Cyber security is no different from any other management activity, the theory is straight forward and well known, but the execution is very difficult. Interestingly, recent research carried out by a UK/ NATO industry team identified that one key element of high quality cyber security is world class service management as the majority of controls used to secure a system lie within the service management realm.
So how do you effectively encompass cyber security into service management? In this presentation Martin outlines the background to the research and shares the results that identify how service management controls fit within a cyber security life cycle. Then, building on this work, Martin showcases how we need to think more about effectiveness and continuous improvement rather than compliance to give us the best chance of staying ahead of the attackers.
David D'Agostino and Tony Price: Kicking the KPI HabititSMF UK
Traditional KPIs are no longer relevant as they focus too much on internal IT metrics rather than customer experience. Experience level agreements (ELAs) are needed to measure service quality from the customer perspective across the entire service lifecycle. Existing intelligence focuses too much on internal operations like incidents and problems rather than how customers actually use services. A holistic approach is required that considers the full customer experience from initial demand through delivery and value realization.
FitSM is a lightweight IT service management standard designed to be approachable, achievable, and compatible with other frameworks like ITIL and ISO/IEC 20000. The FitSM standard consists of 4 core documents that are 85 pages total and only 9 pages of requirements, making it much shorter than ITIL or ISO/IEC 20000. FitSM focuses on familiar processes like service level management, problem management, and change management. Certification is also quicker, more affordable, and uses free materials compared to other standards.
Johann Diaz: The New Management of Service – Joining Up the EnterpriseitSMF UK
Take a look at this presentation to discover how enterprises can now focus from the top down, on delivery outstanding customer services, whilst simultaneously cutting costs and improving compliance.
Nicola Reeves and John McDermott: Value Creation in a Hybrid WorlditSMF UK
In this presentation HPE demonstrates that service management remains an essential ingredient in delivering services and supporting your models, including, but not limited to, practices such as ITIL, DevOps, Security, Cloud, and SIAM.
In this slide deck, Kevin Holland introduces SIAM (Service Integration and Management), covering its key features and benefits, and how it complements ITIL.
At the 2013 ISG Sourcing Industry Conference in the Americas, Dave Tienstra and Lois Coatney of ISG spoke on service integration, it's evolution and solutions for tomorrow.
Clare McAleese: Verism at Vocalink Mastercard... Our Journey so FaritSMF UK
Vocalink Mastercard has been running a proof of concept on VeriSM, with a view to introducing the approach into the wider organisation, and in this session they will be sharing their journey with the audience. Looking at governance (how they carried our gap analysis against the introduction of the new "product"); service management principles (how they reviewed VeriSM to ensure alignment with existing best practices), management proactices (how they formally introduced agile and DevOps into the business), and more. The presentation aims to assist other organisations with their own implementations, by showing how Vocalink Mastercard has taken the theory from the book and put it into practice in the real-world.
Take a look at this presentation to discover how to introduce VeriSM into your own organisation and keep it gathering momentum, how to get approval from senior management and executives to proceed with any given rollout, what training and qualifications you will require (if any), and how to agree your objectives for the successful adoption of VeriSM.
This document introduces managed IT infrastructure services. It discusses threats to infrastructure like data corruption, component failure, and human error. It then outlines the benefits of managed services, including higher availability, efficient outsourcing, 24/7 monitoring, and leveraging best practices. Key aspects of the managed services solution are proactive monitoring, knowledge sharing, and certified staff.
David D'Agostino and Tony Price: Kicking the KPI HabititSMF UK
Traditional KPIs are no longer relevant as they focus too much on internal IT metrics rather than customer experience. Experience level agreements (ELAs) are needed to measure service quality from the customer perspective across the entire service lifecycle. Existing intelligence focuses too much on internal operations like incidents and problems rather than how customers actually use services. A holistic approach is required that considers the full customer experience from initial demand through delivery and value realization.
FitSM is a lightweight IT service management standard designed to be approachable, achievable, and compatible with other frameworks like ITIL and ISO/IEC 20000. The FitSM standard consists of 4 core documents that are 85 pages total and only 9 pages of requirements, making it much shorter than ITIL or ISO/IEC 20000. FitSM focuses on familiar processes like service level management, problem management, and change management. Certification is also quicker, more affordable, and uses free materials compared to other standards.
Johann Diaz: The New Management of Service – Joining Up the EnterpriseitSMF UK
Take a look at this presentation to discover how enterprises can now focus from the top down, on delivery outstanding customer services, whilst simultaneously cutting costs and improving compliance.
Nicola Reeves and John McDermott: Value Creation in a Hybrid WorlditSMF UK
In this presentation HPE demonstrates that service management remains an essential ingredient in delivering services and supporting your models, including, but not limited to, practices such as ITIL, DevOps, Security, Cloud, and SIAM.
In this slide deck, Kevin Holland introduces SIAM (Service Integration and Management), covering its key features and benefits, and how it complements ITIL.
At the 2013 ISG Sourcing Industry Conference in the Americas, Dave Tienstra and Lois Coatney of ISG spoke on service integration, it's evolution and solutions for tomorrow.
Clare McAleese: Verism at Vocalink Mastercard... Our Journey so FaritSMF UK
Vocalink Mastercard has been running a proof of concept on VeriSM, with a view to introducing the approach into the wider organisation, and in this session they will be sharing their journey with the audience. Looking at governance (how they carried our gap analysis against the introduction of the new "product"); service management principles (how they reviewed VeriSM to ensure alignment with existing best practices), management proactices (how they formally introduced agile and DevOps into the business), and more. The presentation aims to assist other organisations with their own implementations, by showing how Vocalink Mastercard has taken the theory from the book and put it into practice in the real-world.
Take a look at this presentation to discover how to introduce VeriSM into your own organisation and keep it gathering momentum, how to get approval from senior management and executives to proceed with any given rollout, what training and qualifications you will require (if any), and how to agree your objectives for the successful adoption of VeriSM.
This document introduces managed IT infrastructure services. It discusses threats to infrastructure like data corruption, component failure, and human error. It then outlines the benefits of managed services, including higher availability, efficient outsourcing, 24/7 monitoring, and leveraging best practices. Key aspects of the managed services solution are proactive monitoring, knowledge sharing, and certified staff.
Why you really need a SIAM tooling strategy Steve Morgan
Service Integration & Management (SIAM) is the term applied to IT Operating Models which cater for a multi-vendor strategy. If you are adopting a SIAM approach, this presentation will help you develop your underpinning tooling strategy
This document discusses service integration and management (SIAM) in multisourced IT operating models. SIAM ensures that technology services from multiple internal and external teams are delivered seamlessly. It specifies service management processes across the enterprise to maximize performance of end-to-end IT services cost-effectively. SIAM acts as the central point of control between demand and supply, coordinating roles and processes to avoid issues falling through the cracks. Without effective SIAM, the benefits of multisourcing can be rapidly undone due to a lack of integration and governance.
