SlideShare a Scribd company logo
1 of 56
Confluence with Information Security – ISO 17799  Ellie Myler, CRM, CBCP Senior Records Management Analyst  Entium Technology Partners, LLC 303-684-0496, emyler@entium.com George Broadbent,  Director, Enterprise Solutions Entium Technology Partners, LLC 610-415-7216, gbroadbent@entium.com Session #M014
Learning Objectives ,[object Object],[object Object],[object Object],[object Object]
How Secure Is Your Data? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Costs Are Rising ,[object Object],[object Object],[object Object],[object Object],“ It is estimated that  intentional attacks  on information systems are costing businesses worldwide around  15 billion  each year and the cost is rising.”
Information Security Defined ,[object Object],[object Object],[object Object],[object Object],[object Object]
Objective 1 – Outline ISO 17799 ,[object Object],[object Object],[object Object]
ISO 17799 Framework ,[object Object],[object Object],[object Object],[object Object]
ISO 17799 Framework ,[object Object],[object Object],[object Object],[object Object]
Benefits Of Using A Framework ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
ISO 17799 Steps and Tasks
Cross-Reference For Compliance
Conduct Risk Assessments ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Establish A Security Policy ,[object Object],[object Object],[object Object]
Establish A Security Policy ,[object Object],[object Object],[object Object]
Compile An Asset Inventory ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Compile An Asset Inventory ,[object Object],[object Object],[object Object]
Define Accountability ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Define Accountability ,[object Object],[object Object],[object Object],[object Object]
Address Physical Security ,[object Object],[object Object],[object Object],[object Object]
Address Physical Security ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Document Operating Procedures ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Document Operating Procedures ,[object Object],[object Object],[object Object],[object Object],[object Object]
Document Operating Procedures ,[object Object],[object Object],[object Object],[object Object],[object Object]
Document Operating Procedures ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Document Operating Procedures ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Document Operating Procedures ,[object Object],[object Object]
Determine Access Control ,[object Object],[object Object],[object Object],[object Object],[object Object]
Determine Access Control ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Determine Access Control ,[object Object],[object Object],[object Object],[object Object],[object Object]
Coordinate Business Continuity ,[object Object],[object Object],[object Object],[object Object]
Coordinate Business Continuity ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Demonstrate Compliance ,[object Object],[object Object],[object Object]
Demonstrate Compliance ,[object Object]
Demonstrate Compliance ,[object Object],[object Object],[object Object],[object Object]
Demonstrate Compliance ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Objective 2 – Review eCommerce ,[object Object],[object Object],[object Object],[object Object]
Consequences of Stolen Data ,[object Object],[object Object],[object Object],“ 639 of 700 companies and governmental agencies surveyed  lost  $31 million worth of  proprietary data  and spent $43 million to clean up computer viruses.”
Definitions ,[object Object],[object Object],[object Object],[object Object],[object Object]
Definitions ,[object Object],[object Object],[object Object],[object Object],[object Object]
California’s Original Precedent ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
California’s Original Precedent ,[object Object],[object Object],[object Object],[object Object]
Federal Mandates ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Federal Mandates ,[object Object],[object Object],[object Object]
Other States ,[object Object],[object Object],[object Object],[object Object],[object Object]
Links to ISO 17799 Clauses ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Objective 3 – RM Components ,[object Object],[object Object],[object Object],[object Object]
Vital Records (VR) Programs ,[object Object],[object Object],[object Object],[object Object],[object Object]
Vital Records (VR) Programs ,[object Object],[object Object],[object Object],[object Object]
Intellectual Property Protection ,[object Object],[object Object],[object Object]
Intellectual Property Protection ,[object Object],[object Object],[object Object],[object Object]
Information Lifecycle ,[object Object]
Retention and Disposition Issues ,[object Object],[object Object],[object Object],[object Object],[object Object]
Compliance and Documentation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Old Adage Still Stands ,[object Object],[object Object],[object Object],[object Object]
Staying Ahead Of The Curve ,[object Object],[object Object],[object Object],[object Object]
Confluence with Information Security - 17799 Session #M014 Ellie Myler, CRM, CBCP Senior Records Management Analyst  Entium Technology Partners, LLC 303-684-0496, emyler@entium.com George Broadbent,  Director, Enterprise Solutions Entium Technology Partners, LLC 610-415-7216, gbroadbent@entium.com Please Complete Your Session Evaluation

More Related Content

What's hot

Information Security Background
Information Security BackgroundInformation Security Background
Information Security Background
Nicholas Davis
 
4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...
4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...
4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...
SafeNet
 
Critical Security And Compliance Issues In Internet Banking
Critical Security And Compliance Issues In Internet BankingCritical Security And Compliance Issues In Internet Banking
Critical Security And Compliance Issues In Internet Banking
Thomas Donofrio
 

What's hot (20)

Byod
ByodByod
Byod
 
Information Security Background
Information Security BackgroundInformation Security Background
Information Security Background
 
Understand Risk in Communications and Data Breach
Understand Risk in Communications and Data BreachUnderstand Risk in Communications and Data Breach
Understand Risk in Communications and Data Breach
 
4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...
4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...
4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...
 
