SlideShare ist ein Scribd-Unternehmen logo
1 von 39
Cyber Security Linda Sharp CoSN Cyber Security  Project Director  SchoolDude University 2009
Understanding the Issues ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],SchoolDude University 2009
Reliance on Technology ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],SchoolDude University 2009
The Evolution of Intent  From Hobbyists to Professionals SchoolDude University 2009 THREAT SEVERITY 1990 1995 2000 2005 WHAT’S NEXT? 2007 Threats becoming increasingly difficult to detect and mitigate FINANCIAL: Theft & Damage FAME: Viruses and Malware TESTING THE WATERS: Basic Intrusions and Viruses
Financial Impact ,[object Object],[object Object],[object Object],SchoolDude University 2009
Legal Impact ,[object Object],[object Object],[object Object],[object Object],[object Object],SchoolDude University 2009
Legal Impact ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],SchoolDude University 2009
Legal Impact ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],SchoolDude University 2009
Safety vs. Security ,[object Object],[object Object],SchoolDude University 2009
Five Guiding Questions ,[object Object],SchoolDude University 2009
Five Guiding Questions ,[object Object],[object Object],SchoolDude University 2009
Five Guiding Questions ,[object Object],[object Object],[object Object],SchoolDude University 2009
Five Guiding Questions ,[object Object],[object Object],[object Object],[object Object],SchoolDude University 2009
Five Guiding Questions ,[object Object],[object Object],[object Object],[object Object],[object Object],SchoolDude University 2009
Three Strategic Areas ,[object Object],[object Object],[object Object],SchoolDude University 2009
Three Action Themes ,[object Object],[object Object],[object Object],SchoolDude University 2009
Questions to Ask ,[object Object],SchoolDude University 2009
Questions to Ask ,[object Object],[object Object],[object Object],[object Object],SchoolDude University 2009
Questions to Ask ,[object Object],[object Object],[object Object],[object Object],SchoolDude University 2009
Questions to Ask ,[object Object],[object Object],[object Object],[object Object],[object Object],SchoolDude University 2009
Questions to Ask ,[object Object],[object Object],[object Object],SchoolDude University 2009
Questions to Ask ,[object Object],[object Object],[object Object],[object Object],SchoolDude University 2009
Questions to Ask ,[object Object],[object Object],[object Object],[object Object],[object Object],SchoolDude University 2009
Security Planning Protocol SchoolDude University 2009 Outcome: Security Project Description      goals    processes    resources    decision-making standards Phase 1: Create Leadership  Team & Set Security Goals Outcome: Prioritized Risk Assessment   A ranked list of vulnerabilities to guide the Risk Reduction Phase Phase 2: Risk Analysis Outcome: Implemented Security Plan   Risk Analysis and Risk Reduction processes must be regularly repeated to ensure effectiveness Phase 3: Risk Reduction Outcome: Crisis Management Plan   A blueprint for organizational continuity Phase 4: Crisis Management
Leadership Team ,[object Object],[object Object],[object Object],[object Object],SchoolDude University 2009
Leadership Team ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],SchoolDude University 2009
District Security Checklist ,[object Object],SchoolDude University 2009
Risk Analysis ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],SchoolDude University 2009
Security Planning Grid SchoolDude University 2009 Security Area Basic Developing Adequate Advanced Management Leadership: Little participation in IT security Aware but little support provided Supports and  funds security Aligns security  with organizational  mission Technology Network design  and IT operations : broadly  vulnerable security roll out  is incomplete mostly secure seamless security Environmental & Physical: Infrastructure: not secure partially secure mostly secure secure End Users   Stakeholders: unaware of role in security Limited  awareness  and  training Improved  awareness,  Mostly  trained Proactive  participants in  security
Security Planning Grid ,[object Object],[object Object],[object Object],SchoolDude University 2009
Planning Security Grid ,[object Object],[object Object],[object Object],SchoolDude University 2009
Plan, Test, Plan, Test….. ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],SchoolDude University 2009
Plan, Test, Plan, Test….. ,[object Object],[object Object],[object Object],[object Object],[object Object],SchoolDude University 2009
Plan, Test, Plan, Test….. ,[object Object],[object Object],[object Object],[object Object],SchoolDude University 2009
[object Object],[object Object],SchoolDude University 2009
SchoolDude University 2009 Questions and Comments?
[object Object],SchoolDude University 2009 www.cosn.org
Thank you Sponsors SchoolDude University 2009
[object Object],[object Object],[object Object],[object Object],[object Object],SchoolDude University 2009

