Commonwealth Information Security Officers Advisory Group (ISOAG) Meeting
|
|
|
- Evelyn McKinney
- 10 years ago
- Views:
Transcription
1 Commonwealth Information Security Officers Advisory Group (ISOAG) Meeting September 2,
2 ISOAG September 2, 2015 Agenda I. Welcome & Opening Remarks Michael Watson, VITA II. Dealing with Overload Eric Cowperthwaite, Core Security III. National Cyber Security Awareness Month IV. Upcoming Events Ed Miller, VITA Bob Baskette/Michael Watson, VIT V. Partner/Operation Update Bob Baskette, VITA, Michael Clark, NG 2
3 Welcome and Opening Remarks Michael Watson September 2,
4 Dealing with Overload Eric Cowperthwaite, Core Security September 2,
5 CISO Overload Eric W. Cowperthwaite Vice President Advanced Security and Strategy PAGE
6 Without Change, We Die Looks at why Homo Sapiens survived and Neanderthals did not A key issue was that Neanderthals didn t adapt to new threats Security today is behaving like Neanderthals 6
7 Another Military Analogy We are preparing for the last war Much like the French Maginot Line in WWII Our defenses are aimed at 2003 SQL Slammer viruses Lost and stolen devices We are fighting WWI and they are fighting WWII Who s going to win that fight? 7
8 And The Reality Is Our current concept says: Build a strong outer defense Know who everybody on the network is Defend all systems with a standard set of security controls In spite of this, the bad guys seem to be able to break in to whatever organization they want to. 8
9 Anatomy of a Breach Adobe breached by exploiting a ColdFusion vulnerability, according to Krebs on Security Attacker discovered vulnerabilities the defender didn t know about. 9
10 The Problem - Overload Security teams are overloaded Data vulnerabilities, networks, viruses, SIEM, oh my Regulations Required security, reports, mandatory activity, oh my 10
11 Data Overload The advent of virtualization Data center sprawl End points, mobility, Internet of Things Vulnerability proliferation (Adobe) Event proliferation (Neiman Marcus) 11
12 Regulatory Overload HIPAA, GLBA, FISMA, PCI State breach notification laws State security regulations Commonwealth s Information Security Standard 12
13 Let s Start Here... Predictive Security is a real term What it means is... Predictive security solutions enable you to understand the strengths and weaknesses of your infrastructure, network and human security and predict where an attacker is most likely to attack and exploit them successfully. 13
14 And Modern, innovative security solutions. Are a force multiplier Deal with regulatory reality Improve security 14
15 How About Some Nuts & Bolts Need to understand your network, servers, & vulnerabilities And then be able to think like a hacker would Validate and prioritize vulnerabilities Demonstrate appropriate security Satisfy auditors and regulators 15
16 This Is A Big Data Problem My previous employer has over 100,000 nodes How many vulnerabilities? How many possible attack paths? Are the vulnerabilities exploitable Does the attack path lead to sensitive data 7 different regulations and security frameworks to satisfy 16
17 What s The Advantage? Instead of defending everything/nothing You will know where the attacks will happen Defend the attack path Harden critical systems Increase the cost/difficulty for the bad guy 17
18 Bottom Line This is the future of Information Security Success is going to require innovation Big Data solutions are crucial Must understand what the bad guy will do Must know where to expend limited resources Have to change the game from blind defense to intelligent defense 18
19 Visualizing the Problem Collect Remediate Nessus MVM IP360 Qualys Nexpose Etc. DATA The Problem: Mountains of Data 1000 s of Vulnerabilities No Relevance to Business The traditional solution: Try to patch everything Priority based on CVE score No business context epo GRC SIEM Remediation IT/Network Ops Trustwave Qualys NTO Web Inspect App Scan Etc. 19
