Layered Security Solutions - Simplified www.SoftwareSecuritySolutions.com 303-232-9070 © 2008 Monte Robertson - CEO Layered Security Solutions – Simplified!

Slides:



Advertisements
Similar presentations
The Whole/Hole of Security Public (DoD) v. Corporate Carl Bourland US Army Judge Advocate Generals Corps.
Advertisements

Women in Technology 2009 Mary Henthorn. Security Prevent loss, theft, or inappropriate access Privacy Ensure freedom from intrusion or disturbance Security.
!! Are we under attack !! Consumer devices continue to invade *Corporate enterprise – just wanting to plug in* Mobile Device Management.
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.
Copyright © 2012, Big I Advantage®, Inc., and Swiss Re Corporate Solutions. All rights reserved. (Ed. 08/12 -1) E&O RISK MANAGEMENT: MEETING THE CHALLENGE.
Mission Critical Messaging Platform Roni Havas Unified Communications Solution Specialist Specialists Technology Unit – EPG - Microsoft Israel
Lecture Materials for the John Wiley & Sons book: Cyber Security: Managing Networks, Conducting Tests, and Investigating Intrusions October 12, 2014 DRAFT1.
Supporting The Mobile Client: Expanding Our Borders John Guidone Manager, Desktop Technologies and Dawn E. Colonese Manager, Help Desk & Client Access.
4 Information Security.
Current Security Threats WMO CBS ET-CTS Toulouse, France May 2008 Allan Darling, NOAA’s National Weather Service WMO CBS ET-CTS Toulouse, France.
Blended Threats and Layered Defenses Security Protection in Today’s Environment Marshall Taylor
Defense-in-Depth Against Malicious Software Jeff Alexander IT Pro Evangelist Microsoft Australia
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Information Security in Real Business
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Security Policies and Implementation Issues.
Small Business Security By Donatas Sumyla. Content Introduction Tools Symantec Corp. Company Overview Symantec.com Microsoft Company Overview Small Business.
Barracuda Networks Steve Scheidegger Commercial Account Manager
Chapter 3 Ethics, Privacy & Security
Norman SecureSurf Protect your users when surfing the Internet.
Cloud Computing How secure is it? Author: Marziyeh Arabnejad Revised/Edited: James Childress April 2014 Tandy School of Computer Science.
New Data Regulation Law 201 CMR TJX Video.
Information Security Information Technology and Computing Services Information Technology and Computing Services
Partnering For Profitability Growing your business with Microsoft Forefront Security Solutions Mark Hassall Director Security & Access BG Microsoft Corporation.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
SEC835 Database and Web application security Information Security Architecture.
© 2009 IDBI Intech, Inc. All rights reserved.IDBI Intech Confidential 1 Information (Data) Security & Risk Mitigation.
1 Monday, June 27, 2011Copyright© 2011 Dragnet Dragnet ® Cloud Service Introduction Matthew McLeod, Managing Director
CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate.
Securing Microsoft® Exchange Server 2010
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #6 Forensics Services September 10, 2007.
Thomas Levy. Agenda 1.Aims: Reducing Cyber Risk 2.Information Risk Management 3.Secure Configuration 4.Network Security 5.Managing User Access 6.Education.
Chapter 12 by Lisa Reeves Bertin Securing Information in a Network.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Asif Jinnah Microsoft IT – United Kingdom. Security Challenges in an ever changing landscape Evolution of Security Controls: Microsoft’s Secure Anywhere.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
Safeguarding OECD Information Assets Frédéric CHALLAL Head, Systems Engineering Team OECD.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
Unit 6b System Security Procedures and Standards Component 8 Installation and Maintenance of Health IT Systems This material was developed by Duke University,
Protecting Your Business! SBA Ft. Lauderdale November 15, 2006 Gregory Levine, Sr. Director Marketing.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Data Security Overview. Data Security Periphery –Firewalls –Web Filtering –Intrusion Detection & Prevention Internal –Virus Protection –Anti Spy-ware.
 Introduction to Computing  Computer Programming  Terrorisom.
Module 7 Planning and Deploying Messaging Compliance.
Security Version 6.1 | August Need for Complete Security Stop threats at the perimeter High volume spam, phishing, viruses and.
Security fundamentals Topic 10 Securing the network perimeter.
HalFILE 2.1 Network Protection & Disaster Recovery.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
1 #UPAugusta Today’s Topics What are Deadly IT Sins? Know them. Fear them. Fix them. #UPAugusta201 6.
Your Office 365 Journey Prepare, Migrate, and Operate with Barracuda
No boundaries with Unified Web Security Solutions Steven Vlastra Sr. Systems Engineer - Benelux.
Security fundamentals
Securing Information Systems
Securing Information Systems
Your Office 365 Journey Prepare, Migrate, and Operate with Barracuda
Trend Micro Consumer 2010 Easy. Fast. Smart.
Cybersecurity - What’s Next? June 2017
TECHNOLOGY GUIDE THREE
CHAPTER 4 Information Security.
Securing Information Systems
CYB 110 Education Begins / Snaptutorial.com. CYB 110 All Assignments For more classes visit CYB 110 Week 1 Individual Protecting.
Design Unit 26 Design a small or home office network
Secure once, run anywhere Simplify your security with Sophos
Contact Center Security Strategies
Implementing Client Security on Windows 2000 and Windows XP Level 150
Introduction to the PACS Security
Presentation transcript:

Layered Security Solutions - Simplified © 2008 Monte Robertson - CEO Layered Security Solutions – Simplified!

