/
SECURITY SOLUTIONS BEST PRACTICES FOR AN  IT SECURITY ASSESSMENT SECURITY SOLUTIONS BEST PRACTICES FOR AN  IT SECURITY ASSESSMENT

SECURITY SOLUTIONS BEST PRACTICES FOR AN IT SECURITY ASSESSMENT - PowerPoint Presentation

tatiana-dople
tatiana-dople . @tatiana-dople
Follow
350 views
Uploaded On 2018-12-22

SECURITY SOLUTIONS BEST PRACTICES FOR AN IT SECURITY ASSESSMENT - PPT Presentation

Financial Records Medical Records Social Security Records Insurance Records Test Records SOURCE HUFFINGTON POST Americas Schools Have a Cybersecurity Problem Education is Second Only to Healthcare in Number of Data Breaches ID: 744802

amp security records assessment security amp assessment records program schools network inability identify risk breaches vulnerability education continuous protection

Share:

Link:

Embed:

Download Presentation from below link

Download Presentation The PPT/PDF document "SECURITY SOLUTIONS BEST PRACTICES FOR AN..." is the property of its rightful owner. Permission is granted to download and print the materials on this web site for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.


Presentation Transcript

Slide1

SECURITY SOLUTIONS

BEST PRACTICES FOR AN IT SECURITY ASSESSMENT Slide2
Slide3

Financial Records

Medical RecordsSocial Security Records

Insurance RecordsTest Records

SOURCE: HUFFINGTON POST

“America’s Schools Have a Cybersecurity Problem.”Slide4

Education is Second Only to Healthcare in Number of Data Breaches

K12 Schools are a Prime Target for Ransomware

In 2016, 1.3 Million EDU Records Were Stolen by Hackers

Cost of an Education Breach: $300 per Record

SOURCE:

EduSense

,

EduWeek

EDU CYBERSECURITY: KEY FACTSSlide5

WHY A SECURITY ASSESSMENT?

SAMPLE FINDINGS

Undocumented Policies & ProceduresPoor End User Security Awareness

Unprotected EndpointsInability to Manage Network Traffic

Inability to Identify Insider Threats

Inability to Identify Breaches

Lack of Network MonitoringSlide6

Risk and Security Program

Vulnerability and Intrusion

Continuous Protection & Defense

THREE TYPES OF

SECURITY ASSESSMENTSlide7

BEST PRACTICES:

Risk & Security Program AssessmentSlide8
Slide9
Slide10

LEVERAGE A SECOND SET OF EYES

Information Security Program

Vulnerability and Intrusion

Continuous Protection & DefenseSlide11
Slide12