The State of Security in 2017:
|
|
- Bethany Palmer
- 5 years ago
- Views:
Transcription
1 The State of Security in 2017: A report from experts in the field February 22, 2017 Ryan Frillman Director, Information Security & Compliance, Spire Energy Joey Smith Chief Information Security Officer, Schnuck Markets Gary Harbison Chief Information Security Officer (CISO) Monsanto Information Security Office James Stanger, PhD Sr. Director Product Development CompTIA
2 The voice of the world s information technology (IT) industry and o ver 1.5 million IT pros. CERTIFICATIONS Largest Provider of Vendor- Neutral IT Certifications ASSOCIATION 4,000+ IT Channel Providers & Partners PHILANTHROPY Creating IT Futures Foundation ADVOCACY Public Policy & Reform Higher Salaries Growing Demand Verified Strengths Universal Skills A non-profit trade association with more than 4,000 members and business partners. Our members A 501(c)(3) charitable organization that creates on-ramps for successful IT careers, serving individuals who Our advocacy division encourages collaboration and advancing of legislation that allows the private Three of the Top 10 Certifications That Help IT Workers Get Jobs are CompTIA certifications. * drive our programs through their participation in CompTIA communities, research studies, events, sharing of best practices and more. are underrepresented in IT and lacking in opportunities to be successful in IT, including veterans, youth, and the unemployed. sector to develop new products and services, find solutions and sell them in the global marketplace. * Source: The Dice Report, February
3 C O M P T I A C E R T I F I C A T I O N S A Quick Overview BEST PRACTICES IT Fundamentals CyberSecure PROFESSIONAL-LEVEL MASTERY LEVEL CompTIA CSA+ CompTIA Advanced Security Practitioner (CASP) SPECIALTY A+ CDIA+ Cloud+ Linux+ Network+ Project+ Security+ Server+ CTT+ Cloud Essentials 3
4 C O M P T I A C E R T I F I C A T I O N S A skills-based look at the roadmap We certify essential skills for the entire IT department ecosystem Help Desk IT Support Technician Field Technician A+ Security+ CSA+ CASP Security Engineer Security Analyst IA Technician Operating system support Server+ Linux+ Cloud+ Cloud Systems Analyst Cloud Engineer Network Technician Network+ Project+ Project Manager For all workers, both inside and outside CE 4
5 For some time, we ve taken note of the spike in security issues reported world-wide. Agenda These issues include ransomware, DDosS attacks, privacy issues, as well as how to secure increasinglysensitive information derived from today s increasingly-sophisticated networks. Today, individuals and companies alike present an increased attack surface that hackers can exploit. Today, we re going to hear from expert, management-level individuals about how they address these issues. We ll be discussing security trends, the steps and strategies that today s CIOs and security experts are taking, and the essential skill set needed in the industry. (1) CEU credit towards A+, Network+, Security+, Cloud+, CASP, and CSA+: You will receive a confirmation along with instructions on how to add the credit to your certification account within 48 hours Introduction to the panel More about the collective decades of experience that our panel brings to the able Today s security issues What are they? What are they going to be? Let s hear some war stories. What are we doing to resolve them? What are the things our panel are doing to address today s issues? What wisdom can they provide for us? Essential security skills What are the ideal skill sets needed in today s security workers? Q&A 5
6 The State of Security AUTHORITIES IN: Ryan Frillman Director, Information Security & Compliance, Spire Energy Joey Smith Chief Information Security Officer, Schnuck Markets Gary Harbison Chief Information Security Officer (CISO) Monsanto Open source Security Web technologies Networking E-commerce Project management Complex architectures Industrial networks Ensuring Four 9s and Five 9s solutions for e- commerce, agriculture, and the energy industry These guys get the 3 a.m. call when something happens Have acted as CompTIA Subject Matter Experts for our exams 6
7 W E L C O M E! A Little Housekeeping Continuing Education This webinar is good for (1) CEU credit towards A+, Network+, Security+, Cloud+ and CASP. After the webinar, you may click on the "Proof of Participation" widget to download a certificate which may be uploaded to your candidate account for activity credit. Recording This webinar is being recorded. You are muted by default, please ask all questions in the Q&A section. Survey & Feedback We want your feedback! Please complete brief survey at the completion of the webinar. Tweet with #ITProStateOfSecurity, #CompTIA #CompTIAWebinar, #CompTIAcertified On-Demand Q&A & Group Chat Webinar presentation slides and recording link will be available tomorrow. Got a question? Use the Q&A widget Also, you can chat with other event attendees in the Group Chat widget! 7
