Thomas Levy. Agenda 1.Aims: Reducing Cyber Risk 2.Information Risk Management 3.Secure Configuration 4.Network Security 5.Managing User Access 6.Education.

Slides:



Advertisements
Similar presentations
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Advertisements

Security Controls – What Works
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Qualitative.
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
Computer Security: Principles and Practice
Session 3 – Information Security Policies
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
SEC835 Database and Web application security Information Security Architecture.
© 2009 IDBI Intech, Inc. All rights reserved.IDBI Intech Confidential 1 Information (Data) Security & Risk Mitigation.
Thomas Levy. Agenda 1.Aims: CIAN 2.Common Business Attacks 3.Information Security & Risk Management 4.Access Control 5.Cryptography 6.Physical Security.
Evolving IT Framework Standards (Compliance and IT)
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
© 2001 Carnegie Mellon University S8A-1 OCTAVE SM Process 8 Develop Protection Strategy Workshop A: Protection Strategy Development Software Engineering.
E-Security: 10 Steps to Protect Your School’s Network NEN – the education network.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 1 – Overview.
Chapter 3 資訊安全管理系統. 4.1 General Requirements Develop, implement, maintain and continually improve a documented ISMS Process based on PDCA.
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
Cyber Security & Fraud – The impact on small businesses.
K E M A, I N C. Ten Steps To Secure Control Systems APPA 2005 Conference Session: Securing SCADA Networks from Cyber Attacks Memphis, TN April 18, 2005.
13.6 Legal Aspects Corporate IT Security Policy. Objectives Understand the need for a corporate information technology security policy and its role within.
Appendix C: Designing an Operations Framework to Manage Security.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Office of Campus Information Security Driving a Security Architecture by Assessing Risk Stefan Wahe Sr. Information Security Analyst.
Knowing What You Missed Forensic Techniques for Investigating Network Traffic.
IMFO Annual Conference – 2015 S21: Good Governance & Oversight B2B.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
IT Controls Global Technology Auditing Guide 1.
IT Security Policies and Campus Networks The dilemma of translating good security policies to practical campus networking Sara McAneney IT Security Officer.
Rob Davidson, Partner Technology Specialist Microsoft Management Servers: Using management to stay secure.
Networked Systems Survivability CERT ® Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA © 2002 Carnegie.
Information Security: Model, Process and Outputs Presentation to PRIA WG November 10, 2006.
ORGANISATIONAL CULTURE ORGANISATION MUST PROVIDE FOR INFORMATION SECURITY FAILING TO PLAN, IS PLANNING TO FAIL ASPECTS THAT SHOULD BE ADRESSED DURING.
Information Security tools for records managers Frank Rankin.
CSC4003: Computer and Information Security Professor Mark Early, M.B.A., CISSP, CISM, PMP, ITILFv3, ISO/IEC 27002, CNSS/NSA 4011.
By: Matt Winkeler.  PCI – Payment Card Industry  DSS – Data Security Standard  PAN – Primary Account Number.
© ITT Educational Services, Inc. All rights reserved. IS3220 Information Technology Infrastructure Security Unit 10 Network Security Management.
Welcome Information Security Office Services Available to Counties Security Operations Center Questions.
Best Cyber Security Practices for Counties An introduction to cybersecurity framework.
Information Security in Laurier Grant Li Wilfrid Laurier University.
Database Security Carl J. Hoppe 20 November 2013.
Presenter: Mohammed Jalaluddin
Cybersecurity - What’s Next? June 2017
Demystifying cybersecurity: Best practices to help strengthen your program Chris Candela Senior Consultant Business Consulting Services Charles Schwab.
Working at a Small-to-Medium Business or ISP – Chapter 8
Cyber Security Enterprise Risk Management: Key to an Organization’s Resilience Richard A. Spires CEO, Learning Tree International Former CIO, IRS and.
Team 4 – Mack, Josh, Felicia, Kevin and Walter
LAND RECORDS INFORMATION SYSTEMS DIVISION
Securing the Law Firm Myth vs. Reality vs. Practicality:
BUILDING A PRIVACY AND SECURITY PROGRAM FOR YOUR NON-PROFIT
CYB 110 Competitive Success/snaptutorial.com
CYB 110 Education Begins / Snaptutorial.com. CYB 110 All Assignments For more classes visit CYB 110 Week 1 Individual Protecting.
CYB 110 Education for Service-- tutorialrank.com
I have many checklists: how do I get started with cyber security?
Risks & Reality Cyber Security Risks & Reality
Office 365 Security Assessment Workshop
UConn NIST Compliance Project
IS4680 Security Auditing for Compliance
Cybersecurity Special Public Meeting/Commission Workshop for Natural Gas Utilities September 27, 2018.
County HIPAA Review All Rights Reserved 2002.
12 STEPS TO A GDPR AWARE NETWORK
EDUCAUSE Security Professionals Conference 2018 Jason Pufahl, CISO
Networking for Home and Small Businesses – Chapter 8
Cybersecurity Threat Assessment
Cyber Security in a Risk Management Framework
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
IT Management Services Infrastructure Services
DSC Contract Management Committee Meeting
Presentation transcript:

Thomas Levy

Agenda 1.Aims: Reducing Cyber Risk 2.Information Risk Management 3.Secure Configuration 4.Network Security 5.Managing User Access 6.Education & Awareness 7.Incident Management 8.Malware Prevention 9.Monitoring 10.Removable Media 11.Mobile Working 12.Summary

Aims: Reducing Cyber Risk Identify Monitor Maintain

Information Risk Management Adopt a framework Determine baseline level of risk for organisation Regularly discuss risk at board meetings Treat risk as a lifecycle

Secure Configuration Implement hardware / software asset register Baseline security builds for all network components Daily updates / patches Regularly scan for vulnerabilities

Network Security Protect Monitor Test

Managing User Access Limit admin accounts Monitor & audit users Establish account management process

Education & Awareness User security policy Staff security induction Refresher training on security threats Formal assessment of staff knowledge

Incident Management Incident response Disaster recovery Senior manager approval

Malware Prevention Anti virus throughout organisation Regular malware scans Regularly update anti virus

Monitoring Systems Network traffic

Removable Media Policies Scanning Encryption Corporate v Personal

Mobile Working Policy Awareness Security Baselines

Information Assurance Cuboid

Summary Choose a security framework Create policies Monitor