Preventing the Next Insider Threat from Leveraging Cross Domain Data Movement

Size: px
Start display at page:

Download "Preventing the Next Insider Threat from Leveraging Cross Domain Data Movement"

Transcription

1 Preventing the Next Insider Threat from Leveraging Cross Domain Data Movement Kevin McPeak, CISSP, ITILv3 Symantec Security

2 Key References: DoDi ICS (Draft) Preventing the Next Insider Threat from Leveraging Cross Domain Data Movement

3 Key Reference DoDi : A CDS must be approved within an IS boundary or authorized as a separate IS using the DoD RMF process.

4 Cross Domain Solution (CDS) Authorization Process: Preventing the Next Insider Threat from Leveraging Cross Domain Data Movement

5 CDS Authorization Process: Cross Domain Enterprise Services The CDS Authorization Process for Cross Domain Enterprise Services (CDES) is comprised of four phases: Phase 1: Validation, Prioritization, & Requirements Analysis Phase 2: Solution Development and Risk Assessment Phase 3: Security Engineering & Risk Assessment Phase 4: Annual Risk Review

6 Understanding Insider Threats If you know the enemy and know yourself, you need not fear the result of a hundred battles. If you know yourself but not the enemy, for every victory gained you will also suffer a defeat. If you know neither the enemy nor yourself, you will succumb in every battle. Sun Tzu, The Art of War

7 Preventing the Next Insider Threat from Leveraging Cross Domain Data Movement

8 Classified USG Materials: Presidential Efforts to Thwart Insider Threats EO EO Conforming Change 2 of the NISPOM

9 EO 13526: "Classified National Security Information" 18 President Obama issued EO in It provided for the creation of the NDC, which systematicallydeclassifies information as soon as practicable.

10 EO 13587: Structural Reforms to Improve Security of Classified Networks and the Responsible Sharing and Safeguarding of Classified Information. Executive Branch Insider Threat Programs require: designation of a senior official(s); capability to gather; integrate; and centrally analyze and respond to key threat related information; monitor employee use of classified networks; provide workforce with insider threat awareness training; protect civil liberties and privacy of all personnel.

11 NISPOM Conforming Change 2 (Pending) The minimum standards for Industry will include: establishing an insider threat program designating an insider threat senior official who is cleared in connection w/ the facility clearance self assessments of insider threat programs insider threat training for designated personnel & awareness for employees monitoring network activity

12 Cross Domain Solution (CDS) Data Movement Strategy to Prevent Data Loss via Insider Threats I: Identify the Appropriate Data Owners II: Locate All of the Places Where Classified Data Resides III: Tag your Classified Data IV: Monitor/Learn How Classified Data is Typically Used V: Determine Where Classified Data Goes VI: Wrap Additional Security Around Classified Data VII: Halt Data Leaks Before Spillage Occurs

13 CDS Data Movement Strategy to Prevent Data Loss via Insider Threats I. Identify the Appropriate Data Owners 1: Identify the Appropriate Operating Units, Specialized Teams, Task Forces, Specific Individuals 2: Work with these Data Owners to further identify additional priority data types. This is an iterative process for risk reduction II. Locate All of the Places Where Your Highly Sensitive & Classified Data Resides 1: Consider data at rest, data in use, data in motion, archived data, & encrypted data 2: Consider standard locations: network devices, storage, databases, file servers, web portals and other applications, laptops, e mail servers (MTA or Proxy), PST files 3: Consider other locations: mobile devices, printers, scanners, fax machines, copiers, file sharing apps like Dropbox or Evernote, USB drives, CD/DVDs, paper copies, IM, "free" webmail services, university webmail for students & alumni, FTP puts

14 CDS Data Movement Strategy to Prevent Data Loss via Insider Threats III. Tag your Sensitive & Classified Data IV. Monitor & Learn How Classified Data is Typically Used and Typically Generated by Your Workforce V. Determine Where Classified Data Goes & the Conditions When it May Cross Domains. Don t be Lookin' for Data in All the Wrong Places... Preventing the Next Insider Threat from Leveraging Cross Domain Data Movement

15 CDS Data Movement Strategy to Prevent Data Loss via Insider Threats XI. Wrap Additional Security Around Sensitive Data 1: The best Incident Response (IR) is for the incident to have been thwarted in the first place, long before it became an incident 2: Review your file permissions 3: Consider using additional encryption for sensitive data as part of your defense in depth posture

16 CDS Data Movement Strategy to Prevent Data Loss via Insider Threats VII. Halt Data Leaks Before Spillage Occurs Preventing the Next Insider Threat from Leveraging Cross Domain Data Movement

17 Defense In Depth: Encryption + Data Loss Prevention Network DLP / Gateway Encryption Can be set to automatically block or encrypt s containing classified or sensitive data Notify employees in real time/context about encryption policies and tools Storage DLP / Shared Storage Encryption Discover where classified data files are stored and automatically apply encryption Ease the burden to staff with near transparence Endpoint DLP / Endpoint Encryption Target high risk users by discovering what laptops contain sensitive data Protect & enable the business by targeting encryption efforts to sensitive data moving to USB devices

18 loss prevention Kevin Thank you! Copyright 2012 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.

