SlideShare ist ein Scribd-Unternehmen logo
1 von 19
Creating a Security Plan
Agent Conference Advanced Track
Laird Rixford
@lrixford/ President
Data
What is it worth?
Security Plan
Why do you need one?
Creating a Security Plan
• Inventory Assessment
• Risk Assessment
• Checklist
• Evaluation and Audit
• Certification
Inventory Assessment
What do you need to protect?
Inventory Assessment
• Hardware
(name the equipment)
• Software
(name the applications and provide quantity...make sure they're licensed)
• System interfaces
(e.g., internal and external connectivity; who do you connect to?)
• Type of Information
(what type of information do your systems hold)
• Critical & Confidential information
(is the department in receipt of confidential, private, or identity bearing data)
• "Owner“
(who uses or manages)
• Processes
(the processes performed by the IT system)
Risk Assessment
What is the impact of breach?
Risk Assessment
• Probability & Impact
• +2 – High
• +1 – Medium
• +0 – Low
• Security Level
• +3 – High
• +1 – Medium
• +0 – Low
• Categories
• Confidentiality of information
• Data (or information) integrity (corruption of data)
• Availability
Confidential Information
• Low
• General workstation security
• Passwords
• Antivirus protection
• Encrypted Devices
• Medium
• Firewall
• High
• One-time passwords (DUO or similar)
• Intrusion Detection System
Data Integrity
• Low
• Antivirus protection
• Medium
• Firewall
• High
• One-time passwords (DUO or similar)
• Intrusion Detection System
• File Integrity & Versioning
Availability
• Low
• Alternate Power Source
• UPS
• Medium
• Disaster recovery and business continuity
• Secondary connectivity
• High
• Backup and recovery
• Antivirus protection
• Replication
Checklist
Things to cover.
Checklist
• Hardware Risks
• Software Risks
• Environmental Failures
• Network Failures
• Security Policy
• Password
• Retention
• Usage policy.
• Internet Usage
• Computer Usage
• Federal and State Compliance and Privacy
Checklist
• Physical Security
• Computer & Network Policy
• Firewalls
• Group Policy
• Business Continuity & Disaster Planning
• Backup & Recovery
• Change Management
• Patching of OS and Software
• Software Licensing
• User Awareness Training
• Network Security Reviews
• Anti-Virus/Antimalware
Evaluation & Audit
Executing your plan.
Evaluation & Audit
• Test
• Evaluate
• Report
• Rectify
• Repeat
• Certification of Audit
• Request from vendors.
When it goes wrong.
What do you do when it happens.
Don’t Panic
• Take immediate audit of the infrastructure.
• Retain logs.
• Contact law enforcement.
• Commit forensic analysis
• Determine impact.
• If notification is required, contact your lawyer, not
your insurance company.
Questions?
Comments.
Live Tweet on Twitter
@lrixford / #AgentCon16

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

CNIT 160: 3. Information Risk Management (Part 4)
CNIT 160: 3. Information Risk Management (Part 4)CNIT 160: 3. Information Risk Management (Part 4)
CNIT 160: 3. Information Risk Management (Part 4)
 
Date security introduction
Date security   introductionDate security   introduction
Date security introduction
 
Fingerprinting healthcare institutions
Fingerprinting healthcare institutionsFingerprinting healthcare institutions
Fingerprinting healthcare institutions
 
CNIT 160 4e Security Program Management (Part 5)
CNIT 160 4e Security Program Management (Part 5)CNIT 160 4e Security Program Management (Part 5)
CNIT 160 4e Security Program Management (Part 5)
 
CNIT 160 Ch 4c: Security Program Development (Part 3)
CNIT 160 Ch 4c: Security Program Development (Part 3)CNIT 160 Ch 4c: Security Program Development (Part 3)
CNIT 160 Ch 4c: Security Program Development (Part 3)
 
Breaking into hospitals
Breaking into hospitalsBreaking into hospitals
Breaking into hospitals
 
CISSP Prep: Ch 6. Identity and Access Management
CISSP Prep: Ch 6. Identity and Access ManagementCISSP Prep: Ch 6. Identity and Access Management
CISSP Prep: Ch 6. Identity and Access Management
 
Fingerprinting healthcare institutions
Fingerprinting healthcare institutionsFingerprinting healthcare institutions
Fingerprinting healthcare institutions
 
