• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
You're Breached: Information Risk Analysis for Today's Threat Landscape
 

You're Breached: Information Risk Analysis for Today's Threat Landscape

on

  • 542 views

If you would like a copy of the slide in the form of a self-playing PowerPoint Show, please contact jtroisi@co3sys.com ...

If you would like a copy of the slide in the form of a self-playing PowerPoint Show, please contact jtroisi@co3sys.com


IT security executives have used information risk analysis for decades. From basic objectives such as ensuring critically sensitive data gets protection commensurate with its value, to more sophisticated uses such as determining when certain risks can be accepted, these risk management frameworks help align security with the business. Changes in the "threat landscape", which includes the technical operating environment, the motivation and capability of threats, and even business context can have dramatic implications on the application of analysis techniques. And in information technology, from BYOD, to cloud, to mobile, to state-sponsored actors; plenty has changed in the last 3 years alone.

This webinar will review the conceptual underpinnings of information risk analysis that remain widely used today. We will then examine important changes in the threat landscape over the last few years and assess their impact on risk assessment and its application in risk management. Finally, we will offer recommendations for how, in light of these changes, organizations should think differently about risk and as a result, their security program as a whole.

Our featured speakers for this timely webinar will be:

- Bill Campbell, CISSP, Director at i-fact@nalysis, former security executive at MITRE, Union Bank, Symantec and Fidelity Investments.

- Ted Julian, Chief Marketing Officer, Co3 Systems. Serial security and compliance entrepreneur.

Statistics

Views

Total Views
542
Views on SlideShare
542
Embed Views
0

Actions

Likes
0
Downloads
17
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment
  • Ted

You're Breached: Information Risk Analysis for Today's Threat Landscape You're Breached: Information Risk Analysis for Today's Threat Landscape Presentation Transcript

  • You’re Breached: Information Risk Analysis for Today’s Threat Landscape Bill Campbell, CISSP Ted Julian Page 2
  • Today’s Speakers Ted Julian, Chief Marketing Officer, Co3 Systems Ted is a serial entrepreneur who has launched four companies during his ~20 years in the security / compliance industry. Bill Campbell, CISSP, Director at i-fact@nalysis Bill has managed IT operations, software development and security functions at several companies including Fidelity Investments, Symantec, and Union Bank. He is a graduate of the United States Naval Academy. He is also one of the longest-serving members of the (ISC)2 Ethics Committee. i-fact@nalysis is a full service corporate investigations firm with global presence to support international compliance, due diligence, background and fraud investigations. Page 3
  • Co3’s Incident Response Management Platform Automated Escalation Accelerate response by easily creating incidents from the systems you already have Industry Best Practices Organizational Best Practices Industry Standard Frameworks Privacy Breach Requirements Web Form IT IR Plan Regulatory Requirements Marketing Trouble Ticketing Legal/Compli ance HR Entry Wizard SIM Streamlined Creation + Collaboration Create IR plans instantly based on regulations, best practices, and standard operating procedure. Collaborate on plan execution across multiple functions Intelligent Correlation Integrated Intelligence Determine related incidents automatically to identify broader, concerted attacks Gain valuable threat intelligence instantly from multiple intelligence feeds Accelerated Mitigation Speed results by easily outputting outcomes to your management platforms Page 4 Trouble Ticketing SIM GRC DASHBOARDS & REPORTING SSAE 16 TYPE II CERTIFIED HOSTING FACILITY Email
  • What we will cover today • The threat landscape: past and present • Basic information risk analysis… plus some additional pertinent detail • Combining these two ideas, and why it matters Page 5
  • Request the Slide Show Because this presentation makes heavy use of animations and graphics, it is not suitable as “presentation notes”. The slides become unreadable in printed form, and in the format used by slideshare.net. We apologize for the inconvenience. If you would like a copy of the slide in the form of a self-playing PowerPoint Show, please contact us. Page 6
  • “Co3 Systems makes the process of planning for a nightmare scenario as painless as possible, making it an Editors’ Choice.” PC MAGAZINE, EDITOR’S CHOICE “One of the hottest products at RSA…” NETWORK WORLD – FEBRUARY 2013 One Alewife Center, Suite 450 Cambridge, MA 02140 PHONE 617.206.3900 “Co3…defines what software packages for privacy look like.” WWW.CO3SYS.COM GARTNER “Platform is comprehensive, user friendly, and very well designed.” PONEMON INSTITUTE Bill Campbell, CISSP billc92107@gmail.com 617.233.0815 www.i-factanalysis.com