Information Security.

Slides:



Advertisements
Similar presentations
DVA Leadership forum Policy and service delivery challenges faced by government agencies with a service delivery role Andrew Metcalfe Secretary Department.
Advertisements

INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Organising the Chaos Lynley Lee ICT Manager AsureQuality Limited.
University of York Planning for Process Review. Using our Vision, Strategy and Medium Term Planning to inform our business and process change agenda..
Digital Investigations of Any Kind ONE COMPANY Cyber Intelligence Response Technology (CIRT)
Layered Security Solutions - Simplified © 2008 Monte Robertson - CEO Layered Security Solutions – Simplified!
©2004 Check Point Software Technologies Ltd. Proprietary & Confidential IDG CIO Government Securing Information Assets: Architecture, Not Devices! Scott.
Privileged Identity Management Enterprise Password Vault
1 Storage Today Victor Hatridge – CIO Nashville Electric Service (615)
1 BIG-IP Global Traffic Manager Presented by: your name, your title.
Benefits of CA Technology & HVB Bank Romania Study Case Bucharest, May 31, 2005.
Advanced Metering Infrastructure AMI Security Roadmap April 13, 2007.
Boost your network security with NETASQ Vulnerability Manager.
Audit and Security for Microsoft Dynamics GP Andy Snook
Entrepreneurship, Innovation and Small Business A sketch in five slides May 2015.
Chapter 10 Information Systems Management. Agenda Information Systems Department Plan the Use of IT Manage Computing Infrastructure Manage Enterprise.
Defining the Challenge: Water Resources Sustainability: Challenges & Economic Opportunities November 5 th Chris Sturm New Jersey Future.
Telecom Expense Management Reporting Scottish Telecom’s Forum.
Open Source for Government Alexander C. Pitzner Sr. Network Engineer Harrisburg University of Science and Technology
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported License.Creative Commons Attribution-NonCommercial-ShareAlike.
INFORMATION SECURITY THE NEXT GENERATION 13 th World Electronics Forum Israel Christopher Joscelyne Board Member & Membership Chairman AEEMA November 2007.
Hosted by How to Negotiate Your Enterprise Software Agreement Why can’t we all just get along…. Nancy Gendron Vice President, AMR Research Contract Negotiation.
Offshore Outsourcing: Privacy and Public Perception Issues by Kenneth N. Rashbaum, Esq. by Kenneth N. Rashbaum, Esq. San Francisco Irvine New York Dallas.
ASIC Cutting red tape and making it easier to do business Rosanne Bell, Acting Senior Executive Leader Real Economy Australian Securities & Investments.
© 2014 PayPal Inc. All rights reserved. Confidential and proprietary. Leveraging Information to Detect and Prevent Insider Attacks Phoram Mehta Senior.
ISO27001 Introduction to Information Security. Who has day-to-day responsibility? All of us! Why Information Security? Control risk, limit liability What.
Copyright © 2012 Axceleon Intellectual Property All rights reserved HPC User Forum, Dearborn MI. Our Focus: Enable HPC solutions in the Cloud for our Customer.
StorTech Security Regulatory compliance provides the business foundation for security Organisations need to tackle all security challenges from a business.
IDENTITY THEFT. RHONDA L. ANDERSON, RHIA, PRESIDENT ANDERSON HEALTH INFORMATION SYSTEMS, INC.
Michael McDonnell GIAC Certified Intrusion Analyst Creative Commons License: You are free to share and remix but you must provide.
Australia Cybercrime Capacity Building Conference April 2010 Brunei Darussalam Ms Marcella Hawkes Director, Cyber Security Policy Australian Government.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
Introduction University of Sunderland CSEM02 Harry R Erwin, PhD Peter Dunne, PhD.
EPA’s Story: Developing a Secure Mobile-First Culture Malcolm Jackson Assistant Administrator for Environmental Information and Chief Information Officer.
The State of Computer & Data Security in Corporations Independent Survey.
Understanding Search Engines What Is The Web? Web Search Lesson Plan Module A1.
Connecting with Your Peers IT Challenges and Opportunities in 2012 A Facilitated Group Discussion Thursday, January 12, 2012.
National Australia Group (UK) With Hindsight!. Rules of Engagement If you have a question… raise your hand. If you are shy… speak to me later or drop.
S. A. Shonola & M. S. Joy Security Framework for Mobile Learning Environments.
- 1 - Information Security Agenda A Brief History of Internet security What is Security What I worry about.
Speaker: Meng-Ting Tsai Date:2010/11/25 The Information Assurance Practices of Cloud Computing Vendors IEEE Communications Society.
Start-Up Application - 5th Security Forum at G&D November 15th, 2012.
CIT 380: Securing Computer Systems Security Solutions Part 2.
Security Issues and Challenges in High Performance Grid Computing SASA SUBOTIC SASA SUBOTIC University of Pretoria.
Selecting an Open Source VoIP Solution for the SMB Think About the Ease of Use, Training, and Support While You Save Money and Obtain Advanced IP PBX.
Channel Shift Web Group Wales Rhiannon Lloyd 11/12/2014.
Jeffrey Murray Principle Test Manager – PowerPoint Problems with PowerPoint? … you can blame me!
The strategy of design Inspiring innovative cultures.
Infrastructure Deployment Services Dell Networking Deployment Services.
Developing a Network Security Policy By: Chris Catalano.
Safeguarding and Child Protection
Why is this called “the ostrich effect”?
IT SOFTWARE, DATA, AND CONTINGENCY PLANNING
ClearAvenue, LLC Headquartered in Columbia, Maryland
Cisco's Assurance System
LAND RECORDS INFORMATION SYSTEMS DIVISION
Lecture 14: Business Information Systems - ICT Security
Business Risks of Insecure Networks
Bill Banks | Security Engineer
Download Latest CompTIA CAS-002 Exam Dumps PDF Questions - CAS-002 Best Study Material - Realexamdumps.com
Computer Security Class 1
ما الذي يريد صاحب العمل أن يعرفه؟
Chapter 27 Security Engineering
*Harvard Business Review – The Truth About Customer Experience
AMI Security Roadmap April 13, 2007.
Building a Model House to Withstand a Hurricane
iCarol UK & Ireleand: +44 (0)
Cyber Security For Civil Engineering
Presentation transcript:

Information Security

Security The CIA Triad Confidentiality Integrity Availability The state of being secret Security Integrity Availability The state or quality of being entire or complete Present and ready for use

The Job http://technet.microsoft.com/en-us/library/cc723507.aspx

Agenda Some Threats Some Controls

San Francisco – Terry Childs http://articles.sfgate.com/2008-12-27/bay-area/17133065_1_computer-network-mr-childs-passwords

UBS – Roger Duronio http://www.cbsnews.com/stories/2002/12/18/tech/main533450.shtml

Certegy Check Services

Lost Backup Tapes

Australia – Vitek Boden This file is licensed under the Creative Commons Attribution-Share Alike 2.5 Generic license “…marine life died, the creek water turned black and the stench was unbearable for residents…” - Australian EPA

California – Mario Azar

Google and China

Waheed Mahmood http://news.bbc.co.uk/

Lost Laptop

Scottish Council Loses Pay Details

Customer Information in Bins

The Biggie …

SMART

Where is Security? IT Security? Information Security? Physical Security? Business Security? Business Assurance?

Some Problems IT Vendors People – IT, employees, others … Complexity Technology Control Systems Anyone who thinks that I am responsible for Information Security

Agenda Some Problems Some Solutions

Accept Challenges Display Your Badge Assess Risks Security Golden Rules Accept Challenges Display Your Badge Assess Risks Protect Your Identity Thirty Minute Rule - 22 -

Security Program Risk Management Policy … Standards Business Engagement Culture / Behaviour Change Security Architecture Metrics and Measurements Management System Money / Staff Controls

Further Reading Bruce Schneier SANS Internet Storm Centre / Newsbites SecurityFocus Titan Rain Advanced Persistent Threat Jericho Forum

Questions ?

Reading List Ross Anderson: Security Engineering Bruce Schneier: Secrets & Lies