Size: px
Start display at page:

Download "[email protected]. www.vigitrust.com"

Transcription

1 Valid concerns about mobile security and how to address them Ins5tute of Management Consultants and Advisers Dublin, 19 th June Thursday 20 June 13 (c) VigiTrust

2 Today s PresentaAon SeCng the Scene Defining Mobility BYOD & ApplicaAon Security two key Mobility topics Right now Preparing for Security Enabled Mobility Outlook Q&A (c) VigiTrust

3 About VigiTrust Compliance as a Service SECURITY TRAINING & elearning Online training for management and staff COMPLIANCE, READINESS & VALIDATION Comprehensive online programs to achieve and maintain compliance SECURITY & GRC SERVICES Professional services to enable and support your compliance process The 5 Pillars of Security Framework Physical Security; People Security; Data Security; IT Security; Crisis Management

4 5 Pillars of Security Framework Chief Security Officer Project leader for all Security Related Matters PHYS. Sec PPL Sec DATA Sec INFRA Sec CRISIS Mgt PHYSICAL SECURITY PEOPLE SECURITY DATA SECURITY INFRASTRUCTURE SECURITY CRISIS MANAGEMENT Access to Building Physical Assets IT Hardware Vehicle Fleet Permanent & Contract Staff Partners 3 rd Party Employees Visitors Special Events Security Trade Secrets Employee Data Database Customer Data Networks Remote Sites Remote Users Application Security Website Intranet Documentation & Work Procedures Emergency Response Plans Business Continuity Plans Disaster Recovery Plans Opera>ons Manager, Security Staff HR, Security Staff HR, IT Team & Manager IT Team & Manager Opera>ons Manager, IT Team, HR Best Practice Security Framework for Enterprise

5 Existing elearning Portfolio US esec Portfolio US Existing EMEA esec Portfolio EMEA - Existing HIPAA NERC-CIP 101 MA 201 Understanding Data Breach Notification Requirements Data Protection Fundamentals Credit Card Security Introduction to PCI DSS Banking & Fraud Green IT & Security ISO IT & SDLC Security During M&A Process GEN. esec Portfolio Generic Training - Existing TECH. esec Portfolio Technical Training - Existing Info Security 101 Mobility & Security Security of Social Networks Cloud Computing & Security 101 Physical Security for Good Logical Security Secure Coding for PCI DSS Introduction to Secure Printing Log Management & Security Wireless Security

6 Mathieu Gorge CEO & Founder, VigiTrust European PCI DSS Roadshow (Disclaimer: Outside Reviewer) Thursday 20 June 13 (c) VigiTrust

7 SeCng the scene

8 A Few Telling Security Facts & Figures Veracode Security Survey During our iniaal analysis of mobile applicaaons we found that 91% of the top mobile apps unnecessarily expose a user s personally idenafiable informaaon Despite this, most mobile users and businesses aren t aware of the risk these apps pose to their organizaaon Gartner 2013 Mobile compuang raises new security concerns in an increasingly mobile world, where devices may be employee- owned, frequently changed, and used for both personal and business purposes ABI Research Mobility Survey OpportuniAes for Services ABI Research esamates that mobile security services will total $1.88 billion by the end of 2013 network security, managed security and professional services are set to become the biggest categories for business- to- business mobile security Vendors such as AdapAve Mobile and F- Secure are well- placed to consolidate their posiaon for carrier- grade security soluaons Players offering highly- innovaave soluaons in niche markets include Aujas Networks (India) with professional services and Zimperium (Israel) for mobile IDS/UTM The role of consultants & security professionals is key to balancing mobility opportuniaes vs security challenges Thursday 20 June 13 (c) VigiTrust

9 Security Challenges associated with Mobile Devices & Mobile applica>ons roll outs Technical Security Challenges Malware Smisphing Bluesnarfing Data leakage Data Loss who is responsible (device owner, app provider, operator, user)? Usage Security challenges ApplicaAons on the mobile device which ones? Geoloca>on Social media is going mobile major risks for the organizaaon Managing the Blur btw private & personal life on private & corporate devices Opera>onal security challenges Business ConAnuity what happens if personal devices are lost? Who pays to replace the device in the case of BYOD Legal challenges Data ProtecAon Act Compliance ediscovery challenges (c) VigiTrust

