SlideShare a Scribd company logo
1 of 24
Download to read offline
Los Angeles Security Summit 7
A Great Day of Collaboration, Learning,
Networking
ISSA LOS ANGELES
 Join Our Community
 Issala.org
 Twitter: @issala
 LinkedIn: ISSA Los Angeles Chapter Networking
 Facebook: Information Systems Security
Association (ISSA) Los Angeles Chapter
 Have drinks with us
ISSA LOS ANGELES
 Come to our monthly meetings
• Next meeting is June 17 at Taix French
Restaurant in Echo Park at 11:30am
 We have dinner meetings: July 15 and Sept 16
 Holiday Party with OWASP December 16th
 Join our CISO Forum
 Join us at sporting events
WHAT DID WE LEARN TODAY?
 Breaches are Occurring Everywhere in Every Industry
 Phishing Attacks are Multiplying and are Now the
Preferred Method of Infiltration
 How to Build Secure Application Development
Environments
 Breaches Are Not Discovered for 6-9 Months
• Often Discovered by External Source
 Some Potential Attacks of the Future
RECENT BREACHES
 Anthem: 78.8 million records
 Target: 42 million people’s credit or debit information stolen;
banks file class-action lawsuit against Target
 Home Depot: estimated 56 million credit and debit card
numbers
 JPMorgan: 76 million households and 7 million small
businesses
 Carbanak: $1 billion stolen from more than 100 banks in 30
countries
 AdultFriendFinder.com 3.9 million users' personal details and
sexual preferences
DATA BREACH COSTS
 Average Cost of a Data Breach in US Averages
$6.5 million, highest in the world
 One estimate of the cost to Home Depot is $10
billion by 2020
 Cost in Health Care Organizations Could be as
much as $363 Per Record
THE TIMES THEY ARE A CHANGIN’
 Every Business is Now a Target
 Every Medical Device Could be a Target
 Every Car Could be a Target
 Every Refrigerator Could be a Target
 Every Drone Could be an Attacker
AWARENESS OF SECURITY SEEMS TO BE
EVERYWHERE!
 Boardrooms Now Have Security on their Agendas
80% of the Time
 Breaches are a Weekly News Item on Mainstream
Media
 Cousins Call Us for Advice or to Ask What We Think
of the Latest Attack
 Congress is Talking About Security
WHAT THE $%#%^%&*?
 Old Vulnerabilities Are Still Everywhere
• SQL Injection (in the OWASP Top 10 in 2007 and still there!)
• 44%of known breaches in 2014 came from vulnerabilities
that were between two and four years old1
 Patching is Still Problematic
 Change Management is not Happening
 Configuration Management is Not Happening
 Our Mission Critical Information is Not Encrypted
1 HP 2015 Cyber Risk Report
OUR WORKFORCE HAS GONE
PHISHING!
 Click That Link!
 Open That Attachment!
 Open That Email From the Unknown Sender
 Respond to that “Too Good to be True” Email
Scam!
 Forward that Funny Attachment to Everyone!
 We Love Port 80!!
WHAT’S A GOOD SECURITY LEADER TO
DO?!
 Go on Tour
 Security Awareness Training for Everyone
• Address Your Companies Vulnerability Trends
• Gamify Your Training
• Provide Incentives and Prizes
• Please, No Death by PowerPoint
 Speak at Division Meetings
 Speak at General Staff Meetings
MEET WITH KEY PLAYERS
Lunch with all Executives
Meet Regularly
• With CTO or Head of System Admins
• Division Heads
• Legal
• Risk Compliance
Learn to Talk “Businessese”
CREATE AND ENFORCE POLICIES,
STANDARDS, AND PROCEDURES
 Ensure Standard Image is Created
• Is Regularly Updated
• Is Regularly Tested
• Deployed Everywhere-Especially on Admin
Systems
 No one Should Be Regularly Logged in with Admin
Privileges
 Have a Plan and Procedures for Securing Portable
Devices and BYOD
BAKE SECURITY INTO THE SDLC
 Embrace and Befriend the Head of Application
Development
 Utilize Static/Dynamic Web App Vulnerability
Scanners
 Have All Staff in AppDev Take Secure Coding
Training
 All Project Proposals Must be Reviewed by InfoSec
 Work with the PMO
SECURE YOUR PHYSICAL
ENVIRONMENT
 Does Your Facilities Head Purchase Physical Security
Solutions Without InfoSec Involvement or
Knowledge?
 Are Your Physical Security Access Cards Waaay too
Easy to Hack? Most Are!
 Do You Know Who Has Access to Your Data Center?
Are You Sure?
 Can People Leave Your Buildings Carrying Anything
They Want?
MONITOR SYSTEMS REGULARLY
 Are You Able to Detect Anomalies on Your
Networks?
 Do You Know if You Have Been Compromised?
Probably Not!
 Would You be able to Detect Strange Outbound
Traffic to, Let’s Say, China or North Korea?
 Monitor Unusual Changes in User Behavior
 Do You Know if 50 Users All Had Their Accounts
Locked After Unsuccessful Login Attempts?
CREATE AND REVIEW REPORTS
 Create Remediation Plans After Reviewing Network
Vulnerability Scans
 Compare Reports From Various Tools: Patch
Management, Vulnerability Scanning, Anti-Malware
 Follow-up on Remediation Efforts
 Rescan and Review Reports
 Look for Patterns in Incidents in Your HelpDesk
Database
ENFORCE ACCESS MANAGEMENT
STANDARDS
 Work With HR to Establish Provisioning/
Deprovisioning Procedures
 Enforce Process to Approve and Grant Access to
Systems
 Enforce Deprovisioning Procedures
 Periodically Audit Systems Access
 Two Factors Required for all Admin Access to Mission
Critical Systems
NETWORK AND COLLABORATE
 Attend Networking Events
 Make New Contacts
 Share War Stories and Solutions
 Join ISSA, OWASP, ISACA, CSA, HTCIA, etc.
 Form New Groups
 Look for Meetups
 Leave Here Today With at Least 5 New Contacts;
Follow-up with them
KEEP LEARNING
Webcasts
Classes
Podcasts
Books
LinkedIn and Twitter Links
Blogs
Networking Events and Conferences
HELP PREPARE THE NEXT GENERATION
OF SECURITY LEADERS
Hire Students
Train and Mentor Your Staff
Speak at Schools
Support Cyber Competitions
Help Schools With their Curriculum
Teach Security at Schools
MOST IMPORTANTLY!!
DRINK AND EAT WITH US…NOW!!!!
Food and Drink Next Door in the Vendor Expo
Last Chance to Meet with Vendors
Last Chance to Enter to Win Raffle Prizes
Book Signing
Raffle Drawing in 15 Minutes
THANK YOU!
To All Our Speakers
To All Our Volunteers
To My Fellow Board Members
To All of You For Joining Us
To All Our Vendor Partners
To Our Fellow Organizations
THANK YOU!
Stay Safe
Stay Hungry for Knowledge
Believe in Yourself
Live Long and Prosper!
See You All At Summit 8!

