TOP 10 TECHNOLOGY INITIATIVES © 2013 - Robert G. Parker S-1 Issues Loss or theft of mobile devices Lack of MDM (mobile device management) software Cloud.

Slides:



Advertisements
Similar presentations
Copyright © XiSEC, All rights reserved, 2002 Secure Computing Best Lifetime Achievement Award 2002 Ted Humphreys Information Security Management Goes Global.
Advertisements

1 Fortinet Confidential 1 T I T R E Fortinet 2013 Global Survey.
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
Josh Alcorn Larry Brachfeld An in depth review of ad hoc mobile network & cloud security concerns.
CSI 2005 Computer Crime Survey Put together by J. Scott, 2006 Using Graphics and Text from the Published CSI/FBI 2005 Crime Survey.
Managed Security Monitoring. 2 ©2015 EarthLink. All rights reserved. Today’s top IT concerns — sound familiar? Source: IT Security Risks 2014: A Business.
1 SANS Technology Institute - Candidate for Master of Science Degree 1 A Preamble into Aligning Systems Engineering and Information Security Risk Dr. Craig.
Lockton Companies International Limited. Authorised and regulated by the Financial Services Authority. A Lloyd’s Broker. Protecting Your Business from.
1 6 - Outsourcing Outsourcing. © Robert G Parker – UW-CISA 2010 Dealing with issues when a portion or all of the provision of technology services is performed.
Get Complete IT Compliance: Reduce Risk and Cost Jonathan CISO, Qualys Seth Automation Specialist, BMC.
Creating a Security Architecture Kim Milford, J.D., CISSP Information Security Manager University of Wisconsin Copyright Kim.
The Difficult Road To Cybersecurity Steve Katz, CISSP Security Risk Solutions Steve Katz, CISSP Security.
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
InformationWeek 2014 Strategic Security Survey Research Findings © 2014 Property of UBM Tech; All Rights Reserved.
90% of EU exports consist of product and services of IPR-intensive industries. Among 269 senior risk managers, 53% said IP loss or theft had inflicted.
(ISC) Global Workforce Study U.S. Government Results May 7, 2013.
WHAT EVERY RISK MANAGER NEEDS TO KNOW ABOUT DATA SECURITY RIMS Rocky Mountain Chapter Meeting Thursday, July 25, :30 am – 12:30 pm.
Security considerations for mobile devices in GoRTT
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
1 The New Security Blueprint : Challenges & Opportunities Ajay Goel, Managing Director, Symantec India & SAARC Sept 1, 2011.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
Where in the world is your data? Data Breach Analysis Angelbeat Seminar Billy Austin, President iScan Online, Inc.
CLIENT FINANCIAL ADVISOR 3 rd Party A Year in the Life of a Client
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. State of Network Security.
Reducing data loss by threats detection. InfoWatch Traffic Monitor & Workplace Security. Andrey Sokurenko Business Development Director.
Visibility. Intelligence. response Information Security: Risk Management or Business Enablement? Mike Childs Vice President Rook Security.
The cost of Cybercrime 1 Steve Lamb Regional Marketing Manager – EMEA, Enterprise Security Products Twitter: actionlamb.
TOP 10 TECHNOLOGY INITIATIVES Robert G Parker July 12, 2013.
Safe’n’Sec IT security solutions for enterprises of any size.
February,  On October 23, 2015 the Commodity Futures Trading Commission (“CFTC”)approved National Futures Association’s (“NFA”) interpretive notice.
By, CA K RAGHU, PAST PRESIDENT – INSTITUTE OF CHARTERED ACCOUNTANTS OF INDIA.
MIS323 – Business Telecommunications Chapter 10 Security.
Your Cyber Security: The scope of your risk is broad and growing To understand the nature of the risk landscape look at the presentations here today-begin.
External Threats Internal Threats Nation States Cyber Terrorists Hacktivists Organised criminal networks Independent insider Insider planted by external.
1 Current Trends in Enterprise IT Network Security Key Takeaways Based on 100 Survey Responses © 2016 Lumeta Corporation.
Trinity Industries, Inc. FEI Presentation May 31, 2012.
EIC – Jornada ciberatacs cyber risk outlook June 2016.
Cyber Insurance Risk Transfer Alternatives Heather Soronen - Operations Director Rocky Mountain Insurance Information Association.
Welcome to the ICT Department Unit 3_5 Security Policies.
Presented by: Mike Gerdes Director, Information Security Center of Expertise Cybersecurity State of the Union.
Information Security Management Goes Global
Cyber Insurance Risk Transfer Alternatives
Cybersecurity as a Business Differentiator
Law Firm Data Security: What In-house Counsel Need to Know
BAE systems Research results October 2016
The time to address enterprise mobility is now
Information Security Program
Information Security – Current Challenges
Audit Risk The risk that an auditor will give an inappropriate audit opinion when the financial statements are materially misstated.
Cybersecurity - What’s Next? June 2017
Cyber Security: State of the Nation
Responding to Intrusions
The Internal Audit Role in assessing Cybersecurity
Trends in my profession, Information Technology
DETAILED Global CYBERSECURITY SURVEY Summary RESULTS
CSI Survey 2007 Tiffany Gorman
Information Security: Risk Management or Business Enablement?
CIS 502 Education for Service-- snaptutorial.com
I have many checklists: how do I get started with cyber security?
Data Privacy and Breaches
CONFIDENTIALITY, INTEGRITY, LEGAL INTERCEPTION
Cyber Defense Matrix Cyber Defense Matrix
The State of Cybersecurity in State Government NAST March 26, 2019
The Secure Contingency Plan
GLOBAL DIGITAL FORENSICS MARKET 2017 – 2025 Published by :Accurize Market Research Pvt. Ltd. Copyright © 2019 Accurize Market Research
Cybersecurity and its Relevance to CIT
Streamline your move to the cloud
Presentation transcript:

TOP 10 TECHNOLOGY INITIATIVES © Robert G. Parker S-1 Issues Loss or theft of mobile devices Lack of MDM (mobile device management) software Cloud computing. Cyber attacks Various uses of social media Risks - Issues Loss of sensitive confidential information Inability to operate (DOS) Customer hostility, law suits over data compromises Customer expectations may be unmet or compromised Security Issues Have Been Top Contenders in Past Technology Surveys 2. Securing the IT Environment The fact that over 50% of respondents lack confidence in their or their client’s ability to manage IT security is seen as a wake-up call to management, their auditors and advisors.

TOP 10 TECHNOLOGY INITIATIVES © Robert G. Parker S-2 2. Securing the IT Environment Deloitte TMT Survey Source: Deloitte 2013 TMT Security Survey – P8

TOP 10 TECHNOLOGY INITIATIVES © Robert G. Parker S-3 2. Securing the IT Environment Deloitte TMT Survey Source: Deloitte 2013 TMT Security Survey – P10 & P13 Third Party Security Concerns

TOP 10 TECHNOLOGY INITIATIVES © Robert G. Parker S-4 2. Securing the IT Environment Deloitte Global Financial Security Survey Source: Deloitte 2013 Financial Services Security Survey – P24

TOP 10 TECHNOLOGY INITIATIVES © Robert G. Parker S-5 What is it Important? Economic constraints of security The economic volatility of the past four years has resulted in budgetary restraint as organizations cut back expenditures and capital investment in almost all areas. Conversely, cybercriminals are becoming increasingly sophisticated and better funded by organized crime elements or, as recently reported in the media, state funded. 2. Securing the IT Environment

TOP 10 TECHNOLOGY INITIATIVES © Robert G. Parker S-6 2. Securing the IT Environment 56% indicated “Confident or Highly Confident” in Their Ability to Effectively Assess IT Security. Placing it 3 rd on the Confidence Scale Quickly Detect & Respond to Cyber Attacks Properly Protected all Mobile Devices to Prevent Data Breaches Considered All Relevant Vulnerabilities & Threats- Including Emerging Technologies 26% 32% 40% 2 nd Highest Initiative