20 Visualizing the Solution Collect Nessus MVM IP360 Qualys Nexpose Etc. Analyze Remediate & Report Attack Intelligence Platform Remediation IT/Network Ops DATA Consolidate security data Simulate attack paths The traditional solution: Try to patch everything Priority based on CVE score No business context Prioritize business risk Validate vulnerabilities Actionable Information Reporting Leadership/Audit Trustwave Qualys NTO Web Inspect App Scan Etc. 20
21 Attack & Threat Intelligence Platform Information Gathering Network Discovery Vulnerability Scanning Phishing Risk Analysis Attack Simulation Threat Modeling Exploit Correlation Exploit Validation Attack Path Testing Penetration Testing Compliance & Reports Risk Reports Role-based Reports Business Reports Compliance Reports Attack Paths Correlation Rules Critical Asset Risk Attack Intelligence Platform Integration Framework Service Desk Remediation Vulnerability data Configuration data Event data VM NSM SIEM 21
22 What Does It Look Like In Practice? Further test and validate vulnerable systems on attack paths Attack Point Web Application Server Vulnerable Database Pivot Point Print Server Critical Business Asset (Ex. credit card database) 22
23 CISO Dashboard Relieves Overload 23
24 Continue The Conversation 24
25 National Cyber Security Awareness Month
26 National Cyber Security Awareness Month is observed annually in October. This year marks the 12 th anniversary of NCSAM and the 5 th anniversary of Stop.Think.Connect Campaign
27 The Anti-Phishing Working Group (APWG) and National Cyber Security Alliance (NCSA) led the development of the STOP. THINK. CONNECT. campaign. The U.S. Department of Homeland Security provides the Federal Government's leadership for the STOP. THINK. CONNECT. campaign
28 The Anti-Phishing Working Group (APWG) and National Cyber Security Alliance (NCSA) led the development of the STOP. THINK. CONNECT. campaign. The U.S. Department of Homeland Security provides the Federal Government's leadership for the STOP. THINK. CONNECT. campaign
29 Stop. Think. Connect. National Cyber Security Awareness Month Partner Packet
30 Start Planning Now 1. Determine weekly themes relevant to your agency 2. Solicit ideas from departments within your agency for NCSAM 3. Identify what communications channels you will use to distribute your tips or resources i.e. webpage, social media, tweets, instagram 4. Determine how you will distribute your information i.e. posters, tip cards, informational materials. 5. Most importantly, make it your own brand You know the unique needs of your agency
31 Planning Checklist: Countdown Time September 1. Continue planning your event 2. Brief your leadership on your plans and solicit their support 3. Work with your communications teams to develop a strategy to promote NCSAM 4. Publicize your event October 1. Post a message on your website or newsletter to announce NCSAM 2. Add a NCSAM auto signature to your s 3. Post cybersecurity and safety messages on social media throughout the month 4. Post cyber security blogs 5. Hold agency events for employees to attend
32 Activity List Examples Week 1 General Cyber Security Awareness Information 1. Upload the NCSAM banner to your website 2. Post a cyber security message on your website or on social media announcing NCSAM Week 2 Creating a Culture of Cybersecurity at Work 1. Share tips on protecting your workplace 2. Encourage employees to use a NCSAM auto signature. i.e. Cybersecurity is a shared responsibility, etc. Week 3 Staying Protected While Connected 1. Post a mobile safety tip on social media 2. Share a link to a cybersecurity video on your website 3. Hold a cybersecurity event
33 Activity List Examples Week 4 Your Evolving Digital Life 1. Post a cybersecurity story in an online newsletter 2. a cybersecurity tip to employees Week 5 Building the Next Generation of Cyber Professionals 1. Share a news story about the importance of cybersecurity 2. Post a cybersecurity fact or figure on social media
34 Additional Resources ftc.gov/bulkorder Order free resource materials from the Federal Trade Commission ww.staysafeonline.org/stay-safe-online/