More Related Content

What's hot

Malware is Called Malicious for a Reason: The Risks of Weaponizing Code
Malware is Called Malicious for a Reason: The Risks of Weaponizing CodeMalware is Called Malicious for a Reason: The Risks of Weaponizing Code
Malware is Called Malicious for a Reason: The Risks of Weaponizing CodeStephen Cobb
 
Cultivating security in the small nonprofit
Cultivating security in the small nonprofitCultivating security in the small nonprofit
Cultivating security in the small nonprofitRoger Hagedorn
 
Cybersecurity for Emergency Managers
Cybersecurity for Emergency ManagersCybersecurity for Emergency Managers
Cybersecurity for Emergency ManagersSarah K Miller
 
7 cyber security questions for boards
7 cyber security questions for boards7 cyber security questions for boards
7 cyber security questions for boardsPaul McGillicuddy
 
Jason Harrell - Compliance and Security: Building a Cybersecurity Risk Manage...
Jason Harrell - Compliance and Security: Building a Cybersecurity Risk Manage...Jason Harrell - Compliance and Security: Building a Cybersecurity Risk Manage...
Jason Harrell - Compliance and Security: Building a Cybersecurity Risk Manage...centralohioissa
 
Why security is the kidney not the tail of the dog v3
Why security is the kidney not the tail of the dog v3Why security is the kidney not the tail of the dog v3
Why security is the kidney not the tail of the dog v3Ernest Staats
 
ISACA State of Cyber Security 2017
ISACA State of Cyber Security 2017ISACA State of Cyber Security 2017
ISACA State of Cyber Security 2017ISACA
 
Nonprofit Cybersecurity Readiness - Community IT Innovators Webinar
Nonprofit Cybersecurity Readiness - Community IT Innovators WebinarNonprofit Cybersecurity Readiness - Community IT Innovators Webinar
Nonprofit Cybersecurity Readiness - Community IT Innovators WebinarCommunity IT Innovators
 
A Practical Security Framework for Website Owners
A Practical Security Framework for Website OwnersA Practical Security Framework for Website Owners
A Practical Security Framework for Website OwnersTony Perez
 
Colin Domoney -
Colin Domoney -  Colin Domoney -
Colin Domoney - DevSecCon
 
Mitigating Risk from Cyber Security Attacks
Mitigating Risk from Cyber Security AttacksMitigating Risk from Cyber Security Attacks
Mitigating Risk from Cyber Security AttacksTripwire
 
Aaron Higbee - The Humanity of Phishing Attack & Defense
Aaron Higbee - The Humanity of Phishing Attack & DefenseAaron Higbee - The Humanity of Phishing Attack & Defense
Aaron Higbee - The Humanity of Phishing Attack & DefenseJason Luttrell, CISSP, CISM
 
Amy DeMartine - 7 Habits of Rugged DevOps
Amy DeMartine - 7 Habits of Rugged DevOpsAmy DeMartine - 7 Habits of Rugged DevOps
Amy DeMartine - 7 Habits of Rugged DevOpsSeniorStoryteller
 
Web security – application security roads to software security nirvana iisf...
Web security – application security roads to software security nirvana   iisf...Web security – application security roads to software security nirvana   iisf...
Web security – application security roads to software security nirvana iisf...Eoin Keary
 
The What If's of Hostile:Evil Personas
The What If's of Hostile:Evil PersonasThe What If's of Hostile:Evil Personas
The What If's of Hostile:Evil PersonasAllison Donatto
 
Are Your IT Systems Secure?
Are Your IT Systems Secure?Are Your IT Systems Secure?
Are Your IT Systems Secure?Nex-Tech
 
Community IT Webinar - IT Security for Nonprofits
Community IT Webinar - IT Security for NonprofitsCommunity IT Webinar - IT Security for Nonprofits
Community IT Webinar - IT Security for NonprofitsCommunity IT Innovators
 
5 Key Findings on Advanced Threats
5 Key Findings on Advanced Threats5 Key Findings on Advanced Threats
5 Key Findings on Advanced ThreatsHannah Jenney
 

What's hot (20)

Assessing Your security
Assessing Your securityAssessing Your security
Assessing Your security
 
Malware is Called Malicious for a Reason: The Risks of Weaponizing Code
Malware is Called Malicious for a Reason: The Risks of Weaponizing CodeMalware is Called Malicious for a Reason: The Risks of Weaponizing Code
Malware is Called Malicious for a Reason: The Risks of Weaponizing Code
 
Cultivating security in the small nonprofit
Cultivating security in the small nonprofitCultivating security in the small nonprofit
Cultivating security in the small nonprofit
 
Cybersecurity for Emergency Managers
Cybersecurity for Emergency ManagersCybersecurity for Emergency Managers
Cybersecurity for Emergency Managers
 
7 cyber security questions for boards
7 cyber security questions for boards7 cyber security questions for boards
7 cyber security questions for boards
 
Jason Harrell - Compliance and Security: Building a Cybersecurity Risk Manage...
Jason Harrell - Compliance and Security: Building a Cybersecurity Risk Manage...Jason Harrell - Compliance and Security: Building a Cybersecurity Risk Manage...
Jason Harrell - Compliance and Security: Building a Cybersecurity Risk Manage...
 
Why security is the kidney not the tail of the dog v3
Why security is the kidney not the tail of the dog v3Why security is the kidney not the tail of the dog v3
Why security is the kidney not the tail of the dog v3
 
ISACA State of Cyber Security 2017
ISACA State of Cyber Security 2017ISACA State of Cyber Security 2017
ISACA State of Cyber Security 2017
 
Nonprofit Cybersecurity Readiness - Community IT Innovators Webinar
Nonprofit Cybersecurity Readiness - Community IT Innovators WebinarNonprofit Cybersecurity Readiness - Community IT Innovators Webinar
Nonprofit Cybersecurity Readiness - Community IT Innovators Webinar
 
A Practical Security Framework for Website Owners
A Practical Security Framework for Website OwnersA Practical Security Framework for Website Owners
A Practical Security Framework for Website Owners
 
Colin Domoney -
Colin Domoney -  Colin Domoney -
Colin Domoney -
 
Mitigating Risk from Cyber Security Attacks
Mitigating Risk from Cyber Security AttacksMitigating Risk from Cyber Security Attacks
Mitigating Risk from Cyber Security Attacks
 
Aaron Higbee - The Humanity of Phishing Attack & Defense
Aaron Higbee - The Humanity of Phishing Attack & DefenseAaron Higbee - The Humanity of Phishing Attack & Defense
Aaron Higbee - The Humanity of Phishing Attack & Defense
 
Amy DeMartine - 7 Habits of Rugged DevOps
Amy DeMartine - 7 Habits of Rugged DevOpsAmy DeMartine - 7 Habits of Rugged DevOps
Amy DeMartine - 7 Habits of Rugged DevOps
 
Web security – application security roads to software security nirvana iisf...
Web security – application security roads to software security nirvana   iisf...Web security – application security roads to software security nirvana   iisf...
Web security – application security roads to software security nirvana iisf...
 
NTXISSACSC2 - Top Ten Trends in TRM by Jon Murphy
NTXISSACSC2 - Top Ten Trends in TRM by Jon MurphyNTXISSACSC2 - Top Ten Trends in TRM by Jon Murphy
NTXISSACSC2 - Top Ten Trends in TRM by Jon Murphy
 
The What If's of Hostile:Evil Personas
The What If's of Hostile:Evil PersonasThe What If's of Hostile:Evil Personas
The What If's of Hostile:Evil Personas
 
Are Your IT Systems Secure?
Are Your IT Systems Secure?Are Your IT Systems Secure?
Are Your IT Systems Secure?
 
Community IT Webinar - IT Security for Nonprofits
Community IT Webinar - IT Security for NonprofitsCommunity IT Webinar - IT Security for Nonprofits
Community IT Webinar - IT Security for Nonprofits
 
5 Key Findings on Advanced Threats
5 Key Findings on Advanced Threats5 Key Findings on Advanced Threats
5 Key Findings on Advanced Threats
 

Viewers also liked

Where to Store the Cloud Encryption Keys - InterOp 2012
Where to Store the Cloud Encryption Keys - InterOp 2012Where to Store the Cloud Encryption Keys - InterOp 2012
Where to Store the Cloud Encryption Keys - InterOp 2012Trend Micro
 
Encryption in the Public Cloud: 16 Bits of Advice for Security Techniques
Encryption in the Public Cloud: 16 Bits of Advice for Security TechniquesEncryption in the Public Cloud: 16 Bits of Advice for Security Techniques
Encryption in the Public Cloud: 16 Bits of Advice for Security TechniquesTrend Micro
 
Technical track chris calvert-1 30 pm-issa conference-calvert
Technical track chris calvert-1 30 pm-issa conference-calvertTechnical track chris calvert-1 30 pm-issa conference-calvert
Technical track chris calvert-1 30 pm-issa conference-calvertISSA LA
 
