SlideShare una empresa de Scribd logo
1 de 39
Cyber Security Linda Sharp CoSN Cyber Security  Project Director  SchoolDude University 2009
Understanding the Issues ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],SchoolDude University 2009
Reliance on Technology ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],SchoolDude University 2009
The Evolution of Intent  From Hobbyists to Professionals SchoolDude University 2009 THREAT SEVERITY 1990 1995 2000 2005 WHAT’S NEXT? 2007 Threats becoming increasingly difficult to detect and mitigate FINANCIAL: Theft & Damage FAME: Viruses and Malware TESTING THE WATERS: Basic Intrusions and Viruses
Financial Impact ,[object Object],[object Object],[object Object],SchoolDude University 2009
Legal Impact ,[object Object],[object Object],[object Object],[object Object],[object Object],SchoolDude University 2009
Legal Impact ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],SchoolDude University 2009
Legal Impact ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],SchoolDude University 2009
Safety vs. Security ,[object Object],[object Object],SchoolDude University 2009
Five Guiding Questions ,[object Object],SchoolDude University 2009
Five Guiding Questions ,[object Object],[object Object],SchoolDude University 2009
Five Guiding Questions ,[object Object],[object Object],[object Object],SchoolDude University 2009
Five Guiding Questions ,[object Object],[object Object],[object Object],[object Object],SchoolDude University 2009
Five Guiding Questions ,[object Object],[object Object],[object Object],[object Object],[object Object],SchoolDude University 2009
Three Strategic Areas ,[object Object],[object Object],[object Object],SchoolDude University 2009
Three Action Themes ,[object Object],[object Object],[object Object],SchoolDude University 2009
Questions to Ask ,[object Object],SchoolDude University 2009
Questions to Ask ,[object Object],[object Object],[object Object],[object Object],SchoolDude University 2009
Questions to Ask ,[object Object],[object Object],[object Object],[object Object],SchoolDude University 2009
Questions to Ask ,[object Object],[object Object],[object Object],[object Object],[object Object],SchoolDude University 2009
Questions to Ask ,[object Object],[object Object],[object Object],SchoolDude University 2009
Questions to Ask ,[object Object],[object Object],[object Object],[object Object],SchoolDude University 2009
Questions to Ask ,[object Object],[object Object],[object Object],[object Object],[object Object],SchoolDude University 2009
Security Planning Protocol SchoolDude University 2009 Outcome: Security Project Description      goals    processes    resources    decision-making standards Phase 1: Create Leadership  Team & Set Security Goals Outcome: Prioritized Risk Assessment   A ranked list of vulnerabilities to guide the Risk Reduction Phase Phase 2: Risk Analysis Outcome: Implemented Security Plan   Risk Analysis and Risk Reduction processes must be regularly repeated to ensure effectiveness Phase 3: Risk Reduction Outcome: Crisis Management Plan   A blueprint for organizational continuity Phase 4: Crisis Management
Leadership Team ,[object Object],[object Object],[object Object],[object Object],SchoolDude University 2009
Leadership Team ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],SchoolDude University 2009
District Security Checklist ,[object Object],SchoolDude University 2009
Risk Analysis ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],SchoolDude University 2009
Security Planning Grid SchoolDude University 2009 Security Area Basic Developing Adequate Advanced Management Leadership: Little participation in IT security Aware but little support provided Supports and  funds security Aligns security  with organizational  mission Technology Network design  and IT operations : broadly  vulnerable security roll out  is incomplete mostly secure seamless security Environmental & Physical: Infrastructure: not secure partially secure mostly secure secure End Users   Stakeholders: unaware of role in security Limited  awareness  and  training Improved  awareness,  Mostly  trained Proactive  participants in  security
Security Planning Grid ,[object Object],[object Object],[object Object],SchoolDude University 2009
Planning Security Grid ,[object Object],[object Object],[object Object],SchoolDude University 2009
Plan, Test, Plan, Test….. ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],SchoolDude University 2009
Plan, Test, Plan, Test….. ,[object Object],[object Object],[object Object],[object Object],[object Object],SchoolDude University 2009
Plan, Test, Plan, Test….. ,[object Object],[object Object],[object Object],[object Object],SchoolDude University 2009
[object Object],[object Object],SchoolDude University 2009
SchoolDude University 2009 Questions and Comments?
[object Object],SchoolDude University 2009 www.cosn.org
Thank you Sponsors SchoolDude University 2009
[object Object],[object Object],[object Object],[object Object],[object Object],SchoolDude University 2009

