SlideShare a Scribd company logo
Protect The Data
Big Data and Cloud Data
You Must Protect the Data
(Caveat: Slide set geared toward Executive managers & non-experts)
http://patrick642.wordpress.com from strategy, intelligence, innovation, leadership to improvements
http://patrick642nu.wordpress.com from cyber security, strategy, innovation, Intel & Intelligence to leadership
Patrick A. -- MScIA MBA CISSP-ISSEP
Intelligence Officer/Analyst – Cyber security/InfoSec SME
May 25, 2014
Champions
 Prior to anything else, you absolutely must have on your
side, on board and in agreement for your Data / Network
Protection efforts
 CEO
 Chairman of the Board
 President
 If these individuals are unwilling to Champion or Sponsor
‘necessary’ security efforts – you may as well stop here
 If they are on board, they should see clear cut reasons &
benefits behind protecting the data, because it means
keeping:
 The company Brand/Reputation intact AND enhancing it
 Customers happy, knowing their data is being protected
 Investors happy – some of whom are altruistic and desire more than just
profits…
Policies
 You must have Policies in place to go along with your
other efforts with executive management signing off
on them
 Without Policies for your management, staff,
partners & vendors, you have no leg to stand on
 Computer Use Policy
 Internet Use Policy
 Telecommunicating Policy (Work from home)
 Non-Disclosure Agreement (NDA)/Policy
 As well as other needed policies
 Policy enforcement – you actually need to do this…
Invaders
 Your data is what the ‘invaders’ want
 They will do whatever they can to get at it
 Hackers Hacktivists Terrorists Nation states and well, even friends sometimes (allegedly)… NSA
Big Data and Cloud Data
(basics) (1 of 4)
 Big Data
 Unstructured and/or structured info your firm
receives and/or collects – multiple sources
 Big Data uses algorithms and analytics to filter
through all the forms of data collected to data mine
and analyze for required results
 The data  PDFs, Images (ie - JPEGs, TIFs), Word &
Excel, Word Perfect, Google Docs, email (professional,
commercial (ie Hotmail)), HTML, HTML5, XML, Database,
Video, etc.
Big Data and Cloud Data (basics)
(2 of 4)
 Cloud Data
 Info in the “Cloud”
 The “Cloud” is nothing more than
 Big Data or specific data sent to/from networks
 Cloud – a network comprised of a number of servers
with multiple CPUs and multiple attached storage
devices at some location on the planet, for parallel
processing or not – think of the early ‘94 Beowulf
network (Becker, D.J. and Sterling, T. and Savarese, D. and Dorband, J.E. and Ranawak, U.A. and
Packer, C.V. www.phy.duke.edu/~rgb/brahma/Resources/beowulf/papers/ICPP95/icpp95.html)
 Grid computing, which is similar, is the collection of computer
resources from multiple locations to reach a common goal
Big Data and Cloud Data (basics)
(3 of 4)
 Cloud Data
 Service Level Agreements (SLA)
 Ensure SLA explicitly covers:
 Protection partnership between you & Cloud provider (you are both
responsible); anti-malware, encryption, VPN access, liability, forensics
for any breach, disaster recovery (provider – fire, earthquake, etc.)
 Who at your firm:
 Has Admin rights to the data for any kind of admin work
 Can access the Cloud data (staff, partners, vendors)
 Who at Cloud provider can:
 Access your data for replication/back up purposes & troubleshooting ‘only’ without
rights to perform any reading, data manipulation, copying or printing
Big Data and Cloud Data (basics)
(4 of 4)
Access to Data
 Passwords - Complex & Encrypted – Yes, painful, annoying &
necessary
 Better than losing $xxx,000+ of R&D data due to weak
passwords (i.e. no more short 8-10 character passwords)
 Must move to better authentication (who’s who)
 2-factor – token & pin, smartcard & pin
 Biometrics – retina, fingerprint
 Provide “only” needed access (authorization) to data people
need to do their job well (and protecting against insider threats)
 i.e. – Are USB ports, DVD/CD writing capabilities necessary –
for everyone…?
 Sys Admins do not require access to all (i.e. – Snowden)
Encryption
 Network & VPN
 AES-192 or AES-256
 Wi-Fi
 No WEP or WPA  At minimum use WPA2
 Make use of security mechanisms in:
 IPv6, IPSec & DNSSec
 Application layer to Application layer
 Where possible, not just endpoint endpoint
 Data At Rest
 Servers, SANs/NAS, PCs, Laptops, Smartphones (containers)
CPUs
Because of encryption & authentication, you need devices
capable of higher processing demands
 Laptops, PCs, Servers
 Do not forget smartphones & tablets too…
 Many CPU cores as possible
 Highest GHz possible for:
 Encrypting & decrypting data
 Preventing latency & lag times
 Users will not like it and ‘will’ become unproductive if they
have to wait on decrypt/encrypt & transmission times
Wi-Fi Access Points (1 of 2)
 For firms, the more APs, the better
Wi-Fi Access Points (2 of 2)
 Strong Passwords & SSIDs
 No default passwords or Descriptive SSIDs
 Multiple APs & multiple SSIDs
 Limit rights & access through the APs - Guests, Admins,
Staff, Partners, Vendors
 Coverage – roaming, fewer dropped connections
 Scan for rogue APs
 Periodically & Randomly – remove & enforce policies
 Directional antennas on peripheries
 Max power for APs – No
 Are people outside the bldg using your Wi-Fi…
VPN
 If you care about:
 Who remotely accesses your network
 Productivity of remote staff
1) Obtain a strong VPN package
 Excellent admin features such as
 A dashboard for drilling down to granular levels and
 Includes analytics for “what if” and other scenarios
2) It will be Fast AND User friendly for your staff
3) One of the best of breed VPNs
4) Scalable to grow with you
 No barebones VPN
 You will pay more later if you do to gain needed
features
Network Speeds (1 of 2)
 Today, it is necessary for your network to have
the best throughput possible & for tomorrows’
growth
 Very, very minimal latency – Staff is more productive
 Latency – Staff and Management wait and they become bored…
and/or annoyed…
Network Speeds (2 of 2)
 You need more:
 Bandwidth into & out of your network
 Throughput across your network
 You will need both to handle growing
 Increased speeds: Router, VPN, Switch, Wi-Fi AP & Server
 10 – 100Mbps no longer cuts it for tomorrow when we will have
 4K HDTV
 More holographic conference calls (i.e. Cisco Telepresence)
 Smartphone to Desk phone video calls
 1 Tbps traffic – yes, 1 Tbps (BT & Alcatel-Lucent proved this new protocol
[Flexigrid] works – over “existing” hardware & fiber optics @ 1.4Tbps)
Anti-Malware (1 of 2)
 Anti-Virus (AV) is no longer good enough, you need
a suite of detective and mitigating anti-malware
software, capable of working from the physical
layer up to the application layer.
 The suite must be capable of working on and at
various points throughout your network.
 Detect, Correlate, Prevent, Mitigate & Report malicious
activity
 Work in conjunction with IDS/IPS/Firewalls
Anti-Malware (2 of 2)
 Intelligent, best of breed
 Layered – to cover multiple avenues of attack
 No one vendors’ product captures all malware
 If possible, obtain a second best of breed suite to run in parallel
 Or, use a vendor who does this in the Cloud with multiple anti-malware
engines for real-time protection
 Very fast processing capabilities
 If possible, software should use:
 Artificial Intelligence, Heuristics, Expert Logic or Fuzzy Logic
IDS/IPS & Firewalls
 Even anti-malware is not enough by itself. You must
detect & prevent as much malware (or hackers) as
possible, as soon as possible, every place possible
 Needed for infiltration into and exfiltration of data
out of the network
 Intrusion Detection Systems & Intrusion Protection
Systems
 NIDS – for the network, on the periphery & internally
 HIDS – for servers, PCs, laptops
 Firewalls
 High throughput
 Very fast processing
 With extremely low latency & extremely low drops & false positives
Forensics
 You will need forensics software (not barebones) to do
multiple levels of forensics if you have an incident
 High to Low level (think deep dive)
 After an incident, you will need to do various forms
of forensics
 Financial & Auditing
 Network
 To see where infiltrated, how, when and what damage was done
 Enough varied reporting capabilities for most
situations allowing for detailed content
 Look out for Anti-Forensics attempts…
Physical Security
 This goes without saying, we still need Physical
Security
 Must work with Cyber Security staff & vice versa
 Physical security should have a good level of cyber security
training
 Your buildings need better than just good
physical security, for:
 Doors (all doors) Windows (all windows) Fences
 Badge Access system (with a chip, no magnetic stripe)
 Cameras
(with great zoom & resolution & tracking & recording & storage & retrieval capabilities)
 Random (and tested) physical sweeps
Innovation & Creativity
 We are at the point where we need more Innovation
and Creativity to protect the data, engage your:
 Techie staff for ideas they know or have heard of
 Non-techie staff for divergent ideas, which could prove
valuable
 Quantum Computing is growing and that, along with
Quantum Cryptography will make current cyber
security efforts, obsolete
 Think, Think, Think… and Adapt, rapidly
 You and your firm cannot afford to go partially into
Protecting The Data, skimping on cost – from this
point on, this is an “all in” situation!

