SlideShare a Scribd company logo
1 of 23
Proposed Business Process, metrics
and tools Optimization for key IT
domain
Akin Akinfenwa
12March2019
Confused on
metrics to track,
Good Processes to
adopt, and tools
to use?
 Identity & Access Management
 Secure SDLC & Application
Security
 Endpoint Security
 Vulnerability Management
Always begin with the Story….
Key Assumptions made:
This is not specific to industry, hence the business processes in presentation, metrics, and tools are simply generic and not unique to any situation, most of the
processes could be customized to unique industries as needed. Further assumptions will be that IT controls are mapped to COBIT, NIST 800-53 or ISO 27001 already.
IDENTIFY & ACCESS
MANAGEMENT (IAM)?
IAM are Series of framework of policies, procedures
and technologies for ensuring appropriate personnel
have access to technology resources.
Identify And Access Management
Process and activities
PROVISION ENFORCEADMINISTER
 REQUEST ACCESS
 VALIDATE REQUEST
 APPROVE ACCESS
 ASSIGN AND
COMMUNICATE
ACCESS
 PLAN AND
STRATEGIZE
 MANAGE POLICIES
AND STANDARDS
 EDUCATE AND
MANAGE SYSTEMS
 MONITOR, AUDIT
AND RECONCILE
• AUTHENTICATE
• AUTHORIZE
• LOG ACTIVITIES
S Y S T E M S A N D D A T A
WHAT IS TRACKED AND MEASURED IN IDENTITY AND ACCESS MANAGEMENT?
Metric Tracked Ranking
Average number of distinct accounts (credentials) per user:
Number of unused accounts:
Number of orphaned accounts:
Number of new accounts provisioned:
Number of exceptions per access re-certification cycle
Password policy effectiveness:
Average time to provision and de-provision of a user:
Average time to provide an authorization
Average time to make changes in identity policies:
Violation of separation of duties:
High Business impact
Medium Business Impact
Low Business Impact
Management Perspective:
How well do we manage
user provisioning without
exposing the organization
to access risk.
COMMON TOOLS USED IN IDENTIFY &
ACCESS MANAGEMENT (IAM)
IAM Tools On-Premise Cloud
Forefront Identity Manager X X
Microsoft Azure Active Directory X X
Oracle Identity Management X
Okta Identity Management X X
Zoho Vault X X
OneLogin X X
LogMeIn Pro X
Auth0 X
ExcelID X X
ADManager Plus X X
IBM IAM X X
SECURE SDLC &
APPLICATION
SECURITY
Application security encompasses measures
taken to improve the security of an
application often by finding, fixing and
preventing security vulnerabilities
A secure SDLC process ensures that security
assurance activities such as penetration
testing, code review, and architecture analysis
are an integral part of the development
effort.
SECURE SDLC & APPLICATION SECURITY PROCESS
REQUIREMENTS DESIGN DEVELOPMENT TEXT DEPLOYMENT
Map Security
& Privacy
Requirements
Threat
modelling.
Security design
review
Static Analysis
Peer Review
Security test
cases
Dynamic Analysis
Final security
review
Application
security &
monitoring
Response Plan
Web application security
People
• Training
• organization
Process
• Risk management
• SDLC
• Guidelines
• Verification
Technology
• Tools
• Development
• frameworks
WHAT IS TRACKED AND MEASURED IN APPLICATION SECURITY?
Metric Tracked Ranking
Weighted Risk Trend
Remediation Calculation Window
Application Testing Coverage
Mean Time to Respond
Confirmed exploits
Confirmed Account Takeovers
High Business impact
Medium Business Impact
Low Business Impact
Management
Perspective: Can we
rely on the security
model of business
applications to operate
as intended?
Risk is very relative to industry and other controls established within the business
COMMON TOOLS USED IN APPLICATION SECURITY
Application Security tools On-Premise Cloud
Wapiti X X
Zed Attack Proxy X X
Vega X
W3af X X
Skipfish X X
Ratproxy X X
SQLMap X
Wfuzz X
Wapiti X X
Zed Attack Proxy X X
Vega X X
End Point Security
Endpoint Security/ endpoint protection is
an approach to the protection of
computer networks that are remotely
bridged to client devices.
END POINT SECURITY PROCESS
CONFIGURATION
MANAGEMENT
ANTI-MALWARE
ACCEPTABLE USE RPOLICIES
SYSTEM
MONITORING
END-POINT SECURITY
CONTROLS
DATA SECURITY
APPLICATION
SECURITY
I A M
The policies, processes and technology controls
used to protect the confidentiality, integrity, and
availability of an end point system
What is tracked and Measured in Endpoint Security?
Metric Tracked Ranking
Level of visibility the solution provides :
Types of threat detected :
OS supporting ability :
File detection :
Security controls :
High Business impact
Medium Business Impact
Low Business Impact
Management
Perspective: How well
do we manage the
end point of critical
infrastructures such
as Servers, desktop.
Common tools used in End Point Security
End Point Security tools On-Premise Cloud
Bitdefender X X
Carbon Black X X
Code42 X
Check Point X X
Comodo X X
CounterTack X X
RSA X
SentinelOne X
Sophos X X
Symantec X X
Trend Micro X X
Section Break
Insert the title of your subtitle Here
VULNERABILITY
MANAGEMENT
Vulnerability management is the process
surrounding vulnerability scanning, also taking
into account other aspects such as risk
acceptance, remediation etc.
Vulnerability Management Process
preparation
Vulnerability
scan
Define
Remediation
Implement
Remediation
Rescan
THREAT AND VULNERABILITY MANAGEMENT PROCESS
What is tracked and Measured in Vulnerability Management?
Metric Tracked Ranking
Mean Time to Detect
Mean Time to Resolve
Average Window of Exposure
Scanner Coverage
Scan Frequency by Asset Group
Average Risk by BU / Asset Group
Number of Exceptions Granted
Vulnerability Reopen Rate
% of Systems with no open High / Critical Vulnerability
High Business impact
Medium Business Impact
Low Business Impact
Management Perspective:
How well do we manage
the exposure of the
organization to
vulnerabilities by
identifying and mitigating
known vulnerabilities?
COMMON TOOLS USED IN VULNERABILITY MANAGEMENT
Vulnerability Management tools On-Premise Cloud
Comodo HackerProof X X
OpenVAS X X
Nexpose Community X
Nikto X X
Tripwire IP360 X X
Wireshark X X
Aircrack X
Nessus Professional X
Retina CS Community X X
Microsoft Baseline Security Analyzer (MBSA) X X
AlienVault USM Anywhere X
Thank you.
akin.akinfenwa@cyberopsinc.com

