cybersecurity seminar series - march 30

Post on 15-Jul-2015

650 Views

Category:

Technology

1 Downloads

Preview:

Click to see full reader

TRANSCRIPT

Click to edit Master title style

4/2/2015 1

Top Five

Things You Can

Do to Protect

Your Clients

and Your

Business

UCONN Stamford

March 30, 2015

Sponsored by:

Top Five

Things You Can

Do to Protect

Your Clients

and Your

Business

UCONN Stamford

March 30, 2015

Presented by

Bruce CarlsonPresident & CEOConnecticut Technology Council

Welcome & In t roduct ion

Top Five

Things You Can

Do to Protect

Your Clients

and Your

Business

UCONN Stamford

March 30, 2015

Sponsored by:

Martin

McBride

P re s e n t e d b y

CongressmanJim Himes (CT-4)

Ranking member of the Subcommittee for

National Security Agency and Cybersecurity

Top Five

Things You Can

Do to Protect

Your Clients

and Your

Business

UCONN Stamford

March 30, 2015

Sponsored by:

P re s e n t e d b y

Patricia FisherPresident & CEO, JANUS Associates

Board Member, CTCChair, CTC Cybersecurity Task Force

Introduction of Speakers

Top Five

Things You Can

Do to Protect

Your Clients

and Your

Business

UCONN Stamford

March 30, 2015

Sponsored by:

P re s e n t e d b y

Rick HarrisBoard Member, CTCPartner, Day Pitney LLP

Fea tured Speakers

Martin McBrideSupervisory Special Agent, FBI

© 2009 Day Pitney LLP

Page 6 | 4/2/2015 | Data Privacy and Protection

Safeguarding Data: The Data Lifecycle

6

• What data does your company collect? Is it all needed? How long is it needed? (Importance of effective records

management program)

•Control internal access / distribution (need-to-know), and use of data

•Trace and monitor access to

data, especially for terminated

employees

•Structure databases for security (e.g., segregate most sensitive data, minimize use of entire database)

•Conduct privacy/data risk assessment to determine likelihood and severity of data breach

Data

Processing

Data

Storage

Data

Collection

Data

Archive and

Destruction

Data

Propagation

Top Five

Things You Can

Do to Protect

Your Clients

and Your

Business

UCONN Stamford

March 30, 2015

Sponsored by:

Martin

McBride

P re s e n t e d b y

Rick Harris Partner, Day Pitney LLP

Martin McBrideSupervisory Special Agent, FBI

Matthew LaneCIO, JANUS Associates

Q & A P a n e l

Survey Resu l t s

Survey Resu l t s

Survey Resu l t s

Survey Resu l t s

Survey Resu l t s

Top Five

Things You Can

Do to Protect

Your Clients

and Your

Business

UCONN Stamford

March 30, 2015

Sponsored by:

P re s e n t e d b y

Bruce CarlsonPresident & CEOCT Technology Council

Patricia FisherPresident & CEOJANUS Associates, Inc.

Nancy HancockPartnerPullman and Comley LLC

Richard HarrisPartnerDay Pitney LLP

Rick HuebnerPresident & CEOVisual Technologies, Inc.

Lyle LibermanCOOJANUS Associates, Inc.

Andy McCarthyVP of Engineering & Technical Ops, Western NE Region Comcast

Suzanne Novak Owner/PresidentERUdync. LLC

Dr. Leon PintsovCEO SignitSure Inc.

Paige RasidCOOCT Technology Council

Ron VernierSVP and CIOHartford Steam Boiler

C y b e r s e c u r i t y Ta s k F o r c e

Top Five

Things You Can

Do to Protect

Your Clients

and Your

Business

UCONN Stamford

March 30, 2015

Sponsored by:

Martin

McBride

P re s e n t e d b y

Keynote Speaker:CT State Attorney General George Jepsen

When: Wednesday June 3 | 8:30am – 10:30amWhere: Frontier Communications | New Haven

Cost: $25 CTC Members $35 Non-members | $40 at the door

J u n e S e m i n a r

S p o n s o re d b y

Top Five

Things You Can

Do to Protect

Your Clients

and Your

Business

UCONN Stamford

March 30, 2015

Sponsored by:

Page 15 | 4/2/2015 | Data Privacy and Protection

Safeguarding Data: The Data Lifecycle

15

• What data does your company collect? Is it all needed? How long is it needed? (Importance of effective records management program)

•Control internal access / distribution (need-to-know), and use of data

•Trace and monitor access to data,

especially for terminated employees

•Structure databases for security (e.g., segregate most sensitive data, minimize use of entire database)

•Conduct privacy/data risk assessment to determine likelihood and severity of data breach

Data

Processing

Data

Storage

Data

Collection

Data

Archive and

Destruction

Data

Propagation

top related