SlideShare uma empresa Scribd logo
1 de 17
Information Security
Computer Engineer
Tim Warren
Company: Neuberger Berman
Industry: Financial Services
 We manage investments for
people and institutions
Located: New York
Title: Lead Engineer/Vice President
What my office looks like
What Is Information Security
 Information Security is the process of keeping information
secure: maintaining
 Confidentiality
 Integrity
 Availability
 The terms information security, computer security and
information assurance are frequently used interchangeably.
These fields are interrelated and share the common goals of
protecting the confidentiality, integrity and availability of
information; however, there are some subtle differences
between them.
Information Security Programs
 Companies build programs to run their Infosec departments
 Infosec programs are built around the core objectives of the CIA triad:
 Confidentiality
 Integrity
 Availability of IT systems and business data.
 These objectives ensure that sensitive information is only
 disclosed to authorized parties (confidentiality)
 prevent unauthorized modification of data (integrity)
 guarantee the data can be accessed by authorized parties (availability).
What are the subject mater areas of
Information Security
Information Security Organizations
 Large enterprises create a dedicated security group to implement and maintain the
organization's InfoSec program.
 The security group is generally for conducting risk management, a process through which
vulnerabilities and threats to information assets are continuously assessed, and the appropriate
protective controls are decided on and applied.
 The goal in part is to protect the organization from
Ransom warePhishing Attacks Identity TheftMalware
Information Security Organizations
Jobs within the information security field vary in their titles, but some common
designations include :
 Chief Information Security Officer (CISO)
 $103,071 - $214,236
 Chief Security Officer (CSO)
 $64,735 - $200,000
 Security Engineer
 57,254 - $125,073
 Information Security Analyst
 $49,478 - $102,185
 Security Systems Administrator
 $41,197 - $97,375
 IT Security Consultant
 $53,206 - $108,696
Employment outlook
Driver of Increased Demand
What do I do?
Information Security
Identity Management(IdM)
 In computer security, identity and access management (IdM) is the security and business
discipline that "enables the right individuals to access the right resources at the right
times and for the right reasons". It addresses the need to ensure appropriate access to
resources across increasingly heterogeneous technology environments and to meet
increasingly rigorous compliance requirements.[1]
 IdM covers issues such as how users:
 gain an identity
 the protection of that identity
 the technologies supporting that protection (e.g., network
protocols, digital certificates, passwords, etc.).
What does my
day look like?
Daily
 Ensure that User records where processed in over night batch jobs
 Communicate to hiring mangers their users status
 Check application logs for errors
 Update project status
 Plan for afterhours and weekend changes
 New project initiation
 Engineering for new integrations
 Level 3 support
Systems
 Active Directory – For authentication and group membership
 Virtual Directories for authentication and attribute extension
 Secure Token – Token for 2nd factor authentication
 Public Key Infrastructure PKI, SSL/TLS Certificates and encryption
 Single Sign On(SSO)
 User Onboarding systems
 Help Desk management of users
 Employee Information systems
Additional Questions
 Education requirements after high school?
 A minimum of an Bachelors Degree for entry level positions
 For advance positions at least 5+ years of additional experience
 What should students take to prepare themselves for this career?
 Mathematics
 Programming
 Psychology
 Advice
 The security landscape changes day to day. Ground yourself in the basic concepts you need to know
such as
 Fundamental computer science or how a computer works. CPU’s, RAM, registers, gates, etc
 TCP/IP networking and routing
Resources
 Your Librarian – Yes your library
 Security Now – Podcast/Webcast
 https://twit.tv/shows/security-now
 How the Internet works https://twit.tv/shows/security-now/episodes/309
 How SSL/TLS Works https://twit.tv/shows/security-now/episodes/195
 SANS Institute – Information Security Resources
 https://www.sans.org/security-resources/

Mais conteúdo relacionado

Mais procurados

Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentationParab Mishra
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and securitySharath Raj
 
Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to CybersecurityKrutarth Vasavada
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Securitybelsis
 
Information security management system (isms) overview
Information security management system (isms) overviewInformation security management system (isms) overview
Information security management system (isms) overviewJulia Urbina-Pineda
 
Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Radar Cyber Security
 
Introduction To Computer Security
Introduction To Computer SecurityIntroduction To Computer Security
Introduction To Computer SecurityVibrant Event
 
CYBER SECURITY.pptx
CYBER SECURITY.pptxCYBER SECURITY.pptx
CYBER SECURITY.pptxMalu704065
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amosAmos Oyoo
 

Mais procurados (20)

Introduction to Information Security
Introduction to Information Security Introduction to Information Security
Introduction to Information Security
 
Information security
Information securityInformation security
Information security
 
Cyber security
Cyber securityCyber security
Cyber security
 
CyberSecurity
CyberSecurityCyberSecurity
CyberSecurity
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Information security
Information securityInformation security
Information security
 
