Keogh and Associates Copyright 2003 Sellers, Resellers, Integrators, Consultants What Are Their Roles?? Presenter Colin Keogh Keogh and Associates.

Slides:



Advertisements
Similar presentations
Web Security for Network and System Administrators1 Chapter 1 Introduction to Information Security.
Advertisements

S3-1 © 2001 Carnegie Mellon University OCTAVE SM Process 3 Identify Staff Knowledge Software Engineering Institute Carnegie Mellon University Pittsburgh,
Computer Fraud Chapter 5.
Software Engineering CSE470: Process 15 Software Engineering Phases Definition: What? Development: How? Maintenance: Managing change Umbrella Activities:
© 2013 Cisco and/or its affiliates. All rights reserved. 1 Cisco Public Building Trustworthy Systems Overview and Strategy 2013 RSA Conference January.
M N P Onshore & Offshore SHIPBUILDING PROJECTS JSC "KRASNOE SORMOVO" SHIPYARD"
WHY USE A FLUID SEALING SPECIALIST? FOR SAFETY & RELIABILITY BECAUSE…….
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Keogh and Associates Copyright 2003 A LOOK AT LARGE SCALE DEPLOYMENTS Presenter Colin Keogh Keogh and Associates.
AFISS Prospectus of Services AFISS offers HACCP food safety and food quality systems development and management services including preparation for regulatory.
Security Controls – What Works
Managing the Information Technology Resource Jerry N. Luftman
MSIS 110: Introduction to Computers; Instructor: S. Mathiyalakan1 Systems Design, Implementation, Maintenance, and Review Chapter 13.
Information Systems Security Officer
Chapter 1 Assuming the Role of the Systems Analyst
Pertemuan Matakuliah: A0214/Audit Sistem Informasi Tahun: 2007.
First Practice - Information Security Management System Implementation and ISO Certification.
Factors to be taken into account when designing ICT Security Policies
Overview of IS Auditing n Need for control and Audit of Computers –Org cost of data loss –cost of incorrect decision –Value of hardware, software, personnel.
 QUALITY ASSURANCE:  QA is defined as a procedure or set of procedures intended to ensure that a product or service under development (before work is.
Oracle Security and GRC Professional Development Program.
Software Process Improvement Initiative
Database Administration Chapter 16. Need for Databases  Data is used by different people, in different departments, for different reasons  Interpretation.
Release & Deployment ITIL Version 3
Internal Auditing and Outsourcing
INFORMATION SECURITY GOVERNANCE (ISG) Relates to the security of information systems Is an element of corporate governance.
NUAGA May 22,  IT Specialist, Utah Department of Technology Services (DTS)  Assigned to Department of Alcoholic Beverage Control  PCI Professional.
SEC835 Database and Web application security Information Security Architecture.
BUSINESS DRIVEN TECHNOLOGY
Your Internal Audit Team …by your side …at your service …in your best interests.
Copyright © 2006 CyberRAVE LLC. All rights reserved. 1 Virtual Private Network Service Grid A Fixed-to-Mobile Secure Communications Framework Managed Security.
Dillon: CSE470: SE, Process1 Software Engineering Phases l Definition: What? l Development: How? l Maintenance: Managing change l Umbrella Activities:
1102 Contract Specialist as a Business Manager Debbie Bartlett Defense Acquisition University.
Vijay V Vijayakumar.  SOX Act  Difference between IT Management and IT Governance  Internal Controls  Frameworks for Implementing SOX  COSO - Committee.
Chapter Three IT Risks and Controls.
Thomas Levy. Agenda 1.Aims: Reducing Cyber Risk 2.Information Risk Management 3.Secure Configuration 4.Network Security 5.Managing User Access 6.Education.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Principles of Information Systems, Sixth Edition Systems Design, Implementation, Maintenance, and Review Chapter 13.
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
IT Staffing Solutions Presented by MicroAge May 22, 2008.
Category #2 Bundling and Unbundling Workgroup September 24, 2007.
Information Security What is Information Security?
Information Security 14 October 2005 IT Security Unit Ministry of IT & Telecommunications.
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Introduction to Information Security
Security Administration. Links to Text Chapter 8 Parts of Chapter 5 Parts of Chapter 1.
Principles of Information Systems, Sixth Edition 1 Systems Design, Implementation, Maintenance, and Review Chapter 13.
T.A 2013/2014. Wake Up Call! Malware hijacks your , sends death threats. Found in Japan (Oct 2012) Standford University Recent Network Hack May Cost.
Websense SLP (Software Licensing Program) Sherri Conover Websense Business Unit Manager March 17, 2010.
SAM-101 Standards and Evaluation. SAM-102 On security evaluations Users of secure systems need assurance that products they use are secure Users can:
BTS730 – Systems Analysis and Project Management Cost Management.
Case Study: Applying Authentication Technologies as Part of a HIPAA Compliance Strategy.
Chapter 3: Purchasing Research and Planning Strategic Planning for Purchasing Strategic planning for purchasing involves the identification of critical.
The NIST Special Publications for Security Management By: Waylon Coulter.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
LECTURE 5 Nangwonvuma M/ Byansi D. Components, interfaces and integration Infrastructure, Middleware and Platforms Techniques – Data warehouses, extending.
By: Mark Reed.  Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction.
Service Design.
Welcome to the ICT Department Unit 3_5 Security Policies.
Advanced Software Engineering Dr. Cheng
Cloud Security for eHealth – Study Validation
Team 1 – Incident Response
Team 2 – understand vulnerabilities
Paul Woods Chair, MITIGATION: Ensuring we procure cloud services taking into account of the risks involved Paul Woods Chair, ISNorthEast.
LM 8 Data Administration & Database Administration
INFORMATION SYSTEMS SECURITY and CONTROL
Project Management Chapter 11.
Today’s Agenda Dealing with Vendors Consultants Contracts
Presentation transcript:

Keogh and Associates Copyright 2003 Sellers, Resellers, Integrators, Consultants What Are Their Roles?? Presenter Colin Keogh Keogh and Associates

Keogh and Associates Copyright 2003 Physical Security Physical security is about protecting tangible assets from harm. These assets can include (but are not limited to) people, buildings, vehicles, documents, food and drink, pharmaceuticals, consumer or industrial products, art, museum artifacts, and money. The harm to be avoided can include theft, destruction, vandalism, sabotage, espionage, or tampering.

Keogh and Associates Copyright 2003 RESELLER INTEGRATOR CONSULTANT SECURITY SYSTEM MANUFACTURER

Keogh and Associates Copyright 2003 Consultants Consultants can help with your complete security plan and implementaion. They can also recommend integrators and resellers that they have worked with in the past. Their knowledge of the industry will save you thousands of dollars and hundreds of hours.

Keogh and Associates Copyright 2003 Vendors The biometric vendors manufacture the hardware or write the software. They do not supply complete integrated solutions. They work with resellers and integrators as their interface to the end user.

Keogh and Associates Copyright 2003 Integrators Integrators work closely with leading biometric technology vendors and independently keep abreast of the latest developments in the biometrics sector, they can provide solutions specific to each customer's security requirements. They are independent of the manufacturer so they can let the need drive the solution.

Keogh and Associates Copyright 2003 Resellers Resellers are retail partners for a manufacturer. They specialize in that manufacturer’s products and usually carry solution based software for the manufacturer’s hardware. Resellers let the hardware drive the solution. Give them your specifications and let them respond with their solution.

Keogh and Associates Copyright 2003 Something You Have Something Your Given Something you know Security Triangle

Keogh and Associates Copyright 2003 There is no single biometric that fits all and each deployment situation must be viewed on its own merits; this way, the requirements shape the biometric solution, the biometric solution does not shape the requirements.

Keogh and Associates Copyright 2003 The RFP Describe what is needed not how to achieve it Allow vendors to tender solutions Make the vendor prove that their integrated product meets your requirements Develop an evaluation model to compare the different solutions

Keogh and Associates Copyright % 20% 5% Security Threats

Keogh and Associates Copyright 2003 Risk Assessment Policies, Procedures, Standards Training Education, Best Practices, Info Sharing Biometric Integration Personnel Security Physical Plant Security Software and middleware Access Control Security Systems Policy Review / Assurance / Tests / Audit / Certification Physical Security

Keogh and Associates Copyright 2003 Security Components Security Policy Security Awareness Security Organization Physical Security Personnel Security Threat Assessment IT SecurityIncident Analysis Security Training

Keogh and Associates Copyright 2003 Top Security Mistakes Security threats and risks are not analyzed prior to selection of security technology and design Corporations fail to deal with the awareness and operational aspects of security Lack of robust security policy definition or non-adherence to security policies Absence of non-periodic security audits Lackadaisical implementation of physical security

Keogh and Associates Copyright 2003 Security Mistakes By Management Assigning untrained people to maintain security Failing to understand the relationship of physical security to the business problem Failing to deal with the operational aspects of security Authorizing reactive, short-term fixes leading to problems re-emerging

Keogh and Associates Copyright 2003

Expenditure Areas Increased Stayed the Same Decreased %& Internal security personnel expenditures Internal security operations expenditures Security consulting expenditures Contract guard expenditures General personnel screening expenditures Access control expenditures Anticipated Security Expenditures for

Keogh and Associates Copyright 2003

PROTECTION DETECTION REACTION