SlideShare uma empresa Scribd logo
1 de 28
Baixar para ler offline
marcumllp.com
Time for an IT Assessment
marcumllp.com
Presented by:
Kerry Mickelson
November 15, 2018
2
0914000N
Agenda
 What we do
 Why do an IT Assessment?
 Is this a threat to my IT Staff?
 Industry best practices
 Network Infrastructure
 Network Security
 IT Budget Review
 Disaster Recovery/Business continuity
 What’s New
3
0914000N
Before We start
4
0914000N
Not trying to scare you… but
 https://youtu.be/zGUR6kao9ys
5
0914000N
Why Do an Assessment?
6
0914000N
Poor planning Make big Headlines
7
0914000N
Planning for the future
• time for upgrades?
• Preparing for an RFP
• Time to introduce new technology
• Improve Business Processes
• PCI or HIPPa compliance
• Seeking Cyber-Insurance
8
0914000N
Risk is a business decision
9
0914000N
What’s my risk?
Downtime?
Reputation?
$$$ ?
10
0914000N
Why? Was there a Problem?
• Was there a server outage?
• An Audit is coming up
• Staff assessments or potential loss of staff
• Recurring issues
• Security concerns (this is big.. Really)
11
0914000N
What about my IT Staff?
12
0914000N
Coaches not Adversaries
13
0914000N
How does the process Work - IT
Infrastructure assessment?
Raffa Assessment Methodology
IT Structure Analysis
- Perform Interviews with key stakeholders
- Identify current/future IT needs in line with your vision
- Review current system architecture
- Review current servers and storage hardware configurations
- Review network configurations and their capacities
14
0914000N
IT Infrastructure analysis
 Review domain configurations
 Review enterprise back-office components and their configurations
 Review existing security requirements and compliance
 Review disaster recovery requirements and strategies including existing data
backup/restore mechanisms, hardware, software
 Review current Total Cost of Ownership (TCO)
15
0914000N
Who am I connected to?
My
Network
Hosting
VOIP
Managed
Services
16
0914000N
Does your network look like this?
17
0914000N
Or this?
18
0914000N
Everyone has something to protect
 Intellectual Property
 Human Resources Information
 Your Financial Data
 Your Customer Databases
 Your Customer’s Data
 Marketing and Sales Data
It’s not Just About
compliance with state and
federal regulations.
It’s about protecting your
company, your employees
and your customers.
Is it time for a Security and Compliance Assessment?
Financial
Healthcare Legal
Professional Services
19
0914000N
What are our concerns?
• Unauthorized Access
• Concerns with in-house staff
• External threats
• Privacy audit
20
0914000N
Security Considerations and Actions
 Strong password policy is the first line of defense against a data breach
STRONG PASSWORD POLICIES
Benefit: Strong password policies help to reduce the risk of a breach. Policies should also provide
guidance to reduce the risk of human error breaches. Strong passwords should meet these
standards at a minimum:
• Lower case characters
• Upper case characters
• Numbers
• "Special characters"(@#$%^&*()_+|~-=`{}[]:";'<>/)
• Contain at least 12 but preferably 15 characters.
Is it Time for a Security and Compliance Assessment?
21
0914000N
Compliance Definitions (PII)
 Definitions are generally accepted by most states
 However, exceptions do exist on a state by state basis
Personal Information: An individual’s first name or first initial and
last name plus one or more of the following data elements:
1. Social Security number,
2. Driver’s license number or state- issued ID card number
3. Account number, credit card number or debit card number
combined with any security code, access code, PIN or password
needed to access an account and generally applies to
computerized data that includes personal information.
Personal Information shall not include publicly available information
that is lawfully made available to the general public from federal,
state or local government records, or widely distributed media. In
addition, Personal Information shall not include publicly available
information that is lawfully made available to the general public from
federal, state, or local government records.
Breach of Security: The unlawful and unauthorized acquisition of
personal information that compromises the security, confidentiality,
or integrity of personal information.
DEFINITIONS
Is it Time for a Security and Compliance Assessment?
22
0914000N
Federal, state & Private Requirements
 It is important to understand that these laws don’t only apply to health
and financial institutions.
HIPAA: Health Insurance Portability and Accountability Act, a US law designed to
provide privacy standards to protect patients' medical records and other health
information provided to health plans, doctors, hospitals and other health care
providers. Developed by the Department of Health and Human Services, these
new standards provide patients with access to their medical records and more
control over how their personal health information is used and disclosed. They
represent a uniform, federal floor of privacy protections for consumers across the
country. State laws providing additional protections to consumers are not affected
by this new rule.
The Gramm-Leach-Bliley Act: (GLB Act or GLBA), is a federal law
enacted to control the ways that financial institutions deal with the private
information of individuals. The Act consists of three sections:
1. The Financial Privacy Rule, which regulates the collection and disclosure
of private financial information
2. The Safeguards Rule, which stipulates that financial institutions must
implement security programs to protect such information
3. The Pretexting provisions, which prohibit the practice of pretexting
(accessing private information using false pretenses).
The Act also requires financial institutions to give customers written privacy
notices that explain their information-sharing practices.
Is it Time for a Security and Compliance Assessment?
23
0914000N
Federal, state & Private Requirements
 The Payment Card Industry Council established rules governing how
credit card data would be secured
Short for Payment Card Industry (PCI) Data Security Standard (DSS), PCI DSS is a standard that all
organizations, including online retailers, must follow when storing, processing and transmitting
their customer's credit card data.
The Data Security Standard (DSS) was developed and the standard is maintained by
The Payment Card Industry Security Standards Council (PCI SSC). To be PCI complaint
companies must use a firewall between wireless networks and their cardholder data
environment, use the latest security and authentication such as WPA/WPA2 and also change
default settings for wired privacy keys, and use a network intrusion detection system.
The PCI DSS standard, as of September 2009 (DSS v 1.2), includes 12 requirements for best
security practices
PRIVATE REQUIREMENTS
Payment Card Industry (PCI) Data Security Standard (DSS)
Is it Time for a Security and Compliance Assessment?
24
0914000N
Security Considerations and Actions
 Security is as much about people and good process and well
documented policy as it is about your IT infrastructure
PROCESS AND PEOPLE MANAGEMENT
25
0914000N
Disaster Recovery
Vs.
Business continuity
26
0914000N
27
0914000N
IT Budget Review
28
0914000N
Questions?
Kerry Mickelson
202-955-6767
Kerry.Mickelson@marcumllp.com

