SlideShare a Scribd company logo
SAGNIK PAL
PROGRAM MANAGER,
IT Services, INDIA
: sagnik.pal@gmail.com
: http://in.linkedin.com/in/sagnikpal/
LEAN PROJECT: INCIDENT
REDUCTION
20% 20%
Business Case:
< --Customer omitted--> uses SSIM (Symantec Security Information
Manager) tool for Security event correlation. Different categories of security
incidents are reported on a daily basis from the Entire Network
infrastructure.
The number of incidents is approximately 20000 per month
Problem Statement:
• Analyzing of all Security Incidents and reporting is not possible with only 2
resources, lot of genuine incidents are not being reported and further
remediated.
• Other category of Security Incidents are going unreported
• Drop in performance of SSIM due to High Database utilization
• Unwanted escalations due to False Positives
Goal Statement:
• Identify and reduce security incidents in all categories
• All categories of security incidents to be monitored
• Improve the SSIM tool performance & database utilization
LEAN PROJECT OVERVIEW
Business:
< - - Omitted - - >
Stakeholders:
< - - Omitted - - >
Metrics Impacted:
Alerting of Critical Incidents
Methodology Used:
Mistake Proofing, MUDA
In scope:
Monitoring of Security incidents
Out scope:
Remediation of Security incidents
Improvements:
False positives eliminated and only genuine
incidents reported that are monitored and RCA
identified for each incident
Post Lean Process:
• Reduction in number of security incidents reported
• RCA can be provided for all incidents in top 5 categories
• Better FTE Utilization with focus on all Security incidents
• Most False positives eliminated
Advantages:
• Reduction in False positive alarms
• All Incidents can be monitored due to lower volume
• RCA for all security incidents and status Report – Timely
Fashion
• Time Reduced for monitoring all incidents and maintaining
daily tracker
Lessons Learned:
False Positives can be kept to a minimum if we fine-tune
rules/queries and exclude authentic devices. Saved time can
be used for value added initiatives in the process.
MUDA in Monitoring can be avoided by simple tweaking and
customization of monitored parameters
Pre Lean Process:
• Many security incidents were unreported
• Difficult to monitor huge volume of security incidents under
all categories on SSIM
• Delay in monitoring due to drop in system performance
Implementation Details:
• Redundant Rules and incidents were deleted
• Authorized devices were white listed, rules were
tweaked/fine tuned to get genuine incidents
• Increased rigor in remediation of infections and follow-up
for installation of patches
Process Controls:
Daily monitoring of all incidents
What is a False Positive in case of Security Incidents?
Any Official ISS Scanner / Qualys / ITAM / CA Unicenter
servers being reported as a malicious source carrying out
Intrusive scans on the network
LEAN PROJECT DETAILS: INCIDENT REDUCTION
Pre Lean
3 Mins
2 Mins
5 Mins
Incident
Count =550
Post Lean
Incident
Count =30
LEAN Action : Exclusion of all Official Vulnerability Scanners / ITAM / CA Unicenter servers from respective Rules
Still 30 incidents occur due to either genuine cases or any new servers introduced
E-mails are
sent only for
genuine
incidents
which is 5
VALUE STREAM MAPPING
Send email for incidents with details
Identify if it is a genuine incident
Monitor the incidents
Logon to Jump Box
As per daily task list, need to
monitor SSIM for incidents
START
STOP
3 Mins
2 Mins
5 Mins Send email for incidents with details
Identify if it is a genuine incident
Monitor the incidents
Logon to Jump Box
As per daily task list, need to
monitor SSIM for incidents
START
STOP
The Seven Deadly Wastes
Motion
Defects
Inventory
Transportation
Overproduction
Waiting
MonitoringProcess
Product
People
Pre-Lean Post-Lean
550 incidents per day pertaining to
different categories which is a high
volume
Entire shift spent on the monitoring
of all the security incident
Incidents out of any Official ISS
Scanner/ Qualys, ITAM / CA
Unicenter servers being reported as a
malicious source carrying out
Intrusive scans on the network are
eliminated, resulting in only few
incidents
Misses in monitoring of all other
security incidents
Timely monitoring and RCA for all
security incidents
Total time spent per day = 545*5 +
5*10= 2775 man mins
Total time spent per day =
25*5 + 5*10 =175 man mins spend
per day to monitor all incidents
MUDA ANALYSIS
Pre LEAN Post LEAN
Item Time in Hrs
FTE Available time per month (22 * 8) 176
Time Spent on incident analysis per month (Pre
LEAN) 1035.98
Time Spent on incident analysis post incident
reduction per month (Post LEAN) 64.24
Effort Saved out of LEAN (Hrs/Month) 971.74
FTE saved 5.51
Cost Savings on FTE Avoidance per annum $ 291522
Compliance : Better focus on analyzing all threats /security incidents due to elimination of false positives
Productivity Saving : 971.74 hrs/month
Item Time in Hrs
Average no. of incidents per day 550
Time taken for analysis of 545
incidents (545*5 mins) per day
46.25
Time taken on sending mails for
genuine incidents (5*10 mins) per day
0.84
Total Time taken per month (22*47.09
hrs)
1035.98
Item Time in Hrs
Average no. of incidents per day 30
Time taken for 30 incidents per day (25*5 + 5*10) 2.92
Total Time taken per month (22 * 2.92 ) 64.24
BENEFIT QUANTIFICATION
QUESTIONS / FEEDBACK
If you have a question or a feedback related to
LEAN Implementation, do write to Sagnik Pal at
sagnik.pal@gmail.com
Thank You