Weitere ähnliche Inhalte

Andere mochten auch

Installation To Occupancy
Installation To OccupancyInstallation To Occupancy
Installation To Occupancybrentdzn
 
San Bernardino
San BernardinoSan Bernardino
San Bernardinobrentdzn
 
Tamion&&Ashely
Tamion&&AshelyTamion&&Ashely
Tamion&&Ashelytlandreth
 
Highlighting Library Collections
Highlighting Library CollectionsHighlighting Library Collections
Highlighting Library Collectionsjohnbickar
 

Andere mochten auch (6)

Installation To Occupancy
Installation To OccupancyInstallation To Occupancy
Installation To Occupancy
 
My Complete C.V[1]
My Complete C.V[1]My Complete C.V[1]
My Complete C.V[1]
 
San Bernardino
San BernardinoSan Bernardino
San Bernardino
 
My Complete C.V[1]
My Complete C.V[1]My Complete C.V[1]
My Complete C.V[1]
 
Tamion&&Ashely
Tamion&&AshelyTamion&&Ashely
Tamion&&Ashely
 
Highlighting Library Collections
Highlighting Library CollectionsHighlighting Library Collections
Highlighting Library Collections
 

Ähnlich wie CyberSecurity - Linda Sharp

Planning for the Inevitable: IT Disaster Preparedness - Linda Sharp
Planning for the Inevitable: IT Disaster Preparedness - Linda SharpPlanning for the Inevitable: IT Disaster Preparedness - Linda Sharp
Planning for the Inevitable: IT Disaster Preparedness - Linda SharpSchoolDude Editors
 
Jonathan raymond 2010 rotman telus - atlseccon2011
Jonathan raymond   2010 rotman telus - atlseccon2011Jonathan raymond   2010 rotman telus - atlseccon2011
Jonathan raymond 2010 rotman telus - atlseccon2011Atlantic Security Conference
 
End User Security Awareness Presentation
End User Security Awareness PresentationEnd User Security Awareness Presentation
End User Security Awareness PresentationCristian Mihai
 
Big data contains valuable information - Protect It!
Big data contains valuable information - Protect It!Big data contains valuable information - Protect It!
Big data contains valuable information - Protect It!Praveenkumar Hosangadi
 
IBM's four key steps to security and privacy for big data
IBM's four key steps to security and privacy for big dataIBM's four key steps to security and privacy for big data
IBM's four key steps to security and privacy for big dataIBM Analytics
 
Managing Risk in Information SystemsChapter 4Developing a .docx
Managing Risk in Information SystemsChapter 4Developing a .docxManaging Risk in Information SystemsChapter 4Developing a .docx
Managing Risk in Information SystemsChapter 4Developing a .docxcroysierkathey
 
CMGT400 v7Threats, Attacks, and Vulnerability Assessment Templa.docx
CMGT400 v7Threats, Attacks, and Vulnerability Assessment Templa.docxCMGT400 v7Threats, Attacks, and Vulnerability Assessment Templa.docx
CMGT400 v7Threats, Attacks, and Vulnerability Assessment Templa.docxmary772
 
Current Article Review1. Locate a current article about Regul.docx
Current Article Review1. Locate a current article about Regul.docxCurrent Article Review1. Locate a current article about Regul.docx
Current Article Review1. Locate a current article about Regul.docxannettsparrow
 
Boardroom to War Room: Practical Application of the NIST Cybersecurity Frame...
Boardroom to War Room:  Practical Application of the NIST Cybersecurity Frame...Boardroom to War Room:  Practical Application of the NIST Cybersecurity Frame...
Boardroom to War Room: Practical Application of the NIST Cybersecurity Frame...robbiesamuel
 
2 Security And Internet Security
2 Security And Internet Security2 Security And Internet Security
2 Security And Internet SecurityAna Meskovska
 
Security Awareness Training for Community Colleges 2009
Security Awareness Training for Community Colleges 2009Security Awareness Training for Community Colleges 2009
Security Awareness Training for Community Colleges 2009Donald E. Hester
 
Fissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-trainingFissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-trainingSwati Gupta
 
Start With A Great Information Security Plan!
Start With A Great Information Security Plan!Start With A Great Information Security Plan!
Start With A Great Information Security Plan!Tammy Clark
 
