SlideShare une entreprise Scribd logo
1  sur  44
Inception Securities
History
• Began in 2002 providing database
performance tuning and security for database
applications
• By 2006, routinely provided complete security
service(assessments, penetration tests, policy
creation, and regulatory compliance
assistance)
Clients in the Past
Our clients include organizations of different
sizes. Most are state and federal government
agencies that must demonstrate compliance
with specific security-related regulations.
Current
• New “In-State” Headquarters
• 22 full-time employees; including 4 who will
focus on providing services and products for
this new opportunity, should we be awarded
the contract
Resources
• Of the five people, all hold Certified
Information Systems Security Professional
(CISSP) certifications, Certified Information
Security Manager (CISM), Global Information
Assurance Certification (GIAC), Security
Essentials Certification (GSEC), and other GIAC
certifications
The Cast
• Project Manager – Dale White
• Network Administrator – Julie Newton
• Database Security – Stephen Davis
• Risk Management – Will Lopez
• Procurement/Compliance – Tara Ramchi
Accomplishments
• Won four major contracts in the last four years
for vulnerability assessments and penetration
tests.
Network Administration
Julie Newton
User Domain
• Bi-monthly training on security (what to look
out for, what is allowed, password security,
etc.)
• Employees will be working with trainers
certified through Inception Securities
• Background checks for employees
• Access badges assigned to each employee
Workstation Domain
• Nightly virus scans performed by Symantec
• Nightly malware scans performed by Malware
Bytes
• Monthly checks for updates and patches
• All laptops will be encrypted by Symantec
• Physical security by disabling USB ports
LAN Domain
• Proxy settings to filter content based on
departmental needs
• Account based access
• Once a day port scanning performed by
Nessus to identify unauthorized open ports
• Departments sub-netted to separate them for
easier security control
LAN-WAN Domain
• Constant monitoring of the packet flow by
Omni-Peek to maintain optimal network
functionality
• Once a day port scanning performed by Nmap
to identify unauthorized open ports
• Access control list (ACL) limiting the access per
department
WAN Domain
• Black and white lists for the DMZ. The Black
list details sites that are blocked and the
White list details the sites that are approved
• ACL detailing what individual people are
allowed to access based on job code
Remote Domain
• Organizational units in Active Directory
providing access to only those who need to
use it
• Virtual Private Network (VPN) client to ensure
data security
• Password requirements will be implemented
Application Domain
• Updates to be applied by the Application team
as they are approved and released
• Patches to be applied by the System
Administrator as they are approved and
released
• Physical security to the server room. Security
code and badge
Data Base Administration
Stephen Davis
Physical Security
• Data Integrity is the single most important
part of the network.
• All data will be under physical security (i.e
Lock and Key) with only specific personal
having access.
• Notices on the Network closets will have
disclaimers about unauthorized access.
Active Directory
• All employees will have a unique username and password. (90 Day
Expiration on passwords)
• Password uniqueness will require at least seven characters, one
uppercase, one number and cannot be your last seven previous
passwords
• Employees will have access to only job specific tasks.
• Access to shared folders will need to be approved by the employees
manager.
• Provide generic accounts with tight Group Policy
Workstations
• All workstations will be a part of a domain and will need to added
manually with administrative privileges.
• All downloads will be conducted by the Help Desk.
• All patches will be conducted by the Desktop System Administrator.
• All administrative rights to local machines will need permission
from the CIO.
• Laptops will have a full disc encryption and will need someone to
register the user for first time use.
Servers
• All servers will be Virtualized and have a Raid
5 setup for redundancy
• Data Center will be in a central location of the
building in a fire rated room.
• Security cameras will be installed to monitor
movement
Software
• All software will be tested in a controlled
environment and approved before put in the
live environment.
• All software installations will be installed from
a shared network and not the internet.
User Training
• All new employees will need to review the
user agreement policy and sign before actually
starting work.
• Mandatory annual IT security training (social
networking, phishing emails, etc.)
• Proper user training could strengthen data
integrity.
Risk Management
Will Lopez
Identify Threats
• What is considered a threat?
1. External hacking threats
2. Personnel
3. Out dated policies
How often is this threat occurring
• Depending on how often the threat occurs will
determine the action to be taken.
• How the security was bypassed and what new
process can be used to stop the threat from
happening.
• By reviewing the past years information to
help determine the trend and which possible
action can be taken next.
What to do with your assets
 Cold site – Will be used to handle issues such as
unforeseen network hiccups, but planed
1. Network updates
2. Hardware failure
 Warm Sites – For sections of the company that
