Presentation is loading. Please wait.

Presentation is loading. Please wait.

Copyright Security-Assessment.com 2004 New Technology Enforcement Strategies by Peter Benson.

Similar presentations


Presentation on theme: "Copyright Security-Assessment.com 2004 New Technology Enforcement Strategies by Peter Benson."— Presentation transcript:

1 Copyright Security-Assessment.com 2004 New Technology Enforcement Strategies by Peter Benson

2 Copyright Security-Assessment.com 2004

3 The issues Information Loss Perimeter Breakdown Mobile Users New Technology Vulnerabilities Future Directions

4 Copyright Security-Assessment.com 2004 Perimeter Breakdown Perimeters slowly disappearing – VPN – Partner Connections – Home Users – Wireless Insecurities Zones of Trust Testing Security

5 Copyright Security-Assessment.com 2004 Laptop Users Current Laptop Loss Rate >4% Information and hardware costs Theft Prevention on increase Minimum controls required for mobile population – Personal Firewall – AV – Disk Encryption Policy and Security Architecture Requirements Citrix is your Friend!

6 Copyright Security-Assessment.com 2004 New Technology and Information Loss USB Fobs External Memory Cards CD / DVD Writers Common PDA’s Integration of Cell Phone Technology IM VoIP

7 Copyright Security-Assessment.com 2004

8 General Strategies Track New Technology Opportunities Research and define Policy Default Deny Enforce Policy – Technical Controls – Policy Controls – HR Controls – Approval / Authorisation Controls

9 Copyright Security-Assessment.com 2004 VoIP Implement your strategy and policy Architect! Default Deny “Free is not necessarily cost effective” Research Be Proactive. Your people are using this now.

10 Copyright Security-Assessment.com 2004 Instant Messaging Manage malicious code via A/V or other means Control at the gateway – Default Deny – Man in the Middle inspection Have approved processes and systems

11 Copyright Security-Assessment.com 2004 Mobile Storage Devices Encrypt removable media USB management of storage devices Flash memory security Allow managed access to USB storage devices Block illegal software installation Block.exe.com.vbs.mp3 files etc Printer, modem permissions management Client side content filtering of removable media

12 Copyright Security-Assessment.com 2004 Mobile Communications Discover your Mobile Perimeter – Asset Database, exposure management – Capture changes to Mobile Perimeter – Vulnerabilities – Connections Control Connectivity Control Mobile Information Security – Encryption – A/V – Content

13 Copyright Security-Assessment.com 2004 Emerging Enforcement Technologies Reflex Magnetics, Reflex Disk Net Pro Trust Digital, Trust Enterprise Mobile Suite Asset Discovery and Management Anti-Spyware for Enterprises Connection Enforcement Enterprise Quality Encryption for Laptops / Mobile Systems Application Aware Firewalls MITM Proxys Fractured Networks (zones of trust)

14 Copyright Security-Assessment.com 2004

15 Thank You Questions?


Download ppt "Copyright Security-Assessment.com 2004 New Technology Enforcement Strategies by Peter Benson."

Similar presentations


Ads by Google