The Impact Of Breaches On Higher Ed Tlc 27 Sep09
The Impact Of Breaches On Higher Ed Tlc 27 Sep09The Impact Of Breaches On Higher Ed Tlc 27 Sep09
The Impact Of Breaches On Higher Ed Tlc 27 Sep09Tammy Clark
 
Cybersecurity education for the next generation
Cybersecurity education for the next generationCybersecurity education for the next generation
Cybersecurity education for the next generationIBM Security
 
Pbl ppt on cybersecurity.pdf
Pbl ppt on cybersecurity.pdfPbl ppt on cybersecurity.pdf
Pbl ppt on cybersecurity.pdfPanchalBhavin2
 
The Cost Of Preventing Breaches Educause Nat Conf Denver Nov 09
The Cost Of Preventing Breaches Educause Nat Conf Denver Nov 09The Cost Of Preventing Breaches Educause Nat Conf Denver Nov 09
The Cost Of Preventing Breaches Educause Nat Conf Denver Nov 09Tammy Clark
 
Gp2 Public Policy Assign8 644 Sp10
Gp2 Public Policy Assign8 644 Sp10Gp2 Public Policy Assign8 644 Sp10
Gp2 Public Policy Assign8 644 Sp10Deepa Devadas
 
Fusion-Center-ITS-Security-and-Privacy-Operations (1).pptx
Fusion-Center-ITS-Security-and-Privacy-Operations (1).pptxFusion-Center-ITS-Security-and-Privacy-Operations (1).pptx
Fusion-Center-ITS-Security-and-Privacy-Operations (1).pptxMuhammadAbdullah311866
 
Dealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber ResilienceDealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber ResilienceDonald Tabone
 

Ähnlich wie CyberSecurity - Linda Sharp (20)

Planning for the Inevitable: IT Disaster Preparedness - Linda Sharp
Planning for the Inevitable: IT Disaster Preparedness - Linda SharpPlanning for the Inevitable: IT Disaster Preparedness - Linda Sharp
Planning for the Inevitable: IT Disaster Preparedness - Linda Sharp
 
Jonathan raymond 2010 rotman telus - atlseccon2011
Jonathan raymond   2010 rotman telus - atlseccon2011Jonathan raymond   2010 rotman telus - atlseccon2011
Jonathan raymond 2010 rotman telus - atlseccon2011
 
End User Security Awareness Presentation
End User Security Awareness PresentationEnd User Security Awareness Presentation
End User Security Awareness Presentation
 
Big data contains valuable information - Protect It!
Big data contains valuable information - Protect It!Big data contains valuable information - Protect It!
Big data contains valuable information - Protect It!
 
IBM's four key steps to security and privacy for big data
IBM's four key steps to security and privacy for big dataIBM's four key steps to security and privacy for big data
IBM's four key steps to security and privacy for big data
 
Managing Risk in Information SystemsChapter 4Developing a .docx
Managing Risk in Information SystemsChapter 4Developing a .docxManaging Risk in Information SystemsChapter 4Developing a .docx
Managing Risk in Information SystemsChapter 4Developing a .docx
 
CMGT400 v7Threats, Attacks, and Vulnerability Assessment Templa.docx
CMGT400 v7Threats, Attacks, and Vulnerability Assessment Templa.docxCMGT400 v7Threats, Attacks, and Vulnerability Assessment Templa.docx
CMGT400 v7Threats, Attacks, and Vulnerability Assessment Templa.docx
 
Current Article Review1. Locate a current article about Regul.docx
Current Article Review1. Locate a current article about Regul.docxCurrent Article Review1. Locate a current article about Regul.docx
Current Article Review1. Locate a current article about Regul.docx
 
Boardroom to War Room: Practical Application of the NIST Cybersecurity Frame...
Boardroom to War Room:  Practical Application of the NIST Cybersecurity Frame...Boardroom to War Room:  Practical Application of the NIST Cybersecurity Frame...
Boardroom to War Room: Practical Application of the NIST Cybersecurity Frame...
 
2 Security And Internet Security
2 Security And Internet Security2 Security And Internet Security
2 Security And Internet Security
 
Security Awareness Training for Community Colleges 2009
Security Awareness Training for Community Colleges 2009Security Awareness Training for Community Colleges 2009
Security Awareness Training for Community Colleges 2009
 
Fissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-trainingFissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-training
 
Start With A Great Information Security Plan!
Start With A Great Information Security Plan!Start With A Great Information Security Plan!
Start With A Great Information Security Plan!
 