More Related Content

What's hot

Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14
Symantec
 
Data loss prevention (dlp)
Data loss prevention (dlp)Data loss prevention (dlp)
Data loss prevention (dlp)
Hussein Al-Sanabani
 
Symantec Data Loss Prevention 11
Symantec Data Loss Prevention 11Symantec Data Loss Prevention 11
Symantec Data Loss Prevention 11
Symantec
 
Symantec Data Loss Prevention 9
Symantec Data Loss Prevention 9Symantec Data Loss Prevention 9
Symantec Data Loss Prevention 9
Ariel Martin Beliera
 
Symantec DLP for Tablet
Symantec DLP for TabletSymantec DLP for Tablet
Symantec DLP for Tablet
Symantec
 
Hipaa Compliance With IT
Hipaa Compliance With ITHipaa Compliance With IT
Hipaa Compliance With IT
Nainil Chheda
 
Dlp notes
Dlp notesDlp notes
Dlp notes
anuepcet
 
Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Information and Identity Protection - Data Loss Prevention, Encryption, User ...Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Information and Identity Protection - Data Loss Prevention, Encryption, User ...Symantec APJ
 
Beware the Firewall My Son: The Workshop
Beware the Firewall My Son: The WorkshopBeware the Firewall My Son: The Workshop
Beware the Firewall My Son: The Workshop
Michele Chubirka
 
Humans Are The Weakest Link – How DLP Can Help
Humans Are The Weakest Link – How DLP Can HelpHumans Are The Weakest Link – How DLP Can Help
Humans Are The Weakest Link – How DLP Can Help
Valery Boronin
 
Shariyaz abdeen data leakage prevention presentation
Shariyaz abdeen   data leakage prevention presentationShariyaz abdeen   data leakage prevention presentation
Shariyaz abdeen data leakage prevention presentation
Shariyaz Abdeen
 
DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...
DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...
DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...
Andris Soroka
 
Aspects of data security
Aspects of data securityAspects of data security
Aspects of data security
SaranSwathi1
 
DSS.LV - Principles Of Data Protection - March2015 By Arturs Filatovs
DSS.LV - Principles Of Data Protection - March2015 By Arturs FilatovsDSS.LV - Principles Of Data Protection - March2015 By Arturs Filatovs
DSS.LV - Principles Of Data Protection - March2015 By Arturs Filatovs
Andris Soroka
 
DLP Executive Overview
DLP Executive OverviewDLP Executive Overview
DLP Executive Overview
Kim Jensen
 
Data Security: Why You Need Data Loss Prevention & How to Justify It
Data Security: Why You Need Data Loss Prevention & How to Justify ItData Security: Why You Need Data Loss Prevention & How to Justify It
Data Security: Why You Need Data Loss Prevention & How to Justify It
Marc Crudgington, MBA
 
Symantec Data Loss Prevention - Technical Proposal (General)
Symantec Data Loss Prevention - Technical Proposal (General)Symantec Data Loss Prevention - Technical Proposal (General)
Symantec Data Loss Prevention - Technical Proposal (General)
Iftikhar Ali Iqbal
 
Be Aware Webinar Symantec-Maxímice su prevención hacia la fuga de la información
Be Aware Webinar Symantec-Maxímice su prevención hacia la fuga de la informaciónBe Aware Webinar Symantec-Maxímice su prevención hacia la fuga de la información
Be Aware Webinar Symantec-Maxímice su prevención hacia la fuga de la información
Symantec LATAM
 
Information management
Information managementInformation management
Information management
Deepak John
 
Attacking the cloud with social engineering
Attacking the cloud with social engineeringAttacking the cloud with social engineering
Attacking the cloud with social engineering
Peter Wood
 

What's hot (20)

Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14
 
Data loss prevention (dlp)
Data loss prevention (dlp)Data loss prevention (dlp)
Data loss prevention (dlp)
 
Symantec Data Loss Prevention 11
Symantec Data Loss Prevention 11Symantec Data Loss Prevention 11
Symantec Data Loss Prevention 11
 
Symantec Data Loss Prevention 9
Symantec Data Loss Prevention 9Symantec Data Loss Prevention 9
Symantec Data Loss Prevention 9
 
Symantec DLP for Tablet
Symantec DLP for TabletSymantec DLP for Tablet
Symantec DLP for Tablet
 
Hipaa Compliance With IT
Hipaa Compliance With ITHipaa Compliance With IT
Hipaa Compliance With IT
 
Dlp notes
Dlp notesDlp notes
Dlp notes
 
Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Information and Identity Protection - Data Loss Prevention, Encryption, User ...Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Information and Identity Protection - Data Loss Prevention, Encryption, User ...
 
Beware the Firewall My Son: The Workshop
Beware the Firewall My Son: The WorkshopBeware the Firewall My Son: The Workshop
Beware the Firewall My Son: The Workshop
 
Humans Are The Weakest Link – How DLP Can Help
Humans Are The Weakest Link – How DLP Can HelpHumans Are The Weakest Link – How DLP Can Help
Humans Are The Weakest Link – How DLP Can Help
 
Shariyaz abdeen data leakage prevention presentation
Shariyaz abdeen   data leakage prevention presentationShariyaz abdeen   data leakage prevention presentation
Shariyaz abdeen data leakage prevention presentation
 
DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...
DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...
DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...
 
Aspects of data security
Aspects of data securityAspects of data security
Aspects of data security
 
DSS.LV - Principles Of Data Protection - March2015 By Arturs Filatovs
DSS.LV - Principles Of Data Protection - March2015 By Arturs FilatovsDSS.LV - Principles Of Data Protection - March2015 By Arturs Filatovs
DSS.LV - Principles Of Data Protection - March2015 By Arturs Filatovs
 
DLP Executive Overview
DLP Executive OverviewDLP Executive Overview
DLP Executive Overview
 
Data Security: Why You Need Data Loss Prevention & How to Justify It
Data Security: Why You Need Data Loss Prevention & How to Justify ItData Security: Why You Need Data Loss Prevention & How to Justify It
Data Security: Why You Need Data Loss Prevention & How to Justify It
 
Symantec Data Loss Prevention - Technical Proposal (General)
Symantec Data Loss Prevention - Technical Proposal (General)Symantec Data Loss Prevention - Technical Proposal (General)
Symantec Data Loss Prevention - Technical Proposal (General)
 
Be Aware Webinar Symantec-Maxímice su prevención hacia la fuga de la información
Be Aware Webinar Symantec-Maxímice su prevención hacia la fuga de la informaciónBe Aware Webinar Symantec-Maxímice su prevención hacia la fuga de la información
Be Aware Webinar Symantec-Maxímice su prevención hacia la fuga de la información
 
Information management
Information managementInformation management
Information management
 
Attacking the cloud with social engineering
Attacking the cloud with social engineeringAttacking the cloud with social engineering
Attacking the cloud with social engineering
 

Viewers also liked

Data security and cyber risks - In house lawyers forum 2013, Richard Nicholas
Data security and cyber risks - In house lawyers forum 2013, Richard NicholasData security and cyber risks - In house lawyers forum 2013, Richard Nicholas
Data security and cyber risks - In house lawyers forum 2013, Richard Nicholas
Browne Jacobson LLP
 
Cyber Security and Data Protection
Cyber Security and Data ProtectionCyber Security and Data Protection
Cyber Security and Data Protection
Strategic Insurance Software
 
David valovcin big data - big risk
David valovcin big data - big riskDavid valovcin big data - big risk
David valovcin big data - big risk
IBM Sverige
 
2016 Cyber Security Breaches Survey for the UK
2016 Cyber Security Breaches Survey for the UK2016 Cyber Security Breaches Survey for the UK
2016 Cyber Security Breaches Survey for the UK
Gary Chambers
 
Cloud computing for banking
Cloud computing for bankingCloud computing for banking
Cloud computing for banking
IBM Software India
 
Top 10 cybersecurity predictions for 2016 by Matthew Rosenquist
Top 10 cybersecurity predictions for 2016 by Matthew RosenquistTop 10 cybersecurity predictions for 2016 by Matthew Rosenquist
Top 10 cybersecurity predictions for 2016 by Matthew Rosenquist
Matthew Rosenquist
 
The State of Data Security
The State of Data SecurityThe State of Data Security
The State of Data Security
Razor Technology
 
Cloud banking
Cloud bankingCloud banking
Cloud banking
Partho Chakraborty
 
Cloud computing and security 03
Cloud computing and security 03Cloud computing and security 03
Cloud computing and security 03
Akash Kamble
 
Data Security For Compliance 2
Data Security For Compliance 2Data Security For Compliance 2
Data Security For Compliance 2
Flaskdata.io
 
Cloud Computing for Banking - Accenture
Cloud Computing for Banking - AccentureCloud Computing for Banking - Accenture
Cloud Computing for Banking - Accenture
Kim Jensen
 
Green banking
Green bankingGreen banking
Green banking
Chandan Bora
 
The Everyday Bank: The Role of Cloud Computing in the Future of Banking
The Everyday Bank: The Role of Cloud Computing in the Future of BankingThe Everyday Bank: The Role of Cloud Computing in the Future of Banking
The Everyday Bank: The Role of Cloud Computing in the Future of Banking
Accenture Technology
 
An atm with an iris recognition
An atm with an iris recognitionAn atm with an iris recognition
An atm with an iris recognition
mahesh123slideshre
 
Cloud security ppt
Cloud security pptCloud security ppt
Cloud security ppt
Venkatesh Chary
 
Protecting your business - managing flood risk
Protecting your business - managing flood risk Protecting your business - managing flood risk
Protecting your business - managing flood risk
Lucas Fettes & Partners
 
Secure multiple bank transaction log a case study
Secure multiple bank transaction log a case studySecure multiple bank transaction log a case study
Secure multiple bank transaction log a case study
eSAT Publishing House
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
Dheeraj Negi
 

Viewers also liked (18)

Data security and cyber risks - In house lawyers forum 2013, Richard Nicholas
Data security and cyber risks - In house lawyers forum 2013, Richard NicholasData security and cyber risks - In house lawyers forum 2013, Richard Nicholas
Data security and cyber risks - In house lawyers forum 2013, Richard Nicholas
 
Cyber Security and Data Protection
Cyber Security and Data ProtectionCyber Security and Data Protection
Cyber Security and Data Protection
 
David valovcin big data - big risk
David valovcin big data - big riskDavid valovcin big data - big risk
David valovcin big data - big risk
 
2016 Cyber Security Breaches Survey for the UK
2016 Cyber Security Breaches Survey for the UK2016 Cyber Security Breaches Survey for the UK
2016 Cyber Security Breaches Survey for the UK
 
Cloud computing for banking
Cloud computing for bankingCloud computing for banking
Cloud computing for banking
 
Top 10 cybersecurity predictions for 2016 by Matthew Rosenquist
Top 10 cybersecurity predictions for 2016 by Matthew RosenquistTop 10 cybersecurity predictions for 2016 by Matthew Rosenquist
Top 10 cybersecurity predictions for 2016 by Matthew Rosenquist
 
The State of Data Security
The State of Data SecurityThe State of Data Security
The State of Data Security
 
Cloud banking
Cloud bankingCloud banking
Cloud banking
 
Cloud computing and security 03
Cloud computing and security 03Cloud computing and security 03
Cloud computing and security 03
 
Data Security For Compliance 2
Data Security For Compliance 2Data Security For Compliance 2
Data Security For Compliance 2
 
Cloud Computing for Banking - Accenture
Cloud Computing for Banking - AccentureCloud Computing for Banking - Accenture
Cloud Computing for Banking - Accenture
 
Green banking
Green bankingGreen banking
Green banking
 
The Everyday Bank: The Role of Cloud Computing in the Future of Banking
The Everyday Bank: The Role of Cloud Computing in the Future of BankingThe Everyday Bank: The Role of Cloud Computing in the Future of Banking
The Everyday Bank: The Role of Cloud Computing in the Future of Banking
 
An atm with an iris recognition
An atm with an iris recognitionAn atm with an iris recognition
An atm with an iris recognition
 
Cloud security ppt
Cloud security pptCloud security ppt
Cloud security ppt
 
Protecting your business - managing flood risk
Protecting your business - managing flood risk Protecting your business - managing flood risk
Protecting your business - managing flood risk
 
Secure multiple bank transaction log a case study
Secure multiple bank transaction log a case studySecure multiple bank transaction log a case study
Secure multiple bank transaction log a case study
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
 

Similar to Protect the data - Cyber security - Breaches - Brand/Reputation

The 300 Leonidas Solution
The 300 Leonidas SolutionThe 300 Leonidas Solution
The 300 Leonidas Solution
matthew.maisel
 
Information Security
Information SecurityInformation Security
Information SecurityMohit8780
 
