How LA Investment Advisors Use Vulnerability Testing to Protect Their Assets (SlideShare)

Click here to load reader

  • date post

    22-Jan-2018
  • Category

    Technology

  • view

    153
  • download

    0

Embed Size (px)

Transcript of How LA Investment Advisors Use Vulnerability Testing to Protect Their Assets (SlideShare)

  1. 1. How LA Investment Advisors Use Vulnerability Testing to Protect Their Assets Courtesy of FPA Technology Services, Inc. http://www.TechGuideforLAInvestmentAdvisors.com
  2. 2. Sponsored by http://www.TechGuideforLAInvestmentAdvisors.com Craig Pollack Founder & CEO A belt and suspenders approach with more layers of defense are needed:
  3. 3. Sponsored by http://www.TechGuideforLAInvestmentAdvisors.com Craig Pollack Founder & CEO web security solutions, intrusion prevention services, anti-spam, and more
  4. 4. Sponsored by http://www.TechGuideforLAInvestmentAdvisors.com Craig Pollack Founder & CEO Vulnerability testing, also known as vulnerability analysis or assessment, is a procedure
  5. 5. Sponsored by http://www.TechGuideforLAInvestmentAdvisors.com Craig Pollack Founder & CEO that identifies and categorizes the externally facing security flaws in a companys IT infrastructure
  6. 6. Sponsored by http://www.TechGuideforLAInvestmentAdvisors.com Craig Pollack Founder & CEO Defining and Classifying Infrastructure Resources
  7. 7. Sponsored by http://www.TechGuideforLAInvestmentAdvisors.com Craig Pollack Founder & CEO Cataloguing resources that are used to deliver online services and contain confidential firm data
  8. 8. Sponsored by http://www.TechGuideforLAInvestmentAdvisors.com Craig Pollack Founder & CEO makes it easier to pinpoint the source of a DOS (Denial of Service) attack, hack attempt, or malware opportunity
  9. 9. Sponsored by http://www.TechGuideforLAInvestmentAdvisors.com Craig Pollack Founder & CEO Assigning Relative Levels of Importance to Every Resource
  10. 10. Sponsored by http://www.TechGuideforLAInvestmentAdvisors.com Craig Pollack Founder & CEO In the case of a multi-target attack, web servers would take priority over smartphones
  11. 11. Sponsored by http://www.TechGuideforLAInvestmentAdvisors.com Craig Pollack Founder & CEO Identifying Potential Threats
  12. 12. Sponsored by http://www.TechGuideforLAInvestmentAdvisors.com Craig Pollack Founder & CEO Internet security experts or specially designed software packages intentionally probe a system or network to locate weaknesses
  13. 13. Sponsored by http://www.TechGuideforLAInvestmentAdvisors.com Craig Pollack Founder & CEO Putting Together a Plan to Deal with More Serious Problems First
  14. 14. Sponsored by http://www.TechGuideforLAInvestmentAdvisors.com Craig Pollack Founder & CEO Senior managers need to:
  15. 15. Sponsored by http://www.TechGuideforLAInvestmentAdvisors.com Craig Pollack Founder & CEO Document the steps for making major decisions, such as quarantining any areas of the network that have been infiltrated
  16. 16. Sponsored by http://www.TechGuideforLAInvestmentAdvisors.com Craig Pollack Founder & CEO Identify the personnel who are integral to incident response and business continuity
  17. 17. Sponsored by http://www.TechGuideforLAInvestmentAdvisors.com Craig Pollack Founder & CEO Ensure that response plans are available to all employees in the firm, and that everyone knows what they need to do in the event of a security breach
  18. 18. Sponsored by http://www.TechGuideforLAInvestmentAdvisors.com Craig Pollack Founder & CEO Defining and Implementing Ways to Minimize Attack Consequences
  19. 19. Sponsored by http://www.TechGuideforLAInvestmentAdvisors.com Craig Pollack Founder & CEO The following steps are also recommended to ensure data integrity:
  20. 20. Sponsored by http://www.TechGuideforLAInvestmentAdvisors.com Craig Pollack Founder & CEO Encrypt all sensitive data so it becomes harder for attackers to steal
  21. 21. Sponsored by http://www.TechGuideforLAInvestmentAdvisors.com Craig Pollack Founder & CEO Provide employees with access only to the files and applications they need to do their jobs
  22. 22. Sponsored by http://www.TechGuideforLAInvestmentAdvisors.com Craig Pollack Founder & CEO Implement a two-factor authentication process: do not rely on passwords alone
  23. 23. Sponsored by http://www.TechGuideforLAInvestmentAdvisors.com Craig Pollack Founder & CEO Bottom Line
  24. 24. Sponsored by http://www.TechGuideforLAInvestmentAdvisors.com Craig Pollack Founder & CEO There are many ways to address your new found vulnerabilities
  25. 25. Sponsored by http://www.TechGuideforLAInvestmentAdvisors.com Craig Pollack Founder & CEO - between business continuity software packages and security assessment and remediation services
  26. 26. Sponsored by http://www.TechGuideforLAInvestmentAdvisors.com Craig Pollack Founder & CEO Has your investment firm used vulnerability testing on its network and systems?
  27. 27. Sponsored by http://www.TechGuideforLAInvestmentAdvisors.com Craig Pollack Founder & CEO And does it do it on a recurring basis?
  28. 28. Sponsored by http://www.TechGuideforLAInvestmentAdvisors.com Craig Pollack Founder & CEO Let us know your thoughts in the Comments box below
  29. 29. Copyright FPA Technology Services, Inc. Learn How to Protect Your Firms Technology With the Right IT Service Provider Download Your Free Guide Investing in High Net Worth Clients: The LA Investment Advisors Guide to Using Technology to Manage and Grow Your Firm Now at http://www.TechGuideforLAInvestmentAdvisors.com