SIAM stands for Service Integration and Management. It is a sourcing strategy that coordinates people, processes, tools, data and governance across multiple IT suppliers to deliver value to customers. The document discusses why organizations implement SIAM, provides examples of real-world SIAM implementations, and outlines challenges and the future of SIAM. It also describes how SIAM can support digital transformation and enable enterprise agility through fundamental business changes.
11 Actions that will make your SIAM Programme successfulSteve Morgan
Service Integration & Management (SIAM) is a term given to IT Operating Models which cater for multi-vendor strategies. This presentation describes the 11 Actions that you must adopt to make your SIAM programme a success
1 dave van herpen agile siam - regie op kwaliteit in de cloudNMITSymposium
This document discusses Agile Service Integration and Management (SIAM). It describes SIAM as a framework for managing multiple IT service providers in a consistent and efficient way to meet user needs. The document outlines four dimensions of enterprise agility - portfolio strategy alignment, dealing with size and complexity, collaboration throughout the lifecycle, and integrating external parties. It then discusses drivers for SIAM including delivery speed, cost reduction, and focus on innovation. Finally, it proposes an Agile approach to implementing SIAM through sprints focused on establishing agreements, processes, and behaviors and continually improving through experimentation.
Service integration and management (SIAM) is a management methodology that can be applied in an environment that includes services sourced from a number of service providers.
The document discusses the challenges CIOs face with multi-sourcing IT services and the importance of service integration and management (SIAM). It notes that Horizons 2012 identified multi-sourcing and SIAM as leading CIO issues. CIOs are looking to improve internal IT capabilities and better control outsourced services. Additionally, business requirements are evolving with front office systems requiring speed and agility while back office prioritize efficiency and stability. The document advocates that CIOs develop service integration layers and partner with providers to help transform IT delivery for multi-sourcing over the next 2-3 years.
The document discusses implementing a two-pronged approach to connecting applications and data sources across an enterprise using a middleware platform and APIs. The approach aims to provide loose coupling between systems for flexibility and plug-and-play connectivity through self-service APIs to enable faster delivery. A canonical data model is proposed to allow decoupling from different data formats and an enterprise API portal is suggested to expose data and functionality through a centralized access point for various consumer applications.
SIAM Study - Comparing the Introduction of New IT Services via Simple and Com...Ken Blunt
A Study to Compare the Introduction of typical New IT Services within a Single Tower and Multi-Tower SIAM Model using a mature set of ‘Plan-Build-Run’ project tasks
Conlcusion
The conclusions of this study for the introduction of New IT Services via Simple and Complex SIAM Models are:
Single Tower model is more efficient than a Muti-Tower Model
Due to security issues, more Design project tasks are required for New hosted cloud services than On-premise hosted services
This document provides five ways to win or procure the right SIAM (Service Integration and Management) services. It discusses:
1) Understanding customer requirements and the reasons for considering a SIAM model.
2) Allocating the right people to the customer and service provider teams.
3) Collaboratively designing the right solution based on established evaluation criteria.
4) Establishing principles for ongoing communication and review between the customer and service provider.
5) Regularly reviewing whether the right partner was chosen and solution provided to create a valuable outcome.
CMS IT Services provides reliable, robust, and secure IT infrastructure services including management of infrastructure, products, IT support, system integration, and information security. With over 300 employees across 50 locations in India and 37 years of experience, CMS focuses on helping customers manage their IT operations reliably through transformation themes to achieve sustained leadership. CMS delivers its services through ITIL-based frameworks with best-in-class partnerships and a global reach to provide scalable and high-quality support.
ITIL SIAM - Service Integration and Management ModelPeteFeehan
This document provides an example model for effective Service Integration and Management (SIAM) based on a model that has been used in the UK public sector since 2003. The model breaks SIAM down into components such as SIAM design, service catalogue and portfolio management, toolset integration, and multi-supplier coordination. It describes each component and the processes involved. The goal of the model is to provide a single point of visibility and control for IT services delivered by multiple suppliers through coordination, integration, assurance of suppliers' performance, and ensuring services meet business needs. Adopting this model requires changes to how the business, suppliers, and SIAM provider work.
The document discusses Service Integration and Management (SIAM) and lessons learned from implementing SIAM models. It defines SIAM as managing IT service delivery when using multiple suppliers instead of a single supplier. Reasons for adopting a SIAM include achieving efficiencies through commodity procurement at scale and meeting demands for better, quicker, cheaper services. The SIAM integrates separate "tower" suppliers into a single service and acts as the single point of contact, implementing ITIL and managing performance against service levels. Lessons include creating the SIAM function before other towers, ensuring open dialogue between stakeholders, and having a clear and robust IT service management toolset.
The document discusses the Service Integration and Management (SIAM) model for ICT organizations. It outlines that the SIAM model aims to provide cost-effective and agile ICT services through coordinating various "tower" suppliers that provide different functional services. The key role of the SIAM supplier is to deliver a single interface and coherent end-to-end services by integrating and managing services across tower suppliers. However, transitioning to the SIAM model from existing outsourcing arrangements poses major challenges, such as operating a mixed environment during the transition and ensuring continuous service. Effective tools that provide integrated monitoring across suppliers and a common suite of processes are critical to enable successful transition and flexibility within the SIAM model.
ITIL is successful because it provides standard practices that help organizations deliver value for customers, integrate business and IT strategies, and optimize costs. It offers robust and proven practices applicable across industries to manage services, risks, investments and improve customer relationships. Additionally, ITIL is vendor-neutral, non-prescriptive, and based on best practices.
Stuart Howitt: Honey, I Shrunk the IncidentitSMF UK
Stu Howitt presented on how Capital One improved their incident management processes. They were facing issues like high incident volumes, low system availability, and rising customer impacts. To solve this, Capital One implemented several initiatives across multiple teams. They improved problem management practices and integrated them with incident management. They also improved communication, dashboards, severity definitions, and partnered more closely with stakeholders. The results were a reduction in major incidents from 2016 to 2018, showing the improvements were successful.
How to build and operate an effective IT tooling strategy in a SIAM operating...Steve Morgan
When operating within an outsourced multi-vendor / Service Integration & Management (SIAM) operating model it is important to have an effective IT tooling strategy.
This document discusses how managed service providers (MSPs) can evolve their business models to offer more competitive managed security services. It notes that MSPs must move from being mere implementers and maintainers to true managed service providers that focus on retention through value articulation. The document recommends that MSPs support all infrastructure types, enable faster identification and prevention of threats through integrated monitoring and analytics, and leverage a single tool to capitalize on new opportunities in the information security market, which is growing at 24.9% annually for IT security outsourcing.