More Related Content

What's hot

Cybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architectureCybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architecturePriyanka Aash
 
Case study financial_services
Case study financial_servicesCase study financial_services
Case study financial_servicesG. Subramanian
 
IBM Security Strategy Overview
IBM Security Strategy OverviewIBM Security Strategy Overview
IBM Security Strategy Overviewxband
 
What We’ve Learned Building a Cyber Security Operation Center: du Case Study
What We’ve Learned Building a Cyber  Security Operation Center: du Case  StudyWhat We’ve Learned Building a Cyber  Security Operation Center: du Case  Study
What We’ve Learned Building a Cyber Security Operation Center: du Case StudyPriyanka Aash
 
Software security engineering
Software security engineeringSoftware security engineering
Software security engineeringAHM Pervej Kabir
 
Software Development Life Cycle – Managing Risk and Measuring Security
Software Development Life Cycle – Managing Risk and Measuring SecuritySoftware Development Life Cycle – Managing Risk and Measuring Security
Software Development Life Cycle – Managing Risk and Measuring SecurityThomas Malmberg
 
Enterprise under attack dealing with security threats and compliance
Enterprise under attack dealing with security threats and complianceEnterprise under attack dealing with security threats and compliance
Enterprise under attack dealing with security threats and complianceSPAN Infotech (India) Pvt Ltd
 
SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1Priyanka Aash
 
Roadmap to security operations excellence
Roadmap to security operations excellenceRoadmap to security operations excellence
Roadmap to security operations excellenceErik Taavila
 
IBM Security Software Solutions - One Pager
IBM Security Software Solutions - One PagerIBM Security Software Solutions - One Pager
IBM Security Software Solutions - One PagerThierry Matusiak
 
SOC: Use cases and are we asking the right questions?
SOC: Use cases and are we asking the right questions?SOC: Use cases and are we asking the right questions?
SOC: Use cases and are we asking the right questions?Jonathan Sinclair
 
Software Security Initiatives
Software Security InitiativesSoftware Security Initiatives
Software Security InitiativesMarco Morana
 
Strategy considerations for building a security operations center
Strategy considerations for building a security operations centerStrategy considerations for building a security operations center
Strategy considerations for building a security operations centerCMR WORLD TECH
 
Certified Information Systems Security Professional
Certified Information Systems Security ProfessionalCertified Information Systems Security Professional
Certified Information Systems Security ProfessionalHelen Njuguna
 
ASMC 2017 - Martin Vliem - Security < productivity < security: syntax ...
ASMC 2017 - Martin Vliem -  Security < productivity < security: syntax ...ASMC 2017 - Martin Vliem -  Security < productivity < security: syntax ...
ASMC 2017 - Martin Vliem - Security < productivity < security: syntax ...PlatformSecurityManagement
 

What's hot (19)

Cybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architectureCybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architecture
 
Information Security and the SDLC
Information Security and the SDLCInformation Security and the SDLC
Information Security and the SDLC
 
Case study financial_services
Case study financial_servicesCase study financial_services
Case study financial_services
 
Secure Design: Threat Modeling
Secure Design: Threat ModelingSecure Design: Threat Modeling
Secure Design: Threat Modeling
 
IBM Security Strategy Overview
IBM Security Strategy OverviewIBM Security Strategy Overview
IBM Security Strategy Overview
 
What We’ve Learned Building a Cyber Security Operation Center: du Case Study
What We’ve Learned Building a Cyber  Security Operation Center: du Case  StudyWhat We’ve Learned Building a Cyber  Security Operation Center: du Case  Study
What We’ve Learned Building a Cyber Security Operation Center: du Case Study
 
Soc
SocSoc
Soc
 
Software security engineering
Software security engineeringSoftware security engineering
Software security engineering
 
Risk Management Strategy (RMF v2)
Risk Management Strategy (RMF v2)Risk Management Strategy (RMF v2)
Risk Management Strategy (RMF v2)
 
