Security Matters It’s not about the network
What’s Your Biggest Threat? http://flickr.com/photos/mikeygottawa/533355476/
The Top 12 Security Threats Reported by CTOs <ul><li>12. Extortion </li></ul><ul><li>11. Denial of Service (DoS) </li></ul...
The Top 12 Security Threats Reported by CTOs <ul><li>6. Physical Loss </li></ul><ul><li>5. Unauthorized Access by Outsider...
The Top 2 (and #6) Security Threats The Cost of an “Inside Job” <ul><li>Four in ten IT managers report incidents involving...
Security Philosophy Control What You Can <ul><li>0’s and 1’s, not people.  </li></ul><ul><li>Network, workstations, device...
Control What You Can Networks <ul><li>NAT Routers </li></ul><ul><li>Integrated VPN </li></ul><ul><li>Dynamic IP addresses ...
Control What You Can Workstations <ul><li>Firewalls </li></ul><ul><li>Antivirus </li></ul><ul><li>Anti-spyware </li></ul><...
Control What You Can In the Cloud <ul><li>Enough seats for all users </li></ul><ul><li>Independent passwords </li></ul><ul...
Control What You Can Devices / Drives <ul><li>Passwords for all devices and drives </li></ul><ul><li>Encryption for files ...
Security Philosophy IT’s More than Digital <ul><li>In 2008…each man, woman, and child will use 4,847 sheets of the office ...
Security Philosophy Plug the Biggest Holes <ul><li>Prioritize!  </li></ul><ul><ul><li>Risk = Value of Asset x Severity of ...
Security Philosophy Plan for Failure <ul><li>Know how you will respond to security breaches in terms of IT </li></ul><ul><...
Security Philosophy Train for Success <ul><li>Ultimately, your success relies on your people  </li></ul><ul><li>Try Disast...
Security Resources <ul><li>HP Security Risk Assessment </li></ul><ul><ul><li>http://h71028.www7.hp.com/ERC/cache/568165-0-...
As we look ahead into the next century, leaders will be those who empower others. - Bill Gates, founder Microsoft
Upcoming SlideShare
Loading in...5
×

Nonprofit Security Matters: It's Not About the Network

653

Published on

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
653
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
6
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide
  • Nonprofit Security Matters: It's Not About the Network

    1. 1. Security Matters It’s not about the network
    2. 2. What’s Your Biggest Threat? http://flickr.com/photos/mikeygottawa/533355476/
    3. 3. The Top 12 Security Threats Reported by CTOs <ul><li>12. Extortion </li></ul><ul><li>11. Denial of Service (DoS) </li></ul><ul><li>10. Vandalism </li></ul><ul><li>9. Pharming </li></ul><ul><li>8. Phishing </li></ul><ul><li>7. Fraudulent Transaction </li></ul>
    4. 4. The Top 12 Security Threats Reported by CTOs <ul><li>6. Physical Loss </li></ul><ul><li>5. Unauthorized Access by Outsiders </li></ul><ul><li>4. Malware </li></ul><ul><li>3. Spam </li></ul><ul><li>2. Unauthorized Access by Insiders </li></ul><ul><li>1. Insider Misuse </li></ul><ul><ul><li>Source: http://www.computereconomics.com/article.cfm?id=1214 </li></ul></ul>
    5. 5. The Top 2 (and #6) Security Threats The Cost of an “Inside Job” <ul><li>Four in ten IT managers report incidents involving non-compliance while another 27 percent have seen unintentional release of corporate information. </li></ul><ul><li>A typical incident requires 22 IT employee hours to remediate. </li></ul>
    6. 6. Security Philosophy Control What You Can <ul><li>0’s and 1’s, not people. </li></ul><ul><li>Network, workstations, devices, applications, files. </li></ul>
    7. 7. Control What You Can Networks <ul><li>NAT Routers </li></ul><ul><li>Integrated VPN </li></ul><ul><li>Dynamic IP addresses </li></ul><ul><li>Wireless - closed </li></ul>http://flickr.com/photos/abbyladybug/930518276/
    8. 8. Control What You Can Workstations <ul><li>Firewalls </li></ul><ul><li>Antivirus </li></ul><ul><li>Anti-spyware </li></ul><ul><li>Spam filtering </li></ul><ul><li>Internet filtering (?) </li></ul><ul><li>Backups </li></ul>http://flickr.com/photos/53088165@N00/579761138/
    9. 9. Control What You Can In the Cloud <ul><li>Enough seats for all users </li></ul><ul><li>Independent passwords </li></ul><ul><li>Automatic logout </li></ul><ul><li>Required password changes </li></ul>http://flickr.com/photos/86778817@N00/88641569/
    10. 10. Control What You Can Devices / Drives <ul><li>Passwords for all devices and drives </li></ul><ul><li>Encryption for files stored on devices and drives </li></ul>http://flickr.com/photos/ian-s/2152798588/
    11. 11. Security Philosophy IT’s More than Digital <ul><li>In 2008…each man, woman, and child will use 4,847 sheets of the office paper, 36 sheets fewer than 2007. </li></ul><ul><ul><li>Source: http://www.entrepreneur.com/tradejournals/article/184744007.html </li></ul></ul>
    12. 12. Security Philosophy Plug the Biggest Holes <ul><li>Prioritize! </li></ul><ul><ul><li>Risk = Value of Asset x Severity of Vulnerability x Likelihood of Attack </li></ul></ul><ul><ul><li>Source: http://h71028.www7.hp.com/ERC/cache/568165-0-0-0-121.html </li></ul></ul>
    13. 13. Security Philosophy Plan for Failure <ul><li>Know how you will respond to security breaches in terms of IT </li></ul><ul><li>Plan for notifying important parties - it’s the law! </li></ul>
    14. 14. Security Philosophy Train for Success <ul><li>Ultimately, your success relies on your people </li></ul><ul><li>Try Disaster Days trainings (make it fun!) </li></ul><ul><li>Make security issues part of your regular communications </li></ul>
    15. 15. Security Resources <ul><li>HP Security Risk Assessment </li></ul><ul><ul><li>http://h71028.www7.hp.com/ERC/cache/568165-0-0-0-121.html </li></ul></ul><ul><li>TechSoup Healthy and Secure Computing </li></ul><ul><ul><li>http://www.techsoup.org/hsc/ </li></ul></ul><ul><li>CERT Octave </li></ul><ul><ul><li>http://www.cert.org/octave/ </li></ul></ul><ul><li>SANS Reading Room </li></ul><ul><ul><li>http://sans.org/ </li></ul></ul><ul><li>Security Focus </li></ul><ul><ul><li>http://www.securityfocus.com/ </li></ul></ul><ul><li>NSA Security Confirguration Guides </li></ul><ul><ul><li>http://www.nsa.gov/snac/ </li></ul></ul>
    16. 16. As we look ahead into the next century, leaders will be those who empower others. - Bill Gates, founder Microsoft
    1. A particular slide catching your eye?

      Clipping is a handy way to collect important slides you want to go back to later.

    ×