Enviar pesquisa
Carregar
Critical Water and Wastewater Data Security
•
0 gostou
•
990 visualizações
WaterTrax and Linko Technology
Seguir
Tecnologia
Denunciar
Compartilhar
Denunciar
Compartilhar
1 de 31
Recomendados
Nexthink Healthcare Overview
Nexthink Healthcare Overview
Brock Spradling
Planning and Deploying an Effective Vulnerability Management Program
Planning and Deploying an Effective Vulnerability Management Program
Sasha Nunke
Why Medical Devices Are So Vulnerable
Why Medical Devices Are So Vulnerable
Medigate
Effective Vulnerability Management
Effective Vulnerability Management
Vicky Ames
Active Network Monitoring brings Peace of Mind
Active Network Monitoring brings Peace of Mind
The Lorenzi Group
Mobile & Cloud Technology - Doing more with less
Mobile & Cloud Technology - Doing more with less
Sasha Levage
Why Patch Management is Still the Best First Line of Defense
Why Patch Management is Still the Best First Line of Defense
Lumension
Geist Presentation
Geist Presentation
stacygriggs
Recomendados
Nexthink Healthcare Overview
Nexthink Healthcare Overview
Brock Spradling
Planning and Deploying an Effective Vulnerability Management Program
Planning and Deploying an Effective Vulnerability Management Program
Sasha Nunke
Why Medical Devices Are So Vulnerable
Why Medical Devices Are So Vulnerable
Medigate
Effective Vulnerability Management
Effective Vulnerability Management
Vicky Ames
Active Network Monitoring brings Peace of Mind
Active Network Monitoring brings Peace of Mind
The Lorenzi Group
Mobile & Cloud Technology - Doing more with less
Mobile & Cloud Technology - Doing more with less
Sasha Levage
Why Patch Management is Still the Best First Line of Defense
Why Patch Management is Still the Best First Line of Defense
Lumension
Geist Presentation
Geist Presentation
stacygriggs
Enterprise Class Vulnerability Management Like A Boss
Enterprise Class Vulnerability Management Like A Boss
rbrockway
How to Secure Your Clinical Network
How to Secure Your Clinical Network
Medigate
Is Your Vulnerability Management Program Irrelevant?
Is Your Vulnerability Management Program Irrelevant?
Skybox Security
Mobile & Cloud Tech - doing more with less
Mobile & Cloud Tech - doing more with less
Sasha Levage
Patch and Vulnerability Management
Patch and Vulnerability Management
Marcelo Martins
Encryption Solutions for Healthcare
Encryption Solutions for Healthcare
Steve Dunn
FIRST 2006 Full-day Tutorial on Logs for Incident Response
FIRST 2006 Full-day Tutorial on Logs for Incident Response
Anton Chuvakin
Simplifying Medical Device Lifecycle Management
Simplifying Medical Device Lifecycle Management
Medigate
Dependable Operations
Dependable Operations
Liming Zhu
Is Your Vulnerability Management Program Keeping Pace With Risks?
Is Your Vulnerability Management Program Keeping Pace With Risks?
Skybox Security
Voyss Cloud-Based Managed Services Webinar 9-14-12
Voyss Cloud-Based Managed Services Webinar 9-14-12
mjamesvoyss
Unlock the Power of Your IoT Security Platform
Unlock the Power of Your IoT Security Platform
Medigate
CHIME LEAD Fourm Houston - "Creating an Effective Cyber Security Strategy: Ke...
CHIME LEAD Fourm Houston - "Creating an Effective Cyber Security Strategy: Ke...
Health IT Conference – iHT2
5 Reasons Why Medigate is a Game Changer For IoT Security in Healthcare
5 Reasons Why Medigate is a Game Changer For IoT Security in Healthcare
Medigate
Centralize Asset Information
Centralize Asset Information
Delhi, India
Vulnerability Management: What You Need to Know to Prioritize Risk
Vulnerability Management: What You Need to Know to Prioritize Risk
AlienVault
Implementing Vulnerability Management
Implementing Vulnerability Management
Argyle Executive Forum
Infographic the new era of corporate continuity of operations
Infographic the new era of corporate continuity of operations
Professor Eric K. Noji, M.D., MPH, DTMH(Lon), FRCP(UK)hon
Data Connectors San Antonio Cybersecurity Conference 2018
Data Connectors San Antonio Cybersecurity Conference 2018
Interset
Umphrey hutcherson-ecu-cause2010-rev5
Umphrey hutcherson-ecu-cause2010-rev5
umphreym
Justifying Capacity Management Efforts
Justifying Capacity Management Efforts
Precisely
Lab Datareach Presentation V5
Lab Datareach Presentation V5
damonhough
Mais conteúdo relacionado
Mais procurados
Enterprise Class Vulnerability Management Like A Boss
Enterprise Class Vulnerability Management Like A Boss
rbrockway
How to Secure Your Clinical Network
How to Secure Your Clinical Network
Medigate
Is Your Vulnerability Management Program Irrelevant?
