1 / 11

The Reality of Security

Explore the complexities of security in both government and private sectors. Learn about the challenges, costs, and future trends in security offerings, from risk assessments to disaster recovery. Understand the importance of policy alongside software solutions for effective security measures.

donofrio
Download Presentation

The Reality of Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. The Reality of Security Aaron Eppert (eppertan@alumni.rose-hulman.edu) May 7, 2004

  2. Today… • Introduction • What is security? • Differences in “Security” • Security in the Government • Security in the Private Sector • Example Security Offerings • Future • Questions?

  3. Introduction • Who am I • Why I am here • What I ask of you…

  4. What is security? • First and foremost: Security is hard • Security is a delicate balance between what is right and what is realistic • Security is expensive • Security is time consuming • Software is not a “silver bullet” for poor policy • Good policy is not a “silver bullet” for poor software

  5. Security in the Government • Sensitive Information • Public Knowledge to Compartmented TS Data • Policy Laden • Lacking technology • Slow moving • Small budgets • Rely on heavily on external resources

  6. Security in the Private Sector • Proprietary Information • Lacking in proper policy • Dependent on software • Varying budgets

  7. Example Security Offerings Overview

  8. Example Security Offerings • Enterprise Risk Assessments • Identity and Access Management (I&AM) • Securing Web Services • Securing the Mobile Workforce • Infrastructure Security

  9. Example Security Offerings (cont’d) • Secure Mail and Content Management • Privacy and Compliance Assessment • Ensuring Business Continuity (Disaster Recovery) • Managed Security Services

  10. Future… • Government mandates will be created • Worms will continue indefinitely • Mobile devices will face the same threats as desktops

  11. Questions?

More Related