8 What do our panel members do?
9 Panel member responsibilities 9
10 The job of ensuring uptime Uptime definition the five 9s? Data and service replication techniques Traditional / Enterprise Cloud Network downtime solutions Redundant hardware Redundant software DNS Protocol SDN? Additional systems Server downtime solutions Virtualization (traditional, containers) Backups / RAID Cloud? War stories when networks get hacked, and why PLEASE NOTE: (1) CEU credit towards A+, Network+, Security+, Cloud+, CASP, and CSA+: You will receive a confirmation along with instructions on how to add the credit to your certification account within 48 hours. 10
11 Uptime metrics Essential services Essential assets Mean time to recovery Recovery Point Objective (RPO) The maximum targeted period in which data might be lost from an IT service due to a major incident. Recovery Time Objective (RTO) The maximum tolerable length of time that a computer, system, network, or application can be down after a failure or disaster. What other metrics do you use? What about compliance? PCI, other regs... PLEASE NOTE: (1) CEU credit towards A+, Network+, Security+, Cloud+, CASP, and CSA+: You will receive a confirmation along with instructions on how to add the credit to your certification account within 48 hours. 11
12 T R O U B L E S H O O T I N G Y O U R C A R E E R Issues confronting the industry Attacks DOS, DDOS Botnets Advanced Persistent Threats (APT) Motives Ideology Espionage as a ruse for the real attack End users Insider attack disgruntled employees Mistakes Lack of planning Lack of funds How possible is it for a group of hackers not particularly wellequipped to take out an entire power grid? PLEASE NOTE: (1) CEU credit towards A+, Network+, Security+, Cloud+, CASP, and CSA+: You will receive a confirmation along with instructions on how to add the credit to your certification account within 48 hours. 12
13 S E C U R I T Y Complicating factors for security Some things to consider - CIOs are worried about what they don t know - We need to think outside the box - Workers need multiple skills in order to secure systems - Creativity is essential in successful workers Growing organization of hackers Greater tech interconnectivity Sophistication of security threats Greater availability of hacking tools Rise of social networking Volume of security threats More reliance on internet applications Continued use of legacy systems Challenges with security expertise Consumerization of IT 54% 52% 52% 48% 45% 45% 44% 38% 35% 35% 13
14 T R O U B L E S H O O T I N G Y O U R C A R E E R Making the most with a limited budget Cost savings Open source? Better-trained individuals? Cloud services? Better planning Employee education? PLEASE NOTE: (1) CEU credit towards A+, Network+, Security+, Cloud+, CASP, and CSA+: You will receive a confirmation along with instructions on how to add the credit to your certification account within 48 hours. 14
15 Burning issues today
16 Ransomware / malware Ransomware one of the biggest stories lately How it gets in What it can do to a company How to address it Training Removal / payment Creating a resilient presence PLEASE NOTE: (1) CEU credit towards A+, Network+, Security+, Cloud+, CASP, and CSA+: You will receive a confirmation along with instructions on how to add the credit to your certification account within 48 hours. 16
17 Relates to various issues Ransomware Privacy issues The latest methods you ve seen How do you combat it? Training Technology? End users and social engineering PLEASE NOTE: (1) CEU credit towards A+, Network+, Security+, Cloud+, CASP, and CSA+: You will receive a confirmation along with instructions on how to add the credit to your certification account within 48 hours. 17
18 Major attacks in the news Characteristics Can last for hours From botnets IoT and DDoS Solutions? DDoS attacks new perspectives PLEASE NOTE: (1) CEU credit towards A+, Network+, Security+, Cloud+, CASP, and CSA+: You will receive a confirmation along with instructions on how to add the credit to your certification account within 48 hours. 18
19 Privacy issues Companies are collecting data, and creating information Predictive analytics Highly-sensitive data How is it stored? How do you make sure it stays private? At what point does a hacked company turn criminal? Initially a victim But what if they don t report the hack properly? Survey: Biggest problems with big data Turn it data into actionable information 51% Managing the database 16% Handling the volume and velocity of data 10% Securing the systems 12% Privacy concerns 4% Legal issues 7% Do these percentages/responses make sense in 2017? PLEASE NOTE: (1) CEU credit towards A+, Network+, Security+, Cloud+, CASP, and CSA+: You will receive a confirmation along with instructions on how to add the credit to your certification account within 48 hours. 19
20 The Advanced Persistent Threat (APT) Addressing the problem Is it still about stopping the hacker? Or, is there a newer approach Creating a resilient network Compartmentalization Automation Redundancy / failover / recovery Metrics to consider Planning Malware Introduction Command & Control Lateral Movement What else? Target Identification Exfiltration (Attack Event) Retreat PLEASE NOTE: (1) CEU credit towards A+, Network+, Security+, Cloud+, CASP, and CSA+: You will receive a confirmation along with instructions on how to add the credit to your certification account within 48 hours. 20
