Social Media Risk and ISACA. All Rights Reserved.

Size: px
Start display at page:

Download "Social Media Risk and. 2012 ISACA. All Rights Reserved."

Transcription

1 Social Media Risk and Mitigation Guidance

2 SPEAKER BIOGRAPHIES Rumy Jaleel Khan, CISA, CRISC, is a senior manager in the Houston AERS practice with 10 years of experience in performing internal controls for financial reporting (ICFR) audits, operational audits, Sarbanes readiness, Sarbanes remediation, general computer controls reviews and security assessments. Jl Jaleel Khan lkh has performed several system implementation reviews of Oracle, PeopleSoft, JDE ERP implementations and other homegrown software. He has established and performed assessments of various compliance programs such as the North American Electricity Reliability Council s (NERC), Cii Critical linfrastructure Protection (CIP) requirements. He has also performed a comprehensive review of a large multi national company s compliance with the Foreign Corrupt PracticesAct (FCPA). Mike Wyatt, CISA, is a director with Deloitte & Touche LLP within the Center for Security and Privacy Solutions. He has over 22 years of experience designing, building, and managing security management as well as identity and access management solutions. Wyatt serves nationally as a quality assurance director for security and privacy engagements where he provides independent oversight to engagement teams, reviewing project tasks and deliverables for completeness and applicability to the client environment. Wyatt serves on the board of the University of Texas Center for Identity and was the founding chair hifor the International lassociation i of Pi Privacy Professionals (IAPP) Knowledge Network for Central Texas. During the past 15 years, he has presented in the US, Europe, and Asia on a variety of security and identity and access management topics.

3 Contents Overview of Social Media Drivers and Benefits of Social Media A Governance, Risk, and Compliance (GRC) Roadmap to address Social Media Risk Governance Risk Assessment Policy Awareness Communication Controls

4 O i f Overview of Social Media

5 Recent news 45,000 Facebook logins hijacked 760 Companies hit by foreign countries hacking operation 8 out of 10 companies are talked about on Twitter 680,747 Views per corporate YouTube channel 845 million Active Facebook users

6 Social media revolution Social media.it s everywhere! Source: YouTube, Socialnomics 3 [Video].

7 Social media landscape Social media technology involves the creation and dissemination of content through social networks using the Internet. An ISACA Emerging Technology White Paper Entertainment Review & opinion Virtual community Collaboration Multimedia Social Media Conversation 1 The State of the U.S. Mobile Advertising Industry and What Lies Ahead, comscore,june 2011

8 Social media platforms Social media are highly accessible, scalable methods of online communication and social interaction, which allow the creation and exchange of user-generated content. There are 7 main types of social media platforms Wikis Presence and Micro blogging RSS (Rich Site Summary) Blogs Social Media Online Photo and Video Sharing Social Networking Social Book marking and News

9 Evolvement of social networking and media Web 1.0 Inspired by Industrial Age Hierarchical (Hierarchy controls and regulates) Linear interaction simple minded Organizations innovate Organizational segments Web 2.0 Information Age Democratic (Community controls and regulates) Network relationship complex Customers provide the innovation Customers provide the segmentation Web 3.0 The Age of Expertise In the recent years, the end users have taken the control of the Internet transforming its use from a monologue to a dialogue. Collaborative problem solving and innovation is leading to higher productivity. User s expectation of performance are driven by technology. The differences between traditional and social media are defined by the level of interaction and dinteractivity ti it available to the consumer. An ISACA Emerging Technology White Paper

10 Di db fi f Drivers and Benefits of Social Media

11 Why do companies use social network media? To improve customer satisfaction and loyalty To recruit and retain the best talent To enhance brand awareness and perception To strengthen connections and relationships, and access internal expertise and insight Social Media offers an approach to realize these benefits To use social media channels to address any negative publicity or misunderstanding Enterprises that aggressively embrace social media as part of their strategy are more financially i successful. An ISACA Emerging Technology White Paper

12 Use and benefits of social media Social networking could benefit your company by making connections across the network, creating intellectual capital, making collaboration tools more accessible, and significantly increasing the shared content.

13 Human resources example D Street D Street is Deloitte s internal talent networking tool Over 47,000 active profiles with about 120,000 views per month As used in this document, Deloitte means Deloitte LLP and its subsidiaries. Please see for a detailed description of the legal structure of Deloitte LLP and its subsidiaries. Certain services may not be available to attest clients under the rules and regulations of public accounting.

14 Social lmedia Risks

15 Discussion Point Does your organization have an official policy for social media use? What is the average total productivity decrease for companies allowing employees to access social networking sites at work? 1% 15% 1.5% 12% 52%

16 Social media incidents and risks Employees at a Medical Center in California posted patient information on a social network. Five nurses were subsequently fired. Privacy Risk Regulatory Compliance Risk An employee used a social network to post insulting comments about the city shortly before presenting to the worldwide communications group. Loss of control over content A customer of a big airline carrier shared a video of a detailed complaint online, which caused a $180 million (10%) market cap impact. Brand/reputation Loss Negative Publicity A major news corporation s social networking account was compromised. The hackers posted a false message that an airliner had crashed at Ground Zero. Identity theft Impersonation

17 Social media high-level threat landscape The advent of Social Media into the corporate environment brings along multiple risk to the Data, Technology, People, and Organization. Copyright Issue Unsatisfied Constituents t Identity Theft Lack of Situational Awareness Unauthorized Disclosure Intellectual Property leakage Data Technology Vulnerabilities HR Policy Violations Virus/ Worms/Trojans People Impact network availability (DOS) Loss of Productivity Social Engineering / Impersonation Privacy Risk Loss of Control Over Content Trademark Infringement Brand / Reputation Loss Negative Publicity False Impression/ Misguidance Organization Public

18 Social media High-level threat landscape Techniques Use social networking sites to enumerate users Taking information learned and using it for social engineering schemes such as targeted phishing messages Getting unsuspecting users to install 3rd party fraudulent applications which provide access to entire user profile s with profile pictures from friends are being used to get users to click on links Using short URLs to obfuscate malicious links Using compromised accounts of friends Celebrity impersonation Blogging Chat File sharing Document meta data Open APIs Third party applications Third party services Video Voice chat Threat Vectors Social Networking Exploits Social Networking account hi-jacking Follower spam-spam links on profile pictures Social Networking brand hi-jacking leading to malware Black hat search engine optimization Malicious banner ads Botnet command and control Malicious background images Distributed Denial of Service attacks Spear Phishing Hack for Hire Schemes Man in the Middle Attacks Click-jacking / Cookie Stuffing Full browser control by 3rd party applications