35 VITA Activity List Week 1 Cyber Security: It s Our Shared Responsibility 1. Open Message from VITA s CIO to employees about the importance of National Cyber Security Awareness Month 2. Cyber security games, videos and informational links will be ed to all employees 3. We will kick off the MS ISAC s annual Kids Safe Online Poster Contest for school age kids K through Oct 1 Brown bag lunch and learn session featuring a Security Family Feud Game to test employees knowledge of cyber security etiquette 5. Setup a Cyber Security Information table in the hallway 6. Publish the Governor s Cyber Security Month Proclamation 7. Post Security Awareness Toolkit on our website 8. Post weekly Cyber Security Awareness Blog by David Ihrie, Center for Information Technology 9. Twitter Thursday Invite employees to tweet security awareness tips based on the theme of the week
36 VITA Activity List Week 2 Social Media Be Careful What you Post 1. Social Media related security games, videos and informational links will be ed to all employees 2. Cyber Security Information table in the hallway 3. Oct 7 Information Security Officers Advisory Group (ISOAG) monthly meeting. Security Awareness posters and pamphlets will be distributed to all attendees. 4. Post weekly Cyber Security Awareness Blog by David Ihrie, Center for Information Technology 5. Twitter Thursday Invite employees to tweet security awareness tips based on the theme of the week
37 VITA Activity List Week 3 Securing Our Work Environment (If you see something, say something) 1. Securing Our Work Environment games, videos and informational links will be ed to all employees 2. Cyber Security Information table in the hallway 3. Oct 13 Employee Popcorn Social to celebrate National Cyber Security Awareness Day 4. Oct 14 - Brown bag lunch-and-learn session on Protecting Our Infrastructure presented by the Department of Homeland Security 5. Link to weekly Cyber Security Awareness Blog by David Ihrie, Center for Information Technology 6. Cyber Security Information table in the hallway 7. Post weekly Cyber Security Awareness Blog by David Ihrie, Center for Information Technology 8. Twitter Thursdays Invite employees to tweet security awareness tips based on the theme of the week
38 VITA Activity List Week 4 Protecting Your Privacy Online Know the Risks 1. Privacy related games, videos and informational links will be ed to all employees 2. Cyber Security Information table in the hallway 3. Oct 21 - A brown bag lunch-and-learn session presentation by Special Agent James LaMattina, United States Secret Service in conjunction with Capital One on ATM Skimming 4. Post weekly Cyber Security Awareness Blog by David Ihire, Center for Information Technology 5. Twitter Thursday Invite employees to tweet security awareness tips based on the theme of the week
39 VITA Activity List Week 5 Keeping Children Safe Online 1. Keep Children Safe online security related games, videos and informational links will be ed to all employees 2. Oct 28: Brown bag lunch-and learn session presentation by Captain Robert P. Chappell, Virginia State Police. Captain Chappell is the author of the book Child Identity Theft : What Every Parent Needs to Know. 3. Oct 29: Cyber Security bake and cyber games for donations to benefit the Commonwealth of Virginia Charities 4. Post weekly Cyber Security Awareness Blog by David Ihrie, Center for Information Technology 5. Twitter Thursday Invite employees to tweet security awareness tips based on the theme of the week
40 2016 Kids Safe Online Poster Contest VITA will be kicking off the 2016 MS ISAC Kids Safe Online Poster Contest this month. The contest is open to students in grades kindergarten through 12. The contest is sponsored by the Virginia Information Technologies Agency (VITA) in conjunction with the Multi-State Information Sharing and Analysis Center (MS-ISAC). This is a national contest which encourages our youth to use the Internet safely and securely
41 2016 Kids Safe Online Poster Contest The top three winning posters from Virginia for each grade group (K-5, 6-8 and 9-12) will be submitted to the national Multi-State Cyber Security Awareness poster contest. The national winning posters in each age group will have their artwork displayed in the 2017 National Stay Safe Online Calendar. The calendar will be distributed throughout the country and may also be used in campaigns to raise awareness among children of all ages about internet and computer safety. Virginia has three national winners in last two years
