SlideShare a Scribd company logo
1 of 35
Download to read offline
Makers of World’s 1st SaaS GRC
Copyright © 2020 FixNix Inc. Confidential. All rights reserved.
Are you ready for Covid19 way of Cyber Security ?
Virtual Chief Information Security Officer(V-CISO) Alliance Webinar
Occupational Safety | Business Resiliency | Network Security
vCISO.FixNix.co
IT SECURITY IN COVID-19
Presented by,
Nagesh Lad, CISSP, CISA
Speaker’s Profile
• Bachelor of Engineering (B.E.) in Electronics from Mumbai
University
• CISA, CISSP, CPISI, ACSA, DCL, ITIL, CEH, CCNA Certified
• 18+ years of industry experience
• Worked for BFSI (Stock Exchange, Banks, Clearing
Corporation, Insurance) and IT Service Industry
• Working as CISO for Private Indian Insurance Company for
more than 7 years
Agenda
• Assumptions
• Different Phases handling current Pandemic Situation
• Enabling WFH Facilities
• IT Security Practices in COVID-19
Assumptions
Organizations are following Information and Cyber Security Practices
which may include but not limit to:
• Secure Network Architecture
• Secure SDLC Practices
• Multi-layered Security Controls / Protections
• Secure Configuration Practices
• Patch Management
• Vulnerability Management
• Data backup & restoration practices
• Role based & least privilege access rights and revalidation practices
• Continuous Monitoring & Responding to Security Alerts
• & others …
Different Phases
Every organization would have gone through below phases
while handling current COVID-19 Pandemic Situation
• Invocation of BCP Plan
• Enabling WFH Facilities
• Educating Users on Do’s and Don’ts
• Re-aligning Security Controls / Practices
• Fine-tuning Monitoring Practices
Invocation of BCP
• Many organization were having documented & tested
BCP Plan
• But very few were ready for such a long lock down period
• WFH has became new way of delivering business
activities
• Many would have revised their BCP Plan to include such
pandemic scenario
ENABLING WFH
FACILITIES
Challenges Faced
• Organizations were having remote access facilities like
VPN and VDI over Internet – but for limited users
• Limited Licenses
• Limited Device Capacity
• Laptops were assigned to limited users based on their
role
• Limited Internet bandwidth
Few Approaches Taken
• Enabled VPN accesses on organization’s securely
configured laptops
• Enabled VDI over internet access for users to connect
from their personal systems
• Allowed users to take organization’s desktops at their
home – risky option if not controlled properly
Steps taken to enable WFH
• Purchased or rented Laptops in bulk quantity
• Increased licenses and capacity of VPN and VDI Solutions
• Increased internet connection bandwidth
• Enabled VPN & VDI accesses to large set of users
• Performed Risk Assessment on Service Provider’s WFH
facilities
• On-boarded new vendors who were ready to deliver services in
WFH scenario – e.g. call center agent solution for WFH
Communications from Regulator
• Regulators were sending frequent security advisories /
notifications to guide organizations
• Number of advisories received from IRDAI on WFH
Security Guidelines, BCP / DR Guidelines for COVID-19
• RBI sent notifications related to DDoS & Phishing
Campaigns from China
• Organization should monitor such communications & take
necessary actions
IT SECURITY PRACTICES
IN COVID-19
User Awareness
• Educating Users on Do’s and Don’ts for Information and
Cyber Security point of view
• Creating situation based awareness e.g.
• Conducting video conference calls,
• Accessing organization’s systems from home
• Wi-Fi Connection Security
• Handling COVID-19 phishing emails etc.
End Point Security
All organization’s end points (laptops) should be securely configured
• Normal access rights to End Users
• Installation of agents like
• Device Control Management
• Internet Proxy Client
• Host based DLP
• Antivirus
• EDR Solution
• Installation of Regular updates & patches
• Weekly complete scanning of End Point to identify / clean any
infection
Network / System Security
• Enable DDoS Protection
• External Penetration Testing to identify & mitigate vulnerability
present (if any)
• Secure Configuration Review and Vulnerability Assessment of
WFH Solutions – VPN, VDI etc.
• Vulnerability Assessments of Internet Facing Systems & Critical
Systems
• Blocking of traffic coming from out of India specially for WFH
Solutions (basis of nature of business & spread of end users)
Security Controls for VPN
• Allow access to only limited secure ports over internet
• Admin interface should be blocked over internet
• Enable 2FA Authentications mechanism
• Allow users to connect to VPN only from organization’s
securely configured laptops
• Enable secure posture validation for End Points
• Configure devices securely and test them periodically
Security Controls for VDI over Internet
• Allow access to only limited secure ports over internet
• Admin interface should be blocked over internet
• Enable 2FA Authentications mechanism
• Ensure restriction of copy-paste rights
Security of Collaboration Solutions
• Organization enabled accesses to collaboration solutions like video
