Logging Antivirus Examples Use recent examples from media of such attacks (RSA, Epsilon, Oak Ridge National Labs, HBGary). Articles in business magazines.

Slides:



Advertisements
Similar presentations
Nishidh, CISSP. To comply with Sarbanes oxley and other legislations To comply with industry standards and business partner requirements To protect.
Advertisements

Innovation or Necessity? ISM 158 By: Sepehr Saeb.
VERS Development and Thinking Howard Quenault and Nicholas Leask.
© 2013 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual.
CSI 2005 Computer Crime Survey Put together by J. Scott, 2006 Using Graphics and Text from the Published CSI/FBI 2005 Crime Survey.
SL21 Information Security Board Mission, Goals and Guiding Principles.
Lance Spitzner
Executive Insight through Enhanced Enterprise Risk Management Leverage Value From Your Risk Management Investment.
BNSF Ethics and Compliance Program Roger Nober Executive Vice President Law and Secretary July 13, 2011.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
AUDIT COMMITTEE FORUM TM ACF Roundtable IT Governance – what does it mean to you as an audit committee member July 2010 The AUDIT COMMITTEE FORUM TM is.
Security Controls – What Works
Planning and Managing Information Security Randall Sutton, President Elytra Enterprises Inc. April 4, 2006.
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
1 IMC Planning Knowing the Score In IMC, a plan is similar to a musical score. The IMC plan details which marketing communications and media should be.
 Can I do this?  How should I be looking at my department?  How are our “security” relationships?  What things could I be doing to sell our.
ISO 9000 Introduction Imran Hussain.
Business Risk Marketing Co-op.  Communication  What is communication?  Types of communication  Online  Telephone  Nonverbal Previously.
Insight Consulting Exercising the Top Team Simon Langdon, Principal Consultant.
INFORMATION SECURITY GOVERNANCE (ISG) Relates to the security of information systems Is an element of corporate governance.
 Jonathan Trull, Deputy State Auditor, Colorado Office of the State Auditor  Travis Schack, Colorado’s Information Security Officer  Chris Ingram,
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
Social Media Jeevan Kaur, Michael Mai, Jing Jiang.
Evolving IT Framework Standards (Compliance and IT)
Measuring Security Best Practices with OpenSAMM Alan Jex SnowFROC 2013.
Finance and Governance Workshop Data Protection and Information Management 10 June 2014.
Insurance Institute for Business & Home Safety Even if the worst happens, be prepared to stay.
Thomas Levy. Agenda 1.Aims: Reducing Cyber Risk 2.Information Risk Management 3.Secure Configuration 4.Network Security 5.Managing User Access 6.Education.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
 Virtual Solutions. Are you protected?  Back up procedures  Disaster recovery plan  Information security policies in action.
Web Security for Network and System Administrators1 Chapter 2 Security Processes.
Business Continuity and Disaster Recovery Chapter 8 Part 1 Pages 897 to 914.
Information Systems Ethics (Cyberethics) Dr. Robert Chi Department of Information Systems California State University, Long Beach.
A PRACTICAL GUIDE TO RESPONDING TO A HEALTHCARE DATA SECURITY BREACH May 19, 2011 | State College, PA Matthew H. Meade Stephanie Winer-Schreiber.
The Impact of Privacy on HP’s Customer Relationship Management Solution Mike Overly Vice President, Marketing © 2003 Hewlett-Packard Development Company,
℠ Pryvos ℠ Computer Security and Forensic Services May 27, 2015 Copyright © 2015 Pryvos, Inc. 1.
Cryptography and Network Security (CS435) Part One (Introduction)
Example Incident Mgmt Initiation No recording of Incidents Users can approach different departments Solutions of previous incidents are not available.
International Life Cycle Partnership To bring science-based life cycle approaches into practice worldwide UNEP/SETAC Life-Cycle Initiative Life Cycle Management.
Information Technology Services Strategic Directions Approach and Proposal “Charting Our Course”
Engineering and Management of Secure Computer Networks School of Engineering © Steve Woodhead 2009 Corporate Governance and Information Security (InfoSec)
1 © 2001, Cisco Systems, Inc. All rights reserved. Session Number Presentation_ID Security ROI and Conclusions Cisco commissioned custom research project.
Customs & Trade Solutions, Inc © Developing A Training Program WESCCON October 16, 2004.
Visibility. Intelligence. response Information Security: Risk Management or Business Enablement? Mike Childs Vice President Rook Security.
ISO CONCEPTS Is a management standard, it is not performance or product standard. The underlying purpose of ISO 1400 is that companies will improve.
1 Project Management C13PM Session 2 Project Initiation & Definition Russell Taylor Business Department Staff Workroom
New EU General Data Protection Regulation Conference 2016 Managing a Data Breach Prevention-Detection-Mitigation By Gerard Joyce Dun Laoghaire Feb 24 th.
Cyber Security in the Mobile Era KEEPING ENTERPRISE DATA SAFE IN THE BYOD ERA.
Employee Orientation to ISO Sygnetics, Inc. is committed to quality. ‘Quality’ is the ability to consistently produce a product or service that.
Dr. Mark Gaynor, Dr. Feliciano Yu, Bryan Duepner.
© 2012 BLR-Business & Legal Resources How to Promote the Business Value of Safety & Health David Galt Managing Editor, Safety.
Trinity Industries, Inc. FEI Presentation May 31, 2012.
HOW TO AVOID COMMON DATA BREACH PITFALLS IAPP Privacy Academy 2014.
Tech 50800: Champion/Define Phases DATE: PRESENTER: DARON SAUNDERS.
BP Centro Introduction and market entry to North-East Europe.
Best Cyber Security Practices for Counties An introduction to cybersecurity framework.
Securing Big Data is a business imperative. PROTECT BIG DATA
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
Information Security Program
Presenter: Mohammed Jalaluddin
Detection and Analysis of Threats to the Energy Sector (DATES)
Office 365 Security Assessment Workshop
Title By Name(s) CS 478 Network Security
ITP Maturity Model Survey 2018
Cyber Security Culture
Title By Name(s) CS 478 Network Security
Best Social Media Marketing Company
Certified Information Security Manager ISACA CISM
Presentation transcript:

Logging Antivirus

Examples Use recent examples from media of such attacks (RSA, Epsilon, Oak Ridge National Labs, HBGary). Articles in business magazines (WSJ, Forbes) Record incidents ( Recent human incidents in your organization. Conduct a security awareness survey or assessment. Compare money invested in securing a company computer versus company employee.

Value to Organization 1.Reduce risk (get examples of risk metrics from 2.Remain compliant (list any specific standards your organization must be compliant with). 3.Reduce costs (freeing up security resources to focus on more advanced threats) 4.Promotes secure brand that is serious about protecting our customers. 5.Train employees on our policies, processes and standards.

Non-Existent Compliance Focused Promoting Awareness & Change Long Term Sustainment Metrics Security Awareness Maturity Model

Key Points on Awareness Most awareness programs have had little impact because they were never designed to. Awareness is another control. Long term program – lifecycle. Not just prevention – detection and response. Not just about clicking on links.

What We Need Senior management support, including being part of communications. Business unit / department support to help coordinate organization wide deployment. Access to resources ( such as marketing, communications, human resources, etc.) Budget Sign-off on program or planning of program.

Summary Humans are another operating system but to date very little has been done to secure them. We can dramatically reduce risk to our organization and remain compliant by implementing an active, longer term awareness program.