The Secure Contingency Plan

Slides:



Advertisements
Similar presentations
S3-1 © 2001 Carnegie Mellon University OCTAVE SM Process 3 Identify Staff Knowledge Software Engineering Institute Carnegie Mellon University Pittsburgh,
Advertisements

Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
S2-1 © 2001 Carnegie Mellon University OCTAVE SM Process 2 Identify Operational Area Management Knowledge Software Engineering Institute Carnegie Mellon.
Affiliated Information Security Collaborative An Affiliated Enterprise Approach to Information Security Deans and Vice Presidents Meeting April 17, 2014.
IT Security Readings A summary of Management's Role in Information Security in a Cyber Economy and The Myth of Secure Computing.
© 2012 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual.
Visual 3. 1 Lesson 3 Risk Assessment and Risk Mitigation.
1 Group-IB: Digital investigations and forensic Ilya Sachkov Group-IB
What is HIPAA? H ealth I nsurance P ortability and A ccountability A ct (Kennedy-Kassenbaum Bill) nAdministrative Simplification –Privacy –Transactions.
What Keeps You Awake at Night Compliance Corporate Governance Critical Infrastructure Are there regulatory risks? Do employees respect and adhere to internal.
Prepared by: Dinesh Bajracharya Nepal Security and Control.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Web Security for Network and System Administrators1 Chapter 2 Security Processes.
Meaningful Use Security Risk Assessment (SRA): Resources for Eligible Professionals (EPs) Kim Bell, MHA, FACHE, PCMH-CCE Executive Director Georgia Health.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
TOP 10 TECHNOLOGY INITIATIVES © Robert G. Parker S-1 Issues Loss or theft of mobile devices Lack of MDM (mobile device management) software Cloud.
Introduction: Information security services. We adhere to the strictest and most respected standards in the industry, including: -The National Institute.
Institutional affiliation Date.  Security is very important as it keeps your secret from other know.  An insecure network exposes a business to various.
DRAFT 1 Belfast th World Cyber Security Technology Research Summit Suren Gupta Allstate Corporation Executive Vice President Allstate Technology.
Develop your Legal Practice using “Cloud” applications, but … Make sure your data is safe! Tuesday 17 November 2015 The Law Society, London Allan Carton,
Legal Jeopardy: Whose Risk Is It?. SPEAKERS Jason Straight Chief Privacy Officer and Senior Vice President Cyber Risk Solutions at UnitedLex Patrick Manzo.
Current risk and compliance priorities for law firms PETER SCOTT CONSULTING.
Security – 2015’s Biggest Threat to Client Confidentiality A Panel Discussion Joseph Abrenio, VP of Cyber Advisory Services & General Counsel Delta Risk.
Company Proprietary and Confidential Texas Association of Community Health Centers - Proprietary and Confidential Fourth and Goal: Score with Meaningful.
BizSmart Lunch & Learn Webinar Information Security and Protecting your business With the increased risk of some sort of cyber- attack over the past few.
EIC – Jornada ciberatacs cyber risk outlook June 2016.
Cyber Security Phillip Davies Head of Content, Cyber and Investigations.
Law Firm Data Security: What In-house Counsel Need to Know
Increasing Information and Data Security in Today’s Cybersecurity World 2017 Conference Review 6/6/2017.
EAST AFRICAN DATA HANDLERS DATA SECURITY/MOBILITY
Information Security Program
Healthcare Cybersecurity: State of Industry
Data Minimization Framework
BEST PRACTICES FOR AN IT SECURITY ASSESSMENT
Responding to Intrusions
The Internal Audit Role in assessing Cybersecurity
Current ‘Hot Topics’ in Information Security Governance Auditing
CSI Survey 2007 Tiffany Gorman
CIS 333 Competitive Success/snaptutorial.com
AJS 572 Possible Is Everything/snaptutorial.com
AJS 572 Education for Service-- snaptutorial.com.
CIS 333Competitive Success/tutorialrank.com
MPA TM543Competitive Success/snaptutorial.com
CIS 333 Education for Service-- snaptutorial.com.
CIS 333 RANK Lessons in Excellence-- cis333rank.com.
CIS 333 Education for Service-- tutorialrank.com.
CMGT 431 STUDY Lessons in Excellence--cmgt431study.com.
CIS 333 RANK Education for Service-- cis333rank.com.
CIS 333 Teaching Effectively-- snaptutorial.com
AJS 572 Teaching Effectively-- snaptutorial.com
MPA TM543 Education for Service- -snaptutorial.com
I have many checklists: how do I get started with cyber security?
SMB practice development: Security play
Searchable. Secure. Simple.
Cybersecurity compliance for attorneys
SMB practice development: Security play
Mitigating Ransomware
Anatomy of a Large Scale Attack
Cybersecurity ATD technical
Definition of Project and Project Cycle
Voluntary Private Sector Preparedness Certification Program
Strategic threat assessment
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
Texas Assisted Living Association 2019 Conference
HIPAA Security Risk Assessment (SRA)
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fuel Cell Market size worth $25.5bn by 2024 Low Power Wide Area Network.
Plan and design the solution
Community Benefit Activities
School of Medicine Orientation Information Security Training
Presentation transcript:

The Secure Contingency Plan Cyber Security The Secure Contingency Plan

Cyber-Threats – 2016-2017 Increase in Cyber Crimes globally, for example: The WannaCry Ransomeware Attack Worldwide cyberattack  Ransomware Cryptoworm Targeted computers running the Microsoft Windows operating system The Panama Papers 11.5 million documents More than 214,488 offshore entities Between 2016 and 2017, we saw an increase in cyber crimes globally. To date, two instances of threats to data became the talk of numerous international bodies: The WannaCry Ransomeware Attack - The WannaCry  attack was a worldwide cyberattack by the WannaCry ransomware cryptoworm, which targets computers running the Microsoft Windows operating system by encrypting data and demanding ransom payments in the Bitcoin cryptocurrency. The Panama Papers – Major data leak of confidential 11.5 million documents that detailed financial and attorney–client information for more than 214,488 offshore entities.

Primary Targets Data Rich enterprises such as: Law Firms Sensitive information that will garner them big payouts Healthcare Institutions Health information - a mixture of personal and financial information Primary Targets for Ransomware and Data attacks are: Law Firms - Data-rich law firms are an attractive target for cybercriminals in search of sensitive information that will garner them big payouts. Healthcare Institutions - There are a few obvious reasons that make the medical sector an enticing target for cyber attacks. Health information is a mixture of personal and financial information.

Foundational Questions Important Questions: What data / assets need protection? What are the most realistic internal and external threats to the data / assets? How vulnerable are we to these threats? In order to assess a law firm’s data security profile, three pertinent questions must be addressed:

Key Stakeholders Collaboration from all stakeholders required: More than just a decision for your IT team Lawyers, managers, professional staff and IT team Partner with experts in the field Requires engaged collaboration from all stakeholders. More than just a decision for your I.T team. Lawyers, managers, professional staff and I.T need to collaborate to mitigate. Partner with experts who truly understand the types of data the firm has and then implement a process to identify the most likely threats to each of the data types.

Identify Vulnerabilities Work with experts to: Identify existing business processes that can create a potential risk Conduct Technical Vulnerability Testing Take an in-depth look at non-technical elements Work with experts to identify existing processes that can create a potential risk. Technical Vulnerability testing. Taking an in-depth look at non-technical elements that can make a firm an easy target to threats.

The Outcome The organization should be able to: Build a solid foundation Identify an outside resource Identify if they are in a place to respond to a hypothetical loss or disclosure of confidential client data. Once all the above questions have been addressed and answered, an organization should be able to: Identify a solid foundation to begin the process of designing and implementing an enhanced network security plan. Identify an outside resource to assist in implementing an managing their data security. Identify if they are in a place to respond to a hypothetical loss or disclosure of confidential client data.

Summary Lumisol Technology has partnered with Check Point to provide a full scale network solution including but not limited to: Next Generation Threat Protection Mobile Security Endpoint Security Next Generation Firewalls Data Security & Security Management