CNIT 160 Ch 4b: Security Program Management
CNIT 160 Ch 4b: Security Program ManagementCNIT 160 Ch 4b: Security Program Management
CNIT 160 Ch 4b: Security Program Management
 
FLIGHT WEST 2018 Presentation - Open Source License Management in Black Duck Hub
FLIGHT WEST 2018 Presentation - Open Source License Management in Black Duck HubFLIGHT WEST 2018 Presentation - Open Source License Management in Black Duck Hub
FLIGHT WEST 2018 Presentation - Open Source License Management in Black Duck Hub
 
CNIT 125 6. Identity and Access Management
CNIT 125 6. Identity and Access ManagementCNIT 125 6. Identity and Access Management
CNIT 125 6. Identity and Access Management
 
Breaking into hospitals
Breaking into hospitalsBreaking into hospitals
Breaking into hospitals
 
Geek Sync | Meeting Security Benchmarks and Compliance with Microsoft SQL Ser...
Geek Sync | Meeting Security Benchmarks and Compliance with Microsoft SQL Ser...Geek Sync | Meeting Security Benchmarks and Compliance with Microsoft SQL Ser...
Geek Sync | Meeting Security Benchmarks and Compliance with Microsoft SQL Ser...
 
501 ch 2 understanding iam
501 ch 2 understanding iam501 ch 2 understanding iam
501 ch 2 understanding iam
 
Lesson 3
Lesson 3Lesson 3
Lesson 3
 
Windy City Rails - Layered Security
Windy City Rails - Layered SecurityWindy City Rails - Layered Security
Windy City Rails - Layered Security
 
CNIT 160 4b: Security Program Management (Part 2)
CNIT 160 4b: Security Program Management (Part 2)CNIT 160 4b: Security Program Management (Part 2)
CNIT 160 4b: Security Program Management (Part 2)
 
CNIT 160: Ch 2b: Security Strategy Development
CNIT 160: Ch 2b: Security Strategy DevelopmentCNIT 160: Ch 2b: Security Strategy Development
CNIT 160: Ch 2b: Security Strategy Development
 
The Case For Secure Data Science
The Case For Secure Data ScienceThe Case For Secure Data Science
The Case For Secure Data Science
 
Application Security-Understanding The Horizon
Application Security-Understanding The HorizonApplication Security-Understanding The Horizon
Application Security-Understanding The Horizon
 

Andere mochten auch

Start With A Great Information Security Plan!
Start With A Great Information Security Plan!Start With A Great Information Security Plan!
Start With A Great Information Security Plan!
Tammy Clark
 

Andere mochten auch (8)

Start With A Great Information Security Plan!
Start With A Great Information Security Plan!Start With A Great Information Security Plan!
Start With A Great Information Security Plan!
 
Security Assessment Plan (Template)
Security Assessment Plan (Template)Security Assessment Plan (Template)
Security Assessment Plan (Template)
 
Plan your security
Plan your securityPlan your security
Plan your security
 
5 Step Data Security Plan for Small Businesses
5 Step Data Security Plan for Small Businesses5 Step Data Security Plan for Small Businesses
5 Step Data Security Plan for Small Businesses
 
Enterprise Architecture and Information Security
Enterprise Architecture and Information SecurityEnterprise Architecture and Information Security
Enterprise Architecture and Information Security
 
The Benefits of a Network Security Plan
The Benefits of a Network Security PlanThe Benefits of a Network Security Plan
The Benefits of a Network Security Plan
 
SAP for Beginners
SAP for BeginnersSAP for Beginners
SAP for Beginners
 
How to dimension user traffic in LTE
How to dimension user traffic in LTEHow to dimension user traffic in LTE
How to dimension user traffic in LTE
 

Ähnlich wie Creating a Security Plan for Your Agency - Laird Rixford

MIS: Information Security Management
MIS: Information Security ManagementMIS: Information Security Management
MIS: Information Security Management
Jonathan Coleman
 
