INFORMATION S ECURI T Y



Similar documents
Cisco Security Optimization Service

White Paper. Information Security -- Network Assessment

Compliance. Review. Our Compliance Review is based on an in-depth analysis and evaluation of your organization's:

PCI Solution for Retail: Addressing Compliance and Security Best Practices

Payment Card Industry Data Security Standard

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Security solutions White paper. Acquire a global view of your organization s security state: the importance of security assessments.

Cisco Advanced Services for Network Security

Security Controls What Works. Southside Virginia Community College: Security Awareness

TASK TDSP Web Portal Project Cyber Security Standards Best Practices

SECURITY. Risk & Compliance Services

An Overview of Information Security Frameworks. Presented to TIF September 25, 2013

The ICS Approach to Security-Focused IT Solutions

Managed Security Services for Data

Bellevue University Cybersecurity Programs & Courses

The Protection Mission a constant endeavor

Enterprise Computing Solutions

Big Data, Big Risk, Big Rewards. Hussein Syed

Information Security Services

Intrusion Detection and Threat Vectors Michael Arent EDS-Global Information Security

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management

ETHICAL HACKING APPLICATIO WIRELESS110 00NETWORK APPLICATION MOBILE MOBILE0001

The Leading Provider of Endpoint Security Solutions

Preparing for the HIPAA Security Rule

Put into test the security of an environment and qualify its resistance to a certain level of attack.

WHITE PAPER. The Need for Wireless Intrusion Prevention in Retail Networks

IT Security. Securing Your Business Investments

Infor CloudSuite. Defense-in-depth. Table of Contents. Technical Paper Plain talk about Infor CloudSuite security

Deploying Firewalls Throughout Your Organization

REGULATIONS FOR THE SECURITY OF INTERNET BANKING

What s happening in the area of E-security for the Financial Transactions in China

SANS Top 20 Critical Controls for Effective Cyber Defense

Strategic Plan On-Demand Services April 2, 2015

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

H.I.P.A.A. Compliance Made Easy Products and Services

Unified Security Anywhere HIPAA COMPLIANCE ACHIEVING HIPAA COMPLIANCE WITH MASERGY PROFESSIONAL SERVICES

Sygate Secure Enterprise and Alcatel

Executive Overview...4. Importance to Citizens, Businesses and Government...5. Emergency Management and Preparedness...6

How To Secure Your System From Cyber Attacks

Orbograph HIPAA/HITECH Compliance, Resiliency and Security

HIPAA Security: Gap Analysis, Vulnerability Assessments, and Countermeasures

HP Security Assessment Services

Looking at the SANS 20 Critical Security Controls

Designing a security policy to protect your automation solution

Security Overview. BlackBerry Corporate Infrastructure

The Impact of HIPAA and HITECH

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

Security Controls for the Autodesk 360 Managed Services

Security Solutions to Meet NERC-CIP Requirements. Kevin Staggs, Honeywell Process Solutions

Information Technology Security Review April 16, 2012

Sample Third Party Management Policy. Establishment date, effective date, and revision procedure

Information Security Policy

NERC CIP VERSION 5 COMPLIANCE

Keeping watch over your best business interests.

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense

Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

Achieving PCI-Compliance through Cyberoam

Network Detective. HIPAA Compliance Module RapidFire Tools, Inc. All rights reserved V

University of Pittsburgh Security Assessment Questionnaire (v1.5)

Four Top Emagined Security Services

Review: McAfee Vulnerability Manager

Microsoft Services Premier Support. Security Services Catalogue

2016 OCR AUDIT E-BOOK

External Supplier Control Requirements

Guideline on Auditing and Log Management

Network Security Guidelines. e-governance

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

GoodData Corporation Security White Paper

Executive Summary Program Highlights for FY2009/2010 Mission Statement Authority State Law: University Policy:

THE TOP 4 CONTROLS.

INFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION

CHIS, Inc. Privacy General Guidelines

Alcatel-Lucent Services

Reducing Cyber Risk in Your Organization

Defense-in-Depth Strategies for Secure, Open Remote Access to Control System Networks

Appendix. Key Areas of Concern. i. Inadequate coverage of cybersecurity risk assessment exercises

A Technical Template for HIPAA Security Compliance

White Paper Achieving PCI Data Security Standard Compliance through Security Information Management. White Paper / PCI

7 Homeland. ty Grant Program HOMELAND SECURITY GRANT PROGRAM. Fiscal Year 2008

INSIDE. Securing Network-Attached Storage Protecting NAS from viruses, intrusions, and blended threats

Network Security Administrator

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

U.S. SECURITIES & EXCHANGE COMMISSION

Penetration Testing Services. Demonstrate Real-World Risk

EVALUATION REPORT. Weaknesses Identified During the FY 2014 Federal Information Security Management Act Review. March 13, 2015 REPORT NUMBER 15-07

Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks

I n f o r m a t i o n S e c u r i t y

PCI Compliance for Branch Offices: Using Router-Based Security to Protect Cardholder Data

Information Security Policies and Procedures Development Framework for Government Agencies. First Edition AH

RSA Solution Brief. RSA SecurID Authentication in Action: Securing Privileged User Access. RSA Solution Brief

NEC Managed Security Services

HIPAA Compliance Evaluation Report

The Business Case for Security Information Management

Network and Security Controls

Defending Against Data Beaches: Internal Controls for Cybersecurity

Transcription:

INFORMATION S ECURI T Y T U R N KEY IN FORM ATION SECU RITY SO L U TION S A G L O B A L R I S K M A N A G E M E N T C O M P A N Y

PRESENCE PROWESS PARTNERSHIP PERFORMANCE Effective IT security requires competence in several areas: vulnerability testing, security policies and architecture, technology planning and training, and regulatory security compliance. By the first quarter of 2005, enterprises that don't enforce security policies during network login will experience 200 percent more network downtime than those that do. (Source Gartner) The Steele Foundation is a leader in providing turnkey information security solutions. Through our consulting services and integrated delivery systems, we help our clients minimize the threats to their information systems and communication networks. In today s economy, information is your organization s greatest asset. It must be protected from unauthorized access, denial of service, breach of confidentiality, loss of data integrity, etc. Your organization must be prepared to protect, detect and respond to today s cyber attacks. So where should you begin? A more comprehensive risk assessment takes a snapshot of your organization s vulnerabilities from a physical security, IT security, document security and personnel security perspective. Steele uses proprietary techniques, based on industry standards (ISO-17799), as well as the most reliable, up-to-date automated security assessment tools, to generate security profiles of essential information systems. VULNERABILITY TESTING The Steele Foundation's Vulnerability Testing Service starts with an in-depth technical review of your most critical and sensitive information systems. This service has been designed to help identify network perimeter vulnerabilities that may be used to gain access to networks and systems that process, store, or transmit information. This service includes planning, testing, and analysis centered around transport, protocol, application, and remote access areas. The Vulnerability Testing Service is a precursor to a Penetration Test, which measures a company s real-world vulnerabilities and responsiveness to security attacks. Penetration Testing uses the information gathered during the vulnerability scan to attempt to exploit subsets of the vulnerabilities found and to demonstrate how unauthorized access could be achieved. After analyzing the Vulnerability and Penetration Test results, Steele recommends prioritized, cost-effective corrective measures and security safeguards. This recommendation report serves as the blueprint to help prioritize budget, resources, product selection, and implementation plans. The analysis also establishes a baseline against which security solutions are measured. There are a number of technical assessments that can be provided. Some of these are: Network (LAN) Assessments Host / Operating System Assessments External Penetration Analysis Firewall and Router Assessments Wireless Network (802.11b) Assessments Workstation Assessments War Dialing Modem Assessments Application Assessments training ISO-BASED SECURITY RISK ASSESSMENT The ISO-based Security Assessment provides a more comprehensive view of the client s overall security. This evaluation covers all aspects of security using questionnaires, interviews, physical security walk-thru, documentation review, network architecture topology reviews, external port scans, vulnerability scans and penetration testing. After Steele security experts carefully analyze this information, a written report is created, and a second meeting is held to discuss the report, any client security concerns, and to finalize the comprehensive security plan. INFORMATION SECURITY POLICY Planning and Development The Security Policy Planning & Development service provides businesses with a standard Best Practices Security Policy template. The service identifies, recommends, and implements appropriate security policy and policy-specified safeguards to help protect your information assets. Additionally, a security professional will tailor a standard security policy to meet specific business needs. If the organization currently has an information security policy, this service will include a review of the existing policy and will make recommendations to bring the current policy up to an industry Best Practices level. The process begins with an interview between the security consultant and your organization. Following the interview, the client will be provided with a draft written policy. This draft security policy covers three major areas: Logical, Managerial and Physical.