10 Security Challenges associated with Mobile Applica>ons How secure is the mobile app? Security by design? Benchmarked against OWASP & SANS? Mobile App Web TesAng? Does the Mobile App impact on data security? Answer is always yes but to what extent? Is the app sending data back to a corporate network and/or Cloud? Where is the data kept? For how long? Etc Data ProtecAon ConsideraAons Social media App? Major risks for the organizaaon because of SNs architectures Managing the Blur btw private & personal life on private & corporate devices Payment via Mobile App? PCI DSS consideraaons (c) VigiTrust

11 Policies must Focus on what mobile devices allow users to do and what is deemed acceptable View / Access Corporate Data See e- mails View/answer/save/delete Access corporate files View/access Modify/save/delete? Access corporate ERP/CRM Files Basic access Limited interacaon Full access (some func+onality tends to be lost in any case) VPN based access to DMZs Internet Browsing Sending Pictures E.g. Some US banks accept picture copies of checks sent in by mail or MMS The odd phone call All of the above must be made clear to users in an AUP! Thursday 20 June 13 (c) VigiTrust

12 Best prac>ces to address BYOD security challenges Classifica>on is key Data classifica>on What data should really be seen/accessed/processed on mobile devices Device Classifica>on Phones Smart Phones (Blackberry/iPhones/Androids) Tablets/iPads User Classifica>on Who needs a mobile device What do they need it for and what is the business jus+fica+on? Policies & Procedures AUP & Associated iniaal and yearly refresher Training OperaAonal Procedures What do you next then? Policies & procedures: draw up a list of P&Ps in your org. Technical SoluAons: update your network diagram + pen test include BYOD as assets Awareness Training: idenafy in- scope employees and start the educaaon process Consider Implemen>ng a Concierge Service Contract amendments btw Employers/employees Thursday 20 June 13 (c) VigiTrust

13 BYOD - Recommended Reading 3 US Federal Government BYOD Case Studies with some interes>ng sta>s>cs Equal Employment Opportunity Commission 75% never used got supplied device to make calls case study on BYOD cost savings Alcohol and Tobacco Tax and Bureau - developed a USB device that turns old desktops/laptops into a thin client State of Delaware - Reimbursement Plan Links to Good informa>on for your IT & legal teams to consider Bring- your- own- device (BYOD) and legal/regulatory compliance Top 10 consumerizaaon and BYOD Aps of 2012 (ISC) Global InformaAon Security Workforce Study FTC Mobile Privacy Disclosures focus on Apps Security - Mobile Security Toolkit Upcoming VigiTrust events: PCI DSS One Day Workshops (IT SoluAons), RSA Security Conference, European PCI DSS Roadshow Thursday 20 June 13 (c) VigiTrust

14 Technical Solu>ons typically required for Tradi>onal Security AnA- Virus / AnA- Spam Firewalls & VPNs IDS/IPS Web Filtering / Mail Filtering IM monitoring File Integrity SIEM Central Log soluaons Asset Management PSD Mgt/Control EncrypAon At rest, in transit, in use Bad News: All the above should and does apply to Mobile Security Good News: It s really not rocket science! (c) VigiTrust

15 Security & GRC Process SOX ISO series EU Data Protec>on PCI DSS HIPAA Others Regulatory, Legal & Corporate Governance Frameworks Policies & Procedures Education, Security & Awareness Self- Governed Pre- Assessment Security Blueprint for Remediation Work Network & Hardware Security Pen- Tes>ng & Applica>on Security Official Assessors & Auditors Specialized Skills Transfer Step 1 Step 2 Step 3 Step 5 Step 4 (c) VigiTrust

16 Corporate Culture & Risk Management The overall Picture Corporate Values Corporate Ecosystem Risk Management & Safeguards Residual Risk Surface which needs to be managed by your Organiza>on Risk Management Strategy for Internal and/or external Risk Management Teams DPA, PCI DSS & ISO compliance

17 Outlook for in the Mobility industry & spheres Every business is Going Mobile For good reasons commercial opportuni>es For the wrong reasons Because my compe>tor has a mobile app so I need one too regardless of security concerns New Internet of Things According to NPD Group US 5.7 internet enabled devices in the home Your own mobile Internet enabled ecosystem must be kept secure Mobility & Security Two sides of the same coin Especially as regards payments Fraud is up in cash less payments Prepaid NFC - Contactless Very ligle implementable guidance available from PCI DSS but this will change as security associa>ons are taking over ISACA ISSA (c) VigiTrust

