The State of Security in 2017:

Size: px
Start display at page:

Download "The State of Security in 2017:"

Transcription

1 The State of Security in 2017: A report from experts in the field February 22, 2017 Ryan Frillman Director, Information Security & Compliance, Spire Energy Joey Smith Chief Information Security Officer, Schnuck Markets Gary Harbison Chief Information Security Officer (CISO) Monsanto Information Security Office James Stanger, PhD Sr. Director Product Development CompTIA

2 The voice of the world s information technology (IT) industry and o ver 1.5 million IT pros. CERTIFICATIONS Largest Provider of Vendor- Neutral IT Certifications ASSOCIATION 4,000+ IT Channel Providers & Partners PHILANTHROPY Creating IT Futures Foundation ADVOCACY Public Policy & Reform Higher Salaries Growing Demand Verified Strengths Universal Skills A non-profit trade association with more than 4,000 members and business partners. Our members A 501(c)(3) charitable organization that creates on-ramps for successful IT careers, serving individuals who Our advocacy division encourages collaboration and advancing of legislation that allows the private Three of the Top 10 Certifications That Help IT Workers Get Jobs are CompTIA certifications. * drive our programs through their participation in CompTIA communities, research studies, events, sharing of best practices and more. are underrepresented in IT and lacking in opportunities to be successful in IT, including veterans, youth, and the unemployed. sector to develop new products and services, find solutions and sell them in the global marketplace. * Source: The Dice Report, February

3 C O M P T I A C E R T I F I C A T I O N S A Quick Overview BEST PRACTICES IT Fundamentals CyberSecure PROFESSIONAL-LEVEL MASTERY LEVEL CompTIA CSA+ CompTIA Advanced Security Practitioner (CASP) SPECIALTY A+ CDIA+ Cloud+ Linux+ Network+ Project+ Security+ Server+ CTT+ Cloud Essentials 3

4 C O M P T I A C E R T I F I C A T I O N S A skills-based look at the roadmap We certify essential skills for the entire IT department ecosystem Help Desk IT Support Technician Field Technician A+ Security+ CSA+ CASP Security Engineer Security Analyst IA Technician Operating system support Server+ Linux+ Cloud+ Cloud Systems Analyst Cloud Engineer Network Technician Network+ Project+ Project Manager For all workers, both inside and outside CE 4

5 For some time, we ve taken note of the spike in security issues reported world-wide. Agenda These issues include ransomware, DDosS attacks, privacy issues, as well as how to secure increasinglysensitive information derived from today s increasingly-sophisticated networks. Today, individuals and companies alike present an increased attack surface that hackers can exploit. Today, we re going to hear from expert, management-level individuals about how they address these issues. We ll be discussing security trends, the steps and strategies that today s CIOs and security experts are taking, and the essential skill set needed in the industry. (1) CEU credit towards A+, Network+, Security+, Cloud+, CASP, and CSA+: You will receive a confirmation along with instructions on how to add the credit to your certification account within 48 hours Introduction to the panel More about the collective decades of experience that our panel brings to the able Today s security issues What are they? What are they going to be? Let s hear some war stories. What are we doing to resolve them? What are the things our panel are doing to address today s issues? What wisdom can they provide for us? Essential security skills What are the ideal skill sets needed in today s security workers? Q&A 5

6 The State of Security AUTHORITIES IN: Ryan Frillman Director, Information Security & Compliance, Spire Energy Joey Smith Chief Information Security Officer, Schnuck Markets Gary Harbison Chief Information Security Officer (CISO) Monsanto Open source Security Web technologies Networking E-commerce Project management Complex architectures Industrial networks Ensuring Four 9s and Five 9s solutions for e- commerce, agriculture, and the energy industry These guys get the 3 a.m. call when something happens Have acted as CompTIA Subject Matter Experts for our exams 6

7 W E L C O M E! A Little Housekeeping Continuing Education This webinar is good for (1) CEU credit towards A+, Network+, Security+, Cloud+ and CASP. After the webinar, you may click on the "Proof of Participation" widget to download a certificate which may be uploaded to your candidate account for activity credit. Recording This webinar is being recorded. You are muted by default, please ask all questions in the Q&A section. Survey & Feedback We want your feedback! Please complete brief survey at the completion of the webinar. Tweet with #ITProStateOfSecurity, #CompTIA #CompTIAWebinar, #CompTIAcertified On-Demand Q&A & Group Chat Webinar presentation slides and recording link will be available tomorrow. Got a question? Use the Q&A widget Also, you can chat with other event attendees in the Group Chat widget! 7

8 What do our panel members do?

9 Panel member responsibilities 9

10 The job of ensuring uptime Uptime definition the five 9s? Data and service replication techniques Traditional / Enterprise Cloud Network downtime solutions Redundant hardware Redundant software DNS Protocol SDN? Additional systems Server downtime solutions Virtualization (traditional, containers) Backups / RAID Cloud? War stories when networks get hacked, and why PLEASE NOTE: (1) CEU credit towards A+, Network+, Security+, Cloud+, CASP, and CSA+: You will receive a confirmation along with instructions on how to add the credit to your certification account within 48 hours. 10

11 Uptime metrics Essential services Essential assets Mean time to recovery Recovery Point Objective (RPO) The maximum targeted period in which data might be lost from an IT service due to a major incident. Recovery Time Objective (RTO) The maximum tolerable length of time that a computer, system, network, or application can be down after a failure or disaster. What other metrics do you use? What about compliance? PCI, other regs... PLEASE NOTE: (1) CEU credit towards A+, Network+, Security+, Cloud+, CASP, and CSA+: You will receive a confirmation along with instructions on how to add the credit to your certification account within 48 hours. 11

12 T R O U B L E S H O O T I N G Y O U R C A R E E R Issues confronting the industry Attacks DOS, DDOS Botnets Advanced Persistent Threats (APT) Motives Ideology Espionage as a ruse for the real attack End users Insider attack disgruntled employees Mistakes Lack of planning Lack of funds How possible is it for a group of hackers not particularly wellequipped to take out an entire power grid? PLEASE NOTE: (1) CEU credit towards A+, Network+, Security+, Cloud+, CASP, and CSA+: You will receive a confirmation along with instructions on how to add the credit to your certification account within 48 hours. 12