Más contenido relacionado

Destacado

Installation To Occupancy
Installation To OccupancyInstallation To Occupancy
Installation To Occupancybrentdzn
 
San Bernardino
San BernardinoSan Bernardino
San Bernardinobrentdzn
 
Tamion&&Ashely
Tamion&&AshelyTamion&&Ashely
Tamion&&Ashelytlandreth
 
Highlighting Library Collections
Highlighting Library CollectionsHighlighting Library Collections
Highlighting Library Collectionsjohnbickar
 

Destacado (6)

Installation To Occupancy
Installation To OccupancyInstallation To Occupancy
Installation To Occupancy
 
My Complete C.V[1]
My Complete C.V[1]My Complete C.V[1]
My Complete C.V[1]
 
San Bernardino
San BernardinoSan Bernardino
San Bernardino
 
My Complete C.V[1]
My Complete C.V[1]My Complete C.V[1]
My Complete C.V[1]
 
Tamion&&Ashely
Tamion&&AshelyTamion&&Ashely
Tamion&&Ashely
 
Highlighting Library Collections
Highlighting Library CollectionsHighlighting Library Collections
Highlighting Library Collections
 

Similar a CyberSecurity - Linda Sharp

Planning for the Inevitable: IT Disaster Preparedness - Linda Sharp
Planning for the Inevitable: IT Disaster Preparedness - Linda SharpPlanning for the Inevitable: IT Disaster Preparedness - Linda Sharp
Planning for the Inevitable: IT Disaster Preparedness - Linda SharpSchoolDude Editors
 
Jonathan raymond 2010 rotman telus - atlseccon2011
Jonathan raymond   2010 rotman telus - atlseccon2011Jonathan raymond   2010 rotman telus - atlseccon2011
Jonathan raymond 2010 rotman telus - atlseccon2011Atlantic Security Conference
 
End User Security Awareness Presentation
End User Security Awareness PresentationEnd User Security Awareness Presentation
End User Security Awareness PresentationCristian Mihai
 
Big data contains valuable information - Protect It!
Big data contains valuable information - Protect It!Big data contains valuable information - Protect It!
Big data contains valuable information - Protect It!Praveenkumar Hosangadi
 
IBM's four key steps to security and privacy for big data
IBM's four key steps to security and privacy for big dataIBM's four key steps to security and privacy for big data
IBM's four key steps to security and privacy for big dataIBM Analytics
 
Managing Risk in Information SystemsChapter 4Developing a .docx
Managing Risk in Information SystemsChapter 4Developing a .docxManaging Risk in Information SystemsChapter 4Developing a .docx
Managing Risk in Information SystemsChapter 4Developing a .docxcroysierkathey
 
CMGT400 v7Threats, Attacks, and Vulnerability Assessment Templa.docx
CMGT400 v7Threats, Attacks, and Vulnerability Assessment Templa.docxCMGT400 v7Threats, Attacks, and Vulnerability Assessment Templa.docx
CMGT400 v7Threats, Attacks, and Vulnerability Assessment Templa.docxmary772
 
Current Article Review1. Locate a current article about Regul.docx
Current Article Review1. Locate a current article about Regul.docxCurrent Article Review1. Locate a current article about Regul.docx
Current Article Review1. Locate a current article about Regul.docxannettsparrow
 
Boardroom to War Room: Practical Application of the NIST Cybersecurity Frame...
Boardroom to War Room:  Practical Application of the NIST Cybersecurity Frame...Boardroom to War Room:  Practical Application of the NIST Cybersecurity Frame...
Boardroom to War Room: Practical Application of the NIST Cybersecurity Frame...robbiesamuel
 
2 Security And Internet Security
2 Security And Internet Security2 Security And Internet Security
2 Security And Internet SecurityAna Meskovska
 
Security Awareness Training for Community Colleges 2009
Security Awareness Training for Community Colleges 2009Security Awareness Training for Community Colleges 2009
Security Awareness Training for Community Colleges 2009Donald E. Hester
 
Fissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-trainingFissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-trainingSwati Gupta
 
Start With A Great Information Security Plan!
Start With A Great Information Security Plan!Start With A Great Information Security Plan!
Start With A Great Information Security Plan!Tammy Clark
 