T E CHNO L OGY P LANNING The Technology Planning Services assist clients in selecting the proper security solution from a broad range of product offerings. Steele security consultants provide on-site consulting services to help a client select and design a robust security solution. Steele offers Technology Planning Services for the following security safeguards: Firewall Design Two-Factor Authentication Intrusion Detection System PKI / LDAP / X.500 Virus Protection Physical Security Content / URL Filtering Biometrics Encryption RADIUS / TACACS Servers INF ORMATIO N SE CURI TY TRAINING PROG RAMS Steele offers security training for every audience, from your front-line employees to the IT department and upper management. Our security training services focus on the following areas: Awareness Training The Information security policy is the cornerstone of any enterprise security solution, but if end users don t know about the policy, or are not up to speed on its components, then the policy serves no purpose. Your Information security policy is the blueprint for acceptable system use and your people need awareness training to understand this and their role in your security policy. This training program focuses on: Comprehensive explanations of system use The reasons why you must protect your information assets The types of threats, including social engineering The penalties for non-compliance IT Security Training As you know, your IT staff are the linchpin for ensuring that your network runs smoothly, and now more than ever, your IT people need a thorough understanding of how IT security works. That s why Steele s IT Security Training Service offers a variety of Information Technology-oriented training options. Steele educates, informs, reinforces and guides your IT personnel in planning, designing, and implementing best security practices. Our approach to training includes real-world instructions and tools to help prevent the misuse of hardware, software, and processes that could result in compromised security. forensic SECURE AR CHITECTURE DE S I GN The Steele design team can help your organization design a secure network infrastructure. Through the use of firewalls, intrusion detection systems, strong authentication mechanisms, VPNs, etc., your organization can achieve a higher level of security, but the proper placement, configuration and interoperability of the various devices and appliances is essential. Other key areas to consider are content/url filtering, high-availability or redundant solutions, VLANS, centralized logging servers, secure subnet segmentation, router controls, dial-up access, etc. Steele has a team of professionals with proven experience in each of these areas. All of our personnel have the credentials and product certifications on each of the technologies that they deploy. In addition to design, configuration and implementation, our security professionals can train your staff in all areas of secure architecture design. C O MPUTER INCI D E NT R E S P O N S E TEAM (CIRT) The Steele Computer Incident Response Team (CIRT) has the experience and knowledge to respond to today s network intrusions and adverse computer events. Steele provides expert guidance in the area of detection, containment, internal reporting, external disclosure, and investigation. Computer crime investigation and computer forensics are esoteric fields, and few individuals or corporations have the depth of experience as The Steele Foundation's Computer Incident Response Team. E N T E R P R I S E R I S K M A N A G E M E N T S O L U T I O N S

