Top Banner
Data Security, personal DMV data Welcome to Information Security Talk Show Please record your attendance using the Sign In Sheet..... Moderator: Jerry Dike DMV Consultant [email protected] 512-751-0574 June 23, 2014, 3:30 – 5 p.m.
26

Welcome to Information Security Talk Show

Oct 16, 2021

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Welcome to Information Security Talk Show

Data Security, personal DMV data

Welcome toInformation Security Talk Show

Please record your attendance usingthe Sign In Sheet.....

Moderator: Jerry DikeDMV Consultant

[email protected] 512-751-0574

June 23, 2014, 3:30 – 5 p.m.

Page 2: Welcome to Information Security Talk Show

Data Security, personal DMV data

Page 3: Welcome to Information Security Talk Show

3

Expert & Experienced Panelists:

Mike Wyatt, Deloitte

David Ulmer, NC

Dean Clemons, HP

Kevin Shwedo, SC

Data Security, personal DMV data

Page 4: Welcome to Information Security Talk Show

4

Almost City

Council

Age 18,

Waxahachie

Data Security, personal DMV data

Page 5: Welcome to Information Security Talk Show

Why states are under attack by cyber actors ?

Changing nature of Info Security as a Discipline ( Prevention is foundational)

Critical: Detection, Containment, & Correction

Page 6: Welcome to Information Security Talk Show

6

Secure, Vigilant, Resilient

Practical Recommendations:

For improving agencies security posture

Page 7: Welcome to Information Security Talk Show

7

David Ulmer, NC DOT CIO

Page 8: Welcome to Information Security Talk Show

Information SecurityA Practical View

Globally Targeted Data

100%

1

Page 9: Welcome to Information Security Talk Show

9

Policy, Procedure & Awareness

Physical

Perimeter

Internal Network

Application

Data

Host

Contrary to

popular belief,

this is not an IT

issue.

The business

owns the data.

This is a team

event!

• Access control

• Monitoring

• Masking

• Auditing

• Threat and

vulnerability

management

Page 10: Welcome to Information Security Talk Show

10

Access Control• Do you have access controls on applications, databases, file shares, and

reports with sensitive data?

• Do you have an accurate inventory of current, valid users and a recurring process for validation of access to systems with sensitive data?

Incident Detection & Response• Do you have an Incident Response Plan? Has it been tested?

• you have baseline activity?

• Can you detect unauthorized users gaining access?

• Can you detect fraud and misuse for authorized users?

• Do you have a secure audit trail (e.g. who, what, when, how)?

Risk Dimensions – A Team Effort

Page 11: Welcome to Information Security Talk Show

11

Data Loss Prevention• First, do you have a classification system for data?

• Is sensitive data in transit encrypted? All of it all the time? Does it get resent?

• Do you have a comprehensive inventory of sensitive information?

• Can you detect unusual patterns against databases?

• Can you determine data theft when it is happening and stop it?

• Are there unknown destinations for sensitive data? Do you know where your data is?

Policy & Contracts• Have you removed all PII data from development & test environments, training material, etc.

• Do you have separation of duties? Can unauthorized users access Production?

• Do your contracts effectively cover:

data handling, disposition, retention, usage & redistribution rights, breach liability, etc.?

data elements, frequency, method of transfer, SLA, costs, etc.?

(Continued)

Page 12: Welcome to Information Security Talk Show

12

System(s)PII (SSN, DL,

etc.)Credit Cards

ProtectedHealth

Information

Financial Data (e.g. Banking & account

information)

System 1

System 2

System 3

System 4

System 5

System 6

System 7

System 8

Map Systems with Targeted Data

Page 13: Welcome to Information Security Talk Show

13

Practical Lessons from the Past Few Years

Classifying data is really hard work

What elements, by themselves are restricted?

What combination of elements are restricted?

When in doubt, what do you want masked?

Managing data effectively requires specialized skills and training

Managing data is never ending. The bad guys are smart, and getting more sophisticated. Risk cannot be eliminated, but can be managed

Page 14: Welcome to Information Security Talk Show

14

Dean Clemons, HP Sr Mgr, Cybersecurity Solutions

Page 15: Welcome to Information Security Talk Show

Cybersecurity trends and attack methods

Key Points

Hacking

Weak/stolen Credentials

Malware

Social Tactics

Physical Attacks

• Users are a key weakness

• Social tactics increased 4-fold in the last year

• Most intrusions are rated as “low difficulty”

• Most intrusions are discovered by outsiders

• Most intrusions took MONTHS to discover

Insider Threats

Page 16: Welcome to Information Security Talk Show

Security challenges and threats are increasing

• Staff lack the necessary skills and bandwidth

• Need for 24x7 global management

• Protecting data at rest, in motion, and in use

• Fragmented systems and procedures

•Embracing new ways of collaborating and delivering IT

Page 17: Welcome to Information Security Talk Show

Traditional security controls are not enough

Network

Protection

Perimeter

Protection

Server

Protection

Application

Protection

Endpoint

Protection

Intellectual property

Personaldata

Businessdata

Attacker

Prevention is important, detection is critical

Page 18: Welcome to Information Security Talk Show

Enterprise security governance

• Risk management framework

• Appoint a security executive

• Convene a security council

• Acquire security expertise

• Conduct security training

• Information sharing

• Develop security metrics

• Incident response capabilities

Page 19: Welcome to Information Security Talk Show

Continuous risk management framework

Step 6

MONITORSecurity Controls

Step 1

CATEGORIZEInformation

SystemsStep 2

SELECTSecurity Controls

Step 5

AUTHORIZEInformation

Systems

Step 3

IMPLEMENTSecurity ControlsStep 4

ASSESSSecurity Controls

Process Overview

RiskManagementFramework

Starting Point

Repeat as necessary

NIST Special Publication 800-37

Page 20: Welcome to Information Security Talk Show

Measure the maturity of your security program

People

Policy

ProcessProof Product

Page 21: Welcome to Information Security Talk Show

Strategy summary to reduce your risk

Focus on five areas • Reduce the attack surface• Improve threat intelligence

• Improve monitoring and detection capabilities

• Proactively test your security posture• Develop incident response capabilities

Page 22: Welcome to Information Security Talk Show

22

Kevin Shwedo, ExDir, SC DMV

Page 23: Welcome to Information Security Talk Show

23

"PowerPoint is the Rodney Dangerfield of software. It gets

no respect ! "

Page 24: Welcome to Information Security Talk Show

24

Kevin Shwedo, SC

Kevin will be talking from his notes about his experiences in DMV data privacy issues.

Page 25: Welcome to Information Security Talk Show

25

Thank you for attending

Please record your attendance usingthe Sign In Sheet

Moderator: Jerry [email protected] Consultant

512-751-0574

Page 26: Welcome to Information Security Talk Show

26

Questions for Presenters