SlideShare a Scribd company logo
1 of 29
IT Security & Data Privacy
https://www.meetup.com/SeaTech4Good/events/235268004/
o 6pm-6:30 – eat, drink, network
o 6:30-7:30 – Panelist’s presentations
o 7:30-8pm – Q&A
o 8pm-8:30 lingering until GA kicks us out
Tonight’s Panelists
Mary Gardner
Chief Information Security Officer
Ralph Johnson
Chief Information Security and Privacy Officer
Peter Kittas
Web and IT Consultant
Revelate LLC
Program
• Housekeeping (Thank You GA!)
• Who is Seattle Tech4Good?
• @seatech4good
• #datasecurity
Security, Compliance,
Risk Management
Mary Gardner, CISSP
Security – CIATriad
KnowYour Data
 What kind of data do you have
 Who has access
 Where is your data
 Why is it important to your non-profit
 When can you delete it?
Regulations and Standards
Regulation Description Triggers Requirements
HIPAA Requires that protected health Information
(PHI) be maintained in a secure and
confidential manner
 Billing
 Self-Insured Companies
 Business Associate Agreements
 Encryption of PHI
 Standards for Deidentification
 Breach Notification
 Policy and Standards for Protection
of Data
GLBA Requires that Customers Personally Identifiable
Information be secured regardless of where it
lives. Also allowed for Investment and Savings
banking to be offered at one institution.
 Chartered as a financial
institution under the guidance of
the OCC, SEC
 Protection of PII
 Vendor Security
 Breach Notification
 Required Information Security
Function
SOX Sarbanes – Oxley act required controls be
maintained around financial reporting data.
Those controls must be certified by
independent 3rd party
 Publically traded companies  Integrity of Accounting Data
 Self –Assessment Program
 Attestation of Controls
PCI Payment Card Industry Standard requires the
protection of cardholder account information
 Companies Processing Payment
card Information
 Requirements Based on Annual
Transaction Volumes
 Encryption or Obfuscation of
Account Numbers
 Annual Assessment Program
 Attestation of Controls
FISMA Federal Information Security Management Act
Requires Institutions Gathering or Processing
Information on the Governments behalf Handle
that data according to risk based standards
 Contractual Requirements
 Stipulation of Certain Grants or
Information Sharing Agreements
 Encryption of Sensitive Information
 Risk Assessment Program
 Identification and Notification of
Breach
State Breach
Laws
Many States Require that Individuals be
Notified in the Event of the Breach of Their
Personally Identifiable Information (PII)
 Public or Private Sector Entities
Storing or Processing PII
 Encryption of PII
 Breach Notification
Risk Management
Resources
 Center for Internet Security
 https://www.cisecurity.org/
 https://www.cisecurity.org/critical-controls/documents/Controls%20Practical%20Guidance%20for%20Web%20v4.pdf
 OWASP
 https://www.owasp.org/
 SANS
 https://www.sans.org/
 RSA conference slides
 https://www.rsaconference.com/events/us16/downloads-and-media
 Cloud Security Alliance
 https://cloudsecurityalliance.org/
Building stronger communities through innovative information technology
@KingCountyIT
Basic Cyber Hyegene
Ralph Johnson
Chief Information Security and Privacy Officer
King County, Washington
Building stronger communities through innovative information technology
What is Information Security?
The practice of preventing unauthorized access, use, disclosure,
disruption, modification, inspection, recording or destruction of
information.
Management of Risk to Information and related systems.
Building stronger communities through innovative information technology
Risk
Weaknesses in a system or process
Effect that the exploitation of a vulnerability by a threat will
have on the organization
Building stronger communities through innovative information technology
Humans Behind Threats
ThreatsMotivation
Terrorist groups
sabotage the
computer systems
that operate our
critical
infrastructure
such as the
electrical grid
Nation state actors
sabotage military
and critical
infrastructure
systems to gain an
advantage in the
event of conflict
Hactivists use
computer
network
exploitation to
advance their
political or social
causes
Individuals and
sophisticated
criminal
enterprises steal
personal
information and
extort victims for
financial gain
Trusted insiders steal
proprietary information
for personal, financial
and ideological reasons
Trusted insiders are
prone to error and
mistakes
Nation State actors
conduct computer
intrusions to steal
sensitive state
secrets and
proprietary
information from