Leading Practices in Information Security & Privacy
Leading Practices in Information Security & PrivacyLeading Practices in Information Security & Privacy
Leading Practices in Information Security & Privacy
 
20100224 Presentation at RGIT Mumbai - Information Security Awareness
20100224 Presentation at RGIT Mumbai - Information Security Awareness20100224 Presentation at RGIT Mumbai - Information Security Awareness
20100224 Presentation at RGIT Mumbai - Information Security Awareness
 
Critical Security And Compliance Issues In Internet Banking
Critical Security And Compliance Issues In Internet BankingCritical Security And Compliance Issues In Internet Banking
Critical Security And Compliance Issues In Internet Banking
 
Insider Breaches and Data Theft by Employees and Contractors
Insider Breaches and Data Theft by Employees and ContractorsInsider Breaches and Data Theft by Employees and Contractors
Insider Breaches and Data Theft by Employees and Contractors
 
Information security management best practice
Information security management best practiceInformation security management best practice
Information security management best practice
 
Database & Data Security
Database & Data SecurityDatabase & Data Security
Database & Data Security
 
Gartner Security & Risk Management Summit 2014 - Defending the Enterprise Aga...
Gartner Security & Risk Management Summit 2014 - Defending the Enterprise Aga...Gartner Security & Risk Management Summit 2014 - Defending the Enterprise Aga...
Gartner Security & Risk Management Summit 2014 - Defending the Enterprise Aga...
 
Kristina Tanasichuk: Presentation of GTSC/InfraGard Cyber Survey
Kristina Tanasichuk: Presentation of GTSC/InfraGard Cyber SurveyKristina Tanasichuk: Presentation of GTSC/InfraGard Cyber Survey
Kristina Tanasichuk: Presentation of GTSC/InfraGard Cyber Survey
 
Emerging Trends in Information Security and Privacy
Emerging Trends in Information Security and PrivacyEmerging Trends in Information Security and Privacy
Emerging Trends in Information Security and Privacy
 
GDPR & IBM i Security
GDPR & IBM i SecurityGDPR & IBM i Security
GDPR & IBM i Security
 
needforsecurity
needforsecurityneedforsecurity
needforsecurity
 
Security Management Practices
Security Management PracticesSecurity Management Practices
Security Management Practices
 
Security and Control Issues in Information System
Security and Control Issues in Information SystemSecurity and Control Issues in Information System
Security and Control Issues in Information System
 
Clifford wilke
Clifford wilkeClifford wilke
Clifford wilke
 
Task 3
Task 3Task 3
Task 3
 
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...
 

Viewers also liked

Gestao da politica de segurança e operação da informacao
Gestao da politica de segurança e operação da informacaoGestao da politica de segurança e operação da informacao
Gestao da politica de segurança e operação da informacao
Rui Gomes
 
Information security in healthcare - a perspective on EMR Security
Information security in healthcare - a perspective on EMR SecurityInformation security in healthcare - a perspective on EMR Security
Information security in healthcare - a perspective on EMR Security
Madhav Chablani
 

Viewers also liked (9)

USWNT Sponsorship
USWNT SponsorshipUSWNT Sponsorship
USWNT Sponsorship
 
Ministerio del Interior - Presentación norma iso 17799
Ministerio del Interior - Presentación norma iso 17799Ministerio del Interior - Presentación norma iso 17799
Ministerio del Interior - Presentación norma iso 17799
 
Gestao da politica de segurança e operação da informacao
Gestao da politica de segurança e operação da informacaoGestao da politica de segurança e operação da informacao
Gestao da politica de segurança e operação da informacao
 
Iso 17799
Iso 17799Iso 17799
Iso 17799
 
Healthcare Security Essentials jean pawluk april 28 2011
Healthcare Security Essentials jean pawluk  april 28 2011 Healthcare Security Essentials jean pawluk  april 28 2011
Healthcare Security Essentials jean pawluk april 28 2011
 
Information security in healthcare - a perspective on EMR Security
Information security in healthcare - a perspective on EMR SecurityInformation security in healthcare - a perspective on EMR Security
Information security in healthcare - a perspective on EMR Security
 
Norma iso 27000
Norma iso 27000Norma iso 27000
Norma iso 27000
 
ISO 27001
ISO 27001ISO 27001
ISO 27001
 
Welingkar Presentation On Cobit And Iso 1799 And Bs 7799
Welingkar Presentation On Cobit And Iso 1799 And Bs 7799Welingkar Presentation On Cobit And Iso 1799 And Bs 7799
Welingkar Presentation On Cobit And Iso 1799 And Bs 7799
 

Similar to M014 Confluence Presentation 08 15 06

Data Risks In A Digital Age
Data Risks In A Digital Age Data Risks In A Digital Age
Data Risks In A Digital Age
padler01
 
