JAMIE S. HERMAN, C|CISO, CISM, CISSP MANAGER OF INFORMATION SECURITY ROPES & GRAY LLP
50% - attacks on companies with fewer than 2500 employees 1719 – Average number of attacks per 1000 users 80 – FBI estimates more than 80 major US law firms were compromised in 2011 Exponential growth – 6x more malicious links (2012)
Software that interferes with normal operation of your computer Generally executes without your knowledge or consent Can damage or disable your computer, or steal firm information Includes viruses, trojans, works, and spyware
Phishing campaign Social Engineering Unencrypted Media Elevated privileges Malicious websites
Perception…
Critical aspect of Information Security Client/Matter intake How can you protect what you don’t know? Many flavors (government, industry, business model) Role Based Access Control (RBAC) Need to know Data Vaults
Visibility Data Leak Prevention (DLP) Reporting Client protection and retention Compliance and competitive advantage
Hot Topics Secure file sharing encryption Removable Media Encryption Social media/personal access Mobile devices (BYOD)
Remember Security is Everyone's responsibility! Sec-U-R-IT-y………You Are It!