private companies
Building stronger communities through innovative information technology
Other Threats
Environmental
Flood
Windstorm
Volcanic Eruption
Earthquake
Fire or Explosion
Transportation
Employee Related
Epidemic
Building stronger communities through innovative information technology
Manage Vulnerabilities Through
Cyber Hygiene
Know what’s
connected to and running
on your network
Building stronger communities through innovative information technology
Manage Vulnerabilities Through
Cyber Hygiene
Implement key security
settings to help protect your systems
Building stronger communities through innovative information technology
Manage Vulnerabilities Through
Cyber Hygiene
Limit and manage those
who have admin privileges to
change, bypass, or override your
security settings
Building stronger communities through innovative information technology
Manage Vulnerabilities Through
Cyber Hygiene
Regularly update all applications,
software and operating systems
Building stronger communities through innovative information technology
Manage Vulnerabilities Through
Cyber Hygiene
Regularize the Top Priorities to
form a solid foundation of cybersecurity
Building stronger communities through innovative information technology
Cloud vs. On-Premise Security
Considerations for Non-Profits
Peter Kittas
Revelate LLC
peter@revelate.io
What is IT Security?
• Three primary elements:
◦ Confidentiality – the data is accessible by only authorized people/systems
◦ Integrity – the data is valid and has not had unauthorized modification
◦ Availability – the resource is accessible when needed
• IT security is the culmination of information risk management
Peter Kittas | Revelate LLC | peter@revelate.io
Security Foundations
• Crucial that leadership demonstrates it cares about security
• Inventory and classify your organization’s critical data
• User security awareness training
• Physical Security
• Use encryption whenever feasible
• Trusted computers/devices
• (Recoverable) Backups, preferably on-site and off-site
Peter Kittas | Revelate LLC | peter@revelate.io
On-Premise Server Security
+ Many application choices and ultimate configuration control
+ Often not dependent on Internet uptime and performance
+ Data might stay entirely on-site
- Managing hardware and software requires ongoing expert attention
- Facilities: Dependent on reliable power and HVAC
- Physical security: reliable power and HVAC, access to servers and network gear should be
controlled
Peter Kittas | Revelate LLC | peter@revelate.io
Cloud Provider Security
+ Handle all hardware and software installation and maintenance
+ Typically, very strong physical security controls
+ Inherent remote access capability
+ Often provides offsite storage / co-location of data
- Less influence over future functionality / changes
- May require additional investment in reliability and speed of Internet connection
- A larger and more visible target
- Anyone in the world can access your login page
Peter Kittas | Revelate LLC | peter@revelate.io
Authentication and Access Control Best Practices
• Use strong, unique passwords, along with a password manager
• Require two-factor authentication
• Role-based access control
• Avoid shared accounts
• Account / device audit and revocation capability
• Review details of password change procedures
Peter Kittas | Revelate LLC | peter@revelate.io
More Cloud Provider Security Considerations
• Beware of "free" services
• Capability to bulk export all data
• Legal and regulatory compliance factors
• Examine Knowledge Base/Support pages of provider’s website to gauge their security-
mindedness
• Does provider conduct independent 3rd party security audits?
• Review Terms of Use, Privacy Policy, and Service Level Agreement
Peter Kittas | Revelate LLC | peter@revelate.io
Tonight’s Panelists
Mary Gardner
Chief Information Security Officer
Ralph Johnson
Chief Information Security and Privacy Officer
Peter Kittas
Web and IT Consultant
Revelate LLC
Three Tidbits from Discussion
• Don’t underestimate the importance of continuous security training for
employees, volunteers, and Board members.
• Several attendees recommend Wombat for gamified training
• A good first step is to scan your system for vulnerability.
• One available tool is Nessus.
• All the major browsers are adding changes in 2017 to show more
warnings when people visit websites that don’t have the latest security
certificates.
• Several attendees recommended Let’s Encrypt to enable HTTPS on your
website. It’s free and they are a nonprofit too!