Thwarting the Insider Threat

Thwarting the Insider Threat Thwarting the Insider Threat Tim Balog, CISSP Engineering Manager, US Federal Civilian Programs Symantec Corporation tbalog@symantec.com October 12, 2017 If you know the enemy and know yourself, you need

More information

Thwarting the Insider Threat: Developing a Robust Defense in Depth Data Loss Prevention Strategy

Thwarting the Insider Threat: Developing a Robust Defense in Depth Data Loss Prevention Strategy Thwarting the Insider Threat: Developing a Robust Defense in Depth Data Loss Prevention Strategy Kevin McPeak, CISSP, ITILv3 Technical Architect, Security Symantec Public Sector Strategic Programs 2014

More information

ProteggereiDatiAziendalion-premises e nel cloud

ProteggereiDatiAziendalion-premises e nel cloud ProteggereiDatiAziendalion-premises e nel cloud Antonio Forzieri Cyber Security Practice Lead, Global Agenda 1 Symantec Information Centric Encryption Introduction 2 Common business objectives addressed

More information

Risk Management. Modifications by Prof. Dong Xuan and Adam C. Champion. Principles of Information Security, 5th Edition 1

Risk Management. Modifications by Prof. Dong Xuan and Adam C. Champion. Principles of Information Security, 5th Edition 1 Risk Management Modifications by Prof. Dong Xuan and Adam C. Champion Principles of Information Security, 5th Edition 1 Learning Objectives Upon completion of this material, you should be able to: Define

More information

McAfee Total Protection for Data Loss Prevention

McAfee Total Protection for Data Loss Prevention McAfee Total Protection for Data Loss Prevention Protect data leaks. Stay ahead of threats. Manage with ease. Key Advantages As regulations and corporate standards place increasing demands on IT to ensure

More information

Don t Be the Next Data Loss Story

Don t Be the Next Data Loss Story Don t Be the Next Data Loss Story Titus: Blair Canavan McAfee: Chris Ellis Date The Importance of Data Protection McAfee DLP + TITUS Data Classification About McAfee Founded in 1987 as the world s largest

More information

Technology Director Meeting

Technology Director Meeting Technology Director Meeting EDUCATION SERVICE CENTER, REGION 20 Serving the Educational Community We believe... ESC-20 positively impacts the learning community through high quality, cost effective products

More information

INFORMATION ASSURANCE DIRECTORATE

INFORMATION ASSURANCE DIRECTORATE National Security Agency/Central Security Service INFORMATION ASSURANCE DIRECTORATE CGS Physical Enterprise Physical Enterprise Monitoring is the monitoring of the physical and environmental controls that

More information

Data Insight Feature Briefing Box Cloud Storage Support

Data Insight Feature Briefing Box Cloud Storage Support Data Insight Feature Briefing Box Cloud Storage Support This document is about the new Box Cloud Storage Support feature in Symantec Data Insight 5.0. If you have any feedback or questions about this document

More information

Safeguarding Controlled Unclassified Information and Cyber Incident Reporting. Kevin R. Gamache, Ph.D., ISP Facility Security Officer

Safeguarding Controlled Unclassified Information and Cyber Incident Reporting. Kevin R. Gamache, Ph.D., ISP Facility Security Officer Safeguarding Controlled Unclassified Information and Cyber Incident Reporting Kevin R. Gamache, Ph.D., ISP Facility Security Officer Why Are We Seeing These Rules? Stolen data provides potential adversaries

More information

CloudSOC and Security.cloud for Microsoft Office 365

CloudSOC and  Security.cloud for Microsoft Office 365 Solution Brief CloudSOC and Email Security.cloud for Microsoft Office 365 DID YOU KNOW? Email is the #1 delivery mechanism for malware. 1 Over 40% of compliance related data in Office 365 is overexposed

More information

ORA HIPAA Security. All Affiliate Research Policy Subject: HIPAA Security File Under: For Researchers

ORA HIPAA Security. All Affiliate Research Policy Subject: HIPAA Security File Under: For Researchers All Affiliate Research Policy Subject: HIPAA File Under: For Researchers ORA HIPAA Issuing Department: Office of Research Administration Original Policy Date Page 1 of 5 Approved by: May 9,2005 Revision