Mais conteúdo relacionado

Mais procurados

Data Driven Tax Administration - new strategy for big data, BI and analytics ...
Data Driven Tax Administration - new strategy for big data, BI and analytics ...Data Driven Tax Administration - new strategy for big data, BI and analytics ...
Data Driven Tax Administration - new strategy for big data, BI and analytics ...Søren Ilsøe
 
Luxembourg Wort_QA_240314 (final)
Luxembourg Wort_QA_240314 (final) Luxembourg Wort_QA_240314 (final)
Luxembourg Wort_QA_240314 (final) Alex Blumen
 
Legal challenges for big data companies
Legal challenges for big data companiesLegal challenges for big data companies
Legal challenges for big data companiesRoger Royse
 
KYC automation using artificial intelligence (AI)
KYC automation using artificial intelligence (AI)KYC automation using artificial intelligence (AI)
KYC automation using artificial intelligence (AI)EY
 
Consolidated Markets | Operational Risk and Regulatory Compliance
Consolidated Markets | Operational Risk and Regulatory ComplianceConsolidated Markets | Operational Risk and Regulatory Compliance
Consolidated Markets | Operational Risk and Regulatory ComplianceIHS Markit
 
Artificial Intelligence and Machine Learning
Artificial Intelligence and Machine LearningArtificial Intelligence and Machine Learning
Artificial Intelligence and Machine LearningPolsinelli PC
 
Online_Transactions_PCI
Online_Transactions_PCIOnline_Transactions_PCI
Online_Transactions_PCIKelly Lam
 
Technology Risk Services
Technology Risk ServicesTechnology Risk Services
Technology Risk Servicessarah kabirat
 
Health insurance-pmo
Health insurance-pmoHealth insurance-pmo
Health insurance-pmoHal Amens
 
How to Get Proactive about your Vendor Master Data: 4 tips for success
How to Get Proactive about your Vendor Master Data: 4 tips for successHow to Get Proactive about your Vendor Master Data: 4 tips for success
How to Get Proactive about your Vendor Master Data: 4 tips for successSarah Fane
 
European Union Privacy Law - General Data Protection Regulation Checklist
European Union Privacy Law - General Data Protection Regulation ChecklistEuropean Union Privacy Law - General Data Protection Regulation Checklist
European Union Privacy Law - General Data Protection Regulation ChecklistChristina Gagnier
 
Άσπα Παλημέρη, 5th Digital Banking Forum
Άσπα Παλημέρη, 5th Digital Banking ForumΆσπα Παλημέρη, 5th Digital Banking Forum
Άσπα Παλημέρη, 5th Digital Banking ForumStarttech Ventures
 
Trends 121415 Citizens Bank
Trends 121415 Citizens BankTrends 121415 Citizens Bank
Trends 121415 Citizens BankMichael Ouellet
 
Vendor File Clean Up And Management
Vendor File Clean Up And ManagementVendor File Clean Up And Management
Vendor File Clean Up And ManagementLavante, Inc.
 
