How LA Investment Advisors Are Securing Wireless Networks (SlideShare)
How LA Investment Advisors Use Vulnerability Testing to Protect Their Assets (SlideShare)
-
Upload
fpa-technology-services-inc -
Category
Technology
-
view
155 -
download
0
Transcript of How LA Investment Advisors Use Vulnerability Testing to Protect Their Assets (SlideShare)
How LA Investment Advisors
Use Vulnerability Testing
to Protect Their Assets
Courtesy of FPA Technology Services, Inc.
http://www.TechGuideforLAInvestmentAdvisors.com
Sponsored by
http://www.TechGuideforLAInvestmentAdvisors.com
Craig PollackFounder & CEO
A “belt and suspenders”
approach with more layers
of defense are needed:
Sponsored by
http://www.TechGuideforLAInvestmentAdvisors.com
Craig PollackFounder & CEO
web security solutions,
intrusion prevention services,
anti-spam, and more
Sponsored by
http://www.TechGuideforLAInvestmentAdvisors.com
Craig PollackFounder & CEO
Vulnerability testing,
also known as vulnerability
analysis or assessment,
is a procedure
Sponsored by
http://www.TechGuideforLAInvestmentAdvisors.com
Craig PollackFounder & CEO
that identifies and categorizes
the externally facing security
flaws in a company’s
IT infrastructure
Sponsored by
http://www.TechGuideforLAInvestmentAdvisors.com
Craig PollackFounder & CEO
Defining and Classifying
Infrastructure Resources
Sponsored by
http://www.TechGuideforLAInvestmentAdvisors.com
Craig PollackFounder & CEO
Cataloguing resources
that are used to deliver
online services and contain
confidential firm data
Sponsored by
http://www.TechGuideforLAInvestmentAdvisors.com
Craig PollackFounder & CEO
makes it easier to pinpoint
the source of a DOS (Denial of
Service) attack, hack attempt,
or malware opportunity
Sponsored by
http://www.TechGuideforLAInvestmentAdvisors.com
Craig PollackFounder & CEO
Assigning Relative Levels of
Importance to Every Resource
Sponsored by
http://www.TechGuideforLAInvestmentAdvisors.com
Craig PollackFounder & CEO
In the case of a multi-target
attack, web servers would
take priority over smartphones
Sponsored by
http://www.TechGuideforLAInvestmentAdvisors.com
Craig PollackFounder & CEO
Identifying Potential Threats
Sponsored by
http://www.TechGuideforLAInvestmentAdvisors.com
Craig PollackFounder & CEO
Internet security experts
or specially designed software
packages intentionally probe
a system or network to locate
weaknesses
Sponsored by
http://www.TechGuideforLAInvestmentAdvisors.com
Craig PollackFounder & CEO
Putting Together a Plan to Deal
with More Serious Problems First
Sponsored by
http://www.TechGuideforLAInvestmentAdvisors.com
Craig PollackFounder & CEO
Senior managers need to:
Sponsored by
http://www.TechGuideforLAInvestmentAdvisors.com
Craig PollackFounder & CEO
• Document the steps for
making major decisions,
such as quarantining any
areas of the network that
have been infiltrated
Sponsored by
http://www.TechGuideforLAInvestmentAdvisors.com
Craig PollackFounder & CEO
• Identify the personnel
who are integral
to incident response
and business continuity
Sponsored by
http://www.TechGuideforLAInvestmentAdvisors.com
Craig PollackFounder & CEO
• Ensure that response plans
are available to all
employees in the firm, and
that everyone knows what
they need to do in the event
of a security breach
Sponsored by
http://www.TechGuideforLAInvestmentAdvisors.com
Craig PollackFounder & CEO
Defining and Implementing
Ways to Minimize Attack
Consequences
Sponsored by
http://www.TechGuideforLAInvestmentAdvisors.com
Craig PollackFounder & CEO
The following steps are also
recommended to ensure
data integrity:
Sponsored by
http://www.TechGuideforLAInvestmentAdvisors.com
Craig PollackFounder & CEO
• Encrypt all sensitive data
so it becomes harder for
attackers to steal
Sponsored by
http://www.TechGuideforLAInvestmentAdvisors.com
Craig PollackFounder & CEO
• Provide employees with
access only to the files and
applications they need
to do their jobs
Sponsored by
http://www.TechGuideforLAInvestmentAdvisors.com
Craig PollackFounder & CEO
• Implement a two-factor
authentication process:
do not rely on passwords
alone
Sponsored by
http://www.TechGuideforLAInvestmentAdvisors.com
Craig PollackFounder & CEO
Bottom Line
Sponsored by
http://www.TechGuideforLAInvestmentAdvisors.com
Craig PollackFounder & CEO
There are many ways to
address your new found
vulnerabilities
Sponsored by
http://www.TechGuideforLAInvestmentAdvisors.com
Craig PollackFounder & CEO
- between business continuity
software packages and
security assessment and
remediation services
Sponsored by
http://www.TechGuideforLAInvestmentAdvisors.com
Craig PollackFounder & CEO
Has your investment firm
used vulnerability testing
on its network and systems?
Sponsored by
http://www.TechGuideforLAInvestmentAdvisors.com
Craig PollackFounder & CEO
And does it do it on a recurring
basis?
Sponsored by
http://www.TechGuideforLAInvestmentAdvisors.com
Craig PollackFounder & CEO
Let us know your thoughts
in the Comments box below
Copyright © FPA Technology Services, Inc.
Learn How to Protect Your Firm’s Technology
With the Right IT Service Provider
Download Your Free Guide
Investing in High Net Worth Clients:
The LA Investment Advisor’s Guide to Using
Technology to Manage and Grow Your Firm
Now at http://www.TechGuideforLAInvestmentAdvisors.com