42 2016 Kids Safe Online Poster Contest The 2015 Virginia national winners posters can be found on our website **more details will be forthcoming
43
44 Questions or Assistance with NCSAM Contact:
45 Upcoming Events
46 IS Orientation When: Thursday, September 24, 2015 Time: 1:00 pm to 3:00 pm Where: CESC, Room 1211 Register here: 46
47 Announcement: VASCAN Conference 2015 They Will Get In. What Are We Doing About It? Date: October 1-2, 2015 Location: UVA, Newcomb Hall Ballroom Topics: information security advanced defense techniques IT risk management IT regulatory compliance Bonus Content: SANS:Incident Response Management MGT535 Meals Breakfast and lunch both days Conference reception Thursday evening, October 1 To Register: 47
48 Future ISOAG October 7, 1:00-4:00 CESC Speaker: Mike Watson, VITA ISOAG meets the 1 st Wednesday of each month in
49 ADJOURN THANK YOU FOR ATTENDING Picture courtesy of 49
Commonwealth Information Security Officers Advisory Group (ISOAG) Meeting
Commonwealth Information Security Officers Advisory Group (ISOAG) Meeting April 4, 2012 www.vita.virginia.gov 1 1 Congratulations! Michael Watson Commonwealth of Virginia Chief Information Security Officer
NEXPOSE ENTERPRISE METASPLOIT PRO. Effective Vulnerability Management and validation. March 2015
NEXPOSE ENTERPRISE METASPLOIT PRO Effective Vulnerability Management and validation March 2015 KEY SECURITY CHALLENGES Common Challenges Organizations Experience Key Security Challenges Visibility gaps
Cybersecurity Protecting Yourself, Your Business, Your Clients
Cybersecurity Protecting Yourself, Your Business, Your Clients Global Summit of Women June 7, 2014 Celina B. Realuyo Professor of Practice of National Security Affairs William J. Perry Center for Hemispheric
National Cyber Security Awareness Month Kicks Off Today with Official Launch Event, Business Summit and Release of Online Safety Survey
PRESS RELEASE Oct. 1, 2012, 9:00 a.m. EDT National Cyber Security Awareness Month Kicks Off Today with Official Launch Event, Business Summit and Release of Online Safety Survey WASHINGTON, Oct. 1, 2012
Vulnerability Risk Management 2.0. Best Practices for Managing Risk in the New Digital War
Vulnerability Risk Management 2.0 Best Practices for Managing Risk in the New Digital War In 2015, 17 new security vulnerabilities are identified every day. One nearly every 90 minutes. This consistent
Attack Intelligence: Why It Matters
Attack Intelligence: Why It Matters WHITE PAPER Core Security +1 617.399-6980 [email protected] www.coresecurity.com A Proactive Strategy Attacks against your organization are more prevalent than ever,
National Cyber Security Awareness Month. Week Two: Creating a Culture of Cybersecurity at Work
National Cyber Security Awareness Month Week Two: Creating a Culture of Cybersecurity at Work Webinar Recording and Evaluation Survey This webinar is being recorded and will be made available online to
CORE Security and the Payment Card Industry Data Security Standard (PCI DSS)
CORE Security and the Payment Card Industry Data Security Standard (PCI DSS) Addressing the PCI DSS with Predictive Security Intelligence Solutions from CORE Security CORE Security +1 617.399-6980 [email protected]
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to
Continuous Network Monitoring
Continuous Network Monitoring Eliminate periodic assessment processes that expose security and compliance programs to failure Continuous Network Monitoring Continuous network monitoring and assessment
Webinar: Creating a Culture of Cybersecurity at Work
Webinar: Creating a Culture of Cybersecurity at Work Thursday, Oct. 8, 2105 stopthinkconnect.org Agenda Welcome/NCSA Landscape Start With Security: Federal Trade Commission NIST Framework: Better Business
SMALL BUSINESS PRESENTATION
STOP.THINK.CONNECT NATIONAL CYBERSECURITY AWARENESS CAMPAIGN SMALL BUSINESS PRESENTATION ABOUT STOP.THINK.CONNECT. In 2009, President Obama issued the Cyberspace Policy Review, which tasked the Department
Universities and Schools Under Cyber-Attack: How to Protect Your Institution of Excellence