The Impact Of Breaches On Higher Ed Tlc 27 Sep09
The Impact Of Breaches On Higher Ed Tlc 27 Sep09The Impact Of Breaches On Higher Ed Tlc 27 Sep09
The Impact Of Breaches On Higher Ed Tlc 27 Sep09
 
Cybersecurity education for the next generation
Cybersecurity education for the next generationCybersecurity education for the next generation
Cybersecurity education for the next generation
 
Pbl ppt on cybersecurity.pdf
Pbl ppt on cybersecurity.pdfPbl ppt on cybersecurity.pdf
Pbl ppt on cybersecurity.pdf
 
The Cost Of Preventing Breaches Educause Nat Conf Denver Nov 09
The Cost Of Preventing Breaches Educause Nat Conf Denver Nov 09The Cost Of Preventing Breaches Educause Nat Conf Denver Nov 09
The Cost Of Preventing Breaches Educause Nat Conf Denver Nov 09
 
Gp2 Public Policy Assign8 644 Sp10
Gp2 Public Policy Assign8 644 Sp10Gp2 Public Policy Assign8 644 Sp10
Gp2 Public Policy Assign8 644 Sp10
 
Fusion-Center-ITS-Security-and-Privacy-Operations (1).pptx
Fusion-Center-ITS-Security-and-Privacy-Operations (1).pptxFusion-Center-ITS-Security-and-Privacy-Operations (1).pptx
Fusion-Center-ITS-Security-and-Privacy-Operations (1).pptx
 
Dealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber ResilienceDealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber Resilience
 

Mehr von SchoolDude Editors

SchoolDude University 2014 West in Pictures
SchoolDude University 2014 West in PicturesSchoolDude University 2014 West in Pictures
SchoolDude University 2014 West in PicturesSchoolDude Editors
 
Energy Management for Schools & Colleges - Terry Taylor
Energy Management for Schools & Colleges - Terry TaylorEnergy Management for Schools & Colleges - Terry Taylor
Energy Management for Schools & Colleges - Terry TaylorSchoolDude Editors
 
Achieving Excellence in Custodial Operations - Terry Taylor
Achieving Excellence in Custodial Operations - Terry TaylorAchieving Excellence in Custodial Operations - Terry Taylor
Achieving Excellence in Custodial Operations - Terry TaylorSchoolDude Editors
 
Your Mission & Why You Should Choose to Accept It - Art Bode
Your Mission & Why You Should Choose to Accept It - Art BodeYour Mission & Why You Should Choose to Accept It - Art Bode
Your Mission & Why You Should Choose to Accept It - Art BodeSchoolDude Editors
 
Facilities Teams - Are You Telling Your Whole Story? - Ray Mirizzi
Facilities Teams - Are You Telling Your Whole Story? - Ray MirizziFacilities Teams - Are You Telling Your Whole Story? - Ray Mirizzi
Facilities Teams - Are You Telling Your Whole Story? - Ray MirizziSchoolDude Editors
 
Telling the Technology Story - Vickie Bigham
Telling the Technology Story - Vickie BighamTelling the Technology Story - Vickie Bigham
Telling the Technology Story - Vickie BighamSchoolDude Editors
 
How to Manage and Embrace Change in Facilities Envt. - Denine Kysar
How to Manage and Embrace Change in Facilities Envt. - Denine KysarHow to Manage and Embrace Change in Facilities Envt. - Denine Kysar
How to Manage and Embrace Change in Facilities Envt. - Denine KysarSchoolDude Editors
 
The Cost of Technology: Total Cost of Ownership and Value of Investment - Ri...
The Cost of Technology:  Total Cost of Ownership and Value of Investment - Ri...The Cost of Technology:  Total Cost of Ownership and Value of Investment - Ri...
The Cost of Technology: Total Cost of Ownership and Value of Investment - Ri...SchoolDude Editors
 
Managing When There Aren't Enough People to Do the Work - Debra Dixon-Doss
Managing When There Aren't Enough People to Do the Work - Debra Dixon-DossManaging When There Aren't Enough People to Do the Work - Debra Dixon-Doss
Managing When There Aren't Enough People to Do the Work - Debra Dixon-DossSchoolDude Editors
 