19 Social media attack illustration pretexting+ 1. Pretexting target selection 2. Gain a toehold 3. Deep discovery 4. Exploit leverage The hacker sees that the user has repeatedly mentioned bad experiences with the ATM A hacker looks for information provided on Access to the account provides further The more someone knows about a person, the easier unsecured social media information, including home it is to impersonate them profiles and collects key of Bank Q on a social and mailing address, that both electronically and in info (DOB, Hometown, employer, picture of a new baby or car). network. Using the information gathered in step 1, the hacker can exploit multiple channels to execute a password reset of the user s account at Bank Q. can be used to redirect mail or examine transaction history, giving even more exploitable clues. person to unwitting staff (Helpdesk, physical security personnel, etc.)

20 Detour: Brand and Crisis Management Real-time Social Media Conversations Blogs, News Search Caching, Articles, Engines Permanent Videos Archives

21 Social Media Strategies

22 Discussion i Point What is percentage of American employees watch online videos in the workplace? 2% 19% 51% 64% Do you think your organization is currently prepared to handle social media risks? What areas are currently well covered? What areas are not? What tools do you have in place to help?

23 Current Observations - social media controls The control of social media in the corporate environment lacks consistent practice. Based on our observations, organizations control approach generally falls into the following categories: No Policy Block* Limited Access Controlled Access * It should be noted that blocking and limiting users access to social media sites only work within the corporate network environment. There are no effective ways of restricting users access when they use public Wi-Fi, hotel network, home network, cellular network, etc.

24 Current observations technology usage There is no single technology that can control the access and usage of social media. Organizations need to establish a control matrix based on use scenarios and set clear policy and guidance. Personal Device Social Media Sites Corporate Network Personal Device Corporate Device Corporate Device Outside Corporate Network Sample Control Matrix Outside Corp Network Inside Corp network Corporate Control Monitor Device Access Personal Device Monitor Not Allowed Corporate or Personal Device

25 Fact check - Deloitte LLP s Ethics and Workplace Survey 74% of working Americans believe it is easy to damage a brand s reputation via social networking sites, though relatively few organizations are actively creating strategies and policies; 1/3 stated they never consider what their boss, colleagues, or clients think before posting materials online; 53% of employees believe that their social networking activity is none of the employers business; VS 60 % of executives state the organization has a right to know how employees portray themselves and their organizations online, with 30% acknowledging informal monitoring practices; 49% indicate that, even if there were a policy in place, it would not affect their behavior. As used in this document, Deloitte means Deloitte LLP and its subsidiaries. Please see for a detailed description of the legal structure of Deloitte LLP and its subsidiaries. Certain services may not be available to attest clients under the rules and regulations of public accounting. Source:

26 Auditing social media from a GRC perspective Strategy and Governance Strategic Plan Policy Education An implementation ti includes: Evaluation of the entity s involvement in social media Alignment of strategy and the business objectives Identification of the target audience and how each uses social media Risk Identification and Analysis Monitoring Mapping of risks to the social media practice Prioritization of organizational resources to address the risks Align the control activities to the overall strategy Establish Responsibility and Ownership Establishing accountability and ownership of the controls Supervision of the release of content to social sites Implementation of process and technology controls

27 Auditing social media - strategy and governance Has a risk assessment been conducted to map the risks to the enterprise presented by the use of social media? Is there an established policy (and supporting standards) that addresses social media use? Do the policies address all aspects of social media use in the workplace both business and personal? Has effective trainings been delivered to all users? Do users (including employees) receive regular awareness communications regarding policies and risks? Source: ISACA, Social Media: Business Benefits and Security, Governance and Assurance Perspectives [Whitepaper].

28 Auditing social media - risk assessment The company should consider the following when identifying social media risks: Risks of using social media as a business tool to communicate with customers or constituents Risks of employee accessing to social media sites while on the corporate network Risks of using social media tools from their corporate issued mobile devices Risks of employee personal user of social media from home and personal computing devices Analyse Risk Impact: How will it adversely affect the organization? What functions would get impacted? How likely would it happen? Examples: People Loss of Productivity Data Unauthorized Disclosure Organization Reputational Loss Technology Virus/Worms

29 Auditing social media - social media policy Key Guidelines Business Use of Social Media Does the policy address intellectual property rights? Does the policy require monitoring of all content posted on social media sites? Does the policy give a careful consideration to review and accept the social media provider s terms of service? Does the policy specify whether only public information can be posted on social media websites? + Employees Personal Use of Social Media Does the policy specify what the employees can and cannot do on a social network? Such as sharing non-public or confidential information. Does the social media policy connect with other policies that might be affected by social media (including IT, Ethics, IP, Privacy, Antidiscrimination, harassment, etc)? Does the policy clarify consequences? Bottom Line Do NOT disclose confidential information Do NOT share information that may violate copyright laws Do show respect, honesty, and transparency during your social media activities

30 Auditing social media - risk awareness program Develop the training curriculum: Establish the training program committee: marketing, legal, IT, HR Take into consideration the organization needs and resources when designing the training program In house or e-learning? Mandatory or optional? Organization wide or particular department focused? Develop a curriculum tailored to the level of social media involvement of your company Update the curriculum regularly Establish a social media facilitator: Responsible for the organization s social media awareness program Conduct social media training with employees Develop and maintain awareness communications regarding social media policies and risks Provide consultation to employees with social media questions Consider the role of this facilitator in incident response processes

31 Auditing social media - risk awareness program (Cont d) ISACA recommends any strategy to address the risks of social media usage should first focus on user behavior through the development of policies and supporting training and awareness program that covers: Whether it is allowed Personal use in the The nondisclosure/posting of business-related content workplace The discussion of workplace-related topics Inappropriate sites, content or conversations Personal use outside the workplace Whether it is allowed The nondisclosure/posting of business-related content The discussion of workplace-related topics Inappropriate sites, content or conversations Business use Whether it is allowed The process to gain approval for use The scope of topics or information permitted to flow through this channel Disallowed activities (installation of applications, playing games, etc.) The escalation process for customer issues

32 Auditing social media - control implementation ISACA Business Model People Has effective trainings been delivered to all users? Do users (including employees) receive regular awareness communications regarding policies and risks? Process/Data Technology Have business processes that utilize social media been reviewed to determine that they are aligned with policies and standards of the enterprise? Are content control processes in place to determine that social communications intended to represent the company are approved before dissemination? Does IT have a strategy and the supporting capabilities to manage technical risks presented by social media? Do technical controls and processes adequately support social media policies and standards? Does the enterprise have an established process to address the risk of unauthorized/fraudulent use of its brand on social media sites? Source: ISACA, Social Media: Business Benefits and Security, Governance and Assurance Perspectives [Whitepaper].