18 Best Prac>ces Designing & Depoying Secured Mobile Fleets & Apps What first steps can you take? Remember the five accredita>on process steps Educa>on Pre- assessment (internal) Remedia>on Actual Assessment Con>nuous compliance Mix of 3 key elements Policies & procedures Technical Solu>ons Awareness Training What do you next then? Policies & procedures: draw up a list of P&Ps in your org. Technical Solu>ons: update your network diagram + App pen test Awareness Training: iden>fy in- scope employees and start the educa>on process (c) VigiTrust

19 Valid concerns about mobile security and how to address them Dublin, 19 th June 2013 hgp:// Thursday 20 June 13 (c) VigiTrust

20 Changes to Data ProtecAon in the EU Not a direcave but a single regulaaon in the EU HarmonizaAon at European level but with challenges Applies to companies based outside in the EU if personal data is handled abroad by companies that are acave in the EU and offer services to EU ciazens Right to be forgoren Controllers responsibiliaes Policies & procedures Staff Training Data processing impact assessment If any data is likely to present risks to individuals Security Both processor and controllers must put security measures in place Data Breach NoAficaAon Within 24 hours of noacing the breach Data Portability (service providers) & Data Transfers Data ProtecAon Officers Thursday 20 June 13 (c) VigiTrust

21 Intersec>on between PCI DSS compliance and the DPA Need for appropriate levels of security Compliance with PCI DSS should enable compliance with key provisions of the DPA ICO in the UK made an example of Lush (Lush Cosme>cs Ltd) "This breach should serve as a warning to all retailers that online security must be taken seriously and that the Payment Card Industry Data Security Standard or an equivalent must be followed at all Ames For online retailers, the PCI DSS is clearly now best pracace Adherence to the PCI DSS should ensure compliance with the security obligaaons under the Act Undertaking from Lush requires them to only store minimum amount of payment data necessary to receive payments, and keep for no longer than necessary. Clear Overlap between DPA & PCI DSS Requirements: Informa>on security policies Under the new data protecaon laws, policies and processes will be key, as transparency takes centre stage Protect Personal Data PHI, CHD, PII EncrypAon of personal data will avoid the need to contact every data subject in the event of a breach Privacy by Design Personal data should only be processed for the specific purpose for which it was collected, and not to be retained beyond the minimum necessary both in terms of amount and Ame (c) VigiTrust

3rd Party Assurance & Information Governance 2014-2016 outlook IIA Ireland Annual Conference 2014. Straightforward Security and Compliance

3rd Party Assurance & Information Governance 2014-2016 outlook IIA Ireland Annual Conference 2014. Straightforward Security and Compliance 3rd Party Assurance & Information Governance 2014-2016 outlook IIA Ireland Annual Conference 2014 Continuous Education Services (elearning/workshops) Compliance Management Portals Information Security

More information

The state of PCI DSS compliance. Irish Payments Services Organisation PCI DSS Explained

The state of PCI DSS compliance. Irish Payments Services Organisation PCI DSS Explained Pro-active Enterprise Security The state of PCI DSS compliance Global, European and Irish perspectives Irish Payments Services Organisation PCI DSS Explained Dublin 2 nd September 2010 Prepared by Mathieu

More information

plantemoran.com What School Personnel Administrators Need to know

plantemoran.com What School Personnel Administrators Need to know plantemoran.com Data Security and Privacy What School Personnel Administrators Need to know Tomorrow s Headline Let s hope not District posts confidential data online (Tech News, May 18, 2007) In one of

More information

Building a cloud- based SIEM with Splunk Cloud and AWS

Building a cloud- based SIEM with Splunk Cloud and AWS Copyright 2014 Splunk Inc. Building a cloud- based SIEM with Splunk Cloud and AWS Joe Goldberg Product MarkeAng, Splunk Gary Mikula Senior Director InformaAon Security, FINRA Sivakanth Mundru Product Manager,

