This document discusses information security governance and business continuity planning for organizations. It emphasizes that information security is a business issue that requires strategic management from the board and senior leadership. It outlines key roles and responsibilities for governance bodies like the board, executive management, information security team, and risk committees. It also discusses developing policies, procedures, risk management processes, information security audits, and testing business continuity plans to ensure effective governance. Regular reviews and updates are needed to account for a changing threat landscape and business environment.
Developing Metrics for Information Security Governancedigitallibrary
Information security has become a critical issue within organizations, and a key success factor for businesses. To effectively maintain the integrity and security of an organization's information infrastructure effective security metrics and measures must be developed, implemented and monitored. Learn about enterprise security metrics and the concepts that must be considered when developing, implementing, and monitoring them. Understand how to identify measurable points and activities, develop meaningful metrics and measures and monitor concepts. Case studies and scenarios demonstrate operational scenarios for the benefits and challenges of securing information.
Cyber Security Organizational Operating Model and GovernanceSrinidhi Aithal
Overview and Recommendations on operating models to mitigate risk factor in the governance model followed by organisations. Presented as part of the Deloitte challenge.
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE360 BSI
Are you effectively securing your organization’s IT systems that store, process, or transmit organizational information?
Is your IT risk management plan tailored to the specific risk profile of your business and being coordinated across all functional and business units?
With the release of IT Governance frameworks, requirements for risk management and new international standards entering the market, the pressure is mounting to ensure that all your IT risks are identified and the necessary action is taken – be this to mitigate them, accept or ignore them. So, how safe is your IT system? What are the risks that your organization is being exposed to?
The solution to this challenge is to establish an effective risk management process that protects the organization, not just its IT assets, and provides it with the ability to perform its mission.
Risk management is the process of identifying and assessing risk and taking preventive measures to reduce it to an acceptable level. It is critical that you develop an effective risk management program that assesses and mitigates risks within your IT systems and better manages these IT-related mission risks.
BENEFITS OF ATTENDING THIS WORKSHOP
Identify common IT project risks
Learn how to assess threats and vulnerabilities to create a risk response strategy
Understand what qualifies as risk with IT projects
Understand the most common IT risk sources
Qualify and quantify IT risks
Learn the difference between negative and positive IT risks
Develop an IT risk management plan
Plan risk response methods for IT risks
Create risk mitigation and contingency plans
Monitor and control project risks
Overcome resistance from stakeholders and team members
WHO SHOULD ATTEND THIS WORKSHOP
IT risk managers
IT security managers
Compliance officers
Program and project managers
IT project managers
IT operation manager
Contact Kris at kris@360bsi.com to register.
Information Security Governance: Concepts, Security Management & MetricsOxfordCambridge
The goal of information security governance is to establish and maintain a framework to provide assurance that information security strategies are aligned with the business objectives and consistent with applicable laws and regulations.
Developing Metrics for Information Security Governancedigitallibrary
Information security has become a critical issue within organizations, and a key success factor for businesses. To effectively maintain the integrity and security of an organization's information infrastructure effective security metrics and measures must be developed, implemented and monitored. Learn about enterprise security metrics and the concepts that must be considered when developing, implementing, and monitoring them. Understand how to identify measurable points and activities, develop meaningful metrics and measures and monitor concepts. Case studies and scenarios demonstrate operational scenarios for the benefits and challenges of securing information.
Cyber Security Organizational Operating Model and GovernanceSrinidhi Aithal
Overview and Recommendations on operating models to mitigate risk factor in the governance model followed by organisations. Presented as part of the Deloitte challenge.
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE360 BSI
Are you effectively securing your organization’s IT systems that store, process, or transmit organizational information?
Is your IT risk management plan tailored to the specific risk profile of your business and being coordinated across all functional and business units?
With the release of IT Governance frameworks, requirements for risk management and new international standards entering the market, the pressure is mounting to ensure that all your IT risks are identified and the necessary action is taken – be this to mitigate them, accept or ignore them. So, how safe is your IT system? What are the risks that your organization is being exposed to?
The solution to this challenge is to establish an effective risk management process that protects the organization, not just its IT assets, and provides it with the ability to perform its mission.
Risk management is the process of identifying and assessing risk and taking preventive measures to reduce it to an acceptable level. It is critical that you develop an effective risk management program that assesses and mitigates risks within your IT systems and better manages these IT-related mission risks.
BENEFITS OF ATTENDING THIS WORKSHOP
Identify common IT project risks
Learn how to assess threats and vulnerabilities to create a risk response strategy
Understand what qualifies as risk with IT projects
Understand the most common IT risk sources
Qualify and quantify IT risks
Learn the difference between negative and positive IT risks
Develop an IT risk management plan
Plan risk response methods for IT risks
Create risk mitigation and contingency plans
Monitor and control project risks
Overcome resistance from stakeholders and team members
WHO SHOULD ATTEND THIS WORKSHOP
IT risk managers
IT security managers
Compliance officers
Program and project managers
IT project managers
IT operation manager
Contact Kris at kris@360bsi.com to register.
Information Security Governance: Concepts, Security Management & MetricsOxfordCambridge
The goal of information security governance is to establish and maintain a framework to provide assurance that information security strategies are aligned with the business objectives and consistent with applicable laws and regulations.
Sans 20 CSC: Connecting Security to the Business MissionTripwire
You know the old break-up line, “it’s not you, it’s me….”? As a CISO, what if when you get your few minutes to discuss security with the C-suite, board of directors or mission leadership, it really turns out to be you not them who failed in the communication?
Lack of success in communicating with your C-suite could lead to a breakup sooner or later. I’ve had hundreds of conversations with and about CISOs communicating – - on topics ranging from security breach information, status, performance metrics, risk, visualizations, or overall security posture with their executive leadership.
And largely, it turns out to be no surprise that communicating security information is incredibly difficult, especially with non-technical, disinterested, or time-constrained C-suite executives.
Success with SANS
The initial UMASS Security Program was based on the ISO/IEC 27002 controls framework, then starting in 2011, the SANS 20 CSC were added. Today’s program includes both. The ISO controls focus on program management, compliance and process from an IT auditor’s perspective, while the SANS controls focus on technology means they are better aligned with IT operations.
Prior to 2011, Wilson was having difficulty communicating with executive management (CIOs and others) – it was difficult to translate the purchase and implementation issues surrounding firewalls, anti-virus, and vulnerability scanning into easily familiar business terms and concepts relevant to management and process.
However, when he ditched trying to explain the ISO/IEC 27002 security controls framework in favor of using the SANS 20 CSC, he was able to communicate much more effectively with his C-suite for the first time in a way they could absorb and support.
In addition, he and his team have been able to map out a measurable and actionable security program based on SANS that he regularly succeeds in communicating to his executive team.
Implementing Business Aligned Security Strategy Dane Warren LiDaneWarren
This was presented at the AISA national seminar day. It is a helicopter view on how to implement a security strategy that is aligned with the business.
How an Integrated Management system helps you comply with new Cyber Laws and ...PECB
When implementing an information security management system (based on ISO/IEC 27001) you need to conduct a risk analysis (based on ISO/IEC 27005) and implement information security controls (based on ISO/IEC 27002). In order to better understand the IT governance framework of the organization, you can refer to service management systems (based on ISO/IEC 20000). Moreover, you have to properly consider security incident management (based on ISO/IEC 27035) and you must ensure that the organization has business continuity and recovery capabilities (based on ISO 22301).
Recorded Webinar: https://youtu.be/aY_envTRGRY
ISO 27001 Implementation using Force Field AnalysisPECB
Force Field Analysis is a useful decision-making technique. It helps you make a decision by analyzing the forces for and against a change, and it helps you communicate the reasoning behind your decision. This webinar explains tools that should be used and questions that you should consider during your analysis. Also, it will explain how to use your analysis, useful tips and ISO 27001 implementation force field analysis example.
Main points covered:
• Questions to consider during your analysis
• Gap analysis
• Strategies that could be followed
Presenter:
This webinar was hosted by David Smart, PECB Certified Trainer and Managing Director of Smart ISO Systems / Smart Mentoring.
Link of the recorded session published on YouTube: https://youtu.be/Cih-6LeUA7I
Emerging Need of a Chief Information Security Officer (CISO)Maurice Dawson
This submission examines the emerging need of the Chief Information Security Officer (CISO) to include the associated roles and responsibilities. One of the key artificacts associated with the CISO shall be detailed such as the security plan.
How To Present Cyber Security To Senior Management Complete DeckSlideTeam
This template is useful in presenting cybersecurity plan to higher authority. Cybersecurity officer will present it to top level management. It will help in determining the roles and responsibilities of senior management and executives who are responsible in handling risks. Firm will also optimize its cybersecurity risk framework. Firm will assess the current concerns that are impeding cybersecurity in terms of increase in cybercrimes, data breach and exposure and amount spent on settlements. It will also analyze firm its current cybersecurity framework. Firm will categorize various risk and will assess them on parameters such as risk likelihood and severity. The IT department will also improve their incident handling mechanism. Cybersecurity contingency plan will be initiated by firm. In this plan, firm will build an alternate site for backup maintenance. Backup site selection will be done by keeping certain parameters into consideration such as cost for implementation, duration, location, etc. The other plan essentials include business impact assessment, vital record maintenance, recovery task list maintenance, etc. The template also includes information regarding the role of personnel in terms of role and responsibilities of line managers, senior managers and executives in risk management. It also includes information related to the role of top management in ensuring effective information security governance. The information regarding the budget required for the cybersecurity plan implementation is also provided with staff training cost. https://bit.ly/3iSww5L
Sans 20 CSC: Connecting Security to the Business MissionTripwire
You know the old break-up line, “it’s not you, it’s me….”? As a CISO, what if when you get your few minutes to discuss security with the C-suite, board of directors or mission leadership, it really turns out to be you not them who failed in the communication?
Lack of success in communicating with your C-suite could lead to a breakup sooner or later. I’ve had hundreds of conversations with and about CISOs communicating – - on topics ranging from security breach information, status, performance metrics, risk, visualizations, or overall security posture with their executive leadership.
And largely, it turns out to be no surprise that communicating security information is incredibly difficult, especially with non-technical, disinterested, or time-constrained C-suite executives.
