Oklahoma Chapter Information Systems Security Association Oklahoma Chapter, Tulsa Oklahoma City Chapter, OKC Student Chapter, Okmulgee Oklahoma Chapter,

Slides:



Advertisements
Similar presentations
ETHICAL HACKING A LICENCE TO HACK
Advertisements

Travelers CyberRisk for Insurance Companies
1© Copyright 2011 EMC Corporation. All rights reserved. Anatomy of an Attack.
Target Data Breach – Cost of the Learning Curve Discuss the recent Target data breach and its impact on the industry as well as individuals January 29/30,
David A. Brown Chief Information Security Officer State of Ohio
CERT ® System and Network Security Practices Presented by Julia H. Allen at the NCISSE 2001: 5th National Colloquium for Information Systems Security Education,
Formulating a Security Policy for the Modern IT Landscape.
Controls for Information Security
| University of Missouri Copyright ©2007 MOREnet and The Curators of the University of Missouri Statenet Security on the cheap and easy Beth.
The Difficult Road To Cybersecurity Steve Katz, CISSP Security Risk Solutions Steve Katz, CISSP Security.
Company LOGO Copyright Carrie Kerskie Data Breach & Identity Theft By Carrie Kerskie Kerskie Group, Inc.
1 Title ECI: Anatomy of a Cyber Investigation Who Are the Actors.
SEC835 Database and Web application security Information Security Architecture.
Did You Hear That Alarm? The impacts of hitting the information security snooze button.
Staying Ahead of the Curve in Cyber Security Bill Chang CEO, SingTel Group Enterprise.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #6 Forensics Services September 10, 2007.
Thomas Levy. Agenda 1.Aims: Reducing Cyber Risk 2.Information Risk Management 3.Secure Configuration 4.Network Security 5.Managing User Access 6.Education.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Can your team outwit, outplay and outlast your opponents to be the ultimate CyberSurvivor?
2 ictQATAR “ Information and Communication Technology (ICT) improves how we live and work in countless ways.”  The Ministry of Information Communication.
GSHRM Conference Cyber Security Education Shri Cockroft, CISO Piedmont Healthcare, Inc. September 21, 2015.
Where in the world is your data? Data Breach Analysis Angelbeat Seminar Billy Austin, President iScan Online, Inc.
1 Commonwealth Security Information Resource Center Michael Watson Security Incident Management Director 10/17/2008
Knowing What You Missed Forensic Techniques for Investigating Network Traffic.
IT Security – Scanning / Vulnerability Assessment David Geick State of Connecticut IT Security.
Ali Alhamdan, PhD National Information Center Ministry of Interior
InfraGard A Government and Private Sector Alliance Information sharing begins with human relationships – people talking with people whom they trust. Information.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Eleventh National HIPAA Summit 5.04 Security Incident Response – What to do if a breach occurs and how to mitigate damages Chris Apgar, CISSP.
Insurance of the risk Policy covers & underwriting issues Stephen Ridley, Senior Development Underwriter.
HP World September 2002 Scott S. Blake, CISSP Vice President, Information Security BindView Corporation Vulnerability Assessment and Action.
AUB Department of Electrical and Computer Engineering Imad H. Elhajj American University of Beirut Electrical and Computer Engineering
Security Trends & Industry Insights
HO © 2012 Fluor. All rights reserved. Quick Wins in Vulnerability Management Classification: Confidential Owner: Michael Holcomb Approver: Phil.
Frontline Enterprise Security
Tamra Pawloski Jeff Miller. The views, information, and content expressed herein are those of the authors and do not necessarily represent the views of.
Internal Audit Considerations for Cybersecurity Risks Posed by Vendors October th, 2015 Chicago IIA Chapter’s 2 nd Annual IIA Chicago IT Hacking.
What is “national security”?  No longer defined only by threat of arms  It really is the economy  Infrastructure not controlled by the government.
NTT Com Security - Welcome to the “Attack Detection & Incident Response” Security Brunch Tom Hager Country Manager.
FBI Phoenix Computer Crime Squad SA Tom Liffiton 10/23/2003 Maricopa Association of Governments Telecommunications Advisory Group.
1 AFCOM Data Center World March 15, 2016 Moderator: Donna Jacobs, MBA Panel: Greg Hartley Bill Kiss Adam Ringle, MBA ITM 9.2 The New Security Challenge:
WHEN, NOT IF THE CYBER SECURITY CHALLENGES AMONG LOCAL GOVERNMENT UMBC Public Policy Forum Baltimore Maryland April 15, 2016 Gayle B. Guilford CISO Baltimore.
©2012 Bit9. All Rights Reserved Peter Llorens, PERegional Sales Manager, FL, Caribbean & Latin America Julio GutierrezSales Engineer, FL, Caribbean & Latin.
Palindrome Technologies all rights reserved © 2016 – PG: Palindrome Technologies all rights reserved © 2016 – PG: 1 Peter Thermos President & CTO Tel:
Welcome Information Security Office Services Available to Counties Security Operations Center Questions.
Best Cyber Security Practices for Counties An introduction to cybersecurity framework.
Information Security in Laurier Grant Li Wilfrid Laurier University.
Computer Security and the “H” word Glen Klinkhart, CEO Mike Messick, CTO.
S ECURE E-S YSTEMS AS A COMPETITIVE ADVANTAGE IN A GLOBAL MARKETS By Cade Zvavanjanja Cybersecurity Strategist By Cade Zvavanjanja Cybersecurity Strategist.
Defining your requirements for a successful security (and compliance
Proactive Incident Response
Managing Compliance for All Departments
Cybersecurity - What’s Next? June 2017
Healthcare Cybersecurity: State of Industry
Security Standard: “reasonable security”
THR2099 What to do BEFORE all hell breaks loose: Building a modern cybersecurity strategy.
Cyber Security: State of the Nation
Security Risk Profiles – Tips and Tricks
Joe, Larry, Josh, Susan, Mary, & Ken
Forensics Week 11.
Unit 7 – Organisational Systems Security
Unfortunately, any small business could face the risk of a data breach or cyber attack. Regardless of how big or small your business is, if your data,
Cyber Defense Matrix Cyber Defense Matrix
National Cyber Security
Securing the Threats of Tomorrow, Today.
CRITICAL INFRASTRUCTURE CYBERSECURITY
Risk Mitigation & Incident Response Week 12
Information Security: Assume you’ve been breached
AIR-T11 What We’ve Learned Building a Cyber Security Operation Center: du Case Study Tamer El Refaey Senior Director, Security Monitoring and Operations.
Presentation transcript:

Oklahoma Chapter Information Systems Security Association Oklahoma Chapter, Tulsa Oklahoma City Chapter, OKC Student Chapter, Okmulgee Oklahoma Chapter, Tulsa Oklahoma City Chapter, OKC Student Chapter, Okmulgee

Oklahoma Chapter What is ISSA ? A not-for-profit international organization of information security professionals Local chapter for Tulsa’s cyber security and data protection professionals and students Educational forums, publications, peer interaction opportunities Free exchange of information security techniques, approaches and problem solving Education outreach to local security programs Frequent newsletters and podcasts A not-for-profit international organization of information security professionals Local chapter for Tulsa’s cyber security and data protection professionals and students Educational forums, publications, peer interaction opportunities Free exchange of information security techniques, approaches and problem solving Education outreach to local security programs Frequent newsletters and podcasts 2

Oklahoma Chapter ISSA Oklahoma Chapter in Tulsa Local Tulsa meetings: –Monthly meetings to network and exchange ideas held second Monday of each month –We support local tech events like TechFest and TechJunction –Participation in and sponsorship of regional security events:  Information Warfare Summit, October in OKC  BSidesOK, coming to Tulsa in April! Visit for more details Local Tulsa meetings: –Monthly meetings to network and exchange ideas held second Monday of each month –We support local tech events like TechFest and TechJunction –Participation in and sponsorship of regional security events:  Information Warfare Summit, October in OKC  BSidesOK, coming to Tulsa in April! Visit for more details 3

Oklahoma Chapter See Clearly Through the Fog of War How to better prepare for a cyber attack, respond effectively, and recovery completely. Michael Haney President, ISSA Oklahoma How to better prepare for a cyber attack, respond effectively, and recovery completely. Michael Haney President, ISSA Oklahoma