33 Auditing social media controls people Risk Identity theft Loss of Productivity Social Engineering HR Policy Violations Control Objective: Employees, contractors and customers are aware of their responsibilities relating to social media. Activities: Establish user agreements for social media use Conduct awareness training to inform users of the risks involved using social media websites Use content-filtering technology such as DLP (Data Loss Prevention) Limit access to social media sites Responsible parties: HR, Information Security

34 Auditing social media controls process Risk Regulatory Compliance Risk (i.e. Copyright, trademark infringement, and privacy issues) Reputational Loss False Impression Control Objective: The enterprise brand is protected from negative publicity or regulation violation Activities: Establish policies to ensure legalsensitive communications are tracked and archived Conduct awareness training to inform users of the risks involved using social media websites Scan the internet for misuse of the enterprise brand Responsible parties: Legal, HR, Information Security

35 Auditing social media controls data Risk Improper Content Control Objective: Enterprise information is protected from unauthorized access or leakage through/by social media. Unauthorized Disclosure Intellectual Property leakage Activities: Establish user agreements for social media sites Develop policies on the use of enterprise-wide intellectual property Ensure there is a capability to log all the communications Responsible parties: Legal, HR, Information Security * Please bear in mind that these risk control mapping are being presented to help illustrate the approach in evaluating your business involvement in social media practice. It is not designed to include a comprehensive listing of risks and control activities.

36 Auditing social media controls technology Risk Virus/Worms via the social media sites Control Objective: IT infrastructure supports risks introduced by social media. Constraining network bandwidth Activities: Install anti-virus applications on all systems including mobile devices Use content-filtering technology such as DLP Limit access to social media sites during business hours Data theft from mobile devices Responsible parties: Information Security

37 Additional considerations Cyber Threat Profile Analysis Perform a study on what organization specific foot printing information is available on the Internet, and how it might be used to produce an exploit that targets the organization s IT or Industrial Systems. Suspicious Program Diagnostics Use available industry hash data sets and cyber intelligence to match against a generated inventory of system files endeavoring to identify hidden exploits. Perform digital forensic analysis on suspect computers including examining system memory. Social Media Impact Survey A policy assessment is performed to assess how social media is being used within the organization. Intranet Cyber Compromise Diagnostic Security event logs and infrastructure logs are analyzed to look for evidence of internal machines that may have been compromised and are attempting to communicate with miscreant controlled devices on the Internet. Anti-Phishing Capability Diagnostic Assess organizations anti-phishing program in order to help identify gaps and improvement opportunities. It includes looking at recent phishing incidents, intelligence services, and the organization s incident handling procedures.

38 Questions? Footer

39 Reference and Additional Resource Web 2.0 reinvents corporate networking. Gopal, Raj et al. Deloitte Consulting LLP Market Intelligence and Content Curating. Eric Openshaw, Deloitte & Touche LLP Social Media Audit/Assurance Program ISACA Social Media: Business Benefits and Security, Governance and Assurance Perspective ISACA 2012 Identity Fraud Report: Social Media and Mobile Forming the New Fraud Frontier Javelin Strategy & Research Auditing Social Media: A Governance and Risk Guide by Peter R. Scott and J. Mike Jacka Security, Mobility, and Social Media: Minimizing Risk in the Era of Sharing by Partha Mukherjee, Lawrence J. Bolick and Brian Cain Securing the Clicks: Network Security in the Age of Social Media by Gary Bahadur, Jason Inasi, and Alex de Carvalho Sophos Security Threat Report 2011 by Graham Cluley Cisco 2010 Annual Security Report KOOBFACE Inside a Crimeware Network by Nart Villeneuve of the Information War Monitor

40 Contact info Mike Wyatt Director Deloitte & Touche LLP Rumy Jaleel-Khan Senior Manager Deloitte & Touche LLP

41 This presentation contains general information only and Deloitte is not, by means of this presentation, rendering accounting, business, financial, investment, legal, tax, or other professional advice or services. This presentation is not a substitute for such professional advice or services, nor should it be used as a basis for any decision or action that may affect your business. Before making any decision or taking any action that may affect your business, you should consult a qualified professional advisor. Deloitte, its affiliates, and related entities shall not be responsible for any loss sustained by any person who relies on this presentation. Member of Deloitte Touche Tohmatsu Limited

42 Collaborate Contribute Connect The Knowledge Center is a collection of resources and online communities that connect ISACA members globally, across industries and by professional focus - under one umbrella. Add or reply to a discussion, post a document or link, connect with other ISACA members, or create a wiki by participating in a community today!

Social Media Assessment. Khalid Wasti Deloitte & Touche LLP December 11, 2012

Social Media Assessment. Khalid Wasti Deloitte & Touche LLP December 11, 2012 Social Media Assessment Khalid Wasti Deloitte & Touche LLP December 11, 2012 http://www.youtube.com/watch?v=0euel3n7fds Contents Overview of social media Social media opportunities Social media risks Regulatory

More information

Into the cybersecurity breach

Into the cybersecurity breach Into the cybersecurity breach Tim Sanouvong State Sector Cyber Risk Services Deloitte & Touche LLP April 3, 2015 Agenda Setting the stage Cyber risks in state governments Cyber attack vectors Preparing

More information

Social Networking and its Implications on your Data Security

Social Networking and its Implications on your Data Security Social Networking and its Implications on your Data Security Canadian Chamber of Commerce of the Philippines June 8, 2011 Warren R Bituin Partner -SGV & Co. About the Speaker Warren R. Bituin SGV & Co./Ernst

More information

Cybersecurity The role of Internal Audit

Cybersecurity The role of Internal Audit Cybersecurity The role of Internal Audit Cyber risk High on the agenda Audit committees and board members are seeing cybersecurity as a top risk, underscored by recent headlines and increased government

More information

Contents. Assessing Social Media Security. Chapter! The Social Media Security Process 3

Contents. Assessing Social Media Security. Chapter! The Social Media Security Process 3 Securing the Clicks: Network Security in the Age of Social Media Gary Bahadur Jason I nasi Alex de Carvalho Mc ssr New York Chicago San Francisco Lisbon London Madrid Mexico City Milan New Delhi San Juan

More information

The digital grapevine Social media and the role of Internal Audit

The digital grapevine Social media and the role of Internal Audit The digital grapevine Social media and the role of Internal Audit Preface Organizations today are embracing new digital technologies to leapfrog or keep pace with growing competition in the marketplace.