Success with SANS
The initial UMASS Security Program was based on the ISO/IEC 27002 controls framework, then starting in 2011, the SANS 20 CSC were added. Today’s program includes both. The ISO controls focus on program management, compliance and process from an IT auditor’s perspective, while the SANS controls focus on technology means they are better aligned with IT operations.
Prior to 2011, Wilson was having difficulty communicating with executive management (CIOs and others) – it was difficult to translate the purchase and implementation issues surrounding firewalls, anti-virus, and vulnerability scanning into easily familiar business terms and concepts relevant to management and process.
However, when he ditched trying to explain the ISO/IEC 27002 security controls framework in favor of using the SANS 20 CSC, he was able to communicate much more effectively with his C-suite for the first time in a way they could absorb and support.
In addition, he and his team have been able to map out a measurable and actionable security program based on SANS that he regularly succeeds in communicating to his executive team.
Implementing Business Aligned Security Strategy Dane Warren LiDaneWarren
This was presented at the AISA national seminar day. It is a helicopter view on how to implement a security strategy that is aligned with the business.
How an Integrated Management system helps you comply with new Cyber Laws and ...PECB
When implementing an information security management system (based on ISO/IEC 27001) you need to conduct a risk analysis (based on ISO/IEC 27005) and implement information security controls (based on ISO/IEC 27002). In order to better understand the IT governance framework of the organization, you can refer to service management systems (based on ISO/IEC 20000). Moreover, you have to properly consider security incident management (based on ISO/IEC 27035) and you must ensure that the organization has business continuity and recovery capabilities (based on ISO 22301).
Recorded Webinar: https://youtu.be/aY_envTRGRY
ISO 27001 Implementation using Force Field AnalysisPECB
Force Field Analysis is a useful decision-making technique. It helps you make a decision by analyzing the forces for and against a change, and it helps you communicate the reasoning behind your decision. This webinar explains tools that should be used and questions that you should consider during your analysis. Also, it will explain how to use your analysis, useful tips and ISO 27001 implementation force field analysis example.
Main points covered:
• Questions to consider during your analysis
• Gap analysis
• Strategies that could be followed
Presenter:
This webinar was hosted by David Smart, PECB Certified Trainer and Managing Director of Smart ISO Systems / Smart Mentoring.
Link of the recorded session published on YouTube: https://youtu.be/Cih-6LeUA7I
Emerging Need of a Chief Information Security Officer (CISO)Maurice Dawson
This submission examines the emerging need of the Chief Information Security Officer (CISO) to include the associated roles and responsibilities. One of the key artificacts associated with the CISO shall be detailed such as the security plan.
How To Present Cyber Security To Senior Management Complete DeckSlideTeam
This template is useful in presenting cybersecurity plan to higher authority. Cybersecurity officer will present it to top level management. It will help in determining the roles and responsibilities of senior management and executives who are responsible in handling risks. Firm will also optimize its cybersecurity risk framework. Firm will assess the current concerns that are impeding cybersecurity in terms of increase in cybercrimes, data breach and exposure and amount spent on settlements. It will also analyze firm its current cybersecurity framework. Firm will categorize various risk and will assess them on parameters such as risk likelihood and severity. The IT department will also improve their incident handling mechanism. Cybersecurity contingency plan will be initiated by firm. In this plan, firm will build an alternate site for backup maintenance. Backup site selection will be done by keeping certain parameters into consideration such as cost for implementation, duration, location, etc. The other plan essentials include business impact assessment, vital record maintenance, recovery task list maintenance, etc. The template also includes information regarding the role of personnel in terms of role and responsibilities of line managers, senior managers and executives in risk management. It also includes information related to the role of top management in ensuring effective information security governance. The information regarding the budget required for the cybersecurity plan implementation is also provided with staff training cost. https://bit.ly/3iSww5L
The impressive presentation from WebGuru introduces you to tempting Christmas offers on all its services. So, hurry up and capture the spirit of festive season before it’s gone.
An icon may look like a mini logo design, but its not. Logo and icon are two completely different objects and they are used for different purposes. A logo is flexible and can be enlarged or compressed without losing the graphics quality, but an icon is not flexible.
Looking for great content? Better SEO? More engagement? Dedicated customers? Take a closer look at what bike store owners have been doing for decades. Build a community.
Namecheap VS Godaddy (Prices, Benefits and Disadvantages)
http://www.alekstanojevic.com/namechep-vs-godaddy/ Namecheap VS GoDaddy (Prices, Benefits and Disadvantages)
I’ve used GoDaddy.com as my domain registrar for a year. This was mostly due to the fact that I knew of nothing else. It wasn’t until I learned about other domain registrars and the benefits of each did I start to realize how much I was missing out by sticking with GoDaddy. After searching out many domain registrars, I have come to the conclusion that Namecheap.com is the best choice for me, and I have chosen to do my entire domain purchasing through them.
Thanks for reading,
Alek Stanojevic
P.S. If you learned something new from my today’s post - Namecheap VS Godaddy, please "like and share" it so someone else can benefit from it!
Work With Alek Stanojevic
http://www.alekstanojevic.com/work-with-alek/
Complete enterprise grade end point security solutions from K7. Please feel free to contact us for further details.
Email us at : info@primeinfoserv.com
Web : www.primeinfoserv.com
Phone : +91 33 6526-0279 / 4008-5677
Responsive Webdesign in a Nutshell - webinale 2015die.agilen GmbH
Das Buzzword „RWD“ ist nun mittlerweile flächendeckend angekommen. Aber was heißt das konkret? Reicht es, Inhalt hin und her zu schieben, wenn das Display sich verändert, oder ist die Welt des Responsive Webdesigns doch deutlich größer? Und wie setzt man RWD ganz konkret um – in großen und kleinen Projekten, auf Webseiten und auf E-Commerce-Applikationen, auf aktuellen und zukünftigen Devices. Der Vortrag zeigt die ganze Welt des RWD auf und gibt praktische Tipps und Tricks zur professionellen Umsetzung.
10 Security Essentials Every CxO Should KnowIBM Security
View On Demand Webinar: http://event.on24.com/wcc/r/1060940/3EBB3C7D778564710E957F99AF1D7C1B
How comprehensive is your security program? Organizations today are reliant on technology more than ever to achieve competitive advantage. Whether it is growing your brand, automating a supply chain or moving to cloud and mobile, technology is the lifeblood of business. This shift in reliance also brings cyber threats that must be addressed.
Based on extensive experience, IBM has established 10 Essential Practices for a comprehensive security posture. Join Glen Holland, Global Practice Lead of SAP Security Services, to hear about the key imperatives can help you understand and address these threats and protect the business.
In this on demand webinar, you will learn:
- The 10 security essentials and best practices of today’s security leaders
- How to assess your security maturity
- Where your critical gaps lie and how to prioritize your actions
IT Risk Management & Leadership 23 - 26 June 2013 Dubai360 BSI
WHY IS THIS IT RISK ASSESSMENT WORKSHOP IMPORTANT?
Are you effectively securing your organization’s IT systems that store, process, or transmit organizational information?
Is your IT risk management plan tailored to the specific risk profile of your business and being coordinated across all functional and business units?
With the release of IT Governance frameworks, requirements for risk management and new international standards entering the market, the pressure is mounting to ensure that all your IT risks are identified and the necessary action is taken – be this to mitigate them, accept or ignore them. So, how safe is your IT system? What are the risks that your organization is being exposed to?
The solution to this challenge is to establish an effective risk management process that protects the organization, not just its IT assets, and provides it with the ability to perform its mission.
Risk management is the process of identifying and assessing risk and taking preventive measures to reduce it to an acceptable level. It is critical that you develop an effective risk management program that assesses and mitigates risks within your IT systems and better manages these IT-related mission risks.
BENEFITS OF ATTENDING THIS WORKSHOP
Identify common IT project risks
Learn how to assess threats and vulnerabilities to create a risk response strategy
Understand what qualifies as risk with IT projects
Understand the most common IT risk sources
Qualify and quantify IT risks
Learn the difference between negative and positive IT risks
Develop an IT risk management plan
Plan risk response methods for IT risks
Create risk mitigation and contingency plans
Monitor and control project risks
Overcome resistance from stakeholders and team members
WHO SHOULD ATTEND THIS WORKSHOP
IT risk managers
IT security managers
Compliance officers
Program and project managers
IT project managers
IT operation manager
Contact Kris at kris@360bsi.com to register.
This presentation was discussed in a Webinar with MetricStream in September 2016. It is applicable for small, medium and large businesses when considering information and cyber security risk.
IT Governance and Compliance: Its Importance and the Best Practices to Follow...GrapesTech Solutions
With new technology coming in every day, the need for IT governance and compliance is essential. IT governance and compliance are not only necessary for consumers but also for businesses. A strong IT governance plan can help add immense value to your business.
Many businesses are not aware of the importance of IT governance and Its Compliance. Hence it is important first to understand IT Governance and the Compliance Standards.
Explore the Significance of IT Governance and Compliance in 2024. Explore best practices for effective management, ensuring security, and meeting regulatory standards in the dynamic IT landscape.
IT Information Security Management Principles, 23 - 26 November 2015 Dubai UAE360 BSI
This 4 day training program combines advanced technology and relevant practical experience to develop your IT security policies & create a robust IT infrastructure.
Information security is critical for modern business models today.
Organizations must be prepared to take crucial steps to strengthen their IT infrastructure from both internal & external threats.
Organizations must look to develop a security network that enhances business operations while improving its security position. Successful security architecture combines a mix of the latest policies & practices, technology, and a robust awareness program.
This 4 day intensive training workshop addresses the latest concerns on IT infrastructure and security. Participants will develop key skills and core competencies that will allow them to meet the ever-changing security demands of the 21st century.
Course Participants will:
- Master the tools & techniques for effective information & network security.
- Discover how to create a complete & sustainable IT security architecture.
- Gain knowledge on how to develop sound security policy together with your security architecture.
- Learn how to perform an IT governance assessment using CoBIT 4.0
- Learn how to perform smart security risk assessment within your organization.
- Gain valuable insights on implementing a proactive & robust security management system.
- Learn how to detect & prevent information security breaches due to inadequate IT security awareness within the organization.
