Data Protection in Practice

Similar documents
Office 365 for businesses. Stay connected on the go

Business Essentials Business Business Premium

NORTH AMERICAN SECURITIES ADMINISTRATORS ASSOCIATION Cybersecurity Checklist for Investment Advisers

Lifespan Guide for installing and using Multi-Factor Authentication (MFA)

Microsoft 365. A complete, intelligent, secure solution to empower employees. Integrated for simplicity. Built for teamwork. Unlocks creativity

3.30pm. A sneak peek at Veeam 2018 releases Veeam for VMware Cloud on AWS technical deep dive Veeam Availability Console Update pm. 2.

Price list for Microsoft Office 365 from Swisscom. Valid from 1 may, 2016

Disaster Recovery Self-Audit

WELCOME! Using Microsoft Office 365 for a Robust Mail and Conferencing System

2018 IT Priorities: Cybersecurity, Cloud Outsourcing & Risk Management. Follow Along

Brussels. Cyber Resiliency Minimizing the impact of breaches on business continuity. Jean-Michel Lamby Associate Partner - IBM Security

TRUSTED IT: REDEFINE SOCIAL, MOBILE & CLOUD INFRASTRUCTURE. John McDonald

Securing Your Most Sensitive Data

Defense in Depth Security in the Enterprise

Office 365 for businesses. Stay connected on the go

Office 365 Business The Microsoft Office you know, powered by the cloud.

Lifespan Guide for installing and using Multi-Factor Authentication (MFA)

A practical guide to IT security

Recommendations for Implementing an Information Security Framework for Life Science Organizations

BULLETPROOF365 SECURING YOUR IT. Bulletproof365.com

How do you track devices that have been approved for use? Are you automatically alerted if an unapproved device connects to the network?

ModernBiz Day. Safeguard Your Business. Sonia Blouin APAC Cloud Lead Microsoft Asia Pacific

Securing the SMB Cloud Generation

Security. Bob Shantz Director of Infrastructure & Cloud Services Computer Guidance Corporation. All Rights Reserved.

Office 365: Modern Workplace

Level 3 Certificate in Cloud Services (for the Level 3 Infrastructure Technician Apprenticeship) Cloud Services

Office 365 What You Need To Know and Why

Microsoft Office 365 Business Plans

Why is Office 365 the right choice?

Understanding Cyber Insurance & Regulatory Drivers for Business Continuity

MICROSOFT APPLICATIONS

Office 365: What plan is the right one?

Office 365 External Sharing Webinar November 7, 2017

RHM Presentation. Maas 360 Mobile device management

Nine Steps to Smart Security for Small Businesses

Cyber security tips and self-assessment for business

QUALITY IT SUPPORT TAILORED FOR NOT FOR PROFITS

Evolution of Cyber Security. Nasser Kettani Chief Technology Officer Microsoft, Middle East and Africa

Lifespan Guide for using your Lifespan Network Account

Agenda. Today s IT Challenges. Symantec s Collaborative Architecture. Symantec TM Endpoint Management Suite. Connecting Symantec Technologies Today

BULLETPROOF365 SECURING YOUR IT. Bulletproof365.com

Position Title: IT Security Specialist

KSI/KAI Cyber Security Policy / Procedures For Registered Reps

CloudSOC and Security.cloud for Microsoft Office 365

Cyber Security. February 13, 2018 (webinar) February 15, 2018 (in-person)

Office 365 An Introduction to Features and Services

Selling network security. A partner guide to getting more business. // Partner Guide. Kerio Technologies

Minimize litigation risk Discuss security best practices Review security tools and techniques Identify seven cybersecurity must-do s

Liquid Telecom Microsoft Partnership

Disaster Preparedness and Recovery

Information Security Controls Policy

Oracle Security Products and Their Relationship to EBS. Presented By: Christopher Carriero

The 10 Disaster Planning Essentials For A Small Business Network

Define Your Office 365 External Sharing Strategy

Business continuity management and cyber resiliency

10 Cybersecurity Questions for Bank CEOs and the Board of Directors

Is your privacy secure? HIPAA Compliance Workshop September Presented by: Andrés Castañeda, Senior Manager Steve Nouss, Partner

Go mobile. Stay in control.

Unpacking Office 365 A high level overview of the apps and services bundled in the standard Office 365 subscription: What is it Use cases FAQ

Unified Communications Phase 2 Presentation to IT Services Users Group

WORKPLACE Data Leak Prevention: Keeping your sensitive out of the public domain. Frans Oudendorp Ronny de Jong

Cybersecurity. Overview. Define Cyber Security Importance of Cyber Security 2017 Cyber Trends Top 10 Cyber Security Controls

Juniper Vendor Security Requirements

Surprisingly Successful: What Really Works in Cyber Defense. John Pescatore, SANS

Is Your Information Safe? Presented by: Jake Gibson IT Director, Eurofins

Maximize your move to Microsoft in the cloud

Cyber Security Updates and Trends Affecting the Real Estate Industry

OFFICE 365 GOVERNANCE: Top FAQ s & Best Practices. Internal Audit, Risk, Business & Technology Consulting

E-Security policy. Ormiston Academies Trust. James Miller OAT DPO. Approved by Exec, July Release date July Next release date July 2019

WHITE PAPER- Managed Services Security Practices

Privilege Security & Next-Generation Technology. Morey J. Haber Chief Technology Officer

The Device Has Left the Building

Identity & Access Management

mhealth SECURITY: STATS AND SOLUTIONS

Understanding Office 365: Is A Cloud Based Solution Right For Your Business?

Defensible Security DefSec 101

Getting Started Accessing Okta All Employees

Joe Stocker, CISSP, MCITP, VTSP Patriot Consulting

7 Steps to Complete Privileged Account Management. September 5, 2017 Fabricio Simao Country Manager

Pearson CISSP Lab. Course Outline. Pearson CISSP Lab. 05 Apr

ACM Retreat - Today s Topics:

IT SECURITY RISK ANALYSIS FOR MEANINGFUL USE STAGE I

AT&T Endpoint Security

The SANS Institute Top 20 Critical Security Controls. Compliance Guide

Microsoft 365 Business FAQs

Use EMS to protect your mobile data and mobile app

Security Information & Policies

Securing Office 365 with SecureCloud

The simplified guide to. HIPAA compliance

Future-ready security for small and mid-size enterprises

NaviSite Managed Office 365 Productivity Suite Powered by Microsoft

White Paper. Enabling Mobile Users and Staying Compliant. How Healthcare Organizations Manage Both

Secure Access for Microsoft Office 365 & SaaS Applications

Information Security Controls Policy

Vembu SaaSBackup - An Introduction

Projectplace: A Secure Project Collaboration Solution

10:30 Welcome. 10:35 Introduction to GDPR Andrew Dent, EU GDPR. Followed by Q&A. Break

Cybersecurity Overview

SaaS as a Security Hazard The Google Apps example

Professional Development

Transcription:

ANNUAL CPD BOARD CONFERENCE Data Protection in Practice 6 & 13 DECEMBER 2016

There are only two types of companies: those that have been hacked, and those that will be. Robert Mueller, FBI Director There are only two types of companies: those that have been hacked and those that don t know they have been hacked. John Chambers, Cisco CEO 2

AGENDA A practical guide to cyber security Technology controls for keeping information secure Using technology to deliver productivity and efficiency Recovering from a cyber breach 3

A Practical Guide to Cyber Security 4

KEEPING IT SYSTEMS SAFE & SECURE 1. Assess the threats and risks to your business 2. Apply technology controls 3. Secure data in the office and on the move 5

KEEPING IT SYSTEMS SAFE & SECURE 4. Secure your data in the cloud 5. Back up your data 6. Train your staff 6

KEEPING IT SYSTEMS SAFE & SECURE 7. Monitor for problems 8. Know what you should be doing 9. Minimise your data 7

KEEPING IT SYSTEMS SAFE & SECURE 10. Make sure your IT department or service provider is doing what they should be 8

Technology Controls for Keeping Information Secure 9

FIREWALL Security services Intrusion prevention system (IPS) Anti virus Application layer filtering Content filtering Remote access / VPN Intrusion detection system (IDS) 10

ANTI VIRUS Real-time file system protection Media scanning (USB) Personal firewall Website reputation filtering 11

ACCESS CONTROLS / PASSWORD POLICY Password length Password complexity Password expiration Password history Multi factor authentication (MFA or 2FA) 12

MOBILE DEVICE MANAGEMENT Phones Laptops Tablets USB Keys 13

BACK UP AND RECOVERY Backup Disaster Recovery Business Continuity Recovery Point Objective (RPO) Recovery Time Objective (RTO) 14

Using Technology to Deliver Productivity and Efficiency 15

MICROSOFT OFFICE 365 Authoring Mail & Social Sites & Content Management Chat, Meetings & Voice Analytics Word Excel Outlook Exchange OneDrive SharePoint Skype for Business Power BI Delve Analytics PowerPoint Yammer Delve OneNote Secure and Compliant Manageable Extensible Always up to date 16

MOBILITY IS THE NEW NORMAL 52% 90% >80% 52% of information workers across 17 countries report using three or more devices for work* 90% of enterprises will have two or more mobile operating systems to support in 2017** >80% of employees admit to using non-approved software-as-a-service (SaaS) applications in their jobs*** * Forrester Research: BT Futures Report: Info workers will erase boundary between enterprise & consumer technologies, ** Gartner Source: Press Release, http://www.gartner.com/newsroom/id/2213115 *** http://www.computing.co.uk/ctg/news/2321750/more-than-80-per-cent-of-employees-use-non-approved-saas-apps-report

WHAT'S DRIVING CHANGE? User Devices Apps Data IT

EMPOWERING ENTERPRISE MOBILITY Enable your users People-centric approach Protect your data Devices Apps Data Unify your environment

ONE USER. ONE IDENTITY. EVERYWHERE. Mobile Device & Application Management Consistent identity Self-service for your people Hybrid Identity Access & Information Protection Security / audit reporting Single sign-on to applications Desktop Virtualization

DEVICE CHOICE. SIMPLIFIED MANAGEMENT. Mobile Device & Application Management Managed productivity with Office mobile apps Mobile app management and app wrapping Hybrid Identity Access & Information Protection Conditional access to corporate resources Simplified device enrollment Desktop Virtualization

Recovering from a Cyber Breach 22

MOST COMMON CAUSES OF DATA LOSS Accidental data deletion Theft or loss of data Viruses and malware Equipment failure Coffee / tea Fire / flooding / office loss Power failure 23

CRISIS MANAGEMENT LIFECYCLE Readiness Response Recovery Simulation Real-Time Response Post Crisis Response Post Crisis Assessment 24

Three in every ten firms subject to attack 50% increase in cyber attacks reported by Irish law firms in the past year 25

QUESTIONS? CONTACT US: Michael Redmond Technical Operations Manager Gavin O Donovan CFO (01) 215 3999 or (053) 948 4113 ask@innovate.ie www.innovate.ie 26