SlideShare une entreprise Scribd logo
1  sur  15
Cómo usar la Tecnología
para generar más
Seguridad y Desarrollo local
27 de Marzo 2015
Adrian Mikeliunas, CISSP, CISA
Conquest Security
Seguridad y Desarrollo
Agenda
♦ Definiciones
♦ Peligros
♦ Tecnologia y Comunicaciones
♦ Seguridad y Desarrollo
Definiciones
♦ Tecnología
♦ Seguridad
♦ Desarrollo
Seguridad y Desarrollo
Adrian Mikeliunas, CISSP
 Certified Information System Security Professional (CISSP)
 Certified Information Systems Auditor (CISA)
 30+ años de Ingeniero de Sistemas
12 años en el Banco Mundial,
4 años en el Fondo Monetario
 7 años de Consultor para AT&T
Mobile: 571-335-5525
Adrian@ConquestSecurity.com
4
Identity theftIdentity theft
Labor ActionLabor Action
Trojan HorsesTrojan Horses
Script KiddiesScript Kiddies
Industrial EspionageIndustrial Espionage
Human FactorHuman Factor
Backdoor ownership of Host machinesBackdoor ownership of Host machines
HackersHackers
SniffingSniffing
CrackersCrackers
Process HijackingProcess Hijacking
Buffer OverflowsBuffer Overflows
Hostile Java AppletsHostile Java Applets
ECHELON/CARNIVORE – Government SurveillanceECHELON/CARNIVORE – Government Surveillance
Abuse of Civil AuthorityAbuse of Civil Authority
Compromise of centralized 3Compromise of centralized 3rdrd
Party Data RepositoriesParty Data Repositories
Legacy Systems
IP TheftIP Theft
Hostile VB ScriptsHostile VB Scripts
Denial of Service AttacksDenial of Service Attacks
Foreign Government EspionageForeign Government Espionage
Data Lineage
Rogue ApplicationsRogue Applications
Intrusion to commit a FelonyIntrusion to commit a Felony
Virus’sVirus’s
Worms
Spoofing
New Regulations
Social EngineeringSocial EngineeringWebsite AttacksWebsite Attacks
Theft of Trade SecretsTheft of Trade Secrets
Dumpster DivingDumpster Diving
Breach of Physical SecurityBreach of Physical Security
Terrorism
Peligros ExternosPeligros Externos
Seguridad y Desarrollo
Social EngineeringSocial Engineering
SniffingSniffing
SpamSpam
GopherGopher
WirelessWireless
emailemail
DNS Cache-based TrustDNS Cache-based Trust
NFSNFS
Poorly Maintained SystemPoorly Maintained SystemSecurity Sensor MisconfigurationSecurity Sensor Misconfiguration
IP TheftIP Theft
Admin ErrorsAdmin Errors
Privilege EscalationPrivilege Escalation
SendmailSendmail
Too many ServicesToo many Services TCP HijackingTCP Hijacking
Finger BuffersFinger Buffers
External DNS Zone TransfersExternal DNS Zone Transfers
Human FactorHuman Factor
Identity theftIdentity theftTFTPTFTP FTPFTP
Unauthorized Insider accessUnauthorized Insider access
Rogue ApplicationsRogue Applications
SabotageSabotage
HTTPHTTP
Instant
Messaging
Education and AwarenessEducation and Awareness
Disgruntled EmployeesDisgruntled Employees
Modem Hijacking
Bad Application Code
Policy adherencePolicy adherence
UDP ServicesUDP Services
NewsNews
Patch Management
Peligros InternosPeligros Internos
Seguridad y Desarrollo
Security Frameworks
Disaster Recovery
Security AwarenessSecurity Awareness
Security Health Checks
Security Policies and Procedures
PKI Readiness Reviews
PKI Infrastructures
Privilege Management
ConsultantsConsultants
Intrusion Detection
Training
Security Infrastructure
Network Forensics
Firewalls
Content Management
Secure Email
Legal/Regulatory
Portal Security
Business Continuity Planning
Incident Management
Platform Security
Computer Forensics
Website Protection
HR Policy
Event Monitoring
Domain Security
Wifi
Privacy
Collaboration/Partners
UsersCorporate Governance
Risk Assessments
Risk Analysis
Legacy Systems
Security Integration
Virus
Event Correlation
Security in Enterprise Architectures
Malware
Patch Management
Vulnerabilities
Control Standards
Intrusion Protection
The Human Factor
Log Analysis
Security Baselines
Webmail
Data Classification
Asset ClassificationAsset Classification
Data Lineage
Security Measurement
Mainframe Security
Security Management
¿Podemos Entender Seguridad?
Seguridad y Desarrollo
OECD Guidelines for the Security of Information Systems & Networks
Government Information Security Reform Act
Turnbull Report
Higgs Report
Smith Report
EU Privacy Directive
OECD - Corporate Guidelines GovernanceOECD - Corporate Guidelines Governance
HIPAA
GLBA
Sarbanes Oxley
Patriot Act II
SB-1386 California
FISMA
GISRAOMB-123
OMB-130
NIST 800 Series Standards
Bill C-6
ISO 17799
Basel II
Computer Fraud and Abuse Act 1986
Children's Online Privacy Protection Act of 1998 (COPPA)
Electronic Communications Privacy Act 1986
Foreign Corrupt Practices Act 1977
Freedom of Information ActFreedom of Information Act
Computer Security Act 1987Computer Security Act 1987
Digital Millennium Copyright Act 1998
FERPA
National infrastructure Protection Act 1996
UK Data Protection Act
BS 7799BS 7799
The European Union Directive on Data Protection
Anti-terrorism, Crime and
Security Act 2001
The Telecommunications (Data Protection and Privacy) Regulations 1999
FERC
Homeland Security Act
NIST
EU Regulatory Framework
for Electronic
Communications
BITS FDA
FFIEC
21 CFR part 11
NERCNERCNY Reg. 173NY Reg. 173
Legislation & Standards
Seguridad y Desarrollo
Seguridad y Desarrollo
Estado Mundial de Seguridad
PASADO
Virus
Lola
TI era responsable
PRESENTE
 Gobiernos que espían
China
Korea
NSA, etc..
 Corrupcción
 SPAM & Malware
Usted es responsable
Seguridad y Desarrollo
Tecnología y Comunicaciones
♦ El Teléfono
– De atadura a liberación [movil]
♦ La Computadora
♦ De atadura a liberación [movil]
♦La radio y Television
– …
Todo implica movilidad!
Seguridad y Desarrollo
Seguridad y Ciudadania
♦ ¿Transparencia o Corrupcion?
♦ ¿Elecciones Electronicas?
♦ Reporte de Servicios
– DC 311 311.dc.gov
– NY 311 www1.nyc.gov/311
Seguridad y Desarrollo
Crowdsourcing
(colaboracion abierta)
♦ Salud
♦ Educación
♦ Calidad Humana
♦ Ejemplos:
– Kickstarter.com
– IndieGogo.com
– GoFundMe.com
Seguridad y Desarrollo
Desarrollo Sustentable
♦ Proyectos Municipales y Estatales
– Comunicación
– Educación
– Salud
– Seguridad
– Trabajo
En un marco de: transparencia y anti-
corrucción
Seguridad y Desarrollo
Desarrollo Sustentable
♦ Micro Préstamos
– Fondos a pequeñas empresas
• http://www.kiva.org
• https://www.prosper.com
Seguridad y Desarrollo
Sumario
♦ Definiciones
♦ Peligros
♦ Tecnologia y Comunicaciones
♦ Seguridad y Desarrollo

