160 likes | 286 Views
The Future of Data Security. Compliance in an Ever Changing Threat Environment. P R E S E N T E D B Y Marc Yoder , Chief Information Security Officer Kyle Smith , Security Operations Manager Texas.gov. Changing Eras. Customers Data Operational Organizational/ Personnel
E N D
The Future of Data Security Compliance in an Ever Changing Threat Environment P R E S E N T E D B Y Marc Yoder, Chief Information Security Officer Kyle Smith, Security Operations Manager Texas.gov
Changing Eras • Customers • Data • Operational • Organizational/ Personnel • Development and Deployment • Compliance • “The only thing that is constant is change.” • ― Heraclitus, 470BC
Customers • Mainframe and ‘Dumb’ Terminal • Client-Server and Personal PCs • Laptop PC • Tablet • Mobile Phone • BYOD • Identity – Authentication & Authorization
Data • Schemas – • Hierarchical, Network, Relational, Object-Oriented • NoSQL – MongoDB, CouchDB, SimpleDB • ‘Big Data’ & Data Mining • Access • Data as a Service • API Accesses • Open Government • Encryption • Caching • Backups
Application Development • Text Graphical • Client-Server • LAMP, WAMP, MAMP, SAMP, OAMP • Functional, OOO • SOA & Enterprise Architecture • REST, SOAP • Agile, Rugged, Composite • Languages … • Code Reviews?
Infrastructure & Hosting • Research & Military & Education • Business • Centralized Client-Server • Virtualization 1.0, 2.0 • Cloud Hosting • xAAS • Private • Hybrid • DevOps
Networking • SNA vs OSI • IPX vs. IP • Routing and Switching • Ethernet vs. Token Ring • WiFi • CDN’s • SDN (Software Defined Networking)/Network Virtualization
Organizational/Personnel • Hacker/Hobbyist/Researcher • Generalist • Specialist • DevOps • Business Analyst • Remote Work
Development & Deployment • Lifecycles • Waterfall • Agile • Continuous Development • Concurrent Deployment • Release Cycles • ITIL • Managed • Continuous Deployment
Security • Disciplines • ‘Castle’ Approach • Attack/Vector & Threat Modeling • ‘Assumption of Breach’ • Security Operations Center • Security Intelligence Center • Cloud – SecAAS • You can’t outsource risk!
Compliance & Standards • Financial and Operational Procedures • Operational Procedures • Data Handling Procedures
Help Yourself! • Frameworks and standards • NIST & ISO • COSO, COBIT, SABSA, … • SAS, SSAE, ISAE, .. • Compliance mappings!
Help Everyone! • Organizations – • ISSA • ISACA • InfraGard • OWASP • Cloud Security Alliance • ACM • IEEE • … • MeetUps
Contact Us • Marc Yoder • CISO • myoder@egov.com • Kyle Smith • Security Operations Manager • kylesmith@egov.com