More information

Protec'ng Informa'on Assets - Week 8 - Business Continuity and Disaster Recovery Planning. MIS 5206 Protec/ng Informa/on Assets Greg Senko

Protec'ng Informa'on Assets - Week 8 - Business Continuity and Disaster Recovery Planning. MIS 5206 Protec/ng Informa/on Assets Greg Senko Protec'ng Informa'on Assets - Week 8 - Business Continuity and Disaster Recovery Planning MIS5206 Week 8 In the News Readings In Class Case Study BCP/DRP Test Taking Tip Quiz In the News Discuss items

More information

RETHINKING CYBER SECURITY Changing the Business Conversation

RETHINKING CYBER SECURITY Changing the Business Conversation RETHINKING CYBER SECURITY Changing the Business Conversation October 2015 Introduction: Diane Smith Michigan Delegate Higher Education Conference Speaker Board Member 2 1 1. Historical Review Agenda 2.

More information

全 球 資 安 剖 析, 您 做 確 實 了 嗎? Albert Yung Barracuda Networks

全 球 資 安 剖 析, 您 做 確 實 了 嗎? Albert Yung Barracuda Networks 全 球 資 安 剖 析, 您 做 確 實 了 嗎? Albert Yung Barracuda Networks Agenda Challenges and PCI DSS 3.0 Updates Personal Information Protection Act Strategy to Protect against leak of Confidential Personal and Corporate

More information

Cybersecurity Capacity Assessment of the Republic of Kosovo. Lara Pace Kosovo June 2015

Cybersecurity Capacity Assessment of the Republic of Kosovo. Lara Pace Kosovo June 2015 Cybersecurity Capacity Assessment of the Republic of Kosovo Lara Pace Kosovo June 2015 CMM - Five Dimensions Levels of Maturity Start- up: At this level either nothing exists, or it is very embryonic in

More information

Payments Cards and Mobile Consul3ng Overview 2013

Payments Cards and Mobile Consul3ng Overview 2013 Payments Cards and Mobile Consul3ng Overview 2013 Our Services A digital publishing and marke3ng pla4orm for the future of payments Publishing Research Consul0ng Public Rela0ons Marke0ng/Branding Corporate

More information

Altius IT Policy Collection Compliance and Standards Matrix

Altius IT Policy Collection Compliance and Standards Matrix Governance IT Governance Policy Mergers and Acquisitions Policy Terms and Definitions Policy 164.308 12.4 12.5 EDM01 EDM02 EDM03 Information Security Privacy Policy Securing Information Systems Policy

More information

PCI Compliance for Cloud Applications

PCI Compliance for Cloud Applications What Is It? The Payment Card Industry Data Security Standard (PCIDSS), in particular v3.0, aims to reduce credit card fraud by minimizing the risks associated with the transmission, processing, and storage

More information

ONE DEVICE TO RULE THEM ALL! AUDITING MOBILE DEVICES / BYOD NSAA IT CONFERENCE OCTOBER 2, 2014

ONE DEVICE TO RULE THEM ALL! AUDITING MOBILE DEVICES / BYOD NSAA IT CONFERENCE OCTOBER 2, 2014 ONE DEVICE TO RULE THEM ALL! 1993 2013 1 AUDITING MOBILE DEVICES / BYOD NSAA IT CONFERENCE OCTOBER 2, 2014 2 1 AGENDA Mobile Devices / Smart Devices Implementation Models Risks & Threats Audit Program

More information

Securely Yours LLC IT Hot Topics. Sajay Rai, CPA, CISSP, CISM [email protected]

Securely Yours LLC IT Hot Topics. Sajay Rai, CPA, CISSP, CISM sajayrai@securelyyoursllc.com Securely Yours LLC IT Hot Topics Sajay Rai, CPA, CISSP, CISM [email protected] Contents Background Top Security Topics What auditors must know? What auditors must do? Next Steps [Image Info]

More information

Security Risk Management Strategy in a Mobile and Consumerised World

Security Risk Management Strategy in a Mobile and Consumerised World Security Risk Management Strategy in a Mobile and Consumerised World RYAN RUBIN (Msc, CISSP, CISM, QSA, CHFI) PROTIVITI Session ID: GRC-308 Session Classification: Intermediate AGENDA Current State Key

