Criticality of Monitoring in Digital World Ananth Kumar Mysore Subbarao 24 July 2016 presentation at 19 th Conference of ISACA Bangalore

Slides:



Advertisements
Similar presentations
GCSE ICT Networks & Security..
Advertisements

!! Are we under attack !! Consumer devices continue to invade *Corporate enterprise – just wanting to plug in* Mobile Device Management.
CS898T Mobile and Wireless Network Handheld Device Security By Yuan Chen July 25 th, 2005.
The Lucernex Cloud: A software-as-a-service solution delivered via the Cloud What is the Cloud? Cloud Computing is the future of all software applications,
RbitPoint Computer Network Monitoring Software Complete Software Solution for Controlling all computers from your desk www. samaysoftware. net.
General Operation and Facts As of 3/24/2014. Virtual Desktop 1. What is a Virtual Desktop? 2. Why VDI? 3. Installing the Virtual Desktop 4. Accessing.
Which server is right for you? Get in Contact with us
Cloud Computing COMP 1631, Winter 2011 Yanggang Chen.
Network+ Guide to Networks, Fourth Edition
DHS SECURITY INCIDENT REPORTING AND RESPONSE SECURITY INCIDENT REPORTING AND RESPONSE DHS managers, employees, and other authorized information users.
310KM Mobile Commerce Applications Lab/Tutorial 8 Part 3 Team members: Li Chun Yin Pun Hoi Lam Pun Hoi Lam Shek Hin Shing Shek Hin Shing.
Discovering Computers Fundamentals, 2011 Edition Living in a Digital World.
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Polycom event Security Briefing 12/03/14 Level 3 Managed Security.
Network+ Guide to Networks, Fourth Edition Chapter 1 An Introduction to Networking.
Data Centers and IP PBXs LAN Structures Private Clouds IP PBX Architecture IP PBX Hosting.
Mobility Methods for document access while away from the office.
1 Networks, advantages & types of What is a network? Two or more computers that are interconnected so they can exchange data, information & resources.
Network+ Guide to Networks, Fourth Edition Chapter 1 An Introduction to Networking.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
1 Panda Malware Radar Discovering hidden threats Channel Presentation Name Date.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
Physical security By Ola Abd el-latif Abbass Hassan.
Safe’n’Sec IT security solutions for enterprises of any size.
IS3220 Information Technology Infrastructure Security
Created by Alexis Ford Research done by Rebecca Tanner Ford 1.
1 (c) 2013 FabSoft. MOST Cloud Service What is a Cloud Service? A cloud service is internet-based, meaning that MOST is hosted on a server farm on the.
partizancloud.com2 Partizan – UK brand established in 2008! We manufacture equipment and develop software for modern security systems. Our solutions are.
Information Technology Acceptable Use An Overview CSTMC All Staff Meeting February 10, 2014.
SYSTEM PRESENTATION. Zhuhai Taichuan Cloud Technology Co., Ltd is a leading enterprise of high technology community and home automation products manufacturer.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Advantage of Security Systems.  Today security camera is a much needed thing to protect us and to preserve valuable properties.  Along with the home.
Introduction to Mobile-Cloud Computing. What is Mobile Cloud Computing? an infrastructure where both the data storage and processing happen outside of.
Federal Civilian. Mobile health Private network traffic management Remote monitoring Field force automation Fleet management See how to go from aging.
Engineered Security Systems, Inc. Access Control Systems CCTV Systems Asset Protection Systems Fire Alarm Systems Laptop Protection Systems Burglar Alarm.
1.4 wired and wireless networks lesson 1
Nexbase Invites You To Our Special Products
WHY VIDEO SURVELLIANCE
WHY VIDEO SURVELLIANCE
Information Technology Acceptable Use An Overview
5.1 Effects of IT on employment
WHAT IS A NETWORK TYPES OF NETWORK NETWORK HARDWARE
Cybersecurity - What’s Next? June 2017
The Office Today.
Discovering Computers 2010: Living in a Digital World Chapter 14
Information Technology 2016 Budget Presentation
Configuring Windows Firewall with Advanced Security
BUILDING A PRIVACY AND SECURITY PROGRAM FOR YOUR NON-PROFIT
Information Security Seminar
Speaker’s Name, SAP Month 00, 2017
Introduction to Computers
Smart Org Charts in Microsoft Office 365: Securely Create, Collaborate, Edit, and Share Org Charts in PowerPoint and Online with OrgWeaver Software OFFICE.
Forensics Week 11.
TIME & ATTENDANCE SYSTEM
Cloud Testing Shilpi Chugh.
FACE DETECTION BASE HOME SECURITY SYSTEM PRESENTED BY: FATIMA -TUZ- ZAHRA(05) BASRI SHAHZADI(06)
NTC 406 Competitive Success/snaptutorial.com
NTC 406 Education for Service/snaptutorial.com
PowerHub on Microsoft Azure Enables Renewable Energy Professionals to Track and Manage Projects from a Centralized Platform Accessible Anywhere MICROSOFT.
Why ISO 27001? Subtitle or presenter
MICROSOFT AZURE ISV PROFILE: ONEBE
12 STEPS TO A GDPR AWARE NETWORK
Media365 Portal by Ctrl365 is Powered by Azure and Enables Easy and Seamless Dissemination of Video for Enhanced B2C and B2B Communication MICROSOFT AZURE.
Why ISO 27001? MARIANNE ENGELBRECHT
Network+ Guide to Networks, Fourth Edition
WHY VIDEO SURVELLIANCE
WHY VIDEO SURVELLIANCE
Technology Convergence
Least and Highest Privilege Access - Need to Know
Presentation transcript:

Criticality of Monitoring in Digital World Ananth Kumar Mysore Subbarao 24 July 2016 presentation at 19 th Conference of ISACA Bangalore © 2016

Table of Contents ■IT before and after Y2K ■Risk to Data ■User Behaviour ■Monitoring.. Just a formality?? ■Typical Monitoring ■Challenges in SME ■Solution.. ISMC ■Advantages ■Case Studies ■Something to think about.. for future

IT before Y2K  IT department was known as EDP  Behind a closed doors  Servers and EDP operators hosted together  Printer in a secure room  Any data is moved out mainly as print out  Floppy only mobile storage  No remote access to Data  Software's like WordStar, Lotus and dBase used  Storage space was in few hundred MB  Network access is restricted  No Internet or WAN

IT after Y2K  IT part of every day life  Not everything behind close doors  Servers located in data center 1000s of miles away  Printer access at every nook and corner  Data access in Air, sea and Land  Terabytes on thumb size mobile storage  Data is always accessed remotely  Variety of software including cloud based  Everything is networked  Internet.. No boundaries

Risk to Data HackersInternal ThreatsLack of Awareness Cloud Storage Lack of security of mobile Devices Espionage Ever Changing Threat Landscape

User Behaviour  Need Data Access 24 / 7  End device controls very weak (especially smart or mobile devices)  Security awareness is just another activity  Working for remote locations (less secure areas)  Security controls are always meant to be for others…  Security.. What is that ?? That is not my responsibility..!!!

Monitoring.. Just a formality  Clients / auditors ask for it.. so do some logging  Default setting on devices  Physical and Technology are independent no correlation  Check logs only when there is a incident  More worried about avaliabity of server rather than data movement  User access logging not done since they need large storage space  Advanced tools used but no training of resources

Traditional Monitoring CCTV Access Control User Access Network Monitoring Independent systems not interconnected

Challenges in SME  Security requirements are high  User awareness issues  Management focus on security is distributed  Budget are low  Security team is multi tasked

Solution.. ISMC Integrated Security Monitoring Center

Advantages  Correlated View of security controls  Better control over User access and Behavior  Proactive measure to prevent any incidents  Centralized data asset monitoring  Meets International Security standards requirements  Better Management oversight

Information Lost to Competitor One of the manufacturing company lost several key market sensitive information to competitor When incident was investigated it was found one of the employee’s who was serving his notice period had stayed back in office after all this colleagues had left for the day. He printed out several documents and carried with him to his new job Could ISMC have prevent it? Yes, provide the access control logs and system access logs were integrated and review in real time

Potential Information theft prevented An Alert Security Guard found a camera phone with an employee who was coming out of a secure work area When the employee was investigated it was found, he was come on every weekend to office to take pictures of a confidential process document. Could ISMC have prevent it? Yes, provide the access control logs and system access logs were integrated and reviewed in real time

Administrator had unauthorized remote access to servers During a routine walk of system administrator bay one of the managers found a monitor had not screen locked and cursor was moving. That system was assigned to an administrator who was not in office that day. Manager enquired with other system administrators. It was found that system administrator had installed an unauthorized remote login software and was accessing that system from home. This particular system had server farm access. ISMC was a solution in this case as well. This would have helped in real time reconciliation of physical access to system logs

Something to think about..  Management will continue to see security as non-revenue generation  Security budgets are shrinking  New technologies available but very expensive  We do lots of certification for personal growth.. Learning should be put to practical use  C.I.A and P.P.T need to be integrated for better results  Expectations from security professional will continue to increase.. Need to find “out of box” solutions

THANK YOU om