might go down.
 Hot Sites- For events far beyond human control.
What are your assets
 Departmental heads from each department are
considered important to the business continuity
 Managers that help assist with the incident
 Core documents and materials to maintain
business continuity.
Procurement and Compliance
Tara Ramchi
What is procurement?
• “Procurement” is the overarching function that
describes the activities and processes to acquire
goods and services.
• Procurement involves the activities involved in
establishing fundamental requirements, sourcing
activities such as market research and vendor
evaluation and negotiation of contracts.
• Procurement differs from purchasing. The term
“Purchasing” refers to the process of ordering and
receiving goods and services. It is a subset of the
wider procurement process.
Procurement Process
• Involves 5 Steps
1. Define Business Need
 Capture business requirements.
 Obtain full stakeholder buy into any resulting plans and
timelines.
2. Develop Procurement Strategy
 Agree procurement approach and timescale.
 Evaluate current environment and decide on the
procurement process.
3. Supplier Evaluation & Selection
 To select the right suppliers and value proposition to be
taken forward to final negotiation.
Procurement Process (Cont.)
4. Negotiation and Award of Contract
 Complete negotiations and select best supplier.
 Award contract.
5. Induction & Integration
 To ensure that the suppliers is fully prepared to
deliver all aspects of the contracts.
 To ensure that all parties are familiar with agreed
P2P policies and procedures.
 To initiate the relevant performance measures and
reporting.
Vendors
• Tiger Direct
• Newegg
• Lenovo
• Cisco
• Symantec
Compliancy
• Legislation and regulations are always changing. Keeping on
top of new developments can be a challenge.
• Our project team:
– Conducts mock regulatory inspections.
– Performs compliance reviews.
– Runs risk mapping projects
– Updates policies and procedures.
– Advises on the compliance issues surrounding new
products and new businesses.
– Conducts training sessions on important compliance
topics.
– Researches and reports on a variety of regulatory issues
across many jurisdictions.
Compliancy (Cont.)
– Accelerates licensing and compliance.
– Results in significant savings for your organization.
– Enables your organization to focus on business critical
tasks.
– Smoothes out volatility in resource demands.
– Protects your organization from penalties/fines associated
with compliance mistakes.
– We have an in depth understanding of the security
industry and thorough knowledge of the regulations that
impact your business.
– Our services are aligned with state and local regulations to
ensure complete compliance for your organization.
Importance of Compliancy
• What is compliancy?
– Compliance refers to the company obeying all of the legal
laws and regulations in regards to how they manage the
business, their staff, and their treatment towards their
consumers. The concept of compliance is to make sure that
corporations act responsibly.
• Benefits
– Avoidance of Criminal Charges and Penalties
– Building Positive Reputation
– Higher Productivity in the Company
Compliance Policy
• All State of Florida agencies must be compliant with this
security policy document
• Compliance with Legal Requirements (11.1)
– All State of Florida agencies must be compliant with any
State or Federal regulatory requirements which supersede
this policy document.
• Applicable Legislation (11.1.1)
– All State of Florida agencies must be compliant with any
legislation enacted by the State of Florida in regards to the
management of information resources on behalf of the
State.
Compliance Policy (Cont.)
• Data Protection and Privacy (11.1.2)
– All State of Florida agency data custodians must ensure that all
“Personal Information” data assets, as defined by applicable State
and/or Federal law and regulations, are protected from unauthorized
use, modification or disclosure.
• Data Breach and Disclosure (11.1.3)
– Any State of Florida agency that discovers a breach of the information
security controls set forth in this document which results in disclosure
of unencrypted “personal information” about persons to unauthorized
third parties shall provide notice of the disclosure in accordance with
TCA 47-18-2107(3)(A).
Closing
Presented by Dale White
Equipment cost
• $357,794.52
– Includes
• Desktops by Lenovo
• Think Pads
• Routers and switches
• Color Laser Printers
• Anti-virus
• Servers
Budget
• The presented budget for the 2014 fiscal year
is $4 million dollars.
Cost
• Project Manager $200,000
• Risk Management $150,000
• Database Security $200,000
• Network Administrator $120,000
• Procurement/Compliance $160,000
$730,000
$4m - $730k = $3,999,270,000
Closing
• It would be advantageous of the State
Government and the Department of Finance
and Administration to make sure that the
information on the databases are safe and
above other State Governments’ level of
security. By using the analysis of the NIST
framework and of COBIT, all layers of security
shall be perlustrated to ensure the client’s
satisfaction of the services provided by
Inception Securities.
Closing (cont.)
• Proven specialists in penetration testing,
vulnerability assessments, risk
management/mitigation analysis, network
systems and software hardening, and
compliance/regulation analysis
• We will ensure that the State Government and
the Department of Finance and
Administration does not suffer any unforeseen
penalty due to noncompliance.