Universities and Schools Under Cyber-Attack: How to Protect Your Institution of Excellence About ERM About The Speaker Information Security Expert at ERM B.S. Software Engineering and Information Technology
Click to edit Master title style
EVOLUTION OF CYBERSECURITY Click to edit Master title style IDENTIFYING BEST PRACTICES PHILIP DIEKHOFF, IT RISK SERVICES TECHNOLOGY THE DARK SIDE AGENDA Defining cybersecurity Assessing your cybersecurity
Threat and Vulnerability Management (TVM) Protecting IT assets through a comprehensive program. Chicago IIA/ISACA
www.pwc.com Vulnerability Management (TVM) Protecting IT assets through a comprehensive program Chicago IIA/ISACA 2 nd Annual Hacking Conference Introductions Paul Hinds Managing Director Cybersecurity
CORE INSIGHT ENTERPRISE: CSO USE CASES FOR ENTERPRISE SECURITY TESTING AND MEASUREMENT
CORE INSIGHT ENTERPRISE: CSO USE CASES FOR ENTERPRISE SECURITY TESTING AND MEASUREMENT How advancements in automated security testing software empower organizations to continuously measure information
Cyber Security Management
Cyber Security Management Focusing on managing your IT Security effectively. By Anthony Goodeill With the news cycles regularly announcing a recurrently theme of targets of hacker attacks and companies
WHITE PAPER: THREAT INTELLIGENCE RANKING
WHITE PAPER: THREAT INTELLIGENCE RANKING SEPTEMBER 2015 2 HOW WELL DO YOU KNOW YOUR THREAT DATA? HOW THREAT INTELLIGENCE FEED MODELING CAN SAVE MONEY AND PREVENT BREACHES Who are the bad guys? What makes
Enhancing NASA Cyber Security Awareness From the C-Suite to the End-User
Enhancing NASA Cyber Security Awareness From the C-Suite to the End-User Valarie Burks Deputy Chief Information Officer, IT Security Division National Aeronautics and Space Administration (NASA) Agenda
Defending Against Data Beaches: Internal Controls for Cybersecurity
Defending Against Data Beaches: Internal Controls for Cybersecurity Presented by: Michael Walter, Managing Director and Chris Manning, Associate Director Protiviti Atlanta Office Agenda Defining Cybersecurity
The Future Is SECURITY THAT MAKES A DIFFERENCE. Overview of the 20 Critical Controls. Dr. Eric Cole
The Future Is SECURITY THAT MAKES A DIFFERENCE Overview of the 20 Critical Controls Dr. Eric Cole Introduction Security is an evolution! Understanding the benefit and know how to implement the 20 critical
CORE Insight Enterprise
CORE Insight Enterprise Advancing Vulnerability Management with Intelligence CORE Security +1 617.399-6980 [email protected] www.coresecurity.com blog.coresecurity.com Introduction Ten years ago, Internet
Checklist for HIPAA/HITECH Compliance Best Practices for Healthcare Information Security
Checklist for HIPAA/HITECH Compliance Best Practices for Healthcare Information Security Ali Pabrai, MSEE, CISSP (ISSMP, ISSAP) For Daily Compliance & Security Tips, Follow ecfirst @ Agenda Review the
Management and Storage of Sensitive Information UH Information Security Team (InfoSec)
Management and Storage of Sensitive Information UH Information Security Team (InfoSec) Who Are We? UH Information Security Team Jodi Ito - Information Security Officer Deanna Pasternak & Taylor Summers
Minimizing Risk Through Vulnerability Management. Presentation for Rochester Security Summit 2015 Security Governance Track October 7, 2015
Minimizing Risk Through Vulnerability Management Presentation for Rochester Security Summit 2015 Security Governance Track October 7, 2015 Speaker Bio Partnering with clients to drive effective cyber risk
Five Ways to Use Security Intelligence to Pass Your HIPAA Audit
e-book Five Ways to Use Security Intelligence to Pass Your HIPAA Audit HIPAA audits on the way 2012 is shaping up to be a busy year for auditors. Reports indicate that the Department of Health and Human
Cyber Security Metrics Dashboards & Analytics
Cyber Security Metrics Dashboards & Analytics Feb, 2014 Robert J. Michalsky Principal, Cyber Security NJVC, LLC Proprietary Data UNCLASSIFIED Agenda Healthcare Sector Threats Recent History Security Metrics
White Paper. IT Security in Higher Education
