Business Outsourcing to Asia: Security   Challenges and Response           FIST CONFERENCE - LISBON                       ...
Agenda• Domains of Outsourcing• Security Concerns• What International Customers demand ?• The answers   – Business Perspec...
Domains of Outsourcing      Copyright First Legion Consulting
Businesses that outsource to Asia• Software Engineering• Support Services   – Call Centers   – Back Office Processing• Hea...
Impact of Business Outsourcing• Increased international interactions• Exchange of Intellectual Property    – Source Code  ...
Security Concerns   Copyright First Legion Consulting
The spheres of concern• Protection of Intellectual Property• Protection of Privacy• Technical Threats   – Related to Infor...
Initial Roadblocks• The advent of International Business initiated new work  cultures.• Most Asian countries did not have ...
What American and European   customers demand ?        Copyright First Legion Consulting
Information Security – Customer Requirement• Mature customers demand,   – Detailed Information Security Framework   – Mana...
The answers Copyright First Legion Consulting
How Asian Companies have adopted      Information Security ?           Copyright First Legion Consulting
Overview of Information Security in Asia• Asian companies ( Especially India and Japan) have been  on the forefront of ISM...
Status of ISO 27001 ( BS7799-2:2005)• Most widely adopted ISMS in Asia, especially India• Out of 2300 companies certified ...
What are the motivating factors ?• Though the law does not demand it, compliance is often  voluntary because,   – Business...
Do we have incidents ?• Yes we do,• But the good factor is that there is maturity in resolution• Companies are coming out ...
How the Government has approached            Security ?            Copyright First Legion Consulting
Government Initiatives• Major initiatives have been through CERT.• Initiation of Privacy Laws – Example Indian Privacy Act...
Government and IT Laws• Indian enacted the IT Act in 2006• All police stations in India are centers for reporting Cyber  S...
Incident Handling and Reporting• Govt. of India has a good framework• CDAC – Center for Development of Advanced Computing,...
A perspective on Business Continuity        and Pandemic Flu            Copyright First Legion Consulting
What was the reaction to Avian Influenza?• Most Asian countries have a good Emergency Management framework  for mitigating...
Comparison on Global Scale        Copyright First Legion Consulting
Approach• As far as ISMS goes, Asian companies are up there with  the best or even leaders.• On Technological Aspects of S...
The professional side• Though my stats are not accurate, Asia, especially India is  a leader in number of CISSP’s, CISA’s•...
The challenges  Copyright First Legion Consulting
We share some of the global challenges• The Human Aspect of Information Security   –   Social Engineering   –   Fraud   – ...
Specific Challenges• Too much focus on certification• This puts stress on small businesses to adopt ISMS’s and  certify th...
Improvements ?• A more holistic approach to Information Security.• The aim of security should be achieving business goals ...
Creative CommonsAttribution-NoDerivs 2.0You are free:•to copy, distribute, display, and perform this work•to make commerci...
Thank You     Anup NarayananSr. Consultant and Founder  First Legion Consulting    Copyright First Legion Consulting
Upcoming SlideShare
Loading in …5
×

Business Outsourcing to Asia

266 views
173 views

Published on

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
266
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
3
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Business Outsourcing to Asia

