SlideShare une entreprise Scribd logo
1  sur  39
Cyber Security Linda Sharp CoSN Cyber Security  Project Director  SchoolDude University 2009
Understanding the Issues ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],SchoolDude University 2009
Reliance on Technology ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],SchoolDude University 2009
The Evolution of Intent  From Hobbyists to Professionals SchoolDude University 2009 THREAT SEVERITY 1990 1995 2000 2005 WHAT’S NEXT? 2007 Threats becoming increasingly difficult to detect and mitigate FINANCIAL: Theft & Damage FAME: Viruses and Malware TESTING THE WATERS: Basic Intrusions and Viruses
Financial Impact ,[object Object],[object Object],[object Object],SchoolDude University 2009
Legal Impact ,[object Object],[object Object],[object Object],[object Object],[object Object],SchoolDude University 2009
Legal Impact ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],SchoolDude University 2009
Legal Impact ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],SchoolDude University 2009
Safety vs. Security ,[object Object],[object Object],SchoolDude University 2009
Five Guiding Questions ,[object Object],SchoolDude University 2009
Five Guiding Questions ,[object Object],[object Object],SchoolDude University 2009
Five Guiding Questions ,[object Object],[object Object],[object Object],SchoolDude University 2009
Five Guiding Questions ,[object Object],[object Object],[object Object],[object Object],SchoolDude University 2009
Five Guiding Questions ,[object Object],[object Object],[object Object],[object Object],[object Object],SchoolDude University 2009
Three Strategic Areas ,[object Object],[object Object],[object Object],SchoolDude University 2009
Three Action Themes ,[object Object],[object Object],[object Object],SchoolDude University 2009
Questions to Ask ,[object Object],SchoolDude University 2009
Questions to Ask ,[object Object],[object Object],[object Object],[object Object],SchoolDude University 2009
Questions to Ask ,[object Object],[object Object],[object Object],[object Object],SchoolDude University 2009
Questions to Ask ,[object Object],[object Object],[object Object],[object Object],[object Object],SchoolDude University 2009
Questions to Ask ,[object Object],[object Object],[object Object],SchoolDude University 2009
Questions to Ask ,[object Object],[object Object],[object Object],[object Object],SchoolDude University 2009
Questions to Ask ,[object Object],[object Object],[object Object],[object Object],[object Object],SchoolDude University 2009
Security Planning Protocol SchoolDude University 2009 Outcome: Security Project Description      goals    processes    resources    decision-making standards Phase 1: Create Leadership  Team & Set Security Goals Outcome: Prioritized Risk Assessment   A ranked list of vulnerabilities to guide the Risk Reduction Phase Phase 2: Risk Analysis Outcome: Implemented Security Plan   Risk Analysis and Risk Reduction processes must be regularly repeated to ensure effectiveness Phase 3: Risk Reduction Outcome: Crisis Management Plan   A blueprint for organizational continuity Phase 4: Crisis Management
Leadership Team ,[object Object],[object Object],[object Object],[object Object],SchoolDude University 2009
Leadership Team ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],SchoolDude University 2009
District Security Checklist ,[object Object],SchoolDude University 2009
Risk Analysis ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],SchoolDude University 2009
Security Planning Grid SchoolDude University 2009 Security Area Basic Developing Adequate Advanced Management Leadership: Little participation in IT security Aware but little support provided Supports and  funds security Aligns security  with organizational  mission Technology Network design  and IT operations : broadly  vulnerable security roll out  is incomplete mostly secure seamless security Environmental & Physical: Infrastructure: not secure partially secure mostly secure secure End Users   Stakeholders: unaware of role in security Limited  awareness  and  training Improved  awareness,  Mostly  trained Proactive  participants in  security
Security Planning Grid ,[object Object],[object Object],[object Object],SchoolDude University 2009
Planning Security Grid ,[object Object],[object Object],[object Object],SchoolDude University 2009
Plan, Test, Plan, Test….. ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],SchoolDude University 2009
Plan, Test, Plan, Test….. ,[object Object],[object Object],[object Object],[object Object],[object Object],SchoolDude University 2009
Plan, Test, Plan, Test….. ,[object Object],[object Object],[object Object],[object Object],SchoolDude University 2009
[object Object],[object Object],SchoolDude University 2009
SchoolDude University 2009 Questions and Comments?
[object Object],SchoolDude University 2009 www.cosn.org
Thank you Sponsors SchoolDude University 2009
[object Object],[object Object],[object Object],[object Object],[object Object],SchoolDude University 2009

