Insider Threat Toronto 22 February 2006. w w w. e l y t r a. c o m Problem Statement  Insider Person that works inside an organization –Employees –Permanent.

Slides:



Advertisements
Similar presentations
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Advertisements

Security Vulnerabilities and Conflicts of Interest in the Provider-Clearinghouse*-Payer Model Andy Podgurski and Bret Kiraly EECS Department & Sharona.
Department of Revenue Lessons for Management by Department of Revenue Internal Audit.
Security and Personnel
Certification Authority. Overview  Identifying CA Hierarchy Design Requirements  Common CA Hierarchy Designs  Documenting Legal Requirements  Analyzing.
Is There a Security Problem in Computing? Network Security / G. Steffen1.
Guide to Massachusetts Data Privacy Laws & Steps you can take towards Compliance.
PHYSICAL SECURITY Attacker. Physical Security Not all attacks on your organization's data come across the network. Many companies focus on an “iron-clad”
Security Controls – What Works
Using Cryptographic ICs For Security and Product Management Misconceptions about security Network and system security Key Management The Business of Security.
Forensic and Investigative Accounting
Developing Network Security Strategies Network Security D ESIGN Network Security M ECHANISMS.
August 9, 2005UCCSC Converting Policy to Reality Building Campus Security Programs Karl Heins -- Director of IT Audit Services Office of the University.
Dr. Sarbari Gupta Electrosoft Services Tel: (703) Security Characteristics of Cryptographic.
IT Security Requirements
IS 380 OME 1 Fall 2010 Class 1. Administrative Roster Syllabus Review Class overview 10 domains overview.
Brian Bradley.  Data is any type of stored digital information.  Security is about the protection of assets.  Prevention: measures taken to protect.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Telenet for Business Mobile & Security? Brice Mees Security Services Operations Manager.
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
Proving Your Case - Computer Security Terrence P. Maher Abrahams Kaslow & Cassman
Protecting Mainframe and Distributed Corporate Data from FTP Attacks: Introducing FTP/Security Suite Alessandro Braccia, DBA Sistemi.
Confidentiality Integrity Accountability Communications Data Hardware Software Next.
Security Policies Paul Hogan Ward Solutions. Agenda 09:30 10:10 Security Policies 10:10 10:30 Veritas 10:30 10:45Break 10:45 11:55 Securing your Server.
© 2001 Carnegie Mellon University S8A-1 OCTAVE SM Process 8 Develop Protection Strategy Workshop A: Protection Strategy Development Software Engineering.
Slide 1 Using Models Introduced in ISA-d Standard: Security of Industrial Automation and Control Systems (IACS) Rahul Bhojani ISA SP99 WG4 Meeting.
Thomas Levy. Agenda 1.Aims: Reducing Cyber Risk 2.Information Risk Management 3.Secure Configuration 4.Network Security 5.Managing User Access 6.Education.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Security Architecture
Effective Restrictions on Internet Usage What is our responsibility? & What can I do?
Chapter 6 of the Executive Guide manual Technology.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
Information Systems Security Operations Security Domain #9.
OCTAVE-S on TradeSolution Inc.. Introduction Phase 1: Critical Assets and threats Phase 2: Critical IT Components Phase 3: Changes Required in current.
Information Systems Ethics (Cyberethics) Dr. Robert Chi Department of Information Systems California State University, Long Beach.
Network Security. Need for security  Connecting to the Internet is quickly becoming a necessity for companies/ individuals  Understand the security.
IS Network and Telecommunications Risks Chapter Six.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Information Security What is Information Security?
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 1 Security Architecture.
1 Policy Types l Program l Issue Specific l System l Overall l Most Generic User Policies should be publicized l Internal Operations Policies should be.
Scott Charney Cybercrime and Risk Management PwC.
Security and Assurance in IT organization Name: Mai Hoang Nguyen Class: INFO 609 Professor: T. Rohm.
Defense in Depth. 1.A well-structured defense architecture treats security of the network like an onion. When you peel away the outermost layer, many.
International Security Management Standards. BS ISO/IEC 17799:2005 BS ISO/IEC 27001:2005 First edition – ISO/IEC 17799:2000 Second edition ISO/IEC 17799:2005.
Module 12: Responding to Security Incidents. Overview Introduction to Auditing and Incident Response Designing an Audit Policy Designing an Incident Response.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 1 Security Architecture.
Chapter 7 1Artificial Intelligent. OBJECTIVES Explain why information systems need special protection from destruction, error, and abuse Assess the business.
Describe the potential of IT to improve internal and external communications By Jim Green.
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
Chapter 3 Pre-Incident Preparation Spring Incident Response & Computer Forensics.
Quickly Establishing A Workable IT Security Program EDUCAUSE Mid-Atlantic Regional Conference January 10-12, 2006 Copyright Robert E. Neale This.
Your Cyber Security: The scope of your risk is broad and growing To understand the nature of the risk landscape look at the presentations here today-begin.
Dr. Mark Gaynor, Dr. Feliciano Yu, Bryan Duepner.
By: Matt Winkeler.  PCI – Payment Card Industry  DSS – Data Security Standard  PAN – Primary Account Number.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Information Technology Acceptable Use An Overview CSTMC All Staff Meeting February 10, 2014.
Welcome Information Security Office Services Available to Counties Security Operations Center Questions.
1© Copyright 2012 EMC Corporation. All rights reserved. Next Generation Authentication Bring Your Own security impact Tim Dumas – Technology Consultant.
Chapter 13 Network Security Auditing Antivirus Firewalls Authentication Authorization Encryption.
Design for Security Pepper.
CMIT100 Chapter 15 - Information.
Capabilities Matrix Access and Authentication
Hot Topics:Mobility in the Cloud
Lesson Objectives Aims You should be able to:
Cloud Computing Security: Mapping Concepts to Practical Techniques
IS4680 Security Auditing for Compliance
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Presentation transcript:

Insider Threat Toronto 22 February 2006

w w w. e l y t r a. c o m Problem Statement  Insider Person that works inside an organization –Employees –Permanent –Temporary –Co-op –Contractors –Partners –Support Personnel

w w w. e l y t r a. c o m Problem Statement  The Threat There is a lot of evil PEOPLE out there and they all want to get us If they are out there we are OK Inside, Security for Real Dummies by Dilbert

w w w. e l y t r a. c o m The Reasonable Threat:People  Glory Seeker  Vendetta: Disgruntled Employees and Others  The Curious and the Incompetent  The Greedy  Management

w w w. e l y t r a. c o m The Carl Bond School of Management

w w w. e l y t r a. c o m Threat  Threats are meaningless until they are qualified as risks We know what the story is, why do we care? –Money –Time –Bandwidth –Image

w w w. e l y t r a. c o m Back to the Problem and the Solutions  Know the What and Why Know your assets –Network structure, its components –The geography of your organization –The nature of the Data and its value –Know the operational and processing needs –Know the your legal requirements (PIPEDA, SOX,….)

w w w. e l y t r a. c o m You Will Need to Succeed  Know your Governance structure and GET MANAGEMENT BUY-IN WHY –You will need their Money –You will need their Support and, –Most of all you will need somebody to wear the unpopular decisions

w w w. e l y t r a. c o m Now you are Ready for Action  Establish a Usage Policy and publish it  Start working on the basics while you attack your high risk areas Use your account management and networking tool to organize data access Insure logging and proper log review Introduce proper entry and departing processes for employees Insure that standard security measure are in place

w w w. e l y t r a. c o m Get more technical  Introduce data protection for traveling staff Encryption OTP token  Introduce end point controls (USB,FW, drives…)  If you have the money, deploy tracking and profiling tools

w w w. e l y t r a. c o m Be in the loop  Don’t let your MANAGEMENT leave you behind  Track the tricks of the trade

Elytra – Who Are We?

w w w. e l y t r a. c o m Access Authentication Removable Storage Devices Software EncryptionHard Drive Encryption Device Control & Auditing Change Auditing Intrusion Prevention Vulnerability Management Elytra Professional Services Law, Investigation & Ethics Network Security Cryptography Business Continuity Application Systems Development Access Control Operations Security Architecture Security Management Practices

w w w. e l y t r a. c o m Take the 1 st Step!!  Download the Safend Auditor at: Auditor performs a client-less scan of your selected domain and generates a report indicating what is connected today to the scanned PC(s) – or has been in the past! »Its Free!

Thanks You for Attending! Carl Bond Paul Vaillant