conferencing e.g. webex, google meet, MS team, Zoom
• Earlier, such accesses were restricted to limited set of users
considering data security & other risks
• Organization should set security guidelines for users while using such
solutions. For e.g.:
• Secure distribution of meeting invite to limited required participants
• Enabling waiting room, allow known participants in the meeting
• Restricting presentation access to host
• Disabling remote accesses etc.
• Educate users on these security guidelines
• Keep software updated with latest version & patches
Firewall Rulebase
• Enable accesses basis of User roles and requirements
from VPN & VDI Systems
• Do not enable complete access to Production Network
• Block black listed IP addresses on perimeter devices
• Block IOCs available in active attacks in the news
• Periodically revalidate accesses enabled from VPN & VDI
Systems
Security Monitoring Practices
• Integrate security and audit logs from all security & perimeter
devices and from critical systems
• Fine-tune use cases basis of current situation and active attack
patterns
• Continuously Monitor & respond to DLP and EDR Alerts
• Monitor of traffic coming from VPN Users
• Perform trend analysis to identify deviation from normal
patterns
• Fine-tune Cyber Crisis Management Plan (CCMP) to include
WFH Situation
Third Party Risk
• Many organizations outsource number of activities to third party
e.g. callings, data entry
• Many of these Third Parties are connected using leased lines,
IPSec Tunnel to organization network to access applications /
systems
• Assess risk introduced by WFH facilities at third party end
• Keep eye on security news to monitor any news related
associated third parties
• Services available which monitor risks from third parties to the
organization and provides reports / alerts for the same –
organization can avail such services
Privilege Access Management
• Ensure no admin module directly available over internet
• Enable Privilege access rights using PAM Solutions
• Enable 2FA Authentication Mechanism
• Enable access rights based on role and least privilege
principles
• Periodically revalidate need for Privilege Access Rights
User Access Revalidations
• Enable user access rights “need to know” and “least
privilege” basis
• Follow entry – exit process to grant & remove access
rights
• Periodically revalidate existence of user and need of
access rights basis of user’s role
• Frequently check inactive users (e.g. inactive for 10 days)
• Remove dormant & orphan User IDs
Back to office
• Slowly governments are allowing companies to call their
employees back to office
• User may bring infected system to office
• User may also bring their personal system to office
• NAC control should be effective to keep infected system
out of network or in an isolated segment
Governance Practices
Set governance practices
• To ensure execution of all critical activities which were
getting delivered from normal work scenario
• To monitor effectiveness of security practices built &
security posture of the organization
• To identify, review & track severe risks
• To take decision on mitigation of severe risks
2
Cyber Security
and
regulatory
Problems
Mutiple standards, regulations, security standards, process across operating
geographies like ISO 27001, GDPR, CCPA, PCI DSS, etc
Increasing complex Audits involving Information Security, Compliance, Legal,
External auditors, Regulators from large enterprises to country regulators
New age Digital, Traditional, Vendor risks need different approaches to improve
Digital Risk Maturity
Cross-department collaboration and strategy as they aim to have a single
enterprise portal and backbone for managing, communicating, and
maintaining policies
Copyright © 2020 FixNix Inc. Confidential. All rights reserved.
V-CISO - How it works Copyright © 2020 FixNix Inc. Confidential. All rights reserved.
Copyright © 2020 FixNix Inc. Confidential. All rights reserved.
V-CISO on board
V-CISO on board Copyright © 2020 FixNix Inc. Confidential. All rights reserved.
Copyright © 2020 FixNix Inc. Confidential. All rights reserved.
V-CISO on board
Copyright © 2020 FixNix Inc. Confidential. All rights reserved.
V-CISO on board
V-CISO Models Copyright © 2020 FixNix Inc. Confidential. All rights reserved.
Save Over 85% in Full Time CISO salary, every year! Copyright © 2020 FixNix Inc. Confidential. All rights reserved.
❑ A simple 80 hours a month Virtual CISO plan with FixNix would cost you in
the region of $30,000 per annum where your team is going to geta V-CISO
strategizes every day 3.2 hours, 25 days a month for your organization.
❑ Whereas a full time, experienced CISO, on average, would set you back
approximately $200,000 per year (not including hiring costs, sick pay,
holiday pay and training costs and possibly redundancy payments).
Shanmugavel Sankaran
Founder, FixNix
Shan@FixNix.co
+1 925 395 3684
+91 87 90 878 222
RegTech21| Red Herring Asia 100
TieCon50| Most User Friendly GRC
Copyright © 2020 FixNix Inc. Confidential. All rights reserved.
From FixNix with for