21 What are we doing to address these issues? Some war stories...
22 Going beyond signature-based, traditional hardware/software models. Beyond hardware and software to wetware Signature-based (firewalls, IDS, antivirus) table stakes, at best Traditional pen testing Security and the help desk PLEASE NOTE: (1) CEU credit towards A+, Network+, Security+, Cloud+, CASP, and CSA+: You will receive a confirmation along with instructions on how to add the credit to your certification account within 48 hours. 22
23 User Behavior Analytics (UBA) PLEASE NOTE: (1) CEU credit towards A+, Network+, Security+, Cloud+, CASP, and CSA+: You will receive a confirmation along with instructions on how to add the credit to your certification account within 48 hours. 23
24 Creating security baselines / thresholds PLEASE NOTE: (1) CEU credit towards A+, Network+, Security+, Cloud+, CASP, and CSA+: You will receive a confirmation along with instructions on how to add the credit to your certification account within 48 hours. 24
25 Where companies and organizations provide detailed information concerning successful attacks How can it work? Why is it considered important? Information sharing PLEASE NOTE: (1) CEU credit towards A+, Network+, Security+, Cloud+, CASP, and CSA+: You will receive a confirmation along with instructions on how to add the credit to your certification account within 48 hours. 25
26 What are some of the novel education programs? Does end user education work? What is the best type of education? Hands-on Live lab Other? Education PLEASE NOTE: (1) CEU credit towards A+, Network+, Security+, Cloud+, CASP, and CSA+: You will receive a confirmation along with instructions on how to add the credit to your certification account within 48 hours. 26
27 Essential best practices Security and return on investment Justifying expenses to the boss CEO Board Accounting Showing ROI what questions do they ask? How do your reports justify expenses to you? PLEASE NOTE: (1) CEU credit towards A+, Network+, Security+, Cloud+, CASP, and CSA+: You will receive a confirmation along with instructions on how to add the credit to your certification account within 48 hours. 27
28 The ideal skill set advice from our panel
29 I T I N D U S T R Y T R E N D S Essential skills an overview Security analytics #1 #6 Business continuity Risk analysis Security infrastructure knowledge #2 #3 Top Ten Skills #7 #8 Traditional and cloud-based backup solutions Server downtime solutions Strong analytical abilities - Visio #4 Are these in the right order? #9 Data service replication techniques Network planning - Failover/redundancy #5 What tools do you use every day? What skills do you look for in a potential employee? #10 Compliance 29
30 Lightning round and audience Q&A
31 Lightning round... and audience questions Continuing education: What conferences do you like to attend? And what books / journals / sites do you read carefully? What advice do you have for the ITPro members in terms of skills that they need to learn? What are some of the next big technologies on the horizon that are going to change your world? 31
32 Thank You! Certification.CompTIA.org PLEASE NOTE: (1) CEU credit towards A+, Network+, Security+, Cloud+, CASP, and CSA+: You will receive a confirmation along with instructions on how to add the credit to your certification account within 48 hours.
Housekeeping. Unmute your speakers. Use Chrome if you have issues Enable Flash: Chrome://settings/content flash settings enabled
Housekeeping Unmute your speakers. Use Chrome if you have issues Enable Flash: Chrome://settings/content flash settings enabled Recording will distributed in two hours. Slides and homework can be downloaded
More informationSECURITY+ COMPETITIVE ANALYSIS 1. GIAC GSEC 2. (ISC)2 SSCP 3. EC-COUNCIL CEH
SECURITY+ COMPETITIVE ANALYSIS 1. GIAC GSEC 2. (ISC)2 SSCP 3. EC-COUNCIL CEH 1 SECURITY+ VS GIAC GSEC Where does GSEC fit? 3 CompTIA Security+ and GIAC Security Essentials (GSEC) Feature CompTIA Security+
More informationCertification and Career Guide
Certification and Career Guide CompTIA offers some of the most recognized entry-level certifications for IT professionals, including its A+, Network+ and Security+ certifications. This certification guide
More informationOctober 21 22, 2014 Introduction to CompTIA, Communities, and ITSS
October 21 22, 2014 Introduction to CompTIA, Communities, and ITSS CompTIA Big View CompTIA Member Communities IT Services & Support Who is CompTIA? Global, Not for Profit, IT Industry Trade Association
More informationCybersecurity and the Board of Directors
Cybersecurity and the Board of Directors Key Findings from BITS/FSR Meetings OVERVIEW Board directors are increasingly required to engage in cybersecurity risk management yet some may need better education
More informationSECOPS: NAVIGATE THE NEW LANDSCAPE FOR PREVENTION, DETECTION AND RESPONSE
SESSION ID: SBX4W5 SECOPS: NAVIGATE THE NEW LANDSCAPE FOR PREVENTION, DETECTION AND RESPONSE Dara Such VP & Publisher, Security Networking and IoT TechTarget @darasuch What we ll cover today State of SecOps:
More informationDefensible and Beyond
TELUS Defensible and Beyond Mike Vamvakaris Director and Head of Cyber Security Consulting November 2017 Digital transformation brings many benefits Communication and Collaboration Autonomous and Artificial
More informationSage Data Security Services Directory
Sage Data Security Services Directory PROTECTING INFORMATION ASSETS ENSURING REGULATORY COMPLIANCE FIGHTING CYBERCRIME Discover the Sage Difference Protecting your business from cyber attacks is a full-time
More informationPONEMON INSTITUTE RESEARCH REPORT 2018 STUDY ON GLOBAL MEGATRENDS IN CYBERSECURITY
PONEMON INSTITUTE RESEARCH REPORT 2018 STUDY ON GLOBAL MEGATRENDS IN CYBERSECURITY Benchmark research sponsored by Raytheon. Independently conducted by Ponemon Institute LLC. February 2018 2018 Study on
More informationCybersecurity Risk Mitigation: Protect Your Member Data. Introduction
Cybersecurity Risk Mitigation: Protect Your Member Data Presented by Matt Mitchell, CISSP Knowledge Consulting Group Introduction Matt Mitchell- Director Risk Assurance 17 years information security experience
More informationCombating Cyber Risk in the Supply Chain
SESSION ID: CIN-W10 Combating Cyber Risk in the Supply Chain Ashok Sankar Senior Director Cyber Strategy Raytheon Websense @ashoksankar Introduction The velocity of data breaches is accelerating at an
More informationUKCC CompTIA Webinar: Upskilling your Partners to sell your Solutions Leveraging the CompTIA Playbooks
UKCC CompTIA Webinar: Upskilling your Partners to sell your Solutions Leveraging the CompTIA Playbooks @CompTIA_UK Housekeeping Login and connect to the audio when logging in: Find audio information under
More informationBrussels. Cyber Resiliency Minimizing the impact of breaches on business continuity. Jean-Michel Lamby Associate Partner - IBM Security
Cyber Resiliency Minimizing the impact of breaches on business continuity Jean-Michel Lamby Associate Partner - IBM Security Brussels Think Brussels / Cyber Resiliency / Oct 4, 2018 / 2018 IBM Corporation
More informationCYBERSECURITY HOW IT IS TRANSFORMING THE IT ASSURANCE FIELD
CYBERSECURITY HOW IT IS TRANSFORMING THE IT ASSURANCE FIELD December 2014 KEVIN GROOM ISACA Involvement (Middle Tennessee Chapter) Treasurer (2009 2011) Vice President (2011 2013) President (2013 present)
More informationCyber Security. February 13, 2018 (webinar) February 15, 2018 (in-person)
Cyber Security Presenters: - Brian Everest, Chief Technology Officer, Starport Managed Services - Susan Pawelek, Accountant, Compliance and Registrant Regulation February 13, 2018 (webinar) February 15,
More informationBRING EXPERT TRAINING TO YOUR WORKPLACE.