The Impact Of Breaches On Higher Ed Tlc 27 Sep09
The Impact Of Breaches On Higher Ed Tlc 27 Sep09The Impact Of Breaches On Higher Ed Tlc 27 Sep09
The Impact Of Breaches On Higher Ed Tlc 27 Sep09Tammy Clark
 
Cybersecurity education for the next generation
Cybersecurity education for the next generationCybersecurity education for the next generation
Cybersecurity education for the next generationIBM Security
 
Pbl ppt on cybersecurity.pdf
Pbl ppt on cybersecurity.pdfPbl ppt on cybersecurity.pdf
Pbl ppt on cybersecurity.pdfPanchalBhavin2
 
The Cost Of Preventing Breaches Educause Nat Conf Denver Nov 09
The Cost Of Preventing Breaches Educause Nat Conf Denver Nov 09The Cost Of Preventing Breaches Educause Nat Conf Denver Nov 09
The Cost Of Preventing Breaches Educause Nat Conf Denver Nov 09Tammy Clark
 
Gp2 Public Policy Assign8 644 Sp10
Gp2 Public Policy Assign8 644 Sp10Gp2 Public Policy Assign8 644 Sp10
Gp2 Public Policy Assign8 644 Sp10Deepa Devadas
 
Fusion-Center-ITS-Security-and-Privacy-Operations (1).pptx
Fusion-Center-ITS-Security-and-Privacy-Operations (1).pptxFusion-Center-ITS-Security-and-Privacy-Operations (1).pptx
Fusion-Center-ITS-Security-and-Privacy-Operations (1).pptxMuhammadAbdullah311866
 
Dealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber ResilienceDealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber ResilienceDonald Tabone
 

Similar a CyberSecurity - Linda Sharp (20)

Planning for the Inevitable: IT Disaster Preparedness - Linda Sharp
Planning for the Inevitable: IT Disaster Preparedness - Linda SharpPlanning for the Inevitable: IT Disaster Preparedness - Linda Sharp
Planning for the Inevitable: IT Disaster Preparedness - Linda Sharp
 
Jonathan raymond 2010 rotman telus - atlseccon2011
Jonathan raymond   2010 rotman telus - atlseccon2011Jonathan raymond   2010 rotman telus - atlseccon2011
Jonathan raymond 2010 rotman telus - atlseccon2011
 
End User Security Awareness Presentation
End User Security Awareness PresentationEnd User Security Awareness Presentation
End User Security Awareness Presentation
 
Big data contains valuable information - Protect It!
Big data contains valuable information - Protect It!Big data contains valuable information - Protect It!
Big data contains valuable information - Protect It!
 
IBM's four key steps to security and privacy for big data
IBM's four key steps to security and privacy for big dataIBM's four key steps to security and privacy for big data
IBM's four key steps to security and privacy for big data
 
Managing Risk in Information SystemsChapter 4Developing a .docx
Managing Risk in Information SystemsChapter 4Developing a .docxManaging Risk in Information SystemsChapter 4Developing a .docx
Managing Risk in Information SystemsChapter 4Developing a .docx
 
CMGT400 v7Threats, Attacks, and Vulnerability Assessment Templa.docx
CMGT400 v7Threats, Attacks, and Vulnerability Assessment Templa.docxCMGT400 v7Threats, Attacks, and Vulnerability Assessment Templa.docx
CMGT400 v7Threats, Attacks, and Vulnerability Assessment Templa.docx
 
Current Article Review1. Locate a current article about Regul.docx
Current Article Review1. Locate a current article about Regul.docxCurrent Article Review1. Locate a current article about Regul.docx
Current Article Review1. Locate a current article about Regul.docx
 
Boardroom to War Room: Practical Application of the NIST Cybersecurity Frame...
Boardroom to War Room:  Practical Application of the NIST Cybersecurity Frame...Boardroom to War Room:  Practical Application of the NIST Cybersecurity Frame...
Boardroom to War Room: Practical Application of the NIST Cybersecurity Frame...
 
2 Security And Internet Security
2 Security And Internet Security2 Security And Internet Security
2 Security And Internet Security
 
Security Awareness Training for Community Colleges 2009
Security Awareness Training for Community Colleges 2009Security Awareness Training for Community Colleges 2009
Security Awareness Training for Community Colleges 2009
 
Fissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-trainingFissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-training
 
Start With A Great Information Security Plan!
Start With A Great Information Security Plan!Start With A Great Information Security Plan!
Start With A Great Information Security Plan!
 
The Impact Of Breaches On Higher Ed Tlc 27 Sep09
The Impact Of Breaches On Higher Ed Tlc 27 Sep09The Impact Of Breaches On Higher Ed Tlc 27 Sep09
The Impact Of Breaches On Higher Ed Tlc 27 Sep09
 
Cybersecurity education for the next generation
Cybersecurity education for the next generationCybersecurity education for the next generation
Cybersecurity education for the next generation
 
Pbl ppt on cybersecurity.pdf
Pbl ppt on cybersecurity.pdfPbl ppt on cybersecurity.pdf
Pbl ppt on cybersecurity.pdf
 
The Cost Of Preventing Breaches Educause Nat Conf Denver Nov 09
The Cost Of Preventing Breaches Educause Nat Conf Denver Nov 09The Cost Of Preventing Breaches Educause Nat Conf Denver Nov 09
The Cost Of Preventing Breaches Educause Nat Conf Denver Nov 09
 
Gp2 Public Policy Assign8 644 Sp10
Gp2 Public Policy Assign8 644 Sp10Gp2 Public Policy Assign8 644 Sp10
Gp2 Public Policy Assign8 644 Sp10
 
Fusion-Center-ITS-Security-and-Privacy-Operations (1).pptx
Fusion-Center-ITS-Security-and-Privacy-Operations (1).pptxFusion-Center-ITS-Security-and-Privacy-Operations (1).pptx
Fusion-Center-ITS-Security-and-Privacy-Operations (1).pptx
 
Dealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber ResilienceDealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber Resilience
 

Más de SchoolDude Editors

SchoolDude University 2014 West in Pictures
SchoolDude University 2014 West in PicturesSchoolDude University 2014 West in Pictures
SchoolDude University 2014 West in PicturesSchoolDude Editors
 
Energy Management for Schools & Colleges - Terry Taylor
Energy Management for Schools & Colleges - Terry TaylorEnergy Management for Schools & Colleges - Terry Taylor
Energy Management for Schools & Colleges - Terry TaylorSchoolDude Editors
 
Achieving Excellence in Custodial Operations - Terry Taylor
Achieving Excellence in Custodial Operations - Terry TaylorAchieving Excellence in Custodial Operations - Terry Taylor
Achieving Excellence in Custodial Operations - Terry TaylorSchoolDude Editors
 
Your Mission & Why You Should Choose to Accept It - Art Bode
Your Mission & Why You Should Choose to Accept It - Art BodeYour Mission & Why You Should Choose to Accept It - Art Bode
Your Mission & Why You Should Choose to Accept It - Art BodeSchoolDude Editors
 
Facilities Teams - Are You Telling Your Whole Story? - Ray Mirizzi
Facilities Teams - Are You Telling Your Whole Story? - Ray MirizziFacilities Teams - Are You Telling Your Whole Story? - Ray Mirizzi
Facilities Teams - Are You Telling Your Whole Story? - Ray MirizziSchoolDude Editors
 
Telling the Technology Story - Vickie Bigham
Telling the Technology Story - Vickie BighamTelling the Technology Story - Vickie Bigham
Telling the Technology Story - Vickie BighamSchoolDude Editors
 
How to Manage and Embrace Change in Facilities Envt. - Denine Kysar
How to Manage and Embrace Change in Facilities Envt. - Denine KysarHow to Manage and Embrace Change in Facilities Envt. - Denine Kysar
How to Manage and Embrace Change in Facilities Envt. - Denine KysarSchoolDude Editors
 
The Cost of Technology: Total Cost of Ownership and Value of Investment - Ri...
The Cost of Technology:  Total Cost of Ownership and Value of Investment - Ri...The Cost of Technology:  Total Cost of Ownership and Value of Investment - Ri...
The Cost of Technology: Total Cost of Ownership and Value of Investment - Ri...SchoolDude Editors
 
Managing When There Aren't Enough People to Do the Work - Debra Dixon-Doss
Managing When There Aren't Enough People to Do the Work - Debra Dixon-DossManaging When There Aren't Enough People to Do the Work - Debra Dixon-Doss
Managing When There Aren't Enough People to Do the Work - Debra Dixon-DossSchoolDude Editors
 