Contenu connexe

Tendances

Cade zvavanjanja iot afigf online
Cade zvavanjanja iot afigf onlineCade zvavanjanja iot afigf online
Cade zvavanjanja iot afigf onlineCade Zvavanjanja
 
Syntax IT ISGRC Products & Services
Syntax IT ISGRC Products & ServicesSyntax IT ISGRC Products & Services
Syntax IT ISGRC Products & ServicesPanagiotis Kalantzis
 
2019 CYBER SECURITY TRENDS REPORT REVIEW
2019 CYBER SECURITY TRENDS REPORT REVIEW2019 CYBER SECURITY TRENDS REPORT REVIEW
2019 CYBER SECURITY TRENDS REPORT REVIEWSylvain Martinez
 
Global Cybersecurity Market Industry Trends, Analysis Report 2021
Global Cybersecurity Market Industry Trends, Analysis Report 2021Global Cybersecurity Market Industry Trends, Analysis Report 2021
Global Cybersecurity Market Industry Trends, Analysis Report 2021Aarkstore Enterprise
 
What if public administration demanded educated MANRS from ISPs?
What if public administration demanded educated MANRS from ISPs?What if public administration demanded educated MANRS from ISPs?
What if public administration demanded educated MANRS from ISPs?Antonio Prado
 
5 Reasons Cyber Attackers Target Small and Medium Businesses
5 Reasons Cyber Attackers Target Small and Medium Businesses 5 Reasons Cyber Attackers Target Small and Medium Businesses
5 Reasons Cyber Attackers Target Small and Medium Businesses FireEye, Inc.
 
What are the top Cybersecurity priorities for state and local governments in ...
What are the top Cybersecurity priorities for state and local governments in ...What are the top Cybersecurity priorities for state and local governments in ...
What are the top Cybersecurity priorities for state and local governments in ...PECB
 
Cyphra - Cyber Security
Cyphra - Cyber SecurityCyphra - Cyber Security
Cyphra - Cyber SecurityNICVA
 
20 million cyber attacks per day
20 million cyber attacks per day20 million cyber attacks per day
20 million cyber attacks per dayRob Wilson
 
INFOGRAPHIC - 6 Reasons Why Cyber Security is Top Priority in 2019 for INDIA
INFOGRAPHIC - 6 Reasons Why Cyber Security is Top Priority in 2019 for INDIAINFOGRAPHIC - 6 Reasons Why Cyber Security is Top Priority in 2019 for INDIA
INFOGRAPHIC - 6 Reasons Why Cyber Security is Top Priority in 2019 for INDIAHaltdos
 
CLASS 2018 - Palestra de Mariana Pereira (Diretora – Darktrace)
CLASS 2018 - Palestra de Mariana Pereira (Diretora – Darktrace)CLASS 2018 - Palestra de Mariana Pereira (Diretora – Darktrace)
CLASS 2018 - Palestra de Mariana Pereira (Diretora – Darktrace)TI Safe
 
Why Your Business Can’t Ignore the Need for a Password Manager Any Longer
Why Your Business Can’t Ignore the Need for a Password Manager Any LongerWhy Your Business Can’t Ignore the Need for a Password Manager Any Longer
Why Your Business Can’t Ignore the Need for a Password Manager Any LongerDigital Transformation EXPO Event Series
 
Microsoft john weigelt 2016
Microsoft john weigelt 2016Microsoft john weigelt 2016
Microsoft john weigelt 2016ColloqueRISQ
 
