Technology Convergence

Slides:



Advertisements
Similar presentations
Invasion of Smart Phones in Clinical Areas Chrissy Kyak Privacy Officer University of Maryland Upper Chesapeake Health.
Advertisements

Current Security Threats WMO CBS ET-CTS Toulouse, France May 2008 Allan Darling, NOAA’s National Weather Service WMO CBS ET-CTS Toulouse, France.
Guide to Massachusetts Data Privacy Laws & Steps you can take towards Compliance.
Lack of Security in Hotspots/Wi Fi Areas Yin Wai ISM 158 4/27/10.
Small Business Security By Donatas Sumyla. Content Introduction Tools Symantec Corp. Company Overview Symantec.com Microsoft Company Overview Small Business.
Brian Bradley.  Data is any type of stored digital information.  Security is about the protection of assets.  Prevention: measures taken to protect.
Data Centers and IP PBXs LAN Structures Private Clouds IP PBX Architecture IP PBX Hosting.
Firewall Slides by John Rouda
Hafez Barghouthi. Model for Network Access Security (our concern) Patrick BoursAuthentication Course 2007/20082.
SEC835 Database and Web application security Information Security Architecture.
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
Section Seven: Information Systems Security Note: All classified markings contained within this presentation are for training purposes only.
This is the best Power Point Template ever. It comes with over 5 styles of colors and include lots of features. Serving New England Businesses Since 1988.
MIS3300_Team8 Service Aron Allen Angela Chong Cameron Sutherland Edment Thai Nakyung Kim.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Protecting Students on the School Computer Network Enfield High School.
Beyond the Fortress Fortify Your Content Before it Travels Beyond the Firm Walls.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Security and Assurance in IT organization Name: Mai Hoang Nguyen Class: INFO 609 Professor: T. Rohm.
Critical Security Controls & Effective Cyber Defense Hasain “The Wolf”
IPv6 security for WLCG sites (preparing for ISGC2016 talk) David Kelsey (STFC-RAL) HEPiX IPv6 WG, CERN 22 Jan 2016.
CPT 123 Internet Skills Class Notes Internet Security Session B.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Information Security tools for records managers Frank Rankin.
Regan Little. Definition Methods of Screening Types of Firewall Network-Level Firewalls Circuit-Level Firewalls Application-Level Firewalls Stateful Multi-Level.
Computer Security Sample security policy Dr Alexei Vernitski.
Secure Services Shared Hosted MS Exchange 2010.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Kevin Watson and Ammar Ammar IT Asset Visibility.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
Documents. Process. Data. Payables
Securing Information Systems
Increasing Information and Data Security in Today’s Cybersecurity World 2017 Conference Review 6/6/2017.
Chapter 7. Identifying Assets and Activities to Be Protected
3 Do you monitor for unauthorized intrusion activity?
Avenues International Inc.
Network Security Presented by: JAISURYA BANERJEA MBA, 2ND Semester.
New A.M. Best Cyber Questionnaire
| Data Connectors: Atlanta, GA
Enterprise Mobility Suite Technical and Business Briefing
Critical Security Controls
CompTIA Security+ SY0-401 Real Exam Question Answer
Common Methods Used to Commit Computer Crimes
Leverage What’s Out There
Introduction to the Federal Defense Acquisition Regulation
(1888 PressRelease) Staying Ahead of Today’s Rapidly Evolving Security Landscape
BUILDING A PRIVACY AND SECURITY PROGRAM FOR YOUR NON-PROFIT
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Chapter 3: IRS and FTC Data Security Rules
Unit 27: Network Operating Systems
Cybersecurity Strategy
Network Security: IP Spoofing and Firewall
Navigating Security Seas in a Small Ship with a Limited Crew
Securing the Internet of Things: Key Insights and Best Practices Across the Industry Theresa Bui Revon IoT Cloud Strategy.
Security Essentials for Small Businesses
Network Security Best Practices
12 STEPS TO A GDPR AWARE NETWORK
Contact Center Security Strategies
The Practical Side of Meaningful Use:
Topic 5: Communication and the Internet
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fuel Cell Market size worth $25.5bn by 2024 Low Power Wide Area Network.
By: Dorian Lockhart Wilston Johnston
The MobileIron® Threat Detection difference:
3 Do you monitor for unauthorized intrusion activity?
Microsoft Data Insights Summit
6. Application Software Security
Protect data in core business applications
3 Do you monitor for unauthorized intrusion activity?
Presentation transcript:

Technology Convergence November 28th, 8:30-9:30am GRB Room 310C Technology Convergence Panel: Cybersecurity Sponsored by:

Technology Convergence Panel CyberSecurity Don Pedersen Director, Technology Development Airbus Defense and Space ( https://www.airbusdshouston.com ) Holly Rollins Principal Director, Booz Allen Hamilton ( https://www.bah.com ) Experience: Lance Smith  CEO, Cyphre Security Solutions RigNet ( http://www.rig.net )

