Cybersecurity for the modern Commercial Brokerage Presented by Brian W. Palm.

Slides:



Advertisements
Similar presentations
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Advertisements

Data Security and legal issues Starter :- 5 Minutes Make a list of all the companies and organisations that you believe holds data on you. Write down what.
Security and Systems. Three tenets of security Confidentiality Integrity Availability.
Black, White, Grey Hat Hackers Not all hackers are bad…which one’s which?
Computer Crimes and Security Professor Matt Thatcher.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
Management’s Role in Information Security V.T. Raja, Ph.D., Oregon State University.
Malicious Attacks By: Albert, Alex, Andon, Ben, Robert.
Bruce Schneier Lanette Dowell November 25, Introduction  “It is insufficient to protect ourselves with laws; we need to protect ourselves with.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
9 99 CHAPTER Privacy and Security - FAQ’s. 9 © The McGraw-Hill Companies, Inc Privacy How secure is data –On system –On Internet Private network.
Factors to be taken into account when designing ICT Security Policies
Computer Networks IGCSE ICT Section 4.
IT Security Readings A summary of Management's Role in Information Security in a Cyber Economy and The Myth of Secure Computing.
Norman Endpoint Protection Advanced security made easy.
Company LOGO Copyright Carrie Kerskie Data Breach & Identity Theft By Carrie Kerskie Kerskie Group, Inc.
Security The Kingsway School. Accidental Data Loss Data can be lost or damaged by: Hardware failure such as a failed disk drive Operator error e.g. accidental.
Protecting ICT Systems
Safe computing and Malware Presentation done by Tylor Hardwick, Alex Gilsdorf, Code Forrester, Xander Winans.
1 Group-IB: Digital investigations and forensic Ilya Sachkov Group-IB
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
Staying Ahead of the Curve in Cyber Security Bill Chang CEO, SingTel Group Enterprise.
IT Security for Users By Matthew Moody.
Technology in Action Alan Evans Kendall Martin Mary Anne Poatsy Twelfth Edition.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
IT Security/Online Loss Prevention Bill Finnerty Assistant Director of Information Technology Cumberland County.
1 Managed Premises Firewall. 2 Typical Business IT Security Challenges How do I protect all my locations from malicious intruders and malware? How can.
What does secure mean? You have been assigned a task of finding a cloud provider who can provide a secure environment for the launch of a new web application.
© 2007 Cisco Systems, Inc. All rights reserved.ICND1 v1.0—1-1 Building a Simple Network Securing the Network.
Chapter 01: Introduction to Network Security. Network  A Network is the inter-connection of communications media, connectivity equipment, and electronic.
Lesson 7-Managing Risk. Overview Defining risk. Identifying the risk to an organization. Measuring risk.
INGOTs Computer Security Name: Elliot Haran. Introduction  Staying safe on the internet  Learning to deal with Cyber Bullying, Stalking and grooming.
Kaspersky Labs 6 ht Annual Partner Conference · Turkey, June Kaspersky Labs 6 th Annual Partner Conference · Turkey, 2-6 June 2004 November 16.
Small Business Security Keith Slagle April 24, 2007.
James McQuillen. Data protection Act 1998 The main aim of it is to protect people's fundamental rights and freedom to a particular right to privacy of.
Desktop Security: Making Sure Your Office Environment is Secure.
What is hacking? Hacking is the use of a computer and its files with out being allowed by the owner. Hacking is used to find out peoples passwords and.
Computer Ethics. Computer Virus  A Virus is a computer program written to alter the way a computer operates, without the permission or knowledge of the.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Bailey Ryan.
Computer Misuse By: Alex Meadows Michael Read. How can you misuse a computer? Accessing data stored electronically Copying software without permission.
Computer Security By Duncan Hall.
Mobile Security By Jenish Jariwala. What is Mobile Security?  Mobile Security is the protection of smartphones, tablets, laptops and other portable computing.
Information Systems in Organizations 3.2 Systems Management.
Matt Broman Kodiac Gamble Devin Nichol SECTION 4.2 INFORMATION SECURITY.
Safe’n’Sec IT security solutions for enterprises of any size.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
DoS Attacks Phishing Keylogging Computer Laws/Acts.
Cybersecurity Test Review Introduction to Digital Technology.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
BTEC NAT Unit 15 - Organisational Systems Security ORGANISATIONAL SYSTEMS SECURITY Unit 15 Lecture 3 OTHER DAMAGING THREATS.
THE NEED FOR NETWORK SECURITY Hunar & Nawzad & Kovan & Abdulla & Aram.
1 Figure 1-6: Attacks and Defenses (Study Figure) Access Control  Access control is the body of strategies and practices that a company uses to prevent.
Created by Alexis Ford Research done by Rebecca Tanner Ford 1.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
Threats To Data 30 Threats To Data 30. Threats To Data 30 We’re now going to look at a range of different threats to people’s data: Opportunity Threats.
Cyber Security – Client View Peter Gibbons | Head of Cyber Security, Group Business Services Suppliers’ Summer Conference 15/07/2015.
BizSmart Lunch & Learn Webinar Information Security and Protecting your business With the increased risk of some sort of cyber- attack over the past few.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
James Paik. What is a virus? A virus is a malicious program that can be executed on the computer and can cause damage to it.
Easy3s Smart Cop antivirus Total Security for Internet ERA.
PROTECTING YOUR DATA THREATS TO YOUR DATA SECURITY.
Calgary Computer Security Solutions
Securing the Academy: Better Cybersecurity for Instructors and Administrators
Answer the questions to reveal the blocks and guess the picture.
Cyber Security Challenges & Opportunities.
Forensics Week 11.
Computer Crime and Security Measures
Presentation transcript:

Cybersecurity for the modern Commercial Brokerage Presented by Brian W. Palm

Gorilla in the front of the room 20 years in Cybersecurity Start as a Gray Hat Hacker and Cryptologist 3rd generation Real Estate Professional Managing Broker/Owner of Palm Real Estate Ventures, Inc. Owner of Palm International, Inc.

Warning: The sky is NOT falling! But the world is changing and there are constant cyberthreats.

What is Cybersecurity? Protecting your digital assets from both external and internal threats.

What are the Threats? (Past) Viruses The neighbors kids Disgruntled employees Other Companies

R2 Units

What are the Threats? (Current) Viruses Adware Ransomware Disgruntled employees Other Companies Foreign Government Cyber Criminals Cyber Terrorists And more.

BB Units

Post-it Notes

A Change in Thinking! Past: How do I keep from getting hacked? Now: How do I deal with getting hacked?

A Change in Thinking! Past: Finding a needle in a haystack!

A Change in Thinking! Now: Who accessed which piece of hay, were they authorized, was a copy made, where else is that data?

Where do we start?

Why do Threats Attack? Information Passwords Financial Information Confidential information Masking Money And more…

Methods to protecting Passive vs. Proactive

Which one is right? Both!!

Your Landscape Data/Information People Policy Technology

Data/information What type of information do you have? What type of information are you collecting? Where is information kept? How does information come in and go out?

People Who has access? What level of access?

Policy Who is allowed to have access? When can they have access? Who owns the data? What strength of security required? What is going to be done when hacked? Who is going to pay for damages ?

Technology What are you reasonable for protecting? Computers Laptops Servers Smartphones Cloud Facility System And more.

Security Technology Antivirus Anti-Malware Filters Firewalls Detection system Business Intelligence And more.

How to stay secure Training Maintenance Don’t stand still!

Q & A