Thomas Ianuzzi, CPP, CISSP, CFE, CCE Information Security Consultants, Inc.

Slides:



Advertisements
Similar presentations
© 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential 14854_10_2008_c1 1 Holistic Approach to Information Security Greg Carter, Cisco Security.
Advertisements

The Financial Modernization Act of 1999, also known as the Gramm-Leach-Bliley Act (GLBA) UNDERSTANDING AND DEVELOPING A STRATEGIC PLAN TO BECOME COMPLIANT.
Securities Investor Protection in the context of the Recent Financial Crisis – Hong Kong’s Experience 2-3 November 2009 Irene Tang Associate Director,
Information Security Jim Cusson, CISSP. Largest Breaches 110, NorthgateArinso, Verity Trustees 6, Aurora St. Luke's Medical.
Managing Your Credit 2014/2015 Office of Student Financial Assistance.
Section 6.3 Protecting Your Credit. Billing Errors and Disputes Notify your creditor in writing Notify your creditor in writing Pay the portion of the.
E-Commerce Security Issues. General E-Business Security Issues Any E-Business needs to be concerned about network security. The Internet is a “ public.
Security Concerns at Offshore Development Centers MIS Practicum Presentation Week 6 Ashish Bahety.
1 Outsourcing Contract and Service Level Issues Sharon O’Bryan Week 5 November 2, 2004.
Security Controls – What Works
What Should You Do If OSHA Knocks Mark McDaniel, INSafe Consultant.
Cash and Internal Control
Chapter 12 Auditing the Human Resource Management Process McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved.
Why Comply with PCI Security Standards?
Security Posture Assessment (SPA) Headquarters: Ofisgate Sdn Bhd ( A), 2-15 Jalan Jalil Perkasa 13 Aked Esplanad, Bukit Jalil, Kuala Lumpur,
Forensic Accountant Steven Auerbach. Forensic Accountant  Forensic accountants are experienced auditors and investigators of financial documents who.
Introduction to Management Information Systems I Overview of Business Processes.
INTERNAL AUDIT - ACCOUNTS RECEIVABLE AND COLLECTIONS AUDIT University of Washington August 11, 2011 Kim Herrenkohl, Director Western Washington University.
1 Careers in the field of FINANCE: It’s all about the MONEY! Compiled by Dotty Harshberger Paul V. Moore High School.
How to be successful in business. Student: Bâlbâe Ioana ROMANIA.
IT Assurance and Reliability Why Should You Care? Richard Oppenheim, CPA, CITP President, SysTrust Services Corporation Presented to ISACA Regional Meeting.
Cybercrime Outlook on African banks Adwo Heintjes Global Head IT Audit & Ops Rabobank.
Chapter 15 Conflicts of Interest in the Financial Industry.
Advice from CPAs Ten Ways To Protect Your Business.
Key to the Future Chapter 2, Lesson 2 Warm-Up Questions CPS Questions Note for teacher: Use “Pick a Student” button in CPS.
Click here for Game Rules & InstructionsClick here for Game Rules & Instructions: Copyright.
The Financial Impact of Cyber Security 50 Questions Every CFO Should Ask A publication of the American National Standards Institute and the Internet Security.
1 The Starting Line for business. 2 Successful entrepreneurs are: Ambitious…want more out of life Motivated…to achieve goals Passionate… about what they.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Protecting Seniors Against Financial Abuse Jane Rooney, Financial Literacy Leader Edmonton Financial Elder Abuse Roundtable April 23, 2015.
PCI DSS Readiness Presented By: Paul Grégoire, CISSP, QSA, PA-QSA
Capital Formation Montana Money School State Auditor John Morrison.
Bank Secrecy Act (BSA) Office of Foreign Assets Control (OFAC)
3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America,
Introduction to HR Management
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
WHAT HAS CHANGED SINCE OUR LAST MEETING? Stephen P. Harbeck President and CEO SECURITIES INVESTOR PROTECTION CORPORATION HOHHOT, CHINA 2008.
Attract & Retain Your Employees Build & Preserve Your Business Protect Your Family Larry Ricke and Mike Ricke are registered representatives offering securities.
Protecting Your Organization Identity Theft and Data Breach.
Intuit Master Builder 2003 System Tour Intuit Master Builder 2003 We need that estimate today! It takes me 2 days to get out that billing. Where’s our.
Put your company logo here Confidential Data Upgrade from 8.x to 9.0.
A PRACTICAL GUIDE TO RESPONDING TO A HEALTHCARE DATA SECURITY BREACH May 19, 2011 | State College, PA Matthew H. Meade Stephanie Winer-Schreiber.
The State of Computer & Data Security in Corporations Independent Survey.
℠ Pryvos ℠ Computer Security and Forensic Services May 27, 2015 Copyright © 2015 Pryvos, Inc. 1.
Custom Corporate Consulting and Training Fraud: Detecting and Preventing Presented October 30, 2010 To University of Texas at Arlington Executive MBA Students.
Prepared by Dept. of Information Technology & Telecommunications, November 19, 2015 Application Security Business Risk and Data Protection Gregory Neuhaus.
Unit 9: Electronic Fraud Professor Thomas Genovese.
APA – Fundamentals of Payroll Chapter 2 – Payroll Systems March 10, 2012.
ABC Company Introducing Our Expanded Client Services Platform insert contact info.
Chapter 6 Payroll Schemes.
Common Mistakes Organizations Make in their HR Business Practices By Kimberly A. Benjamin,PHR,CERP,CBSP.
1 Chapter 6: Human Resources The Functions of Human Resources Management Looking for the Right Employee HR uses a variety of recruitment sources to hire.
By Celine and Josh.  A loss caused by customer theft, fraudulent payment, or nonpayment  Shoplifting costs retailers billion dollars a year, according.
Real Estate Assistant Program Developed for Coldwell Banker Residential Brokerage Colorado
Protecting Your Assets By Preventing Identity Theft 1.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
ShapeShifter Jennifer Nguyen, Jordan Travis, Cian Connor, Rebecca Miller.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
Online Banking. Learning Objectives To learn how society has been affected by online banking.
GLENCOE / McGraw-Hill. Accounting: The Language of Business.
Comparing Merchant Credit Card Accounts Having a merchant charge account is essential to running a modern business as more consumers eschew cash for debit.
Thomas Ianuzzi, CPP, CISSP, CFE, CCE. In 2007 Companies Reported  Almost 1/3 of companies reported a loss  Average loss was over $350,000  About 1/5.
CSCE 548 Secure Software Development Security Operations
Conflicts of Interest in the Financial Industry
E&O Risk Management: Meeting the Challenge of Change
Understanding Cyber Insurance NASCUS/CUNA Cybersecurity Symposium
Security Essentials for Small Businesses
Neopay Practical Guides #2 PSD2 (Should I be worried?)
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
Presentation transcript:

Thomas Ianuzzi, CPP, CISSP, CFE, CCE Information Security Consultants, Inc.

It Evolved

DATA LOSS -- U.S. More on $275K Settlement The Register reports on ChoicePoint's settlement with the Federal Trade Commission. ChoicePoint will pay $275,000 and will get independent assessments of its data securitysettlement MD Bank Dumps Identities into Trash Reported by: Joce StermanJoce Sterman It's a local bank you trust with your money and your personal information. But the M&T branch in Rodgers Forge didn't shelter all of some peoples' secrets Lawsuits over Heartland data breach folded into one Banks, credit unions want to be compensated for breach- related costs Computerworld - A lawsuit consolidating 16 separate class- action complaints brought by financial institutions against Heartland Payment Systems Inc. has been filed in U.S. District Court for the Southern District of Texas. Federal Web sites knocked out by cyber attack Jul 7 10:04 PM US/Eastern By LOLITA C. BALDOR

Even if you have a comprehensive security program, there may be serious gaps.

 You can stop haphazard development in its tracks  A proactive approach to security will reduce the risk level you experience. In addition, it can provide your organization with surprising benefits

Investors love it because it reduces their risk. A comprehensive security program is a major sales tool. Properly documented and presented, it can set you apart from the crowd and cinch crucial sales. A strong hiring program results in improved morale for all employees, higher productivity and may prevent you from making the costliest mistake a company can make. Hiring the wrong person. When your customers understand how well you protect their interests, your reputation soars.

When you manage information technology assets securely and proactively, your equipment costs and your downtime drop dramatically. When you work to protect your employees both on and off the job, their loyalty protects your business. When you are prepared for disaster, you strengthen your community as well as your company and your bottom line With a pervasive security culture, you will see the benefits on the bottom line. Your superior management capability will attract the best customers, investors and employees. Key people who want to be involved in your success

The first step to great security is to know exactly where you stand.

 IT standards  ISO or others  Accounting controls  HR practices  Business continuity  Best practices

Levels of Maturity More Mature Less Mature Non Existent Ad hoc Repeatable but Intuitive Defined Process Managed & Measurable Optimized

Logical testing (vulnerability and penetration testing) Social engineering Testing of disaster recovery plans

 Initial training and signoff  Refresher training  Training in protecting and using their laptops and home computers.

Internal Audit IT Auditor CPA Audit SAS 70 – Tier 1 – Tier 2

Contact Information Security Consultants, Inc. to thoroughly secure your business.