Playing Safely in the Cloud Marie Greenberg, CISSP, IAM, IEM Information Security Manager Virginia State Corporation Commission.

Slides:



Advertisements
Similar presentations
Hands-on SQL Injection Attack and Defense HI-TEC July 21, 2013.
Advertisements

Don’t get Stung (An introduction to the OWASP Top Ten Project) Barry Dorrans Microsoft Information Security Tools NEW AND IMPROVED!
Springfield Technical Community College Security Awareness Training.
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
Christian Vargas. Also known as Data Privacy or Data Protection Is the relationship between collection and spreading or exposing data and information.
Security Controls – What Works
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 18, 20 & 25 March 2015.
CHAPTER 3 Ethics and Privacy. Outline for Today Chapter 3: Ethics and Privacy Tech Guide: Protecting Information Assets REMINDER: Project 1 due tonight.
It’s always better live. MSDN Events Security Best Practices Part 2 of 2 Reducing Vulnerabilities using Visual Studio 2008.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
It’s always better live. MSDN Events Securing Web Applications Part 1 of 2 Understanding Threats and Attacks.
Advanced Security Center Overview Northern Illinois University.
Information Networking Security and Assurance Lab National Chung Cheng University 1 Top Vulnerabilities in Web Applications (I) Unvalidated Input:  Information.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
PASSWORD MANAGER Why you need one 1. WHAT IS A PASSWORD MANAGER? A modern Password Manager is a browser extension (Chrome, Internet Explorer, Firefox,
Software Security Course Course Outline Course Overview Introduction to Software Security Common Attacks and Vulnerabilities Overview of Security.
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
Norman SecureTide Powerful cloud solution to stop spam and threats before it reaches your network.
Security Liaisons Information Presentation. Introduction  What’s the big deal with computer security? Don’t we have an IT security department to take.
Norman SecureSurf Protect your users when surfing the Internet.
OWASP Mobile Top 10 Why They Matter and What We Can Do
Information Security Information Technology and Computing Services Information Technology and Computing Services
Trust Guard PCI Certification Service Technical White Paper Trust Guard provides PCI DSS Compliant Scans that exceed PCI requirements. What’s more, your.
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
SEC835 Database and Web application security Information Security Architecture.
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
Marketing of Information Security Products. The business case for Information Security Management.
HTTP and Server Security James Walden Northern Kentucky University.
Juha Siivikko SECURITY IN SOCIAL MEDIA.
Security Awareness ITS SECURITY TRAINING. Why am I here ? Isn’t security an IT problem ?  Technology can address only a small fraction of security risks.
1 General Awareness Training Security Awareness Module 1 Overview and Requirements.
How can you protect yourself from online identity theft?
IT security By Tilly Gerlack.
Copyright 2007 © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
DIGITAL SECURITY PART 2 TOOLS. phising  Internet criminals can steal your personal and banking information without you ever noticing – they can do it.
The Significance and Evolution of End User Privacy Julie Earp College of Management North Carolina State University WISE 2010 Sponsored by TRUST June 21-24,
CHAPTER 3 Ethics and Privacy. Outline for Today Chapter 3: Ethics and Privacy Tech Guide: Protecting Information Assets.
Data Security: Steps to Improved Information Security September 22, 2015 Presented by: Alex Henderson General Counsel and Chief Administrative Officer.
Do you believe in this? Due to its very nature, the Internet is NOT a safe or secure environment. It is an ever-changing medium where anyone and everyone.
Building Secure Web Applications With ASP.Net MVC.
Playing Safely in the Cloud Marie Greenberg, CISSP, IAM, IEM Information Security Manager Virginia State Corporation Commission.
Frontline Enterprise Security
Social Networking. Freewrite #1 What is Social Networking?
Data Security & Privacy: Fundamental Risk Mitigation Tactics 360° of IT Compliance Anthony Perkins, Shareholder Business Law Practice Group Data Security.
ONLINE SAFETY AND SECURITY Computer Basics 1.5. INFAMOUS CYBER ATTACKS IN 2014 Sony Pictures: Attackers stole just about everything in the corporate network,
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Computers Are Your Future Eleventh Edition Chapter 6: The Internet and the World Wide Web Copyright © 2011 Pearson Education, Inc. Publishing as Prentice.
Social Media: The Do’s and Don’ts for Administrators Presented on August 5, 2014 By Laura L. Holmes of.
Technological Awareness for Teens and Young Adults.
Computer Security Keeping you and your computer safe in the digital world.
LESSON 12 Business Internet. Electronic business, or e-business, is the application of information and communication technologies (ICT) in support of.
IT Security Awareness Day October 19, 2016
Information Security Program
TOPIC: Web Security (Part-4)
Secure Software Confidentiality Integrity Data Security Authentication
Finding and Fighting the Causes of Insecure Applications
Securing Information Systems
Cybersecurity Awareness
Playing Safely in the Cloud
امنیت نرم‌افزارهای وب تقديم به پيشگاه مقدس امام عصر (عج) عباس نادری
Playing Safely in the Cloud
Implementing Client Security on Windows 2000 and Windows XP Level 150
Finding and Fighting the Causes of Insecure Applications
Privacy and Data Mining
Privacy and Data Mining
Presentation transcript:

Playing Safely in the Cloud Marie Greenberg, CISSP, IAM, IEM Information Security Manager Virginia State Corporation Commission

2 “Come into my parlor.” said the spider to the fly. Every day, government agencies are moving business practices from the physical realm into the cloud. Pay your taxes, renew your drivers license, incorporate your small business, order your birth certificate, look up a state employee… As a public entity we have certain responsibilities to the citizens of Virginia. The public looks to us for guidance and assumes that the service we are providing is secure.

3 What can we do to make “Playing Safely in the Cloud” a reality for our Citizens? Assure the public that we have a secure site for them to conduct e-government business. Require all users to register on our sites. Verify the identity of users.

4 Bring awareness to the Citizens COV Citizen Awareness Banner The security of your personal information is important to us! Diligent efforts are made to ensure the security of Commonwealth of Virginia systems. Before you use this Web site to conduct business with the Commonwealth, please ensure your personal computer is not infected with malicious code that collects your personal information. This code is referred to as a keylogger. The way to protect against this is to maintain current Anti-Virus and security patches.keyloggerAnti-Virus security patches For more information on protecting your personal information online, refer to the Citizens Guide to Online Protection.Citizens Guide to Online Protection

5 Establish good Security Practices Ensure secure payment services are in place. Use a third party to evaluate the security of the web site.

6 What can we do within our organizations to be more secure? Identify the internet threats facing us. Take ownership. Promote a ‘culture of security awareness’. Create and maintain a security policy.

7 Take steps to protect our systems and data. Keep software up-to-date. Develop a disaster recovery plan. Be proactive.

Playing Safely in the Cloud Online Identity Management Web Application Security Steve Werby Information Security Officer Virginia Commonwealth University

Anything you upload to a public website is not private – it's public.

City / State Address Interests Activities Friends Age Website First Name Last Name Alias Colleges Degrees Employers Job Titles Address Friends Colleagues First Name Last Name Address Birthday Street Address City / State Phone Number Website Marital Status Colleges Degrees Friends Alias Address Interests Alias City / State Friends Colleagues Website First Name Last Name Alias Age City / State Website Marital Status Friends Interests Activities Identity Theft Social Engineering Reconnaissance Phishing First Name Last Name Friends Colleagues Interests Activities Address

Aggregate social network data Your personal lifestream Your connections' lifestreams

Is the concept of privacy outdated?

1.Manage your identity 2.Make informed decisions 3.Voice your concerns 4.See #1

SaaS Cybercrime‏ Russian Business Network, Rock Phish HIPAA, PCI, GLBA, FACTA, FERPA IE, Firefox, Chrome, Safari, Opera AJAX Blackberry, iPhone, Windows Mobile Phishing, Smishing, Vishing 3G, n, mesh Web 2.0

Malicious File Execution Cross Site Scripting (XSS)‏ Insecure Direct Object Reference Cross Site Request Forgery (CSRF)‏ Information Leakage / Improper Error Handling Broken Authentication and Session Management Insecure Cryptographic Storage Insecure Communications Failure to Restrict URL Access Injection Flaws

1.Know your web applications 2.Know your data 3.Secure EVERYTHING 4.Educate, educate, EDUCATE