Security Imperatives in a New Workplace Partnering to Protect Digital Information in the 21st Century Presented by Michael Ferris, Alaska Enterprise Solutions.

Slides:



Advertisements
Similar presentations
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Advertisements

1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
Data Security The Best Data Security In The Industry.
SPEAKER BLITZ ERIC BROWN Senior Systems Engineer NICK JAVANOVIC DoD Regional Sales Manager.
Guide to Massachusetts Data Privacy Laws & Steps you can take towards Compliance.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Access Control Chapter 3 Part 5 Pages 248 to 252.
Security Controls – What Works
Network and Server Basics. 6/1/20152 Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server.
Data Security Issues in IR Eileen Driscoll Institutional Planning and Research Cornell University
Security Management IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
IBM Security Network Protection (XGS)
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Security Policies and Implementation Issues.
Mel Pless, Sr. Director, Solutions Consulting Guidance Software, Inc. Let’s Get Right To The Endpoint Leveraging Endpoint Data to Expose,
Customized solutions. Keep It Secure Contents  Protection objectives  Endpoint and server software  Protection.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
New Data Regulation Law 201 CMR TJX Video.
OPSEC Awareness Briefing Multi-Function Printer (MFP) Security.
Trojan Horse Implementation and Prevention By Pallavi Dharmadhikari Sirisha Bollineni VijayaLakshmi Jothiram Vasanthi Madala.
eScan Total Security Suite with Cloud Security
P6 - CONFIGURE THE SOFTWARE. CONFIGURE SOFTWARE Most software can be configured to suit an individual user, for example by changing the appearance of.
[Name / Title] [Date] Effective Threat Protection Strategies.
Hands-On Microsoft Windows Server 2008
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Protecting Mainframe and Distributed Corporate Data from FTP Attacks: Introducing FTP/Security Suite Alessandro Braccia, DBA Sistemi.
Information Systems Security Computer System Life Cycle Security.
©Kwan Sai Kit, All Rights Reserved Windows Small Business Server 2003 Features.
Cosmos Security Feature Overview Product Planning Group Samsung IT Solutions Business 12 July 2010.
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 2 This material was developed by Oregon Health & Science University,
Forms Management: Compliance, Security & Workflow Efficiencies.
Dell Connected Security Solutions Simplify & unify.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
A virus is software that spreads from program to program, or from disk to disk, and uses each infected program or disk to make copies of itself. Basically.
Introduction to Barracuda IM Firewall. Two Security Products in One Public IM Management –Manages traffic from public IM clients, including AIM, Yahoo!
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Note1 (Admi1) Overview of administering security.
CIO Perspectives on Security Fabrício Brasileiro Regional Sales Manager.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
©2015 Xerox Corporation. All rights reserved. Xerox® and Xerox Design® are trademarks of Xerox Corporation in the United States and/or other countries.
IT Security Policy: Case Study March 2008 Copyright , All Rights Reserved.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
W elcome to our Presentation. Presentation Topic Virus.
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Windows Vista Configuration MCTS : NTFS Security Features and File Sharing.
Protecting Against Cyber Attacks PLEASE TAKE A MINUTE TO LOOK AT THIS IMPORTANT MESSAGE. THIS IS HAPPENING HERE AND NOW! LET US SAVE YOU AND YOUR INFORMATION.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
Protect your Digital Enterprise
Introduction to Barracuda IM Firewall
Cybersecurity - What’s Next? June 2017
Systems Security Keywords Protecting Systems
Lesson Objectives Aims You should be able to:
Business Risks of Insecure Networks
Security software for today’s enterprise marketplace
Malware, Phishing and Network Policies
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Check Point Connectra NGX R60
Brandon Traffanstedt Systems Engineer - Southeast
Modular Object Scanning Technology (MOST)
K!M SAA LOGICAL SECURITY Strong Adaptive Authentication
Bethesda Cybersecurity Club
IS4680 Security Auditing for Compliance
PLANNING A SECURE BASELINE INSTALLATION
Cybriant Partner Partner Program White Label Materials
Presentation transcript:

Security Imperatives in a New Workplace Partnering to Protect Digital Information in the 21st Century Presented by Michael Ferris, Alaska Enterprise Solutions

Today’s rising security threats come in various forms, in varying degrees of severity: 2 While others can be extreme… … Such as the Stuxnet virus that paralyzed Iran’s nuclear research facilities. Some occur undetected but are much more severe… …Such as malicious software, or “malware,” that’s unintentionally installed by a computer user and which causes the user’s computer to conduct illicit tasks via the network on behalf of the malware’s owner. Some security breaches are obvious but relatively harmless… … Receiving spam messages, for example.

The real costs of a security breach: Digital information makes up 49% of an organization’s value.* Average cost of each compromised record per breach: $214**. Average organizational cost of a data breach is $5.5 million**. *2012 state of information survey. **Source: “2010 Annual Study: US Cost of a Data Breach.” The Ponemon Institute, LLC, March By addressing security proactively, organizations can reduce per record cost of breaches by $80**. Security Policies Security Breach Costs

End points are connected on networks with increasing risk velocity. 4 Changing Threat Landscape Devices Go Undetected on the Network Controlled Network

Today’s MFPs are complex embedded network devices with many potential security vulnerabilities: Some MFPs have: An operating system with a direct external interface A proprietary operating system All MFPs have: One or more operating systems Network controller and firmware One or more hard disk drives Web server Hardware ports Page Description Language interpreters (PS & PCL) 5

MFP Security cannot be an afterthought! In a December, 2011 lecture, “Print Me If You Dare,” a research team from Columbia University was able to design malware with capabilities that include: Port scanning Network exploration Exfiltration data from print-jobs Security Levels 6

3 Levels of Security Perimeter Machine Documents 7

Security at the Perimeter McAfee Embedded Security Cisco TrustSec Service Technicians 8

What you need to protect information on the network: 1.“Hands-off, self-protecting” devices that are resilient to new attacks. 2.Compliance with the most up-to- date security standards and regulations. 3.Complete visibility on the network. 9

Hands off Protection: McAfee Whitelisting Technology 10 Known users Approved software Unknown files and software Normal usage Attacks Alerts Unknown users Malicious acts Polymorphic zero-day attacks Known files and software Whitelisting technology allows only approved software to run Management Tools McAfee ePO

McAfee Integrity Control Proactive/Always active even if mismanaged Security is managed at the end point in addition to the network Permits secure use of advanced MFP features — user permissions, scanning without fear Turns the unknown (bad) into known (good) 11

Compliance: Integration with Cisco TrustSec Gain complete visibility on the network Automatically identifies printer and MFP devices on the network Monitors device activity, similar to PC on the network. Reports any suspicious activity and alerts IT administrators. Virtually every device is TrustSec compliant – more than any other vendor 12

Service Technicians Technicians Laptops Thumb Drives Software 13

14 Protecting the Perimeter: Multilayered Approach Network Management Consoles User Endpoints TrustSec Access Protection MFPs

Security at the Machine Level Common Criteria Certification –HIPAA –Sarbanes Oxley Fax / Network Isolation 15

Security at the Document Level Disk/Image overwrite Encrypted Hard Disk Audit Log Secure Print Standard Accounting Secure Watermark Password protected PDF Smart Card technology Secure Access Follow you Print Hard Disk Retention 16

The New Security Standard for a New Age Security cannot be an afterthought Information is an increasingly valuable intellectual property Firewalls aren’t enough; security policies must be holistic and ubiquitous Protection for embedded devices is now an integral part of today’s security imperative 17