View
220
Download
0
Category
Tags:
Preview:
Citation preview
Welcome To Presentation on Holistic Information Security Management
Achieving Operational Excellence in Information Security Management
Agenda
Part 1
Why we need security on operational basis- because current
models are failing us
Part 2
What does operational security entail- the new model of
security management
Part 3
How as full service managed security provider, we can assist
you to set up and manage security on operational basis
Part 1- Why it is needed?
We cannot afford security breaches today
1. Today attacks are getting more financially motivated and
with internal complicity
Consequently, the financial losses are rising
For breaches with proprietary/ customer data loss, the average
cost is US $ 4.2 million (Data Breach survey 2009)
We cannot afford security breaches today
2. Growing consensus in International community on
downstream liability
You are liable for attacks launched off of your machines and
networks. You can be sued if your security weakness allowed
someone to launch an attack via your server or network upon a
third party.
We cannot afford security breaches today
3. Customers, regulators and markets have become more
demanding and punishing
Over 2.5% of customers move out after disclosure of security
incidents affecting them. Additionally, 40% of potential
customers have apprehensions of opening business with the
provider (Ponemon Institute)
Regulations like SOX, Data Protection Act, Privacy rules create
legal as well as personal liability.
Share prices drop from 0.63% to 2.10% in value when a major
breach is reported (Emory university survey)
S0
5
10
15
20
20072008
2009
% of IT Budget
Annual Spend
9.9%11.8%
16.9%
Investments
in risk
management
are high.
Credit Card Breach Exposes 40 Million Accounts
Bank Of America Loses A Million Customer Records
Pentagon Hacker Compromises Personal Data
Online Attack Puts 1.4 Million Records At Risk
Hacker Faces Extradition Over 'Biggest Military Computer Hack Of All Time'
Laptop Theft Puts Data Of 98,000 At Risk
Medical Group: Data On 185,000 People Stolen
Hackers Grab LexisNexis Info on 32000 People
ChoicePoint Data Theft Widens To 145,000 People
PIN Scandal 'Worst Hack Ever'; Citibank Only The Start
ID Theft Hit 3.6 Million In U.S.
Georgia Authority Hack Exposes Confidential Information of 570,000 Members
Scammers Access Data On 35,000 Californians
Payroll Firm Pulls Web Services Citing Data Leak
Hacker Steals Online Shoppers' Personal Information
Undisclosed Number of Verizon Employees at Risk of Identity Theft
Credit Card Breach Exposes 40 Million Accounts
Bank Of America Loses A Million Customer Records
Mitsui Bank Hacker Compromises Personal Data
Online Attack Puts 1.4 Million Records At Risk
Hacker Faces Extradition Over 'Biggest Computer Hack Of All Time'
Laptop Theft Puts Data Of 98,000 At Risk
Wachovia Bank: Data On 185,000 Customers Stolen
Hackers Grab LexisNexis Info on 32000 People
Yet, Security Breaches Are Only Rising…
Breaches are spreading in Middle East also…
December, 2005
Senior official manipulates systems for financial fraud
“A senior official has been charged with manipulation of ERP application…”
July, 2005
Banks hit by wave of hacking attacks
“… atleast two banks – NBD and Mashreqbank suspended some of its online banking services citing the threat of banking attacks….”
May, 2006
ATM fraud forces banks to issue fresh cards to 1,100 customers
“Emirates Bank & Standard Chartered …”
June, 2006
HSBC customers hit by Phishing attack
“Internet users in the UAE are being warned to be on their guard following a massive phishing scam targeting HSBC customers…”
Credit Card Breach Exposes 40 Million Accounts
Bank Of America Loses A Million Customer Records
Pentagon Hacker Compromises Personal Data
Online Attack Puts 1.4 Million Records At Risk
Hacker Faces Extradition Over 'Biggest Military Computer Hack Of All Time'
Laptop Theft Puts Data Of 98,000 At Risk
Medical Group: Data On 185,000 People Stolen
Hackers Grab LexisNexis Info on 32000 People
ChoicePoint Data Theft Widens To 145,000 People
PIN Scandal 'Worst Hack Ever'; Citibank Only The Start
ID Theft Hit 3.6 Million In U.S.
Georgia Technology Authority Hack Exposes Confidential Information of
570,000 Members
Scammers Access Data On 35,000 Californians
Payroll Firm Pulls Web Services Citing Data Leak
Hacker Steals Air Force Officers' Personal Information
Undisclosed Number of Verizon Employees at Risk of Identity Theft
Nearly 9 out of 10 businesses have suffered some form of security breach. (CSI/FBI survey)
Worldwide, 51% of organizations faced some form of security failure last year (PC Mag)
Clearly, Current Models are
Failing Us..
Current Model
Underlying Problem
Security is not a one-time project with a beginning and an end.
It requires continuous improvement comprising planning,
executing, checking, and then taking further action.
Achieving a particular state of security is no guarantee that it
can be sustained.
Part 2- New Model: What it entails?
What we need now is new model for
operational excellence-
Holistic
Continuous
Integrated
Business Focused
Business
problem
Technology
problem
Current Focus Desired Focus
•Firewalls
•Intrusion detection
•Viruses, worms
•Patch management
•Encryption
•Service interruption
•Customer privacy
•Business integrity
•Financial loss
•Regulatory compliance
Business focus
From Point in time Assessments
From Point in time Assessments
We require a new model that…
To Continual Risk Aware System
Point in Time Assessments
Continual Risk Aware System
FromPolicy & Products
FromPolicy & Products
We require a new model that…
To Continual Mitigation System
Point in Time Assessments
Continual Risk Aware System
Policy & Products Continual Mitigation System
FromSecurity
Administration
FromSecurity
Administration
We require a new model that…
To Continual Threat, Vulnerability and
Identity Management
Point in Time Assessments
Continual Risk Aware System
Policy & Products Continual Mitigation System
Security Administration
Continual Threat, Vulnerability& Identity Management
FromIT Assets
FromIT Assets
We require a new model that…
To Channels, Business And Process Risks
Point in Time Assessments
Continual Risk Aware System
Policy & Products Continual Mitigation System
Security Administration
Continual Threat, Vulnerability& Identity Management
Our Integrated Model
Integrated Risk Management Components
Need for SOC
IT systems have security weaknesses (Vulnerabilities)
These weaknesses may be used for system compromise (Threats)
In ideal scenario, security can be achieved if
All vulnerabilities are removed at all times
Or all threats are blocked at all times
In practice, vulnerabilities and threats can be protected to degrees.
For continuous security, it is essential to manage both
Increasing vulnerabilities and threats require robust security
operations
Setup a Security Operations Center (SOC) to integrate multiple
security functions and continuously manage operations
SOC Components
Access Management
Vuln
era
bilit
y M
anagem
ent T
hre
at M
anagem
ent
Security Operations Center (SOC)
Automation & Integration of Security Operations
SOC Architecture
Workflows pre-defined in our response desk
SOC Benefits
24X7X365 management of security
Proactive approach to security including early detection &
mitigation of vulnerabilities and threats
Integration of multiple security processes, heterogeneous
platforms for higher efficiencies & effectiveness
Centralized security operations resulting in better control
and visibility
Holistic approach to security as against piecemeal
approach
Thank You
Thank Youepourmand@remisco.com
Recommended