Contenu connexe

Tendances

PCI DSS Business as Usual (BAU)
PCI DSS Business as Usual (BAU)PCI DSS Business as Usual (BAU)
PCI DSS Business as Usual (BAU)ControlCase
 
Robert Williams Final Project
Robert Williams Final Project Robert Williams Final Project
Robert Williams Final Project Robert D. Williams
 
CISSP Prep: Ch 6. Identity and Access Management
CISSP Prep: Ch 6. Identity and Access ManagementCISSP Prep: Ch 6. Identity and Access Management
CISSP Prep: Ch 6. Identity and Access ManagementSam Bowne
 
Vendor risk management webinar 10022019 v1
Vendor risk management webinar 10022019 v1Vendor risk management webinar 10022019 v1
Vendor risk management webinar 10022019 v1ControlCase
 
Performing One Audit Using Zero Trust Principles
Performing One Audit Using Zero Trust PrinciplesPerforming One Audit Using Zero Trust Principles
Performing One Audit Using Zero Trust PrinciplesControlCase
 
Vendor Management for PCI DSS; EI3PA; HIPAA and FFIEC
Vendor Management for PCI DSS; EI3PA; HIPAA and FFIECVendor Management for PCI DSS; EI3PA; HIPAA and FFIEC
Vendor Management for PCI DSS; EI3PA; HIPAA and FFIECKimberly Simon MBA
 
CNIT 125: Ch 2. Security and Risk Management (Part 2)
CNIT 125: Ch 2. Security and Risk Management (Part 2)CNIT 125: Ch 2. Security and Risk Management (Part 2)
CNIT 125: Ch 2. Security and Risk Management (Part 2)Sam Bowne
 
CNIT 125: Ch 2. Security and Risk Management (Part 1)
CNIT 125: Ch 2. Security and Risk Management (Part 1)CNIT 125: Ch 2. Security and Risk Management (Part 1)
CNIT 125: Ch 2. Security and Risk Management (Part 1)Sam Bowne
 
Top PCI Pitfalls and How to Avoid Them: The QSA’s Perspective
Top PCI Pitfalls and How to Avoid Them: The QSA’s PerspectiveTop PCI Pitfalls and How to Avoid Them: The QSA’s Perspective
Top PCI Pitfalls and How to Avoid Them: The QSA’s PerspectiveAlgoSec
 
PCI DSS and Other Related Updates
PCI DSS and Other Related UpdatesPCI DSS and Other Related Updates
PCI DSS and Other Related UpdatesControlCase
 
PCI DSS and PA DSS Compliance
PCI DSS and PA DSS CompliancePCI DSS and PA DSS Compliance
PCI DSS and PA DSS ComplianceControlCase
 
PCI DSS Business as Usual
PCI DSS Business as UsualPCI DSS Business as Usual
PCI DSS Business as UsualControlCase
 
Continuous Compliance Monitoring
Continuous Compliance MonitoringContinuous Compliance Monitoring
Continuous Compliance MonitoringControlCase
 
PCI DSS Compliance in the Cloud
PCI DSS Compliance in the CloudPCI DSS Compliance in the Cloud
PCI DSS Compliance in the CloudControlCase
 
Vendor Management for PCI DSS, HIPAA, and FFIEC
Vendor Management for PCI DSS, HIPAA, and FFIECVendor Management for PCI DSS, HIPAA, and FFIEC
Vendor Management for PCI DSS, HIPAA, and FFIECControlCase
 
Log Monitoring and File Integrity Monitoring
Log Monitoring and File Integrity MonitoringLog Monitoring and File Integrity Monitoring
Log Monitoring and File Integrity MonitoringKimberly Simon MBA
 
PCI PIN Security & Key Management Compliance
PCI PIN Security & Key Management CompliancePCI PIN Security & Key Management Compliance
PCI PIN Security & Key Management ComplianceControlCase
 
It audit methodologies
It audit methodologiesIt audit methodologies
It audit methodologiesSalih Islam
 
Continuous Compliance Monitoring
Continuous Compliance MonitoringContinuous Compliance Monitoring
Continuous Compliance MonitoringControlCase
 
Integrated Compliance – Collect Evidence Once, Certify to Many
Integrated Compliance – Collect Evidence Once, Certify to ManyIntegrated Compliance – Collect Evidence Once, Certify to Many
Integrated Compliance – Collect Evidence Once, Certify to ManyControlCase
 

Tendances (20)

PCI DSS Business as Usual (BAU)
PCI DSS Business as Usual (BAU)PCI DSS Business as Usual (BAU)
PCI DSS Business as Usual (BAU)
 
Robert Williams Final Project
Robert Williams Final Project Robert Williams Final Project
Robert Williams Final Project
 
CISSP Prep: Ch 6. Identity and Access Management
CISSP Prep: Ch 6. Identity and Access ManagementCISSP Prep: Ch 6. Identity and Access Management
CISSP Prep: Ch 6. Identity and Access Management
 
Vendor risk management webinar 10022019 v1
Vendor risk management webinar 10022019 v1Vendor risk management webinar 10022019 v1
Vendor risk management webinar 10022019 v1
 
Performing One Audit Using Zero Trust Principles
Performing One Audit Using Zero Trust PrinciplesPerforming One Audit Using Zero Trust Principles
Performing One Audit Using Zero Trust Principles
 
Vendor Management for PCI DSS; EI3PA; HIPAA and FFIEC
Vendor Management for PCI DSS; EI3PA; HIPAA and FFIECVendor Management for PCI DSS; EI3PA; HIPAA and FFIEC
Vendor Management for PCI DSS; EI3PA; HIPAA and FFIEC
 
