Business Compromise and Cyber Threat
Cyber Security: What the Head & Board Need to Know
Compliance in the Cloud
Cybersecurity: Don’t Be Scared; Be Prepared Dean Choudhri, CISSP, CISM, CRISC Assistant Vice President, Cybersecurity and Information Assurance Alloya.
Anatomy of a Common Cyber Attack
Presentation transcript:

Information Security and Technology Overview Presented By: Enterprise Risk Management (ERM) Division Jill Martucci, CISA, SSCP, Senior Allison Hall, Experienced Assistant

2 Agenda Overall Firm & ERM Capabilities Current Events and Threats Tips for 2016 Questions and Comments

3 Senior Consultant with a focus on information technology and information security auditing for banks and financial organizations Audit and assessment performance in areas such as SSAE16 SOC Reporting, FFIEC, GLBA, PCI DSS, etc. Experienced in vulnerability assessments, social engineering and phishing, and ethical hacking Clients range from $10 million + to $2 billion + Associates Degree in Criminal Justice and a Bachelor of Science Degree in Computer Security and Information Assurance Systems Security Certified Practitioner (SSCP) through the International Information Systems Security Certification Consortium ((ISC)²) Certified Information Systems Auditor (CISA) through the Information Systems Audit and Control Association (ISACA)

4 Consultant with a focus on Payment Card Industry Data Security Standard (PCI DSS) Compliance Audit and assessment performance in areas such as SSAE16 SOC Reporting, FFIEC, GLBA, etc. Experienced in vulnerability assessments, social engineering, and data analysis Clients range from $10 million + to $2 billion + Bachelor of Science Degree in Forensic Science Member of the Information Systems Audit and Control Association (ISACA) PCI DSS Payment Card Professional (PCIP) (pending)

5 Overall Firm Capabilities Founded in 1978 We are the 38 th largest accounting firm in the U.S. – Approximately 750 employees – Ten office locations, headquartered in Rochester – Approximately $100 million/year revenue – 141 partners/principals – 112 managers Full array of audit, accounting and consulting services Nationally & internationally aligned with Moore Stephens

6 Enterprise Risk Management Team Dedicated IT/IA Consultants – Certified Information Systems Auditors (CISA) – Certified in Risk and Information Systems Control (CRISC) – Certified in Information Security Management (CISM) – Certified Information Systems Security Professional (CISSP) – Certified Fraud Examiners (CFE) – Certified Internal Auditors (CIA) – Certified Information Technology Professionals (CITP) – PCI Qualified Security Assessor (PCI QSA)

7 Enterprise Risk Management Team Service Offerings Internal Audit IT Controls Consulting SSAE16 Service Organization Control (SOC) Reporting Computer Forensics Payment Card Industry Data and Application Security Services Vulnerability and Penetration Testing IT Risk Management HIPAA/HITECH Meaningful Use US State Data Privacy PCI DSS FFIEC SOX/COSO/CoBIT FTC Red Flags GLBA

8 Current Events and Threats Why Information Security? Savvy attackers are using increased levels of deception and, in some cases, hijacking companies’ own infrastructure and turning it against them 60 percent of all targeted attacks struck small- and medium-sized organizations Organizations are still not adopting basic best practices like blocking executable files and screensaver attachments

9 Current Events and Threats Stay Out of the News Former BancCentral (OK) Employee Charged with Accessing Bank Computer Network Former IT Engineer Stung for Destructive Attack Against Law Firm Owner of California Payment Processing Company Charged with Fraud Human Error to Blame as UK Data Breach Investigations Surge FBI Reports $2.3 Billion Lost to CEO Scams Over the Past Three Years Improper Data Transfer Leads to Data Exposure of 850,000 People Google Finds 800,000 Websites Breached Worldwide 51% of consumers will take business elsewhere post breach

10 Current Events and Threats Ransomware Type of malware that limits or prevents users from accessing their system Normally encrypts the user data – can spread to network data Victims must pay the ransom to regain access Phishing s designed to fool you Can be very convincing; they may appear to come from a friend or organization you know Sometimes use details from social media accounts

11 Current Events and Threats Cloud Data Losses Highly sensitive, confidential, and regulatory personal controlled data is regularly stored in the cloud Increasing use of cloud services can increase the probability of a $20 million data breach by as much as three times Cybercriminals are regularly using cloud services to exfiltrate data from inside your business or to gain access using trusted online services Bring Your Own Device (BYOD) Now being called BYODB - Bring Your Own Data Breach Mobile devices bring a new set of threats, including allowing malicious software an unparalleled look into victims’ lives

12 Tips for 2016 Be Prepared Conduct a Risk Assessment Identify and rank where ALL sensitive data is stored, processed, transmitted, and maintained, for clients and employees Incident Response and Preparedness For every $5.60 that a data breach costs you, the prevention would have cost only $1.00 Plug Known Holes and Perform Routine Audits Passwords, User Access, AV, Patching, Firewalls, Third Parties You cannot protect against a risk you do not know exists!

QUESTIONS?

14 Albany | Batavia | Buffalo | East Aurora | Geneva | New York City | Rochester | Rutland | Syracuse | Utica