More Related Content

What's hot

Managing Data Breach Communication on The Social Web
Managing Data Breach Communication on The Social WebManaging Data Breach Communication on The Social Web
Managing Data Breach Communication on The Social WebBoyd Neil
 
GDPR Part 2: Quest Relevance
GDPR Part 2: Quest RelevanceGDPR Part 2: Quest Relevance
GDPR Part 2: Quest RelevanceAdrian Dumitrescu
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss Preventiondj1arry
 
Digital Transformation and Security for the Modern Business Part 1 – Finance
Digital Transformation and Security for the Modern Business Part 1 – FinanceDigital Transformation and Security for the Modern Business Part 1 – Finance
Digital Transformation and Security for the Modern Business Part 1 – FinanceXenith Document Systems Ltd
 
MITRE ATT&CKcon 2.0: ATT&CK Updates - ICS; Otis Alexander, MITRE
MITRE ATT&CKcon 2.0: ATT&CK Updates - ICS; Otis Alexander, MITREMITRE ATT&CKcon 2.0: ATT&CK Updates - ICS; Otis Alexander, MITRE
MITRE ATT&CKcon 2.0: ATT&CK Updates - ICS; Otis Alexander, MITREMITRE - ATT&CKcon
 
GDPR and Remote Access Security: What You Need To Know
GDPR and Remote Access Security: What You Need To KnowGDPR and Remote Access Security: What You Need To Know
GDPR and Remote Access Security: What You Need To KnowBomgar
 
Privacy Risk Management - Emerging Trends, Benchmarking Research and Best Pra...
Privacy Risk Management - Emerging Trends, Benchmarking Research and Best Pra...Privacy Risk Management - Emerging Trends, Benchmarking Research and Best Pra...
Privacy Risk Management - Emerging Trends, Benchmarking Research and Best Pra...TrustArc
 
Realizing the Value of Social: Evolving from Social Media to Customer Experience
Realizing the Value of Social: Evolving from Social Media to Customer ExperienceRealizing the Value of Social: Evolving from Social Media to Customer Experience
Realizing the Value of Social: Evolving from Social Media to Customer ExperienceTata Consultancy Services
 
Issala exec-forum-opening-150604
Issala exec-forum-opening-150604Issala exec-forum-opening-150604
Issala exec-forum-opening-150604ISSA LA
 
7 Key GDPR Requirements & the Role of Data Governance
7 Key GDPR Requirements & the Role of Data Governance7 Key GDPR Requirements & the Role of Data Governance
7 Key GDPR Requirements & the Role of Data GovernanceDATUM LLC
 
How Network Data Loss Prevention is Implemented
How Network Data Loss Prevention is ImplementedHow Network Data Loss Prevention is Implemented
How Network Data Loss Prevention is ImplementedJerry Paul Acosta
 
Data Protection Indonesia: Basic Regulation and Technical Aspects_Eryk
Data Protection Indonesia: Basic Regulation and Technical Aspects_ErykData Protection Indonesia: Basic Regulation and Technical Aspects_Eryk
Data Protection Indonesia: Basic Regulation and Technical Aspects_ErykEryk Budi Pratama
 
Gdpr questions for compliance difficulties
Gdpr questions for compliance difficultiesGdpr questions for compliance difficulties
Gdpr questions for compliance difficultiesSteven Meister
 
Data Discovery Automation: How to Save Time & Protect Customer Data
Data Discovery Automation: How to Save Time & Protect Customer DataData Discovery Automation: How to Save Time & Protect Customer Data
Data Discovery Automation: How to Save Time & Protect Customer DataTrustArc
 
Better to Ask Permission? Best Practices for Privacy and Security
Better to Ask Permission? Best Practices for Privacy and SecurityBetter to Ask Permission? Best Practices for Privacy and Security
Better to Ask Permission? Best Practices for Privacy and SecurityEric Kavanagh
 
Data Security: Are you Protected?
Data Security: Are you Protected?Data Security: Are you Protected?
Data Security: Are you Protected?The TNS Group
 
The Ins and Outs of Data Security: Kareo Success Summit
The Ins and Outs of Data Security: Kareo Success SummitThe Ins and Outs of Data Security: Kareo Success Summit
The Ins and Outs of Data Security: Kareo Success SummitKareo
 
The CIA Triad - Assurance on Information Security
The CIA Triad - Assurance on Information SecurityThe CIA Triad - Assurance on Information Security
The CIA Triad - Assurance on Information SecurityBharath Rao
 

What's hot (20)

Managing Data Breach Communication on The Social Web
Managing Data Breach Communication on The Social WebManaging Data Breach Communication on The Social Web
Managing Data Breach Communication on The Social Web
 
Data Security
Data SecurityData Security
Data Security
 
GDPR Part 2: Quest Relevance
GDPR Part 2: Quest RelevanceGDPR Part 2: Quest Relevance
GDPR Part 2: Quest Relevance
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss Prevention
 
Data Security
Data SecurityData Security
Data Security
 
Digital Transformation and Security for the Modern Business Part 1 – Finance
Digital Transformation and Security for the Modern Business Part 1 – FinanceDigital Transformation and Security for the Modern Business Part 1 – Finance
Digital Transformation and Security for the Modern Business Part 1 – Finance
 
