jamie s. herman, c|ciso, cism, cissp manager of information security ropes & gray llp

17
JAMIE S. HERMAN, C|CISO, CISM, CISSP MANAGER OF INFORMATION SECURITY ROPES & GRAY LLP Navigating an Ever-Changing Security Landscape

Upload: annabel-jennings

Post on 12-Jan-2016

223 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: JAMIE S. HERMAN, C|CISO, CISM, CISSP MANAGER OF INFORMATION SECURITY ROPES & GRAY LLP

JAMIE S. HERMAN, C|CISO, CISM, CISSPMANAGER OF INFORMATION SECURITY

ROPES & GRAY LLP

Navigating an Ever-Changing Security

Landscape

Page 2: JAMIE S. HERMAN, C|CISO, CISM, CISSP MANAGER OF INFORMATION SECURITY ROPES & GRAY LLP

The Reality

50% - attacks on companies with fewer than 2500 employees

1719 – Average number of attacks per 1000 users

80 – FBI estimates more than 80 major US law firms were compromised in 2011

Exponential growth – 6x more malicious links (2012)

Page 3: JAMIE S. HERMAN, C|CISO, CISM, CISSP MANAGER OF INFORMATION SECURITY ROPES & GRAY LLP
Page 4: JAMIE S. HERMAN, C|CISO, CISM, CISSP MANAGER OF INFORMATION SECURITY ROPES & GRAY LLP

Malware

Software that interferes with normal operation of your computer

Generally executes without your knowledge or consent

Can damage or disable your computer, or steal firm information

Includes viruses, trojans, works, and spyware

Page 5: JAMIE S. HERMAN, C|CISO, CISM, CISSP MANAGER OF INFORMATION SECURITY ROPES & GRAY LLP

The How

Phishing campaign

Social Engineering

Unencrypted Media

Elevated privileges

Malicious websites

Page 6: JAMIE S. HERMAN, C|CISO, CISM, CISSP MANAGER OF INFORMATION SECURITY ROPES & GRAY LLP
Page 7: JAMIE S. HERMAN, C|CISO, CISM, CISSP MANAGER OF INFORMATION SECURITY ROPES & GRAY LLP
Page 8: JAMIE S. HERMAN, C|CISO, CISM, CISSP MANAGER OF INFORMATION SECURITY ROPES & GRAY LLP
Page 9: JAMIE S. HERMAN, C|CISO, CISM, CISSP MANAGER OF INFORMATION SECURITY ROPES & GRAY LLP

Perception…

Page 10: JAMIE S. HERMAN, C|CISO, CISM, CISSP MANAGER OF INFORMATION SECURITY ROPES & GRAY LLP

Data Classification

Critical aspect of Information Security Client/Matter intake

How can you protect what you don’t know?

Many flavors (government, industry, business model)

Role Based Access Control (RBAC)

Need to know

Data Vaults

Page 11: JAMIE S. HERMAN, C|CISO, CISM, CISSP MANAGER OF INFORMATION SECURITY ROPES & GRAY LLP

Auditing

Visibility

Data Leak Prevention (DLP)

Reporting

Client protection and retention

Compliance and competitive advantage

Page 12: JAMIE S. HERMAN, C|CISO, CISM, CISSP MANAGER OF INFORMATION SECURITY ROPES & GRAY LLP

Hot Topics

Secure file sharing

Email encryption

Removable Media Encryption

Social media/personal email access

Mobile devices (BYOD)

Page 13: JAMIE S. HERMAN, C|CISO, CISM, CISSP MANAGER OF INFORMATION SECURITY ROPES & GRAY LLP
Page 14: JAMIE S. HERMAN, C|CISO, CISM, CISSP MANAGER OF INFORMATION SECURITY ROPES & GRAY LLP
Page 15: JAMIE S. HERMAN, C|CISO, CISM, CISSP MANAGER OF INFORMATION SECURITY ROPES & GRAY LLP

Resources

http://www.darkreading.com

http://www.infosecisland.com

http://www.threatpost.com

http://www.krebsonsecurity.com

http://www.dhs.gov/dhs-daily-open-source-infrastructure-report

http://www.us-cert.gov/ncas/current-activity

https://isc.sans.edu/ https://isc.sans.edu/reportfakecall.html

Page 16: JAMIE S. HERMAN, C|CISO, CISM, CISSP MANAGER OF INFORMATION SECURITY ROPES & GRAY LLP

Remember

Security is Everyone's responsibility!

Sec-U-R-IT-y………You Are It!

Page 17: JAMIE S. HERMAN, C|CISO, CISM, CISSP MANAGER OF INFORMATION SECURITY ROPES & GRAY LLP

Questions