More information

WHITE PAPER Mapping Organizational Roles & Responsibilities for Social Media Risk. A Hootsuite & Nexgate White Paper

WHITE PAPER Mapping Organizational Roles & Responsibilities for Social Media Risk. A Hootsuite & Nexgate White Paper WHITE PAPER Mapping Organizational Roles & Responsibilities for Social Media Risk A Hootsuite & Nexgate White Paper Mapping Organizational Roles & Responsibilities for Social Media Risk Executive Summary

More information

Ten Questions Your Board Should be asking about Cyber Security. Eric M. Wright, Shareholder

Ten Questions Your Board Should be asking about Cyber Security. Eric M. Wright, Shareholder Ten Questions Your Board Should be asking about Cyber Security Eric M. Wright, Shareholder Eric Wright, CPA, CITP Started my career with Schneider Downs in 1983. Responsible for all IT audit and system

More information

Cybersecurity and internal audit. August 15, 2014

Cybersecurity and internal audit. August 15, 2014 Cybersecurity and internal audit August 15, 2014 arket insights: what we are seeing so far? 60% of organizations see increased risk from using social networking, cloud computing and personal mobile devices

More information

CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility

CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility CYBER SECURITY AND RISK MANAGEMENT An Executive level responsibility Cyberspace poses risks as well as opportunities Cyber security risks are a constantly evolving threat to an organisation s ability to

More information

Security within a development lifecycle. Enhancing product security through development process improvement

Security within a development lifecycle. Enhancing product security through development process improvement Security within a development lifecycle Enhancing product security through development process improvement Who I am Working within a QA environment, with a focus on security for 10 years Primarily web

More information

Data Privacy: The High Cost of Unprotected Sensitive Data 6 Step Data Privacy Protection Plan

Data Privacy: The High Cost of Unprotected Sensitive Data 6 Step Data Privacy Protection Plan WHITE PAPER Data Privacy: The High Cost of Unprotected Sensitive Data 6 Step Data Privacy Protection Plan Introduction to Data Privacy Today, organizations face a heightened threat landscape with data

More information

Cyber Security and Information Assurance Controls Prevention and Reaction NOVEMBER 2013

Cyber Security and Information Assurance Controls Prevention and Reaction NOVEMBER 2013 Cyber Security and Information Assurance Controls Prevention and Reaction 1 About Enterprise Risk Management Capabilities Cyber Security Risk Management Information Assurance Strategic Governance Regulatory

More information

Managing Cyber Risk through Insurance

Managing Cyber Risk through Insurance Managing Cyber Risk through Insurance Eric Lowenstein Aon Risk Solutions This presentation has been prepared for the Actuaries Institute 2015 ASTIN and AFIR/ERM Colloquium. The Institute Council wishes

More information

1. Understanding Big Data

1. Understanding Big Data Big Data and its Real Impact on Your Security & Privacy Framework: A Pragmatic Overview Erik Luysterborg Partner, Deloitte EMEA Data Protection & Privacy leader Prague, SCCE, March 22 nd 2016 1. 2016 Deloitte

More information

4/10/2012. W. Noel Haskins-Hafer Lead Internal Auditor Audit Innovation Leader Intuit IIA / ISACA San Diego Joint Meeting 11 April 2012.

4/10/2012. W. Noel Haskins-Hafer Lead Internal Auditor Audit Innovation Leader Intuit IIA / ISACA San Diego Joint Meeting 11 April 2012. W. Noel Haskins-Hafer Lead Internal Auditor Audit Innovation Leader Intuit IIA / ISACA San Diego Joint Meeting 11 April 2012 1 Disclaimer Unless otherwise specified, the views expressed in this presentation

More information

Data Loss Prevention Program

Data Loss Prevention Program Data Loss Prevention Program Safeguarding Intellectual Property Author: Powell Hamilton Senior Managing Consultant Foundstone Professional Services One of the major challenges for today s IT security professional

More information

An New Approach to Security. Chris Ellis McAfee Senior System Engineer Chris_Ellis@McAfee.com

An New Approach to Security. Chris Ellis McAfee Senior System Engineer Chris_Ellis@McAfee.com An New Approach to Security Chris Ellis McAfee Senior System Engineer Chris_Ellis@McAfee.com Advanced Targeted Attack Challenges Criminal Theft Sabotage Espionage After the Fact Expensive Public Uncertainty

More information

2010 AICPA Top Technology Initiatives. About the Presenter. Agenda. Presenter: Dan Schroeder, CPA/CITP Habif, Arogeti, & Wynne, LLP

2010 AICPA Top Technology Initiatives. About the Presenter. Agenda. Presenter: Dan Schroeder, CPA/CITP Habif, Arogeti, & Wynne, LLP 2010 AICPA Top Technology Initiatives Presenter: Dan Schroeder, CPA/CITP Habif, Arogeti, & Wynne, LLP Georgia Society of CPAs Annual Convention June 16, 2010 About the Presenter Partner-in-Charge, Habif,

More information

The Changing IT Risk Landscape Understanding and managing existing and emerging risks

The Changing IT Risk Landscape Understanding and managing existing and emerging risks The Changing IT Risk Landscape Understanding and managing existing and emerging risks IIA @ Noon Kareem Sadek Senior Manager, Deloitte Canada Chris Close Senior Manager, Deloitte Canada December 2, 2015

More information

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS CONTENTS PAGE RECONNAISSANCE STAGE 4 INCURSION STAGE 5 DISCOVERY STAGE 6 CAPTURE STAGE 7 EXFILTRATION STAGE

More information

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES www.kaspersky.com EXPERT SERVICES Expert Services from Kaspersky Lab are exactly that the services of our in-house experts, many of them global