Who should attend:
Vice Presidents, Directors, General Managers
Chief Information Officers
Chief Security Officers
Chief Information Security Officers
Chief Technology Officers
Contact Kris at kris@360bsi.com for further information.
For unparalleled IT management service in Folsom, Total Secure Technology is the trusted service provider. Our tailored IT management service Folsom solutions cater to businesses of all sizes, ensuring seamless operations and maximum efficiency. With our expertise, businesses can focus on their core objectives while we handle the complexities of IT management in Folsom. Trust Total Secure Technology for comprehensive IT management service in Folsom, delivering unmatched reliability and security.
Banks and other financial services firms need to recognize the threats of cyber risk in a different way. Many have put in place thick walls to protect themselves. But firms cannot be protected at all times from a cyber-related incident. So putting in place structures, technologies and processes to ensure resilience—or fast recovery—is as much or more important than simply putting more locks on the doors or building stronger walls. See www.accenture.com/CyberRisk for more.
Face Recognition is an unique solution in the recent context, where touching a surface by multiple people has emerged as a potential cause of infection. Traditional Biometric attendance devices will become obsolete due to the burning needs of contact less/Hygienic/Social distancing. On the contrary,AI & deep Learning based Facial recognition system is attracting market demand with Face Detection + Mask Detection + Door Control + Attendance Management.
The fear of touching public surfaces sparked by the Covid -19 outbreak is spurring a shift from fingerprint sensors to Facial Recognition Systems for allowing access to employees across offices in India.
Face recognition is a unique solution in the recent context, where touching a surface by multiple people has emerged as a potential cause of infection. Traditional Biometric attendance devices are dead upgrade with contact less/Hygienic/Social distancing AI deep Learning based Facial recognition system which includes Face Detection + Mask Detection + Door Control + Attendance Management.
May write to us at info@primeinfoserv.com for further details
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend MicroPrime Infoserv
The session theme is "Roadmap of Cyber-security from On-Prem to Cloud Journey".
The session focuses how security information and event management can help enterprises to collects data from the heterogeneous landscape to have incident response plans and have automation in the entire security operations framework.
The session will be handled by Mr. Kanchan Mallick, Regional Head for Eastern India,Nepal, Bhutan and Bangladesh, Trendmicro India Private Ltd.
Mr. Mallick has an experience of total 19 years in the IT Security, Information security domain, Cyber Security consulting field, especially in the areas of presales activities, Techno-marketing, Account sales activities, Channel sales & Product positioning and other managerial areas.
The session theme is "Threat Management, Next Generation Security Operations Center".
The session focuses how security information and event management can help enterprises to collects data from the heterogeneous landscape to have incident response plans and have automation in the entire security operations framework.
The session is handled by The session will be handled by Mr.Ravi Shankar Mallah, Architect / IBM security Specialist – Resilient & i2.
Ravi has over 13+ years of experience in the field of Cyber security. Over the course of his career he has been involved in building & running multiple enterprise level SOC while taking care of both perimeter and internal security of these setup. He also enjoys real life experience of various Security related technologies such as SIEM, SOAR, IPS, firewalls, Vulnerability management, Anti-APT solutions etc.
In his current role at IBM he is working as an Architect and enjoys the role of specialist for Incident Response Platform (IRP) and Threat Hunting
The session focuses how A Unified solution can assist enterprises to have Data Leakage Protection, Employee Productivity Monitoring and Employee Behavior Monitoring.
The session is handled by The session will be handled by Mr. Dhruv Khanna, Co-Founder of Data Resolve Technologies Private Limited
Dhruv has 20 years of experience in leadership position across Sales, IT Consulting, Cyber Security domain with 360 degree hands-on experience across Team Mentoring, Business Development, International Sales, Digital Channels, Client Acquisition, P&L Management, Project Delivery, Product Management, Solution design, Tech Marketing, Business Finance, Investor Relations & Fund Raise.
The session will be focusing how cloud-native security platform can continuously discovers workloads, identifies risk, and enforces security policies in any multi-cloud environment. Additionally it will also cover the Automated policy generation through agent-less security controls makes protecting data and applications the easiest thing to do in the cloud.
The Speaker of the session will be Dr. Ratinder Paul Singh Ahuja, Founder and Chief Research and Development Officer, Shield X, USA
Dr. Ratinder leads ShieldX and its mission as its central pivot point. Drawing from a career as a successful serial entrepreneur and corporate leader, he brings his unique blend of business acumen, industry network and deep technical knowledge.
At his previous start-ups, Internet Junction, Webstacks and Reconnex he served as Chief Technology Officer and Vice President of the Mobile and Network Security Business Units. His knowledge of innovation and emerging trends in networking, network security, and data-loss prevention are derived from years of industry experience. Dr. Ahuja holds a BS in Electronics & Electrical Engineering from Thapar University, in India, and a Masters and Ph.D. in Computer Engineering from Iowa State University. Dr. Ahuja has been granted 61 patents for security-based technologies, and has presented in many public forums, including the Content Protection Summit, IC3, IEEE Computer Society, McAfee FOCUS, and the Cloud Expo.
The session focuses The session focuses how EDR detects suspicious or threatening activity on endpoints. EDR constantly monitors endpoints allowing for immediate response. The information collected from the monitoring process is recorded to be analysed and investigated to enable response.
The session is handled by Mr.Ranjit Sawant, Regional Security Architect (APAC), FireEye Inc.
With over 16 years’ experience in Information Security, he has been working with various verticals such as BFSI, IT Services and Manufacturing.Being a technocrat, Ranjit worked on technologies pertaining to Endpoint, Network, Application Security and since last 8+ years his focus & investment is on Advance Threat Protection Solutions.
Microsoft Teams is a unified communication and collaboration platform that combines persistent workplace chat, video meetings, file storage (including collaboration on files), and application integration. The service integrates with the company's Office 365 subscription office productivity suite and features extensions that can integrate with non-Microsoft products.
The session theme is "Enabling Business Continuity During Challenging Times With Virtual Desktops". The session will be conducted by Microsoft..
In the last few weeks, thelives of people around the world have been impacted. Daily working has gotcompromised, particularly with regard to business continuity. Remote working,in the best interest of organizations, is becoming a necessity.
Travel restrictions and new rules on large public gatherings have changed the daily routines of millions. Many organizations are quickly moving to remote working environments. If your customers are thinking of similar options, we at Microsoft are here to support you in this endeavor.
As the point of entry for 91% of cyber attacks, email is every organisation’s biggest vulnerability and most of the clients will be settling for protection that is just not secure enough. When attackers are sending 150 million phishing emails every day, it should come as no surprise that the majority of companies face a situation of “when” a successful breach will occur, as opposed to “if”.Let's discuss how Email Security solution can help mitigating above biggest Vulnerabilities.
The session will be delivered by Ishtiyaq Ahmad Shah is a Security Consultant with more than 15 years of experience in the security industry, Ishtiyaq is currently Security consultant at FireEye India, based out of New Delhi. Ishtiyaq specializes in Advance Persistent Threat Management, Data Security and Security management solutions. Prior to joining FireEye, he served as security consultant at RSA, Wipro & HCL Technologies. Ishtiyaq holds a Bachelor's degree in computer science, Diploma in Cyber Law & other Industry certifications.
Secure Access – Anywhere by Prisma, PaloAltoPrime Infoserv
The purpose of the session is to ensure security on the rapidly scaled work from Home situations during the COVID-19 outbreak. The objective is to ensure that they can securely and rapidly connect to all of their applications, including SaaS, cloud, and data-center applications.
The session will be delivered by Mohammad Faizan Sheikh, Channel Systems Engineer, India & SAARC for Palo Alto Networks..
The session theme was "Protect your business from disruptions and keep your workforce productivity with BCM".
The purpose of the session was to help business leaders understand how to keep the business up and running in the current lock-down using best practices for a complete business continuity strategy.
It was driven to help businesses to understand how to address issues like business continuity team structure, business continuity planning, disaster recovery and business continuity testing, crisis communications, and employee safety and awareness programs. How should organizations address these with comprehensive BCM approach encompassing both organizational measures and technologies to minimize disruption, maintain security and support uninterrupted productivity for users and teams and minimize the impact of the disruption to their business.
PaloAlto Networks is world’s Cyber Security leader. Their technologies give 65,000 enterprise customers the power to
protect billions of people worldwide.
Cortex, Demisto & Prisma are the few flagship products to prevent attacks with industry-defining enterprise security platforms. Tightly integrated innovations, cloud delivered and easy to deploy and operate.
Delightful Finds: Unveiling the Power of Gifts Under 100JoyTree Global
Stretch your budget and spread joy! This guide explores the world of gifts under 100, proving thoughtful gestures don't require a hefty price tag. Discover unique and practical options for birthdays, holidays, or simply showing someone you care. Find inspiration for every occasion within your budget!
How Does Littering Affect the Environment.ClenliDirect
Read this PPT now to gain in-depth insights into how to fight litter and safeguard our landscapes from its negative impacts.
Visit-https://clenlidirect.com/cleaning-equipment/litter-picker-grabber-equipment.html
All Trophies at Trophy-World Malaysia | Custom Trophies & Plaques Supplier. Come to our Trophy Shop today and check out all our variety of Trophies available. We have the widest range of Trophies in Malaysia. Our team is always ready to greet your needs and discuss with you on your custom Trophy for your event. Rest assured, you will be with the best Trophy Supplier in Malaysia. The official Trophy Malaysia. Thank you for your support.
Colors of Wall Paint and Their Mentally Properties.pptxBrendon Jonathan
Discover how different wall paint colors can influence your mood and mental well-being. Learn the psychological effects of colors and find the perfect hue for every room in your home.
Comprehensive Water Damage Restoration Serviceskleenupdisaster
Find out how Disaster Kleenup's professional water damage restoration services can quickly and efficiently restore your property. Find more about our advanced techniques and quick action plans. Visit here: https://iddk.com/disaster-cleanup-services/flood-damage/
What Are the Latest Trends in Endpoint Security for 2024?VRS Technologies
In this PDF, Discover the top 2024 endpoint security trends, including zero trust, AI integration, XDR, cloud security, and enhanced mobile protection. VRS Technologies LLC supplies the top level Endpoint Security Service Dubai. For More Info Contact us: +971 56 7029840 Visit us: https://www.vrstech.com/endpoint-security-solutions.html
SECUREX UK FOR SECURITY SERVICES AND MOBILE PATROLsecurexukweb
At Securex UK Ltd we are dedicated to providing top-rated security solutions tailored to your specific needs. With a team of highly trained professionals and cutting-edge technology, we prioritize your safety and peace of mind.
