E-Security Gulf Group WLL Corporate Profile [email_address] www.esgulf.com http://4sec.blogspot.com/
Profile “ Leading security solutions ” Strategic partner for security solutions EU, GCC, Asia ISO27001, ISO27002, ISO13335, CoBIT, ITIL, BS25999, PAS56, EMV2,Basel 2 , HIPAA, SOX Complete security portfolio Physical Security Homeland Security Incidence Response Center Managed Security Services Pool > 50 security professionals A 5tm  Methodology Time Based Security
New Technologies, Risks Laptops Mobiles Wireless Bluetooth PDA Memory Sticks Smart Card
More sophisticated Attacks
When Hackers grow UP?
Your Business @ Risk!
Critical resources
Disaster Strikes easy…
Threats Industrial Espionage Environmental Natural Disasters Unexpected (“OOPS” factor) Cyber terrorism Viruses Threats
Business Risk Employee &  customer  privacy Legislative violations Financial loss Intellectual capital Litigation Public Image/Trust Business Risks
The result is!
Right Assumptions?
Security Challenges Confidentiality Integrity Availability
Threats and Risk
Risk requires… Technology Process People
Risk Matrices
Leverage Standards Security Metrics Key Performance Indicators CoBiT, Compliance ITIL ISO20000 ( & BS15000) ISO27001 ISO2700x PAS56 BS25999 Physical ISO14001 OHSAS18001 OSPB
Security = Time Protection Detection Response SECURITY P>D+R Anti-virus VPN Access Control Firewall Intrusion Prevention  Patch Mgmt Disaster Recovery Incidence Response Vulnerability Testing Intrusion Detection CCTV, Access Control Log Correlation
A5 Continuous process User Non-IT Devices Applications Databases Platforms Networks A 5tm  S ecurity Physical A dminister A pply A rchitect A ssess A wareness
Security Services Managed Security Services CCTV & Access Control Security Operations Center Forensic Analysis Incidence Response Administer Security Education Training and Awareness Organizational security Security Maturity Awareness Security Defense, Administration PKI, VPN, Encryption Biometrics, Smart Card, Access Control, Perimeter Web Defacement Protection Content Inspection and Management Apply Design Security Perimeter Security Awareness Program Policies, Standards, Procedures, Guidelines Physical Protection Disaster Recovery Planning Architect Vulnerability Testing ISO27001 Assessment Penetration Testing Business Impact Assessment Security Auditing Assess
Security Research-1 Remote secure data access Certificate based or dynamic password technology Transparent technology Secure Access Your portable Datacenter Full Data synchronization Multi-operating System Support Support for full back and front office operations Tactical solution for Disaster Recovery Disaster Recovery Box (DRB) Cost Effective Security Operations Center Internal or Externally Managed Technology Transfer Distributed Architecture, Scalable, Module Support for full forensic analysis First  Defence Basis for Security Framework Based on open Security Standards Support for Time Based Security Continuous Process People, Process Technology Paradigm A 5 tm  Methodology Key Features Solutions
Security Research-2 Hackers Insight for CIO/CEO Hackers Insight for Managers Hackers Insight for Techies Hackers Insight for Wireless Practical Security Workshops Learn attack and countermeasure technologies Hackers Insight Training Series Managed Vulnerability Services Managed Early alter Services Managed Patching and Configuration Management Managed Incidence Response Managed Security Monitoring and Alerting Managed Security Services (MSS) Multi technology for complete Defense Early warning system Internal and external protection Managed Service Phishing Alert Plus (PAP) Secure Hosting Secure Data Vaulting Complete Storage and Transmission Encryption Swiss Vault Key Features Solutions
Integration Business Security Management Physical Security Management ICT Security Management
A5™ - Process ASSESS ARCHITECT APPLY ADMINISTER Awareness Business Risk Controls Maturity
Best Practices
Securing Applications
Flexible Architecture
Physical Security
Knowledge fills gaps SETA =Security Education + Training + Awareness
A5™  Security Defense in depth
Incidence Response Time Line Process Analyse Contain Eliminate Restore Lessons Policy Refine Policy Continuous Monitoring T-1 T 0 T 1 T 1 T 3 T 4 T N Communicate
SOC Continuous Response 24x7x365  Security monitoring Managed Services Automatic Alerting Incidence Response Vulnerability Assessment Patch Management Forensic Analysis Integration
Various response types Business Availability
Implementation Process Education Standards & Best Practices Support
Partnerships
Why eSgulf? Integrated Methodology Industry Best practices Business & Risk  Focus Security Metrics approach Security Experts Proof of Concept and R&D Lab Proven delivery, references Cost effective solutions & services Strategic Vendor Partnerships 24x7x365 Support