More information

Threat Intelligence & Analytics Cyber Threat Intelligence and how to best understand the adversary s operations

Threat Intelligence & Analytics Cyber Threat Intelligence and how to best understand the adversary s operations Threat Intelligence & Analytics Cyber Threat Intelligence and how to best understand the adversary s operations September 2015 Copyright 2015 Deloitte Development LLC. All rights reserved. This presentation

More information

W. Noel Haskins-Hafer CISA, CISM, CGEIT, CRISC, CRMA, CFE, SCPM Compliance Program Manager Intuit Consumer Ecosystems Group IIA Orange County / ISACA

W. Noel Haskins-Hafer CISA, CISM, CGEIT, CRISC, CRMA, CFE, SCPM Compliance Program Manager Intuit Consumer Ecosystems Group IIA Orange County / ISACA W. Noel Haskins-Hafer CISA, CISM, CGEIT, CRISC, CRMA, CFE, SCPM Compliance Program Manager Intuit Consumer Ecosystems Group IIA Orange County / ISACA Orange County Spring Educational Conference 13 March,

More information

Mary E. Galligan Director Deloitte & Touche LLP August 4, 2015

Mary E. Galligan Director Deloitte & Touche LLP August 4, 2015 A Crisis Response Framework: Strategies for Effective Leadership Mary E. Galligan Director Deloitte & Touche LLP August 4, 2015 Managing a crisis A crisis is a major catastrophic event, or a series of

More information

Personal Information Threats & Risks: Responding to an Evolving Landscape with an Integrated Data Protection Approach

Personal Information Threats & Risks: Responding to an Evolving Landscape with an Integrated Data Protection Approach Personal Information Threats & Risks: Responding to an Evolving Landscape with an Integrated Data Protection Approach Don MacPherson January 2012 Discussion Items 1. Threats and risks to personal information

More information

Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015

Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015 Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence AIBA Quarterly Meeting September 10, 2015 The Answer 2 Everyone The relationship between the board, C-suite, IT, and compliance leaders

More information

Cybersecurity: A View from the Boardroom

Cybersecurity: A View from the Boardroom An Executive Brief from Cisco Cybersecurity: A View from the Boardroom In the modern economy, every company runs on IT. That makes security the business of every person in the organization, from the chief

More information

Beyond the Hype: Advanced Persistent Threats

Beyond the Hype: Advanced Persistent Threats Advanced Persistent Threats and Real-Time Threat Management The Essentials Series Beyond the Hype: Advanced Persistent Threats sponsored by Dan Sullivan Introduction to Realtime Publishers by Don Jones,

More information

Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs

Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs IBM Global Technology Services Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs Achieving a secure government

More information

Information Security and Risk Management

Information Security and Risk Management Information Security and Risk Management COSO and COBIT Standards and Requirements Page 1 Topics Information Security Industry Standards and COBIT Framework Relation to COSO Internal Control Risk Management

More information

SOCIAL MEDIA POLICY. Introduction

SOCIAL MEDIA POLICY. Introduction Introduction Throughout this Policy, the words Translink Company and/or the Group refer to all corporate entities under the ownership of the Northern Ireland Transport Holding Company (NITHC). This includes

More information

plantemoran.com What School Personnel Administrators Need to know

plantemoran.com What School Personnel Administrators Need to know plantemoran.com Data Security and Privacy What School Personnel Administrators Need to know Tomorrow s Headline Let s hope not District posts confidential data online (Tech News, May 18, 2007) In one of

More information

Top Attacks in Social Media

Top Attacks in Social Media Top Attacks in Social Media SESSION ID: HUM-F03A Gary Bahadur CEO KRAA Security @KRAASecurity 140 Characters of Pain What s the Problem with Social Media? No security strategies in place No enterprise-wide

More information

CONSULTING IMAGE PLACEHOLDER

CONSULTING IMAGE PLACEHOLDER CONSULTING IMAGE PLACEHOLDER KUDELSKI SECURITY CONSULTING SERVICES CYBERCRIME MACHINE LEARNING ECOSYSTEM & INTRUSION DETECTION: CYBERCRIME OR REALITY? ECOSYSTEM COSTS BENEFITS BIG BOSS Criminal Organization

More information

City of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011

City of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011 City of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011 Purpose and Intent The City of Boston recognizes the importance

More information

Data Security Incident Response Plan. [Insert Organization Name]

Data Security Incident Response Plan. [Insert Organization Name] Data Security Incident Response Plan Dated: [Month] & [Year] [Insert Organization Name] 1 Introduction Purpose This data security incident response plan provides the framework to respond to a security

More information

How To Protect Your Online Banking From Fraud

How To Protect Your Online Banking From Fraud DETECT MONITORING SERVICES AND DETECT SAFE BROWSING: Empowering Tools to Prevent Account Takeovers SUMMARY The Federal Financial Institutions Examination Council (FFIEC) is planning to update online transaction

More information

Security tips for the use of social media websites

Security tips for the use of social media websites CYBER SECURITY OPERATIONS CENTRE NOVEMBER 2012 (U) LEGAL NOTICE: THIS PUBLICATION HAS BEEN PRODUCED BY THE DEFENCE SIGNALS DIRECTORATE (DSD), ALSO KNOWN AS THE AUSTRALIAN SIGNALS DIRECTORATE (ASD). ALL

More information

Data Breach Lessons Learned. June 11, 2015

Data Breach Lessons Learned. June 11, 2015 Data Breach Lessons Learned June 11, 2015 Introduction John Adams, CISM, CISA, CISSP Associate Director Security & Privacy 410.707.2829 john.adams@protiviti.com Powerful Insights. Proven Delivery. Kevin

More information

KEY STEPS FOLLOWING A DATA BREACH

KEY STEPS FOLLOWING A DATA BREACH KEY STEPS FOLLOWING A DATA BREACH Introduction This document provides key recommended steps to be taken following the discovery of a data breach. The document does not constitute an exhaustive guideline,

More information

Panel Title: Data Breaches: Industry and Law Enforcement Perspectives on Best Practices

Panel Title: Data Breaches: Industry and Law Enforcement Perspectives on Best Practices Panel Title: Data Breaches: Industry and Law Enforcement Perspectives on Best Practices Over the course of this one hour presentation, panelists will cover the following subject areas, providing answers

More information

Information Security Incident Management Guidelines

Information Security Incident Management Guidelines Information Security Incident Management Guidelines INFORMATION TECHNOLOGY SECURITY SERVICES http://safecomputing.umich.edu Version #1.0, June 21, 2006 Copyright 2006 by The Regents of The University of

