SlideShare a Scribd company logo
01 INFORMATION SECURITY Using a Layered Approach Michael Kaishar, CISSP Information Security Consultant
Defense-in-Depth Layered Approach  Access Control Lists and Permissions controlled by GPO All applications published by Citrix Portal with SSL certificate security OS Hardening & Patching, BIOS Password, and Disable USB Subnets, VLANs, IDS/IPS, IPSec Firewalls, VPN, IDS/IPS Badges, PINS, Security Cameras, Locks, etc… Electronic Security Policy and Security Awareness Training Michael Kaishar, CISSP / Information Security Consultant  Policies, Procedures, & Security Awareness Physical Security Perimeter Internal Network Host Application Data
02 SECURITY AWARENESS TRAINING Web-Based Training provided by [Vendor of Choice] Michael Kaishar, CISSP / Information Security Consultant
Security Awareness Training Security Awareness Training empowers employees through a web-based delivery system supporting Information Security Policies and Acceptable Use of Electronic Communications Systems at [COMPANY].  The web-based, e-learning courses are designed to help meet compliance requirements.   Security Awareness Training Course Topics Passwords: how to create a strong password and the techniques hackers use to crack them. Viruses & Hoaxes: malware concepts and protective controls each employee can take. Social Engineering: gathering of private information through conversations, and how to avoid crossing the line from helpful to harmful. Michael Kaishar, CISSP / Information Security Consultant
03 END-USER SECURITY RECOMMENDATIONS FOR TECHNICAL SECURITY Michael Kaishar, CISSP / Information Security Consultant
End-User Security Technical Recommendation End-User Client Security  In order to mitigate the risk of data theft it is necessary to provide a secure ePC (Thin) client solution. ePC Security & Feature Configuration Recommendations RDP / ICA Connection Only Boot from Hard Drive (Disable CD/DVD/USB Booting) Enable BIOS Passwords Latest XP Service Pack. DISABLE ALL USB PORTS!! Michael Kaishar, CISSP / Information Security Consultant
04 Network Diagram RECOMMENDATION FOR A SECURE NETWORK Michael Kaishar, CISSP / Information Security Consultant
Network Security Recommendation Michael Kaishar, CISSP / Information Security Consultant

More Related Content

PDF
Defense In Depth Using NIST 800-30
PPTX
Vulnerability Assessment Presentation
PDF
Vulnerability Management
PPTX
Challenges of Vulnerability Management
PPTX
Vulnerability Assessment
PDF
SFScon 21 - Matteo Falsetti - Cybersecurity Management in the Supply Chain
PPTX
Rothke rsa 2012 building a security operations center (soc)
PDF
Security operations center 5 security controls
Defense In Depth Using NIST 800-30
Vulnerability Assessment Presentation
Vulnerability Management
Challenges of Vulnerability Management
Vulnerability Assessment
SFScon 21 - Matteo Falsetti - Cybersecurity Management in the Supply Chain
Rothke rsa 2012 building a security operations center (soc)
Security operations center 5 security controls

What's hot (20)