Insider Threat Final Powerpoint Prezi
Insider Threat Final Powerpoint PreziInsider Threat Final Powerpoint Prezi
Insider Threat Final Powerpoint Prezi
Kashif Semple
 
a48f81cc-3e85-4e00-9a3c-5ed63821797e-160716160704
a48f81cc-3e85-4e00-9a3c-5ed63821797e-160716160704a48f81cc-3e85-4e00-9a3c-5ed63821797e-160716160704
a48f81cc-3e85-4e00-9a3c-5ed63821797e-160716160704
Ricky Truong
 
Risk assesment servers
Risk assesment serversRisk assesment servers
Risk assesment servers
Georgi Peshev
 
Mnescot controls monitoring
Mnescot controls monitoringMnescot controls monitoring
Mnescot controls monitoring
mnescot
 
Lecture Data Classification And Data Loss Prevention
Lecture Data Classification And Data Loss PreventionLecture Data Classification And Data Loss Prevention
Lecture Data Classification And Data Loss Prevention
Nicholas Davis
 
Data Classification And Loss Prevention
Data Classification And Loss PreventionData Classification And Loss Prevention
Data Classification And Loss Prevention
Nicholas Davis
 
Lecture data classification_and_data_loss_prevention
Lecture data classification_and_data_loss_preventionLecture data classification_and_data_loss_prevention
Lecture data classification_and_data_loss_prevention
Nicholas Davis
 

Ähnlich wie Creating a Security Plan for Your Agency - Laird Rixford (20)

MIS: Information Security Management
MIS: Information Security ManagementMIS: Information Security Management
MIS: Information Security Management
 
Insider Threat Final Powerpoint Prezi
Insider Threat Final Powerpoint PreziInsider Threat Final Powerpoint Prezi
Insider Threat Final Powerpoint Prezi
 
a48f81cc-3e85-4e00-9a3c-5ed63821797e-160716160704
a48f81cc-3e85-4e00-9a3c-5ed63821797e-160716160704a48f81cc-3e85-4e00-9a3c-5ed63821797e-160716160704
a48f81cc-3e85-4e00-9a3c-5ed63821797e-160716160704
 
Risk assesment servers
Risk assesment serversRisk assesment servers
Risk assesment servers
 
Application Threat Modeling
Application Threat ModelingApplication Threat Modeling
Application Threat Modeling
 
Ch 1 assets
Ch 1 assetsCh 1 assets
Ch 1 assets
 
Intro.ppt
Intro.pptIntro.ppt
Intro.ppt
 
Cybersecurity Basics - Aravindr.com
Cybersecurity Basics - Aravindr.comCybersecurity Basics - Aravindr.com
Cybersecurity Basics - Aravindr.com
 
CNIT 125 Ch 8. Security Operations
CNIT 125 Ch 8. Security OperationsCNIT 125 Ch 8. Security Operations
CNIT 125 Ch 8. Security Operations
 
Definitive Security Testing Checklist Shielding Your Applications against Cyb...
Definitive Security Testing Checklist Shielding Your Applications against Cyb...Definitive Security Testing Checklist Shielding Your Applications against Cyb...
Definitive Security Testing Checklist Shielding Your Applications against Cyb...
 
CNIT 160 4d Security Program Management (Part 4)
CNIT 160 4d Security Program Management (Part 4)CNIT 160 4d Security Program Management (Part 4)
CNIT 160 4d Security Program Management (Part 4)
 
CNIT 160 4d Security Program Management (Part 4)
CNIT 160 4d Security Program Management (Part 4)CNIT 160 4d Security Program Management (Part 4)
CNIT 160 4d Security Program Management (Part 4)
 
Mnescot controls monitoring
Mnescot controls monitoringMnescot controls monitoring
Mnescot controls monitoring
 
css ppt.ppt
css ppt.pptcss ppt.ppt
css ppt.ppt
 
Computer security concepts
Computer security conceptsComputer security concepts
Computer security concepts
 
ISAA PPt
ISAA PPtISAA PPt
ISAA PPt
 
Security.pdf
Security.pdfSecurity.pdf
Security.pdf
 
Lecture Data Classification And Data Loss Prevention
Lecture Data Classification And Data Loss PreventionLecture Data Classification And Data Loss Prevention
Lecture Data Classification And Data Loss Prevention
 
Data Classification And Loss Prevention
Data Classification And Loss PreventionData Classification And Loss Prevention
Data Classification And Loss Prevention
 
