A Comprehensive Solution Team Mag 5 Valerie B., Derek C., Jimmy C., Julia M., Mark Z.

Slides:



Advertisements
Similar presentations
Nishidh, CISSP. To comply with Sarbanes oxley and other legislations To comply with industry standards and business partner requirements To protect.
Advertisements

IT Security Policy Framework
Creating HIPAA-Compliant Medical Data Applications with Amazon Web Services Presented by, Tulika Srivastava Purdue University.
Security by Design A Prequel for COMPSCI 702. Perspective “Any fool can know. The point is to understand.” - Albert Einstein “Sometimes it's not enough.
Notes: Update as of 1/13/2010. Vulnerabilities are included for SQL Server 2000, SQL Server 2005, SQL Server Oracle (8i, 9i, 9iR2, 10g, 10gR2,11g),
Massachusetts privacy law and your business  Jonathan Gossels, President, SystemExperts Corporation  Moderator: Illena Armstrong  Actual Topic: Intersecting.
The twenty-four/seven database Oracle Database Security David Yahalom Senior database consultant
Miss Scarlet with a lead pipe, in the library Players: 3 to 6 Contents: Clue game board, six suspect tokens, six murder weapons, 21 cards, secret envelope,
Dell Compellent and SafeNet KeySecure
COPYRIGHT © 2010 TECTIA CORPORATION. ALL RIGHTS RESERVED. Proactive Measures to Prevent Data Theft Securing, Auditing and Controlling remote.
Security Controls – What Works
Security & Privacy The changing world of Privacy and the core drivers.
Dino Tsibouris (614) Information Security – What’s New In the Law?
Sophos / Utimaco Data Loss Prevention Peter Szendröi, SOPHOS Nordics Jan 20, 2010.
Notes: Update as of 12/31/2010 inclusive. Chart counts NIST CVE – Reported Software Flaws by “published” date, utilizing the NIST NVD. SQL Server.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
Network security policy: best practices
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Account Reset Console Delegated and secure self password resets Joe Vachon Sales Engineer.
1 ZIXCORP The Criticality of Security Dena Bauckman Director Product Management April 2015.
IT-Partners Limited © 2011 IT Partners Limited Y OUR IT SOLUTION P ARTNERS Managing Director Confidential Data Loss Prevention Sunny Ho 1.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
Managing Risk in Cloud Computing Contracts Henry Ward and Todd Taylor April 30, 2015.
HIPAA PRIVACY AND SECURITY AWARENESS.
What Keeps You Awake at Night Compliance Corporate Governance Critical Infrastructure Are there regulatory risks? Do employees respect and adhere to internal.
SafeNet Protects Data at Rest
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
WSV323. CSO/CIO department Regulation translated to control objectives Infrastructure Support Control objectives turned into control activities.
User Manager Pro Suite Taking Control of Your Systems Joe Vachon Sales Engineer November 8, 2007.
Kevin Casady Hanna Short BJ Rollinson.  Centralized and Structured collection of data stored in a computer system  An electronic filing system  Easy.
ENCRYPTION Team 2.0 Pamela Dornan, Thomas Malone, David Kotar, Nayan Thakker, and Eddie Gallon.
SEC835 Practical aspects of security implementation Part 1.
Introduction to Barracuda IM Firewall. Two Security Products in One Public IM Management –Manages traffic from public IM clients, including AIM, Yahoo!
Additional Security Tools Lesson 15. Skills Matrix.
Information Security Governance and Risk Chapter 2 Part 3 Pages 100 to 141.
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
Database Security and Data Protection Suseel Pachalla, CISSP.
HIPAA BASIC TRAINING Presented by Anderson Health Information Systems, Inc.
Cloud Computing Security Keep Your Head and Other Data Secure in the Cloud Lynne Pizzini, CISSP, CISM, CIPP Information Systems Security Officer Information.
Chapter 11 Privacy and Secrets. Chapter Outline Privacy and Regulation What to do about passwords Random Number generation Cryptography Secrets in Memory.
IT Security Policy Framework ● Policies ● Standards ● Procedures ● Guidelines.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Managing your Institution-Specific HIPAA Compliance Policies and Procedures Cutting Edge Issues Thursday, December 13, 2007.
CIBC Global Services © 2006, Echoworx Corporation Ubiquity of Security Compliance and Content Management Stephen Dodd Director – Enterprise Accounts.
12/23/2015Software Assist Corporation1 “Most companies have little idea how pervasive FTP activity is in their organizations because FTP is no longer just.
Data Security & Privacy: Fundamental Risk Mitigation Tactics 360° of IT Compliance Anthony Perkins, Shareholder Business Law Practice Group Data Security.
Chapter 1: Information Security Fundamentals Security+ Guide to Network Security Fundamentals Second Edition.
CYBERSECURITY: RISK AND LIABILITY March 2, 2016 Joshua A. Mooney Co-chair-Cyber Law and Data Protection White and Williams LLP (215)
Santa Clara, CA (408)
Vormetric Encryption Architecture Overview Protecting Enterprise Data at Rest with Encryption, Access Controls, and Auditing.
The Payment Card Industry Data Security Standard (PCI DSS) is a proprietary information security standard for organizations that handle branded credit.
Security Policy and Key Management Centrally Manage Encryption Keys - Oracle TDE, SQL Server TDE and Vormetric. Tina Stewart, Vice President.
-1- WORKSHOP ON DATA PROTECTION AND DATA TRANSFERS TO THIRD COUNTRIES Technical and organizational security measures Skopje, 16 May - 17 May 2011 María.
Pioneers in secure data storage devices. Users have become more accustomed to using multiple devices, are increasingly mobile, and are now used to storing.
Blackboard Security System
Introduction to Barracuda IM Firewall
Maciej Pęciak Robert Dąbroś
Encrypted from CDS Office Technologies
Regulatory Compliance
OUR DATA SECURITY SERVICES
General Data Protection Regulation
Chapter 1: Information Security Fundamentals
Building a Vertical Around Regulated Industries to Increase Your Business
Anthem Data Breach Group 2: Jing Jiang, Dongjie Wang, Haitao Huang, Binju Gaire, Parneet Toor.
Protect data in core business applications
Presentation transcript:

A Comprehensive Solution Team Mag 5 Valerie B., Derek C., Jimmy C., Julia M., Mark Z.

 44 states have enacted laws that if the companies lose customer or employee data they can be held liable  In our most recent HR audit we discovered the following flaws ◦ Data is stored in an unsecured manner ◦ Lack of compliance with Corporate Data Privacy Policy ◦ Varying interpretations of how the Data Privacy Policy Applies ◦ Transfer of unsecured data to various vendors ◦ Lack of control of data usage and access

 Auditors increasingly concerned with personally identifiable data.  US Sarbanes Oxley Act  Global companies need to worry about Safe Harbor for global data.  Increased awareness of identity theft.  Health Information  Use technology instead of only policy to protect data.  Proactive instead of responsive measures after data has been exposed already.

Solution DescriptionProsCons Data Obfuscation (Masking, Scrambling) Fake or Scrambled data set for use by design and implementation teams Can be very expensive – good fake data can range in cost from $200,000 to $1 Million Encryption of DataAllows personally identifiable data to be scrambled if intrusion takes place. Adds overhead and possible performance issues. Database Intrusion/Extrusion Prevention Looks for SQL Injections, Bad access commands and odd outbound data Can eat into over head and cause performance issues – also expensive. Needs very specific criteria to set up. Data Leak PreventionCatches any data that is being sent out of the system Does not protect data in the actual data warehouse.

 Improved over basic encryption with high speed 128/256 bit file based encryption which resolves the performance issues with other encryption solutions.  Improved database intrusion detection because it is context aware. It knows all the users and their access hours and abilities.  Improved data leak prevention since it prevents the unencrypted data from even being accessed let alone removed from system.

 Vormetric appliance for production :$39,  Vormetric appliance for development:$29,  Unix / Windows Server Agent License for production:$6,  Windows Server Agent License for development:$3,  Oracle Database server agent License for Production:$6,  Oracle Database server agent License for Dev:$3,  Total cost for this HR Project?$88,  These costs are significantly less than the 200,000 to 1 Million dollar pricing per data set for other solutions that are available.  The Cost to Risk ratio is good as a data loss/compromise can cost millions in legal fees and lost customer or employee confidence.

 Concerns about encryptions impact on performance? ◦ Data Security Expert delivers high-speed file-level encryption of stored data using a FIPS certified AES (128/256-bit) algorithm.  Concerns about data beyond the database level? ◦ Data Security Expert provides file-level encryption because the underlying files in which data is stored is the primary point of attack.  Concerns about Administrator Access to Data? ◦ Data Security Expert’s “separation of duties” feature further restricts access to data by allowing system administrators and root users to maintain the system and backup data, without being able to view the sensitive data.

 Concerns about Authorized users taking Unauthorized Actions? ◦ “Context-aware” control means that Data Security Expert grants access only to authorized users performing authorized operations on authorized applications during specific time windows.  Concerns about being able to report on which users have accessed the system? ◦ The system logs any attempted access to any data by any user –not only authorized access requests, but all attempts to circumvent authorized access channels.  Concerns about legal regulations? ◦ The system is entirely auditable to comply with Sarbanes-Oxley, Gramm-Leach-Bliley Act (GLBA), HIPAA, CA SB 1386, the EU Data Protection Act, Visa’s CISP and the PCI requirements, and other mandates regarding the handling and protection of information.

 This will secure all HR related data on all levels with minimal performance impact ◦ Database/OS ◦ Backup ◦ Data Transfers  Will allow users to access own HR data securely and blocks access to all unauthorized users  Administrators can work on system without seeing confidential data

 HIPAA - Confidentiality and integrity controls for patient health information (PHI) HIPAA  GLBA - Privacy and protection for sensitive personally identifiable information GLBA  PCI-DSS - Broadest solution for encryption, key management, access control, and audit that uniquely removes roadblocks for compliance with PCI encryption requirements PCI-DSS  SOX - Integrity, access and audit controls for financial data plus trade secret protection to reduce risk of Sarbanes-Oxley material events SOX  State Breach Notification Laws - Transparent, cost effective encryption to eliminate data breach notification requirements State Breach Notification Laws