PPTX
Security architecture, engineering and operations
PDF
Understanding security operation.pptx
PPTX
NIST Critical Security Framework (CSF)
PDF
Vulnerability threat and attack
PDF
Building A Security Operations Center
PDF
Extended Detection and Response (XDR) An Overhyped Product Category With Ulti...
PDF
Integrated Security Operations Center (ISOC) for Cybersecurity Collaboration
PPTX
Top 20 Security Controls for a More Secure Infrastructure
PDF
Security operations center-SOC Presentation-مرکز عملیات امنیت
PPTX
AlienVault Partner Update: So Many Security Products to Sell to My Customers…...
PDF
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
PPT
Top Tactics For Endpoint Security
PPTX
SOC Architecture Workshop - Part 1
PPT
002.itsecurity bcp v1
PDF
Identifying Code Risks in Software M&A
PDF
Rothke secure360 building a security operations center (soc)
PPTX
Effective Security Operation Center - present by Reza Adineh
PDF
Walk This Way: CIS CSC and NIST CSF is the 80 in the 80/20 rule
PDF
Symantec Cyber Security Solutions | MSS and Advanced Threat Protection
PPTX
CyberSecurity Strategy For Defendable ROI
Security architecture, engineering and operations
Understanding security operation.pptx
NIST Critical Security Framework (CSF)
Vulnerability threat and attack
Building A Security Operations Center
Extended Detection and Response (XDR) An Overhyped Product Category With Ulti...
Integrated Security Operations Center (ISOC) for Cybersecurity Collaboration
Top 20 Security Controls for a More Secure Infrastructure
Security operations center-SOC Presentation-مرکز عملیات امنیت
AlienVault Partner Update: So Many Security Products to Sell to My Customers…...
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
Top Tactics For Endpoint Security
SOC Architecture Workshop - Part 1
002.itsecurity bcp v1
Identifying Code Risks in Software M&A
Rothke secure360 building a security operations center (soc)
Effective Security Operation Center - present by Reza Adineh
Walk This Way: CIS CSC and NIST CSF is the 80 in the 80/20 rule
Symantec Cyber Security Solutions | MSS and Advanced Threat Protection
CyberSecurity Strategy For Defendable ROI
Ad

Viewers also liked (8)

DOC
Implementing Two Factor Authentication Using Phone Factor
PPT
Information Security Awareness And Training Business Case For Web Based Solut...
PDF
Trustwave Cybersecurity Education Catalog
PPTX
ISO 27001 - information security user awareness training presentation -part 2
PPTX
ISO 27001 - information security user awareness training presentation - Part 1
PPT
Computer Malware
PPTX
ISO 27001 - Information security user awareness training presentation - part 3
PPT
End User Security Awareness Presentation
Implementing Two Factor Authentication Using Phone Factor
Information Security Awareness And Training Business Case For Web Based Solut...
Trustwave Cybersecurity Education Catalog
ISO 27001 - information security user awareness training presentation -part 2
ISO 27001 - information security user awareness training presentation - Part 1
Computer Malware
ISO 27001 - Information security user awareness training presentation - part 3
End User Security Awareness Presentation
Ad

Similar to Layered Approach - Information Security Recommendations (20)

PDF
Cissp certified information systems security professional - 27 th february ...
PPTX
How to Build a Winning Cybersecurity Team
PPTX
What Cybersecurity Certifications Make You The Most Money Today.pptx
DOCX
Certifications on Security - IS AUDIT
PPT
Information security management system Trg 2.ppt
PDF
ScotSecure Cyber Security Summit 2025 Edinburgh
PDF
Cisco Endpoint Security for MSSPs
PPT
Cy Cops Company Presentation
PDF
Crush Cloud Complexity, Simplify Security - Shield X
PDF
EC-Council Certified Network Defender
PDF
Cyber security course in trivandrum 1.pdf
PDF
Datasheet
PDF
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
PPTX
Surviving the lions den - how to sell SaaS services to security oriented cust...
PDF
webapplication-security-assessment-casestudy
PPTX
What is the significance of cybersecurity in cloud.pptx
PPTX
Cybersecurity in Singapore: Trends, Careers & Training Path
PPTX
What is the significance of cybersecurity in cloud.pptx
PPTX
Microsoft Security Advice ISSA Slides.pptx
PPTX
Cybersecurity Solutions in Abu Dhabi | Bluechip Gulf
Cissp certified information systems security professional - 27 th february ...
How to Build a Winning Cybersecurity Team
What Cybersecurity Certifications Make You The Most Money Today.pptx
Certifications on Security - IS AUDIT
Information security management system Trg 2.ppt
ScotSecure Cyber Security Summit 2025 Edinburgh
Cisco Endpoint Security for MSSPs
Cy Cops Company Presentation
Crush Cloud Complexity, Simplify Security - Shield X
EC-Council Certified Network Defender
Cyber security course in trivandrum 1.pdf
Datasheet
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Surviving the lions den - how to sell SaaS services to security oriented cust...
webapplication-security-assessment-casestudy
What is the significance of cybersecurity in cloud.pptx
Cybersecurity in Singapore: Trends, Careers & Training Path
What is the significance of cybersecurity in cloud.pptx
Microsoft Security Advice ISSA Slides.pptx
Cybersecurity Solutions in Abu Dhabi | Bluechip Gulf