Lo Zen e l'arte dell'UX Design Mobile - by Synesthesia - festival ICT 2015
Lo Zen e l'arte dell'UX Design Mobile - by Synesthesia - festival ICT 2015Lo Zen e l'arte dell'UX Design Mobile - by Synesthesia - festival ICT 2015
Lo Zen e l'arte dell'UX Design Mobile - by Synesthesia - festival ICT 2015festival ICT 2016
 
Captain, Where Is Your Ship – Compromising Vessel Tracking Systems
Captain, Where Is Your Ship – Compromising Vessel Tracking SystemsCaptain, Where Is Your Ship – Compromising Vessel Tracking Systems
Captain, Where Is Your Ship – Compromising Vessel Tracking SystemsTrend Micro
 
The Web Advisor: restare vivi e aggiornati nel business digitale - festival I...
The Web Advisor: restare vivi e aggiornati nel business digitale - festival I...The Web Advisor: restare vivi e aggiornati nel business digitale - festival I...
The Web Advisor: restare vivi e aggiornati nel business digitale - festival I...festival ICT 2016
 
Skip the Security Slow Lane with VMware Cloud on AWS
Skip the Security Slow Lane with VMware Cloud on AWSSkip the Security Slow Lane with VMware Cloud on AWS
Skip the Security Slow Lane with VMware Cloud on AWSTrend Micro
 
Its time to grow up by Eric C.
Its time to grow up by Eric C.Its time to grow up by Eric C.
Its time to grow up by Eric C.ISSA LA
 
HBR APT framework
HBR APT frameworkHBR APT framework
HBR APT frameworkTrend Micro
 
Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.
Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.
Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.Trend Micro
 
Migliorare il cash flow della propria azienda e dei propri clienti: i benefic...
Migliorare il cash flow della propria azienda e dei propri clienti: i benefic...Migliorare il cash flow della propria azienda e dei propri clienti: i benefic...
Migliorare il cash flow della propria azienda e dei propri clienti: i benefic...festival ICT 2016
 
Criticità per la protezione dei dati personali connesse all’utilizzo di dispo...
Criticità per la protezione dei dati personali connesse all’utilizzo di dispo...Criticità per la protezione dei dati personali connesse all’utilizzo di dispo...
Criticità per la protezione dei dati personali connesse all’utilizzo di dispo...festival ICT 2016
 
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...Acrodex
 
Issa jason dablow
Issa jason dablowIssa jason dablow
Issa jason dablowISSA LA
 
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...Ingram Micro Cloud
 
Turner.issa la.mobile vulns.150604
Turner.issa la.mobile vulns.150604Turner.issa la.mobile vulns.150604
Turner.issa la.mobile vulns.150604ISSA LA
 
Threat predictions 2011
Threat predictions 2011 Threat predictions 2011
Threat predictions 2011 Trend Micro
 
Who owns security in the cloud
Who owns security in the cloudWho owns security in the cloud
Who owns security in the cloudTrend Micro
 
Regina Technology Innovation Day
Regina Technology Innovation DayRegina Technology Innovation Day
Regina Technology Innovation DayAcrodex
 

Viewers also liked (20)

Where to Store the Cloud Encryption Keys - InterOp 2012
Where to Store the Cloud Encryption Keys - InterOp 2012Where to Store the Cloud Encryption Keys - InterOp 2012
Where to Store the Cloud Encryption Keys - InterOp 2012
 
Encryption in the Public Cloud: 16 Bits of Advice for Security Techniques
Encryption in the Public Cloud: 16 Bits of Advice for Security TechniquesEncryption in the Public Cloud: 16 Bits of Advice for Security Techniques
Encryption in the Public Cloud: 16 Bits of Advice for Security Techniques
 
Technical track chris calvert-1 30 pm-issa conference-calvert
Technical track chris calvert-1 30 pm-issa conference-calvertTechnical track chris calvert-1 30 pm-issa conference-calvert
Technical track chris calvert-1 30 pm-issa conference-calvert
 
Lo Zen e l'arte dell'UX Design Mobile - by Synesthesia - festival ICT 2015
Lo Zen e l'arte dell'UX Design Mobile - by Synesthesia - festival ICT 2015Lo Zen e l'arte dell'UX Design Mobile - by Synesthesia - festival ICT 2015
Lo Zen e l'arte dell'UX Design Mobile - by Synesthesia - festival ICT 2015
 
Captain, Where Is Your Ship – Compromising Vessel Tracking Systems
Captain, Where Is Your Ship – Compromising Vessel Tracking SystemsCaptain, Where Is Your Ship – Compromising Vessel Tracking Systems
Captain, Where Is Your Ship – Compromising Vessel Tracking Systems
 
The Web Advisor: restare vivi e aggiornati nel business digitale - festival I...
The Web Advisor: restare vivi e aggiornati nel business digitale - festival I...The Web Advisor: restare vivi e aggiornati nel business digitale - festival I...
The Web Advisor: restare vivi e aggiornati nel business digitale - festival I...
 
Skip the Security Slow Lane with VMware Cloud on AWS
Skip the Security Slow Lane with VMware Cloud on AWSSkip the Security Slow Lane with VMware Cloud on AWS
Skip the Security Slow Lane with VMware Cloud on AWS
 
Its time to grow up by Eric C.
Its time to grow up by Eric C.Its time to grow up by Eric C.
Its time to grow up by Eric C.
 
Microsoft
MicrosoftMicrosoft
Microsoft
 
HBR APT framework
HBR APT frameworkHBR APT framework
HBR APT framework
 
Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.
Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.
Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.
 