Life Cycle Modeling - Theory Behind TARA - Rick Biedenweg
Life Cycle Modeling - Theory Behind TARA - Rick BiedenwegLife Cycle Modeling - Theory Behind TARA - Rick Biedenweg
Life Cycle Modeling - Theory Behind TARA - Rick BiedenwegSchoolDude Editors
 
• Technology Leadership, Planning and Implementation: Specific Strategies fo...
•	Technology Leadership, Planning and Implementation:  Specific Strategies fo...•	Technology Leadership, Planning and Implementation:  Specific Strategies fo...
• Technology Leadership, Planning and Implementation: Specific Strategies fo...SchoolDude Editors
 
Improving Personal Communication - Jim Joyce
Improving Personal Communication - Jim JoyceImproving Personal Communication - Jim Joyce
Improving Personal Communication - Jim JoyceSchoolDude Editors
 
Train Your Requesters - Susan Savage Fusco and Natalie Stites
Train Your Requesters - Susan Savage Fusco and Natalie StitesTrain Your Requesters - Susan Savage Fusco and Natalie Stites
Train Your Requesters - Susan Savage Fusco and Natalie StitesSchoolDude Editors
 
How to Implement a Fee Schedule for Community Use of School Facilities
How to Implement a Fee Schedule for Community Use of School FacilitiesHow to Implement a Fee Schedule for Community Use of School Facilities
How to Implement a Fee Schedule for Community Use of School FacilitiesSchoolDude Editors
 
Strategies for Successful Technology Bond Campaigns - Vickie Bigham
Strategies for Successful Technology Bond Campaigns - Vickie BighamStrategies for Successful Technology Bond Campaigns - Vickie Bigham
Strategies for Successful Technology Bond Campaigns - Vickie BighamSchoolDude Editors
 
Theres Gold In Those Energy Bills
Theres Gold In Those Energy BillsTheres Gold In Those Energy Bills
Theres Gold In Those Energy BillsSchoolDude Editors
 
Energy Management And Cost Control Fall2008
Energy Management And Cost Control Fall2008Energy Management And Cost Control Fall2008
Energy Management And Cost Control Fall2008SchoolDude Editors
 

Mehr von SchoolDude Editors (19)

SchoolDude University 2014 West in Pictures
SchoolDude University 2014 West in PicturesSchoolDude University 2014 West in Pictures
SchoolDude University 2014 West in Pictures
 
Capital Planning
Capital PlanningCapital Planning
Capital Planning
 
Energy Management for Schools & Colleges - Terry Taylor
Energy Management for Schools & Colleges - Terry TaylorEnergy Management for Schools & Colleges - Terry Taylor
Energy Management for Schools & Colleges - Terry Taylor
 
Achieving Excellence in Custodial Operations - Terry Taylor
Achieving Excellence in Custodial Operations - Terry TaylorAchieving Excellence in Custodial Operations - Terry Taylor
Achieving Excellence in Custodial Operations - Terry Taylor
 
Your Mission & Why You Should Choose to Accept It - Art Bode
Your Mission & Why You Should Choose to Accept It - Art BodeYour Mission & Why You Should Choose to Accept It - Art Bode
Your Mission & Why You Should Choose to Accept It - Art Bode
 
Facilities Teams - Are You Telling Your Whole Story? - Ray Mirizzi
Facilities Teams - Are You Telling Your Whole Story? - Ray MirizziFacilities Teams - Are You Telling Your Whole Story? - Ray Mirizzi
Facilities Teams - Are You Telling Your Whole Story? - Ray Mirizzi
 
Telling the Technology Story - Vickie Bigham
Telling the Technology Story - Vickie BighamTelling the Technology Story - Vickie Bigham
Telling the Technology Story - Vickie Bigham
 
How to Manage and Embrace Change in Facilities Envt. - Denine Kysar
How to Manage and Embrace Change in Facilities Envt. - Denine KysarHow to Manage and Embrace Change in Facilities Envt. - Denine Kysar
How to Manage and Embrace Change in Facilities Envt. - Denine Kysar
 
The Cost of Technology: Total Cost of Ownership and Value of Investment - Ri...
The Cost of Technology:  Total Cost of Ownership and Value of Investment - Ri...The Cost of Technology:  Total Cost of Ownership and Value of Investment - Ri...
The Cost of Technology: Total Cost of Ownership and Value of Investment - Ri...
 