More information

SECURITY CONSIDERATIONS FOR LAW FIRMS

SECURITY CONSIDERATIONS FOR LAW FIRMS SECURITY CONSIDERATIONS FOR LAW FIRMS Enterprise Risk Management Professional consulting firm that specializes in cyber security Founded in 1998 in Miami, Florida Serves more than 150 clients, locally,

More information

Session 334 Incident Management. Jeff Roth, CISA, CGEIT, CISSP

Session 334 Incident Management. Jeff Roth, CISA, CGEIT, CISSP Session 334 Incident Management Jeff Roth, CISA, CGEIT, CISSP SPEAKER BIOGRAPHY Jeff Roth, CISA, CGEIT Jeff Roth has over 25 years experience in IT audit, security, risk management and IT Governance experience

More information

Is There Such a Thing as Internet Privacy?

Is There Such a Thing as Internet Privacy? Is There Such a Thing as Internet Privacy? April 13, 2015 Danielle Graff & Kristél Kriel Western Canada s Law Firm Click Agenda to edit Master title style What is Internet Privacy? Why does it matter?

More information

Cyber/ Network Security. FINEX Global

Cyber/ Network Security. FINEX Global Cyber/ Network Security FINEX Global ABOUT US >> We are one of the largest insurance brokers in the world >> We have over 180 years of history and experience in insurance; we currently operate in over

More information

$194 per record lost* 3/15/2013. Global Economic Crime Survey. Data Breach Costs. David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP

$194 per record lost* 3/15/2013. Global Economic Crime Survey. Data Breach Costs. David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP Global Economic Crime Survey Global Cyber Crime is the fastest growing economic crime Cyber Crime is more lucrative than trafficking drugs!

More information

Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team

Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team Symantec Cyber Threat Analysis Program Symantec Cyber Threat Analysis Program Team White Paper: Symantec Security Intelligence Services Symantec Cyber Threat Analysis Program Contents Overview...............................................................................................

More information

A Websense Research Brief Prevent Data Loss and Comply with Payment Card Industry Data Security Standards

A Websense Research Brief Prevent Data Loss and Comply with Payment Card Industry Data Security Standards A Websense Research Brief Prevent Loss and Comply with Payment Card Industry Security Standards Prevent Loss and Comply with Payment Card Industry Security Standards Standards for Credit Card Security

More information

Security Practices for Online Collaboration and Social Media

Security Practices for Online Collaboration and Social Media Cisco IT Best Practice Collaboration Security Cisco on Cisco Best Practice Security Practices for Online Collaboration and Social Media January 2012 2013 Cisco and/or its affiliates. All rights reserved.

More information

Protecting against cyber threats and security breaches

Protecting against cyber threats and security breaches Protecting against cyber threats and security breaches IBM APT Survival Kit Alberto Benavente Martínez abenaventem@es.ibm.com IBM Security Services Jun 11, 2015 (Madrid, Spain) 12015 IBM Corporation So

More information

Big 4 Information Security Forum

Big 4 Information Security Forum San Francisco ISACA Chapter Proudly Presents: Big 4 Information Security Forum A Day-Long, Multi-Session Event, being held in San Francisco @ the Sir Francis Drake Hotel! *** PLEASE NOTE THIS EVENT WILL

More information

CLOSING THE DOOR TO CYBER ATTACKS HOW ENTERPRISES CAN IMPLEMENT COMPREHENSIVE INFORMATION SECURITY

CLOSING THE DOOR TO CYBER ATTACKS HOW ENTERPRISES CAN IMPLEMENT COMPREHENSIVE INFORMATION SECURITY CLOSING THE DOOR TO CYBER ATTACKS HOW ENTERPRISES CAN IMPLEMENT COMPREHENSIVE INFORMATION SECURITY CLOSING THE DOOR TO CYBER ATTACKS Cybersecurity and information security have become key challenges for

More information

The Risks and Rewards of Social Media and Mobile Devices

The Risks and Rewards of Social Media and Mobile Devices The Risks and Rewards of Social Media and Mobile Devices October 29-30, 2012 Tony Brooks, CISA Principal & Director of IT Assurance Tony and Brooks, Risk Services CISA, CRISC Partner HORNE - IT LLP Assurance

More information

Achieving Information Security

Achieving Information Security Achieving Information Security Beyond penetration testing and frameworks ISACA Athens Conference 25 November, 2014. All good information security presentations start with a Bruce Schneier quote - Not Bruce

More information

Secure Your Mobile Workplace

Secure Your Mobile Workplace Secure Your Mobile Workplace Sunny Leung Senior System Engineer Symantec 3th Dec, 2013 1 Agenda 1. The Threats 2. The Protection 3. Q&A 2 The Mobile Workplaces The Threats 4 Targeted Attacks up 42% in

More information

Information Security Services

Information Security Services Information Security Services Information Security In 2013, Symantec reported a 62% increase in data breaches over 2012. These data breaches had tremendous impacts on many companies, resulting in intellectual

More information

Who s Doing the Hacking?

Who s Doing the Hacking? Who s Doing the Hacking? 1 HACKTIVISTS Although the term hacktivist refers to cyber attacks conducted in the name of political activism, this segment of the cyber threat spectrum covers everything from

More information

By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015

By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015 Community Bank Auditors Group Cybersecurity What you need to do now June 9, 2015 By: Gerald Gagne MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2015 Wolf & Company, P.C. Cybersecurity

More information

Information Security: A Perspective for Higher Education

Information Security: A Perspective for Higher Education Information Security: A Perspective for Higher Education A By Introduction On a well-known hacker website, individuals charged students $2,100 to hack into university and college computers for the purpose

More information

IT risk management discussion 2013 PIAA Leadership Camp May 15, 2013

IT risk management discussion 2013 PIAA Leadership Camp May 15, 2013 IT risk management discussion 2013 PIAA Leadership Camp May 15, 2013 Debbie Lew Agenda Review what is IT governance Review what is IT risk management A discussion of key IT risks to be aware of Page 2

More information

OCT Training & Technology Solutions Training@qc.cuny.edu (718) 997-4875

OCT Training & Technology Solutions Training@qc.cuny.edu (718) 997-4875 OCT Training & Technology Solutions Training@qc.cuny.edu (718) 997-4875 Understanding Information Security Information Security Information security refers to safeguarding information from misuse and theft,