More Related Content

What's hot

Mobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best PracticesMobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best PracticesCisco Canada
 
Managing Multiple Assessments Using Zero Trust Principles
Managing Multiple Assessments Using Zero Trust PrinciplesManaging Multiple Assessments Using Zero Trust Principles
Managing Multiple Assessments Using Zero Trust PrinciplesControlCase
 
Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015Samuel Kamuli
 
Design and Evaluation of [vSoC]: Virtualised Security Operations Centre
Design and Evaluation of [vSoC]: Virtualised Security Operations Centre  Design and Evaluation of [vSoC]: Virtualised Security Operations Centre
Design and Evaluation of [vSoC]: Virtualised Security Operations Centre Napier University
 
IBM Endpoint Manager for Mobile Devices (Overview)
IBM Endpoint Manager for Mobile Devices (Overview)IBM Endpoint Manager for Mobile Devices (Overview)
IBM Endpoint Manager for Mobile Devices (Overview)Kimber Spradlin
 
Accelerating OT - A Case Study
Accelerating OT - A Case StudyAccelerating OT - A Case Study
Accelerating OT - A Case StudyDigital Bond
 
Assessing the Security of Cloud SaaS Solutions
Assessing the Security of Cloud SaaS SolutionsAssessing the Security of Cloud SaaS Solutions
Assessing the Security of Cloud SaaS SolutionsDigital Bond
 
Huntsville GovCon Growth Summit 2020 - Summit 7 - Cybersecurity Maturity Mode...
Huntsville GovCon Growth Summit 2020 - Summit 7 - Cybersecurity Maturity Mode...Huntsville GovCon Growth Summit 2020 - Summit 7 - Cybersecurity Maturity Mode...
Huntsville GovCon Growth Summit 2020 - Summit 7 - Cybersecurity Maturity Mode...Unanet
 
Company Profile
Company ProfileCompany Profile
Company Profile3SC World
 
IT Service & Asset Management Better Together
IT Service & Asset Management Better TogetherIT Service & Asset Management Better Together
IT Service & Asset Management Better TogetherIvanti
 
Building an Intelligence-Driven Security Operations Center
Building an Intelligence-Driven Security Operations CenterBuilding an Intelligence-Driven Security Operations Center
Building an Intelligence-Driven Security Operations CenterEMC
 
Top PCI Pitfalls and How to Avoid Them: The QSA’s Perspective
Top PCI Pitfalls and How to Avoid Them: The QSA’s PerspectiveTop PCI Pitfalls and How to Avoid Them: The QSA’s Perspective
Top PCI Pitfalls and How to Avoid Them: The QSA’s PerspectiveAlgoSec
 
Manoj purandare - Stratergy towards an Effective Security Operations Centre -...
Manoj purandare - Stratergy towards an Effective Security Operations Centre -...Manoj purandare - Stratergy towards an Effective Security Operations Centre -...
Manoj purandare - Stratergy towards an Effective Security Operations Centre -...Manoj Purandare ☁
 
Business Case Of Bring Your Own Device[ BYOD]
Business Case Of Bring Your Own Device[ BYOD] Business Case Of Bring Your Own Device[ BYOD]
Business Case Of Bring Your Own Device[ BYOD] Md Yousup Faruqu
 
Ooredoo%20Security%20Managed%20Services
Ooredoo%20Security%20Managed%20ServicesOoredoo%20Security%20Managed%20Services
Ooredoo%20Security%20Managed%20ServicesMuhammad Mudassar
 
Network Security, Change Control, Outsourcing
Network Security, Change Control, OutsourcingNetwork Security, Change Control, Outsourcing
Network Security, Change Control, OutsourcingNicholas Davis
 
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #5
SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #5SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #5
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #5Lisa Niles
 
Auditing & Assessing The Risk Of Cloud Service Providers at Auditworld 2015 ...
Auditing & Assessing The  Risk Of Cloud Service Providers at Auditworld 2015 ...Auditing & Assessing The  Risk Of Cloud Service Providers at Auditworld 2015 ...
Auditing & Assessing The Risk Of Cloud Service Providers at Auditworld 2015 ...Alan Yau Ti Dun
 
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #1
SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #1SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #1
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #1Lisa Niles
 

What's hot (20)

Mobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best PracticesMobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best Practices
 
Managing Multiple Assessments Using Zero Trust Principles
Managing Multiple Assessments Using Zero Trust PrinciplesManaging Multiple Assessments Using Zero Trust Principles
Managing Multiple Assessments Using Zero Trust Principles
 
Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015
 
Design and Evaluation of [vSoC]: Virtualised Security Operations Centre
Design and Evaluation of [vSoC]: Virtualised Security Operations Centre  Design and Evaluation of [vSoC]: Virtualised Security Operations Centre
Design and Evaluation of [vSoC]: Virtualised Security Operations Centre
 
IBM Endpoint Manager for Mobile Devices (Overview)
IBM Endpoint Manager for Mobile Devices (Overview)IBM Endpoint Manager for Mobile Devices (Overview)
IBM Endpoint Manager for Mobile Devices (Overview)
 
Accelerating OT - A Case Study
Accelerating OT - A Case StudyAccelerating OT - A Case Study
Accelerating OT - A Case Study
 
Assessing the Security of Cloud SaaS Solutions
Assessing the Security of Cloud SaaS SolutionsAssessing the Security of Cloud SaaS Solutions
Assessing the Security of Cloud SaaS Solutions
 
Huntsville GovCon Growth Summit 2020 - Summit 7 - Cybersecurity Maturity Mode...
Huntsville GovCon Growth Summit 2020 - Summit 7 - Cybersecurity Maturity Mode...Huntsville GovCon Growth Summit 2020 - Summit 7 - Cybersecurity Maturity Mode...
Huntsville GovCon Growth Summit 2020 - Summit 7 - Cybersecurity Maturity Mode...
 
Company Profile
Company ProfileCompany Profile
Company Profile
 
IT Service & Asset Management Better Together
IT Service & Asset Management Better TogetherIT Service & Asset Management Better Together
IT Service & Asset Management Better Together
 
Building an Intelligence-Driven Security Operations Center
Building an Intelligence-Driven Security Operations CenterBuilding an Intelligence-Driven Security Operations Center
Building an Intelligence-Driven Security Operations Center
 
Top PCI Pitfalls and How to Avoid Them: The QSA’s Perspective
Top PCI Pitfalls and How to Avoid Them: The QSA’s PerspectiveTop PCI Pitfalls and How to Avoid Them: The QSA’s Perspective
Top PCI Pitfalls and How to Avoid Them: The QSA’s Perspective
 
Manoj purandare - Stratergy towards an Effective Security Operations Centre -...
Manoj purandare - Stratergy towards an Effective Security Operations Centre -...Manoj purandare - Stratergy towards an Effective Security Operations Centre -...
Manoj purandare - Stratergy towards an Effective Security Operations Centre -...
 
Business Case Of Bring Your Own Device[ BYOD]
Business Case Of Bring Your Own Device[ BYOD] Business Case Of Bring Your Own Device[ BYOD]
Business Case Of Bring Your Own Device[ BYOD]
 
Ooredoo%20Security%20Managed%20Services
Ooredoo%20Security%20Managed%20ServicesOoredoo%20Security%20Managed%20Services
Ooredoo%20Security%20Managed%20Services
 
Network Security, Change Control, Outsourcing
Network Security, Change Control, OutsourcingNetwork Security, Change Control, Outsourcing
Network Security, Change Control, Outsourcing
 
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #5
SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #5SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #5
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #5
 
Auditing & Assessing The Risk Of Cloud Service Providers at Auditworld 2015 ...
Auditing & Assessing The  Risk Of Cloud Service Providers at Auditworld 2015 ...Auditing & Assessing The  Risk Of Cloud Service Providers at Auditworld 2015 ...
Auditing & Assessing The Risk Of Cloud Service Providers at Auditworld 2015 ...
 
IBM Qradar-Advisor
IBM Qradar-AdvisorIBM Qradar-Advisor
IBM Qradar-Advisor
 
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #1
SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #1SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #1
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #1
 

Similar to FixNix vCISO CyberSecurity Network Security for Covid91

Performing One Audit Using Zero Trust Principles
Performing One Audit Using Zero Trust PrinciplesPerforming One Audit Using Zero Trust Principles
Performing One Audit Using Zero Trust PrinciplesControlCase
 
Resume | Vijay Navgire
Resume | Vijay Navgire Resume | Vijay Navgire
Resume | Vijay Navgire Vijay Νavgire
 
Secure Cloud Hosting: Real Requirements to Protect your Data
Secure Cloud Hosting: Real Requirements to Protect your DataSecure Cloud Hosting: Real Requirements to Protect your Data
Secure Cloud Hosting: Real Requirements to Protect your DataGreat Wide Open
 
Lock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM iLock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM iPrecisely
 
VMworld 2013: Troubleshooting and Monitoring NSX Service Composer Policies
VMworld 2013: Troubleshooting and Monitoring NSX Service Composer Policies VMworld 2013: Troubleshooting and Monitoring NSX Service Composer Policies
VMworld 2013: Troubleshooting and Monitoring NSX Service Composer Policies VMworld
 
