Now? Ron LaPedis, CISSP-ISSAP, ISSMP, MBCP, MBCI SPYRUS, Inc. Michael F. Angelo, CSA NetIQ Corporation
|
|
- Isabel Stevens
- 5 years ago
- Views:
Transcription
1 Bring Your Own Computer To Title Work of - Presentation What Now? Ron LaPedis, CISSP-ISSAP, ISSMP, MBCP, MBCI SPYRUS, Inc Michael F. Angelo, CSA NetIQ Corporation
2 Bring your own computer BYOC is Consumerization of IT How It Happens Organizational Benefits and Impact Action Today, Tomorrow, Future 2
3 Bring your own computer Summary Questions Pop Down to the Pub x 3
4 BYOC is Consumerization of IT 4
5 Changing the Face of Work What Is Consumerization? Consumer-based Social Media for advertising Consumer-based Financial Services for accounts receivable Use of consumer or Free Software for sustaining corporate infrastructure And What we are going to focus on: Use of personal equipment in the corporate environment 5
6 Evolution Consumerization of IT Mice Keyboards Monitors Home equipment for remote access Mobile Phone Wi-Fi Card Flash Drive PDA Music Player Smart Phone Desktop / Laptop Use of employee owned resources for company work 6
7 HOW WIDESPREAD IS consumerization? Employee Purchased Primary Machine Laptop PDA Mobile Phone Smart Phone Source:In-Stat 7
8 How It Happens 8
9 How It Happens Don t want to use your Pentium III with 256mb RAM & 60gb HD Don t want to use your OS Don t want to use IE6 Don t want to use your software tools Don t want to be locked down 9
10 What is your policy? Secretive Ignored Unofficially Supported Officially Supported Subsidized 10
11 Benefit and Impact 11
12 Benefits and drawbacks Companies save 9-40% on equipment purchase cost * Exit the hardware business Employee satisfaction Higher productivity Longer work hours Helpdesk Knowledge Loaner Hardware Capability Configuration Maintenance / warranty Upgrades Software Interoperability Upgrades / updates Vulnerabilities *Source:Gartner 12
13 Organizational impact - ownership Logins Personal login information on corporate machine Social Networks / Professional Associations Corporate login information on personal machine VPN Configuration User IDs and passwords stored in browsers Software Ownership Personal software Restricted use licenses Corporate software on home equipment 13
14 Legislated Privacy Organizational impact - legal Issues EU data protection act USA HIPAA, SOX, GLBA Country, state/province, local (e.g. CA SB 1386) More laws pending Cross contamination Corporate backup includes personal information Personal backup includes corporate information 14
15 Information Leakage Family & friends Device Loss Virus Personal Spear Fishing Increased Exposure to Threats Surfing at Home <> Surfing at Work Torrents Organizational impact - Security 15
16 Organizational impact - Non Obvious Issues Acceptable use policies How to apply to personal machines? Out processing of individuals How do you know organizational data is removed from the employee machine? Software PST files Passwords / wireless / VPN Access Residual data Employee / corporate backups 16
17 Action To Take 17
18 Action to take today Is it already there? Run, don t walk to your legal staff Decide if you will allow Consumerization Don t wait for it to happen and then rush to formulate policy and procedures Decision must explicitly include all possible components Decision must be extended as new technology becomes available 18
19 Action today - Define policies Balance: Corporate vs Employee vs Customer Corporate: Must comply with laws Must maintain fiduciary responsibility Must not expose corporate assets At a minimum should address Employee responsibility Acceptable use Protection of assets 19
20 Action today - Incident response plan Even with Policies & Procedures accidents can happen Need incident response plan 20
21 Technical Solutions 21
22 Action today Security 101: Keep secret stuff separate from non secret stuff Keep corporate stuff separate from personal stuff Separate personal and corporate identities Compartmentalize the environments to reduce the risk of accidents. 22
23 lication isolation Separate user accounts Action today - Compartmentalization Virtual Desktop Infrastructure (VDI) Hypervisor on PC OS or Hypervisor on USB drive Windows-on-a-stick PC-in-my-pocket 23
24 Work and Personal Mac, PC, or Linux Fast user switching Action today - Separate user accounts Separate Context Subject to worms and viruses Can share information via common file system User 1 User 2 Host OS Computer Separate Users 24
