Presentation is loading. Please wait.

Presentation is loading. Please wait.

Fourth ICT Security Conference 2017

Similar presentations


Presentation on theme: "Fourth ICT Security Conference 2017"— Presentation transcript:

1 Fourth ICT Security Conference 2017
IT Security Controls Endpoint Security Luka Milinković, IT Auditor Komercijalna banka AD Beograd

2 If we want to protect access to corporate resources and information, we need to properly manage security endpoints. We need to define and implement the necessary IT security controls. IT security controls

3 problems Malicious software Data leakage
What can happen if IT security controls are not well-defined or non-existent? problems

4 Rules and Exceptions We have rules and exceptions
Sometimes rules are not a problem But exceptions can be Rules and Exceptions

5 Examples BYOD, BYOPC, BYOP, BYOT
Corporate computers and mobile devices Personal computer and mobile device Work in cloud Examples

6 Computer protection basic rules
Lock the computer (automatic) Antivirus protection (send boxing) Computer protection basic rules

7 Computer protection AdvanceD rules
Protection of interfaces – USB and memory slots are locked Hard disk encryption – laptop, notebook Computer protection AdvanceD rules

8 Computer protection AdvanceD rules
Restriction of internet traffic – Security Web Gateway (proxy server), LAN, IP addresses WiFi in the company – Out of the corporate network Internet (LAN, WiFi) out of the company through the VPN Computer protection AdvanceD rules

9 Computer protection Exceptions
It is necessary to know who is delegated (owner) to approve requirements that different from the rules and when is it justified Internet traffic – Bypassing of SWG Computer protection Exceptions

10 Computer protection Exceptions
USB flash memory is allowed, but disabled functions are read, write or delete Company’s USB flash memory Restriction of USB flash memory by serial number Hardware encryption of USB flash memory Computer protection Exceptions

11 Corporate e-mail E-mail protection (spam, phishing…)
Internal or external server OWA (Outlook Web Access) service on the phone PIN for mobile – Exchange can force the screen lock on the devices Mobile Device Management (MDM) Corporate

12 Mobile Devices phones and tablets
Lock the devices (automatic) Data protection – encryption Disable installation of applications Remotely delete phone data Internet traffic through APN (automatic VNP) – service by mobile provider Mobile Devices phones and tablets

13 Mobile Devices phones and tablets
Protection of conversation and attachments on the phone PIN for mobile – Exchange can force the screen lock on the devices Mobile Device Management (MDM) Mobile Devices phones and tablets

14 SOLUTIONS Malicious software protection
Protection of interfaces – USB and memory slots are locked Read, write, delete functions USB flash memory with hardware encryption SOLUTIONS Malicious software protection

15 SOLUTION Data leakage protection
Unintentional data leakage Hard disk encryption USB flash memory encryption and/or restriction of USB flash memory by serial number SOLUTION Data leakage protection

16 Education of employees
Our company is secure as much as secure our weakest employee Education of employees

17 IT Security Controls – Endpoint Security
Fourth ICT Security Conference 2017 Thank you! IT Security Controls – Endpoint Security Luka Milinković, IT Auditor Komercijalna banka AD Beograd


Download ppt "Fourth ICT Security Conference 2017"

Similar presentations


Ads by Google