Protecting Your Business from Unauthorized IBM i Access
Protecting Your Business from Unauthorized IBM i AccessProtecting Your Business from Unauthorized IBM i Access
Protecting Your Business from Unauthorized IBM i AccessPrecisely
 
Patch your workplaces at home, in a meeting center or at the office
Patch your workplaces at home, in a meeting center or at the officePatch your workplaces at home, in a meeting center or at the office
Patch your workplaces at home, in a meeting center or at the officeIvanti
 
PCI DSS Business as Usual
PCI DSS Business as UsualPCI DSS Business as Usual
PCI DSS Business as UsualControlCase
 
Cyberteq - Cyber Security for Telecom.pdf
Cyberteq - Cyber Security for Telecom.pdfCyberteq - Cyber Security for Telecom.pdf
Cyberteq - Cyber Security for Telecom.pdfssuser8717cc
 
Dealing with Web Application Security, Regulation Style
Dealing with Web Application Security, Regulation StyleDealing with Web Application Security, Regulation Style
Dealing with Web Application Security, Regulation StyleRochester Security Summit
 
Improving System Upgrades and Patching using SolarWinds
Improving System Upgrades and Patching using SolarWindsImproving System Upgrades and Patching using SolarWinds
Improving System Upgrades and Patching using SolarWindsSolarWinds
 
Network security, change control, outsourcing
Network security, change control, outsourcingNetwork security, change control, outsourcing
Network security, change control, outsourcingNicholas Davis
 
Cybersecurity Insiders Webinar - Zero Trust: Best Practices for Securing the...
Cybersecurity Insiders Webinar  - Zero Trust: Best Practices for Securing the...Cybersecurity Insiders Webinar  - Zero Trust: Best Practices for Securing the...
Cybersecurity Insiders Webinar - Zero Trust: Best Practices for Securing the...Ivanti
 
What is the UK Cyber Essentials scheme?
What is the  UK Cyber Essentials scheme?What is the  UK Cyber Essentials scheme?
What is the UK Cyber Essentials scheme?IT Governance Ltd
 
Government Webinar: Five Essential IT Tools You Need Today
Government Webinar: Five Essential IT Tools You Need TodayGovernment Webinar: Five Essential IT Tools You Need Today
Government Webinar: Five Essential IT Tools You Need TodaySolarWinds
 
The New Assure Security: Complete IBM i Compliance and Security
The New Assure Security: Complete IBM i Compliance and SecurityThe New Assure Security: Complete IBM i Compliance and Security
The New Assure Security: Complete IBM i Compliance and SecurityPrecisely
 
Cybersecurity
Cybersecurity Cybersecurity
Cybersecurity nado-web
 
PCI DSS Business as Usual (BAU)
PCI DSS Business as Usual (BAU)PCI DSS Business as Usual (BAU)
PCI DSS Business as Usual (BAU)ControlCase
 

Similar to FixNix vCISO CyberSecurity Network Security for Covid91 (20)

Performing One Audit Using Zero Trust Principles
Performing One Audit Using Zero Trust PrinciplesPerforming One Audit Using Zero Trust Principles
Performing One Audit Using Zero Trust Principles
 
BEST CYBER SECURITY PRACTICES
BEST CYBER SECURITY PRACTICESBEST CYBER SECURITY PRACTICES
BEST CYBER SECURITY PRACTICES
 
Resume | Vijay Navgire
Resume | Vijay Navgire Resume | Vijay Navgire
Resume | Vijay Navgire
 
Secure Cloud Hosting: Real Requirements to Protect your Data
Secure Cloud Hosting: Real Requirements to Protect your DataSecure Cloud Hosting: Real Requirements to Protect your Data
Secure Cloud Hosting: Real Requirements to Protect your Data
 
Lock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM iLock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM i
 
VMworld 2013: Troubleshooting and Monitoring NSX Service Composer Policies
VMworld 2013: Troubleshooting and Monitoring NSX Service Composer Policies VMworld 2013: Troubleshooting and Monitoring NSX Service Composer Policies
VMworld 2013: Troubleshooting and Monitoring NSX Service Composer Policies
 
Protecting Your Business from Unauthorized IBM i Access
Protecting Your Business from Unauthorized IBM i AccessProtecting Your Business from Unauthorized IBM i Access
Protecting Your Business from Unauthorized IBM i Access
 
Patch your workplaces at home, in a meeting center or at the office
Patch your workplaces at home, in a meeting center or at the officePatch your workplaces at home, in a meeting center or at the office
Patch your workplaces at home, in a meeting center or at the office
 
PCI DSS Business as Usual
PCI DSS Business as UsualPCI DSS Business as Usual
PCI DSS Business as Usual
 
