Cybersecurity Seminar Series - March 30
-
Upload
paige-rasid -
Category
Technology
-
view
650 -
download
1
Transcript of Cybersecurity Seminar Series - March 30
![Page 1: Cybersecurity Seminar Series - March 30](https://reader030.fdocuments.us/reader030/viewer/2022032420/55a5b4d81a28ab203a8b45d4/html5/thumbnails/1.jpg)
Click to edit Master title style
4/2/2015 1
Top Five
Things You Can
Do to Protect
Your Clients
and Your
Business
UCONN Stamford
March 30, 2015
Sponsored by:
![Page 2: Cybersecurity Seminar Series - March 30](https://reader030.fdocuments.us/reader030/viewer/2022032420/55a5b4d81a28ab203a8b45d4/html5/thumbnails/2.jpg)
Top Five
Things You Can
Do to Protect
Your Clients
and Your
Business
UCONN Stamford
March 30, 2015
Presented by
Bruce CarlsonPresident & CEOConnecticut Technology Council
Welcome & In t roduct ion
![Page 3: Cybersecurity Seminar Series - March 30](https://reader030.fdocuments.us/reader030/viewer/2022032420/55a5b4d81a28ab203a8b45d4/html5/thumbnails/3.jpg)
Top Five
Things You Can
Do to Protect
Your Clients
and Your
Business
UCONN Stamford
March 30, 2015
Sponsored by:
Martin
McBride
P re s e n t e d b y
CongressmanJim Himes (CT-4)
Ranking member of the Subcommittee for
National Security Agency and Cybersecurity
![Page 4: Cybersecurity Seminar Series - March 30](https://reader030.fdocuments.us/reader030/viewer/2022032420/55a5b4d81a28ab203a8b45d4/html5/thumbnails/4.jpg)
Top Five
Things You Can
Do to Protect
Your Clients
and Your
Business
UCONN Stamford
March 30, 2015
Sponsored by:
P re s e n t e d b y
Patricia FisherPresident & CEO, JANUS Associates
Board Member, CTCChair, CTC Cybersecurity Task Force
Introduction of Speakers
![Page 5: Cybersecurity Seminar Series - March 30](https://reader030.fdocuments.us/reader030/viewer/2022032420/55a5b4d81a28ab203a8b45d4/html5/thumbnails/5.jpg)
Top Five
Things You Can
Do to Protect
Your Clients
and Your
Business
UCONN Stamford
March 30, 2015
Sponsored by:
P re s e n t e d b y
Rick HarrisBoard Member, CTCPartner, Day Pitney LLP
Fea tured Speakers
Martin McBrideSupervisory Special Agent, FBI
![Page 6: Cybersecurity Seminar Series - March 30](https://reader030.fdocuments.us/reader030/viewer/2022032420/55a5b4d81a28ab203a8b45d4/html5/thumbnails/6.jpg)
© 2009 Day Pitney LLP
Page 6 | 4/2/2015 | Data Privacy and Protection
Safeguarding Data: The Data Lifecycle
6
• What data does your company collect? Is it all needed? How long is it needed? (Importance of effective records
management program)
•Control internal access / distribution (need-to-know), and use of data
•Trace and monitor access to
data, especially for terminated
employees
•Structure databases for security (e.g., segregate most sensitive data, minimize use of entire database)
•Conduct privacy/data risk assessment to determine likelihood and severity of data breach
Data
Processing
Data
Storage
Data
Collection
Data
Archive and
Destruction
Data
Propagation
![Page 7: Cybersecurity Seminar Series - March 30](https://reader030.fdocuments.us/reader030/viewer/2022032420/55a5b4d81a28ab203a8b45d4/html5/thumbnails/7.jpg)
Top Five
Things You Can
Do to Protect
Your Clients
and Your
Business
UCONN Stamford
March 30, 2015
Sponsored by:
Martin
McBride
P re s e n t e d b y
Rick Harris Partner, Day Pitney LLP
Martin McBrideSupervisory Special Agent, FBI