5 Reasons to Support Cybersecurity Information Sharing Act (CISA)
5 Reasons to Support Cybersecurity Information Sharing Act (CISA)5 Reasons to Support Cybersecurity Information Sharing Act (CISA)
5 Reasons to Support Cybersecurity Information Sharing Act (CISA)U.S. Chamber of Commerce
 
Cybersecurity: Connectivity, Collaboration and Security Controls
Cybersecurity: Connectivity, Collaboration and Security ControlsCybersecurity: Connectivity, Collaboration and Security Controls
Cybersecurity: Connectivity, Collaboration and Security ControlsKristian Alisasis Pura
 

Tendances (18)

Fortinet k
Fortinet kFortinet k
Fortinet k
 
Cade zvavanjanja iot afigf online
Cade zvavanjanja iot afigf onlineCade zvavanjanja iot afigf online
Cade zvavanjanja iot afigf online
 
Syntax IT ISGRC Products & Services
Syntax IT ISGRC Products & ServicesSyntax IT ISGRC Products & Services
Syntax IT ISGRC Products & Services
 
2019 CYBER SECURITY TRENDS REPORT REVIEW
2019 CYBER SECURITY TRENDS REPORT REVIEW2019 CYBER SECURITY TRENDS REPORT REVIEW
2019 CYBER SECURITY TRENDS REPORT REVIEW
 
Global Cybersecurity Market Industry Trends, Analysis Report 2021
Global Cybersecurity Market Industry Trends, Analysis Report 2021Global Cybersecurity Market Industry Trends, Analysis Report 2021
Global Cybersecurity Market Industry Trends, Analysis Report 2021
 
What if public administration demanded educated MANRS from ISPs?
What if public administration demanded educated MANRS from ISPs?What if public administration demanded educated MANRS from ISPs?
What if public administration demanded educated MANRS from ISPs?
 
5 Reasons Cyber Attackers Target Small and Medium Businesses
5 Reasons Cyber Attackers Target Small and Medium Businesses 5 Reasons Cyber Attackers Target Small and Medium Businesses
5 Reasons Cyber Attackers Target Small and Medium Businesses
 
What are the top Cybersecurity priorities for state and local governments in ...
What are the top Cybersecurity priorities for state and local governments in ...What are the top Cybersecurity priorities for state and local governments in ...
What are the top Cybersecurity priorities for state and local governments in ...
 
Pindad iso27000 2016 smki
Pindad   iso27000 2016 smkiPindad   iso27000 2016 smki
Pindad iso27000 2016 smki
 
Cyphra - Cyber Security
Cyphra - Cyber SecurityCyphra - Cyber Security
Cyphra - Cyber Security
 
20 million cyber attacks per day
20 million cyber attacks per day20 million cyber attacks per day
20 million cyber attacks per day
 
INFOGRAPHIC - 6 Reasons Why Cyber Security is Top Priority in 2019 for INDIA
INFOGRAPHIC - 6 Reasons Why Cyber Security is Top Priority in 2019 for INDIAINFOGRAPHIC - 6 Reasons Why Cyber Security is Top Priority in 2019 for INDIA
INFOGRAPHIC - 6 Reasons Why Cyber Security is Top Priority in 2019 for INDIA
 
CLASS 2018 - Palestra de Mariana Pereira (Diretora – Darktrace)
CLASS 2018 - Palestra de Mariana Pereira (Diretora – Darktrace)CLASS 2018 - Palestra de Mariana Pereira (Diretora – Darktrace)
CLASS 2018 - Palestra de Mariana Pereira (Diretora – Darktrace)
 
Khas bank isms 3 s
Khas bank isms 3 sKhas bank isms 3 s
Khas bank isms 3 s
 
Why Your Business Can’t Ignore the Need for a Password Manager Any Longer
Why Your Business Can’t Ignore the Need for a Password Manager Any LongerWhy Your Business Can’t Ignore the Need for a Password Manager Any Longer
Why Your Business Can’t Ignore the Need for a Password Manager Any Longer
 
Microsoft john weigelt 2016
Microsoft john weigelt 2016Microsoft john weigelt 2016
Microsoft john weigelt 2016
 
5 Reasons to Support Cybersecurity Information Sharing Act (CISA)
5 Reasons to Support Cybersecurity Information Sharing Act (CISA)5 Reasons to Support Cybersecurity Information Sharing Act (CISA)
5 Reasons to Support Cybersecurity Information Sharing Act (CISA)
 
Cybersecurity: Connectivity, Collaboration and Security Controls
Cybersecurity: Connectivity, Collaboration and Security ControlsCybersecurity: Connectivity, Collaboration and Security Controls
Cybersecurity: Connectivity, Collaboration and Security Controls
 

Similaire à Cómo usar la tecnología para generar más Seguridad y desarrollo local

Cyber Six: Managing Security in Internet
Cyber Six: Managing Security in InternetCyber Six: Managing Security in Internet
Cyber Six: Managing Security in InternetRichardus Indrajit
 
DSS and Security Intelligence @IBM_Connect_2014_April
DSS and Security Intelligence @IBM_Connect_2014_AprilDSS and Security Intelligence @IBM_Connect_2014_April
DSS and Security Intelligence @IBM_Connect_2014_AprilAndris Soroka
 
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)Andris Soroka
 
Cyber Security Seminar.pptx
Cyber Security Seminar.pptxCyber Security Seminar.pptx
Cyber Security Seminar.pptxDESTROYER39
 
Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015Samuel Kamuli
 
Introduction to Hacking (101) Fundamentals
Introduction to Hacking (101) FundamentalsIntroduction to Hacking (101) Fundamentals
Introduction to Hacking (101) FundamentalsToño Herrera
 
Information security management v2010
Information security management v2010Information security management v2010
Information security management v2010joevest
 
Presentation1 110616195133-phpapp01(information security)
Presentation1 110616195133-phpapp01(information security)Presentation1 110616195133-phpapp01(information security)
Presentation1 110616195133-phpapp01(information security)Bonagiri Rajitha
 
Mobility Security - A Business-Centric Approach
Mobility Security - A Business-Centric ApproachMobility Security - A Business-Centric Approach
Mobility Security - A Business-Centric ApproachOmar Khawaja
 
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsManaging ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsPECB
 
Outlook Briefing 2016: Cyber Security
Outlook Briefing 2016: Cyber SecurityOutlook Briefing 2016: Cyber Security
Outlook Briefing 2016: Cyber SecurityMastel Indonesia
 
Maloney slides
Maloney slidesMaloney slides
Maloney slidesOnkar Sule
 
DSS @ Digital ERA 2014 - Security in the digital world
DSS @ Digital ERA 2014 - Security in the digital worldDSS @ Digital ERA 2014 - Security in the digital world
DSS @ Digital ERA 2014 - Security in the digital worldAndris Soroka
 
DSS @SFK International Conference - March 2014 - Quantifying Business Value o...
DSS @SFK International Conference - March 2014 - Quantifying Business Value o...DSS @SFK International Conference - March 2014 - Quantifying Business Value o...
DSS @SFK International Conference - March 2014 - Quantifying Business Value o...Andris Soroka
 
Where data security and value of data meet in the cloud brighttalk webinar ...
Where data security and value of data meet in the cloud   brighttalk webinar ...Where data security and value of data meet in the cloud   brighttalk webinar ...
Where data security and value of data meet in the cloud brighttalk webinar ...Ulf Mattsson
 
Balancing User Experience with Secure Access Control in Healthcare
Balancing User Experience with Secure Access Control in HealthcareBalancing User Experience with Secure Access Control in Healthcare
Balancing User Experience with Secure Access Control in HealthcareSecureAuth
 

Similaire à Cómo usar la tecnología para generar más Seguridad y desarrollo local (20)

Cyber Six: Managing Security in Internet
Cyber Six: Managing Security in InternetCyber Six: Managing Security in Internet
Cyber Six: Managing Security in Internet
 
DSS and Security Intelligence @IBM_Connect_2014_April
DSS and Security Intelligence @IBM_Connect_2014_AprilDSS and Security Intelligence @IBM_Connect_2014_April
DSS and Security Intelligence @IBM_Connect_2014_April
 
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
 
Cyber Security Seminar.pptx
Cyber Security Seminar.pptxCyber Security Seminar.pptx
Cyber Security Seminar.pptx
 
Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015
 
U S Embassy Event - Today’S Cyber Threats
U S  Embassy  Event - Today’S  Cyber  ThreatsU S  Embassy  Event - Today’S  Cyber  Threats
U S Embassy Event - Today’S Cyber Threats
 
Introduction to Hacking (101) Fundamentals
Introduction to Hacking (101) FundamentalsIntroduction to Hacking (101) Fundamentals
Introduction to Hacking (101) Fundamentals
 
Information security management v2010
Information security management v2010Information security management v2010
Information security management v2010
 
Cyber security
Cyber securityCyber security
Cyber security
 
Presentation1 110616195133-phpapp01(information security)
Presentation1 110616195133-phpapp01(information security)Presentation1 110616195133-phpapp01(information security)
Presentation1 110616195133-phpapp01(information security)
 
Mobility Security - A Business-Centric Approach
Mobility Security - A Business-Centric ApproachMobility Security - A Business-Centric Approach
Mobility Security - A Business-Centric Approach
 
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsManaging ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
 
Cobit 2
Cobit 2Cobit 2
Cobit 2
 
Main Menu
Main MenuMain Menu
Main Menu
 
Outlook Briefing 2016: Cyber Security
Outlook Briefing 2016: Cyber SecurityOutlook Briefing 2016: Cyber Security
Outlook Briefing 2016: Cyber Security
 
Maloney slides
Maloney slidesMaloney slides
Maloney slides
 
DSS @ Digital ERA 2014 - Security in the digital world
DSS @ Digital ERA 2014 - Security in the digital worldDSS @ Digital ERA 2014 - Security in the digital world
DSS @ Digital ERA 2014 - Security in the digital world
 
DSS @SFK International Conference - March 2014 - Quantifying Business Value o...
DSS @SFK International Conference - March 2014 - Quantifying Business Value o...DSS @SFK International Conference - March 2014 - Quantifying Business Value o...
DSS @SFK International Conference - March 2014 - Quantifying Business Value o...
 
Where data security and value of data meet in the cloud brighttalk webinar ...
Where data security and value of data meet in the cloud   brighttalk webinar ...Where data security and value of data meet in the cloud   brighttalk webinar ...
Where data security and value of data meet in the cloud brighttalk webinar ...
 