25 Action today- VDI Virtual Desktop Infrastructure (VDI) 25
26 Aka Hosted Hypervisor Still subject to worms and viruses Action today - Type 2 hypervisor Harder to accidentally share information but cross-contamination still possible s Hosted OS s Hypervisor Host OS Computer Type 2 Hypervisor 26
27 Action not-quite-today - Type 1 hypervisor Aka Native Hypervisor Almost impossible to share information Only common attack is hypervisor itself Each OS can be attacked separately OS 1 OS 2 Hypervisor Computer Type 1 Hypervisor 27
28 Action Today - Type 2 portable hypervisor OS Partition Operating System User Settings Hypervisor File File File Hosted (Type 2) VM Running PC loads hypervisor from device OS from device and OS from host HD completely separated Does not prevent attack via host OS Does not protect the information if device is lost Does not stop access after employment 28
29 Action today - Virtualized OS-on-a-stick Encrypted OS Partition Operating System User Settings Boot Partition OS + Virtual Machine File File File On-board cryptography authenticates and protects Boots OS from device, loads hypervisor, then loads hosted OS Host provides mouse, keyboard, RAM Encryption can protect information if device is lost Limited to OS on device Management system can block device when employee leaves 29
30 Action today - Native OS-on-a-stick Encrypted OS Partition Operating System User Settings Boot Partition Boot Loader File File File On-board cryptography authenticates and protects Boots OS directly from device Host provides mouse, keyboard, RAM Encryption can protect information if device is lost Limited to OS on device Management system can block device when employee leaves 30
31 Native versus hypervisor lications Hypervisor lications PC Hardware PC Hardware Virtualized OS Native OS Note the addidonal overhead and larger agack surface of a hypervisor- based approach since two operadng systems are required. It will be nodceably slower and possibly less secure. 31
32 Action tomorrow - Native OS-on-a-stick + TPM Encrypted OS Partition Operating System User Settings Boot Partition Secure Boot Loader File File File Provides a mechanism to generate and measure system characteristics upon which a security decision can be made. In almost all commercial grade computers For more info see: the Trusted Computing Group 32
33 Action tomorrow: Native OS-on-a-stick + TPM Can also be used to seal information to a snapshot A snapshot consists of information relevant to defining an identity or entity Information can not be unsealed if any element used to seal is not an exact match or available. 33
34 Summary 34
35 Immediately Summary Consult with legal dept Review current information ownership / protection policies and make appropriate changes Put Consumerization policies in place Separate user accounts 35
36 Summary Longer Term Legal policies and procedures Enforce them! Technical policies and procedures ly, rinse, repeat Technical Tools Isolate applications, virtualization 36
37 Thank You Michael F. Angelo NetIQ Corporation 1233 West Loop South, Ste 810 Houston, TX Ron LaPedis SPYRUS, Inc Hartog Dr. San Jose, CA
Plug into more places
USB EVERYWHERE Plug into more places with our new family of USB flash drives USB ports are popping up everywhere... With more ports in more places, I can plug in just about anywhere SanDisk Cruzer USB
More informationUniversity of Pittsburgh Security Assessment Questionnaire (v1.7)
Technology Help Desk 412 624-HELP [4357] technology.pitt.edu University of Pittsburgh Security Assessment Questionnaire (v1.7) Directions and Instructions for completing this assessment The answers provided
More informationWeak Spots Enterprise Mobility Management. Dr. Johannes Hoffmann
Weak Spots Enterprise Mobility Management Dr. Johannes Hoffmann Personal details TÜV Informationstechnik GmbH TÜV NORD GROUP Dr. Johannes Hoffmann IT Security Business Security & Privacy Main focus: Mobile
More informationYour Own Virtual Playground. CS 1585 :: Doug McGeehan
Your Own Virtual Playground CS 1585 :: Doug McGeehan Overview Follow these steps on your personal laptop or home PC. 1. 2. 3. 4. 5. Open this URL in your browser: http://tiny.cc/dsl-vm Download and Install
More informationName of Policy: Computer Use Policy
Page: Page 1 of 5 Director Approved By: Approval Date: Reason(s) for Change Responsible: Corporate Services Leadership April 22, Reflect current technology and practice Corporate Services Leadership Leadership
More informationTrinity Multi Academy Trust