CNIT 125: Ch 2. Security and Risk Management (Part 2)
CNIT 125: Ch 2. Security and Risk Management (Part 2)CNIT 125: Ch 2. Security and Risk Management (Part 2)
CNIT 125: Ch 2. Security and Risk Management (Part 2)
 
CNIT 125: Ch 2. Security and Risk Management (Part 1)
CNIT 125: Ch 2. Security and Risk Management (Part 1)CNIT 125: Ch 2. Security and Risk Management (Part 1)
CNIT 125: Ch 2. Security and Risk Management (Part 1)
 
Top PCI Pitfalls and How to Avoid Them: The QSA’s Perspective
Top PCI Pitfalls and How to Avoid Them: The QSA’s PerspectiveTop PCI Pitfalls and How to Avoid Them: The QSA’s Perspective
Top PCI Pitfalls and How to Avoid Them: The QSA’s Perspective
 
PCI DSS and Other Related Updates
PCI DSS and Other Related UpdatesPCI DSS and Other Related Updates
PCI DSS and Other Related Updates
 
PCI DSS and PA DSS Compliance
PCI DSS and PA DSS CompliancePCI DSS and PA DSS Compliance
PCI DSS and PA DSS Compliance
 
PCI DSS Business as Usual
PCI DSS Business as UsualPCI DSS Business as Usual
PCI DSS Business as Usual
 
Continuous Compliance Monitoring
Continuous Compliance MonitoringContinuous Compliance Monitoring
Continuous Compliance Monitoring
 
PCI DSS Compliance in the Cloud
PCI DSS Compliance in the CloudPCI DSS Compliance in the Cloud
PCI DSS Compliance in the Cloud
 
Vendor Management for PCI DSS, HIPAA, and FFIEC
Vendor Management for PCI DSS, HIPAA, and FFIECVendor Management for PCI DSS, HIPAA, and FFIEC
Vendor Management for PCI DSS, HIPAA, and FFIEC
 
Log Monitoring and File Integrity Monitoring
Log Monitoring and File Integrity MonitoringLog Monitoring and File Integrity Monitoring
Log Monitoring and File Integrity Monitoring
 
PCI PIN Security & Key Management Compliance
PCI PIN Security & Key Management CompliancePCI PIN Security & Key Management Compliance
PCI PIN Security & Key Management Compliance
 
It audit methodologies
It audit methodologiesIt audit methodologies
It audit methodologies
 
Continuous Compliance Monitoring
Continuous Compliance MonitoringContinuous Compliance Monitoring
Continuous Compliance Monitoring
 
Integrated Compliance – Collect Evidence Once, Certify to Many
Integrated Compliance – Collect Evidence Once, Certify to ManyIntegrated Compliance – Collect Evidence Once, Certify to Many
Integrated Compliance – Collect Evidence Once, Certify to Many
 

En vedette

Wikipedia.powerpoint
Wikipedia.powerpointWikipedia.powerpoint
Wikipedia.powerpointgrash850
 
YBCP purpose, value proposition and past event pictures_nov 17_2014_v1
YBCP purpose, value proposition and past event pictures_nov 17_2014_v1YBCP purpose, value proposition and past event pictures_nov 17_2014_v1
YBCP purpose, value proposition and past event pictures_nov 17_2014_v1ybcp
 
SampleClean: Bringing Data Cleaning into the BDAS Stack
SampleClean: Bringing Data Cleaning into the BDAS StackSampleClean: Bringing Data Cleaning into the BDAS Stack
SampleClean: Bringing Data Cleaning into the BDAS Stackjeykottalam
 
AMP Camp 5 Intro
AMP Camp 5 IntroAMP Camp 5 Intro
AMP Camp 5 Introjeykottalam
 
SparkR: Enabling Interactive Data Science at Scale
SparkR: Enabling Interactive Data Science at ScaleSparkR: Enabling Interactive Data Science at Scale
SparkR: Enabling Interactive Data Science at Scalejeykottalam
 
Concurrency Control for Parallel Machine Learning
Concurrency Control for Parallel Machine LearningConcurrency Control for Parallel Machine Learning
Concurrency Control for Parallel Machine Learningjeykottalam
 
The BDAS Open Source Community
The BDAS Open Source CommunityThe BDAS Open Source Community
The BDAS Open Source Communityjeykottalam
 
MLlib: Spark's Machine Learning Library
MLlib: Spark's Machine Learning LibraryMLlib: Spark's Machine Learning Library
MLlib: Spark's Machine Learning Libraryjeykottalam
 
Machine Learning Pipelines
Machine Learning PipelinesMachine Learning Pipelines
Machine Learning Pipelinesjeykottalam
 
COCOA: Communication-Efficient Coordinate Ascent
COCOA: Communication-Efficient Coordinate AscentCOCOA: Communication-Efficient Coordinate Ascent
COCOA: Communication-Efficient Coordinate Ascentjeykottalam
 
Intro to Spark and Spark SQL
Intro to Spark and Spark SQLIntro to Spark and Spark SQL
Intro to Spark and Spark SQLjeykottalam
 

En vedette (14)

Herramientastelematicas.
Herramientastelematicas.Herramientastelematicas.
Herramientastelematicas.
 