More Related Content

What's hot

Information Assurance Metrics: Practical Steps to Measurement
Information Assurance Metrics: Practical Steps to MeasurementInformation Assurance Metrics: Practical Steps to Measurement
Information Assurance Metrics: Practical Steps to Measurement
EnclaveSecurity
 
Vulnerability Assessment Report
Vulnerability Assessment ReportVulnerability Assessment Report
Vulnerability Assessment Report
Harshit Singh Bhatia
 
Incident Mgmt Process Guideand Standards
Incident Mgmt Process Guideand StandardsIncident Mgmt Process Guideand Standards
Incident Mgmt Process Guideand Standards
Edward Paul Pagsanhan
 
Incident Response Swimlanes
Incident Response SwimlanesIncident Response Swimlanes
Incident Response Swimlanes
Daniel P Wallace
 
Incident Escalation process Presentation
Incident Escalation process PresentationIncident Escalation process Presentation
Incident Escalation process Presentation
Lukas Williamson
 
Data Classification And Loss Prevention
Data Classification And Loss PreventionData Classification And Loss Prevention
Data Classification And Loss Prevention
Nicholas Davis
 
IT Infrastructure Management Powerpoint Presentation Slides
IT Infrastructure Management Powerpoint Presentation SlidesIT Infrastructure Management Powerpoint Presentation Slides
IT Infrastructure Management Powerpoint Presentation Slides
SlideTeam
 
Incident management with jira
Incident management with jiraIncident management with jira
Incident management with jira
Jyaasa Technologies
 
Incident, Problem, Change, Knowledge…and Service Catalog? A Powerful Circle.
Incident, Problem, Change, Knowledge…and Service Catalog? A Powerful Circle. Incident, Problem, Change, Knowledge…and Service Catalog? A Powerful Circle.
Incident, Problem, Change, Knowledge…and Service Catalog? A Powerful Circle.
Evergreen Systems
 
Business Impact Analysis - The Most Important Step during BCMS Implementation
Business Impact Analysis - The Most Important Step during BCMS ImplementationBusiness Impact Analysis - The Most Important Step during BCMS Implementation
Business Impact Analysis - The Most Important Step during BCMS Implementation
PECB
 
Do You Really Need to Evolve From Monitoring to Observability?
Do You Really Need to Evolve From Monitoring to Observability?Do You Really Need to Evolve From Monitoring to Observability?
Do You Really Need to Evolve From Monitoring to Observability?
Splunk
 
IT Audit For Non-IT Auditors
IT Audit For Non-IT AuditorsIT Audit For Non-IT Auditors
IT Audit For Non-IT Auditors
Ed Tobias
 
ITSM Presentation
ITSM PresentationITSM Presentation
ITSM Presentation
itsm_at_hanover
 
Transition Plan for New Business & Project
Transition Plan for New Business & ProjectTransition Plan for New Business & Project
Transition Plan for New Business & Project
Praveen Yadav
 
SOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterSOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations Center
Michael Nickle
 
Managing a Major Incident
Managing a Major IncidentManaging a Major Incident
Managing a Major Incident
NUS-ISS
 
Major Incident Management
Major Incident ManagementMajor Incident Management
Major Incident Management
NorthCoastHDI
 
IT Service's Improvement Plan
IT Service's Improvement PlanIT Service's Improvement Plan
IT Service's Improvement Plan
Uday Mishra, PMP, ITIL V3
 
Understanding cyber resilience
Understanding cyber resilienceUnderstanding cyber resilience
Understanding cyber resilience
Christophe Foulon, CISSP
 
Incident Management Best Practices
Incident Management Best PracticesIncident Management Best Practices
Incident Management Best Practices
TechExcel
 

What's hot (20)

Information Assurance Metrics: Practical Steps to Measurement
Information Assurance Metrics: Practical Steps to MeasurementInformation Assurance Metrics: Practical Steps to Measurement
Information Assurance Metrics: Practical Steps to Measurement
 
Vulnerability Assessment Report
Vulnerability Assessment ReportVulnerability Assessment Report
Vulnerability Assessment Report
 
Incident Mgmt Process Guideand Standards
Incident Mgmt Process Guideand StandardsIncident Mgmt Process Guideand Standards
Incident Mgmt Process Guideand Standards
 
Incident Response Swimlanes
Incident Response SwimlanesIncident Response Swimlanes
Incident Response Swimlanes
 
Incident Escalation process Presentation
Incident Escalation process PresentationIncident Escalation process Presentation
Incident Escalation process Presentation
 
Data Classification And Loss Prevention
Data Classification And Loss PreventionData Classification And Loss Prevention
Data Classification And Loss Prevention
 
IT Infrastructure Management Powerpoint Presentation Slides
IT Infrastructure Management Powerpoint Presentation SlidesIT Infrastructure Management Powerpoint Presentation Slides
IT Infrastructure Management Powerpoint Presentation Slides
 
Incident management with jira
Incident management with jiraIncident management with jira
Incident management with jira
 
Incident, Problem, Change, Knowledge…and Service Catalog? A Powerful Circle.
Incident, Problem, Change, Knowledge…and Service Catalog? A Powerful Circle. Incident, Problem, Change, Knowledge…and Service Catalog? A Powerful Circle.
Incident, Problem, Change, Knowledge…and Service Catalog? A Powerful Circle.
 
Business Impact Analysis - The Most Important Step during BCMS Implementation
Business Impact Analysis - The Most Important Step during BCMS ImplementationBusiness Impact Analysis - The Most Important Step during BCMS Implementation
Business Impact Analysis - The Most Important Step during BCMS Implementation
 
Do You Really Need to Evolve From Monitoring to Observability?
Do You Really Need to Evolve From Monitoring to Observability?Do You Really Need to Evolve From Monitoring to Observability?
Do You Really Need to Evolve From Monitoring to Observability?
 
IT Audit For Non-IT Auditors
IT Audit For Non-IT AuditorsIT Audit For Non-IT Auditors
IT Audit For Non-IT Auditors
 
ITSM Presentation
ITSM PresentationITSM Presentation
ITSM Presentation
 
Transition Plan for New Business & Project
Transition Plan for New Business & ProjectTransition Plan for New Business & Project
Transition Plan for New Business & Project
 
SOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterSOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations Center
 
Managing a Major Incident
Managing a Major IncidentManaging a Major Incident
Managing a Major Incident
 
Major Incident Management
Major Incident ManagementMajor Incident Management
Major Incident Management
 
IT Service's Improvement Plan
IT Service's Improvement PlanIT Service's Improvement Plan
IT Service's Improvement Plan
 
Understanding cyber resilience
Understanding cyber resilienceUnderstanding cyber resilience
Understanding cyber resilience
 
Incident Management Best Practices
Incident Management Best PracticesIncident Management Best Practices
Incident Management Best Practices
 

Viewers also liked

Strategy for Reducing Ticket Backlog
Strategy for Reducing Ticket BacklogStrategy for Reducing Ticket Backlog
Strategy for Reducing Ticket Backlog
Mark Copeland
 