IBM Share Conference 2010, Boston, Ulf Mattsson
IBM Share Conference 2010, Boston, Ulf MattssonIBM Share Conference 2010, Boston, Ulf Mattsson
IBM Share Conference 2010, Boston, Ulf Mattsson
Ulf Mattsson
 
nullcon 2011 - Enterprise Paradigm for Controlling Data Leakage
nullcon 2011 - Enterprise Paradigm for Controlling Data Leakagenullcon 2011 - Enterprise Paradigm for Controlling Data Leakage
nullcon 2011 - Enterprise Paradigm for Controlling Data Leakage
n|u - The Open Security Community
 
Solving the Really Big Tech Problems with IoT
 Solving the Really Big Tech Problems with IoT Solving the Really Big Tech Problems with IoT
Solving the Really Big Tech Problems with IoT
Eric Kavanagh
 
Preparing for the Cybersecurity Renaissance
Preparing for the Cybersecurity RenaissancePreparing for the Cybersecurity Renaissance
Preparing for the Cybersecurity Renaissance
Cloudera, Inc.
 
DG_Architecture_Training.pptx
DG_Architecture_Training.pptxDG_Architecture_Training.pptx
DG_Architecture_Training.pptx
TranVu383073
 
SCADA and HMI Security in InduSoft Web Studio
SCADA and HMI Security in InduSoft Web StudioSCADA and HMI Security in InduSoft Web Studio
SCADA and HMI Security in InduSoft Web Studio
AVEVA
 
ISSA Boston - PCI and Beyond: A Cost Effective Approach to Data Protection
ISSA Boston - PCI and Beyond: A Cost Effective Approach to Data ProtectionISSA Boston - PCI and Beyond: A Cost Effective Approach to Data Protection
ISSA Boston - PCI and Beyond: A Cost Effective Approach to Data Protection
Ulf Mattsson
 
A Vision for Shared, Central Intelligence to Ebb a Growing Flood of Alerts
A Vision for Shared, Central Intelligence  to Ebb a Growing Flood of AlertsA Vision for Shared, Central Intelligence  to Ebb a Growing Flood of Alerts
A Vision for Shared, Central Intelligence to Ebb a Growing Flood of Alerts
Priyanka Aash
 
Corona| COVID IT Tactical Security Preparedness: Threat Management
Corona| COVID IT Tactical Security Preparedness: Threat ManagementCorona| COVID IT Tactical Security Preparedness: Threat Management
Corona| COVID IT Tactical Security Preparedness: Threat Management
RedZone Technologies
 
The past, present, and future of big data security
The past, present, and future of big data securityThe past, present, and future of big data security
The past, present, and future of big data security
Ulf Mattsson
 
Imperative Induced Innovation - Patrick W. Dowd, Ph. D
Imperative Induced Innovation - Patrick W. Dowd, Ph. DImperative Induced Innovation - Patrick W. Dowd, Ph. D
Imperative Induced Innovation - Patrick W. Dowd, Ph. D
scoopnewsgroup
 
Are You Leveraging the Cloud? Or is it Leveraging You?
Are You Leveraging the Cloud? Or is it Leveraging You?Are You Leveraging the Cloud? Or is it Leveraging You?
Are You Leveraging the Cloud? Or is it Leveraging You?
Tom Mumford
 
Splunk for Security Breakout Session
Splunk for Security Breakout SessionSplunk for Security Breakout Session
Splunk for Security Breakout Session
Splunk
 
Webinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
Webinar: Endpoint Backup is not Enough - You Need an End-user Data StrategyWebinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
Webinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
Storage Switzerland
 
CSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxCSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptx
Mohammad512578
 
Safeguard Your Business
Safeguard Your BusinessSafeguard Your Business
Safeguard Your Business
DWP Information Architects Inc.
 
Business Continuity 2009
Business Continuity 2009Business Continuity 2009
Business Continuity 2009
OS-Cubed, Inc.
 

Similar to Protect the data - Cyber security - Breaches - Brand/Reputation (20)

The 300 Leonidas Solution
The 300 Leonidas SolutionThe 300 Leonidas Solution
The 300 Leonidas Solution
 
John Shawky Khalil
John Shawky KhalilJohn Shawky Khalil
John Shawky Khalil
 
Information Security
Information SecurityInformation Security
Information Security
 
IBM Share Conference 2010, Boston, Ulf Mattsson
IBM Share Conference 2010, Boston, Ulf MattssonIBM Share Conference 2010, Boston, Ulf Mattsson
IBM Share Conference 2010, Boston, Ulf Mattsson
 
nullcon 2011 - Enterprise Paradigm for Controlling Data Leakage
nullcon 2011 - Enterprise Paradigm for Controlling Data Leakagenullcon 2011 - Enterprise Paradigm for Controlling Data Leakage
nullcon 2011 - Enterprise Paradigm for Controlling Data Leakage
 
Solving the Really Big Tech Problems with IoT
 Solving the Really Big Tech Problems with IoT Solving the Really Big Tech Problems with IoT
Solving the Really Big Tech Problems with IoT
 
Preparing for the Cybersecurity Renaissance
Preparing for the Cybersecurity RenaissancePreparing for the Cybersecurity Renaissance
Preparing for the Cybersecurity Renaissance
 
DG_Architecture_Training.pptx
DG_Architecture_Training.pptxDG_Architecture_Training.pptx
DG_Architecture_Training.pptx
 
SCADA and HMI Security in InduSoft Web Studio
SCADA and HMI Security in InduSoft Web StudioSCADA and HMI Security in InduSoft Web Studio
SCADA and HMI Security in InduSoft Web Studio
 