Johnson claude 4.4
Johnson claude 4.4Johnson claude 4.4
Johnson claude 4.4
 
Binder1
Binder1Binder1
Binder1
 
Wikipedia.powerpoint
Wikipedia.powerpointWikipedia.powerpoint
Wikipedia.powerpoint
 
YBCP purpose, value proposition and past event pictures_nov 17_2014_v1
YBCP purpose, value proposition and past event pictures_nov 17_2014_v1YBCP purpose, value proposition and past event pictures_nov 17_2014_v1
YBCP purpose, value proposition and past event pictures_nov 17_2014_v1
 
SampleClean: Bringing Data Cleaning into the BDAS Stack
SampleClean: Bringing Data Cleaning into the BDAS StackSampleClean: Bringing Data Cleaning into the BDAS Stack
SampleClean: Bringing Data Cleaning into the BDAS Stack
 
AMP Camp 5 Intro
AMP Camp 5 IntroAMP Camp 5 Intro
AMP Camp 5 Intro
 
SparkR: Enabling Interactive Data Science at Scale
SparkR: Enabling Interactive Data Science at ScaleSparkR: Enabling Interactive Data Science at Scale
SparkR: Enabling Interactive Data Science at Scale
 
Concurrency Control for Parallel Machine Learning
Concurrency Control for Parallel Machine LearningConcurrency Control for Parallel Machine Learning
Concurrency Control for Parallel Machine Learning
 
The BDAS Open Source Community
The BDAS Open Source CommunityThe BDAS Open Source Community
The BDAS Open Source Community
 
MLlib: Spark's Machine Learning Library
MLlib: Spark's Machine Learning LibraryMLlib: Spark's Machine Learning Library
MLlib: Spark's Machine Learning Library
 
Machine Learning Pipelines
Machine Learning PipelinesMachine Learning Pipelines
Machine Learning Pipelines
 
COCOA: Communication-Efficient Coordinate Ascent
COCOA: Communication-Efficient Coordinate AscentCOCOA: Communication-Efficient Coordinate Ascent
COCOA: Communication-Efficient Coordinate Ascent
 
Intro to Spark and Spark SQL
Intro to Spark and Spark SQLIntro to Spark and Spark SQL
Intro to Spark and Spark SQL
 

Similaire à ISStateGovtProposal

Cloud Computing Legal Risks And Best Practices
Cloud Computing Legal Risks And Best PracticesCloud Computing Legal Risks And Best Practices
Cloud Computing Legal Risks And Best Practiceslisaabe
 
chapter7-220725121544-6a1c05a5.pdf
chapter7-220725121544-6a1c05a5.pdfchapter7-220725121544-6a1c05a5.pdf
chapter7-220725121544-6a1c05a5.pdfMahmoudSOLIMAN380726
 
Chapter 7: Data Security Management
Chapter 7: Data Security ManagementChapter 7: Data Security Management
Chapter 7: Data Security ManagementAhmed Alorage
 
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2TechSoup Canada
 
FRSecure Sales Deck
FRSecure Sales DeckFRSecure Sales Deck
FRSecure Sales DeckEvan Francen
 
Lecture 2 - Security Requirments.ppt
Lecture 2 - Security Requirments.pptLecture 2 - Security Requirments.ppt
Lecture 2 - Security Requirments.pptDrBasemMohamedElomda
 
Chamber Technology Committee Presentation
Chamber Technology Committee PresentationChamber Technology Committee Presentation
Chamber Technology Committee PresentationTony DeGonia (LION)
 
NARCA Presentation - IT Best Practice
NARCA Presentation - IT Best PracticeNARCA Presentation - IT Best Practice
NARCA Presentation - IT Best PracticeBrenda Majewski
 
Robert Williams Final Project
Robert Williams Final Project Robert Williams Final Project
Robert Williams Final Project Robert D. Williams
 
Chapter_5_Security_CC.pptx
Chapter_5_Security_CC.pptxChapter_5_Security_CC.pptx
Chapter_5_Security_CC.pptxLokNathRegmi1
 
7 Habits of Highly Secure Organizations
7 Habits of Highly Secure Organizations7 Habits of Highly Secure Organizations
7 Habits of Highly Secure OrganizationsHelpSystems
 
Implementing Asset Management System with ISO 55001
Implementing Asset Management System with ISO 55001Implementing Asset Management System with ISO 55001
Implementing Asset Management System with ISO 55001PECB
 
India’s Most Comprehensive Compliance Management software
India’s Most Comprehensive Compliance Management softwareIndia’s Most Comprehensive Compliance Management software
India’s Most Comprehensive Compliance Management softwareLexComply
 
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be Secured
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be SecuredCountdown to CCPA: 48 Days Until Your IBM i Data Needs to Be Secured
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be SecuredPrecisely
 
LOW LEVEL DESIGN INSPECTION SECURE CODING
LOW LEVEL DESIGN INSPECTION SECURE CODINGLOW LEVEL DESIGN INSPECTION SECURE CODING
LOW LEVEL DESIGN INSPECTION SECURE CODINGSri Latha
 
Toreon adding privacy by design in secure application development oss18 v20...
Toreon adding privacy by design in secure application development   oss18 v20...Toreon adding privacy by design in secure application development   oss18 v20...
Toreon adding privacy by design in secure application development oss18 v20...Sebastien Deleersnyder
 
presentation on property buy and sell
presentation on property buy and sellpresentation on property buy and sell
presentation on property buy and sellHarshikesh Kumar
 
The eDiscovery Primer for Lotus Domino Admins
The eDiscovery Primer for Lotus Domino AdminsThe eDiscovery Primer for Lotus Domino Admins
The eDiscovery Primer for Lotus Domino AdminsBill Malchisky Jr.
 

