Fear Not What Security Can Do to Your Firm; Instead, Imagine What Your Firm Can Do When Secured!



Similar documents
Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Information Technology Solutions

University of Pittsburgh Security Assessment Questionnaire (v1.5)

INCIDENT RESPONSE CHECKLIST

The Protection Mission a constant endeavor

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

INNOVATE. MSP Services Overview SVEN RADEMACHER THROUGH MOTIVATION

APPENDIX C - PRICING INDEX DIR-SDD-2514 VERIZON BUSINESS NETWORK SERVICES, INC SERVICES

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

CompTIA Security+ (Exam SY0-410)

Information Blue Valley Schools FEBRUARY 2015

Cisco Advanced Services for Network Security

Security Threat Risk Assessment: the final key piece of the PIA puzzle

Why SaaS (Software as a Service) and not COTS (Commercial Off The Shelf software)?

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

Client Security Risk Assessment Questionnaire

Industrial Security for Process Automation

Larry Wilson Version 1.0 November, University Cyber-security Program Critical Asset Mapping

Network Segmentation

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

Network Security. Protective and Dependable. 52 Network Security. UTM Content Security Gateway CS-2000

BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports

How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements

Technology Blueprint. Protect Your Servers. Guard the data and availability that enable business-critical communications

ICANWK406A Install, configure and test network security

Achieving SOX Compliance with Masergy Security Professional Services

HIPAA Compliance Evaluation Report

Managed Service Plans

Critical Controls for Cyber Security.

Managing internet security

Cybersecurity: An Innovative Approach to Advanced Persistent Threats

Four Top Emagined Security Services

IT Networking and Security

Goals. Understanding security testing

We are Passionate about Total Security Management Architecture & Infrastructure Optimisation Review

FBLA Cyber Security aligned with Common Core FBLA: Cyber Security RST RST RST RST WHST WHST

Network Security: 30 Questions Every Manager Should Ask. Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting

H.I.P.A.A. Compliance Made Easy Products and Services

How To Configure Forefront Threat Management Gateway (Forefront) For An Server

Network Security Administrator

External Supplier Control Requirements

Firewall Environments. Name

THE TOP 4 CONTROLS.

TechGuard Firewall Products Specs/Parts/Competitive Analysis

Guideline on Auditing and Log Management

Cybersecurity Health Check At A Glance

Linux Server Support by Applied Technology Research Center. Proxy Server Configuration

Chapter 9 Firewalls and Intrusion Prevention Systems

Clavister InSight TM. Protecting Values

Fortinet Solutions for Compliance Requirements

VPNSCAN: Extending the Audit and Compliance Perimeter. Rob VandenBrink

TERMS OF REFERENCE (TORs) OF CONSULTANTS - (EAG) 1. Reporting Function. The Applications Consultant reports directly to the CIO

Secure Your Mobile Workplace

Jort Kollerie SonicWALL

CONTENTS. PCI DSS Compliance Guide

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Data Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments

Patch and Vulnerability Management Program

Solution Brief: Enterprise Security

Solving the Desktop Dilemma

Internet Security Protecting Your Business. Hayden Johnston & Rik Perry WYSCOM

i-pcgrid Workshop 2015 Cyber Security for Substation Automation The Jagged Line between Utility and Vendors

Course: Information Security Management in e-governance. Day 1. Session 5: Securing Data and Operating systems

Developing Network Security Strategies

The Education Fellowship Finance Centralisation IT Security Strategy

Modular Network Security. Tyler Carter, McAfee Network Security

Recommended IP Telephony Architecture

By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015

How To Manage Your Information Systems At Aerosoft.Com

Managed IT Secure Infrastructure Flexible Offerings Peace of Mind

74% 96 Action Items. Compliance

O N L I N E I N C I D E N T R E S P O N S E C O M M U N I T Y

Vendor Risk Assessment Questionnaire

ABB s approach concerning IS Security for Automation Systems

Payment Card Industry Self-Assessment Questionnaire

Retention & Destruction

IBM Cloud Security Draft for Discussion September 12, IBM Corporation

Interactive welcome kit Charter-Business.com CB.016.fibCD.0210

Top tips for improved network security

Unified Security Anywhere HIPAA COMPLIANCE ACHIEVING HIPAA COMPLIANCE WITH MASERGY PROFESSIONAL SERVICES

Network and Security Controls

Introduction to Cyber Security / Information Security

Managed Security Services for Data

APPENDIX 3 TO SCHEDULE 3.3 SECURITY SERVICES SOW

SonicWALL PCI 1.1 Implementation Guide

Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.