Software Development Life Cycle – Managing Risk and Measuring Security
Software Development Life Cycle – Managing Risk and Measuring SecuritySoftware Development Life Cycle – Managing Risk and Measuring Security
Software Development Life Cycle – Managing Risk and Measuring Security
 
Enterprise under attack dealing with security threats and compliance
Enterprise under attack dealing with security threats and complianceEnterprise under attack dealing with security threats and compliance
Enterprise under attack dealing with security threats and compliance
 
SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1
 
Roadmap to security operations excellence
Roadmap to security operations excellenceRoadmap to security operations excellence
Roadmap to security operations excellence
 
IBM Security Software Solutions - One Pager
IBM Security Software Solutions - One PagerIBM Security Software Solutions - One Pager
IBM Security Software Solutions - One Pager
 
SOC: Use cases and are we asking the right questions?
SOC: Use cases and are we asking the right questions?SOC: Use cases and are we asking the right questions?
SOC: Use cases and are we asking the right questions?
 
Software Security Initiatives
Software Security InitiativesSoftware Security Initiatives
Software Security Initiatives
 
Strategy considerations for building a security operations center
Strategy considerations for building a security operations centerStrategy considerations for building a security operations center
Strategy considerations for building a security operations center
 
Certified Information Systems Security Professional
Certified Information Systems Security ProfessionalCertified Information Systems Security Professional
Certified Information Systems Security Professional
 
ASMC 2017 - Martin Vliem - Security < productivity < security: syntax ...
ASMC 2017 - Martin Vliem -  Security < productivity < security: syntax ...ASMC 2017 - Martin Vliem -  Security < productivity < security: syntax ...
ASMC 2017 - Martin Vliem - Security < productivity < security: syntax ...
 

Similar to Key metrics and process in cyber security case scenario

key metrics and process in cyber security case scenario
key metrics and process in cyber security case scenario key metrics and process in cyber security case scenario
key metrics and process in cyber security case scenario Skillweed
 
Smart security solutions for SMBs
Smart security solutions for SMBsSmart security solutions for SMBs
Smart security solutions for SMBsJyothi Satyanathan
 
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05 Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05 sucesuminas
 
Security Governance Isp Eng
Security Governance Isp EngSecurity Governance Isp Eng
Security Governance Isp EngMaurizio Milazzo
 
Software security engineering
Software security engineeringSoftware security engineering
Software security engineeringAHM Pervej Kabir
 
CompTIA CySA Domain 1 Threat and Vulnerability Management.pptx
CompTIA CySA Domain 1 Threat and Vulnerability Management.pptxCompTIA CySA Domain 1 Threat and Vulnerability Management.pptx
CompTIA CySA Domain 1 Threat and Vulnerability Management.pptxInfosectrain3
 
Does Anyone Remember Enterprise Security Architecture?
Does Anyone Remember Enterprise Security Architecture?Does Anyone Remember Enterprise Security Architecture?
Does Anyone Remember Enterprise Security Architecture?rbrockway
 
Comodo SOC service provider
Comodo SOC service providerComodo SOC service provider
Comodo SOC service providerpaulharry03
 
Software Security Engineering
Software Security EngineeringSoftware Security Engineering
Software Security EngineeringMarco Morana
 
II Security At Microsoft
II Security At MicrosoftII Security At Microsoft
II Security At MicrosoftMark J. Feldman
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxYoisRoberthTapiadeLa
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxVictoriaChavesta
 
Securing the Digital Frontier - An Analysis of Cybersecurity Landscape and Tr...
Securing the Digital Frontier - An Analysis of Cybersecurity Landscape and Tr...Securing the Digital Frontier - An Analysis of Cybersecurity Landscape and Tr...
Securing the Digital Frontier - An Analysis of Cybersecurity Landscape and Tr...Draup3
 
Cyber crime with privention
Cyber crime with privention Cyber crime with privention
Cyber crime with privention Manish Dixit Ceh
 
MS. Cybersecurity Reference Architecture
MS. Cybersecurity Reference ArchitectureMS. Cybersecurity Reference Architecture
MS. Cybersecurity Reference Architectureangelohammond
 
IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future IBM
 
CRS Company Overview -Feb 6 2017
CRS Company Overview -Feb 6 2017CRS Company Overview -Feb 6 2017
CRS Company Overview -Feb 6 2017Joseph John
 

Similar to Key metrics and process in cyber security case scenario (20)

key metrics and process in cyber security case scenario
key metrics and process in cyber security case scenario key metrics and process in cyber security case scenario
key metrics and process in cyber security case scenario
 
Smart security solutions for SMBs
Smart security solutions for SMBsSmart security solutions for SMBs
Smart security solutions for SMBs
 
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05 Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
 
Security Governance Isp Eng
Security Governance Isp EngSecurity Governance Isp Eng
Security Governance Isp Eng
 
Software security engineering
Software security engineeringSoftware security engineering
Software security engineering
 
CompTIA CySA Domain 1 Threat and Vulnerability Management.pptx
CompTIA CySA Domain 1 Threat and Vulnerability Management.pptxCompTIA CySA Domain 1 Threat and Vulnerability Management.pptx
CompTIA CySA Domain 1 Threat and Vulnerability Management.pptx
 
CCA study group
CCA study groupCCA study group
CCA study group
 
Does Anyone Remember Enterprise Security Architecture?
Does Anyone Remember Enterprise Security Architecture?Does Anyone Remember Enterprise Security Architecture?
Does Anyone Remember Enterprise Security Architecture?
 