Similaire à ISStateGovtProposal (20)

Cloud Computing Legal Risks And Best Practices
Cloud Computing Legal Risks And Best PracticesCloud Computing Legal Risks And Best Practices
Cloud Computing Legal Risks And Best Practices
 
chapter7-220725121544-6a1c05a5.pdf
chapter7-220725121544-6a1c05a5.pdfchapter7-220725121544-6a1c05a5.pdf
chapter7-220725121544-6a1c05a5.pdf
 
Chapter 7: Data Security Management
Chapter 7: Data Security ManagementChapter 7: Data Security Management
Chapter 7: Data Security Management
 
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
 
FRSecure Sales Deck
FRSecure Sales DeckFRSecure Sales Deck
FRSecure Sales Deck
 
Lecture 2 - Security Requirments.ppt
Lecture 2 - Security Requirments.pptLecture 2 - Security Requirments.ppt
Lecture 2 - Security Requirments.ppt
 
Chamber Technology Committee Presentation
Chamber Technology Committee PresentationChamber Technology Committee Presentation
Chamber Technology Committee Presentation
 
NARCA Presentation - IT Best Practice
NARCA Presentation - IT Best PracticeNARCA Presentation - IT Best Practice
NARCA Presentation - IT Best Practice
 
Robert Williams Final Project
Robert Williams Final Project Robert Williams Final Project
Robert Williams Final Project
 
Chapter_5_Security_CC.pptx
Chapter_5_Security_CC.pptxChapter_5_Security_CC.pptx
Chapter_5_Security_CC.pptx
 
7 Habits of Highly Secure Organizations
7 Habits of Highly Secure Organizations7 Habits of Highly Secure Organizations
7 Habits of Highly Secure Organizations
 
Implementing Asset Management System with ISO 55001
Implementing Asset Management System with ISO 55001Implementing Asset Management System with ISO 55001
Implementing Asset Management System with ISO 55001
 
India’s Most Comprehensive Compliance Management software
India’s Most Comprehensive Compliance Management softwareIndia’s Most Comprehensive Compliance Management software
India’s Most Comprehensive Compliance Management software
 
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be Secured
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be SecuredCountdown to CCPA: 48 Days Until Your IBM i Data Needs to Be Secured
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be Secured
 
Open Science Grid security-atlas-t2 Bob Cowles
Open Science Grid security-atlas-t2 Bob CowlesOpen Science Grid security-atlas-t2 Bob Cowles
Open Science Grid security-atlas-t2 Bob Cowles
 
LOW LEVEL DESIGN INSPECTION SECURE CODING
LOW LEVEL DESIGN INSPECTION SECURE CODINGLOW LEVEL DESIGN INSPECTION SECURE CODING
LOW LEVEL DESIGN INSPECTION SECURE CODING
 
Toreon adding privacy by design in secure application development oss18 v20...
Toreon adding privacy by design in secure application development   oss18 v20...Toreon adding privacy by design in secure application development   oss18 v20...
Toreon adding privacy by design in secure application development oss18 v20...
 
presentation on property buy and sell
presentation on property buy and sellpresentation on property buy and sell
presentation on property buy and sell
 
The eDiscovery Primer for Lotus Domino Admins
The eDiscovery Primer for Lotus Domino AdminsThe eDiscovery Primer for Lotus Domino Admins
The eDiscovery Primer for Lotus Domino Admins
 
IT Security Strategy
IT Security StrategyIT Security Strategy
IT Security Strategy
 