Cyberteq - Cyber Security for Telecom.pdf
Cyberteq - Cyber Security for Telecom.pdfCyberteq - Cyber Security for Telecom.pdf
Cyberteq - Cyber Security for Telecom.pdf
 
Dealing with Web Application Security, Regulation Style
Dealing with Web Application Security, Regulation StyleDealing with Web Application Security, Regulation Style
Dealing with Web Application Security, Regulation Style
 
NAC_p3.pptx
NAC_p3.pptxNAC_p3.pptx
NAC_p3.pptx
 
Improving System Upgrades and Patching using SolarWinds
Improving System Upgrades and Patching using SolarWindsImproving System Upgrades and Patching using SolarWinds
Improving System Upgrades and Patching using SolarWinds
 
Network security, change control, outsourcing
Network security, change control, outsourcingNetwork security, change control, outsourcing
Network security, change control, outsourcing
 
Cybersecurity Insiders Webinar - Zero Trust: Best Practices for Securing the...
Cybersecurity Insiders Webinar  - Zero Trust: Best Practices for Securing the...Cybersecurity Insiders Webinar  - Zero Trust: Best Practices for Securing the...
Cybersecurity Insiders Webinar - Zero Trust: Best Practices for Securing the...
 
What is the UK Cyber Essentials scheme?
What is the  UK Cyber Essentials scheme?What is the  UK Cyber Essentials scheme?
What is the UK Cyber Essentials scheme?
 
Government Webinar: Five Essential IT Tools You Need Today
Government Webinar: Five Essential IT Tools You Need TodayGovernment Webinar: Five Essential IT Tools You Need Today
Government Webinar: Five Essential IT Tools You Need Today
 
The New Assure Security: Complete IBM i Compliance and Security
The New Assure Security: Complete IBM i Compliance and SecurityThe New Assure Security: Complete IBM i Compliance and Security
The New Assure Security: Complete IBM i Compliance and Security
 
Cybersecurity
Cybersecurity Cybersecurity
Cybersecurity
 
PCI DSS Business as Usual (BAU)
PCI DSS Business as Usual (BAU)PCI DSS Business as Usual (BAU)
PCI DSS Business as Usual (BAU)
 

More from Shanmugavel Sankaran

The Virtual Security Officer Platform
The Virtual Security Officer PlatformThe Virtual Security Officer Platform
The Virtual Security Officer PlatformShanmugavel Sankaran
 
Wilson Sonsini Executive Orders on TikTok and WeChat: Ambiguity and a Few Oth...
Wilson Sonsini Executive Orders on TikTok and WeChat: Ambiguity and a Few Oth...Wilson Sonsini Executive Orders on TikTok and WeChat: Ambiguity and a Few Oth...
Wilson Sonsini Executive Orders on TikTok and WeChat: Ambiguity and a Few Oth...Shanmugavel Sankaran
 
national standards of People's Republic of China
national standards of People's Republic of China national standards of People's Republic of China
national standards of People's Republic of China Shanmugavel Sankaran
 
FixNix and life of Chief Nixer__ A photo essay
FixNix and life of Chief Nixer__ A photo essayFixNix and life of Chief Nixer__ A photo essay
FixNix and life of Chief Nixer__ A photo essayShanmugavel Sankaran
 

More from Shanmugavel Sankaran (9)

Educate empower experience
Educate empower experienceEducate empower experience
Educate empower experience
 
The Virtual Security Officer Platform
The Virtual Security Officer PlatformThe Virtual Security Officer Platform
The Virtual Security Officer Platform
 
Wilson Sonsini Executive Orders on TikTok and WeChat: Ambiguity and a Few Oth...
Wilson Sonsini Executive Orders on TikTok and WeChat: Ambiguity and a Few Oth...Wilson Sonsini Executive Orders on TikTok and WeChat: Ambiguity and a Few Oth...
Wilson Sonsini Executive Orders on TikTok and WeChat: Ambiguity and a Few Oth...
 
national standards of People's Republic of China
national standards of People's Republic of China national standards of People's Republic of China
national standards of People's Republic of China
 
World earth day
World earth dayWorld earth day
World earth day
 
Cyber security for journalists
Cyber security for journalistsCyber security for journalists
Cyber security for journalists
 
FixNix and life of Chief Nixer__ A photo essay
FixNix and life of Chief Nixer__ A photo essayFixNix and life of Chief Nixer__ A photo essay
FixNix and life of Chief Nixer__ A photo essay
 
PCI-DSS for IDRBT
PCI-DSS for IDRBTPCI-DSS for IDRBT
PCI-DSS for IDRBT
 
Learning from great souls..
Learning from great souls..Learning from great souls..
Learning from great souls..
 