From Surveillance to Service Excellence - Big Data in Financial Services
From Surveillance to Service Excellence - Big Data in Financial ServicesFrom Surveillance to Service Excellence - Big Data in Financial Services
From Surveillance to Service Excellence - Big Data in Financial ServicesRob Rensman
 
The Basics for University Treasurers: the need-to-knows
The Basics for University Treasurers: the need-to-knowsThe Basics for University Treasurers: the need-to-knows
The Basics for University Treasurers: the need-to-knowsKyriba Corporation
 
Wollmuth Maher & Deutsch LLP -Takeaways From The SEC Cybersecurity Examinatio...
Wollmuth Maher & Deutsch LLP -Takeaways From The SEC Cybersecurity Examinatio...Wollmuth Maher & Deutsch LLP -Takeaways From The SEC Cybersecurity Examinatio...
Wollmuth Maher & Deutsch LLP -Takeaways From The SEC Cybersecurity Examinatio...Jason Glass, CFA, CISSP
 
Pci compliance
Pci compliancePci compliance
Pci compliancepcihghg23
 
Outsourcing in Insurance industry
Outsourcing in Insurance industryOutsourcing in Insurance industry
Outsourcing in Insurance industryChetan Goenka
 

Mais procurados (20)

Data Driven Tax Administration - new strategy for big data, BI and analytics ...
Data Driven Tax Administration - new strategy for big data, BI and analytics ...Data Driven Tax Administration - new strategy for big data, BI and analytics ...
Data Driven Tax Administration - new strategy for big data, BI and analytics ...
 
Luxembourg Wort_QA_240314 (final)
Luxembourg Wort_QA_240314 (final) Luxembourg Wort_QA_240314 (final)
Luxembourg Wort_QA_240314 (final)
 
Legal challenges for big data companies
Legal challenges for big data companiesLegal challenges for big data companies
Legal challenges for big data companies
 
KYC automation using artificial intelligence (AI)
KYC automation using artificial intelligence (AI)KYC automation using artificial intelligence (AI)
KYC automation using artificial intelligence (AI)
 
Consolidated Markets | Operational Risk and Regulatory Compliance
Consolidated Markets | Operational Risk and Regulatory ComplianceConsolidated Markets | Operational Risk and Regulatory Compliance
Consolidated Markets | Operational Risk and Regulatory Compliance
 
Artificial Intelligence and Machine Learning
Artificial Intelligence and Machine LearningArtificial Intelligence and Machine Learning
Artificial Intelligence and Machine Learning
 
Online_Transactions_PCI
Online_Transactions_PCIOnline_Transactions_PCI
Online_Transactions_PCI
 
Technology Risk Services
Technology Risk ServicesTechnology Risk Services
Technology Risk Services
 
Health insurance-pmo
Health insurance-pmoHealth insurance-pmo
Health insurance-pmo
 
How to Get Proactive about your Vendor Master Data: 4 tips for success
How to Get Proactive about your Vendor Master Data: 4 tips for successHow to Get Proactive about your Vendor Master Data: 4 tips for success
How to Get Proactive about your Vendor Master Data: 4 tips for success
 
European Union Privacy Law - General Data Protection Regulation Checklist
European Union Privacy Law - General Data Protection Regulation ChecklistEuropean Union Privacy Law - General Data Protection Regulation Checklist
European Union Privacy Law - General Data Protection Regulation Checklist
 
ECS IRIS Know Your Client (KYC) Solution
ECS IRIS Know Your Client (KYC) SolutionECS IRIS Know Your Client (KYC) Solution
ECS IRIS Know Your Client (KYC) Solution
 
Άσπα Παλημέρη, 5th Digital Banking Forum
Άσπα Παλημέρη, 5th Digital Banking ForumΆσπα Παλημέρη, 5th Digital Banking Forum
Άσπα Παλημέρη, 5th Digital Banking Forum
 
Trends 121415 Citizens Bank
Trends 121415 Citizens BankTrends 121415 Citizens Bank
Trends 121415 Citizens Bank
 
Vendor File Clean Up And Management
Vendor File Clean Up And ManagementVendor File Clean Up And Management
Vendor File Clean Up And Management
 
From Surveillance to Service Excellence - Big Data in Financial Services
From Surveillance to Service Excellence - Big Data in Financial ServicesFrom Surveillance to Service Excellence - Big Data in Financial Services
From Surveillance to Service Excellence - Big Data in Financial Services
 
The Basics for University Treasurers: the need-to-knows
The Basics for University Treasurers: the need-to-knowsThe Basics for University Treasurers: the need-to-knows
The Basics for University Treasurers: the need-to-knows
 
Wollmuth Maher & Deutsch LLP -Takeaways From The SEC Cybersecurity Examinatio...
Wollmuth Maher & Deutsch LLP -Takeaways From The SEC Cybersecurity Examinatio...Wollmuth Maher & Deutsch LLP -Takeaways From The SEC Cybersecurity Examinatio...
Wollmuth Maher & Deutsch LLP -Takeaways From The SEC Cybersecurity Examinatio...
 