BRING EXPERT TRAINING TO YOUR WORKPLACE. ISACA s globally respected training and certification programs inspire confidence that enables innovation in the workplace. ISACA s On-Site Training brings a unique
More informationCompTIA IT Fundamentals:
CompTIA IT Fundamentals: The IT Fundamentals certification is ideal for you if you re considering a career in IT or if you work in an allied field that requires a broad understanding of IT, like in a sales
More informationChapter 12. Information Security Management
Chapter 12 Information Security Management We Have to Design It for Privacy... and Security. Tension between Maggie and Ajit regarding terminology to use with Dr. Flores. Overly technical communication
More informationRIMS Perk Session Protecting the Crown Jewels A Risk Manager's guide to cyber security March 18, 2015
www.pwc.com RIMS Perk Session 2015 - Protecting the Crown Jewels A Risk Manager's guide to cyber security March 18, 2015 Los Angeles RIMS Agenda Introductions What is Cybersecurity? Crown jewels The bad
More informationGOVERNMENT IT: FOCUSING ON 5 TECHNOLOGY PRIORITIES
GOVERNMENT IT: FOCUSING ON 5 TECHNOLOGY PRIORITIES INSIGHTS FROM PUBLIC SECTOR IT LEADERS DISCOVER NEW POSSIBILITIES. New network technology is breaking down barriers in government offices, allowing for
More informationAngela McKay Director, Government Security Policy and Strategy Microsoft
Angela McKay Director, Government Security Policy and Strategy Microsoft Demographic Trends: Internet Users in 2005.ru.ca.is.uk.nl.be.no.de.pl.ua.us.fr.es.ch.it.eg.il.sa.jo.tr.qa.ae.kz.cn.tw.kr.jp.mx.co.br.pk.th.ph.ng.in.sg.my.ar.id.au
More informationThinking Outside the Box on Disaster Recovery
Thinking Outside the Box on Disaster Recovery A Complimentary Webinar From healthsystemcio.com Sponsored by SunGard Your Line Will Be Silent Until Our Event Begins at 12:00 ET Thank You! Housekeeping Moderator
More informationIntroducing Maryville University s CYBER SECURITY ONLINE PROGRAMS. Bachelor of Science in Cyber Security & Master of Science in Cyber Security
Introducing Maryville University s CYBER SECURITY ONLINE PROGRAMS Bachelor of Science in Cyber Security & Master of Science in Cyber Security The cyber security industry is calling for more experts. And
More informationKey Findings from the Global State of Information Security Survey 2017 Indonesian Insights
www.pwc.com/id Key Findings from the State of Information Security Survey 2017 n Insights Key Findings from the State of Information Security Survey 2017 n Insights By now, the numbers have become numbing.
