© 2012 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual.

Slides:



Advertisements
Similar presentations
Life Science Services and Solutions
Advertisements

JUNE 2007 page 1 EDS Proprietary Applications Modernization Services Modernizing the Applications Portfolio.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential 14854_10_2008_c1 1 Holistic Approach to Information Security Greg Carter, Cisco Security.
Lynn Ray ISO Towson University Strategic Planning for IT Security Copyright Lynn Ray, This work is the intellectual property rights of the author.
© 2013 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual.
Chapter © 2009 Pearson Education, Inc. Publishing as Prentice Hall.
Chapter © 2009 Pearson Education, Inc. Publishing as Prentice Hall.
Security Controls – What Works
ISS IT Assessment Framework
Security Engineering II. Problem Sources 1.Requirements definitions, omissions, and mistakes 2.System design flaws 3.Hardware implementation flaws, such.
Symantec Vision and Strategy for the Information-Centric Enterprise Muhamed Bavçiç Senior Technology Consultant SEE.
Security Offering. Cyber Security Solutions 2 Assessment Analysis & Planning Design & Architecture Development & Implementation O&M Critical Infrastructure.
PCI's Changing Environment – “What You Need to Know & Why You Need To Know It.” Stephen Scott – PCI QSA, CISA, CISSP
Overview 4Core Technology Group, Inc. is a woman/ veteran owned full-service IT and Cyber Security firm based in Historic Petersburg, Virginia. Founded.
© 2014 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual.
VULNERABILITY MANAGEMENT Moving Away from the Compliance Checkbox Towards Continuous Discovery.
© 2012 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual.
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
Website Hardening HUIT IT Security | Sep
Vulnerability Management Dimension Data – Tom Gilis 24 November 2011.
Consultancy.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Financial Advisory & Litigation Consulting Services Risk Management 2006 September 14-15, 2006 The Metropolitan Club, New York, NY Workshop B: Information.
NUAGA May 22,  IT Specialist, Utah Department of Technology Services (DTS)  Assigned to Department of Alcoholic Beverage Control  PCI Professional.
No one questions that Microsoft can write great software. Customers want to know if we can be innovative, scalable, reliable in the cloud. (1996) 450M+
QAD's Customer Engagement Dan Blake Consultancy Development Director, QAD QAD Explore 2012.
Unify and Simplify: Security Management
What Keeps You Awake at Night Compliance Corporate Governance Critical Infrastructure Are there regulatory risks? Do employees respect and adhere to internal.
041025_1 Your World-Class IT Business Solution _2 Bolt Networks, Inc. Providing you with world-class service and total technology solutions.
The Challenge of IT-Business Alignment
Enterprise Risk Management & IT Compliance March 30, 2010 Presented by: Ken Rowe, Director Enterprise Systems Assurance & Chief Security Officer University.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
1 CISCO SAFE: VALIDATED SECURITY REFERENCE ARCHITECTURE What It Is Business Transformation Top Questions To Ask To Initiate The Sale Where It Fits KEY.
An Integrated Control Framework & Control Objectives for Information Technology – An IT Governance Framework COSO and COBIT 4.0.
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
Introduction: Information security services. We adhere to the strictest and most respected standards in the industry, including: -The National Institute.
HO © 2012 Fluor. All rights reserved. Quick Wins in Vulnerability Management Classification: Confidential Owner: Michael Holcomb Approver: Phil.
INFORMATION SECURITY DISCUSSION © 2015 Trojan Horse Security Inc., all rights reserved1.
SAM for SQL Workloads Presenter Name.
© 2012 IBM Corporation IBM Security Systems 1 © 2012 IBM Corporation Cloud Security: Who do you trust? Martin Borrett Director of the IBM Institute for.
Security Snapshot Assessment Maximizing Return on Security Investment What assets do we have? What is running on those assets? What is our risk level?
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
111 © 2001, Cisco Systems, Inc. All rights reserved. Presentation_ID Cisco Services & Support World Class Partners Technical Support Services Advanced.
CLOUD-BASED VIDS A CIO’S PERSPECTIVE Stephen Alford, CIO WEP, Inc.
CLOSE THE SECURITY GAP WITH IT SOLUTIONS FROM COMPUTACENTER AND CISCO AUGUST 2014.
Welcome Information Security Office Services Available to Counties Security Operations Center Questions.
1© Copyright 2016 EMC Corporation. All rights reserved. VIEWTRUST SOFTWARE OVERVIEW RISK MANAGEMENT AND COMPLIANCE MONITORING.
1© Copyright 2012 EMC Corporation. All rights reserved. Authentication Manager Integration Services (AMIS) RSA Global Services Customer Presentation SP.
Defining your requirements for a successful security (and compliance
Information Security Program
AT&T Premises-Based Firewall Enhanced SBS Solution
Cyber-Security for Healthcare
OHIMA 2010.
San Francisco IIA Fall Seminar
Securing Your Digital Transformation
National Cyber Security
Securing the Threats of Tomorrow, Today.
Holistic Approach to Information Security
IBM GTS Storage Security and Compliance overview.
MAZARS’ CONSULTING PRACTICE
AT&T Security Solutions Customer use cases
Managing IT Risk in a digital Transformation AGE
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
IT Management Services Infrastructure Services
Presentation transcript:

© 2012 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks contained herein are the property of their respective owners. AT&T Security Consulting Services

© 2012 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks contained herein are the property of their respective owners. Payment Card Industry Solutions Governance, Risk, Compliance Security Strategy & Roadmap Secure Infrastructure Services Vulnerability & Threat Management Application Security Services S e c u r i t y Security Consulting Services 2

© 2012 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks contained herein are the property of their respective owners. 3 Our Mission To build trusted advisor customer relationships by delivering forward thinking, world-class infrastructure consulting services Our Customers Strategic clientele with large scale, complex & custom infrastructure needs Public and private sector, domestic and multinational presence Who We Are Our Scope Pure play consulting services – independent and objective solutions Life cycle capabilities: Plan, Architect, Integrate, Optimize Project-based engagement model aligned to specific business outcomes Our Team Part of AT&T Business Services Seasoned consultants averaging 12 years industry experience Executive team averaging 20 years leading global professional services 11 offices across the U.S. & UK AT&T Consulting Solutions At A Glance

© 2012 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks contained herein are the property of their respective owners. Security Business Drivers Evolving threats, increasing complexity Evolution of Malware / Botnets Cyber Protests / Events Mobile Device Security Re-emergence of Old Attacks Security In The Cloud Advanced Persistent Threats Logical Attacks Against Physical Infrastructure Social Media and Geolocation Insider Attacks Ipv4/Ipv6 Attacks Compliance 4

© 2012 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks contained herein are the property of their respective owners. AT&T Security Consulting Practice Towers Protecting business assets & enhancing enterprise Governance 5 Security Strategy & Roadmap Advisory and development services providing programmatic frameworks for operational alignment, advanced technology deployments (mobility and cloud) and a life cycle approach to security and risk management. Governance, Risk & Compliance Security assessment services addressing regulatory requirements and/or industry standards, as well as security program development with an emphasis on usable frameworks for policy and security management aligned with the adoption of emerging technologies such as mobility, cloud. Payment Card Industry Solutions A range of comprehensive PCI compliance services that objectively help achieve and maintain PCI compliance including PCI assessments, readiness assessments, remediation assistance, and other related solutions. Vulnerability & Threat Management Services designed to provide an independent baseline and validation of the overall security posture from within or outside of the enterprise. Application Security Services Strategic and tactical security services focused on the applications supporting critical business processes such as mobile, web based. Includes technical assessments, secure development life cycle reviews and program management consulting. Secure Infrastructure Services A suite of life cycle offerings aligned with planning, architecting, integrating, and optimizing a secure network and infrastructure aligned with business and security goals.

© 2012 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks contained herein are the property of their respective owners. Security Strategy & Roadmap An advisory service to assist with the development of comprehensive information security strategies that are effective, manageable and offering maximum return on your security investments while addressing any emerging threats/risks specific to your business operations. 6 Strategy Development Security Roadmap Develop a comprehensive information security framework that can address the organization’s requirements for information protection, incident prevention, detection and response based on the organization’s risk and alignment with industry best practice frameworks Develop customized roadmap with detailed project plans, identifying ownership, timelines and resource allocation for the effective implementation of the security strategies

© 2012 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks contained herein are the property of their respective owners. Mobility and Cloud Security Risk Assessments Risk Analysis Remediation Roadmap Implementation FTC Mandated Assessments Security Assessments Initial & biennial Planning & Remediation Business Continuity Planning Business Impact Analysis Strategy & Plan Training & Testing Regulatory and Industry Standards-based Assessments HIPAA, HITECH, HITRUST GLBA State Privacy Law ISO 27001/2 Assessments & Certification Readiness Assessment Planning & Implementation Certification AT&T SureSeal Security Certified Trust & Assurance Security Assessment Remediation Roadmap Governance, Risk & Compliance 7 End-to-end consulting and advisory services for Information Security, Governance, Risk Management, Compliance and Implementation of standards, regulatory, contractual and internal security requirements.