Recently uploaded

Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...Pooja Nehwal
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxShobhayan Kirtania
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 

Recently uploaded (20)

Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptx
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 

FixNix vCISO CyberSecurity Network Security for Covid91

  • 1. Makers of World’s 1st SaaS GRC Copyright © 2020 FixNix Inc. Confidential. All rights reserved. Are you ready for Covid19 way of Cyber Security ? Virtual Chief Information Security Officer(V-CISO) Alliance Webinar Occupational Safety | Business Resiliency | Network Security vCISO.FixNix.co
  • 2. IT SECURITY IN COVID-19 Presented by, Nagesh Lad, CISSP, CISA
  • 3. Speaker’s Profile • Bachelor of Engineering (B.E.) in Electronics from Mumbai University • CISA, CISSP, CPISI, ACSA, DCL, ITIL, CEH, CCNA Certified • 18+ years of industry experience • Worked for BFSI (Stock Exchange, Banks, Clearing Corporation, Insurance) and IT Service Industry • Working as CISO for Private Indian Insurance Company for more than 7 years
  • 4. Agenda • Assumptions • Different Phases handling current Pandemic Situation • Enabling WFH Facilities • IT Security Practices in COVID-19
  • 5. Assumptions Organizations are following Information and Cyber Security Practices which may include but not limit to: • Secure Network Architecture • Secure SDLC Practices • Multi-layered Security Controls / Protections • Secure Configuration Practices • Patch Management • Vulnerability Management • Data backup & restoration practices • Role based & least privilege access rights and revalidation practices • Continuous Monitoring & Responding to Security Alerts • & others …
  • 6. Different Phases Every organization would have gone through below phases while handling current COVID-19 Pandemic Situation • Invocation of BCP Plan • Enabling WFH Facilities • Educating Users on Do’s and Don’ts • Re-aligning Security Controls / Practices • Fine-tuning Monitoring Practices
  • 7. Invocation of BCP • Many organization were having documented & tested BCP Plan • But very few were ready for such a long lock down period • WFH has became new way of delivering business activities • Many would have revised their BCP Plan to include such pandemic scenario
  • 9. Challenges Faced • Organizations were having remote access facilities like VPN and VDI over Internet – but for limited users • Limited Licenses • Limited Device Capacity • Laptops were assigned to limited users based on their role • Limited Internet bandwidth
  • 10. Few Approaches Taken • Enabled VPN accesses on organization’s securely configured laptops • Enabled VDI over internet access for users to connect from their personal systems • Allowed users to take organization’s desktops at their home – risky option if not controlled properly
  • 11. Steps taken to enable WFH • Purchased or rented Laptops in bulk quantity • Increased licenses and capacity of VPN and VDI Solutions • Increased internet connection bandwidth • Enabled VPN & VDI accesses to large set of users • Performed Risk Assessment on Service Provider’s WFH facilities • On-boarded new vendors who were ready to deliver services in WFH scenario – e.g. call center agent solution for WFH
  • 12. Communications from Regulator • Regulators were sending frequent security advisories / notifications to guide organizations • Number of advisories received from IRDAI on WFH Security Guidelines, BCP / DR Guidelines for COVID-19 • RBI sent notifications related to DDoS & Phishing Campaigns from China • Organization should monitor such communications & take necessary actions
  • 14. User Awareness • Educating Users on Do’s and Don’ts for Information and Cyber Security point of view • Creating situation based awareness e.g. • Conducting video conference calls, • Accessing organization’s systems from home • Wi-Fi Connection Security • Handling COVID-19 phishing emails etc.
  • 15. End Point Security All organization’s end points (laptops) should be securely configured • Normal access rights to End Users • Installation of agents like • Device Control Management • Internet Proxy Client • Host based DLP • Antivirus • EDR Solution • Installation of Regular updates & patches • Weekly complete scanning of End Point to identify / clean any infection
  • 16. Network / System Security • Enable DDoS Protection • External Penetration Testing to identify & mitigate vulnerability present (if any) • Secure Configuration Review and Vulnerability Assessment of WFH Solutions – VPN, VDI etc. • Vulnerability Assessments of Internet Facing Systems & Critical Systems • Blocking of traffic coming from out of India specially for WFH Solutions (basis of nature of business & spread of end users)
  • 17. Security Controls for VPN • Allow access to only limited secure ports over internet • Admin interface should be blocked over internet • Enable 2FA Authentications mechanism • Allow users to connect to VPN only from organization’s securely configured laptops • Enable secure posture validation for End Points • Configure devices securely and test them periodically
  • 18. Security Controls for VDI over Internet • Allow access to only limited secure ports over internet • Admin interface should be blocked over internet • Enable 2FA Authentications mechanism • Ensure restriction of copy-paste rights