More information

Mission Defense via Information-Centric Security

Mission Defense via Information-Centric Security Mission Defense via Information-Centric Security Overview It s About the Information Traditional CND Tools are Not Sufficient Not All Data is Created Equal "The views expressed in this presentation are

More information

Components and Considerations in Building an Insider Threat Program

Components and Considerations in Building an Insider Threat Program Components and Considerations in Building an Insider Threat Program Carly Huth Insider Threat Researcher, CEWM Carly L. Huth is an insider threat researcher in the Cyber Enterprise and Workforce Management

More information

UTAH VALLEY UNIVERSITY Policies and Procedures

UTAH VALLEY UNIVERSITY Policies and Procedures Page 1 of 5 POLICY TITLE Section Subsection Responsible Office Private Sensitive Information Facilities, Operations, and Information Technology Information Technology Office of the Vice President of Information

More information

NISPOM Change 2: Considerations for Building an Effective Insider Threat Program

NISPOM Change 2: Considerations for Building an Effective Insider Threat Program NISPOM Change 2: Considerations for Building an Effective Insider Threat Program Randall Trzeciak (rft@cert.org) July 7, 2016 Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213

More information

Essentials to creating your own Security Posture using Splunk Enterprise

Essentials to creating your own Security Posture using Splunk Enterprise Essentials to creating your own Security Posture using Splunk Enterprise Using Splunk to maximize the efficiency and effectiveness of the SOC / IR Richard W. McKee, MS-ISA, CISSP Principal Cyber Security

More information

Encryption Vision & Strategy

Encryption Vision & Strategy Encryption Vision & Strategy Brad Zehring Principal Product Manager Encryption Vision & Strategy 1 Safe Harbor Disclaimer This presentation contains information about pre-release software. Any unreleased

More information

Update on the Key Initiatives Recommended by NTT Data regarding the Agency Cyber Security Framework

Update on the Key Initiatives Recommended by NTT Data regarding the Agency Cyber Security Framework Update on the Key Initiatives Recommended by NTT Data regarding the Agency Cyber Security Framework Texas Higher Education Coordinating Board Zhenzhen Sun Assistant Commissioner Information Solutions and

More information

New! Checklist for HIPAA & HITECH Compliance Pabrai

New! Checklist for HIPAA & HITECH Compliance Pabrai Ensure An Always Ready Audit State Ali, MSEE, CISSP (ISSAP, ISSMP) ecfirst, chief executive Member, FBI InfraGard Agenda Step through compliance challenges and state of security in healthcare Review list

More information

Symantec & Blue Coat Technical Update Webinar 29. Juni 2017

Symantec & Blue Coat Technical Update Webinar 29. Juni 2017 Avantec Blue Coat/Symantec Webinar Jean Marc Edder Senior Systems Engineer The Global Leader in Cyber Network + + Cloud Global market leader in Endpoint, Email, Data Loss Prevention and Website, User Authentication

More information

Building a resilient ICS

Building a resilient ICS Building a resilient ICS By Dr Jules Pagna Disso, @julesdisso Building a resilient Industrial Control System (ICS) 1: From ICS to Critical National Infrastructure 2: Thenatureof the problem 3: Building

More information

Symantec Security Monitoring Services

Symantec Security Monitoring Services 24x7 real-time security monitoring and protection Protect corporate assets from malicious global threat activity before it impacts your network. Partnering with Symantec skilled and experienced analysts

More information

ForeScout ControlFabric TM Architecture

ForeScout ControlFabric TM Architecture ForeScout ControlFabric TM Architecture IMPROVE MULTI-VENDOR SOLUTION EFFECTIVENESS, RESPONSE AND WORKFLOW AUTOMATION THROUGH COLLABORATION WITH INDUSTRY-LEADING TECHNOLOGY PARTNERS. The Challenge 50%

More information

Apex Information Security Policy

Apex Information Security Policy Apex Information Security Policy Table of Contents Sr.No Contents Page No 1. Objective 4 2. Policy 4 3. Scope 4 4. Approval Authority 5 5. Purpose 5 6. General Guidelines 7 7. Sub policies exist for 8

More information

Defense in Depth Security in the Enterprise

Defense in Depth Security in the Enterprise Defense in Depth Security in the Enterprise Mike Mulville SAIC Cyber Chief Technology Officer MulvilleM@saic.com Agenda The enterprise challenge - threat; vectors; and risk Traditional data protection

More information

The Device Has Left the Building

The Device Has Left the Building The Device Has Left the Building Mobile Security Made Easy With Managed PKI Christian Brindley Principal Systems Engineer, Symantec Identity and Information Protection Agenda 1 2 3 Mobile Trends and Use

