Welcome To Presentation on Holistic Information Security Management.

Slides:



Advertisements
Similar presentations
The Whole/Hole of Security Public (DoD) v. Corporate Carl Bourland US Army Judge Advocate Generals Corps.
Advertisements

Property Inventory Valuation Replacement Cost Value The amount it would take to replace property with like property of the same quality and construction.
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Zenith Visa Web Acquiring A quick over view. Web Acquiring Allows merchants to receive payments for goods and services through the Internet Allows customers.
A Gift of Fire, 2edChapter 7: Computer Crime1 Computer Crime.
The Financial Modernization Act of 1999, also known as the Gramm-Leach-Bliley Act (GLBA) UNDERSTANDING AND DEVELOPING A STRATEGIC PLAN TO BECOME COMPLIANT.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Information Security Jim Cusson, CISSP. Largest Breaches 110, NorthgateArinso, Verity Trustees 6, Aurora St. Luke's Medical.
Is There a Security Problem in Computing? Network Security / G. Steffen1.
E-Commerce Security Issues. General E-Business Security Issues Any E-Business needs to be concerned about network security. The Internet is a “ public.
Information & Communication Technologies NMSU All About Discovery! Risk-Based Information Security Program at NMSU presented by Norma Grijalva.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Chapter 1 Introduction to Security
Global Information Security Issues According to the E&Y Global Survey, Managers Say the Right Thing… –90% of 1400 companies surveyed in 66 countries say.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Quantitative.
Security Awareness Challenges of Security No single simple solution to protecting computers and securing information Different types of attacks Difficulties.
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
Electronic Banking BY Bahaa Abas Noor abo han. Definition * e-banking is defined as: …the automated delivery of new and traditional banking products and.
The Difficult Road To Cybersecurity Steve Katz, CISSP Security Risk Solutions Steve Katz, CISSP Security.
Company LOGO Copyright Carrie Kerskie Data Breach & Identity Theft By Carrie Kerskie Kerskie Group, Inc.
1Cisco Security NOW © 2003, Cisco Systems, Inc. All rights reserved. THIS IS THE POWER OF CISCO SECURITY. now.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
External Threats to Healthcare Data Joshua Spencer, CPHIMS, C | EH.
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Building Your Security Strategy with 3D.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
© 2009 IDBI Intech, Inc. All rights reserved.IDBI Intech Confidential 1 Information (Data) Security & Risk Mitigation.
1 Deployment of Computer Security in an Organization CE-408 Sir Syed University of Engineering & Technology 99-CE-282, 257 & 260.
IT GENERAL CONTROLS & THE PREVENTION OF FRAUD Ed Tobias, CISA, CIA, CFE May 11, 2011.
WHAT EVERY RISK MANAGER NEEDS TO KNOW ABOUT DATA SECURITY RIMS Rocky Mountain Chapter Meeting Thursday, July 25, :30 am – 12:30 pm.
Business Computing 550 Lesson 6. 2 Security Threats on Web Sites Issues and vulnerabilities 1.Illegal Access and Use (Hacking the system or users exposing.
Data Center Firewall. 2 Common IT Security Challenges Does my network security protect my IT environment and sensitive data and meet the regulatory compliances?
© 2015 ForeScout Technologies, Page 2 Source: Identity Theft Resource Center Annual number of data breaches Breaches reported Average annual cost of security.
Security Awareness Challenges of Securing Information No single simple solution to protecting computers and securing information Different types of attacks.
What does secure mean? You have been assigned a task of finding a cloud provider who can provide a secure environment for the launch of a new web application.
Managing Data Against Insider Threats Dr. John D. Johnson, CISSP.
Protecting Your Business! SBA Ft. Lauderdale November 15, 2006 Gregory Levine, Sr. Director Marketing.
John Carpenter & lecture & Information Security 2008 Lecture 1: Subject Introduction and Security Fundamentals.
STANFORD UNIVERSITY INFORMATION TECHNOLOGY SERVICES Desktop Security Strategy Common Solutions Group September 19, 2006 Bill Clebsch.
Internet Security Breach & Its Impact on Business Operations Kim Nguyen Manish Shirke Wa Mo Saravanan Velrajan.
Information Systems Security New Faculty Orientation Day Queen’s University August 2011 George Farah, GIAC/GSEC Gold, CRISC, CISA University Information.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Prepared by Dept. of Information Technology & Telecommunications, November 19, 2015 Application Security Business Risk and Data Protection Gregory Neuhaus.
Topic 5: Basic Security.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Introduction.
Chap1: Is there a Security Problem in Computing?.
IT Security Policy: Case Study March 2008 Copyright , All Rights Reserved.
Langara College PCI Awareness Training
Data Security & Privacy: Fundamental Risk Mitigation Tactics 360° of IT Compliance Anthony Perkins, Shareholder Business Law Practice Group Data Security.
Chapter 1: Information Security Fundamentals Security+ Guide to Network Security Fundamentals Second Edition.
Security Snapshot Assessment Maximizing Return on Security Investment What assets do we have? What is running on those assets? What is our risk level?
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
Safe’n’Sec IT security solutions for enterprises of any size.
Information Security: Current Threats Marc Scarborough Information Security Officer
CYBERSECURITY: RISK AND LIABILITY March 2, 2016 Joshua A. Mooney Co-chair-Cyber Law and Data Protection White and Williams LLP (215)
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
Protecting Your Assets By Preventing Identity Theft
Securing Information Systems
CYBERSECURITY INCIDENCE IN THE FINANCIAL SERVICES SECTOR March 28, 2017 Presented by Osato Omogiafo Head IT Audit.
An Update on FERPA and Student Privacy
Comprehensive Security and Compliance at an Affordable Price.
Cloud Firewall.
Protection of CONSUMER information
Data Center Firewall.
Securing Information Systems
Today’s Risk. Today’s Solutions. Cyber security and
Agenda Consumer ID theft issues Data breach trends Laws and regulations Assessing and mitigating your risk.
Cyber Trends and Market Update
Chapter 1: Information Security Fundamentals
Data Breach of United States Office of Personnel Management
Presentation transcript:

Welcome To Presentation on Holistic Information Security Management

Achieving Operational Excellence in Information Security Management

Agenda Part 1 Why we need security on operational basis- because current models are failing us Part 2 What does operational security entail- the new model of security management Part 3 How as full service managed security provider, we can assist you to set up and manage security on operational basis

Part 1- Why it is needed?

We cannot afford security breaches today 1.Today attacks are getting more financially motivated and with internal complicity Consequently, the financial losses are rising For breaches with proprietary/ customer data loss, the average cost is US $ 4.2 million (Data Breach survey 2009)

We cannot afford security breaches today 2. Growing consensus in International community on downstream liability You are liable for attacks launched off of your machines and networks. You can be sued if your security weakness allowed someone to launch an attack via your server or network upon a third party.

We cannot afford security breaches today 3. Customers, regulators and markets have become more demanding and punishing Over 2.5% of customers move out after disclosure of security incidents affecting them. Additionally, 40% of potential customers have apprehensions of opening business with the provider (Ponemon Institute) Regulations like SOX, Data Protection Act, Privacy rules create legal as well as personal liability. Share prices drop from 0.63% to 2.10% in value when a major breach is reported (Emory university survey)

9.9% 11.8% 16.9% Investments in risk management are high.

Credit Card Breach Exposes 40 Million Accounts Bank Of America Loses A Million Customer Records Pentagon Hacker Compromises Personal Data Online Attack Puts 1.4 Million Records At Risk Hacker Faces Extradition Over 'Biggest Military Computer Hack Of All Time' Laptop Theft Puts Data Of 98,000 At Risk Medical Group: Data On 185,000 People Stolen Hackers Grab LexisNexis Info on People ChoicePoint Data Theft Widens To 145,000 People PIN Scandal 'Worst Hack Ever'; Citibank Only The Start ID Theft Hit 3.6 Million In U.S. Georgia Authority Hack Exposes Confidential Information of 570,000 Members Scammers Access Data On 35,000 Californians Payroll Firm Pulls Web Services Citing Data Leak Hacker Steals Online Shoppers' Personal Information Undisclosed Number of Verizon Employees at Risk of Identity Theft Credit Card Breach Exposes 40 Million Accounts Bank Of America Loses A Million Customer Records Mitsui Bank Hacker Compromises Personal Data Online Attack Puts 1.4 Million Records At Risk Hacker Faces Extradition Over 'Biggest Computer Hack Of All Time' Laptop Theft Puts Data Of 98,000 At Risk Wachovia Bank: Data On 185,000 Customers Stolen Hackers Grab LexisNexis Info on People Yet, Security Breaches Are Only Rising…

