• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • About
    • Secure360
    • UMSA
    • Get Involved
  • Events
    • Secure360 2021
    • Student360
    • Past Events
      • 2020 Secure360 Twin Cities
      • 2020 Student360
      • 2019 Secure360 Twin Cities
      • 2019 Student360
      • 2018 Secure360 Twin Cities
      • 2018 Secure360 Wisconsin
      • 2018 Student360
      • 2017 Secure360 Twin Cities
      • 2017 Student360
      • 2016 TC Secure360 Conference
      • 2015 Secure360 Conference
      • 2014 Secure360 Conference
      • 2013 Secure360 Conference
        • 2013 Secure360 Conference Speaker Presentations
      • 2012 Secure360 Conference
  • For Sponsors
    • Secure360 Twin Cities
    • Student360 Sponsors
  • For Speakers
    • Secure360 Speaker Details
    • Student360 Speaker Details
  • Blog
  • Nav Social Menu

    • Facebook
    • LinkedIn
    • Twitter
    • Vimeo

Secure360

Physical Access Controls Mitigate SE Risks

Physical security is an often an afterthought when it comes to data and system security in the technology world today. Physical security is just as critical as a timely patch management program, strong password policies and appropriate user permissions. You can take measures to harden your servers and network as much as possible, but it will not make any difference if someone is able to gain access to your facility and ultimately a keyboard, USB port or steal hardware right out from under you. The most effective approach to securing the physical business environment is to apply a defense-in-depth methodology, or “layered defense model.” Physical security can be compromised in a number of ways, the least of which can be done through social engineering.

View presentation slides.

Key learning points:
  • Sound physical security measures to protect critical assets
  • Social engineering risks associated with deficiencies in physical security
  • Attacker motivations, “big picture” threat landscape, and top trends
  • Key areas of control your organization should have in place to improve the security posture, RFID access card cloning

About Laura Faulkner

Laura Faulkner is a Manager at CliftonLarsonAllen LLP in the Information Security & Advisory Services Group. Laura has over 4 years of information security consulting experience. Laura’s experience consists of IT Auditing including General Controls Review and Vulnerability Assessments, IT Risk Assessments and Controls Assessments. Prior to her manager role, Laura spent over 9 years working with CliftonLarsonAllen’s internal Information Technology Group. Laura graduated from Chestnut Hill College in Philadelphia, PA with a Bachelor of Business and Accounting degree.

About Peter Storm

Pete is a Senior Information Security Consultant in the CliftonLarsonAllen LLP (CliftonLarsonAllen) Information Security & Advisory Services Group. Pete’s experience includes Social Engineering, Incident Response and Computer Forensics, Penetration Testing and IT Security Consulting. Pete’s industry experience in professional services includes financial services, health care, manufacturing, government and non-profit. Pete graduated from the University of Wisconsin – Eau Claire with a bachelor’s degree in Business Administration, double majoring in Accounting and Information Systems. He is a Certified Public Accountant (CPA) and a member of the American Institute of Certified Public Accountants (AICPA). He also holds certifications for GIAC Certified Forensic Analyst (GCFA) and Certified Fraud Examiner (CFE) with membership in the Association of Certified Fraud Examiners. Pete is also a member of the High Technology Crime Investigation Association (HTCIA) and the InfraGard.

Primary Sidebar

Details

Tuesday May 13, 2014
2:50 PM - 3:50 PM
Room 13
Level: Intermediate
Focus: Physical Security,

Share this page

Share on Facebook
Facebook
Tweet about this on Twitter
Twitter
Share on LinkedIn
Linkedin
Buffer this page
Buffer
Email this to someone
email

Footer

Contact

For more information about UMSA events, contact: Marie Strawser

Email List Signup

Join our email list for monthly Secure360 news and updates!




Join our tradeshow email list for updates on sponsorship opportunities and upcoming exhibitor deadlines.

Sponsored by:
© 2021 Secure360. All rights reserved.