Our commitment to excellence extends beyond traditional security measures. We understand the dynamic nature of security challenges, and our personalized approach ensures that every client receives a bespoke protection plan.
Office Business Furnishings | Office EquipmentOFWD
OFWD is Edmonton’s Newest and most cost-effective source for Office Furnishings. Conveniently located on 170 street and 114 Avenue in Edmonton’s West End. We take pride in servicing a client base of over 500 corporations throughout the Edmonton and Alberta area. OFWD is in the business of satisfying the home or corporate office environment needs of our clients, from individual pieces of furniture for the home user to the implementation of complete turn-key projects on much larger scales. We supply only quality products from reputable manufacturers. It is our intention to continue to earn the trust of our clients by dealing with honesty and integrity and by providing service and after sales follow-up second to none.
Earth moving equipment refers to heavy-duty machines used in construction, mining, agriculture, and other industries to move large amounts of earth, soil, and other materials. These machines include excavators, bulldozers, loaders, and backhoes, which are essential for tasks such as digging, grading, and leveling land.
Earthmovers is a leading brand in the industry, known for providing reliable and high-performance earth moving equipment. Their machines are designed to handle the toughest jobs with efficiency and precision, ensuring optimal productivity on any project.
The Jamstack Revolution: Building Dynamic Websites with Static Site Generator...Softradix Technologies
In this infographic, the Jamstack architecture emphasizes pre-rendered content and decoupling the frontend from the backend. It leverages static site generators (SSGs) to create fast-loading HTML files and APIs for dynamic functionality. Benefits include improved performance, enhanced security, scalability, and ease of deployment. Real-world examples include Netlify, Gatsby, and Contentful. https://softradix.com/web-development/
BesT panDit Ji LoVe problem solution 9463629203 UK uSA California New Zealand...gitapress3
love problem solution astrologer
best love problem solution astrologer
online love problem solution astrologer
love problem solution astrologer in india
love problem solution astrologer in kolkata
love problem solution astrologer near me
love problem solution astrologer in ludhiana
love problem solution astrologer acharya ji
love problem solution astrologer in delhi
love problem solution astrologer amritsar
astrologer love problem solution
astrologer for love problem
astrology love problem solution
love solution astrologer
love problem solution specialist astrologer
love problem solution by astrologer
astrology love problem solution baba ji
love problem solve astrologer
love problem solution usa
love problem solution expert astrologer
astrologer for love marriage problem solution
love problem solution astrologer in mumbai
love problem solution muslim astrologer
love marriage specialist astrologer problem solution
famous love astrologer
love problem solution astrologer specialist
love problem solution astrologer tantrikBesT panDit Ji LoVe problem solution 9463629203 UK uSA California New Zealand baba ji LoVe marriage specialist Uk USA LonDOn panDit ji
DOJO Training Center - Empowering Workforce ExcellenceHimanshu
The document delves into DOJO training, an immersive offline training concept designed to educate both new hires and existing staff. This method follows an organized eight-step process within a simulated work setting. The steps encompass safety protocols, behavioral coaching, product familiarity, production guidelines, and procedural understanding. Trainees acquire skills through hands-on simulations and rehearsal prior to transitioning to actual shop floor duties under supervision. The primary aim is to minimize accidents and defects by ensuring employees undergo comprehensive training, preparing them effectively for their job roles.
Solar power panels, also known as photovoltaic (PV) panels, convert sunlight into electricity, offering a renewable and sustainable energy solution. Composed of semiconductor materials, typically silicon, these panels absorb photons from sunlight, generating an electric current through the photovoltaic effect. This clean energy source reduces dependence on fossil fuels, mitigates greenhouse gas emissions, and contributes to environmental sustainability.
Looking for the Reliable Logistics Solutions in India? Discover unparalleled efficiency and reliability with our top-rated logistics services. We specialize in streamlining supply chains, ensuring timely deliveries, and providing cutting-edge tracking solutions. Our platform caters to businesses of all sizes, offering customizable logistics solutions to meet your unique needs. With a focus on innovation and customer satisfaction, we are your trusted partner in navigating the complexities of logistics in India. Choose us for seamless, cost-effective, and scalable logistics solutions. Experience the best in Indian logistics with our expert team by your side.
SMS2ORBIT | launched in 2022 in Mumbai's Andheri area, aims to be the most reliable Bulk SMS Service Provider in Mumbai.
If More Information About The SMS Service Provided By SMS2ORBIT Is Desired, Please Don’t Hesitate To Contact The Business Team. They Can Be Reached At
business@sms2orbit.com Or By Calling 97248 55877.
Are Gutters Necessary? Explore the details now!AmeliaLauren3
Gutters are typically installed at a slight downward slope to allow water to flow freely towards downspouts or drains – the downspout being the vertical pipe attached to the gutters. The water is subsequently transported by the downspout to either the ground or an underground drainage system. Maintaining a gutter system that is free of blockages and functional requires regular maintenance.
But, many wonder in what situations gutters are required and not required. In this ppt we will discuss in detail the matter, ‘Are Gutters Necessary?’
Elevate Your Brand with Digital Marketing for Fashion IndustryMatebiz Pvt. Ltd
Matebiz Pvt. Ltd. specializes in providing cutting-edge digital marketing for Fashion Industry. Our comprehensive strategies ensure that your brand stands out in the competitive fashion landscape. From targeted social media campaigns to search engine optimization tailored for fashion keywords, we cover it all. With a deep understanding of industry trends and consumer behavior, we craft compelling content and engaging visuals to enhance your online presence. Trust Matebiz Pvt. Ltd. to elevate your fashion brand through strategic digital marketing initiatives.
Maximizing Efficiency with Integrated Water Management SystemsIrri Design Studio
Integrated water management systems are essential for improving irrigation design sustainability and efficiency. Irri Design Studio helps customers maximize water consumption, reduce waste, and encourage responsible stewardship of water resources by utilizing cutting-edge technology like drone-based construction updates and BIM modeling. The increasing issues of water shortage and environmental protection require an all-encompassing strategy to water management. Irrigation systems may be planned to optimize water consumption efficiency while guaranteeing the safety of people and the environment by putting new ideas and concepts into practice. Visit our website https://www.irridesignstudio.com/ for more information.
Unlocking Insights: AI-powered Enhanced Due Diligence Strategies for Increase...RNayak3
Explore how a risk-based approach to Enhanced Due Diligence can deliver effective Anti-Money Laundering (AML) compliance and monitoring in banking and financial services.
Unlocking Insights: AI-powered Enhanced Due Diligence Strategies for Increase...
Infocon Bangladesh 2016
1. www.primeinfoserv.com | email : info@primeinfoserv.com | Contact : +91 98300 17040
Managed Service | Consulting | System Integration | Skill Development | Applications
2.
3. PRIME INFOSERV LLP
▪ Prime Infoserv LLP is an IT-services company offering comprehensive
services to businesses across a broad range of platforms and
technologies.
▪ With Prime, organizations get more than just an outsourcing partner.
We hold strategic capabilities to compete better and deliver more for
the customers. By improving reliability, speed and agility, we enable
our customers to achieve sustainable differential advantage over
their competitors. Our engagement models are flexible, scalable,
secure and custom defined, based on specific individual needs of our
customers
7. OVERVIEW
▪ DO WE NEED TO TAKE INFORMATION SECURITY
CHALLENGES SERIOUSLY
▪ WHAT WE SHOULD BE DOING AS AN ORGANIZTION
TO ADDRESS THE MULTIPLE CHALLENGES.
▪ HOW WE CAN HELP YOU IN YOUR JOURNEY
8. DO WE NEED TO TAKE INFORMATION
SECURITY CHALLENGES SERIOUSLY ?
13. Q: IN TODAY’S MARKET, WHAT CAN:
•Give your company a competitive advantage?
•Improve your reputation in the eyes of your customer?
•Demonstrate compliance to international and federal privacy laws?
•Improve system uptime and employee productivity?
•Ensure viable eCommerce?
▪ Answer: Information Security.
14. www.primeinfoserv.com | info@primeinfoserv.com
Limitations of Current information security systems
ENTERPRISE
CUSTOMERS
VENDORS
What happens if the employee with critical information with him leaves organization and joins the
competitors?
Competitors
ENTERPRISE
Employees take laptops out, what happens if the laptop is stolen?
What happens if the email gets accidentally marked to a vendor ?
Firewalls
VPN Network
17. WHAT’S THE PROBLEM?
▪ Your security people have to protect against thousands of
security problems.
▪ Hackers only need one thing to be missed.
▪ But with appropriate attention given to security, companies
can be reasonably well protected.
18. “All it takes is just one weak link in
the chain for an attacker to gain a foothold into
your network”
19. 19
WHAT IS NEEDED?
Management concerns
• Market reputation
• Business continuity
• Disaster recovery
• Business loss
• Loss of confidential data
• Loss of customer confidence
• Legal liability
• Cost of security
Security
Measures/Controls
• Technical
• Procedural
• Physical
• Logical
• Personnel
• Management
20. www.primeinfoserv.com | info@primeinfoserv.com
CALL TO ACTION
Poor information security outcomes
are commonly the result of
poor management
and not
poor technical controls.
The 27000 series of ISMS Standards tackle the information problems we face from the management
perspective.
- It is not easy, but it is best practice and it works
21. THE GOLDEN RULE IN INFORMATION SECURITY !
Business Needs First,
Technology Needs Last.
22. (No More of This)
THE FIRST STEP -START BY ACKNOWLEDGING THE
PROBLEM…
24. EFFECTIVE MANAGEMENT SYSTEMS
▪ Effective management systems include:
▪ Clear delineation of roles and responsibilities
▪ Written policies and procedures
▪ Training
▪ Internal controls
▪ Effective oversight
▪ Information sharing
▪ Systems must provide reliable and current information on effectiveness and
efficiency of the process .
