Building a Security Culture - Founders, Employees, and Risk Assessments

startwithsecurity n.w
1 / 29
Embed
Share

Building a strong security culture is essential for organizations. This involves integrating security into core values, leveraging expertise, and prioritizing risk assessments. Collaboration with the security community and utilizing established resources are key. The event showcases industry leaders discussing strategies and tools for enhancing security practices.

  • Security Culture
  • Risk Assessments
  • Collaboration
  • Expertise
  • Prioritization

Uploaded on | 0 Views


Download Presentation

Please find below an Image/Link to download the presentation.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.

You are allowed to download the files provided on this website for personal or commercial use, subject to the condition that they are used lawfully. All files are the property of their respective owners.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.

E N D

Presentation Transcript


  1. #StartwithSecurity

  2. Welcome Todd Kossow Acting Regional Director, Midwest Region Federal Trade Commission #StartwithSecurity

  3. Introductory Remarks James B. Speta Senior Associate Dean for Academic Affairs & International Initiatives Northwestern Pritzker School of Law #StartwithSecurity

  4. Opening Remarks Maureen Ohlhausen Commissioner, Federal Trade Commission #StartwithSecurity

  5. Panel 1 Building a Security Culture #StartwithSecurity

  6. Featuring Aaron Bedra, Chief Security Officer, Eligible John Downey, Security Lead, Braintree Arlan McMillan, Chief Information Security Officer, United Airlines Marc Varner, Corporate Vice President & Global Chief Information Security Officer, McDonald s Corp. Moderator: Cora Han, Division of Privacy & Identity Protection, FTC #StartwithSecurity

  7. Building a Security Culture #StartwithSecurity

  8. Building a Security Culture Security as Core Value Founders, executives, and employees Building Security Expertise It s not us versus them Risk Assessments and Threat Modeling Critical tools for establishing priorities Leveraging the Security Community Don t reinvent the wheel #StartwithSecurity

  9. #StartwithSecurity

  10. Panel 2 Integrating Security into the Development Pipeline #StartwithSecurity

  11. Featuring Michael Allen, Chief Information Security Officer, Morningstar Matt Konda, Founder & Chief Executive Officer, Jemurai; Chair, OWASP Global Board of Directors Alex Lock, Senior Software Engineer, Application Security, Groupon Lyle Sudin, Manager, Mandiant Consulting Services Moderator: Jim Trilling, Division of Privacy & Identity Protection, FTC #StartwithSecurity

  12. Integrating Security into the Development Pipeline #StartwithSecurity

  13. Integrating Security into the Development Pipeline Integrate security into development to achieve efficiencies and cost savings Employ different security-related tools in different phases of development Use tools you already use for other purposes Automate testing and feedback where possible Speak to developers in their language #StartwithSecurity

  14. #StartwithSecurity

  15. Panel 3 Considering Security When Working with Third Parties #StartwithSecurity

  16. Featuring Erin Jacobs, Founding Partner, Urbane Security Jeff Jarmoc, Lead Product Security Engineer, Salesforce Nathan Leong, Corporate Counsel, Microsoft Jon Oberheide, Co-Founder & Chief Technology Officer, Duo Security Moderator: Steve Wernikoff, Office of Technology Research & Investigation, & Midwest Region, FTC #StartwithSecurity

  17. Considering Security When Working with Third Parties #StartwithSecurity

  18. Considering Security When Working with Third Parties Conduct due diligence on security impact before selecting a 3rd party service provider or vendor Companies cannot simply rely on a service provider to handle all of their security issues Formulate an authentication strategy that appropriately limits access to cloud services used by your company #StartwithSecurity

  19. #StartwithSecurity

  20. Panel 4 Recognizing and Addressing Network Security Challenges #StartwithSecurity

  21. Featuring Jibran Ilyas, Director, Incident Response, Stroz Friedberg Nick Percoco, Chief Information Security Officer, Uptake Sunil Sekhri, Director, Forensic Technology Solutions, PwC Moderator: Andrea Arias, Division of Privacy & Identity Protection, FTC #StartwithSecurity

  22. Recognizing and Addressing Network Security Challenges #StartwithSecurity

  23. Recognizing and Addressing Network Security Challenges Require secure passwords and authentication Secure remote access to your network Restrict access to sensitive data and limit administrative access Segment your network and monitor who s trying to get in and out Put procedures in place to keep your security current and address vulnerabilities that may arise #StartwithSecurity

  24. Closing Remarks #StartwithSecurity

  25. Subscribe to the FTC Business Blog business.ftc.gov/blog

  26. #StartwithSecurity

  27. Start with Security videos ftc.gov/videos

  28. Learn More Start with Security: A Guide for Business ftc.gov/startwithsecurity Protecting Personal Information https://www.ftc.gov/tips-advice/business-center/guidance/protecting- personal-information-guide-business Slides & Videos from Start with Security events https://www.ftc.gov/news-events/events-calendar/2016/06/start- security-chicago ftc.gov/startwithsecurityseattle ftc.gov/startwithsecurityaustin www.ftc.gov/news-events/events-calendar/2015/09/start-security- san-francisco #StartwithSecurity

Related


More Related Content