S ECURE E-S YSTEMS AS A COMPETITIVE ADVANTAGE IN A GLOBAL MARKETS By Cade Zvavanjanja Cybersecurity Strategist By Cade Zvavanjanja Cybersecurity Strategist.

Slides:



Advertisements
Similar presentations
ETHICAL HACKING A LICENCE TO HACK
Advertisements

1 Introduction Welcome! Format of day Response to previous requests from clients Amendment to schedule Using Information Security for Business Advantage.
Computer Fraud Chapter 5.
Possible Threats To Data. Objectives To understand: Types of threats Importance of security Preventative and remedial actions Personal safety This will.
Information Security Policies and Standards
OPM Cybersecurity Competencies by Occupation (Technical Competencies) Information Technology Management Series Electronics Engineering.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Cybersecurity Summit 2004 Andrea Norris Deputy Chief Information Officer/ Director of Division of Information Systems.
Or, How to Spend Your Weekends… Fall 2007 Agenda General Overview of the CISO Arena Technical Security Information Security Strategic Security Kirk Bailey.
Reliability and Security. Security How big a problem is security? Perfect security is unattainable Security in the context of a socio- technical system.
Lecture 11 Reliability and Security in IT infrastructure.
Security Offering. Cyber Security Solutions 2 Assessment Analysis & Planning Design & Architecture Development & Implementation O&M Critical Infrastructure.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
Website Hardening HUIT IT Security | Sep
The Difficult Road To Cybersecurity Steve Katz, CISSP Security Risk Solutions Steve Katz, CISSP Security.
Cybercrime Outlook on African banks Adwo Heintjes Global Head IT Audit & Ops Rabobank.
Oklahoma Chapter Information Systems Security Association Oklahoma Chapter, Tulsa Oklahoma City Chapter, OKC Student Chapter, Okmulgee Oklahoma Chapter,
Securing Information Systems
Information Security– SNO International Zanzibar, Tanzania Joe Beaulac, Sr. Manager – Cyber Defense Center & Risk/Vulnerability Management 23 September.
Financial Advisory & Litigation Consulting Services Risk Management 2006 September 14-15, 2006 The Metropolitan Club, New York, NY Workshop B: Information.
General Awareness Training
Information Security OECD, April 2001 International Computing Centre Managing Information Security Ed Gelbstein, International Computing Centre, Geneva.
Enterprise Computing Community June , 2010February 27, Information Security Industry View Linda Betz IBM Director IT Policy and Information.
Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #6 Forensics Services September 10, 2007.
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
Nata Raju Gurrapu Agenda What is Information and Security. Industry Standards Job Profiles Certifications Tips.
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
Supervision of Information Security and Technology Risk Barbara Yelcich, Federal Reserve Bank of New York Presentation to the World Bank September 10,
What does secure mean? You have been assigned a task of finding a cloud provider who can provide a secure environment for the launch of a new web application.
Information Systems Security Operations Security Domain #9.
Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security.
℠ Pryvos ℠ Computer Security and Forensic Services May 27, 2015 Copyright © 2015 Pryvos, Inc. 1.
The Real Deal With SIM/SEM The Promise of Security Information / Event Management Scott Sidel Sr. Security Manager Computer Sciences Corp.
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
Security Trends & Industry Insights
Scott Charney Cybercrime and Risk Management PwC.
Security and Assurance in IT organization Name: Mai Hoang Nguyen Class: INFO 609 Professor: T. Rohm.
E NGINEERING STUDIES IN T ELECOMMUNICATIONS S ECURITY School of Communication Engineering.
MVHS Career Night 2015 Information Security. Agenda What is Information and Security. Industry Standards Job Profiles Certifications Tips.
Territory Insurance Conference, resilient future Mr Ralph Bönig, Special Counsel, Finlaysons Cyber Times and the Insurance Industry Territory Insurance.
© 2012 IBM Corporation IBM Security Systems 1 © 2012 IBM Corporation Cloud Security: Who do you trust? Martin Borrett Director of the IBM Institute for.
Palindrome Technologies all rights reserved © 2016 – PG: Palindrome Technologies all rights reserved © 2016 – PG: 1 Peter Thermos President & CTO Tel:
Cyber Security for the real world Tim Brown Dell Fellow and CTO Dell Security Solutions.
September 20, 2016 How to Defend Your Organization from a Cyber Breach LTC Tim Bloechl (U.S. Army, Ret.) Director, Cyber Security Business.
Defining your requirements for a successful security (and compliance
Securing Information Systems
Cybersecurity as a Business Differentiator
Increasing Information and Data Security in Today’s Cybersecurity World 2017 Conference Review 6/6/2017.
Issues and Protections
Cybersecurity - What’s Next? June 2017
Team 2 – understand vulnerabilities
Capabilities Matrix Access and Authentication
Strategies & Tactics for Data Security
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
BUILDING A PRIVACY AND SECURITY PROGRAM FOR YOUR NON-PROFIT
Securing Information Systems
I have many checklists: how do I get started with cyber security?
Security Essentials for Small Businesses
Securing the Threats of Tomorrow, Today.
Chapter 9 E-Commerce Security and Fraud Protection
Moving from “Bolt-on” to “Build-in” Security Controls
Cyber Risk & Cyber Insurance - Overview
Cyber Security Culture
IS Risk Management Framework Overview
Neil Kirton and Zoë Newman
Records Management Network
Presentation transcript:

S ECURE E-S YSTEMS AS A COMPETITIVE ADVANTAGE IN A GLOBAL MARKETS By Cade Zvavanjanja Cybersecurity Strategist By Cade Zvavanjanja Cybersecurity Strategist

A GENDA 5 Common Mistakes Is Zimbabwe under threat What is cybersecurity Case for competitive advantage Way forward

Is Zimbabwe under threat??

Some Responses

H ACKERS I NFORMATION W ARRIORS ? Personal motives Retaliate or ”get even” Political or terrorism Make a joke Show off/Just Because Elite Hackers Black Hat Grey Hat White Hat No hat Malicious Code Writers Criminal Enterprises Trusted Insiders Economic gain Steal information Blackmail Financial fraud Inflicting damage Alter, damage or delete information Deny services Damage public image

How is info attacked

T ODAY ’ S T REND TerroristsWhite Collar Crime Open Source Disasters Theft Scripts ID Theft Insider/Espionage

Easy of attacks

Zimbabwe Landscape

Zimbabwe vs. Global Landscape

Process Organization Technology Opt/in/out Regulatory Requirement Security/Pr ivacy Policy Planning and Strategy Program Maturity Program Metrics Cybersecurity Architecture Privacy Strategy Data Classification Analysis Privacy Teams Policy Development Policy Update Plans Decision Management Privacy Support Architecture Awareness Privacy Strategy Data Classification Analysis Privacy Teams Policy Development Policy Update Plans Decision Management Privacy Support Architecture Awareness Privacy Risk Assessments Data Governance Vendor Governance Technology Planning Business Process Review Information Security Information Privacy Privacy Risk Assessments Data Governance Vendor Governance Technology Planning Business Process Review Information Security Information Privacy External Support Infrastructure Privacy Auditing Incident Response Crisis Management Knowledge Management Consumer Support Infrastructure Open Source Intelligence External Support Infrastructure Privacy Auditing Incident Response Crisis Management Knowledge Management Consumer Support Infrastructure Open Source Intelligence - # - 17 People Compliance

18 Ecommerce Site Data Storage Business Interfaces IT/IS/ Developmen t IT/IS/ Developmen t Anti-Virus Firewalls Encryption Security in SDLC Threat Modelling Build Standards Information Security Policies Legislative Compliance Configuration Reviews Patch Management Access Control Reviews Application Testing Penetration Testing Intrusion Detection Vulnerability Assessment Vetting / References Disciplinary Procedure Awareness & Training Holistic IT security

-Technology containment - Process containment - Procedure containment - Engage digital forensics process - Collect evidence - Engage 3 rd party - Detect Incident - Identify source of identified -Log incident - Reduce false positive H IGH L EVEL O VERVIEW Detection Assessment AnalysisContainment Digital Forensics Resolution & Reporting - Determine scope - Assemble Response Team - Collect & sort facts - Determine scope - Assemble Response Team - Collect & sort facts - Notify client - Notify regulators - Remediate - Analyze long term effects - Analyze lessons learned Privacy Incident Response Process

Thank You Tel: