Playing Safely in the Cloud Marie Greenberg, CISSP, IAM, IEM Information Security Manager Virginia State Corporation Commission.

Slides:



Advertisements
Similar presentations
NETWORKS By : Nicolas Pottier. Electronic security Establishing techniques that allow users to prove and protect their Identity from unauthorised personnel.
Advertisements

By Brian Langone. Internet censorship is essentially a method used by corporations, governments and others in order to filter what a user can view on.
Information Technology Awareness Wayne Donald IT Security Officer.
Lessons Learned Data and Asset Security FOCUS Spring 2006 Chuck Banner UVA-Wise.
INTERNET SAFETY FOR EVERYONE A QUICK AND EASY CRASH COURSE.
Guide to Massachusetts Data Privacy Laws & Steps you can take towards Compliance.
1 CLOUD AND SaaS-BASED PLATFORMS: ENSURING DATA PRIVACY May, 2011.
1 Enabling Legislators’ Staffs to Provide Basic Taxpayer Service March 31, 2011.
Safe IT – Protect your computer and Family from unwanted programs viruses and websites.
Security Controls – What Works
Chapter 17 Controls and Security Measures
CHAPTER 3 Ethics and Privacy. Outline for Today Chapter 3: Ethics and Privacy Tech Guide: Protecting Information Assets REMINDER: Project 1 due tonight.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Information Systems Security Officer
Factors to be taken into account when designing ICT Security Policies
INTERNET SAFETY FOR EVERYONE
Online Shopping Take Charge of Your Finances
© Family Economics & Financial Education –October 2007 – Consumer Protection Unit – Online Shopping Funded by a grant from Take Charge America, Inc. to.
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
Norman SecureTide Powerful cloud solution to stop spam and threats before it reaches your network.
Information Security Information Technology and Computing Services Information Technology and Computing Services
JOURNAL QUESTIONS FOR CHOOSE TWO TO ANSWER! Why is it important for consumers to know what is in food products? What kinds of things do you need.
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
SEC835 Database and Web application security Information Security Architecture.
Marketing of Information Security Products. The business case for Information Security Management.
Staying Safe. Files can be added to a computer by:- when users are copying files from a USB stick or CD/DVD - downloading files from the Internet - opening.
How STERIS is using Cloud Technology to Protect Web Access Presented By: Ed Pollock, CISSP-ISSMP, CISM CISO STERIS Corporation “Enabling Business”
Safe and Secure Internet Gambling Financial Model.
Just In Time Training (JITT): How Not to Jump from the Frying Pan into the Fire.
Thomas Levy. Agenda 1.Aims: Reducing Cyber Risk 2.Information Risk Management 3.Secure Configuration 4.Network Security 5.Managing User Access 6.Education.
WHAT IS VIRUS? NAE GRAND CHALLENGE SECURE CYBERSPACE.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
CHAPTER 3 Ethics and Privacy. Outline for Today Chapter 3: Ethics and Privacy Tech Guide: Protecting Information Assets.
Data Security: Steps to Improved Information Security September 22, 2015 Presented by: Alex Henderson General Counsel and Chief Administrative Officer.
What is e-government? E-Government refers to the use by government agencies of information technologies (such as Wide Area Networks, the Internet, and.
Do you believe in this? Due to its very nature, the Internet is NOT a safe or secure environment. It is an ever-changing medium where anyone and everyone.
Playing Safely in the Cloud Marie Greenberg, CISSP, IAM, IEM Information Security Manager Virginia State Corporation Commission.
Presentation on electronic government Presented to: Sir Adnan Presented by: Kiran shakoor (07- 05) Razeena Ameen(07-25)
G:\99Q3\9220\PD\AJD2.PPT 1 Harriet P. Pearson Chief Privacy Officer IBM February 7, 2003 IBM.
MINISTRY OF MINES, ENERGY AND WATER DEVELOPMENT MINES DEVELOPMENT DEPARTMENT MINING CADASTRE PORTAL IMPLEMENTATION 5 TH ZIMEC 19 TH FEBRUARY, 2015.
IT in Business Issues in Information Technology Lecture – 13.
CPS ® and CAP ® Examination Review OFFICE SYTEMS AND TECHNOLOGY, Fifth Edition By Schroeder and Graf ©2005 Pearson Education, Inc. Pearson Prentice Hall.
Information Technology Acceptable Use Policy The acceptable use policy (AUP) is a document stipulating constraints and practices that a user must agree.
Data Security & Privacy: Fundamental Risk Mitigation Tactics 360° of IT Compliance Anthony Perkins, Shareholder Business Law Practice Group Data Security.
1 © 2001, Cisco Systems, Inc. All rights reserved. Session Number Presentation_ID Security ROI and Conclusions Cisco commissioned custom research project.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
LEFIS ROVANIEMI MEETING 19TH 20TH JANUARY 2007 Privacy In The Web TATYANA STEFANOVA LEX.BG BULGARIA.
Case Study: Applying Authentication Technologies as Part of a HIPAA Compliance Strategy.
Warm Up 9/18/15 List all of the things that you can think of that government does for you (directly or indirectly)
Managing End Point Security Starts at the Perimeter DIR ISF April 14&15, 2016 Randy Guin, CISSP, CGEIT.
Sniper Corporation. Sniper Corporation is an IT security solution company that has introduced security products for the comprehensive protection related.
Information Technology Acceptable Use An Overview CSTMC All Staff Meeting February 10, 2014.
U.S. Department of Agriculture eGovernment Program eAuthentication Initiative eAuthentication Solution Screens Review Meeting October 7, 2003.
ISO17799 / BS ISO / BS Introduction Information security has always been a major challenge to most organizations. Computer infections.
Professional Technicians Do Provide Support For Guardian Not Scanning In Windows8 or In Other Windows. Professional Technicians Do Provide Support For.
Managing Windows Security
CMGT 230 Possible Is Everything/tutorialrank.com.
CYB 110 Competitive Success/snaptutorial.com
CYB 110 Education Begins / Snaptutorial.com. CYB 110 All Assignments For more classes visit CYB 110 Week 1 Individual Protecting.
CYB 110 Education Begins / tutorialrank.com. CYB 110 All Assignments For more course tutorials visit CYB 110 Week 1 Individual Protecting.
CMGT 230 Education for Service/tutorialrank
CYB 110 Teaching Effectively-- snaptutorial.com
CYB 110 Education for Service-- tutorialrank.com
Playing Safely in the Cloud
Playing Safely in the Cloud
David J. Carter, CISO Commonwealth Office of Technology
Government Agencies Important to Small Businesses
Privacy and Data Mining