White Paper IT Security in Higher Education 3BIntroduction: The Growing Need for Improved IT Security on Campuses IT security is a hot topic these days, especially at colleges and universities. An April
Integrating Cybersecurity with Emergency Operations Plans (EOPs) for Institutions of Higher Education (IHEs)
Integrating Cybersecurity with Emergency Operations Plans (EOPs) for Institutions of Higher Education (IHEs) Amy Banks, U.S. Department of Education, Center for School Preparedness, Office of Safe and
2011 Forrester Research, Inc. Reproduction Prohibited
1 2011 Forrester Research, Inc. Reproduction Prohibited Information Security Metrics Present Information that Matters to the Business Ed Ferrara, Principal Research Analyst July 12, 2011 2 2009 2011 Forrester
Solving the CIO s Cybersecurity Dilemma: 20 Critical Controls for Effective Cyber Defense
Solving the CIO s Cybersecurity Dilemma: 20 Critical Controls for Effective Cyber Defense John M. Gilligan Information systems Security Association National Capital Chapter January 19, 2010 1 Topics Background
Cybersecurity: What CFO s Need to Know
Cybersecurity: What CFO s Need to Know William J. Nowik, CISA, CISSP, QSA PCIP MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2014 Wolf & Company, P.C. Today s Agenda Introduction
FIVE PRACTICAL STEPS
WHITEPAPER FIVE PRACTICAL STEPS To Protecting Your Organization Against Breach How Security Intelligence & Reducing Information Risk Play Strategic Roles in Driving Your Business CEOs, CIOs, CTOs, AND
By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015
Community Bank Auditors Group Cybersecurity What you need to do now June 9, 2015 By: Gerald Gagne MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2015 Wolf & Company, P.C. Cybersecurity
How to Spot and Combat a Phishing Attack Webinar
How to Spot and Combat a Phishing Attack Webinar October 20 th, 2015 Kevin Patel Sr Director of Information Security, Compliance & IT Risk Mgmt [email protected] Agenda 1) National Cyber Security
Cyber R &D Research Roundtable
Cyber R &D Research Roundtable 2 May 2013 N A T I O N A L S E C U R I T Y E N E R G Y & E N V I R O N M E N T H E A L T H C Y B E R S E C U R I T Y Changing Environment Rapidly Evolving Threat Changes
SMALL BUSINESS PRESENTATION
STOP.THINK.CONNECT NATIONAL CYBERSECURITY AWARENESS CAMPAIGN SMALL BUSINESS PRESENTATION ABOUT STOP.THINK.CONNECT. In 2009, President Obama issued the Cyberspace Policy Review, which tasked the Department
The SIEM Evaluator s Guide
Using SIEM for Compliance, Threat Management, & Incident Response Security information and event management (SIEM) tools are designed to collect, store, analyze, and report on log data for threat detection,
Review: McAfee Vulnerability Manager
Review: McAfee Vulnerability Manager S3KUR3, Inc. Communicating Complex Concepts in Simple Terms Tony Bradley, CISSP, Microsoft MVP September 2010 Threats and vulnerabilities are a way of life for IT admins.
How To Test For Security On A Network Without Being Hacked
A Simple Guide to Successful Penetration Testing Table of Contents Penetration Testing, Simplified. Scanning is Not Testing. Test Well. Test Often. Pen Test to Avoid a Mess. Six-phase Methodology. A Few
High End Information Security Services
High End Information Security Services Welcome Trion Logics Security Solutions was established after understanding the market's need for a high end - End to end security integration and consulting company.
Wasting Money on the Tools? Automating the Most Critical Security Controls. Mason Brown Director, The SANS Institute
Wasting Money on the Tools? Automating the Most Critical Security Controls Bonus: Gaining Support From Top Managers for Security Investments Mason Brown Director, The SANS Institute The Most Trusted Name
Analyzing Security for Retailers An analysis of what retailers can do to improve their network security
Analyzing Security for Retailers An analysis of what retailers can do to improve their network security Clone Systems Business Security Intelligence Properly Secure Every Business Network Executive Summary
Cybersecurity Vulnerability Management:
Cybersecurity Vulnerability Management: Finding Your Enterprise s Security Product Partner William L Brown Jr. Senior Engineering Manager, Regulatory and Product Security Is your security system doing
