Building A Security Program From The Ground Up

Slides:



Advertisements
Similar presentations
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Advertisements

Managed Security Monitoring. 2 ©2015 EarthLink. All rights reserved. Today’s top IT concerns — sound familiar? Source: IT Security Risks 2014: A Business.
PCI Compliance Forrest Walsh Director, Information Technology California Chamber of Commerce.
Managing A Secure Infrastructure – Tales From the Trenches November 6, 2003.
Enterprise security How to bring security transparency into your organization ISSA EDUCATIONAL SESSION Nicklaus Schleicher, VP Support & Customer Service.
Know the Client Own the Problem Share the Solution The 2005 Case for Information Technology Security October 14, 2004.
Security Management IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
Are Large Scale Data Breaches Inevitable? Douglas E. Salane Center for Cybercrime Studies John Jay College of Criminal Justice Cyber Infrastructure Protection.
Network security policy: best practices
Citadel Security Software Presents Are you Vulnerable? Bill Diamond Senior Security Engineer
The Difficult Road To Cybersecurity Steve Katz, CISSP Security Risk Solutions Steve Katz, CISSP Security.
Information Security Technological Security Implementation and Privacy Protection.
InformationWeek 2014 Strategic Security Survey Research Findings © 2014 Property of UBM Tech; All Rights Reserved.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Intrusion Detection MIS ALTER 0A234 Lecture 11.
D2-02_09 Construction of Next-generation Security Infrastructure to Cope with Next Types of Cyber Attacks Takehiro Sueta Kyushu Electric Power Co., Inc.
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
How STERIS is using Cloud Technology to Protect Web Access Presented By: Ed Pollock, CISSP-ISSMP, CISM CISO STERIS Corporation “Enabling Business”
PCI: As complicated as it sounds? Gerry Lawrence CTO
1 Panda Malware Radar Discovering hidden threats Channel Presentation Name Date.
©2014 Bit9. All Rights Reserved Endpoint Threat Prevention Charles Roussey | Sr. Sales Engineer Detection and Response in Seconds.
Common Cyber Defenses Tom Chothia Computer Security, Lecture 18.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
GSHRM Conference Cyber Security Education Shri Cockroft, CISO Piedmont Healthcare, Inc. September 21, 2015.
Data Security and Payment Card Acceptance Presented by: Brian Ridder Senior Vice President First National September 10, 2009.
Note1 (Admi1) Overview of administering security.
Knowing What You Missed Forensic Techniques for Investigating Network Traffic.
Security for Online Games Austin GDC, September 2009 Tim Ray, CISSP.
IT Security Policy: Case Study March 2008 Copyright , All Rights Reserved.
Module 12: Responding to Security Incidents. Overview Introduction to Auditing and Incident Response Designing an Audit Policy Designing an Incident Response.
FFIEC Cyber Security Assessment Tool
APolicy EASy Security Project Analysis and Recommendations for TJX Companies, Inc.
BUSINESS CLARITY ™ PCI – The Pathway to Compliance.
Role Of Network IDS in Network Perimeter Defense.
IS3220 Information Technology Infrastructure Security
©2016 Check Point Software Technologies Ltd. 1 Latest threats…. Rolando Panez | Security Engineer RANSOMWARE.
Palindrome Technologies all rights reserved © 2016 – PG: Palindrome Technologies all rights reserved © 2016 – PG: 1 Peter Thermos President & CTO Tel:
The Payment Card Industry Data Security Standard (PCI DSS) is a proprietary information security standard for organizations that handle branded credit.
September 20, 2016 How to Defend Your Organization from a Cyber Breach LTC Tim Bloechl (U.S. Army, Ret.) Director, Cyber Security Business.
Proactive Incident Response
Information Technology Acceptable Use An Overview
CISOs Guide To Communicating WNCRY.
OIT Security Operations
3 Do you monitor for unauthorized intrusion activity?
Payment card industry data security standards
Comprehensive Security and Compliance at an Affordable Price.
Performing a SQL Server Security Risk Assessment
Cyber Security Enterprise Risk Management: Key to an Organization’s Resilience Richard A. Spires CEO, Learning Tree International Former CIO, IRS and.
“Introduction to Azure Security Center”
Point of Sale Attacks By Deepak.
Security Standard: “reasonable security”
Data Compromises: A Tax Practitioners “Nightmare”
Trends in Ransomware Distribution
Cyber Protections: First Step, Risk Assessment
Jon Peppler, Menlo Security Channels
Infrastructure, Data Center & Managed Services
Unfortunately, any small business could face the risk of a data breach or cyber attack. Regardless of how big or small your business is, if your data,
Office 365 Security Assessment Workshop
Cyber Security in the Mortgage Industry
PBA.
Ransomware and Data breaches in public libraries
Cybercrime and Canadian Businesses
Security Hardening through Awareness August 2018
Bethesda Cybersecurity Club
Incident response and intrusion detection
Security week 1 Introductions Class website Syllabus review
3 Do you monitor for unauthorized intrusion activity?
Data Security and Privacy Techniques for Modern Databases
3 Do you monitor for unauthorized intrusion activity?
AIR-T11 What We’ve Learned Building a Cyber Security Operation Center: du Case Study Tamer El Refaey Senior Director, Security Monitoring and Operations.
Presentation transcript:

Building A Security Program From The Ground Up

Agenda Understand InfoSec role in the business Assess risks to the business Secure support and funding from management Document approach Selection and tuning of tools Reporting Monitoring Gain cooperation and support from IT teams

Background Studied Music at University of North Texas Played and taught guitar from 1984 to 2000 Attended SMU MCSE Program Started in IT in 2000 as Windows AD admin Moved into security in 2006

Overview of past work Heartland Payment Systems Acquired by Global Payment Systems 5th largest card acquirer in US 4 years as systems administrator 6 ½ as Security Manager 2009 Massive security breach

Overview of past work International Security Manger Responsible for Europe, Australia and New Zealand locations Sr. Security Manager Global IT Security Operations

Business World

Money

Possibility and Probability Risk Financial Loss Ecommerce Downtime Customer data Fraud Litigation Damage to Brand Possibility and Probability

Breaches Sell Security 2013 – 2014 Security Breaches 2013 Target Breach 252 Million Dollars to resolve Recommend to fire 7 of 10 board members

The Hard Sell Give them data! Top down or busting out of IT Department Data to justify tools Downtime due to malware infections Data on attacks against websites Data on investment per record Breach cost per record Breach cost per record (Sector)

Existing tools Data Accurate data on phishing Infections due to clicking Amount data encrypted from Ransomware Time to recovery (hours of downtime) Tie it to something the business can understand

Data From Board Presentation

Where to Start ID data most valuable to the company Who need access to data Applications Systems Network Controls Monitor

Create Policies and Standards Time Consuming but important Acceptable use policy VPN Policy Incident Response Policy Firewall configuration standard Web Proxy configuration standard Obtain signoff from IT and or Business www.sans.org/info/166795

Security Infrastructure Make roadmap (Have a plan) Identify, Protect, Detect, Respond and Recover (NIST Security Domains) Target most useful tools Firewalls IDS Endpoint systems Web Proxy Log correlation Vulnerability Scanner Better to have a few tools tuned well than many half implemented

Monitor Events and Alerts Alerts and events from Anti-Virus IDS Endpoint agents Web proxy logs Failed login attempts Outbound connections attempts

IT Teams They want the company to be secure They just don’t want more work on them Often believe security wants to “Shut everything down” Security doesn’t understand SLAs Often they don’t know what to fix Varying levels of talent

IT and Security Security Culture Partner with teams Often best resource for reporting incidents Do research to enable quick remediation Be reasonable about requests Understand their job responsibility Attend Change Control Meetings

International Security Understand culture Learn about their business Review organization structure Listen to their concerns Acknowledge their accomplishments Reassure you won’t break their systems Report findings in a constructive manner

Micromania France

HQ Sophia Antipolis (Nice) France 444 stores Parent Company GameStop Most profitable International region First security person for company

Lack of Cooperation IT teams or individuals difficult to work with Non-cooperative Obstructive

Strictly Business not Personal

Questions

mray@fossil.com