13 S E C U R I T Y Complicating factors for security Some things to consider - CIOs are worried about what they don t know - We need to think outside the box - Workers need multiple skills in order to secure systems - Creativity is essential in successful workers Growing organization of hackers Greater tech interconnectivity Sophistication of security threats Greater availability of hacking tools Rise of social networking Volume of security threats More reliance on internet applications Continued use of legacy systems Challenges with security expertise Consumerization of IT 54% 52% 52% 48% 45% 45% 44% 38% 35% 35% 13

14 T R O U B L E S H O O T I N G Y O U R C A R E E R Making the most with a limited budget Cost savings Open source? Better-trained individuals? Cloud services? Better planning Employee education? PLEASE NOTE: (1) CEU credit towards A+, Network+, Security+, Cloud+, CASP, and CSA+: You will receive a confirmation along with instructions on how to add the credit to your certification account within 48 hours. 14

15 Burning issues today

16 Ransomware / malware Ransomware one of the biggest stories lately How it gets in What it can do to a company How to address it Training Removal / payment Creating a resilient presence PLEASE NOTE: (1) CEU credit towards A+, Network+, Security+, Cloud+, CASP, and CSA+: You will receive a confirmation along with instructions on how to add the credit to your certification account within 48 hours. 16

17 Relates to various issues Ransomware Privacy issues The latest methods you ve seen How do you combat it? Training Technology? End users and social engineering PLEASE NOTE: (1) CEU credit towards A+, Network+, Security+, Cloud+, CASP, and CSA+: You will receive a confirmation along with instructions on how to add the credit to your certification account within 48 hours. 17

18 Major attacks in the news Characteristics Can last for hours From botnets IoT and DDoS Solutions? DDoS attacks new perspectives PLEASE NOTE: (1) CEU credit towards A+, Network+, Security+, Cloud+, CASP, and CSA+: You will receive a confirmation along with instructions on how to add the credit to your certification account within 48 hours. 18

19 Privacy issues Companies are collecting data, and creating information Predictive analytics Highly-sensitive data How is it stored? How do you make sure it stays private? At what point does a hacked company turn criminal? Initially a victim But what if they don t report the hack properly? Survey: Biggest problems with big data Turn it data into actionable information 51% Managing the database 16% Handling the volume and velocity of data 10% Securing the systems 12% Privacy concerns 4% Legal issues 7% Do these percentages/responses make sense in 2017? PLEASE NOTE: (1) CEU credit towards A+, Network+, Security+, Cloud+, CASP, and CSA+: You will receive a confirmation along with instructions on how to add the credit to your certification account within 48 hours. 19

20 The Advanced Persistent Threat (APT) Addressing the problem Is it still about stopping the hacker? Or, is there a newer approach Creating a resilient network Compartmentalization Automation Redundancy / failover / recovery Metrics to consider Planning Malware Introduction Command & Control Lateral Movement What else? Target Identification Exfiltration (Attack Event) Retreat PLEASE NOTE: (1) CEU credit towards A+, Network+, Security+, Cloud+, CASP, and CSA+: You will receive a confirmation along with instructions on how to add the credit to your certification account within 48 hours. 20

21 What are we doing to address these issues? Some war stories...

22 Going beyond signature-based, traditional hardware/software models. Beyond hardware and software to wetware Signature-based (firewalls, IDS, antivirus) table stakes, at best Traditional pen testing Security and the help desk PLEASE NOTE: (1) CEU credit towards A+, Network+, Security+, Cloud+, CASP, and CSA+: You will receive a confirmation along with instructions on how to add the credit to your certification account within 48 hours. 22

23 User Behavior Analytics (UBA) PLEASE NOTE: (1) CEU credit towards A+, Network+, Security+, Cloud+, CASP, and CSA+: You will receive a confirmation along with instructions on how to add the credit to your certification account within 48 hours. 23

24 Creating security baselines / thresholds PLEASE NOTE: (1) CEU credit towards A+, Network+, Security+, Cloud+, CASP, and CSA+: You will receive a confirmation along with instructions on how to add the credit to your certification account within 48 hours. 24

25 Where companies and organizations provide detailed information concerning successful attacks How can it work? Why is it considered important? Information sharing PLEASE NOTE: (1) CEU credit towards A+, Network+, Security+, Cloud+, CASP, and CSA+: You will receive a confirmation along with instructions on how to add the credit to your certification account within 48 hours. 25

26 What are some of the novel education programs? Does end user education work? What is the best type of education? Hands-on Live lab Other? Education PLEASE NOTE: (1) CEU credit towards A+, Network+, Security+, Cloud+, CASP, and CSA+: You will receive a confirmation along with instructions on how to add the credit to your certification account within 48 hours. 26

27 Essential best practices Security and return on investment Justifying expenses to the boss CEO Board Accounting Showing ROI what questions do they ask? How do your reports justify expenses to you? PLEASE NOTE: (1) CEU credit towards A+, Network+, Security+, Cloud+, CASP, and CSA+: You will receive a confirmation along with instructions on how to add the credit to your certification account within 48 hours. 27

28 The ideal skill set advice from our panel

29 I T I N D U S T R Y T R E N D S Essential skills an overview Security analytics #1 #6 Business continuity Risk analysis Security infrastructure knowledge #2 #3 Top Ten Skills #7 #8 Traditional and cloud-based backup solutions Server downtime solutions Strong analytical abilities - Visio #4 Are these in the right order? #9 Data service replication techniques Network planning - Failover/redundancy #5 What tools do you use every day? What skills do you look for in a potential employee? #10 Compliance 29

30 Lightning round and audience Q&A

31 Lightning round... and audience questions Continuing education: What conferences do you like to attend? And what books / journals / sites do you read carefully? What advice do you have for the ITPro members in terms of skills that they need to learn? What are some of the next big technologies on the horizon that are going to change your world? 31

32 Thank You! Certification.CompTIA.org PLEASE NOTE: (1) CEU credit towards A+, Network+, Security+, Cloud+, CASP, and CSA+: You will receive a confirmation along with instructions on how to add the credit to your certification account within 48 hours.