Lecture data classification_and_data_loss_prevention
Lecture data classification_and_data_loss_preventionLecture data classification_and_data_loss_prevention
Lecture data classification_and_data_loss_prevention
 

Mehr von Insurance Technologies Corporation (ITC)

Mehr von Insurance Technologies Corporation (ITC) (20)

Emerling Agency Case Study
Emerling Agency Case StudyEmerling Agency Case Study
Emerling Agency Case Study
 
How to Get Started with a New Website Redesign
How to Get Started with a New Website RedesignHow to Get Started with a New Website Redesign
How to Get Started with a New Website Redesign
 
Test Your Way to Success: Optimize Your Agency's Email Marketing
Test Your Way to Success: Optimize Your Agency's Email MarketingTest Your Way to Success: Optimize Your Agency's Email Marketing
Test Your Way to Success: Optimize Your Agency's Email Marketing
 
Stay on Track: Strategic Benchmarking For Digital Marketing
Stay on Track: Strategic Benchmarking For Digital MarketingStay on Track: Strategic Benchmarking For Digital Marketing
Stay on Track: Strategic Benchmarking For Digital Marketing
 
Stay on Track: Strategic Benchmarking for Search Marketing
Stay on Track: Strategic Benchmarking for Search MarketingStay on Track: Strategic Benchmarking for Search Marketing
Stay on Track: Strategic Benchmarking for Search Marketing
 
Ready for Takeoff: How Landing Pages Can Boost your Insurance Website Leads
Ready for Takeoff: How Landing Pages Can Boost your Insurance Website LeadsReady for Takeoff: How Landing Pages Can Boost your Insurance Website Leads
Ready for Takeoff: How Landing Pages Can Boost your Insurance Website Leads
 
SEO in 2019...and Beyond!
SEO in 2019...and Beyond!SEO in 2019...and Beyond!
SEO in 2019...and Beyond!
 
Email Service Quirks and How to Get Around Them
Email Service Quirks and How to Get Around ThemEmail Service Quirks and How to Get Around Them
Email Service Quirks and How to Get Around Them
 
ITC AgencyBuzz
ITC AgencyBuzzITC AgencyBuzz
ITC AgencyBuzz
 
Answering Your Top 10 FAQs About Insurance Website Design
Answering Your Top 10 FAQs About Insurance Website DesignAnswering Your Top 10 FAQs About Insurance Website Design
Answering Your Top 10 FAQs About Insurance Website Design
 
How to Write the Perfect Insurance Email
How to Write the Perfect Insurance EmailHow to Write the Perfect Insurance Email
How to Write the Perfect Insurance Email
 
Blogging Your Way to Local SEO Success
Blogging Your Way to Local SEO SuccessBlogging Your Way to Local SEO Success
Blogging Your Way to Local SEO Success
 
Common Misconceptions About Email Marketing
Common Misconceptions About Email MarketingCommon Misconceptions About Email Marketing
Common Misconceptions About Email Marketing
 
Search Marketing For The Short And Long Term
Search Marketing For The Short And Long TermSearch Marketing For The Short And Long Term
Search Marketing For The Short And Long Term
 
Using the 5 Ws to Create a Successful Email Marketing Strategy
Using the 5 Ws to Create a Successful Email Marketing StrategyUsing the 5 Ws to Create a Successful Email Marketing Strategy
Using the 5 Ws to Create a Successful Email Marketing Strategy
 
Crawl, Walk, Run: Using Your Agency’s Branding to Reach Online Prospects
Crawl, Walk, Run: Using Your Agency’s Branding to Reach Online Prospects Crawl, Walk, Run: Using Your Agency’s Branding to Reach Online Prospects
Crawl, Walk, Run: Using Your Agency’s Branding to Reach Online Prospects
 
All Sky, No Net: How Agencies Can Survive Automation
All Sky, No Net: How Agencies Can Survive AutomationAll Sky, No Net: How Agencies Can Survive Automation
All Sky, No Net: How Agencies Can Survive Automation
 
How to Turn Your Website into a Lead Generator
How to Turn Your Website into a Lead GeneratorHow to Turn Your Website into a Lead Generator
How to Turn Your Website into a Lead Generator
 
10 Email Marketing Feaux Pas You're Probably Making
10 Email Marketing Feaux Pas You're Probably Making10 Email Marketing Feaux Pas You're Probably Making
10 Email Marketing Feaux Pas You're Probably Making
 