  • 19. Security of Collaboration Solutions • Organization enabled accesses to collaboration solutions like video conferencing e.g. webex, google meet, MS team, Zoom • Earlier, such accesses were restricted to limited set of users considering data security & other risks • Organization should set security guidelines for users while using such solutions. For e.g.: • Secure distribution of meeting invite to limited required participants • Enabling waiting room, allow known participants in the meeting • Restricting presentation access to host • Disabling remote accesses etc. • Educate users on these security guidelines • Keep software updated with latest version & patches
  • 20. Firewall Rulebase • Enable accesses basis of User roles and requirements from VPN & VDI Systems • Do not enable complete access to Production Network • Block black listed IP addresses on perimeter devices • Block IOCs available in active attacks in the news • Periodically revalidate accesses enabled from VPN & VDI Systems
  • 21. Security Monitoring Practices • Integrate security and audit logs from all security & perimeter devices and from critical systems • Fine-tune use cases basis of current situation and active attack patterns • Continuously Monitor & respond to DLP and EDR Alerts • Monitor of traffic coming from VPN Users • Perform trend analysis to identify deviation from normal patterns • Fine-tune Cyber Crisis Management Plan (CCMP) to include WFH Situation
  • 22. Third Party Risk • Many organizations outsource number of activities to third party e.g. callings, data entry • Many of these Third Parties are connected using leased lines, IPSec Tunnel to organization network to access applications / systems • Assess risk introduced by WFH facilities at third party end • Keep eye on security news to monitor any news related associated third parties • Services available which monitor risks from third parties to the organization and provides reports / alerts for the same – organization can avail such services
  • 23. Privilege Access Management • Ensure no admin module directly available over internet • Enable Privilege access rights using PAM Solutions • Enable 2FA Authentication Mechanism • Enable access rights based on role and least privilege principles • Periodically revalidate need for Privilege Access Rights
  • 24. User Access Revalidations • Enable user access rights “need to know” and “least privilege” basis • Follow entry – exit process to grant & remove access rights • Periodically revalidate existence of user and need of access rights basis of user’s role • Frequently check inactive users (e.g. inactive for 10 days) • Remove dormant & orphan User IDs
  • 25. Back to office • Slowly governments are allowing companies to call their employees back to office • User may bring infected system to office • User may also bring their personal system to office • NAC control should be effective to keep infected system out of network or in an isolated segment
  • 26. Governance Practices Set governance practices • To ensure execution of all critical activities which were getting delivered from normal work scenario • To monitor effectiveness of security practices built & security posture of the organization • To identify, review & track severe risks • To take decision on mitigation of severe risks
  • 27. 2 Cyber Security and regulatory Problems Mutiple standards, regulations, security standards, process across operating geographies like ISO 27001, GDPR, CCPA, PCI DSS, etc Increasing complex Audits involving Information Security, Compliance, Legal, External auditors, Regulators from large enterprises to country regulators New age Digital, Traditional, Vendor risks need different approaches to improve Digital Risk Maturity Cross-department collaboration and strategy as they aim to have a single enterprise portal and backbone for managing, communicating, and maintaining policies Copyright © 2020 FixNix Inc. Confidential. All rights reserved.
  • 28. V-CISO - How it works Copyright © 2020 FixNix Inc. Confidential. All rights reserved.
  • 29. Copyright © 2020 FixNix Inc. Confidential. All rights reserved. V-CISO on board
  • 30. V-CISO on board Copyright © 2020 FixNix Inc. Confidential. All rights reserved.
  • 31. Copyright © 2020 FixNix Inc. Confidential. All rights reserved. V-CISO on board
  • 32. Copyright © 2020 FixNix Inc. Confidential. All rights reserved. V-CISO on board
  • 33. V-CISO Models Copyright © 2020 FixNix Inc. Confidential. All rights reserved.
  • 34. Save Over 85% in Full Time CISO salary, every year! Copyright © 2020 FixNix Inc. Confidential. All rights reserved. ❑ A simple 80 hours a month Virtual CISO plan with FixNix would cost you in the region of $30,000 per annum where your team is going to geta V-CISO strategizes every day 3.2 hours, 25 days a month for your organization. ❑ Whereas a full time, experienced CISO, on average, would set you back approximately $200,000 per year (not including hiring costs, sick pay, holiday pay and training costs and possibly redundancy payments).
  • 35. Shanmugavel Sankaran Founder, FixNix Shan@FixNix.co +1 925 395 3684 +91 87 90 878 222 RegTech21| Red Herring Asia 100 TieCon50| Most User Friendly GRC Copyright © 2020 FixNix Inc. Confidential. All rights reserved. From FixNix with for