More information

2015-16 ITS Strategic Plan Enabling an Unbounded University

2015-16 ITS Strategic Plan Enabling an Unbounded University 2015-16 ITS Strategic Plan Enabling an Unbounded University Update: July 31, 2015 IniAaAve: Agility Through Technology Vision Mission Enable Unbounded Learning Support student success through the innovaave

More information

Copyright 2013 WatchGuard Technologies, Inc. All rights reserved. Introducción a Watchguard DLP Data Loss Prevention

Copyright 2013 WatchGuard Technologies, Inc. All rights reserved. Introducción a Watchguard DLP Data Loss Prevention Copyright 2013 WatchGuard Technologies, Inc. All rights reserved. Introducción a Watchguard DLP Data Loss Prevention About WatchGuard > Taken private in 2006; enabled strategic shift > Firewall appliance

More information

How Do You Secure An Environment Without a Perimeter?

How Do You Secure An Environment Without a Perimeter? How Do You Secure An Environment Without a Perimeter? Using Emerging Technology Processes to Support InfoSec Efforts in an Agile Data Center PTC Briefing January 18, 2015 About the Presenters CHARLA GRIFFY-BROWN

More information

DEVELOPING A CYBERSECURITY POLICY ARCHITECTURE

DEVELOPING A CYBERSECURITY POLICY ARCHITECTURE TECHNICAL PROPOSAL DEVELOPING A CYBERSECURITY POLICY ARCHITECTURE A White Paper Sandy Bacik, CISSP, CISM, ISSMP, CGEIT July 2011 7/8/2011 II355868IRK ii Study of the Integration Cost of Wind and Solar

More information

Obtaining CSF Certification Lessons Learned and Why Do It

Obtaining CSF Certification Lessons Learned and Why Do It Obtaining CSF Certification Lessons Learned and Why Do It Aaron Miri, Chief Technology Officer, Children s medical Center of Dallas Ryan Sawyer, Director, Technology Risk and Identity Governance, WellPoint

More information

Auditing the Security and Management of Smart Devices. ISACA Dallas Meeting February 13, 2014

Auditing the Security and Management of Smart Devices. ISACA Dallas Meeting February 13, 2014 Securely Manage your devices, applications and data. Deploy your corporate policies on smart devices. Comply with Regulatory Laws. Auditing the Security and Management of Smart Devices ISACA Dallas Meeting

More information

HOW SECURE IS YOUR PAYMENT CARD DATA?

HOW SECURE IS YOUR PAYMENT CARD DATA? HOW SECURE IS YOUR PAYMENT CARD DATA? October 27, 2011 MOSS ADAMS LLP 1 TODAY S PRESENTERS Francis Tam, CPA, CISA, CISM, CITP, CRISC, PCI QSA Managing Director PCI Practice Leader Kevin Villanueva,, CISSP,

More information

Information and Communications Technology Supply Chain Risk Management (ICT SCRM) AND NIST Cybersecurity Framework

Information and Communications Technology Supply Chain Risk Management (ICT SCRM) AND NIST Cybersecurity Framework Information and Communications Technology Supply Chain Risk Management (ICT SCRM) AND NIST Cybersecurity Framework Don t screw with my chain, dude! Jon Boyens Computer Security Division IT Laboratory November

More information

PCI COMPLIANCE REQUIREMENTS COMPLIANCE CALENDAR

PCI COMPLIANCE REQUIREMENTS COMPLIANCE CALENDAR PCI COMPLIANCE REQUIREMENTS COMPLIANCE CALENDAR AUTHOR: UDIT PATHAK SENIOR SECURITY ANALYST [email protected] Public Network Intelligence India 1 Contents 1. Background... 3 2. PCI Compliance

More information

Project Por)olio Management

Project Por)olio Management Project Por)olio Management Important markers for IT intensive businesses Rest assured with Infolob s project management methodologies What is Project Por)olio Management? Project Por)olio Management (PPM)

More information

How To Protect Virtualized Data From Security Threats

How To Protect Virtualized Data From Security Threats S24 Virtualiza.on Security from the Auditor Perspec.ve Rob Clyde, CEO, Adap.ve Compu.ng; former CTO, Symantec David Lu, Senior Product Manager, Trend Micro Hemma Prafullchandra, CTO/SVP Products, HyTrust