25. SECURITY RISK MANAGEMENT PRINCIPLES
•Information Security is a business problem, not just an IT problem
•Information Security risks need to be properly managed just like any
other business risk
•Lifecycle management is essential – there are always new threats
and new vulnerabilities to manage (and new systems , new people
new technologies, etc., etc.)
26. Information Security
WHERE DO I APPLY INFORMATION SECURITY
Process
Layer
Technology
Layer
People
Layer
Facilities
Layer
Strategy
Layer
Data/Appl.
Layer
Information Security
Is your IS strategy complete?
Does it address key issue?
Privacy rights must be balanced with security
exposures.
Ensure that your security processes function and
produce intended results.
Sensitive and critical data must be available,
managed, and utilized in a secure fashion.
IT is the foundation for data management and
process execution maximize uptime and security.
The best strategies and processes will be
undermined if availability and security of physical
assets is not ensured.
Way Ahead
ItAppliesatAllLayers
27. SECURITY RISK MANAGEMENT:
EDUCATION
• One of the largest security risks in your enterprise is untrained employees – this
especially includes upper management
• Who cares what technology you have if an employee will give their password
over the phone to someone claiming to be from the help desk?
• Are users aware of their roles and responsibilities as they relate to information
security?
• Are users aware of security policies and procedures?
• Do users know who to call when there are security problems?
28. WHAT WE SHOULD BE DOING AS AN ORGANIZTION
TO ADDRESS THE MULTIPLE CHALLENGES.
31. www.primeinfoserv.com | info@primeinfoserv.com
Existing Problems
Organizations are often working at the tactical level without a strategic framework
Examples:
Security tools
Incident response
Lack of regular feedback to executive management
Examples:
Ad hoc testing occurs without a pre-defined structure
Few requirements for action plans to provide solutions
33. www.primeinfoserv.com | info@primeinfoserv.com
Information Security & IT Governance
What is information security governance?
Leadership
Framework established to ensure that all the security elements put in place to protect
your data environment work efficiently, accomplish what is intended, and do so cost
effectively
Processes to carry out what is intended by the leadership‘
Why is it important?
Provides a framework for secure business operations in an
interconnected world
Ensures the organization ’s security resources are well spent
Gains international respect
35. www.primeinfoserv.com | info@primeinfoserv.com
Information Security & IT Governance
What does it need to include?
Alignment with the information security strategy of the organization
Management of risks
Efficient and effective management
Verification of results
What benefits can be gained from a security governance program?
International recognition
Fewer breaches to deal with/increased efficiency
More effective use of resources
37. www.primeinfoserv.com | info@primeinfoserv.com
Tiered Security Process
CIO
CISO
Business Processes
Systems and Infrastructure
Risks
Audit Results
Vulnerability
Assessments
Continuous
Monitoring
Page 12
Security
Awareness
Policies
Guidelines
Standards
Drive the
Program
Feedback
Security Management
38. www.primeinfoserv.com | info@primeinfoserv.com
Best Practices Security Governance
Approve
Define
Interpret
Implement Operations
Operational
Governance
Enterprise Policy
and Standards
Executive
Leadership –
Executive
Mgmt/
CIO
CISO
Line of
Business
Human
Resources
Line of
Business
Datacenter
39. www.primeinfoserv.com | info@primeinfoserv.com
Governance Implementation
The Role of Executive Management - Strategic
Commit To Holistic Security Excellence
Set a common vision
Establish principles to guide the program
Commit To a Program
Create the security program plan
Apply the necessary resources
Manage Change
Drive transformation through organization
Measure Success
Internal testing and measurement
Audit improvement
40. IT GOVERNANCE
▪ IT Governance is an integral part of the corporate
governance involves leadership support,
organizational structure and processes to ensure
that a bank’s IT sustains and extends business
strategies and objectives.
▪ Effective IT Governance is the responsibility of the
Board of Directors and Executive Management.
41. WHY IT GOVERNANCE?
– IT is critical in supporting and enabling bank’s
business goals
– IT is strategic to business growth and innovation
– Due diligence is increasingly important due to IT
implications of mergers and acquisitions
– Risks of failure have wider reputational impact
42. ROLES & RESPONSIBILITIES
SNo. Roles & Responsibilities Responsibility Description
(i) Board of Directors/ IT Strategy
Committee
Approving IT strategy and policy documents, Ensuring that the IT organizational structure
complements the business model and its direction etc.
(ii) Risk Management Committee Promoting an enterprise risk management competence throughout the bank, including
facilitating development of IT-related enterprise risk management expertise
(iii) Executive Management Level Among executives, the responsibility of Senior executive in charge of IT operations/Chief
Information officer (CIO) is to ensure implementation from policy to operational level
involving IT strategy, value delivery, risk management, IT resource and performance
management.
(iv) IT Steering Committee Its role is to assist the Executive Management in implementing IT strategy that has been
approved by the Board. An IT Steering Committee needs to be created with
representatives from the IT, HR, legal and business sectors.
43. POLICIES & PROCEDURES
▪ The bank needs to have IT-related strategy and policies
▪ IT strategy and policy needs to be approved by the Board
▪ Detailed operational procedures may be formulated in
relevant areas including for data center operations
▪ A bank needs to follow a structured approach for the long-
range planning process considering multiple factors
▪ There needs to be an annual review of IT strategy and policies
taking into account the changes to the organization’s business
plans and IT environment
44. POLICIES & PROCEDURES
▪ Banks need to establish and maintain an enterprise architecture framework
or enterprise information model to enable applications development and
decision-supporting activities, consistent with IT strategy.
▪ There is also a need to maintain an “enterprise data dictionary” that
incorporates the organization’s data syntax rules.
▪ Banks need to establish a classification scheme that applies throughout the
enterprise, based on the criticality and sensitivity (e.g. public, confidential,
or top secret) of enterprise data.
▪ There is a need for a CIO in bank. He has to be the key business player and a
part of the executive decision-making function. His key role would be to be
the owner of IT functions: enabling business and technology alignment.
▪ Bank-wide risk management policy or operational risk management policy
needs to be incorporate IT-related risks also. The Risk Management
Committee periodically reviews and updates the same (at least annually).
46. SNo. Roles & Responsibilities Responsibility Description
(i) Boards of Directors/Senior
Management
The Board of Directors is ultimately responsible for information security. Senior
Management is responsible for understanding risks to the bank to ensure that they
are adequately addressed from a governance perspective.
(ii) Information Security
Team/Function
Banks should form a separate information security function/group to focus
exclusively on information security management.
(iii) Information Security
Committee
Includes business heads from different units and are responsible for enforcing
companywide policies & procedures.
(iv) Chief Information Security
Officer (CISO)
A sufficiently senior level official of the rank of GM/DGM/AGM needs to be
designated as the Chief Information Security Officer (CISO) responsible for
articulating and enforcing the policies that a bank uses to protect its information
assets. The CISO needs to report directly to the Head of the Risk Management
function and should not have a direct reporting relationship with the CIO.
48. R&R
S No. Roles & Responsibilities Responsibility description
1 Board of Directors and Senior
Management
To meet the responsibility to provide an independent audit function with sufficient resources
to ensure adequate IT coverage, the board of directors or its audit committee should provide
an internal audit function which is capable of evaluating IT controls adequately.
2 Audit Committee of the Board The Audit Committee should devote appropriate and sufficient time to IS audit findings
identified during IS Audits and members of the Audit Committee would need to review
critical issues highlighted and provide appropriate guidance to the bank’s management.
3 Internal Audit/Information System
Audit function
Banks should have a separate IS Audit function within the Internal Audit department led by an
IS Audit Head, assuming responsibility and accountability of the IS audit function,
reporting to the Chief Audit Executive (CAE) or Head of Internal Audit.
49. IS AUDIT
S No. Component Description
(i) IS Audit Because the IS Audit is an integral part of the Internal Auditors, auditors will also be required to be independent,
competent and exercise due professional care.
(ii) Outsourcing
relating to IS Audit
Risk evaluation should be performed prior to entering into an outsourcing agreement and reviewed periodically
in light of known and expected changes, as part of the strategic planning or review process.
2 Audit Charter,
Audit Policy to
include IS Audit
An Audit Charter / Audit Policy is a document which guides and directs the activities of the Internal Audit
function. IS Audit, being an integral part of the Internal Audit function, should also be governed by the same
Audit Charter / Audit Policy. The document should be approved by the Board of Directors. IS Audit policy/charter
should be subjected to an annual review to ensure its continued relevance and effectiveness.
3 Planning an IS
Audit
Banks need to carry out IS Audit planning using the Risk Based Audit Approach. The approach involves aspects
like IT risk assessment methodology, defining the IS Audit Universe, scoping and planning the audit, execution
and follow up activities.
4 Executing IS Audit During audit, auditors should obtain evidences, perform test procedures, appropriately document findings, and
conclude a report.
6 Reporting and
Follow up
This phase involves reporting audit findings to the CAE and Audit Committee. Before reporting the findings, it is
imperative that IS Auditors prepare an audit summary memorandum providing overview of the entire audit
processing from planning to audit findings.
7 Quality Review It is to assess audit quality by reviewing documentation, ensuring appropriate supervision of IS Audit members
and assessing whether IS Audit members have taken due care while performing their duties.
51. R&R
SNo. Roles & Responsibilities Responsibility description
(a) Board of Directors and
Senior Management
Indian banks follow the RBI guideline of reporting all frauds above 1
crore to their respective Audit Committee of the Board.
1.1. BCP Head or Business
Continuity Coordinator
A senior official needs to be designated as the Head of BCP activity
or function
1.2. BCP Committee or Crisis
Management Team
Present in each department to implement BCP department wise.
1.3 BCP Teams There needs to be adequate teams for various aspects of BCP at
central office, as well as individual controlling offices or at a branch
level, as required.
52. SNo Component Description
2.1 BCP Methodology Banks should consider various BCP methodologies and standards, like BS 25999, as inputs for their BCP framework.
2.3 Key Factors to be
considered for BCP
Design
Following factors should be considered while designing the BCP:
• Probability of unplanned events, including natural or man-made disasters, earthquakes, fire, hurricanes or bio-
chemical disaster
• Security threats
• Increasing infrastructure and application interdependencies
• Regulatory and compliance requirements, which are growing increasingly complex
• Failure of key third party arrangements
• Globalization and the challenges of operating in multiple countries.
