Successfully reported this slideshow.
Your SlideShare is downloading. ×

2016 Maze Live Cyber-security for Local Governments

Ad
Ad
Ad
Ad
Ad
Ad
Ad
Ad
Ad
Ad
Ad
Loading in …3
×

Check these out next

1 of 48 Ad

2016 Maze Live Cyber-security for Local Governments

Download to read offline

Is your organization doing enough to reduce the risk of cyber threats? Cyber-security is more than compliance with credit card processing. What risks does your organization have? Cyber-security is a prime concern today and in this session we will cover what local governments can do to reduce risk. Presenter Donald E. Hester, CISA, CISSP, Director

Is your organization doing enough to reduce the risk of cyber threats? Cyber-security is more than compliance with credit card processing. What risks does your organization have? Cyber-security is a prime concern today and in this session we will cover what local governments can do to reduce risk. Presenter Donald E. Hester, CISA, CISSP, Director

Advertisement
Advertisement

More Related Content

Advertisement

Similar to 2016 Maze Live Cyber-security for Local Governments (20)

Advertisement

Recently uploaded (20)

2016 Maze Live Cyber-security for Local Governments

  1. 1. 1
  2. 2. 2
  3. 3. 3
  4. 4. 4 Albert Gonzalez, 28 With accomplices, he was involved in data breaches of most of the major data breaches: Heartland, Hannaford Bros., 7-Eleven, T.J. Maxx, Marshalls, BJ’s Wholesale Club, OfficeMax, Barnes & Noble, Sports Authority, Dave & Busters, Boston Market, Forever 21, DSW and others. The public trusts that we will keep their information safe from crooks like these.
  5. 5. 5 Source:
  6. 6. 6 Number of incidents per year. Source:
  7. 7. 7
  8. 8. 8 Source:
  9. 9. 9 Source:
  10. 10. 10 Source:
  11. 11. 11 Source:
  12. 12. 12
  13. 13. 13 Source:
  14. 14. 14
  15. 15. 15 Source:
  16. 16. 16 1. Securing the IT environment 2. Managing and retaining data 3. Managing IT risk and compliance 4. Ensuring privacy 6. Managing System Implementations 7. Preventing and responding to computer fraud 10. Managing vendors and service providers http://www.aicpa.org/InterestAreas/InformationTechnology/Resources/TopTechnologyInitiatives/Pages/2013TTI.aspx Orange text are all PCI related
  17. 17. 17
  18. 18. 18 Determine Objectives Assess Risk Apply Controls Assess Controls Monitor
  19. 19. 19
  20. 20. 20 Source: Internal Control Guidelines California Local Agencies 2015 SCO
  21. 21. 21  Source: AICPA’s Auditing Standard AU-C §315.A91
  22. 22. 22
  23. 23. 23
  24. 24. 24
  25. 25. 25
  26. 26. 26 utility model
  27. 27. 27
  28. 28. 28
  29. 29. 29 Efficiency Agility Innovation
  30. 30. 30
  31. 31. 31
  32. 32. 32
  33. 33. 33
  34. 34. 34
  35. 35. 35
  36. 36. 36
  37. 37. 37
  38. 38. 38
  39. 39. 39
  40. 40. 40
  41. 41. 41
  42. 42. 42
  43. 43. 43
  44. 44. 44
  45. 45. 45
  46. 46. 46
  47. 47. 47
  48. 48. 48

×