Download presentation
Presentation is loading. Please wait.
Published byElaine Walsh Modified over 10 years ago
1
Sponsored by:
2
Introduction: Mark Lyons Senior Director of Business Development Procore Technologies, Inc. Sponsored by:
3
This presentation will be recorded and available on-demand (copies of the PowerPoint are not available). If you would like to ask questions during the presentation, use the chat window located on the bottom panel. We will be answering questions at the end of the presentations. All the presenters email addresses will be provided to you at the end of the webinar. ? Record Sponsored by:
4
Sponsored by Why Companies Choose Procore
5
Sponsored by The #1 Most Widely Used Construction Management Software 1,300+ client accounts, 750,000+ users Used in over 92 countries 3X increase in engineering over the last 18 months
6
Sponsored by Founded in 2003, Procore is a cloud-based construction project management SaaS provider headquartered in Santa Barbara, CA with multiple offices and US-based support. Who We Are
7
Sponsored by Over the last year and a half, Procore has witnessed a Procore has taken several steps to improve our products including securing $30M investment from ICONIQ Capital in 2015 and $16M in 2014 from Bessemer Venture Partners. revenue growth per year since 2010 is a testament to the success of the solutions Procore continues to build. increase in engineering by more than tripling our engineering headcount. Recent Growth
8
Sponsored by Procore Customers OWNERSENG/ARCH GENERAL CONTRACTOR COMMERCIALGOVERNMENTHEALTHCARERETAIL COMMERCIALINDUSTRIALMULTI-FAMILYINFRASTRUCTURERESIDENTIAL SUB CONTRACTORS
9
Sponsored by Our strong company culture attracts top talent, making Procore one of the top places to work in the area.
10
Moderator: Tom Sawyer Deputy Editor Engineering News-Record
11
Jason T. Burns Vice President, Chief Information Officer Hunter Roberts Construction Group John Jacobs Senior Vice President and Chief Information Officer JE Dunn Construction Reed Loden Director of Security HackerOne
12
Jason T. Burns Vice President, Chief Information Officer Hunter Roberts Construction Group
13
Jason T. Burns Vice President, Chief Information Officer Jason Burns is responsible for Hunter Roberts technology umbrella including core network infrastructure, project site infrastructure, and software and security management. Under Jason’s direction, the Technology department is dedicated to working with internal and external business partners to align systems with Hunter Roberts’ global strategies. Jason is responsible for creating system, policies, and procedures that will support Hunter Roberts in the years to come, focusing on efficient processes, systems, and tool sets that keep Hunter Roberts employees well informed. Jason has gained broad experience throughout his 16-year career in the construction industry. He has held a variety of positions in the field and back office, from subcontractor Laborer to Senior Financial Analyst for the nations largest builder. Jason’s Information Technology, Accounting, and Operations experience allows him to create real-time solutions that brings value to all company. Jason is also widely recognized as an industry expert; he speaks about technology in the construction industry frequently and is published regularly.
14
The moment you realize you are vulnerable
15
Tactile Vest Name badge “Hacker” Briefcase of doom The vest may be worse Capture the flag in eight minutes from turnstiles to the end users machine SAY HELLO TO MY FIRST PHYSICAL THREAT
16
WHAT DID I LEARN? 1 Weakest Link? 2 Personal & Private Information 3 Banking
17
USB Control IPS Port ControlWireless MDM Malware / Viruses Physical Access Control 802.1 X LEM Two-Factor Authentication WHAT DID I RESEARCH? Research…
18
Low Cost BIG Gain Items Proxy All Traffic on and Off network DROP Malware/Adware in First Four Weeks
19
Low Cost BIG Gain Items File Review Email/Download DROP Malware/Virus in first 4 weeks
20
Low Cost BIG GAIN Less Help Desk Tickets
21
Great!!! Now you have all this security, now what? 1 Time 2 Knowledge Base 3 Attack Vectors Change Rate 4 Assets
22
John Jacobs Senior Vice President and Chief Information Officer JE Dunn Construction
23
About JE Dunn Founded in 1924 in Kansas City, Missouri Expanded to 20 offices around the United States Ranked 12 th in the US for General Building Contractors (by ENR) Family & employee owned
24
Industry Observations Internet of Every(Things) Threat Landscape Collaboration Demands
25
Top Security Threats Insider Misuse (unintentional data access) Crimeware/Ransomware (project data access) Theft/Loss (workstation theft) Web Application Attack (external user access) Phishing (financial target, corporate data access) Malware (internal efficiency degradation)
27
What are we doing? Define security standards – Corporate & Individual Security Incident Event Monitoring & Management Intrusion Detection/Prevention System Firewall Upgrades Vulnerability Management Endpoint Security Remediation Email Security Intelligence Analysis
28
People, price, and period Level of effort Resources (FTEs) Capital How long it took Planning Execution Expected continuing effort Resources Capital
29
Early Wins “Rare Double” – During our firewall upgrade initiative, we increased our security capability while increasing our capacity and productivity. Security Analytics – Ignorance is very risky bliss. Analyzing events on our network has brought to light security issues to remediate as well as identified application misconfiguration that we could easily fix prior to them becoming a critical issue.