If your data isn’t secure, it isn’t your data.® The Layered Security Solution for Small Businesses Goals and Outcomes: Begin to understand layered security. Put information to immediate use, at home and at work. Use this to help others with awareness.

If your data isn’t secure, it isn’t your data.® The Small Business Situation SMB does not have the knowledge or skills to address this complex issue. Small Business Information Security Act of 2008 (Senator Olympia J. Snowe, R-Maine) As Mentors - You can help!

Identification of Risk What data could cause them harm if lost, changed or compromised? What do they need to protect? If your data isn’t secure, it isn’t your data.® 1.Financial Data 2.Customer Data 3.Vendor Data 4.Employee Data 5.Health Care, Investments 6.Corporate Intellectual Property 7.Investors

Identification of Risk What is the value of each category? Where is this information kept? What regulations apply to the business’ data? –PCI, SOX, GLB, HIPAA –E-Discovery requirements for pertinent data If your data isn’t secure, it isn’t your data.®

Data Back-up All categories of Data 1.Critical\Non Critical 2. – Archiving, new legal requirements 3.Data Shares If your data isn’t secure, it isn’t your data.®

Data Back-up Local – on site, DAS, NAS, Appliances Tape vs. new technology Off site, Online Redundancy & DR Standards & Regulations If your data isn’t secure, it isn’t your data.®

Data Back-up Research If your data isn’t secure, it isn’t your data.® Are all areas identified & backed up? Both on & off site? What type do they use & is it efficient? Time & resources required to maintain? Time & resources required to restore? Have backups been tested? Comfort & Consequences!

Disaster Recovery Plan Identify and assign resources Business Continuity Insurance Tools to help If your data isn’t secure, it isn’t your data.®

Disaster Recovery Research Disaster Recovery Journal Gartner SBA Plans are a work in progress as business changes. Less than 10% survive without a plan If your data isn’t secure, it isn’t your data.®

Anti Malware Client machines – laptop, desktop, mobile Servers Gateways 1.Internet, Changes in technology New Threats –Mashups & Web 2.0 $100 additional cost per user If your data isn’t secure, it isn’t your data.®

Anti Malware Research Virus Bulletin Anti Virus Comparatives AV Test –Times have changed & so have solutions calculator.phpwww.SoftwareSecuritySolutions.com/anti-virus-cost- calculator.php If your data isn’t secure, it isn’t your data.®

Firewalls Gateway Inspection types Additional layers 1.Anti Malware 2.Anti Spam 3.Content Filtering 4.Intrusion prevention Personal Firewalls If your data isn’t secure, it isn’t your data.®

Firewall Research ICSA West Coast Labs If your data isn’t secure, it isn’t your data.®

Security & Filtering All user devices Technology Spam 1.Volume, Cost Malware Phishing Social Engineering Archiving, Legal If your data isn’t secure, it isn’t your data.®

Security Research How critical is to their business? Associated cost? POP3 vs. SMTP Conduct CBA on Service vs. Appliances & Software If your data isn’t secure, it isn’t your data.®

Wireless Security Mobile Devices 1.Anti malware 2.Backup & theft recovery Wireless Networks Authentication Encryption WEP\WPA If your data isn’t secure, it isn’t your data.®

Web Security & Filtering All user devices\Servers Shift in threat Web applications –PCI compliance Searching\Surfing Liabilities If your data isn’t secure, it isn’t your data.®

User Education & Application updates Weakest link Threat Surface Future attacks Updates 1.OS 2.Office 3.Common apps 4.Checked regularly? If your data isn’t secure, it isn’t your data.®

User Education Resources Employee Awareness: Security Video: World Security Challenge: Customizable Awareness Newsletter: If your data isn’t secure, it isn’t your data.®

Security Policy Definitions –All Layers –Acceptable Use –Consequences Resources –What to use –Who supports If your data isn’t secure, it isn’t your data.®

Security Policy Resources Policies, Standards and Guidelines: If your data isn’t secure, it isn’t your data.®

What they can (and should) do right now Network Configuration (P2P vs. Domain) Updates – 3 rd party Office machines – (all in one) Laptop encryption, theft tracking User rights File Access Physical Access If your data isn’t secure, it isn’t your data.®

Implementing a Layered Security Solution Create a Security Policy Formulate an adoption plan Budget Start with most critical areas Set & forget not an option If your data isn’t secure, it isn’t your data.®

Questions and Answers If your data isn’t secure, it isn’t your data.®

Layered Security Solutions - Simplified © 2008 Monte Robertson – CEO Layered Security Solutions – Simplified!