More information

Beyond Data Breach: Cyber Trends and Exposures

Beyond Data Breach: Cyber Trends and Exposures Beyond Data Breach: Cyber Trends and Exposures Vietnam 7 th May 2015 Jason Kelly Head of Asia Financial Lines AIG Agenda Why do companies need cyber protection Example of Cyber attack worldwide and in

More information

Cisco Advanced Services for Network Security

Cisco Advanced Services for Network Security Data Sheet Cisco Advanced Services for Network Security IP Communications networking the convergence of data, voice, and video onto a single network offers opportunities for reducing communication costs

More information

Insuring Innovation. CyberFirst Coverage for Technology Companies

Insuring Innovation. CyberFirst Coverage for Technology Companies Insuring Innovation. CyberFirst for Technology Companies TECHNOLOGY IS EVERYWHERE. SO ARE THE THREATS. protection that goes well beyond a traditional general liability policy. CyberFirst CyberFirst is

More information

Social Media Opportunities and Risks A Lifecycle Approach for the Enterprise

Social Media Opportunities and Risks A Lifecycle Approach for the Enterprise Social Media Opportunities and Risks A Lifecycle Approach for the Enterprise The program will begin shortly. Please listen to the webinar through your computer audio. Make sure your speakers are turned

More information

WEB APPLICATION FIREWALLS: DO WE NEED THEM?

WEB APPLICATION FIREWALLS: DO WE NEED THEM? DISTRIBUTING EMERGING TECHNOLOGIES, REGION-WIDE WEB APPLICATION FIREWALLS: DO WE NEED THEM? SHAIKH SURMED Sr. Solutions Engineer info@fvc.com www.fvc.com HAVE YOU BEEN HACKED????? WHAT IS THE PROBLEM?

More information

PACB One-Day Cybersecurity Workshop

PACB One-Day Cybersecurity Workshop PACB One-Day Cybersecurity Workshop WHAT IS CYBERSECURITY? PRESENTED BY: JON WALDMAN, SBS CISA, CRISC 1 Contact Information Jon Waldman Partner, Senior IS Consultant CISA, CRISC Masters of Info Assurance

More information

Key Cyber Risks at the ERP Level

Key Cyber Risks at the ERP Level Key Cyber Risks at the ERP Level Process & Industrial Products (P&IP) Sector December, 2014 Today s presenters Bhavin Barot, Sr. Manager Deloitte & Touche LLP Goran Ristovski, Manager Deloitte & Touche

More information

Mobile Device Security and Audit

Mobile Device Security and Audit Mobile Device Security and Audit ISACA Chapter Meeting February 2012 Alex Stamps Manager Security & Privacy Services Deloitte & Touche LLP astamps@deloitte.com Session Objectives Define mobile devices

More information

Social Media -Benefits and Risk. Western Carolinas IIA Chapter Meeting October 25, 2012

Social Media -Benefits and Risk. Western Carolinas IIA Chapter Meeting October 25, 2012 Social Media -Benefits and Risk Western Carolinas IIA Chapter Meeting October 25, 2012 Matt Thompson Managing Director, Advisory Services Grant Thornton LLP Introductions Matt Thompson Managing Director

More information

Cyber Security Evolved

Cyber Security Evolved Cyber Security Evolved Aware Cyber threats are many, varied and always evolving Being aware is knowing what is going on so you can figure out what to do. The challenge is to know which cyber threats are

More information

Beyond passwords: Protect the mobile enterprise with smarter security solutions

Beyond passwords: Protect the mobile enterprise with smarter security solutions IBM Software Thought Leadership White Paper September 2013 Beyond passwords: Protect the mobile enterprise with smarter security solutions Prevent fraud and improve the user experience with an adaptive

More information

Cyber Risks and Insurance Solutions Malaysia, November 2013

Cyber Risks and Insurance Solutions Malaysia, November 2013 Cyber Risks and Insurance Solutions Malaysia, November 2013 Dynamic but vulnerable IT environment 2 Cyber risks are many and varied Malicious attacks Cyber theft/cyber fraud Cyber terrorism Cyber warfare

More information

How To Implement Data Loss Prevention

How To Implement Data Loss Prevention Data Loss Prevention Implementation Initiatives THE HITACHI WAY White Paper By HitachiSoft America Security Solutions Group September, 2009 HITACHI SOFTWARE ENGINEERING AMERICA, LTD. Executive Summary

More information

Cyber Security Metrics Dashboards & Analytics

Cyber Security Metrics Dashboards & Analytics Cyber Security Metrics Dashboards & Analytics Feb, 2014 Robert J. Michalsky Principal, Cyber Security NJVC, LLC Proprietary Data UNCLASSIFIED Agenda Healthcare Sector Threats Recent History Security Metrics

More information

Countering Insider Threats Jeremy Ho

Countering Insider Threats Jeremy Ho Countering Insider Threats Jeremy Ho Strategic Sales Group (ASEAN) 1 CONFIDENTIAL Key Challenges Impacting Organization Today REGULATORY COMPLIANCE Rising Data Volumes Changing Requirements Prioritization

More information

CYBER & PRIVACY INSURANCE FOR FINANCIAL INSTITUTIONS

CYBER & PRIVACY INSURANCE FOR FINANCIAL INSTITUTIONS CYBER & PRIVACY INSURANCE FOR FINANCIAL INSTITUTIONS 1 As regulators around the world move to tighten compliance requirements for financial institutions, improvement in cyber security controls will become

More information

IBM SECURITY QRADAR INCIDENT FORENSICS

IBM SECURITY QRADAR INCIDENT FORENSICS IBM SECURITY QRADAR INCIDENT FORENSICS DELIVERING CLARITY TO CYBER SECURITY INVESTIGATIONS Gyenese Péter Channel Sales Leader, CEE IBM Security Systems 12014 IBM Corporation Harsh realities for many enterprise

More information

Stop advanced targeted attacks, identify high risk users and control Insider Threats

Stop advanced targeted attacks, identify high risk users and control Insider Threats TRITON AP-EMAIL Stop advanced targeted attacks, identify high risk users and control Insider Threats From socially engineered lures to targeted phishing, most large cyberattacks begin with email. As these

More information

Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model

Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model Stéphane Hurtaud Partner Governance Risk & Compliance Deloitte Laurent De La Vaissière Director Governance Risk & Compliance

More information

The webinar will begin shortly

The webinar will begin shortly The webinar will begin shortly An Introduction to Security Intelligence Presented by IBM Security Chris Ross Senior Security Specialist, IBM Security Agenda The Security Landscape An Introduction to Security

More information

Loyalty data security Are hospitality and travel companies managing the risks of their rewards programs?