Pci compliance
Pci compliancePci compliance
Pci compliance
 
Outsourcing in Insurance industry
Outsourcing in Insurance industryOutsourcing in Insurance industry
Outsourcing in Insurance industry
 

Semelhante a 2018-11-15 IT Assessment

2017 06-27 Time for an IT Assessment
2017 06-27 Time for an IT Assessment2017 06-27 Time for an IT Assessment
2017 06-27 Time for an IT AssessmentRachel Caldwell
 
2015 09-22 Is it time for a Security and Compliance Assessment?
2015 09-22 Is it time for a Security and Compliance Assessment?2015 09-22 Is it time for a Security and Compliance Assessment?
2015 09-22 Is it time for a Security and Compliance Assessment?Raffa Learning Community
 
The Most Wonderful Time of the Year for Health-IT...NOT
The Most Wonderful Time of the Year for Health-IT...NOTThe Most Wonderful Time of the Year for Health-IT...NOT
The Most Wonderful Time of the Year for Health-IT...NOTCompliancy Group
 
2017-01-24 Introduction of PCI and HIPAA Compliance
2017-01-24 Introduction of PCI and HIPAA Compliance2017-01-24 Introduction of PCI and HIPAA Compliance
2017-01-24 Introduction of PCI and HIPAA ComplianceRaffa Learning Community
 
2018 01-25 Introduction to PCI and HIPAA Compliance
2018 01-25 Introduction to PCI and HIPAA Compliance 2018 01-25 Introduction to PCI and HIPAA Compliance
2018 01-25 Introduction to PCI and HIPAA Compliance Raffa Learning Community
 
2016 02-23 Is it time for a Security and Compliance Assessment?
2016 02-23 Is it time for a Security and Compliance Assessment?2016 02-23 Is it time for a Security and Compliance Assessment?
2016 02-23 Is it time for a Security and Compliance Assessment?Raffa Learning Community
 
Whitepaper - Application Delivery in PCI DSS Compliant Environments
Whitepaper - Application Delivery in PCI DSS Compliant EnvironmentsWhitepaper - Application Delivery in PCI DSS Compliant Environments
Whitepaper - Application Delivery in PCI DSS Compliant EnvironmentsJason Dover
 
Privacy Do's and Don'ts for Customer Service Representatives
Privacy Do's and Don'ts for Customer Service RepresentativesPrivacy Do's and Don'ts for Customer Service Representatives
Privacy Do's and Don'ts for Customer Service RepresentativesArt Hall
 
Complying with Cybersecurity Regulations for IBM i Servers and Data
Complying with Cybersecurity Regulations for IBM i Servers and DataComplying with Cybersecurity Regulations for IBM i Servers and Data
Complying with Cybersecurity Regulations for IBM i Servers and DataPrecisely
 
Legal issues of domain names & trademarks
Legal issues of domain names & trademarksLegal issues of domain names & trademarks
Legal issues of domain names & trademarksMatt Siltala
 
Powerpoint mack jackson
Powerpoint   mack jacksonPowerpoint   mack jackson
Powerpoint mack jacksonaiimnevada
 
Responding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for MerchantsResponding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for Merchants- Mark - Fullbright
 
365 infographic-compliance
365 infographic-compliance365 infographic-compliance
365 infographic-compliance365 Data Centers
 
Corporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Corporate & Regulatory Compliance Boot Camp - Data Privacy ComplianceCorporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Corporate & Regulatory Compliance Boot Camp - Data Privacy ComplianceFinancial Poise
 
Data Security and Regulatory Compliance
Data Security and Regulatory ComplianceData Security and Regulatory Compliance
Data Security and Regulatory ComplianceLifeline Data Centers
 
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...Raleigh ISSA
 
ISO/IEC 27001 vs. CCPA and NYC Shield Act: What Are the Similarities and Diff...
ISO/IEC 27001 vs. CCPA and NYC Shield Act: What Are the Similarities and Diff...ISO/IEC 27001 vs. CCPA and NYC Shield Act: What Are the Similarities and Diff...
ISO/IEC 27001 vs. CCPA and NYC Shield Act: What Are the Similarities and Diff...PECB
 

Semelhante a 2018-11-15 IT Assessment (20)

Is it time for an IT Assessment?
Is it time for an IT Assessment?Is it time for an IT Assessment?
Is it time for an IT Assessment?
 
