Your SlideShare is downloading. ×
0
A4 to A10 of security V3.1
A4 to A10 of security V3.1
A4 to A10 of security V3.1
A4 to A10 of security V3.1
A4 to A10 of security V3.1
A4 to A10 of security V3.1
A4 to A10 of security V3.1
A4 to A10 of security V3.1
A4 to A10 of security V3.1
A4 to A10 of security V3.1
A4 to A10 of security V3.1
A4 to A10 of security V3.1
A4 to A10 of security V3.1
A4 to A10 of security V3.1
A4 to A10 of security V3.1
A4 to A10 of security V3.1
A4 to A10 of security V3.1
A4 to A10 of security V3.1
A4 to A10 of security V3.1
A4 to A10 of security V3.1
A4 to A10 of security V3.1
A4 to A10 of security V3.1
A4 to A10 of security V3.1
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

A4 to A10 of security V3.1

614

Published on

A4 to A10 of security, a journey in security experience...

A4 to A10 of security, a journey in security experience...

0 Comments
2 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
614
On Slideshare
0
From Embeds
0
Number of Embeds
3
Actions
Shares
0
Downloads
1
Comments
0
Likes
2
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. A4toA10ofSecurityA journey in Security…
  • 2. How do we secure this?
  • 3. Security need is everywhere…
  • 4. Putting in layers, is not Trust?
  • 5. Are your barriers effective?
  • 6. Effective Security is hiddendeep underneath…TechnologyProcessPeople
  • 7. 4As A4 of SecurityAssess Evaluate, Audit, CheckArchitect Plan, DesignApply Build, Implement, DoAdminister Operate, Act
  • 8. 5As A5 of SecurityAssess Evaluate, Audit, CheckArchitect Plan, DesignApply Build, Implement, DoAdminister Operate, ActAwareness Intelligence, User
  • 9. 6As A6 of SecurityAssess Evaluate, Audit, CheckArchitect Plan, DesignApply Build, Implement, DoAdminister Operate, ActAwareness Intelligence, UserAgility Timeliness of Response
  • 10. Agility is all about time…
  • 11. TBS = Time Based SecurityProtectionDetectionResponse SECURITYP>D+RAnti-virus, FirewallVPN, QuantumDoor, GatesAccess ControlGrid Time ResponseRemediation, DisasterRecoveryIncidence ResponseGuards ResponseVulnerability TestingSIEM, CorrelationQuantum PhotonsCCTV, Access ControlAlarms
  • 12. Security is about maturity…BusinessRiskMatureControls
  • 13. 10As A10 of SecurityAssess Evaluate, Audit, CheckArchitect Plan, DesignApply Build, Implement, DoAdminister Operate, Act, RespondAwareness Intelligence, UserAgility Timeliness of ResponseAppetite How much Risk can you take?Alignment Business focusAssumption Something is wrong?Authorization Right to access, authentication
  • 14. Align Security to your Business…
  • 15. What is you Appetite for Risk?
  • 16. Risk Appetite framework…
  • 17. Update your Assumptions…
  • 18. Understand your Authorizations
  • 19. Layer your security to reduce Risk
  • 20. Integrate security for Effectiveness…Total Integrated SecurityPhysicalSecurityManagementInformationSecurityManagementTelecomSecurityManagement
  • 21. Measure everything!!!Security MetricsKey Performance IndicatorsCoBiT, ComplianceITILISO20000ISMSISO27001BCMSISO22301Time Based Security
  • 22. Think outside the box!!!
  • 23. “…Security isa continuousskilledprocess…”…Jorge Sebastiaohttp://linkedin.com/in/sebastiao

×