Information security
Information securityInformation security
Information security
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to Cybersecurity
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Security
 
Information security management system (isms) overview
Information security management system (isms) overviewInformation security management system (isms) overview
Information security management system (isms) overview
 
Basic malware analysis
Basic malware analysis Basic malware analysis
Basic malware analysis
 
Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025
 
Information security
Information securityInformation security
Information security
 
Introduction To Computer Security
Introduction To Computer SecurityIntroduction To Computer Security
Introduction To Computer Security
 
CYBER SECURITY.pptx
CYBER SECURITY.pptxCYBER SECURITY.pptx
CYBER SECURITY.pptx
 
ISO 27001 - Information Security Management System
ISO 27001 - Information Security Management SystemISO 27001 - Information Security Management System
ISO 27001 - Information Security Management System
 
CYBER SECURITY
CYBER SECURITY CYBER SECURITY
CYBER SECURITY
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amos
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 

Destaque

Ps4 vs xbox one | àlex Gómez i Arnau Marín
Ps4 vs xbox one | àlex Gómez i Arnau MarínPs4 vs xbox one | àlex Gómez i Arnau Marín
Ps4 vs xbox one | àlex Gómez i Arnau MarínTheFirecraker
 
iPhone Cost Components
iPhone Cost ComponentsiPhone Cost Components
iPhone Cost ComponentsMekko Graphics
 
Open Access. La valutazione della ricerca oltre le divisioni tra le scienze
Open Access. La valutazione della ricerca oltre le divisioni tra le scienzeOpen Access. La valutazione della ricerca oltre le divisioni tra le scienze
Open Access. La valutazione della ricerca oltre le divisioni tra le scienzeFrancesca Di Donato
 
168 wzy6bxfkuj elaboraciondeproyectos (1)
168 wzy6bxfkuj elaboraciondeproyectos (1)168 wzy6bxfkuj elaboraciondeproyectos (1)
168 wzy6bxfkuj elaboraciondeproyectos (1)suarez10
 
РосАгроЗдрав
РосАгроЗдравРосАгроЗдрав
РосАгроЗдравMitrus
 
Incident Response
Incident Response Incident Response
Incident Response InnoTech
 
Mobile device security
Mobile device securityMobile device security
Mobile device securityLisa Herrera
 

Destaque (18)

CV MAURIZIO PIPINO
CV MAURIZIO PIPINOCV MAURIZIO PIPINO
CV MAURIZIO PIPINO
 
Call of Duty
Call of DutyCall of Duty
Call of Duty
 
Ps4 vs xbox one | àlex Gómez i Arnau Marín
Ps4 vs xbox one | àlex Gómez i Arnau MarínPs4 vs xbox one | àlex Gómez i Arnau Marín
Ps4 vs xbox one | àlex Gómez i Arnau Marín
 
iPhone Cost Components
iPhone Cost ComponentsiPhone Cost Components
iPhone Cost Components
 
Open Access. La valutazione della ricerca oltre le divisioni tra le scienze
Open Access. La valutazione della ricerca oltre le divisioni tra le scienzeOpen Access. La valutazione della ricerca oltre le divisioni tra le scienze
Open Access. La valutazione della ricerca oltre le divisioni tra le scienze
 
168 wzy6bxfkuj elaboraciondeproyectos (1)
168 wzy6bxfkuj elaboraciondeproyectos (1)168 wzy6bxfkuj elaboraciondeproyectos (1)
168 wzy6bxfkuj elaboraciondeproyectos (1)
 
РосАгроЗдрав
РосАгроЗдравРосАгроЗдрав
РосАгроЗдрав
 
Eyra cedeño
Eyra cedeñoEyra cedeño
Eyra cedeño
 
Las contribuciones.
Las contribuciones.Las contribuciones.
Las contribuciones.
 
La grandeza de nuestro universo
La grandeza de nuestro universoLa grandeza de nuestro universo
La grandeza de nuestro universo
 
Doc1
Doc1Doc1
Doc1
 
Incident Response
Incident Response Incident Response
Incident Response
 
Capuchino 2017
Capuchino 2017Capuchino 2017
Capuchino 2017
 
Mobile device security
Mobile device securityMobile device security
Mobile device security
 
Скарбничка професіонала
Скарбничка професіоналаСкарбничка професіонала
Скарбничка професіонала
 
Kant: el formalisme ètic
Kant: el formalisme èticKant: el formalisme ètic
Kant: el formalisme ètic
 
Què és la ciència?
Què és la ciència?Què és la ciència?
Què és la ciència?
 