1B1 SECURITY RESPONSIBILITY

Transcription:

Fear Not What Security Can Do to Your Firm; Instead, Imagine What Your Firm Can Do When Secured! Presented by: Kristen Zarcadoolas, Jim Soenksen, and Ed Sale

PART 2: plan, act, repeat (from the look, plan, act, repeat methodology) Putting the Puzzle Pieces Together

Presentation Goals Review of Part 1 Translating Assessment into a plan and act Securing Management Buy-In Security Technologies Selecting, Deploying, and Maintaining the Right Technologies for your Firm

Review of Part 1 Top IT Concerns Security Best Practices look: Phase 1 in Building a Proactive Security Program Using SANS Defense in Depth as a Blueprint Business Benefits

Translate Assessment into a plan Risk = Threat x Vulnerability x Cost Quantify Exposure and Risk to Critical Assets Create a Risk Management Plan and Roadmap Identify Available Resources

Securing Management Buy-In Security Education Firm s Exposure Risk Management Plan and Roadmap Independent Third Party Advice Client Requirements Regulatory Compliance Peer Pressure Competitive Advantage ROSI Significant Event

Security Technologies SANS Defense in Depth Network Attacks Host Attacks Security Vulnerabilities Authorizing Users and Data Privacy Business Losses

Defensive Wall #1: Blocking Network Attacks Y o u r F ir m? W o r k s ta tio n s F ile S e r v e r P e r im e t e r M a il S e r v e r L a p to p s S e c u r e W e b F ilt e r I n t r a n e t F ir e w a ll D a t a b a s e M S S P r o v id e r ID S /IP S In s id e D o m a in C o n t r o lle r A V / S p y w a r e G a t e w a y D is c o v e r y & M it ig a ttio n In t e r n e t ID S /IP S O u t s id e D D o S D e f e n s e F ilt e r in g R o u t e r D M Z M a il F ilt e r A n t i- V ir u s A n t i -S p a m W e b S e r v e r T e r m in a l S e r v e r F ile T r a n s f e r S e r v e r Filtering Router (NAT) Firewall and AntiVirus / Spyware Gateways Secure E-Mail / Anti- Spam Secure Web Filtering Discovery and Mitigation IDS / IPS Managed Security Services DDoS Defense Tools

Defensive Wall #2: Blocking Host Attacks Host IPS Spyware Removal Personal Firewalls and Scan and Block Systems Personal AntiVirus RootKit Detection and Removal Host IPS Personal Firewall Personal AntiVirus Spyware & RootKit Removal

Defensive Wall #3: Eliminating Security Vulnerabilities Workstations File Server Intranet Mail Server Laptops Database Domain Controller Vulnerability Testing Patch & Configuration Management Web Server DMZ Mail Filter Anti-Virus Anti-Spam Terminal Server File Transfer Server Vulnerability Management and Penetration Testing Patch and Configuration Management and Compliance Application Security Testing

Defensive Wall #4: Safely Supporting Authorized Users ID and Access Management File Encryption Secure Communication PKI VPN Secure Remote Access Strong Authentication

Defensive Wall #5: Minimizing Business Losses and Maximizing Effectiveness Secure Information Management Fraud in Business Transactions Security Skills Development Forensics Tools Regulatory Compliance Tools Log Management Business Recovery Back-Up

Selecting the Technologies that are Right for Your Firm Vendor Reputation robust solutions, customer service, warranty and support, longevity Effectiveness of Solution Appropriateness of Solution to Organization Price Maintenance & Ongoing Costs User Training Requirements Resource Requirements employee time, systems, network, disk, backup Multi-Vendor Environment vs. Single-Vendor

Deploying the Technologies that are Right for Your Firm Other Companies Experiences Evaluation Period Test Plan Does It Really Work? Will It Work (Easily) with My Existing Equipment?

Maintaining the Technologies that are Right for Your Firm Frequency of Updates Underlying O/S Platform and Robustness Configuration and Tuning Disruptive Upgrades

Proactive Security Program = Business Enabler look - ID Critical Assets and Assess Risk plan - Develop a Proactive Security Program act - Implement Tailored InfoSec Roadmap including Policies, Training, and Technology repeat - Ongoing Monitoring, Auditing, Updating, & Adjusting

Helpful Sites www.cert.org www.csrc.nist.gov www.infragard.net/index.htm www.sans.org www.pivotgroup.net

For More Information, Please Contact Us Directly: Pivot Group Jim Soenksen (404) 419 2163 Kristen Zarcadoolas (213) 341 1494 www.pivotgroup.net

What to Consider When Securing Your Firm s Telecommunications What Questions Do You Have?

THANK YOU from Kristen Zarcadoolas, Jim Soenksen, and Ed Sale