El Camino Cyber security

Slides:



Advertisements
Similar presentations
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Advertisements

Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Security Policies and Implementation Issues.
InformationWeek 2014 Strategic Security Survey Research Findings © 2014 Property of UBM Tech; All Rights Reserved.
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
Challenges of Securing Clinical Data in a Cloud- centric World Patty Furukawa – Assistant Dean for IT University of California-Irvine School of Law Doug.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
Data Security: Steps to Improved Information Security September 22, 2015 Presented by: Alex Henderson General Counsel and Chief Administrative Officer.
Information Technology Study Fiscal Crisis and Management Assistance Team (FCMAT) Las Virgenes Unified School District Presented By: Leslie Barnes Steve.
GSHRM Conference Cyber Security Education Shri Cockroft, CISO Piedmont Healthcare, Inc. September 21, 2015.
The University of Georgia. /1002 Ensure that the University is appropriately managing risk to information assets and information services.
TIF-Security Update Robert Ono, IT Security Coordinator October 2010.
Jeff Miller Tamra Pawloski IT Procurement Summit headline news…
Cyber Security Management Lesson Introduction ●Understand organizational context for cyber security ●Understand the people, process and technology dimensions.
STANFORD UNIVERSITY RESEARCH COMPUTING Are we outliers? Institutional minimum security requirements RUTH MARINSHAW OCTOBER 14, 2015.
IT Security Policy: Case Study March 2008 Copyright , All Rights Reserved.
Information Security tools for records managers Frank Rankin.
Managing End Point Security Starts at the Perimeter DIR ISF April 14&15, 2016 Randy Guin, CISSP, CGEIT.
1 1 Advanced Cyber Security Event - Introduction 11 th May 2016 Matt Locker.
Palindrome Technologies all rights reserved © 2016 – PG: Palindrome Technologies all rights reserved © 2016 – PG: 1 Peter Thermos President & CTO Tel:
Taking on Tomorrow's Challenges Today Taking on Tomorrow's Challenges Today Almost every organisation has been attacked …. But most don’t know about it!
“How to Protect Yourself”
Defining your requirements for a successful security (and compliance
Law Firm Data Security: What In-house Counsel Need to Know
Michael Wright • Chief Security Officer • Tech Lock
Increasing Information and Data Security in Today’s Cybersecurity World 2017 Conference Review 6/6/2017.
Your Partner for Superior Cybersecurity
Earth’s Mightiest Heroes: Combating the Evils Lurking in Cyberspace
Performing Risk Analysis and Testing: Outsource or In-house
Your security risk is higher than ever.
Barracuda Web Security Flex
Cybersecurity - What’s Next? June 2017
Cyber Security Enterprise Risk Management: Key to an Organization’s Resilience Richard A. Spires CEO, Learning Tree International Former CIO, IRS and.
Security Standard: “reasonable security”
Team 2 – understand vulnerabilities
Secure Software Confidentiality Integrity Data Security Authentication
Cybersecurity Trends for 2018
Data Compromises: A Tax Practitioners “Nightmare”
That could never happen to me! Think again.
Executive Director, Education Technology Services
Cybersecurity Reference Architecture
Cyber Protections: First Step, Risk Assessment
BUILDING A PRIVACY AND SECURITY PROGRAM FOR YOUR NON-PROFIT
UNIVERSITY Common Cyber Security Myths An Update on Cyber Security.
Jon Peppler, Menlo Security Channels
Download Latest CompTIA CAS-002 Exam Dumps PDF Questions - CAS-002 Best Study Material - Realexamdumps.com
CompTIA CAS-003 Exam Study Material - CompTIA CAS-003 Exam Dumps Realexamdumps.com
CIS 502 Education for Service-- tutorialrank.com
I have many checklists: how do I get started with cyber security?
By: Tekeste Berhan Habtu Chief Executive Officer Venue: African Union
Implementing and Auditing the Critical Controls
Cyber Security in the Mortgage Industry
Cybersecurity Strategy
IT Development Initiative: Status and Next Steps
Curating an Effective Security Culture
Navigating Security Seas in a Small Ship with a Limited Crew
National Cyber Security
Automating Security in the Cloud
Chapter 4: Protecting the Organization
How to Mitigate the Consequences What are the Countermeasures?
Cyber Risk & Cyber Insurance - Overview
IT Development Initiative: Status & Next Steps
Topic What is Network & Network Security ? Network Security Companies
The State of Cybersecurity in State Government NAST March 26, 2019
Security week 1 Introductions Class website Syllabus review
Cybersecurity: Tried and True Tactics for Assessing and Managing Risks, Employee Training and Program Testing Brian Rubin, Partner, Sutherland Tee Meeks,
Policies and Procedures to Protect you, your Office and your Data
Technology Solutions Cybersecurity Report to the KCTCS Board of Regents March 14, 2019.
Presentation transcript:

El Camino Cyber security

Where we started – may, 2016 Aging eol firewall/vpn No spf/dmarc/dkim implementation Aging eol switches No waf Aging eol server & workstation o.s. versions No dns protection No internal security procedures Aging and underperforming email gateway No dedicated security person

Where we started – may, 2016 Out of date motd & web privacy statement No formal employee cyber security training program Only one administrative policy (out of date) No endpoint malware protection No security website or newsletter No firm understanding of cyber insurance coverage No penetration testing No focus on ferpa/pci/ca compliance No vulnerability testing

Where we are now - 2019 Hired CISO per plan-net Cisco internal waf New Cisco 9000 firewall w/ vpn Cisco umbrella dns New switches – more being replaced internal procedures for spam/phishing mitigation, ransomware, & formal breach response plan Servers upgraded to newer os Workstations being upgraded to win10 Upgraded to barracuda 600 & cloud spf/dmarc/dkim implementation

Where we are now - 2019 KnowB4 phishing simulator & training 12 new administrative policies & 2 new board policies Malwarebytes & Cisco amp endpoints Complete understanding of cyber insurance coverage documented in breach-response plan Cyber security website & monthly newsletter penetration testing performed focus on ferpa/pci/gdpr compliance vulnerability testing via tenable/nessus New motd & web privacy statement

Where we are now - 2019 Splunk (log aggregation) Involvement in technology committee & aims committee Re-wrote info security section in new technology master plan Representation at chancellor’s office events Created 5 year cybersecurity strategic plan Represented el camino at the 2018 mcafee cybersecurity leadership & innovation awards Involvement in fbi-infragard, isaca, issa FBI infragard daily intel briefings to ecc- pd Represented el camino at the 2019 cio ones to watch awards DHS cybersecurity intel briefings to its

Where we need to be – 2020 & beyond New policies approved by board Look at logz.io (elk stack) Implement 2FA (at least its) Finalize & implement br/dr plan Another pen test Look at spirion Threat-hunting s/w (Reveal-X) Completion of data governance project (Vladimir) Checkpoint sandblast now appliance Address scada vulnerabilities HP printer security

Current trending threats Cryptojacking (cryptomining) File-less malware (powerghost) Software Subversion – malware in opensource s/w Attacks to cryptocurrency eco-system Large-scale DNS attacks Q1 2019 has seen a 967% increase so far on 100gbps+ attacks!!!

Current trending defenses Threat emulation s/w (verodin, attackIQ, darklight, etc.) IAM moving to the cloud Authentication through mobile devices will explode (2FA) The public will look beyond compliance for real trust FedEx (notPetya) & Equifax (data breach)

Where we need to be – 2020 & beyond fff

Questions. https://www. elcamino