ITIL v3 Problem Management
ITIL v3 Problem ManagementITIL v3 Problem Management
ITIL v3 Problem Management
Josep Bardallo
 
Tips & Tricks To Reducing TTR
Tips & Tricks To Reducing TTRTips & Tricks To Reducing TTR
Tips & Tricks To Reducing TTR
VictorOps
 
March 2009 - Reducing Incidents: 3-2-1-0 Approach
March 2009 - Reducing Incidents: 3-2-1-0 ApproachMarch 2009 - Reducing Incidents: 3-2-1-0 Approach
March 2009 - Reducing Incidents: 3-2-1-0 Approach
IT Service and Support
 
B2B Marketing Automation Case Study - Marketo implementation at Mobify
B2B Marketing Automation Case Study - Marketo implementation at MobifyB2B Marketing Automation Case Study - Marketo implementation at Mobify
B2B Marketing Automation Case Study - Marketo implementation at Mobify
Luke Starbuck
 
Neptune facebook autoremediation_talk
Neptune facebook autoremediation_talkNeptune facebook autoremediation_talk
Neptune facebook autoremediation_talk
Kiran Gollu
 
McLaren_Elekta Progress Report
McLaren_Elekta Progress ReportMcLaren_Elekta Progress Report
McLaren_Elekta Progress Report
Jerry Duncan
 
Incident and Problem management simplified
Incident and Problem management simplifiedIncident and Problem management simplified
Incident and Problem management simplified
Valentyn Barmak
 
Turn Around Time
Turn Around TimeTurn Around Time
Turn Around Time
alikhizar
 
Neptune : Re-thinking Incident Response Automation
Neptune : Re-thinking Incident Response Automation Neptune : Re-thinking Incident Response Automation
Neptune : Re-thinking Incident Response Automation
Kiran Gollu
 
Design Thinking and Lean UX
Design Thinking and Lean UXDesign Thinking and Lean UX
Design Thinking and Lean UX
Lillian Ayla Ersoy
 
How to Measure IT Process Automation Return on Investment (ROI)
How to Measure IT Process Automation Return on Investment (ROI)How to Measure IT Process Automation Return on Investment (ROI)
How to Measure IT Process Automation Return on Investment (ROI)
Ayehu Software Technologies Ltd.
 
Mẫu slide powerpoint đẹp cho thuyết trình-Download miễn phí
Mẫu slide powerpoint đẹp cho thuyết trình-Download miễn phíMẫu slide powerpoint đẹp cho thuyết trình-Download miễn phí
Mẫu slide powerpoint đẹp cho thuyết trình-Download miễn phí
PowerPoint Đẹp
 
Circular flowchart 4 stages powerpoint templates 0712
Circular flowchart 4 stages powerpoint templates 0712Circular flowchart 4 stages powerpoint templates 0712
Circular flowchart 4 stages powerpoint templates 0712
SlideTeam.net
 
Six Sigma the best ppt
Six Sigma the best pptSix Sigma the best ppt
Six Sigma the best ppt
Rabia Sgh S
 
#TeamClinton vs. #TeamTrump #Election2016
#TeamClinton vs. #TeamTrump #Election2016#TeamClinton vs. #TeamTrump #Election2016
#TeamClinton vs. #TeamTrump #Election2016
Empowered Presentations
 
Home automation using android mobiles
Home automation using android mobilesHome automation using android mobiles
Home automation using android mobiles
Durairaja
 

Viewers also liked (17)

Strategy for Reducing Ticket Backlog
Strategy for Reducing Ticket BacklogStrategy for Reducing Ticket Backlog
Strategy for Reducing Ticket Backlog
 
ITIL v3 Problem Management
ITIL v3 Problem ManagementITIL v3 Problem Management
ITIL v3 Problem Management
 
Tips & Tricks To Reducing TTR
Tips & Tricks To Reducing TTRTips & Tricks To Reducing TTR
Tips & Tricks To Reducing TTR
 
March 2009 - Reducing Incidents: 3-2-1-0 Approach
March 2009 - Reducing Incidents: 3-2-1-0 ApproachMarch 2009 - Reducing Incidents: 3-2-1-0 Approach
March 2009 - Reducing Incidents: 3-2-1-0 Approach
 
