How are we keeping our company & clients safe?
Energy | Water | Transport Efficiencies Evidence
An Integrated World – Data Security Challenges
Defence in Depth
Defence in Depth People Technology Operations Principle of least privilege Security culture, e.g. Password safes Training and Support Technology Use of Firewalls, Proxys, DMZs, VPNs, IP restrictions, Virus scanners Storage encryption by default Sandbox any vulnerable / obsolete technologies Centralised security utilising SAML / JWT tokens with federated single sign on Operations Physical security, Locked doors! Appropriate sessions timeouts Password complexity rules Control of data transfer – Discourage poor use of email
Questions?