More information

Connec(ng to the NC Educa(on Cloud

Connec(ng to the NC Educa(on Cloud NC Educa)on Cloud Connec(ng to the NC Educa(on Cloud May 2012 Update! http://cloud.fi.ncsu.edu! Dave Furiness, MCNC! Phil Emer, Friday Institute! 1 First Things First Year one was about planning we are

More information

Reneaué Railton Sr. Informa2on Security Analyst, Duke Medicine Cyber Defense & Response

Reneaué Railton Sr. Informa2on Security Analyst, Duke Medicine Cyber Defense & Response Reneaué Railton Sr. Informa2on Security Analyst, Duke Medicine Cyber Defense & Response Incident Response What is the most importance component of an Incident Response Program? Tools? Processes? Governance?

More information

9/14/2015. Before we begin. Learning Objectives. Kevin Secrest IT Audit Manager, University of Pennsylvania

9/14/2015. Before we begin. Learning Objectives. Kevin Secrest IT Audit Manager, University of Pennsylvania Evaluating and Managing Third Party IT Service Providers Are You Really Getting The Assurance You Need To Mitigate Information Security and Privacy Risks? Kevin Secrest IT Audit Manager, University of

More information

Mobile Device Security Is there an app for that?

Mobile Device Security Is there an app for that? Mobile Device Security Is there an app for that? Session Objectives. The security risks associated with mobile devices. Current UC policies and guidelines designed to mitigate these risks. An approach

More information

Cloud Security and Managing Use Risks

Cloud Security and Managing Use Risks Carl F. Allen, CISM, CRISC, MBA Director, Information Systems Security Intermountain Healthcare Regulatory Compliance External Audit Legal and ediscovery Information Security Architecture Models Access

More information

Cybersecurity: An Innovative Approach to Advanced Persistent Threats

Cybersecurity: An Innovative Approach to Advanced Persistent Threats Cybersecurity: An Innovative Approach to Advanced Persistent Threats SESSION ID: AST1-R01 Brent Conran Chief Security Officer McAfee This is who I am 2 This is what I do 3 Student B The Hack Pack I used

More information

Information & Asset Protection with SIEM and DLP

Information & Asset Protection with SIEM and DLP Information & Asset Protection with SIEM and DLP Keeping the Good Stuff in and the Bad Stuff Out Professional Services: Doug Crich Practice Leader Infrastructure Protection Solutions What s driving the

More information

Cloud Services Overview

Cloud Services Overview Cloud Services Overview John Hankins Global Offering Executive Ricoh Production Print Solutions May 23, 2012 Cloud Services Agenda Definitions Types of Clouds The Role of Virtualization Cloud Architecture

More information

HITRUST CSF Assurance Program You Need a HITRUST CSF Assessment Now What?

HITRUST CSF Assurance Program You Need a HITRUST CSF Assessment Now What? HITRUST CSF Assurance Program You Need a HITRUST CSF Assessment Now What? Introduction This material is designed to answer some of the commonly asked questions by business associates and other organizations

More information

Innovation and Emerging Payments/FinTech

Innovation and Emerging Payments/FinTech Innovation and Emerging Payments/FinTech The Regulatory Perspective Wild, Wild West 2006-2 008 2009-2 010 2011 2012 2013-2 014 Remote Payments - SMS & Internet Mobile Browser QR Codes mpos PayPal Here

More information

The Emergence of the ISO in Community Banking Patrick H. Whelan CISA IT Security & Compliance Consultant

The Emergence of the ISO in Community Banking Patrick H. Whelan CISA IT Security & Compliance Consultant THE MARKET LEADER IN IT, SECURITY AND COMPLIANCE SERVICES FOR COMMUNITY FINANCIAL INSTITUTIONS The Emergence of the ISO in Community Banking Patrick H. Whelan CISA IT Security & Compliance Consultant Agenda

More information

Interna'onal Standards Ac'vi'es on Cloud Security EVA KUIPER, CISA CISSP [email protected] HP ENTERPRISE SECURITY SERVICES

Interna'onal Standards Ac'vi'es on Cloud Security EVA KUIPER, CISA CISSP EVA.KUIPER@HP.COM HP ENTERPRISE SECURITY SERVICES Interna'onal Standards Ac'vi'es on Cloud Security EVA KUIPER, CISA CISSP [email protected] HP ENTERPRISE SECURITY SERVICES Agenda Importance of Common Cloud Standards Outline current work undertaken Define

More information

Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation

Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation Melissa J. Krasnow, Dorsey & Whitney LLP A Note discussing written information security programs (WISPs)

More information

To ensure independence, PSC does not represent, resell or receive commissions from any third party hardware, software or solutions vendors.

