+ All Categories
Home > Documents > Economic Affairs Interim Committee Identity Theft Overview ...€¦ · Microsoft PowerPoint -...

Economic Affairs Interim Committee Identity Theft Overview ...€¦ · Microsoft PowerPoint -...

Date post: 08-Aug-2020
Category:
Upload: others
View: 1 times
Download: 0 times
Share this document with a friend
2
1 1 Economic Affairs Interim Committee Identity Theft Overview Government IT Presentation Agenda •It’s a hostile world outside; complex inside •Responsibilities within the State •Key Issue •Actions completed/underway/anticipated October 28, 2005 Mike Boyer MT Dept of Admin/ITSD 2 Hostile Outside; Complex Inside Threats from the outside Unauthorized attempts to enter the State network: 1.5 Billion successful: 0 Virus exposures: 1,540,000 “infections”: 36 workstations Complexity challenges from the inside Vast amounts of data: est. 50 TB (trillion characters) Personal data scattered throughout the State 758 server computers in 211 sites About half housed in 55 sites/“data centers” in Helena area CY2004 FY2004/2005 Biennial Report 3 Data Security Responsibilities Agency heads responsible for the security of the data maintained/stored by their agency. Montana Information Technology Act (MCA 2-17-533) DoA/CIO responsible for oversight and assistance (MCA 2-17-534) Policies & standards – Education – Assistance Policy & standards enforcement (MCA 2-17-512) Computer Security Incident Response Team Enterprise-wide incident response Uses Incident Command System
Transcript
Page 1: Economic Affairs Interim Committee Identity Theft Overview ...€¦ · Microsoft PowerPoint - Identity theft 10-28-05.ppt [Read-Only] Author: cl4640 Created Date: 2/3/2006 3:38:32

1

1

Economic Affairs Interim CommitteeIdentity Theft Overview

Government IT Presentation

Agenda•It’s a hostile world outside; complex inside•Responsibilities within the State•Key Issue•Actions completed/underway/anticipated

October 28, 2005Mike BoyerMT Dept of Admin/ITSD

2

Hostile Outside; Complex Inside

• Threats from the outside– Unauthorized attempts to enter the State network:

1.5 Billion successful: 0– Virus exposures:

1,540,000 “infections”: 36 workstations• Complexity challenges from the inside

– Vast amounts of data: est. 50 TB (trillion characters)

– Personal data scattered throughout the State – 758 server computers in 211 sites– About half housed in 55 sites/“data centers” in

Helena area

CY2004

FY2004/2005Biennial Report

3

Data Security Responsibilities

• Agency heads responsible for the security of the data maintained/stored by their agency.– Montana Information Technology Act (MCA 2-17-533)

• DoA/CIO responsible for oversight and assistance (MCA 2-17-534)

– Policies & standards – Education– Assistance– Policy & standards enforcement (MCA 2-17-512)

• Computer Security Incident Response Team– Enterprise-wide incident response– Uses Incident Command System

Page 2: Economic Affairs Interim Committee Identity Theft Overview ...€¦ · Microsoft PowerPoint - Identity theft 10-28-05.ppt [Read-Only] Author: cl4640 Created Date: 2/3/2006 3:38:32

2

4

Key Issue

• Attention has been focused on prevention of a breach; less focus on response– State has done a very good job preventing

security breaches– Must assume a breach will occur … we are not

adequately prepared to respond when it occurs

5

Actions Completed/Underway/Anticipated

• PC Disposal (“cleansing”) Policy/Process– Completed - Policy & process in response to audit– Underway – working on more effective process

• Continue prevention improvements• Breach response policies to assure

consistent, appropriate responses– Anticipate significant effort in coming months– Align with Security Breach law (MCA 30-14-1704)

• (Effective March 1, 2006)

– Leverage CSIRT into agency breaches– Best practices – NASCIO has published

guidelines for policy creation


Recommended