Is Your Vulnerability Management Program Irrelevant?
Skybox Security
Mobile & Cloud Tech - doing more with less
Mobile & Cloud Tech - doing more with less
Sasha Levage
Patch and Vulnerability Management
Patch and Vulnerability Management
Marcelo Martins
Encryption Solutions for Healthcare
Encryption Solutions for Healthcare
Steve Dunn
FIRST 2006 Full-day Tutorial on Logs for Incident Response
FIRST 2006 Full-day Tutorial on Logs for Incident Response
Anton Chuvakin
Simplifying Medical Device Lifecycle Management
Simplifying Medical Device Lifecycle Management
Medigate
Dependable Operations
Dependable Operations
Liming Zhu
Is Your Vulnerability Management Program Keeping Pace With Risks?
Is Your Vulnerability Management Program Keeping Pace With Risks?
Skybox Security
Voyss Cloud-Based Managed Services Webinar 9-14-12
Voyss Cloud-Based Managed Services Webinar 9-14-12
mjamesvoyss
Unlock the Power of Your IoT Security Platform
Unlock the Power of Your IoT Security Platform
Medigate
CHIME LEAD Fourm Houston - "Creating an Effective Cyber Security Strategy: Ke...
CHIME LEAD Fourm Houston - "Creating an Effective Cyber Security Strategy: Ke...
Health IT Conference – iHT2
5 Reasons Why Medigate is a Game Changer For IoT Security in Healthcare
5 Reasons Why Medigate is a Game Changer For IoT Security in Healthcare
Medigate
Centralize Asset Information
Centralize Asset Information
Delhi, India
Vulnerability Management: What You Need to Know to Prioritize Risk
Vulnerability Management: What You Need to Know to Prioritize Risk
AlienVault
Implementing Vulnerability Management
Implementing Vulnerability Management
Argyle Executive Forum
Infographic the new era of corporate continuity of operations
Infographic the new era of corporate continuity of operations
Professor Eric K. Noji, M.D., MPH, DTMH(Lon), FRCP(UK)hon
Data Connectors San Antonio Cybersecurity Conference 2018
Data Connectors San Antonio Cybersecurity Conference 2018
Interset
Umphrey hutcherson-ecu-cause2010-rev5
Umphrey hutcherson-ecu-cause2010-rev5
umphreym
Mais procurados
(20)
Enterprise Class Vulnerability Management Like A Boss
Enterprise Class Vulnerability Management Like A Boss
How to Secure Your Clinical Network
How to Secure Your Clinical Network
Is Your Vulnerability Management Program Irrelevant?
Is Your Vulnerability Management Program Irrelevant?
Mobile & Cloud Tech - doing more with less
Mobile & Cloud Tech - doing more with less
Patch and Vulnerability Management
Patch and Vulnerability Management
Encryption Solutions for Healthcare
Encryption Solutions for Healthcare
FIRST 2006 Full-day Tutorial on Logs for Incident Response
FIRST 2006 Full-day Tutorial on Logs for Incident Response
Simplifying Medical Device Lifecycle Management
Simplifying Medical Device Lifecycle Management
Dependable Operations
Dependable Operations
Is Your Vulnerability Management Program Keeping Pace With Risks?
Is Your Vulnerability Management Program Keeping Pace With Risks?
Voyss Cloud-Based Managed Services Webinar 9-14-12
Voyss Cloud-Based Managed Services Webinar 9-14-12
Unlock the Power of Your IoT Security Platform
Unlock the Power of Your IoT Security Platform
CHIME LEAD Fourm Houston - "Creating an Effective Cyber Security Strategy: Ke...
CHIME LEAD Fourm Houston - "Creating an Effective Cyber Security Strategy: Ke...