Comodo SOC service provider
Comodo SOC service providerComodo SOC service provider
Comodo SOC service provider
 
Software Security Engineering
Software Security EngineeringSoftware Security Engineering
Software Security Engineering
 
II Security At Microsoft
II Security At MicrosoftII Security At Microsoft
II Security At Microsoft
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
 
Securing the Digital Frontier - An Analysis of Cybersecurity Landscape and Tr...
Securing the Digital Frontier - An Analysis of Cybersecurity Landscape and Tr...Securing the Digital Frontier - An Analysis of Cybersecurity Landscape and Tr...
Securing the Digital Frontier - An Analysis of Cybersecurity Landscape and Tr...
 
CRISC Course Preview
CRISC Course PreviewCRISC Course Preview
CRISC Course Preview
 
Cyber crime with privention
Cyber crime with privention Cyber crime with privention
Cyber crime with privention
 
MS. Cybersecurity Reference Architecture
MS. Cybersecurity Reference ArchitectureMS. Cybersecurity Reference Architecture
MS. Cybersecurity Reference Architecture
 
IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future
 
IAM Solution
IAM  SolutionIAM  Solution
IAM Solution
 
CRS Company Overview -Feb 6 2017
CRS Company Overview -Feb 6 2017CRS Company Overview -Feb 6 2017
CRS Company Overview -Feb 6 2017
 

More from Bim Akinfenwa

GRC Program KPIs and KRIs
GRC Program KPIs and KRIsGRC Program KPIs and KRIs
GRC Program KPIs and KRIsBim Akinfenwa
 
GDPR Compliance KPIs and KRIs
GDPR Compliance KPIs and KRIsGDPR Compliance KPIs and KRIs
GDPR Compliance KPIs and KRIsBim Akinfenwa
 
Data Privacy KPIs and KRIs
Data Privacy KPIs and KRIsData Privacy KPIs and KRIs
Data Privacy KPIs and KRIsBim Akinfenwa
 
Operational Technology (OT) Facility KPIs and KRIs
Operational Technology (OT) Facility KPIs and KRIsOperational Technology (OT) Facility KPIs and KRIs
Operational Technology (OT) Facility KPIs and KRIsBim Akinfenwa
 
Vulnerability Management KPIs and KRIs
Vulnerability Management KPIs and KRIsVulnerability Management KPIs and KRIs
Vulnerability Management KPIs and KRIsBim Akinfenwa
 
Cloud Deployment KPIs and KRIs
Cloud Deployment KPIs and KRIsCloud Deployment KPIs and KRIs
Cloud Deployment KPIs and KRIsBim Akinfenwa
 
Asset Management KPIs and KRIs
Asset Management KPIs and KRIsAsset Management KPIs and KRIs
Asset Management KPIs and KRIsBim Akinfenwa
 
Incident Response KPIs and KRIs
Incident Response KPIs and KRIsIncident Response KPIs and KRIs
Incident Response KPIs and KRIsBim Akinfenwa
 
Third-Party Vendor Risk Management KPIs and KRIs
Third-Party Vendor Risk Management KPIs and KRIsThird-Party Vendor Risk Management KPIs and KRIs
Third-Party Vendor Risk Management KPIs and KRIsBim Akinfenwa
 
Cyber IAM KPIs and KRIs
Cyber IAM KPIs and KRIsCyber IAM KPIs and KRIs
Cyber IAM KPIs and KRIsBim Akinfenwa
 
FedRAMP Compliance KPIs and KRIs
FedRAMP Compliance KPIs and KRIsFedRAMP Compliance KPIs and KRIs
FedRAMP Compliance KPIs and KRIsBim Akinfenwa
 
SOX Section 404 KPIs and KRIs
SOX Section 404 KPIs and KRIsSOX Section 404 KPIs and KRIs
SOX Section 404 KPIs and KRIsBim Akinfenwa
 
Data Governance KPIs and KRIs
Data Governance KPIs and KRIsData Governance KPIs and KRIs
Data Governance KPIs and KRIsBim Akinfenwa
 
Risk Assessment KPIs and KRIs:
Risk Assessment KPIs and KRIs:Risk Assessment KPIs and KRIs:
Risk Assessment KPIs and KRIs:Bim Akinfenwa
 
NERC-CIP Compliance KPIs and KRIs
NERC-CIP Compliance KPIs and KRIsNERC-CIP Compliance KPIs and KRIs
NERC-CIP Compliance KPIs and KRIsBim Akinfenwa
 
Threat Intelligence KPIs and KRIs
Threat Intelligence KPIs and KRIsThreat Intelligence KPIs and KRIs
Threat Intelligence KPIs and KRIsBim Akinfenwa
 

More from Bim Akinfenwa (20)

GRC Program KPIs and KRIs
GRC Program KPIs and KRIsGRC Program KPIs and KRIs
GRC Program KPIs and KRIs
 
GDPR Compliance KPIs and KRIs
GDPR Compliance KPIs and KRIsGDPR Compliance KPIs and KRIs
GDPR Compliance KPIs and KRIs
 
