Security ROI Rick Shaw – President, CorpNet Security, Inc.

Slides:



Advertisements
Similar presentations
©2013 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Best Practices to Secure the Mobile Enterprise Macy Torrey
Advertisements

Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 25 & 27 November 2013.
Backup and Disaster Recovery (BDR) A LOGICAL Alternative to costly Hosted BDR ELLEGENT SYSTEMS, Inc.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
1 CLOUD AND SaaS-BASED PLATFORMS: ENSURING DATA PRIVACY May, 2011.
1 Visualizer for Firewall Display & Analysis Tool.
The costs and benefits related to cyber security breaches Chapter 3 – Gordon & Loeb.
16254_08_2002 © 2002, Cisco Systems, Inc. All rights reserved. Cisco’s Security Vision Mario Mazzola Chief Development Officer August 29, 2002.
N ETWORK S ECURITY Presented by: Brent Vignola. M ATERIAL OVERVIEW … Basic security components that exist in all networks Authentication Firewall Intrusion.
Developing Network Security Strategies Network Security D ESIGN Network Security M ECHANISMS.
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
Web Servers Security: What You Should Know. The World Wide Web (WWW) is one of the best ways to develop an e-commerce business presence and interact with.
Security Management IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
Security Management IACT 418/918 Autumn 2005 Gene Awyzio SITACS University of Wollongong.
Factors to be taken into account when designing ICT Security Policies
seminar on Intrusion detection system
By Edith Butler Fall Our Security Ways we protect our valuables: Locks Security Alarm Video Surveillance, etc.
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
Keeping Data Safe Revision Summer How many ways can data be lost? Start a list… Physical Loss or Corruption of data Accidental or Deliberate Unauthorised.
CISCO CONFIDENTIAL – DO NOT DUPLICATE OR COPY Protecting the Business Network and Resources with CiscoWorks VMS Security Management Software Girish Patel,
Cloud Computing How secure is it? Author: Marziyeh Arabnejad Revised/Edited: James Childress April 2014 Tandy School of Computer Science.
1Cisco Security NOW © 2003, Cisco Systems, Inc. All rights reserved. THIS IS THE POWER OF CISCO SECURITY. now.
Security The Kingsway School. Accidental Data Loss Data can be lost or damaged by: Hardware failure such as a failed disk drive Operator error e.g. accidental.
Information Systems CS-507 Lecture 40. Availability of tools and techniques on the Internet or as commercially available software that an intruder can.
IT-security in the Ubiquitous Computing World Chris Kuo, CISSP, CISA Acer eDC (e-Enabling Data Center) Acer Inc. 2007/3/27.
Network Security in a Business Setting By: Brian Haumschild.
Gain Executive Support in Measuring the Effectiveness of Your BCM Program -Cheyene Haase BC Management, Inc.
Presented By: MICHAEL HOFFMAN President & CEO - Bolt Data Systems June 16, 2010 Data Backup for the Shared Platform.
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
What If You Could… …Automatically protect and secure your company’s most critical business information?... …Get more done with less by enabling employees.
Hosted by Understand Business Requirements: A Blueprint for Digital Security James Mobley President & Chief Executive Officer.
IDS Intrusion Detection Systems CERT definition: A combination of hardware and software that monitors and collects system and network information and analyzes.
Chapter 8 Technology and Auditing Systems: Hardware and Software Defenses.
Impact Development in IT have had a major impact on the way organisations operate. Few organisations are able to survive in a competitive market without.
Partner Logo Overcoming Buyer Objections Q
What does secure mean? You have been assigned a task of finding a cloud provider who can provide a secure environment for the launch of a new web application.
Citrix Solutions in Financial Services Joseph Alexander Delgado Business Development Manager, Citrix Wordtext Systems, Inc.
Physical ways of keeping your system secure. Unit 7 – Assignment 2. (Task1) By, Rachel Fiveash.
Note1 (Admi1) Overview of administering security.
Information System Audit : © South-Asian Management Technologies Foundation Chapter 10 Case Study: Conducting an Information Systems Audit.
Network Security Lewis R. Folkerth, P. E. Consumers Energy Energy Management Systems
1 Figure 10-4: Intrusion Detection Systems (IDSs) IDSs  Event logging in log files  Analysis of log file data  Alarms Too many false positives (false.
Intrusion Detection Systems Paper written detailing importance of audit data in detecting misuse + user behavior 1984-SRI int’l develop method of.
Business IT Applications- A Simplified Integrated Overview IT For Managers Farhan Mahboob.
Hot Topics in Information Security Rick Shaw – President, CorpNet Security, Inc. Mick Johannes – CTO, CorpNet Security, Inc.
Engineering and Management of Secure Computer Networks School of Engineering © Steve Woodhead 2009 Corporate Governance and Information Security (InfoSec)
Computer Security By Duncan Hall.
Network management Network management refers to the activities, methods, procedures, and tools that pertain to the operation, administration, maintenance,
INNOVATE THROUGH MOTIVATION MSP Services Overview KEVIN KIRKPATRICK – OWNER, MSP INC LOGO.
Matt Broman Kodiac Gamble Devin Nichol SECTION 4.2 INFORMATION SECURITY.
Topic 8 – Security Methods 1)TechMed scenario covers Security methods and devices, including biometrics In the scenario: Implied.
Enterprise Mobility Suite: Simplify security, stay productive Protect data and empower workers Unsecured company data can cost millions in lost research,
A Comparison Between Signature Based and Anomaly Based Intrusion Detection Systems By: Brandon Lokesak For: COSC 356 Date: 12/4/2008.
ASHRAY PATEL Securing Public Web Servers. Roadmap Web server security problems Steps to secure public web servers Securing web servers and contents Implementing.
By: Keith Reiter COSC 356. Today’s Agenda Introduction Types of firewalls Firewall Access Rules Firewall Logging Who needs a firewall Summary.
Novell iFolder Novell Academy QuickTrain. What is iFolder? Novell iFolder lets users’ files follow them anywhere A simple and secure way to access, organize.
Onsite CRM Security
Managed IT Solutions More Reliable Networks Are Our Business
CompTIA Security+ Study Guide (SY0-401)
CompTIA Security+ Study Guide (SY0-401)
NETWORK SECURITY LAB Lab 9. IDS and IPS.
CompTIA Security+ Study Guide (SY0-501)
ISMS Information Security Management System
Figure 1-7: Eavesdropping on a Dialog
Identity & Access Management
Firewalls Types of Firewalls Inspection Methods Firewall Architecture
Data integrity and security
Is it Y2K or Problem-X (not to be confused with Memorex)
Network Security Mark Creighton GBA 576 6/4/2019.
Presentation transcript:

Security ROI Rick Shaw – President, CorpNet Security, Inc.

The Challenge! Information Security is just coming into the mainstream. Few companies have given it budgeting in the past. Most ROI is figured on cost avoidance rather than cost savings. Often we have to justify based upon projected savings and statistics.

Banks have done it for years. Banks will use a safe, cameras, sensors, security guards, etc… Your company is no different, it is only the currency that has changed. Today we are dealing with a different point of entry and therefore have different types of sensors (log files, intrusion detection, host agents…).

What is the cost? Hardware (Servers, Firewalls, VPN, Authentication devices). Software (IDS, Log Analyzers, Assessment/Audit Tools, Encryption) Personnel (IS, Trainers, Consultants, CSO)

How long does it take to do your job right? Who actually reads the logs produced by your critical systems? Are the logs even turned on? Systems in question…Critical Servers, Anti- Virus, WWW, e-Commerce, Routers, Firewalls. If you had just 3 of these servers that were somewhat active, you could easily spend 3 hours/day. Most companies have 10X these hosts.

Security “Events” Cost Money Even if a negative “Security Event” resulted in no data loss, you have lost money. Average Virus discovery costs $153/pc to correct. Only you, your competitors and your shareholders can put a value on your data and reputation.

Justification Items Downtime Avoidance. Competitive protection of critical data (research, bids, marketing…) Increased Productivity through increased uptime and more highly educated/aware employees. Direct personnel savings if you actually had the people to manage security on your network appropriately. Reduced litigation from harassment and wrongful termination suites. Possible savings to outsource response services.