© 2006 EmeSec HealthTechNet The Management and Operational Perspective of Privacy and Security 12801 Worldgate Drive, Suite 500 Herndon, Virginia 20170.

Slides:



Advertisements
Similar presentations
NERC Security Requirements – What Vendors Should Provide James W. Sample, CISSP, CISM Manager of Information Security California ISO.
Advertisements

Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
1 Telstra in Confidence Managing Security for our Mobile Technology.
Security Controls – What Works
Information Security Policies and Standards
© BT PLC 2005 ‘Risk-based’ Approach to Managing Infrastructure a ‘Commercial Prospective’ Malcolm Page BT UK AFCEA Lisbon 2005.
Planning and Managing Information Security Randall Sutton, President Elytra Enterprises Inc. April 4, 2006.
August 9, 2005UCCSC Converting Policy to Reality Building Campus Security Programs Karl Heins -- Director of IT Audit Services Office of the University.
Cybersecurity Summit 2004 Andrea Norris Deputy Chief Information Officer/ Director of Division of Information Systems.
Computer Security: Principles and Practice
Stephen S. Yau CSE , Fall Security Strategies.
Session 3 – Information Security Policies
Data Protection in Higher Education: Recent Experiences in Privacy and Security Institute for Computer Law and Policy Cornell University June 29, 2005.
Maintaining & Reviewing a Web Application’s Security By: Karen Baldacchino Date: 15 September 2012.
Comptroller of the Currency Administrator of National Banks E- Security Risk Mitigation: A Supervisor’s Perspective Global Dialogue World Bank Group September.
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
NUAGA May 22,  IT Specialist, Utah Department of Technology Services (DTS)  Assigned to Department of Alcoholic Beverage Control  PCI Professional.
SEC835 Database and Web application security Information Security Architecture.
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
K E M A, I N C. NERC Cyber Security Standards and August 14 th Blackout Implications OSI PI User Group April 20, 2004 Joe Weiss
Evolving IT Framework Standards (Compliance and IT)
Lessons Learned in Smart Grid Cyber Security
HIPAA COMPLIANCE WITH DELL
Security Policies Paul Hogan Ward Solutions. Agenda 09:30 10:10 Security Policies 10:10 10:30 Veritas 10:30 10:45Break 10:45 11:55 Securing your Server.
© 2001 Carnegie Mellon University S8A-1 OCTAVE SM Process 8 Develop Protection Strategy Workshop A: Protection Strategy Development Software Engineering.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 1 – Overview.
Computer Security: Principles and Practice
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
Challenges in Infosecurity Practices at IT Organizations
Compliance Management Platform ™. Compliance Management Platform Compliance is the New Marketing – Position yourself to thrive in the new regulatory and.
The ISO Standards Get Familiar or Stay Away? PrivaTech Consulting Presenter: Fazila Nurani, B.A.Sc., (E.Eng.), LL.B., CIPP/C.
IDENTITY THEFT. RHONDA L. ANDERSON, RHIA, PRESIDENT ANDERSON HEALTH INFORMATION SYSTEMS, INC.
Secure Cloud Solutions Open Government Forum Abu Dhabi April 2014 Karl Chambers CISSP PMP President/CEO Diligent eSecurity International.
U of Maryland, Baltimore County Risk Analysis of Critical Process –Financial Aid Adapted STAR model –Focus on process and information flow –Reduced analysis.
K E M A, I N C. Ten Steps To Secure Control Systems APPA 2005 Conference Session: Securing SCADA Networks from Cyber Attacks Memphis, TN April 18, 2005.
State Data Center Oregon Consumer Identity Theft Protection Act Information Forum October 31, 2007.
IT Governance: COBIT, ISO17799 & ITIL. Introduction COBIT ITIL ISO17799Others.
Engineering Essential Characteristics Security Engineering Process Overview.
How to Integrate Security Tools to Defend Data Assets Robert Lara Senior Enterprise Solutions Consultant, GTSI.
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
Last Minute Security Compliance - Tips for Those Just Starting 10 th National HIPAA Summit April 7, 2005 Chris Apgar, CISSP – President Apgar &
Scott Charney Cybercrime and Risk Management PwC.
HO © 2012 Fluor. All rights reserved. Quick Wins in Vulnerability Management Classification: Confidential Owner: Michael Holcomb Approver: Phil.
Ken Brumfield | Premier Field Engineer Ward Ralston| Group Product Manager Microsoft Corporation.
SecSDLC Chapter 2.
Vendor Management from a Vendor’s Perspective. Agenda Regulatory Updates and Trends Examiner Trends Technology and Solution Trends Common Issues and Misconceptions.
Security Environment Assessment. Outline  Overview  Key Sources and Participants  General Findings  Policy / Procedures  Host Systems  Network Components.
Understand Network Isolation Part 2 LESSON 3.3_B Security Fundamentals.
Visibility. Intelligence. response Information Security: Risk Management or Business Enablement? Mike Childs Vice President Rook Security.
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
Information Security Framework Regulatory Compliance and Reporting Auditing and Validation Metrics Definition and Collection Reporting (management, regulatory,
Quickly Establishing A Workable IT Security Program EDUCAUSE Mid-Atlantic Regional Conference January 10-12, 2006 Copyright Robert E. Neale This.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
Dr. Mark Gaynor, Dr. Feliciano Yu, Bryan Duepner.
ASHRAY PATEL Securing Public Web Servers. Roadmap Web server security problems Steps to secure public web servers Securing web servers and contents Implementing.
© ITT Educational Services, Inc. All rights reserved. IS3220 Information Technology Infrastructure Security Unit 10 Network Security Management.
Welcome Information Security Office Services Available to Counties Security Operations Center Questions.
Risk Assessments in Many Flavors George J. Dolicker, CISA, CISSP.
Advanced Planning Brief to Industry Jerry L. Davis DAS, Office of Information Security June 9, 2011.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
 December 2010 US Chief Information Officer Vivek Kundra released the Federal Cloud Computing Strategy. This became to be what is known as “Cloud First”
Cybersecurity - What’s Next? June 2017
IT Development Initiative: Status and Next Steps
General Counsel and Chief Privacy Officer
CIPSEC architecture CIPSEC workshop Frankfurt 16/10/2018
Pam Matthews, FHIMSS Director of Business Information Systems Business Information Systems is focused around administrative and financial information.
~ 20% of employees are military veterans.
IT Management Services Infrastructure Services
Presentation transcript:

© 2006 EmeSec HealthTechNet The Management and Operational Perspective of Privacy and Security Worldgate Drive, Suite 500 Herndon, Virginia A Privacy / Security Presentation For HealthTechNet July 21, 2006 Maria C. Horton, CISSP-ISSMP, IAM

© 2006 EmeSec HealthTechNet About EmeSec (pronounced em-ēē-sek) 8(a), Service Disabled Veteran, Woman Owned Business –Founded April 2003 EmeSec specializes e-Security solutions IT policy and planning, Continuity of Operations, Incident Response, and Regulatory Compliance

© 2006 EmeSec HealthTechNet Security in Large Organizations Source: Meta Group, yr phase

© 2006 EmeSec HealthTechNet Data Protection Drivers –Government Regulatory –Commercial Revenue Privacy Management –Policy driven –Procedurally oriented Operational –Technically focused –Location based

© 2006 EmeSec HealthTechNet Common Security Issues Five Basic problem Areas –Inherent Security Defects –Misuse of Tools –Improper maintenance –Ineffective Security –Inadequate detection systems

© 2006 EmeSec HealthTechNet Threat Response Activities Annual Risk Assessment Perimeter protections –Changing: wireless / virtual worlds –Automated configuration management Access control –Role Based –Multi-factorial Authentication Specialized security training

© 2006 EmeSec HealthTechNet Managing Vulnerabilities Continuous Monitoring –Automated patching –Network and server functionality –Audit trail monitoring / alerts Trend analysis –Incident Response –Key Performance Indicators Up time Training Size does matter –Monitoring and response are required –Resources generally limited Money Personnel –Innovation Critical to success

© 2006 EmeSec HealthTechNet Contact Us: Worldgate Drive, Suite 500 Herndon, Virginia (a), Service Disabled Veteran, Woman-owned, Small Business