3 Testing a BCP Banks must regularly test BCP to ensure that they are up to date and effective: Testing of BCP should include all aspects
and constituents of a bank i.e. people, processes and resources (including technology). Banks should consider having
unplanned BCP drill, Banks should involve their Internal Auditors (including IS Auditors) to audit the effectiveness of
BCP etc. Various other techniques shall be used for testing the effectiveness of BCP.
4 Maintenance and
Re-assessment of
Plans
BCPs should be maintained by annual reviews and updates to ensure their continued effectiveness. Changes should
follow the bank’s formal change management process in place for its policy or procedure documents. A copy of the BCP,
approved by the Board, should be forwarded for perusal to the RBI on an annual basis.
5 Procedural aspects
of BCP
Banks should also consider the need to put in place necessary backup sites for their critical payment systems which
interact with the systems at the Data centers of the Reserve Bank.
6 Infrastructural
aspects of BCP
Banks should consider paying special attention to availability of basic amenities such as electricity, water and first-aid
box in all offices.
7 Human Aspect of
BCP
Banks must consider training more than one individual staff for specific critical jobs, They must consider cross-training
employees for critical functions and document-operating procedures.
8 Technology aspects
of BCP
Applications and services in banking system which are highly mission critical in nature and therefore requires high
availability, and fault tolerance to be considered while designing and implementing the solution.
56. WHAT WOULD YOU LIKE TO DO?
22/04/2016
BRiSK_April20
15
•Would you avail the offer,
as is ?
•Would you like to revert to
the typical design (at
additional cost)?
•Would you like to get re-
trained to drive this car?
•Would you like to get
insured at a higher
premium, or hire a driver
who can manage this
design?
Accept the risk
Avoid the risk
Mitigate the risk
Transfer the risk
57. RISK - DEFINITION
Source Definition
ISO/IEC Guide 73:2002 ‘Combination of the probability of an event and its consequence.’
AS/NZS 4360:2004 ‘Chance of something happening that will have an impact on objectives.’
COSO (2004) ERM - Integrated
Framework
‘Events with a negative impact represent risks, which can prevent value
creation or erode existing value. Events with positive impact may offset
negative impacts or represent opportunities.’
Lars Oxelheim and Clas
Wihlborg (2008) Corporate
Decision-Making with
Macroeconomic Uncertainty
‘The concept of risk refers in general to the magnitude and likelihood of
unanticipated changes that have an impact on a firm’s cash flows, value or
profitability. […] Risk has a negative connotation, but uncertainty can be a
source of opportunities as well as costs.’
BRiSK_April2015 22/04/2016
58. LET’S LOOK AT THE ASPECTS OF ANY RISK SITUATION
BRiSK_April2015 22/04/2016
60. LET’S CALIBRATE ON OUR DISCUSSION
We have a
reflex to
identify risks
Decisions are
influenced by
nature of risks
applicable
Risk is not only
un-certainty;
its the effect of
uncertainty
The rigor of
treatment
should be
commensurate
to the
magnitude and
type of risk
61. OBJECTIVES CAN BE….
Business Objectives
(examples)
Risk Management
Objectives (examples)
IS / BC Objectives
(examples)
• Market share
• Profit margin
• Competitive advantage
• Protect business value
• Embedded at all levels i.e. strategic,
tactical and operational
• On-time & effective risk treatment
• Availability of services at all times
• Legal and regulatory compliance
• Protect health and safety of
personnel
BRiSK_April2015 22/04/2016
63. STRUCTURE OF ISO/IEC 27001 / ISO 22301 / ISO 9001
4 Context of
the
organization
Understandin
g the
organization
and its
context
Expectations
of interested
parties
Scope of ISMS
ISMS
(PDCA)
5 Leadership
Leadership
and
commitment
Policy
Org. roles,
responsibilities
and authorities
6 Planning 7 Support
Resources
Competence
Awareness
Communication
8 Operation
9 Performance
evaluation
Monitoring,
measurement,
analysis and
evaluation
Internal audit
Management
review
10
Improvement
Nonconformity
and corrective
action
Continual
improvement
PLAN DO CHECK ACT
Documented
information
Actions to
address risks
and
opportunities
IS objectives
and plans to
achieve them
Operational
planning and
control
Information
security risk
assessment
Information
security risk
treatment
New
Major
clause
New section
with emphasis
on
measurable
objectives
Concept of
preventive
action moved
to Clause 6
(planning)
New section with
emphasis on
methods of
measurement &
performance
analysis
New section on
Communication
strategy
A
64. RISK CRITERIA
▪ “Risk criteria are the parameters established by the organization to allow it to
describe risk and make decisions about the significance of risk . These decisions
enable risk to be assessed and treatment to be selected”. (ISO TR 31004:2013)
▪ Risk criteria can be based on organisational objectives, context , risk appetite
▪ Risk criteria can also be derived from standards, laws, policies and other
requirements
22/04/2016
65. EXAMPLES OF RISK CRITERIA
Impact & Probability Criteria (Examples)
• SLA
• Cost of recovery (criticality of assets)
• Number of sites or personnel affected
• Man-hours of production time
• Damage to reputation,
• Legal or regulatory penalties
• Strategic value of the business process
• Number of incidents (likelihood)
Acceptance Criteria (Examples)
• Different residual levels may apply to
different classes of risk, e.g. Risks that
could result in legal / regulatory non-
compliance may have a very low residual
level (qualitative or quantitative)
• Risk owners may accept risks above the
acceptance level under defined
conditions, (for example if there is a
commitment to take action to reduce it to
an acceptable level within a defined time)
22/04/2016
66. ISO/IEC 27001:2013& RISK MANAGEMENT
▪ PLAN PHASE: Risk assessment process mandatory
▪ DO PHASE: System of Internal controls to manage applicable risks
▪ CHECK PHASE: Internal Audit and Management Review process for
verifying effectiveness of controls
▪ DO PHASE: Process to implement necessary actions to improve the
systems of control
67. www.primeinfoserv.com | info@primeinfoserv.com
Likelihood X Impact = RISK
Risk Rating Very small Impact Moderate Impact Significant Impact Huge Impact
Unlikely Low Risk Low Risk Low Risk Low Risk
Realistic Possibility Low Risk Low Risk Moderate Risk Moderate Risk
Strong Likelihood Low Risk Moderate Risk Moderate Risk High Risk
Near Certainty Low Risk Moderate Risk High Risk High Risk
Page 14
Drive to the left
68. LET’S PUT IT TOGETHER
22/04/2016
A. Creates Value
B. Integral part of organisational
process
C. Part of Decision making
D. Explicitly address uncertainty
E. Systematic, Structured and
timely
F. Based on the best available
information
G. Tailored
H. Takes human and cultural
factors into account
I. Transparent and inclusive
J. Dynamic , iterative and
responsive to change
K. Facilitates continual
improvement and
enhancement of the
organisation
Principles Framework Process
Mandate &
Commitment (4.2)
Design of
Framework for
managing risk
(4.3)
Implementing risk
management
(4.4)
Monitoring and
review of the
framework (4.5)
Continual
improvement of
the framework
(4.6)
Establishing the context
(5.3)
Risk identification
(5.4.2)
Risk Analysis
(5.4.3)
Risk evaluation
(5.4.4)
Risk Treatment
(5.5)
Communicationandconsultation(.52.)
Monitoringandreview(5.6)
Risk Assessment (5.4)
Figure 1: ISO 31000:2009
69. www.primeinfoserv.com | info@primeinfoserv.com
Risk Management
Plan
Risk Analysis
Audits
DO
Plan of Action and Milestones
Check
Continuous Monitoring
“After-Action” Reports
Act
Revise Policy & Program
Redirect Risk Analysis
Page 16
73. WHAT IS COMPLIANCE?
• Compliance should be a program based on defined requirements
• Requirements are fulfilled by a set of mapped controls solving
multiple regulatory compliance issues
• The program is embodied by a framework
• Compliance is more about policy, process and risk management
than it is about technology
74. RISK & COMPLIANCE MGMT
Partners/
Customers
Regulations Control
Framework
Assessments
Policy
and
Awareness
Audits
Treat
Risks
Improve
Controls
Automate
Process
Risk
Assessment
75. RISK AND COMPLIANCE APPROACHES
Minimal Sustainable Optimized
• Annual / Project-based
Approach
• Minimal Repeatability
• Only Use Technologies Where
Explicitly Prescribed in
Standards and Regulations
• Minimal Automation
•Proactive / Planned Approach
•Learning Year over Year
•Use Technologies to Reduce
Human Factor
•Leverage Controls Automation
Whenever Possible
•Regulatory Requirements are
Mapped to Standards
•A Framework is in Place
•Compliance and Enterprise Risk
Management are Aligned
•Process is Automated
77. IDENTIFY DRIVERS
Compliance is NOT just about regulatory compliance. Regulatory
compliance is a driver to the program, controls and framework
being put in place.
Managing compliance is fundamentally about managing risk.
78. IDENTIFY DRIVERS
• Risk Assessment
– Identify unique risks and controls requirements
• Partners / Customers
– Partners represent potential contractual risk
– Customer present privacy concerns
• Regulations – regulatory risk is considered as part of overall
risk
80. WHAT IS A CONTROL?
*Source: ITGI, COBIT 4.1
Control is defined as the policies, procedures, practices and
organizational structures designed to provide reasonable
assurance that business objectives will be achieved and
undesired events will be prevented or detected and corrected.
81. WHAT IS A FRAMEWORK?
A framework is a set of controls and/or guidance organized
in categories, focused on a particular topic.
A framework is a structure upon which to build strategy,
reach objectives and monitor performance.
