The Power To SecureIntroductionJorge SebastiaoCOO
Infosec IssuesMobile Malware up1,200% Q1 2012Motivation 2012Global AttacksComplexity
Importance of CriticalInfrastructures
Our approach to Securityis too complex
A Vision“To build the largest information securityservices & solutions companyin the MENA region”5
A TeamDr. TaherElgamalCEOJorge SebastiaoCOODr. Sherif ElKassasCTOSherif ShaltoutDirector of ServiceDeliveryGeneral BadrKha...
Business OverviewFirst Information SecurityManagedSecurityServices&SecurityMetricsSolutions&ServicesAdvancedTrainingIncide...
Managed Security ServicesManagedSecurityServicesMonitor & IR• Monitoring and threatmanagement• Aggregation of logs• Anomal...
Solutions & Services• Risk assessment• Vulnerability assessment• Penetration testingSecurityassessment• Architecture, solu...
We build Infosec knowledgeInformation Security Awareness ProgramSecuringtheweakestlinkCreateknowledgeto changebehaviorInfo...
Forensic Laboratories DeploymentIncidentResponseEvidenceAcquisitionEvidencePreservationMediaRecoveryMobile DevicesForensic...
Advanced Infosec• Forensics• Security Metrics• SDLC & Code Security• Cloud Security• Customized Encryption• Transformation...
Its all about time…
TBS- Time Based SecurityProtectionDetectionResponseSECURITYP>D+RAnti-virusVPN, QuantumFirewall, IPSAccess ControlGrid Time...
Total Integrated securityTotal Integrated SecurityPhysicalSecurityManagementInformationSecurityManagementTelecomSecurityMa...
People, Process &TechnologyTechnologyProcessPeople
A5 - ProcessBusiness RiskControlsMaturity
Defense in depth
Business Continuity ManagementBusiness Impact AnalysisRisk AnalysisRecovery StrategyGroup Plansand ProceduresBusiness Cont...
Crisis Management ResponsestepsDetectionAssessmentDecisionResponseRecoveryPreparation toPreventOpen Platform forSafety and...
Best PracticesSecurity MetricsKey Performance IndicatorsCoBiT, ComplianceITILISO20000ISMSISO27001BCMSISO22301Time Based Se...
Securing Voice and SMS
Securing Applications &Emails, Contacts,…
Securing mobilecollaboration
Transformational ValueFIS Unique ValueSecurityMetrics&ManagedSecurityServices&EncryptionArabization&Localization&TrainingB...
Transformational SecurityTransformAccess Architect
We leverage referencesFinance Government Telecom
Partners StrategicPartners
29FIS SaudiKingdom TowerP.O Box: 230888Riyadh 11321 – KSATel: +966 1 211 8041Fax: +966 1 211 8001FIS Egypt7 Ibn Gobier St....
The Power To SecureQ&AJorge SebastiaoCOOhttp://linkedin.com/in/sebastiao
Upcoming SlideShare
Loading in …5
×

FIS Profile Summary V7.3

555
-1

Published on

First Information Security Profile Summary Version 7.3

Published in: Business, Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
555
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
0
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