Loyalty data security Are hospitality and travel companies managing the risks of their rewards programs? Loyalty data security Are hospitality and travel companies managing the risks of their rewards programs? Companies that can persuade their customers to share personalized information about their interests,

More information

micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) August, 2013 Revision 8.0 MICROS Systems, Inc. Version 8.

micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) August, 2013 Revision 8.0 MICROS Systems, Inc. Version 8. micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) Revision 8.0 August, 2013 1 Table of Contents Overview /Standards: I. Information Security Policy/Standards Preface...5 I.1 Purpose....5

More information

Best Practices in Incident Response. SF ISACA April 1 st 2009. Kieran Norton, Senior Manager Deloitte & Touch LLP

Best Practices in Incident Response. SF ISACA April 1 st 2009. Kieran Norton, Senior Manager Deloitte & Touch LLP Best Practices in Incident Response SF ISACA April 1 st 2009 Kieran Norton, Senior Manager Deloitte & Touch LLP Current Landscape What Large scale breaches and losses involving credit card data and PII

More information

CYBERTRON NETWORK SOLUTIONS

CYBERTRON NETWORK SOLUTIONS CYBERTRON NETWORK SOLUTIONS CybertTron Certified Ethical Hacker (CT-CEH) CT-CEH a Certification offered by CyberTron @Copyright 2015 CyberTron Network Solutions All Rights Reserved CyberTron Certified

More information

Cisco on Cisco Best Practice Security Practices for Online Collaboration and Social Media

Cisco on Cisco Best Practice Security Practices for Online Collaboration and Social Media January 2012 Cisco on Cisco Best Practice Security Practices for Online Collaboration and Social Media January 2012 All contents are Copyright 1992 2012 Cisco Systems, Inc. All rights reserved. This document

More information

Policy for Social Media Usage in Catawba County

Policy for Social Media Usage in Catawba County Policy for Social Media Usage in Catawba County Adopted March 1, 2010 Revised September 7,2010 1. PURPOSE The role of technology in the 21 st century workplace is constantly expanding and now includes

More information

Social Media Guidelines

Social Media Guidelines MARKETING AND MEDIA RELATIONS Social Media Guidelines Emporia State University Last Updated: July 09, 2011 Introduction What is Social Media? Social media consists of web-based tools used to interact with

More information

County of Orange County Executive Office Information and Technology PURPOSE. County Social Media Use Policy and Procedure SOCIAL MEDIA USE

County of Orange County Executive Office Information and Technology PURPOSE. County Social Media Use Policy and Procedure SOCIAL MEDIA USE County of Orange County Executive Office Information and Technology PURPOSE SOCIAL MEDIA USE County Social Media Use Policy and Procedure Subject: Number: County Social Media Use Policy SM-001 Approved

More information

Social Media - Public & Private Use

Social Media - Public & Private Use TEMECULA VALLEY CHARTER SCHOOL BOARD POLICY Section 5000 Personnel 5013 Employee Use of Social Media Board Action: Approved Effective Date: 11-2-2015 Temecula Valley Charter School recognizes the value

More information

Maintaining PCI-DSS compliance. Daniele Bertolotti daniele_bertolotti@symantec.com Antonio Ricci antonio_ricci@symantec.com

Maintaining PCI-DSS compliance. Daniele Bertolotti daniele_bertolotti@symantec.com Antonio Ricci antonio_ricci@symantec.com Maintaining PCI-DSS compliance Daniele Bertolotti daniele_bertolotti@symantec.com Antonio Ricci antonio_ricci@symantec.com Sessione di Studio Milano, 21 Febbraio 2013 Agenda 1 Maintaining PCI-DSS compliance

More information

Web Protection for Your Business, Customers and Data

Web Protection for Your Business, Customers and Data WHITE PAPER: WEB PROTECTION FOR YOUR BUSINESS, CUSTOMERS............ AND.... DATA........................ Web Protection for Your Business, Customers and Data Who should read this paper For security decision

More information

White Paper. What the ideal cloud-based web security service should provide. the tools and services to look for

White Paper. What the ideal cloud-based web security service should provide. the tools and services to look for White Paper What the ideal cloud-based web security service should provide A White Paper by Bloor Research Author : Fran Howarth Publish date : February 2010 The components required of an effective web

More information

6.9 Social Media Policy

6.9 Social Media Policy Policy Statement It is the policy of the to encourage clear and effective communication with all Nova Scotians using a variety of accepted tools, including social media. Social media is helping government

More information

Risk Considerations for Internal Audit

Risk Considerations for Internal Audit Risk Considerations for Internal Audit Cecile Galvez, Deloitte & Touche LLP Enterprise Risk Services Director Traci Mizoguchi, Deloitte & Touche LLP Enterprise Risk Services Senior Manager February 2013

More information

BladeLogic Software-as-a- Service (SaaS) Solution. Help reduce operating cost, improve security compliance, strengthen cybersecurity posture

BladeLogic Software-as-a- Service (SaaS) Solution. Help reduce operating cost, improve security compliance, strengthen cybersecurity posture BladeLogic Software-as-a- Service (SaaS) Solution Help reduce operating cost, improve security compliance, strengthen cybersecurity posture February 20, 2014 Contents The Configuration Security Compliance

More information

Combating a new generation of cybercriminal with in-depth security monitoring. 1 st Advanced Data Analysis Security Operation Center

Combating a new generation of cybercriminal with in-depth security monitoring. 1 st Advanced Data Analysis Security Operation Center Combating a new generation of cybercriminal with in-depth security monitoring 1 st Advanced Data Analysis Security Operation Center The Challenge Don t leave your systems unmonitored. It takes an average

More information

North Carolina Office of the Governor North Carolina Office of Information Technology Services North Carolina Department of Cultural Resources

North Carolina Office of the Governor North Carolina Office of Information Technology Services North Carolina Department of Cultural Resources North Carolina Office of the Governor North Carolina Office of Information Technology Services North Carolina Department of Cultural Resources Best Practices for Social Media Usage in North Carolina December

More information