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoftOSIsoft, LLC
As the need for facility equipment and asset data grows, serious cybersecurity risk are revealed, including inadequate security architecture, lack of process and controls the use of contractors and vendors. We need to be able to to identify risks and develop mitigation strategy. This presentation will provide insights, answers and tips. It will identify the value of IT/OT integration in solving facilities cybersecurity threats.
Why you really need a SIAM tooling strategy Steve Morgan
Service Integration & Management (SIAM) is the term applied to IT Operating Models which cater for a multi-vendor strategy. If you are adopting a SIAM approach, this presentation will help you develop your underpinning tooling strategy
This document discusses service integration and management (SIAM) in multisourced IT operating models. SIAM ensures that technology services from multiple internal and external teams are delivered seamlessly. It specifies service management processes across the enterprise to maximize performance of end-to-end IT services cost-effectively. SIAM acts as the central point of control between demand and supply, coordinating roles and processes to avoid issues falling through the cracks. Without effective SIAM, the benefits of multisourcing can be rapidly undone due to a lack of integration and governance.
SIAM stands for Service Integration and Management. It is a sourcing strategy that coordinates people, processes, tools, data and governance across multiple IT suppliers to deliver value to customers. The document discusses why organizations implement SIAM, provides examples of real-world SIAM implementations, and outlines challenges and the future of SIAM. It also describes how SIAM can support digital transformation and enable enterprise agility through fundamental business changes.
11 Actions that will make your SIAM Programme successfulSteve Morgan
Service Integration & Management (SIAM) is a term given to IT Operating Models which cater for multi-vendor strategies. This presentation describes the 11 Actions that you must adopt to make your SIAM programme a success
1 dave van herpen agile siam - regie op kwaliteit in de cloudNMITSymposium
This document discusses Agile Service Integration and Management (SIAM). It describes SIAM as a framework for managing multiple IT service providers in a consistent and efficient way to meet user needs. The document outlines four dimensions of enterprise agility - portfolio strategy alignment, dealing with size and complexity, collaboration throughout the lifecycle, and integrating external parties. It then discusses drivers for SIAM including delivery speed, cost reduction, and focus on innovation. Finally, it proposes an Agile approach to implementing SIAM through sprints focused on establishing agreements, processes, and behaviors and continually improving through experimentation.
Service integration and management (SIAM) is a management methodology that can be applied in an environment that includes services sourced from a number of service providers.
The document discusses the challenges CIOs face with multi-sourcing IT services and the importance of service integration and management (SIAM). It notes that Horizons 2012 identified multi-sourcing and SIAM as leading CIO issues. CIOs are looking to improve internal IT capabilities and better control outsourced services. Additionally, business requirements are evolving with front office systems requiring speed and agility while back office prioritize efficiency and stability. The document advocates that CIOs develop service integration layers and partner with providers to help transform IT delivery for multi-sourcing over the next 2-3 years.
The document discusses implementing a two-pronged approach to connecting applications and data sources across an enterprise using a middleware platform and APIs. The approach aims to provide loose coupling between systems for flexibility and plug-and-play connectivity through self-service APIs to enable faster delivery. A canonical data model is proposed to allow decoupling from different data formats and an enterprise API portal is suggested to expose data and functionality through a centralized access point for various consumer applications.
SIAM Study - Comparing the Introduction of New IT Services via Simple and Com...Ken Blunt
A Study to Compare the Introduction of typical New IT Services within a Single Tower and Multi-Tower SIAM Model using a mature set of ‘Plan-Build-Run’ project tasks
Conlcusion
The conclusions of this study for the introduction of New IT Services via Simple and Complex SIAM Models are:
Single Tower model is more efficient than a Muti-Tower Model
Due to security issues, more Design project tasks are required for New hosted cloud services than On-premise hosted services
This document provides five ways to win or procure the right SIAM (Service Integration and Management) services. It discusses:
1) Understanding customer requirements and the reasons for considering a SIAM model.
2) Allocating the right people to the customer and service provider teams.
3) Collaboratively designing the right solution based on established evaluation criteria.
4) Establishing principles for ongoing communication and review between the customer and service provider.
5) Regularly reviewing whether the right partner was chosen and solution provided to create a valuable outcome.
CMS IT Services provides reliable, robust, and secure IT infrastructure services including management of infrastructure, products, IT support, system integration, and information security. With over 300 employees across 50 locations in India and 37 years of experience, CMS focuses on helping customers manage their IT operations reliably through transformation themes to achieve sustained leadership. CMS delivers its services through ITIL-based frameworks with best-in-class partnerships and a global reach to provide scalable and high-quality support.
ITIL SIAM - Service Integration and Management ModelPeteFeehan
This document provides an example model for effective Service Integration and Management (SIAM) based on a model that has been used in the UK public sector since 2003. The model breaks SIAM down into components such as SIAM design, service catalogue and portfolio management, toolset integration, and multi-supplier coordination. It describes each component and the processes involved. The goal of the model is to provide a single point of visibility and control for IT services delivered by multiple suppliers through coordination, integration, assurance of suppliers' performance, and ensuring services meet business needs. Adopting this model requires changes to how the business, suppliers, and SIAM provider work.
The document discusses Service Integration and Management (SIAM) and lessons learned from implementing SIAM models. It defines SIAM as managing IT service delivery when using multiple suppliers instead of a single supplier. Reasons for adopting a SIAM include achieving efficiencies through commodity procurement at scale and meeting demands for better, quicker, cheaper services. The SIAM integrates separate "tower" suppliers into a single service and acts as the single point of contact, implementing ITIL and managing performance against service levels. Lessons include creating the SIAM function before other towers, ensuring open dialogue between stakeholders, and having a clear and robust IT service management toolset.
The document discusses the Service Integration and Management (SIAM) model for ICT organizations. It outlines that the SIAM model aims to provide cost-effective and agile ICT services through coordinating various "tower" suppliers that provide different functional services. The key role of the SIAM supplier is to deliver a single interface and coherent end-to-end services by integrating and managing services across tower suppliers. However, transitioning to the SIAM model from existing outsourcing arrangements poses major challenges, such as operating a mixed environment during the transition and ensuring continuous service. Effective tools that provide integrated monitoring across suppliers and a common suite of processes are critical to enable successful transition and flexibility within the SIAM model.
ITIL is successful because it provides standard practices that help organizations deliver value for customers, integrate business and IT strategies, and optimize costs. It offers robust and proven practices applicable across industries to manage services, risks, investments and improve customer relationships. Additionally, ITIL is vendor-neutral, non-prescriptive, and based on best practices.
Stuart Howitt: Honey, I Shrunk the IncidentitSMF UK
Stu Howitt presented on how Capital One improved their incident management processes. They were facing issues like high incident volumes, low system availability, and rising customer impacts. To solve this, Capital One implemented several initiatives across multiple teams. They improved problem management practices and integrated them with incident management. They also improved communication, dashboards, severity definitions, and partnered more closely with stakeholders. The results were a reduction in major incidents from 2016 to 2018, showing the improvements were successful.
How to build and operate an effective IT tooling strategy in a SIAM operating...Steve Morgan
When operating within an outsourced multi-vendor / Service Integration & Management (SIAM) operating model it is important to have an effective IT tooling strategy.
This document discusses how managed service providers (MSPs) can evolve their business models to offer more competitive managed security services. It notes that MSPs must move from being mere implementers and maintainers to true managed service providers that focus on retention through value articulation. The document recommends that MSPs support all infrastructure types, enable faster identification and prevention of threats through integrated monitoring and analytics, and leverage a single tool to capitalize on new opportunities in the information security market, which is growing at 24.9% annually for IT security outsourcing.
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoftOSIsoft, LLC
As the need for facility equipment and asset data grows, serious cybersecurity risk are revealed, including inadequate security architecture, lack of process and controls the use of contractors and vendors. We need to be able to to identify risks and develop mitigation strategy. This presentation will provide insights, answers and tips. It will identify the value of IT/OT integration in solving facilities cybersecurity threats.
This webinar series is designed to help internal auditors looking to equip themselves with competencies and confidence to handle audit of IT controls and information security, and learn about the emerging technologies and their underlying risks
The series focuses on contemporary IT audit approaches relevant to Internal Auditors and the processes underlying risk based IT audits.
Session 7 of 10
This Webinar focuses on SEIM Log Analysis
• Logging Sources & Servers
• What is a SIEM?
• Advantages of a SIEM?
• Using SIEM
• Detection of outbound sensitive information
• Data Collection
• Aggrefation, Normalization and Enrichment
• Reporting and Forensics
• Challenges in log management
Digital transformation in the oil and gas industry is being driven by emerging technologies like big data, artificial intelligence, and public cloud adoption. Cybersecurity is crucial as companies integrate IT and operational technology systems. A leading company underwent a three-year cybersecurity transformation that prioritized competency, risk management, hygiene, response and resilience. Their strategy was built on the NIST cybersecurity framework and included goals like achieving certain cyber maturity levels for identify, protect, detect, respond and recover functions. A vulnerability assessment of one company's operational technology environment reviewed policies, physical security, network security, host security and safety aspects across process domains to identify risks.
This was delivered during National Apprenticeships Week 2018. The global shortage of Cyber Security Professionals is set to grow to 1.5 million in 2019. By harnessing apprenticeships organisations can train new talent and up-skill existing employees.
สไลด์ประกอบเวที Open Forum: Cybersecurity Knowledge Sharing Series ครั้งที่ 3 หัวข้อ THE ESSENTIAL ELEMENT OF YOUR SECURITY. ในวันพุธที่ 16 พฤษภาคม 2561 เวลา 12.45–16.30 น. ณ ห้อง Open Forum ชั้น 21 ETDA
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec
The document discusses building a zero trust program on a solid platform. It emphasizes that a zero trust approach requires considering six interrelated areas: data, networks, workloads, devices, people/workforce, and analytics & automation. A platform that integrates capabilities across these areas provides improved security outcomes, reduces complexity, and simplifies automation compared to a fragmented approach. The document uses Symantec's integrated cyber defense platform as an example and demonstrates how it can operationalize zero trust strategies.
The document discusses cyber security strategies and services provided by Symantec Corporation, including managed security services, threat intelligence, incident response, and cyber security exercises. It provides details on Symantec's security operations centers, capabilities for continuous visibility and threat analytics, and frameworks for organizations to develop their own cyber defense centers. The document emphasizes the need for comprehensive security solutions that span prevention, detection, and response across the attack lifecycle.
UK Conference 2018_How to engage your IT security team and fund your SAM prog...Martin Thompson
The document summarizes a presentation about how IT asset managers can engage and support IT security teams. It discusses analyzing stakeholders to understand their power, interest, and attitude. It also outlines how ITAM programs can help IT security teams by providing additional trusted inventory sources, version control, usage stats, and vulnerability reporting to help justify ongoing security budgets and reduce technical debt. A case study of how one organization responded heroically to a cyberattack shows how close ITAM-ITSEC alignment can help organizations respond effectively to security incidents.
Proactive Risk Management and Compliance in a World of Digital DisruptionMike Wons
Is the CISO the new CEO. Proactive Risk Management and Compliance in a World of Digital Disruption presentation at annual Information Technology Security and Audit (CACS) event in Chicago...as GDPR becomes a reality!
This document discusses digital security and the challenges of securing systems in a changing technological landscape. It notes that terminology around information, cyber, and digital security can be confusing, and that security requirements need to be defined on a case-by-case basis. It emphasizes that security risks will continue to increase as digitalization accelerates, and that security professionals must adapt to embrace changes like cloud computing, IoT, and new technologies. The document concludes that data and trust are key currencies, that security enables digitalization when done well, and that effective security requires balancing risks with opportunities through good design principles and lifelong learning.
SOC as a Service manages and monitors your logs, devices, network and assets for internal IT teams. It provides skills to combat cybersecurity threats. Get now! - https://mdr.comodo.com/soc-as-a-service.php?afid=10110
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...Cristian Garcia G.
El panorama de amenazas en evolución basado en nuestro ISTR (Reporte de Anual de Amenazas en Internet Vol. 24) recientemente publicado, refleja las últimas tendencias y cómo se aplican a Colombia y América Latina. Las principales tendencias de transformación digital, como la nube y la movilidad, junto con los nuevos desafíos de seguridad han cambiado el panorama de ciberseguridad por lo que la estrategia debe enfocarse en términos de riesgos clave, regulaciones y hallazgos sobre la madurez de la seguridad. Recomendaciones para enfocar y mejorar las posturas de ciberseguridad para abordar estas tendencias, incluidos los marcos clave, las tecnologías, los procesos y los cambios culturales son parte integral de los pasos a seguir.
Why Network and Endpoint Security Isn’t EnoughImperva
The rise in high-profile breaches demonstrates that traditional security defenses are no longer enough. Endpoint and network security cannot defend against sophisticated attacks or compromised insiders.
View this presentation and learn:
- Why traditional security measures fail to stop web attacks and data breaches
- How modernized best practices safeguard against web application attacks
- What strategies enable scalable data protection and simplified audits
How to Choose the Right Security Information and Event Management (SIEM) Solu...IBM Security
View on-demand webinar: https://securityintelligence.com/events/choose-right-security-information-event-management-siem-solution/
Learn what matters most when choosing a SIEM solution. In this session, we take a tour of the 2015 Gartner Magic Quadrant for SIEM, and IBM experts will discuss what we believe has set IBM Security QRadar® apart from other vendors for 7 consecutive years.
