JAMIE S. HERMAN, C|CISO, CISM, CISSP MANAGER OF INFORMATION SECURITY ROPES & GRAY LLP.

Slides:



Advertisements
Similar presentations
POSSIBLE THREATS TO DATA
Advertisements

Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
Data Leak Prevention: Safeguarding Corporate Information in a world of vanishing perimeters Kostas Papadatos MSc InfoSec, CISSP, ISO Lead Auditor,
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
UT Wing Civil Air Patrol. Objective Identify network and cyber vulnerabilities and mitigations Social Media/Metadata/Exfil data MITM Attacks Malware Social.
Chapter 8 Chapter 8 Digital Defense: Securing Your Data and Privacy
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Malicious Attacks By: Albert, Alex, Andon, Ben, Robert.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
Malicious Attacks By: Albert, Alex, Andon, Ben, Robert.
Internet Security PA Turnpike Commission. Internet Security Practices, rule #1: Be distrustful when using the Internet!
Internet Safety for Students Malicious Programs By: Mr. Bradshaw Scott City R-1 Schools.
Keeping Data Safe Revision Summer How many ways can data be lost? Start a list… Physical Loss or Corruption of data Accidental or Deliberate Unauthorised.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Quiz Review.
Threats to I.T Internet security By Cameron Mundy.
Information Security Information Technology and Computing Services Information Technology and Computing Services
Issues Raised by ICT.
Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human.
Protecting Your Computer & Your Information
Unit 2 - Hardware Computer Security.
Cyber crime & Security Prepared by : Rughani Zarana.
Business Computing 550 Lesson 6. 2 Security Threats on Web Sites Issues and vulnerabilities 1.Illegal Access and Use (Hacking the system or users exposing.
Spyware and Viruses Group 6 Magen Price, Candice Fitzgerald, & Brittnee Breze.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
Topic : Malicious Software Written By :Kaveh Maroufi December.
PROTECTION ON THE INTERNET NADIA SNOW VIRUS Is a file made to do harm or criminal activity there are many types: -worms -Trojan horse -Spyware How they.
Network problems Last week, we talked about 3 disadvantages of networks. What are they?
Security System Ability of a system to protect information and system resources with respect to confidentiality and integrity.
Computer viruses The effects of a virus are…  Slow loadings  Crashing  Not having control over the computer  Deleting documents.
Android Mobile Security Krystal Salerno. Introductions.
Data Security Overview. Data Security Periphery –Firewalls –Web Filtering –Intrusion Detection & Prevention Internal –Virus Protection –Anti Spy-ware.
COSC 513 Operating Systems Project Presentation: Internet Security Instructor: Dr. Anvari Student: Ying Zhou Spring 2003.
Malicious Attacks By: Albert, Alex, Andon, Ben, Robert.
Last Minute Security Compliance - Tips for Those Just Starting 10 th National HIPAA Summit April 7, 2005 Chris Apgar, CISSP – President Apgar &
CYBER RESILIENCE BEST PRACTICE. To Discuss Why cyber risk management is increasingly challenging How everyone has a role to play in your cyber risk management.
Computer Security By Duncan Hall.
14.1 Silberschatz, Galvin and Gagne ©2009 Operating System Concepts with Java – 8 th Edition Protection.
Security and Ethics Safeguards and Codes of Conduct.
Cybersecurity Test Review Introduction to Digital Technology.
Digital Security Jesline James! 9cc. Contents  The CREATORS!!!! =] The CREATORS!!!! =]  What is Digital Security? What is Digital Security?  How does.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Malicious Attacks By: Jamie Woznicki Rahul-Anaadi Kurl Alexander Kaufmann Curtis Songer Daniel Cardenas Rivero.
Information Systems Design and Development Security Risks Computing Science.
BYOD: An IT Security Perspective. What is BYOD? Bring your own device - refers to the policy of permitting employees to bring personally owned mobile.
Information Security and Technology Overview Presented By: Enterprise Risk Management (ERM) Division Jill Martucci, CISA, SSCP, Senior Allison Hall, Experienced.
Vulnerabilities in Operating Systems Michael Gaydeski COSC December 2008.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
Threats To Data 30 Threats To Data 30. Threats To Data 30 We’re now going to look at a range of different threats to people’s data: Opportunity Threats.
USDA 2016 Financial Management Training Transforming Shared Services Cyber Security Presented by Jack Blount.
Information Technology Security Office of the Vice President for Information Technology New Employee Orientation II.
Mobile Devices in the Corporate World
An Introduction to Phishing and Viruses
Big Picture Consider this How many online threats might you be faced with a day?
Recommending a Security Strategy
Cyber Security By: Pratik Gandhi.
McAfee Technical Support. McAfee.com/Activate McAfee helps to block from malware and malicious downloads, phishing websites, , spyware and it scans.
McAfee.com/Activate
Securing Information Systems
Unit 11 Task #1 Read the unit specification and create a glossary which defines each of the words / terms you don’t know.
Risk of the Internet At Home
How to keep the bad guys out and your data safe
What devices use the internet?
Securely run and grow your business
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Presentation transcript:

JAMIE S. HERMAN, C|CISO, CISM, CISSP MANAGER OF INFORMATION SECURITY ROPES & GRAY LLP

 50% - attacks on companies with fewer than 2500 employees  1719 – Average number of attacks per 1000 users  80 – FBI estimates more than 80 major US law firms were compromised in 2011  Exponential growth – 6x more malicious links (2012)

 Software that interferes with normal operation of your computer  Generally executes without your knowledge or consent  Can damage or disable your computer, or steal firm information  Includes viruses, trojans, works, and spyware

 Phishing campaign  Social Engineering  Unencrypted Media  Elevated privileges  Malicious websites

Perception…

 Critical aspect of Information Security  Client/Matter intake  How can you protect what you don’t know?  Many flavors (government, industry, business model)  Role Based Access Control (RBAC)  Need to know  Data Vaults

 Visibility  Data Leak Prevention (DLP)  Reporting  Client protection and retention  Compliance and competitive advantage

Hot Topics  Secure file sharing  encryption  Removable Media Encryption  Social media/personal access  Mobile devices (BYOD)

       

Remember Security is Everyone's responsibility! Sec-U-R-IT-y………You Are It!