Technology Convergence Panel CyberSecurity “CyberSecurity is the protection of internet- connected systems, including hardware, software and data, from cyberattacks. In a computing context, security comprises cybersecurity and physical security -- both are used by enterprises to protect against unauthorized access to data centers and other computerized systems.” TechTarget, 2016

Technology Convergence Panel CyberSecurity In our world of Cloud infrastructures and services, Mobile devices and apps with internet connectivity and with AI (machine learning), CyberSecurity has grown into a critical knowledge base and skill for IT professionals. With the growing use of contract labor actively managing user accounts and access to business resources is a necessary practice for a good security posture. Ensure ex-employees accounts are disabled everywhere. The growing use of IOT devices in our infrastructures drives IT resources to constantly monitor for internet connections and data transfer when these devices “phone home” for updates. Even some COTS (Commercial Off The Shelf) managed 4-8 port network switches attempt to make connections if you don’t block them from the inside. Training of IT personnel will lead to an IT staff that thinks Cyber Defensive.

SESSION LEARNING OBJECTIVES Threat Awareness and Exposure What are we exposing and what threats are out there? Internal and External Testing Protecting from the inside and guarding from the outside Cyber Security Products and Services Leveraging Free and Enterprise-level Services and Products Security and Your Products Protecting client data within your own products ITAR and Export Controlled Data Good documentation and disciplined data transfer training

SESSION LEARNING OBJECTIVES Threat Awareness and Exposure What are we exposing and what threats are out there? Internal and External Testing Protecting from the inside and guarding from the outside Cyber Security Products and Services Leveraging Free and Enterprise-level Services and Products ITAR and Export Controlled Data Good documentation and disciplined data transfer training

Threat Awareness and Exposure Keep your software products and defenses up-to- date. Apply patches to systems that can be updated Isolate systems that can’t be patched with a network switch + firewall IT personnel should limit the exposure of externally accessible IPs and ports in your infrastructure to protect from outside attacks.

Threat Awareness and Exposure Carefully inspect and test all introduced software apps in a sandboxed environment before deploying enterprise-wide. Some simple desktop tools that people love to use connect to foreign countries and send out data. Stay up-to-date with the latest threats and take preventative measures.

SESSION LEARNING OBJECTIVES Threat Awareness and Exposure What are we exposing and what threats are out there? Internal and External Testing Protecting from the inside and guarding from the outside Cyber Security Products and Services Leveraging Free and Enterprise-level Services and Products ITAR and Export Controlled Data Good documentation and disciplined data transfer training

Internal and External Testing Regularly review routing and iptables rules internally. Utilize a sandbox environment for testing apps and monitor their behavior before deploying. Take advantage of local university resources for a cost-effective way to test your network from an independent perspective. Helps the university students by building practical experience and tests your defense with an independent view of your network responses.

Internal and External Testing Enterprise-level products should be used whenever possible for proactive internal scanning and monitoring of resources and connections Enterprise-level products should have the latest

SESSION LEARNING OBJECTIVES Threat Awareness and Exposure What are we exposing and what threats are out there? Internal and External Testing Protecting from the inside and guarding from the outside Cyber Security Products and Services Leveraging Free and Enterprise-level Services and Products ITAR and Export Controlled Data Good documentation and disciplined data transfer training

Cyber Security Products and Services Enterprise products are supported and have measures in place to deal with the latest threats. Spending $ on Enterprise-level products and support is worth the expense. Evaluate Enterprise products carefully and make the best choice for your company and security needs. Supplement your exposure testing with government provided DHS NCATS services. Free services for those that register. National Cybersecurity Assessments and Technical Services (NCATS) https://www.us-cert.gov/resources/ncats

Cyber Security Products and Services Network and IT infrastructure hardware Upgrade your hardware network-related products to ensure that each of your products is supported and updates are possible. Keep an eye on the latest trends and monitor for possible inclusion into your framework. There are a lot of great new emerging services related to secure transmission, encryption techniques, authentication and so on. Use these services if it solves a problem and adds value to your security posture. Evaluate these services and make sure that they fit your needs and complements your infrastructure.

SESSION LEARNING OBJECTIVES Threat Awareness and Exposure What are we exposing and what threats are out there? Internal and External Testing Protecting from the inside and guarding from the outside Cyber Security Products and Services Leveraging Free and Enterprise-level Services and Products ITAR and Export Controlled Data Good documentation and disciplined data transfer training

ITAR and Export Controlled Data Today most businesses interface with the global marketplace. When your business is involved in DoD contracts or interfacing and exchanging certain types of data or discussing design with foreign entities: Your workforce needs to be trained to recognize export- controlled technologies and technical data, and be equipped with the know-how and tools to comply with ITAR, EAR and DoD requirements, as well as industry best practices, for safeguarding sensitive information and combating cyber threats

ITAR and Export Controlled Data Secure your data, log all access to sensitive data, control access to physical locations of stored data and drawings. Log all e-mail exchanges and physically store all exchanges in file cabinets. Export control violations and fines can be very costly. Ensure your CyberSecurity plan involves measures to deal with ITAR and Export Controlled data.

QUESTIONS? THANK YOU