82. WHY USE A FRAMEWORK?
• Enable effective governance
• Align with business goals
• Standardize process and approach
• Enable structured audit and/or assessment
• Control cost
• Comply with external requirements
83. FRAMEWORKS AND CONTROL SETS
• ISO 27001/27002
• COBIT
• ITIL
• NIST
• Industry-specific – i.e. PCI
• Custom
84. ISO 27001/27002
• Information Security Framework
• Requirements and guidelines for development of an ISMS
(Information Security Management System)
• Risk Management a key component of ISMS
• Part of ISO 27000 Series of security standards
85. ISO 27001 – MGMT FRAMEWORK
▪ Information Security Management Systems –
Requirements (ISMS)
▪ Process approach
▪ Understand organization’s information security requirements
and the need to establish policy
▪ Implement and operate controls to manage risk, in context of
business risk
▪ Monitor and review
▪ Continuous improvement
88. BUILDING A FRAMEWORK
Risk
Assessment &
Treatment Security
Policy
Organizing
Information
Security
Asset
Management
Human
Resources
Security
Physical and
Environmental
SecurityCommunications
and Operations
Management
Access
Control
IS Acquisition,
Development and
Maintenance
Information
Security Incident
Management
Business
Continuity
Management
Compliance
Operational
Controls
Technical
Controls
Management
Controls
Protected Information
ISO 27002: Code of Practice for
Information Security Management
89. FRAMEWORKS COMPARISON
Framework Strengths Focus
COBIT Strong mappings
Support of ISACA
Availability
IT Governance
Audit
ISO 27001/27002 Global Acceptance
Certification
Information Security Management
System
ITIL IT Service Management
Certification
IT Service Management
NIST 800-53 Detailed, granular
Tiered controls
Free
Information Systems
FISMA
PCI DSS Card Industry Specific IT Controls to protect Card holder
Information
90. www.primeinfoserv.com | info@primeinfoserv.com
What is PCI Compliance?
Definition – Payment Card Industry Data
Security Standard (PCI-DSS)
Set up in 2004 by Visa, MasterCard,
American Express, Discover, and JCB to
reduce the risk of credit card theft and
transfer liability to merchants
Requires mandatory adoption by all
businesses that store, process, or
transmit credit/debit card data
6Control Objectives
6Control Objectives
12Core Requirements
280+Audit
Procedures
91. 12 RULES OF PCI DSS COMPLIANCE
NEW VENTURES - PAYMENTS
Build and Maintain a Secure Network
Requirement 1 Install and maintain a firewall configuration to protect cardholder data
Requirement 2 Do not use vendor supplied defaults for system passwords and other security parameters
Protect Cardholder Data
Requirement 3 Protect stored cardholder data
Requirement 4 Encrypt transmission of cardholder data across open, public networks
Maintain a Vulnerability Management Program
Requirement 5 Use and regularly update anti-virus software or programs
Requirement 6 Develop and maintain secure systems and applications
Implement Strong Access Control Measures
Requirement 7 Restrict access to cardholder data by business need to know
Requirement 8 Assign a unique ID to each person with computer access
Requirement 9 Restrict physical access to cardholder data
Regularly Monitor and Test Networks
Requirement 11 Track and monitor all access to network resources and cardholder data
Requirement 11 Regularly test security systems and processes
Maintain an Information Security Policy
Requirement 12 Maintain a policy that addresses information security for all personnel.
92. PCI INTENT - IN ONE SENTENCE…
Protect card holder data (CHD) from inappropriate
disclosure
94. CHD – IT GETS EVERYWHERE!!!!
Just a few places where
we have found CHD !
95. www.primeinfoserv.com | info@primeinfoserv.com
COMMON CHALLENGES TO ACHIEVE PCI COMPLIANCE
• Fully understand and document the processes and payment environment
• Tracking and monitoring of access to payments card systems and data
• Controlling logical access (authentication) to systems containing payment card data
• Security event monitoring across a disparate environment
• Limited security capabilities (authentication, monitoring, etc…) of legacy systems
• Remediation of controls across large (often legacy) distributed environments
• Encryption of payment card data
• Putting PCI contractual language in place for third party service providers
• Obtaining management support to perform remediation
96. www.primeinfoserv.com | info@primeinfoserv.com
BENEFITS OF COMPLIANCE
• Protect customers’ personal data
• Boost customer confidence through a higher level of data
security
• Lower exposure to financial losses and remediation costs
• Maintain customer trust and safeguard the reputation of the
brand
• Provide a complete “health check” for any business that stores
or transmit customer information
99. CONTROLS ALIGNMENT
How aligned are your controls?
Assessment
(Information Security, IT
Risk Management)
Internal Audit
(IT/Financial Audit)
External Audit
(Regulatory and Non-
Regulatory)
100. REMEDIATION PRIORITIES
• Where are our greatest risks?
• What controls are we fulfilling?
• How many compliance requirements are we solving?
102. CONTROLS HIERARCHY
Manual
Require human intervention Vs.
Automated
Rely on computers to reduce human
intervention
Detective Preventive
Designed to search for and identify
errors after they have occurred
Designed to discourage or preempt
errors or irregularities from
occurring
Vs.
103. AUTOMATED AND PREVENTIVE
Logging and Monitoring
Not Efficient Efficient
Reviewing logs for incidents An automated method of
detecting incidents
Not Effective Effective
Missing the incident due to human
error
Preventing the incident from
occurring in the first place
104. AUTOMATE THE PROCESS
• How do you currently measure compliance?
• Reduce documents, spreadsheets and other forms of manual
measurement
• Create dashboard approach
• Governance, Risk and Compliance toolsets
105. GRC AUTOMATION
Enterprise
Multi-Function
Single Function
•Enterprise Scope
•Highly Configurable
•Multiple Functions (Risk,
Compliance, Policy)
•Sophisticated Workflow
•Functionality More Limited
•More “out of the box”
•Modest Workflow
•Specific Process
•Specific Standard or Regulation
•Simple Workflow
106. CUSTOM DEFENSE :
TARGETED ATTACKS AND
ADVANCED THREATS &
VULNERABILITY PROTECTION
Confidential | Copyright 2013 Trend Micro Inc.
108. THE NEED FOR REAL-TIME RISK
MANAGEMENT
SOURCE: VERIZON 2011 DATA BREACH REPORT
1/3 of infections result in compromise within minutes, but
most are not discovered or contained for weeks or months!
109. ANALYSTS AND INFLUENCERS URGE
ACTION
“Zero-Trust” security model
Use of Network Analysis and Visibility Tools
“Lean Forward” proactive security strategy
Use of Network Threat Monitoring Tools
“Real-Time Risk Management”
Use of Threat Monitoring Intelligence
US Federal Risk Management Framework
Calls for “Continuous Monitoring”
110. A Typical Targeted Attack
Intelligence Gathering
Identify & research target individuals using
public sources (LinkedIn, Facebook, etc) and prepare
a customized attack.
1
Point of Entry
The initial compromise is typically from zero-day malware
delivered via social engineering (email/IM or drive by
download). A backdoor is created and the network can now
be infiltrated. (Alternatively, a web site exploitation
or direct network hack may be employed.)
2
Command & Control (C&C) Communication
Allows the attacker to instruct and control the compromised
machines and malware used for all subsequent phases.
3
Lateral Movement
Once inside the network, attacker compromises additional
machines to harvest credentials, escalate privilege levels
and maintain persistent control.
4
Asset/Data Discovery
Several techniques (ex. Port scanning) are used to identify
the noteworthy servers and the services that house the
data of interest.
5
Data Exfiltration
Once sensitive information is gathered, the data is
funneled to an internal staging server where it is chunked,
compressed and often encrypted for transmission
to external locations.
6
111. HOW LONG DO TARGETED ATTACKS / APTS STAY HIDDEN?
Most companies are breached in minutes but it is not
discovered for months!
Source: Verizon Data Breach Investigations Report 20121
1Confidential | Copyright
2012 Trend Micro Inc.
Average time from
compromise to discovery
is 210 days
112. APTS MOST COMMONLY START WITH A
SPEAR PHISHING EMAIL WITH AN
ATTACHMENT
113. Antivirus
Compare malicious
binary files and
attachments, like the
‘copy.docx’ file
to known virus
signatures
Sender Reputation
Block email from known
suspected spammers, like
readjustedha6@12481b
matter.com
Lexical Analysis
Analyze word
combinations &
patterns commonly
found in spam
114. Sender Reputation
Example@emailinfo.e
xample.com is not
known for sending out
spam
X
Antivirus
Script-based attack; no
known signatures or
history of similar
attacks
Lexical Analysis
No commonly used
word combinations
or patterns of spam
X
X
115. ▪ Spread through direct
messages with “hidden video”
lure
▪ Utilizes obfuscation techniques
(re-direct)
▪ Steals account credentials
▪ “Missing Adobe” message
causes dropper file
▪ 23% detection rate by AV
engines
▪ Websense customers were
protected
EXAMPLE - SOCIAL MEDIA
115
118. "While traditional antivirus [vendors] may be able to spot and deflect many kinds of
attacks, they're not well-equipped to handle targeted attacks. But there are
technologies able to detect such attacks, if not entirely prevent them."
119. WHY CURRENT DEFENSES FAIL
3 FORWARD FACING ONLY,
LACK OUTBOUND
PROTECTION
Not data-aware, lack contextual
analysis, minimal to no forensic
visibility
2 LACK OF REAL-TIME
INLINE CONTENT ANALYSIS
Collect samples for lab analysis using
background processes
Producing new signatures (network/file)
and reputations (URL/file)
4 MORE OF THE SAME IN
NEW DEPLOYMENT OPTIONS
UTMs, NGFWs, IDSs, Network Threat
Monitors
SSL severely impacts performance,
or blind to it
1 PRIMARILY BASED ON
SIGNATURE & REPUTATION
History is not a reliable indicator of
future behavior.