More information

INFORMATION ASSURANCE DIRECTORATE

INFORMATION ASSURANCE DIRECTORATE National Security Agency/Central Security Service INFORMATION ASSURANCE DIRECTORATE CGS Port Security Port Security helps to control access to logical and physical ports, protocols, and services. This

More information

Apocalypse Now? MSc. Ivica Ostojic CISSP, CISM. Thursday, November 5, Cisco Systems, Inc. All rights reserved. 1

Apocalypse Now? MSc. Ivica Ostojic CISSP, CISM. Thursday, November 5, Cisco Systems, Inc. All rights reserved. 1 Apocalypse Now? MSc. Ivica Ostojic CISSP, CISM 2008 Cisco Systems, Inc. All rights reserved. 1 Warning Disclaimer - Upozorenje 2007 Cisco Systems, Inc. All rights reserved. 2 Warning Disclaimer - Upozorenje

More information

INFORMATION ASSURANCE DIRECTORATE

INFORMATION ASSURANCE DIRECTORATE National Security Agency/Central Security Service INFORMATION ASSURANCE DIRECTORATE CGS Risk Monitoring Risk Monitoring assesses the effectiveness of the risk decisions that are made by the Enterprise.

More information

IC B01: Internet Security Threat Report: How to Stay Protected

IC B01: Internet Security Threat Report: How to Stay Protected IC B01: Internet Security Threat Report: How to Stay Protected Piero DePaoli Director, Product Marketing IC B01: Internet Security Threat Report: How to Stay Protected 1 Topics 1 Targeted Attacks 2 Spam

More information

Symantec Protection Engine

Symantec Protection Engine Ian McShane Senior Manager, Product Management Kevin Kingston Senior Product Manager 1 Where is your data? 2 What s the problem? File uploads You shouldn t trust any of them. Ever. File sharing You shouldn

More information

The next generation of knowledge and expertise

The next generation of knowledge and expertise The next generation of knowledge and expertise UNDERSTANDING FISMA REPORTING REQUIREMENTS 1 HTA Technology Security Consulting., 30 S. Wacker Dr, 22 nd Floor, Chicago, IL 60606, 708-862-6348 (voice), 708-868-2404

More information

Cyber Security Program

Cyber Security Program Cyber Security Program Cyber Security Program Goals and Objectives Goals Provide comprehensive Security Education and Awareness to the University community Build trust with the University community by

More information

Symantec Network Access Control Starter Edition

Symantec Network Access Control Starter Edition Simplified endpoint compliance Overview makes it easy to begin implementing a network access control solution. It offers a subset of Symantec Network Access Control functionality that can be completely

More information

GDPR: An Opportunity to Transform Your Security Operations

GDPR: An Opportunity to Transform Your Security Operations GDPR: An Opportunity to Transform Your Security Operations McAfee SIEM solutions improve breach detection and response Is your security operations GDPR ready? General Data Protection Regulation (GDPR)

More information

Data Sheet: Endpoint Security Symantec Network Access Control Starter Edition Simplified endpoint enforcement

Data Sheet: Endpoint Security Symantec Network Access Control Starter Edition Simplified endpoint enforcement Simplified endpoint enforcement Overview makes it easy to begin implementing a network access control solution. It offers a subset of Symantec Network Access Control functionality that can be completely

More information

DOD Medical Device Cybersecurity Considerations

DOD Medical Device Cybersecurity Considerations Enedina Guerrero, Acting Chief, Incident Mgmt. Section, Cyber Security Ops Branch 2015 Defense Health Information Technology Symposium DOD Medical Device Cybersecurity Considerations 1 DHA Vision A joint,

More information

Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure

Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure Executive Order 13800 Update July 2017 In Brief On May 11, 2017, President Trump issued Executive Order 13800, Strengthening

More information

SearchInform DLP. Data Loss Prevention and Insider Threat Security

SearchInform DLP. Data Loss Prevention and Insider Threat Security SearchInform DLP Data Loss Prevention and Insider Threat Security SearchInform Today Over 2000 customers in 17 countries Over 11 years on the DLP market, 22 years in the IT industry SearchInform DLP monitors

More information

PKI is Alive and Well: The Symantec Managed PKI Service

PKI is Alive and Well: The Symantec Managed PKI Service PKI is Alive and Well: The Symantec Managed PKI Service Marty Jost Product Marketing, User Authentication Lance Handorf Technical Enablement, PKI Solutions 1 Agenda 1 2 3 PKI Background: Problems and Solutions

More information

BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE

BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE 1 WHAT IS YOUR SITUATION? Excel spreadsheets Manually intensive Too many competing priorities Lack of effective reporting Too many consultants Not

More information

RSA Data Loss Prevention: Policy to Remediation

RSA Data Loss Prevention: Policy to Remediation RSA Data Loss Prevention: Policy to Remediation Christian Hewitt, CISSP 1 RSA Security Management & Compliance Vision Delivering Visibility, Intelligence and Governance 2 Problem Definition You have a

