Advanced Virus Protection: A Strategic Blueprint to Repel the Next Attack Presented by Paul Schmehl Information Security Officer University of Texas at.

Slides:



Advertisements
Similar presentations
Presented by Nikita Shah 5th IT ( )
Advertisements

Collecting Information about the Problem
Advanced Networks and Computer Security Curt Carver & Jeff Humphries © 1999 Texas A&M University.
For Official Use Only. Public Health and EMS How Long Do You Have to Live? For Official Use Only.
SL21 Information Security Board Mission, Goals and Guiding Principles.
DOs & DON’Ts of EARLY VOTING Michael Winn Director of Elections Travis County Texas.
Is There a Security Problem in Computing? Network Security / G. Steffen1.
© 2005, QEI Inc. all characteristics subject to change. For clarity purposes, some displays may be simulated. Any trademarks mentioned remain the exclusive.
Framework for Improving Critical Infrastructure Cybersecurity NIST Feb 2014.
Access Control Chapter 3 Part 5 Pages 248 to 252.
Conflict and Consent: Managing Disclosure in Human Subjects Research University of Miami Human Subjects Research Office Conflict of Interest Symposium.
You are connected Critical Infrastructure Protection and Resilience Tabletop Exercise Strengthening our Nation’s infrastructure Month 00, 2010.
Information Security Policies and Standards
SIRT Contact Orientation Security Incident Response Team Departmental Security Contacts April 16, 2004.
seminar on Intrusion detection system
Barracuda Spam & Virus Firewall. Introduction to the Barracuda Spam & Virus Firewall Complete server protection –Spam Blocking (95+ percent) Extremely.
CISCO CONFIDENTIAL – DO NOT DUPLICATE OR COPY Protecting the Business Network and Resources with CiscoWorks VMS Security Management Software Girish Patel,
Presented by INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used?
University of Missouri System 1 Security – Defending your Customers from Themselves StateNets Annual Meeting February, 2004.
Information Security OECD, April 2001 International Computing Centre Managing Information Security Ed Gelbstein, International Computing Centre, Geneva.
2015 ANNUAL TRAINING By: Denise Goff
Physical Security By: Christian Hudson. Overview Definition and importance Components Layers Physical Security Briefs Zones Implementation.
Thursday, January 23, :00 am – 11:30 am. Agenda  Cyber Security Center of Excellence  Project Phase  Implementation  Next Steps 2.
FORESEC Academy FORESEC Academy Security Essentials (II)
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
FRAUD Prevention & Detection. Group Members Raven Smith Tommy Harville Kedron Hilario.
State Data Center Oregon Consumer Identity Theft Protection Act Information Forum October 31, 2007.
The Managers Role in Customer Service
Managing Data Against Insider Threats Dr. John D. Johnson, CISSP.
INCIDENT RESPONSE IMPLEMENTATION David Basham University of Advancing Technology Professor: Robert Chubbuck NTS435.
Recent Cyber Attacks and Countermeasures September 2006.
Note1 (Admi1) Overview of administering security.
A Presentation to FMI January 2011 Betty-Anne Pratt, CA Provincial Comptroller Province of Manitoba.
Knowing What You Missed Forensic Techniques for Investigating Network Traffic.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #22 Secure Web Information.
Wait for the Police? Is this a sufficient defensive strategy for an Active Killer event? Tragic events in schools, churches, hospitals, malls, and workplaces.
Networked Systems Survivability CERT ® Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA © 2002 Carnegie.
©Dr. Respickius Casmir Network Security Best Practices – Session 2 By Dr. Respickius Casmir.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Network Forensics - III November 3, 2008.
District Test Coordinators Training. Organized into short modules Clear objectives and questions for discussion Designed to be delivered to district and.
Assuring Reliable and Secure IT Services Chapter 6.
District Test Coordinators Training. Policy Contacts.
Joe Budzyn Jeff Goeke-Smith Jeff Utter. Risk Analysis  Match the technologies used with the security need  Spend time and resources covering the most.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Moving to BYOD Gary Audin 1.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Risk Controls in IA Zachary Rensko COSC 481. Outline Definition Risk Control Strategies Risk Control Categories The Human Firewall Project OCTAVE.
Building Our IT Security Lines of Defense Working together to protect Government’s IT systems.
Chapter 14.  Upon completion of this chapter, you should be able to:  Identify different types of Intrusion Detection Systems and Prevention Systems.
Physical Security at Data Center: A survey. Objective of the Survey  1. To identify the current physical security in data centre.  2.To analyse the.
Child safe guarding Child protection in your organisation.
New Hanover County Schools Managing Crisis Events
Jane Drews University IT Security Officer EDUCAUSE On-line 2009
Managing Secure Network Systems
Responding to Intrusions
BUILDING A PRIVACY AND SECURITY PROGRAM FOR YOUR NON-PROFIT
Cyber Security coordination in Europe CERT-EU’s perspective
Information Security Board
Office 365 Security Assessment Workshop
IS4680 Security Auditing for Compliance
Your communications approach
Introduction to Systems Security
Keeping your data, money & reputation safe
Physical Security.
District Test Coordinators Training
IS4680 Security Auditing for Compliance
Access Control and Site Security
Basic Systems Management Employing Security Policies
ALICE Training.
Presentation transcript:

Advanced Virus Protection: A Strategic Blueprint to Repel the Next Attack Presented by Paul Schmehl Information Security Officer University of Texas at Dallas

Why Virus Outbreaks Occur We’re unaware Virus Alert Lists Notification Services Security Discussion Lists

Why Virus Outbreaks Occur, II We’re unprepared No plan in place No procedures defined No protection in place

How To Design Policies That Work Define the problem Define the policy’s purpose Define the policy’s scope Define the policy’s limitations Define the policy’s enforcement

The Do’s and Don’ts Of Awareness Training Do include everyone Do establish credibility Do be consistent Don’t assume user knowledge Don’t cry wolf

How To Identify Your Weaknesses Pay attention to the obvious Leverage your experiences Learn from the mistakes of others Mine gold from your vendors Turn lemons into lemonade

Effective Protective Measures Cover every desktop, no exceptions Don’t forget your servers Lock the doors and keep them out Don’t let the buggers out Localize the problems

Effective Detective Measures Reverse intrusion detection Honeypots Get specific Use the tools you have Leverage your existing products

Designing An Effective Response System Multiple monitoring methods Define the response roles Make your decisions beforehand Don’t overreact to the crisis Always debrief

Putting It All Together Design sound policies Preach security awareness Identify the weaknesses Develop effective countermeasures Respond proportionately

Thank you. Questions, comments?