Presentation transcript:

Playing Safely in the Cloud Marie Greenberg, CISSP, IAM, IEM Information Security Manager Virginia State Corporation Commission

2 “Come into my parlor.” said the spider to the fly. Every day, government agencies are moving business practices from the physical realm into the cloud. Pay your taxes, renew your drivers license, incorporate your small business, order your birth certificate, look up a state employee… As a public entity we have certain responsibilities to the citizens of Virginia. The public looks to us for guidance and assumes that the service we are providing is secure.

3 What can we do to make “Playing Safely in the Cloud” a reality for our Citizens? Assure the public that we have a secure site for them to conduct e-government business. Require all users to register on our sites. Verify the identity of users.

4 Bring awareness to the Citizens COV Citizen Awareness Banner The security of your personal information is important to us! Diligent efforts are made to ensure the security of Commonwealth of Virginia systems. Before you use this Web site to conduct business with the Commonwealth, please ensure your personal computer is not infected with malicious code that collects your personal information. This code is referred to as a keylogger. The way to protect against this is to maintain current Anti-Virus and security patches.keyloggerAnti-Virus security patches For more information on protecting your personal information online, refer to the Citizens Guide to Online Protection.Citizens Guide to Online Protection

5 Establish good Security Practices Ensure secure payment services are in place. Use a third party to evaluate the security of the web site.

6 What can we do within our organizations to be more secure? Identify the internet threats facing us. Take ownership. Promote a ‘culture of security awareness’. Create and maintain a security policy.

7 Take steps to protect our systems and data. Keep software up-to-date. Develop a disaster recovery plan. Be proactive.