Housekeeping. Unmute your speakers. Use Chrome if you have issues Enable Flash: Chrome://settings/content flash settings enabled

Housekeeping. Unmute your speakers. Use Chrome if you have issues Enable Flash: Chrome://settings/content flash settings enabled Housekeeping Unmute your speakers. Use Chrome if you have issues Enable Flash: Chrome://settings/content flash settings enabled Recording will distributed in two hours. Slides and homework can be downloaded

More information

SECURITY+ COMPETITIVE ANALYSIS 1. GIAC GSEC 2. (ISC)2 SSCP 3. EC-COUNCIL CEH

SECURITY+ COMPETITIVE ANALYSIS 1. GIAC GSEC 2. (ISC)2 SSCP 3. EC-COUNCIL CEH SECURITY+ COMPETITIVE ANALYSIS 1. GIAC GSEC 2. (ISC)2 SSCP 3. EC-COUNCIL CEH 1 SECURITY+ VS GIAC GSEC Where does GSEC fit? 3 CompTIA Security+ and GIAC Security Essentials (GSEC) Feature CompTIA Security+

More information

Certification and Career Guide

Certification and Career Guide Certification and Career Guide CompTIA offers some of the most recognized entry-level certifications for IT professionals, including its A+, Network+ and Security+ certifications. This certification guide

More information

October 21 22, 2014 Introduction to CompTIA, Communities, and ITSS

October 21 22, 2014 Introduction to CompTIA, Communities, and ITSS October 21 22, 2014 Introduction to CompTIA, Communities, and ITSS CompTIA Big View CompTIA Member Communities IT Services & Support Who is CompTIA? Global, Not for Profit, IT Industry Trade Association

More information

Cybersecurity and the Board of Directors

Cybersecurity and the Board of Directors Cybersecurity and the Board of Directors Key Findings from BITS/FSR Meetings OVERVIEW Board directors are increasingly required to engage in cybersecurity risk management yet some may need better education

More information

SECOPS: NAVIGATE THE NEW LANDSCAPE FOR PREVENTION, DETECTION AND RESPONSE

SECOPS: NAVIGATE THE NEW LANDSCAPE FOR PREVENTION, DETECTION AND RESPONSE SESSION ID: SBX4W5 SECOPS: NAVIGATE THE NEW LANDSCAPE FOR PREVENTION, DETECTION AND RESPONSE Dara Such VP & Publisher, Security Networking and IoT TechTarget @darasuch What we ll cover today State of SecOps:

More information

Defensible and Beyond

Defensible and Beyond TELUS Defensible and Beyond Mike Vamvakaris Director and Head of Cyber Security Consulting November 2017 Digital transformation brings many benefits Communication and Collaboration Autonomous and Artificial

More information

Sage Data Security Services Directory

Sage Data Security Services Directory Sage Data Security Services Directory PROTECTING INFORMATION ASSETS ENSURING REGULATORY COMPLIANCE FIGHTING CYBERCRIME Discover the Sage Difference Protecting your business from cyber attacks is a full-time

More information

PONEMON INSTITUTE RESEARCH REPORT 2018 STUDY ON GLOBAL MEGATRENDS IN CYBERSECURITY

PONEMON INSTITUTE RESEARCH REPORT 2018 STUDY ON GLOBAL MEGATRENDS IN CYBERSECURITY PONEMON INSTITUTE RESEARCH REPORT 2018 STUDY ON GLOBAL MEGATRENDS IN CYBERSECURITY Benchmark research sponsored by Raytheon. Independently conducted by Ponemon Institute LLC. February 2018 2018 Study on

More information

Cybersecurity Risk Mitigation: Protect Your Member Data. Introduction

Cybersecurity Risk Mitigation: Protect Your Member Data. Introduction Cybersecurity Risk Mitigation: Protect Your Member Data Presented by Matt Mitchell, CISSP Knowledge Consulting Group Introduction Matt Mitchell- Director Risk Assurance 17 years information security experience

More information

Combating Cyber Risk in the Supply Chain

Combating Cyber Risk in the Supply Chain SESSION ID: CIN-W10 Combating Cyber Risk in the Supply Chain Ashok Sankar Senior Director Cyber Strategy Raytheon Websense @ashoksankar Introduction The velocity of data breaches is accelerating at an

More information

UKCC CompTIA Webinar: Upskilling your Partners to sell your Solutions Leveraging the CompTIA Playbooks

UKCC CompTIA Webinar: Upskilling your Partners to sell your Solutions Leveraging the CompTIA Playbooks UKCC CompTIA Webinar: Upskilling your Partners to sell your Solutions Leveraging the CompTIA Playbooks @CompTIA_UK Housekeeping Login and connect to the audio when logging in: Find audio information under

More information

Brussels. Cyber Resiliency Minimizing the impact of breaches on business continuity. Jean-Michel Lamby Associate Partner - IBM Security

Brussels. Cyber Resiliency Minimizing the impact of breaches on business continuity. Jean-Michel Lamby Associate Partner - IBM Security Cyber Resiliency Minimizing the impact of breaches on business continuity Jean-Michel Lamby Associate Partner - IBM Security Brussels Think Brussels / Cyber Resiliency / Oct 4, 2018 / 2018 IBM Corporation

More information

CYBERSECURITY HOW IT IS TRANSFORMING THE IT ASSURANCE FIELD

CYBERSECURITY HOW IT IS TRANSFORMING THE IT ASSURANCE FIELD CYBERSECURITY HOW IT IS TRANSFORMING THE IT ASSURANCE FIELD December 2014 KEVIN GROOM ISACA Involvement (Middle Tennessee Chapter) Treasurer (2009 2011) Vice President (2011 2013) President (2013 present)

More information

Cyber Security. February 13, 2018 (webinar) February 15, 2018 (in-person)

Cyber Security. February 13, 2018 (webinar) February 15, 2018 (in-person) Cyber Security Presenters: - Brian Everest, Chief Technology Officer, Starport Managed Services - Susan Pawelek, Accountant, Compliance and Registrant Regulation February 13, 2018 (webinar) February 15,

More information

BRING EXPERT TRAINING TO YOUR WORKPLACE.