5 Reasons Why Medigate is a Game Changer For IoT Security in Healthcare
5 Reasons Why Medigate is a Game Changer For IoT Security in Healthcare
Centralize Asset Information
Centralize Asset Information
Vulnerability Management: What You Need to Know to Prioritize Risk
Vulnerability Management: What You Need to Know to Prioritize Risk
Implementing Vulnerability Management
Implementing Vulnerability Management
Infographic the new era of corporate continuity of operations
Infographic the new era of corporate continuity of operations
Data Connectors San Antonio Cybersecurity Conference 2018
Data Connectors San Antonio Cybersecurity Conference 2018
Umphrey hutcherson-ecu-cause2010-rev5
Umphrey hutcherson-ecu-cause2010-rev5
Semelhante a Critical Water and Wastewater Data Security
Justifying Capacity Management Efforts
Justifying Capacity Management Efforts
Precisely
Lab Datareach Presentation V5
Lab Datareach Presentation V5
damonhough
Information Leakage - A knowledge Based Approach
Information Leakage - A knowledge Based Approach
Global Business Events - the Heart of your Network.
Webinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
Webinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
Storage Switzerland
Dstca
Dstca
ajay vj
Securing control systems v0.4
Securing control systems v0.4
CrispnCrunch
Clinlogix - Improving Pharmacovigilance Outsourcing with Modern Technologies
Clinlogix - Improving Pharmacovigilance Outsourcing with Modern Technologies
Veeva Systems
SegurançA Da InformaçãO Faat V1 4
SegurançA Da InformaçãO Faat V1 4
Rodrigo Piovesana
LU - SGHE Application Management Services Webinar
LU - SGHE Application Management Services Webinar
Michael Dobe, Ph.D.
Encryptionsolutionsforhealthcare
Encryptionsolutionsforhealthcare
Nitin Parbhakar
It Audit And Forensics
It Audit And Forensics
JED Consulting Services LLC
Mitigating Risk in Aging Federal IT Systems
Mitigating Risk in Aging Federal IT Systems
BeyondTrust
How Vulnerable is Your Critical Data?
How Vulnerable is Your Critical Data?
IBM Security
Paetec Data Center Colocation Presentation
Paetec Data Center Colocation Presentation
tbunten
Breakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview Solutions
Drew Madelung
Integrating Physical And Logical Security
Integrating Physical And Logical Security
Jorge Sebastiao
Delivering Modern Data Protection for VMware Environments
Delivering Modern Data Protection for VMware Environments
Paula Koziol
Environmental Monitoring in Regulated Labs and Cleanrooms
Environmental Monitoring in Regulated Labs and Cleanrooms
Công ty Cổ phần Tư vấn Thiết kế GMP EU
Bestpractices
Bestpractices
vidalocafz
Kaseya: 5 Tips for Education IT Directors
Kaseya: 5 Tips for Education IT Directors
Kaseya
Semelhante a Critical Water and Wastewater Data Security
(20)
Justifying Capacity Management Efforts
Justifying Capacity Management Efforts
Lab Datareach Presentation V5
Lab Datareach Presentation V5
Information Leakage - A knowledge Based Approach
Information Leakage - A knowledge Based Approach
Webinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
Webinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
Dstca
Dstca
Securing control systems v0.4
Securing control systems v0.4
Clinlogix - Improving Pharmacovigilance Outsourcing with Modern Technologies
Clinlogix - Improving Pharmacovigilance Outsourcing with Modern Technologies
SegurançA Da InformaçãO Faat V1 4
SegurançA Da InformaçãO Faat V1 4
LU - SGHE Application Management Services Webinar
LU - SGHE Application Management Services Webinar
Encryptionsolutionsforhealthcare
Encryptionsolutionsforhealthcare
It Audit And Forensics
It Audit And Forensics
Mitigating Risk in Aging Federal IT Systems
Mitigating Risk in Aging Federal IT Systems
How Vulnerable is Your Critical Data?
How Vulnerable is Your Critical Data?