Oklahoma Chapter Michael Haney  Over 15 years as an infosec professional  11 years as information security consultant:  1 year as Walmart Stores Digital Forensics Lab QM  SANS Institute Mentor  CISSP, GSEC, GCIA, GCIH, GCFA, and former PCI QSA  Currently full-time Ph.D. student at TU:  Over 15 years as an infosec professional  11 years as information security consultant:  1 year as Walmart Stores Digital Forensics Lab QM  SANS Institute Mentor  CISSP, GSEC, GCIA, GCIH, GCFA, and former PCI QSA  Currently full-time Ph.D. student at TU:

BE PREPARED 6

Oklahoma Chapter Be Prepared Quality Information Security Policies –Disaster Recovery Plan –Incident Response Plan –Communications Plan(s) Awareness, Training, and Education –Appropriate for the Appropriate Level –Everyone should know the policy Outside Assistance: –Know who to call –Know when to call Exercises –Table Top Exercises –Fire Drills –Lessons Learned Quality Information Security Policies –Disaster Recovery Plan –Incident Response Plan –Communications Plan(s) Awareness, Training, and Education –Appropriate for the Appropriate Level –Everyone should know the policy Outside Assistance: –Know who to call –Know when to call Exercises –Table Top Exercises –Fire Drills –Lessons Learned

BE PREPARED 8

VULNERABILITY INTELLIGENCE 9

Oklahoma Chapter Vulnerability Intelligence Inventory Management Configuration Management Patch Management Log Management Secure Code Reviews Vulnerability Scanning and Remediation Lifecycle Penetration Testing –Trusted Security Vendor –White Box and Black Box Testing Inventory Management Configuration Management Patch Management Log Management Secure Code Reviews Vulnerability Scanning and Remediation Lifecycle Penetration Testing –Trusted Security Vendor –White Box and Black Box Testing

11 VULNERABILITY INTELLIGENCE

THREAT INTELLIGENCE 12

Oklahoma Chapter Threat Intelligence Malware Outbreaks (Rogue Actors and Criminals) Targeted Attacks (Enemy Nations and Terrorists) Insider Threats, Negligent Users, Social Engineers Know the Stages of Attack and Compromise Well-tuned Intrusion Detection Systems HONEYPOTS! Time to Go Hunting –Know the threats –Know your vulnerabilities –Don’t Wait for Alerts Malware Outbreaks (Rogue Actors and Criminals) Targeted Attacks (Enemy Nations and Terrorists) Insider Threats, Negligent Users, Social Engineers Know the Stages of Attack and Compromise Well-tuned Intrusion Detection Systems HONEYPOTS! Time to Go Hunting –Know the threats –Know your vulnerabilities –Don’t Wait for Alerts

14 THREAT INTELLIGENCE

COLLECTIVE INTELLIGENCE 15

Oklahoma Chapter Collective Intelligence Publicly Available Information Sources: –Internet Storm Center: isc.sans.edu –SANS NewsBytes –The Hacker News, Krebs On Security –Lots of good blogs out there (and some bad ones, too) Vendors: –Verizon Data Breach Investigations Report –Mandiant APT1 and IOC –Symantec Deep Insight Organizations: –FS-ISAC, ES-ISAC, MS-ISAC, REN-ISAC, etc. –CERT/CC, US-CERT, ICS-CERT –ISSA, InfraGard PEERS! READ, LEARN, and SHARE! Publicly Available Information Sources: –Internet Storm Center: isc.sans.edu –SANS NewsBytes –The Hacker News, Krebs On Security –Lots of good blogs out there (and some bad ones, too) Vendors: –Verizon Data Breach Investigations Report –Mandiant APT1 and IOC –Symantec Deep Insight Organizations: –FS-ISAC, ES-ISAC, MS-ISAC, REN-ISAC, etc. –CERT/CC, US-CERT, ICS-CERT –ISSA, InfraGard PEERS! READ, LEARN, and SHARE!

17 COLLECTIVE INTELLIGENCE

18 PRIVACY

Oklahoma Chapter Privacy Know the Law Know the Policies and Culture Share information, but do so securely Be cautious of increasing liability and risk Do the Right Thing Know the Law Know the Policies and Culture Share information, but do so securely Be cautious of increasing liability and risk Do the Right Thing

20 PRIVACY

21 COLLECTIVE INTELLIGENCE

22 THREAT INTELLIGENCE

23 VULNERABILITY INTELLIGENCE

BE PREPARED 24

Oklahoma Chapter Thanks and Good Luck!