cybersecurity seminar series - march 30

15
Click to edit Master title style 4/2/2015 1 Top Five Things You Can Do to Protect Your Clients and Your Business UCONN Stamford March 30, 2015 Sponsored by:

Upload: paige-rasid

Post on 15-Jul-2015

649 views

Category:

Technology


1 download

TRANSCRIPT

Page 1: Cybersecurity Seminar Series - March 30

Click to edit Master title style

4/2/2015 1

Top Five

Things You Can

Do to Protect

Your Clients

and Your

Business

UCONN Stamford

March 30, 2015

Sponsored by:

Page 2: Cybersecurity Seminar Series - March 30

Top Five

Things You Can

Do to Protect

Your Clients

and Your

Business

UCONN Stamford

March 30, 2015

Presented by

Bruce CarlsonPresident & CEOConnecticut Technology Council

Welcome & In t roduct ion

Page 3: Cybersecurity Seminar Series - March 30

Top Five

Things You Can

Do to Protect

Your Clients

and Your

Business

UCONN Stamford

March 30, 2015

Sponsored by:

Martin

McBride

P re s e n t e d b y

CongressmanJim Himes (CT-4)

Ranking member of the Subcommittee for

National Security Agency and Cybersecurity

Page 4: Cybersecurity Seminar Series - March 30

Top Five

Things You Can

Do to Protect

Your Clients

and Your

Business

UCONN Stamford

March 30, 2015

Sponsored by:

P re s e n t e d b y

Patricia FisherPresident & CEO, JANUS Associates

Board Member, CTCChair, CTC Cybersecurity Task Force

Introduction of Speakers

Page 5: Cybersecurity Seminar Series - March 30

Top Five

Things You Can

Do to Protect

Your Clients

and Your

Business

UCONN Stamford

March 30, 2015

Sponsored by:

P re s e n t e d b y

Rick HarrisBoard Member, CTCPartner, Day Pitney LLP

Fea tured Speakers

Martin McBrideSupervisory Special Agent, FBI

Page 6: Cybersecurity Seminar Series - March 30

© 2009 Day Pitney LLP

Page 6 | 4/2/2015 | Data Privacy and Protection

Safeguarding Data: The Data Lifecycle

6

• What data does your company collect? Is it all needed? How long is it needed? (Importance of effective records

management program)

•Control internal access / distribution (need-to-know), and use of data

•Trace and monitor access to

data, especially for terminated

employees

•Structure databases for security (e.g., segregate most sensitive data, minimize use of entire database)

•Conduct privacy/data risk assessment to determine likelihood and severity of data breach

Data

Processing

Data

Storage

Data

Collection

Data

Archive and

Destruction

Data

Propagation

Page 7: Cybersecurity Seminar Series - March 30

Top Five

Things You Can

Do to Protect

Your Clients

and Your

Business

UCONN Stamford

March 30, 2015

Sponsored by:

Martin

McBride

P re s e n t e d b y

Rick Harris Partner, Day Pitney LLP

Martin McBrideSupervisory Special Agent, FBI

Matthew LaneCIO, JANUS Associates

Q & A P a n e l

Page 8: Cybersecurity Seminar Series - March 30

Survey Resu l t s

Page 9: Cybersecurity Seminar Series - March 30

Survey Resu l t s

Page 10: Cybersecurity Seminar Series - March 30

Survey Resu l t s

Page 11: Cybersecurity Seminar Series - March 30

Survey Resu l t s

Page 12: Cybersecurity Seminar Series - March 30

Survey Resu l t s

Page 13: Cybersecurity Seminar Series - March 30

Top Five

Things You Can

Do to Protect

Your Clients

and Your

Business

UCONN Stamford

March 30, 2015

Sponsored by:

P re s e n t e d b y

Bruce CarlsonPresident & CEOCT Technology Council

Patricia FisherPresident & CEOJANUS Associates, Inc.

Nancy HancockPartnerPullman and Comley LLC

Richard HarrisPartnerDay Pitney LLP

Rick HuebnerPresident & CEOVisual Technologies, Inc.

Lyle LibermanCOOJANUS Associates, Inc.

Andy McCarthyVP of Engineering & Technical Ops, Western NE Region Comcast

Suzanne Novak Owner/PresidentERUdync. LLC

Dr. Leon PintsovCEO SignitSure Inc.

Paige RasidCOOCT Technology Council

Ron VernierSVP and CIOHartford Steam Boiler

C y b e r s e c u r i t y Ta s k F o r c e

Page 14: Cybersecurity Seminar Series - March 30

Top Five

Things You Can

Do to Protect

Your Clients

and Your

Business

UCONN Stamford

March 30, 2015

Sponsored by:

Martin

McBride

P re s e n t e d b y

Keynote Speaker:CT State Attorney General George Jepsen

When: Wednesday June 3 | 8:30am – 10:30amWhere: Frontier Communications | New Haven

Cost: $25 CTC Members $35 Non-members | $40 at the door

J u n e S e m i n a r

S p o n s o re d b y

Page 15: Cybersecurity Seminar Series - March 30

Top Five

Things You Can

Do to Protect

Your Clients

and Your

Business

UCONN Stamford

March 30, 2015

Sponsored by:

Page 15 | 4/2/2015 | Data Privacy and Protection

Safeguarding Data: The Data Lifecycle

15

• What data does your company collect? Is it all needed? How long is it needed? (Importance of effective records management program)

•Control internal access / distribution (need-to-know), and use of data

•Trace and monitor access to data,

especially for terminated employees

•Structure databases for security (e.g., segregate most sensitive data, minimize use of entire database)

•Conduct privacy/data risk assessment to determine likelihood and severity of data breach

Data

Processing

Data

Storage

Data

Collection

Data

Archive and

Destruction

Data

Propagation