Balancing User Experience with Secure Access Control in Healthcare
Balancing User Experience with Secure Access Control in HealthcareBalancing User Experience with Secure Access Control in Healthcare
Balancing User Experience with Secure Access Control in Healthcare
 

Plus de Adrian Mikeliunas

Office Hour Week 14 Adrian.pptx
Office Hour Week 14 Adrian.pptxOffice Hour Week 14 Adrian.pptx
Office Hour Week 14 Adrian.pptxAdrian Mikeliunas
 
CISSP introduction 2016 Udemy Course
CISSP introduction 2016 Udemy CourseCISSP introduction 2016 Udemy Course
CISSP introduction 2016 Udemy CourseAdrian Mikeliunas
 
Introduction to WordPress Class 6
Introduction to WordPress Class 6Introduction to WordPress Class 6
Introduction to WordPress Class 6Adrian Mikeliunas
 
Introduction to WordPress Class 5
Introduction to WordPress Class 5Introduction to WordPress Class 5
Introduction to WordPress Class 5Adrian Mikeliunas
 
Introduction to WordPress Class 4
Introduction to WordPress Class 4Introduction to WordPress Class 4
Introduction to WordPress Class 4Adrian Mikeliunas
 
Introduction to WordPress Class 3
Introduction to WordPress Class 3Introduction to WordPress Class 3
Introduction to WordPress Class 3Adrian Mikeliunas
 
Introduction to WordPress Class 2
Introduction to WordPress Class 2Introduction to WordPress Class 2
Introduction to WordPress Class 2Adrian Mikeliunas
 
Genymotion Android fast development
Genymotion Android fast development Genymotion Android fast development
Genymotion Android fast development Adrian Mikeliunas
 
Introduction to WordPress Class 1
Introduction to WordPress Class 1Introduction to WordPress Class 1
Introduction to WordPress Class 1Adrian Mikeliunas
 
Ii 1500-publishing your android application
Ii 1500-publishing your android applicationIi 1500-publishing your android application
Ii 1500-publishing your android applicationAdrian Mikeliunas
 
Ii 1300-java essentials for android
Ii 1300-java essentials for androidIi 1300-java essentials for android
Ii 1300-java essentials for androidAdrian Mikeliunas
 
Ii 1100-android development for fun and profit
Ii 1100-android development for fun and profitIi 1100-android development for fun and profit
Ii 1100-android development for fun and profitAdrian Mikeliunas
 
Cyber Security At The Cinema
Cyber Security At The CinemaCyber Security At The Cinema
Cyber Security At The CinemaAdrian Mikeliunas
 

Plus de Adrian Mikeliunas (18)

Office Hour Week 14 Adrian.pptx
Office Hour Week 14 Adrian.pptxOffice Hour Week 14 Adrian.pptx
Office Hour Week 14 Adrian.pptx
 
WordPress Security 2018
WordPress Security 2018WordPress Security 2018
WordPress Security 2018
 
CISSP introduction 2016 Udemy Course
CISSP introduction 2016 Udemy CourseCISSP introduction 2016 Udemy Course
CISSP introduction 2016 Udemy Course
 
Introduction to WordPress Class 6
Introduction to WordPress Class 6Introduction to WordPress Class 6
Introduction to WordPress Class 6
 
Introduction to WordPress Class 5
Introduction to WordPress Class 5Introduction to WordPress Class 5
Introduction to WordPress Class 5
 
Introduction to WordPress Class 4
Introduction to WordPress Class 4Introduction to WordPress Class 4
Introduction to WordPress Class 4
 
Introduction to WordPress Class 3
Introduction to WordPress Class 3Introduction to WordPress Class 3
Introduction to WordPress Class 3
 
Introduction to WordPress Class 2
Introduction to WordPress Class 2Introduction to WordPress Class 2
Introduction to WordPress Class 2
 
Genymotion Android fast development
Genymotion Android fast development Genymotion Android fast development
Genymotion Android fast development
 
Linux introduction Class 03
Linux introduction Class 03Linux introduction Class 03
Linux introduction Class 03
 
Linux introduction Class 02
Linux introduction Class 02Linux introduction Class 02
Linux introduction Class 02
 
Linux introduction, class 1
Linux introduction, class 1Linux introduction, class 1
Linux introduction, class 1
 
Introduction to WordPress Class 1
Introduction to WordPress Class 1Introduction to WordPress Class 1
Introduction to WordPress Class 1
 
Task deck
Task deckTask deck
Task deck
 
Ii 1500-publishing your android application
Ii 1500-publishing your android applicationIi 1500-publishing your android application
Ii 1500-publishing your android application
 
Ii 1300-java essentials for android
Ii 1300-java essentials for androidIi 1300-java essentials for android
Ii 1300-java essentials for android
 
Ii 1100-android development for fun and profit
Ii 1100-android development for fun and profitIi 1100-android development for fun and profit
Ii 1100-android development for fun and profit
 
Cyber Security At The Cinema
Cyber Security At The CinemaCyber Security At The Cinema
Cyber Security At The Cinema
 

Dernier

How to design healthy team dynamics to deliver successful digital projects.pptx
How to design healthy team dynamics to deliver successful digital projects.pptxHow to design healthy team dynamics to deliver successful digital projects.pptx
How to design healthy team dynamics to deliver successful digital projects.pptxTechSoupConnectLondo
 
productionpost-productiondiary-240320114322-5004daf6.pptx
productionpost-productiondiary-240320114322-5004daf6.pptxproductionpost-productiondiary-240320114322-5004daf6.pptx
productionpost-productiondiary-240320114322-5004daf6.pptxHenryBriggs2
 
call girls in Laxmi Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Laxmi Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Laxmi Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Laxmi Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️saminamagar
 
call girls in Mayapuri DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Mayapuri DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Mayapuri DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Mayapuri DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️saminamagar
 
Make Charity for Poor Students to Strong Kurnool
Make Charity for Poor Students to Strong KurnoolMake Charity for Poor Students to Strong Kurnool
Make Charity for Poor Students to Strong KurnoolSERUDS INDIA
 