BRING EXPERT TRAINING TO YOUR WORKPLACE. BRING EXPERT TRAINING TO YOUR WORKPLACE. ISACA s globally respected training and certification programs inspire confidence that enables innovation in the workplace. ISACA s On-Site Training brings a unique

More information

CompTIA IT Fundamentals:

CompTIA IT Fundamentals: CompTIA IT Fundamentals: The IT Fundamentals certification is ideal for you if you re considering a career in IT or if you work in an allied field that requires a broad understanding of IT, like in a sales

More information

Chapter 12. Information Security Management

Chapter 12. Information Security Management Chapter 12 Information Security Management We Have to Design It for Privacy... and Security. Tension between Maggie and Ajit regarding terminology to use with Dr. Flores. Overly technical communication

More information

RIMS Perk Session Protecting the Crown Jewels A Risk Manager's guide to cyber security March 18, 2015

RIMS Perk Session Protecting the Crown Jewels A Risk Manager's guide to cyber security March 18, 2015 www.pwc.com RIMS Perk Session 2015 - Protecting the Crown Jewels A Risk Manager's guide to cyber security March 18, 2015 Los Angeles RIMS Agenda Introductions What is Cybersecurity? Crown jewels The bad

More information

GOVERNMENT IT: FOCUSING ON 5 TECHNOLOGY PRIORITIES

GOVERNMENT IT: FOCUSING ON 5 TECHNOLOGY PRIORITIES GOVERNMENT IT: FOCUSING ON 5 TECHNOLOGY PRIORITIES INSIGHTS FROM PUBLIC SECTOR IT LEADERS DISCOVER NEW POSSIBILITIES. New network technology is breaking down barriers in government offices, allowing for

More information

Angela McKay Director, Government Security Policy and Strategy Microsoft

Angela McKay Director, Government Security Policy and Strategy Microsoft Angela McKay Director, Government Security Policy and Strategy Microsoft Demographic Trends: Internet Users in 2005.ru.ca.is.uk.nl.be.no.de.pl.ua.us.fr.es.ch.it.eg.il.sa.jo.tr.qa.ae.kz.cn.tw.kr.jp.mx.co.br.pk.th.ph.ng.in.sg.my.ar.id.au

More information

Thinking Outside the Box on Disaster Recovery

Thinking Outside the Box on Disaster Recovery Thinking Outside the Box on Disaster Recovery A Complimentary Webinar From healthsystemcio.com Sponsored by SunGard Your Line Will Be Silent Until Our Event Begins at 12:00 ET Thank You! Housekeeping Moderator

More information

Introducing Maryville University s CYBER SECURITY ONLINE PROGRAMS. Bachelor of Science in Cyber Security & Master of Science in Cyber Security

Introducing Maryville University s CYBER SECURITY ONLINE PROGRAMS. Bachelor of Science in Cyber Security & Master of Science in Cyber Security Introducing Maryville University s CYBER SECURITY ONLINE PROGRAMS Bachelor of Science in Cyber Security & Master of Science in Cyber Security The cyber security industry is calling for more experts. And

More information

Key Findings from the Global State of Information Security Survey 2017 Indonesian Insights

Key Findings from the Global State of Information Security Survey 2017 Indonesian Insights www.pwc.com/id Key Findings from the State of Information Security Survey 2017 n Insights Key Findings from the State of Information Security Survey 2017 n Insights By now, the numbers have become numbing.

More information

Emerging Technologies The risks they pose to your organisations

Emerging Technologies The risks they pose to your organisations Emerging Technologies The risks they pose to your organisations 10 June 2016 Digital trends are fundamentally changing the way that customers behave and companies operate Mobile Connecting people and things

More information

9 TH SOUTHERN INDIA INFORMATION TECHNOLOGY FAIR (SIITF) THEME : EMERGING TECHNOLOGIES TO CREATE NEWER MARKETS

9 TH SOUTHERN INDIA INFORMATION TECHNOLOGY FAIR (SIITF) THEME : EMERGING TECHNOLOGIES TO CREATE NEWER MARKETS 9 TH SOUTHERN INDIA INFORMATION TECHNOLOGY FAIR (SIITF) THEME : EMERGING TECHNOLOGIES TO CREATE NEWER MARKETS INTRODUCTION Today s business environment is global and highly-interconnected, increasing an

More information

Gomex Institute of Technology. COMPTIA TRAINING PROGRAMMES JANUARY JUNE 2016 Proposed Dates

Gomex Institute of Technology. COMPTIA TRAINING PROGRAMMES JANUARY JUNE 2016 Proposed Dates Gomex Institute of Technology 19 Parkington Plaza, Kingston 10 Phone: (876) 622-7519, (876) 622-7590 Web: www.gomex.edu.jm Email: training@gomex.edu.jm COMPTIA TRAINING PROGRAMMES JANUARY JUNE 2016 Proposed

More information

State of the Cyber Training Market January 2018

State of the Cyber Training Market January 2018 State of the Cyber Training Market January 2018 2018 by CYBERBIT 2018 by CYBERBIT Proprietary CYBERBIT Proprietary Cybersecurity Market Worth 202.36 Billion USD by 2021 Marketandmarkets analysis, 2017

More information

ISACA MOSCOW CHAPTER Chapter meeting 22 September 2016

ISACA MOSCOW CHAPTER Chapter meeting 22 September 2016 ISACA MOSCOW CHAPTER Chapter meeting 22 September 2016 Introduction Special guest speaker ISACA Audit committee member, Rosemary Amato Open dialog Wrap-up and close Special guest speaker CISA, CMA, CPA,

More information

Course overview. CompTIA Security+ Certification (Exam SY0-501) Study Guide (G635eng v107)

Course overview. CompTIA Security+ Certification (Exam SY0-501) Study Guide (G635eng v107) Overview This course is intended for those wishing to qualify with CompTIA Security+. CompTIA's Security+ Certification is a foundation-level certificate designed for IT administrators with 2 years' experience

More information

Cybersecurity and Nonprofit

Cybersecurity and Nonprofit Cybersecurity and Nonprofit 2 2 Agenda Cybersecurity and Non Profits Scenario #1 Scenario #2 What Makes a Difference Cyber Insurance and How it Helps Question and Answer 3 3 Cybersecurity and Nonprofit