Life Cycle Modeling - Theory Behind TARA - Rick Biedenweg
Life Cycle Modeling - Theory Behind TARA - Rick BiedenwegLife Cycle Modeling - Theory Behind TARA - Rick Biedenweg
Life Cycle Modeling - Theory Behind TARA - Rick BiedenwegSchoolDude Editors
 
• Technology Leadership, Planning and Implementation: Specific Strategies fo...
•	Technology Leadership, Planning and Implementation:  Specific Strategies fo...•	Technology Leadership, Planning and Implementation:  Specific Strategies fo...
• Technology Leadership, Planning and Implementation: Specific Strategies fo...SchoolDude Editors
 
Improving Personal Communication - Jim Joyce
Improving Personal Communication - Jim JoyceImproving Personal Communication - Jim Joyce
Improving Personal Communication - Jim JoyceSchoolDude Editors
 
Train Your Requesters - Susan Savage Fusco and Natalie Stites
Train Your Requesters - Susan Savage Fusco and Natalie StitesTrain Your Requesters - Susan Savage Fusco and Natalie Stites
Train Your Requesters - Susan Savage Fusco and Natalie StitesSchoolDude Editors
 
How to Implement a Fee Schedule for Community Use of School Facilities
How to Implement a Fee Schedule for Community Use of School FacilitiesHow to Implement a Fee Schedule for Community Use of School Facilities
How to Implement a Fee Schedule for Community Use of School FacilitiesSchoolDude Editors
 
Strategies for Successful Technology Bond Campaigns - Vickie Bigham
Strategies for Successful Technology Bond Campaigns - Vickie BighamStrategies for Successful Technology Bond Campaigns - Vickie Bigham
Strategies for Successful Technology Bond Campaigns - Vickie BighamSchoolDude Editors
 
Theres Gold In Those Energy Bills
Theres Gold In Those Energy BillsTheres Gold In Those Energy Bills
Theres Gold In Those Energy BillsSchoolDude Editors
 
Energy Management And Cost Control Fall2008
Energy Management And Cost Control Fall2008Energy Management And Cost Control Fall2008
Energy Management And Cost Control Fall2008SchoolDude Editors
 

Más de SchoolDude Editors (19)

SchoolDude University 2014 West in Pictures
SchoolDude University 2014 West in PicturesSchoolDude University 2014 West in Pictures
SchoolDude University 2014 West in Pictures
 
Capital Planning
Capital PlanningCapital Planning
Capital Planning
 
Energy Management for Schools & Colleges - Terry Taylor
Energy Management for Schools & Colleges - Terry TaylorEnergy Management for Schools & Colleges - Terry Taylor
Energy Management for Schools & Colleges - Terry Taylor
 
Achieving Excellence in Custodial Operations - Terry Taylor
Achieving Excellence in Custodial Operations - Terry TaylorAchieving Excellence in Custodial Operations - Terry Taylor
Achieving Excellence in Custodial Operations - Terry Taylor
 
Your Mission & Why You Should Choose to Accept It - Art Bode
Your Mission & Why You Should Choose to Accept It - Art BodeYour Mission & Why You Should Choose to Accept It - Art Bode
Your Mission & Why You Should Choose to Accept It - Art Bode
 
Facilities Teams - Are You Telling Your Whole Story? - Ray Mirizzi
Facilities Teams - Are You Telling Your Whole Story? - Ray MirizziFacilities Teams - Are You Telling Your Whole Story? - Ray Mirizzi
Facilities Teams - Are You Telling Your Whole Story? - Ray Mirizzi
 
Telling the Technology Story - Vickie Bigham
Telling the Technology Story - Vickie BighamTelling the Technology Story - Vickie Bigham
Telling the Technology Story - Vickie Bigham
 
How to Manage and Embrace Change in Facilities Envt. - Denine Kysar
How to Manage and Embrace Change in Facilities Envt. - Denine KysarHow to Manage and Embrace Change in Facilities Envt. - Denine Kysar
How to Manage and Embrace Change in Facilities Envt. - Denine Kysar
 
The Cost of Technology: Total Cost of Ownership and Value of Investment - Ri...
The Cost of Technology:  Total Cost of Ownership and Value of Investment - Ri...The Cost of Technology:  Total Cost of Ownership and Value of Investment - Ri...
The Cost of Technology: Total Cost of Ownership and Value of Investment - Ri...
 