2024: The FAR, Federal Acquisition Regulations - Part 26
2024: The FAR, Federal Acquisition Regulations - Part 262024: The FAR, Federal Acquisition Regulations - Part 26
2024: The FAR, Federal Acquisition Regulations - Part 26JSchaus & Associates
 
call girls in moti bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in moti bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in moti bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in moti bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️saminamagar
 
call girls in Punjabi Bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Punjabi Bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Punjabi Bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Punjabi Bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️saminamagar
 
Russian Call Girl Hebbagodi ! 7001305949 ₹2999 Only and Free Hotel Delivery 2...
Russian Call Girl Hebbagodi ! 7001305949 ₹2999 Only and Free Hotel Delivery 2...Russian Call Girl Hebbagodi ! 7001305949 ₹2999 Only and Free Hotel Delivery 2...
Russian Call Girl Hebbagodi ! 7001305949 ₹2999 Only and Free Hotel Delivery 2...narwatsonia7
 
call girls in Model Town DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Model Town  DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Model Town  DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Model Town DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️saminamagar
 
Premium Call Girls Btm Layout - 7001305949 Escorts Service with Real Photos a...
Premium Call Girls Btm Layout - 7001305949 Escorts Service with Real Photos a...Premium Call Girls Btm Layout - 7001305949 Escorts Service with Real Photos a...
Premium Call Girls Btm Layout - 7001305949 Escorts Service with Real Photos a...narwatsonia7
 
call girls in Kirti Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Kirti Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Kirti Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Kirti Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️saminamagar
 
call girls in Vasant Kunj DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vasant Kunj DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Vasant Kunj DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vasant Kunj DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️saminamagar
 
YHR Fall 2023 Issue (Joseph Manning Interview) (2).pdf
YHR Fall 2023 Issue (Joseph Manning Interview) (2).pdfYHR Fall 2023 Issue (Joseph Manning Interview) (2).pdf
YHR Fall 2023 Issue (Joseph Manning Interview) (2).pdfyalehistoricalreview
 
2023 Ecological Profile of Ilocos Norte.pdf
2023 Ecological Profile of Ilocos Norte.pdf2023 Ecological Profile of Ilocos Norte.pdf
2023 Ecological Profile of Ilocos Norte.pdfilocosnortegovph
 
Start Donating your Old Clothes to Poor People
Start Donating your Old Clothes to Poor PeopleStart Donating your Old Clothes to Poor People
Start Donating your Old Clothes to Poor PeopleSERUDS INDIA
 
call girls in Mukherjee Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝...
call girls in Mukherjee Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝...call girls in Mukherjee Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝...
call girls in Mukherjee Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝...saminamagar
 
PEO AVRIL POUR LA COMMUNE D'ORGERUS INFO
PEO AVRIL POUR LA COMMUNE D'ORGERUS INFOPEO AVRIL POUR LA COMMUNE D'ORGERUS INFO
PEO AVRIL POUR LA COMMUNE D'ORGERUS INFOMAIRIEORGERUS
 
Professional Conduct and ethics lecture.pptx
Professional Conduct and ethics lecture.pptxProfessional Conduct and ethics lecture.pptx
Professional Conduct and ethics lecture.pptxjennysansano2
 

Dernier (20)

How to design healthy team dynamics to deliver successful digital projects.pptx
How to design healthy team dynamics to deliver successful digital projects.pptxHow to design healthy team dynamics to deliver successful digital projects.pptx
How to design healthy team dynamics to deliver successful digital projects.pptx
 
productionpost-productiondiary-240320114322-5004daf6.pptx
productionpost-productiondiary-240320114322-5004daf6.pptxproductionpost-productiondiary-240320114322-5004daf6.pptx
productionpost-productiondiary-240320114322-5004daf6.pptx
 
call girls in Laxmi Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Laxmi Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Laxmi Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Laxmi Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
 
call girls in Mayapuri DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Mayapuri DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Mayapuri DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Mayapuri DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
 
Make Charity for Poor Students to Strong Kurnool
Make Charity for Poor Students to Strong KurnoolMake Charity for Poor Students to Strong Kurnool
Make Charity for Poor Students to Strong Kurnool
 
2024: The FAR, Federal Acquisition Regulations - Part 26
2024: The FAR, Federal Acquisition Regulations - Part 262024: The FAR, Federal Acquisition Regulations - Part 26
2024: The FAR, Federal Acquisition Regulations - Part 26
 
call girls in moti bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in moti bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in moti bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in moti bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
 
call girls in Punjabi Bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Punjabi Bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Punjabi Bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Punjabi Bagh DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
 
Russian Call Girl Hebbagodi ! 7001305949 ₹2999 Only and Free Hotel Delivery 2...
Russian Call Girl Hebbagodi ! 7001305949 ₹2999 Only and Free Hotel Delivery 2...Russian Call Girl Hebbagodi ! 7001305949 ₹2999 Only and Free Hotel Delivery 2...
Russian Call Girl Hebbagodi ! 7001305949 ₹2999 Only and Free Hotel Delivery 2...
 
call girls in Model Town DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Model Town  DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Model Town  DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Model Town DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
 
Premium Call Girls Btm Layout - 7001305949 Escorts Service with Real Photos a...
Premium Call Girls Btm Layout - 7001305949 Escorts Service with Real Photos a...Premium Call Girls Btm Layout - 7001305949 Escorts Service with Real Photos a...
Premium Call Girls Btm Layout - 7001305949 Escorts Service with Real Photos a...
 