More information

You ve Been Hacked Now What? Incident Response Tabletop Exercise

You ve Been Hacked Now What? Incident Response Tabletop Exercise You ve Been Hacked Now What? Incident Response Tabletop Exercise Date or subtitle Jeff Olejnik, Director Cybersecurity Services 1 Agenda Incident Response Planning Mock Tabletop Exercise Exercise Tips

More information

ISACA GEEK WEEK SECURITY MANAGEMENT TO ENTERPRISE RISK MANAGEMENT USING THE ISO FRAMEWORK AUGUST 19, 2015

ISACA GEEK WEEK SECURITY MANAGEMENT TO ENTERPRISE RISK MANAGEMENT USING THE ISO FRAMEWORK AUGUST 19, 2015 ISACA GEEK WEEK SECURITY MANAGEMENT TO ENTERPRISE RISK MANAGEMENT USING THE ISO 27001 FRAMEWORK AUGUST 19, 2015 Agenda Coalfire Overview Threat Landscape What is ISO Why ISO ISO Cycle Q&A 2 Presenters

More information

IaaS Buyer s Checklist.

IaaS Buyer s Checklist. Problem Solved IaaS Buyer s Checklist. Yes it s another checklist, but this one s actually useful. 2 Problem Solved Service levels. Does the provider offer your required SLA/SLG? Example: 99.9%, 99.95%,100%

More information

Manager, Infrastructure Services. Position Number Community Division/Region Yellowknife Technology Service Centre

Manager, Infrastructure Services. Position Number Community Division/Region Yellowknife Technology Service Centre IDENTIFICATION Department Position Title Infrastructure Manager, Infrastructure Services Position Number Community Division/Region 32-11488 Yellowknife Technology Service Centre PURPOSE OF THE POSITION

More information

DeMystifying Data Breaches and Information Security Compliance

DeMystifying Data Breaches and Information Security Compliance May 22-25, 2016 Los Angeles Convention Center Los Angeles, California DeMystifying Data Breaches and Information Security Compliance Presented by James Harrison OM32 5/25/2016 3:00 PM - 4:15 PM The handouts

More information

Perimeter Defenses T R U E N E T W O R K S E C U R I T Y DEPENDS ON MORE THAN

Perimeter Defenses T R U E N E T W O R K S E C U R I T Y DEPENDS ON MORE THAN T R U E N E T W O R K S E C U R I T Y DEPENDS ON MORE THAN Perimeter Defenses Enterprises need to take their security strategy beyond stacking up layers of perimeter defenses to building up predictive

More information

Disaster Recovery and Business Continuity

Disaster Recovery and Business Continuity Disaster Recovery and Business A Rackspace White Paper Spring 2010 Summary The purpose of this guide is to cut through the jargon around Business and Disaster Recovery, explain the differences and help

More information

Cyber Attack: Is Your Business at Risk?

Cyber Attack: Is Your Business at Risk? 15 July 2017 Cyber Attack: Is Your Business at Risk? Stanley Wong Regional Head of Financial Lines, Asia Pacific Agenda Some common misconceptions by SMEs around cyber protection Cyber Claims and Industry

More information

Governance Ideas Exchange

Governance Ideas Exchange www.pwc.com.au Anatomy of a Hack Governance Ideas Exchange Robert Di Pietro October 2018 Cyber Security Anatomy of a Hack Cyber Security Introduction Who are the bad guys? Profiling the victim Insights

More information

INTELLIGENCE DRIVEN GRC FOR SECURITY

INTELLIGENCE DRIVEN GRC FOR SECURITY INTELLIGENCE DRIVEN GRC FOR SECURITY OVERVIEW Organizations today strive to keep their business and technology infrastructure organized, controllable, and understandable, not only to have the ability to

More information

Career Paths In Cybersecurity

Career Paths In Cybersecurity Career Paths In Cybersecurity Introductions Rob Ashcraft Sr. Technical Advisor 26-yrs in Information Technology 14-yrs in Information Security Held positions as Technician, IT Management, IT Sales Double

More information

5 Trends That Will Impact Your IT Planning in Layered Security. Executive Brief

5 Trends That Will Impact Your IT Planning in Layered Security. Executive Brief 5 Trends That Will Impact Your IT Planning in 2012 Layered Security Executive Brief a QuinStreet Excutive Brief. 2011 Layered Security Many of the IT trends that your organization will tackle in 2012 aren

More information

IT Services. We re the IT in OrganIsaTion.

IT Services. We re the IT in OrganIsaTion. IT Services. We re the IT in OrganIsaTion. IT for Large Organisations. As the world of business technology has changed, so have we. From designing, building and optimising tailored IT infrastructures,

More information

Move Up to an OpenStack Private Cloud and Lose the Vendor Lock-in

Move Up to an OpenStack Private Cloud and Lose the Vendor Lock-in Move Up to an OpenStack Private Cloud and Lose the Vendor Lock-in Peace, commerce and honest friendship with all nations; entangling alliances with none. -Thomas Jefferson Introduction In business and

More information

Disaster Recovery Is A Business Strategy

Disaster Recovery Is A Business Strategy Disaster Recovery Is A Business Strategy A White Paper By Table of Contents Preface Disaster Recovery Is a Business Strategy Disaster Recovery Is a Business Strategy... 2 Disaster Recovery: The Facts...