Data Privacy KPIs and KRIs
Data Privacy KPIs and KRIsData Privacy KPIs and KRIs
Data Privacy KPIs and KRIs
 
BCDR KPIs and KRIs
BCDR KPIs and KRIsBCDR KPIs and KRIs
BCDR KPIs and KRIs
 
Operational Technology (OT) Facility KPIs and KRIs
Operational Technology (OT) Facility KPIs and KRIsOperational Technology (OT) Facility KPIs and KRIs
Operational Technology (OT) Facility KPIs and KRIs
 
Vulnerability Management KPIs and KRIs
Vulnerability Management KPIs and KRIsVulnerability Management KPIs and KRIs
Vulnerability Management KPIs and KRIs
 
Cloud Deployment KPIs and KRIs
Cloud Deployment KPIs and KRIsCloud Deployment KPIs and KRIs
Cloud Deployment KPIs and KRIs
 
Asset Management KPIs and KRIs
Asset Management KPIs and KRIsAsset Management KPIs and KRIs
Asset Management KPIs and KRIs
 
Incident Response KPIs and KRIs
Incident Response KPIs and KRIsIncident Response KPIs and KRIs
Incident Response KPIs and KRIs
 
Third-Party Vendor Risk Management KPIs and KRIs
Third-Party Vendor Risk Management KPIs and KRIsThird-Party Vendor Risk Management KPIs and KRIs
Third-Party Vendor Risk Management KPIs and KRIs
 
Cyber IAM KPIs and KRIs
Cyber IAM KPIs and KRIsCyber IAM KPIs and KRIs
Cyber IAM KPIs and KRIs
 
FedRAMP Compliance KPIs and KRIs
FedRAMP Compliance KPIs and KRIsFedRAMP Compliance KPIs and KRIs
FedRAMP Compliance KPIs and KRIs
 
SOX Section 404 KPIs and KRIs
SOX Section 404 KPIs and KRIsSOX Section 404 KPIs and KRIs
SOX Section 404 KPIs and KRIs
 
SIEM KPIs and KRIs
SIEM KPIs and KRIsSIEM KPIs and KRIs
SIEM KPIs and KRIs
 
RMF KPIs and KRIs
RMF KPIs and KRIsRMF KPIs and KRIs
RMF KPIs and KRIs
 
Data Governance KPIs and KRIs
Data Governance KPIs and KRIsData Governance KPIs and KRIs
Data Governance KPIs and KRIs
 
Risk Assessment KPIs and KRIs:
Risk Assessment KPIs and KRIs:Risk Assessment KPIs and KRIs:
Risk Assessment KPIs and KRIs:
 
NERC-CIP Compliance KPIs and KRIs
NERC-CIP Compliance KPIs and KRIsNERC-CIP Compliance KPIs and KRIs
NERC-CIP Compliance KPIs and KRIs
 
Threat Intelligence KPIs and KRIs
Threat Intelligence KPIs and KRIsThreat Intelligence KPIs and KRIs
Threat Intelligence KPIs and KRIs
 
SDLC KPIs and KRIs
SDLC KPIs and KRIsSDLC KPIs and KRIs
SDLC KPIs and KRIs
 

Recently uploaded

Call Us ➥9654467111▻Call Girls In Delhi NCR
Call Us ➥9654467111▻Call Girls In Delhi NCRCall Us ➥9654467111▻Call Girls In Delhi NCR
Call Us ➥9654467111▻Call Girls In Delhi NCRSapana Sha
 
The Skin Games 2024 25 - Sponsorship Deck
The Skin Games 2024 25 - Sponsorship DeckThe Skin Games 2024 25 - Sponsorship Deck
The Skin Games 2024 25 - Sponsorship DeckToluwanimi Balogun
 
DGR_Digital Advertising Strategies for a Cookieless World_Presentation.pdf
DGR_Digital Advertising Strategies for a Cookieless World_Presentation.pdfDGR_Digital Advertising Strategies for a Cookieless World_Presentation.pdf
DGR_Digital Advertising Strategies for a Cookieless World_Presentation.pdfDemandbase
 
2024 SEO Trends for Business Success (WSA)
2024 SEO Trends for Business Success (WSA)2024 SEO Trends for Business Success (WSA)
2024 SEO Trends for Business Success (WSA)Jomer Gregorio
 
DIGITAL MARKETING STRATEGY_INFOGRAPHIC IMAGE.pdf
DIGITAL MARKETING STRATEGY_INFOGRAPHIC IMAGE.pdfDIGITAL MARKETING STRATEGY_INFOGRAPHIC IMAGE.pdf
DIGITAL MARKETING STRATEGY_INFOGRAPHIC IMAGE.pdfmayanksharma0441
 
How videos can elevate your Google rankings and improve your EEAT - Benjamin ...
How videos can elevate your Google rankings and improve your EEAT - Benjamin ...How videos can elevate your Google rankings and improve your EEAT - Benjamin ...
How videos can elevate your Google rankings and improve your EEAT - Benjamin ...Benjamin Szturmaj
 