More information

Accelerate GDPR compliance with the Microsoft Cloud

Accelerate GDPR compliance with the Microsoft Cloud Regional Forum on Cybersecurity in the Era of Emerging Technologies & the Second Meeting of the Successful Administrative Practices -2017 Cairo, Egypt 28-29 November 2017 Accelerate GDPR compliance with

More information

National College for High Speed Rail DATA BREACH NOTIFICATION PROCEDURE

National College for High Speed Rail DATA BREACH NOTIFICATION PROCEDURE National College for High Speed Rail DATA BREACH NOTIFICATION PROCEDURE Document Reference Version Author Owner Workstream / Business area Classification Approval Level Version approval date Review schedule

More information

Piero DePaoli, Director, Product Marketing Scott Sawoya, Senior Manager, Product Management. SR B19: Symantec Endpoint Protection 12 Customer Panel

Piero DePaoli, Director, Product Marketing Scott Sawoya, Senior Manager, Product Management. SR B19: Symantec Endpoint Protection 12 Customer Panel SR B19: Symantec Endpoint Protection 12 Customer Panel Piero DePaoli, Director, Product Marketing Scott Sawoya, Senior Manager, Product Management 1 Panelists Jeff Marsh Christian Sosa David Nguyen Presentation

More information

Post-Secondary Institution Data-Security Overview and Requirements

Post-Secondary Institution Data-Security Overview and Requirements Post-Secondary Institution Data-Security Overview and Tiina K.O. Rodrigue, EdDc, CISSP, CISM, PMP, CSM, CEA, ITIL, ISC2 Compliance Mapper, A+ Senior Advisor Cybersecurity - 2017 Agenda Who needs to worry

More information

STUDENT GUIDE Risk Management Framework Step 1: Categorization of the Information System

STUDENT GUIDE Risk Management Framework Step 1: Categorization of the Information System Slide 1 RMF Overview RMF Module 1 RMF takes into account the organization as a whole, including strategic goals and objectives and relationships between mission/business processes, the supporting information

More information

Ransomware. How to protect yourself?

Ransomware. How to protect yourself? Ransomware How to protect yourself? ED DUGUID, CISSP, VCP CONSULTANT, WEST CHESTER CONSULTANTS Ransomware Ransomware is a type of malware that restricts access to the infected computer system in some way,

More information

Boston Chapter AGA 2018 Regional Professional Development Conference Cyber Security MAY 2018

Boston Chapter AGA 2018 Regional Professional Development Conference Cyber Security MAY 2018 Boston Chapter AGA 2018 Regional Professional Development Conference Cyber Security BRANDEIS UNIVERSITY PROFESSOR ERICH SCHUMANN MAY 2018 1 Chinese military strategist Sun Tzu: Benchmark If you know your

More information

Data Privacy in Your Own Backyard

Data Privacy in Your Own Backyard White paper Data Privacy in Your Own Backyard Staying Secure Under New GDPR Employee Internet Monitoring Rules www.proofpoint.com TABLE OF CONTENTS INTRODUCTION... 3 KEY GDPR PROVISIONS... 4 GDPR AND EMPLOYEE

More information

Continuous protection to reduce risk and maintain production availability

Continuous protection to reduce risk and maintain production availability Industry Services Continuous protection to reduce risk and maintain production availability Managed Security Service Answers for industry. Managing your industrial cyber security risk requires world-leading

More information

Symantec Network Access Control Starter Edition

Symantec Network Access Control Starter Edition Simplified endpoint compliance Overview makes it easy to begin implementing a network access control solution. It offers a subset of Symantec Network Access Control functionality that can be completely

More information

Rocky Mountain Cyberspace Symposium 2018 DoD Cyber Resiliency

Rocky Mountain Cyberspace Symposium 2018 DoD Cyber Resiliency Rocky Mountain Cyberspace Symposium 2018 DoD Cyber Resiliency Mr. Ed Brindley Acting Deputy Cyber Security Department of Defense 7 March 2018 SUPPORT THE WARFIGHTER 2 Overview Secretary Mattis Priorities

More information

Inside Symantec O 3. Sergi Isasi. Senior Manager, Product Management. SR B30 - Inside Symantec O3 1

Inside Symantec O 3. Sergi Isasi. Senior Manager, Product Management. SR B30 - Inside Symantec O3 1 Inside Symantec O 3 Sergi Isasi Senior Manager, Product Management SR B30 - Inside Symantec O3 1 Agenda 2 Cloud: Opportunity And Challenge Cloud Private Cloud We should embrace the Cloud to respond to

More information

Plenary Session: Branch Cybersecurity Controls Thursday, February 22 1:15 p.m. 2:15 p.m.

