Data Security in a Mobile World Emmitt Wells – Getronics.

Slides:



Advertisements
Similar presentations
Data Privacy and Security in the Cloud Presented by Robert J. Scott Managing Partner Scott & Scott, LLP
Advertisements

IT Security Policy Framework
COMPREHENSIVE APPROACH TO INFORMATION SECURITY IN ADVANCED COMPANIES.
Information Privacy and Data Protection Lexpert Seminar David YoungDecember 9, 2013 Breach Prevention – Due Diligence and Risk Reduction.
IAPP CONFIDENTIAL Insider Leakage Threatens Privacy.
Information System Audit : © South-Asian Management Technologies Foundation Chapter 4: Information System Audit Requirements.
HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)
1 Electronic Information Security – What Researchers Need to Know University of California Office of the President Office of Research May 2005.
Information Security Jim Cusson, CISSP. Largest Breaches 110, NorthgateArinso, Verity Trustees 6, Aurora St. Luke's Medical.
PCI Compliance Forrest Walsh Director, Information Technology California Chamber of Commerce.
EDiscovery and Records Management. Records Management- Historical Perspective- Paper Historically- Paper was the “Corporate Memory” – a physical entity.
Security Controls – What Works
Chapter 17 Controls and Security Measures
Insights on the Legal Landscape for Data Privacy in Higher Education Rodney Petersen, J.D. Government Relations Officer and Security Task Force Coordinator.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Security, Continuity & Compliance Gordon McKenzie Business Development Director, Syan Limited.
Brian Bradley.  Data is any type of stored digital information.  Security is about the protection of assets.  Prevention: measures taken to protect.
Electronic Banking BY Bahaa Abas Noor abo han. Definition * e-banking is defined as: …the automated delivery of new and traditional banking products and.
Governance, Risk, and Compliance Bill Greene Senior Industry Director.
Obtaining, Storing and Using Confidential Data October 2, 2014 Georgia Department of Audits and Accounts.
Market Trends Enterprise Web Applications Cloud Computing SaaS Applications BYOD Data Compliance Regulations 30 Second Elevator Pitch Web browsers have.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
The NYSE Personal Finance Mrs. Brewer. The Stock Market Review O pa.org/SafeVideos/Video.aspx?id=hjuMlola Ko4 pa.org/SafeVideos/Video.aspx?id=hjuMlola.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
1 Secure Services. 2 Secure is a hosted application that provides users with enterprise-grade business features including calendaring, contacts.
Unify and Simplify: Security Management
What Keeps You Awake at Night Compliance Corporate Governance Critical Infrastructure Are there regulatory risks? Do employees respect and adhere to internal.
Security Awareness: Applying Practical Security in Your World Chapter 1: Introduction to Security.
Forensic Archiving and Compliance Retention, access and protection for critical business information Cryoserver Robin Bingeman
Managing and Securing Endpoints Bruce Hotte Chief Information Officer Jeff Swan Network Supervisor  The definition of “endpoint” used to be simple: a.
GRC - Governance, Risk MANAGEMENT, and Compliance
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
STORAGE MANAGEMENT/ EXECUTIVE: Managing a Compliant Infrastructure Processes and Procedures Mike Casey Principal Analyst Contoural Inc.
Chapter 12 by Lisa Reeves Bertin Securing Information in a Network.
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
Part 6 – Special Legal Rights and Relationships Chapter 35 – Privacy Law Prepared by Michael Bozzo, Mohawk College © 2015 McGraw-Hill Ryerson Limited 34-1.
Controlling Fraud Risk Exposure and Loss Sherri Goodman Director of Fraud Operations September 22, 2005.
The NYSE Personal Finance Mrs. Brewer. The Stock Market Review O pa.org/SafeVideos/Video.aspx?id=hjuMlola Ko4 pa.org/SafeVideos/Video.aspx?id=hjuMlola.
Protecting Your Business! SBA Ft. Lauderdale November 15, 2006 Gregory Levine, Sr. Director Marketing.
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
IT Security Policy Framework ● Policies ● Standards ● Procedures ● Guidelines.
Data Breach: How to Get Your Campus on the Front Page of the Chronicle?
Last Minute Security Compliance - Tips for Those Just Starting 10 th National HIPAA Summit April 7, 2005 Chris Apgar, CISSP – President Apgar &
CIBC Global Services © 2006, Echoworx Corporation Ubiquity of Security Compliance and Content Management Stephen Dodd Director – Enterprise Accounts.
Csci5233 Computer Security & Integrity 1 Overview of Security & Java (based on GS: Ch. 1)
Langara College PCI Awareness Training
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Legal, Regulations, Investigations, and Compliance Chapter 9 Part 2 Pages 1006 to 1022.
CYBERSECURITY: RISK AND LIABILITY March 2, 2016 Joshua A. Mooney Co-chair-Cyber Law and Data Protection White and Williams LLP (215)
Operational Resilience DR’s Big Data Dilemma September 16, 2015 Datalink IT Resiliency Practice.
INTRODUCTION  netCORE offers 360 degree digital communication solutions Messaging and Mobility  Pioneers in Linux based mailing solution and catering.
Secure Services Shared Hosted MS Exchange 2010.
1 Privacy & Preference Committee Update Ensuring a healthy ecosystem via transparency & trust Date: January 13, 2009 Alan Chapell, President.
WHAT NEW, WHAT NEXT IN PAYMENT PROCESSING. EMV WHAT IS EMV? 3  An acronym created by Europay ®, MasterCard ® and Visa ®  The global standard for the.
LESSON 12 Business Internet. Electronic business, or e-business, is the application of information and communication technologies (ICT) in support of.
The technology behind the USPS EPM. AND COMPLIANCE March 25, 2004 Adam Hoffman.
Data Breach ALICAP, the District Insurance Provider, is Now Offering Data Breach Coverage as Part of Our Blanket Coverage Package 1.
Pioneers in secure data storage devices. Users have become more accustomed to using multiple devices, are increasingly mobile, and are now used to storing.
Top Compliance Topics.
Regulatory Compliance
Decrypting Data Compliance in China
Governance, Risk, and Compliance Bill Greene Senior Industry Director
Securing Information Systems
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Richard Purcell Corporate Privacy Officer Microsoft Corporation
COMPREHENSIVE APPROACH TO INFORMATION SECURITY IN ADVANCED COMPANIES
INFORMATION SYSTEMS SECURITY and CONTROL
The MobileIron® Threat Detection difference:
Colorado “Protections For Consumer Data Privacy” Law
Presentation transcript:

Data Security in a Mobile World Emmitt Wells – Getronics

September 10-12, 2007 Los Angeles Convention Center Los Angeles, California 3 Hitting Close to Home If you think mobile security isn’t a real subject, just consider the possibility that there is someone out there right now with your name, , phone number, and birth date and more stored on a digital device that was just left in a taxi cab – not a comforting thought.

September 10-12, 2007 Los Angeles Convention Center Los Angeles, California 4 View of Endpoint Security…

September 10-12, 2007 Los Angeles Convention Center Los Angeles, California 5 All Sectors –SOX, Combined Code, Companies Bill, IAS –Privacy, Data Protection, Human Rights Finance Sector –Basel II, FSA, SEC Act 17a-3/4, NASD Rules 3010/3110 Retail Sector –Payment Card Industry (PCI) Security Standard Health Sector –HIPAA Interception legislation –RIPA, European Data Retention Directive Local legislation with Global consequences –Californian Law SB 1386 Compliance Demands are Mounting

September 10-12, 2007 Los Angeles Convention Center Los Angeles, California 6 Securing Data in Motion

September 10-12, 2007 Los Angeles Convention Center Los Angeles, California 7 Ensuring Data Integrity

September 10-12, 2007 Los Angeles Convention Center Los Angeles, California 8 Data Theft

September 10-12, 2007 Los Angeles Convention Center Los Angeles, California 9 Policy Establish

September 10-12, 2007 Los Angeles Convention Center Los Angeles, California 10 Technology Available Endpoint Products –Anti-virus, anti-spam, Message Cleaning, HIDS for the desktop Controlling Access –Identity Management and Authentication External Protection –Firewalls and NIDS Data Protection –Policy Enforcement Tools Backup and Retrieval –Secure Archival Stolen Equipment –Data low-jack

September 10-12, 2007 Los Angeles Convention Center Los Angeles, California 11 What if I do nothing? “Gartner estimates cleanup costs for any data loss to be $90 per customer record when you calculate notification, legal expenses, and the damage done to a corporate brand." = = +

September 10-12, 2007 Los Angeles Convention Center Los Angeles, California 12 How do I convince my executives of the need? Discuss Technology Discuss Business Impact

September 10-12, 2007 Los Angeles Convention Center Los Angeles, California 13 Balanced Security

September 10-12, 2007 Los Angeles Convention Center Los Angeles, California 14 Policy –Define rules, promote best practices and minimize risks Technology –Enforce policies, detect violations of policy, and deliver evidence of compliance with corporate policy and regulatory requirements Education –Equip employees to recognize potential sources of risk and to safeguard information and transactions in hostile environments Management –Setup reactive and proactive management to help measure how your endpoints are performing against the policy you have established Requirements for Mobile Endpoint Security

September 10-12, 2007 Los Angeles Convention Center Los Angeles, California 15 Keep it Simple "Aye sir, the more they over-tech the plumbing, the easier it is to stop up the drain." – Mr. Scot, Star Trek III: The Search For Spock

Thank you