ISStateGovtProposal

  • 1.
  • 2. Inception Securities History • Began in 2002 providing database performance tuning and security for database applications • By 2006, routinely provided complete security service(assessments, penetration tests, policy creation, and regulatory compliance assistance)
  • 3. Clients in the Past Our clients include organizations of different sizes. Most are state and federal government agencies that must demonstrate compliance with specific security-related regulations.
  • 4. Current • New “In-State” Headquarters • 22 full-time employees; including 4 who will focus on providing services and products for this new opportunity, should we be awarded the contract
  • 5. Resources • Of the five people, all hold Certified Information Systems Security Professional (CISSP) certifications, Certified Information Security Manager (CISM), Global Information Assurance Certification (GIAC), Security Essentials Certification (GSEC), and other GIAC certifications
  • 6. The Cast • Project Manager – Dale White • Network Administrator – Julie Newton • Database Security – Stephen Davis • Risk Management – Will Lopez • Procurement/Compliance – Tara Ramchi
  • 7. Accomplishments • Won four major contracts in the last four years for vulnerability assessments and penetration tests.
  • 9. User Domain • Bi-monthly training on security (what to look out for, what is allowed, password security, etc.) • Employees will be working with trainers certified through Inception Securities • Background checks for employees • Access badges assigned to each employee
  • 10. Workstation Domain • Nightly virus scans performed by Symantec • Nightly malware scans performed by Malware Bytes • Monthly checks for updates and patches • All laptops will be encrypted by Symantec • Physical security by disabling USB ports
  • 11. LAN Domain • Proxy settings to filter content based on departmental needs • Account based access • Once a day port scanning performed by Nessus to identify unauthorized open ports • Departments sub-netted to separate them for easier security control
  • 12. LAN-WAN Domain • Constant monitoring of the packet flow by Omni-Peek to maintain optimal network functionality • Once a day port scanning performed by Nmap to identify unauthorized open ports • Access control list (ACL) limiting the access per department
  • 13. WAN Domain • Black and white lists for the DMZ. The Black list details sites that are blocked and the White list details the sites that are approved • ACL detailing what individual people are allowed to access based on job code
  • 14. Remote Domain • Organizational units in Active Directory providing access to only those who need to use it • Virtual Private Network (VPN) client to ensure data security • Password requirements will be implemented
  • 15. Application Domain • Updates to be applied by the Application team as they are approved and released • Patches to be applied by the System Administrator as they are approved and released • Physical security to the server room. Security code and badge
  • 17. Physical Security • Data Integrity is the single most important part of the network. • All data will be under physical security (i.e Lock and Key) with only specific personal having access. • Notices on the Network closets will have disclaimers about unauthorized access.
  • 18. Active Directory • All employees will have a unique username and password. (90 Day Expiration on passwords) • Password uniqueness will require at least seven characters, one uppercase, one number and cannot be your last seven previous passwords • Employees will have access to only job specific tasks. • Access to shared folders will need to be approved by the employees manager. • Provide generic accounts with tight Group Policy
  • 19. Workstations • All workstations will be a part of a domain and will need to added manually with administrative privileges. • All downloads will be conducted by the Help Desk. • All patches will be conducted by the Desktop System Administrator. • All administrative rights to local machines will need permission from the CIO. • Laptops will have a full disc encryption and will need someone to register the user for first time use.
  • 20. Servers • All servers will be Virtualized and have a Raid 5 setup for redundancy • Data Center will be in a central location of the building in a fire rated room. • Security cameras will be installed to monitor movement
  • 21. Software • All software will be tested in a controlled environment and approved before put in the live environment. • All software installations will be installed from a shared network and not the internet.
  • 22. User Training • All new employees will need to review the user agreement policy and sign before actually starting work. • Mandatory annual IT security training (social networking, phishing emails, etc.) • Proper user training could strengthen data integrity.
  • 24. Identify Threats • What is considered a threat? 1. External hacking threats 2. Personnel 3. Out dated policies
  • 25. How often is this threat occurring • Depending on how often the threat occurs will determine the action to be taken. • How the security was bypassed and what new process can be used to stop the threat from happening. • By reviewing the past years information to help determine the trend and which possible action can be taken next.
  • 26.
  • 27. What to do with your assets  Cold site – Will be used to handle issues such as unforeseen network hiccups, but planed 1. Network updates 2. Hardware failure  Warm Sites – For sections of the company that might go down.  Hot Sites- For events far beyond human control.
  • 28. What are your assets  Departmental heads from each department are considered important to the business continuity  Managers that help assist with the incident  Core documents and materials to maintain business continuity.
  • 30. What is procurement? • “Procurement” is the overarching function that describes the activities and processes to acquire goods and services. • Procurement involves the activities involved in establishing fundamental requirements, sourcing activities such as market research and vendor evaluation and negotiation of contracts. • Procurement differs from purchasing. The term “Purchasing” refers to the process of ordering and receiving goods and services. It is a subset of the wider procurement process.
  • 31. Procurement Process • Involves 5 Steps 1. Define Business Need  Capture business requirements.  Obtain full stakeholder buy into any resulting plans and timelines. 2. Develop Procurement Strategy  Agree procurement approach and timescale.  Evaluate current environment and decide on the procurement process. 3. Supplier Evaluation & Selection  To select the right suppliers and value proposition to be taken forward to final negotiation.
  • 32. Procurement Process (Cont.) 4. Negotiation and Award of Contract  Complete negotiations and select best supplier.  Award contract. 5. Induction & Integration  To ensure that the suppliers is fully prepared to deliver all aspects of the contracts.  To ensure that all parties are familiar with agreed P2P policies and procedures.  To initiate the relevant performance measures and reporting.
  • 33. Vendors • Tiger Direct • Newegg • Lenovo • Cisco • Symantec
  • 34. Compliancy • Legislation and regulations are always changing. Keeping on top of new developments can be a challenge. • Our project team: – Conducts mock regulatory inspections. – Performs compliance reviews. – Runs risk mapping projects – Updates policies and procedures. – Advises on the compliance issues surrounding new products and new businesses. – Conducts training sessions on important compliance topics. – Researches and reports on a variety of regulatory issues across many jurisdictions.
  • 35. Compliancy (Cont.) – Accelerates licensing and compliance. – Results in significant savings for your organization. – Enables your organization to focus on business critical tasks. – Smoothes out volatility in resource demands. – Protects your organization from penalties/fines associated with compliance mistakes. – We have an in depth understanding of the security industry and thorough knowledge of the regulations that impact your business. – Our services are aligned with state and local regulations to ensure complete compliance for your organization.
  • 36. Importance of Compliancy • What is compliancy? – Compliance refers to the company obeying all of the legal laws and regulations in regards to how they manage the business, their staff, and their treatment towards their consumers. The concept of compliance is to make sure that corporations act responsibly. • Benefits – Avoidance of Criminal Charges and Penalties – Building Positive Reputation – Higher Productivity in the Company
  • 37. Compliance Policy • All State of Florida agencies must be compliant with this security policy document • Compliance with Legal Requirements (11.1) – All State of Florida agencies must be compliant with any State or Federal regulatory requirements which supersede this policy document. • Applicable Legislation (11.1.1) – All State of Florida agencies must be compliant with any legislation enacted by the State of Florida in regards to the management of information resources on behalf of the State.
  • 38. Compliance Policy (Cont.) • Data Protection and Privacy (11.1.2) – All State of Florida agency data custodians must ensure that all “Personal Information” data assets, as defined by applicable State and/or Federal law and regulations, are protected from unauthorized use, modification or disclosure. • Data Breach and Disclosure (11.1.3) – Any State of Florida agency that discovers a breach of the information security controls set forth in this document which results in disclosure of unencrypted “personal information” about persons to unauthorized third parties shall provide notice of the disclosure in accordance with TCA 47-18-2107(3)(A).
  • 40. Equipment cost • $357,794.52 – Includes • Desktops by Lenovo • Think Pads • Routers and switches • Color Laser Printers • Anti-virus • Servers
  • 41. Budget • The presented budget for the 2014 fiscal year is $4 million dollars.
  • 42. Cost • Project Manager $200,000 • Risk Management $150,000 • Database Security $200,000 • Network Administrator $120,000 • Procurement/Compliance $160,000 $730,000 $4m - $730k = $3,999,270,000
  • 43. Closing • It would be advantageous of the State Government and the Department of Finance and Administration to make sure that the information on the databases are safe and above other State Governments’ level of security. By using the analysis of the NIST framework and of COBIT, all layers of security shall be perlustrated to ensure the client’s satisfaction of the services provided by Inception Securities.
  • 44. Closing (cont.) • Proven specialists in penetration testing, vulnerability assessments, risk management/mitigation analysis, network systems and software hardening, and compliance/regulation analysis • We will ensure that the State Government and the Department of Finance and Administration does not suffer any unforeseen penalty due to noncompliance.