More information

A Guide to Ensuring Security and Resiliency

A Guide to Ensuring Security and Resiliency Protecting Your Business Network: A Guide to Ensuring Security and Resiliency Even as major news outlets continue to report new stories about massive security breaches at the world s largest companies,

More information

ACTIONABLE SECURITY AWARENESS: CONVERT THE WEAKEST LINK INTO THE SAFETY FORCE

ACTIONABLE SECURITY AWARENESS: CONVERT THE WEAKEST LINK INTO THE SAFETY FORCE ACTIONABLE SECURITY AWARENESS: CONVERT THE WEAKEST LINK INTO THE SAFETY FORCE Cybersecurity Awareness by gamification: Kaspersky CyberSafety Training 2017 Kaspersky Lab. All rights reserved. 1 HUMAN MISTAKES

More information

Securing Digital Transformation

Securing Digital Transformation September 4, 2017 Securing Digital Transformation DXC Security Andreas Wuchner, CTO Security Innovation Risk surface is evolving and increasingly complex The adversary is highly innovative and sophisticated

More information

Managing complexity and rapid change in 2019

Managing complexity and rapid change in 2019 2019 Predictions Managing complexity and rapid change in 2019 No-one has a crystal ball, but here at NTT Security we ve worked with our security experts around the world to identify trends that affect

More information

Y O UR BUS I N E SS IS ONL Y A S S TR ON G A S YO U R CONNEC T I O N T HE I M P ORTANCE OF R ELI ABLE CO NNECTIVITY W HAT S IN SIDE:

Y O UR BUS I N E SS IS ONL Y A S S TR ON G A S YO U R CONNEC T I O N T HE I M P ORTANCE OF R ELI ABLE CO NNECTIVITY W HAT S IN SIDE: W H I T E PA P E R C O N N E C T I V I T Y Y O UR BUS I N E SS IS ONL Y A S S TR ON G A S YO U R CONNEC T I O N T HE I M P ORTANCE OF R ELI ABLE CO NNECTIVITY W HAT S IN SIDE: The importance of connectivity

More information

IT SECURITY OFFICER. Department: Information Technology. Pay Range: Professional 18

IT SECURITY OFFICER. Department: Information Technology. Pay Range: Professional 18 Pierce County Classification Description IT SECURITY OFFICER Department: Information Technology Job Class #: 634900 Pay Range: Professional 18 FLSA: Exempt Represented: No Classification descriptions are

More information

Digital Healthcare. Yordan Iliev Director R&D Healthcare. Regional Cybersecurity Forum, November 2016, Grand Hotel Sofia, Bulgaria

Digital Healthcare. Yordan Iliev Director R&D Healthcare. Regional Cybersecurity Forum, November 2016, Grand Hotel Sofia, Bulgaria Digital Healthcare Yordan Iliev Director R&D Healthcare Regional Cybersecurity Forum, 29-30 November 2016, Grand Hotel Sofia, Bulgaria AGENDA Introduction Security challenges in healthcare IT Change ahead

More information

The Value Of NEONet Cybersecurity. Why You Need To Protect Your The Value Of NEOnet Cybersecurity. Private Student Data In Ohio

The Value Of NEONet Cybersecurity. Why You Need To Protect Your The Value Of NEOnet Cybersecurity. Private Student Data In Ohio Prompt. Courteous. Knowledgeable. Support you deserve. The Value Of NEONet Cybersecurity Why You Need To Protect Your Private Student Data In Ohio 1 TABLE OF CONTENTS 2 2 2-3 4 5 7 Introduction The Three

More information

Securing the Internet of Things (IoT) at the U.S. Department of Veterans Affairs

Securing the Internet of Things (IoT) at the U.S. Department of Veterans Affairs Securing the Internet of Things (IoT) at the U.S. Department of Veterans Affairs Dominic Cussatt Acting Deputy Assistant Secretary / Chief Information Security Officer (CISO) February 20, 2017 The Cyber

More information

Sales Presentation Case 2018 Dell EMC

Sales Presentation Case 2018 Dell EMC Sales Presentation Case 2018 Dell EMC Introduction: As a member of the Dell Technologies unique family of businesses, Dell EMC serves a key role in providing the essential infrastructure for organizations

More information

Cybersecurity Session IIA Conference 2018

Cybersecurity Session IIA Conference 2018 www.pwc.com/me Cybersecurity Session IIA Conference 2018 Wael Fattouh Partner PwC Cybersecurity and Technology Risk PwC 2 There are only two types of companies: Those that have been hacked, and those that

More information

Policy Session 4 Identifying Risk: An abundance of Potential Shock Waves

Policy Session 4 Identifying Risk: An abundance of Potential Shock Waves Policy Session 4 Identifying Risk: An abundance of Potential Shock Waves Ray Stanton Interim Group CiSO & Director Digital Risk, National Grid &, Group CiSO/CiRO, Redwood Technologies Group 9 th May 2017

More information

Must Have Items for Your Cybersecurity or IT Budget in 2018

Must Have Items for Your Cybersecurity or IT Budget in 2018 Must Have Items for Your Cybersecurity or IT Budget in 2018 CBAO Regional Meeting Dan Desko (Senior Manager, IT Risk Advisory) Matt Dunn (Senior Security Analyst, IT Risk Advisory) Who is Schneider Downs?

More information

State Governments at Risk: State CIOs and Cybersecurity. CSG Cybersecurity and Privacy Policy Academy November 2, 2017

State Governments at Risk: State CIOs and Cybersecurity. CSG Cybersecurity and Privacy Policy Academy November 2, 2017 State Governments at Risk: State CIOs and Cybersecurity CSG Cybersecurity and Privacy Policy Academy November 2, 2017 About NASCIO National association representing state chief information officers and

More information

COUNTERING CYBER CHAOS WITH HIPAA COMPLIANCE. Presented by Paul R. Hales, J.D. May 8, 2017

COUNTERING CYBER CHAOS WITH HIPAA COMPLIANCE. Presented by Paul R. Hales, J.D. May 8, 2017 COUNTERING CYBER CHAOS WITH HIPAA COMPLIANCE Presented by Paul R. Hales, J.D. May 8, 2017 1 HIPAA Rules Combat Cyber Crime HIPAA Rules A Blueprint to Combat Cyber Crime 2 HIPAA Rules Combat Cyber Crime

More information

CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships. from the most trusted name in information security

CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships. from the most trusted name in information security CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships About SANS The SANS (SysAdmin, Audit, Network, Security) Institute Established in 1989 Cooperative research

More information

Transforming the utilities industry. How our insight and infrastructure can help you thrive in a changing world

Transforming the utilities industry. How our insight and infrastructure can help you thrive in a changing world Transforming the utilities industry How our insight and infrastructure can help you thrive in a changing world The utilities industry is changing You need to be leaner, greener and smarter. And we re here

More information

Managing IT Risk: What Now and What to Look For. Presented By Tina Bode IT Assurance Services