Managing When There Aren't Enough People to Do the Work - Debra Dixon-Doss
Managing When There Aren't Enough People to Do the Work - Debra Dixon-DossManaging When There Aren't Enough People to Do the Work - Debra Dixon-Doss
Managing When There Aren't Enough People to Do the Work - Debra Dixon-Doss
 
Life Cycle Modeling - Theory Behind TARA - Rick Biedenweg
Life Cycle Modeling - Theory Behind TARA - Rick BiedenwegLife Cycle Modeling - Theory Behind TARA - Rick Biedenweg
Life Cycle Modeling - Theory Behind TARA - Rick Biedenweg
 
• Technology Leadership, Planning and Implementation: Specific Strategies fo...
•	Technology Leadership, Planning and Implementation:  Specific Strategies fo...•	Technology Leadership, Planning and Implementation:  Specific Strategies fo...
• Technology Leadership, Planning and Implementation: Specific Strategies fo...
 
Improving Personal Communication - Jim Joyce
Improving Personal Communication - Jim JoyceImproving Personal Communication - Jim Joyce
Improving Personal Communication - Jim Joyce
 
Train Your Requesters - Susan Savage Fusco and Natalie Stites
Train Your Requesters - Susan Savage Fusco and Natalie StitesTrain Your Requesters - Susan Savage Fusco and Natalie Stites
Train Your Requesters - Susan Savage Fusco and Natalie Stites
 
How to Implement a Fee Schedule for Community Use of School Facilities
How to Implement a Fee Schedule for Community Use of School FacilitiesHow to Implement a Fee Schedule for Community Use of School Facilities
How to Implement a Fee Schedule for Community Use of School Facilities
 
Leading Today - Scott Little
Leading Today - Scott LittleLeading Today - Scott Little
Leading Today - Scott Little
 
Strategies for Successful Technology Bond Campaigns - Vickie Bigham
Strategies for Successful Technology Bond Campaigns - Vickie BighamStrategies for Successful Technology Bond Campaigns - Vickie Bigham
Strategies for Successful Technology Bond Campaigns - Vickie Bigham
 
Theres Gold In Those Energy Bills
Theres Gold In Those Energy BillsTheres Gold In Those Energy Bills
Theres Gold In Those Energy Bills
 
Energy Management And Cost Control Fall2008
Energy Management And Cost Control Fall2008Energy Management And Cost Control Fall2008
Energy Management And Cost Control Fall2008
 

Último

Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 

Último (20)

Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 

CyberSecurity - Linda Sharp

  • 1. Cyber Security Linda Sharp CoSN Cyber Security Project Director SchoolDude University 2009
  • 2.
  • 3.
  • 4. The Evolution of Intent From Hobbyists to Professionals SchoolDude University 2009 THREAT SEVERITY 1990 1995 2000 2005 WHAT’S NEXT? 2007 Threats becoming increasingly difficult to detect and mitigate FINANCIAL: Theft & Damage FAME: Viruses and Malware TESTING THE WATERS: Basic Intrusions and Viruses
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24. Security Planning Protocol SchoolDude University 2009 Outcome: Security Project Description  goals  processes  resources  decision-making standards Phase 1: Create Leadership Team & Set Security Goals Outcome: Prioritized Risk Assessment A ranked list of vulnerabilities to guide the Risk Reduction Phase Phase 2: Risk Analysis Outcome: Implemented Security Plan Risk Analysis and Risk Reduction processes must be regularly repeated to ensure effectiveness Phase 3: Risk Reduction Outcome: Crisis Management Plan A blueprint for organizational continuity Phase 4: Crisis Management
  • 25.
  • 26.
  • 27.
  • 28.
  • 29. Security Planning Grid SchoolDude University 2009 Security Area Basic Developing Adequate Advanced Management Leadership: Little participation in IT security Aware but little support provided Supports and funds security Aligns security with organizational mission Technology Network design and IT operations : broadly vulnerable security roll out is incomplete mostly secure seamless security Environmental & Physical: Infrastructure: not secure partially secure mostly secure secure End Users Stakeholders: unaware of role in security Limited awareness and training Improved awareness, Mostly trained Proactive participants in security
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36. SchoolDude University 2009 Questions and Comments?
  • 37.
  • 38. Thank you Sponsors SchoolDude University 2009
  • 39.