cybersecurity seminar series - march 30
TRANSCRIPT
Click to edit Master title style
4/2/2015 1
Top Five
Things You Can
Do to Protect
Your Clients
and Your
Business
UCONN Stamford
March 30, 2015
Sponsored by:
Top Five
Things You Can
Do to Protect
Your Clients
and Your
Business
UCONN Stamford
March 30, 2015
Presented by
Bruce CarlsonPresident & CEOConnecticut Technology Council
Welcome & In t roduct ion
Top Five
Things You Can
Do to Protect
Your Clients
and Your
Business
UCONN Stamford
March 30, 2015
Sponsored by:
Martin
McBride
P re s e n t e d b y
CongressmanJim Himes (CT-4)
Ranking member of the Subcommittee for
National Security Agency and Cybersecurity
Top Five
Things You Can
Do to Protect
Your Clients
and Your
Business
UCONN Stamford
March 30, 2015
Sponsored by:
P re s e n t e d b y
Patricia FisherPresident & CEO, JANUS Associates
Board Member, CTCChair, CTC Cybersecurity Task Force
Introduction of Speakers
Top Five
Things You Can
Do to Protect
Your Clients
and Your
Business
UCONN Stamford
March 30, 2015
Sponsored by:
P re s e n t e d b y
Rick HarrisBoard Member, CTCPartner, Day Pitney LLP
Fea tured Speakers
Martin McBrideSupervisory Special Agent, FBI
© 2009 Day Pitney LLP
Page 6 | 4/2/2015 | Data Privacy and Protection
Safeguarding Data: The Data Lifecycle
6
• What data does your company collect? Is it all needed? How long is it needed? (Importance of effective records
management program)
•Control internal access / distribution (need-to-know), and use of data
•Trace and monitor access to
data, especially for terminated
employees
•Structure databases for security (e.g., segregate most sensitive data, minimize use of entire database)
•Conduct privacy/data risk assessment to determine likelihood and severity of data breach
Data
Processing
Data
Storage
Data
Collection
Data
Archive and
Destruction
Data
Propagation
Top Five
Things You Can
Do to Protect
Your Clients
and Your
Business
UCONN Stamford
March 30, 2015
Sponsored by:
Martin
McBride
P re s e n t e d b y
Rick Harris Partner, Day Pitney LLP
Martin McBrideSupervisory Special Agent, FBI
Matthew LaneCIO, JANUS Associates
Q & A P a n e l
Survey Resu l t s
Survey Resu l t s
Survey Resu l t s
Survey Resu l t s
Survey Resu l t s
Top Five
Things You Can
Do to Protect
Your Clients
and Your
Business
UCONN Stamford
March 30, 2015
Sponsored by:
P re s e n t e d b y
Bruce CarlsonPresident & CEOCT Technology Council
Patricia FisherPresident & CEOJANUS Associates, Inc.
Nancy HancockPartnerPullman and Comley LLC
Richard HarrisPartnerDay Pitney LLP
Rick HuebnerPresident & CEOVisual Technologies, Inc.
Lyle LibermanCOOJANUS Associates, Inc.
Andy McCarthyVP of Engineering & Technical Ops, Western NE Region Comcast
Suzanne Novak Owner/PresidentERUdync. LLC
Dr. Leon PintsovCEO SignitSure Inc.
Paige RasidCOOCT Technology Council
Ron VernierSVP and CIOHartford Steam Boiler
C y b e r s e c u r i t y Ta s k F o r c e
Top Five
Things You Can
Do to Protect
Your Clients
and Your
Business
UCONN Stamford
March 30, 2015
Sponsored by:
Martin
McBride
P re s e n t e d b y
Keynote Speaker:CT State Attorney General George Jepsen
When: Wednesday June 3 | 8:30am – 10:30amWhere: Frontier Communications | New Haven
Cost: $25 CTC Members $35 Non-members | $40 at the door
J u n e S e m i n a r
S p o n s o re d b y
Top Five
Things You Can
Do to Protect
Your Clients
and Your
Business
UCONN Stamford
March 30, 2015
Sponsored by:
Page 15 | 4/2/2015 | Data Privacy and Protection
Safeguarding Data: The Data Lifecycle
15
• What data does your company collect? Is it all needed? How long is it needed? (Importance of effective records management program)
•Control internal access / distribution (need-to-know), and use of data
•Trace and monitor access to data,
especially for terminated employees
•Structure databases for security (e.g., segregate most sensitive data, minimize use of entire database)
•Conduct privacy/data risk assessment to determine likelihood and severity of data breach
Data
Processing
Data
Storage
Data
Collection
Data
Archive and
Destruction
Data
Propagation