B2B Marketing Automation Case Study - Marketo implementation at Mobify
B2B Marketing Automation Case Study - Marketo implementation at MobifyB2B Marketing Automation Case Study - Marketo implementation at Mobify
B2B Marketing Automation Case Study - Marketo implementation at Mobify
 
Neptune facebook autoremediation_talk
Neptune facebook autoremediation_talkNeptune facebook autoremediation_talk
Neptune facebook autoremediation_talk
 
McLaren_Elekta Progress Report
McLaren_Elekta Progress ReportMcLaren_Elekta Progress Report
McLaren_Elekta Progress Report
 
Incident and Problem management simplified
Incident and Problem management simplifiedIncident and Problem management simplified
Incident and Problem management simplified
 
Turn Around Time
Turn Around TimeTurn Around Time
Turn Around Time
 
Neptune : Re-thinking Incident Response Automation
Neptune : Re-thinking Incident Response Automation Neptune : Re-thinking Incident Response Automation
Neptune : Re-thinking Incident Response Automation
 
Design Thinking and Lean UX
Design Thinking and Lean UXDesign Thinking and Lean UX
Design Thinking and Lean UX
 
How to Measure IT Process Automation Return on Investment (ROI)
How to Measure IT Process Automation Return on Investment (ROI)How to Measure IT Process Automation Return on Investment (ROI)
How to Measure IT Process Automation Return on Investment (ROI)
 
Mẫu slide powerpoint đẹp cho thuyết trình-Download miễn phí
Mẫu slide powerpoint đẹp cho thuyết trình-Download miễn phíMẫu slide powerpoint đẹp cho thuyết trình-Download miễn phí
Mẫu slide powerpoint đẹp cho thuyết trình-Download miễn phí
 
Circular flowchart 4 stages powerpoint templates 0712
Circular flowchart 4 stages powerpoint templates 0712Circular flowchart 4 stages powerpoint templates 0712
Circular flowchart 4 stages powerpoint templates 0712
 
Six Sigma the best ppt
Six Sigma the best pptSix Sigma the best ppt
Six Sigma the best ppt
 
#TeamClinton vs. #TeamTrump #Election2016
#TeamClinton vs. #TeamTrump #Election2016#TeamClinton vs. #TeamTrump #Election2016
#TeamClinton vs. #TeamTrump #Election2016
 
Home automation using android mobiles
Home automation using android mobilesHome automation using android mobiles
Home automation using android mobiles
 

Similar to LEAN Project: Incident Reduction

Comparative study of Cyber Security Assessment Tools
Comparative study of Cyber Security Assessment ToolsComparative study of Cyber Security Assessment Tools
Comparative study of Cyber Security Assessment Tools
IRJET Journal
 
Panda Security - Adaptive Defense 360
Panda Security - Adaptive Defense 360Panda Security - Adaptive Defense 360
Panda Security - Adaptive Defense 360
Panda Security
 
How can managed services improve your SAP security and compliance? [Webinar]
How can managed services improve your SAP security and compliance? [Webinar]How can managed services improve your SAP security and compliance? [Webinar]
How can managed services improve your SAP security and compliance? [Webinar]
akquinet enterprise solutions GmbH
 
ICS Cyber Security Effectiveness Measurement
ICS Cyber Security Effectiveness MeasurementICS Cyber Security Effectiveness Measurement
ICS Cyber Security Effectiveness Measurement
Aleksey Lukatskiy
 
SIEM brochure A4 8pp FINAL WEB
SIEM brochure A4 8pp FINAL WEBSIEM brochure A4 8pp FINAL WEB
SIEM brochure A4 8pp FINAL WEB
Merlin Govender
 
Scalar Security Roadshow April 2015
Scalar Security Roadshow April 2015Scalar Security Roadshow April 2015
Scalar Security Roadshow April 2015
Scalar Decisions
 
5 Clear Signs You Need Security Policy Automation
5 Clear Signs You Need Security Policy Automation5 Clear Signs You Need Security Policy Automation
5 Clear Signs You Need Security Policy Automation
Tufin
 
ThirdEye - LinkedIn's Business-wide monitoring platform
ThirdEye - LinkedIn's Business-wide monitoring platformThirdEye - LinkedIn's Business-wide monitoring platform
ThirdEye - LinkedIn's Business-wide monitoring platform
Akshay Rai
 
