commonwealth information security officers advisory group isoag meeting n.
Skip this Video
Loading SlideShow in 5 Seconds..
Commonwealth Information Security Officers Advisory Group (ISOAG) Meeting PowerPoint Presentation
Download Presentation
Commonwealth Information Security Officers Advisory Group (ISOAG) Meeting

Loading in 2 Seconds...

play fullscreen
1 / 114

Commonwealth Information Security Officers Advisory Group (ISOAG) Meeting - PowerPoint PPT Presentation

  • Uploaded on

Commonwealth Information Security Officers Advisory Group (ISOAG) Meeting. JULY 11, 2007. www.vita.virginia. 1. WELCOME. Peggy Ward, VITA. www.vita.virginia. 2. ISOAG July 2007 Agenda. I. Welcome Peggy Ward, VITA II. E-Discovery Julie Whitlock, OAG

I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
Download Presentation

Commonwealth Information Security Officers Advisory Group (ISOAG) Meeting

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.

- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
    Presentation Transcript
    1. Commonwealth Information Security Officers Advisory Group (ISOAG) Meeting JULY 11, 2007 www.vita.virginia 1

    2. WELCOME Peggy Ward, VITA www.vita.virginia 2

    3. ISOAG July 2007 Agenda I. Welcome Peggy Ward, VITA II. E-Discovery Julie Whitlock, OAG III. Identity Management Roadmap Tony Shoot, NG IV. CESC - Security Operations Linda Smith, NG V. Commonwealth Information Security Council Update! Encryption Committee Steve Werby Making Security an Executive Management Priority John Karabaic Small Agency Outreach Robert Jenkins Identity and Access Management Patricia Paquette VI. Keylogging Malware Tripp Sims, VITA VII. COV IT Security Policies, Standards and Guidelines Update Cathie Brown, VITA IX. MS-ISAC Peggy Ward, VITA X. Upcoming Events Peggy Ward, VITA XI. Other Business Peggy Ward, VITA

    4. An Overview ofE-Discovery July 11, 2007 Julie Whitlock, Assistant Attorney General Technology and Procurement Law Section

    5. What is discovery? • Discovery is the process by which parties to a lawsuit exchange information, or request it from third parties • Requests for production of documents • Subpoenas • Depositions • Etc.

    6. What is e-discovery? • Process by which parties request “electronically stored information” = ESI • Includes: Emails Metadata Voice mails Spreadsheets Word files Text messages Calendars Videos Information on jump drives, PDAs, and Blackberries Information stored on home or personal computers and devices, and in personal e-mail accounts

    7. What has changed? • Statewide document retention schedules have not changed • Duty to preserve evidence has not changed • Federal Rules of Civil Procedure • Amendments became effective December 2006 • Specifically address e-discovery • Specifically allow for sanctions • Require early conference to discuss availability, cost, and timing of producing data

    8. What is individual agency’s responsibility? • Compliance with document retention schedules, including documentation of destruction • Preservation of all evidence in its original electronic form, so that all information contained within it, whether visible or not, is also available for inspection (e.g. metadata) • Notification to VITA early on, to enable efficient responses and coordinate any necessary litigation holds • Notification to your agency counsel at the AG’s Office when you anticipate litigation, in order to receive advice specific to the situation

    9. Effective Records Management • Ensures compliance with document retention schedules • Provides the foundation for compliance with discovery rules • Enables efficient review of ESI • Reduces cost of storage, cost of searching, cost of retrieval • Library of Virginia retention schedules address both physical records and virtual records

    10. Virginia Code § 42.1-86.1. Disposition of public records. — *** C. Each agency shall ensure that records created after July 1, 2006 and authorized to be destroyed or discarded in accordance with subsection A, are destroyed or discarded in a timely mannerin accordance with the provisions of this chapter; provided, however, such records that contain identifying information as defined in clauses (iii) through (ix), or clause (xii) of subsection C of § 18.2-186.3, shall be destroyed within six months of the expiration of the records retention period. *** (iii) social security number (iv) driver's license number (v) bank account numbers (vi) credit or debit card numbers (vii) PIN numbers (viii) electronic identification codes (ix) automated or electronic signatures (xii) passwords

    11. What can my agency do now? • Review current document retention schedules and practices • Watch for formal advice from the OAG • Become familiar with what you have electronically, where it is stored, in what formats, and who is responsible for it (don’t forget personal devices) • Become familiar with your automatic backup and archiving functions • Begin to understand what would be necessary to perform a search or to retrieve archived documents