Big data
Big dataBig data
Big data
 

Semelhante a Information security[277]

Unit 1 Information Security.docx
Unit 1 Information Security.docxUnit 1 Information Security.docx
Unit 1 Information Security.docxPrernaThakwani
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfAnil
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfAnil
 
E-Commerce Privacy and Security System
E-Commerce Privacy and Security SystemE-Commerce Privacy and Security System
E-Commerce Privacy and Security SystemIJERA Editor
 
E-Commerce Privacy and Security System
E-Commerce Privacy and Security SystemE-Commerce Privacy and Security System
E-Commerce Privacy and Security SystemIJERA Editor
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxcuddietheresa
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxsalmonpybus
 
Fundamentals of-information-security
Fundamentals of-information-security Fundamentals of-information-security
Fundamentals of-information-security madunix
 
Causes And Consequences Of Data Leakage
Causes And Consequences Of Data LeakageCauses And Consequences Of Data Leakage
Causes And Consequences Of Data LeakagePatty Buckley
 
Information Security Analyst- Infosec train
Information Security Analyst- Infosec trainInformation Security Analyst- Infosec train
Information Security Analyst- Infosec trainInfosecTrain
 
Presentation 1.pptx
Presentation 1.pptxPresentation 1.pptx
Presentation 1.pptxrabeetkashif
 
Chapter 6 Security of Information and Cyber Security(FASS)
Chapter 6 Security of Information and Cyber Security(FASS)Chapter 6 Security of Information and Cyber Security(FASS)
Chapter 6 Security of Information and Cyber Security(FASS)Md Shaifullar Rabbi
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfCareerera
 
CompTIA CySA+ Domain 2 Software and Systems Security.pptx
CompTIA CySA+ Domain 2 Software and Systems Security.pptxCompTIA CySA+ Domain 2 Software and Systems Security.pptx
CompTIA CySA+ Domain 2 Software and Systems Security.pptxInfosectrain3
 
All About Network Security & its Essentials.pptx
All About Network Security & its Essentials.pptxAll About Network Security & its Essentials.pptx
All About Network Security & its Essentials.pptxInfosectrain3
 
Cyber and information security operations and assurance
Cyber and information security operations and assurance Cyber and information security operations and assurance
Cyber and information security operations and assurance EyesOpen Association
 
Security policy case study
Security policy case studySecurity policy case study
Security policy case studyashu6
 
Awareness Security Session 2023 v1.0.pptx.pdf
Awareness Security Session 2023 v1.0.pptx.pdfAwareness Security Session 2023 v1.0.pptx.pdf
Awareness Security Session 2023 v1.0.pptx.pdfAbdullahKanash
 

Semelhante a Information security[277] (20)

Unit 1 Information Security.docx
Unit 1 Information Security.docxUnit 1 Information Security.docx
Unit 1 Information Security.docx
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
 
E-Commerce Privacy and Security System
E-Commerce Privacy and Security SystemE-Commerce Privacy and Security System
E-Commerce Privacy and Security System
 
E-Commerce Privacy and Security System
E-Commerce Privacy and Security SystemE-Commerce Privacy and Security System
E-Commerce Privacy and Security System
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docx
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docx
 
Fundamentals of-information-security
Fundamentals of-information-security Fundamentals of-information-security
Fundamentals of-information-security
 
Causes And Consequences Of Data Leakage
Causes And Consequences Of Data LeakageCauses And Consequences Of Data Leakage
Causes And Consequences Of Data Leakage
 
Information Security Analyst- Infosec train
Information Security Analyst- Infosec trainInformation Security Analyst- Infosec train
Information Security Analyst- Infosec train
 
Presentation 1.pptx
Presentation 1.pptxPresentation 1.pptx
Presentation 1.pptx
 
Chapter 6 Security of Information and Cyber Security(FASS)
Chapter 6 Security of Information and Cyber Security(FASS)Chapter 6 Security of Information and Cyber Security(FASS)
Chapter 6 Security of Information and Cyber Security(FASS)
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdf
 
CompTIA CySA+ Domain 2 Software and Systems Security.pptx
CompTIA CySA+ Domain 2 Software and Systems Security.pptxCompTIA CySA+ Domain 2 Software and Systems Security.pptx
CompTIA CySA+ Domain 2 Software and Systems Security.pptx
 
Hacking the Helpdesk, Craig Clark
Hacking the Helpdesk, Craig ClarkHacking the Helpdesk, Craig Clark
Hacking the Helpdesk, Craig Clark
 
Hacking the Helpdesk: Social Engineering Risks
Hacking the Helpdesk: Social Engineering RisksHacking the Helpdesk: Social Engineering Risks
Hacking the Helpdesk: Social Engineering Risks
 
All About Network Security & its Essentials.pptx
All About Network Security & its Essentials.pptxAll About Network Security & its Essentials.pptx
All About Network Security & its Essentials.pptx
 
Cyber and information security operations and assurance
Cyber and information security operations and assurance Cyber and information security operations and assurance
Cyber and information security operations and assurance
 