More informationEmerging Technologies The risks they pose to your organisations
Emerging Technologies The risks they pose to your organisations 10 June 2016 Digital trends are fundamentally changing the way that customers behave and companies operate Mobile Connecting people and things
More information9 TH SOUTHERN INDIA INFORMATION TECHNOLOGY FAIR (SIITF) THEME : EMERGING TECHNOLOGIES TO CREATE NEWER MARKETS
9 TH SOUTHERN INDIA INFORMATION TECHNOLOGY FAIR (SIITF) THEME : EMERGING TECHNOLOGIES TO CREATE NEWER MARKETS INTRODUCTION Today s business environment is global and highly-interconnected, increasing an
More informationGomex Institute of Technology. COMPTIA TRAINING PROGRAMMES JANUARY JUNE 2016 Proposed Dates
Gomex Institute of Technology 19 Parkington Plaza, Kingston 10 Phone: (876) 622-7519, (876) 622-7590 Web: www.gomex.edu.jm Email: training@gomex.edu.jm COMPTIA TRAINING PROGRAMMES JANUARY JUNE 2016 Proposed
More informationState of the Cyber Training Market January 2018
State of the Cyber Training Market January 2018 2018 by CYBERBIT 2018 by CYBERBIT Proprietary CYBERBIT Proprietary Cybersecurity Market Worth 202.36 Billion USD by 2021 Marketandmarkets analysis, 2017
More informationISACA MOSCOW CHAPTER Chapter meeting 22 September 2016
ISACA MOSCOW CHAPTER Chapter meeting 22 September 2016 Introduction Special guest speaker ISACA Audit committee member, Rosemary Amato Open dialog Wrap-up and close Special guest speaker CISA, CMA, CPA,
More informationCourse overview. CompTIA Security+ Certification (Exam SY0-501) Study Guide (G635eng v107)
Overview This course is intended for those wishing to qualify with CompTIA Security+. CompTIA's Security+ Certification is a foundation-level certificate designed for IT administrators with 2 years' experience
More informationCybersecurity and Nonprofit
Cybersecurity and Nonprofit 2 2 Agenda Cybersecurity and Non Profits Scenario #1 Scenario #2 What Makes a Difference Cyber Insurance and How it Helps Question and Answer 3 3 Cybersecurity and Nonprofit
More informationYou ve Been Hacked Now What? Incident Response Tabletop Exercise
You ve Been Hacked Now What? Incident Response Tabletop Exercise Date or subtitle Jeff Olejnik, Director Cybersecurity Services 1 Agenda Incident Response Planning Mock Tabletop Exercise Exercise Tips
More informationISACA GEEK WEEK SECURITY MANAGEMENT TO ENTERPRISE RISK MANAGEMENT USING THE ISO FRAMEWORK AUGUST 19, 2015
ISACA GEEK WEEK SECURITY MANAGEMENT TO ENTERPRISE RISK MANAGEMENT USING THE ISO 27001 FRAMEWORK AUGUST 19, 2015 Agenda Coalfire Overview Threat Landscape What is ISO Why ISO ISO Cycle Q&A 2 Presenters
More informationIaaS Buyer s Checklist.
Problem Solved IaaS Buyer s Checklist. Yes it s another checklist, but this one s actually useful. 2 Problem Solved Service levels. Does the provider offer your required SLA/SLG? Example: 99.9%, 99.95%,100%
More informationManager, Infrastructure Services. Position Number Community Division/Region Yellowknife Technology Service Centre
IDENTIFICATION Department Position Title Infrastructure Manager, Infrastructure Services Position Number Community Division/Region 32-11488 Yellowknife Technology Service Centre PURPOSE OF THE POSITION
More informationDeMystifying Data Breaches and Information Security Compliance
May 22-25, 2016 Los Angeles Convention Center Los Angeles, California DeMystifying Data Breaches and Information Security Compliance Presented by James Harrison OM32 5/25/2016 3:00 PM - 4:15 PM The handouts
More informationPerimeter Defenses T R U E N E T W O R K S E C U R I T Y DEPENDS ON MORE THAN
T R U E N E T W O R K S E C U R I T Y DEPENDS ON MORE THAN Perimeter Defenses Enterprises need to take their security strategy beyond stacking up layers of perimeter defenses to building up predictive
More informationDisaster Recovery and Business Continuity
Disaster Recovery and Business A Rackspace White Paper Spring 2010 Summary The purpose of this guide is to cut through the jargon around Business and Disaster Recovery, explain the differences and help
More informationCyber Attack: Is Your Business at Risk?
15 July 2017 Cyber Attack: Is Your Business at Risk? Stanley Wong Regional Head of Financial Lines, Asia Pacific Agenda Some common misconceptions by SMEs around cyber protection Cyber Claims and Industry
More informationGovernance Ideas Exchange
www.pwc.com.au Anatomy of a Hack Governance Ideas Exchange Robert Di Pietro October 2018 Cyber Security Anatomy of a Hack Cyber Security Introduction Who are the bad guys? Profiling the victim Insights
More informationINTELLIGENCE DRIVEN GRC FOR SECURITY
INTELLIGENCE DRIVEN GRC FOR SECURITY OVERVIEW Organizations today strive to keep their business and technology infrastructure organized, controllable, and understandable, not only to have the ability to
More informationCareer Paths In Cybersecurity
Career Paths In Cybersecurity Introductions Rob Ashcraft Sr. Technical Advisor 26-yrs in Information Technology 14-yrs in Information Security Held positions as Technician, IT Management, IT Sales Double
More information5 Trends That Will Impact Your IT Planning in Layered Security. Executive Brief
5 Trends That Will Impact Your IT Planning in 2012 Layered Security Executive Brief a QuinStreet Excutive Brief. 2011 Layered Security Many of the IT trends that your organization will tackle in 2012 aren
More informationIT Services. We re the IT in OrganIsaTion.
IT Services. We re the IT in OrganIsaTion. IT for Large Organisations. As the world of business technology has changed, so have we. From designing, building and optimising tailored IT infrastructures,
More informationMove Up to an OpenStack Private Cloud and Lose the Vendor Lock-in
Move Up to an OpenStack Private Cloud and Lose the Vendor Lock-in Peace, commerce and honest friendship with all nations; entangling alliances with none. -Thomas Jefferson Introduction In business and
More informationDisaster Recovery Is A Business Strategy
Disaster Recovery Is A Business Strategy A White Paper By Table of Contents Preface Disaster Recovery Is a Business Strategy Disaster Recovery Is a Business Strategy... 2 Disaster Recovery: The Facts...