Migliorare il cash flow della propria azienda e dei propri clienti: i benefic...
Migliorare il cash flow della propria azienda e dei propri clienti: i benefic...Migliorare il cash flow della propria azienda e dei propri clienti: i benefic...
Migliorare il cash flow della propria azienda e dei propri clienti: i benefic...
 
Criticità per la protezione dei dati personali connesse all’utilizzo di dispo...
Criticità per la protezione dei dati personali connesse all’utilizzo di dispo...Criticità per la protezione dei dati personali connesse all’utilizzo di dispo...
Criticità per la protezione dei dati personali connesse all’utilizzo di dispo...
 
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...
 
Issa jason dablow
Issa jason dablowIssa jason dablow
Issa jason dablow
 
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...
 
Turner.issa la.mobile vulns.150604
Turner.issa la.mobile vulns.150604Turner.issa la.mobile vulns.150604
Turner.issa la.mobile vulns.150604
 
Threat predictions 2011
Threat predictions 2011 Threat predictions 2011
Threat predictions 2011
 
Who owns security in the cloud
Who owns security in the cloudWho owns security in the cloud
Who owns security in the cloud
 
Regina Technology Innovation Day
Regina Technology Innovation DayRegina Technology Innovation Day
Regina Technology Innovation Day
 

Similar to Microsoft power point closing presentation-greenberg

Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...Rishi Singh
 
Webinar: Cybersecurity and the New Age of Hackers
Webinar: Cybersecurity and the New Age of HackersWebinar: Cybersecurity and the New Age of Hackers
Webinar: Cybersecurity and the New Age of HackersModern Healthcare
 
Keep Up with the Demands of IT Security on a Nonprofit Budget
Keep Up with the Demands of IT Security on a Nonprofit BudgetKeep Up with the Demands of IT Security on a Nonprofit Budget
Keep Up with the Demands of IT Security on a Nonprofit BudgetBVU
 
Intro to INFOSEC
Intro to INFOSECIntro to INFOSEC
Intro to INFOSECSean Whalen
 
Cybersecurity 5 road_blocks
Cybersecurity 5 road_blocksCybersecurity 5 road_blocks
Cybersecurity 5 road_blocksCyphort
 
DevSecCon Asia 2017 Shannon Lietz: Security is Shifting Left
DevSecCon Asia 2017 Shannon Lietz: Security is Shifting LeftDevSecCon Asia 2017 Shannon Lietz: Security is Shifting Left
DevSecCon Asia 2017 Shannon Lietz: Security is Shifting LeftDevSecCon
 
HDI Capital Area Slides August 17, 2018
HDI Capital Area Slides August 17, 2018HDI Capital Area Slides August 17, 2018
HDI Capital Area Slides August 17, 2018hdicapitalarea
 
How to assess and manage cyber risk
How to assess and manage cyber riskHow to assess and manage cyber risk
How to assess and manage cyber riskStephen Cobb
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Stephen Cobb
 
2017-10-05 Mitigating Cybersecurity and Cyber Fraud risk in Your Organization
2017-10-05 Mitigating Cybersecurity and Cyber Fraud risk in Your Organization2017-10-05 Mitigating Cybersecurity and Cyber Fraud risk in Your Organization
2017-10-05 Mitigating Cybersecurity and Cyber Fraud risk in Your OrganizationRaffa Learning Community
 
Cyber Security Awareness Month 2017-Nugget 6
Cyber Security Awareness Month 2017-Nugget 6Cyber Security Awareness Month 2017-Nugget 6
Cyber Security Awareness Month 2017-Nugget 6Chinatu Uzuegbu
 
1 - Shaping Tomorrow Guide - Introduction
1 - Shaping Tomorrow Guide - Introduction1 - Shaping Tomorrow Guide - Introduction
1 - Shaping Tomorrow Guide - IntroductionKerry Richardson
 
Security Minded - Ransomware Awareness
Security Minded - Ransomware AwarenessSecurity Minded - Ransomware Awareness
Security Minded - Ransomware AwarenessGreg Wartes, MCP
 
11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of securityMatthew Pascucci
 
Be More Secure than your Competition: MePush Cyber Security for Small Business
Be More Secure than your Competition:  MePush Cyber Security for Small BusinessBe More Secure than your Competition:  MePush Cyber Security for Small Business
Be More Secure than your Competition: MePush Cyber Security for Small BusinessArt Ocain
 
The Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
The Cloud 9 - Threat & Solutions 2016 by Bobby DominguezThe Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
The Cloud 9 - Threat & Solutions 2016 by Bobby DominguezEC-Council
 
Webinar - Cyber Hygiene: Stay Clean at Work and at Home
Webinar - Cyber Hygiene: Stay Clean at Work and at HomeWebinar - Cyber Hygiene: Stay Clean at Work and at Home
Webinar - Cyber Hygiene: Stay Clean at Work and at HomeWPICPE
 
Protecting the Core of Your Network
Protecting the Core of Your Network Protecting the Core of Your Network
Protecting the Core of Your Network Mighty Guides, Inc.
 