MITRE ATT&CKcon 2.0: ATT&CK Updates - ICS; Otis Alexander, MITRE
MITRE ATT&CKcon 2.0: ATT&CK Updates - ICS; Otis Alexander, MITREMITRE ATT&CKcon 2.0: ATT&CK Updates - ICS; Otis Alexander, MITRE
MITRE ATT&CKcon 2.0: ATT&CK Updates - ICS; Otis Alexander, MITRE
 
GDPR and Remote Access Security: What You Need To Know
GDPR and Remote Access Security: What You Need To KnowGDPR and Remote Access Security: What You Need To Know
GDPR and Remote Access Security: What You Need To Know
 
Privacy Risk Management - Emerging Trends, Benchmarking Research and Best Pra...
Privacy Risk Management - Emerging Trends, Benchmarking Research and Best Pra...Privacy Risk Management - Emerging Trends, Benchmarking Research and Best Pra...
Privacy Risk Management - Emerging Trends, Benchmarking Research and Best Pra...
 
Realizing the Value of Social: Evolving from Social Media to Customer Experience
Realizing the Value of Social: Evolving from Social Media to Customer ExperienceRealizing the Value of Social: Evolving from Social Media to Customer Experience
Realizing the Value of Social: Evolving from Social Media to Customer Experience
 
Issala exec-forum-opening-150604
Issala exec-forum-opening-150604Issala exec-forum-opening-150604
Issala exec-forum-opening-150604
 
7 Key GDPR Requirements & the Role of Data Governance
7 Key GDPR Requirements & the Role of Data Governance7 Key GDPR Requirements & the Role of Data Governance
7 Key GDPR Requirements & the Role of Data Governance
 
How Network Data Loss Prevention is Implemented
How Network Data Loss Prevention is ImplementedHow Network Data Loss Prevention is Implemented
How Network Data Loss Prevention is Implemented
 
Data Protection Indonesia: Basic Regulation and Technical Aspects_Eryk
Data Protection Indonesia: Basic Regulation and Technical Aspects_ErykData Protection Indonesia: Basic Regulation and Technical Aspects_Eryk
Data Protection Indonesia: Basic Regulation and Technical Aspects_Eryk
 
Gdpr questions for compliance difficulties
Gdpr questions for compliance difficultiesGdpr questions for compliance difficulties
Gdpr questions for compliance difficulties
 
Data Discovery Automation: How to Save Time & Protect Customer Data
Data Discovery Automation: How to Save Time & Protect Customer DataData Discovery Automation: How to Save Time & Protect Customer Data
Data Discovery Automation: How to Save Time & Protect Customer Data
 
Better to Ask Permission? Best Practices for Privacy and Security
Better to Ask Permission? Best Practices for Privacy and SecurityBetter to Ask Permission? Best Practices for Privacy and Security
Better to Ask Permission? Best Practices for Privacy and Security
 
Data Security: Are you Protected?
Data Security: Are you Protected?Data Security: Are you Protected?
Data Security: Are you Protected?
 
The Ins and Outs of Data Security: Kareo Success Summit
The Ins and Outs of Data Security: Kareo Success SummitThe Ins and Outs of Data Security: Kareo Success Summit
The Ins and Outs of Data Security: Kareo Success Summit
 
The CIA Triad - Assurance on Information Security
The CIA Triad - Assurance on Information SecurityThe CIA Triad - Assurance on Information Security
The CIA Triad - Assurance on Information Security
 

Viewers also liked

Privacy and Data Security: Risk Management and Avoidance
Privacy and Data Security:  Risk Management and AvoidancePrivacy and Data Security:  Risk Management and Avoidance
Privacy and Data Security: Risk Management and AvoidanceAmy Purcell
 
Data Security and Privacy Landscape 2012 (September 2012)
Data Security and Privacy Landscape 2012 (September 2012)Data Security and Privacy Landscape 2012 (September 2012)
Data Security and Privacy Landscape 2012 (September 2012)Jason Haislmaier
 
Cyber Security and Data Privacy: Views on Article III Standing LIVE Webcast
Cyber Security and Data Privacy: Views on Article III Standing LIVE WebcastCyber Security and Data Privacy: Views on Article III Standing LIVE Webcast
Cyber Security and Data Privacy: Views on Article III Standing LIVE WebcastThomas LaPointe
 
Privacy and Data Security
Privacy and Data SecurityPrivacy and Data Security
Privacy and Data SecurityWilmerHale
 
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...Gohsuke Takama
 
Office 365 security concerns, EU General Data Protection Regulation (GDPR)
Office 365 security concerns, EU General Data Protection Regulation (GDPR) Office 365 security concerns, EU General Data Protection Regulation (GDPR)
Office 365 security concerns, EU General Data Protection Regulation (GDPR) Sonja Madsen
 

