Information Security Proposal POP’S POP SPRITZERS JULY 2016.

Slides:



Advertisements
Similar presentations
Travelers CyberRisk for Insurance Companies
Advertisements

Is There a Security Problem in Computing? Network Security / G. Steffen1.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Cybersecurity Summit 2004 Andrea Norris Deputy Chief Information Officer/ Director of Division of Information Systems.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
Philippe LE TERTRE IS Governance Consultant  Founder and managing partner of VADEGIS (company specialized in Information System Management.
Security Awareness Challenges of Security No single simple solution to protecting computers and securing information Different types of attacks Difficulties.
Cybercrime Outlook on African banks Adwo Heintjes Global Head IT Audit & Ops Rabobank.
Enterprise Risk ManagementSeptember 2010Miami, FL © 2010 Enterprise Risk Management Information Security- Facing the Risks in Electronic Channels and Social.
SEC835 Database and Web application security Information Security Architecture.
© 2009 IDBI Intech, Inc. All rights reserved.IDBI Intech Confidential 1 Information (Data) Security & Risk Mitigation.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Lessons Learned in Smart Grid Cyber Security
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #6 Forensics Services September 10, 2007.
Thomas Levy. Agenda 1.Aims: Reducing Cyber Risk 2.Information Risk Management 3.Secure Configuration 4.Network Security 5.Managing User Access 6.Education.
PATCH MANAGEMENT: Issues and Practical Solutions Presented by: ISSA Vancouver Chapter March 4, 2004.
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
Supervision of Information Security and Technology Risk Barbara Yelcich, Federal Reserve Bank of New York Presentation to the World Bank September 10,
Managing Data Against Insider Threats Dr. John D. Johnson, CISSP.
The State of Computer & Data Security in Corporations Independent Survey.
South Wales Cyber Security Cluster A networking group with a purpose Membership Open to anyone with an interest in Cyber Security.
Engineering and Management of Secure Computer Networks School of Engineering © Steve Woodhead 2009 Corporate Governance and Information Security (InfoSec)
Albany Bank Corporation Security Incident Management Program.
Cyber Security in the Mobile Era KEEPING ENTERPRISE DATA SAFE IN THE BYOD ERA.
IS3220 Information Technology Infrastructure Security
©2015 Check Point Software Technologies Ltd. 1 [Restricted] ONLY for designated groups and individuals CHECK POINT MOBILE THREAT PREVENTION.
WHEN, NOT IF THE CYBER SECURITY CHALLENGES AMONG LOCAL GOVERNMENT UMBC Public Policy Forum Baltimore Maryland April 15, 2016 Gayle B. Guilford CISO Baltimore.
Welcome to the ICT Department Unit 3_5 Security Policies.
For more course tutorials visit
For More Best A+ Tutorials CMGT 400 Entire Courses (UOP Course) CMGT 400 Week 1 DQ 1 (UOP Course)  CMGT 400 Week 1 Individual Assignments.
INF526: Secure Systems Administration Student Presentations And Review for Final Prof. Clifford Neuman Lecture July 2016 OHE100C.
Defining your requirements for a successful security (and compliance
Securing Information Systems
Cybersecurity as a Business Differentiator
CYBERSECURITY SOLUTIONS
Earth’s Mightiest Heroes: Combating the Evils Lurking in Cyberspace
Information Security Program
Cybersecurity - What’s Next? June 2017
Demystifying cybersecurity: Best practices to help strengthen your program Chris Candela Senior Consultant Business Consulting Services Charles Schwab.
Critical Security Controls
Cyber Security Enterprise Risk Management: Key to an Organization’s Resilience Richard A. Spires CEO, Learning Tree International Former CIO, IRS and.
Information Technology Sector
Compliance with hardening standards
The Internal Audit Role in assessing Cybersecurity
What if tomorrow never comes
Managing a Data Breach Prevention-Detection-Mitigation
Cyber Protections: First Step, Risk Assessment
BUILDING A PRIVACY AND SECURITY PROGRAM FOR YOUR NON-PROFIT
Securing Information Systems
CSI Survey 2007 Tiffany Gorman
Cybersecurity Awareness
I have many checklists: how do I get started with cyber security?
Andy Hall – Cyber & Tech INSURANCE Specialist
Cyber Security Why You Should Care.
Security Essentials for Small Businesses
Cybersecurity compliance for attorneys
How to Mitigate the Consequences What are the Countermeasures?
Cybercrime and Canadian Businesses
Protect Your Ecommerce Site From Hacking and Fraud
Cybersecurity Threat Assessment
Tom Murphy Chief Information Security Officer
Information Protection
IT and Audit Building a Security Aware Culture
DSC Contract Management Committee Meeting
Information Protection
CMGT/431 INFORMATION SYSTEMS SECURITY The Latest Version // uopcourse.com
CMGT 431 CMGT431 cmgt 431 cmgt431 Entire Course // uopstudy.com
Presentation transcript:

Information Security Proposal POP’S POP SPRITZERS JULY 2016

Small Businesses at Risk  Cyber Attacks are a growing threat among small businesses  Previous thought was that small businesses wouldn’t attract the attention of attackers  Large, Blue Chip Corporations have been ramping up defense efforts.  Attackers may see small businesses as the new “soft” targets

Top Risks to Small Businesses Cyber Streetwise is a UK based government initiative to raise awareness. According to their research, the top threats to small businesses include:  Ransomware  Data is encrypted  Payment demanded to unlock  Hacking  Unpatched vulnerabilities exploited  Sensitive data stolen  Denial of Service / Distributed Denial of Service  Traffic overload  Loss of service  Human Error  Weakest Link  Mistakes / confusion  CEO/Executive Fraud  Impersonations  Spoofing

Proposed Security Organization Structure

Risk Assessment & Control Design

Measurable Metrics Metric IDCYBS.001 Metric TitleRefresh of information Assets Description Measures the % of information assets that have been inventoried, updated, and had their configuration checked Metric OwnerCIO Metric ContactInformation Security Manager Control TypePreventative FormatPercent FrequencyAnnually Calculation # of Assets that have been reviewed and refreshed within the past 6 months / total # of information assets LSL0.95 USL1 Target1 Which Direction is BetterHigher is Better < This Number = Red0.95 <= This Number = Green0.95

Measurable Metrics Continued Metric IDCYBS.004 Metric TitleMonthly Success rate of InfoSec controls Description Tracks the number of incidents that were presented during the month and how many of those incidents were mitigated by controls that were in place. Metric OwnerCSO/CISO Metric ContactInformation Security Manager Control TypeDetective FormatPercent FrequencyMonthly Calculation Total # of incidents blocked or prevented / Total # of incident attempts detected. LSL0.9 USL1 Target1 Which Direction is BetterHigher is Better < This Number = Red0.9 <= This Number = Green0.9

Measurable Metrics Continued Metric IDCYBS.005 Metric Title # of vulnerabilities found during penetration testing deemed as high or medium risk Description Results of regularly scheduled penetration testing efforts to detect vulnerabilities and gaps. Metric OwnerInformation Security Manager Metric ContactIT Technicians Control TypeDetective FormatNumber FrequencySemi-annually LSL0 USL10 Target0 Which Direction is BetterLower is Better > This Number = Red10 >= This Number = Green10

Business Contingency

Security Training and Awareness Basic Security Awareness  All employees  At Onboarding  Annually  How security impacts you  How to strengthen the company  Assessment & Attestation Advanced Security Training and Education  Employees with security specific roles  Formal Classes & Certification  Partner with local Colleges & Universities  Highlight Industry Certification Courses  Geared toward specific types of roles  Tuition Reimbursement Program  2 year commitment  Ongoing Awareness Campaigns  Newsletter  Banners & Posters

Budget (Projected) Line ItemAmountComments People Salaries, Training, Recruiting. Includes % of shared resources Hardware Dedicated Security Hardware. Computers, Networking, Control Devices, etc. Software 4900 Purchases & Licensing Communications 4100 Including Mobile Vendor Services 375 Disaster Recovery6375 Planning, Design, & Readiness Support Services3250 Total Security Budget326,000

Costs of a Breach  Survey Found that average small business breach cost organization $38,000.  Additional indirect costs  Reputation  Lost business  Potential Legal or Regulatory “The cost of a security breach is always higher than the cost of protection.” -Kaspersky Lab Survey Report

Additional Resources         

Questions