Trinity Multi Academy Trust Policy: Bring Your Own Device Date of review: October 2018 Date of next review: October 2020 Lead professional: Status: Director of ICT and Data Non-Statutory Page 1 of 5 Scope
More informationVirtual Machine Encryption Security & Compliance in the Cloud
Virtual Machine Encryption Security & Compliance in the Cloud Pius Graf Director Sales Switzerland 27.September 2017 Agenda Control Your Data In The Cloud Overview Virtual Machine Encryption Architecture
More informationitexamdump 최고이자최신인 IT 인증시험덤프 일년무료업데이트서비스제공
itexamdump 최고이자최신인 IT 인증시험덤프 http://www.itexamdump.com 일년무료업데이트서비스제공 Exam : CISA Title : Certified Information Systems Auditor Vendor : ISACA Version : DEMO Get Latest & Valid CISA Exam's Question and
More informationDepartment of Public Health O F S A N F R A N C I S C O
PAGE 1 of 9 Category: Information Technology Security and HIPAA DPH Unit of Origin: Department of Public Health Policy Owner: Phillip McDown, CISSP Phone: 255-3577 CISSPCISSP/C Distribution: DPH-wide Other:
More informationCompTIA A+ Certification ( ) Study Guide Table of Contents
CompTIA A+ Certification (220-902) Study Guide Table of Contents Course Introduction About This Course About CompTIA Certifications Module 1 / Supporting Windows 1 Module 1 / Unit 1 Windows Operating System
More informationBRING YOUR OWN DEVICE: POLICY CONSIDERATIONS
WHITE PAPER BRING YOUR OWN DEVICE: POLICY CONSIDERATIONS INTRODUCTION As more companies embrace the broad usage of individual liable mobile devices or BYOD for access to corporate applications and data,
More informationCanadian Access Federation: Trust Assertion Document (TAD)
1. Canadian Access Federation Participant Information 1.1.1. Organization name: DOUGLAS COLLEGE 1.1.2. Information below is accurate as of this date: November 16, 2017 1.2 Identity Management and/or Privacy
More informationTrusted Computing Today: Benefits and Solutions
Trusted Computing Today: Benefits and Solutions Brian D. Berger EVP Marketing & Sales Wave Systems Corp. bberger@wavesys.com Copyright 2009 Trusted Computing Group Agenda TCG Vision TCG Benefits Solution
More informationDisk Encryption Buyers Guide
Briefing Paper Disk Encryption Buyers Guide Why not all solutions are the same and how to choose the one that s right for you.com CommercialSector Introduction We have written this guide to help you understand
More information<Criminal Justice Agency Name> Personally Owned Device Policy. Allowed Personally Owned Device Policy
Policy Title: Effective Date: Revision Date: Approval(s): LASO: CSO: Agency Head: Allowed Personally Owned Device Policy Every 2 years or as needed Purpose: A personally owned information system or device
More informationA practical guide to IT security
Data protection A practical guide to IT security Ideal for the small business The Data Protection Act states that appropriate technical and organisational measures shall be taken against unauthorised or
More informationWhitepaper. Endpoint Strategy: Debunking Myths about Isolation
Whitepaper Endpoint Strategy: Debunking Myths about Isolation May 2018 Endpoint Strategy: Debunking Myths about Isolation Endpoints are, and have always been, a major cyberattack vector. Attackers, aiming
More informationIntroduction to Information Security Dr. Rick Jerz
Introduction to Information Security Dr. Rick Jerz 1 Goals Explain the various types of threats to the security of information Discuss the different categorizations of security technologies and solutions
More informationAbout the XenClient Enterprise Solution
About the XenClient Enterprise Solution About the XenClient Enterprise Solution About the XenClient Enterprise Solution XenClient Enterprise is a distributed desktop virtualization solution that makes
More informationCSIRT in general CSIRT Service Categories Reactive Services Proactive services Security Quality Management Services CSIRT. Brmlab, hackerspace Prague
Brmlab, hackerspace Prague Lightning talks, November 2016 in general in general WTF is an? in general WTF is an? Computer Security in general WTF is an? Computer Security Incident Response in general WTF
More informationData Handling Security Policy
Data Handling Security Policy May 2018 Newark Orchard School Data Handling Security Policy May 2018 Page 1 Responsibilities for managing IT equipment, removable storage devices and papers, in the office,
More informationTPM v.s. Embedded Board. James Y