More informationA Guide to Ensuring Security and Resiliency
Protecting Your Business Network: A Guide to Ensuring Security and Resiliency Even as major news outlets continue to report new stories about massive security breaches at the world s largest companies,
More informationACTIONABLE SECURITY AWARENESS: CONVERT THE WEAKEST LINK INTO THE SAFETY FORCE
ACTIONABLE SECURITY AWARENESS: CONVERT THE WEAKEST LINK INTO THE SAFETY FORCE Cybersecurity Awareness by gamification: Kaspersky CyberSafety Training 2017 Kaspersky Lab. All rights reserved. 1 HUMAN MISTAKES
More informationSecuring Digital Transformation
September 4, 2017 Securing Digital Transformation DXC Security Andreas Wuchner, CTO Security Innovation Risk surface is evolving and increasingly complex The adversary is highly innovative and sophisticated
More informationManaging complexity and rapid change in 2019
2019 Predictions Managing complexity and rapid change in 2019 No-one has a crystal ball, but here at NTT Security we ve worked with our security experts around the world to identify trends that affect
More informationY O UR BUS I N E SS IS ONL Y A S S TR ON G A S YO U R CONNEC T I O N T HE I M P ORTANCE OF R ELI ABLE CO NNECTIVITY W HAT S IN SIDE:
W H I T E PA P E R C O N N E C T I V I T Y Y O UR BUS I N E SS IS ONL Y A S S TR ON G A S YO U R CONNEC T I O N T HE I M P ORTANCE OF R ELI ABLE CO NNECTIVITY W HAT S IN SIDE: The importance of connectivity
More informationIT SECURITY OFFICER. Department: Information Technology. Pay Range: Professional 18
Pierce County Classification Description IT SECURITY OFFICER Department: Information Technology Job Class #: 634900 Pay Range: Professional 18 FLSA: Exempt Represented: No Classification descriptions are
More informationDigital Healthcare. Yordan Iliev Director R&D Healthcare. Regional Cybersecurity Forum, November 2016, Grand Hotel Sofia, Bulgaria
Digital Healthcare Yordan Iliev Director R&D Healthcare Regional Cybersecurity Forum, 29-30 November 2016, Grand Hotel Sofia, Bulgaria AGENDA Introduction Security challenges in healthcare IT Change ahead
More informationThe Value Of NEONet Cybersecurity. Why You Need To Protect Your The Value Of NEOnet Cybersecurity. Private Student Data In Ohio
Prompt. Courteous. Knowledgeable. Support you deserve. The Value Of NEONet Cybersecurity Why You Need To Protect Your Private Student Data In Ohio 1 TABLE OF CONTENTS 2 2 2-3 4 5 7 Introduction The Three
More informationSecuring the Internet of Things (IoT) at the U.S. Department of Veterans Affairs
Securing the Internet of Things (IoT) at the U.S. Department of Veterans Affairs Dominic Cussatt Acting Deputy Assistant Secretary / Chief Information Security Officer (CISO) February 20, 2017 The Cyber
More informationSales Presentation Case 2018 Dell EMC
Sales Presentation Case 2018 Dell EMC Introduction: As a member of the Dell Technologies unique family of businesses, Dell EMC serves a key role in providing the essential infrastructure for organizations
More informationCybersecurity Session IIA Conference 2018
www.pwc.com/me Cybersecurity Session IIA Conference 2018 Wael Fattouh Partner PwC Cybersecurity and Technology Risk PwC 2 There are only two types of companies: Those that have been hacked, and those that
More informationPolicy Session 4 Identifying Risk: An abundance of Potential Shock Waves
Policy Session 4 Identifying Risk: An abundance of Potential Shock Waves Ray Stanton Interim Group CiSO & Director Digital Risk, National Grid &, Group CiSO/CiRO, Redwood Technologies Group 9 th May 2017
More informationMust Have Items for Your Cybersecurity or IT Budget in 2018
Must Have Items for Your Cybersecurity or IT Budget in 2018 CBAO Regional Meeting Dan Desko (Senior Manager, IT Risk Advisory) Matt Dunn (Senior Security Analyst, IT Risk Advisory) Who is Schneider Downs?
