How LA Investment Advisors Use Vulnerability Testing to Protect Their Assets (SlideShare)

Post on 22-Jan-2018

155 views 0 download

Transcript of How LA Investment Advisors Use Vulnerability Testing to Protect Their Assets (SlideShare)

How LA Investment Advisors

Use Vulnerability Testing

to Protect Their Assets

Courtesy of FPA Technology Services, Inc.

http://www.TechGuideforLAInvestmentAdvisors.com

Sponsored by

http://www.TechGuideforLAInvestmentAdvisors.com

Craig PollackFounder & CEO

A “belt and suspenders”

approach with more layers

of defense are needed:

Sponsored by

http://www.TechGuideforLAInvestmentAdvisors.com

Craig PollackFounder & CEO

web security solutions,

intrusion prevention services,

anti-spam, and more

Sponsored by

http://www.TechGuideforLAInvestmentAdvisors.com

Craig PollackFounder & CEO

Vulnerability testing,

also known as vulnerability

analysis or assessment,

is a procedure

Sponsored by

http://www.TechGuideforLAInvestmentAdvisors.com

Craig PollackFounder & CEO

that identifies and categorizes

the externally facing security

flaws in a company’s

IT infrastructure

Sponsored by

http://www.TechGuideforLAInvestmentAdvisors.com

Craig PollackFounder & CEO

Defining and Classifying

Infrastructure Resources

Sponsored by

http://www.TechGuideforLAInvestmentAdvisors.com

Craig PollackFounder & CEO

Cataloguing resources

that are used to deliver

online services and contain

confidential firm data

Sponsored by

http://www.TechGuideforLAInvestmentAdvisors.com

Craig PollackFounder & CEO

makes it easier to pinpoint

the source of a DOS (Denial of

Service) attack, hack attempt,

or malware opportunity

Sponsored by

http://www.TechGuideforLAInvestmentAdvisors.com

Craig PollackFounder & CEO

Assigning Relative Levels of

Importance to Every Resource

Sponsored by

http://www.TechGuideforLAInvestmentAdvisors.com

Craig PollackFounder & CEO

In the case of a multi-target

attack, web servers would

take priority over smartphones

Sponsored by

http://www.TechGuideforLAInvestmentAdvisors.com

Craig PollackFounder & CEO

Identifying Potential Threats

Sponsored by

http://www.TechGuideforLAInvestmentAdvisors.com

Craig PollackFounder & CEO

Internet security experts

or specially designed software

packages intentionally probe

a system or network to locate

weaknesses

Sponsored by

http://www.TechGuideforLAInvestmentAdvisors.com

Craig PollackFounder & CEO

Putting Together a Plan to Deal

with More Serious Problems First

Sponsored by

http://www.TechGuideforLAInvestmentAdvisors.com

Craig PollackFounder & CEO

Senior managers need to:

Sponsored by

http://www.TechGuideforLAInvestmentAdvisors.com

Craig PollackFounder & CEO

• Document the steps for

making major decisions,

such as quarantining any

areas of the network that

have been infiltrated

Sponsored by

http://www.TechGuideforLAInvestmentAdvisors.com

Craig PollackFounder & CEO

• Identify the personnel

who are integral

to incident response

and business continuity

Sponsored by

http://www.TechGuideforLAInvestmentAdvisors.com

Craig PollackFounder & CEO

• Ensure that response plans

are available to all

employees in the firm, and

that everyone knows what

they need to do in the event

of a security breach

Sponsored by

http://www.TechGuideforLAInvestmentAdvisors.com

Craig PollackFounder & CEO

Defining and Implementing

Ways to Minimize Attack

Consequences

Sponsored by

http://www.TechGuideforLAInvestmentAdvisors.com

Craig PollackFounder & CEO

The following steps are also

recommended to ensure

data integrity:

Sponsored by

http://www.TechGuideforLAInvestmentAdvisors.com

Craig PollackFounder & CEO

• Encrypt all sensitive data

so it becomes harder for

attackers to steal

Sponsored by

http://www.TechGuideforLAInvestmentAdvisors.com

Craig PollackFounder & CEO

• Provide employees with

access only to the files and

applications they need

to do their jobs

Sponsored by

http://www.TechGuideforLAInvestmentAdvisors.com

Craig PollackFounder & CEO

• Implement a two-factor

authentication process:

do not rely on passwords

alone

Sponsored by

http://www.TechGuideforLAInvestmentAdvisors.com

Craig PollackFounder & CEO

Bottom Line

Sponsored by

http://www.TechGuideforLAInvestmentAdvisors.com

Craig PollackFounder & CEO

There are many ways to

address your new found

vulnerabilities

Sponsored by

http://www.TechGuideforLAInvestmentAdvisors.com

Craig PollackFounder & CEO

- between business continuity

software packages and

security assessment and

remediation services

Sponsored by

http://www.TechGuideforLAInvestmentAdvisors.com

Craig PollackFounder & CEO

Has your investment firm

used vulnerability testing

on its network and systems?

Sponsored by

http://www.TechGuideforLAInvestmentAdvisors.com

Craig PollackFounder & CEO

And does it do it on a recurring

basis?

Sponsored by

http://www.TechGuideforLAInvestmentAdvisors.com

Craig PollackFounder & CEO

Let us know your thoughts

in the Comments box below

Copyright © FPA Technology Services, Inc.

Learn How to Protect Your Firm’s Technology

With the Right IT Service Provider

Download Your Free Guide

Investing in High Net Worth Clients:

The LA Investment Advisor’s Guide to Using

Technology to Manage and Grow Your Firm

Now at http://www.TechGuideforLAInvestmentAdvisors.com