how la investment advisors use vulnerability testing to protect their assets (slideshare)

Post on 22-Jan-2018

155 Views

Category:

Technology

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

How LA Investment Advisors

Use Vulnerability Testing

to Protect Their Assets

Courtesy of FPA Technology Services, Inc.

http://www.TechGuideforLAInvestmentAdvisors.com

Sponsored by

http://www.TechGuideforLAInvestmentAdvisors.com

Craig PollackFounder & CEO

A “belt and suspenders”

approach with more layers

of defense are needed:

Sponsored by

http://www.TechGuideforLAInvestmentAdvisors.com

Craig PollackFounder & CEO

web security solutions,

intrusion prevention services,

anti-spam, and more

Sponsored by

http://www.TechGuideforLAInvestmentAdvisors.com

Craig PollackFounder & CEO

Vulnerability testing,

also known as vulnerability

analysis or assessment,

is a procedure

Sponsored by

http://www.TechGuideforLAInvestmentAdvisors.com

Craig PollackFounder & CEO

that identifies and categorizes

the externally facing security

flaws in a company’s

IT infrastructure

Sponsored by

http://www.TechGuideforLAInvestmentAdvisors.com

Craig PollackFounder & CEO

Defining and Classifying

Infrastructure Resources

Sponsored by

http://www.TechGuideforLAInvestmentAdvisors.com

Craig PollackFounder & CEO

Cataloguing resources

that are used to deliver

online services and contain

confidential firm data

Sponsored by

http://www.TechGuideforLAInvestmentAdvisors.com

Craig PollackFounder & CEO

makes it easier to pinpoint

the source of a DOS (Denial of

Service) attack, hack attempt,

or malware opportunity

Sponsored by

http://www.TechGuideforLAInvestmentAdvisors.com

Craig PollackFounder & CEO

Assigning Relative Levels of

Importance to Every Resource

Sponsored by

http://www.TechGuideforLAInvestmentAdvisors.com

Craig PollackFounder & CEO

In the case of a multi-target

attack, web servers would

take priority over smartphones

Sponsored by

http://www.TechGuideforLAInvestmentAdvisors.com

Craig PollackFounder & CEO

Identifying Potential Threats

Sponsored by

http://www.TechGuideforLAInvestmentAdvisors.com

Craig PollackFounder & CEO

Internet security experts

or specially designed software

packages intentionally probe

a system or network to locate

weaknesses

Sponsored by

http://www.TechGuideforLAInvestmentAdvisors.com

Craig PollackFounder & CEO

Putting Together a Plan to Deal

with More Serious Problems First

Sponsored by

http://www.TechGuideforLAInvestmentAdvisors.com

Craig PollackFounder & CEO

Senior managers need to:

Sponsored by

http://www.TechGuideforLAInvestmentAdvisors.com

Craig PollackFounder & CEO

• Document the steps for

making major decisions,

such as quarantining any

areas of the network that

have been infiltrated

Sponsored by

http://www.TechGuideforLAInvestmentAdvisors.com

Craig PollackFounder & CEO

• Identify the personnel

who are integral

to incident response

and business continuity

Sponsored by

http://www.TechGuideforLAInvestmentAdvisors.com

Craig PollackFounder & CEO

• Ensure that response plans

are available to all

employees in the firm, and

that everyone knows what

they need to do in the event

of a security breach

Sponsored by

http://www.TechGuideforLAInvestmentAdvisors.com

Craig PollackFounder & CEO

Defining and Implementing

Ways to Minimize Attack

Consequences

Sponsored by

http://www.TechGuideforLAInvestmentAdvisors.com

Craig PollackFounder & CEO

The following steps are also

recommended to ensure

data integrity:

Sponsored by

http://www.TechGuideforLAInvestmentAdvisors.com

Craig PollackFounder & CEO

• Encrypt all sensitive data

so it becomes harder for

attackers to steal

Sponsored by

http://www.TechGuideforLAInvestmentAdvisors.com

Craig PollackFounder & CEO

• Provide employees with

access only to the files and

applications they need

to do their jobs

Sponsored by

http://www.TechGuideforLAInvestmentAdvisors.com

Craig PollackFounder & CEO

• Implement a two-factor

authentication process:

do not rely on passwords

alone

Sponsored by

http://www.TechGuideforLAInvestmentAdvisors.com

Craig PollackFounder & CEO

Bottom Line

Sponsored by

http://www.TechGuideforLAInvestmentAdvisors.com

Craig PollackFounder & CEO

There are many ways to

address your new found

vulnerabilities

Sponsored by

http://www.TechGuideforLAInvestmentAdvisors.com

Craig PollackFounder & CEO

- between business continuity

software packages and

security assessment and

remediation services

Sponsored by

http://www.TechGuideforLAInvestmentAdvisors.com

Craig PollackFounder & CEO

Has your investment firm

used vulnerability testing

on its network and systems?

Sponsored by

http://www.TechGuideforLAInvestmentAdvisors.com

Craig PollackFounder & CEO

And does it do it on a recurring

basis?

Sponsored by

http://www.TechGuideforLAInvestmentAdvisors.com

Craig PollackFounder & CEO

Let us know your thoughts

in the Comments box below

Copyright © FPA Technology Services, Inc.

Learn How to Protect Your Firm’s Technology

With the Right IT Service Provider

Download Your Free Guide

Investing in High Net Worth Clients:

The LA Investment Advisor’s Guide to Using

Technology to Manage and Grow Your Firm

Now at http://www.TechGuideforLAInvestmentAdvisors.com

top related