Managing IT Risk: What Now and What to Look For. Presented By Tina Bode IT Assurance Services Managing IT Risk: What Now and What to Look For Presented By Tina Bode IT Assurance Services Agenda 1 2 WHAT TOP TEN IT SECURITY RISKS YOU CAN DO 3 QUESTIONS 2 IT S ALL CONNECTED Introduction All of our

More information

Virtualization. Q&A with an industry leader. Virtualization is rapidly becoming a fact of life for agency executives,

Virtualization. Q&A with an industry leader. Virtualization is rapidly becoming a fact of life for agency executives, Virtualization Q&A with an industry leader Virtualization is rapidly becoming a fact of life for agency executives, as the basis for data center consolidation and cloud computing and, increasingly, as

More information

HOSTED SECURITY SERVICES

HOSTED SECURITY SERVICES HOSTED SECURITY SERVICES A PROVEN STRATEGY FOR PROTECTING CRITICAL IT INFRASTRUCTURE AND DEVICES Being always-on, always-connected might be good for business, but it creates an ideal climate for cybercriminal

More information

Which Side Are You On?

Which Side Are You On? 12/9/2015 ARE YOU THE NEXT CYBER WARRIOR? Maria S. Thompson State Chief Risk/Security Officer Which Side Are You On? 8/17/2015 2 Information Technology 2 1 Cyber Professionals Deficiency Statistics Cybersecurity

More information

BULLETPROOF365 SECURING YOUR IT. Bulletproof365.com

BULLETPROOF365 SECURING YOUR IT. Bulletproof365.com BULLETPROOF365 SECURING YOUR IT Bulletproof365.com INTRODUCING BULLETPROOF365 The world s leading productivity platform wrapped with industry-leading security, unmatched employee education and 24x7 IT

More information

CYBER SECURITY FOR BUSINESS COUNTING THE COSTS, FINDING THE VALUE

CYBER SECURITY FOR BUSINESS COUNTING THE COSTS, FINDING THE VALUE CYBER SECURITY FOR BUSINESS COUNTING THE COSTS, FINDING THE VALUE Business has always looked to squeeze the maximum possible benefit out of IT resources at the lowest possible cost but measuring return

More information

THALES DATA THREAT REPORT

THALES DATA THREAT REPORT 2018 THALES DATA THREAT REPORT Trends in Encryption and Data Security U.S. FEDERAL EDITION EXECUTIVE SUMMARY #2018DataThreat THE TOPLINE Federal agency data is under siege. Over half of all agency IT security

More information

A guide to CompTIA training and certification DDLS Australia Pty Ltd

A guide to CompTIA training and certification DDLS Australia Pty Ltd A guide to CompTIA training and certification 1 DDLS DDLS is an accredited CompTIA training organisation, offering the courses needed to establish CompTIA A+, Linux+, Network+, Security+ and CySA+. DDLS

More information

Best wishes for 2018! Bryan Ware, CEO. Haystax Technology INSIDER THREAT PREDICTIONS FOR

Best wishes for 2018! Bryan Ware, CEO.  Haystax Technology INSIDER THREAT PREDICTIONS FOR See our insider threat predictions for 2018 based on data from nearly 1,500 companies that participated in a multi-year research study on insider attacks. This is the season for predictions, the time when

More information

2018 Edition. Security and Compliance for Office 365

2018 Edition. Security and Compliance for Office 365 2018 Edition Security and Compliance for Office 365 [Proofpoint has] given us our time back to focus on the really evil stuff. CISO, Global 500 Manufacturer Like millions of businesses around the world,

More information

Mobile Security and Public Networks

Mobile Security and Public Networks Mobile Security and Public Networks Victor Johnston, Future Leaders Executive Council June 7, 2016 RECORDING HERE: http://bit.ly/29t0bq7 Teleconference Settings This call is being recorded To see the slides,

More information

CYBERSECURITY IN THE POST ACUTE ARENA AGENDA

CYBERSECURITY IN THE POST ACUTE ARENA AGENDA CYBERSECURITY IN THE POST ACUTE ARENA AGENDA 2 Introductions 3 Assessing Your Organization 4 Prioritizing Your Review 5 206 Benchmarks and Breaches 6 Compliance 0 & Cybersecurity 0 7 Common Threats & Vulnerabilities

More information

Making hybrid IT simple with Capgemini and Microsoft Azure Stack

Making hybrid IT simple with Capgemini and Microsoft Azure Stack Making hybrid IT simple with Capgemini and Microsoft Azure Stack The significant evolution of cloud computing in the last few years has encouraged IT leaders to rethink their enterprise cloud strategy.

More information

Neustar Security Solutions Overview

Neustar Security Solutions Overview Neustar Security Solutions Overview Our digital, hyperconnected world is a world of opportunity, but also one of anonymity and criminal activity. Your job is to minimize risk and enforce an acceptable

More information

Give Students Limitless Opportunities with Linux Courses

Give Students Limitless Opportunities with Linux Courses Cisco Networking Academy and NDG Present Give Students Limitless Opportunities with Linux Courses In collaboration with Welcome to the 1st session of the Intro to Linux webinar series! Use the Q and A

More information

Institute of Internal Auditors 2019 CONNECT WITH THE IIA CHICAGO #IIACHI

Institute of Internal Auditors 2019 CONNECT WITH THE IIA CHICAGO #IIACHI Institute of Internal Auditors 2019 CONNECT WITH THE IIA CHICAGO CHAPTER: @IIACHI #IIACHI WWW.FACEBOOK.COM/IIACHICAGO HTTPS://WWW.LINKEDIN.COM/GROUPS/1123977 1 CAE Communications and Common Audit Committee

More information

EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led

EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led Certification: Certified Network Defender Exam: 312-38 Course Description This course is a vendor-neutral, hands-on,

More information

Expand Your Cyber Expertise. Secure Your Future.

