ISSP Information Systems Security Partners | GiTi: 2015 Transforming IT Security Strategy: shifting focus from technologies to business process Artem Mykhailov.

Slides:



Advertisements
Similar presentations
New York, October 4, 2010 Mobility in the next Decade: Ensuring you have the right programs to meet future talent challenges Presenters: Morgan Crosby.
Advertisements

Philippine Cybercrime Efforts
Preparing for Clementi - are you ready to compete? Peter Scott PETER SCOTT CONSULTING
Introduction to Unitas Global Managed IT Infrastructure Service Provider February 2012 North America Los Angeles, USA
Ddn.com ©2013 DataDirect Networks. All Rights Reserved. Cloud-Based Multimedia Storage Seeing the bright spots in the clouds 4/8/2013 Dave Fellinger Chief.
Network System Architects, Inc. (NSAi) Capabilities Briefing
August 9, 2005UCCSC Converting Policy to Reality Building Campus Security Programs Karl Heins -- Director of IT Audit Services Office of the University.
WHAT… Myrket is a B2B online advertising agency focused on e-marketing services; Main Services: e-marketing strategies; website development; search engine.
1 IS371 WEEK 8 Last and Final Assignment Application Development Alternatives to Application Development Instructor Online Evaluations.
One Firm. One Team. Countless Opportunities. Baruch College Come out to network and learn more about a career with KPMG that is far beyond coding !
IT Infrastructure Outsourcing for Government Sector in Latvia Aivis Rozenfelds MicroLink Latvia Systems Maintenance and Management department director.
Consulting Services Worksession Middle East Regional Conference, Abu Dhabi March 2012 Leo Punt Mark Buysse.
The Exclusive Networks Group. Hands up VADs Everyone claims to be a VAD Overused, undervalued What do you mean you're a VAD?
Office 365: Efficient Cloud Solutions Wednesday March 12, 9AM Chaz Vossburg / Gabe Laushbaugh.
Basel Accord IITRANSITIONSERVICES Business Integration Support FCM Management Limited Paris New York Toronto.
Reinventing with Outsourcing YES BANK Experience Balaji V Vice President, Business Services July 4, 2005.
Amdocs Services Reach New Heights of Success
Finance & Investment Club Fall 2012 Supply Chain Management Software and Services.
D-1 McGraw-Hill/Irwin ©2005 by the McGraw-Hill Companies, Inc. All rights reserved. Module D Internal, Governmental, and Fraud Audits “I predict that audit.
James Brehm Senior Strategist Compass Intelligence.
+. Background Design & Structure Motives & FitsPerformance Problems & Success Factors Microsoft: leading software companies – developing, manufacturing.
Putting a Face on Electronic Commerce Kathy Warden.
JJ Mois Année Competitive Intelligence as a key decision factor in Komercni banka André Léger Executive Director, Marketing.
E. business knowledge transfer for SMEs – experience from Lithuania Prof. Rimantas Gatautis, KTU
Martyn Lewis 13 th February ©2008 Market-Partners Inc. CONFIDENTIAL MARKET-PARTNERS Market-Partners is the world’s leading independent consulting.
Operations in Financial Services Fall 2003 Eugenia Chiang Shirley Chen.
Global Conductive Adhesive Transfer Tape Industry 2014 Market Research Report.
1 © Quality House QUALITY HOUSE The best testing partner in Bulgaria.
STRATEGIC INTELLIGENCE MANAGEMENT Chapter by Paul de Souza Chapter 18 - National Cyber Defense Strategy, Pg. 224.
THE CIO ROLE ON THE NEW FINANCIAL ENVIRONMENT Gustavo de Souza Fosse Banco do Brasil Board of Technology Organized by:
0 Main Problems of Access to Market Information in Russia O.B.Saluleva, Head of the Technology Transfer Office, Innovation Business Center, Yekaterinburg.
VIP-ER Virtual Industrial Park – Emphasis Rural Phase I Technical Overview February 2005.
Bank Audit. Internal Audit Internal audit is an independent, objective assurance activity and can give valuable insight in providing assurance that major.
Protecting Internet Infrastructure Michael M. Roberts [ ] MS&E 237 July 11, 2002 Stanford University.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill/Irwin.
Course Modules Office 365 ProPlus Deployment for IT Pros 01 | Introduction An overview of Office | Office 365 for IT Professionals Get an inside.
Built on Azure, Moodle Helps Educators Create Proprietary Private Web Sites Filled with Dynamic Courses that Extend Learning Anytime, Anywhere MICROSOFT.
0 Archived presentation - 14 October This presentation may be deemed to include forward- looking statements relating to Reuters within the meaning.
NTT Com Security - Welcome to the “Attack Detection & Incident Response” Security Brunch Tom Hager Country Manager.
From cost to value: 2010 Global Survey on the CIO Agenda June 15 th, 2010 IT ADVISORY KPMG INTERNATIONAL.
Will Roebuck Chief Executive ERA: the e-business network Governance + Compliance = Competitive Advantage.
1. You Are Making A Difference World Finance: Companies Cope with Declining Dollar Feb 13 th, 2008 Australia Braces For Rate Increases To Curb Inflation.
1© Copyright 2015 EMC Corporation. All rights reserved. FEDERATION ENTERPRISE HYBRID CLOUD OPERATION SERVICES FULL RANGE OF SERVICES TO ASSIST YOUR STAFF.
“From GRID research to GRID business” Francesco Giglio
ARAMA TECH D A T A P R O T E C T I O N P R O F E S S I O N A L S VISION & STRATEGY.
© Copyright 2011 Softype, Inc. Netsuite Solutions from Softype 31 March, 2011.
Template V.17, July 29, 2011 What’s the Cloud Got to do with HR Transformation? Heath Brownsworth, Director Technology Strategy.
Global Dental Operating Lamp Industry 2014 Market Research Report.
Global & US Trends in Management Consulting
Global Cocktail Dresses Industry 2014 Market Research Report.
Group 1: Outsourcing Spectrum Management
Business Analysis for Data Science Teams
Avenues International Inc.
Cloud University Live: 8 Steps to Build Your Cloud Go to Market Plan
| Data Connectors: Atlanta, GA
Reliable Software Services Inc.
Teri Takai EXECUTIVE DIRECTOR, CENTER FOR DIGITAL GOVERNMENT.
Security. Audit. Compliance
Group 1: Outsourcing Spectrum Management
Securing the Threats of Tomorrow, Today.
ITP Maturity Model Survey 2018
Cybersecurity Threats and Opportunities in Latin America
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
Sizzle or Fizzle: Is Threat Intelligence Really Worth My Time?
Presentation transcript:

ISSP Information Systems Security Partners | GiTi: 2015 Transforming IT Security Strategy: shifting focus from technologies to business process Artem Mykhailov ISSP | Regional Director 1

ISSP Information Systems Security Partners | GiTi: 2015 ISSP focuses on its clients needs in provisioning of information security for theirs business.  Professional consulting and services  Technical tools and solutions  Threat Intelligence Center  Training Center 7 Countries of presence 300+ projects

ISSP Information Systems Security Partners | GiTi: 2015 Information Security >> Cybersecurity

ISSP Information Systems Security Partners | GiTi: 2015 There are 3 types of Sources of online threats : 1. Criminal 2. Hacktivism 3. Governments Mikko Hypponen

ISSP Information Systems Security Partners | GiTi: 2015 “America’s economic prosperity, national security, and our individual liberties depend on our commitment to securing cyberspace and maintaining an open, interoperable, secure, and reliable Internet.” Obama

ISSP Information Systems Security Partners | GiTi: 2015 Financial Fraud in Cyberspace is

ISSP Information Systems Security Partners | GiTi: 2015 Regulations& Compliance Risk Analysis Standards Strategy Factors, which influence investments >Results The traditional perception of IS

ISSP Information Systems Security Partners | GiTi: 2015 Security – is a process, not a product Bruce Schneier

ISSP Information Systems Security Partners | GiTi: 2015 Active Phase Reactive Phase Simple Information Security Cycle

ISSP Information Systems Security Partners | GiTi: 2015 Active Phase Reactive Phase Preventive Phase Developed Information Security Cycle

ISSP Information Systems Security Partners | GiTi: 2015 FTE per SIEM project (65 projects)

ISSP Information Systems Security Partners | GiTi: 2015 Gartner 2015: SIEM Market 1. Insufficient Internal human resources 2. Insufficient 24/7 resources 3. Lack of expertize for … 4. Market Demand for talented specialists with in-depth understanding would grow extremely

ISSP Information Systems Security Partners | GiTi: 2015

Managed Security Services Model – more than just outsourcing

ISSP Information Systems Security Partners | GiTi: 2015 EmployeesTechnologies Solutions Procedures Processes Hosing Platform Data Center

ISSP Information Systems Security Partners | GiTi: % Monitoring 50% Reaction 80% Investigations Optimized Information Security Cycle

ISSP Information Systems Security Partners | GiTi: 2015 Managed Security Service Instant Result Return of Investments Resources optimization Process management Risk Assurance

ISSP Information Systems Security Partners | GiTi: 2015 A vailable B est in class technologies C ertified Experts D uty on 24х7, SLA 99,6%

ISSP Information Systems Security Partners | GiTi: 2015 Outsource vs Insource ParameterInsourceOutsource ControlFullPartial CustomizationFullStandard Services Deployment2 years2 months PriceHigh price initially Low price in long term Low price per service always Quality?Predictable

ISSP Information Systems Security Partners | GiTi: 2015