IT Security Breaches: The Costs and the Cures Todd Thibodeaux President and CEO CompTIA.

Slides:



Advertisements
Similar presentations
Symantec 2004 Pulse of IT Security in Canada Volume II Survey shows Increases in Concern and Spending for IT Security Andrew Bisson Director, Planning.
Advertisements

Slide Heading Data Security Risk Assessment David Fanson, CISA, MBA Practice Director, Technology Risk Titus December 12, 2012.
Reliability of the electrical service Business Continuity Management Business Impact Analysis (BIA) Critical ITC Services Minimum Business Continuity Objective.
Lynn Ray ISO Towson University Strategic Planning for IT Security Copyright Lynn Ray, This work is the intellectual property rights of the author.
Week 12 – Monday.  What did we talk about last time?  Security policies  Physical security  Lock picking.
Information & Communication Technologies NMSU All About Discovery! Risk-Based Information Security Program at NMSU presented by Norma Grijalva.
CST 481/598 Many thanks to Jeni Li.  Potential negative impact to an asset  Probability of a loss  A function of three variables  The probability.
(ISC) Global Information Security Workforce Study (GISWS) Results U.S. Federal Government.
Lecture 3 Strategic Planning for IT Projects (Chapter 7)
Security Awareness Challenges of Security No single simple solution to protecting computers and securing information Different types of attacks Difficulties.
Enterprise Security. Mark Bruhn, Assoc. VP, Indiana University Jack Suess, VP of IT, UMBC.
CISCO CONFIDENTIAL – DO NOT DUPLICATE OR COPY Protecting the Business Network and Resources with CiscoWorks VMS Security Management Software Girish Patel,
MBA/MIS Class #3 September 2, 2008 IT Business Value Financial Justification 1.
CERN IT Department CH-1211 Genève 23 Switzerland t ITIL and Business Continuity (Service Perspective) Hepix 2012 Conference Prague,
2010 SIM IT Trends Survey Jerry Luftman Executive Director and Distinguished Professor Stevens Institute of Technology.
Facilitated IT Risk Assessment Program Protecting Your Business Information Security Awareness | security.uwm.edu.
InformationWeek 2014 Strategic Security Survey Research Findings © 2014 Property of UBM Tech; All Rights Reserved.
PJM©2014www.pjm.com An ISO/RTO Cyber Security Framework Terry Boston President and CEO PJM Interconnection SINET Security Innovation Summit July 17, 2014.
Topic: Information Security Risk Management Framework: China Aerospace Systems Engineering Corporation (Case Study) Supervisor: Dr. Raymond Choo Student:
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Study Results Advanced Persistent Threat Awareness.
11 Canal Center Plaza, Alexandria, VA T F Enterprise Computing Conference (ECC) Workshop Alma R. Cole,
© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Cyber Security: Now and.
Presented to President’s Cabinet. INTERNAL CONTROLS are the integration of the activities, plans, attitudes, policies and efforts of the people of an.
Risk Management in the Built Environment Management of Risk in Construction By Professor Simon Burtonshaw-Gunn – licensed under the Creative Commons Attribution.
Security Awareness Challenges of Securing Information No single simple solution to protecting computers and securing information Different types of attacks.
Business Continuity and Disaster Recovery Chapter 8 Part 1 Pages 897 to 914.
SAFE KNOWLEDGEwww.zondex.com INFORMATION MANAGEMENT Chris Joscelyne AUSTRALIAN PROJECTS PTY LIMITED IT Security and Data Protection.
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
Peter B. Bloland, DVM, MPVM Director Division of Public Health Systems and Workforce Development Global Health Leadership Forum November 10, 2011 National.
TOP 10 TECHNOLOGY INITIATIVES © Robert G. Parker S-1 Issues Loss or theft of mobile devices Lack of MDM (mobile device management) software Cloud.
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
Desktop Security: Making Sure Your Office Environment is Secure.
Placing Information Security within an Organization
Visual 1. 1 Lesson 1 Overview and and Risk Management Terminology.
Engineering and Management of Secure Computer Networks School of Engineering © Steve Woodhead 2009 Corporate Governance and Information Security (InfoSec)
Computer Security By Duncan Hall.
15 years of Web Security © 2015 WhiteHat Security, Inc. Jeremiah Grossman Founder WhiteHat Security, Inc. The Rebellious Teenage Years.
Cybersecurity for the modern Commercial Brokerage Presented by Brian W. Palm.
Cyber Security in the Mobile Era KEEPING ENTERPRISE DATA SAFE IN THE BYOD ERA.
Your Cyber Security: The scope of your risk is broad and growing To understand the nature of the risk landscape look at the presentations here today-begin.
ISACA Many thanks to the ISACA Belgium Chapter, who created the original slide deck.
HSCIC Cyber Security Presented by: Richard Ives - Stakeholder Engagement Manager IGA Conference - 16 Mar 2016.
Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall Ch 1 -1 Chapter 1 The Nature of Strategic Management Strategic Management: Concepts.
YJT1 - Application of Effective Comm (UG 0914) Task 2: Presentation Kody M. Hackbusch.
Welcome to the ICT Department Unit 3_5 Security Policies.
Overview We are living in a technological world and rapidly advancement in all the different fields of science. With the development in the technology.
Enterprise Managed Services: Key Issues Facing Today’s CIO
What, when and how – are you prepared?
Information Security Program
Cybersecurity - What’s Next? June 2017
Information Technology 2016 Budget Presentation
Change.
Data protection headaches: GDPR, brexit AND perimeter risk
Compliance with hardening standards
A Thread Relevant to all Levels of the EA Cube
ESSENTIALS OF A PHYSICAL SECURITY SYSTEMS RISK ASSESSMENT
CSI Survey 2007 Tiffany Gorman
Myths About Web Application Security That You Need To Ignore.
Making Information Security Manageable with GRC
Making Information Security Actionable with GRC
COVER.
Managing the Security Function
Managing Human Resources Today
Windows 10 Enterprise subscriptions in CSP – Messaging Summary
COVER.
Guidelines for building security policies. Building a successful set of security policies will ensure that your business stands the best possible chance.
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fuel Cell Market size worth $25.5bn by 2024 Low Power Wide Area Network.
CyberSecurity Strategy For Defendable ROI
Presentation transcript:

IT Security Breaches: The Costs and the Cures Todd Thibodeaux President and CEO CompTIA

Who We Are | What We Do E DUCATION C ERTIFICATIONS A DVOCACY P HILANTHROPY

The Usual Opening… Scary Security Headline: Oh the Humanity

Wait, How About… Technology, Training, Teamwork Thwart Security Breach

Setting the Stage: The Good and the Not so Good More organizations rate security a high priority; although still often viewed as an IT problem # of security breaches roughly constant; severity level trending upwards + new threats and vulnerabilities IT professionals rate human error a primary cause of many security breaches Improvements to security landscape attributed to better technology, policy and training Spending on security held up relatively well in 2010

Forecast Prioritization of security relative to all strategic IT initiatives Prioritization of InfoSec Trends Upwards

Changes to the Security Landscape Increasing ConcernsIncreasing Areas of Improvement Rise of social networking52% Improved technology to protect against threats 55% More reliance on Internet-based applications 50%Improved IT staff expertise41% Growing criminalization and organization of hackers 48%Improved security policies36% Greater interconnectivity of devices46% Improved ability of end-users to avoid security threats 33% Sophistication of security threats exceeding staff’s expertise 42% Improved ability to enforce security policies 24% More access points42% More exec. mgt. support of security 16%

Many Variables to Consider More Critical No Change Less Critical

Economic Recession Affects Security Likelihood of new internal security threat due to departing or disgruntled employees

Elements of Human Error that Contribute to Security Breaches

Actions Taken After Security Breaches

Top Areas where Organizations want to Improve their Response to Security Breaches

Security Investments that Yield Highest ROI

Security Spend Wish List

Wrap-up | Q&A