How are we keeping our company & clients safe?

Slides:



Advertisements
Similar presentations
Using PHINMS and Web-Services for Interoperability The findings and conclusions in this presentation are those of the author and do not necessarily represent.
Advertisements

Caltech Proprietary Videoconferencing Security in VRVS 3.0 and Future Videoconferencing Security in VRVS 3.0 and Future Kun Wei California Institute of.
Internet of Things Security Architecture
Information Systems Audit Program (cont.). PHYSICAL SECURITY CONTROLS.
Simple and Secure Approach to Discovery at the Desktop.
Secure Design Principles  secure the weakest link  reduce the attack surface  practice defense in depth  minimize privilege  compartmentalize  fail.
Chapter 10: Data Centre and Network Security Proxies and Gateways * Firewalls * Virtual Private Network (VPN) * Security issues * * * * Objectives:
Firewall Configuration Strategies
Bruce Schneier Lanette Dowell November 25, Introduction  “It is insufficient to protect ourselves with laws; we need to protect ourselves with.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart1 of 222 C HAPTER 7 Information Systems Controls for Systems.
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
Using Internet Information Server And Microsoft ® Internet Explorer To Implement Security On The Intranet HTTP.
Lecture 6 Networked Application Security IT 202—Internet Applications Based on notes developed by Morgan Benton.
Introduction To Windows NT ® Server And Internet Information Server.
Topics 1.Security options and settings 2.Layer 2 vs. Layer 3 connection types 3.Advanced network and routing options 4.Local connections 5.Offline mode.
SUBSTATION SECURITY WHY FIREWALLS DON’T WORK! ©Copyright 1998, Systems Integration Specialists Company, Inc. All Rights Reserved Presented by:
Course 201 – Administration, Content Inspection and SSL VPN
1 Chapter 8 Securing Information Systems. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
Teaching Security via Problem- based Learning Scenarios Chris Beaumont Senior Lecturer Learning Technology Research Group Liverpool Hope University College.
IT und TK Training Check Point Authentication Methods A short comparison.
Chapter 6 of the Executive Guide manual Technology.
{ Active Directory Security Why bother?.   Law #1: Nobody believes anything bad can happen to them, until it does   Law #2: Security only works if.
Module 9: Configuring IPsec. Module Overview Overview of IPsec Configuring Connection Security Rules Configuring IPsec NAP Enforcement.
DIYTP Assessing a System - Basics  Why?  Vulnerabilities  What to look at:  The six ‘P’s  Patch  Ports  Protect  Policies  Probe  Physical.
McGraw-Hill © ©The McGraw-Hill Companies, Inc., 2004 Chapter 31 Security Protocols in the Internet.
Shibboleth 2.0 IdP Training: Authentication January, 2009.
1 Class 15 System Security. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized data access,
Office of Campus Information Security Driving a Security Architecture by Assessing Risk Stefan Wahe Sr. Information Security Analyst.
12 Steps to Cloud Security A guide to securing your Cloud Deployment Vishnu Vettrivel Principal Engineering Lead,
Manga comic industry security information presentation By Dominic Roofe.
SIM401. A. Datum Account Forest Trey Research Resource Forest Federation Trust Microsoft (Users) E-Company Store (Resource) Contoso(Users)Contoso(Users)Fabrikam(Resource)Fabrikam(Resource)
OV Copyright © 2005 Element K Content LLC. All rights reserved. Hardening Internetwork Devices and Services  Harden Internetwork Connection Devices.
Security fundamentals Topic 10 Securing the network perimeter.
Communication in Administration (Security)
Prevent Data Breaches and PII from Walking Out the Door Jim Farrell, Senior Vice President Products Archive Systems 9/18/2015.
Robert Ono Office of the Vice Provost, Information and Educational Technology September 9, 2010 TIF-Security Cyber-safety Plans for 2010.
Understand Internet Security LESSON Security Fundamentals.
Mr C Johnston ICT Teacher BTEC IT Unit 09 - Lesson 09 Network Services.
Agenda  Microsoft Directory Synchronization Tool  Active Directory Federation Server  ADFS Proxy  Hybrid Features – LAB.
Syo-401 Question Answer. QUESTION 1 An achievement in providing worldwide Internet security was the signing of certificates associated with which of the.
Network Security Chapter 8 roadmap 8.1 What is network security? 8.2 Principles of cryptography (confidentiality) 8.3 Message integrity 8.4 End-point authentication.
Security fundamentals
Chapter 5 Electronic Commerce | Security Threats - Solution
Recommended Practices & Fundamentals
Network Security (the Internet Security)
SY0-401 Exam Dumps CompTIA Security+ Certification Exam
Enabling Secure Internet Access with TMG
09 October 2017 COMPULSORY TENDER BRIEFING SESSION: OPEN TENDER : AGSA/14/2017– Appointment of a service provider to render information security managed.
Securing the Network Perimeter with ISA 2004
Chapter 5 Electronic Commerce | Security Threats - Solution
Lecture 14: Business Information Systems - ICT Security
Novell BorderManager® 3.7: Technical Overview
CompTIA Security+ Study Guide (SY0-401)
BOMGAR REMOTE SUPPORT Karl Lankford
مصطفى فتحى المنظمة العربية للتنمية الادارية
NTC 406 Competitive Success/snaptutorial.com
NTC 406 Education for Service/snaptutorial.com
Azure AD Application Proxy
An Introduction to Web Application Security
Understanding Security Layers
Privacy 101: Data Security Implementation for SAP
Data integrity and security
Contact Center Security Strategies
How to Mitigate the Consequences What are the Countermeasures?
Lecture 2: Overview of TCP/IP protocol
My 7-Point Plan for Windows Security
Lecture 3: Secure Network Architecture
Design Principles Thanks to Matt Bishop 2006 CS 395: Computer Security.
Session 1 – Introduction to Information Security
Presentation transcript:

How are we keeping our company & clients safe?

Energy | Water | Transport Efficiencies Evidence

An Integrated World – Data Security Challenges

Defence in Depth

Defence in Depth People Technology Operations Principle of least privilege Security culture, e.g. Password safes Training and Support Technology Use of Firewalls, Proxys, DMZs, VPNs, IP restrictions, Virus scanners Storage encryption by default Sandbox any vulnerable / obsolete technologies   Centralised security utilising SAML / JWT tokens with federated single sign on Operations Physical security, Locked doors! Appropriate sessions timeouts Password complexity rules Control of data transfer – Discourage poor use of email

Questions?