© 2012 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks contained herein are the property of their respective owners. Payment Card Industry Service Offerings 8 Annual Security Assessment Performed by QSAs on-site for Level 1 and Level 2 entities (i.e. merchants) Readiness Assessment Pre-assessment service that helps clients identify gaps prior to the actual assessment Remediation Services Work with our clients to close gaps between the PCI Data Security Standard requirements and their current state Vulnerability & Threat Management Design and implement programmatic controls and processes to maintain compliance throughout the year Approved Scanning Vendor (ASV) Payment Application Assessments For clients who develop and resell payment applications to more than one entity, we can perform assessments per requirements of PCI’s Payment Application Data Security Standard Qualified Forensic Investigator

© 2012 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks contained herein are the property of their respective owners. Secure Infrastructure Services 9 Networks have become complex and fragmented due to rapid growth and acquisitions. An enterprise-based network security approach can provide tangible reduction in TCO, and enable a business to be more agile and competitive. Firewall Assessment Services Implementation and administration Migration and consolidation Tuning (performance and compliance) Data Discovery & Data Loss Prevention Know where the data resides and traverses Preventing data escaping the organization Secure Network Architecture Planning, design and segmentation Configuration reviews Data center management Mobile Security / Cloud Computing Security Event Management (SEM/SIM/SIEM) Log consolidation, alerting and reporting Intrusion Detection / Prevention / NAC placement and tuning

© 2012 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks contained herein are the property of their respective owners. Vulnerability and Threat Management 10 Provides an independent baseline and validation of the organization’s security posture. AT&T Consulting can simulate real-world attacks to identify vulnerabilities in the network, evaluate risks, and develop remediation plans that are tailored to unique business requirements and security needs Vulnerability Assessments Penetration Testing (aka Ethical Hacking) Scanning of the target infrastructure, establishing a baseline and making compliance easier by validating external posture Providing an overall security picture at a lower cost with repeatable exercises Periodically verifying assets are properly protected; evaluating recurring differentials and managing vulnerabilities Takes Vulnerability Assessment to the next level Manual testing and exploits, in addition to false positive reduction of automated results Taken from the perspective of a malicious external entity, or rogue internal resource Verifying that defense in depth and response capabilities are working as designed, along with security controls validation Required by many industry regulations and standards Vulnerability Management VoIP Penetration Testing Wi-Fi Penetration Testing War Dial Social Engineering Mobile Security Assessments Denial of Service based testing Virtualization Security Remote Access Assessment Breach/Incident Response Testing

© 2012 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks contained herein are the property of their respective owners. Application Security The Application Security solution portfolio consists of tactical and strategic services to help organizations assess, manage, and reduce security risks arising from unsafe software development practices. Application Security Assessments Automated and manual testing designed to circumvent the logic of the application in order to gain elevated access to systems or information – Web Based – Mobile Applications Application Security Program Management Application inventory, identification and assignment of risk classification, development of testing plans, management and execution of program Security Code Review Industry common practice and PCI requirement PCI DSS v1.2, section 6.3.7: Review of custom code prior to release to production or customers in order identify any potential coding vulnerability OWASP Orizon Code Review, and Top 10 PCI PA-QSA Application Security Assessment Visa & MasterCard encourage application development companies to certify their payment applications in accordance with the PCI Payment Application Best Practices program Applications that meet these standards can be listed on the Visa web site as PCI-approved payment applications 11

© 2012 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks contained herein are the property of their respective owners. Trusted Advisors 12 Helping our customers navigate complex IT Transformation Compliance & Risk Reduction In deployments, upgrades, operations, and security Cost Performance Reduce CapEx/OpEx Consolidation Shared Services Technology Strategy Technology roadmap, refresh, migrations Rapidly introduce new services into production Revenue Growth Governance and Sourcing Process Frameworks & Sourcing Strategies CIO Agenda