compliance REGULATORY COMPLIANCE SOLUTIONS The consequences of less-than-perfect IT security are more serious than ever before. The havoc wreaked worldwide by the Nimda, SQL Slammer and MSBlast worms, as well as a constant stream of viruses, confirm the need to build better defenses against cyberattacks. Legislative and regulatory initiatives including the U.S. Public Company Accounting Reform and Investor Protection Act of 2002 (also known as Sarbanes-Oxley), the U.S. Graham-Leach-Bliley Financial Services Modernization Act, the Healthcare Information Portability and Accountability Act and the European Data Privacy Directive demand better execution in the areas of security and privacy process definition and reporting. They also raise the legal and financial stakes for enterprises that fail to meet their standards. The Steele Foundation s Information Security consulting services has been helping organizations protect their valuable information assets in all industries for many years. Supporting our clients efforts to achieve Sarbanes-Oxley, GLB, HIPAA, FISM, and EUDPD compliance, is a natural extension of our services. Sarbanes-Oxley The U.S. Public Company Accounting Reform and Investor Protection Act of 2002 (Sarbanes-Oxley) makes a public company's senior management and advisors individually accountable for the accuracy of its financial performance reporting (Sarbanes-Oxley does not affect private companies). From an IT security perspective, companies must demonstrate the integrity of the systems and applications used to generate financial reports. An aspect of demonstrating integrity is the presence of user, system and application resource-access controls, as well as processes to monitor and correct lapses in these controls. Gramm-Leach-Bliley (GLB) The Gramm-Leach-Bliley Financial Services Modernization Act of 1999 (GLBA) requires that financial institutions ensure the security and confidentiality of customer personal information against "reasonably foreseeable" internal or external threats. From an IT security perspective, companies must implement a process that assesses and monitors the threat environment, as well as tools and policies to counter threats. Healthcare Insurance Portability and Accountability Act (HIPAA) The U.S. Healthcare Information Portability and Accountability Act (HIPAA) specifies that healthcare and insurance organizations must have procedures to prevent, detect, contain and correct security violations, as well as procedures to regularly review records of information system activity. Federal Information Security Management Act (FISM) The Federal Information Security Management Act (FISM) requires federal agencies to develop, document and implement agency wide programs to secure data and information systems that support agency operations and assets, including those managed by other agencies or contractors. European Union Data Protection Directive The European Union Data Protection Directive specifies that "personal data" must have "appropriate security." The United Kingdom's Information Commissioner will accept BS 7799-2 accreditation as evidence of "appropriate security." Without accreditation, an organization likely would have to show broad compliance with ISO/IEC 17799 recommendations. IT Security Capabilities for Regulatory Compliance Many regulations don't specify what companies must do to achieve compliance. Therefore, companies can't buy a product that directly provides an organization with the ability to demonstrate compliance. The Steele Foundation can perform a base set of IT security administration and operations assessments to build a cost-effective security report ( gap analysis ) tailored to your company s unique environment. Steele consultants assess the current security exposure as well as design and implement security policies, processes, procedures and countermeasures, to mitigate the looming threats. For more information about The Steele Foundation s Information Security consulting practice, please contact our corporate headquarters at (415) 781-4300 or via our website: http://www.steelefoundation.com

I N F O R M A T I O N S E C U R I T Y The Steele Foundation has developed its own proprietary Information Security Lifecycle methodology in support of its Professional Security Services. Steele s Information Security brings a unique set of skills and experience to ensure that its clients receive the most comprehensive, cost-effective information security services available. As an end-to-end information security solutions provider, we offer clients a full breadth of products and services including: Information Security Consulting and Technology Planning Information Security Assessments and Audits Information Security Policy Review and Development Information Security Training and Awareness Programs Secure Architecture Design Security Products Implementation and Integration Computer Incident Response Team (CIRT) w/24 Hour Rapid Response Capabilities Investigative and Forensic Services Regulatory Compliance Solutions The Steele Foundation is developing proactive measures and positive ideas to lead corporations into a safer and more secure tomorrow. Please call for more information or visit our web site: www.steelefoundation.com