2012 CWAG Annual Meeting State Agency Data Breaches Loss prevention, response and remediation strategies.

Slides:



Advertisements
Similar presentations
1© Copyright 2011 EMC Corporation. All rights reserved. The Future of the Advance Soc 3rd Annual Privacy, Access and Security Congress, Ottawa, 2012 Mike.
Advertisements

©2014 Bit9. All Rights Reserved The Evolution of Endpoint Security: Detecting and Responding to Malware Across the Kill Chain Mary Ann Fitzsimmons Regional.
Travelers CyberRisk for Insurance Companies
Cyber Liability- Risks, Exposures and Risk Transfer for a Data Breach June 11, 2013.
© 2013 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual.
Possible Threats To Data. Objectives To understand: Types of threats Importance of security Preventative and remedial actions Personal safety This will.
©2014 Bit9. All Rights Reserved Building a Continuous Response Architecture.
David Flournoy Bit9 Mid-Atlantic Regional Manager
Cyber Security Discussion Craig D’Abreo – VP Security Operations.
Enterprise security How to bring security transparency into your organization ISSA EDUCATIONAL SESSION Nicklaus Schleicher, VP Support & Customer Service.
Chapter 1 Introduction to Security
Cyber Security Finance Forum 2012 Michael DuBose Managing Director & Practice Leader Cyber Investigations.
1© Copyright 2012 EMC Corporation. All rights reserved. Getting Ahead of Advanced Threats Advanced Security Solutions for Trusted IT Chezki Gil – Territory.
What Keeps You Awake at Night Compliance Corporate Governance Critical Infrastructure Are there regulatory risks? Do employees respect and adhere to internal.
Homeland Security. Learning Topics Purpose Introduction History Homeland Security Act Homeland Defense Terrorism Advisory System Keeping yourself safe.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #6 Forensics Services September 10, 2007.
Dell Connected Security Solutions Simplify & unify.
Fraud and Prevention: Lessons from the Fire Service August 24,
Information Warfare Playgrounds to Battlegrounds.
Supervision of Information Security and Technology Risk Barbara Yelcich, Federal Reserve Bank of New York Presentation to the World Bank September 10,
State Data Center Oregon Consumer Identity Theft Protection Act Information Forum October 31, 2007.
Managing Data Against Insider Threats Dr. John D. Johnson, CISSP.
GSHRM Conference Cyber Security Education Shri Cockroft, CISO Piedmont Healthcare, Inc. September 21, 2015.
Where in the world is your data? Data Breach Analysis Angelbeat Seminar Billy Austin, President iScan Online, Inc.
Ali Alhamdan, PhD National Information Center Ministry of Interior
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Introduction.
Security Trends & Industry Insights
Scott Charney Cybercrime and Risk Management PwC.
HO © 2012 Fluor. All rights reserved. Quick Wins in Vulnerability Management Classification: Confidential Owner: Michael Holcomb Approver: Phil.
Tamra Pawloski Jeff Miller. The views, information, and content expressed herein are those of the authors and do not necessarily represent the views of.
Information Warfare Playgrounds to Battlegrounds.
New A.M. Best Cyber Questionnaire
BUFFERZONE Advanced Endpoint Security Data Connectors-Charlotte January 2016 Company Confidential.
ASHRAY PATEL Securing Public Web Servers. Roadmap Web server security problems Steps to secure public web servers Securing web servers and contents Implementing.
©2012 Bit9. All Rights Reserved Peter Llorens, PERegional Sales Manager, FL, Caribbean & Latin America Julio GutierrezSales Engineer, FL, Caribbean & Latin.
Why SIEM – Why Security Intelligence??
© 2015 IBM Corporation IBM Security 1 © 2015 IBM Corporation Protecting against cyber threats and security breaches IBM APT Survival Kit Overview Client.
Neil Thacker, Information Security & Strategy Officer, EMEA EU DATA PROTECTION -
Welcome Information Security Office Services Available to Counties Security Operations Center Questions.
TOTAL POLICING LDSC: Protecting London’s Business Community. Presentation to.
Information Technology Network and Security. Networking In the world of computers, networking is the practice of linking two or more computing devices.
Data Breach ALICAP, the District Insurance Provider, is Now Offering Data Breach Coverage as Part of Our Blanket Coverage Package 1.
Defining your requirements for a successful security (and compliance
Proactive Incident Response
Advanced Endpoint Security Data Connectors-Charlotte January 2016
Penetration Testing in Financial Institutions
Cyber Security Zafar Sadik
New A.M. Best Cyber Questionnaire
Healthcare Cybersecurity: State of Industry
Critical Security Controls
DART Technology Nicole Fontayne-Bardowell, MPA Vice President & CIO
Responding to Intrusions
Introduction to a Security Intelligence Maturity Model
Active Cyber Security, OnDemand
Reducing Cost and Risk During an Investigation
Data Compromises: A Tax Practitioners “Nightmare”
San Francisco IIA Fall Seminar
Unfortunately, any small business could face the risk of a data breach or cyber attack. Regardless of how big or small your business is, if your data,
I have many checklists: how do I get started with cyber security?
CYBER CRIME Matthew Purchase.
Securing Your Digital Transformation
cyberopsalliance.com |
Cyber Defense Matrix Cyber Defense Matrix
Cybersecurity Threat Assessment
Information Protection
Information Protection
Anatomy of a Common Cyber Attack
Protecting Knowledge Assets – Case & Method for New CISO Portfolio
Presentation transcript:

2012 CWAG Annual Meeting State Agency Data Breaches Loss prevention, response and remediation strategies

Employees Job Seekers Mortgagees Identity Exploitations: 12+ years of our cases Insured The Scams Persist and This is Now an Industry

+ Prevention + Detection + Analysis & Response

Prevention

Data Loss Prevention: Comprehensive Approach People, Processes and Systems to Identify, Monitor and Protect Data... + In Use (endpoints, devices) + In Motion (network) + At Rest (storage)

Data Loss Prevention: Conduct Gap Analysis + Your Current Security System Versus What You Need to Have in Place + What Other Service Providers or Counter-Party are Points of Vulnerability? + What Other Data Do You Hold That Could Become Valuable? + What Processes (Internal and/or External) Can be Tightened Up?

Detection

Analysis Data Theft Is Preceded by Smaller Intrusions...Catch Me if You Can + We Can Home In On Who Is Attacking + We Can Identify How Much Data Went Out + What Data Went Out, Where It Went + Stop the Bleeding

State Agency Supplier

Analytics: Real-time..or post-mortem

Analysis An Incident Response Function and Plan Must be In Place + Discover Attack and Exfiltration + Identify Data Which Has Gone Out and Where It Went + Contain Damage + Eradicate Perpetrator’s Presence + Recover System and Data Protection in Secure Manner + Conduct in Forensically Sound Manner + Identify What Led to Intrusion to Prevent

Monitoring, Detection and Remediation Providers:

Self-help resource Security Controls For Effective Cyber Defense - The SANS Institute + Consortium-led Approach to Determining Best Practices and Most Cost Effective Security Across Government Bodies

Wireless Access Code: