SlideShare a Scribd company logo
1
apmg-international.com
© Copyright APMG Group 2018, All Rights Reserved
apmg-international.com
CYBER SECURITY
No Service Management,
No Cyber Security
20th November 2018
Martin Huddleston, Head of Cyber
CDCAT® is the registered trade mark of The Secretary of State for Defence, Dstl
2
apmg-international.com
© Copyright APMG Group 2018, All Rights Reserved
What we will cover
• The Service Management Risk Balance
• The Threat
• What Good Cyber Security Looks Like
• Analytics – Cyber Security through the Service Management Lens
• Real world Case Studies of High Frequency Use Process in Threat Prevention
• A Tangled Web
• What it means to be ‘Effective’, meeting appetite to take risk
• Digital Services Growth – Service Management Futures
• Takeaways
3
apmg-international.com
© Copyright APMG Group 2018, All Rights Reserved
Service Management Reminder – Risk Balance
This Photo by Unknown Author is licensed under CC BY-ND
•Resources
•Quality /
Performance
(including
cyber
security)
•Stakeholder
interests
4
apmg-international.com
© Copyright APMG Group 2018, All Rights Reserved
Threat Actor Motivations, Means and Agility
Financial Fraud / Extortion
Resource Acquisition
Competitive IPTheft
Reputational Damage
Blackmail
State SponsoredAttacks
Social engineered attacks on the person / groups
Speed and agility in opportunities of the moment
Supply chain, 3rd party code and API security
Resource acquisition and parasitic processes
5
apmg-international.com
© Copyright APMG Group 2018, All Rights Reserved
Modern Day Dog-Fight – Attacker Lifecycle Elements
• Privilege Escalation
• Opportunity Identification
• Attacker DevSecOps
• Reconnaissance
• Initial Access
• Execution
• Persistence
• Defence Evasion
• Credential Access
• Discovery
• Lateral Movement
• Collection
• Exfiltration
• Command and Control
• Attack Assurance
This Photo by Unknown Author is licensed under CC BY-NC-ND
6
apmg-international.com
© Copyright APMG Group 2018, All Rights Reserved
• Service Management Integrated
Standard(s) & Frameworks
• Proportionate Performance to Impacts,
Agile to Context and Appetite to Take
Risk
• Per Asset and per Threat Performance
• Cyber Value and Effectiveness
Measurable
So What Does Good Cyber Security Look Like?
7
apmg-international.com
© Copyright APMG Group 2018, All Rights Reserved
Good Cyber Security – 2009 ‘Confiker’ Impact
• UK MoD needed means to assess systems cyber defence preparedness
• MoDChief ScientificAdvisor asked Dstl to establish “What good looks like”
• Dstl could not find a suitable commercial product
• MOD / Dstl developed know - how to enable it to:-
 Systematically collect evidence
 Make evidence based investment decisions
 Do this at pace and scale
CDCAT® is the registered trademark of The Secretary of State for Defence.
© Crown copyright, 2015; Crown Database Rights, 2015
8
apmg-international.com
© Copyright APMG Group 2018, All Rights Reserved
• Operational Resilience
• 2 Lifecycles in Risk Balance
 Cyber Defence
 Service Management
• Multi-standard Support
 159 Capabilities, NATO*/MOD Derived
 Protect / Defend / Operate satisfaction of
ALL included standards
Integrated Control System for Cyber Security
9
apmg-international.com
© Copyright APMG Group 2018, All Rights Reserved
Modern Day Dog-Fight – Defender Lifecycles / Phases
* Compared to US NIST Cyber Security Framework – Identify, Protect, Detect, Respond Recover
“Security is not merely a ‘state’ but a process that consists of 3 fundamental
components: Protection, Detection and Reaction”
-Bob Ayes, US DoD, 1998
• Strategy
• Design
• Transition
 Incl. DevSecOps
• Operation
• Continual Improvement
• Assess*
• Deter
• Protect
• Detect
• Respond
• Recover
This Photo by Unknown Author is licensed under CC BY-NC-ND
10
apmg-international.com
© Copyright APMG Group 2018, All Rights Reserved
So What of Service Management?
Analytics – Cyber Security through the Service Management Lens
A Capability Based Assessment
11
apmg-international.com
© Copyright APMG Group 2018, All Rights Reserved
10 Steps to Cyber Security – Capability Count
0
5
10
15
20
25
30
35
1 11 21 31 41 51 61 71 81 91 101
CapabilityRe-useCount
Capability Order (by a rank)
10 Steps to Cyber Security
0
5
10
15
20
25
30
35
1 11 21 31 41 51 61 71 81 91 101
CapabilityRe-useCount
Capability Order (by frequency rank)
10 Steps – Excl. ITIL®V3
Top Four Gaps:
1) Incident Management
2) Risk Management
3) Supplier Management
4) Service Asset & Configuration Management
Top Four:
1) Define Security Configuration Baselines
2) Establish Policies to Secure Target System
3) Establish Policies to Secure Information
4) Identify Minimum System Security Requirements
12
apmg-international.com
© Copyright APMG Group 2018, All Rights Reserved
US NIST Cyber Security Framework – Capability Count
0
10
20
30
40
50
60
70
1 11 21 31 41 51 61 71 81 91 101 111 121 131
CapabilityRe-useCount
Capability Order (by frequency rank)
NIST CSF V1.1
0
10
20
30
40
50
60
70
1 11 21 31 41 51 61 71 81 91 101 111 121 131
CapabilityRe-useCount
Capability Order (by frequency rank)
NIST CSF V1.1 excl. ITIL V3
Top Four:
1) Information Security
2) Health Checks / Audits
3) Secure Data and Network Management
4) Accounting and Audit Controls
Top Four Gaps:
1) Information Security
2) Incident Management
3) Supplier Management
4) Risk Management
13
apmg-international.com
© Copyright APMG Group 2018, All Rights Reserved
Poll of Top Service Management Capabilities - Impact
MageCart Indidents
Ticketmaster, British Airways et al.
Supplier Management
Top ITIL® Capabilities
Service Asset & Configuration
Management
Incident Management
Risk Management
14
apmg-international.com
© Copyright APMG Group 2018, All Rights Reserved
Facebook Incident
“This attack exploited the complex
interaction of multiple issues in our
code. It stemmed from a change
we made to our video uploading
feature in July 2017…hackers
were using the site's API to
automate the process of grabbing
users' profile information”
Supplier Management
Top ITIL® Capabilities
Service Asset & Configuration
Management
Incident Management
Risk Management
Poll of Top Service Management Capabilities - Impact
15
apmg-international.com
© Copyright APMG Group 2018, All Rights Reserved
Supplier Management
Top ITIL® Capabilities
Service Asset & Configuration
Management
Incident Management
Risk Management
SamSam Incidents –
Healthcare Sector
“Modus operandi is to gain access
to an organization’s network,
spend time performing
reconnaissance by mapping out
the network, before encrypting as
many computers as possible and
presenting the organization with a
single ransom demand”
Poll of Top Service Management Capabilities - Impact
16
apmg-international.com
© Copyright APMG Group 2018, All Rights Reserved
Service Management in Complex System Risk –
“A Tangled Web”
• Change language to Cyber Defence, not passive cyber security, but proactive
defence.
• Increasing dependencies is a growing risk
 With every new cyber security standards, we are seeing greater complexity
• A future is with us now
 AI’s essential impact on service management, the complexity & scale issue
• But not all good. A new class of problems and a new Service Management:
 Prevent: keeping down the AI weeds from choking the internet and digital
services
 Detect: for cyber ‘bad’ actors from weaponizing the AI weeds
 Recover/Respond: cleaning up the AI weeds.
17
apmg-international.com
© Copyright APMG Group 2018, All Rights Reserved
Continual Improvement - Operational Risk Measurement e.g.
Supply / Service Chain Security Effectiveness
 These assets are individual systems / services
that have had cyber defence assessment and
effectiveness measurement calibrated to real-
world performance data
 These allow you to decide a risk appetite and
actions to accept, treat, transfer or avoid the
risk as a portfolio
Overall Effectiveness with
Maturity Levels
18
apmg-international.com
© Copyright APMG Group 2018, All Rights Reserved
Control System Trends in Digital Services Growth
Leading to a changing face for Operational Resilience and Management of Harm
Process Quality
Only Compliance
Driven
Passive
BC & DR
Response &
Recovery Driven
Reactive
Intelligence,
Analytics &
Agility Driven
Proactive
Self Healing, re-
Provisioning,
After-care
AutonomicAdhoc
19
apmg-international.com
© Copyright APMG Group 2018, All Rights Reserved
Takeaways
1. Service Managers can “step up” to secure networks, effective security is a ‘team’ sport -
consider your high frequency processes first
2. The need for more operational testing, SIAM*, DevSecOps and of complex systems is
inevitable - consider your ‘Release and Deployment’ processes
3. Baseline your current maturity effectiveness to empower your business conversations in
valuing cyber risk - quantify it with the business exposure
*SIAM – Service Integration and Management
20
apmg-international.com
© Copyright APMG Group 2018, All Rights Reserved
Questions
21
apmg-international.com
© Copyright APMG Group 2018, All Rights Reserved
+44 (0) 1494 452450
servicedesk@apmgroupltd.com
linkedin.com/company/apm-group
apmg-international.com
@Cyber_APMG @APMG_Inter
facebook.com/APMGinternationalLTD
Keeping in touch
© APMG International Ltd. 2018. All rights reserved.

More Related Content

What's hot

Why you really need a SIAM tooling strategy
Why you really need a SIAM tooling strategy Why you really need a SIAM tooling strategy
Why you really need a SIAM tooling strategy
Steve Morgan
 
SIAM and DevOps - Getting the Best of Both Worlds
SIAM and DevOps - Getting the Best of Both WorldsSIAM and DevOps - Getting the Best of Both Worlds
SIAM and DevOps - Getting the Best of Both Worlds
Scopism
 
Service North 2018 - ABB's SIAM journey
Service North 2018 - ABB's SIAM journeyService North 2018 - ABB's SIAM journey
Service North 2018 - ABB's SIAM journey
Scopism
 
Assembling the Jigsaw: Service Integration and Management in a Multisourced I...
Assembling the Jigsaw: Service Integration and Management in a Multisourced I...Assembling the Jigsaw: Service Integration and Management in a Multisourced I...
Assembling the Jigsaw: Service Integration and Management in a Multisourced I...
Information Services Group (ISG)
 
Siam for enterprize agility
Siam for enterprize agilitySiam for enterprize agility
Siam for enterprize agility
Francis Martens
 
11 Actions that will make your SIAM Programme successful
11 Actions that will make your SIAM Programme successful11 Actions that will make your SIAM Programme successful
11 Actions that will make your SIAM Programme successful
Steve Morgan
 
1 dave van herpen agile siam - regie op kwaliteit in de cloud
1 dave van herpen   agile siam - regie op kwaliteit in de cloud1 dave van herpen   agile siam - regie op kwaliteit in de cloud
1 dave van herpen agile siam - regie op kwaliteit in de cloud
NMITSymposium
 
Service Integration and Management
Service Integration and Management Service Integration and Management
Service Integration and Management
Desmond Devendran
 
The Multi Sourcing Challenge
The Multi Sourcing ChallengeThe Multi Sourcing Challenge
The Multi Sourcing Challenge
Capgemini
 
Creating Business Agility and Connectivity using Open Technologies
Creating Business Agility and Connectivity using Open TechnologiesCreating Business Agility and Connectivity using Open Technologies
Creating Business Agility and Connectivity using Open Technologies
Appnovation Technologies
 
SIAM Study - Comparing the Introduction of New IT Services via Simple and Com...
SIAM Study - Comparing the Introduction of New IT Services via Simple and Com...SIAM Study - Comparing the Introduction of New IT Services via Simple and Com...
SIAM Study - Comparing the Introduction of New IT Services via Simple and Com...
Ken Blunt
 
Service North 2018 - Successful SIAM bids
Service North 2018 - Successful SIAM bidsService North 2018 - Successful SIAM bids
Service North 2018 - Successful SIAM bids
Scopism
 
CMS IT Services new ppt _j15
CMS IT Services new ppt _j15CMS IT Services new ppt _j15
CMS IT Services new ppt _j15
CMS IT Training Institute
 
Service Integration and Management (SIAM)
Service Integration and Management (SIAM)Service Integration and Management (SIAM)
Service Integration and Management (SIAM)
NUS-ISS
 
ITIL SIAM - Service Integration and Management Model
ITIL  SIAM - Service Integration and Management ModelITIL  SIAM - Service Integration and Management Model
ITIL SIAM - Service Integration and Management Model
PeteFeehan
 
Making SIAM Work (for you)
Making SIAM Work (for you)Making SIAM Work (for you)
Making SIAM Work (for you)
Lockheed-Martin
 
SIAM Whitepaper
SIAM WhitepaperSIAM Whitepaper
SIAM Whitepaper
Software AG UK
 
Why Is ITIL So Successful
Why Is ITIL So SuccessfulWhy Is ITIL So Successful
Why Is ITIL So Successful
PriSkills Knowledge Solutions
 
Stuart Howitt: Honey, I Shrunk the Incident
Stuart Howitt: Honey, I Shrunk the IncidentStuart Howitt: Honey, I Shrunk the Incident
Stuart Howitt: Honey, I Shrunk the Incident
itSMF UK
 
How to build and operate an effective IT tooling strategy in a SIAM operating...
How to build and operate an effective IT tooling strategy in a SIAM operating...How to build and operate an effective IT tooling strategy in a SIAM operating...
How to build and operate an effective IT tooling strategy in a SIAM operating...
Steve Morgan
 

What's hot (20)

Why you really need a SIAM tooling strategy
Why you really need a SIAM tooling strategy Why you really need a SIAM tooling strategy
Why you really need a SIAM tooling strategy
 
SIAM and DevOps - Getting the Best of Both Worlds
SIAM and DevOps - Getting the Best of Both WorldsSIAM and DevOps - Getting the Best of Both Worlds
SIAM and DevOps - Getting the Best of Both Worlds
 
Service North 2018 - ABB's SIAM journey
Service North 2018 - ABB's SIAM journeyService North 2018 - ABB's SIAM journey
Service North 2018 - ABB's SIAM journey
 
Assembling the Jigsaw: Service Integration and Management in a Multisourced I...
Assembling the Jigsaw: Service Integration and Management in a Multisourced I...Assembling the Jigsaw: Service Integration and Management in a Multisourced I...
Assembling the Jigsaw: Service Integration and Management in a Multisourced I...
 
Siam for enterprize agility
Siam for enterprize agilitySiam for enterprize agility
Siam for enterprize agility
 
11 Actions that will make your SIAM Programme successful
11 Actions that will make your SIAM Programme successful11 Actions that will make your SIAM Programme successful
11 Actions that will make your SIAM Programme successful
 
1 dave van herpen agile siam - regie op kwaliteit in de cloud
1 dave van herpen   agile siam - regie op kwaliteit in de cloud1 dave van herpen   agile siam - regie op kwaliteit in de cloud
1 dave van herpen agile siam - regie op kwaliteit in de cloud
 
Service Integration and Management
Service Integration and Management Service Integration and Management
Service Integration and Management
 
The Multi Sourcing Challenge
The Multi Sourcing ChallengeThe Multi Sourcing Challenge
The Multi Sourcing Challenge
 
Creating Business Agility and Connectivity using Open Technologies
Creating Business Agility and Connectivity using Open TechnologiesCreating Business Agility and Connectivity using Open Technologies
Creating Business Agility and Connectivity using Open Technologies
 
SIAM Study - Comparing the Introduction of New IT Services via Simple and Com...
SIAM Study - Comparing the Introduction of New IT Services via Simple and Com...SIAM Study - Comparing the Introduction of New IT Services via Simple and Com...
SIAM Study - Comparing the Introduction of New IT Services via Simple and Com...
 
Service North 2018 - Successful SIAM bids
Service North 2018 - Successful SIAM bidsService North 2018 - Successful SIAM bids
Service North 2018 - Successful SIAM bids
 
CMS IT Services new ppt _j15
CMS IT Services new ppt _j15CMS IT Services new ppt _j15
CMS IT Services new ppt _j15
 
Service Integration and Management (SIAM)
Service Integration and Management (SIAM)Service Integration and Management (SIAM)
Service Integration and Management (SIAM)
 
ITIL SIAM - Service Integration and Management Model
ITIL  SIAM - Service Integration and Management ModelITIL  SIAM - Service Integration and Management Model
ITIL SIAM - Service Integration and Management Model
 
Making SIAM Work (for you)
Making SIAM Work (for you)Making SIAM Work (for you)
Making SIAM Work (for you)
 
SIAM Whitepaper
SIAM WhitepaperSIAM Whitepaper
SIAM Whitepaper
 
Why Is ITIL So Successful
Why Is ITIL So SuccessfulWhy Is ITIL So Successful
Why Is ITIL So Successful
 
Stuart Howitt: Honey, I Shrunk the Incident
Stuart Howitt: Honey, I Shrunk the IncidentStuart Howitt: Honey, I Shrunk the Incident
Stuart Howitt: Honey, I Shrunk the Incident
 
How to build and operate an effective IT tooling strategy in a SIAM operating...
How to build and operate an effective IT tooling strategy in a SIAM operating...How to build and operate an effective IT tooling strategy in a SIAM operating...
How to build and operate an effective IT tooling strategy in a SIAM operating...
 

Similar to Martin Huddleston: No Service Management, No Security

Msp deck v1.0
Msp deck v1.0Msp deck v1.0
Msp deck v1.0
AccelOps
 
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoftHow Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
OSIsoft, LLC
 
Cybersecurity Series SEIM Log Analysis
Cybersecurity Series  SEIM Log AnalysisCybersecurity Series  SEIM Log Analysis
Cybersecurity Series SEIM Log Analysis
Jim Kaplan CIA CFE
 
Cybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas CompanyCybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas Company
Eryk Budi Pratama
 
CompTIA powered Cybersecurity Apprenticeships
CompTIA powered Cybersecurity ApprenticeshipsCompTIA powered Cybersecurity Apprenticeships
CompTIA powered Cybersecurity Apprenticeships
Zeshan Sattar
 
THE ESSENTIAL ELEMENT OF YOUR SECURITY
THE ESSENTIAL  ELEMENT OF YOUR SECURITYTHE ESSENTIAL  ELEMENT OF YOUR SECURITY
THE ESSENTIAL ELEMENT OF YOUR SECURITY
ETDAofficialRegist
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec
 
ICS Cyber Security Effectiveness Measurement
ICS Cyber Security Effectiveness MeasurementICS Cyber Security Effectiveness Measurement
ICS Cyber Security Effectiveness Measurement
Aleksey Lukatskiy
 
Atelier Technique SYMANTEC ACSS 2018
Atelier Technique SYMANTEC ACSS 2018Atelier Technique SYMANTEC ACSS 2018
Atelier Technique SYMANTEC ACSS 2018
African Cyber Security Summit
 
UK Conference 2018_How to engage your IT security team and fund your SAM prog...
UK Conference 2018_How to engage your IT security team and fund your SAM prog...UK Conference 2018_How to engage your IT security team and fund your SAM prog...
UK Conference 2018_How to engage your IT security team and fund your SAM prog...
Martin Thompson
 
Proactive Risk Management and Compliance in a World of Digital Disruption
Proactive Risk Management and Compliance in a World of Digital DisruptionProactive Risk Management and Compliance in a World of Digital Disruption
Proactive Risk Management and Compliance in a World of Digital Disruption
Mike Wons
 
Aalto cyber-10.4.18
Aalto cyber-10.4.18Aalto cyber-10.4.18
Aalto cyber-10.4.18
japijapi
 
Comodo SOC service provider
Comodo SOC service providerComodo SOC service provider
Comodo SOC service provider
paulharry03
 
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Cristian Garcia G.
 
Ecosystems - Drive improvement from Holistic Insight
Ecosystems - Drive improvement from Holistic InsightEcosystems - Drive improvement from Holistic Insight
Ecosystems - Drive improvement from Holistic Insight
Cyrus Sorab
 
Why Network and Endpoint Security Isn’t Enough
Why Network and Endpoint Security Isn’t EnoughWhy Network and Endpoint Security Isn’t Enough
Why Network and Endpoint Security Isn’t Enough
Imperva
 
How to Choose the Right Security Information and Event Management (SIEM) Solu...
How to Choose the Right Security Information and Event Management (SIEM) Solu...How to Choose the Right Security Information and Event Management (SIEM) Solu...
How to Choose the Right Security Information and Event Management (SIEM) Solu...
IBM Security
 
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
IBM Security
 
Australia Conference 2018_How to engage your it security team and fund your s...
Australia Conference 2018_How to engage your it security team and fund your s...Australia Conference 2018_How to engage your it security team and fund your s...
Australia Conference 2018_How to engage your it security team and fund your s...
Martin Thompson
 
The Good, the Bad and the Ugly: A Different Perspective on Identity Governance
The Good, the Bad and the Ugly: A Different Perspective on Identity GovernanceThe Good, the Bad and the Ugly: A Different Perspective on Identity Governance
The Good, the Bad and the Ugly: A Different Perspective on Identity Governance
IBM Security
 

Similar to Martin Huddleston: No Service Management, No Security (20)

Msp deck v1.0
Msp deck v1.0Msp deck v1.0
Msp deck v1.0
 
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoftHow Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
 
Cybersecurity Series SEIM Log Analysis
Cybersecurity Series  SEIM Log AnalysisCybersecurity Series  SEIM Log Analysis
Cybersecurity Series SEIM Log Analysis
 
Cybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas CompanyCybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas Company
 
CompTIA powered Cybersecurity Apprenticeships
CompTIA powered Cybersecurity ApprenticeshipsCompTIA powered Cybersecurity Apprenticeships
CompTIA powered Cybersecurity Apprenticeships
 
THE ESSENTIAL ELEMENT OF YOUR SECURITY
THE ESSENTIAL  ELEMENT OF YOUR SECURITYTHE ESSENTIAL  ELEMENT OF YOUR SECURITY
THE ESSENTIAL ELEMENT OF YOUR SECURITY
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
 
ICS Cyber Security Effectiveness Measurement
ICS Cyber Security Effectiveness MeasurementICS Cyber Security Effectiveness Measurement
ICS Cyber Security Effectiveness Measurement
 
Atelier Technique SYMANTEC ACSS 2018
Atelier Technique SYMANTEC ACSS 2018Atelier Technique SYMANTEC ACSS 2018
Atelier Technique SYMANTEC ACSS 2018
 
UK Conference 2018_How to engage your IT security team and fund your SAM prog...
UK Conference 2018_How to engage your IT security team and fund your SAM prog...UK Conference 2018_How to engage your IT security team and fund your SAM prog...
UK Conference 2018_How to engage your IT security team and fund your SAM prog...
 
Proactive Risk Management and Compliance in a World of Digital Disruption
Proactive Risk Management and Compliance in a World of Digital DisruptionProactive Risk Management and Compliance in a World of Digital Disruption
Proactive Risk Management and Compliance in a World of Digital Disruption
 
Aalto cyber-10.4.18
Aalto cyber-10.4.18Aalto cyber-10.4.18
Aalto cyber-10.4.18
 
Comodo SOC service provider
Comodo SOC service providerComodo SOC service provider
Comodo SOC service provider
 
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
 
Ecosystems - Drive improvement from Holistic Insight
Ecosystems - Drive improvement from Holistic InsightEcosystems - Drive improvement from Holistic Insight
Ecosystems - Drive improvement from Holistic Insight
 
Why Network and Endpoint Security Isn’t Enough
Why Network and Endpoint Security Isn’t EnoughWhy Network and Endpoint Security Isn’t Enough
Why Network and Endpoint Security Isn’t Enough
 
How to Choose the Right Security Information and Event Management (SIEM) Solu...
How to Choose the Right Security Information and Event Management (SIEM) Solu...How to Choose the Right Security Information and Event Management (SIEM) Solu...
How to Choose the Right Security Information and Event Management (SIEM) Solu...
 
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
 
Australia Conference 2018_How to engage your it security team and fund your s...
Australia Conference 2018_How to engage your it security team and fund your s...Australia Conference 2018_How to engage your it security team and fund your s...
Australia Conference 2018_How to engage your it security team and fund your s...
 
The Good, the Bad and the Ugly: A Different Perspective on Identity Governance
The Good, the Bad and the Ugly: A Different Perspective on Identity GovernanceThe Good, the Bad and the Ugly: A Different Perspective on Identity Governance
The Good, the Bad and the Ugly: A Different Perspective on Identity Governance
 

More from itSMF UK

Gary Gamp: The 21st Century Service Manager
Gary Gamp: The 21st Century Service ManagerGary Gamp: The 21st Century Service Manager
Gary Gamp: The 21st Century Service Manager
itSMF UK
 
Rebecca Ulyatt: People Power – Crack the Code, One Conversation at a Time
Rebecca Ulyatt: People Power – Crack the Code, One Conversation at a TimeRebecca Ulyatt: People Power – Crack the Code, One Conversation at a Time
Rebecca Ulyatt: People Power – Crack the Code, One Conversation at a Time
itSMF UK
 
Chris Bryan: Continuous Service Improvement in a SIAM Environment
Chris Bryan: Continuous Service Improvement in a SIAM EnvironmentChris Bryan: Continuous Service Improvement in a SIAM Environment
Chris Bryan: Continuous Service Improvement in a SIAM Environment
itSMF UK
 
Peter Hubbard: Don't Get Stuck in a Silo – Going Digital isn't Transformation
Peter Hubbard: Don't Get Stuck in a Silo – Going Digital isn't TransformationPeter Hubbard: Don't Get Stuck in a Silo – Going Digital isn't Transformation
Peter Hubbard: Don't Get Stuck in a Silo – Going Digital isn't Transformation
itSMF UK
 
Simone Jo Moore: Machine Humanity
Simone Jo Moore: Machine HumanitySimone Jo Moore: Machine Humanity
Simone Jo Moore: Machine Humanity
itSMF UK
 
Hayley Butler and Spenser Arnold: Agile Service Management
Hayley Butler and Spenser Arnold: Agile Service ManagementHayley Butler and Spenser Arnold: Agile Service Management
Hayley Butler and Spenser Arnold: Agile Service Management
itSMF UK
 
Network Rail: Intelligent Infrastructure
Network Rail: Intelligent InfrastructureNetwork Rail: Intelligent Infrastructure
Network Rail: Intelligent Infrastructure
itSMF UK
 
Lynda Cooper: ISO/IEC 20000 - The Launch of the Revised Standard
Lynda Cooper: ISO/IEC 20000 - The Launch of the Revised StandardLynda Cooper: ISO/IEC 20000 - The Launch of the Revised Standard
Lynda Cooper: ISO/IEC 20000 - The Launch of the Revised Standard
itSMF UK
 
Andrew Vermes: Major Incident Management
Andrew Vermes: Major Incident ManagementAndrew Vermes: Major Incident Management
Andrew Vermes: Major Incident Management
itSMF UK
 
Dave Wheable: Can We Manage the Future
Dave Wheable: Can We Manage the FutureDave Wheable: Can We Manage the Future
Dave Wheable: Can We Manage the Future
itSMF UK
 
Akshay Anand: The Future is Built on ITIL – Get Ready for ITIL 4
Akshay Anand: The Future is Built on ITIL – Get Ready for ITIL 4Akshay Anand: The Future is Built on ITIL – Get Ready for ITIL 4
Akshay Anand: The Future is Built on ITIL – Get Ready for ITIL 4
itSMF UK
 
Sanjeev NC: 5 Game Techniques to Immediately Apply in Your Service Desk
Sanjeev NC: 5 Game Techniques to Immediately Apply in Your Service DeskSanjeev NC: 5 Game Techniques to Immediately Apply in Your Service Desk
Sanjeev NC: 5 Game Techniques to Immediately Apply in Your Service Desk
itSMF UK
 
Alice Doyne: Service Design Meets Service
Alice Doyne: Service Design Meets ServiceAlice Doyne: Service Design Meets Service
Alice Doyne: Service Design Meets Service
itSMF UK
 
Jon Terry: Respect for People Lean's Neglected Pillar
Jon Terry: Respect for People Lean's Neglected PillarJon Terry: Respect for People Lean's Neglected Pillar
Jon Terry: Respect for People Lean's Neglected Pillar
itSMF UK
 
Scarlett Bayes: Analyst 2.0
Scarlett Bayes: Analyst 2.0Scarlett Bayes: Analyst 2.0
Scarlett Bayes: Analyst 2.0
itSMF UK
 
Richard Oliver: Tested, Ready, and Able
Richard Oliver: Tested, Ready, and AbleRichard Oliver: Tested, Ready, and Able
Richard Oliver: Tested, Ready, and Able
itSMF UK
 
Alan Nance: The Battle for Relevance
Alan Nance: The Battle for RelevanceAlan Nance: The Battle for Relevance
Alan Nance: The Battle for Relevance
itSMF UK
 
David J Maskell: Digital Transformation Whilst the Wheels Are Still Turning, ...
David J Maskell: Digital Transformation Whilst the Wheels Are Still Turning, ...David J Maskell: Digital Transformation Whilst the Wheels Are Still Turning, ...
David J Maskell: Digital Transformation Whilst the Wheels Are Still Turning, ...
itSMF UK
 
Kaimar Karu: Beyond the Hype - the Real Promise of AI
Kaimar Karu: Beyond the Hype - the Real Promise of AIKaimar Karu: Beyond the Hype - the Real Promise of AI
Kaimar Karu: Beyond the Hype - the Real Promise of AI
itSMF UK
 
Roy Atkinson - Closing keynote
Roy Atkinson - Closing keynote Roy Atkinson - Closing keynote
Roy Atkinson - Closing keynote
itSMF UK
 

More from itSMF UK (20)

Gary Gamp: The 21st Century Service Manager
Gary Gamp: The 21st Century Service ManagerGary Gamp: The 21st Century Service Manager
Gary Gamp: The 21st Century Service Manager
 
Rebecca Ulyatt: People Power – Crack the Code, One Conversation at a Time
Rebecca Ulyatt: People Power – Crack the Code, One Conversation at a TimeRebecca Ulyatt: People Power – Crack the Code, One Conversation at a Time
Rebecca Ulyatt: People Power – Crack the Code, One Conversation at a Time
 
Chris Bryan: Continuous Service Improvement in a SIAM Environment
Chris Bryan: Continuous Service Improvement in a SIAM EnvironmentChris Bryan: Continuous Service Improvement in a SIAM Environment
Chris Bryan: Continuous Service Improvement in a SIAM Environment
 
Peter Hubbard: Don't Get Stuck in a Silo – Going Digital isn't Transformation
Peter Hubbard: Don't Get Stuck in a Silo – Going Digital isn't TransformationPeter Hubbard: Don't Get Stuck in a Silo – Going Digital isn't Transformation
Peter Hubbard: Don't Get Stuck in a Silo – Going Digital isn't Transformation
 
Simone Jo Moore: Machine Humanity
Simone Jo Moore: Machine HumanitySimone Jo Moore: Machine Humanity
Simone Jo Moore: Machine Humanity
 
Hayley Butler and Spenser Arnold: Agile Service Management
Hayley Butler and Spenser Arnold: Agile Service ManagementHayley Butler and Spenser Arnold: Agile Service Management
Hayley Butler and Spenser Arnold: Agile Service Management
 
Network Rail: Intelligent Infrastructure
Network Rail: Intelligent InfrastructureNetwork Rail: Intelligent Infrastructure
Network Rail: Intelligent Infrastructure
 
Lynda Cooper: ISO/IEC 20000 - The Launch of the Revised Standard
Lynda Cooper: ISO/IEC 20000 - The Launch of the Revised StandardLynda Cooper: ISO/IEC 20000 - The Launch of the Revised Standard
Lynda Cooper: ISO/IEC 20000 - The Launch of the Revised Standard
 
Andrew Vermes: Major Incident Management
Andrew Vermes: Major Incident ManagementAndrew Vermes: Major Incident Management
Andrew Vermes: Major Incident Management
 
Dave Wheable: Can We Manage the Future
Dave Wheable: Can We Manage the FutureDave Wheable: Can We Manage the Future
Dave Wheable: Can We Manage the Future
 
Akshay Anand: The Future is Built on ITIL – Get Ready for ITIL 4
Akshay Anand: The Future is Built on ITIL – Get Ready for ITIL 4Akshay Anand: The Future is Built on ITIL – Get Ready for ITIL 4
Akshay Anand: The Future is Built on ITIL – Get Ready for ITIL 4
 
Sanjeev NC: 5 Game Techniques to Immediately Apply in Your Service Desk
Sanjeev NC: 5 Game Techniques to Immediately Apply in Your Service DeskSanjeev NC: 5 Game Techniques to Immediately Apply in Your Service Desk
Sanjeev NC: 5 Game Techniques to Immediately Apply in Your Service Desk
 
Alice Doyne: Service Design Meets Service
Alice Doyne: Service Design Meets ServiceAlice Doyne: Service Design Meets Service
Alice Doyne: Service Design Meets Service
 
Jon Terry: Respect for People Lean's Neglected Pillar
Jon Terry: Respect for People Lean's Neglected PillarJon Terry: Respect for People Lean's Neglected Pillar
Jon Terry: Respect for People Lean's Neglected Pillar
 
Scarlett Bayes: Analyst 2.0
Scarlett Bayes: Analyst 2.0Scarlett Bayes: Analyst 2.0
Scarlett Bayes: Analyst 2.0
 
Richard Oliver: Tested, Ready, and Able
Richard Oliver: Tested, Ready, and AbleRichard Oliver: Tested, Ready, and Able
Richard Oliver: Tested, Ready, and Able
 
Alan Nance: The Battle for Relevance
Alan Nance: The Battle for RelevanceAlan Nance: The Battle for Relevance
Alan Nance: The Battle for Relevance
 
David J Maskell: Digital Transformation Whilst the Wheels Are Still Turning, ...
David J Maskell: Digital Transformation Whilst the Wheels Are Still Turning, ...David J Maskell: Digital Transformation Whilst the Wheels Are Still Turning, ...
David J Maskell: Digital Transformation Whilst the Wheels Are Still Turning, ...
 
Kaimar Karu: Beyond the Hype - the Real Promise of AI
Kaimar Karu: Beyond the Hype - the Real Promise of AIKaimar Karu: Beyond the Hype - the Real Promise of AI
Kaimar Karu: Beyond the Hype - the Real Promise of AI
 
Roy Atkinson - Closing keynote
Roy Atkinson - Closing keynote Roy Atkinson - Closing keynote
Roy Atkinson - Closing keynote
 

Recently uploaded

Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
ScyllaDB
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
c5vrf27qcz
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
saastr
 
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Pitangent Analytics & Technology Solutions Pvt. Ltd
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
Pablo Gómez Abajo
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Precisely
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
Miro Wengner
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
Neo4j
 
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
Edge AI and Vision Alliance
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
Alex Pruden
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 

Recently uploaded (20)

Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
 
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
 
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 

Martin Huddleston: No Service Management, No Security

  • 1. 1 apmg-international.com © Copyright APMG Group 2018, All Rights Reserved apmg-international.com CYBER SECURITY No Service Management, No Cyber Security 20th November 2018 Martin Huddleston, Head of Cyber CDCAT® is the registered trade mark of The Secretary of State for Defence, Dstl
  • 2. 2 apmg-international.com © Copyright APMG Group 2018, All Rights Reserved What we will cover • The Service Management Risk Balance • The Threat • What Good Cyber Security Looks Like • Analytics – Cyber Security through the Service Management Lens • Real world Case Studies of High Frequency Use Process in Threat Prevention • A Tangled Web • What it means to be ‘Effective’, meeting appetite to take risk • Digital Services Growth – Service Management Futures • Takeaways
  • 3. 3 apmg-international.com © Copyright APMG Group 2018, All Rights Reserved Service Management Reminder – Risk Balance This Photo by Unknown Author is licensed under CC BY-ND •Resources •Quality / Performance (including cyber security) •Stakeholder interests
  • 4. 4 apmg-international.com © Copyright APMG Group 2018, All Rights Reserved Threat Actor Motivations, Means and Agility Financial Fraud / Extortion Resource Acquisition Competitive IPTheft Reputational Damage Blackmail State SponsoredAttacks Social engineered attacks on the person / groups Speed and agility in opportunities of the moment Supply chain, 3rd party code and API security Resource acquisition and parasitic processes
  • 5. 5 apmg-international.com © Copyright APMG Group 2018, All Rights Reserved Modern Day Dog-Fight – Attacker Lifecycle Elements • Privilege Escalation • Opportunity Identification • Attacker DevSecOps • Reconnaissance • Initial Access • Execution • Persistence • Defence Evasion • Credential Access • Discovery • Lateral Movement • Collection • Exfiltration • Command and Control • Attack Assurance This Photo by Unknown Author is licensed under CC BY-NC-ND
  • 6. 6 apmg-international.com © Copyright APMG Group 2018, All Rights Reserved • Service Management Integrated Standard(s) & Frameworks • Proportionate Performance to Impacts, Agile to Context and Appetite to Take Risk • Per Asset and per Threat Performance • Cyber Value and Effectiveness Measurable So What Does Good Cyber Security Look Like?
  • 7. 7 apmg-international.com © Copyright APMG Group 2018, All Rights Reserved Good Cyber Security – 2009 ‘Confiker’ Impact • UK MoD needed means to assess systems cyber defence preparedness • MoDChief ScientificAdvisor asked Dstl to establish “What good looks like” • Dstl could not find a suitable commercial product • MOD / Dstl developed know - how to enable it to:-  Systematically collect evidence  Make evidence based investment decisions  Do this at pace and scale CDCAT® is the registered trademark of The Secretary of State for Defence. © Crown copyright, 2015; Crown Database Rights, 2015
  • 8. 8 apmg-international.com © Copyright APMG Group 2018, All Rights Reserved • Operational Resilience • 2 Lifecycles in Risk Balance  Cyber Defence  Service Management • Multi-standard Support  159 Capabilities, NATO*/MOD Derived  Protect / Defend / Operate satisfaction of ALL included standards Integrated Control System for Cyber Security
  • 9. 9 apmg-international.com © Copyright APMG Group 2018, All Rights Reserved Modern Day Dog-Fight – Defender Lifecycles / Phases * Compared to US NIST Cyber Security Framework – Identify, Protect, Detect, Respond Recover “Security is not merely a ‘state’ but a process that consists of 3 fundamental components: Protection, Detection and Reaction” -Bob Ayes, US DoD, 1998 • Strategy • Design • Transition  Incl. DevSecOps • Operation • Continual Improvement • Assess* • Deter • Protect • Detect • Respond • Recover This Photo by Unknown Author is licensed under CC BY-NC-ND
  • 10. 10 apmg-international.com © Copyright APMG Group 2018, All Rights Reserved So What of Service Management? Analytics – Cyber Security through the Service Management Lens A Capability Based Assessment
  • 11. 11 apmg-international.com © Copyright APMG Group 2018, All Rights Reserved 10 Steps to Cyber Security – Capability Count 0 5 10 15 20 25 30 35 1 11 21 31 41 51 61 71 81 91 101 CapabilityRe-useCount Capability Order (by a rank) 10 Steps to Cyber Security 0 5 10 15 20 25 30 35 1 11 21 31 41 51 61 71 81 91 101 CapabilityRe-useCount Capability Order (by frequency rank) 10 Steps – Excl. ITIL®V3 Top Four Gaps: 1) Incident Management 2) Risk Management 3) Supplier Management 4) Service Asset & Configuration Management Top Four: 1) Define Security Configuration Baselines 2) Establish Policies to Secure Target System 3) Establish Policies to Secure Information 4) Identify Minimum System Security Requirements
  • 12. 12 apmg-international.com © Copyright APMG Group 2018, All Rights Reserved US NIST Cyber Security Framework – Capability Count 0 10 20 30 40 50 60 70 1 11 21 31 41 51 61 71 81 91 101 111 121 131 CapabilityRe-useCount Capability Order (by frequency rank) NIST CSF V1.1 0 10 20 30 40 50 60 70 1 11 21 31 41 51 61 71 81 91 101 111 121 131 CapabilityRe-useCount Capability Order (by frequency rank) NIST CSF V1.1 excl. ITIL V3 Top Four: 1) Information Security 2) Health Checks / Audits 3) Secure Data and Network Management 4) Accounting and Audit Controls Top Four Gaps: 1) Information Security 2) Incident Management 3) Supplier Management 4) Risk Management
  • 13. 13 apmg-international.com © Copyright APMG Group 2018, All Rights Reserved Poll of Top Service Management Capabilities - Impact MageCart Indidents Ticketmaster, British Airways et al. Supplier Management Top ITIL® Capabilities Service Asset & Configuration Management Incident Management Risk Management
  • 14. 14 apmg-international.com © Copyright APMG Group 2018, All Rights Reserved Facebook Incident “This attack exploited the complex interaction of multiple issues in our code. It stemmed from a change we made to our video uploading feature in July 2017…hackers were using the site's API to automate the process of grabbing users' profile information” Supplier Management Top ITIL® Capabilities Service Asset & Configuration Management Incident Management Risk Management Poll of Top Service Management Capabilities - Impact
  • 15. 15 apmg-international.com © Copyright APMG Group 2018, All Rights Reserved Supplier Management Top ITIL® Capabilities Service Asset & Configuration Management Incident Management Risk Management SamSam Incidents – Healthcare Sector “Modus operandi is to gain access to an organization’s network, spend time performing reconnaissance by mapping out the network, before encrypting as many computers as possible and presenting the organization with a single ransom demand” Poll of Top Service Management Capabilities - Impact
  • 16. 16 apmg-international.com © Copyright APMG Group 2018, All Rights Reserved Service Management in Complex System Risk – “A Tangled Web” • Change language to Cyber Defence, not passive cyber security, but proactive defence. • Increasing dependencies is a growing risk  With every new cyber security standards, we are seeing greater complexity • A future is with us now  AI’s essential impact on service management, the complexity & scale issue • But not all good. A new class of problems and a new Service Management:  Prevent: keeping down the AI weeds from choking the internet and digital services  Detect: for cyber ‘bad’ actors from weaponizing the AI weeds  Recover/Respond: cleaning up the AI weeds.
  • 17. 17 apmg-international.com © Copyright APMG Group 2018, All Rights Reserved Continual Improvement - Operational Risk Measurement e.g. Supply / Service Chain Security Effectiveness  These assets are individual systems / services that have had cyber defence assessment and effectiveness measurement calibrated to real- world performance data  These allow you to decide a risk appetite and actions to accept, treat, transfer or avoid the risk as a portfolio Overall Effectiveness with Maturity Levels
  • 18. 18 apmg-international.com © Copyright APMG Group 2018, All Rights Reserved Control System Trends in Digital Services Growth Leading to a changing face for Operational Resilience and Management of Harm Process Quality Only Compliance Driven Passive BC & DR Response & Recovery Driven Reactive Intelligence, Analytics & Agility Driven Proactive Self Healing, re- Provisioning, After-care AutonomicAdhoc
  • 19. 19 apmg-international.com © Copyright APMG Group 2018, All Rights Reserved Takeaways 1. Service Managers can “step up” to secure networks, effective security is a ‘team’ sport - consider your high frequency processes first 2. The need for more operational testing, SIAM*, DevSecOps and of complex systems is inevitable - consider your ‘Release and Deployment’ processes 3. Baseline your current maturity effectiveness to empower your business conversations in valuing cyber risk - quantify it with the business exposure *SIAM – Service Integration and Management
  • 20. 20 apmg-international.com © Copyright APMG Group 2018, All Rights Reserved Questions
  • 21. 21 apmg-international.com © Copyright APMG Group 2018, All Rights Reserved +44 (0) 1494 452450 servicedesk@apmgroupltd.com linkedin.com/company/apm-group apmg-international.com @Cyber_APMG @APMG_Inter facebook.com/APMGinternationalLTD Keeping in touch © APMG International Ltd. 2018. All rights reserved.

