CYBER SECURITY PRACTICES: AN EXPERT PANEL DISCUSSION February 12, 2015 Harvard Business School Association of Boston.

Slides:



Advertisements
Similar presentations
© 2013 Bradford Networks. All rights reserved. Rapid Threat Response From 7 Days to 7 Seconds.
Advertisements

© 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential 14854_10_2008_c1 1 Holistic Approach to Information Security Greg Carter, Cisco Security.
1 1 Risk Management: How to Comply with Everything July 11, 2013.
Classification The Threat Environment Joyce Corell, NCSC Assistant Director for Supply Chain National Defense Industrial Association Global Supply Chain.
Securing the Digital Environment Technology Risk Management - A Caribbean Perspective Monday November 10 th 2014 Roshan Mohammed.
Recent Trends and Insurance Considerations March 2015
Challenges and Opportunities in Cyber Security Innovation Paul Barford Qualys Inc. and University of Wisconsin Fall, 2011.
The New World of Security for Business Travellers Anurag Lal Senior Vice President Strategic Services & Business Development Wi-Fi Business Development.
August 9, 2005UCCSC Converting Policy to Reality Building Campus Security Programs Karl Heins -- Director of IT Audit Services Office of the University.
Contact Center Security Strategies Grant Sainsbury Practice Director, Dimension Data.
SMARTER. TOGETHER. Skimming Prevention: Overview of Best Practices August 5, 2014.
Information Security in Real Business Yuri & The Cheeseheads.
Introduction to Network Defense
Skybox® Security Solutions for Symantec CCS Comprehensive IT Governance Risk and Access Compliance Management Skybox Security's.
Vulnerability Management Dimension Data – Tom Gilis 24 November 2011.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Information Security Update CTC 18 March 2015 Julianne Tolson.
What Keeps You Awake at Night Compliance Corporate Governance Critical Infrastructure Are there regulatory risks? Do employees respect and adhere to internal.
WHAT EVERY RISK MANAGER NEEDS TO KNOW ABOUT DATA SECURITY RIMS Rocky Mountain Chapter Meeting Thursday, July 25, :30 am – 12:30 pm.
FIVE STEPS TO REDUCE THE RISK OF CYBERCRIME TO YOUR BUSINESS.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
AUGUST 25, 2015 Cyber Insurance:
Data Center Firewall. 2 Common IT Security Challenges Does my network security protect my IT environment and sensitive data and meet the regulatory compliances?
SME Security. Articulate the major security risks and legal compliance issues for an SME.Explain and justify approaches of investment on InfoSec controls,
The State of Computer & Data Security in Corporations Independent Survey.
UWM CIO Office Institutional Data Privacy and Security Presenter: Steve Brukbacher, Information Security Architect Moderated by: Bruce Maas, CIO November.
Cloud Compliance Considerations March 24, 2015 | Jason Smith, CISSP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Herbert Thompson, Ph.D., CISSP Chief Security Strategist People Security Software Security.
IT Security – Scanning / Vulnerability Assessment David Geick State of Connecticut IT Security.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Introduction.
FFIEC Cyber Security Assessment Tool
Panel: Engineering Discipline in Cyber Security Steve Orrin, Chief Technologist, Intel Federal, Intel Coporation.
Data Security & Privacy: Fundamental Risk Mitigation Tactics 360° of IT Compliance Anthony Perkins, Shareholder Business Law Practice Group Data Security.
ONLINE SAFETY AND SECURITY Computer Basics 1.5. INFAMOUS CYBER ATTACKS IN 2014 Sony Pictures: Attackers stole just about everything in the corporate network,
Compliance is Pretty Important, I Guess Florida Gulf Coast ARMA Meeting.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Security Mindset Lesson Introduction Why is cyber security important?
MIS5001: Information Technology Management Ethics and Continuity Management Larry Brandolph
Deck 5 Accounting Information Systems Romney and Steinbart Linda Batch February 2012.
CYBERSECURITY: RISK AND LIABILITY March 2, 2016 Joshua A. Mooney Co-chair-Cyber Law and Data Protection White and Williams LLP (215)
Your Cyber Security: The scope of your risk is broad and growing To understand the nature of the risk landscape look at the presentations here today-begin.
BYOD: An IT Security Perspective. What is BYOD? Bring your own device - refers to the policy of permitting employees to bring personally owned mobile.
1© Copyright 2016 EMC Corporation. All rights reserved. VIEWTRUST SOFTWARE OVERVIEW RISK MANAGEMENT AND COMPLIANCE MONITORING.
Proprietary & Confidential 1 Paul Falor, VP of IT, North Highland Friday, May 20th Cyber Security PayCLT.
Defining your requirements for a successful security (and compliance
Information Security Program
Comprehensive Security and Compliance at an Affordable Price.
Cloud Firewall.
Educause/Internet 2 Computer and Network Security Task Force
BEST PRACTICES FOR AN IT SECURITY ASSESSMENT
OHIMA 2010.
Data Center Firewall.
Team 4 – Mack, Josh, Felicia, Kevin and Walter
Can Cyber Insurance Stand in the Data Breach
Managing Director and Head of Group Legal & Secretariat DBS Bank
GDPR Awareness and Training Workshop
Network Access Control 101 Securing the Critical Edge of Your Network
Institutional Privacy Challenges
Information governance and information security
cyberopsalliance.com |
به نام خداوند بخشنده و مهربان.
Risk Analysis and HIPAA Security
Cyber Risk & Cyber Insurance - Overview
I UNDERSTAND CONCEPTS OF CYBERSECURITY
AMI Security Roadmap April 13, 2007.
IS Risk Management Framework Overview
Presentation transcript:

CYBER SECURITY PRACTICES: AN EXPERT PANEL DISCUSSION February 12, 2015 Harvard Business School Association of Boston

Major Breaches in 2014 Sony Target Home Depot JP Morgan Neiman Marcus rticle/ /security0/worst- security-breaches-of-the-year sony-tops-the-list.html

Security concerns? Enterprise data and data breaches – It’s not just SSN and credit card numbers, e.g. Sony – Balancing act – security and ease of use are inversely related Governance, Risk, Compliance – Regulations (HIPAA, PCI, SEC, SOX) – Impact to business – trade secrets, IP, trust, costs Dangers – Assessment, complexity, adherence

Considerations Culture of security Education Policies Assets * Vulnerabilities * Threats = Risk Network security Endpoints Information transfer Physical