ISSA Boston - PCI and Beyond: A Cost Effective Approach to Data Protection
ISSA Boston - PCI and Beyond: A Cost Effective Approach to Data ProtectionISSA Boston - PCI and Beyond: A Cost Effective Approach to Data Protection
ISSA Boston - PCI and Beyond: A Cost Effective Approach to Data Protection
 
A Vision for Shared, Central Intelligence to Ebb a Growing Flood of Alerts
A Vision for Shared, Central Intelligence  to Ebb a Growing Flood of AlertsA Vision for Shared, Central Intelligence  to Ebb a Growing Flood of Alerts
A Vision for Shared, Central Intelligence to Ebb a Growing Flood of Alerts
 
Corona| COVID IT Tactical Security Preparedness: Threat Management
Corona| COVID IT Tactical Security Preparedness: Threat ManagementCorona| COVID IT Tactical Security Preparedness: Threat Management
Corona| COVID IT Tactical Security Preparedness: Threat Management
 
The past, present, and future of big data security
The past, present, and future of big data securityThe past, present, and future of big data security
The past, present, and future of big data security
 
Imperative Induced Innovation - Patrick W. Dowd, Ph. D
Imperative Induced Innovation - Patrick W. Dowd, Ph. DImperative Induced Innovation - Patrick W. Dowd, Ph. D
Imperative Induced Innovation - Patrick W. Dowd, Ph. D
 
Are You Leveraging the Cloud? Or is it Leveraging You?
Are You Leveraging the Cloud? Or is it Leveraging You?Are You Leveraging the Cloud? Or is it Leveraging You?
Are You Leveraging the Cloud? Or is it Leveraging You?
 
Splunk for Security Breakout Session
Splunk for Security Breakout SessionSplunk for Security Breakout Session
Splunk for Security Breakout Session
 
Webinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
Webinar: Endpoint Backup is not Enough - You Need an End-user Data StrategyWebinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
Webinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
 
CSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxCSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptx
 
Safeguard Your Business
Safeguard Your BusinessSafeguard Your Business
Safeguard Your Business
 
Business Continuity 2009
Business Continuity 2009Business Continuity 2009
Business Continuity 2009
 

Recently uploaded

Cree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBdCree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
creerey
 
amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05
marketing317746
 
VAT Registration Outlined In UAE: Benefits and Requirements
VAT Registration Outlined In UAE: Benefits and RequirementsVAT Registration Outlined In UAE: Benefits and Requirements
VAT Registration Outlined In UAE: Benefits and Requirements
uae taxgpt
 
April 2024 Nostalgia Products Newsletter
April 2024 Nostalgia Products NewsletterApril 2024 Nostalgia Products Newsletter
April 2024 Nostalgia Products Newsletter
NathanBaughman3
 
The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...
awaisafdar
 
3.0 Project 2_ Developing My Brand Identity Kit.pptx
3.0 Project 2_ Developing My Brand Identity Kit.pptx3.0 Project 2_ Developing My Brand Identity Kit.pptx
3.0 Project 2_ Developing My Brand Identity Kit.pptx
tanyjahb
 
Project File Report BBA 6th semester.pdf
Project File Report BBA 6th semester.pdfProject File Report BBA 6th semester.pdf
Project File Report BBA 6th semester.pdf
RajPriye
 
The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...
Adam Smith
 
What are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdfWhat are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdf
HumanResourceDimensi1
 
Skye Residences | Extended Stay Residences Near Toronto Airport
Skye Residences | Extended Stay Residences Near Toronto AirportSkye Residences | Extended Stay Residences Near Toronto Airport
Skye Residences | Extended Stay Residences Near Toronto Airport
marketingjdass
 
ENTREPRENEURSHIP TRAINING.ppt for graduating class (1).ppt
ENTREPRENEURSHIP TRAINING.ppt for graduating class (1).pptENTREPRENEURSHIP TRAINING.ppt for graduating class (1).ppt
ENTREPRENEURSHIP TRAINING.ppt for graduating class (1).ppt
zechu97
 
Attending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learnersAttending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learners
Erika906060
 
FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134
LR1709MUSIC
 
Business Valuation Principles for Entrepreneurs
Business Valuation Principles for EntrepreneursBusiness Valuation Principles for Entrepreneurs
Business Valuation Principles for Entrepreneurs
Ben Wann
 
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
taqyed
 
The effects of customers service quality and online reviews on customer loyal...
The effects of customers service quality and online reviews on customer loyal...The effects of customers service quality and online reviews on customer loyal...
The effects of customers service quality and online reviews on customer loyal...
balatucanapplelovely
 
Affordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n PrintAffordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n Print
Navpack & Print
 
Kseniya Leshchenko: Shared development support service model as the way to ma...
Kseniya Leshchenko: Shared development support service model as the way to ma...Kseniya Leshchenko: Shared development support service model as the way to ma...
Kseniya Leshchenko: Shared development support service model as the way to ma...
Lviv Startup Club
 
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdfMeas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
dylandmeas
 
Buy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star ReviewsBuy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star Reviews
usawebmarket
 

Recently uploaded (20)

Cree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBdCree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
 
amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05
 
VAT Registration Outlined In UAE: Benefits and Requirements
VAT Registration Outlined In UAE: Benefits and RequirementsVAT Registration Outlined In UAE: Benefits and Requirements
VAT Registration Outlined In UAE: Benefits and Requirements
 
April 2024 Nostalgia Products Newsletter
April 2024 Nostalgia Products NewsletterApril 2024 Nostalgia Products Newsletter
April 2024 Nostalgia Products Newsletter
 
The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...
 