Viewers also liked (6)

Privacy and Data Security: Risk Management and Avoidance
Privacy and Data Security:  Risk Management and AvoidancePrivacy and Data Security:  Risk Management and Avoidance
Privacy and Data Security: Risk Management and Avoidance
 
Data Security and Privacy Landscape 2012 (September 2012)
Data Security and Privacy Landscape 2012 (September 2012)Data Security and Privacy Landscape 2012 (September 2012)
Data Security and Privacy Landscape 2012 (September 2012)
 
Cyber Security and Data Privacy: Views on Article III Standing LIVE Webcast
Cyber Security and Data Privacy: Views on Article III Standing LIVE WebcastCyber Security and Data Privacy: Views on Article III Standing LIVE Webcast
Cyber Security and Data Privacy: Views on Article III Standing LIVE Webcast
 
Privacy and Data Security
Privacy and Data SecurityPrivacy and Data Security
Privacy and Data Security
 
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
 
Office 365 security concerns, EU General Data Protection Regulation (GDPR)
Office 365 security concerns, EU General Data Protection Regulation (GDPR) Office 365 security concerns, EU General Data Protection Regulation (GDPR)
Office 365 security concerns, EU General Data Protection Regulation (GDPR)
 

Similar to Seattle Tech4Good meetup: Data Security and Privacy

Community IT Webinar - Crafting IT Security Policy Apr 2015
Community IT Webinar - Crafting IT Security Policy Apr 2015Community IT Webinar - Crafting IT Security Policy Apr 2015
Community IT Webinar - Crafting IT Security Policy Apr 2015Community IT Innovators
 
A guide to Sustainable Cyber Security
A guide to Sustainable Cyber SecurityA guide to Sustainable Cyber Security
A guide to Sustainable Cyber SecurityErnest Staats
 
Lessons in privacy engineering from a nation scale identity system - connect id
Lessons in privacy engineering from a nation scale identity system - connect idLessons in privacy engineering from a nation scale identity system - connect id
Lessons in privacy engineering from a nation scale identity system - connect idDavid Kelts, CIPT
 
SQLCAT: Addressing Security and Compliance Issues with SQL Server 2008
SQLCAT: Addressing Security and Compliance Issues with SQL Server 2008SQLCAT: Addressing Security and Compliance Issues with SQL Server 2008
SQLCAT: Addressing Security and Compliance Issues with SQL Server 2008Denny Lee
 
Information security: importance of having defined policy & process
Information security: importance of having defined policy & processInformation security: importance of having defined policy & process
Information security: importance of having defined policy & processInformation Technology Society Nepal
 
Micro segmentation and zero trust for security and compliance - Guardicore an...
Micro segmentation and zero trust for security and compliance - Guardicore an...Micro segmentation and zero trust for security and compliance - Guardicore an...
Micro segmentation and zero trust for security and compliance - Guardicore an...YouAttestSlideshare
 
Data Breaches and Security Rights in SharePoint Webinar
Data Breaches and Security Rights in SharePoint WebinarData Breaches and Security Rights in SharePoint Webinar
Data Breaches and Security Rights in SharePoint WebinarConcept Searching, Inc
 
Office 365 : Data leakage control, privacy, compliance and regulations in the...
Office 365 : Data leakage control, privacy, compliance and regulations in the...Office 365 : Data leakage control, privacy, compliance and regulations in the...
Office 365 : Data leakage control, privacy, compliance and regulations in the...Edge Pereira
 
Perspectives on Ethical Big Data Governance
Perspectives on Ethical Big Data GovernancePerspectives on Ethical Big Data Governance
Perspectives on Ethical Big Data GovernanceCloudera, Inc.
 
Complying with Cybersecurity Regulations for IBM i Servers and Data
Complying with Cybersecurity Regulations for IBM i Servers and DataComplying with Cybersecurity Regulations for IBM i Servers and Data
Complying with Cybersecurity Regulations for IBM i Servers and DataPrecisely
 
Aligning Application Security to Compliance
Aligning Application Security to ComplianceAligning Application Security to Compliance
Aligning Application Security to ComplianceSecurity Innovation
 
Himss 2016 Lunch & Learn: Data Security in IoT (and ePHI Risks)
Himss 2016 Lunch & Learn: Data Security in IoT (and ePHI Risks)Himss 2016 Lunch & Learn: Data Security in IoT (and ePHI Risks)
Himss 2016 Lunch & Learn: Data Security in IoT (and ePHI Risks)OnRamp
 
