Download presentation
Presentation is loading. Please wait.
Published byJoaquín Barbero García Modified over 6 years ago
1
Cybersecurity classification and protection of information
Lic. Claudio Jorge Tana Gerente de Consultoría NeoSecure S.A. LA LA25999 – CISM - CBCP May 2016
2
Index Cyber Security and Information Protection Reasons for Identification and Classification Main concepts Goals Implementation Summary
3
CyberSecurity Protecting information assets, through treatment of threats that exposed risk the information is processed, stored and transported by information systems that are interconnected. ISACA (Information Systems Audit and Control Association) Monterrey Chapter
4
Differences Between Cybersecurity and Information Security
Seeks to protect information that may affect risk in its different forms and states. Focus on information in digital format and interconnected systems that process, store or transmit. Methodologies, standards, techniques, tools, organizational structures, technology and other elements that support the idea of protection in the various facets of information. Approach with Security. It involves the implementation and management of appropriate security measures, through a holistic approach. Threats and vulnerabilities in cyberspace. Information threats and infrastructure threats. Information Classification. Cybersecurity Information Sharing Classification System.
5
Reasons for classifying information in digital format
Companies need to protect their information today more than ever. The need is obvious but solutions are not. Management must ensure company information is protected. Mobile Technology Cloud Computing Distinguishing Information Classification and Cybersecurity Information Sharing Classification System.
6
Principal Objectives Understand what an effective information classification system should accomplish. Be easy to understand, use and maintain. Focus only on confidentiality. Specially in “Private” and “Confidential” Information. Protecting it from inappropriate access. Apply “least privilege” / “need to know” concepts. Strategy for Information Sharing and Safeguarding.
7
Successful implementation
Identify all information sources and media that need to be protected. Identify information protection measures Authentication Role based Access Encryption Administrative controls Technology control Assurance Map information protection measures to information classes. Classify information. Repeat as needed.
8
Iterative and an on-going process.
Summary Iterative and an on-going process. Information security policy (updated). Standards and procedures (updated). Updated on new technologies. Security awareness. If this sounds like too much work, consider… Without data classification, all decisions about information protection are being made by the discretion and judgement of security, system, and database administrators only
9
Presencia Local en: Argentina Chile Colombia Perú Argentina Carlos Pellegrini 1265 – 6to Piso Teléfono:
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.