security matters
Download
Skip this Video
Download Presentation
Security Matters

Loading in 2 Seconds...

play fullscreen
1 / 16

Security Matters - PowerPoint PPT Presentation


  • 117 Views
  • Uploaded on

Security Matters. It’s not about the network. What’s Your Biggest Threat?. http://flickr.com/photos/mikeygottawa/533355476/. The Top 12 Security Threats Reported by CTOs. 12. Extortion 11. Denial of Service (DoS) 10. Vandalism 9. Pharming 8. Phishing 7. Fraudulent Transaction.

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about ' Security Matters' - oke


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
security matters

Security Matters

It’s not about the network

what s your biggest threat
What’s Your Biggest Threat?

http://flickr.com/photos/mikeygottawa/533355476/

the top 12 security threats reported by ctos
The Top 12 Security ThreatsReported by CTOs
  • 12. Extortion
  • 11. Denial of Service (DoS)
  • 10. Vandalism
  • 9. Pharming
  • 8. Phishing
  • 7. Fraudulent Transaction
the top 12 security threats reported by ctos1
The Top 12 Security ThreatsReported by CTOs
  • 6. Physical Loss
  • 5. Unauthorized Access by Outsiders
  • 4. Malware
  • 3. Spam
  • 2. Unauthorized Access by Insiders
  • 1. Insider Misuse
    • Source: http://www.computereconomics.com/article.cfm?id=1214
the top 2 and 6 security threats the cost of an inside job
The Top 2 (and #6) Security ThreatsThe Cost of an “Inside Job”
  • Four in ten IT managers report incidents involving non-compliance while another 27 percent have seen unintentional release of corporate information.
  • A typical incident requires 22 IT employee hours to remediate.
security philosophy control what you can
Security PhilosophyControl What You Can
  • 0’s and 1’s, not people.
  • Network, workstations, devices, applications, files.
control what you can networks
Control What You CanNetworks
  • NAT Routers
  • Integrated VPN
  • Dynamic IP addresses
  • Wireless - closed

http://flickr.com/photos/abbyladybug/930518276/

control what you can workstations
Control What You CanWorkstations
  • Firewalls
  • Antivirus
  • Anti-spyware
  • Spam filtering
  • Internet filtering (?)
  • Backups

http://flickr.com/photos/[email protected]/579761138/

control what you can in the cloud
Control What You CanIn the Cloud
  • Enough seats for all users
  • Independent passwords
  • Automatic logout
  • Required password changes

http://flickr.com/photos/[email protected]/88641569/

control what you can devices drives
Control What You CanDevices / Drives
  • Passwords for all devices and drives
  • Encryption for files stored on devices and drives

http://flickr.com/photos/ian-s/2152798588/

security philosophy it s more than digital
Security PhilosophyIT’s More than Digital
  • In 2008…each man, woman, and child will use 4,847 sheets of the office paper, 36 sheets fewer than 2007.
    • Source: http://www.entrepreneur.com/tradejournals/article/184744007.html
security philosophy plug the biggest holes
Security PhilosophyPlug the Biggest Holes
  • Prioritize!
    • Risk = Value of Asset x Severity of Vulnerability x Likelihood of Attack
    • Source:http://h71028.www7.hp.com/ERC/cache/568165-0-0-0-121.html
security philosophy plan for failure
Security PhilosophyPlan for Failure
  • Know how you will respond to security breaches in terms of IT
  • Plan for notifying important parties - it’s the law!
security philosophy train for success
Security PhilosophyTrain for Success
  • Ultimately, your success relies on your people
  • Try Disaster Days trainings (make it fun!)
  • Make security issues part of your regular communications
security resources
Security Resources
  • HP Security Risk Assessment
    • http://h71028.www7.hp.com/ERC/cache/568165-0-0-0-121.html
  • TechSoup Healthy and Secure Computing
    • http://www.techsoup.org/hsc/
  • CERT Octave
    • http://www.cert.org/octave/
  • SANS Reading Room
    • http://sans.org/
  • Security Focus
    • http://www.securityfocus.com/
  • NSA Security Confirguration Guides
    • http://www.nsa.gov/snac/
slide16
As we look ahead into the next century, leaders will be those who empower others.- Bill Gates, founder Microsoft
ad