11
Advanced Virus Protection: A Strategic Blueprint to Repel the Next Attack Presented by Paul Schmehl Information Security Officer University of Texas at Dallas

Advanced Virus Protection: A Strategic Blueprint to Repel the Next Attack Presented by Paul Schmehl Information Security Officer University of Texas at

Embed Size (px)

DESCRIPTION

Why Virus Outbreaks Occur, II We’re unprepared No plan in place No procedures defined No protection in place

Citation preview

Page 1: Advanced Virus Protection: A Strategic Blueprint to Repel the Next Attack Presented by Paul Schmehl Information Security Officer University of Texas at

Advanced Virus Protection: A Strategic Blueprint to Repel the Next

Attack

Presented by Paul Schmehl

Information Security OfficerUniversity of Texas at Dallas

Page 2: Advanced Virus Protection: A Strategic Blueprint to Repel the Next Attack Presented by Paul Schmehl Information Security Officer University of Texas at

Why Virus Outbreaks Occur

We’re unaware• Virus Alert Lists• Notification Services• Security Discussion Lists

Page 3: Advanced Virus Protection: A Strategic Blueprint to Repel the Next Attack Presented by Paul Schmehl Information Security Officer University of Texas at

Why Virus Outbreaks Occur, IIWe’re unprepared• No plan in place• No procedures defined• No protection in place

Page 4: Advanced Virus Protection: A Strategic Blueprint to Repel the Next Attack Presented by Paul Schmehl Information Security Officer University of Texas at

How To Design Policies That Work

Define the problemDefine the policy’s purposeDefine the policy’s scopeDefine the policy’s limitationsDefine the policy’s enforcement

Page 5: Advanced Virus Protection: A Strategic Blueprint to Repel the Next Attack Presented by Paul Schmehl Information Security Officer University of Texas at

The Do’s and Don’tsOf Awareness Training

Do include everyoneDo establish credibilityDo be consistentDon’t assume user knowledgeDon’t cry wolf

Page 6: Advanced Virus Protection: A Strategic Blueprint to Repel the Next Attack Presented by Paul Schmehl Information Security Officer University of Texas at

How To Identify Your WeaknessesPay attention to the obviousLeverage your experiencesLearn from the mistakes of othersMine gold from your vendorsTurn lemons into lemonade

Page 7: Advanced Virus Protection: A Strategic Blueprint to Repel the Next Attack Presented by Paul Schmehl Information Security Officer University of Texas at

Effective Protective Measures

Cover every desktop, no exceptionsDon’t forget your serversLock the doors and keep them outDon’t let the buggers outLocalize the problems

Page 8: Advanced Virus Protection: A Strategic Blueprint to Repel the Next Attack Presented by Paul Schmehl Information Security Officer University of Texas at

Effective Detective Measures

Reverse intrusion detectionHoneypotsGet specificUse the tools you haveLeverage your existing products

Page 9: Advanced Virus Protection: A Strategic Blueprint to Repel the Next Attack Presented by Paul Schmehl Information Security Officer University of Texas at

Designing An EffectiveResponse System

Multiple monitoring methodsDefine the response rolesMake your decisions beforehandDon’t overreact to the crisisAlways debrief

Page 10: Advanced Virus Protection: A Strategic Blueprint to Repel the Next Attack Presented by Paul Schmehl Information Security Officer University of Texas at

Putting It All Together

Design sound policiesPreach security awarenessIdentify the weaknessesDevelop effective countermeasuresRespond proportionately

Page 11: Advanced Virus Protection: A Strategic Blueprint to Repel the Next Attack Presented by Paul Schmehl Information Security Officer University of Texas at

Thank you.

Questions, comments?