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be Secured
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be SecuredCountdown to CCPA: 48 Days Until Your IBM i Data Needs to Be Secured
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be SecuredPrecisely
 
The value of big data analytics
The value of big data analyticsThe value of big data analytics
The value of big data analyticsMarc Vael
 
Understanding Identity Management and Security.
Understanding Identity Management and Security.Understanding Identity Management and Security.
Understanding Identity Management and Security.Chinatu Uzuegbu
 
Improve IT Security and Compliance with Mainframe Data in Splunk
Improve IT Security and Compliance with Mainframe Data in SplunkImprove IT Security and Compliance with Mainframe Data in Splunk
Improve IT Security and Compliance with Mainframe Data in SplunkPrecisely
 
Security Architecture Best Practices for SaaS Applications
Security Architecture Best Practices for SaaS ApplicationsSecurity Architecture Best Practices for SaaS Applications
Security Architecture Best Practices for SaaS ApplicationsTechcello
 
Microsoft Office 365 Security and Compliance
Microsoft Office 365 Security and ComplianceMicrosoft Office 365 Security and Compliance
Microsoft Office 365 Security and ComplianceDavid J Rosenthal
 
Accelerating Regulatory Compliance for IBM i Systems
Accelerating Regulatory Compliance for IBM i SystemsAccelerating Regulatory Compliance for IBM i Systems
Accelerating Regulatory Compliance for IBM i SystemsPrecisely
 

Similar to Seattle Tech4Good meetup: Data Security and Privacy (20)

Community IT Webinar - Crafting IT Security Policy Apr 2015
Community IT Webinar - Crafting IT Security Policy Apr 2015Community IT Webinar - Crafting IT Security Policy Apr 2015
Community IT Webinar - Crafting IT Security Policy Apr 2015
 
A guide to Sustainable Cyber Security
A guide to Sustainable Cyber SecurityA guide to Sustainable Cyber Security
A guide to Sustainable Cyber Security
 
Lessons in privacy engineering from a nation scale identity system - connect id
Lessons in privacy engineering from a nation scale identity system - connect idLessons in privacy engineering from a nation scale identity system - connect id
Lessons in privacy engineering from a nation scale identity system - connect id
 
SQLCAT: Addressing Security and Compliance Issues with SQL Server 2008
SQLCAT: Addressing Security and Compliance Issues with SQL Server 2008SQLCAT: Addressing Security and Compliance Issues with SQL Server 2008
SQLCAT: Addressing Security and Compliance Issues with SQL Server 2008
 
Information security: importance of having defined policy & process
Information security: importance of having defined policy & processInformation security: importance of having defined policy & process
Information security: importance of having defined policy & process
 
Micro segmentation and zero trust for security and compliance - Guardicore an...
Micro segmentation and zero trust for security and compliance - Guardicore an...Micro segmentation and zero trust for security and compliance - Guardicore an...
Micro segmentation and zero trust for security and compliance - Guardicore an...
 
Data Breaches and Security Rights in SharePoint Webinar
Data Breaches and Security Rights in SharePoint WebinarData Breaches and Security Rights in SharePoint Webinar
Data Breaches and Security Rights in SharePoint Webinar
 
Office 365 : Data leakage control, privacy, compliance and regulations in the...
Office 365 : Data leakage control, privacy, compliance and regulations in the...Office 365 : Data leakage control, privacy, compliance and regulations in the...
Office 365 : Data leakage control, privacy, compliance and regulations in the...
 
Perspectives on Ethical Big Data Governance
Perspectives on Ethical Big Data GovernancePerspectives on Ethical Big Data Governance
Perspectives on Ethical Big Data Governance
 
Complying with Cybersecurity Regulations for IBM i Servers and Data
Complying with Cybersecurity Regulations for IBM i Servers and DataComplying with Cybersecurity Regulations for IBM i Servers and Data
Complying with Cybersecurity Regulations for IBM i Servers and Data
 
Aligning Application Security to Compliance
Aligning Application Security to ComplianceAligning Application Security to Compliance
Aligning Application Security to Compliance
 
Himss 2016 Lunch & Learn: Data Security in IoT (and ePHI Risks)
Himss 2016 Lunch & Learn: Data Security in IoT (and ePHI Risks)Himss 2016 Lunch & Learn: Data Security in IoT (and ePHI Risks)
Himss 2016 Lunch & Learn: Data Security in IoT (and ePHI Risks)
 
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be Secured
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be SecuredCountdown to CCPA: 48 Days Until Your IBM i Data Needs to Be Secured
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be Secured
 
The value of big data analytics
The value of big data analyticsThe value of big data analytics
The value of big data analytics
 
CyberSecurity Update Slides
CyberSecurity Update SlidesCyberSecurity Update Slides
CyberSecurity Update Slides
 
Understanding Identity Management and Security.
Understanding Identity Management and Security.Understanding Identity Management and Security.
Understanding Identity Management and Security.
 
