![Page 1: Thomas Ianuzzi, CPP, CISSP, CFE, CCE Information Security Consultants, Inc](https://reader035.vdocuments.us/reader035/viewer/2022062306/5a4d1b8e7f8b9ab0599c039b/html5/thumbnails/1.jpg)
Thomas Ianuzzi, CPP, CISSP, CFE, CCE
Information Security Consultants, Inc.
![Page 2: Thomas Ianuzzi, CPP, CISSP, CFE, CCE Information Security Consultants, Inc](https://reader035.vdocuments.us/reader035/viewer/2022062306/5a4d1b8e7f8b9ab0599c039b/html5/thumbnails/2.jpg)
It Evolved
![Page 3: Thomas Ianuzzi, CPP, CISSP, CFE, CCE Information Security Consultants, Inc](https://reader035.vdocuments.us/reader035/viewer/2022062306/5a4d1b8e7f8b9ab0599c039b/html5/thumbnails/3.jpg)
DATA LOSS -- U.S.More on $275K SettlementThe Register reports on ChoicePoint's settlement with the Federal Trade Commission. ChoicePoint will pay $275,000 and will get independent assessments of its data security
MD Bank Dumps Identities into TrashReported by: Joce Sterman It's a local bank you trust with your money and your personal information. But the M&T branch in Rodgers Forge didn't shelter all of some peoples' secrets
Lawsuits over Heartland data breach folded into oneBanks, credit unions want to be compensated for breach-related costs Computerworld - A lawsuit consolidating 16 separate class-action complaints brought by financial institutions against Heartland Payment Systems Inc. has been filed in U.S. District Court for the Southern District of Texas.
Federal Web sites knocked out by cyber attack Jul 7 10:04 PM US/EasternBy LOLITA C. BALDOR
![Page 4: Thomas Ianuzzi, CPP, CISSP, CFE, CCE Information Security Consultants, Inc](https://reader035.vdocuments.us/reader035/viewer/2022062306/5a4d1b8e7f8b9ab0599c039b/html5/thumbnails/4.jpg)
Even if you have a comprehensive security program,
there may be serious gaps.
![Page 5: Thomas Ianuzzi, CPP, CISSP, CFE, CCE Information Security Consultants, Inc](https://reader035.vdocuments.us/reader035/viewer/2022062306/5a4d1b8e7f8b9ab0599c039b/html5/thumbnails/5.jpg)
You can stop haphazard development in its tracks
A proactive approach to security will reduce the risk level you experience.
In addition, it can provide your organization with surprising benefits
![Page 6: Thomas Ianuzzi, CPP, CISSP, CFE, CCE Information Security Consultants, Inc](https://reader035.vdocuments.us/reader035/viewer/2022062306/5a4d1b8e7f8b9ab0599c039b/html5/thumbnails/6.jpg)
Investors love it because it reduces their risk.
A comprehensive security program is a major sales tool. Properly documented and presented, it can set you apart from the crowd and cinch crucial sales.
A strong hiring program results in improved morale for all employees, higher productivity and may prevent you from making the costliest mistake a company can make. Hiring the wrong person.
A strong hiring program results in improved morale for all employees, higher productivity and may prevent you from making the costliest mistake a company can make. Hiring the wrong person.
When your customers understand how well you protect their interests, your reputation soars.
![Page 7: Thomas Ianuzzi, CPP, CISSP, CFE, CCE Information Security Consultants, Inc](https://reader035.vdocuments.us/reader035/viewer/2022062306/5a4d1b8e7f8b9ab0599c039b/html5/thumbnails/7.jpg)
When you manage information technology assets securely and proactively, your equipment costs and your downtime drop dramatically.
When you work to protect your employees both on and off the job, their loyalty protects your business.
When you are prepared for disaster, you strengthen your community as well as your company and your bottom line
With a pervasive security culture, you will see the benefits on the bottom line. Your superior management capability will attract the best customers, investors and employees. Key people who want to be involved in your success
![Page 8: Thomas Ianuzzi, CPP, CISSP, CFE, CCE Information Security Consultants, Inc](https://reader035.vdocuments.us/reader035/viewer/2022062306/5a4d1b8e7f8b9ab0599c039b/html5/thumbnails/8.jpg)
The first step to great security is to know exactly where you stand.
![Page 9: Thomas Ianuzzi, CPP, CISSP, CFE, CCE Information Security Consultants, Inc](https://reader035.vdocuments.us/reader035/viewer/2022062306/5a4d1b8e7f8b9ab0599c039b/html5/thumbnails/9.jpg)
IT standards ISO or others
Accounting controlsHR practicesBusiness continuityBest practices
![Page 10: Thomas Ianuzzi, CPP, CISSP, CFE, CCE Information Security Consultants, Inc](https://reader035.vdocuments.us/reader035/viewer/2022062306/5a4d1b8e7f8b9ab0599c039b/html5/thumbnails/10.jpg)
![Page 11: Thomas Ianuzzi, CPP, CISSP, CFE, CCE Information Security Consultants, Inc](https://reader035.vdocuments.us/reader035/viewer/2022062306/5a4d1b8e7f8b9ab0599c039b/html5/thumbnails/11.jpg)
Levels of Maturity
More Mature
Less Mature
Non Existent Ad hoc Repeatable
but IntuitiveDefined Process
Managed & MeasurableOptimized
![Page 12: Thomas Ianuzzi, CPP, CISSP, CFE, CCE Information Security Consultants, Inc](https://reader035.vdocuments.us/reader035/viewer/2022062306/5a4d1b8e7f8b9ab0599c039b/html5/thumbnails/12.jpg)
• Logical testing (vulnerability and penetration testing)
• Social engineering
• Testing of disaster recovery plans
![Page 13: Thomas Ianuzzi, CPP, CISSP, CFE, CCE Information Security Consultants, Inc](https://reader035.vdocuments.us/reader035/viewer/2022062306/5a4d1b8e7f8b9ab0599c039b/html5/thumbnails/13.jpg)
Initial training and signoff
Refresher training
Training in protecting and using their laptops and home computers.
![Page 14: Thomas Ianuzzi, CPP, CISSP, CFE, CCE Information Security Consultants, Inc](https://reader035.vdocuments.us/reader035/viewer/2022062306/5a4d1b8e7f8b9ab0599c039b/html5/thumbnails/14.jpg)
• Internal Audit• IT Auditor• CPA Audit• SAS 70
– Tier 1– Tier 2
![Page 15: Thomas Ianuzzi, CPP, CISSP, CFE, CCE Information Security Consultants, Inc](https://reader035.vdocuments.us/reader035/viewer/2022062306/5a4d1b8e7f8b9ab0599c039b/html5/thumbnails/15.jpg)
![Page 16: Thomas Ianuzzi, CPP, CISSP, CFE, CCE Information Security Consultants, Inc](https://reader035.vdocuments.us/reader035/viewer/2022062306/5a4d1b8e7f8b9ab0599c039b/html5/thumbnails/16.jpg)
Contact
Information Security Consultants, Inc.
to thoroughly secure your business.