DART Technology Nicole Fontayne-Bardowell, MPA Vice President & CIO

Slides:



Advertisements
Similar presentations
Philippine Cybercrime Efforts
Advertisements

©2011 Bradford Networks. All rights reserved. Secure Mobility Safely Onboarding Personal Devices to Corporate Networks.
OPM Cybersecurity Competencies by Occupation (Technical Competencies) Information Technology Management Series Electronics Engineering.
August 9, 2005 UCCSC IT Security at the University of California A New Initiative Jacqueline Craig. Director of Policy Information Resources and.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Creation of Policies, Part.
Cyberspace and the Police Mamoru TAKAHASHI Head of Computer Forensic Center, Hi-tech Crime Technology Division National Police Agency, Japan.
IBM Security A New Era of Security for a New Era of Computing Pelin Konakcı IBM Security Software Sales Leader.
INFORMATION SECURITY GOVERNANCE (ISG) Relates to the security of information systems Is an element of corporate governance.
Information Security Issues at Casinos and eGaming
Responding to a Security Incident Maryland Security Day March 2, 2004 Joy Hughes, CIO
2012 CWAG Annual Meeting State Agency Data Breaches Loss prevention, response and remediation strategies.
Thomas Levy. Agenda 1.Aims: Reducing Cyber Risk 2.Information Risk Management 3.Secure Configuration 4.Network Security 5.Managing User Access 6.Education.
Security Training & Awareness on a Budget Presented by: Calvin Weeks, (CISSP), CISM, EnCE.
Information Technology & Communications Sensitive Data Use, Storage & Security Meeting Background Data Breach on February 18, 2014 Security Meeting with.
Cyber Security & Fraud – The impact on small businesses.
EPA’s Story: Developing a Secure Mobile-First Culture Malcolm Jackson Assistant Administrator for Environmental Information and Chief Information Officer.
℠ Pryvos ℠ Computer Security and Forensic Services May 27, 2015 Copyright © 2015 Pryvos, Inc. 1.
1 (ISC) 2 Conference Oct, 2008 Presented by Shin, Soojung Dr. Soojung shin, CISSP, Executive Vice President, Infosec, Korea.
IT Security – Scanning / Vulnerability Assessment David Geick State of Connecticut IT Security.
HP World September 2002 Scott S. Blake, CISSP Vice President, Information Security BindView Corporation Vulnerability Assessment and Action.
Security Trends & Industry Insights
DRAFT 1 Belfast th World Cyber Security Technology Research Summit Suren Gupta Allstate Corporation Executive Vice President Allstate Technology.
ADMINISTRATIVE AGENCIES Crystal Wahlstrom-Kauffman April 1 st, 2008 MGT 335.
FBI Phoenix Computer Crime Squad SA Tom Liffiton 10/23/2003 Maricopa Association of Governments Telecommunications Advisory Group.
WHEN, NOT IF THE CYBER SECURITY CHALLENGES AMONG LOCAL GOVERNMENT UMBC Public Policy Forum Baltimore Maryland April 15, 2016 Gayle B. Guilford CISO Baltimore.
Welcome Information Security Office Services Available to Counties Security Operations Center Questions.
Best Cyber Security Practices for Counties An introduction to cybersecurity framework.
CompTIA Security+ Certification Exam SY COMPTIA SECURITY+SY0-401 Q&A is a straight forward,efficient,and effective method of preparing for the new.
IT Security Mandatory Solutions Andris Soroka 2nd of July, RIGA.
Incident Response Strategy and Implementation Anthony J. Scaturro University IT Security Officer September 22, 2004.
Your Partner for Superior Cybersecurity
Governance and Oversight
Your security risk is higher than ever.
Cybersecurity - What’s Next? June 2017
State Board of Elections Computers
“Introduction to Azure Security Center”
The Game has Changed… Ready or Not! Andrew Willetts Technologies, Inc.
ACAA Summer Meeting Carrie O’Brien June 1, 2017
Real-time protection for web sites and web apps against ATTACKS
BYOD: Short-term Gain Without Long-term Pain?
Responding to Intrusions
Leverage What’s Out There
BUILDING A PRIVACY AND SECURITY PROGRAM FOR YOUR NON-PROFIT
Matt G change over point ?
Managing Cyber Threats for Health Systems
BCC 403 Innovative Education--snaptutorial.com
CMGT 245 Education for Service-- snaptutorial.com.
5G Security Training
CMGT 245 Teaching Effectively-- snaptutorial.com.
I have many checklists: how do I get started with cyber security?
Building a Security Operations Center
IT Development Initiative: Status and Next Steps
Attacks on The Manufacturing Industry
Cybersecurity Special Public Meeting/Commission Workshop for Natural Gas Utilities September 27, 2018.
National Cyber Security
Information Services and IT Support Information Services
CRITICAL INFRASTRUCTURE CYBERSECURITY
How to Mitigate the Consequences What are the Countermeasures?
I UNDERSTAND CONCEPTS OF CYBERSECURITY
IT Development Initiative: Status & Next Steps
‘’Guidelines for Parents, Guardians and Educators’’ report of ITU in cooperation with ENISA Creating a safe ICT learning environment has several important.
Neil Kirton and Zoë Newman
THE CYBER LANDSCAPE UNCLASSIFIED CROSS DOMAIN NETWORK & INFO SHARING
CE-Notes Law Enforcement
LO1 - Know about aspects of cyber security
Figuring out CyberSecurity Return On Investment
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Information Technology Organization Overview RFP #220-05
Presentation transcript:

DART Technology Nicole Fontayne-Bardowell, MPA Vice President & CIO Cyber Security Program June 20, 2017

Agenda FBI Global Cybersecurity Threatscape Incident Response Cybersecurity Program @ DART Security Governance Essential Characteristics Conclusion

Incident Response Elements Communications Law Enforcement Investigative Measures DART Police FBI TSA General Counsel Forensics & Threat Remediation Services Specialized Forensics Services System Monitoring Vulnerability Scanning of Endpoints Mobile Devices Web Applications Servers Databases Wireless Networks Law Enforcement Executive Management Staff Customers

DART Cybersecurity Program

Security Governance Essential Characteristics

Questions?