Click to edit Master title Information Security: A Discussion Wednesday, December 6, 2006 Bob Steadman Director, National IT Security Sobeys.

Slides:



Advertisements
Similar presentations
Ethics, Privacy and Information Security
Advertisements

Lynn Ray ISO Towson University Strategic Planning for IT Security Copyright Lynn Ray, This work is the intellectual property rights of the author.
Building an Effective Compliance Architecture Alan Weintraub Sr. Director Hummingbird
“High Performing Financial Institutions and the Keys to Success in an Uncertain Environment”
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
1 Risk Management at Progressive Insurance How we got started Getting corporate support Capital Management Examples of deliverables The value risk management.
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
Fair competition commission Mobile and Cyber Threat Issues Joshua Msoma Tanzania Fair Competition Commission Sixth Annual African Dialogue Conference Lilongwe,
By Ashlee Parton, Kimmy McCoy, & Labdhi Shah
Security Controls – What Works
Advantages of IT Security Prof. Uldis Sukovskis, CISA Riga Information Technology Institute Secure information exchange in Electronic media Baltic IT&T.
WHY CHOOSE CEO-PE?  We employ International Association of Privacy Professionals (IAPP) Certified and Health Insurance Portability & Accountability Act.
Current Information Technology Issues Norbert Mika NJ Mika Consulting Inc.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Contact Center Security Strategies Grant Sainsbury Practice Director, Dimension Data.
(Geneva, Switzerland, September 2014)
Data Protection in Higher Education: Recent Experiences in Privacy and Security Institute for Computer Law and Policy Cornell University June 29, 2005.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
“The Impact of Sarbanes Oxley, An Evolving Best Practice” Ellen C. Wolf Senior Vice President & Chief Financial Officer American Water National Association.
Electronic Banking BY Bahaa Abas Noor abo han. Definition * e-banking is defined as: …the automated delivery of new and traditional banking products and.
Maintaining & Reviewing a Web Application’s Security By: Karen Baldacchino Date: 15 September 2012.
Bank Crime Investigation Techniques by means of Forensic IT
1 ZIXCORP The Criticality of Security Dena Bauckman Director Product Management April 2015.
Chapter 4 Internal Controls McGraw-Hill/Irwin
Company LOGO Copyright Carrie Kerskie Data Breach & Identity Theft By Carrie Kerskie Kerskie Group, Inc.
Are you Confident that data in your non-production systems is secured?
Self-Assessment » Find a Consultant » Links & Resources » News & Headlines » Educational & Training Resources » Steve Peters, President Community Information.
Securing Information Systems
© 2009 IDBI Intech, Inc. All rights reserved.IDBI Intech Confidential 1 Information (Data) Security & Risk Mitigation.
Enterprise Computing Community June , 2010February 27, Information Security Industry View Linda Betz IBM Director IT Policy and Information.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Audits & Assessments: What are the Differences and How Do We Learn from the Results? Brown Bag March 12, 2009 Sal Rubano – Director, Office of the Vice.
Lessons Learned in Smart Grid Cyber Security
Enw / Name. How legislation affects business computer users How important is health and safety legislation to a business and how does it affect a workers.
1 Brett Roberts Director of Innovation | Microsoft NZ | 28 Aug 07 Technology and Privacy.
Chapter 3 Internal Controls.
BUSINESS B1 Information Security.
IT security By Tilly Gerlack.
Virtual techdays INDIA │ 9-11 February 2011 Security Discussion: Ask the Experts M.S.Anand │ MTC Technology Specialist │ Microsoft Corporation Anirudh.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Business Plug-In B6 Information Security.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
8.1 © 2007 by Prentice Hall Minggu ke 6 Chapter 8 Securing Information Systems Chapter 8 Securing Information Systems.
Looking beyond the obvious!! HOW SECURE IS BANKS’ CORE DATA? Prashant Pande Head Professional Services IDBI Intech Ltd.
7 Information Security.
What does secure mean? You have been assigned a task of finding a cloud provider who can provide a secure environment for the launch of a new web application.
Protecting Your Business! SBA Ft. Lauderdale November 15, 2006 Gregory Levine, Sr. Director Marketing.
Computer viruses The effects of a virus are…  Slow loadings  Crashing  Not having control over the computer  Deleting documents.
IT Strategy for Business © Oxford University Press 2008 All rights reserved Chapter 12 IT Security Strategies.
13-1 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 13 Information Technology for Business.
Bank Audit. Internal Audit Internal audit is an independent, objective assurance activity and can give valuable insight in providing assurance that major.
1 GSC: Standardization Advancing Global Communications ISACC Opening Plenary Presentation GSC-11 SOURCE:ISACC TITLE:ISACC Opening Plenary Presentation.
RISK MANAGEMENT : JOURNEY OR DESTINATION ?. What is Risk? “ Any uncertain event that could significantly enhance or impede a Company’s ability to achieve.
Territory Insurance Conference, resilient future Mr Ralph Bönig, Special Counsel, Finlaysons Cyber Times and the Insurance Industry Territory Insurance.
Data Security & Privacy: Fundamental Risk Mitigation Tactics 360° of IT Compliance Anthony Perkins, Shareholder Business Law Practice Group Data Security.
About Us AVG is a global security software maker protecting 98 million active users in 170 countries from the ever-growing incidence of Web threats, viruses,
CYBERSECURITY: RISK AND LIABILITY March 2, 2016 Joshua A. Mooney Co-chair-Cyber Law and Data Protection White and Williams LLP (215)
Operational Resilience DR’s Big Data Dilemma September 16, 2015 Datalink IT Resiliency Practice.
Trinity Industries, Inc. FEI Presentation May 31, 2012.
CLOSE THE SECURITY GAP WITH IT SOLUTIONS FROM COMPUTACENTER AND CISCO AUGUST 2014.
Cyber Insurance Risk Transfer Alternatives Heather Soronen - Operations Director Rocky Mountain Insurance Information Association.
Securing Information Systems
Cyber Insurance Risk Transfer Alternatives
Securing Information Systems
CPA Gilberto Rivera, VP Compliance and Operational Risk
Network security threats
Securing Information Systems
Prepared by: Yazan Metwalli(148371) Moyad Habiballah(137535)
Presentation transcript:

Click to edit Master title Information Security: A Discussion Wednesday, December 6, 2006 Bob Steadman Director, National IT Security Sobeys

December 6, 2006Iroquois Ridge High School Agenda 1.Why protect information and computer systems? 2.Briefly describe methods of protection. 3.What are the major privacy and security issues related to information and technology? 4.Identify the specific security measures e-businesses provide for consumers. 5.Highlight a current security issue.

December 6, 2006Iroquois Ridge High School Security Made Easy

December 6, 2006Iroquois Ridge High School 1. Why protect information and computer systems? When we leave for work in the morning, we automatically lock our doors. We need to have the same automatic locks for our computers.

December 6, 2006Iroquois Ridge High School It only happens to others...doesn’t it?

December 6, 2006Iroquois Ridge High School

December 6, 2006Iroquois Ridge High School

December 6, 2006Iroquois Ridge High School

December 6, 2006Iroquois Ridge High School

December 6, 2006Iroquois Ridge High School

December 6, 2006Iroquois Ridge High School 1. Why protect information and computer systems? Evolution of Hacking Historical (websites – playful disruption) Present (cyber terrorism) Hollywood Hype: War Games; Hackers; Firewall Business Impact Direct / Indirect Financial Loss Corporate Image and Market Impact

December 6, 2006Iroquois Ridge High School 2. Briefly describe methods of protection. Security Strategy Security Architecture: Policies, People & Process Preventive Controls: Technology, Tools & Techniques Detective Controls: Management Monitoring & Review Convergence of Control

December 6, 2006Iroquois Ridge High School 3. Major privacy/security issues related to information & technology? Compliance SOX Bill 198 PCI Privacy PIPEDA Identity Theft Confidentiality Litigation

December 6, 2006Iroquois Ridge High School Canadian Rules Bill 198 (Ontario) –Amends Canadian Securities Act –Broadens OSC powers –Penalties for non- compliance –Directs regulators to enhance investor confidence CANADIAN INVESTOR CONFIDENCE MEASURES: –National Instrument Auditor Oversight –Multilateral Instrument –Multilateral Instrument (Similar to various rules from SEC/PCAOB) Audit Committees Multilateral Instrument

December 6, 2006Iroquois Ridge High School 4. Identify specific security measures e-businesses provide consumers. Privacy Policy Encryption (SSL) Insurance mitigation Apologies –Banks –Visa –Amex

December 6, 2006Iroquois Ridge High School 5. Highlight a current security issue. Risk Gap Enemy Within (still highest%) ATM / Gas Station Protecting Customer Data/Information Viruses / Spam / Spyware / Adware McAfee –Bots; MPEG; Mobile Phone; Malware Identity Theft Wireless

December 6, 2006Iroquois Ridge High School RISK GAP unmitigated exposures (threats) and missed opportunities CONTROL REQUIREMENTS increasing rate of change increased change brings increased risk increases control requirements TIME Quality of Controls Time-to-market pressures leave companies uncertain over the quality of controls that they have in place. >> need to identify the nature of the “Risk Gap” …and provide recommendations for closing the gap! The “Risk Gap” in Technology Environments

December 6, 2006Iroquois Ridge High School In organizations' scramble for competitive advantage and the haste to quickly utilize information technology, issues of control are sometimes subverted by operational priorities Facilitating Strategic IT Investment Decisions

December 6, 2006Iroquois Ridge High School The Security Balance Security is a balancing act between ease of access to information and protecting that information from increasing threats

December 6, 2006Iroquois Ridge High School SEC- -Y The key to security awareness is embedded in the word security Awareness Message

December 6, 2006Iroquois Ridge High School