Plenary Session: Branch Cybersecurity Controls Thursday, February 22 1:15 p.m. 2:15 p.m. Plenary Session: Branch Cybersecurity Controls Thursday, February 22 1:15 p.m. 2:15 p.m. Cybersecurity is a top priority for the financial services industry. Firms dedicate significant resources every

More information

Google Cloud & the General Data Protection Regulation (GDPR)

Google Cloud & the General Data Protection Regulation (GDPR) Google Cloud & the General Data Protection Regulation (GDPR) INTRODUCTION General Data Protection Regulation (GDPR) On 25 May 2018, the most significant piece of European data protection legislation to

More information

Symantec Encryption Management Server and Symantec Data Loss Prevention. Integration Guide

Symantec Encryption Management Server and Symantec Data Loss Prevention. Integration Guide Symantec Encryption Management Server and Symantec Data Loss Prevention Integration Guide The software described in this book is furnished under a license agreement and may be used only in accordance

More information

Software Management Nuts and Bolts

Software Management Nuts and Bolts Software Management Nuts and Bolts Joel Smith & Rene Kolga Sr. Principal Support Engineer Sr. Product Manager 1 Presentation Agenda 1 Introduction 2 Managing the Software Catalog 3 Rules, Detection and

More information

Symantec Network Access Control Starter Edition

Symantec Network Access Control Starter Edition Symantec Network Access Control Starter Edition Simplified endpoint compliance Overview makes it easy to begin implementing a network access control solution. It offers a subset of Symantec Network Access

More information

SIEM: Five Requirements that Solve the Bigger Business Issues

SIEM: Five Requirements that Solve the Bigger Business Issues SIEM: Five Requirements that Solve the Bigger Business Issues After more than a decade functioning in production environments, security information and event management (SIEM) solutions are now considered

More information

Virginia Commonwealth University School of Medicine Information Security Standard

Virginia Commonwealth University School of Medicine Information Security Standard Virginia Commonwealth University School of Medicine Information Security Standard Title: Scope: Personnel Security Standard This standard is applicable to all VCU School of Medicine personnel. Approval

More information

Identity Theft Prevention Policy

Identity Theft Prevention Policy Identity Theft Prevention Policy Purpose of the Policy To establish an Identity Theft Prevention Program (Program) designed to detect, prevent and mitigate identity theft in connection with the opening

More information

ELIZABETH CITY STATE UNIVERSITY Web Page Policy

ELIZABETH CITY STATE UNIVERSITY Web Page Policy Adopted: 06/14/05 ELIZABETH CITY STATE UNIVERSITY Web Page Policy 1. Purpose of Policy The World Wide Web allows Elizabeth City State University staff, faculty, and students to promote university educational

More information

Building and Testing an Effective Incident Response Plan

Building and Testing an Effective Incident Response Plan 14th Annual Building and Testing an Effective Incident Response Plan John Gelinne Deloitte & Touche LLP jgelinne@deloitte.com www.linkedin.com/in/jgelinne No battle plan ever survives contact with the

More information

Level Access Information Security Policy

Level Access Information Security Policy Level Access Information Security Policy INFOSEC@LEVELACCESS.COM Table of Contents Version Control... 3 Policy... 3 Commitment... 3 Scope... 4 Information Security Objectives... 4 + 1.800.889.9659 INFOSEC@LEVELACCESS.COM

More information

Carbon Black PCI Compliance Mapping Checklist

Carbon Black PCI Compliance Mapping Checklist Carbon Black PCI Compliance Mapping Checklist The following table identifies selected PCI 3.0 requirements, the test definition per the PCI validation plan and how Carbon Black Enterprise Protection and

More information

RSA Solution Brief. The RSA Solution for VMware. Key Manager RSA. RSA Solution Brief

RSA Solution Brief. The RSA Solution for VMware. Key Manager RSA. RSA Solution Brief RSA Solution Brief The RSA Solution for VMware View: Managing Securing the the Lifecycle Virtual of Desktop Encryption Environment Keys with RSA Key Manager RSA Solution Brief 1 According to the Open Security

More information

Enterprise Vault Overview Nedeljko Štefančić

Enterprise Vault Overview Nedeljko Štefančić Enterprise Vault Overview Nedeljko Štefančić 2015 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, the Checkmark Logo, Veritas, and the Veritas Logo are trademarks or registered

More information

Protect Your Endpoint, Keep Your Business Safe. White Paper. Exosphere, Inc. getexosphere.com

Protect Your Endpoint, Keep Your Business Safe. White Paper. Exosphere, Inc. getexosphere.com Protect Your Endpoint, Keep Your Business Safe. White Paper Exosphere, Inc. getexosphere.com White Paper Today s Threat Landscape Cyber attacks today are increasingly sophisticated and widespread, rendering