Auditing emerging cyber threats and IT controls
Auditing emerging cyber threats and IT controls Robert Baldi Director of IT Audit, ACI Worldwide Warren Fish Manager of IT Audit, ACI Worldwide Competency The trouble with competence is that it is always
Vulnerability Management
Vulnerability Management Buyer s Guide Buyer s Guide 01 Introduction 02 Key Components 03 Other Considerations About Rapid7 01 INTRODUCTION Exploiting weaknesses in browsers, operating systems and other
CYBERSECURITY: PROTECTING YOUR ORGANIZATION AGAINST CYBER ATTACKS. Viviana Campanaro CISSP Director, Security and Compliance July 14, 2015
CYBERSECURITY: PROTECTING YOUR ORGANIZATION AGAINST CYBER ATTACKS Viviana Campanaro CISSP Director, Security and Compliance July 14, 2015 TODAY S PRESENTER Viviana Campanaro, CISSP Director, Security and
IBM Security Strategy
IBM Security Strategy Intelligence, Integration and Expertise Kate Scarcella CISSP Security Tiger Team Executive M.S. Information Security IBM Security Systems IBM Security: Delivering intelligence, integration
WHITE PAPER AUTOMATED, REAL-TIME RISK ANALYSIS AND REMEDIATION
WHITE PAPER AUTOMATED, REAL-TIME RISK ANALYSIS AND REMEDIATION Table of Contents Executive Summary...3 Vulnerability Scanners Alone Are Not Enough...3 Real-Time Change Configuration Notification is the
PCI DSS Overview and Solutions. Anwar McEntee [email protected]
PCI DSS Overview and Solutions Anwar McEntee [email protected] Agenda Threat environment and risk PCI DSS overview Who we are Solutions and where we can help Market presence High Profile Hacks in
White Paper: Leveraging Web Intelligence to Enhance Cyber Security
White Paper: Leveraging Web Intelligence to Enhance Cyber Security October 2013 Inside: New context on Web Intelligence The need for external data in enterprise context Making better use of web intelligence
October 24, 2014. Mitigating Legal and Business Risks of Cyber Breaches
October 24, 2014 Mitigating Legal and Business Risks of Cyber Breaches AGENDA Introductions Cyber Threat Landscape Cyber Risk Mitigation Strategies 1 Introductions 2 Introductions To Be Confirmed Title
The Value of Vulnerability Management*
The Value of Vulnerability Management* *ISACA/IIA Dallas Presented by: Robert Buchheit, Director Advisory Practice, Dallas Ricky Allen, Manager Advisory Practice, Houston *connectedthinking PwC Agenda
BIG SHIFT TO CLOUD-BASED SECURITY
GUIDE THE BIG SHIFT TO CLOUD-BASED SECURITY How mid-sized and smaller organizations can manage their IT risks and meet regulatory compliance with minimal staff and budget. CONTINUOUS SECURITY TABLE OF
Best Practices for Threat & Vulnerability Management. Don t let vulnerabilities monopolize your organization.
Best Practices for Threat & Vulnerability Management Don t let vulnerabilities monopolize your organization. Table of Contents 1. Are You in the Lead? 2. A Winning Vulnerability Management Program 3. Vulnerability
Real World Healthcare Security Exposures. Brian Selfridge, Partner, Meditology Services
Real World Healthcare Security Exposures Brian Selfridge, Partner, Meditology Services 2 Agenda Introduction Background and Industry Context Anatomy of a Pen Test Top 10 Healthcare Security Exposures Lessons
Social-Engineering. Hacking a mature security program. Strategic Penetration Testing
Social-Engineering Hacking a mature security program Strategic Penetration Testing Dave Kennedy (ReL1K) http://www.secmaniac.com twitter: Dave_ReL1K A Mature Security Program. Companies have invested a
What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.
What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things. AGENDA Current State of Information Security Data Breach Statics Data Breach Case Studies Why current
Compliance, Security and Risk Management Relationship Advice. Andrew Hicks, Director Coalfire
Compliance, Security and Risk Management Relationship Advice Andrew Hicks, Director Coalfire Housekeeping You may submit questions throughout the webinar using the question area in the control panel on
WHAT EVERY CEO, CIO AND CFO NEEDS TO KNOW ABOUT CYBER SECURITY.