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...IBM Security
Learn about Sogeti’s journey of creating a new Security Operation Center, and how and why we leveraged QRadar solutions. We explore the full program lifecycle, from strategic choices to technical analysis and benchmarking on the product. We explain how QRadar accelerates the go-to-market of the SOC, and how we embed IBM Security Intelligence offerings in our solution. Having a strong collaboration between different IBM stakeholders such as Software Group, Global Technology Services, as well as the Labs, was key to client satisfaction and operational effectiveness. We also show the value of integrating new QRadar features in our SOC roadmap, in order to constantly stay ahead in the cyber security game.
The Good, the Bad and the Ugly: A Different Perspective on Identity GovernanceIBM Security
The document discusses a successful implementation of an identity governance and administration (IGA) system at E.ON Global Commodities (EGC) to better manage user access and meet compliance requirements. Key points:
- EGC implemented IBM's Identity Governance and Administration platform to standardize access management processes, reduce risk of improper access, and improve audit controls.
- Drivers for the project included audit findings showing a need to improve controls over user access and authentication. The new system would help enforce separation of duties policies.
- Benefits of the system include a single view of access privileges, real-time detection of access risks, and ability to quickly review and revoke access. This has made EGC
Similar to Martin Huddleston: No Service Management, No Security (20)
Gary Gamp: The 21st Century Service ManageritSMF UK
The 21st century service manager must evolve their skills and approach to focus on relationships, commercial aspects, and at the same time be able to maximise the customer experience. This presentation focuses on the key aspects of what it will take to transform to the service manager of the future in line with PSMF.
Rebecca Ulyatt: People Power – Crack the Code, One Conversation at a TimeitSMF UK
When you look at organisational strategy today, 90% of it is based on getting technology to do the work. Digitalisation is brilliant and will futureproof channel shift and personalisation, but we need to be wary of leaving behind the human element. We are always going to require people to deliver customer service – it’s all about bringing in the right people with the right skills and mindsets; but unfortunately some of the messages around that are getting confused. Whether you work in service or support, customers expect to get value from the time they invest in every conversation with you. Top performers, in all sectors, really get it. We should be talking about creating value at every single touch point.
Best-in-class companies realise that spending time and effort on customer conversations, combined with the right mindset and skills, will result in value for both the customer and the business. In this presentation, Rebecca shares examples of companies who are getting it right. Take a look at her presentation to: understand the science that backs up the thinking, hear of case studies that have shaped thinking, and to better understand the mindsets and skills required to create more human conversations.
Chris Bryan: Continuous Service Improvement in a SIAM EnvironmentitSMF UK
In a time of digital transformation there is a business imperative to continuously improve services, yet too often continual service improvement (CSI) is often left as an isolated afterthought in IT operations. In this presentation Chris outlines a proven model for implementing CSI driven by business value, and intelligently inter-connected with other service management capabilities, processes, and functions.
Learn how to: govern CSI, identify business benefits, align metrics across initiatives, introduce a portfolio approach to CSI, make CSI both agile and lean, and integrate CSI with problem management.
Peter Hubbard: Don't Get Stuck in a Silo – Going Digital isn't TransformationitSMF UK
This document summarizes a presentation about digital transformation and enterprise service management. The presentation discusses:
1) How to build and implement a digital transformation strategy, engage management, and regain control of data silos through enterprise service management solutions.
2) The need for IT to shift from a focus on running the business to growing and transforming the business through digital evolution.
3) Examples of using the same service management principles across different business functions like HR, facilities, and IT through a consolidated platform to standardize and automate processes.
Our fascination with machines is infinite, as is the unceasing focus to humanise them. The question is, how far are we willing to take artifical intelligence (AI)? Humans are emotional but not always emotionally intelligent, so it’s therefore possible that we end up we limiting the technology, losing ourselves in what we create. As such, to deal with the volatility, uncertainty, complexity, and ambiguity of our environment we must look beyond IT!
In this presentation, Simone explores the positives and negatives of volatility, uncertainty, complexity, and ambiguity (VUCA) with resilience vs. resistance, and teaches you how to understand talent diversity requirements in the machine age. In addition, she shows you how to elevate good habits while still retaining originality.
Hayley Butler and Spenser Arnold: Agile Service ManagementitSMF UK
As HM Land registry transforms the services they deliver, they transform the way they manage services. Earlier this year they began a trial on increasing the agility of their service management functions. In this presentation they share where they started from, where they are now, and where they think they're headed.
As the operator of Britain's railway infrastructure, Network Rail (NR) is tasked with managing a highly complex, multi-dimensional and ageing railway consisting of 20,000 miles of track, 40,000 bridges and tunnels, and 23,000 switches and crossings. The challenge to NR to run a safe, high performing railway meant it had to look at new, innovative ways of working to exploit the current infrastructure to meet current and future demands. This presentation describes the part that IT is playing in that transformation.
Lynda Cooper: ISO/IEC 20000 - The Launch of the Revised StandarditSMF UK
ISO/IEC 20000 is a standard for service management that can be applied to IT and non-IT services and is already used around the world, which can be supported by ITIL, VeriSM, Devops, IT4IT, or any other framework. With the third edition of the standard being published in Q4 of 2018 and officially launced at ITSM18, this presentation is perfect for those that already use ISO/IEC 20000 and want to find out about what is new; or those who are wishing to improve their services and learn more about what ISO/IEC 20000 is.
Take a look at this presentation to get an overview of the revised standard covering: why the revision was needed and how it addresses today's business and service management challenges; the benefits of the standard and of the revision; what is new, changed, or removed; and the timeline for transition for organizations already certified.
This document provides guidance on effectively managing major incidents by separating work into four key streams: understanding what's happening, restoring service, investigating causes, and preventing future incidents. It emphasizes keeping all relevant information visible, updated, and organized on a shared incident dashboard. An example dashboard is shown and updated as a simulated incident involving a broken brick sorting robot is resolved over 60 minutes. Lessons include avoiding long calls, transparency of information, specificity from participants, and regular simulations to maintain skills.
1) Powerful external forces like empowered customers and digital technologies are remaking markets and creating existential risk for companies.
2) Business leaders must make critical decisions to determine their company's destiny in response to these forces, with massive consequences but little precedence.
3) To manage the future, companies must design principles that are connected, insights-driven, fast, and customer-led in order to execute digital transformations successfully.
Akshay Anand: The Future is Built on ITIL – Get Ready for ITIL 4itSMF UK
The document discusses the future of ITIL and highlights some key points about the upcoming ITIL 4 framework. ITIL 4 represents an evolution of IT service management best practices focused around guiding principles. Training for ITIL 4 certification is underway with the foundation exam being made available at the end of February 2019. The new version aims to build upon ITIL's value by focusing on areas like digital transformation and the creation of customer value.
Sanjeev NC: 5 Game Techniques to Immediately Apply in Your Service DeskitSMF UK
Gamification in service management is nothing new, but all too often it only focuses on points, badges, and leaderboards. In this presentation, Sanjeev goes beyond this, and shows you how you can apply gaming techniques to drive the right behaviours amongst end users and agents. Plus he shares examples of specific game techniques that can be applied to your service desk, based on Yukai Chou's Octalysis framework for gamification and behavioural design.
Take a look at this presentation to gain actionable insights based on game techniques when applied to the service desk; to take away advice on how to improve end user adoption (of the likes of self-service) and agent motivation. Plus learn a new behavioural design framework (Octalysis).
Service Design is a user-centered approach to designing end-to-end services that enable users to achieve their goals. It uses methods and a "toolbox" to understand user needs and challenge assumptions in order to simplify services. Service Design can complement other approaches like ITIL by focusing on the front-of-house experience and reusing existing components rather than building new ones. Adopting a user-centric mindset and learning from other practices like those of the Government Digital Service can help make services more open and consistent.
Jon Terry: Respect for People Lean's Neglected PillaritSMF UK
Respect for People is one of the pillars of Lean. If you read the Lean-Agile and DevOps literature or attend conferences, you will hear plenty about culture. However, these ideas usually aren’t presented as systematically and tangibly as the process tools. Most of the Lean principles that we study are focused on the other pillar, continuous improvement. Cultural ideas may be mixed in there but in a way that’s hard to untangle. Or, at the risk of ruffling some feathers, they may seem overly touchy-feely or theoretical brain science-y. This is a real shame. A business can’t just be a nice place to work, full of nice people; it must deliver a steady stream of results for customers and financial stakeholders. But the best long-term results come from providing a sustainable, healthy work environment. So investing in a strong culture is a wise decision for executives and managers.
Here ITSM17 top-rated speaker Jon Terry explores some key ideas around team structure and the responsibilities of both team members and managers in a respectful Lean-Agile company. The presentation provides candidates with a set of seven principles to spell out respect for people to match those for continuous improvement. And it shares some of the source material from which these ideas are derived.
The industry is abuzz with discussions around how technology will improve the service desk and allow it to become more efficient and productive. However, there is always an underlying rhetoric that these technologies will be implemented to the detriment of the service desk analyst. This is simply not the case. As SDI data suggests, the role of the analyst will not become redundant, but will evolve to work alongside technologies, and potentially provide more value to the service desk.
Here Scarlett explores how the role of the service desk analyst will evolve, including what skills will be necessary for the Analyst v2.0. Furthermore, she will look at what this means for the service desk, and how emerging technologies will shape how it will look in the future.
How do you ensure your SIAM model is fit for purpose, able to deliver once implemented, and is providing the business benefit realisation post deployment? Are your people and process in place? This presentation provides insight into the SIAM SIGS approach and how your business can benefit. The impact of change and not dealing with it is the causal factors of many IT ventures. Here Richard surfaces those issues and the need to address them in a successful SIAM implementation.
So the technology organisation introduced Agile, DevOps, and Cloud-based delivery. Why do they still suck in the eyes of the business? The answer lies in the management perspective which still relies on the 20th century thinking for 21st-century technologies. Using a major European car manufacturing company as a case study. Alan explains the management change necessary to get a better return on energy after digital transformations.
David J Maskell: Digital Transformation Whilst the Wheels Are Still Turning, ...itSMF UK
Discover how Computacenter drove their Digital Workplace programme - Digitalme@CC throughout their global teams. Learn about the highs, the lows, adoption and how things could have been different. A fast paced overview on changing the wheels on several services in multiple languages whilst continuing to support their customers.
Kaimar Karu: Beyond the Hype - the Real Promise of AIitSMF UK
This pragmatic session from ITSM18 focused on the ""so what"" questions related to Artificial Intelligence (AI). It covered the real-world technical capabilities based on current practices and the latest AI research, as well as the philosophical aspects and ethical implications of designing, developing, and operating human-impacting systems that leverage machine learning and advanced AI capabilities. Kaimar specifically looked at the impact of AI on agile software development and technical IT operations, plus he discussed how to tune in and cut through the (marketing) noise of "AI-as-a-buzzword".
Take a look at his presentation to find out the direction that AI is heading, key practical challenges, and the differences between AI, machine learning, and deep learning among other things. Discover what aspects of your role is or could be impacted by AI, and what it means in practical terms beyond the "your job will disappear" scare. Plus, learn practical considerations for leveraging AI in a responsible and ethical manner.
This session took us through the highs and lows of the ground-breaking research survey conducted by HD to determine the current state of IT organisations’ business focus and process maturity.
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyScyllaDB
Freshworks creates AI-boosted business software that helps employees work more efficiently and effectively. Managing data across multiple RDBMS and NoSQL databases was already a challenge at their current scale. To prepare for 10X growth, they knew it was time to rethink their database strategy. Learn how they architected a solution that would simplify scaling while keeping costs under control.
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
Discover top-tier mobile app development services, offering innovative solutions for iOS and Android. Enhance your business with custom, user-friendly mobile applications.
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.
Conversational agents, or chatbots, are increasingly used to access all sorts of services using natural language. While open-domain chatbots - like ChatGPT - can converse on any topic, task-oriented chatbots - the focus of this paper - are designed for specific tasks, like booking a flight, obtaining customer support, or setting an appointment. Like any other software, task-oriented chatbots need to be properly tested, usually by defining and executing test scenarios (i.e., sequences of user-chatbot interactions). However, there is currently a lack of methods to quantify the completeness and strength of such test scenarios, which can lead to low-quality tests, and hence to buggy chatbots.
To fill this gap, we propose adapting mutation testing (MuT) for task-oriented chatbots. To this end, we introduce a set of mutation operators that emulate faults in chatbot designs, an architecture that enables MuT on chatbots built using heterogeneous technologies, and a practical realisation as an Eclipse plugin. Moreover, we evaluate the applicability, effectiveness and efficiency of our approach on open-source chatbots, with promising results.
Your One-Stop Shop for Python Success: Top 10 US Python Development Providersakankshawande
Simplify your search for a reliable Python development partner! This list presents the top 10 trusted US providers offering comprehensive Python development services, ensuring your project's success from conception to completion.
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframePrecisely
Inconsistent user experience and siloed data, high costs, and changing customer expectations – Citizens Bank was experiencing these challenges while it was attempting to deliver a superior digital banking experience for its clients. Its core banking applications run on the mainframe and Citizens was using legacy utilities to get the critical mainframe data to feed customer-facing channels, like call centers, web, and mobile. Ultimately, this led to higher operating costs (MIPS), delayed response times, and longer time to market.