Improve IT Security and Compliance with Mainframe Data in Splunk
Improve IT Security and Compliance with Mainframe Data in SplunkImprove IT Security and Compliance with Mainframe Data in Splunk
Improve IT Security and Compliance with Mainframe Data in Splunk
 
Security Architecture Best Practices for SaaS Applications
Security Architecture Best Practices for SaaS ApplicationsSecurity Architecture Best Practices for SaaS Applications
Security Architecture Best Practices for SaaS Applications
 
Microsoft Office 365 Security and Compliance
Microsoft Office 365 Security and ComplianceMicrosoft Office 365 Security and Compliance
Microsoft Office 365 Security and Compliance
 
Accelerating Regulatory Compliance for IBM i Systems
Accelerating Regulatory Compliance for IBM i SystemsAccelerating Regulatory Compliance for IBM i Systems
Accelerating Regulatory Compliance for IBM i Systems
 

Recently uploaded

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 

Recently uploaded (20)

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 

Seattle Tech4Good meetup: Data Security and Privacy

  • 1. IT Security & Data Privacy https://www.meetup.com/SeaTech4Good/events/235268004/ o 6pm-6:30 – eat, drink, network o 6:30-7:30 – Panelist’s presentations o 7:30-8pm – Q&A o 8pm-8:30 lingering until GA kicks us out
  • 2. Tonight’s Panelists Mary Gardner Chief Information Security Officer Ralph Johnson Chief Information Security and Privacy Officer Peter Kittas Web and IT Consultant Revelate LLC
  • 3. Program • Housekeeping (Thank You GA!) • Who is Seattle Tech4Good? • @seatech4good • #datasecurity
  • 6. KnowYour Data  What kind of data do you have  Who has access  Where is your data  Why is it important to your non-profit  When can you delete it?
  • 7. Regulations and Standards Regulation Description Triggers Requirements HIPAA Requires that protected health Information (PHI) be maintained in a secure and confidential manner  Billing  Self-Insured Companies  Business Associate Agreements  Encryption of PHI  Standards for Deidentification  Breach Notification  Policy and Standards for Protection of Data GLBA Requires that Customers Personally Identifiable Information be secured regardless of where it lives. Also allowed for Investment and Savings banking to be offered at one institution.  Chartered as a financial institution under the guidance of the OCC, SEC  Protection of PII  Vendor Security  Breach Notification  Required Information Security Function SOX Sarbanes – Oxley act required controls be maintained around financial reporting data. Those controls must be certified by independent 3rd party  Publically traded companies  Integrity of Accounting Data  Self –Assessment Program  Attestation of Controls PCI Payment Card Industry Standard requires the protection of cardholder account information  Companies Processing Payment card Information  Requirements Based on Annual Transaction Volumes  Encryption or Obfuscation of Account Numbers  Annual Assessment Program  Attestation of Controls FISMA Federal Information Security Management Act Requires Institutions Gathering or Processing Information on the Governments behalf Handle that data according to risk based standards  Contractual Requirements  Stipulation of Certain Grants or Information Sharing Agreements  Encryption of Sensitive Information  Risk Assessment Program  Identification and Notification of Breach State Breach Laws Many States Require that Individuals be Notified in the Event of the Breach of Their Personally Identifiable Information (PII)  Public or Private Sector Entities Storing or Processing PII  Encryption of PII  Breach Notification
  • 9. Resources  Center for Internet Security  https://www.cisecurity.org/  https://www.cisecurity.org/critical-controls/documents/Controls%20Practical%20Guidance%20for%20Web%20v4.pdf  OWASP  https://www.owasp.org/  SANS  https://www.sans.org/  RSA conference slides  https://www.rsaconference.com/events/us16/downloads-and-media  Cloud Security Alliance  https://cloudsecurityalliance.org/
  • 10. Building stronger communities through innovative information technology @KingCountyIT Basic Cyber Hyegene Ralph Johnson Chief Information Security and Privacy Officer King County, Washington
  • 11. Building stronger communities through innovative information technology What is Information Security? The practice of preventing unauthorized access, use, disclosure, disruption, modification, inspection, recording or destruction of information. Management of Risk to Information and related systems.
  • 12. Building stronger communities through innovative information technology Risk Weaknesses in a system or process Effect that the exploitation of a vulnerability by a threat will have on the organization