WHAT EVERY CEO, CIO AND CFO NEEDS TO KNOW ABOUT CYBER SECURITY. A guide for IT security from BIOS The Problem SME s, Enterprises and government agencies are under virtually constant attack today. There
Cyber Threats Insights from history and current operations. Prepared by Cognitio May 5, 2015
Cyber Threats Insights from history and current operations Prepared by Cognitio May 5, 2015 About Cognitio Cognitio is a strategic consulting and engineering firm led by a team of former senior technology
How To Handle A Threat From A Corporate Computer System
Politics of Security Webcast Summary Cyber Threat News and APT Defenses Introduction Stories about cyber espionage and Advanced Persistent Threats (APTs) are part of the mainstream news cycle. Concerns
VULNERABILITY MANAGEMENT
Vulnerability Management (VM) software differ in the richness of reporting, and the capabilities for application and security configuration assessment. Companies must consider how a VM technology will
Penetration Testing - a way for improving our cyber security
OWASP EU Tour Bucharest 2013 The OWASP Foundation http://www.owasp.org Penetration Testing - a way for improving our cyber security Adrian Furtunǎ, PhD, OSCP, CEH [email protected] Copyright The OWASP
When less is more (Spear-Phishing and Other Methods to Steal Data) Alexander Raczyński
When less is more (Spear-Phishing and Other Methods to Steal Data) Alexander Raczyński 1 Agenda Spear-Fishing the new CEO Fear How to Fight Spear-Fishing It s All About the Data Evolution of the bad guys
Vulnerability management lifecycle: defining vulnerability management
Framework for building a vulnerability management lifecycle program http://searchsecurity.techtarget.com/magazinecontent/framework-for-building-avulnerability-management-lifecycle-program August 2011 By
Social Media Marketing for Small Business Success
The Basics of Social Media Social Media Marketing for Small Business Success Social Media Revolution Constant Contact 2014 #ctctsocial @constantcontact http://youtu.be/0euel3n7fds 2 YOUR PHOTO HERE Catrine
Cyber Insurance: How to Investigate the Right Coverage for Your Company
6-11-2015 Cyber Insurance: How to Investigate the Right Coverage for Your Company Presented by: Faith M. Heikkila, Ph.D., CISM, CIPM, CIPP-US, ABCP Greenleaf Trust Chief Information Security Officer (CISO)
Total Protection for Compliance: Unified IT Policy Auditing
Total Protection for Compliance: Unified IT Policy Auditing McAfee Total Protection for Compliance Regulations and standards are growing in number, and IT audits are increasing in complexity and cost.
Extreme Networks Security Analytics G2 Vulnerability Manager
DATA SHEET Extreme Networks Security Analytics G2 Vulnerability Manager Improve security and compliance by prioritizing security gaps for resolution HIGHLIGHTS Help prevent security breaches by discovering
Prevent cyber attacks. SEE. what you are missing. Netw rk Infrastructure Security Management
Prevent cyber attacks. SEE what you are missing. See Your Network MAPS. Prevent cyber attacks. [RedSeal] is meeting our expectations and is playing an integral role as it feeds right into our overall risk
CYBERSECURITY BEST PRACTICES FOR SMALL AND MEDIUM PENNSYLVANIA UTILITIES
CYBERSECURITY BEST PRACTICES FOR SMALL AND MEDIUM PENNSYLVANIA UTILITIES The information provided in this document is presented as a courtesy to be used for informational purposes only. This information
STATE OF NEW JERSEY IT CIRCULAR
NJ Office of Information Technology P.O. Box 212 www.nj.gov/it/ps/ Chris Christie, Governor 300 River View E. Steven Emanuel, Chief Information Officer Trenton, NJ 08625-0212 STATE OF NEW JERSEY IT CIRCULAR
THE EVOLUTION OF SIEM
THE EVOLUTION OF SIEM WHY IT IS CRITICAL TO MOVE BEYOND LOGS Despite increasing investments in security, breaches are still occurring at an alarming rate. 43% Traditional SIEMs have not evolved to meet
RETHINKING CYBER SECURITY Changing the Business Conversation
RETHINKING CYBER SECURITY Changing the Business Conversation October 2015 Introduction: Diane Smith Michigan Delegate Higher Education Conference Speaker Board Member 2 1 1. Historical Review Agenda 2.
The #GivingTuesday Event Marketing Toolkit
The #GivingTuesday Event Marketing Toolkit Best practices and resources to help amp your marketing efforts before, during, and after your fundraiser. In This Toolkit Event Marketing Checklist Important
Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst
ESG Brief Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst Abstract: APTs first came on the scene in 2010, creating a wave
Cyber Security Awareness Kids Safe Online Poster Contest OFFICIAL RULES
OFFICIAL RULES OFFICIAL RULES Eligibility All students in public and private schools, and youth organizations in Kindergarten - 12th grades in the 50 United States, the District of Columbia, and the U.S.
Bringing Continuous Security to the Global Enterprise
Bringing Continuous to the Global Enterprise Asset Discovery Network Web App Compliance Monitoring Threat Protection The Most Advanced Platform 3+ Billion IP Scans/Audits a Year 1+ Trillion Events The
BDPA Education & Technology Foundation (BETF) United Way Marketing Plan
BDPA Education & Technology Foundation (BETF) United Way Marketing Plan Authors: Owner: Document Type: Document Identifier: Revised Filename: Brandi Royal Washington Lorrinda S. Michieka BETF PLAN BETF-UWCC