    12. What can my agency do now? (con’t) • Begin to identify positions within your agency that are involved in data retention – this includes your document retention/records management officer • Encourage the segregation of personal or proprietary information before data is archived – to reduce the time spent segregating when responding to a request

    13. Things to consider when preparing for e-discovery • Individual privacy of user • Prevention of data loss, whether inadvertent or intentional • Minimizing individual disruptions while searching and responding to discovery requests • Operational efficiencies to ensure timely preservation and processing of data • Consistency of process

    14. Conclusion

    15. Identity Management Support June 11, 2007

    16. Identity Management • Definition: • Management of the identity life cycle of entities (subjects or objects) during which: • the identity is established • the identity is described • the identity is destroyed • Transformation Objectives: • User consolidation across multiple directories and e-mail system • Single domain Active Directory (COV.VIRGINIA.GOV) • Role-Based Access Control • Provisioning and de-provisioning • Self Service Password Management • Auditing and Reporting

    17. Components Confidential

    18. Active Directory • Primary Identity Repository • Authentication and Access Control • Single domain Active Directory – COV.VIRGINIA.GOV • User consolidation from Agency directories and e-mail system

    19. ADAM (Active Directory Application Mode) Confidential

    20. MIIS (Microsoft Identity Integration Server) Confidential

    21. Quest Management Tools Confidential

    22. P-Synch Confidential

    23. Pegasus / Dogwood Confidential

    24. Identity Management Transformation Roadmap Confidential

    25. Enabling Identity Management • Central Identity Repository • Identity Synchronization • Self-Service • Authorization • Access • Passwords • Profile • Workflow • Centralized User Management • Delegated Administration • Automated Provisioning and De-Provisioning • Single Sign On • Consolidated Auditing

    26. Enabling Identity Management • Central Identity Repository • Consolidation of user identities into one centralized repository • Integrate other systems authorization and authentication of users • External and internal web apps leverage primary identity store • Internal enterprise apps leverage primary identity store

    27. Enabling Identity Management • Identity Synchronization • Automatic propagation of changes to other managed systems (Synchronization) • Collects identity data from other systems • Enables provisioning across wide range of systems and applications

    28. Enabling Identity Management • Self Service • Password Resets • Profile Updates • Account and Access request

    29. Enabling Identity Management • Centralized User Management • Role-Based Access Control • Rule-Based Access Control • Centralized provisioning and de-provisioning • Password Management • Uniform Password Policy • Password Initialization • Spans multiple systems

    30. Enabling Identity Management • Delegated Administration • Non-technical users perform granular administration

    31. Enabling Identity Management • Resource Provisioning • Automated provisioning and de-provisioning • Workflow automates approval process

    32. Enabling Identity Management • Single Sign-On (SSO) • Reduced Sign On • Authenticate once to gain access to many systems • A single identity source is used for authentication • Reduced Credentials • User credentials gain access to multiple systems (each requiring sign on) • Password is synchronized between multiple systems

    33. Enabling Identity Management • Identity Auditing and Reporting • Automatic ticket generation for follow-up and reporting • Automatic E-Mail for interaction with users, administrators, and authorizers • Real-time auditing of all AD changes

    34. Questions ?

    35. Security Operations Center tools Linda Smith Manager Transformation Security Services July 11, 2007

    36. Table of Contents Confidential

    37. Blue Coat Confidential

    38. Blue Coat default deny policy Confidential Confidential

    39. Blue Coat configuration Confidential

    40. Blue Coat Reporter Confidential

    41. Internet Security Systems Confidential

    42. ID Management Confidential

    43. Antivirus Management Confidential

    44. Firewall / VPN Confidential

    45. Firewall / VPN Confidential

    46. Questions?

    47. Commonwealth Information Security Council Peggy Ward, VITA 47

    48. Encryption Committee Jesse Crim (VCU) John Palese (DSS) Michael McDaniel (VRS) Tripp Simms (VITA/NG) Steve Werby (DOC) Craig Goeller (DMAS) NEW MEMBER!

    49. Making Security an Executive Management Priority Committee Members Shirley Payne, Chair, University of Virginia Joe Hubbard, Virginia Lottery Beth Nelson, State Board of Elections Judy Napier, Office of the Governor John Karabaic, CISSP, Dept. Medical Assistance Services

    50. Deliverables • Plan and develop Executive Security Awareness events, either stand-alone or as riders on other planned executive-level events. • Present effective Executive Security Awareness practices from agencies as models other agencies might follow.