2017 06-27 Time for an IT Assessment
2017 06-27 Time for an IT Assessment2017 06-27 Time for an IT Assessment
2017 06-27 Time for an IT Assessment
 
2017 06-27 Time for an IT Assessment
2017 06-27 Time for an IT Assessment2017 06-27 Time for an IT Assessment
2017 06-27 Time for an IT Assessment
 
2015 09-22 Is it time for a Security and Compliance Assessment?
2015 09-22 Is it time for a Security and Compliance Assessment?2015 09-22 Is it time for a Security and Compliance Assessment?
2015 09-22 Is it time for a Security and Compliance Assessment?
 
The Most Wonderful Time of the Year for Health-IT...NOT
The Most Wonderful Time of the Year for Health-IT...NOTThe Most Wonderful Time of the Year for Health-IT...NOT
The Most Wonderful Time of the Year for Health-IT...NOT
 
2017-01-24 Introduction of PCI and HIPAA Compliance
2017-01-24 Introduction of PCI and HIPAA Compliance2017-01-24 Introduction of PCI and HIPAA Compliance
2017-01-24 Introduction of PCI and HIPAA Compliance
 
2018 01-25 Introduction to PCI and HIPAA Compliance
2018 01-25 Introduction to PCI and HIPAA Compliance 2018 01-25 Introduction to PCI and HIPAA Compliance
2018 01-25 Introduction to PCI and HIPAA Compliance
 
2016 02-23 Is it time for a Security and Compliance Assessment?
2016 02-23 Is it time for a Security and Compliance Assessment?2016 02-23 Is it time for a Security and Compliance Assessment?
2016 02-23 Is it time for a Security and Compliance Assessment?
 
Whitepaper - Application Delivery in PCI DSS Compliant Environments
Whitepaper - Application Delivery in PCI DSS Compliant EnvironmentsWhitepaper - Application Delivery in PCI DSS Compliant Environments
Whitepaper - Application Delivery in PCI DSS Compliant Environments
 
Privacy Do's and Don'ts for Customer Service Representatives
Privacy Do's and Don'ts for Customer Service RepresentativesPrivacy Do's and Don'ts for Customer Service Representatives
Privacy Do's and Don'ts for Customer Service Representatives
 
Complying with Cybersecurity Regulations for IBM i Servers and Data
Complying with Cybersecurity Regulations for IBM i Servers and DataComplying with Cybersecurity Regulations for IBM i Servers and Data
Complying with Cybersecurity Regulations for IBM i Servers and Data
 
Legal issues of domain names & trademarks
Legal issues of domain names & trademarksLegal issues of domain names & trademarks
Legal issues of domain names & trademarks
 
Powerpoint mack jackson
Powerpoint   mack jacksonPowerpoint   mack jackson
Powerpoint mack jackson
 
Data Privacy
Data PrivacyData Privacy
Data Privacy
 
Responding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for MerchantsResponding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for Merchants
 
365 infographic-compliance
365 infographic-compliance365 infographic-compliance
365 infographic-compliance
 
Corporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Corporate & Regulatory Compliance Boot Camp - Data Privacy ComplianceCorporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Corporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
 
Data Security and Regulatory Compliance
Data Security and Regulatory ComplianceData Security and Regulatory Compliance
Data Security and Regulatory Compliance
 
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...
 
ISO/IEC 27001 vs. CCPA and NYC Shield Act: What Are the Similarities and Diff...
ISO/IEC 27001 vs. CCPA and NYC Shield Act: What Are the Similarities and Diff...ISO/IEC 27001 vs. CCPA and NYC Shield Act: What Are the Similarities and Diff...
ISO/IEC 27001 vs. CCPA and NYC Shield Act: What Are the Similarities and Diff...
 

Mais de Raffa Learning Community

2018-11-8 The Changing Role of Today's CIO
2018-11-8 The Changing Role of Today's CIO2018-11-8 The Changing Role of Today's CIO
2018-11-8 The Changing Role of Today's CIORaffa Learning Community
 
2018 09-13 it essentials disaster recovery vs. business continuity
2018 09-13 it essentials disaster recovery vs. business continuity2018 09-13 it essentials disaster recovery vs. business continuity
2018 09-13 it essentials disaster recovery vs. business continuityRaffa Learning Community
 
2018-09-20 Accounting Systems Comparison Seminar
2018-09-20 Accounting Systems Comparison Seminar2018-09-20 Accounting Systems Comparison Seminar
2018-09-20 Accounting Systems Comparison SeminarRaffa Learning Community
 
