Global Information Security Issues According to the E&Y Global Survey, Managers Say the Right Thing… –90% of 1400 companies surveyed in 66 countries say.

Slides:



Advertisements
Similar presentations
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Advertisements

IAPP CONFIDENTIAL Insider Leakage Threatens Privacy.
Lynn Ray ISO Towson University Strategic Planning for IT Security Copyright Lynn Ray, This work is the intellectual property rights of the author.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
© Carnegie Mellon University The CERT Insider Threat Center.
STOP.THINK.CONNECT™ NATIONAL CYBERSECURITY AWARENESS CAMPAIGN SMALL BUSINESS PRESENTATION.
E-Commerce Security Issues. General E-Business Security Issues Any E-Business needs to be concerned about network security. The Internet is a “ public.
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 4 ETHICS AND INFORMATION SECURITY Business Driven Information Systems 2e.
Forensic and Investigative Accounting Chapter 16 Cybercrime Loss Valuations © 2011 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL
The Ecommerce Security Environment For most law-abiding citizens, the internet holds the promise of a global marketplace, providing access to people and.
Security+ Guide to Network Security Fundamentals
22 November Security and Privacy  Security: the protection of data, networks and computing power  Privacy: complying with a person's desires when.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Chapter 1 Introduction to Security
Introduction Security is a major networking concern. 90% of the respondents to the 2004 Computer Security Institute/FBI Computer Crime and Security Survey.
1 Pertemuan 17 Organisational Back Up Matakuliah:A0334/Pengendalian Lingkungan Online Tahun: 2005 Versi: 1/1.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Session 3 – Information Security Policies
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
Network security policy: best practices
SiteLock Internet Security: Big Threats for Small Business.
Get Complete IT Compliance: Reduce Risk and Cost Jonathan CISO, Qualys Seth Automation Specialist, BMC.
Introduction to Network Defense
The Difficult Road To Cybersecurity Steve Katz, CISSP Security Risk Solutions Steve Katz, CISSP Security.
Company LOGO Copyright Carrie Kerskie Data Breach & Identity Theft By Carrie Kerskie Kerskie Group, Inc.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Security. If I get 7.5% interest on $5,349.44, how much do I get in a month? (.075/12) = * 5, = $ What happens to the.004? =
Securing Information Systems
© 2009 IDBI Intech, Inc. All rights reserved.IDBI Intech Confidential 1 Information (Data) Security & Risk Mitigation.
InformationWeek 2014 Strategic Security Survey Research Findings © 2014 Property of UBM Tech; All Rights Reserved.
PART THREE E-commerce in Action Norton University E-commerce in Action.
What Keeps You Awake at Night Compliance Corporate Governance Critical Infrastructure Are there regulatory risks? Do employees respect and adhere to internal.
BITS Proprietary and Confidential © BITS Security and Technology Risks: Risk Mitigation Activities of US Financial Institutions John Carlson Senior.
1 Figure 1-17: Security Management Security is a Primarily a Management Issue, not a Technology Issue Top-to-Bottom Commitment  Top-management commitment.
Security Awareness: Applying Practical Security in Your World Chapter 1: Introduction to Security.
Slide 1 Using Models Introduced in ISA-d Standard: Security of Industrial Automation and Control Systems (IACS) Rahul Bhojani ISA SP99 WG4 Meeting.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 1 – Overview.
Computer Security: Principles and Practice
C8- Securing Information Systems
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
Managing Data Against Insider Threats Dr. John D. Johnson, CISSP.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
IT Strategy for Business © Oxford University Press 2008 All rights reserved Chapter 12 IT Security Strategies.
Auditing IT Vulnerabilities IT vulnerabilities are weaknesses or exposures in IT assets or processes that may lead to a business risk or security risk.
Internet Security Breach & Its Impact on Business Operations Kim Nguyen Manish Shirke Wa Mo Saravanan Velrajan.
What Keeps Your Board Up at Night? Sylvia Kerrigan, Exec. VP, General Counsel & Secretary – Marathon Oil Sean Gorman, Partner – Bracewell & Giuliani.
SECURITY Professor Mona Mursi. ENVIRONMENT IT infrastructures are made up of many components, abstractly: IT infrastructures are made up of many components,
Topic 5: Basic Security.
HP World September 2002 Scott S. Blake, CISSP Vice President, Information Security BindView Corporation Vulnerability Assessment and Action.
Pro-active Security Measures
111 © 2005 EMC Corporation. All rights reserved. Achieving Business Resilience 2005 Business Continuity and Corporate Security Show & Conference Stephen.
Engineering and Management of Secure Computer Networks School of Engineering © Steve Woodhead 2009 Corporate Governance and Information Security (InfoSec)
Safe’n’Sec IT security solutions for enterprises of any size.
By, CA K RAGHU, PAST PRESIDENT – INSTITUTE OF CHARTERED ACCOUNTANTS OF INDIA.
THE NEED FOR NETWORK SECURITY Hunar & Nawzad & Kovan & Abdulla & Aram.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
Securing Information Systems
Securing Information Systems
Network Security Presented by: JAISURYA BANERJEA MBA, 2ND Semester.
Cyber Security Zafar Sadik
Team 1 – Incident Response
Securing Information Systems
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Today’s Risk. Today’s Solutions. Cyber security and
Protect Your Ecommerce Site From Hacking and Fraud
Forensic and Investigative Accounting
Presentation transcript:

Global Information Security Issues According to the E&Y Global Survey, Managers Say the Right Thing… –90% of 1400 companies surveyed in 66 countries say information security is highly important for their business But Critical Security Gaps Persist… –34% rate themselves less than adequate in ability to determine whether they are under attack –33% rate themselves inadequate to respond to attack And Security Resources Are Skewed –Only 29% make employee awareness and training a top area of focus and spending (compared to 83% who say technology is top information security spending area)

A Never-Ending Challenge (and Getting Worse) We are all targets: –Constant external probes and attacks are now the norm for all size companies (and individuals) connected to the Internet via the web or Financial consequence are enormous: –Skyrocketing fraud and identity theft damages –Frequent denial of service and virus disruptions Estimated cost of viruses and worms =$12.5 billion worldwide in 2003 Only 6% of global companies surveyed by InformationWeek in 2004 report no attack-related downtime – 16% of companies had systems down from 1 to 3 days Companies now spend average of 12% of IT budgets on security

Classifying Security Attacks Passive (eavesdropping) attacks –A hostile party is snooping on your network Risks: –Loss of confidentiality (customer and employee records, contracts, trade secrets, financials, passwords, etc.) –Analysis of your traffic and network use and vulnerability (to be used for future attacks) Active (insertion) attacks –False Identity or message modification in transit (fraud) –Rogue programs (viruses and worms) –Denial of service (network shut down) Security solutions must build on each other to deal with both types of attacks "Authentication" Who are you, basis for everything else "Authorization" Given who you are, what can you do? "Accountability" Given both the above, what did you actually do? "Non-repudiability" Strict proof that nothing has been changed in transit

Risk Management Focus To manage online risks, understand –a) what is possible b) what matters most to you c) what security practices generate the best results Insider attacks Typically cannot be detected until after the fact Must be prevented through internal policies, education and employee awareness Outsider attacks Typically cannot be prevented Must be detected and stopped from causing damage

Biggest Security Fallacy: Focus Primarily on Outsider Attacks Outsider attacks are not preventable by an individual company –They can be costly and disruptive, but are unlikely to threaten long-term competitiveness or survival Average outside attack costs $57,000 at large corporation Insider attacks are often more damaging –Insiders often have vindictive motivation, multiple opportunities and company specific expertise on their side Insider attacks estimated to cause $2.7 million in damages 70% of attacks costing over $100,000 come from inside Such attacks can and have put companies out of business Good internal security policy and practice addresses external risk factors as a side effect

Core Best Practices (CSO Magazine September 2004) Define your overall security architecture and plan in relation to business goals and priorities Create a comprehensive risk assessment process to classify and prioritize threats and vulnerabilities Perform a complete security audit to identify threats to employees and intellectual property (annually) Establish a quarterly review process, with metrics (for example, employee compliance rates) to measure your security's effectiveness. Patch, Update and Test your network and application security on a regular cycle