It security strategy protecting your key corporate assets
1 / 24

IT Security Strategy: Protecting Your Key Corporate Assets - PowerPoint PPT Presentation

  • Uploaded on

IT Security Strategy: Protecting Your Key Corporate Assets. Tech Data. Non-Disclosure. This discussion is under our mutual nondisclosure agreement. Purpose of Our Discussion. Decide if we should expand our relationship Identify your questions and concerns about your IT security

I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
Download Presentation

PowerPoint Slideshow about ' IT Security Strategy: Protecting Your Key Corporate Assets' - rana-dillon

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.

- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
It security strategy protecting your key corporate assets

IT Security Strategy: Protecting Your Key Corporate Assets

Tech Data

Non disclosure

  • This discussion is under our mutual nondisclosure agreement.

Purpose of our discussion
Purpose of Our Discussion

  • Decide if we should expand our relationship

  • Identify your questions and concerns about your IT security

  • Identify whether your issues are within our expertise

  • Report our findings about security issues

  • Establish next-step recommendations based on your situation

  • Create an action plan for your consideration.


  • Your team

    • Role, responsibility, experience

    • What would make this a valuable meeting for you?

  • Our team

    • Role, responsibility, experience

Why security
Why Security?

  • IT is the engine of your business: When it’s compromised, you’re at risk

  • Your assets have value that bad guys want.

Why our customers choose us
Why Our Customers Choose Us

  • Local, responsive and concerned means we’ll be there when called

  • Experienced in delivering and securing IT in all varieties: traditional, cloud, blended systems, mobile

  • Deep network of resources to solve unique situations

  • We work until the the problem is resolved

  • We take a holistic view and focus on growing our customer’s business by judicious application of IT.

What gets secured
What Gets Secured…?

  • What do you want to protect?

    • How much do you want to protect it?

  • What’s vulnerable?

    • Human failure

    • Equipment failure

    • Malicious attack.

What gets secured1
What Gets Secured…?

  • What’s valuable?

    • What can and can’t you live without?

  • What are you legally required to protect?

    • Defend this first or you could go to jail

  • What do you need to operate your business?

    • Defend that next or you could go out of business.

What gets secured2
What Gets Secured?

  • What is impossible to replace and what can be covered by insurance?

  • What’s a trade secret and what’s common knowledge?

Your key assets
Your Key Assets:

  • People – employees, customers, key vendors and stakeholders

  • Property – physical, electronic and intellectual

  • Processes – the procedures used to successfully conduct business

  • Proprietary data – trade secrets, confidential information and personal data.

The outcome of security
The Outcome of Security

  • Availability of corporate assets

  • Integrity of those assets

  • Confidentiality of assets that are private

  • Accountability, making those who access the data responsible for their behavior.

The value of security
The Value of Security…

  • Increases staff efficiencies from not having to individually deal with security issues like spam, viruses and rogue email

  • Increases in systems efficiency created by the security system because of upgraded technology

  • Eliminates cost of security breaches from unpatched software.

Security is a real challenge
Security is a Real Challenge

  • New IT threats every second

  • High-profile attacks

  • New attack points

    • Mobile devices

    • Data leakage

    • Social engineering.

Seven security layers
Seven Security Layers

  • Access control

  • Deter intrusion

  • Detect intrusion

  • Determine attack nature

  • Delay further access

  • Defend

  • Recover.

The value of security1
The Value of Security

  • Reduces legal exposure from unsecured premises and computer systems

  • Increases sales based on improved security and stability

  • Reduces business interruptions caused by security breaches.

Your security concerns
Your Security Concerns

  • What do you need to secure?

  • What would it be worth to secure that?

  • What would it cost if it wasn’t secured?

  • What is your security policy?

What would you like to have happen
What Would You Like to Have Happen?

  • What would it be like if everything worked correctly?

  • How will you know who to choose?

Our recommendations
Our Recommendations

  • Assessment

  • Security policy

  • Remediation plan

  • Policy audit and implementation

  • Bring compliance up-to-date

  • Adjust implementation of policies.


  • Review your situation using the seven layer security model

  • Identify any issues

  • Recommend any specific actions with cost/risk analysis

  • If we find nothing, you’re just being cautious.

Security policy
Security Policy

  • Review your security policy

  • Look for completeness

  • Look for areas that have changed

    • Mobile

    • New compliance mandates.

Remediation plan
Remediation Plan

  • If required

Policy audit and implementation
Policy Audit and Implementation

  • Audit for compliance

  • Education where needed

  • Help your team with enforcement strategies.

Proposed next steps
Proposed Next Steps

  • Agree to an assessment

  • Our security team will perform this

  • Meet for a review of findings

  • Decide the next step, if any.

Schedule the next meetings
Schedule the Next Meetings

  • Assessment

    • Who and when

  • Report of findings

    • Executive team

    • Two weeks later.