Matthew LaneCIO, JANUS Associates
Q & A P a n e l
![Page 8: Cybersecurity Seminar Series - March 30](https://reader030.fdocuments.us/reader030/viewer/2022032420/55a5b4d81a28ab203a8b45d4/html5/thumbnails/8.jpg)
Survey Resu l t s
![Page 9: Cybersecurity Seminar Series - March 30](https://reader030.fdocuments.us/reader030/viewer/2022032420/55a5b4d81a28ab203a8b45d4/html5/thumbnails/9.jpg)
Survey Resu l t s
![Page 10: Cybersecurity Seminar Series - March 30](https://reader030.fdocuments.us/reader030/viewer/2022032420/55a5b4d81a28ab203a8b45d4/html5/thumbnails/10.jpg)
Survey Resu l t s
![Page 11: Cybersecurity Seminar Series - March 30](https://reader030.fdocuments.us/reader030/viewer/2022032420/55a5b4d81a28ab203a8b45d4/html5/thumbnails/11.jpg)
Survey Resu l t s
![Page 12: Cybersecurity Seminar Series - March 30](https://reader030.fdocuments.us/reader030/viewer/2022032420/55a5b4d81a28ab203a8b45d4/html5/thumbnails/12.jpg)
Survey Resu l t s
![Page 13: Cybersecurity Seminar Series - March 30](https://reader030.fdocuments.us/reader030/viewer/2022032420/55a5b4d81a28ab203a8b45d4/html5/thumbnails/13.jpg)
Top Five
Things You Can
Do to Protect
Your Clients
and Your
Business
UCONN Stamford
March 30, 2015
Sponsored by:
P re s e n t e d b y
Bruce CarlsonPresident & CEOCT Technology Council
Patricia FisherPresident & CEOJANUS Associates, Inc.
Nancy HancockPartnerPullman and Comley LLC
Richard HarrisPartnerDay Pitney LLP
Rick HuebnerPresident & CEOVisual Technologies, Inc.
Lyle LibermanCOOJANUS Associates, Inc.
Andy McCarthyVP of Engineering & Technical Ops, Western NE Region Comcast
Suzanne Novak Owner/PresidentERUdync. LLC
Dr. Leon PintsovCEO SignitSure Inc.
Paige RasidCOOCT Technology Council
Ron VernierSVP and CIOHartford Steam Boiler
C y b e r s e c u r i t y Ta s k F o r c e
![Page 14: Cybersecurity Seminar Series - March 30](https://reader030.fdocuments.us/reader030/viewer/2022032420/55a5b4d81a28ab203a8b45d4/html5/thumbnails/14.jpg)
Top Five
Things You Can
Do to Protect
Your Clients
and Your
Business
UCONN Stamford
March 30, 2015
Sponsored by:
Martin
McBride
P re s e n t e d b y
Keynote Speaker:CT State Attorney General George Jepsen
When: Wednesday June 3 | 8:30am – 10:30amWhere: Frontier Communications | New Haven
Cost: $25 CTC Members $35 Non-members | $40 at the door
J u n e S e m i n a r
S p o n s o re d b y
![Page 15: Cybersecurity Seminar Series - March 30](https://reader030.fdocuments.us/reader030/viewer/2022032420/55a5b4d81a28ab203a8b45d4/html5/thumbnails/15.jpg)
Top Five
Things You Can
Do to Protect
Your Clients
and Your
Business
UCONN Stamford
March 30, 2015
Sponsored by:
Page 15 | 4/2/2015 | Data Privacy and Protection
Safeguarding Data: The Data Lifecycle
15
• What data does your company collect? Is it all needed? How long is it needed? (Importance of effective records management program)
•Control internal access / distribution (need-to-know), and use of data
•Trace and monitor access to data,
especially for terminated employees
•Structure databases for security (e.g., segregate most sensitive data, minimize use of entire database)
•Conduct privacy/data risk assessment to determine likelihood and severity of data breach
Data
Processing
Data
Storage
Data
Collection
Data
Archive and
Destruction
Data
Propagation