Notes de l'éditeur

  1. Currently do not offer services that review source code to assess security, and do not employ development security specialists.
  2. Step 1: Define business need Identify Business Requirement Knowledge capture Stakeholder consultation Risk assessment Scope and communication Step 2: Develop procurement strategy Team kick off Market research Define success Agree strategy Step 3: Supplier evaluation and selection Develop prequal strategy Score, filter, & notify Develop & launch tender Assess & filter Step 4: Negotiation and Award of Contract Prepare negotiation strategy P2P design Conduct negotiations Finalize contract Award Step 5: Induction and integration Launch supplier Post procurement review Continuous integration
  3. Benefits Avoidance of criminal charges and penalties Example- HIPAA (a) General penalty (1) In general Except as provided in subsection (b), the Secretary shall impose on any person who violates a provision of this part a penalty of not more than $100 for each such violation, except that the total amount imposed on the person for all violations of an identical requirement or prohibition during a calendar year may not exceed $25,000. * * * 42USC1320d-6 Wrongful disclosure of individually identifiable health information (a) Offense A person who knowingly and in violation of this part- (1) uses or causes to be used a unique health identifier; (2) obtains individually identifiable health information relating to an individual; or (3) discloses individually identifiable health information to another person, shall be punished as provided in subsection (b). (b) Penalties A person described in subsection (a) shall- (1) be fined not more than $50,000, imprisoned not more than 1 year, or both; (2) if the offense is committed under false pretenses, be fined not more than $100,000, Imprisoned not more than 5 years, or both; and (3) if the offense is committed with intent to sell, transfer, or use individually identifiable health information for commercial advantage, personal gain, or malicious harm, be fined not more than $250,000, imprisoned not more than 10 years, or both. Building positive reputation The success of your business pretty much depends on its public image. Compliance will ensure that a company can uphold a positive image and build consumer trust. This also helps build consumer loyalty, since customers are more likely going to return to a service or product from a company they identify as trustworthy.