Expand Your Cyber Expertise. Secure Your Future. Expand Your Cyber Expertise. Secure Your Future. CSX 2018 Europe will help you stay on top of the latest cybersecurity trends, further your cyber career, and make new connections with professionals around

More information

Supply Chain Integrity and Security Assurance for ICT. Mats Nilsson

Supply Chain Integrity and Security Assurance for ICT. Mats Nilsson Supply Chain Integrity and Security Assurance for ICT Mats Nilsson The starting point 2 B Internet users 85% Population coverage 5+ B Mobile subscriptions 10 years of Daily upload E-Books surpassing Print

More information

Welcome to the HP Institute

Welcome to the HP Institute Welcome to the HP Institute How HP is working with education to develop tomorrow s IT workforce today Capability Business need for speed The rate of business is increasing exponentially 2020 2T devices

More information

Hearing Voices: The Cybersecurity Pro s View of the Profession

Hearing Voices: The Cybersecurity Pro s View of the Profession SESSION ID: AST2-W02 Hearing Voices: The Cybersecurity Pro s View of the Profession Jon Oltsik Senior Principal Analyst and ESG Fellow Enterprise Strategy Group @joltsik Candy Alexander, CISSP CISM International

More information

A guide to CompTIA training and certification DDLS Australia Pty Ltd

A guide to CompTIA training and certification DDLS Australia Pty Ltd A guide to CompTIA training and certification 1 DDLS DDLS is an accredited CompTIA training organisation, offering the courses needed to establish CompTIA A+, Linux+, Network+, and Security+. DDLS can

More information

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security SYMANTEC: SECURITY ADVISORY SERVICES Symantec Security Advisory Services The World Leader in Information Security Knowledge, as the saying goes, is power. At Symantec we couldn t agree more. And when it

More information

IBM Security Systems. IBM X-Force 2012 & CISO Survey. Cyber Security Threat Landscape IBM Corporation IBM Corporation

IBM Security Systems. IBM X-Force 2012 & CISO Survey. Cyber Security Threat Landscape IBM Corporation IBM Corporation IBM X-Force 2012 & CISO Survey Cyber Security Threat Landscape 1 2012 IBM Corporation IBM X-Force 2011 Trend and Risk Report Highlights The mission of the IBM X-Force research and development team is to:

More information

BREAKING BARRIERS TO COLLABORATE WITH THE C-SUITE

BREAKING BARRIERS TO COLLABORATE WITH THE C-SUITE BREAKING BARRIERS TO COLLABORATE WITH THE C-SUITE 31st Annual SoCal ISSA Security Symposium Wendy T. Wu Vice President Agenda + CISO: Then and Now + Who are the Stakeholders and What Do They Care About?

More information

BULLETPROOF365 SECURING YOUR IT. Bulletproof365.com

BULLETPROOF365 SECURING YOUR IT. Bulletproof365.com BULLETPROOF365 SECURING YOUR IT Bulletproof365.com INTRODUCING BULLETPROOF365 The world s leading productivity platform wrapped with industry-leading security, unmatched employee education and 24x7 IT

More information

IT SECURITY FOR NONPROFITS

IT SECURITY FOR NONPROFITS IT SECURITY FOR NONPROFITS COMMUNITY IT INNOVATORS PLAYBOOK April 2016 Community IT Innovators 1101 14th Street NW, Suite 830 Washington, DC 20005 The challenge for a nonprofit organization is to develop

More information

Security-as-a-Service: The Future of Security Management

Security-as-a-Service: The Future of Security Management Security-as-a-Service: The Future of Security Management EVERY SINGLE ATTACK THAT AN ORGANISATION EXPERIENCES IS EITHER ON AN ENDPOINT OR HEADING THERE 65% of CEOs say their risk management approach is

More information

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers Computer Information Systems (CIS) CIS 101 Introduction to Computers This course provides an overview of the computing field and its typical applications. Key terminology and components of computer hardware,

More information

Strengthening Capacity in Cyber Talent sans.org/cybertalent

Strengthening Capacity in Cyber Talent sans.org/cybertalent SANS Security Awareness Summit August 4th, 2016 Strengthening Capacity in Cyber Talent sans.org/cybertalent Cybersecurity: The Current State Skills Mismatch Emphasis on theory over practice Education focus

More information

Cloud Communications for Healthcare

Cloud Communications for Healthcare Cloud Communications for Healthcare Today, many powerful business communication challenges face everyone in the healthcare chain including clinics, hospitals, insurance providers and any other organization

More information

American Society for Quality

American Society for Quality US Army BOSS Program Information Session American Society for Quality Choices and Challenges for the Future 10 September 2017 Certified Lean Six Sigma Black Belt Certified Change Management Advanced Practitioner

More information

The Future of Business Continuity & Resiliency

The Future of Business Continuity & Resiliency The Future of Business Continuity & Resiliency Richard Cocchiara: IBM Distinguished Engineer; CTO IBM Business Continuity & Resiliency Services (BCRS); Managing Partner IBM Resiliency Consulting Services

More information

CyberSecurity Matters: The Human Factor

CyberSecurity Matters: The Human Factor CyberSecurity Matters: The Human Factor Seth Robinson Sr. Director Technology Analysis @sethdrobinson James Stanger Sr. Director Product Management @stangernet www.netcomlearning.com Copyright (c) 2015

More information

E-Guide CLOUDS ARE MORE SECURE THAN TRADITIONAL IT SYSTEMS -- AND HERE S WHY

E-Guide CLOUDS ARE MORE SECURE THAN TRADITIONAL IT SYSTEMS -- AND HERE S WHY E-Guide CLOUDS ARE MORE SECURE THAN TRADITIONAL IT SYSTEMS -- AND HERE S WHY P aranoia has crept into many organizations due to the cloud computing approach, and how it feels insecure with your data stored

More information

Credential Awarding Body Timing Before, During or After Apprenticeship. hardware vendors

Credential Awarding Body Timing Before, During or After Apprenticeship. hardware vendors Occupation: Information Technology Generalist ONET Code 15-1151.00 RAPIDS Code 1059 OCCUPATIONAL OVERVIEW Potential Job Titles: IT Generalist, Network Manager, Network Support Technician, Network Administrator,

More information

ESSENTIAL, QUALITY IT SUPPORT FOR SMALL AND MEDIUM BUSINESSES

ESSENTIAL, QUALITY IT SUPPORT FOR SMALL AND MEDIUM BUSINESSES ESSENTIAL, QUALITY IT SUPPORT FOR SMALL AND MEDIUM BUSINESSES YOUR OWN IT DEPARTMENT AT A FRACTION OF THE COST// Hand over the day-to-day management and responsibility of your IT so you can focus on what

More information