3.0 Project 2_ Developing My Brand Identity Kit.pptx
3.0 Project 2_ Developing My Brand Identity Kit.pptx3.0 Project 2_ Developing My Brand Identity Kit.pptx
3.0 Project 2_ Developing My Brand Identity Kit.pptx
 
Project File Report BBA 6th semester.pdf
Project File Report BBA 6th semester.pdfProject File Report BBA 6th semester.pdf
Project File Report BBA 6th semester.pdf
 
The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...
 
What are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdfWhat are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdf
 
Skye Residences | Extended Stay Residences Near Toronto Airport
Skye Residences | Extended Stay Residences Near Toronto AirportSkye Residences | Extended Stay Residences Near Toronto Airport
Skye Residences | Extended Stay Residences Near Toronto Airport
 
ENTREPRENEURSHIP TRAINING.ppt for graduating class (1).ppt
ENTREPRENEURSHIP TRAINING.ppt for graduating class (1).pptENTREPRENEURSHIP TRAINING.ppt for graduating class (1).ppt
ENTREPRENEURSHIP TRAINING.ppt for graduating class (1).ppt
 
Attending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learnersAttending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learners
 
FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134
 
Business Valuation Principles for Entrepreneurs
Business Valuation Principles for EntrepreneursBusiness Valuation Principles for Entrepreneurs
Business Valuation Principles for Entrepreneurs
 
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
 
The effects of customers service quality and online reviews on customer loyal...
The effects of customers service quality and online reviews on customer loyal...The effects of customers service quality and online reviews on customer loyal...
The effects of customers service quality and online reviews on customer loyal...
 
Affordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n PrintAffordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n Print
 
Kseniya Leshchenko: Shared development support service model as the way to ma...
Kseniya Leshchenko: Shared development support service model as the way to ma...Kseniya Leshchenko: Shared development support service model as the way to ma...
Kseniya Leshchenko: Shared development support service model as the way to ma...
 
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdfMeas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
 
Buy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star ReviewsBuy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star Reviews
 