Netflix Ads The Game Changer in Video Ads – Who Needs YouTube.pptx (Chester Y...
Netflix Ads The Game Changer in Video Ads – Who Needs YouTube.pptx (Chester Y...Netflix Ads The Game Changer in Video Ads – Who Needs YouTube.pptx (Chester Y...
Netflix Ads The Game Changer in Video Ads – Who Needs YouTube.pptx (Chester Y...ChesterYang6
 
Red bull marketing presentation pptxxxxx
Red bull marketing presentation pptxxxxxRed bull marketing presentation pptxxxxx
Red bull marketing presentation pptxxxxx216310017
 
Digital Marketing Spotlight: Lifecycle Advertising Strategies.pdf
Digital Marketing Spotlight: Lifecycle Advertising Strategies.pdfDigital Marketing Spotlight: Lifecycle Advertising Strategies.pdf
Digital Marketing Spotlight: Lifecycle Advertising Strategies.pdfDemandbase
 
TOP DUBAI AGENCY OFFERS EXPERT DIGITAL MARKETING SERVICES.pdf
TOP DUBAI AGENCY OFFERS EXPERT DIGITAL MARKETING SERVICES.pdfTOP DUBAI AGENCY OFFERS EXPERT DIGITAL MARKETING SERVICES.pdf
TOP DUBAI AGENCY OFFERS EXPERT DIGITAL MARKETING SERVICES.pdfasiyahanif9977
 
Avoid the 2025 web accessibility rush: do not fear WCAG compliance
Avoid the 2025 web accessibility rush: do not fear WCAG complianceAvoid the 2025 web accessibility rush: do not fear WCAG compliance
Avoid the 2025 web accessibility rush: do not fear WCAG complianceDamien ROBERT
 
Call Girls in Lajpat Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Lajpat Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Lajpat Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Lajpat Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
marketing strategy of tanishq word PPROJECT.pdf
marketing strategy of tanishq word PPROJECT.pdfmarketing strategy of tanishq word PPROJECT.pdf
marketing strategy of tanishq word PPROJECT.pdfarsathsahil
 
Inbound Marekting 2.0 - The Paradigm Shift in Marketing | Axon Garside
Inbound Marekting 2.0 - The Paradigm Shift in Marketing | Axon GarsideInbound Marekting 2.0 - The Paradigm Shift in Marketing | Axon Garside
Inbound Marekting 2.0 - The Paradigm Shift in Marketing | Axon Garsiderobwhite630290
 
BrightonSEO - Addressing SEO & CX - CMDL - Apr 24 .pptx
BrightonSEO -  Addressing SEO & CX - CMDL - Apr 24 .pptxBrightonSEO -  Addressing SEO & CX - CMDL - Apr 24 .pptx
BrightonSEO - Addressing SEO & CX - CMDL - Apr 24 .pptxcollette15
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Film Nagar high-profile Call ...
VIP 7001035870 Find & Meet Hyderabad Call Girls Film Nagar high-profile Call ...VIP 7001035870 Find & Meet Hyderabad Call Girls Film Nagar high-profile Call ...
VIP 7001035870 Find & Meet Hyderabad Call Girls Film Nagar high-profile Call ...aditipandeya
 
The Pitfalls of Keyword Stuffing in SEO Copywriting
The Pitfalls of Keyword Stuffing in SEO CopywritingThe Pitfalls of Keyword Stuffing in SEO Copywriting
The Pitfalls of Keyword Stuffing in SEO CopywritingJuan Pineda
 
Brighton SEO April 2024 - The Good, the Bad & the Ugly of SEO Success
Brighton SEO April 2024 - The Good, the Bad & the Ugly of SEO SuccessBrighton SEO April 2024 - The Good, the Bad & the Ugly of SEO Success
Brighton SEO April 2024 - The Good, the Bad & the Ugly of SEO SuccessVarn
 
Jai Institute for Parenting Program Guide
Jai Institute for Parenting Program GuideJai Institute for Parenting Program Guide
Jai Institute for Parenting Program Guidekiva6
 
Cost-effective tactics for navigating CPC surges
Cost-effective tactics for navigating CPC surgesCost-effective tactics for navigating CPC surges
Cost-effective tactics for navigating CPC surgesPushON Ltd
 

Recently uploaded (20)

Call Us ➥9654467111▻Call Girls In Delhi NCR
Call Us ➥9654467111▻Call Girls In Delhi NCRCall Us ➥9654467111▻Call Girls In Delhi NCR
Call Us ➥9654467111▻Call Girls In Delhi NCR
 
The Skin Games 2024 25 - Sponsorship Deck
The Skin Games 2024 25 - Sponsorship DeckThe Skin Games 2024 25 - Sponsorship Deck
The Skin Games 2024 25 - Sponsorship Deck
 
DGR_Digital Advertising Strategies for a Cookieless World_Presentation.pdf
DGR_Digital Advertising Strategies for a Cookieless World_Presentation.pdfDGR_Digital Advertising Strategies for a Cookieless World_Presentation.pdf
DGR_Digital Advertising Strategies for a Cookieless World_Presentation.pdf
 
2024 SEO Trends for Business Success (WSA)
2024 SEO Trends for Business Success (WSA)2024 SEO Trends for Business Success (WSA)
2024 SEO Trends for Business Success (WSA)
 
DIGITAL MARKETING STRATEGY_INFOGRAPHIC IMAGE.pdf
DIGITAL MARKETING STRATEGY_INFOGRAPHIC IMAGE.pdfDIGITAL MARKETING STRATEGY_INFOGRAPHIC IMAGE.pdf
DIGITAL MARKETING STRATEGY_INFOGRAPHIC IMAGE.pdf
 
How videos can elevate your Google rankings and improve your EEAT - Benjamin ...
How videos can elevate your Google rankings and improve your EEAT - Benjamin ...How videos can elevate your Google rankings and improve your EEAT - Benjamin ...
How videos can elevate your Google rankings and improve your EEAT - Benjamin ...
 