Contenu connexe

En vedette (6)

Installation To Occupancy
Installation To OccupancyInstallation To Occupancy
Installation To Occupancy
 
My Complete C.V[1]
My Complete C.V[1]My Complete C.V[1]
My Complete C.V[1]
 
San Bernardino
San BernardinoSan Bernardino
San Bernardino
 
My Complete C.V[1]
My Complete C.V[1]My Complete C.V[1]
My Complete C.V[1]
 
Tamion&&Ashely
Tamion&&AshelyTamion&&Ashely
Tamion&&Ashely
 
Highlighting Library Collections
Highlighting Library CollectionsHighlighting Library Collections
Highlighting Library Collections
 

Similaire à CyberSecurity - Linda Sharp

Planning for the Inevitable: IT Disaster Preparedness - Linda Sharp
Planning for the Inevitable: IT Disaster Preparedness - Linda SharpPlanning for the Inevitable: IT Disaster Preparedness - Linda Sharp
Planning for the Inevitable: IT Disaster Preparedness - Linda Sharp
SchoolDude Editors
 
Managing Risk in Information SystemsChapter 4Developing a .docx
Managing Risk in Information SystemsChapter 4Developing a .docxManaging Risk in Information SystemsChapter 4Developing a .docx
Managing Risk in Information SystemsChapter 4Developing a .docx
croysierkathey
 
CMGT400 v7Threats, Attacks, and Vulnerability Assessment Templa.docx
CMGT400 v7Threats, Attacks, and Vulnerability Assessment Templa.docxCMGT400 v7Threats, Attacks, and Vulnerability Assessment Templa.docx
CMGT400 v7Threats, Attacks, and Vulnerability Assessment Templa.docx
mary772
 
Current Article Review1. Locate a current article about Regul.docx
Current Article Review1. Locate a current article about Regul.docxCurrent Article Review1. Locate a current article about Regul.docx
Current Article Review1. Locate a current article about Regul.docx
annettsparrow
 
2 Security And Internet Security
2 Security And Internet Security2 Security And Internet Security
2 Security And Internet Security
Ana Meskovska
 
Fissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-trainingFissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-training
Swati Gupta
 
Start With A Great Information Security Plan!
Start With A Great Information Security Plan!Start With A Great Information Security Plan!
Start With A Great Information Security Plan!
Tammy Clark
 
Gp2 Public Policy Assign8 644 Sp10
Gp2 Public Policy Assign8 644 Sp10Gp2 Public Policy Assign8 644 Sp10
Gp2 Public Policy Assign8 644 Sp10
Deepa Devadas
 

Similaire à CyberSecurity - Linda Sharp (20)

Planning for the Inevitable: IT Disaster Preparedness - Linda Sharp
Planning for the Inevitable: IT Disaster Preparedness - Linda SharpPlanning for the Inevitable: IT Disaster Preparedness - Linda Sharp
Planning for the Inevitable: IT Disaster Preparedness - Linda Sharp
 
Jonathan raymond 2010 rotman telus - atlseccon2011
Jonathan raymond   2010 rotman telus - atlseccon2011Jonathan raymond   2010 rotman telus - atlseccon2011
Jonathan raymond 2010 rotman telus - atlseccon2011
 
End User Security Awareness Presentation
End User Security Awareness PresentationEnd User Security Awareness Presentation
End User Security Awareness Presentation
 
Big data contains valuable information - Protect It!
Big data contains valuable information - Protect It!Big data contains valuable information - Protect It!
Big data contains valuable information - Protect It!
 
IBM's four key steps to security and privacy for big data
IBM's four key steps to security and privacy for big dataIBM's four key steps to security and privacy for big data
IBM's four key steps to security and privacy for big data
 
Managing Risk in Information SystemsChapter 4Developing a .docx
Managing Risk in Information SystemsChapter 4Developing a .docxManaging Risk in Information SystemsChapter 4Developing a .docx
Managing Risk in Information SystemsChapter 4Developing a .docx
 
CMGT400 v7Threats, Attacks, and Vulnerability Assessment Templa.docx
CMGT400 v7Threats, Attacks, and Vulnerability Assessment Templa.docxCMGT400 v7Threats, Attacks, and Vulnerability Assessment Templa.docx
CMGT400 v7Threats, Attacks, and Vulnerability Assessment Templa.docx
 
Current Article Review1. Locate a current article about Regul.docx
Current Article Review1. Locate a current article about Regul.docxCurrent Article Review1. Locate a current article about Regul.docx
Current Article Review1. Locate a current article about Regul.docx
 
Boardroom to War Room: Practical Application of the NIST Cybersecurity Frame...
Boardroom to War Room:  Practical Application of the NIST Cybersecurity Frame...Boardroom to War Room:  Practical Application of the NIST Cybersecurity Frame...
Boardroom to War Room: Practical Application of the NIST Cybersecurity Frame...
 
2 Security And Internet Security
2 Security And Internet Security2 Security And Internet Security
2 Security And Internet Security
 
Security Awareness Training for Community Colleges 2009
Security Awareness Training for Community Colleges 2009Security Awareness Training for Community Colleges 2009
Security Awareness Training for Community Colleges 2009
 
Fissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-trainingFissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-training
 
Start With A Great Information Security Plan!
Start With A Great Information Security Plan!Start With A Great Information Security Plan!
Start With A Great Information Security Plan!
 
The Impact Of Breaches On Higher Ed Tlc 27 Sep09
The Impact Of Breaches On Higher Ed Tlc 27 Sep09The Impact Of Breaches On Higher Ed Tlc 27 Sep09
The Impact Of Breaches On Higher Ed Tlc 27 Sep09
 
Cybersecurity education for the next generation
Cybersecurity education for the next generationCybersecurity education for the next generation
Cybersecurity education for the next generation
 
Pbl ppt on cybersecurity.pdf
Pbl ppt on cybersecurity.pdfPbl ppt on cybersecurity.pdf
Pbl ppt on cybersecurity.pdf
 
The Cost Of Preventing Breaches Educause Nat Conf Denver Nov 09
The Cost Of Preventing Breaches Educause Nat Conf Denver Nov 09The Cost Of Preventing Breaches Educause Nat Conf Denver Nov 09
The Cost Of Preventing Breaches Educause Nat Conf Denver Nov 09
 
Gp2 Public Policy Assign8 644 Sp10
Gp2 Public Policy Assign8 644 Sp10Gp2 Public Policy Assign8 644 Sp10
Gp2 Public Policy Assign8 644 Sp10
 
Fusion-Center-ITS-Security-and-Privacy-Operations (1).pptx
Fusion-Center-ITS-Security-and-Privacy-Operations (1).pptxFusion-Center-ITS-Security-and-Privacy-Operations (1).pptx
Fusion-Center-ITS-Security-and-Privacy-Operations (1).pptx
 
Dealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber ResilienceDealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber Resilience
 

Plus de SchoolDude Editors

Energy Management for Schools & Colleges - Terry Taylor
Energy Management for Schools & Colleges - Terry TaylorEnergy Management for Schools & Colleges - Terry Taylor
Energy Management for Schools & Colleges - Terry Taylor
SchoolDude Editors
 
Achieving Excellence in Custodial Operations - Terry Taylor
Achieving Excellence in Custodial Operations - Terry TaylorAchieving Excellence in Custodial Operations - Terry Taylor
Achieving Excellence in Custodial Operations - Terry Taylor
SchoolDude Editors
 
Your Mission & Why You Should Choose to Accept It - Art Bode
Your Mission & Why You Should Choose to Accept It - Art BodeYour Mission & Why You Should Choose to Accept It - Art Bode
Your Mission & Why You Should Choose to Accept It - Art Bode
SchoolDude Editors
 
Facilities Teams - Are You Telling Your Whole Story? - Ray Mirizzi
Facilities Teams - Are You Telling Your Whole Story? - Ray MirizziFacilities Teams - Are You Telling Your Whole Story? - Ray Mirizzi
Facilities Teams - Are You Telling Your Whole Story? - Ray Mirizzi
SchoolDude Editors
 
Telling the Technology Story - Vickie Bigham
Telling the Technology Story - Vickie BighamTelling the Technology Story - Vickie Bigham
Telling the Technology Story - Vickie Bigham
SchoolDude Editors
 
How to Manage and Embrace Change in Facilities Envt. - Denine Kysar
How to Manage and Embrace Change in Facilities Envt. - Denine KysarHow to Manage and Embrace Change in Facilities Envt. - Denine Kysar
How to Manage and Embrace Change in Facilities Envt. - Denine Kysar
SchoolDude Editors
 
The Cost of Technology: Total Cost of Ownership and Value of Investment - Ri...
The Cost of Technology:  Total Cost of Ownership and Value of Investment - Ri...The Cost of Technology:  Total Cost of Ownership and Value of Investment - Ri...
The Cost of Technology: Total Cost of Ownership and Value of Investment - Ri...
SchoolDude Editors
 
Managing When There Aren't Enough People to Do the Work - Debra Dixon-Doss
Managing When There Aren't Enough People to Do the Work - Debra Dixon-DossManaging When There Aren't Enough People to Do the Work - Debra Dixon-Doss
Managing When There Aren't Enough People to Do the Work - Debra Dixon-Doss
SchoolDude Editors
 
Life Cycle Modeling - Theory Behind TARA - Rick Biedenweg
Life Cycle Modeling - Theory Behind TARA - Rick BiedenwegLife Cycle Modeling - Theory Behind TARA - Rick Biedenweg
Life Cycle Modeling - Theory Behind TARA - Rick Biedenweg
SchoolDude Editors
 
• Technology Leadership, Planning and Implementation: Specific Strategies fo...
•	Technology Leadership, Planning and Implementation:  Specific Strategies fo...•	Technology Leadership, Planning and Implementation:  Specific Strategies fo...
• Technology Leadership, Planning and Implementation: Specific Strategies fo...
SchoolDude Editors
 
Improving Personal Communication - Jim Joyce
Improving Personal Communication - Jim JoyceImproving Personal Communication - Jim Joyce
Improving Personal Communication - Jim Joyce
SchoolDude Editors
 
Train Your Requesters - Susan Savage Fusco and Natalie Stites
Train Your Requesters - Susan Savage Fusco and Natalie StitesTrain Your Requesters - Susan Savage Fusco and Natalie Stites
Train Your Requesters - Susan Savage Fusco and Natalie Stites
SchoolDude Editors
 
How to Implement a Fee Schedule for Community Use of School Facilities
How to Implement a Fee Schedule for Community Use of School FacilitiesHow to Implement a Fee Schedule for Community Use of School Facilities
How to Implement a Fee Schedule for Community Use of School Facilities
SchoolDude Editors
 
Strategies for Successful Technology Bond Campaigns - Vickie Bigham
Strategies for Successful Technology Bond Campaigns - Vickie BighamStrategies for Successful Technology Bond Campaigns - Vickie Bigham
Strategies for Successful Technology Bond Campaigns - Vickie Bigham
SchoolDude Editors
 

Plus de SchoolDude Editors (19)

SchoolDude University 2014 West in Pictures
SchoolDude University 2014 West in PicturesSchoolDude University 2014 West in Pictures
SchoolDude University 2014 West in Pictures
 
Capital Planning
Capital PlanningCapital Planning
Capital Planning
 
Energy Management for Schools & Colleges - Terry Taylor
Energy Management for Schools & Colleges - Terry TaylorEnergy Management for Schools & Colleges - Terry Taylor
Energy Management for Schools & Colleges - Terry Taylor
 
Achieving Excellence in Custodial Operations - Terry Taylor
Achieving Excellence in Custodial Operations - Terry TaylorAchieving Excellence in Custodial Operations - Terry Taylor
Achieving Excellence in Custodial Operations - Terry Taylor
 
Your Mission & Why You Should Choose to Accept It - Art Bode
Your Mission & Why You Should Choose to Accept It - Art BodeYour Mission & Why You Should Choose to Accept It - Art Bode
Your Mission & Why You Should Choose to Accept It - Art Bode
 
Facilities Teams - Are You Telling Your Whole Story? - Ray Mirizzi
Facilities Teams - Are You Telling Your Whole Story? - Ray MirizziFacilities Teams - Are You Telling Your Whole Story? - Ray Mirizzi
Facilities Teams - Are You Telling Your Whole Story? - Ray Mirizzi
 
Telling the Technology Story - Vickie Bigham
Telling the Technology Story - Vickie BighamTelling the Technology Story - Vickie Bigham
Telling the Technology Story - Vickie Bigham
 
How to Manage and Embrace Change in Facilities Envt. - Denine Kysar
How to Manage and Embrace Change in Facilities Envt. - Denine KysarHow to Manage and Embrace Change in Facilities Envt. - Denine Kysar
How to Manage and Embrace Change in Facilities Envt. - Denine Kysar
 
The Cost of Technology: Total Cost of Ownership and Value of Investment - Ri...
The Cost of Technology:  Total Cost of Ownership and Value of Investment - Ri...The Cost of Technology:  Total Cost of Ownership and Value of Investment - Ri...
The Cost of Technology: Total Cost of Ownership and Value of Investment - Ri...
 