Signature creation cannot keep up with
the dynamic creation of threats
124. www.primeinfoserv.com | info@primeinfoserv.com
Custom Defense
Advanced Malware
Detection
Contextual
Threat Analysis
Automated
Security Updates
Command & Control
Detection
Attacker
Activity Detection
Threat Impact
Assessment
Enterprise
Network
EndpointsGateways
Third Party
Security
Information
Security
Email
Network
125. DEEP DISCOVERY
• Network traffic inspection
• Advanced threat detection
• Real-time analysis & reporting
Deep Discovery
Inspector
Deep Discovery
Analyzer
Deep Discovery provides the visibility, insight and control you
need to protect your company against APTs and targeted attacks
Targeted Attack/APT Detection
In-Depth Contextual Analysis
Rapid Containment & Response
• Custom scalable threat simulation
• Deep investigation & analysis
• Actionable intelligence & results
127. • Emails containing embedded
document exploits
• Drive-by downloads
• Zero-day & known malware
• C&C communication for all
malware: bots, downloaders,
data stealing, worms, blended…
• Backdoor activity by attacker
• Malware activity: propagation,
downloading , spamming, …
• Attacker activity: scan, brute
force, tool download , …
• Data exfiltration
Attack Detection
• Decode & decompress embedded files
• Sandbox simulation of suspicious files
• Browser exploit kit detection
• Malware scan (Signature & Heuristic)
• Destination analysis (URL, IP, domain,
email, IRC channel, …) via dynamic
blacklisting, white listing
• Smart Protection Network reputation
of all requested and embedded URLs
• Communication fingerprinting rules
• Rule-based heuristic analysis
• Identification and analysis of usage of
100’s of protocols & apps including
HTTP-based apps
• Behavior fingerprinting
Detection Methods
HOW DEEP DISCOVERY WORKS
128. DEEP DISCOVERY:
KEY FEATURES
• Deep content inspection
across 80+ of protocols
& applications
• Smart Protection Network reputation
and dynamic black listing
• Sandbox simulation and analysis
• Communication fingerprinting
• Multi-level rule-based event correlation
• And more… Driven by Trend Micro threat
researchers and billions of daily events
Specialized Threat Detection
Across the Attack Sequence
Malicious Content
• Emails containing embedded
document exploits
• Drive-by Downloads
• Zero-day and known malware
Suspect Communication
• C&C communication for any
type of malware & bots
• Backdoor activity by attacker
Attack Behavior
• Malware activity: propagation,
downloading, spamming . . .
• Attacker activity: scan, brute
force, tool downloads. . .
• Data exfiltration communication
129. Real-Time Inspection
Analyze
Deep Analysis
CorrelateSimulate
Actionable Intelligence
Threat
Connect
Watch List GeoPlotting
Alerts, Reports,
Evidence Gathering
130
Visibility
– Real-time Dashboards
Insight
– Risk-based Analysis
Action
– Remediation Intelligence
Identify Attack
Behavior
& Reduce False
Positives
Detect Malicious
Content and
Communication
Out of band network
data feed of all network
traffic
130. CUSTOM DEFENSE 2.0
Control Manager
OfficeScan InterScan
Messaging
Security
InterScan
Web
Deep Discovery
Inspector/
Analyzer
SPN Feedback
Company A
SPN Feedback
ScanMailEndpoint
Sensor
1. Suspicious object list
2. Suspicious objects list/Action/IOC
Deep
Security
Block IOC
IOC
131. INCREASED IT SECURITY PRIORITY:
VULNERABILITY AND THREAT
MANAGEMENT
Source: Forrsights Security Survey, Q3 2010
Since 2008, “Managing
vulnerabilities and threats” has
moved from #5 to #2
“Which of the following initiatives are likely to be your firm’s
top IT security priorities over the next 12 months?”
132. www.primeinfoserv.com | info@primeinfoserv.com
Announcing: Trend Micro Real-Time
Threat Management Solutions
• Detect, analyze and remediate advanced threats
• Investigate incident events and contain their impact
• Monitor and optimize security posture
• Manage vulnerabilities & proactive virtual patching
• Augment security staff & expertise
Network-Wide
Visibility and Control
Actionable
Threat Intelligence
Timely Vulnerability
Protection
Threat Management System
Dynamic Threat Analysis System
Threat Intelligence
Manager
Vulnerability Mgmt. Services
Deep Security Virtual Patching
Smart Protection Network Intelligence
Risk Management Services
133. TREND MICRO THREAT MANAGEMENT
SYSTEM
TMS is a Network Analysis and Visibility solution that
provides the real-time visibility, insight, and control to
protect your company from advanced persistent attacks
Network Threat
Detection &
Deterrence
Automated
Remediation
Malware Forensic
Analysis Platform
Multi-Level Reporting
Risk Management
Services Offering
Over 300 Enterprise & Government Customers WW
134. TMS: VISIBILITY – INSIGHT – CONTROL
DataCenter
APT Implanted
Via Web, Email, USB…
Threat Discovery
Appliance
Command &
Control Server
APT Communication Detected
Threat Mitigator
Additional Analysis
Detailed Reports:
• Incident Analysis
• Executive Summary
• Root-cause Analysis
• Signature-free clean up
• Root-cause analysis
Threat Confirmed
135. DETECTION CAPABILITIES
New – DTAS Sandbox Detection Engine
New – Document Exploit Engine
• Multiple unique threat engines
• 24 hour event correlation
• Continually updated threat
relevance rules
• Data loss detection
• Tracks unauthorized app usage and
malicious destinations
• Powered by Smart Protection
Network and dedicated Trend
researchers
Best Detection Rates
Lowest False Positives
Real-Time Impact
137. TREND MICRO THREAT INTELLIGENCE
MANAGER
Delivers threat intelligence and impact analysis needed
to identify and reduce exposure to advanced threats.
Incident Analysis and
Security Posture
Monitoring
Real-Time Threat
Analysis and
Visualization
Provide Actionable
Intelligence for active
threats
Visualize event
relationships in an
attack
Office Scan
Incident Discovery
Threat Discovery Appliance
Suspicious Network BehaviorThreat Intelligence
Manager
Threat Analysis and
Response
Consolidates threat events and uses advanced visualization
and intelligence to uncover the hidden threats!
Deep Security
System Integrity
140. NEW RISK MANAGEMENT SERVICES
▪ Proactive monitoring and alerting
▪ Threat analysis and advisory
▪ Threat remediation assistance
▪ Risk posture review and analysis
▪ Strategic security planning
Augment stretched IT security staff
Put Trend Micro Threat Researchers
and Service Specialists on your team
A complete portfolio
designed to further reduce
risk exposure and security
management costs
Increase IT security responsiveness
and expertise
141. WHY TREND MICRO?
Trend Micro is the only vendor providing integrated
real-time protection and risk management against
advanced targeted threats.
Network-Wide
Visibility and Control
Actionable
Threat Intelligence
Timely Vulnerability
Protection
Threat Management System
Dynamic Threat Analysis System
Threat Intelligence
Manager
Vulnerability Mgmt. Services
Deep Security Virtual Patching
Smart Protection Network Intelligence
Risk Management Services
“Trend Micro has always impressed me with its understanding of
what its customers are going through and this reiterates it again.”
Richard Stiennon, IT-Harvest
142. THE VIRTUAL PATCHING SOLUTION
▪ Close window of vulnerability for
critical systems and applications
▪ Protect “unpatchable” systems
▪ Meet 30-day PCI patch requirement
Risk Mgt & Compliance
• Reduce patch cycle frequency
• Avoid ad-hoc patching
• Minimize system downtime
Operational Impact
Trend Micro Security Center provides
Virtual Patches within
hours of vulnerability disclosure
•Automated centralized distribution
•Protection available:
•Deep Security product module
•With OfficeScan IDF plugin
Automated
Monitoring Application
Analysis
Filter “Patch”
Development
Protection
DeliveryTrend Micro
Security Center Physical / Virtual / Cloud
Servers
Endpoints
& Devices
143. www.primeinfoserv.com | info@primeinfoserv.com
VULNERABILITY MANAGEMENT
SYSTEM▪ Vulnerability scanning
▪ Vulnerability scanning of internal and external
devices
▪ Patch and configuration recommendations
▪ Web application scanning
▪ Web site crawler to detect application design
vulnerabilities like SQL injection and cross-site
scripting etc.
▪ PCI compliant scanning
▪ Vulnerability scanning with reports for PCI
▪ Trend is an Approved Scanning Vendor
▪ Policy compliance
▪ Define and track compliance with device security
policies
▪ SaaS based management portal
▪ Hosted scans of external devices
▪ On-premise appliance for scanning internal
devices managed from SaaS portal
▪ On-demand scan
144
144. ADVANCED VISUALIZATION & IMPACT ANALYSIS
Visualize the relationship between cause and effect of each
threat event, and fully understand the impact
145. Jan 2011 results of testing conducted by AV-Test.org (qualified for internal use)
Results from T+60 test
0.0%
20.0%
40.0%
60.0%
80.0%
100.0%
100.0%
63.0%
70.5%
77.0%
61.5%
Total Percentage of threats blocked by all layers:
Exposure, Infection, Dynamic
Trend Micro OfficeScan McAfee VirusScan Microsoft Forefront
Sophos Endpoint Security Symantec Endpoint Protection
TREND MICRO SMART PROTECTION
NETWORK
147. Industry-proven real-world protection
Note: If multiple products from one vendor were
evaluated, then vendor’s best performance is listed.
*1:http://www.nsslabs.com/research/endpoint-security/anti-malware/
*2:http://us.trendmicro.com/us/trendwatch/core-technologies/competitive-benchmarks/index.html
*3:http://www.dennistechnologylabs.com/reports/s/a-m/trendmicro/PCVP2010-TM.pdf
(Dec. Test performed for Computer Shopper UK)
*4 : http://www.av-comparatives.org/images/stories/test/dyn/stats/index.html
TREND MICRO SMART PROTECTION
NETWORK
148. Interactive drill-down dashboards
• Navigate across corporate groups
• Pin-point infected sources
• Perform root-cause analysis
• Track suspicious user behavior and
application usage
• Detect leakage of regulated data
• Customizable event alarms
• Multi-level reporting for managers
and executives
• Available on-premise or hosted
THREAT MANAGEMENT PORTAL
Coming 2H 2011
• Improved drill down capability
• Sandbox analysis workbench
149. www.primeinfoserv.com | info@primeinfoserv.com
THREAT MITIGATOR TECHNOLOGY:
ROOT-CAUSE AND SIGNATURE-FREE
CLEANUP
Cleanup request
received
Check forensic logs
Locate which process
performed malicious activity
Remove malware
process, file and registry
entries
Locate and remove
parent malware
Locate and remove child
malware
In case of failure, a
custom cleanup kit is
automatically generated
by Trend
159. ▪ VAPT/IT Infra GAP Analysis
▪ Process Consulting (ISMS, ITSM, COBIT, PCI-DSS)
▪ Gateway Security, End Point Security, Anti-APT
Solution
▪ Security and Process Based Skill Development
Programs