Security policy case study
Security policy case studySecurity policy case study
Security policy case study
 
Awareness Security Session 2023 v1.0.pptx.pdf
Awareness Security Session 2023 v1.0.pptx.pdfAwareness Security Session 2023 v1.0.pptx.pdf
Awareness Security Session 2023 v1.0.pptx.pdf
 

Último

Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 

Último (20)

Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 

Information security[277]

  • 2. Tim Warren Company: Neuberger Berman Industry: Financial Services  We manage investments for people and institutions Located: New York Title: Lead Engineer/Vice President
  • 3. What my office looks like
  • 4. What Is Information Security  Information Security is the process of keeping information secure: maintaining  Confidentiality  Integrity  Availability  The terms information security, computer security and information assurance are frequently used interchangeably. These fields are interrelated and share the common goals of protecting the confidentiality, integrity and availability of information; however, there are some subtle differences between them.
  • 5. Information Security Programs  Companies build programs to run their Infosec departments  Infosec programs are built around the core objectives of the CIA triad:  Confidentiality  Integrity  Availability of IT systems and business data.  These objectives ensure that sensitive information is only  disclosed to authorized parties (confidentiality)  prevent unauthorized modification of data (integrity)  guarantee the data can be accessed by authorized parties (availability).
  • 6. What are the subject mater areas of Information Security
  • 7. Information Security Organizations  Large enterprises create a dedicated security group to implement and maintain the organization's InfoSec program.  The security group is generally for conducting risk management, a process through which vulnerabilities and threats to information assets are continuously assessed, and the appropriate protective controls are decided on and applied.  The goal in part is to protect the organization from Ransom warePhishing Attacks Identity TheftMalware
  • 8. Information Security Organizations Jobs within the information security field vary in their titles, but some common designations include :  Chief Information Security Officer (CISO)  $103,071 - $214,236  Chief Security Officer (CSO)  $64,735 - $200,000  Security Engineer  57,254 - $125,073  Information Security Analyst  $49,478 - $102,185  Security Systems Administrator  $41,197 - $97,375  IT Security Consultant  $53,206 - $108,696
  • 11. What do I do?
  • 12. Information Security Identity Management(IdM)  In computer security, identity and access management (IdM) is the security and business discipline that "enables the right individuals to access the right resources at the right times and for the right reasons". It addresses the need to ensure appropriate access to resources across increasingly heterogeneous technology environments and to meet increasingly rigorous compliance requirements.[1]  IdM covers issues such as how users:  gain an identity  the protection of that identity  the technologies supporting that protection (e.g., network protocols, digital certificates, passwords, etc.).
  • 13. What does my day look like?
  • 14. Daily  Ensure that User records where processed in over night batch jobs  Communicate to hiring mangers their users status  Check application logs for errors  Update project status  Plan for afterhours and weekend changes  New project initiation  Engineering for new integrations  Level 3 support
  • 15. Systems  Active Directory – For authentication and group membership  Virtual Directories for authentication and attribute extension  Secure Token – Token for 2nd factor authentication  Public Key Infrastructure PKI, SSL/TLS Certificates and encryption  Single Sign On(SSO)  User Onboarding systems  Help Desk management of users  Employee Information systems
  • 16. Additional Questions  Education requirements after high school?  A minimum of an Bachelors Degree for entry level positions  For advance positions at least 5+ years of additional experience  What should students take to prepare themselves for this career?  Mathematics  Programming  Psychology  Advice  The security landscape changes day to day. Ground yourself in the basic concepts you need to know such as  Fundamental computer science or how a computer works. CPU’s, RAM, registers, gates, etc  TCP/IP networking and routing
  • 17. Resources  Your Librarian – Yes your library  Security Now – Podcast/Webcast  https://twit.tv/shows/security-now  How the Internet works https://twit.tv/shows/security-now/episodes/309  How SSL/TLS Works https://twit.tv/shows/security-now/episodes/195  SANS Institute – Information Security Resources  https://www.sans.org/security-resources/

Notas do Editor

  1. Information security is concerned with the confidentiality, integrity and availability of data regardless of the form the data may take People confuse Information with computer security and cyber security
  2. Companies develop information security programs around a model know as the CIA Confidentiality Integrity Availability of IT systems and business data. These objectives ensure that sensitive information is only disclosed to authorized parties (confidentiality) prevent unauthorized modification of data (integrity) guarantee the data can be accessed by authorized parties (availability).
  3. What are the subject that make up Information security? Network Security Access Controls Business Continuity Confidentiality Risk Assessment Compliance
  4. To deter attackers and mitigate vulnerabilities at various points, multiple security controls are implemented and coordinated as part of a layered defense in depth strategy. This should minimize the impact of an attack. To be prepared for a security breach, security groups develop incident response plan (IRP). This should allow them to contain and limit the damage, remove the cause and apply updated defense controls.