call girls in Kirti Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Kirti Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Kirti Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Kirti Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
 
call girls in Vasant Kunj DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vasant Kunj DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in Vasant Kunj DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vasant Kunj DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
 
YHR Fall 2023 Issue (Joseph Manning Interview) (2).pdf
YHR Fall 2023 Issue (Joseph Manning Interview) (2).pdfYHR Fall 2023 Issue (Joseph Manning Interview) (2).pdf
YHR Fall 2023 Issue (Joseph Manning Interview) (2).pdf
 
2023 Ecological Profile of Ilocos Norte.pdf
2023 Ecological Profile of Ilocos Norte.pdf2023 Ecological Profile of Ilocos Norte.pdf
2023 Ecological Profile of Ilocos Norte.pdf
 
Start Donating your Old Clothes to Poor People
Start Donating your Old Clothes to Poor PeopleStart Donating your Old Clothes to Poor People
Start Donating your Old Clothes to Poor People
 
call girls in Mukherjee Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝...
call girls in Mukherjee Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝...call girls in Mukherjee Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝...
call girls in Mukherjee Nagar DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝...
 
PEO AVRIL POUR LA COMMUNE D'ORGERUS INFO
PEO AVRIL POUR LA COMMUNE D'ORGERUS INFOPEO AVRIL POUR LA COMMUNE D'ORGERUS INFO
PEO AVRIL POUR LA COMMUNE D'ORGERUS INFO
 
Hot Sexy call girls in Palam Vihar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Palam Vihar🔝 9953056974 🔝 escort ServiceHot Sexy call girls in Palam Vihar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Palam Vihar🔝 9953056974 🔝 escort Service
 
Professional Conduct and ethics lecture.pptx
Professional Conduct and ethics lecture.pptxProfessional Conduct and ethics lecture.pptx
Professional Conduct and ethics lecture.pptx
 

Cómo usar la tecnología para generar más Seguridad y desarrollo local

  • 1. Cómo usar la Tecnología para generar más Seguridad y Desarrollo local 27 de Marzo 2015 Adrian Mikeliunas, CISSP, CISA Conquest Security
  • 2. Seguridad y Desarrollo Agenda ♦ Definiciones ♦ Peligros ♦ Tecnologia y Comunicaciones ♦ Seguridad y Desarrollo
  • 3. Definiciones ♦ Tecnología ♦ Seguridad ♦ Desarrollo Seguridad y Desarrollo
  • 4. Adrian Mikeliunas, CISSP  Certified Information System Security Professional (CISSP)  Certified Information Systems Auditor (CISA)  30+ años de Ingeniero de Sistemas 12 años en el Banco Mundial, 4 años en el Fondo Monetario  7 años de Consultor para AT&T Mobile: 571-335-5525 Adrian@ConquestSecurity.com 4
  • 5. Identity theftIdentity theft Labor ActionLabor Action Trojan HorsesTrojan Horses Script KiddiesScript Kiddies Industrial EspionageIndustrial Espionage Human FactorHuman Factor Backdoor ownership of Host machinesBackdoor ownership of Host machines HackersHackers SniffingSniffing CrackersCrackers Process HijackingProcess Hijacking Buffer OverflowsBuffer Overflows Hostile Java AppletsHostile Java Applets ECHELON/CARNIVORE – Government SurveillanceECHELON/CARNIVORE – Government Surveillance Abuse of Civil AuthorityAbuse of Civil Authority Compromise of centralized 3Compromise of centralized 3rdrd Party Data RepositoriesParty Data Repositories Legacy Systems IP TheftIP Theft Hostile VB ScriptsHostile VB Scripts Denial of Service AttacksDenial of Service Attacks Foreign Government EspionageForeign Government Espionage Data Lineage Rogue ApplicationsRogue Applications Intrusion to commit a FelonyIntrusion to commit a Felony Virus’sVirus’s Worms Spoofing New Regulations Social EngineeringSocial EngineeringWebsite AttacksWebsite Attacks Theft of Trade SecretsTheft of Trade Secrets Dumpster DivingDumpster Diving Breach of Physical SecurityBreach of Physical Security Terrorism Peligros ExternosPeligros Externos Seguridad y Desarrollo
  • 6. Social EngineeringSocial Engineering SniffingSniffing SpamSpam GopherGopher WirelessWireless emailemail DNS Cache-based TrustDNS Cache-based Trust NFSNFS Poorly Maintained SystemPoorly Maintained SystemSecurity Sensor MisconfigurationSecurity Sensor Misconfiguration IP TheftIP Theft Admin ErrorsAdmin Errors Privilege EscalationPrivilege Escalation SendmailSendmail Too many ServicesToo many Services TCP HijackingTCP Hijacking Finger BuffersFinger Buffers External DNS Zone TransfersExternal DNS Zone Transfers Human FactorHuman Factor Identity theftIdentity theftTFTPTFTP FTPFTP Unauthorized Insider accessUnauthorized Insider access Rogue ApplicationsRogue Applications SabotageSabotage HTTPHTTP Instant Messaging Education and AwarenessEducation and Awareness Disgruntled EmployeesDisgruntled Employees Modem Hijacking Bad Application Code Policy adherencePolicy adherence UDP ServicesUDP Services NewsNews Patch Management Peligros InternosPeligros Internos Seguridad y Desarrollo
  • 7. Security Frameworks Disaster Recovery Security AwarenessSecurity Awareness Security Health Checks Security Policies and Procedures PKI Readiness Reviews PKI Infrastructures Privilege Management ConsultantsConsultants Intrusion Detection Training Security Infrastructure Network Forensics Firewalls Content Management Secure Email Legal/Regulatory Portal Security Business Continuity Planning Incident Management Platform Security Computer Forensics Website Protection HR Policy Event Monitoring Domain Security Wifi Privacy Collaboration/Partners UsersCorporate Governance Risk Assessments Risk Analysis Legacy Systems Security Integration Virus Event Correlation Security in Enterprise Architectures Malware Patch Management Vulnerabilities Control Standards Intrusion Protection The Human Factor Log Analysis Security Baselines Webmail Data Classification Asset ClassificationAsset Classification Data Lineage Security Measurement Mainframe Security Security Management ¿Podemos Entender Seguridad? Seguridad y Desarrollo
  • 8. OECD Guidelines for the Security of Information Systems & Networks Government Information Security Reform Act Turnbull Report Higgs Report Smith Report EU Privacy Directive OECD - Corporate Guidelines GovernanceOECD - Corporate Guidelines Governance HIPAA GLBA Sarbanes Oxley Patriot Act II SB-1386 California FISMA GISRAOMB-123 OMB-130 NIST 800 Series Standards Bill C-6 ISO 17799 Basel II Computer Fraud and Abuse Act 1986 Children's Online Privacy Protection Act of 1998 (COPPA) Electronic Communications Privacy Act 1986 Foreign Corrupt Practices Act 1977 Freedom of Information ActFreedom of Information Act Computer Security Act 1987Computer Security Act 1987 Digital Millennium Copyright Act 1998 FERPA National infrastructure Protection Act 1996 UK Data Protection Act BS 7799BS 7799 The European Union Directive on Data Protection Anti-terrorism, Crime and Security Act 2001 The Telecommunications (Data Protection and Privacy) Regulations 1999 FERC Homeland Security Act NIST EU Regulatory Framework for Electronic Communications BITS FDA FFIEC 21 CFR part 11 NERCNERCNY Reg. 173NY Reg. 173 Legislation & Standards Seguridad y Desarrollo
  • 9. Seguridad y Desarrollo Estado Mundial de Seguridad PASADO Virus Lola TI era responsable PRESENTE  Gobiernos que espían China Korea NSA, etc..  Corrupcción  SPAM & Malware Usted es responsable
  • 10. Seguridad y Desarrollo Tecnología y Comunicaciones ♦ El Teléfono – De atadura a liberación [movil] ♦ La Computadora ♦ De atadura a liberación [movil] ♦La radio y Television – … Todo implica movilidad!
  • 11. Seguridad y Desarrollo Seguridad y Ciudadania ♦ ¿Transparencia o Corrupcion? ♦ ¿Elecciones Electronicas? ♦ Reporte de Servicios – DC 311 311.dc.gov – NY 311 www1.nyc.gov/311
  • 12. Seguridad y Desarrollo Crowdsourcing (colaboracion abierta) ♦ Salud ♦ Educación ♦ Calidad Humana ♦ Ejemplos: – Kickstarter.com – IndieGogo.com – GoFundMe.com
  • 13. Seguridad y Desarrollo Desarrollo Sustentable ♦ Proyectos Municipales y Estatales – Comunicación – Educación – Salud – Seguridad – Trabajo En un marco de: transparencia y anti- corrucción
  • 14. Seguridad y Desarrollo Desarrollo Sustentable ♦ Micro Préstamos – Fondos a pequeñas empresas • http://www.kiva.org • https://www.prosper.com
  • 15. Seguridad y Desarrollo Sumario ♦ Definiciones ♦ Peligros ♦ Tecnologia y Comunicaciones ♦ Seguridad y Desarrollo

