Conduct A Strong Evaluation Soar to New Heights! 2013 National Equipment Finance Summit, Albuquerque, NM.

Slides:



Advertisements
Similar presentations
ETHICAL HACKING A LICENCE TO HACK
Advertisements

Pros and Cons of Cloud Computing Professor Kam-Fai Wong Faculty of Engineering The Chinese University of Hong Kong.
Information Risk Management Key Component for HIPAA Security Compliance Ann Geyer Tunitas Group
Security and Personnel
COBIT - II.
Chapter © 2009 Pearson Education, Inc. Publishing as Prentice Hall.
Chapter © 2009 Pearson Education, Inc. Publishing as Prentice Hall.
Ethical Hacking Introduction.  What is Ethical Hacking?  Types of Ethical Hacking  Responsibilities of a ethical hacker  Customer Expectations  Skills.
Boost your network security with NETASQ Vulnerability Manager.
Stephen S. Yau CSE , Fall Security Strategies.
Ferst Center Incident Incident Identification – Border Intrusion Detection System Incident Response – Campus Executive Incident Response Team Incident.
Information Security Compliance System Owner Training Richard Gadsden Information Security Office Office of the CIO – Information Services Sharon Knowles.
No one questions that Microsoft can write great software. Customers want to know if we can be innovative, scalable, reliable in the cloud. (1996) 450M+
 Jonathan Trull, Deputy State Auditor, Colorado Office of the State Auditor  Travis Schack, Colorado’s Information Security Officer  Chris Ingram,
Information Systems Security Computer System Life Cycle Security.
WHAT EVERY RISK MANAGER NEEDS TO KNOW ABOUT DATA SECURITY RIMS Rocky Mountain Chapter Meeting Thursday, July 25, :30 am – 12:30 pm.
Adam Ely CISO, Heroku at salesforce.com Founder & COO, Bluebox Managing Security in The Cloud.
Joseph Ferracin Director IT Security Solutions Managing Security.
SECURITY Is cloud computing secure? Are Microsoft Online Services secure? Is cloud computing secure? Are Microsoft Online Services secure? PRIVACY What.
Presented to: SBAS Technical Interoperability Working Group Date: 21 June 2005 Federal Aviation Administration Certification of the Wide Area Augmentation.
SODA Archiving October 2013
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
DISCOVER IT PEACE OF MIND Staying HIPAA-Compliant Revised: April 13, 2015.
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
Nata Raju Gurrapu Agenda What is Information and Security. Industry Standards Job Profiles Certifications Tips.
Mobile Banking By: Chenyu Gong, Jalal Hafidi, Harika Malineni.
PRIVACYRELIABILIT Y SECURITY Secures against attacks Protects confidentiality, integrity, and availability of data and systems Helps manage risk Protects.
September 12, 2004 Simplifying the Administration of HIPAA Security Angel Hoffman, RN, MSN Director, Corporate Compliance University of Pittsburgh Medical.
IT Strategy for Business © Oxford University Press 2008 All rights reserved Chapter 12 IT Security Strategies.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Cloud Computing Security Keep Your Head and Other Data Secure in the Cloud Lynne Pizzini, CISSP, CISM, CIPP Information Systems Security Officer Information.
Alert Logic Provides a Fully Managed Security and Compliance Solution Based in the Cloud, Powered by the Robust Microsoft Azure Platform MICROSOFT AZURE.
What Can Go Wrong During a Pen-test? Effectively Engaging and Managing a Pen-test.
Introduction: Information security services. We adhere to the strictest and most respected standards in the industry, including: -The National Institute.
CSCE 548 Secure Software Development Security Operations.
5/18/2006 Department of Technology Services Security Architecture.
Need for Security Control access to servicesControl access to services Ensure confidentialityEnsure confidentiality Guard against attacksGuard against.
Develop your Legal Practice using “Cloud” applications, but … Make sure your data is safe! Tuesday 17 November 2015 The Law Society, London Allan Carton,
CLOUD COMPUTING-3.
PRIVACYRELIABILIT Y SECURITY Secures against attacks Protects confidentiality, integrity, and availability of data and systems Helps manage risk Protects.
BUSINESS CLARITY ™ PCI – The Pathway to Compliance.
HIPAA Compliance Case Study: Establishing and Implementing a Program to Audit HIPAA Compliance Drew Hunt Network Security Analyst Valley Medical Center.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
Mohssen Mohammed Sakib Pathan Building Customer Trust in Cloud Computing with an ICT-Enabled Global Regulatory Body Mohssen Mohammed Sakib Pathan.
Managed IT Services JND Consulting Group LLC
Example First: Cost savings conversation Cloud-First Dynamics AX Architecture Microsoft Dynamics AX Data Management Services AX MorphX Dev Tools.
Maciej Pęciak Robert Dąbroś
Cisco Defense Orchestrator
VIRTUALIZATION & CLOUD COMPUTING
Security Standard: “reasonable security”
Paul Woods Chair, MITIGATION: Ensuring we procure cloud services taking into account of the risks involved Paul Woods Chair, ISNorthEast.
Robust, Secure Azure Cloud Platform Enables Manufacturers to Manage Customers’ Returns “Azure offers us a reliable, secure, and robust cloud platform so.
CMGT 431 STUDY Lessons in Excellence--cmgt431study.com.
Bill.com Overview for [CLIENT NAME]
Assessing the Security of the Cloud
How To Land Your Dream Job in Cyber Security
National Cyber Security
Security Essentials for Small Businesses
Windows 10 Enterprise subscriptions in CSP – Messaging Summary
HIPAA Security Standards Final Rule
Drew Hunt Network Security Analyst Valley Medical Center
IS4680 Security Auditing for Compliance
Chris Romano Andrew Shepardson IA 456
Microsoft Data Insights Summit
MS-900 MS-101 Dumps PDF 2019
Modern benefits administration and HR software, supported by us.
Cloud Computing for Wireless Networks
OU BATTLECARD: WebLogic Server 12c
Presentation transcript:

Conduct A Strong Evaluation Soar to New Heights! 2013 National Equipment Finance Summit, Albuquerque, NM

Is A Security Team Actively Working? Find out if security is a reactive part of the cloud provider's processes or if it is actively securing its systems. Smaller providers will have system administrators addressing security as issues pop up. Get customer references. Skills and certifications only go so far. Talk to the staff and generally get a feeling of their experience and knowledge. Soar to New Heights! 2013 National Equipment Finance Summit, Albuquerque, NM

Is There A Process In Place For Incident Response? Ensure that the provider is actively looking for weaknesses and vulnerabilities in its platform. Insist on active monitoring, support and communication when problems arise. Ask for a monthly report, a quarterly call or other regular meeting is set up to discuss issues and any improvements that are needed in your environment. The business that owns the data is responsible for securing it. Soar to New Heights! 2013 National Equipment Finance Summit, Albuquerque, NM

What Proof Does The Provider Have Validating Its Security? Service providers should be able to show proof that the architecture and systems have been audited, giving you peace of mind that the systems meet industry standards. Service Organization Control reports show it provides reasonable protection over customer data. –A SOC2 report is an exhaustive review of the control environment and would only be provided under a nondisclosure agreement. It gauges a service provider's controls against the Trust Services Principles, which cover the security, availability, processing integrity, confidentiality and privacy of the organization. –A SOC3 report is more streamlined but freely available and should provide reasonable information about an assessment of the provider's security. Soar to New Heights! 2013 National Equipment Finance Summit, Albuquerque, NM

Can I Conduct A Penetration Test Of The Provider's Environment? Security experts advise that penetration testing is a valuable tool to find weaknesses and configuration issues before a real attacker strikes. –A full penetration test is unlikely in the case of most SaaS provider, but a large infrastructure service provider will let potential customers conduct a penetration test. Conduct vulnerability scans or hire a firm to perform a full penetration test. If the service provider has an internal penetration testing team, you can request a detailed audit of reports. Third-party testing may be required to meet certain compliance mandates. Soar to New Heights! 2013 National Equipment Finance Summit, Albuquerque, NM

Where Is My Data Residing? If you are working with an infrastructure provider, most organizations will pick the data center where the information will reside and many service providers have data centers to settle country- specific data location regulations. Organizations must keep an eye on what happens to the data. –Is the data encrypted at rest? –Are backups encrypted? –Does the data center provider have any direct access to the data at rest or in transit? Soar to New Heights! 2013 National Equipment Finance Summit, Albuquerque, NM