Download presentation
Presentation is loading. Please wait.
Published byBrandon Leonard Modified over 9 years ago
1
ISSP Information Systems Security Partners | GiTi: 2015 Transforming IT Security Strategy: shifting focus from technologies to business process Artem Mykhailov ISSP | Regional Director 1
2
ISSP Information Systems Security Partners | GiTi: 2015 ISSP focuses on its clients needs in provisioning of information security for theirs business. Professional consulting and services Technical tools and solutions Threat Intelligence Center Training Center 7 Countries of presence 300+ projects
3
ISSP Information Systems Security Partners | GiTi: 2015 Information Security >> Cybersecurity
4
ISSP Information Systems Security Partners | GiTi: 2015 There are 3 types of Sources of online threats : 1. Criminal 2. Hacktivism 3. Governments Mikko Hypponen
5
ISSP Information Systems Security Partners | GiTi: 2015 “America’s economic prosperity, national security, and our individual liberties depend on our commitment to securing cyberspace and maintaining an open, interoperable, secure, and reliable Internet.” Obama
6
ISSP Information Systems Security Partners | GiTi: 2015 Financial Fraud in Cyberspace is
7
ISSP Information Systems Security Partners | GiTi: 2015 Regulations& Compliance Risk Analysis Standards Strategy Factors, which influence investments >Results The traditional perception of IS
8
ISSP Information Systems Security Partners | GiTi: 2015 Security – is a process, not a product Bruce Schneier
9
ISSP Information Systems Security Partners | GiTi: 2015 Active Phase Reactive Phase Simple Information Security Cycle
10
ISSP Information Systems Security Partners | GiTi: 2015 Active Phase Reactive Phase Preventive Phase Developed Information Security Cycle
11
ISSP Information Systems Security Partners | GiTi: 2015 FTE per SIEM project (65 projects)
12
ISSP Information Systems Security Partners | GiTi: 2015 Gartner 2015: SIEM Market 1. Insufficient Internal human resources 2. Insufficient 24/7 resources 3. Lack of expertize for … 4. Market Demand for talented specialists with in-depth understanding would grow extremely
13
ISSP Information Systems Security Partners | GiTi: 2015
14
Managed Security Services Model – more than just outsourcing
15
ISSP Information Systems Security Partners | GiTi: 2015 EmployeesTechnologies Solutions Procedures Processes Hosing Platform Data Center
16
ISSP Information Systems Security Partners | GiTi: 2015 80% Monitoring 50% Reaction 80% Investigations Optimized Information Security Cycle
17
ISSP Information Systems Security Partners | GiTi: 2015 Managed Security Service Instant Result Return of Investments Resources optimization Process management Risk Assurance
18
ISSP Information Systems Security Partners | GiTi: 2015 A vailable B est in class technologies C ertified Experts D uty on 24х7, SLA 99,6%
19
ISSP Information Systems Security Partners | GiTi: 2015 Outsource vs Insource ParameterInsourceOutsource ControlFullPartial CustomizationFullStandard Services Deployment2 years2 months PriceHigh price initially Low price in long term Low price per service always Quality?Predictable
20
ISSP Information Systems Security Partners | GiTi: 2015
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.