DOJ CYBER RISK REPORT 2015 BREACHES & THE CYBER LANDSCAPE CYBER SECURITY? HUH?

Slides:



Advertisements
Similar presentations
1 Richard V. Tucker, CIC Applied Systems Users Group of Central New Jersey Cyberslacking Cyberslacking Introduction.
Advertisements

Helping our customers keep their computers safe.  Using your pet’s, business, family, friend’s names  Using number or letter sequences (0123, abcd)
Slide Heading Seminar Series: Managing IT Risk In 2010 Understanding End User Attack Vectors Brian Judd, CISSP SynerComm January 20, 2009.
Update your Software or Die! Wolfgang Kandek Qualys, Inc. RMISC 2012 Denver - May 18, 2012.
Guide to Massachusetts Data Privacy Laws & Steps you can take towards Compliance.
Computer Maintenance & Safety Spring Internet Safety Keeping your computer safe What is a computer virus? A computer program that can copy itself.
Vehicle Accident Reporting Presented by the Office of Risk Management.
. 15 Patches / 32 Vulns – 9 Critical Affecting most everything Other updates, MSRT, Defender Definitions, Junk Mail Filter –MS Windows.
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
Web server security Dr Jim Briggs WEBP security1.
INFORMATION SECURITY UPDATE Al Arboleda Chief Information Security Officer.
INFORMATION SECURITY AWARENESS PRESENTED BY KAMRON NELSON AND ROYCE WILKERSON.
Morris Bennett Altman Director of Network Services Internet Security Officer Queens College, CUNY Are You Exposed? Network Security.
Citadel Security Software Presents Are you Vulnerable? Bill Diamond Senior Security Engineer
Information Security Information Technology and Computing Services Information Technology and Computing Services
Fermi Computer Incident Response Team Computer Security Awareness Day March 8, 2005 Michael Diesburg.
Elite Networking & Consulting Presents: Everything You Wanted To Know About Data Insurance* * But Were Afraid To Ask Elite Networking & Consulting, LLC,
Using The Website Water Users Workshop March 7-8, 2006 Boyd Clayton.
Design of a cyber security awareness campaign for Internet Cafés users in rural areas WA Labuschagne, MM Eloff, N Veerasamy, L Leenen, M Mujinga CSIR /
1 Group-IB: Digital investigations and forensic Ilya Sachkov Group-IB
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
CROWNWeb Reporting CROWNWeb – Reporting Matt McDonough Communications Coordinator NW7 Mike Seckman Technical Writer NW7.
Dr E Kritzinger – UNISA SACSAW Cyber Awareness Implementation Plan (CAIP) for schools.
Objectives  Accessing and Navigating within AQS  Resources available on the AQS Website  AQS Support.
E-Security: 10 Steps to Protect Your School’s Network NEN – the education network.
Securing the Human. Presented by Thomas Nee, Computer Coordinator Town of Hanover, Massachusetts hanover-ma.gov/information-technology October is Cyber.
IT Security Essentials Lesley A. Bidwell, IT Security Administrator.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
November 10,  Acceptable use  Internet Filtering  Social Web (MySpace, Facebook, etc.)  Cyberbullying  Plagiarism  Phishing.
Cyber Security & Fraud – The impact on small businesses.
CERN IT Department CH-1211 Genève 23 Switzerland t Windows Desktop Applications Life-cycle Management Sebastien Dellabella, Rafal Otto Internet.
ThankQ Solutions Pty Ltd thankQ Cloud Scott Druery 2015.
Outlook WEB How to access your Brevard County Schools Outlook from any Internet-based PC.
President: Christopher Brooks II Vice President: Ja’Sena R. Smith Technical Coordinator: LaShonda May Kid- nology “Where Knowledge and Technology is POWER!”
Information Commissioner’s Office Sheila Logan Operations and Policy Manager Information Commissioner’s Office Business Matters 20 May 2008.
Software BrandsState the Type of Software each Brand below is Microsoft Access Database Microsoft Excel Spread sheet Microsoft Outlook Microsoft.
Network Security for DEC staff. Anti-virus/spyware for home use At work, devices are built and maintained by ITSU staff Symantec is no longer licensed.
Introduction, Security, Technical Requirements and Access Tips ADMIT.
Internet Services Web browsing Chat/Messaging Newsgroups Social networking Shopping Information –Text –Pictures –Movies –Music And more! 3.
PREVIOUS GNEWS. 4 Patches / 5 Vulns – 3 Critical Affecting Winodow (all of them), Office, IE, SharePoint,.net Other updates, MSRT, Defender Definitions,
13LECTURE NET301 11/23/2015Lect13 NET THE PROBLEM OF NETWORK SECURITY The Internet allows an attacker to attack from anywhere in the world from.
Software for Cyber Hygiene © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.
PRESENTATION TITLE Presented by: Xxxx Xxxxx. Providence Health & Services Very large Catholic healthcare system 33 hospitals in AK, CA, MT, OR, WA 65,000.
Security Mindset Lesson Introduction Why is cyber security important?
Implementing an Information Systems Security Plan THE MONTANA OFFICE OF PUBLIC INSTRUCTION.
MIS323 – Business Telecommunications Chapter 10 Security.
Vulnerabilities in Operating Systems Michael Gaydeski COSC December 2008.
1 AFCOM Data Center World March 15, 2016 Moderator: Donna Jacobs, MBA Panel: Greg Hartley Bill Kiss Adam Ringle, MBA ITM 9.2 The New Security Challenge:
FERPA & Data Security:FERPA & Data Security: Passwords and Authenticators.
Securing the Human. Presented by Thomas Nee, Computer Coordinator Town of Hanover, Massachusetts hanover-ma.gov/information-technology October is Cyber.
BizSmart Lunch & Learn Webinar Information Security and Protecting your business With the increased risk of some sort of cyber- attack over the past few.
 is a set of instructions that tell the computer what to do. Software can be categorized into: 1. Operating system software 2. Applications software.
Managed IT Services JND Consulting Group LLC
New Extension Educator Orientation DASNR Information Technology Division of Agricultural Sciences and Natural Resources Levi Arnold May, 2016 New Extension.
Protecting Against Cyber Attacks PLEASE TAKE A MINUTE TO LOOK AT THIS IMPORTANT MESSAGE. THIS IS HAPPENING HERE AND NOW! LET US SAVE YOU AND YOUR INFORMATION.
Proprietary & Confidential 1 Paul Falor, VP of IT, North Highland Friday, May 20th Cyber Security PayCLT.
Welcome to the DDN Campus Parent Portal Hanson School District School District.
Introduction, Security, Technical Requirements and
Jordan Population and Housing Census 2015
Wilmington Area School District
Dell Latitude E5570 Laptop Heather L Horvath.
Your Computer Wants To Ruin Your Life
MEASURE I CITIZEN’S OVERSIGHT COMMITTEE MEETING
Reporting personal data breaches to the ICO
Prepared By : Binay Tiwari
آموزش نحوه ورود و استفاده از سامانه آموزش مجازی
Connecting Remotely Winter 2014.
I will… only people I know or my teacher has approved of.
Sioux City Community Schools Computer System
Presentation transcript:

DOJ CYBER RISK REPORT 2015 BREACHES & THE CYBER LANDSCAPE CYBER SECURITY? HUH?

BREACHES & THE CYBER LANDSCAPE

OPM/ANTHEM BREACH

HACKED DATA-WHAT’S IT WORTH?

BREACH STATISTICS

STATE OF MONTANA – CYBER STATS

TOP INFECTION VECTORS 1.BROWSERS 2.

TOP VULNERABILITIES 1.INTERNET EXPLORER 2.ADOBE (FLASH, READER & ACROBAT) 3.JAVA 4.MICROSOFT OFFICE (WORD & EXCEL) 5.FIREFOX

1. APPLY SECURITY PATCHES 2. CHANGE PASSWORDS REGULARLY 3. BE CAREFUL WHERE YOU SURF 4. MONITOR YOUR SYSTEMS 5. USE ANTI-VIRUS & ANTI-MALWARE SOFTWARE 6. REPORT SECURITY INCIDENTS YOU CAN FIGHT BACK!! DAWN TEMPLE MT DEPT. OF JUSTICE – INFORMATION SECURITY OFFICER

CONTACT INFO Dawn Temple Agency Information Security Officer MT Dept. of Justice | Information Technology Service Division Call: Cell: Chat: Stop by: Follow:

TECHNOLOGY USE POLICY CHANGES Personal Use Allowing staff the ability for very limited personal use (as defined below) of the internet, and DOJ IT during breaks and during travel is at the discretion of the supervisor or contract manager. It is not a right but a privilege that may be revoked or modified by a supervisor or manager at any time. This will not be done on State equipment from home during off hours – use your personal computer. At all times, potential public perception must be considered, and personal use of DOJ IT resources will not impact any business activity such as a user’s work time or State internet bandwidth. The following items are examples intended as guidance and are not all inclusive. Users should consult their supervisor or manager when activities may be questionable or unclear.