Think Like a Marketer: Marketing Ideation for Insurance Agents
Think Like a Marketer: Marketing Ideation for Insurance AgentsThink Like a Marketer: Marketing Ideation for Insurance Agents
Think Like a Marketer: Marketing Ideation for Insurance Agents
 

Kürzlich hochgeladen

Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
amitlee9823
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
lizamodels9
 
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Anamikakaur10
 
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
lizamodels9
 
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
amitlee9823
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
Matteo Carbone
 
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
amitlee9823
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
Abortion pills in Kuwait Cytotec pills in Kuwait
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
dollysharma2066
 

Kürzlich hochgeladen (20)

Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
 
Business Model Canvas (BMC)- A new venture concept
Business Model Canvas (BMC)-  A new venture conceptBusiness Model Canvas (BMC)-  A new venture concept
Business Model Canvas (BMC)- A new venture concept
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
 
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
 
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1
 
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
 
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
 
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort ServiceEluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors Data
 

Creating a Security Plan for Your Agency - Laird Rixford

  • 1. Creating a Security Plan Agent Conference Advanced Track Laird Rixford @lrixford/ President
  • 3. Security Plan Why do you need one?
  • 4. Creating a Security Plan • Inventory Assessment • Risk Assessment • Checklist • Evaluation and Audit • Certification
  • 5. Inventory Assessment What do you need to protect?
  • 6. Inventory Assessment • Hardware (name the equipment) • Software (name the applications and provide quantity...make sure they're licensed) • System interfaces (e.g., internal and external connectivity; who do you connect to?) • Type of Information (what type of information do your systems hold) • Critical & Confidential information (is the department in receipt of confidential, private, or identity bearing data) • "Owner“ (who uses or manages) • Processes (the processes performed by the IT system)
  • 7. Risk Assessment What is the impact of breach?
  • 8. Risk Assessment • Probability & Impact • +2 – High • +1 – Medium • +0 – Low • Security Level • +3 – High • +1 – Medium • +0 – Low • Categories • Confidentiality of information • Data (or information) integrity (corruption of data) • Availability
  • 9. Confidential Information • Low • General workstation security • Passwords • Antivirus protection • Encrypted Devices • Medium • Firewall • High • One-time passwords (DUO or similar) • Intrusion Detection System
  • 10. Data Integrity • Low • Antivirus protection • Medium • Firewall • High • One-time passwords (DUO or similar) • Intrusion Detection System • File Integrity & Versioning
  • 11. Availability • Low • Alternate Power Source • UPS • Medium • Disaster recovery and business continuity • Secondary connectivity • High • Backup and recovery • Antivirus protection • Replication
  • 13. Checklist • Hardware Risks • Software Risks • Environmental Failures • Network Failures • Security Policy • Password • Retention • Usage policy. • Internet Usage • Computer Usage • Federal and State Compliance and Privacy
  • 14. Checklist • Physical Security • Computer & Network Policy • Firewalls • Group Policy • Business Continuity & Disaster Planning • Backup & Recovery • Change Management • Patching of OS and Software • Software Licensing • User Awareness Training • Network Security Reviews • Anti-Virus/Antimalware
  • 16. Evaluation & Audit • Test • Evaluate • Report • Rectify • Repeat • Certification of Audit • Request from vendors.
  • 17. When it goes wrong. What do you do when it happens.
  • 18. Don’t Panic • Take immediate audit of the infrastructure. • Retain logs. • Contact law enforcement. • Commit forensic analysis • Determine impact. • If notification is required, contact your lawyer, not your insurance company.
  • 19. Questions? Comments. Live Tweet on Twitter @lrixford / #AgentCon16

Hinweis der Redaktion

  1. Insurance can not a special price. However, it does have it’s own loss leaders.
  2. Insurance can not a special price. However, it does have it’s own loss leaders.
  3. Insurance can not a special price. However, it does have it’s own loss leaders.
  4. Insurance can not a special price. However, it does have it’s own loss leaders.
  5. Insurance can not a special price. However, it does have it’s own loss leaders.
  6. Insurance can not a special price. However, it does have it’s own loss leaders.
  7. Setup what happens over the next hour.