FIS Profile Summary V7.3

  1. 1. The Power To SecureIntroductionJorge SebastiaoCOO
  2. 2. Infosec IssuesMobile Malware up1,200% Q1 2012Motivation 2012Global AttacksComplexity
  3. 3. Importance of CriticalInfrastructures
  4. 4. Our approach to Securityis too complex
  5. 5. A Vision“To build the largest information securityservices & solutions companyin the MENA region”5
  6. 6. A TeamDr. TaherElgamalCEOJorge SebastiaoCOODr. Sherif ElKassasCTOSherif ShaltoutDirector of ServiceDeliveryGeneral BadrKhairyVP of BDRania El RoubyDirector of TechnicalSalesHesham AminCFOAnwar Al KindiDirector of HRTraining
  7. 7. Business OverviewFirst Information SecurityManagedSecurityServices&SecurityMetricsSolutions&ServicesAdvancedTrainingIncidenceResponse&Forensics&DisasterRecovery
  8. 8. Managed Security ServicesManagedSecurityServicesMonitor & IR• Monitoring and threatmanagement• Aggregation of logs• Anomaly detection• alertsPerimeterProtection• Managed Firewall,UTM, IPS, Anti-Malware, etc.In cloud MSS• Clean pipes• Anti-malware, etc• AntifraudDOS/DDOSmitigationEnd-user/devicemanagement
  9. 9. Solutions & Services• Risk assessment• Vulnerability assessment• Penetration testingSecurityassessment• Architecture, solution selection• Compliance gap analysis• Secure application developmentRoadmapandcompliance• Incident management• Response services• Forensics and support servicesIncidenthandling• Integration• Customization• LocalizationSolutions
  10. 10. We build Infosec knowledgeInformation Security Awareness ProgramSecuringtheweakestlinkCreateknowledgeto changebehaviorInformation Security FundamentalsThreats andRisksControlsSpecialized Information SecurityTraining (role based)SecurityAssessmentSecureCodingForensics
  11. 11. Forensic Laboratories DeploymentIncidentResponseEvidenceAcquisitionEvidencePreservationMediaRecoveryMobile DevicesForensicsEmailInvestigationsPasswordRecoveryNetworkForensicsBrowserInvestigationsMultimediaForensicsOptical MediaForensicsMalwareAnalysisInternetInvestigationseDiscovery Mac ForensicsWirelessForensicsCCTV &VideoForensicsEncryptionAttacksSmart PhoneForensicsCore Forensic Laboratory
  12. 12. Advanced Infosec• Forensics• Security Metrics• SDLC & Code Security• Cloud Security• Customized Encryption• Transformational Security• Big Data Analytics• CERT• Cyber warfare• Total Integrated Security• Homeland Security
  13. 13. Its all about time…
  14. 14. TBS- Time Based SecurityProtectionDetectionResponseSECURITYP>D+RAnti-virusVPN, QuantumFirewall, IPSAccess ControlGrid Time ResponsePatch MgmtIncidence ResponseDisaster RecoveryVulnerability TestingSIEM, CorrelationQuantumCCTV, Access Control
  15. 15. Total Integrated securityTotal Integrated SecurityPhysicalSecurityManagementInformationSecurityManagementTelecomSecurityManagement
  16. 16. People, Process &TechnologyTechnologyProcessPeople
  17. 17. A5 - ProcessBusiness RiskControlsMaturity
  18. 18. Defense in depth
  19. 19. Business Continuity ManagementBusiness Impact AnalysisRisk AnalysisRecovery StrategyGroup Plansand ProceduresBusiness Continuity Planning InitiationRiskReductionImplementStandby FacilitiesCreate Planning OrganizationTestingPROCESSChange Management Education Testing ReviewPolicy ScopeResourcesOrganizationBCMOngoingProcessBCMProjectBCMOngoing
  20. 20. Crisis Management ResponsestepsDetectionAssessmentDecisionResponseRecoveryPreparation toPreventOpen Platform forSafety and SecurityIncident123456Command andControlMission-CriticalNetworkSensing andActuationNotifying Entity &AuthorityMobilization ofForcesIncidentCollaborationNotification toAuthoritySensingMobilizedForceIncidentCorroborationCommandControlActuationCompletionRecord
  21. 21. Best PracticesSecurity MetricsKey Performance IndicatorsCoBiT, ComplianceITILISO20000ISMSISO27001BCMSISO22301Time Based Security
  22. 22. Securing Voice and SMS
  23. 23. Securing Applications &Emails, Contacts,…
  24. 24. Securing mobilecollaboration
  25. 25. Transformational ValueFIS Unique ValueSecurityMetrics&ManagedSecurityServices&EncryptionArabization&Localization&TrainingBestPractices&InfosecMaturityStandardsIncidenceResponse&Forensics&BCPDisasterRecovery
  26. 26. Transformational SecurityTransformAccess Architect
  27. 27. We leverage referencesFinance Government Telecom
  28. 28. Partners StrategicPartners
  29. 29. 29FIS SaudiKingdom TowerP.O Box: 230888Riyadh 11321 – KSATel: +966 1 211 8041Fax: +966 1 211 8001FIS Egypt7 Ibn Gobier St., El Orouba-Heliopolis, Cairo - EgyptTel: +202 2418 8252Fax: +202 2417 1278FIS UAEP.O.Box: 37148Abu Dhabi – UAETel: +971 2 658 1050Fax: +971 2 658 1070FIS OmanP.O.Box: 196Muscat - OmanTel: +968 24707727Fax: +968 24797709FIS UAEWorld Trade CenterP.O.Box: 9677Dubai – UAETel: +971 4 332 2555Fax: +971 4 332 8777FIS QatarP.O.Box: 3735Doha - QatarTel: +974 4877193Fax: +974 4877206Regional Presence
  30. 30. The Power To SecureQ&AJorge SebastiaoCOOhttp://linkedin.com/in/sebastiao

×