Similar to Microsoft power point closing presentation-greenberg (20)

Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
 
Webinar: Cybersecurity and the New Age of Hackers
Webinar: Cybersecurity and the New Age of HackersWebinar: Cybersecurity and the New Age of Hackers
Webinar: Cybersecurity and the New Age of Hackers
 
Keep Up with the Demands of IT Security on a Nonprofit Budget
Keep Up with the Demands of IT Security on a Nonprofit BudgetKeep Up with the Demands of IT Security on a Nonprofit Budget
Keep Up with the Demands of IT Security on a Nonprofit Budget
 
Intro to INFOSEC
Intro to INFOSECIntro to INFOSEC
Intro to INFOSEC
 
Cybersecurity 5 road_blocks
Cybersecurity 5 road_blocksCybersecurity 5 road_blocks
Cybersecurity 5 road_blocks
 
DevSecCon Asia 2017 Shannon Lietz: Security is Shifting Left
DevSecCon Asia 2017 Shannon Lietz: Security is Shifting LeftDevSecCon Asia 2017 Shannon Lietz: Security is Shifting Left
DevSecCon Asia 2017 Shannon Lietz: Security is Shifting Left
 
HDI Capital Area Slides August 17, 2018
HDI Capital Area Slides August 17, 2018HDI Capital Area Slides August 17, 2018
HDI Capital Area Slides August 17, 2018
 
How to assess and manage cyber risk
How to assess and manage cyber riskHow to assess and manage cyber risk
How to assess and manage cyber risk
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
 
Riverside Healthcare Accelerate Tech 2016 presentation
Riverside Healthcare Accelerate Tech 2016 presentationRiverside Healthcare Accelerate Tech 2016 presentation
Riverside Healthcare Accelerate Tech 2016 presentation
 
2017-10-05 Mitigating Cybersecurity and Cyber Fraud risk in Your Organization
2017-10-05 Mitigating Cybersecurity and Cyber Fraud risk in Your Organization2017-10-05 Mitigating Cybersecurity and Cyber Fraud risk in Your Organization
2017-10-05 Mitigating Cybersecurity and Cyber Fraud risk in Your Organization
 
Cyber Security Awareness Month 2017-Nugget 6
Cyber Security Awareness Month 2017-Nugget 6Cyber Security Awareness Month 2017-Nugget 6
Cyber Security Awareness Month 2017-Nugget 6
 
1 - Shaping Tomorrow Guide - Introduction
1 - Shaping Tomorrow Guide - Introduction1 - Shaping Tomorrow Guide - Introduction
1 - Shaping Tomorrow Guide - Introduction
 
Security Minded - Ransomware Awareness
Security Minded - Ransomware AwarenessSecurity Minded - Ransomware Awareness
Security Minded - Ransomware Awareness
 
11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security
 
Be More Secure than your Competition: MePush Cyber Security for Small Business
Be More Secure than your Competition:  MePush Cyber Security for Small BusinessBe More Secure than your Competition:  MePush Cyber Security for Small Business
Be More Secure than your Competition: MePush Cyber Security for Small Business
 
The Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
The Cloud 9 - Threat & Solutions 2016 by Bobby DominguezThe Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
The Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
 
Cybersecurity Training for Nonprofits
Cybersecurity Training for NonprofitsCybersecurity Training for Nonprofits
Cybersecurity Training for Nonprofits
 
Webinar - Cyber Hygiene: Stay Clean at Work and at Home
Webinar - Cyber Hygiene: Stay Clean at Work and at HomeWebinar - Cyber Hygiene: Stay Clean at Work and at Home
Webinar - Cyber Hygiene: Stay Clean at Work and at Home
 
Protecting the Core of Your Network
Protecting the Core of Your Network Protecting the Core of Your Network
Protecting the Core of Your Network
 

More from ISSA LA

Technical track kevin cardwell-10-00 am-solid-defense
Technical track   kevin cardwell-10-00 am-solid-defenseTechnical track   kevin cardwell-10-00 am-solid-defense
Technical track kevin cardwell-10-00 am-solid-defenseISSA LA
 
The savvy security leader final dg ppt issa_la
The savvy security leader final dg ppt issa_laThe savvy security leader final dg ppt issa_la
The savvy security leader final dg ppt issa_laISSA LA
 
Security mgt track turner-aaron-11am-.issa-la.mobile vulns.150529
Security mgt track turner-aaron-11am-.issa-la.mobile vulns.150529Security mgt track turner-aaron-11am-.issa-la.mobile vulns.150529
Security mgt track turner-aaron-11am-.issa-la.mobile vulns.150529ISSA LA
 
Malcolm issa preso june 2015
Malcolm issa preso june 2015Malcolm issa preso june 2015
Malcolm issa preso june 2015ISSA LA
 
La issa-2015-cyberwar-ranum
La issa-2015-cyberwar-ranumLa issa-2015-cyberwar-ranum
La issa-2015-cyberwar-ranumISSA LA
 
Issa symc la 5min mr
Issa symc la 5min mrIssa symc la 5min mr
Issa symc la 5min mrISSA LA
 
Issala exec-forum-opening-150604
Issala exec-forum-opening-150604Issala exec-forum-opening-150604
Issala exec-forum-opening-150604ISSA LA
 
Issa healthcare panel
Issa healthcare panelIssa healthcare panel
Issa healthcare panelISSA LA
 
Irari rules
Irari rulesIrari rules
Irari rulesISSA LA
 
Healthcare forum yelorda megan himss presentation
Healthcare forum yelorda megan himss presentation Healthcare forum yelorda megan himss presentation
Healthcare forum yelorda megan himss presentation ISSA LA
 
Healthcare forum perry-david m-everything you know is wrong!
Healthcare forum perry-david m-everything you know is wrong!Healthcare forum perry-david m-everything you know is wrong!
Healthcare forum perry-david m-everything you know is wrong!ISSA LA
 
