Download presentation
Presentation is loading. Please wait.
Published byEmerald Strickland Modified over 9 years ago
1
Information Security Zero to 60 in 10 Years Howard Muffler, Information Security Officer Joseph Progar, Information Security Analyst Embry-Riddle Aeronautical University
2
BUSINESS IMPERATIVES
3
Past: Business Imperatives Create a “Web Presence” –Convey information –Market to current and prospective customers Expand research capabilities Explore new markets – local to global –Reach a wider audience –Defend against competitors Enhance student life
4
Past: Business Imperatives Develop online classes and classrooms Transition IT from service provider to business driver Security imperatives growing as well: –Pay more attention to information protection! –Recognize the Internet as a dangerous place
5
Present: Business Imperatives Internet = Requisite business tool –Anytime Anywhere –Empower constituents More Self-Services More communication and collaboration –Continue to innovate – expand markets further –Think like an entrepreneur – act like a business
6
Present: Business Imperatives Security is a bigger concern than ever –Don’t end up “In the News” (involuntarily) –Understand risks; mitigate vulnerabilities –Formalize security responsibility and functions –Ensure legal and regulatory compliance
7
Future: Business Imperatives Continue expansion in global markets Deliver product anytime and anywhere Expand brand recognition Concentrate on niche competencies
8
Future: Business Imperatives Security will continue to be critical –Imbed awareness into organization culture –Provide security which doesn’t conflict with education, productivity, & job responsibilities –Preserve constituent privacy –Ensure continued legal and regulatory compliance
9
ATTACKS
10
Past: Attackers and their Motives Attacker Researchers Teenagers Motivation Proof of Concept Fame / Infamy
11
Past: Common Attacks Viruses Worms Trojans DOS Web defacement Scanning Sniffing
12
Present: Attackers and their Motives Attacker Well educated individuals Organized crime Motivation Money Power
13
Present: Common Attacks Viruses, Worms, Trojans –Root Kits –Bot Nets –Key loggers DDOS Phishing
14
Future: Attackers and their Motives Attacker Well educated criminals Ideologies and Businesses Motives Money Politics
15
Future: Common attacks Viruses, Worms, Trojans –Bot Nets –Blended threats Encryption –Holding data hostage
16
NETWORK
17
Past: Network
18
Present: Network
19
HOST Anti-VirusHIDSPolicy SERVER Anti-VirusLoggingPolicy Network NetflowIDSIPSACLs Present: Network Defense in Depth
20
Future: Network
21
ERAU SECURITY RESPONSE
22
Past: Security Response Moving away from Laissez Faire (B.I.) Early safeguards mostly afterthoughts Focused on virus protection and basic network security (perimeter protection) Equipment misuse > info protection SPAM threat not yet fully appreciated Y2K = Resource hog
23
Past: Security Response Higher Ed = Prime hacker target (why?) “Selling” security to upper management Growing appreciation of “Insider” threat Virus concerns = “Trio of Trouble” Plus Stronger efforts re: Regulatory compliance
24
Present: Security Response Formalization of security responsibilities Creation of formal polices and procedures Creation/expansion of education and awareness programs IT leadership in incident response First formal Risk Assessment study
25
Future: Security Response Continue to view security holistically Expand policies and procedures (ISO) Address new “compliance hammers” Formalize incident response – Not just IT Repeat Risk Analysis regularly Implement security measures which don’t just target specific vulnerabilities (adaptive, heuristic)
26
Five Steps to an Effective Information Security Program 1.Get Upper Management Support 2.Start Small 3.Adopt a Multilayered Approach 4.Keep Security Flexible 5.Improve Continuously
27
Thank You! Q & A
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.