To ensure independence, PSC does not represent, resell or receive commissions from any third party hardware, software or solutions vendors. About PSC With offices in the USA, Canada, UK and Australia, PSC is a leading PCI, PA DSS, and P2PE assessor, PCI Forensics Company and Approved Scanning Vendor. PSC is one of an elite few companies qualified

More information

Risky Business. Is Your Cybersecurity in Cruise Control? ISACA Austin Chapter Meeting May 5, 2015

Risky Business. Is Your Cybersecurity in Cruise Control? ISACA Austin Chapter Meeting May 5, 2015 Risky Business Is Your Cybersecurity in Cruise Control? ISACA Austin Chapter Meeting May 5, 2015 What We ll Cover About Me Background The threat Risks to your organization What your organization can/should

More information

Developing National Frameworks & Engaging the Private Sector

Developing National Frameworks & Engaging the Private Sector www.pwc.com Developing National Frameworks & Engaging the Private Sector Focus on Information/Cyber Security Risk Management American Red Cross Disaster Preparedness Summit Chicago, IL September 19, 2012

More information

Taking a Data-Centric Approach to Security in the Cloud

Taking a Data-Centric Approach to Security in the Cloud Taking a Data-Centric Approach to Security in the Cloud Bob West Chief Trust Officer CipherCloud 2014 CipherCloud All rights reserved 1 Taking a Data-Centric Approach to Cloud Data Protection Bob West

More information

The BYOD of Tomorrow: BYOD 2.0. What is BYOD 1.0? What is BYOD 2.0? 3/27/2014. Cesar Picasso, MBA SOTI Inc. April 02, 2014

The BYOD of Tomorrow: BYOD 2.0. What is BYOD 1.0? What is BYOD 2.0? 3/27/2014. Cesar Picasso, MBA SOTI Inc. April 02, 2014 The BYOD of Tomorrow: BYOD 2.0 Cesar Picasso, MBA SOTI Inc. April 02, 2014 What is BYOD 1.0? BYOD 1.0 was the first wave of mobile device management that controlled the entire device BYOD 1.0 was inadequate

More information

Information Security: Cloud Computing

Information Security: Cloud Computing Information Security: Cloud Computing Simon Taylor MSc CLAS CISSP CISMP PCIRM Director & Principal Consultant All Rights Reserved. Taylor Baines Limited is a Registered Company in England & Wales. Registration

More information

Guided HIPAA Compliance

Guided HIPAA Compliance Guided HIPAA Compliance HIPAA Solutions for Office Managers and Practitioners SecurityMetrics We protect business Since its founding in 2000, privately-held SecurityMetrics has grown from a small security

More information

How To Protect Yourself From A Hacker Attack

How To Protect Yourself From A Hacker Attack Cybersecurity Demystified: Information Technology Security Trends Joe Oleksak, Plante Moran Agenda Data Security Trends Example Attacks Industry Examples An Answer 1 Who Are The Victims? Targets - victims

More information

A framework for auditing mobile devices

A framework for auditing mobile devices A framework for auditing mobile devices Baker Tilly refers to Baker Tilly Virchow Krause, LLP, an independently owned and managed member of Baker Tilly International. 2010 Baker Tilly Virchow Krause, LLP

More information

IT Security & Compliance Risk Assessment Capabilities

IT Security & Compliance Risk Assessment Capabilities ATIBA Governance, Risk and Compliance ATIBA provides information security and risk management consulting services for the Banking, Financial Services, Insurance, Healthcare, Manufacturing, Government,

More information

Cloud Computing Risks & Reality. Sandra Liepkalns, CRISC [email protected]

Cloud Computing Risks & Reality. Sandra Liepkalns, CRISC sandra.liepkalns@netrus.com Cloud Computing Risks & Reality Sandra Liepkalns, CRISC [email protected] What is Cloud Security The quality or state of being secure to be free from danger & minimize risk To be protected from