Fssf breach-incident-table-top
Fssf breach-incident-table-topFssf breach-incident-table-top
Fssf breach-incident-table-topISSA LA
 
Healthcare forum law enforcement panel prez
Healthcare forum law enforcement panel prezHealthcare forum law enforcement panel prez
Healthcare forum law enforcement panel prezISSA LA
 
Emerging tech track kovar-david-forensics-kovar
Emerging tech track kovar-david-forensics-kovarEmerging tech track kovar-david-forensics-kovar
Emerging tech track kovar-david-forensics-kovarISSA LA
 
Digital forensics track schroader-rob when forensics collide
Digital forensics track schroader-rob when forensics collideDigital forensics track schroader-rob when forensics collide
Digital forensics track schroader-rob when forensics collideISSA LA
 
Cloud flare issa_annual_summit_june_5_2015
Cloud flare issa_annual_summit_june_5_2015Cloud flare issa_annual_summit_june_5_2015
Cloud flare issa_annual_summit_june_5_2015ISSA LA
 

More from ISSA LA (16)

Technical track kevin cardwell-10-00 am-solid-defense
Technical track   kevin cardwell-10-00 am-solid-defenseTechnical track   kevin cardwell-10-00 am-solid-defense
Technical track kevin cardwell-10-00 am-solid-defense
 
The savvy security leader final dg ppt issa_la
The savvy security leader final dg ppt issa_laThe savvy security leader final dg ppt issa_la
The savvy security leader final dg ppt issa_la
 
Security mgt track turner-aaron-11am-.issa-la.mobile vulns.150529
Security mgt track turner-aaron-11am-.issa-la.mobile vulns.150529Security mgt track turner-aaron-11am-.issa-la.mobile vulns.150529
Security mgt track turner-aaron-11am-.issa-la.mobile vulns.150529
 
Malcolm issa preso june 2015
Malcolm issa preso june 2015Malcolm issa preso june 2015
Malcolm issa preso june 2015
 
La issa-2015-cyberwar-ranum
La issa-2015-cyberwar-ranumLa issa-2015-cyberwar-ranum
La issa-2015-cyberwar-ranum
 
Issa symc la 5min mr
Issa symc la 5min mrIssa symc la 5min mr
Issa symc la 5min mr
 
Issala exec-forum-opening-150604
Issala exec-forum-opening-150604Issala exec-forum-opening-150604
Issala exec-forum-opening-150604
 
Issa healthcare panel
Issa healthcare panelIssa healthcare panel
Issa healthcare panel
 
Irari rules
Irari rulesIrari rules
Irari rules
 
Healthcare forum yelorda megan himss presentation
Healthcare forum yelorda megan himss presentation Healthcare forum yelorda megan himss presentation
Healthcare forum yelorda megan himss presentation
 
Healthcare forum perry-david m-everything you know is wrong!
Healthcare forum perry-david m-everything you know is wrong!Healthcare forum perry-david m-everything you know is wrong!
Healthcare forum perry-david m-everything you know is wrong!
 
Fssf breach-incident-table-top
Fssf breach-incident-table-topFssf breach-incident-table-top
Fssf breach-incident-table-top
 
Healthcare forum law enforcement panel prez
Healthcare forum law enforcement panel prezHealthcare forum law enforcement panel prez
Healthcare forum law enforcement panel prez
 
Emerging tech track kovar-david-forensics-kovar
Emerging tech track kovar-david-forensics-kovarEmerging tech track kovar-david-forensics-kovar
Emerging tech track kovar-david-forensics-kovar
 
Digital forensics track schroader-rob when forensics collide
Digital forensics track schroader-rob when forensics collideDigital forensics track schroader-rob when forensics collide
Digital forensics track schroader-rob when forensics collide
 
Cloud flare issa_annual_summit_june_5_2015
Cloud flare issa_annual_summit_june_5_2015Cloud flare issa_annual_summit_june_5_2015
Cloud flare issa_annual_summit_june_5_2015
 

