Cross Security Group Presented by: Thomas Carrozza Senior Systems Engineer.

Slides:



Advertisements
Similar presentations
ETHICAL HACKING A LICENCE TO HACK
Advertisements

Rocket Software, Inc. Confidential James Storey General Manager, OSS Unit Rocket Software APNOMS 2003: Managing Pervasive Computing and Ubiquitous Communications.
CS898T Mobile and Wireless Network Handheld Device Security By Yuan Chen July 25 th, 2005.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Network Basics.
Personal Identity Theft in the Web-based Business World Presenter – Rick Weatherspoon Xtreme Computing, LLC.
Hackers, Crackers, and Network Intruders: Heroes, villains, or delinquents? Tim McLaren Thursday, September 28, 2000 McMaster University.
E-Commerce Security Issues. General E-Business Security Issues Any E-Business needs to be concerned about network security. The Internet is a “ public.
TeleWall, TeleSweep Secure, TeleAudit, TeleVPN, ETM, TeleView, TeleBridge, TeleIDS, TeleWall NET, SecureLogix, SecureLogix Corporation and the SecureLogix.
EC-Council | Press The Security Books You Have Been Waiting For!
Iron Mountain’s Continuity Service ©2006 Iron Mountain Incorporated. All rights reserved. Iron Mountain and the design of the mountain are registered.
© 2006 Vigilar, Inc. All rights reserved worldwide. Contents are property of Vigilar, Inc. VoIP Penetration Testing: Lessons Learned, Tools.
Hands-On Ethical Hacking and Network Defense
Information Assurance & Network Security Certificate Prof. Rafael M. Rivera Universidad del Turabo School of Engineering Institute of Telecommunications.
Personal Identity Theft in the Web-based Business World Presenter – Rick Weatherspoon Xtreme Computing, LLC.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
FIT3105 Security and Identity Management Lecture 1.
E-Commerce Security and Fraud Issues and Protections
Security Offering. Cyber Security Solutions 2 Assessment Analysis & Planning Design & Architecture Development & Implementation O&M Critical Infrastructure.
Assessing the Threat How much money is lost due to cyber crimes? –Estimates range from $100 million to $100s billions –Why the discrepancy? Companies don’t.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
Citadel Security Software Presents Are you Vulnerable? Bill Diamond Senior Security Engineer
Norman SecureSurf Protect your users when surfing the Internet.
Company LOGO Copyright Carrie Kerskie Data Breach & Identity Theft By Carrie Kerskie Kerskie Group, Inc.
A First Course in Information Security
Assured Information Solutions, LLC Securing the Life Blood of Business - INFORMATION Christopher D. Peele CISSP-ISSEP Chief IA Analyst.
Market Analysis Decision Group.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Agenda Do You Need to Be Concerned? Information Risk at Nationwide
Computer Security Fundamentals Chuck Easttom Chapter 1 Introduction to to Computer Security.
Joseph Ferracin Director IT Security Solutions Managing Security.
Cybersecurity and the Department of Justice Vincent A. Citro, Assistant United States Attorney July 9-10, 2014 Unclassified – For Public Use.
World Bank Integrator Unit Electronic Security and Payment Systems: Some New Challenges Tom Glaessner Thomas Kellermann Valerie McNevin The World Bank.
A Step Into The Computer Underground 1 “By Understanding The Enemy We Are Better Prepared To Defend Ourselves”
EECS 710: Information Security and Assurance Assignment #3 Brent Frye 10/13/
Cambridge Management Group (CMG) Capabilities Presentation “Taking you into the Future with Visionary IT Solutions Aldie Mill Ct, Suite 200, Chantilly,
Security Issues and Strategies Chapter 8 – Computers: Understanding Technology (Third edition)
Playing Safely in the Cloud Marie Greenberg, CISSP, IAM, IEM Information Security Manager Virginia State Corporation Commission.
Module 4 Quiz. 1. Which of the following statements about Network Address Translation (NAT) are true? Each correct answer represents a complete solution.
Risk Assessment: Key to a successful risk management program Sixteenth National HIPAA Summit Timothy H Rearick, MBA, PMP August 22, 2008.
Cyber Safety Jamie Salazar.
Data Security & Privacy: Fundamental Risk Mitigation Tactics 360° of IT Compliance Anthony Perkins, Shareholder Business Law Practice Group Data Security.
Chapter 1 Ethical Hacking Overview. Hands-On Ethical Hacking and Network Defense2  Describe the role of an ethical hacker  Describe what you can do.
Decision Group April 2010 Market Analysis. Agenda  Market  DPI/DPC Market Size  Market Segments  Forensic Solution Market  Competitors  Decision.
Information Security: Current Threats Marc Scarborough Information Security Officer
Ethical Hacking and Network Defense. Contact Information Sam Bowne Sam Bowne Website: samsclass.info Website:
Internet Security and Implications on Transportation Systems 1 Yan Chen Department of Electrical Engineering and Computer Science Northwestern University.
Information Security and Technology Overview Presented By: Enterprise Risk Management (ERM) Division Jill Martucci, CISA, SSCP, Senior Allison Hall, Experienced.
Federal Identity Theft Investigations Richard W. Downing Assistant Deputy Chief Computer Crime and Intellectual Property Section U.S. Department of Justice.
Managed IT Services JND Consulting Group LLC
Tuesday March 15, 2016 Session 19-D Technology Forum David Finkelstein, CIO RiverSpring Health.
Since 2000, Broadband Technology Corporation (BTC) has specialized in the installation of voice and data network cabling services for commercial and government.
Securing Information Systems
Chapter 1: Exploring the Network
Cyber Security Zafar Sadik
CISSP-ISSEP® - Certified Information Systems Security Professional
CEH vs CISSP Course, Advantage, Career, Salary, Demand!
Patch Management Patch Management Best Practices
Level 2 Diploma Unit 11 IT Security
NYBA 2017 Technology, Compliance &
Securing Information Systems
John Butters Running Tiger Teams
Playing Safely in the Cloud
Cyber Trends and Market Update
E-Commerce Security and Fraud Issues and Protections
National Cyber Security
Security Essentials for Small Businesses
Playing Safely in the Cloud
Information Assurance & Network Security Certificate
Security in mobile technologies
Presentation transcript:

Cross Security Group Presented by: Thomas Carrozza Senior Systems Engineer

Agenda Business Drivers Threat Overview Cross Service Offerings Wrap Up / Questions

Security Business Drivers Voice and Data are now applications running on 1 network; this is convergence. Your Network “Is it safe? Is it secure?”

Security Business Drivers Ultimately, what are we protecting? Information

Predators

Security Business Drivers Viruses/worms/hackers have caused more than $55 Billion in damages in the last 12 months Federal and State Laws/Regulations Pose Financial and Personal Risk –HIPAA (Health Care) –SOX (Financial Governance) –Gramm-Leach-Blilely- GLBA (Information Security) Human Error- Data Theft or Lost Data as a Result of Human Error –Dept of Veterans Affairs- Recently lost names, social security numbers, and dates of birth for up to 26.5 million Veterans VoIP Deployment has opened up additional holes into the data network Wireless Network Deployments have blurred the definition of “Perimeter”

Threats—Total Overload

Denial of Service DoS Attacks Up 50%

Day Zero Attacks Day Zero Attacks– Increasing in Speed, Sophistication and Level of Stealth

Policy and Human Error AFP Published Photo after Katrina- leading to immediate Credit Card Theft

Phishing Phishing Increased 39% in Last 6 Months

Extortion

Wireless and Mobility Wardriving –Laptop/GPS and software to discover open networks Warwalking –iPAQ/GPS and software Warchalking –Symbols indicates wireless settings to others Rogue Access Points

Security Threats Security Threats Toll Fraud Viruses/Worms Hackers Espionage Denial of Service (DOS) Man in the Middle Extortion PDA Theft Podslurping Bluetooth Access Wireless Bleed Over Rogue Modem Usage IP Packet Hi-Jacking

To help our customers address these security concerns, Cross has formed the Cross Security Group (CSG). Cross’ Core Offerings are: –Security Jumpstart –Converged Network Security Assessment –Network Security Consulting Cross Security Group (CSG)

Security Jumpstart is an assessment of the External Network that identifies and prioritizes vulnerabilities Customers receive: –Executive Report of Network Security –Top 10 Threats to the Network Report –Threat Matrix of Vulnerabilities –Web Intelligence Report –Full Technical Report –Current Network Map –Outbriefing of the State of Security on Your Network Performed Remotely- Price: $2,000. Onsite available upon request for added cost. Security Jumpstart

Converged Network Security Assessments (CNSA) CNSA is a holistic assessment focusing on both the voice and the data network, in order to expose any security associated with a converged network. The assessment covers: –External Security Assessment –Internal Security Assessment –Wireless Assessment –Bluetooth Assessment –Rogue Modem Assessment –IDS Assessment –SAN’s Assessment –VoIP Assessment –Penetration Testing

Cross Security Team Chief Security Officer—Joseph Seanor –10 years Central Intelligence Agency, CIC/CNC –Department of Justice Telecom Security Staff –Private Investigator for 14 years –7 years America Online’s Senior Investigator –Learning Tree Instructor on: IDS, Firewalls, Windows Security. –Author of 6 books on computer and crime –7 th book out “The Black Book on Corporate Security” -- Converged Network Security –Avaya Security Managing Consultant 3 years –CBS radio national correspondent –2 patents pending

Cross Security Team Security Analyst –Security Consultant Avaya –DISA Network Consultant –America Online Network Security engineer –Software programmer Developed software for DOD, to be reviewed by NSA Developed Kerberos software for AOL –NSA IAM certified Certified Security Engineers –CCIE- Security –CISSPs –CCSPs –Global Information Assurance Certifications (GIAC) –Government Clearance

Always Ask Your Network “Is it safe? Is it secure?”

Questions?