  • 13. Building stronger communities through innovative information technology Humans Behind Threats ThreatsMotivation Terrorist groups sabotage the computer systems that operate our critical infrastructure such as the electrical grid Nation state actors sabotage military and critical infrastructure systems to gain an advantage in the event of conflict Hactivists use computer network exploitation to advance their political or social causes Individuals and sophisticated criminal enterprises steal personal information and extort victims for financial gain Trusted insiders steal proprietary information for personal, financial and ideological reasons Trusted insiders are prone to error and mistakes Nation State actors conduct computer intrusions to steal sensitive state secrets and proprietary information from private companies
  • 14. Building stronger communities through innovative information technology Other Threats Environmental Flood Windstorm Volcanic Eruption Earthquake Fire or Explosion Transportation Employee Related Epidemic
  • 15. Building stronger communities through innovative information technology Manage Vulnerabilities Through Cyber Hygiene Know what’s connected to and running on your network
  • 16. Building stronger communities through innovative information technology Manage Vulnerabilities Through Cyber Hygiene Implement key security settings to help protect your systems
  • 17. Building stronger communities through innovative information technology Manage Vulnerabilities Through Cyber Hygiene Limit and manage those who have admin privileges to change, bypass, or override your security settings
  • 18. Building stronger communities through innovative information technology Manage Vulnerabilities Through Cyber Hygiene Regularly update all applications, software and operating systems
  • 19. Building stronger communities through innovative information technology Manage Vulnerabilities Through Cyber Hygiene Regularize the Top Priorities to form a solid foundation of cybersecurity
  • 20. Building stronger communities through innovative information technology
  • 21. Cloud vs. On-Premise Security Considerations for Non-Profits Peter Kittas Revelate LLC peter@revelate.io
  • 22. What is IT Security? • Three primary elements: ◦ Confidentiality – the data is accessible by only authorized people/systems ◦ Integrity – the data is valid and has not had unauthorized modification ◦ Availability – the resource is accessible when needed • IT security is the culmination of information risk management Peter Kittas | Revelate LLC | peter@revelate.io
  • 23. Security Foundations • Crucial that leadership demonstrates it cares about security • Inventory and classify your organization’s critical data • User security awareness training • Physical Security • Use encryption whenever feasible • Trusted computers/devices • (Recoverable) Backups, preferably on-site and off-site Peter Kittas | Revelate LLC | peter@revelate.io
  • 24. On-Premise Server Security + Many application choices and ultimate configuration control + Often not dependent on Internet uptime and performance + Data might stay entirely on-site - Managing hardware and software requires ongoing expert attention - Facilities: Dependent on reliable power and HVAC - Physical security: reliable power and HVAC, access to servers and network gear should be controlled Peter Kittas | Revelate LLC | peter@revelate.io
  • 25. Cloud Provider Security + Handle all hardware and software installation and maintenance + Typically, very strong physical security controls + Inherent remote access capability + Often provides offsite storage / co-location of data - Less influence over future functionality / changes - May require additional investment in reliability and speed of Internet connection - A larger and more visible target - Anyone in the world can access your login page Peter Kittas | Revelate LLC | peter@revelate.io
  • 26. Authentication and Access Control Best Practices • Use strong, unique passwords, along with a password manager • Require two-factor authentication • Role-based access control • Avoid shared accounts • Account / device audit and revocation capability • Review details of password change procedures Peter Kittas | Revelate LLC | peter@revelate.io
  • 27. More Cloud Provider Security Considerations • Beware of "free" services • Capability to bulk export all data • Legal and regulatory compliance factors • Examine Knowledge Base/Support pages of provider’s website to gauge their security- mindedness • Does provider conduct independent 3rd party security audits? • Review Terms of Use, Privacy Policy, and Service Level Agreement Peter Kittas | Revelate LLC | peter@revelate.io
  • 28. Tonight’s Panelists Mary Gardner Chief Information Security Officer Ralph Johnson Chief Information Security and Privacy Officer Peter Kittas Web and IT Consultant Revelate LLC
  • 29. Three Tidbits from Discussion • Don’t underestimate the importance of continuous security training for employees, volunteers, and Board members. • Several attendees recommend Wombat for gamified training • A good first step is to scan your system for vulnerability. • One available tool is Nessus. • All the major browsers are adding changes in 2017 to show more warnings when people visit websites that don’t have the latest security certificates. • Several attendees recommended Let’s Encrypt to enable HTTPS on your website. It’s free and they are a nonprofit too!