More information

Fabrizio Patriarca. Come creare valore dalla GDPR

Fabrizio Patriarca. Come creare valore dalla GDPR Fabrizio Patriarca Come creare valore dalla GDPR Disclaimer Notice: Clients are responsible for ensuring their own compliance with various laws and regulations, including the European Union General Data

More information

To the Designer Where We Need Your Help

To the Designer Where We Need Your Help To the Designer Where We Need Your Help Slide 7 Can you provide a similar high-res image? Slide 15 Can you polish up the content so it s not an eye chart? Slide 21, 22, 23 Can you polish up the content

More information

Oracle Database Security Assessment Tool

Oracle Database Security Assessment Tool Oracle Database Security Assessment Tool With data breaches growing every day along with the evolving set of data protection and privacy regulations, protecting business sensitive and regulated data is

More information

New York Department of Financial Services Cybersecurity Regulation Compliance and Certification Deadlines

New York Department of Financial Services Cybersecurity Regulation Compliance and Certification Deadlines New York Department of Financial Services Cybersecurity Regulation Compliance and Certification Deadlines New York Department of Financial Services ( DFS ) Regulation 23 NYCRR 500 requires that entities

More information

Securing global enterprise with innovation

Securing global enterprise with innovation IBM Cybersecurity Securing global enterprise with innovation Shamla Naidoo VP, IBM Global CISO August 2018 Topics 01 02 03 Securing Large Complex Enterprise Accelerating With Artificial Intelligence And

More information

Implementing Executive Order and Presidential Policy Directive 21

Implementing Executive Order and Presidential Policy Directive 21 March 26, 2013 Implementing Executive Order 13636 and Presidential Policy Directive 21 Mike Smith, Senior Cyber Policy Advisor, Office of Electricity Delivery and Energy Reliability, Department of Energy

More information

Technical Brief Veritas Technical Education Services

Technical Brief Veritas Technical Education Services Veritas Desktop and Laptop Option 9.3 The Veritas Desktop and Laptop Option provides automated file protection for Desktops and laptops. Protection is provided regardless of whether the computer is connected

More information

Best Practices in Securing a Multicloud World

Best Practices in Securing a Multicloud World Best Practices in Securing a Multicloud World Actions to take now to protect data, applications, and workloads We live in a multicloud world. A world where a multitude of offerings from Cloud Service Providers

More information

Reviewed by ADM(RS) in accordance with the Access to Information Act. Information UNCLASSIFIED.

Reviewed by ADM(RS) in accordance with the Access to Information Act. Information UNCLASSIFIED. Assistant Deputy Minister (Review Services) Reviewed by in accordance with the Access to Information Act. Information UNCLASSIFIED. Security Audits: Management Action Plan Follow-up December 2015 1850-3-003

More information

Securing the New Perimeter:

Securing the New Perimeter: Microsoft Future Decoded Securing the New Perimeter: Identity as the Keystone with Heathrow Airport 01/11/2018 Divider Title Slide Name Here Some Facts & Figures.. Passengers Team Heathrow Flights Size

More information

McAfee epolicy Orchestrator

McAfee epolicy Orchestrator McAfee epolicy Orchestrator Centrally get, visualize, share, and act on security insights Security management requires cumbersome juggling between tools and data. This puts the adversary at an advantage

More information

The Cloud Identity Crisis

The Cloud Identity Crisis The Cloud Identity Crisis Strategies for Identity-based Access Control for Cloud Applications Marty Jost Symantec Product Marketing Jim Brigham O3 Product Management 1 Agenda Cloud Customer Experiences

More information

Introduction Challenges with using ML Guidelines for using ML Conclusions

Introduction Challenges with using ML Guidelines for using ML Conclusions Introduction Challenges with using ML Guidelines for using ML Conclusions Misuse detection Exact descriptions of known bad behavior Anomaly detection Deviations from profiles of normal behavior First proposed

More information

DLP GUIDE

DLP GUIDE www.safetica.com DLP GUIDE Content Introduction to context DLP protecting data with Safetica... 3 How does Safetica protect data?... 3 Exercise: Use-cases for most common scenarios... 4 Protecting data

More information

SYSTEMS ASSET MANAGEMENT POLICY

SYSTEMS ASSET MANAGEMENT POLICY SYSTEMS ASSET MANAGEMENT POLICY Policy: Asset Management Policy Owner: CIO Change Management Original Implementation Date: 7/1/2017 Effective Date: 7/1/2017 Revision Date: Approved By: NIST Cyber Security

More information

DFARS Compliance. SLAIT Consulting SECURITY SERVICES. Mike D Arezzo Director of Security Services. SLAITCONSULTING.com

