℠ Pryvos ℠ Computer Security and Forensic Services May 27, 2015 Copyright © 2015 Pryvos, Inc. 1.

Slides:



Advertisements
Similar presentations
Security and Control Soetam Rizky. Why Systems Are Vulnerable ?
Advertisements

David A. Brown Chief Information Security Officer State of Ohio
DHS, National Cyber Security Division Overview
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
CERT ® System and Network Security Practices Presented by Julia H. Allen at the NCISSE 2001: 5th National Colloquium for Information Systems Security Education,
Security Controls – What Works
PPA 573 – Emergency Management and Homeland Security Lecture 9b - Department of Homeland Security Strategic Plan.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
(Geneva, Switzerland, September 2014)
Security Offering. Cyber Security Solutions 2 Assessment Analysis & Planning Design & Architecture Development & Implementation O&M Critical Infrastructure.
Higher Education Cybersecurity Strategy, Programs, and Initiatives Rodney Petersen Policy Analyst & Security Task Force Coordinator EDUCAUSE.
Draft of June 9, 2015 Cyber Risks in the Boardroom Managing Business, Legal and Reputational Risks Perspectives for Directors and Executive Officers Preparing.
Session 3 – Information Security Policies
Information Security Governance in Higher Education Policy2004 The EDUCAUSE Policy Conference Gordon Wishon EDUCAUSE/Internet 2 Security Task Force This.
Computer Security: Principles and Practice
Cyber Security Finance Forum 2012 Michael DuBose Managing Director & Practice Leader Cyber Investigations.
Company LOGO Copyright Carrie Kerskie Data Breach & Identity Theft By Carrie Kerskie Kerskie Group, Inc.
Internal Auditing and Outsourcing
In the Belly of the Breach: What Every In-House Counsel Needs to Know about Data Breach Response ACC International Legal Affairs Committee Legal Quick.
INFORMATION SECURITY GOVERNANCE (ISG) Relates to the security of information systems Is an element of corporate governance.
1 Group-IB: Digital investigations and forensic Ilya Sachkov Group-IB
Module 3 Develop the Plan Planning for Emergencies – For Small Business –
BITS Proprietary and Confidential © BITS Security and Technology Risks: Risk Mitigation Activities of US Financial Institutions John Carlson Senior.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #6 Forensics Services September 10, 2007.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 14 – Human Factors.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Australia Cybercrime Capacity Building Conference April 2010 Brunei Darussalam Ms Marcella Hawkes Director, Cyber Security Policy Australian Government.
Cyber Security Nevada Businesses Overview June, 2014.
A PRACTICAL GUIDE TO RESPONDING TO A HEALTHCARE DATA SECURITY BREACH May 19, 2011 | State College, PA Matthew H. Meade Stephanie Winer-Schreiber.
Risk Assessment: Key to a successful risk management program Sixteenth National HIPAA Summit Timothy H Rearick, MBA, PMP August 22, 2008.
Scott Charney Cybercrime and Risk Management PwC.
Proprietary Information of BearingPoint Inc. | Copyright 2005 BearingPoint Inc. All rights reserved. America’s First National Critical Infrastructure Exercise.
PwC Informations- gold assets. 2 Introduction 3 Central and Eastern EuropeGlobal Number of companies that have been victims of economic crime in the.
Territory Insurance Conference, resilient future Mr Ralph Bönig, Special Counsel, Finlaysons Cyber Times and the Insurance Industry Territory Insurance.
Chapter 3 Pre-Incident Preparation Spring Incident Response & Computer Forensics.
Albany Bank Corporation Security Incident Management Program.
IT Security CS5493(74293). IT Security Q: Why do you need security? A: To protect assets.
February 2, 2016 | Chicago NFA Cybersecurity Workshop.
Chapter 2 Incident Response Management Handbook Spring Incident Response & Computer Forensics.
CYBERSECURITY: RISK AND LIABILITY March 2, 2016 Joshua A. Mooney Co-chair-Cyber Law and Data Protection White and Williams LLP (215)
Investigations: Strategies and Recommendations (Hints and Tips) Leah Lane, CFE Director, Global Investigations, Texas Instruments, Inc.
Trinity Industries, Inc. FEI Presentation May 31, 2012.
HOW TO AVOID COMMON DATA BREACH PITFALLS IAPP Privacy Academy 2014.
Program Overview and 2015 Outlook Finance & Administration Committee Meeting February 10, 2015 Sheri Le, Manager of Cybersecurity RTD.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
November 19, 2002 – Congress passed the Homeland Security Act of 2002, creating a new cabinet-level agency DHS activated in early 2003 Original Mission.
March 23, 2015 Missouri Public Service Commission | Jefferson City, MO.
BruinTech Vendor Meet & Greet December 3, 2015
Information Security Program
Master’s Degree Program in Business Compliance Assurance
Responding to Intrusions
California Cybersecurity Integration Center (Cal-CSIC)
Reducing Cost and Risk During an Investigation
Cybersecurity Policies & Procedures ICA
Information Security based on International Standard ISO 27001
Chapter 3: IRS and FTC Data Security Rules
8 Building Blocks of National Cyber Strategies
Csilla Farkas Cybersecurity Csilla Farkas
Understanding Cyber Insurance NASCUS/CUNA Cybersecurity Symposium
Cybersecurity Special Public Meeting/Commission Workshop for Natural Gas Utilities September 27, 2018.
Cybersecurity ATD technical
1 Advanced Cyber Security Forensics Training for Law Enforcement Building Advanced Forensics & Digital Evidence Human Resource in the Law Enforcement sector.
Neil Kirton and Zoë Newman
Cyber Security: What the Head & Board Need to Know
DSC Contract Management Committee Meeting
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
Introduction to Digital Forensics
Anatomy of a Common Cyber Attack
Presentation transcript:

℠ Pryvos ℠ Computer Security and Forensic Services May 27, 2015 Copyright © 2015 Pryvos, Inc. 1

℠ Our Mission Pryvos ℠ helps organizations: Protect data Protect the brand Comply with laws and regulations Reduce litigation risk Copyright © 2015 Pryvos, Inc. 2

℠ Core Service Summary Pryvos ℠ offers four core services: Cybersecurity assessments Cyber Incident response planning Cyber Incident response Digital investigations (forensics) Copyright © 2015 Pryvos, Inc. 3

℠ Cybersecurity Assessments Pryvos ℠ uses a proprietary methodology leveraging the NIST Cybersecurity Framework – Ensures that the organization will meet the standard of care to which it could be held liable in legal proceedings and the court of public opinion Pryvos ℠ will: – Assess risk based on current security posture and information assets – Perform vulnerability assessments using industry-leading technical tools Pryvos ℠ consulting engagements result in a written information security program, or WISP: – Often required by law – Documents a cybersecurity control strategy appropriate for your business. – Controls will vary depending on your budget constraints, industry, geography, technical maturity, threat environment, and reliance on trade secrets Copyright © 2015 Pryvos, Inc. 4

℠ Cyber Incident Response Planning Cyber incident response planning is a critical component of an effective information or computer security program. Pryvos ℠ assists organizations throughout all stages of incident response planning from conception to maintenance, all while minimizing impact to your current operations. Pryvos ℠ will: – Build the business case for an incident response program – Develop written plans tailored to the specific needs of your business – Train employees on the actions to be performed in the event of a breach – Advise on hardware, software, and services that facilitate an optimal response – Lead a simulation of a breach to test your readiness Copyright © 2015 Pryvos, Inc. 5

℠ Cyber Incident Response Cyber incident response is the restoration of a strong security posture after a breach or attack. Pryvos ℠ will: – be your trusted advisor from detection through remediation – work with your IT and security personnel to conduct triage, contain the breach, remediate damage, and get your business back to normal – prepare statements and coordinate with all key stakeholders including customers, employees, law enforcement, regulators, and the press – staff your organization’s war room, alleviating the need for key employees to be pulled from mission-critical daily tasks Pryvos ℠ can also refer clients to vetted attorneys who can provide specialized legal counsel where warranted. Copyright © 2015 Pryvos, Inc. 6

℠ Digital Investigations Pryvos ℠ performs digital investigations using industry-leading forensic technology. Pryvos ℠ will identify, collect, and preserve evidence of: – unauthorized access – malware – denial of service – fraud – intellectual property theft – violations of corporate policies concerning acceptable use of IT assets Pryvos ℠ can also assist your organization with building its own internal investigations capability through: – procurement advice – training – procedures development Copyright © 2015 Pryvos, Inc. 7

℠ Pryvos ℠ Leadership Bernard C. Eydt CEO Attorney and technologist with over 20 years of cybersecurity experience. Provided cybersecurity solutions to the US Departments of Defense and Homeland Security, the National Institute of Standards and Technology, and the Financial Industry Regulatory Authority. Holds degrees in law, economics, statistics and computer science from Concord, Princeton, Yale, and Columbia respectively. Sylvia Syracuse VP Business Development Over 15 years of experience in corporate relations and business development. Director of marketing and events and Broadbreakfast.com, a technology policy news and events start-up in Washington DC. Graduate of Swarthmore College. Copyright © 2015 Pryvos, Inc. 8

℠ Contact Us Copyright © 2015 Pryvos, Inc. 9

℠ 10 ℠

℠ 11 ℠