More informationState Governments at Risk: State CIOs and Cybersecurity. CSG Cybersecurity and Privacy Policy Academy November 2, 2017
State Governments at Risk: State CIOs and Cybersecurity CSG Cybersecurity and Privacy Policy Academy November 2, 2017 About NASCIO National association representing state chief information officers and
More informationCOUNTERING CYBER CHAOS WITH HIPAA COMPLIANCE. Presented by Paul R. Hales, J.D. May 8, 2017
COUNTERING CYBER CHAOS WITH HIPAA COMPLIANCE Presented by Paul R. Hales, J.D. May 8, 2017 1 HIPAA Rules Combat Cyber Crime HIPAA Rules A Blueprint to Combat Cyber Crime 2 HIPAA Rules Combat Cyber Crime
More informationCyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships. from the most trusted name in information security
CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships About SANS The SANS (SysAdmin, Audit, Network, Security) Institute Established in 1989 Cooperative research
More informationTransforming the utilities industry. How our insight and infrastructure can help you thrive in a changing world
Transforming the utilities industry How our insight and infrastructure can help you thrive in a changing world The utilities industry is changing You need to be leaner, greener and smarter. And we re here
More informationManaging IT Risk: What Now and What to Look For. Presented By Tina Bode IT Assurance Services
Managing IT Risk: What Now and What to Look For Presented By Tina Bode IT Assurance Services Agenda 1 2 WHAT TOP TEN IT SECURITY RISKS YOU CAN DO 3 QUESTIONS 2 IT S ALL CONNECTED Introduction All of our
More informationVirtualization. Q&A with an industry leader. Virtualization is rapidly becoming a fact of life for agency executives,
Virtualization Q&A with an industry leader Virtualization is rapidly becoming a fact of life for agency executives, as the basis for data center consolidation and cloud computing and, increasingly, as
More informationHOSTED SECURITY SERVICES
HOSTED SECURITY SERVICES A PROVEN STRATEGY FOR PROTECTING CRITICAL IT INFRASTRUCTURE AND DEVICES Being always-on, always-connected might be good for business, but it creates an ideal climate for cybercriminal
More informationWhich Side Are You On?
12/9/2015 ARE YOU THE NEXT CYBER WARRIOR? Maria S. Thompson State Chief Risk/Security Officer Which Side Are You On? 8/17/2015 2 Information Technology 2 1 Cyber Professionals Deficiency Statistics Cybersecurity
More informationBULLETPROOF365 SECURING YOUR IT. Bulletproof365.com
BULLETPROOF365 SECURING YOUR IT Bulletproof365.com INTRODUCING BULLETPROOF365 The world s leading productivity platform wrapped with industry-leading security, unmatched employee education and 24x7 IT
More informationCYBER SECURITY FOR BUSINESS COUNTING THE COSTS, FINDING THE VALUE
CYBER SECURITY FOR BUSINESS COUNTING THE COSTS, FINDING THE VALUE Business has always looked to squeeze the maximum possible benefit out of IT resources at the lowest possible cost but measuring return
More informationTHALES DATA THREAT REPORT
2018 THALES DATA THREAT REPORT Trends in Encryption and Data Security U.S. FEDERAL EDITION EXECUTIVE SUMMARY #2018DataThreat THE TOPLINE Federal agency data is under siege. Over half of all agency IT security
More informationA guide to CompTIA training and certification DDLS Australia Pty Ltd
A guide to CompTIA training and certification 1 DDLS DDLS is an accredited CompTIA training organisation, offering the courses needed to establish CompTIA A+, Linux+, Network+, Security+ and CySA+. DDLS
More informationBest wishes for 2018! Bryan Ware, CEO. Haystax Technology INSIDER THREAT PREDICTIONS FOR
See our insider threat predictions for 2018 based on data from nearly 1,500 companies that participated in a multi-year research study on insider attacks. This is the season for predictions, the time when
More information2018 Edition. Security and Compliance for Office 365
2018 Edition Security and Compliance for Office 365 [Proofpoint has] given us our time back to focus on the really evil stuff. CISO, Global 500 Manufacturer Like millions of businesses around the world,
More informationMobile Security and Public Networks
Mobile Security and Public Networks Victor Johnston, Future Leaders Executive Council June 7, 2016 RECORDING HERE: http://bit.ly/29t0bq7 Teleconference Settings This call is being recorded To see the slides,
More informationCYBERSECURITY IN THE POST ACUTE ARENA AGENDA
CYBERSECURITY IN THE POST ACUTE ARENA AGENDA 2 Introductions 3 Assessing Your Organization 4 Prioritizing Your Review 5 206 Benchmarks and Breaches 6 Compliance 0 & Cybersecurity 0 7 Common Threats & Vulnerabilities
More informationMaking hybrid IT simple with Capgemini and Microsoft Azure Stack
Making hybrid IT simple with Capgemini and Microsoft Azure Stack The significant evolution of cloud computing in the last few years has encouraged IT leaders to rethink their enterprise cloud strategy.
More informationNeustar Security Solutions Overview
Neustar Security Solutions Overview Our digital, hyperconnected world is a world of opportunity, but also one of anonymity and criminal activity. Your job is to minimize risk and enforce an acceptable
More informationGive Students Limitless Opportunities with Linux Courses
Cisco Networking Academy and NDG Present Give Students Limitless Opportunities with Linux Courses In collaboration with Welcome to the 1st session of the Intro to Linux webinar series! Use the Q and A
More informationInstitute of Internal Auditors 2019 CONNECT WITH THE IIA CHICAGO #IIACHI
Institute of Internal Auditors 2019 CONNECT WITH THE IIA CHICAGO CHAPTER: @IIACHI #IIACHI WWW.FACEBOOK.COM/IIACHICAGO HTTPS://WWW.LINKEDIN.COM/GROUPS/1123977 1 CAE Communications and Common Audit Committee
More informationEC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led
EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led Certification: Certified Network Defender Exam: 312-38 Course Description This course is a vendor-neutral, hands-on,
More informationExpand Your Cyber Expertise. Secure Your Future.