Esguf Profile Short V34

  • 1.
    E-Security Gulf GroupWLL Corporate Profile [email_address] www.esgulf.com http://4sec.blogspot.com/
  • 2.
    Profile “ Leadingsecurity solutions ” Strategic partner for security solutions EU, GCC, Asia ISO27001, ISO27002, ISO13335, CoBIT, ITIL, BS25999, PAS56, EMV2,Basel 2 , HIPAA, SOX Complete security portfolio Physical Security Homeland Security Incidence Response Center Managed Security Services Pool > 50 security professionals A 5tm Methodology Time Based Security
  • 3.
    New Technologies, RisksLaptops Mobiles Wireless Bluetooth PDA Memory Sticks Smart Card
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
    Threats Industrial EspionageEnvironmental Natural Disasters Unexpected (“OOPS” factor) Cyber terrorism Viruses Threats
  • 10.
    Business Risk Employee& customer privacy Legislative violations Financial loss Intellectual capital Litigation Public Image/Trust Business Risks
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
    Leverage Standards SecurityMetrics Key Performance Indicators CoBiT, Compliance ITIL ISO20000 ( & BS15000) ISO27001 ISO2700x PAS56 BS25999 Physical ISO14001 OHSAS18001 OSPB
  • 18.
    Security = TimeProtection Detection Response SECURITY P>D+R Anti-virus VPN Access Control Firewall Intrusion Prevention Patch Mgmt Disaster Recovery Incidence Response Vulnerability Testing Intrusion Detection CCTV, Access Control Log Correlation
  • 19.
    A5 Continuous processUser Non-IT Devices Applications Databases Platforms Networks A 5tm S ecurity Physical A dminister A pply A rchitect A ssess A wareness
  • 20.
    Security Services ManagedSecurity Services CCTV & Access Control Security Operations Center Forensic Analysis Incidence Response Administer Security Education Training and Awareness Organizational security Security Maturity Awareness Security Defense, Administration PKI, VPN, Encryption Biometrics, Smart Card, Access Control, Perimeter Web Defacement Protection Content Inspection and Management Apply Design Security Perimeter Security Awareness Program Policies, Standards, Procedures, Guidelines Physical Protection Disaster Recovery Planning Architect Vulnerability Testing ISO27001 Assessment Penetration Testing Business Impact Assessment Security Auditing Assess
  • 21.
    Security Research-1 Remotesecure data access Certificate based or dynamic password technology Transparent technology Secure Access Your portable Datacenter Full Data synchronization Multi-operating System Support Support for full back and front office operations Tactical solution for Disaster Recovery Disaster Recovery Box (DRB) Cost Effective Security Operations Center Internal or Externally Managed Technology Transfer Distributed Architecture, Scalable, Module Support for full forensic analysis First Defence Basis for Security Framework Based on open Security Standards Support for Time Based Security Continuous Process People, Process Technology Paradigm A 5 tm Methodology Key Features Solutions
  • 22.
    Security Research-2 HackersInsight for CIO/CEO Hackers Insight for Managers Hackers Insight for Techies Hackers Insight for Wireless Practical Security Workshops Learn attack and countermeasure technologies Hackers Insight Training Series Managed Vulnerability Services Managed Early alter Services Managed Patching and Configuration Management Managed Incidence Response Managed Security Monitoring and Alerting Managed Security Services (MSS) Multi technology for complete Defense Early warning system Internal and external protection Managed Service Phishing Alert Plus (PAP) Secure Hosting Secure Data Vaulting Complete Storage and Transmission Encryption Swiss Vault Key Features Solutions
  • 23.
    Integration Business SecurityManagement Physical Security Management ICT Security Management
  • 24.
    A5™ - ProcessASSESS ARCHITECT APPLY ADMINISTER Awareness Business Risk Controls Maturity
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
    Knowledge fills gapsSETA =Security Education + Training + Awareness
  • 30.
    A5™ SecurityDefense in depth
  • 31.
    Incidence Response TimeLine Process Analyse Contain Eliminate Restore Lessons Policy Refine Policy Continuous Monitoring T-1 T 0 T 1 T 1 T 3 T 4 T N Communicate
  • 32.
    SOC Continuous Response24x7x365 Security monitoring Managed Services Automatic Alerting Incidence Response Vulnerability Assessment Patch Management Forensic Analysis Integration
  • 33.
    Various response typesBusiness Availability
  • 34.
    Implementation Process EducationStandards & Best Practices Support
  • 35.
  • 36.
    Why eSgulf? IntegratedMethodology Industry Best practices Business & Risk Focus Security Metrics approach Security Experts Proof of Concept and R&D Lab Proven delivery, references Cost effective solutions & services Strategic Vendor Partnerships 24x7x365 Support

Editor's Notes

  • #2 Introduce: ESGULF, partners, sponsors, yourself