  1. 1. Business Outsourcing to Asia: Security Challenges and Response FIST CONFERENCE - LISBON Presented By Anup Narayanan, CISA, CISSP anup@firstlegion.net Copyright First Legion Consulting05/29/06 1
  2. 2. Agenda• Domains of Outsourcing• Security Concerns• What International Customers demand ?• The answers – Business Perspective on Security – Government Perspective on Security – Comparison on Global Scale• Scope for Improvement Copyright First Legion Consulting
  3. 3. Domains of Outsourcing Copyright First Legion Consulting
  4. 4. Businesses that outsource to Asia• Software Engineering• Support Services – Call Centers – Back Office Processing• Health Insurance• Finance Services Copyright First Legion Consulting
  5. 5. Impact of Business Outsourcing• Increased international interactions• Exchange of Intellectual Property – Source Code – Designs• Exchange of personal information – Finance Data – Health Data• Impact of International Laws ( Information Security) on Indian Business,• Opening of new channels of Information Exchange – Extreme Reliance on Internet Copyright First Legion Consulting
  6. 6. Security Concerns Copyright First Legion Consulting
  7. 7. The spheres of concern• Protection of Intellectual Property• Protection of Privacy• Technical Threats – Related to Information Exchange – Related to communication channels• Legal Aspects Copyright First Legion Consulting
  8. 8. Initial Roadblocks• The advent of International Business initiated new work cultures.• Most Asian countries did not have – Framework for Intellectual Property Protection – Privacy Protection• Awareness of Privacy was and is not as advanced in Asian Countries.• What is the status today ? Copyright First Legion Consulting
  9. 9. What American and European customers demand ? Copyright First Legion Consulting
  10. 10. Information Security – Customer Requirement• Mature customers demand, – Detailed Information Security Framework – Management Understanding and Commitment to Information Security – Most of them stress on good Physical Security – Understanding of International Standards – SoX, GLBA, HIPAA Security Rule – Good Technical Infrastructure for Information Security – Encryption, Firewall and the works…. Copyright First Legion Consulting
  11. 11. The answers Copyright First Legion Consulting
  12. 12. How Asian Companies have adopted Information Security ? Copyright First Legion Consulting
  13. 13. Overview of Information Security in Asia• Asian companies ( Especially India and Japan) have been on the forefront of ISMS implementation.• For example – Japan is the largest adopter of BS7799 in the world. – India is at the 3rd largest adopter of BS7799 in the world.• Apart from this many companies voluntarily adopt SoX, COBIT, HIPAA Security Rule etc. Copyright First Legion Consulting
  14. 14. Status of ISO 27001 ( BS7799-2:2005)• Most widely adopted ISMS in Asia, especially India• Out of 2300 companies certified worldwide, roughly 1000 are in Asia.• The scope is normally the critical business processes of the organization.• More focus on, – Ownership and accountability of Information Security – Management commitment – Periodic review Copyright First Legion Consulting
  15. 15. What are the motivating factors ?• Though the law does not demand it, compliance is often voluntary because, – Business survival often depends on security compliance – Management realizes the importance of the same.• For example, Asian companies have, – Voluntarily complied to SoX and COBIT – Also, HIPAA Security Rule Copyright First Legion Consulting
  16. 16. Do we have incidents ?• Yes we do,• But the good factor is that there is maturity in resolution• Companies are coming out and sharing incident reports with government and other companies• Example - – A major outsourcing company in India with a major American Bank as it’s customer had an incident. The company reported the same and their security levels were reviewed. – The level of security was reviewed and was found to be better than that of the customers’. Copyright First Legion Consulting
  17. 17. How the Government has approached Security ? Copyright First Legion Consulting
  18. 18. Government Initiatives• Major initiatives have been through CERT.• Initiation of Privacy Laws – Example Indian Privacy Act• Apart from this many associations are active – ISACA – eISSA Copyright First Legion Consulting
  19. 19. Government and IT Laws• Indian enacted the IT Act in 2006• All police stations in India are centers for reporting Cyber Security Thefts• Cyber Crime is slowly gaining recognition and there is regular training for Police on Cyber Security Copyright First Legion Consulting
  20. 20. Incident Handling and Reporting• Govt. of India has a good framework• CDAC – Center for Development of Advanced Computing, has released an open version of Forensic Analysis kit, which is recognized by the Government,• This tool has been used for convicting Cyber Criminals. Copyright First Legion Consulting
  21. 21. A perspective on Business Continuity and Pandemic Flu Copyright First Legion Consulting
  22. 22. What was the reaction to Avian Influenza?• Most Asian countries have a good Emergency Management framework for mitigating Pandemic Flu.• For example in India – The NDRC ( National Disaster Recovery Coordination) Committee coordinated with corporate companies to create recovery plans. – Businesses tested their DR plans through drills. – Industry meetings were arranged to discuss the possible impact of Pandemic Flu• The positive – There was a common sharing of knowledge and best practices. Copyright First Legion Consulting
  23. 23. Comparison on Global Scale Copyright First Legion Consulting
  24. 24. Approach• As far as ISMS goes, Asian companies are up there with the best or even leaders.• On Technological Aspects of Security, may be we do not have the latest geek devices.• There is immense improvements on – Management framework – Management commitment on regular investment in Information Security Copyright First Legion Consulting
  25. 25. The professional side• Though my stats are not accurate, Asia, especially India is a leader in number of CISSP’s, CISA’s• Security Professionals are amongst the best paid in India• Some of the major security service providers ( Nokia) have their Global Security Support services in India.• There is a demand for Risk Management and Business Continuity Management Professionals. Copyright First Legion Consulting
  26. 26. The challenges Copyright First Legion Consulting
  27. 27. We share some of the global challenges• The Human Aspect of Information Security – Social Engineering – Fraud – Theft – Corruption• Environmental Factors – Tsunami, Floods etc. Copyright First Legion Consulting
  28. 28. Specific Challenges• Too much focus on certification• This puts stress on small businesses to adopt ISMS’s and certify them – Not economically viable.• Slow adoption of privacy laws.• Compliance by users by fear and not real understanding. Copyright First Legion Consulting
  29. 29. Improvements ?• A more holistic approach to Information Security.• The aim of security should be achieving business goals and not just Confidentiality, Integrity And Availability.• Too many companies ( managers) adopt Information Security out of fear and not understanding it really.• There is no clear understanding on how much to invest and what to expect in return. Copyright First Legion Consulting
  30. 30. Creative CommonsAttribution-NoDerivs 2.0You are free:•to copy, distribute, display, and perform this work•to make commercial use of this workUnder the following conditions: Attribution. You must give the original author credit. No Derivative Works. You may not alter, transform, or build upon this work.          For any reuse or distribution, you must make clear to others the license termsof this work.Any of these conditions can be waived if you get permission from the author.Your fair use and other rights are in no way affected by the above.This work is licensed under the Creative Commons Attribution-NoDerivsLicense. To view a copy of this license, visithttp://creativecommons.org/licenses/by-nd/2.0/ or send a letter to CreativeCommons, 559 Nathan Abbott Way, Stanford, California 94305, USA. Copyright First Legion Consulting
  31. 31. Thank You Anup NarayananSr. Consultant and Founder First Legion Consulting Copyright First Legion Consulting

×