IT SECURITY STRATEGY: PROTECTING YOUR KEY CORPORATE ASSETS Tech Data Non-Disclosure • This discussion is under our mutual nondisclosure agreement. Purpose of Our Discussion • Decide if we should expand our relationship • Identify your questions and concerns about your IT • • • • security Identify whether your issues are within our expertise Report our findings about security issues Establish next-step recommendations based on your situation Create an action plan for your consideration. Introductions • Your team • Role, responsibility, experience • What would make this a valuable meeting for you? • Our team • Role, responsibility, experience Why Security? • IT is the engine of your business: When it’s compromised, you’re at risk • Your assets have value that bad guys want. Why Our Customers Choose Us • Local, responsive and concerned means we’ll be there • • • • when called Experienced in delivering and securing IT in all varieties: traditional, cloud, blended systems, mobile Deep network of resources to solve unique situations We work until the the problem is resolved We take a holistic view and focus on growing our customer’s business by judicious application of IT. What Gets Secured…? • What do you want to protect? • How much do you want to protect it? • What’s vulnerable? • Human failure • Equipment failure • Malicious attack. What Gets Secured…? • What’s valuable? • What can and can’t you live without? • What are you legally required to protect? • Defend this first or you could go to jail • What do you need to operate your business? • Defend that next or you could go out of business. What Gets Secured? • What is impossible to replace and what can be covered by insurance? • What’s a trade secret and what’s common knowledge? Your Key Assets: • People – employees, customers, key vendors and stakeholders • Property – physical, electronic and intellectual • Processes – the procedures used to successfully conduct business • Proprietary data – trade secrets, confidential information and personal data. The Outcome of Security • Availability of corporate assets • Integrity of those assets • Confidentiality of assets that are private • Accountability, making those who access the data responsible for their behavior. The Value of Security… • Increases staff efficiencies from not having to individually deal with security issues like spam, viruses and rogue email • Increases in systems efficiency created by the security system because of upgraded technology • Eliminates cost of security breaches from unpatched software. Security is a Real Challenge • New IT threats every second • High-profile attacks • New attack points • Mobile devices • Data leakage • Social engineering. Seven Security Layers 1. 2. 3. 4. 5. 6. 7. Access control Deter intrusion Detect intrusion Determine attack nature Delay further access Defend Recover. The Value of Security • Reduces legal exposure from unsecured premises and computer systems • Increases sales based on improved security and stability • Reduces business interruptions caused by security breaches. Your Security Concerns • What do you need to secure? • What would it be worth to secure that? • What would it cost if it wasn’t secured? • What is your security policy? What Would You Like to Have Happen? • What would it be like if everything worked correctly? • How will you know who to choose? Our Recommendations • Assessment • Security policy • Remediation plan • Policy audit and implementation • Bring compliance up-to-date • Adjust implementation of policies. Assessment • Review your situation using the seven layer security model • Identify any issues • Recommend any specific actions with cost/risk analysis • If we find nothing, you’re just being cautious. Security Policy • Review your security policy • Look for completeness • Look for areas that have changed • Mobile • New compliance mandates. Remediation Plan • If required Policy Audit and Implementation • Audit for compliance • Education where needed • Help your team with enforcement strategies. Proposed Next Steps • Agree to an assessment • Our security team will perform this • Meet for a review of findings • Decide the next step, if any. Schedule the Next Meetings • Assessment • Who and when • Report of findings • Executive team • Two weeks later.