Managing When There Aren't Enough People to Do the Work - Debra Dixon-Doss
Managing When There Aren't Enough People to Do the Work - Debra Dixon-DossManaging When There Aren't Enough People to Do the Work - Debra Dixon-Doss
Managing When There Aren't Enough People to Do the Work - Debra Dixon-Doss
 
Life Cycle Modeling - Theory Behind TARA - Rick Biedenweg
Life Cycle Modeling - Theory Behind TARA - Rick BiedenwegLife Cycle Modeling - Theory Behind TARA - Rick Biedenweg
Life Cycle Modeling - Theory Behind TARA - Rick Biedenweg
 
• Technology Leadership, Planning and Implementation: Specific Strategies fo...
•	Technology Leadership, Planning and Implementation:  Specific Strategies fo...•	Technology Leadership, Planning and Implementation:  Specific Strategies fo...
• Technology Leadership, Planning and Implementation: Specific Strategies fo...
 
Improving Personal Communication - Jim Joyce
Improving Personal Communication - Jim JoyceImproving Personal Communication - Jim Joyce
Improving Personal Communication - Jim Joyce
 
Train Your Requesters - Susan Savage Fusco and Natalie Stites
Train Your Requesters - Susan Savage Fusco and Natalie StitesTrain Your Requesters - Susan Savage Fusco and Natalie Stites
Train Your Requesters - Susan Savage Fusco and Natalie Stites
 
How to Implement a Fee Schedule for Community Use of School Facilities
How to Implement a Fee Schedule for Community Use of School FacilitiesHow to Implement a Fee Schedule for Community Use of School Facilities
How to Implement a Fee Schedule for Community Use of School Facilities
 
Leading Today - Scott Little
Leading Today - Scott LittleLeading Today - Scott Little
Leading Today - Scott Little
 
Strategies for Successful Technology Bond Campaigns - Vickie Bigham
Strategies for Successful Technology Bond Campaigns - Vickie BighamStrategies for Successful Technology Bond Campaigns - Vickie Bigham
Strategies for Successful Technology Bond Campaigns - Vickie Bigham
 
Theres Gold In Those Energy Bills
Theres Gold In Those Energy BillsTheres Gold In Those Energy Bills
Theres Gold In Those Energy Bills
 
Energy Management And Cost Control Fall2008
Energy Management And Cost Control Fall2008Energy Management And Cost Control Fall2008
Energy Management And Cost Control Fall2008
 

Dernier

Dernier (20)

Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 

CyberSecurity - Linda Sharp

  • 1. Cyber Security Linda Sharp CoSN Cyber Security Project Director SchoolDude University 2009
  • 2.
  • 3.
  • 4. The Evolution of Intent From Hobbyists to Professionals SchoolDude University 2009 THREAT SEVERITY 1990 1995 2000 2005 WHAT’S NEXT? 2007 Threats becoming increasingly difficult to detect and mitigate FINANCIAL: Theft & Damage FAME: Viruses and Malware TESTING THE WATERS: Basic Intrusions and Viruses
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24. Security Planning Protocol SchoolDude University 2009 Outcome: Security Project Description  goals  processes  resources  decision-making standards Phase 1: Create Leadership Team & Set Security Goals Outcome: Prioritized Risk Assessment A ranked list of vulnerabilities to guide the Risk Reduction Phase Phase 2: Risk Analysis Outcome: Implemented Security Plan Risk Analysis and Risk Reduction processes must be regularly repeated to ensure effectiveness Phase 3: Risk Reduction Outcome: Crisis Management Plan A blueprint for organizational continuity Phase 4: Crisis Management
  • 25.
  • 26.
  • 27.
  • 28.
  • 29. Security Planning Grid SchoolDude University 2009 Security Area Basic Developing Adequate Advanced Management Leadership: Little participation in IT security Aware but little support provided Supports and funds security Aligns security with organizational mission Technology Network design and IT operations : broadly vulnerable security roll out is incomplete mostly secure seamless security Environmental & Physical: Infrastructure: not secure partially secure mostly secure secure End Users Stakeholders: unaware of role in security Limited awareness and training Improved awareness, Mostly trained Proactive participants in security
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36. SchoolDude University 2009 Questions and Comments?
  • 37.
  • 38. Thank you Sponsors SchoolDude University 2009
  • 39.