DFARS Compliance. SLAIT Consulting SECURITY SERVICES. Mike D Arezzo Director of Security Services. SLAITCONSULTING.com DFARS Compliance SLAIT Consulting SECURITY SERVICES Mike D Arezzo Director of Security Services Introduction 18+ year career in Information Technology and Security General Electric (GE) as Software Governance

More information

Virginia State University Policies Manual. Title: Information Security Program Policy: 6110

Virginia State University Policies Manual. Title: Information Security Program Policy: 6110 Purpose Virginia State University (VSU) uses information to perform the business services and functions necessary to fulfill its mission. VSU information is contained in many different mediums including

More information

Contracting in the Dark World: Special Considerations for Classified Contracting

Contracting in the Dark World: Special Considerations for Classified Contracting Contracting in the Dark World: Special Considerations for Classified Contracting Michelle Sutphin, BAE Systems Karen Hermann Mark Ries Agenda Handling Classified Protests and Claims: Lessons Learned and

More information

SOLUTION BRIEF RSA NETWITNESS NETWORK VISIBILITY-DRIVEN THREAT DEFENSE

SOLUTION BRIEF RSA NETWITNESS NETWORK VISIBILITY-DRIVEN THREAT DEFENSE RSA NETWITNESS NETWORK VISIBILITY-DRIVEN THREAT DEFENSE KEY CUSTOMER BENEFITS: Gain complete visibility across enterprise networks Continuously monitor all traffic Faster analysis reduces risk exposure

More information

HIPAA RISK ADVISOR SAMPLE REPORT

HIPAA RISK ADVISOR SAMPLE REPORT HIPAA RISK ADVISOR SAMPLE REPORT HIPAA Security Analysis Report The most tangible part of any annual security risk assessment is the final report of findings and recommendations. It s important to have

More information

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE EXECUTIVE SUMMARY ALIGNING CYBERSECURITY WITH RISK The agility and cost efficiencies

More information

Open Data Policy City of Irving

Open Data Policy City of Irving Open Data Policy City of Irving 1. PURPOSE: The City of Irving is committed to fostering open, transparent, and accessible city government, and recognizes that by sharing data freely, the city will generate

More information

How AlienVault ICS SIEM Supports Compliance with CFATS

How AlienVault ICS SIEM Supports Compliance with CFATS How AlienVault ICS SIEM Supports Compliance with CFATS (Chemical Facility Anti-Terrorism Standards) The U.S. Department of Homeland Security has released an interim rule that imposes comprehensive federal

More information

University Information Systems. Administrative Computing Services. Contingency Plan. Overview

University Information Systems. Administrative Computing Services. Contingency Plan. Overview University Information Systems Administrative Computing Services Contingency Plan Overview Last updated 01/11/2005 University Information Systems Administrative Computing Services Contingency Plan Overview

More information

Symantec Endpoint Protection Integration Component User's Guide. Version 7.0

Symantec Endpoint Protection Integration Component User's Guide. Version 7.0 Symantec Endpoint Protection Integration Component User's Guide Version 7.0 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms

More information

What It Takes to be a CISO in 2017

What It Takes to be a CISO in 2017 What It Takes to be a CISO in 2017 Doug Copley Deputy CISO Sr. Security & Privacy Strategist February 2017 IMAGINE You re the CISO In Bangladesh Of a bank On a Friday when you re closed You realize 6 huge

More information

1110 Cool Things Your Firewall Should Do. Extend beyond blocking network threats to protect, manage and control application traffic

1110 Cool Things Your Firewall Should Do. Extend beyond blocking network threats to protect, manage and control application traffic 1110 Cool Things Your Firewall Should Do Extend beyond blocking network threats to protect, manage and control application traffic Table of Contents The Firewall Grows Up 1 What does SonicWALL Application

More information

INFORMATION ASSURANCE DIRECTORATE

INFORMATION ASSURANCE DIRECTORATE National Security Agency/Central Security Service INFORMATION ASSURANCE DIRECTORATE CGS Signature Repository A Signature Repository provides a group of signatures for use by network security tools such

More information

INFORMATION ASSURANCE DIRECTORATE

INFORMATION ASSURANCE DIRECTORATE National Security Agency/Central Security Service INFORMATION ASSURANCE DIRECTORATE Digital Policy Management consists of a set of computer programs used to generate, convert, deconflict, validate, assess

More information

Secure Government Computing Initiatives & SecureZIP

Secure Government Computing Initiatives & SecureZIP Secure Government Computing Initiatives & SecureZIP T E C H N I C A L W H I T E P A P E R WP 700.xxxx Table of Contents Introduction FIPS 140 and SecureZIP Ensuring Software is FIPS 140 Compliant FIPS

More information