Transcript
Page 1: Welcome To Presentation on Holistic Information Security Management

Welcome To Presentation on Holistic Information Security Management

Page 2: Welcome To Presentation on Holistic Information Security Management

Achieving Operational Excellence in Information Security Management

Page 3: Welcome To Presentation on Holistic Information Security Management

Agenda

Part 1

Why we need security on operational basis- because current

models are failing us

Part 2

What does operational security entail- the new model of

security management

Part 3

How as full service managed security provider, we can assist

you to set up and manage security on operational basis

Page 4: Welcome To Presentation on Holistic Information Security Management

Part 1- Why it is needed?

Page 5: Welcome To Presentation on Holistic Information Security Management

We cannot afford security breaches today

1. Today attacks are getting more financially motivated and

with internal complicity

Consequently, the financial losses are rising

For breaches with proprietary/ customer data loss, the average

cost is US $ 4.2 million (Data Breach survey 2009)

Page 6: Welcome To Presentation on Holistic Information Security Management

We cannot afford security breaches today

2. Growing consensus in International community on

downstream liability

You are liable for attacks launched off of your machines and

networks. You can be sued if your security weakness allowed

someone to launch an attack via your server or network upon a

third party.

Page 7: Welcome To Presentation on Holistic Information Security Management

We cannot afford security breaches today

3. Customers, regulators and markets have become more

demanding and punishing

Over 2.5% of customers move out after disclosure of security

incidents affecting them. Additionally, 40% of potential

customers have apprehensions of opening business with the

provider (Ponemon Institute)

Regulations like SOX, Data Protection Act, Privacy rules create

legal as well as personal liability.

Share prices drop from 0.63% to 2.10% in value when a major

breach is reported (Emory university survey)

Page 8: Welcome To Presentation on Holistic Information Security Management

S0

5

10

15

20

20072008

2009

% of IT Budget

Annual Spend

9.9%11.8%

16.9%

Investments

in risk

management

are high.

Page 9: Welcome To Presentation on Holistic Information Security Management

Credit Card Breach Exposes 40 Million Accounts

Bank Of America Loses A Million Customer Records

Pentagon Hacker Compromises Personal Data

Online Attack Puts 1.4 Million Records At Risk

Hacker Faces Extradition Over 'Biggest Military Computer Hack Of All Time'

Laptop Theft Puts Data Of 98,000 At Risk

Medical Group: Data On 185,000 People Stolen

Hackers Grab LexisNexis Info on 32000 People

ChoicePoint Data Theft Widens To 145,000 People

PIN Scandal 'Worst Hack Ever'; Citibank Only The Start

ID Theft Hit 3.6 Million In U.S.

Georgia Authority Hack Exposes Confidential Information of 570,000 Members

Scammers Access Data On 35,000 Californians

Payroll Firm Pulls Web Services Citing Data Leak

Hacker Steals Online Shoppers' Personal Information

Undisclosed Number of Verizon Employees at Risk of Identity Theft

Credit Card Breach Exposes 40 Million Accounts

Bank Of America Loses A Million Customer Records

Mitsui Bank Hacker Compromises Personal Data

Online Attack Puts 1.4 Million Records At Risk

Hacker Faces Extradition Over 'Biggest Computer Hack Of All Time'

Laptop Theft Puts Data Of 98,000 At Risk

Wachovia Bank: Data On 185,000 Customers Stolen

Hackers Grab LexisNexis Info on 32000 People

Yet, Security Breaches Are Only Rising…

Page 10: Welcome To Presentation on Holistic Information Security Management

Breaches are spreading in Middle East also…

December, 2005

Senior official manipulates systems for financial fraud

“A senior official has been charged with manipulation of ERP application…”

July, 2005

Banks hit by wave of hacking attacks

“… atleast two banks – NBD and Mashreqbank suspended some of its online banking services citing the threat of banking attacks….”

May, 2006

ATM fraud forces banks to issue fresh cards to 1,100 customers

“Emirates Bank & Standard Chartered …”

June, 2006

HSBC customers hit by Phishing attack

“Internet users in the UAE are being warned to be on their guard following a massive phishing scam targeting HSBC customers…” 

Page 11: Welcome To Presentation on Holistic Information Security Management

Credit Card Breach Exposes 40 Million Accounts

Bank Of America Loses A Million Customer Records

Pentagon Hacker Compromises Personal Data

Online Attack Puts 1.4 Million Records At Risk

Hacker Faces Extradition Over 'Biggest Military Computer Hack Of All Time'

Laptop Theft Puts Data Of 98,000 At Risk

Medical Group: Data On 185,000 People Stolen

Hackers Grab LexisNexis Info on 32000 People

ChoicePoint Data Theft Widens To 145,000 People

PIN Scandal 'Worst Hack Ever'; Citibank Only The Start

ID Theft Hit 3.6 Million In U.S.

