3. Previous places include Alternative Technology, IBM Security & Privacy, Safe Harbor, US West, .com’s
4.
5. Technologies Used You’ve seen it and probably not realized it Smart Cards – RFID, chip, etc IP Cameras Access controlled doors Physical Security Management systems
12. Security Convergence Present Why are we starting to see this change? Need to cut costs Corporate Compliance Attackers taking path of least resistance Blended threats Gains in efficiency
21. 'I'm not going to do anything to hurt your system or inhibit your business processes. I'm here to protect you so our CEO isn't standing before a congressional committee someday explaining why credit reports are in front of some gym locker.’ – Mecsics @ Equifax
24. Without proper evaluation of new tools and software, you can be introducing even more vulnerabilities and risks into your environment
25. Long term cost benefit is there, but initial cost is very high training hardware installation/upgrades let’s not forget the cost in TIME
26. Security Convergence YOU HAVE TO PLAN! This is not something you do because you read about it in a trade rag This is not something you copy from what another company did This is not something that will just plug and play into your organization This is not something that will necessarily even work for your organization currently This is not a quick fix for all your security problems
27. Planning Determine what style of merger will work best for YOUR organization Policies and procedures will need to change Make sure the right people are in the right jobs and are properly trained Network design Technology options Pilot deployment Obtain upper management support
28. More Information ASIS – http://www.asisonline.org Alliance for Enterprise Security Risk Management – http://www.aesrm.org ASIS, ISACA, and ISSA Contact: Ryan Jones Twitter: lizborden Email: rjones2@trustwave.com