2018-09-06 FASB ASC 606 - Revenue Recognition
2018-09-06 FASB ASC 606 - Revenue Recognition2018-09-06 FASB ASC 606 - Revenue Recognition
2018-09-06 FASB ASC 606 - Revenue RecognitionRaffa Learning Community
 
2018-07 Systems Integration Best Practices for Integrating Your Business Appl...
2018-07 Systems Integration Best Practices for Integrating Your Business Appl...2018-07 Systems Integration Best Practices for Integrating Your Business Appl...
2018-07 Systems Integration Best Practices for Integrating Your Business Appl...Raffa Learning Community
 
2018-07 FSG BI360 Improve Your Annual Budget Seminar
2018-07 FSG BI360 Improve Your Annual Budget Seminar 2018-07 FSG BI360 Improve Your Annual Budget Seminar
2018-07 FSG BI360 Improve Your Annual Budget Seminar Raffa Learning Community
 
2018 06-27 How to Accelerate the Month-End Close
2018 06-27 How to Accelerate the Month-End Close2018 06-27 How to Accelerate the Month-End Close
2018 06-27 How to Accelerate the Month-End CloseRaffa Learning Community
 
2018 5-8 IT Security - What You Need to Know
2018 5-8 IT Security - What You Need to Know2018 5-8 IT Security - What You Need to Know
2018 5-8 IT Security - What You Need to KnowRaffa Learning Community
 
4-25 18 Blind Spots: The Art of Self Awareness
4-25 18 Blind Spots: The Art of Self Awareness4-25 18 Blind Spots: The Art of Self Awareness
4-25 18 Blind Spots: The Art of Self AwarenessRaffa Learning Community
 
2018 4-23 The Changing Role of Today's CIO
2018 4-23 The Changing Role of Today's CIO2018 4-23 The Changing Role of Today's CIO
2018 4-23 The Changing Role of Today's CIORaffa Learning Community
 
2018 04-17 How Much Should My Nonprofit Target for Reserves?
2018 04-17 How Much Should My Nonprofit Target for Reserves?2018 04-17 How Much Should My Nonprofit Target for Reserves?
2018 04-17 How Much Should My Nonprofit Target for Reserves?Raffa Learning Community
 
2018 03-27 Effective Corporate Performance Management Best Practices
2018 03-27 Effective Corporate Performance Management Best Practices2018 03-27 Effective Corporate Performance Management Best Practices
2018 03-27 Effective Corporate Performance Management Best PracticesRaffa Learning Community
 
2018 3-14 The Changing Role of Today's CIO
2018 3-14 The Changing Role of Today's CIO2018 3-14 The Changing Role of Today's CIO
2018 3-14 The Changing Role of Today's CIORaffa Learning Community
 
2018 3-13 Federal Funding - What You Don't Know Can Hurt You!
2018 3-13 Federal Funding - What You Don't Know Can Hurt You!2018 3-13 Federal Funding - What You Don't Know Can Hurt You!
2018 3-13 Federal Funding - What You Don't Know Can Hurt You!Raffa Learning Community
 
2018 3-8 Sage Intacct - The Cloud ERP Difference
2018 3-8 Sage Intacct - The Cloud ERP Difference2018 3-8 Sage Intacct - The Cloud ERP Difference
2018 3-8 Sage Intacct - The Cloud ERP DifferenceRaffa Learning Community
 

Mais de Raffa Learning Community (20)

2018-11-15 Compliance Issues
2018-11-15 Compliance Issues2018-11-15 Compliance Issues
2018-11-15 Compliance Issues
 
2018-11-8 The Changing Role of Today's CIO
2018-11-8 The Changing Role of Today's CIO2018-11-8 The Changing Role of Today's CIO
2018-11-8 The Changing Role of Today's CIO
 
2018-9-26 Federal Funding
2018-9-26 Federal Funding2018-9-26 Federal Funding
2018-9-26 Federal Funding
 
2018-09-25 Sage Intacct for Nonprofits
2018-09-25 Sage Intacct for Nonprofits2018-09-25 Sage Intacct for Nonprofits
2018-09-25 Sage Intacct for Nonprofits
 
2018 09-13 it essentials disaster recovery vs. business continuity
2018 09-13 it essentials disaster recovery vs. business continuity2018 09-13 it essentials disaster recovery vs. business continuity
2018 09-13 it essentials disaster recovery vs. business continuity
 
2018-09-20 Accounting Systems Comparison Seminar
2018-09-20 Accounting Systems Comparison Seminar2018-09-20 Accounting Systems Comparison Seminar
2018-09-20 Accounting Systems Comparison Seminar
 
2018-09-06 FASB ASC 606 - Revenue Recognition
2018-09-06 FASB ASC 606 - Revenue Recognition2018-09-06 FASB ASC 606 - Revenue Recognition
2018-09-06 FASB ASC 606 - Revenue Recognition
 
2018-07 Systems Integration Best Practices for Integrating Your Business Appl...
2018-07 Systems Integration Best Practices for Integrating Your Business Appl...2018-07 Systems Integration Best Practices for Integrating Your Business Appl...
2018-07 Systems Integration Best Practices for Integrating Your Business Appl...
 
