Your SlideShare is downloading. ×
0
Threats And Countermeasures
Threats And Countermeasures
Threats And Countermeasures
Threats And Countermeasures
Threats And Countermeasures
Threats And Countermeasures
Threats And Countermeasures
Threats And Countermeasures
Threats And Countermeasures
Threats And Countermeasures
Threats And Countermeasures
Threats And Countermeasures
Threats And Countermeasures
Threats And Countermeasures
Threats And Countermeasures
Threats And Countermeasures
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Threats And Countermeasures

971

Published on

I gave this presentation at a security conference in Mumbai in 2007.

I gave this presentation at a security conference in Mumbai in 2007.

Published in: Technology
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
971
On Slideshare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
0
Comments
0
Likes
1
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide
  • Transcript

    • 1. Securing the Un-securable? Emerging threats and preventive methods in the Enterprise Jon Collins, Service Director Freeform Dynamics Ltd [email_address] www.freeformdynamics.com
    • 2. Agenda
      • The nature of the beast
        • Risks and their impact
        • Moving the goalposts
      • The role of technology
        • The fire extinguisher industry…
        • … and the fire fighting customer
      • Knowing where to start
        • Knowledge is power
        • The fundamentals of best practice
    • 3. The Nature of the Beast
      • How prominent are the following threats to [IT] security and how is this changing?
    • 4.
      • To what degree do you consider these specific risks during business planning?
    • 5.
      • Have concerns of risk exposure specifically held you back from taking full advantage of any of the following?
    • 6. Moving the Goalposts…
    • 7. The Changing Threat Landscape VIRUSES AND TROJANS INTRUSION AND DENIAL SPAMMING AND PHISHING
    • 8. The Changing Enterprise Boundary
    • 9.
      • Is the increasing popularity of removable storage devices such as USB memory sticks and portable hard drives a potential threat to information security?
      Behaviours – individual and corporate
    • 10. The role of technology – can it really help?
    • 11.
      • Turning to IT security measures, what is the status of your capability in the following areas?
    • 12. On fire fighting and fire extinguishers
    • 13. What’s holding organisations back?
      • Broader risk understanding
      • Rapidly changing context
      • Data proliferation
      • Separation of concerns
      • Boundary protection vs deperimeterisation
    • 14. Integration and Co-ordination are Key – but there’s still a way to go!
    • 15. So, where to start?
      • Security exists to enable business
      • Risk mitigation, not avoidance
      • Balance trust with prevention
        • Awareness training
        • Acceptable behaviour
        • Enforceable policy
      • Make ownership a first step
    • 16. Thank You Jon Collins, Service Director Freeform Dynamics Ltd [email_address] 2007 www.freeformdynamics.com

    ×