Notes de l'éditeur

  1. 10:30 a.m. to 11:30 a.m.  “Cómo usar la tecnología para generar más Seguridad y Desarrollo local”,  Adrian Mikeliunas (Conquest Security).
  2. REMEMBER MOST THREATS COME FROM INSIDE – SO IT’S IMPORTANT TO KNOW WHAT THEY ARE AND HOW THEY CAN MANIFEST THEMSELVES ON YOU AS ADMINISTRATORS.. WE CAN PICK ANY OF THESE ISSUES AND DRILL DOWN FOR EXAMPLE SOCIAL ENGINEERING – INSTANT MESSAGING SPAM MALWARE (SPYWARE)
  3. REMEMBER MOST THREATS COME FROM INSIDE – SO IT’S IMPORTANT TO KNOW WHAT THEY ARE AND HOW THEY CAN MANIFEST THEMSELVES ON YOU AS ADMINISTRATORS.. WE CAN PICK ANY OF THESE ISSUES AND DRILL DOWN FOR EXAMPLE SOCIAL ENGINEERING – INSTANT MESSAGING SPAM MALWARE (SPYWARE)
  4. So here we go again! This tells us that Security is becoming the only way in which organizations can understand what they need to do, to protect their business and conform to the laws of the land. In addition, what they must NOW do to mitigate risk and prove compliance. We are also seeing the laws changing quickly here in the US. How do you navigate and understand what laws, standards are needed in your business? The Europeans have adhered to a stricter privacy standard, believing that informational privacy is a human right and recalling the abuses of personal data by the Nazis during World War II. Europe has applied its data protection principles both to government and to private industry. The European Union (EU) recently gave these principles constitutional status in the Data Protection Directive, which all EU member countries must implement. The agreement, which took effect in October 1998, caused concern in the United States because it prohibits trade with any nation that does not have adequate privacy laws. Negotiations on this issue between the United States and the EU ARE ongoing.