Netflix Ads The Game Changer in Video Ads – Who Needs YouTube.pptx (Chester Y...
Netflix Ads The Game Changer in Video Ads – Who Needs YouTube.pptx (Chester Y...Netflix Ads The Game Changer in Video Ads – Who Needs YouTube.pptx (Chester Y...
Netflix Ads The Game Changer in Video Ads – Who Needs YouTube.pptx (Chester Y...
 
Red bull marketing presentation pptxxxxx
Red bull marketing presentation pptxxxxxRed bull marketing presentation pptxxxxx
Red bull marketing presentation pptxxxxx
 
Digital Marketing Spotlight: Lifecycle Advertising Strategies.pdf
Digital Marketing Spotlight: Lifecycle Advertising Strategies.pdfDigital Marketing Spotlight: Lifecycle Advertising Strategies.pdf
Digital Marketing Spotlight: Lifecycle Advertising Strategies.pdf
 
TOP DUBAI AGENCY OFFERS EXPERT DIGITAL MARKETING SERVICES.pdf
TOP DUBAI AGENCY OFFERS EXPERT DIGITAL MARKETING SERVICES.pdfTOP DUBAI AGENCY OFFERS EXPERT DIGITAL MARKETING SERVICES.pdf
TOP DUBAI AGENCY OFFERS EXPERT DIGITAL MARKETING SERVICES.pdf
 
Avoid the 2025 web accessibility rush: do not fear WCAG compliance
Avoid the 2025 web accessibility rush: do not fear WCAG complianceAvoid the 2025 web accessibility rush: do not fear WCAG compliance
Avoid the 2025 web accessibility rush: do not fear WCAG compliance
 
Call Girls in Lajpat Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Lajpat Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Lajpat Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Lajpat Nagar Delhi 💯Call Us 🔝8264348440🔝
 
marketing strategy of tanishq word PPROJECT.pdf
marketing strategy of tanishq word PPROJECT.pdfmarketing strategy of tanishq word PPROJECT.pdf
marketing strategy of tanishq word PPROJECT.pdf
 
Inbound Marekting 2.0 - The Paradigm Shift in Marketing | Axon Garside
Inbound Marekting 2.0 - The Paradigm Shift in Marketing | Axon GarsideInbound Marekting 2.0 - The Paradigm Shift in Marketing | Axon Garside
Inbound Marekting 2.0 - The Paradigm Shift in Marketing | Axon Garside
 
BrightonSEO - Addressing SEO & CX - CMDL - Apr 24 .pptx
BrightonSEO -  Addressing SEO & CX - CMDL - Apr 24 .pptxBrightonSEO -  Addressing SEO & CX - CMDL - Apr 24 .pptx
BrightonSEO - Addressing SEO & CX - CMDL - Apr 24 .pptx
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Film Nagar high-profile Call ...
VIP 7001035870 Find & Meet Hyderabad Call Girls Film Nagar high-profile Call ...VIP 7001035870 Find & Meet Hyderabad Call Girls Film Nagar high-profile Call ...
VIP 7001035870 Find & Meet Hyderabad Call Girls Film Nagar high-profile Call ...
 
The Pitfalls of Keyword Stuffing in SEO Copywriting
The Pitfalls of Keyword Stuffing in SEO CopywritingThe Pitfalls of Keyword Stuffing in SEO Copywriting
The Pitfalls of Keyword Stuffing in SEO Copywriting
 
Brighton SEO April 2024 - The Good, the Bad & the Ugly of SEO Success
Brighton SEO April 2024 - The Good, the Bad & the Ugly of SEO SuccessBrighton SEO April 2024 - The Good, the Bad & the Ugly of SEO Success
Brighton SEO April 2024 - The Good, the Bad & the Ugly of SEO Success
 
Jai Institute for Parenting Program Guide
Jai Institute for Parenting Program GuideJai Institute for Parenting Program Guide
Jai Institute for Parenting Program Guide
 
Cost-effective tactics for navigating CPC surges
Cost-effective tactics for navigating CPC surgesCost-effective tactics for navigating CPC surges
Cost-effective tactics for navigating CPC surges
 