Georgia Technology Authority Hack Exposes Confidential Information of

570,000 Members

Scammers Access Data On 35,000 Californians

Payroll Firm Pulls Web Services Citing Data Leak

Hacker Steals Air Force Officers' Personal Information

Undisclosed Number of Verizon Employees at Risk of Identity Theft

Nearly 9 out of 10 businesses have suffered some form of security breach. (CSI/FBI survey)

Worldwide, 51% of organizations faced some form of security failure last year (PC Mag)

Clearly, Current Models are

Failing Us..

Page 12: Welcome To Presentation on Holistic Information Security Management

Current Model

Underlying Problem

Security is not a one-time project with a beginning and an end.

It requires continuous improvement comprising planning,

executing, checking, and then taking further action.

Achieving a particular state of security is no guarantee that it

can be sustained.

Page 13: Welcome To Presentation on Holistic Information Security Management

Part 2- New Model: What it entails?

Page 14: Welcome To Presentation on Holistic Information Security Management

What we need now is new model for

operational excellence-

Holistic

Continuous

Integrated

Business Focused

Page 15: Welcome To Presentation on Holistic Information Security Management

Business

problem

Technology

problem

Current Focus Desired Focus

•Firewalls

•Intrusion detection

•Viruses, worms

•Patch management

•Encryption

•Service interruption

•Customer privacy

•Business integrity

•Financial loss

•Regulatory compliance

Business focus

Page 16: Welcome To Presentation on Holistic Information Security Management

From Point in time Assessments

From Point in time Assessments

We require a new model that…

To Continual Risk Aware System

Point in Time Assessments

Continual Risk Aware System

Page 17: Welcome To Presentation on Holistic Information Security Management

FromPolicy & Products

FromPolicy & Products

We require a new model that…

To Continual Mitigation System

Point in Time Assessments

Continual Risk Aware System

Policy & Products Continual Mitigation System

Page 18: Welcome To Presentation on Holistic Information Security Management

FromSecurity

Administration

FromSecurity

Administration

We require a new model that…

To Continual Threat, Vulnerability and

Identity Management

Point in Time Assessments

Continual Risk Aware System

Policy & Products Continual Mitigation System

Security Administration

Continual Threat, Vulnerability& Identity Management

Page 19: Welcome To Presentation on Holistic Information Security Management

FromIT Assets

FromIT Assets

We require a new model that…

To Channels, Business And Process Risks

Point in Time Assessments

Continual Risk Aware System

Policy & Products Continual Mitigation System

Security Administration

Continual Threat, Vulnerability& Identity Management

Page 20: Welcome To Presentation on Holistic Information Security Management

Our Integrated Model

Page 21: Welcome To Presentation on Holistic Information Security Management

Integrated Risk Management Components

Page 22: Welcome To Presentation on Holistic Information Security Management

Need for SOC

IT systems have security weaknesses (Vulnerabilities)

These weaknesses may be used for system compromise (Threats)

In ideal scenario, security can be achieved if

All vulnerabilities are removed at all times

Or all threats are blocked at all times

In practice, vulnerabilities and threats can be protected to degrees.

For continuous security, it is essential to manage both

Increasing vulnerabilities and threats require robust security

operations

Setup a Security Operations Center (SOC) to integrate multiple

security functions and continuously manage operations

Page 23: Welcome To Presentation on Holistic Information Security Management

SOC Components

Access Management

Vuln

era

bilit

y M

anagem

ent T

hre

at M

anagem

ent

Security Operations Center (SOC)

Automation & Integration of Security Operations

Page 24: Welcome To Presentation on Holistic Information Security Management

SOC Architecture

Page 25: Welcome To Presentation on Holistic Information Security Management

Workflows pre-defined in our response desk

Page 26: Welcome To Presentation on Holistic Information Security Management

SOC Benefits

24X7X365 management of security

Proactive approach to security including early detection &

mitigation of vulnerabilities and threats

Integration of multiple security processes, heterogeneous

platforms for higher efficiencies & effectiveness

Centralized security operations resulting in better control

and visibility

Holistic approach to security as against piecemeal

approach

Page 27: Welcome To Presentation on Holistic Information Security Management

Thank You

Thank [email protected]


Recommended