Matthew Speare
Senior Vice President
M&T BANK
Amherst, New York
With data breaches making headlines and with new and growing threats
coming from disgruntled insiders, viruses/worms, corporate espionage,
cyber-terrorism, and information warfare, there is a heightened concern
over information assurance. Today, largely invisible enemies launch
daily attacks on nearly every major corporation and government agency,
and rapidly adapt their tactics to address countermeasures. As the
threat model evolves, traditional "perimeter" security measures are no
longer adequate to protect sensitive information. It's time for
enterprises to consider a number of time-tested techniques and
principles to prepare for such electronic warfare. This session will
present the newest techniques that help address evolving computer
security threats. In this session attendees will learn:
How to apply time-tested risk management techniques to address
evolving computer security threats, including multi-level security,
compartmentalization, need-to-know, cryptography, layered defense,
concentration of data flow, role separation, two-factor authentication,
key rotation etc.
How to evaluate your security infrastructure to identify the most
appropriate protection measures for your organization.
How to deploy a security model that ensures that missioncritical
data is backed up, replicated, and accessible, and enables
organizations to completely retrieve data after such unplanned events
as system failures, operational outages, and cyber threats.
A list of common vulnerabilities and the newest attack techniques
along with recommendations on addressing these issues to effectively
protect sensitive information