Recently uploaded (20)

PPTX
breach-and-attack-simulation-cybersecurity-india-chennai-defenderrabbit-2025....
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
solutions_manual_-_materials___processing_in_manufacturing__demargo_.pdf
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
GamePlan Trading System Review: Professional Trader's Honest Take
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Electronic commerce courselecture one. Pdf
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Machine learning based COVID-19 study performance prediction
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Advanced IT Governance
PDF
Empathic Computing: Creating Shared Understanding
PDF
[발표본] 너의 과제는 클라우드에 있어_KTDS_김동현_20250524.pdf
PDF
Network Security Unit 5.pdf for BCA BBA.
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Modernizing your data center with Dell and AMD
breach-and-attack-simulation-cybersecurity-india-chennai-defenderrabbit-2025....
“AI and Expert System Decision Support & Business Intelligence Systems”
solutions_manual_-_materials___processing_in_manufacturing__demargo_.pdf
MYSQL Presentation for SQL database connectivity
Spectral efficient network and resource selection model in 5G networks
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
GamePlan Trading System Review: Professional Trader's Honest Take
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Electronic commerce courselecture one. Pdf
NewMind AI Monthly Chronicles - July 2025
Diabetes mellitus diagnosis method based random forest with bat algorithm
Machine learning based COVID-19 study performance prediction
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Advanced IT Governance
Empathic Computing: Creating Shared Understanding
[발표본] 너의 과제는 클라우드에 있어_KTDS_김동현_20250524.pdf
Network Security Unit 5.pdf for BCA BBA.
The AUB Centre for AI in Media Proposal.docx
The Rise and Fall of 3GPP – Time for a Sabbatical?
Modernizing your data center with Dell and AMD

Layered Approach - Information Security Recommendations

  • 1. 01 INFORMATION SECURITY Using a Layered Approach Michael Kaishar, CISSP Information Security Consultant
  • 2. Defense-in-Depth Layered Approach Access Control Lists and Permissions controlled by GPO All applications published by Citrix Portal with SSL certificate security OS Hardening & Patching, BIOS Password, and Disable USB Subnets, VLANs, IDS/IPS, IPSec Firewalls, VPN, IDS/IPS Badges, PINS, Security Cameras, Locks, etc… Electronic Security Policy and Security Awareness Training Michael Kaishar, CISSP / Information Security Consultant Policies, Procedures, & Security Awareness Physical Security Perimeter Internal Network Host Application Data
  • 3. 02 SECURITY AWARENESS TRAINING Web-Based Training provided by [Vendor of Choice] Michael Kaishar, CISSP / Information Security Consultant
  • 4. Security Awareness Training Security Awareness Training empowers employees through a web-based delivery system supporting Information Security Policies and Acceptable Use of Electronic Communications Systems at [COMPANY]. The web-based, e-learning courses are designed to help meet compliance requirements. Security Awareness Training Course Topics Passwords: how to create a strong password and the techniques hackers use to crack them. Viruses & Hoaxes: malware concepts and protective controls each employee can take. Social Engineering: gathering of private information through conversations, and how to avoid crossing the line from helpful to harmful. Michael Kaishar, CISSP / Information Security Consultant
  • 5. 03 END-USER SECURITY RECOMMENDATIONS FOR TECHNICAL SECURITY Michael Kaishar, CISSP / Information Security Consultant
  • 6. End-User Security Technical Recommendation End-User Client Security In order to mitigate the risk of data theft it is necessary to provide a secure ePC (Thin) client solution. ePC Security & Feature Configuration Recommendations RDP / ICA Connection Only Boot from Hard Drive (Disable CD/DVD/USB Booting) Enable BIOS Passwords Latest XP Service Pack. DISABLE ALL USB PORTS!! Michael Kaishar, CISSP / Information Security Consultant
  • 7. 04 Network Diagram RECOMMENDATION FOR A SECURE NETWORK Michael Kaishar, CISSP / Information Security Consultant
  • 8. Network Security Recommendation Michael Kaishar, CISSP / Information Security Consultant