More information

STATE OF NEW JERSEY Security Controls Assessment Checklist

STATE OF NEW JERSEY Security Controls Assessment Checklist STATE OF NEW JERSEY Security Controls Assessment Checklist Appendix D to 09-11-P1-NJOIT P.O. Box 212 www.nj.gov/it/ps/ 300 Riverview Plaza Trenton, NJ 08625-0212 Agency/Business (Extranet) Entity Response

More information

Security Controls What Works. Southside Virginia Community College: Security Awareness

Security Controls What Works. Southside Virginia Community College: Security Awareness Security Controls What Works Southside Virginia Community College: Security Awareness Session Overview Identification of Information Security Drivers Identification of Regulations and Acts Introduction

More information

Big Data, Big Risk, Big Rewards. Hussein Syed

Big Data, Big Risk, Big Rewards. Hussein Syed Big Data, Big Risk, Big Rewards Hussein Syed Discussion Topics Information Security in healthcare Cyber Security Big Data Security Security and Privacy concerns Security and Privacy Governance Big Data

More information

PALO ALTO SAFE APPLICATION ENABLEMENT

PALO ALTO SAFE APPLICATION ENABLEMENT PALO ALTO SAFE APPLICATION ENABLEMENT 1 Palo Alto Networks Product Overview James Sherlow SE Manager WEUR & Africa [email protected] @jsherlow Palo Alto Networks at a Glance Corporate Highlights

More information

Customer PCI 3.0 Changes = New Opportunity For You. Giles Witherspoon-Boyd SecurityMetrics

Customer PCI 3.0 Changes = New Opportunity For You. Giles Witherspoon-Boyd SecurityMetrics Customer PCI 3.0 Changes = New Opportunity For You Giles Witherspoon-Boyd SecurityMetrics Who is this guy? Giles Witherspoon-Boyd, PCIP 15 years in technology, 4 years at SecurityMetrics SecurityMetrics

More information

Design of Database Security Policy In Enterprise Systems

Design of Database Security Policy In Enterprise Systems Design of Database Security Policy In Enterprise Systems by Krishna R Singitam Database Architect Page 1 of 10 Table of Contents 1. Abstract... 3 2. Introduction... 3 2.1. Understanding the Necessity of

More information

Protecting Your Data On The Network, Cloud And Virtual Servers

Protecting Your Data On The Network, Cloud And Virtual Servers Protecting Your Data On The Network, Cloud And Virtual Servers How SafeGuard Encryption can secure your files everywhere The workplace is never static. Developments include the widespread use of public

More information

Clavister InSight TM. Protecting Values

Clavister InSight TM. Protecting Values Clavister InSight TM Clavister SSP Security Services Platform firewall VPN termination intrusion prevention anti-virus anti-spam content filtering traffic shaping authentication Protecting Values & Enterprise-wide

More information

Cloud models and compliance requirements which is right for you?

Cloud models and compliance requirements which is right for you? Cloud models and compliance requirements which is right for you? Bill Franklin, Director, Coalfire Stephanie Tayengco, VP of Technical Operations, Logicworks March 17, 2015 Speaker Introduction Bill Franklin,

More information

Network Security & Privacy Landscape

Network Security & Privacy Landscape Network Security & Privacy Landscape Presented By: Greg Garijanian Senior Underwriter Professional Liability 1 Agenda Network Security Overview -Latest Threats - Exposure Trends - Regulations Case Studies

More information

Network & Information Security Policy

Network & Information Security Policy Policy Version: 2.1 Approved: 02/20/2015 Effective: 03/02/2015 Table of Contents I. Purpose................... 1 II. Scope.................... 1 III. Roles and Responsibilities............. 1 IV. Risk

More information

Our Commitment to Information Security

Our Commitment to Information Security Our Commitment to Information Security What is HIPPA? Health Insurance Portability and Accountability Act 1996 The HIPAA Privacy regulations require health care providers and organizations, as well as

More information

SECURITY. Risk & Compliance Services

SECURITY. Risk & Compliance Services SECURITY Risk & Compliance s V1 8/2010 Risk & Compliances s Risk & compliance services Summary Summary Trace3 offers a full and complete line of security assessment services designed to help you minimize

More information