Expand Your Cyber Expertise. Secure Your Future. CSX 2018 Europe will help you stay on top of the latest cybersecurity trends, further your cyber career, and make new connections with professionals around
More informationSupply Chain Integrity and Security Assurance for ICT. Mats Nilsson
Supply Chain Integrity and Security Assurance for ICT Mats Nilsson The starting point 2 B Internet users 85% Population coverage 5+ B Mobile subscriptions 10 years of Daily upload E-Books surpassing Print
More informationWelcome to the HP Institute
Welcome to the HP Institute How HP is working with education to develop tomorrow s IT workforce today Capability Business need for speed The rate of business is increasing exponentially 2020 2T devices
More informationHearing Voices: The Cybersecurity Pro s View of the Profession
SESSION ID: AST2-W02 Hearing Voices: The Cybersecurity Pro s View of the Profession Jon Oltsik Senior Principal Analyst and ESG Fellow Enterprise Strategy Group @joltsik Candy Alexander, CISSP CISM International
More informationA guide to CompTIA training and certification DDLS Australia Pty Ltd
A guide to CompTIA training and certification 1 DDLS DDLS is an accredited CompTIA training organisation, offering the courses needed to establish CompTIA A+, Linux+, Network+, and Security+. DDLS can
More informationSYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security
SYMANTEC: SECURITY ADVISORY SERVICES Symantec Security Advisory Services The World Leader in Information Security Knowledge, as the saying goes, is power. At Symantec we couldn t agree more. And when it
More informationIBM Security Systems. IBM X-Force 2012 & CISO Survey. Cyber Security Threat Landscape IBM Corporation IBM Corporation
IBM X-Force 2012 & CISO Survey Cyber Security Threat Landscape 1 2012 IBM Corporation IBM X-Force 2011 Trend and Risk Report Highlights The mission of the IBM X-Force research and development team is to:
More informationBREAKING BARRIERS TO COLLABORATE WITH THE C-SUITE
BREAKING BARRIERS TO COLLABORATE WITH THE C-SUITE 31st Annual SoCal ISSA Security Symposium Wendy T. Wu Vice President Agenda + CISO: Then and Now + Who are the Stakeholders and What Do They Care About?
More informationBULLETPROOF365 SECURING YOUR IT. Bulletproof365.com
BULLETPROOF365 SECURING YOUR IT Bulletproof365.com INTRODUCING BULLETPROOF365 The world s leading productivity platform wrapped with industry-leading security, unmatched employee education and 24x7 IT
More informationIT SECURITY FOR NONPROFITS
IT SECURITY FOR NONPROFITS COMMUNITY IT INNOVATORS PLAYBOOK April 2016 Community IT Innovators 1101 14th Street NW, Suite 830 Washington, DC 20005 The challenge for a nonprofit organization is to develop
More informationSecurity-as-a-Service: The Future of Security Management
Security-as-a-Service: The Future of Security Management EVERY SINGLE ATTACK THAT AN ORGANISATION EXPERIENCES IS EITHER ON AN ENDPOINT OR HEADING THERE 65% of CEOs say their risk management approach is
More informationComputer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers
Computer Information Systems (CIS) CIS 101 Introduction to Computers This course provides an overview of the computing field and its typical applications. Key terminology and components of computer hardware,
More informationStrengthening Capacity in Cyber Talent sans.org/cybertalent
SANS Security Awareness Summit August 4th, 2016 Strengthening Capacity in Cyber Talent sans.org/cybertalent Cybersecurity: The Current State Skills Mismatch Emphasis on theory over practice Education focus
More informationCloud Communications for Healthcare
Cloud Communications for Healthcare Today, many powerful business communication challenges face everyone in the healthcare chain including clinics, hospitals, insurance providers and any other organization
More informationAmerican Society for Quality
US Army BOSS Program Information Session American Society for Quality Choices and Challenges for the Future 10 September 2017 Certified Lean Six Sigma Black Belt Certified Change Management Advanced Practitioner
More informationThe Future of Business Continuity & Resiliency
The Future of Business Continuity & Resiliency Richard Cocchiara: IBM Distinguished Engineer; CTO IBM Business Continuity & Resiliency Services (BCRS); Managing Partner IBM Resiliency Consulting Services
More informationCyberSecurity Matters: The Human Factor
CyberSecurity Matters: The Human Factor Seth Robinson Sr. Director Technology Analysis @sethdrobinson James Stanger Sr. Director Product Management @stangernet www.netcomlearning.com Copyright (c) 2015
More informationE-Guide CLOUDS ARE MORE SECURE THAN TRADITIONAL IT SYSTEMS -- AND HERE S WHY
E-Guide CLOUDS ARE MORE SECURE THAN TRADITIONAL IT SYSTEMS -- AND HERE S WHY P aranoia has crept into many organizations due to the cloud computing approach, and how it feels insecure with your data stored
More informationCredential Awarding Body Timing Before, During or After Apprenticeship. hardware vendors
Occupation: Information Technology Generalist ONET Code 15-1151.00 RAPIDS Code 1059 OCCUPATIONAL OVERVIEW Potential Job Titles: IT Generalist, Network Manager, Network Support Technician, Network Administrator,
More informationESSENTIAL, QUALITY IT SUPPORT FOR SMALL AND MEDIUM BUSINESSES
ESSENTIAL, QUALITY IT SUPPORT FOR SMALL AND MEDIUM BUSINESSES YOUR OWN IT DEPARTMENT AT A FRACTION OF THE COST// Hand over the day-to-day management and responsibility of your IT so you can focus on what
More information