Key metrics and process in cyber security case scenario

  • 1. Proposed Business Process, metrics and tools Optimization for key IT domain Akin Akinfenwa 12March2019
  • 2. Confused on metrics to track, Good Processes to adopt, and tools to use?  Identity & Access Management  Secure SDLC & Application Security  Endpoint Security  Vulnerability Management Always begin with the Story…. Key Assumptions made: This is not specific to industry, hence the business processes in presentation, metrics, and tools are simply generic and not unique to any situation, most of the processes could be customized to unique industries as needed. Further assumptions will be that IT controls are mapped to COBIT, NIST 800-53 or ISO 27001 already.
  • 4. IAM are Series of framework of policies, procedures and technologies for ensuring appropriate personnel have access to technology resources.
  • 5. Identify And Access Management Process and activities PROVISION ENFORCEADMINISTER  REQUEST ACCESS  VALIDATE REQUEST  APPROVE ACCESS  ASSIGN AND COMMUNICATE ACCESS  PLAN AND STRATEGIZE  MANAGE POLICIES AND STANDARDS  EDUCATE AND MANAGE SYSTEMS  MONITOR, AUDIT AND RECONCILE • AUTHENTICATE • AUTHORIZE • LOG ACTIVITIES S Y S T E M S A N D D A T A
  • 6. WHAT IS TRACKED AND MEASURED IN IDENTITY AND ACCESS MANAGEMENT? Metric Tracked Ranking Average number of distinct accounts (credentials) per user: Number of unused accounts: Number of orphaned accounts: Number of new accounts provisioned: Number of exceptions per access re-certification cycle Password policy effectiveness: Average time to provision and de-provision of a user: Average time to provide an authorization Average time to make changes in identity policies: Violation of separation of duties: High Business impact Medium Business Impact Low Business Impact Management Perspective: How well do we manage user provisioning without exposing the organization to access risk.
  • 7. COMMON TOOLS USED IN IDENTIFY & ACCESS MANAGEMENT (IAM) IAM Tools On-Premise Cloud Forefront Identity Manager X X Microsoft Azure Active Directory X X Oracle Identity Management X Okta Identity Management X X Zoho Vault X X OneLogin X X LogMeIn Pro X Auth0 X ExcelID X X ADManager Plus X X IBM IAM X X
  • 9. Application security encompasses measures taken to improve the security of an application often by finding, fixing and preventing security vulnerabilities A secure SDLC process ensures that security assurance activities such as penetration testing, code review, and architecture analysis are an integral part of the development effort.
  • 10. SECURE SDLC & APPLICATION SECURITY PROCESS REQUIREMENTS DESIGN DEVELOPMENT TEXT DEPLOYMENT Map Security & Privacy Requirements Threat modelling. Security design review Static Analysis Peer Review Security test cases Dynamic Analysis Final security review Application security & monitoring Response Plan Web application security People • Training • organization Process • Risk management • SDLC • Guidelines • Verification Technology • Tools • Development • frameworks
  • 11. WHAT IS TRACKED AND MEASURED IN APPLICATION SECURITY? Metric Tracked Ranking Weighted Risk Trend Remediation Calculation Window Application Testing Coverage Mean Time to Respond Confirmed exploits Confirmed Account Takeovers High Business impact Medium Business Impact Low Business Impact Management Perspective: Can we rely on the security model of business applications to operate as intended? Risk is very relative to industry and other controls established within the business
  • 12. COMMON TOOLS USED IN APPLICATION SECURITY Application Security tools On-Premise Cloud Wapiti X X Zed Attack Proxy X X Vega X W3af X X Skipfish X X Ratproxy X X SQLMap X Wfuzz X Wapiti X X Zed Attack Proxy X X Vega X X
  • 14. Endpoint Security/ endpoint protection is an approach to the protection of computer networks that are remotely bridged to client devices.
  • 15. END POINT SECURITY PROCESS CONFIGURATION MANAGEMENT ANTI-MALWARE ACCEPTABLE USE RPOLICIES SYSTEM MONITORING END-POINT SECURITY CONTROLS DATA SECURITY APPLICATION SECURITY I A M The policies, processes and technology controls used to protect the confidentiality, integrity, and availability of an end point system
  • 16. What is tracked and Measured in Endpoint Security? Metric Tracked Ranking Level of visibility the solution provides : Types of threat detected : OS supporting ability : File detection : Security controls : High Business impact Medium Business Impact Low Business Impact Management Perspective: How well do we manage the end point of critical infrastructures such as Servers, desktop.
  • 17. Common tools used in End Point Security End Point Security tools On-Premise Cloud Bitdefender X X Carbon Black X X Code42 X Check Point X X Comodo X X CounterTack X X RSA X SentinelOne X Sophos X X Symantec X X Trend Micro X X
  • 18. Section Break Insert the title of your subtitle Here VULNERABILITY MANAGEMENT
  • 19. Vulnerability management is the process surrounding vulnerability scanning, also taking into account other aspects such as risk acceptance, remediation etc.
  • 21. What is tracked and Measured in Vulnerability Management? Metric Tracked Ranking Mean Time to Detect Mean Time to Resolve Average Window of Exposure Scanner Coverage Scan Frequency by Asset Group Average Risk by BU / Asset Group Number of Exceptions Granted Vulnerability Reopen Rate % of Systems with no open High / Critical Vulnerability High Business impact Medium Business Impact Low Business Impact Management Perspective: How well do we manage the exposure of the organization to vulnerabilities by identifying and mitigating known vulnerabilities?
  • 22. COMMON TOOLS USED IN VULNERABILITY MANAGEMENT Vulnerability Management tools On-Premise Cloud Comodo HackerProof X X OpenVAS X X Nexpose Community X Nikto X X Tripwire IP360 X X Wireshark X X Aircrack X Nessus Professional X Retina CS Community X X Microsoft Baseline Security Analyzer (MBSA) X X AlienVault USM Anywhere X