Editor's Notes

  1. No service management No cyber security   Cyber Security is no different from any other management activity, the theory is straight forward and well known, execution is very difficult. Research carried out by a joint UK/US team identified that one key element of high quality Cyber security is world class service management as the majority of controls used to secure a system lie within the Service management realm. Martin will outline the background to the research and share the results that identify how service management controls fit within a Cyber security life cycle. Building on this work Martin will show how we need to think more about effectiveness and continuous improvement rather than compliance to give us the best chance of staying ahead of the attackers. Plan Assume people know what service management is (3 legged stool), what is cyber security re operational resilience maturity to agile defence agile operations resource prioritisation agility, raising process and performance maturity to be able to be agile to be able to perform. What makes cyber security execution difficult? [Threat agility, attack right once, defence right every time] [ Failure of protection, resort to Resilience/recovery][Evolution of systems / defences] NATO / MOD background, maturity models for agility. What is high quality Cyber Security and what role is Service Management playing – heat map/statistics/re-use. Demonstrate how service management controls fit in the CyberSecurity Lifecycle. [iData CPNI/NCSC kill chain, ATT&CK steps/lifecycle, A/D/P/D/R/R] Effectiveness & continual improvement (noting ISO20000-1:2018 has dropped CSI), agility to stay ahead of attackers, DevSecOps [re recent UK/US/Canada Airforce investments in agile process] [ coding securely at pace] [issue for GitHub and ReadHat’s new owners re opensource]
  2. Service Management Reminder Threats, Threat Agility What does good look like in Cyber Security
  3. Financial Fraud/Extortion, Resource Acquisition, Competitive IP Theft, Reputational Damage, Black-mail, State Sponsored Attacks… NCSC: Sept Threat brief on Supply Chain . NCSC is developing its approach to this issue and stated in October 2018 that the risk in the supply chain is:- • An increase in pace and number of cyber security incidents • No increase in severity • Vulnerabilities are old and can be patched • Attacks do not require use of high-end skills • Supply chain at risk, with suppliers being the first source of the compromise. NCSC’s approach also recommends:- • Promoting cloud-based hosting technology for the vast majority of users • To change the focus from sites to systems • Exploring models for examining and recording cyber security of common suppliers • Promoting NIS across all CNI sectors (not just ones regulated by NIS) and major businesses to improve security in the supply chain • Piloting a new Active Cyber Defence “Supplier Check” inspection of external web site as proxy for internal cyber posture. Current ‘Live’ Means Used by Attackers Social engineered attacks on the person e.g. Phishing, Vishing, Whaling, etc Speed and agility e.g. opportunistic ransomware, machine to machine network exploitation – SAMSAM, WannaCry, etc Supply chain and sources of code and API security e.g. Ccleaner, MageCart (TicketMaster, BA et al), FaceBook, etc Resource acquisition in parasitic processes e.g. DDOS bots, crypto mining, scam hosting https://duo.com/decipher/magecart-group-refines-attacks-nabs-more-sites Much of Magecart’s previous attacks focused on compromising third-party providers. The group would inject its malicious code into libraries and scripts provided by third-party providers, thus ensuring that any website using that provider’s code would be executing the attack code. For example, Magecart has targeted websites running outdated and unpatched versions of Magento, an open-source ecommerce platform written in PHP. Recent figures suggest that over 7,300 stores have been affected by the MagentoCore card skimming code.
  4. Unseen, performing, cost effective – sounds like service management …Compliance is not Enough, How High the Bar, What Performance and what Effectiveness, What Agility, changing the Bar Anticipating the Threats / Vulnerabilities, Continual Optimisation, ATT&CK / Intel, Automation Commoditisation Cloud Utility Security Just a characteristic of Digital Service, a feature of service & service management. Like any athlete the organisation needs to perform, every time, which is hard, sustaining performance is all about service management, including delivering agile services, where the service is cyber security. What it is not is conformance to ISO/IEC 27001 or ISO/IEC 20000-1 or any ‘compliance’ standard It is much more than process in sense of process quality improvement Sustaining outcomes, Sustaining and Adapting, Optimising to the dynamic, more than People, Process, Technology – sustaining is about TEPIMOIL / Leadership … don’t conflate ‘Governance’ with ‘Performance’ – operational agility is hard, but service management has always sought to deliver 3 legged stool of balancing stakeholders, resources and performance/quality/output – we know there are never enough resources, not just for security, resources and prioritisation are the order of the day Performance vs compliance, visualise the High Jump, but how high the bar?
  5. Back ground ‘Time Based Security’ book by Wynn Schwartau on, Bob Ayers Director at DoD Information Systems Security Programme and team at US DOD DISA, Circa 1997: Protection > Detection + Reaction. ‘Risk Avoidance’ cultures are doomed to failure. Security risk cannot be designed out.
  6. 5 basic cyber controls that everyone should adhere to Boundary firewalls and internet gateways Secure configuration Access control Malware protection Patch management Top 5 Capabilities by Frequency: Define Security Configuration Baselines Establish Policies to Secure Target System Establish Policies to Secure Information Identify Minimum System Security Requirements Secure Data and Network Management Top 6 Capabilities used for ITIL V3 Delivery Incident Management Risk Management Supplier Management Service Asset & Configuration Management Cyber Policy Event Management
  7. Top 5 Capabilities by frequency: Information Security Health Checks / Audits Secure Data and Network Management Accounting and Audit Controls Incident Management Top 6 ITIL V3 Capabilities excluded: Information Security Incident Management Supplier Management Risk Management Service Continuity Plan Metrics / Improvement Opportunity Identification
  8. https://duo.com/decipher/magecart-group-refines-attacks-nabs-more-sites https://www.zdnet.com/article/british-airways-cyberattack-data-theft-bigger-than-we-first-thought/ 10 Steps: Incident Management Risk Management Supplier Management Service Asset & Configuration Management Cyber Policy Event Management ASD: Service Asset & Configuration Management 2 Change Management Event Management Incident Management 2 Release and Deployment Management Risk Management 2 NIST: Information Security Incident Management 3 Supplier Management 2 Risk Management 3 Service Continuity Plan Metrics / Improvement Opportunity Identification Aggregate: Cyber Policy 2 Information Security 2 Cyber Strategy Metrics / Improvement Opportunity Identification Risk Management 4 Access Management
  9. Change language to Cyber Defence, not passive cyber security, but proactive defence. Increasing in dependencies is a growing risk With every new cyber security standards, we are seeing greater complexity/dependencies Statistics on complexity, re grown in number of mappings per capability, would be a string indicator of the fundamental need for automation in capability interactions. Could conclude from this why SM and SIAT in particular, remains and will grow in importance. A future with us now in a tangled Web AI’s growing and essential impact on service management, the complexity & scale issue But Not all good, new class of problems Prevent: keeping down the AI weeds from choking the internet and digital services Detect: preventing cyber ‘bad’ actors from weaponizing the AI weeds Recover/Respond: cleaning up the AI weeds. https://www.weforum.org/reports/the-global-risks-report-2018 A Tangled Web Artificial intelligence “weeds” proliferate, choking off the performance of the internet What if the adverse impact of artificial intelligence (AI) involves not a super-intelligence that takes control from humans but “AI weeds”—low-level algorithms that slowly choke off the internet? Algorithms are already proliferating. As they increase in sophistication—as we become more reliant on code that writes code, for example—explosive growth becomes more likely. A divergence could open between the code we have created and our capacity to track and control it. The tragedy of the commons means we often let chronic problems with dispersed responsibilities fester. Think of plastic in the ocean. A trend towards reduced internet efficiency would undermine service delivery in countless businesses. It could hobble the Internet of Things. It would frustrate users. If the problem became significant enough, it could prompt some governments to wall off parts of the internet. If malicious actors found ways to proliferate or weaponize the AI weeds, they could do extensive damage. As the global demands placed on the internet increase in scale and sophistication, digital hygiene is likely to become a more pressing concern for end-users. The development of overarching norms, regulations and governance structures for AI will be crucial: without a robust and enforceable regulatory framework, there is a risk that humans will in effect be crowded out from the internet by the proliferation of AI. Service Management or Cyber Security, or does it matter, just Secure Digital SM?
  10. Aggregate analysis to assess whether appetite to take risk is being applied uniformly and if systems are connected whether risk is being appropriately managed, e.g. is system M connected to system N, in which case system effectiveness might be that of M not N. This diagram currently not routinely produced by CDCAT but by subsequent consultancy. Discuss continual maturity improvement, road to effectiveness is about sustaining high performance to agile attackers to make it hard for them so they try elsewhere. Capability improvement is about knowing where to invest to get the most bang for buck, take for example the 4 ITIL processes identified. In a world of cloud services, extended API’s down an opaque supply or service chain, where attackers can live off the land of the slightest configuration mismatch exploiting emergent behaviour, then to know the capability maturity and quantify the effectiveness calibrated to an absolute scale is to instil trust and or decide what risk measures are needed from the business perspective. E.g. to take out appropriate cyber insurance but understand insurers rightly place obligations on you to be mature in your resilience operation, a partnership in financial mitigations.
  11. Reasons to be proactive: Money Reputation Livelihood Safety Survival Explain resilience and stress induced by Cyber, conflict of maturity levels, agile tends to Level 2 ‘Developing’ whilst Cyber Security tends to Level 4 ‘Manage outcomes by metrics’. Future business architectures ‘build this in’ by design but at a cost compensated for by future benefits, i.e. the opportunity. Security and proactive resilience isn’t free. Business evolutions and resilience is evolving to change what is ‘normal’ in business design. Aim is now to provide a framework and risk analysis system that supports the agility needed Discuss the status of regulators approach to harm and expectations on managing risk in financial service. Discuss state of the art in autonomics, e.g. telecoms 5G and zero-touch provisioning, role of service management in carrier grade services delivery including security effectiveness to better than 5x9’s availability. Right almost every time – the means to digitally secure systems in the face of human fallibility and inevitable mis-configurations of complex services. Influence of 5G autonomic technologies, e.g. zero touch provisioning. Forensics: premera-blue breach data destruction https://www.zdnet.com/article/premera-blue-cross-accused-of-destroying-evidence-in-data-breach-lawsuit/ see also SANS NewsBites Vol. 20 Num. 070 : California Establishes Election Cybersecurity Office; Five Eyes Want to Access Encrypted Communications; California Approves Net Neutrality Bill for the commentary. [CDCAT Q2: CDCAT Application: Capabilities folder]. Need in recovery operations to forensically archive data/equipment to ensure legal duties of care. Automation, cenx/ericsson closed loop control and 5G cdcat lvl 3,4,5 automated control identification, predicting where it will be needed next re mapping is a process of process design to achieve cyber defence but using IA, CNO and SM. https://www.fiercetelecom.com/telecom/ericsson-boosts-closed-loop-automation-capabilities-deal-to-buy-cenx cdcat lvl 3,4,5 automated control identification. this is an example where that automation is bubbling up
  12. Service Managers can and need to “step up” to secure networks, Good cyber security is dependent on good service management, Effective security is a “team sport”, automate for repeatable outcomes, get to grips with configuration risk. Most breaches are due to insider issues [in fact historical human error and misconfiguration, ref VDBIR] – need for more testing, DevSecOps. Compliance alone means accepting successful attacks Baseline your current maturity effectiveness and empower you business conversations in the value of cyber risk – quantify it using real world calibration. Maturity of implementation is the only way to effective security.