The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4
stevemeltzer
 
The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4
stevemeltzer
 
The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4
stevemeltzer
 
AgendaIntroduction Administrative Controls Physical Contro.docx
AgendaIntroduction Administrative Controls Physical Contro.docxAgendaIntroduction Administrative Controls Physical Contro.docx
AgendaIntroduction Administrative Controls Physical Contro.docx
daniahendric
 
Ilta 2011 balancing km with data privacy facilitated by dave cunningham aug...
Ilta 2011 balancing km with data privacy   facilitated by dave cunningham aug...Ilta 2011 balancing km with data privacy   facilitated by dave cunningham aug...
Ilta 2011 balancing km with data privacy facilitated by dave cunningham aug...
David Cunningham
 
Best Practices In Corporate Privacy & Information Security
Best Practices In Corporate Privacy & Information SecurityBest Practices In Corporate Privacy & Information Security
Best Practices In Corporate Privacy & Information Security
satyakam_biswas
 
The new massachusetts privacy rules v5.35.1
The new massachusetts privacy rules v5.35.1The new massachusetts privacy rules v5.35.1
The new massachusetts privacy rules v5.35.1
stevemeltzer
 

Similar to M014 Confluence Presentation 08 15 06 (20)

The New Massachusetts Privacy Rules (February 2, 2010)
The New Massachusetts Privacy Rules (February 2, 2010)The New Massachusetts Privacy Rules (February 2, 2010)
The New Massachusetts Privacy Rules (February 2, 2010)
 
Data Risks In A Digital Age
Data Risks In A Digital Age Data Risks In A Digital Age
Data Risks In A Digital Age
 
The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4
 
The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4
 
The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4
 
2009 iapp-the corpprivacydeptmar13-2009
2009 iapp-the corpprivacydeptmar13-20092009 iapp-the corpprivacydeptmar13-2009
2009 iapp-the corpprivacydeptmar13-2009
 
AgendaIntroduction Administrative Controls Physical Contro.docx
AgendaIntroduction Administrative Controls Physical Contro.docxAgendaIntroduction Administrative Controls Physical Contro.docx
AgendaIntroduction Administrative Controls Physical Contro.docx
 
Business Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer ForensicBusiness Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer Forensic
 
Integrating Physical And Logical Security
Integrating Physical And Logical SecurityIntegrating Physical And Logical Security
Integrating Physical And Logical Security
 
Information Security Framework
Information Security FrameworkInformation Security Framework
Information Security Framework
 
What Every Organization Should Log And Monitor
What Every Organization Should Log And MonitorWhat Every Organization Should Log And Monitor
What Every Organization Should Log And Monitor
 
Microsoft 365 Compliance
Microsoft 365 ComplianceMicrosoft 365 Compliance
Microsoft 365 Compliance
 
Uid security
Uid securityUid security
Uid security
 
Ilta 2011 balancing km with data privacy facilitated by dave cunningham aug...
Ilta 2011 balancing km with data privacy   facilitated by dave cunningham aug...Ilta 2011 balancing km with data privacy   facilitated by dave cunningham aug...
Ilta 2011 balancing km with data privacy facilitated by dave cunningham aug...
 
Cisa 2013 ch5
Cisa 2013 ch5Cisa 2013 ch5
Cisa 2013 ch5
 
Best Practices In Corporate Privacy & Information Security
Best Practices In Corporate Privacy & Information SecurityBest Practices In Corporate Privacy & Information Security
Best Practices In Corporate Privacy & Information Security
 
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
 
The new massachusetts privacy rules v5.35.1
The new massachusetts privacy rules v5.35.1The new massachusetts privacy rules v5.35.1
The new massachusetts privacy rules v5.35.1
 
Data Protection: We\'re In This Together
Data Protection: We\'re In This TogetherData Protection: We\'re In This Together
Data Protection: We\'re In This Together
 
Don't Get Stung - Student Data Security
Don't Get Stung - Student Data Security Don't Get Stung - Student Data Security
Don't Get Stung - Student Data Security
 

Recently uploaded

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Recently uploaded (20)

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 

M014 Confluence Presentation 08 15 06

  • 1. Confluence with Information Security – ISO 17799 Ellie Myler, CRM, CBCP Senior Records Management Analyst Entium Technology Partners, LLC 303-684-0496, emyler@entium.com George Broadbent, Director, Enterprise Solutions Entium Technology Partners, LLC 610-415-7216, gbroadbent@entium.com Session #M014
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10. ISO 17799 Steps and Tasks
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 46.
  • 47.
  • 48.
  • 49.
  • 50.
  • 51.
  • 52.
  • 53.
  • 54.
  • 55.
  • 56. Confluence with Information Security - 17799 Session #M014 Ellie Myler, CRM, CBCP Senior Records Management Analyst Entium Technology Partners, LLC 303-684-0496, emyler@entium.com George Broadbent, Director, Enterprise Solutions Entium Technology Partners, LLC 610-415-7216, gbroadbent@entium.com Please Complete Your Session Evaluation