Establishing an Effective IT Security Program A Holistic View Ann Marie Beasley, VP Strategies - PowerPoint PPT Presentation

1 / 7
About This Presentation
Title:

Establishing an Effective IT Security Program A Holistic View Ann Marie Beasley, VP Strategies

Description:

Rapidly & easily recover from loss of critical systems & information ... Demand an early warning system that provides the most time to prevent attack and ... – PowerPoint PPT presentation

Number of Views:70
Avg rating:3.0/5.0
Slides: 8
Provided by: natalie47
Category:

less

Transcript and Presenter's Notes

Title: Establishing an Effective IT Security Program A Holistic View Ann Marie Beasley, VP Strategies


1
Establishing an Effective IT Security ProgramA
Holistic ViewAnn Marie Beasley, VP Strategies
Solutions
2
Security Program Drivers
92 businesses attacked in 2003 75 acknowledge
the fact 4 measure impact 12.5B!!
Source Computer Economics 2003
  • Workforce Mobility
  • Infrastructure Consolidation
  • IT Complexity
  • Customer Connectivity Demands

40countries haveadopted e-commercelaws
FISMA HIPAA GLBA
PATRIOT Basel II NERC
Sarbanes-Oxley EU Data Protection Privacy
3
Stopping the Bullet
  • QuestionHow do you stop a bullet that has
    already been fired?

4
Challenges
  • Need to ensure integrity (security
    availability) of IT
  • Must be able to respond quickly during crises
    with minimal loss of information
  • Beyond guarding the network, must ensure it is
    configured, patched correctly
  • Improve asset management Can only protect what
    you can identify and inventory
  • Strenuous requirements such as FISMA
    incorporating the above with staff training,
    incident preparedness, etc.

5
A back-to-basics approach
  • Create and maintain an accurate asset inventory
  • Analyze all the functions of each system
  • Perform a risk assessment
  • Develop a prioritized risk strategy

Re-think security
  • Understand every aspect of your environment
  • Be proactive to prevent problems
  • Count on qualified service providers for
    assessment, testing, and design
  • Improve alerting systems

Increase threat awareness
  • Understand current state of threat activity
  • Know what to do in response
  • Be alert to new vulnerabilities and the
    potential harm if exploited
  • Increase efficiency

Improve alerting system
6
Elements of a Comprehensive Security Program
  • Assure security policy compliance
  • Receive early awareness of threats
  • Prevent detect attacks breaches
  • Protect privacy of information
  • Discover track HW/SW assets
  • Provision, update configure systems via
    automated policies
  • Instantly push security patches signatures to
    all managed devices
  • Assure software license compliance remove
    unauthorized applications
  • De-provision repurpose systems securely
  • Rapidly easily recover from loss of critical
    systems information
  • Insure via policies that adequate storage
    available for applications backup
  • Create secure archives for preserving information
    assets

7
Security Program Take-Aways
  • Get prepared for new vulnerabilities and more
    aggressive and complex attacks

Adopt the right framework for comprehensive
enterprise security
Demand an early warning system that provides the
most time to prevent attack and/or minimize damage
Drive to an architecture that provides integrated
protection and integrated management
Build in effective management capabilities to
address all aspects of securing and managing the
infrastructure
Write a Comment
User Comments (0)
About PowerShow.com