Protect the data - Cyber security - Breaches - Brand/Reputation

  • 1. Protect The Data Big Data and Cloud Data You Must Protect the Data (Caveat: Slide set geared toward Executive managers & non-experts) http://patrick642.wordpress.com from strategy, intelligence, innovation, leadership to improvements http://patrick642nu.wordpress.com from cyber security, strategy, innovation, Intel & Intelligence to leadership Patrick A. -- MScIA MBA CISSP-ISSEP Intelligence Officer/Analyst – Cyber security/InfoSec SME May 25, 2014
  • 2. Champions  Prior to anything else, you absolutely must have on your side, on board and in agreement for your Data / Network Protection efforts  CEO  Chairman of the Board  President  If these individuals are unwilling to Champion or Sponsor ‘necessary’ security efforts – you may as well stop here  If they are on board, they should see clear cut reasons & benefits behind protecting the data, because it means keeping:  The company Brand/Reputation intact AND enhancing it  Customers happy, knowing their data is being protected  Investors happy – some of whom are altruistic and desire more than just profits…
  • 3. Policies  You must have Policies in place to go along with your other efforts with executive management signing off on them  Without Policies for your management, staff, partners & vendors, you have no leg to stand on  Computer Use Policy  Internet Use Policy  Telecommunicating Policy (Work from home)  Non-Disclosure Agreement (NDA)/Policy  As well as other needed policies  Policy enforcement – you actually need to do this…
  • 4. Invaders  Your data is what the ‘invaders’ want  They will do whatever they can to get at it  Hackers Hacktivists Terrorists Nation states and well, even friends sometimes (allegedly)… NSA
  • 5. Big Data and Cloud Data (basics) (1 of 4)
  • 6.  Big Data  Unstructured and/or structured info your firm receives and/or collects – multiple sources  Big Data uses algorithms and analytics to filter through all the forms of data collected to data mine and analyze for required results  The data  PDFs, Images (ie - JPEGs, TIFs), Word & Excel, Word Perfect, Google Docs, email (professional, commercial (ie Hotmail)), HTML, HTML5, XML, Database, Video, etc. Big Data and Cloud Data (basics) (2 of 4)
  • 7.  Cloud Data  Info in the “Cloud”  The “Cloud” is nothing more than  Big Data or specific data sent to/from networks  Cloud – a network comprised of a number of servers with multiple CPUs and multiple attached storage devices at some location on the planet, for parallel processing or not – think of the early ‘94 Beowulf network (Becker, D.J. and Sterling, T. and Savarese, D. and Dorband, J.E. and Ranawak, U.A. and Packer, C.V. www.phy.duke.edu/~rgb/brahma/Resources/beowulf/papers/ICPP95/icpp95.html)  Grid computing, which is similar, is the collection of computer resources from multiple locations to reach a common goal Big Data and Cloud Data (basics) (3 of 4)
  • 8.  Cloud Data  Service Level Agreements (SLA)  Ensure SLA explicitly covers:  Protection partnership between you & Cloud provider (you are both responsible); anti-malware, encryption, VPN access, liability, forensics for any breach, disaster recovery (provider – fire, earthquake, etc.)  Who at your firm:  Has Admin rights to the data for any kind of admin work  Can access the Cloud data (staff, partners, vendors)  Who at Cloud provider can:  Access your data for replication/back up purposes & troubleshooting ‘only’ without rights to perform any reading, data manipulation, copying or printing Big Data and Cloud Data (basics) (4 of 4)
  • 9. Access to Data  Passwords - Complex & Encrypted – Yes, painful, annoying & necessary  Better than losing $xxx,000+ of R&D data due to weak passwords (i.e. no more short 8-10 character passwords)  Must move to better authentication (who’s who)  2-factor – token & pin, smartcard & pin  Biometrics – retina, fingerprint  Provide “only” needed access (authorization) to data people need to do their job well (and protecting against insider threats)  i.e. – Are USB ports, DVD/CD writing capabilities necessary – for everyone…?  Sys Admins do not require access to all (i.e. – Snowden)
  • 10. Encryption  Network & VPN  AES-192 or AES-256  Wi-Fi  No WEP or WPA  At minimum use WPA2  Make use of security mechanisms in:  IPv6, IPSec & DNSSec  Application layer to Application layer  Where possible, not just endpoint endpoint  Data At Rest  Servers, SANs/NAS, PCs, Laptops, Smartphones (containers)
  • 11. CPUs Because of encryption & authentication, you need devices capable of higher processing demands  Laptops, PCs, Servers  Do not forget smartphones & tablets too…  Many CPU cores as possible  Highest GHz possible for:  Encrypting & decrypting data  Preventing latency & lag times  Users will not like it and ‘will’ become unproductive if they have to wait on decrypt/encrypt & transmission times
  • 12. Wi-Fi Access Points (1 of 2)  For firms, the more APs, the better
  • 13. Wi-Fi Access Points (2 of 2)  Strong Passwords & SSIDs  No default passwords or Descriptive SSIDs  Multiple APs & multiple SSIDs  Limit rights & access through the APs - Guests, Admins, Staff, Partners, Vendors  Coverage – roaming, fewer dropped connections  Scan for rogue APs  Periodically & Randomly – remove & enforce policies  Directional antennas on peripheries  Max power for APs – No  Are people outside the bldg using your Wi-Fi…
  • 14. VPN  If you care about:  Who remotely accesses your network  Productivity of remote staff 1) Obtain a strong VPN package  Excellent admin features such as  A dashboard for drilling down to granular levels and  Includes analytics for “what if” and other scenarios 2) It will be Fast AND User friendly for your staff 3) One of the best of breed VPNs 4) Scalable to grow with you  No barebones VPN  You will pay more later if you do to gain needed features
  • 15. Network Speeds (1 of 2)  Today, it is necessary for your network to have the best throughput possible & for tomorrows’ growth  Very, very minimal latency – Staff is more productive  Latency – Staff and Management wait and they become bored… and/or annoyed…
  • 16. Network Speeds (2 of 2)  You need more:  Bandwidth into & out of your network  Throughput across your network  You will need both to handle growing  Increased speeds: Router, VPN, Switch, Wi-Fi AP & Server  10 – 100Mbps no longer cuts it for tomorrow when we will have  4K HDTV  More holographic conference calls (i.e. Cisco Telepresence)  Smartphone to Desk phone video calls  1 Tbps traffic – yes, 1 Tbps (BT & Alcatel-Lucent proved this new protocol [Flexigrid] works – over “existing” hardware & fiber optics @ 1.4Tbps)
  • 17. Anti-Malware (1 of 2)  Anti-Virus (AV) is no longer good enough, you need a suite of detective and mitigating anti-malware software, capable of working from the physical layer up to the application layer.  The suite must be capable of working on and at various points throughout your network.  Detect, Correlate, Prevent, Mitigate & Report malicious activity  Work in conjunction with IDS/IPS/Firewalls
  • 18. Anti-Malware (2 of 2)  Intelligent, best of breed  Layered – to cover multiple avenues of attack  No one vendors’ product captures all malware  If possible, obtain a second best of breed suite to run in parallel  Or, use a vendor who does this in the Cloud with multiple anti-malware engines for real-time protection  Very fast processing capabilities  If possible, software should use:  Artificial Intelligence, Heuristics, Expert Logic or Fuzzy Logic
  • 19. IDS/IPS & Firewalls  Even anti-malware is not enough by itself. You must detect & prevent as much malware (or hackers) as possible, as soon as possible, every place possible  Needed for infiltration into and exfiltration of data out of the network  Intrusion Detection Systems & Intrusion Protection Systems  NIDS – for the network, on the periphery & internally  HIDS – for servers, PCs, laptops  Firewalls  High throughput  Very fast processing  With extremely low latency & extremely low drops & false positives
  • 20. Forensics  You will need forensics software (not barebones) to do multiple levels of forensics if you have an incident  High to Low level (think deep dive)  After an incident, you will need to do various forms of forensics  Financial & Auditing  Network  To see where infiltrated, how, when and what damage was done  Enough varied reporting capabilities for most situations allowing for detailed content  Look out for Anti-Forensics attempts…
  • 21. Physical Security  This goes without saying, we still need Physical Security  Must work with Cyber Security staff & vice versa  Physical security should have a good level of cyber security training  Your buildings need better than just good physical security, for:  Doors (all doors) Windows (all windows) Fences  Badge Access system (with a chip, no magnetic stripe)  Cameras (with great zoom & resolution & tracking & recording & storage & retrieval capabilities)  Random (and tested) physical sweeps
  • 22. Innovation & Creativity  We are at the point where we need more Innovation and Creativity to protect the data, engage your:  Techie staff for ideas they know or have heard of  Non-techie staff for divergent ideas, which could prove valuable  Quantum Computing is growing and that, along with Quantum Cryptography will make current cyber security efforts, obsolete  Think, Think, Think… and Adapt, rapidly  You and your firm cannot afford to go partially into Protecting The Data, skimping on cost – from this point on, this is an “all in” situation!