Microsoft power point closing presentation-greenberg

  • 1. Los Angeles Security Summit 7 A Great Day of Collaboration, Learning, Networking
  • 2. ISSA LOS ANGELES  Join Our Community  Issala.org  Twitter: @issala  LinkedIn: ISSA Los Angeles Chapter Networking  Facebook: Information Systems Security Association (ISSA) Los Angeles Chapter  Have drinks with us
  • 3. ISSA LOS ANGELES  Come to our monthly meetings • Next meeting is June 17 at Taix French Restaurant in Echo Park at 11:30am  We have dinner meetings: July 15 and Sept 16  Holiday Party with OWASP December 16th  Join our CISO Forum  Join us at sporting events
  • 4. WHAT DID WE LEARN TODAY?  Breaches are Occurring Everywhere in Every Industry  Phishing Attacks are Multiplying and are Now the Preferred Method of Infiltration  How to Build Secure Application Development Environments  Breaches Are Not Discovered for 6-9 Months • Often Discovered by External Source  Some Potential Attacks of the Future
  • 5. RECENT BREACHES  Anthem: 78.8 million records  Target: 42 million people’s credit or debit information stolen; banks file class-action lawsuit against Target  Home Depot: estimated 56 million credit and debit card numbers  JPMorgan: 76 million households and 7 million small businesses  Carbanak: $1 billion stolen from more than 100 banks in 30 countries  AdultFriendFinder.com 3.9 million users' personal details and sexual preferences
  • 6. DATA BREACH COSTS  Average Cost of a Data Breach in US Averages $6.5 million, highest in the world  One estimate of the cost to Home Depot is $10 billion by 2020  Cost in Health Care Organizations Could be as much as $363 Per Record
  • 7. THE TIMES THEY ARE A CHANGIN’  Every Business is Now a Target  Every Medical Device Could be a Target  Every Car Could be a Target  Every Refrigerator Could be a Target  Every Drone Could be an Attacker
  • 8. AWARENESS OF SECURITY SEEMS TO BE EVERYWHERE!  Boardrooms Now Have Security on their Agendas 80% of the Time  Breaches are a Weekly News Item on Mainstream Media  Cousins Call Us for Advice or to Ask What We Think of the Latest Attack  Congress is Talking About Security
  • 9. WHAT THE $%#%^%&*?  Old Vulnerabilities Are Still Everywhere • SQL Injection (in the OWASP Top 10 in 2007 and still there!) • 44%of known breaches in 2014 came from vulnerabilities that were between two and four years old1  Patching is Still Problematic  Change Management is not Happening  Configuration Management is Not Happening  Our Mission Critical Information is Not Encrypted 1 HP 2015 Cyber Risk Report
  • 10. OUR WORKFORCE HAS GONE PHISHING!  Click That Link!  Open That Attachment!  Open That Email From the Unknown Sender  Respond to that “Too Good to be True” Email Scam!  Forward that Funny Attachment to Everyone!  We Love Port 80!!
  • 11. WHAT’S A GOOD SECURITY LEADER TO DO?!  Go on Tour  Security Awareness Training for Everyone • Address Your Companies Vulnerability Trends • Gamify Your Training • Provide Incentives and Prizes • Please, No Death by PowerPoint  Speak at Division Meetings  Speak at General Staff Meetings
  • 12. MEET WITH KEY PLAYERS Lunch with all Executives Meet Regularly • With CTO or Head of System Admins • Division Heads • Legal • Risk Compliance Learn to Talk “Businessese”
  • 13. CREATE AND ENFORCE POLICIES, STANDARDS, AND PROCEDURES  Ensure Standard Image is Created • Is Regularly Updated • Is Regularly Tested • Deployed Everywhere-Especially on Admin Systems  No one Should Be Regularly Logged in with Admin Privileges  Have a Plan and Procedures for Securing Portable Devices and BYOD
  • 14. BAKE SECURITY INTO THE SDLC  Embrace and Befriend the Head of Application Development  Utilize Static/Dynamic Web App Vulnerability Scanners  Have All Staff in AppDev Take Secure Coding Training  All Project Proposals Must be Reviewed by InfoSec  Work with the PMO
  • 15. SECURE YOUR PHYSICAL ENVIRONMENT  Does Your Facilities Head Purchase Physical Security Solutions Without InfoSec Involvement or Knowledge?  Are Your Physical Security Access Cards Waaay too Easy to Hack? Most Are!  Do You Know Who Has Access to Your Data Center? Are You Sure?  Can People Leave Your Buildings Carrying Anything They Want?
  • 16. MONITOR SYSTEMS REGULARLY  Are You Able to Detect Anomalies on Your Networks?  Do You Know if You Have Been Compromised? Probably Not!  Would You be able to Detect Strange Outbound Traffic to, Let’s Say, China or North Korea?  Monitor Unusual Changes in User Behavior  Do You Know if 50 Users All Had Their Accounts Locked After Unsuccessful Login Attempts?
  • 17. CREATE AND REVIEW REPORTS  Create Remediation Plans After Reviewing Network Vulnerability Scans  Compare Reports From Various Tools: Patch Management, Vulnerability Scanning, Anti-Malware  Follow-up on Remediation Efforts  Rescan and Review Reports  Look for Patterns in Incidents in Your HelpDesk Database
  • 18. ENFORCE ACCESS MANAGEMENT STANDARDS  Work With HR to Establish Provisioning/ Deprovisioning Procedures  Enforce Process to Approve and Grant Access to Systems  Enforce Deprovisioning Procedures  Periodically Audit Systems Access  Two Factors Required for all Admin Access to Mission Critical Systems
  • 19. NETWORK AND COLLABORATE  Attend Networking Events  Make New Contacts  Share War Stories and Solutions  Join ISSA, OWASP, ISACA, CSA, HTCIA, etc.  Form New Groups  Look for Meetups  Leave Here Today With at Least 5 New Contacts; Follow-up with them
  • 20. KEEP LEARNING Webcasts Classes Podcasts Books LinkedIn and Twitter Links Blogs Networking Events and Conferences
  • 21. HELP PREPARE THE NEXT GENERATION OF SECURITY LEADERS Hire Students Train and Mentor Your Staff Speak at Schools Support Cyber Competitions Help Schools With their Curriculum Teach Security at Schools
  • 22. MOST IMPORTANTLY!! DRINK AND EAT WITH US…NOW!!!! Food and Drink Next Door in the Vendor Expo Last Chance to Meet with Vendors Last Chance to Enter to Win Raffle Prizes Book Signing Raffle Drawing in 15 Minutes
  • 23. THANK YOU! To All Our Speakers To All Our Volunteers To My Fellow Board Members To All of You For Joining Us To All Our Vendor Partners To Our Fellow Organizations
  • 24. THANK YOU! Stay Safe Stay Hungry for Knowledge Believe in Yourself Live Long and Prosper! See You All At Summit 8!