TPM v.s. Embedded Board James Y What Is A Trusted Platform Module? (TPM 1.2) TPM 1.2 on the Enano-8523 that: How Safe is your INFORMATION? Protects secrets from attackers Performs cryptographic functions
More informationDIRECTIVE ON INFORMATION TECHNOLOGY SECURITY FOR BANK PERSONNEL. June 14, 2018
DIRECTIVE ON INFORMATION TECHNOLOGY SECURITY FOR BANK PERSONNEL June 14, 2018 A. Overriding Objective 1.1 This Directive establishes the rules and instructions for Bank Personnel with respect to Information
More informationTechnology Security Failures Common security parameters neglected. Presented by: Tod Ferran
Technology Security Failures Common security parameters neglected Presented by: Tod Ferran October 31 st, 2015 1 HALOCK Overview Founded in 1996 100% focus on information security Privately owned Owned
More informationBring Your Own Device
Bring Your Own Device Individual Liable User Contents Introduction 3 Policy Document Objectives & Legal Disclaimer 3 Eligibility Considerations 4 Reimbursement Considerations 4 Security Considerations
More informationMobile security: Tips and tricks for securing your iphone, Android and other mobile devices
Mobile security: Tips and tricks for securing your iphone, Android and other mobile devices Presented by Michael Harris [MS, CISSP, WAPT] Systems Security Analyst University of Missouri Overview What data
More informationGUIDANCE ON ELECTRONIC VOTING SYSTEM PREPARATION AND SECURITY
September, 2016 GUIDANCE ON ELECTRONIC VOTING SYSTEM PREPARATION AND SECURITY As a reminder for counties, and refresher on good cyber hygiene practices, DOS recommends the following procedures in the preparation
More informationNighthawk AC2600 Smart WiFi Router
Performance & Use Dual Core Processor Extreme Speed & Range MU-MIMO Streaming data to multiple devices at the same time AC2600 WiFi 800Mbps 2.4GHz + 1733Mbps 5GHz Implicit & Explicit Beamforming Powerful
More informationNighthawk AC2400 Smart WiFi Router
Performance & Use Dual Core Processor Extreme Speed & Range MU-MIMO Streaming data to multiple devices at the same time WiFi speeds up to 2400Mbps Dual-core processor Advanced features for lag-free gaming
More informationBackup, File Backup copies of individual files made in order to replace the original file(s) in case it is damaged or lost.
Glossary A Active Directory a directory service that inventories, secures and manages the users, computers, rules and other components of a Microsoft Windows network. This service is typically deployed
More informationCompTIA A+ Accelerated course for & exams
CompTIA A+ Accelerated course for 220-901 & 220-902 exams Course overview Target Audience This course is for Participants wishing to take and pass both CompTIA A+ exams (220-901 and 220-902) exam. It is
More informationSample BYOD Policy. Copyright 2015, PWW Media, Inc. All Rights Reserved. Duplication, Reproduction or Distribution by Any Means Prohibited.
Sample BYOD Policy Copyright 2015, PWW Media, Inc. All Rights Reserved. Duplication, Reproduction or Distribution by Any Means Prohibited. SAMPLE BRING YOUR OWN DEVICE POLICY TERMS OF USE This Sample Bring
More informationNighthawk AC1900 Smart WiFi Router Dual Band Gigabit
Performance & Use AC1900 1900 DUAL BAND 600+1300 RANGE AC1900 WiFi 600+1300 Mbps speeds 1GHz dual core processor Advanced features for lag-free gaming Prioritized bandwidth for streaming videos or music
More informationCOURSE OUTLINE: A+ COMPREHENSIVE
COURSE OUTLINE: A+ COMPREHENSIVE Course Outline CompTIA A+ Comprehensive Chapter Outline 1. The Path of the PC Tech What is the CompTIA A+? How to Pass the A+ Exams 2. Operational Procedures Professionalism
More informationNEW! CLOUD APPS ReadyCLOUD & genie remote access
Performance & Use AC1900 1900 DUAL BAND 600+1300 RANGE AC1900 WiFi 600+1300 Mbps speeds 1GHz Dual Core Processor Advanced features for lag-free gaming Prioritized bandwidth for streaming videos or music
More informationMU2a Authentication, Authorization & Accounting Questions and Answers with Explainations
98-367 MU2a Authentication, Authorization & Accounting Questions and Answers with Explainations Which are common symptoms of a virus infection? (Lesson 5 p 135-136) Poor system performance. Unusually low
More informationCyber Security. February 13, 2018 (webinar) February 15, 2018 (in-person)
Cyber Security Presenters: - Brian Everest, Chief Technology Officer, Starport Managed Services - Susan Pawelek, Accountant, Compliance and Registrant Regulation February 13, 2018 (webinar) February 15,
More informationSymantec Network Access Control Starter Edition