Ever-changing customer expectations demand more modern digital experiences, and the bank needed to find a solution that could provide real-time data to its customer channels with low latency and operating costs. Join this session to learn how Citizens is leveraging Precisely to replicate mainframe data to its customer channels and deliver on their “modern digital bank” experiences.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/how-axelera-ai-uses-digital-compute-in-memory-to-deliver-fast-and-energy-efficient-computer-vision-a-presentation-from-axelera-ai/
Bram Verhoef, Head of Machine Learning at Axelera AI, presents the “How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-efficient Computer Vision” tutorial at the May 2024 Embedded Vision Summit.
As artificial intelligence inference transitions from cloud environments to edge locations, computer vision applications achieve heightened responsiveness, reliability and privacy. This migration, however, introduces the challenge of operating within the stringent confines of resource constraints typical at the edge, including small form factors, low energy budgets and diminished memory and computational capacities. Axelera AI addresses these challenges through an innovative approach of performing digital computations within memory itself. This technique facilitates the realization of high-performance, energy-efficient and cost-effective computer vision capabilities at the thin and thick edge, extending the frontier of what is achievable with current technologies.
In this presentation, Verhoef unveils his company’s pioneering chip technology and demonstrates its capacity to deliver exceptional frames-per-second performance across a range of standard computer vision networks typical of applications in security, surveillance and the industrial sector. This shows that advanced computer vision can be accessible and efficient, even at the very edge of our technological ecosystem.
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...Alex Pruden
Folding is a recent technique for building efficient recursive SNARKs. Several elegant folding protocols have been proposed, such as Nova, Supernova, Hypernova, Protostar, and others. However, all of them rely on an additively homomorphic commitment scheme based on discrete log, and are therefore not post-quantum secure. In this work we present LatticeFold, the first lattice-based folding protocol based on the Module SIS problem. This folding protocol naturally leads to an efficient recursive lattice-based SNARK and an efficient PCD scheme. LatticeFold supports folding low-degree relations, such as R1CS, as well as high-degree relations, such as CCS. The key challenge is to construct a secure folding protocol that works with the Ajtai commitment scheme. The difficulty, is ensuring that extracted witnesses are low norm through many rounds of folding. We present a novel technique using the sumcheck protocol to ensure that extracted witnesses are always low norm no matter how many rounds of folding are used. Our evaluation of the final proof system suggests that it is as performant as Hypernova, while providing post-quantum security.
Paper Link: https://eprint.iacr.org/2024/257
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
No service management No cyber security
Cyber Security is no different from any other management activity, the theory is straight forward and well known, execution is very difficult. Research carried out by a joint UK/US team identified that one key element of high quality Cyber security is world class service management as the majority of controls used to secure a system lie within the Service management realm. Martin will outline the background to the research and share the results that identify how service management controls fit within a Cyber security life cycle. Building on this work Martin will show how we need to think more about effectiveness and continuous improvement rather than compliance to give us the best chance of staying ahead of the attackers.
Plan
Assume people know what service management is (3 legged stool), what is cyber security re operational resilience maturity to agile defence agile operations resource prioritisation agility, raising process and performance maturity to be able to be agile to be able to perform.
What makes cyber security execution difficult? [Threat agility, attack right once, defence right every time] [ Failure of protection, resort to Resilience/recovery][Evolution of systems / defences]
NATO / MOD background, maturity models for agility.
What is high quality Cyber Security and what role is Service Management playing – heat map/statistics/re-use.
Demonstrate how service management controls fit in the CyberSecurity Lifecycle. [iData CPNI/NCSC kill chain, ATT&CK steps/lifecycle, A/D/P/D/R/R]
Effectiveness & continual improvement (noting ISO20000-1:2018 has dropped CSI), agility to stay ahead of attackers, DevSecOps [re recent UK/US/Canada Airforce investments in agile process] [ coding securely at pace] [issue for GitHub and ReadHat’s new owners re opensource]
Service Management Reminder
Threats, Threat Agility
What does good look like in Cyber Security
Financial Fraud/Extortion, Resource Acquisition, Competitive IP Theft, Reputational Damage, Black-mail, State Sponsored Attacks…
NCSC: Sept Threat brief on Supply Chain . NCSC is developing its approach to this issue and stated in October 2018 that the risk in the supply chain is:-
• An increase in pace and number of cyber security incidents
• No increase in severity
• Vulnerabilities are old and can be patched
• Attacks do not require use of high-end skills
• Supply chain at risk, with suppliers being the first source of the compromise.
NCSC’s approach also recommends:-
• Promoting cloud-based hosting technology for the vast majority of users
• To change the focus from sites to systems
• Exploring models for examining and recording cyber security of common suppliers
• Promoting NIS across all CNI sectors (not just ones regulated by NIS) and major businesses to improve security in the supply chain
• Piloting a new Active Cyber Defence “Supplier Check” inspection of external web site as proxy for internal cyber posture.
Current ‘Live’ Means Used by Attackers
Social engineered attacks on the person
e.g. Phishing, Vishing, Whaling, etc
Speed and agility
e.g. opportunistic ransomware, machine to machine network exploitation – SAMSAM, WannaCry, etc
Supply chain and sources of code and API security
e.g. Ccleaner, MageCart (TicketMaster, BA et al), FaceBook, etc
Resource acquisition in parasitic processes
e.g. DDOS bots, crypto mining, scam hosting
https://duo.com/decipher/magecart-group-refines-attacks-nabs-more-sites
Much of Magecart’s previous attacks focused on compromising third-party providers. The group would inject its malicious code into libraries and scripts provided by third-party providers, thus ensuring that any website using that provider’s code would be executing the attack code. For example, Magecart has targeted websites running outdated and unpatched versions of Magento, an open-source ecommerce platform written in PHP. Recent figures suggest that over 7,300 stores have been affected by the MagentoCore card skimming code.
Unseen, performing, cost effective – sounds like service management …Compliance is not Enough, How High the Bar, What Performance and what Effectiveness, What Agility, changing the Bar Anticipating the Threats / Vulnerabilities, Continual Optimisation, ATT&CK / Intel, AutomationCommoditisationCloudUtility SecurityJust a characteristic of Digital Service, a feature of service & service management.
Like any athlete the organisation needs to perform, every time, which is hard, sustaining performance is all about service management, including delivering agile services, where the service is cyber security.
