Hot Topics in Information Security Rick Shaw – President, CorpNet Security, Inc. Mick Johannes – CTO, CorpNet Security, Inc.

Slides:



Advertisements
Similar presentations
The Whole/Hole of Security Public (DoD) v. Corporate Carl Bourland US Army Judge Advocate Generals Corps.
Advertisements

CS898T Mobile and Wireless Network Handheld Device Security By Yuan Chen July 25 th, 2005.
1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
Current Security Threats WMO CBS ET-CTS Toulouse, France May 2008 Allan Darling, NOAA’s National Weather Service WMO CBS ET-CTS Toulouse, France.
NCS welcome all participants on behalf of Quick Heal Anti Virus and Fortinet Firewall solution.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Separate Domains of IT Infrastructure
Hacker Update Rick Shaw – President,CorpNet Security, Inc. Mick Johannes – CTO, CorpNet Security, Inc.
16254_08_2002 © 2002, Cisco Systems, Inc. All rights reserved. Cisco’s Security Vision Mario Mazzola Chief Development Officer August 29, 2002.
Security Controls – What Works
Security ROI Rick Shaw – President, CorpNet Security, Inc.
Security+ Guide to Network Security Fundamentals
Defense-in-Depth Against Malicious Software Jeff Alexander IT Pro Evangelist Microsoft Australia
Enterprise security How to bring security transparency into your organization ISSA EDUCATIONAL SESSION Nicklaus Schleicher, VP Support & Customer Service.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
 Controls that provide security against internal and external threats  2 Types of access controls: › Physical controls › Logical controls.
Cybersecurity Summit 2004 Andrea Norris Deputy Chief Information Officer/ Director of Division of Information Systems.
Know the Client Own the Problem Share the Solution The 2005 Case for Information Technology Security October 14, 2004.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Qualitative.
Lecture 11 Reliability and Security in IT infrastructure.
Lesson 1-What Is Information Security?. Overview History of security. Security as a process.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Chapter 8 Information Systems Controls for System Reliability— Part 1: Information Security Copyright © 2012 Pearson Education, Inc. publishing as Prentice.
By Edith Butler Fall Our Security Ways we protect our valuables: Locks Security Alarm Video Surveillance, etc.
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
1Cisco Security NOW © 2003, Cisco Systems, Inc. All rights reserved. THIS IS THE POWER OF CISCO SECURITY. now.
Chapter 2 Information Security Overview The Executive Guide to Information Security manual.
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
© 2009 IDBI Intech, Inc. All rights reserved.IDBI Intech Confidential 1 Information (Data) Security & Risk Mitigation.
 Southwest Florida Local Managed Services Company  Technicians throughout Florida, North Carolina, and New York  Knowledgeable Core Team  Certified.
Copyright, 2005 Pinnacle Entertainment, Inc. 1 Auditing the Windows Network Bart A. Lewin Chief Technology Officer Pinnacle Entertainment, Inc. CS 3-2.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
CS 325: Software Engineering April 14, 2015 Software Security Security Requirements Software Security in the Life Cycle.
BUSINESS B1 Information Security.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Business Plug-In B6 Information Security.
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
Chapter 6 of the Executive Guide manual Technology.
NSF and IT Security George O. Strawn NSF CIO. Outline Confessions of a CIO Otoh NSF matters IT security progress at NSF IT security progress in the Community.
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
OCTAVE-S on TradeSolution Inc.. Introduction Phase 1: Critical Assets and threats Phase 2: Critical IT Components Phase 3: Changes Required in current.
Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security.
IS Network and Telecommunications Risks Chapter Six.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Note1 (Admi1) Overview of administering security.
Information Security What is Information Security?
Completing network setup. INTRODUCTION Course Overview Course Objectives.
Wireless Intrusion Prevention System
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved INFORMATION SECURITY SECTION 4.2.
Module 11: Designing Security for Network Perimeters.
Last Minute Security Compliance - Tips for Those Just Starting 10 th National HIPAA Summit April 7, 2005 Chris Apgar, CISSP – President Apgar &
Information Systems, Security, and e-Commerce* ACCT7320, Controllership C. Bailey *Ch in Controllership : The Work of the Managerial Accountant,
Pro-active Security Measures
Prevent Data Breaches and PII from Walking Out the Door Jim Farrell, Senior Vice President Products Archive Systems 9/18/2015.
Welcome Topic : Security.
Security Environment Assessment. Outline  Overview  Key Sources and Participants  General Findings  Policy / Procedures  Host Systems  Network Components.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
Thomas E. Noonan President and Chief Executive Officer Issues in eBusiness Security.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
IS3220 Information Technology Infrastructure Security
INFORMATION SECURITY AND CONTROL. SECURITY: l Deter l Detect l Minimize l Investigate l Recover.
© ITT Educational Services, Inc. All rights reserved. IS3220 Information Technology Infrastructure Security Unit 10 Network Security Management.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
EAST AFRICAN DATA HANDLERS DATA SECURITY/MOBILITY
AT&T Premises-Based Firewall Enhanced SBS Solution
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Security in Networking
Is it Y2K or Problem-X (not to be confused with Memorex)
Presentation transcript:

Hot Topics in Information Security Rick Shaw – President, CorpNet Security, Inc. Mick Johannes – CTO, CorpNet Security, Inc.

Hot topics in Information Security Internal vulnerability assessment services Intrusion detection solutionsExternal vulnerability assessment services Managed security services Anti-virus solutions Security training and awareness Security policy development and implementation Y2K Reactions vs. Unauthorized System Access/Modification (Y2K Hack) Misuse detection solutions Intranet and VPN solutionsBiometric solutions © 1999 by CorpNet Security, Inc. All rights reserved.

External Vulnerability Assessment evaluate the current state of perimeter access devices and determine the level of risk to outside penetration © 1999 by CorpNet Security, Inc. All rights reserved.

Internal Vulnerability Assessment evaluate access controls, latest versions/patches of software and secure architectures being implemented © 1999 by CorpNet Security, Inc. All rights reserved.

Security policy development/implementation security policies are the road map to a comprehensive Information Security program © 1999 by CorpNet Security, Inc. All rights reserved.

Intrusion detection solutions assists your organization to know when external unauthorized traffic is ‘knocking at your door’ © 1999 by CorpNet Security, Inc. All rights reserved.

Misuse Detection Solutions provides proactive feedback on internal network activity so your organization is aware of ‘insiders’ attempting to access unauthorized or highly sensitive information. © 1999 by CorpNet Security, Inc. All rights reserved.

Security training and awareness a majority of all losses are directly attributed to human error and lack of knowledge includes activation of viruses, release of critical information and unintentional destruction of data © 1999 by CorpNet Security, Inc. All rights reserved.

Intranet and VPN solutions new technologies utilizing high-speed, low cost mediums to create secure points of access between users, hosts and remote facilities © 1999 by CorpNet Security, Inc. All rights reserved.

Y2K Reactions vs. Unauthorized System Access/Modification (Y2K Hack) How will you determine if that problem that occurred over the Dec 31 st weekend was Y2K or a genuine attempt to Hack your system that can be easily misdiagnosed. © 1999 by CorpNet Security, Inc. All rights reserved.

Biometrics solutions new technologies offering user authentication methods including fingerprint, retina scan, facial and voice recognition © 1999 by CorpNet Security, Inc. All rights reserved.

Anti-virus solutions 1999 has been the year of the virus even the smallest virus incident can cost a company hundreds of thousands of dollars only an enterprise anti-virus strategy can help defend against such losses © 1999 by CorpNet Security, Inc. All rights reserved.

Outsourcing of Security Services outsourcing security services such as firewall support, escalation support, intrusion detection, misuse detection, employee awareness reporting and system/audit log management can not only free up limited staff but also offer an additional level of security and support to critical issues. © 1999 by CorpNet Security, Inc. All rights reserved.

Contact Information corpnetsecurity.com Rick ShawMick Johannes © 1999 by CorpNet Security, Inc. All rights reserved.