Paetec Data Center Colocation Presentation
Paetec Data Center Colocation Presentation
Breakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview Solutions
Integrating Physical And Logical Security
Integrating Physical And Logical Security
Delivering Modern Data Protection for VMware Environments
Delivering Modern Data Protection for VMware Environments
Environmental Monitoring in Regulated Labs and Cleanrooms
Environmental Monitoring in Regulated Labs and Cleanrooms
Bestpractices
Bestpractices
Kaseya: 5 Tips for Education IT Directors
Kaseya: 5 Tips for Education IT Directors
Último
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
Hervé Boutemy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
BkGupta21
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
NavinnSomaal
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
Pixlogix Infotech
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
Lorenzo Miniero
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
DianaGray10
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
ScyllaDB
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
BookNet Canada
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
Alex Barbosa Coqueiro
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
Dilum Bandara
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
LoriGlavin3
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
Mattias Andersson
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
Commit University
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
LoriGlavin3
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
Alan Dix
How to write a Business Continuity Plan
How to write a Business Continuity Plan
Databarracks
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
LoriGlavin3
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
Curtis Poe
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
LoriGlavin3
Último
(20)
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
How to write a Business Continuity Plan
How to write a Business Continuity Plan
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
Critical Water and Wastewater Data Security
1.
WaterTrax Critical Data
Security Andrew Lewis, P.Eng. Director Product Strategy WaterTrax
2.
3.
Data Management
4.
5.
More reporting
6.
Training/Certifications
7.
8.
Aging infrastructure
9.
Water resource issuesInfrastructure
Improvements
10.
Data Security Threats
External Viruses Malware Hacking
11.
The Weakest Link
12.
The Weakest Link
13.
Internal vs. External
Threat Estimated External Threat = < 1% Internal Threat Most Compelling Issue
14.
15.
16.
Non-secure data management
tools
17.
18.
19.
Survey of Water
Utilities
20.
21.
Requires manual review
22.
No backups
23.
Fire damage
24.
Water damage
25.
Shredding
26.
Loss
27.
Alteration
28.
Erasure
29.
30.
Data entry errors
31.
No audit trail
32.
Desktop malfunction
33.
Error prone
34.
Accidental/purposeful deletion
35.
Multiple copies/versions
36.
Accessibility
37.
No separation of
archive from analysis and presentation
38.
Backups?What happened to
the data?
39.
“The Water Board
Office” “…there must be an easier way to get this information”
40.
41.
1980s – Desktop
Applications
42.
Excel, Lotus, Quattro
spreadsheets
43.
Databases
44.
Isolated and insecure
45.
1990s – Client
Server Applications
46.
Customizable off-the-shelf solutions
47.
Custom-build solutions
48.
Heavily dependant on
internal IT infrastructure and resources
49.
2000s – Software
as a Service Applications
50.
Industry specific applications
available over the web
51.
State-of-the-art cyber security
52.
External and multiple
backups and disaster recovery systems
53.
54.
Prevent technology obsolescence
and data loss
55.
State-of-the-art security systems
in place
56.
57.
Who determines access?
58.
Who gets access?
59.
What part of
the database can they access?
60.
What can they
do?
61.
Ability to access
key data by key personal anytime, anywhere?
62.
Control
63.
Who can enter
and modify the database configuration?
64.
Who can enter
and modify the data?
65.
Ability to lock-in
data after a specified period of time?
66.
Audit Trail
67.
Who entered the
data and when?
68.
Who modified the
data and when (what was the old value)?
69.
Database backups
70.
How often?
71.
72.
Automate data entry
- minimize fingerprints
73.
Automate data review
and verification
74.
Automate alert notification
75.
Quick and easy
report generation
76.
Control who has
access & what they can do
77.
Make data accessible
anytime, anywhere
78.
Create multiple, frequent
backups
79.
Store at least
one backup off-site
80.
81.
82.
Promote transparency
and efficiency
83.
84.
Smart-phones/handhelds for field
data entry
85.
Web site for
external lab uploads
86.
Web site for
plant operator’s logs
87.
Reduce errors –
fewer fingerprints
88.
Remote data access
89.
Quickly puts critical
data in the hands of decision makers
90.
Faster response times
91.
92.
93.
94.
95.
96.
Promote transparency
and efficiency
97.
98.
Promote use
of the system
99.
100.
Ideally use rotational
data parceling
101.
Ideally using redundancies
102.
Plan for hardware
loss and potential disasters
103.
104.
Automate consolidation of
data
105.
Automate alerting of
problems
106.
Enable fast, easy
access to data
107.
Control access without
limiting accessibility
108.
Implement an Audit
Trail
109.
Implement a disaster
recovery plan
110.
Backup system &
store it externallyImproved Operations Increased Regulations Infrastructure Improvements
111.
Andrew Lewis, P.Eng.
Director Product Strategy andrew.lewis@watertrax.com 1-604-630-3708 1-866-812-2233 x 3708
Notas do Editor
Internet based solutionsSaaSEliminate internal threatsSaaS provider can’t afford lax security – would be out of business pretty quick