What it is not is conformance to ISO/IEC 27001 or ISO/IEC 20000-1 or any ‘compliance’ standard
It is much more than process in sense of process quality improvement
Sustaining outcomes, Sustaining and Adapting, Optimising to the dynamic, more than People, Process, Technology – sustaining is about TEPIMOIL / Leadership … don’t conflate ‘Governance’ with ‘Performance’ – operational agility is hard, but service management has always sought to deliver
3 legged stool of balancing stakeholders, resources and performance/quality/output – we know there are never enough resources, not just for security, resources and prioritisation are the order of the day
Performance vs compliance, visualise the High Jump, but how high the bar?
Back ground ‘Time Based Security’ book by Wynn Schwartau on, Bob Ayers Director at DoD Information Systems Security Programme and team at US DOD DISA, Circa 1997: Protection > Detection + Reaction. ‘Risk Avoidance’ cultures are doomed to failure. Security risk cannot be designed out.
5 basic cyber controls that everyone should adhere to
Boundary firewalls and internet gateways
Secure configuration
Access control
Malware protection
Patch management
Top 5 Capabilities by Frequency:
Define Security Configuration Baselines
Establish Policies to Secure Target System
Establish Policies to Secure Information
Identify Minimum System Security Requirements
Secure Data and Network Management
Top 6 Capabilities used for ITIL V3 Delivery
Incident Management
Risk Management
Supplier Management
Service Asset & Configuration Management
Cyber Policy
Event Management
Top 5 Capabilities by frequency:
Information Security
Health Checks / Audits
Secure Data and Network Management
Accounting and Audit Controls
Incident Management
Top 6 ITIL V3 Capabilities excluded:
Information Security
Incident Management
Supplier Management
Risk Management
Service Continuity Plan
Metrics / Improvement Opportunity Identification
Change language to Cyber Defence, not passive cyber security, but proactive defence.
Increasing in dependencies is a growing risk
With every new cyber security standards, we are seeing greater complexity/dependencies
Statistics on complexity, re grown in number of mappings per capability, would be a string indicator of the fundamental need for automation in capability interactions.
Could conclude from this why SM and SIAT in particular, remains and will grow in importance.
A future with us now in a tangled Web
AI’s growing and essential impact on service management, the complexity & scale issue
But Not all good, new class of problems
Prevent: keeping down the AI weeds from choking the internet and digital services
Detect: preventing cyber ‘bad’ actors from weaponizing the AI weeds
Recover/Respond: cleaning up the AI weeds.
https://www.weforum.org/reports/the-global-risks-report-2018
A Tangled Web
Artificial intelligence “weeds” proliferate, choking off the performance of the internet
What if the adverse impact of artificial intelligence (AI) involves not a super-intelligence that takes control from humans but “AI weeds”—low-level algorithms that slowly choke off the internet? Algorithms are already proliferating. As they increase in sophistication—as we become more reliant on code that writes code, for example—explosive growth becomes more likely. A divergence could open between the code we have created and our capacity to track and control it.
The tragedy of the commons means we often let chronic problems with dispersed responsibilities fester. Think of plastic in the ocean. A trend towards reduced internet efficiency would undermine service delivery in countless businesses. It could hobble the Internet of Things. It would frustrate users. If the problem became significant enough, it could prompt some governments to wall off parts of the internet. If malicious actors found ways to proliferate or weaponize the AI weeds, they could do extensive damage.
As the global demands placed on the internet increase in scale and sophistication, digital hygiene is likely to become a more pressing concern for end-users. The development of overarching norms, regulations and governance structures for AI will be crucial: without a robust and enforceable regulatory framework, there is a risk that humans will in effect be crowded out from the internet by the proliferation of AI.
Service Management or Cyber Security, or does it matter, just Secure Digital SM?
Aggregate analysis to assess whether appetite to take risk is being applied uniformly and if systems are connected whether risk is being appropriately managed, e.g. is system M connected to system N, in which case system effectiveness might be that of M not N.
This diagram currently not routinely produced by CDCAT but by subsequent consultancy.
Discuss continual maturity improvement, road to effectiveness is about sustaining high performance to agile attackers to make it hard for them so they try elsewhere. Capability improvement is about knowing where to invest to get the most bang for buck, take for example the 4 ITIL processes identified.
In a world of cloud services, extended API’s down an opaque supply or service chain, where attackers can live off the land of the slightest configuration mismatch exploiting emergent behaviour, then to know the capability maturity and quantify the effectiveness calibrated to an absolute scale is to instil trust and or decide what risk measures are needed from the business perspective. E.g. to take out appropriate cyber insurance but understand insurers rightly place obligations on you to be mature in your resilience operation, a partnership in financial mitigations.
Reasons to be proactive:
Money
Reputation
Livelihood
Safety
Survival
Explain resilience and stress induced by Cyber, conflict of maturity levels, agile tends to Level 2 ‘Developing’ whilst Cyber Security tends to Level 4 ‘Manage outcomes by metrics’. Future business architectures ‘build this in’ by design but at a cost compensated for by future benefits, i.e. the opportunity. Security and proactive resilience isn’t free. Business evolutions and resilience is evolving to change what is ‘normal’ in business design.
Aim is now to provide a framework and risk analysis system that supports the agility needed
Discuss the status of regulators approach to harm and expectations on managing risk in financial service.
Discuss state of the art in autonomics, e.g. telecoms 5G and zero-touch provisioning, role of service management in carrier grade services delivery including security effectiveness to better than 5x9’s availability. Right almost every time – the means to digitally secure systems in the face of human fallibility and inevitable mis-configurations of complex services.
Influence of 5G autonomic technologies, e.g. zero touch provisioning.
Forensics: premera-blue breach data destruction
https://www.zdnet.com/article/premera-blue-cross-accused-of-destroying-evidence-in-data-breach-lawsuit/ see also SANS NewsBites Vol. 20 Num. 070 : California Establishes Election Cybersecurity Office; Five Eyes Want to Access Encrypted Communications; California Approves Net Neutrality Bill for the commentary. [CDCAT Q2: CDCAT Application: Capabilities folder]. Need in recovery operations to forensically archive data/equipment to ensure legal duties of care.
Automation, cenx/ericsson closed loop control and 5G
cdcat lvl 3,4,5 automated control identification, predicting where it will be needed next re mapping is a process of process design to achieve cyber defence but using IA, CNO and SM.
https://www.fiercetelecom.com/telecom/ericsson-boosts-closed-loop-automation-capabilities-deal-to-buy-cenx cdcat lvl 3,4,5 automated control identification. this is an example where that automation is bubbling up
Service Managers can and need to “step up” to secure networks, Good cyber security is dependent on good service management, Effective security is a “team sport”, automate for repeatable outcomes, get to grips with configuration risk.
Most breaches are due to insider issues [in fact historical human error and misconfiguration, ref VDBIR] – need for more testing, DevSecOps. Compliance alone means accepting successful attacks
Baseline your current maturity effectiveness and empower you business conversations in the value of cyber risk – quantify it using real world calibration. Maturity of implementation is the only way to effective security.