Breaches are spreading in Middle East also… December, 2005 Senior official manipulates systems for financial fraud A senior official has been charged with manipulation of ERP application… July, 2005 Banks hit by wave of hacking attacks … atleast two banks – NBD and Mashreqbank suspended some of its online banking services citing the threat of banking attacks…. May, 2006 ATM fraud forces banks to issue fresh cards to 1,100 customers Emirates Bank & Standard Chartered … June, 2006 HSBC customers hit by Phishing attack Internet users in the UAE are being warned to be on their guard following a massive phishing scam targeting HSBC customers…

Credit Card Breach Exposes 40 Million Accounts Bank Of America Loses A Million Customer Records Pentagon Hacker Compromises Personal Data Online Attack Puts 1.4 Million Records At Risk Hacker Faces Extradition Over 'Biggest Military Computer Hack Of All Time' Laptop Theft Puts Data Of 98,000 At Risk Medical Group: Data On 185,000 People Stolen Hackers Grab LexisNexis Info on People ChoicePoint Data Theft Widens To 145,000 People PIN Scandal 'Worst Hack Ever'; Citibank Only The Start ID Theft Hit 3.6 Million In U.S. Georgia Technology Authority Hack Exposes Confidential Information of 570,000 Members Scammers Access Data On 35,000 Californians Payroll Firm Pulls Web Services Citing Data Leak Hacker Steals Air Force Officers' Personal Information Undisclosed Number of Verizon Employees at Risk of Identity Theft Nearly 9 out of 10 businesses have suffered some form of security breach. (CSI/FBI survey) Worldwide, 51% of organizations faced some form of security failure last year (PC Mag) Clearly, Current Models are Failing Us..

Current Model Underlying Problem Security is not a one-time project with a beginning and an end. It requires continuous improvement comprising planning, executing, checking, and then taking further action. Achieving a particular state of security is no guarantee that it can be sustained.

Part 2- New Model: What it entails?

What we need now is new model for operational excellence- Holistic Continuous Integrated Business Focused

Business problem Technology problem Current Focus Desired Focus Firewalls Intrusion detection Viruses, worms Patch management Encryption Service interruption Customer privacy Business integrity Financial loss Regulatory compliance Business focus

From Point in time Assessments We require a new model that… To Continual Risk Aware System Point in Time Assessments Continual Risk Aware System

From Policy & Products We require a new model that… To Continual Mitigation System Point in Time Assessments Continual Risk Aware System Policy & Products Continual Mitigation System

From Security Administration We require a new model that… To Continual Threat, Vulnerability and Identity Management Point in Time Assessments Continual Risk Aware System Policy & Products Continual Mitigation System Security Administration Continual Threat, Vulnerability & Identity Management

From IT Assets We require a new model that… To Channels, Business And Process Risks Point in Time Assessments Continual Risk Aware System Policy & Products Continual Mitigation System Security Administration Continual Threat, Vulnerability & Identity Management

Our Integrated Model

Integrated Risk Management Components

Need for SOC IT systems have security weaknesses (Vulnerabilities) These weaknesses may be used for system compromise (Threats) In ideal scenario, security can be achieved if All vulnerabilities are removed at all times Or all threats are blocked at all times In practice, vulnerabilities and threats can be protected to degrees. For continuous security, it is essential to manage both Increasing vulnerabilities and threats require robust security operations Setup a Security Operations Center (SOC) to integrate multiple security functions and continuously manage operations

SOC Components Access Management Vulnerability Management Threat Management Security Operations Center (SOC) Automation & Integration of Security Operations

SOC Architecture

Workflows pre-defined in our response desk

SOC Benefits 24X7X365 management of security Proactive approach to security including early detection & mitigation of vulnerabilities and threats Integration of multiple security processes, heterogeneous platforms for higher efficiencies & effectiveness Centralized security operations resulting in better control and visibility Holistic approach to security as against piecemeal approach

Thank You