1 / 24

IT Security Strategy: Protecting Your Key Corporate Assets

IT Security Strategy: Protecting Your Key Corporate Assets. Tech Data. Non-Disclosure. This discussion is under our mutual nondisclosure agreement. Purpose of Our Discussion. Decide if we should expand our relationship Identify your questions and concerns about your IT security

kmcconnell
Download Presentation

IT Security Strategy: Protecting Your Key Corporate Assets

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. IT Security Strategy: Protecting Your Key Corporate Assets Tech Data

  2. Non-Disclosure • This discussion is under our mutual nondisclosure agreement.

  3. Purpose of Our Discussion • Decide if we should expand our relationship • Identify your questions and concerns about your IT security • Identify whether your issues are within our expertise • Report our findings about security issues • Establish next-step recommendations based on your situation • Create an action plan for your consideration.

  4. Introductions • Your team • Role, responsibility, experience • What would make this a valuable meeting for you? • Our team • Role, responsibility, experience

  5. Why Security? • IT is the engine of your business: When it’s compromised, you’re at risk • Your assets have value that bad guys want.

  6. Why Our Customers Choose Us • Local, responsive and concerned means we’ll be there when called • Experienced in delivering and securing IT in all varieties: traditional, cloud, blended systems, mobile • Deep network of resources to solve unique situations • We work until the the problem is resolved • We take a holistic view and focus on growing our customer’s business by judicious application of IT.

  7. What Gets Secured…? • What do you want to protect? • How much do you want to protect it? • What’s vulnerable? • Human failure • Equipment failure • Malicious attack.

  8. What Gets Secured…? • What’s valuable? • What can and can’t you live without? • What are you legally required to protect? • Defend this first or you could go to jail • What do you need to operate your business? • Defend that next or you could go out of business.

  9. What Gets Secured? • What is impossible to replace and what can be covered by insurance? • What’s a trade secret and what’s common knowledge?

  10. Your Key Assets: • People – employees, customers, key vendors and stakeholders • Property – physical, electronic and intellectual • Processes – the procedures used to successfully conduct business • Proprietary data – trade secrets, confidential information and personal data.

  11. The Outcome of Security • Availability of corporate assets • Integrity of those assets • Confidentiality of assets that are private • Accountability, making those who access the data responsible for their behavior.

  12. The Value of Security… • Increases staff efficiencies from not having to individually deal with security issues like spam, viruses and rogue email • Increases in systems efficiency created by the security system because of upgraded technology • Eliminates cost of security breaches from unpatched software.

  13. Security is a Real Challenge • New IT threats every second • High-profile attacks • New attack points • Mobile devices • Data leakage • Social engineering.

  14. Seven Security Layers • Access control • Deter intrusion • Detect intrusion • Determine attack nature • Delay further access • Defend • Recover.

  15. The Value of Security • Reduces legal exposure from unsecured premises and computer systems • Increases sales based on improved security and stability • Reduces business interruptions caused by security breaches.

  16. Your Security Concerns • What do you need to secure? • What would it be worth to secure that? • What would it cost if it wasn’t secured? • What is your security policy?

  17. What Would You Like to Have Happen? • What would it be like if everything worked correctly? • How will you know who to choose?

  18. Our Recommendations • Assessment • Security policy • Remediation plan • Policy audit and implementation • Bring compliance up-to-date • Adjust implementation of policies.

  19. Assessment • Review your situation using the seven layer security model • Identify any issues • Recommend any specific actions with cost/risk analysis • If we find nothing, you’re just being cautious.

  20. Security Policy • Review your security policy • Look for completeness • Look for areas that have changed • Mobile • New compliance mandates.

  21. Remediation Plan • If required

  22. Policy Audit and Implementation • Audit for compliance • Education where needed • Help your team with enforcement strategies.

  23. Proposed Next Steps • Agree to an assessment • Our security team will perform this • Meet for a review of findings • Decide the next step, if any.

  24. Schedule the Next Meetings • Assessment • Who and when • Report of findings • Executive team • Two weeks later.

More Related