30
Case Study – Collaboration, and the effects on Risk and Response The Problem - HackingTeam Exploit-Kit Leak (July 5 th, 2015) The Collaboration – Local FBI, InfraGard, and Threat Intelligence Exchange The Result – Within day(s), perimeter defended. Within hours, patches applied as available. Immediate, as intelligence is shared, we update our now existing defenses.
31
Take-Aways No matter the size of the organization, we have found that the following apply across all: Fundamentals Executive Support Perimeter Security Data Classification Corporate and End User Policy Operations Security Monitoring Incident Management Security Operations Improvement Security Awareness Risk Management Research and Development
32
Reed Loden Director of Security HackerOne
33
Professional Defender… I am Reed -- security is what I do Director of Security at HackerOne Security expert, hacker, and developer Previously Lookout Mobile Security, Mozilla, Palantir…
34
43% of companies have experienced a data breach in the past year 71% of security breaches target small businesses
35
What are criminals looking for?
36
Real Threats… Ransomware
37
Real Threats… Lax security posture
38
Real Threats… Social Engineering Attacks
39
12 Steps to take today… Use a Password Manager o 1Password, LastPass Always use 2-Factor Authentication o Critical for VPN and cloud services Install/use Malware/Virus Protection o Microsoft Security Essentials is free! Use Chrome or Firefox for Internet browsing o Disable / Use click-to-play for Java and Flash
40
12 Steps to take today… Turn on Automatic Software Updates o Includes OS, browsers, and various software suites such as Adobe and Microsoft Office Have a Mobile Devices Management Policy o Encrypted, passwords required, & ability to remote wipe Examine Sharing Settings o Who really needs access? Ensure not sharing with world. Secure Your Infrastructure o Use SSL/TLS, firewall, and maybe some form of IDS/IPS
41
Be prepared for Social Engineering attacks o Occur in both the physical and virtual worlds Have plans for dealing with an incident / breach o It will happen. Ensure you are prepared for it. Define an “off-boarding” process o Stick to it and keep updated; think about sub-contractors Switch to Card Readers o Locks are easy to pick; keys offer no accountability 12 Steps to take today…
42
Q & A
43
Sponsored by “Since we started using Procore, over the last year we were able to increase our sales by over 60%. Without Procore we wouldn’t have been able to handle that amount of work.” - Sylvia Lamas, Wells Construction Project Management From Bidding to Closeout
44
Sponsored by Be up and running in weeks, not months or years Unlimited users, no per-user fees or seat licenses Easy to learn, intuitive interface "Procore ensures we never have to hire additional resources in the office for administrative purposes. That’s a testament to Procore’s ROI––I’m saving 2-3 salaries worth of money.” - Geoff Bambini, Asturian Group Unrivaled Time to Value
45
Sponsored by Procore offers industry leading mobile project management on iOS and Android devices. Take photos Approve RFIs Close punch list items Mark up drawings Record meeting minutes View schedules Approve or reject submittals And more! The Power of Procore in the Palm of Your Hands
46
Sponsored by Client Loyalty
47
Sponsored by Thank you! Contact Us 866.477.6267 sales@procore.com Procore’s FREE drawing management app:
48
Mark Lyons mark@procore.com Tom Sawyer tom.sawyer@construction.com Jason T. Burns jburns@hrcg.com John Jacobs john.jacobs@jedunn.com Reed Loden reed@hackerone.com Sponsored by:
Similar presentations
© 2025 SlidePlayer.com Inc.
All rights reserved.