Outline  Company Profile  Services Provided  Assets  System Schema  Risk Categories  Technical Risks and Mitigation  Summary.

Slides:



Advertisements
Similar presentations
COMPREHENSIVE APPROACH TO INFORMATION SECURITY IN ADVANCED COMPANIES.
Advertisements

MID/jpl 5/15/ © 1999 by James P. Litchko Total BS Security: Business-based Systems Security Jim Litchko (703) ext. 310.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Security Controls – What Works
Security+ Guide to Network Security Fundamentals
Cybersecurity Summit 2004 Andrea Norris Deputy Chief Information Officer/ Director of Division of Information Systems.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Qualitative.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Security Management IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
Barracuda Networks Confidential1 Barracuda Backup Service Integrated Local & Offsite Data Backup.
Network security policy: best practices
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Ferst Center Incident Incident Identification – Border Intrusion Detection System Incident Response – Campus Executive Incident Response Team Incident.
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
Company LOGO Copyright Carrie Kerskie Data Breach & Identity Theft By Carrie Kerskie Kerskie Group, Inc.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
SEC835 Database and Web application security Information Security Architecture.
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
Information Systems Security Computer System Life Cycle Security.
Current Job Components Information Technology Department Network Systems Administration Telecommunications Database Design and Administration.
Dell Connected Security Solutions Simplify & unify.
MIS3300_Team8 Service Aron Allen Angela Chong Cameron Sutherland Edment Thai Nakyung Kim.
Security Architecture
Computer & Network Security
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
Unit 6b System Security Procedures and Standards Component 8 Installation and Maintenance of Health IT Systems This material was developed by Duke University,
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Information Systems Security
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
Note1 (Admi1) Overview of administering security.
Information Security What is Information Security?
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 1 Security Architecture.
Chapter 2 Securing Network Server and User Workstations.
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
What Can Go Wrong During a Pen-test? Effectively Engaging and Managing a Pen-test.
Module 11: Designing Security for Network Perimeters.
Information Systems, Security, and e-Commerce* ACCT7320, Controllership C. Bailey *Ch in Controllership : The Work of the Managerial Accountant,
Lesson 19-E-Commerce Security Needs. Overview Understand e-commerce services. Understand the importance of availability. Implement client-side security.
Scott Charney Cybercrime and Risk Management PwC.
McGraw-Hill/Irwin © 2013 The McGraw-Hill Companies, Inc., All Rights Reserved. Chapter 11 Computer Crime and Information Technology Security.
IT SERVICES FOR RED HAT CUSTOMERS Tarmo Pruunes Head of IT Services.
PENETRATION TESTING. A scare at bedtime! There is no hiding place, you can be found through a variety of means: DNS, Name Server Lookup, NSlookup, Newsgroups,
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 1 Security Architecture.
Module 10: Windows Firewall and Caching Fundamentals.
1 Chapter 13: RADIUS in Remote Access Designs Designs That Include RADIUS Essential RADIUS Design Concepts Data Protection in RADIUS Designs RADIUS Design.
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
1 Lesson 24 Network Fundamentals Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
Management of Operational Risk. Regulatory Capital Perspective Credit Risk – Basel I (1987) Market Risk – (Amendment 1998) Credit Risk – Basel II (2005)
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
By: Mark Reed.  Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction.
Softheme Service Model Software Outsourcing Solutions.
Documents. Process. Data. Payables
Chapter 5 Electronic Commerce | Security Threats - Solution
Risk management.
Critical Security Controls
Chapter 5 Electronic Commerce | Security Threats - Solution
BUILDING A PRIVACY AND SECURITY PROGRAM FOR YOUR NON-PROFIT
COMPREHENSIVE APPROACH TO INFORMATION SECURITY IN ADVANCED COMPANIES
Computer-Based Processing: Developing an Audit Assessment Approach
IT Vocab IT = information technology Server Client or host
IS4680 Security Auditing for Compliance
INFORMATION SYSTEMS SECURITY and CONTROL
How to Mitigate the Consequences What are the Countermeasures?
Security week 1 Introductions Class website Syllabus review
COMPANY PROFILE. Contents Company Profile  Architectural Design, Plans & Drawings  Construction Management, Costing & Implementation  Process Measurement.
Presentation transcript:

Outline  Company Profile  Services Provided  Assets  System Schema  Risk Categories  Technical Risks and Mitigation  Summary

 Operates in Estonia, Latvia, Lithuania, Finland, Jordan  Largest employer in Estonia with over 7500 employees  ~ private customers  ~ business customers  Total revenue of 796 million Euros in FY 2010  Most preferred employer in Estonia  Second-best customer service in Estonia  Bonds listed on the London Stock Exchange

Eesti Energia offers comprehensive energy solutions including:  Electricity  heat and fuel  customer service and consulting ENERGY SERVICES PRODUCTION&TECHNOLOGY RESIDENTIAL BUSINESSELECTRIC, HEAT OIL, TECHNOLOGY

 The vision of Eesti Energia is to sell energy to two million customers in the Baltic Sea Region by  The mission of Eesti Energia is to devote all of their energy for the good of the people.

 Internal service hardware  Internal service software  Backup and restore system  Firewalls and VPN tunnels systems  Monitoring systems  Datacenter physical  Datacenter power  Web access to self service systems  Accounting systems  Internal technical knowledge  Interdepartment processes

 Physical accidents  Employee configuration errors  Customer configuration errors  Internal malicious actions  External malicious actions  Customer malicious actions  Missing or untested procedures  Interdepartment cross training  Software limitation  Political environment

 Data Center Incidents ◦ Data safety and accessibility  Software exploit ◦ Risks connected with software  Network problems ◦ Computer network incidents  Human factor ◦ We are not machines

Description: A system cannot work without databases. All information, finance reports, billing reports, and settings are stored in database. Risks:  Unauthorized access  Data loss  Server overwhelmed, insufficient server performance. Measures taken to prevent incidents:  Increase overall database security.  Backups are stored separately in several places geographically.  Database servers are configured for appropriate workload.

Description: Company tries to protect its IT property especially system, software and technology secrets. Information system is also company’s private property. Risk:  Software bugs can be discovered and exploited rapidly.  Software architecture cannot keep up to speed with the changing world.  New features would bring new problems, change is risky. Measures:  Design good software architecture from the beginning.  Overall workflow monitoring  Fast response to software security incidents.

Description: External and internal network security, integrity, data confidentiality are vital to company operations. Network safety and availability are the most important. Risks:  Unauthorized network penetration and anti service attacks.  Disrupted connections.  Possible leak of sensitive information due weak network defence. Measures:  Hardware: firewall, intrusion detection system, intrusion prevention system, monitoring system with notifications.  Software firewall on client machines and network flow monitoring.  Strict domain policy.

Description: Our organization is concerned that at any time any of its employee could make a mistake. They cannot control the actions of all employees at all times. Risks:  Loss of unsaved information.  A spilled cup of coffee.  Security accounts exchanging between employees. Measures:  Ensure that corporate rules and procedures are followed.  Enhance and optimize work processes.  Personnel must cooperate with policy.  Build up politics of loyalty in company culture.

Summary  Risk assurance is a fundamental concern to All organizations!  Eesti Energia is not an exception.