Managing When There Aren't Enough People to Do the Work - Debra Dixon-Doss
Managing When There Aren't Enough People to Do the Work - Debra Dixon-DossManaging When There Aren't Enough People to Do the Work - Debra Dixon-Doss
Managing When There Aren't Enough People to Do the Work - Debra Dixon-Doss
 
Life Cycle Modeling - Theory Behind TARA - Rick Biedenweg
Life Cycle Modeling - Theory Behind TARA - Rick BiedenwegLife Cycle Modeling - Theory Behind TARA - Rick Biedenweg
Life Cycle Modeling - Theory Behind TARA - Rick Biedenweg
 
• Technology Leadership, Planning and Implementation: Specific Strategies fo...
•	Technology Leadership, Planning and Implementation:  Specific Strategies fo...•	Technology Leadership, Planning and Implementation:  Specific Strategies fo...
• Technology Leadership, Planning and Implementation: Specific Strategies fo...
 
Improving Personal Communication - Jim Joyce
Improving Personal Communication - Jim JoyceImproving Personal Communication - Jim Joyce
Improving Personal Communication - Jim Joyce
 
Train Your Requesters - Susan Savage Fusco and Natalie Stites
Train Your Requesters - Susan Savage Fusco and Natalie StitesTrain Your Requesters - Susan Savage Fusco and Natalie Stites
Train Your Requesters - Susan Savage Fusco and Natalie Stites
 
How to Implement a Fee Schedule for Community Use of School Facilities
How to Implement a Fee Schedule for Community Use of School FacilitiesHow to Implement a Fee Schedule for Community Use of School Facilities
How to Implement a Fee Schedule for Community Use of School Facilities
 
Leading Today - Scott Little
Leading Today - Scott LittleLeading Today - Scott Little
Leading Today - Scott Little
 
Strategies for Successful Technology Bond Campaigns - Vickie Bigham
Strategies for Successful Technology Bond Campaigns - Vickie BighamStrategies for Successful Technology Bond Campaigns - Vickie Bigham
Strategies for Successful Technology Bond Campaigns - Vickie Bigham
 
Theres Gold In Those Energy Bills
Theres Gold In Those Energy BillsTheres Gold In Those Energy Bills
Theres Gold In Those Energy Bills
 
Energy Management And Cost Control Fall2008
Energy Management And Cost Control Fall2008Energy Management And Cost Control Fall2008
Energy Management And Cost Control Fall2008
 

Kürzlich hochgeladen

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 

Kürzlich hochgeladen (20)

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 

CyberSecurity - Linda Sharp

  • 1. Cyber Security Linda Sharp CoSN Cyber Security Project Director SchoolDude University 2009
  • 2.
  • 3.
  • 4. The Evolution of Intent From Hobbyists to Professionals SchoolDude University 2009 THREAT SEVERITY 1990 1995 2000 2005 WHAT’S NEXT? 2007 Threats becoming increasingly difficult to detect and mitigate FINANCIAL: Theft & Damage FAME: Viruses and Malware TESTING THE WATERS: Basic Intrusions and Viruses
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24. Security Planning Protocol SchoolDude University 2009 Outcome: Security Project Description  goals  processes  resources  decision-making standards Phase 1: Create Leadership Team & Set Security Goals Outcome: Prioritized Risk Assessment A ranked list of vulnerabilities to guide the Risk Reduction Phase Phase 2: Risk Analysis Outcome: Implemented Security Plan Risk Analysis and Risk Reduction processes must be regularly repeated to ensure effectiveness Phase 3: Risk Reduction Outcome: Crisis Management Plan A blueprint for organizational continuity Phase 4: Crisis Management
  • 25.
  • 26.
  • 27.
  • 28.
  • 29. Security Planning Grid SchoolDude University 2009 Security Area Basic Developing Adequate Advanced Management Leadership: Little participation in IT security Aware but little support provided Supports and funds security Aligns security with organizational mission Technology Network design and IT operations : broadly vulnerable security roll out is incomplete mostly secure seamless security Environmental & Physical: Infrastructure: not secure partially secure mostly secure secure End Users Stakeholders: unaware of role in security Limited awareness and training Improved awareness, Mostly trained Proactive participants in security
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36. SchoolDude University 2009 Questions and Comments?
  • 37.
  • 38. Thank you Sponsors SchoolDude University 2009
  • 39.