Cyber Security Gloria Stephenson

Slides:



Advertisements
Similar presentations
| University of Missouri Copyright ©2006 MOREnet and The Curators of the University of Missouri Information sharing the MOREnet way: How not.
Advertisements

Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Know the Client Own the Problem Share the Solution The 2005 Case for Information Technology Security October 14, 2004.
| University of Missouri Copyright ©2007 MOREnet and The Curators of the University of Missouri Statenet Security on the cheap and easy Beth.
University of Missouri System 1 Security – Defending your Customers from Themselves StateNets Annual Meeting February, 2004.
MOREnet Service Packages Overview MOREnet Service Packages Overview.
Topic: Information Security Risk Management Framework: China Aerospace Systems Engineering Corporation (Case Study) Supervisor: Dr. Raymond Choo Student:
Thomas Levy. Agenda 1.Aims: Reducing Cyber Risk 2.Information Risk Management 3.Secure Configuration 4.Network Security 5.Managing User Access 6.Education.
Cyber Security & Fraud – The impact on small businesses.
Cyber Security Training Assessment for Indian Army Cyber security for Social Networking 18 February 2015 Command HQ complex, Delhi Cantt.
Национальная процедура одобрения и регистрации проектов (программ) международной технической помощи (исключая представление информации об организации и.
NSF Cybersecuity Summit May REN-ISAC Goal The goal of the REN-ISAC is to aid and promote cyber security protection and response within the higher.
Last Minute Security Compliance - Tips for Those Just Starting 10 th National HIPAA Summit April 7, 2005 Chris Apgar, CISSP – President Apgar &
AUB Department of Electrical and Computer Engineering Imad H. Elhajj American University of Beirut Electrical and Computer Engineering
SecSDLC Chapter 2.
IBM PassItAlong Introduction Project  Overview  Deliverables  Timeline Q&A Ryerson University W CPS630 Term Project – Team #1 – IBM PassItAlong.
Internet2 Abilene & REN-ISAC Arbor Networks Peakflow SP Identification and Response to DoS Joint Techs Winter 2006 Albuquerque Doug Pearson.
MTRS3 Solutions and Services (SME, IL). MTRS in a nutshell  A security consulting company specialising in high risk environments (SME)  Main fields.
Palindrome Technologies all rights reserved © 2016 – PG: Palindrome Technologies all rights reserved © 2016 – PG: 1 Peter Thermos President & CTO Tel:
CLOSE THE SECURITY GAP WITH IT SOLUTIONS FROM COMPUTACENTER AND CISCO AUGUST 2014.
Douglas DiJulio Director – Enterprise Operations Application Support Cyber Security.
Computer Support and Networking in Houston, Conroe
Market Engagement – security update
EAST AFRICAN DATA HANDLERS DATA SECURITY/MOBILITY
WSU IT Risk Assessment Process
ISSeG Integrated Site Security for Grids WP2 - Methodology
Cybersecurity - What’s Next? June 2017
Direct Deposit Phishing Attack
AT&T Premises-Based Firewall Enhanced SBS Solution
DART Technology Nicole Fontayne-Bardowell, MPA Vice President & CIO
Access Service – National learning network.
Security Standard: “reasonable security”
Building an Information Sharing Community
Copyright Infringement: Don’t let it happen to you!
Preparing for the cyber landscape of 2020
Belkin Router Customer Service
Cyber Security & Embedded Systems Training Bootcamp VISIT TONEX.COM.
Norton.com/Setup | +1(844) | Norton Internet Security
NTC 406 Competitive Success/snaptutorial.com
5G Security Training
NTC 406 Education for Service/snaptutorial.com
I have many checklists: how do I get started with cyber security?
Yahoo Users Face Various Issues. Yahoo Account Login Issue Call Toll Free:
Implementing and Auditing the Critical Controls
Office 365 Security Assessment Workshop
Audit Plan Michelangelo Collura, Folake Stella Alabede, Felice Walden, Matthew Zimmerman.
NRC Cyber Security Regulatory Overview
Organisation Model Assistant Director: IT & Digital
Join In Be Secure Presentation
Protective Security Advisor Program Brief
How To Land Your Dream Job in Cyber Security
Cybersecurity Special Public Meeting/Commission Workshop for Natural Gas Utilities September 27, 2018.
IIA District Conference Seminar Presenter David Cole, CPA, CISA, CRISC
Michael Bonatsos, Robin Hibbard, Anna Kim, Sean Murray, Joshua Sandoe
Overview UA has formed is forming a Security Operations Center (SOC) with Students supporting Tier 1 Activities. The SOC provides benefits to the University.
Security week 1 Introductions Class website Syllabus review
Cybersecurity: Tried and True Tactics for Assessing and Managing Risks, Employee Training and Program Testing Brian Rubin, Partner, Sutherland Tee Meeks,
The MobileIron® Threat Detection difference:
Final Conference 18 Set 2018.
General information Targeted topics SU-INFRA
LO1 - Know about aspects of cyber security
Counter APT Counter APT HUNT operations combine best of breed endpoint detection response technology with an experienced cadre of cybersecurity experts.
In the attack index…what number is your Company?
General information Targeted topics SU-INFRA
Guidelines for building security policies. Building a successful set of security policies will ensure that your business stands the best possible chance.
UDTSecure TM.
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Election Security Presented by: michelle K. tassinari Director and Legal counsel Elections division Office of the secretary of the commonwealth.
Presentation transcript:

Cyber Security Gloria Stephenson Manager, Cyber Security & LAN Services Patti Dudenhoeffer Cyber Security Analyst Lunch/MOREnet Cyber Security Services Overview, Dr. Gloria Stephenson, Manager, Cyber Security and LAN Services, MOREnet, Patti Dudenhoeffer Cyber Security Analyst, MOREnet Gloria and Patti will provide an overview of the various cyber security services that MOREnet members can take advantage of through the consortium including DDoS, threat monitoring and mitigation, security audits, incident response and technical support, consulting, training, etc.  

CYBER SECURITY team Gloria Stephenson, Manager Kathy Bellew, Cyber Security Analyst Luke Polson, Cyber Security Analyst Patti Dudenhoeffer, Cyber Security Analyst – Security Architecture and Threat Mitigation

WHAT WE DO FOR YOU

Day-to-day operations Notifications DMCA Complaints SPAM Attacks Member Support Incident Response Consulting NOTE: These services are provided at no additional cost.

Additional Support services Security Assessments Consortium Discounts PhishMe Secure Ideas NetworkScout Fortinet Security Solutions Technical Training NOTE: Additional requirements and/or costs may be associated with these services.

Connection support services Network Monitoring MRTG Netflow Blackhole DNS GNN (Level I and II) DDoS Mitigation NOTE: These services are provided at no additional cost.

Member outreach Weekly MOREnet Cyber Security News Review Cyber Security Presentations and Training Staff Students General Public Cyber Security Bootcamp Cyber Security Workshops Cyber Security Roadshow Cyber Security Webinars

General security resources 20 Critical Security Controls Security Best Practices Passwords Email Mobile Device Social Media Security Training/Conferences SANS, RSA, InfoSec World,

questions