2018-07 FSG BI360 Improve Your Annual Budget Seminar
2018-07 FSG BI360 Improve Your Annual Budget Seminar 2018-07 FSG BI360 Improve Your Annual Budget Seminar
2018-07 FSG BI360 Improve Your Annual Budget Seminar
 
2018 06-27 How to Accelerate the Month-End Close
2018 06-27 How to Accelerate the Month-End Close2018 06-27 How to Accelerate the Month-End Close
2018 06-27 How to Accelerate the Month-End Close
 
2018 06-12 The Changing Role of the CIO
2018 06-12 The Changing Role of the CIO2018 06-12 The Changing Role of the CIO
2018 06-12 The Changing Role of the CIO
 
2018-05-31 A New Look for Nonprofits
2018-05-31 A New Look for Nonprofits2018-05-31 A New Look for Nonprofits
2018-05-31 A New Look for Nonprofits
 
2018 5-8 IT Security - What You Need to Know
2018 5-8 IT Security - What You Need to Know2018 5-8 IT Security - What You Need to Know
2018 5-8 IT Security - What You Need to Know
 
4-25 18 Blind Spots: The Art of Self Awareness
4-25 18 Blind Spots: The Art of Self Awareness4-25 18 Blind Spots: The Art of Self Awareness
4-25 18 Blind Spots: The Art of Self Awareness
 
2018 4-23 The Changing Role of Today's CIO
2018 4-23 The Changing Role of Today's CIO2018 4-23 The Changing Role of Today's CIO
2018 4-23 The Changing Role of Today's CIO
 
2018 04-17 How Much Should My Nonprofit Target for Reserves?
2018 04-17 How Much Should My Nonprofit Target for Reserves?2018 04-17 How Much Should My Nonprofit Target for Reserves?
2018 04-17 How Much Should My Nonprofit Target for Reserves?
 
2018 03-27 Effective Corporate Performance Management Best Practices
2018 03-27 Effective Corporate Performance Management Best Practices2018 03-27 Effective Corporate Performance Management Best Practices
2018 03-27 Effective Corporate Performance Management Best Practices
 
2018 3-14 The Changing Role of Today's CIO
2018 3-14 The Changing Role of Today's CIO2018 3-14 The Changing Role of Today's CIO
2018 3-14 The Changing Role of Today's CIO
 
2018 3-13 Federal Funding - What You Don't Know Can Hurt You!
2018 3-13 Federal Funding - What You Don't Know Can Hurt You!2018 3-13 Federal Funding - What You Don't Know Can Hurt You!
2018 3-13 Federal Funding - What You Don't Know Can Hurt You!
 
2018 3-8 Sage Intacct - The Cloud ERP Difference
2018 3-8 Sage Intacct - The Cloud ERP Difference2018 3-8 Sage Intacct - The Cloud ERP Difference
2018 3-8 Sage Intacct - The Cloud ERP Difference
 

Último

ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 

Último (20)

ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 

2018-11-15 IT Assessment

  • 1. marcumllp.com Time for an IT Assessment marcumllp.com Presented by: Kerry Mickelson November 15, 2018
  • 2. 2 0914000N Agenda  What we do  Why do an IT Assessment?  Is this a threat to my IT Staff?  Industry best practices  Network Infrastructure  Network Security  IT Budget Review  Disaster Recovery/Business continuity  What’s New
  • 4. 4 0914000N Not trying to scare you… but  https://youtu.be/zGUR6kao9ys
  • 5. 5 0914000N Why Do an Assessment?
  • 7. 7 0914000N Planning for the future • time for upgrades? • Preparing for an RFP • Time to introduce new technology • Improve Business Processes • PCI or HIPPa compliance • Seeking Cyber-Insurance
  • 8. 8 0914000N Risk is a business decision
  • 10. 10 0914000N Why? Was there a Problem? • Was there a server outage? • An Audit is coming up • Staff assessments or potential loss of staff • Recurring issues • Security concerns (this is big.. Really)
  • 13. 13 0914000N How does the process Work - IT Infrastructure assessment? Raffa Assessment Methodology IT Structure Analysis - Perform Interviews with key stakeholders - Identify current/future IT needs in line with your vision - Review current system architecture - Review current servers and storage hardware configurations - Review network configurations and their capacities
  • 14. 14 0914000N IT Infrastructure analysis  Review domain configurations  Review enterprise back-office components and their configurations  Review existing security requirements and compliance  Review disaster recovery requirements and strategies including existing data backup/restore mechanisms, hardware, software  Review current Total Cost of Ownership (TCO)
  • 15. 15 0914000N Who am I connected to? My Network Hosting VOIP Managed Services
  • 16. 16 0914000N Does your network look like this?
  • 18. 18 0914000N Everyone has something to protect  Intellectual Property  Human Resources Information  Your Financial Data  Your Customer Databases  Your Customer’s Data  Marketing and Sales Data It’s not Just About compliance with state and federal regulations. It’s about protecting your company, your employees and your customers. Is it time for a Security and Compliance Assessment? Financial Healthcare Legal Professional Services
  • 19. 19 0914000N What are our concerns? • Unauthorized Access • Concerns with in-house staff • External threats • Privacy audit
  • 20. 20 0914000N Security Considerations and Actions  Strong password policy is the first line of defense against a data breach STRONG PASSWORD POLICIES Benefit: Strong password policies help to reduce the risk of a breach. Policies should also provide guidance to reduce the risk of human error breaches. Strong passwords should meet these standards at a minimum: • Lower case characters • Upper case characters • Numbers • "Special characters"(@#$%^&*()_+|~-=`{}[]:";'<>/) • Contain at least 12 but preferably 15 characters. Is it Time for a Security and Compliance Assessment?
  • 21. 21 0914000N Compliance Definitions (PII)  Definitions are generally accepted by most states  However, exceptions do exist on a state by state basis Personal Information: An individual’s first name or first initial and last name plus one or more of the following data elements: 1. Social Security number, 2. Driver’s license number or state- issued ID card number 3. Account number, credit card number or debit card number combined with any security code, access code, PIN or password needed to access an account and generally applies to computerized data that includes personal information. Personal Information shall not include publicly available information that is lawfully made available to the general public from federal, state or local government records, or widely distributed media. In addition, Personal Information shall not include publicly available information that is lawfully made available to the general public from federal, state, or local government records. Breach of Security: The unlawful and unauthorized acquisition of personal information that compromises the security, confidentiality, or integrity of personal information. DEFINITIONS Is it Time for a Security and Compliance Assessment?
  • 22. 22 0914000N Federal, state & Private Requirements  It is important to understand that these laws don’t only apply to health and financial institutions. HIPAA: Health Insurance Portability and Accountability Act, a US law designed to provide privacy standards to protect patients' medical records and other health information provided to health plans, doctors, hospitals and other health care providers. Developed by the Department of Health and Human Services, these new standards provide patients with access to their medical records and more control over how their personal health information is used and disclosed. They represent a uniform, federal floor of privacy protections for consumers across the country. State laws providing additional protections to consumers are not affected by this new rule. The Gramm-Leach-Bliley Act: (GLB Act or GLBA), is a federal law enacted to control the ways that financial institutions deal with the private information of individuals. The Act consists of three sections: 1. The Financial Privacy Rule, which regulates the collection and disclosure of private financial information 2. The Safeguards Rule, which stipulates that financial institutions must implement security programs to protect such information 3. The Pretexting provisions, which prohibit the practice of pretexting (accessing private information using false pretenses). The Act also requires financial institutions to give customers written privacy notices that explain their information-sharing practices. Is it Time for a Security and Compliance Assessment?
  • 23. 23 0914000N Federal, state & Private Requirements  The Payment Card Industry Council established rules governing how credit card data would be secured Short for Payment Card Industry (PCI) Data Security Standard (DSS), PCI DSS is a standard that all organizations, including online retailers, must follow when storing, processing and transmitting their customer's credit card data. The Data Security Standard (DSS) was developed and the standard is maintained by The Payment Card Industry Security Standards Council (PCI SSC). To be PCI complaint companies must use a firewall between wireless networks and their cardholder data environment, use the latest security and authentication such as WPA/WPA2 and also change default settings for wired privacy keys, and use a network intrusion detection system. The PCI DSS standard, as of September 2009 (DSS v 1.2), includes 12 requirements for best security practices PRIVATE REQUIREMENTS Payment Card Industry (PCI) Data Security Standard (DSS) Is it Time for a Security and Compliance Assessment?
  • 24. 24 0914000N Security Considerations and Actions  Security is as much about people and good process and well documented policy as it is about your IT infrastructure PROCESS AND PEOPLE MANAGEMENT