Know the Client Own the Problem Share the Solution The 2005 Case for Information Technology Security October 14, 2004.

Slides:



Advertisements
Similar presentations
Not to be distributed or reproduced by anyone other than Qwest entities. Copyright © 2010 Qwest. All Rights Reserved. Government Services TIC from an Industry.
Advertisements

Security Monitoring & Management Security Control Panel Sensors & Detection Devices $ $ $ $ $ $ Physical Security Monitoring.
1 Chapter 7 Intrusion Detection. 2 Objectives In this chapter, you will: Understand intrusion detection benefits and problems Learn about network intrusion.
5-Network Defenses Dr. John P. Abraham Professor UTPA.
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
Controls for Information Security
Nate Olson-Daniel Director of Strategic Development & Principal Engineer The Inevitable Attack.
Small Business Security By Donatas Sumyla. Content Introduction Tools Symantec Corp. Company Overview Symantec.com Microsoft Company Overview Small Business.
Brian Bradley.  Data is any type of stored digital information.  Security is about the protection of assets.  Prevention: measures taken to protect.
Building a Campus Dshield Randy Marchany IT Security Lab VA Tech Blacksburg, VA 24060
Network security policy: best practices
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
IT-security in the Ubiquitous Computing World Chris Kuo, CISSP, CISA Acer eDC (e-Enabling Data Center) Acer Inc. 2007/3/27.
Chapter 2 Information Security Overview The Executive Guide to Information Security manual.
Information Security– SNO International Zanzibar, Tanzania Joe Beaulac, Sr. Manager – Cyber Defense Center & Risk/Vulnerability Management 23 September.
Alisha Horsfield INTERNET SAFETY. firewall Firewall- a system made to stop unauthorised access to or from a private network Firewalls also protects your.
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
Homeland Security. Learning Topics Purpose Introduction History Homeland Security Act Homeland Defense Terrorism Advisory System Keeping yourself safe.
Dell Connected Security Solutions Simplify & unify.
WHAT IS VIRUS? NAE GRAND CHALLENGE SECURE CYBERSPACE.
Asif Jinnah Microsoft IT – United Kingdom. Security Challenges in an ever changing landscape Evolution of Security Controls: Microsoft’s Secure Anywhere.
Chapter 6 of the Executive Guide manual Technology.
1 CISCO SAFE: VALIDATED SECURITY REFERENCE ARCHITECTURE What It Is Business Transformation Top Questions To Ask To Initiate The Sale Where It Fits KEY.
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
1 Managed Premises Firewall. 2 Typical Business IT Security Challenges How do I protect all my locations from malicious intruders and malware? How can.
Looking beyond the obvious!! HOW SECURE IS BANKS’ CORE DATA? Prashant Pande Head Professional Services IDBI Intech Ltd.
Safeguarding OECD Information Assets Frédéric CHALLAL Head, Systems Engineering Team OECD.
Security at NCAR David Mitchell February 20th, 2007.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
GSHRM Conference Cyber Security Education Shri Cockroft, CISO Piedmont Healthcare, Inc. September 21, 2015.
Data Security Overview. Data Security Periphery –Firewalls –Web Filtering –Intrusion Detection & Prevention Internal –Virus Protection –Anti Spy-ware.
Knowing What You Missed Forensic Techniques for Investigating Network Traffic.
Wireless Intrusion Prevention System
National HMIS Conference September 14th and 15th, 2004 Chicago, IL Sponsored by the U.S. Department of Housing and Urban Development1 Information Security.
Small Business Security Keith Slagle April 24, 2007.
12/1/2015Faculty : Trần Thị Ngọc Hoa1 ISA server Overview 1. Introducing ISA Server 2. Deployment Scenario for ISA Server.
Module 11: Designing Security for Network Perimeters.
Security fundamentals Topic 10 Securing the network perimeter.
Hot Topics in Information Security Rick Shaw – President, CorpNet Security, Inc. Mick Johannes – CTO, CorpNet Security, Inc.
ARAMA TECH D A T A P R O T E C T I O N P R O F E S S I O N A L S VISION & STRATEGY.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
IS3220 Information Technology Infrastructure Security
Security Outsourcing Melissa Karolewski. Overview Introduction Definitions Offshoring MSSP Outsourcing Advice Vendors MSSPs Benefits & Risks Security.
Syo-401 Question Answer. QUESTION 1 An achievement in providing worldwide Internet security was the signing of certificates associated with which of the.
1 1 Advanced Cyber Security Event - Introduction 11 th May 2016 Matt Locker.
Palindrome Technologies all rights reserved © 2016 – PG: Palindrome Technologies all rights reserved © 2016 – PG: 1 Peter Thermos President & CTO Tel:
Welcome Information Security Office Services Available to Counties Security Operations Center Questions.
PROTECTING YOUR DATA THREATS TO YOUR DATA SECURITY.
Securing Information Systems
OIT Security Operations
CompTIA Security+ Study Guide (SY0-401)
AT&T Premises-Based Firewall Enhanced SBS Solution
Capabilities Matrix Access and Authentication
Click to edit Master subtitle style
Securing Information Systems
CompTIA Security+ Study Guide (SY0-401)
Cyber Security in New Jersey State Government
ISMS Information Security Management System
Check Point Connectra NGX R60
Identity & Access Management
Implementing Client Security on Windows 2000 and Windows XP Level 150
Security week 1 Introductions Class website Syllabus review
In the attack index…what number is your Company?
INTERNET SECURITY.
Network Security in Academia: an Oxymoron?
Presentation transcript:

Know the Client Own the Problem Share the Solution The 2005 Case for Information Technology Security October 14, 2004

Know the Client Own the Problem Share the Solution From an executive perspective … What are the latest Information Security Issues?

Know the Client Own the Problem Share the Solution

Is there really an active threat to Michigan government? 30,000 virus attacks stopped daily 100,000 hacking attempts stopped monthly 800 worker hours of productivity lost due to attacks in an average month 600 DIT staff hours used to restore service due to attacks in an average month

Know the Client Own the Problem Share the Solution Homeland Security Grant Projects Critical IT Infrastructure Protection Program

Know the Client Own the Problem Share the Solution Program Overview Program encompasses 12 separate but related projects that focus on prevention, detection, and response to cyber threats and incidents against critical State of Michigan IT infrastructure All projects meet the goals and objectives required by Statewide Homeland Security Strategy Funded by grant dollars from Department of Homeland Security

Know the Client Own the Problem Share the Solution Critical Infrastructure IT Protection Projects What: Fixed Generators for State’s Data Centers What: Security events correlation collected by isolated systems (IDS, firewalls, SMTP anti-virus scanner, etc) What: Firewall technologies for the internal State network placed at each of the hosting centers to provide protection for internal zones What: Intrusion detection devices and systems for internal protected zones and the extranet made visible to the IDS systems What: Network portal system that provides encryption to user data without the need for client side applications. Commonly referred to as SSL VPN What: Permanent, dedicated and secure, remote-controlled network monitor/analyzer shared between the connections to the Public Internet and server farm infrastructure at the Tier III hosting centers

Know the Client Own the Problem Share the Solution Critical Infrastructure IT Protection Projects What: Decoy Server using honeypot technology provides early detection of internal, external, and unknown attacks What: Network penetration tests to identify vulnerabilities What: GIS information system for DIT Emergency Coordination Center What: Software to reduce spam entering the State’s systems What: Software preventing access to web sites that are deemed risks to the State's network and systems; spyware filter What: Implement documented formal methods for the application of forensic risk analysis and risk management of information systems

Know the Client Own the Problem Share the Solution

Michigan Cyber Security Success Stories NASCIO Award for The Secure Michigan Initiative (Enterprise Risk Assessment) NASCIO Award for Michigan Critical Incident Management System --- Cyber Terrorism Exercise in July 2004

Know the Client Own the Problem Share the Solution Contact Information: Dan Lohrmann Michigan CISO phone: (517)