Simplified endpoint compliance Overview makes it easy to begin implementing a network access control solution. It offers a subset of Symantec Network Access Control functionality that can be completely
More informationStart the Security Walkthrough
Start the Security Walkthrough This guide will help you complete your HIPAA security risk analysis and can additionally be used for periodic review. It is based on the methodology used in PrivaPlan Stat
More informationJoe Stocker, CISSP, MCITP, VTSP Patriot Consulting
Joe Stocker, CISSP, MCITP, VTSP Patriot Consulting Microsoft Cloud Evangelist at Patriot Consulting Principal Systems Architect with 17 Years of experience Technical certifications: MCSE, MCITP Office
More informationNetworks with Cisco NAC Appliance primarily benefit from:
Cisco NAC Appliance Cisco NAC Appliance (formerly Cisco Clean Access) is an easily deployed Network Admission Control (NAC) product that allows network administrators to authenticate, authorize, evaluate,
More informationNighthawk AC1900 Smart WiFi Router Dual Band Gigabit
Performance & Use AC1900 1900 DUAL BAND 600+1300 RANGE AC1900 WiFi 600+1300 Mbps speeds 1GHz Dual Core Processor Advanced features for lag-free gaming Prioritized bandwidth for streaming videos or music
More informationIntroduction. Assessment Test. Part I
Contents Introduction Assessment Test xxix lvii Part I 220 901 1 Chapter 1 Motherboards, Processors, and Memory 3 Identifying Components of Motherboards 5 System Board Form Factors 6 System Board Components
More information1. CyberCIEGE Advanced VPNs
1. CyberCIEGE Advanced VPNs CyberCIEGE is an information assurance (IA) training tool that illustrates computer and network security principles through simulation and resource management trade-offs. CyberCIEGE
More informationSymantec Network Access Control Starter Edition
Symantec Network Access Control Starter Edition Simplified endpoint compliance Overview makes it easy to begin implementing a network access control solution. It offers a subset of Symantec Network Access
More informationAT&T Endpoint Security
AT&T Endpoint Security November 2016 Security Drivers Market Drivers Online business 24 x 7, Always on Globalization Virtual Enterprise Business Process / IT Alignment Financial Drivers CapEx / OpEx Reduction
More informationEC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led
EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led Certification: Certified Network Defender Exam: 312-38 Course Description This course is a vendor-neutral, hands-on,
More informationNEW! CLOUD APPS ReadyCLOUD & genie remote access
Performance & Use AC1900 1900 DUAL BAND 600+1300 RANGE AC1900 WiFi 600+1300 Mbps speeds 1GHz Dual Core Processor Advanced features for lag-free gaming Prioritized bandwidth for streaming videos or music
More informationSymantec Network Access Control Starter Edition
Simplified endpoint compliance Overview makes it easy to begin implementing a network access control solution. It offers a subset of Symantec Network Access Control functionality that can be completely
More informationG/On OS Security Model
Whitepaper G/On OS Security Model Technical Whitepaper with Excitor comments on CESG Guidance 1 About this document This document describes the security properties of G/On OS, which is a Linux based, client
More informationBelarc Product Description
Belarc Product Description BelManage Base Belarc's architecture is based on a single enterprise-wide server and database. There is no requirement to maintain local servers or scanners. Belarc's discovery
More informationMobile Devices prioritize User Experience
Mobile Security 1 Uniqueness of Mobile Mobile Devices are Shared More Often Mobile Devices are Used in More Locations Mobile Devices prioritize User Experience Mobile Devices have multiple personas Mobile
More informationCERTIFIED SECURE COMPUTER USER COURSE OUTLINE
CERTIFIED SECURE COMPUTER USER COURSE OUTLINE Page 1 TABLE OF CONTENT 1 COURSE DESCRIPTION... 3 2 MODULE-1: INTRODUCTION TO DATA SECURITY... 4 3 MODULE-2: SECURING OPERATING SYSTEMS... 6 4 MODULE-3: MALWARE
More informationL1: Computer Security Overview. Hui Chen, Ph.D. Dept. of Engineering & Computer Science Virginia State University Petersburg, VA 23806
L1: Computer Security Overview Hui Chen, Ph.D. Dept. of Engineering & Computer Science Virginia State University Petersburg, VA 23806 8/17/2015 CSCI 451- Fall 2015 1 Acknowledgement Many slides are or
More informationN300 WiFi Router with External Antennas
Performance & Use N300 300 SPEED N300 WiFi speed Faster downloads & Internet gaming 5dBi antennas for improved WiFi coverage WiFi range for medium-sized homes RANGE The NETGEAR Difference - Push N Connect
More informationDONE FOR YOU SAMPLE INTERNET ACCEPTABLE USE POLICY
DONE FOR YOU SAMPLE INTERNET ACCEPTABLE USE POLICY Published By: Fusion Factor Corporation 2647 Gateway Road Ste 105-303 Carlsbad, CA 92009 USA 1.0 Overview Fusion Factor s intentions for publishing an
More informationVendor: CompTIA. Exam Code: Exam Name: CompTIA A+ Certification Exam (902) Version: Demo
Vendor: CompTIA Exam Code: 220-902 Exam Name: CompTIA A+ Certification Exam (902) Version: Demo DEMO QUESTION 1 Which of the following best practices is used to fix a zero-day vulnerability on Linux? A.
More informationMobile Device policy Frequently Asked Questions April 2016
Mobile Device policy Frequently Asked Questions April 2016 In an attempt to help the St. Lawrence University community understand this policy, the following FAQ document was developed by IT in collaboration
More informationHIPAA Security and Privacy Policies & Procedures
Component of HIPAA Security Policy and Procedures Templates (Updated for HITECH) Total Cost: $495 Our HIPAA Security policy and procedures template suite have 71 policies and will save you at least 400
More informationHow to Build a Culture of Security
How to Build a Culture of Security March 2016 Table of Contents You are the target... 3 Social Engineering & Phishing and Spear-Phishing... 4 Browsing the Internet & Social Networking... 5 Bringing Your
More informationSECURITY. The changing Face and Focus. UPDATED - May Sr. Advisor/Partner at PostMark 21 years in corporate IT P&G and RJ Reynolds
SECURITY The changing Face and Focus UPDATED - May 2016 BACKGROUND Dick Vann Sr. Advisor/Partner at PostMark 21 years in corporate IT P&G and RJ Reynolds PostMark Mail Service Provider (MSP) in Winston
More informationChapter 12. Information Security Management
Chapter 12 Information Security Management We Have to Design It for Privacy... and Security. Tension between Maggie and Ajit regarding terminology to use with Dr. Flores. Overly technical communication
More informationChanging face of endpoint security
Changing face of endpoint security S A N T H O S H S R I N I V A S A N C I S S P, C I S M, C R I S C, C E H, C I S A, G S L C, C G E I T D I R E C T O R S H A R E D S E R V I C E S, H C L T E C H N O L
More informationCYBER RISK CONSULTING. Smartphone Security Issues
CYBER RISK CONSULTING Blackhat Briefings Europe 2004 Smartphone Security Issues May 2004 Luc DELPHA Maliha RASHID 1. Introduction Why smartphones? Functionalities Operating Systems Supported Connectivity
More information716 West Ave Austin, TX USA
Fundamentals of Computer and Internet Fraud GLOBAL Headquarters the gregor building 716 West Ave Austin, TX 78701-2727 USA TABLE OF CONTENTS I. INTRODUCTION What Is Computer Crime?... 2 Computer Fraud
More informationInformation Technology Standards
Information Technology Standards IT Standard Issued: 9/16/2009 Supersedes: New Standard Mobile Device Security Responsible Executive: HSC CIO Responsible Office: HSC IT Contact: For questions about this
More informationGSE/Belux Enterprise Systems Security Meeting
MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION. 1 In the news Microsoft Exposes Scope of Botnet Threat By Tony Bradley, October 15, 2010 Microsoft's
More informationCisco NAC Network Module for Integrated Services Routers
Cisco NAC Network Module for Integrated Services Routers The Cisco NAC Network Module for Integrated Services Routers (NME-NAC-K9) brings the feature-rich Cisco NAC Appliance Server capabilities to Cisco
More informationUTM Firewall Registration & Activation Manual DFL-260/ 860. Ver 1.00 Network Security Solution
UTM Firewall Registration & Activation Manual DFL-260/ 860 Ver 1.00 curitycu Network Security Solution http://security.dlink.com.tw 1.Introduction...02 2.Apply for a D-Link Membership...03 3.D-Link NetDefend
More informationSafeNet Authentication Client
SafeNet Authentication Client Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto and/or its subsidiaries who shall have and keep the
More informationDesktopPlayer for Windows
DesktopPlayer for Windows Getting Started Version 2.3.0 February 2017 Table of Contents About this Release... 3 About the Citrix DesktopPlayer for Windows Solution... 3 Remote versus Local Desktops...
More informationMobile Security / Mobile Payments
Mobile Security / Mobile Payments Leslie K. Lambert CISSP, CISM, CISA, CRISC, CIPP/US, CIPP/G VP, Chief Information Security Officer Juniper Networks Professional Techniques - Session T23 MOBILE SECURITY
More informationMobility Policy Bundle
Version 2018-02 Mobility Policy Bundle Table of Contents This document contains the following policies: BYOD Access and Use Policy (revised 02/2018) Mobile Device Access and Use Policy (revised 02/2018)
More informationPS 176 Removable Media Policy
PS 176 Removable Media Policy December 2013 Version 2.0 Statement of legislative compliance This document has been drafted to comply with the general and specific duties in the Equality Act 2010; Data
More information1GHz Dual Core Processor Extreme Speed & Range
Performance & Use AC1900 AC1900 WiFi 600+1300 Mbps speeds 1GHz Dual Core Processor 1900 DUAL BAND 600+1300 RANGE Advanced features for lag-free gaming Prioritized bandwidth for streaming videos or music
More informationEvaluating the Security of Your IT Network. Vulnerability Scanning & Network Map
Click to edit Master title style Evaluating the Security of Your IT Network Vulnerability Scanning & Network Map Kyle Stafford / M-CEITA 5/12/2017 1 1 Disclaimer This presentation was current at the time
More informationInternet of Things Toolkit for Small and Medium Businesses
Your Guide #IoTatWork to IoT Security #IoTatWork Internet of Things Toolkit for Small and Medium Businesses Table of Contents Introduction 1 The Internet of Things (IoT) 2 Presence of IoT in Business Sectors
More informationMobile Device Security. Image from
Mobile Device Security Image from http://appaddict.net Examples of Mobile Devices - Phones ios (iphone), Android, Windows, etc. -USB devices - Tablets (ipad, Dell/HP running Windows, WebOS, etc.) This
More informationTRACKVIA SECURITY OVERVIEW
TRACKVIA SECURITY OVERVIEW TrackVia s customers rely on our service for many mission-critical applications, as well as for applications that have various compliance and regulatory obligations. At all times
More informationImplementing Your BYOD Mobility Strategy An IT Checklist and Guide
Implementing Your BYOD Mobility Strategy An IT Checklist and Guide 2012 Enterproid IBYOD: 120221 Content 1. Overview... 1 2. The BYOD Checklist... 1 2.1 Application Choice... 1 2.2 Installation and Configuration...
More informationGuide to Network Defense and Countermeasures Second Edition. Chapter 2 Security Policy Design: Risk Analysis
Guide to Network Defense and Countermeasures Second Edition Chapter 2 Security Policy Design: Risk Analysis Objectives Explain the fundamental concepts of risk analysis Describe different approaches to
More informationPCI DSS Compliance. White Paper Parallels Remote Application Server
PCI DSS Compliance White Paper Parallels Remote Application Server Table of Contents Introduction... 3 What Is PCI DSS?... 3 Why Businesses Need to Be PCI DSS Compliant... 3 What Is Parallels RAS?... 3
More informationRisky Business. How Secure is Your Dealership s Information? By Robert Gibbs
I S S U E P A P E Risky Business By Robert Gibbs R 2 0 0 8 Risky Business Remember when information security meant locking your file cabinets at night? Unfortunately, those days are long gone. With the
More informationCourse overview. CompTIA Security+ Certification (Exam SY0-501) Study Guide (G635eng v107)
Overview This course is intended for those wishing to qualify with CompTIA Security+. CompTIA's Security+ Certification is a foundation-level certificate designed for IT administrators with 2 years' experience
More informationData Sheet: Endpoint Security Symantec Network Access Control Starter Edition Simplified endpoint enforcement
Simplified endpoint enforcement Overview makes it easy to begin implementing a network access control solution. It offers a subset of Symantec Network Access Control functionality that can be completely
More informationSecurity Policies and Procedures Principles and Practices
Security Policies and Procedures Principles and Practices by Sari Stern Greene Chapter 3: Information Security Framework Objectives Plan the protection of the confidentiality, integrity and availability
More informationLeading the New Era of WiFi. Nighthawk AC1750 Smart WiFi Router Dual Band Gigabit. Data Sheet R6700
Leading the New Era of WiFi Nighthawk AC1750 Smart WiFi Router is powered by three antennas to extend your WiFi coverage. Blazing-fast combined WiFi speeds up to 450+1300Mbps and 1GHz Dual Core Processor
More informationTravel Information Security November 2015
Travel Information Security November 2015 Important Note: Disclaimer The price of your house may go down as well as up This presentation contains the results of a short research exercise into travel information
More informationPolycom RealPresence Capture Server - Appliance Edition Getting Started Guide
Getting Started Guide 1.6.1 April 2014 3725-69904-003/A Polycom RealPresence Capture Server - Appliance Edition Getting Started Guide Trademark Information POLYCOM and the names and marks associated with
More informationANDROID PRIVACY & SECURITY GUIDE ANDROID DEVICE SETTINGS
ANDROID PRIVACY & SECURITY GUIDE WESNET The Women s Services Network Smartphones store a lot of personal information, including email or social media accounts, reminders and notes, the number of steps
More informationChildren s Health System. Remote User Policy
Children s Health System Remote User Policy July 28, 2008 Reason for this Policy This policy defines standards for connecting to the Children s Health System (CHS) network from any remote host. These standards
More informationTips for Passing an Audit or Assessment
Tips for Passing an Audit or Assessment Rob Wayt CISSP-ISSEP, HCISPP, CISM, CISA, CRISC, CEH, QSA, ISO 27001 Lead Auditor Senior Security Engineer Structured Communication Systems Who likes audits? Compliance
More informationSecure IT consumeration (BYOD), users will like you How to make secure access for smart mobile devices
Michal Zlesák Area Sales Manager Michal.zlesak@enterasys.com Secure IT consumeration (BYOD), users will like you How to make secure access for smart mobile devices A Siemens Enterprise Communications Company
More informationCommercial Online. Banking: Corporate. First Mid Bank & Trust Commercial Online Banking. Secure Browser Installation Guide for Windows
Banking: Corporate Commercial Online First Mid Bank & Trust Commercial Online Banking Secure Browser Installation Guide for Windows Commercial Online Banking Secure Browser Commercial Online Banking Secure
More informationHP Security Solutions for business PCs. Comprehensive protection measures so you can work smarter and with greater confidence.
HP Security Solutions for business PCs Comprehensive protection measures so you can work smarter and with greater confidence. Companies lose millions of dollars every year due to inadequate security. Informally-run
More informationCourse Outline (version 2)
Course Outline (version 2) Page. 1 CERTIFIED SECURE COMPUTER USER This course is aimed at end users in order to educate them about the main threats to their data s security. It also equips the students
More informationCSE 3482 Introduction to Computer Security. Introduction to Information/Computer Security
CSE 3482 Introduction to Computer Security Introduction to Information/Computer Security Instructor: N. Vlajic, Winter 2017 Learning Objectives Upon completion of this material, you should be able to:
More informationGUIDE. MetaDefender Kiosk Deployment Guide
GUIDE MetaDefender Kiosk Deployment Guide 1 SECTION 1.0 Recommended Deployment of MetaDefender Kiosk(s) OPSWAT s MetaDefender Kiosk product is deployed by organizations to scan portable media and detect
More informationCybersecurity Risk Mitigation: Protect Your Member Data. Introduction
Cybersecurity Risk Mitigation: Protect Your Member Data Presented by Matt Mitchell, CISSP Knowledge Consulting Group Introduction Matt Mitchell- Director Risk Assurance 17 years information security experience
More informationVMware Enterprise Desktop Solutions. Tommy Walker Enterprise Desktop Specialist Engineer Desktop Platform Solutions
VMware Enterprise Desktop Solutions Tommy Walker Enterprise Desktop Specialist Engineer Desktop Platform Solutions Agenda The Enterprise Desktop Market Assured Computing Environment (ACE) Virtual Desktop
More information