Solving the CIO’s Cybersecurity Dilemma
Solving the CIO’s Cybersecurity DilemmaSolving the CIO’s Cybersecurity Dilemma
Solving the CIO’s Cybersecurity Dilemma
John Gilligan
 
Intranet implementation of Identity and Access Manager
Intranet implementation of Identity and Access ManagerIntranet implementation of Identity and Access Manager
Intranet implementation of Identity and Access Manager
ProcessIT Global
 
Panda Security - Adaptive Defense
Panda Security - Adaptive DefensePanda Security - Adaptive Defense
Panda Security - Adaptive Defense
Panda Security
 
Cost effective cyber security
Cost effective cyber securityCost effective cyber security
Cost effective cyber security
임채호 박사님
 
TIG / Infocyte: Proactive Cybersecurity for State and Local Government
TIG / Infocyte: Proactive Cybersecurity for State and Local GovernmentTIG / Infocyte: Proactive Cybersecurity for State and Local Government
TIG / Infocyte: Proactive Cybersecurity for State and Local Government
Infocyte
 
CIS_Controls_v7.1_Implementation_Groups.pdf
CIS_Controls_v7.1_Implementation_Groups.pdfCIS_Controls_v7.1_Implementation_Groups.pdf
CIS_Controls_v7.1_Implementation_Groups.pdf
NesterWare
 
Effective Security Monitoring for IBM i: What You Need to Know
Effective Security Monitoring for IBM i: What You Need to KnowEffective Security Monitoring for IBM i: What You Need to Know
Effective Security Monitoring for IBM i: What You Need to Know
Precisely
 
How to Perform Continuous Vulnerability Management
How to Perform Continuous Vulnerability ManagementHow to Perform Continuous Vulnerability Management
How to Perform Continuous Vulnerability Management
Ivanti
 
Maceo Wattley Contributor Infosec
Maceo Wattley Contributor InfosecMaceo Wattley Contributor Infosec
Maceo Wattley Contributor Infosec
Dr. Maceo D. Wattley
 
Siem tools-monitor-your-network
Siem tools-monitor-your-networkSiem tools-monitor-your-network
Siem tools-monitor-your-network
hardik soni
 
Federal Webinar: Best Practices and Tools for Reducing Insider Threats
Federal Webinar: Best Practices and Tools for Reducing Insider ThreatsFederal Webinar: Best Practices and Tools for Reducing Insider Threats
Federal Webinar: Best Practices and Tools for Reducing Insider Threats
SolarWinds
 
Symantec Managed AV Service - KAZ
Symantec Managed AV Service - KAZSymantec Managed AV Service - KAZ
Symantec Managed AV Service - KAZ
Grant Chapman
 

Similar to LEAN Project: Incident Reduction (20)

Comparative study of Cyber Security Assessment Tools
Comparative study of Cyber Security Assessment ToolsComparative study of Cyber Security Assessment Tools
Comparative study of Cyber Security Assessment Tools
 
Panda Security - Adaptive Defense 360
Panda Security - Adaptive Defense 360Panda Security - Adaptive Defense 360
Panda Security - Adaptive Defense 360
 
How can managed services improve your SAP security and compliance? [Webinar]
How can managed services improve your SAP security and compliance? [Webinar]How can managed services improve your SAP security and compliance? [Webinar]
How can managed services improve your SAP security and compliance? [Webinar]
 
ICS Cyber Security Effectiveness Measurement
ICS Cyber Security Effectiveness MeasurementICS Cyber Security Effectiveness Measurement
ICS Cyber Security Effectiveness Measurement
 
SIEM brochure A4 8pp FINAL WEB
SIEM brochure A4 8pp FINAL WEBSIEM brochure A4 8pp FINAL WEB
SIEM brochure A4 8pp FINAL WEB
 
Scalar Security Roadshow April 2015
Scalar Security Roadshow April 2015Scalar Security Roadshow April 2015
Scalar Security Roadshow April 2015
 
5 Clear Signs You Need Security Policy Automation
5 Clear Signs You Need Security Policy Automation5 Clear Signs You Need Security Policy Automation
5 Clear Signs You Need Security Policy Automation
 
ThirdEye - LinkedIn's Business-wide monitoring platform
ThirdEye - LinkedIn's Business-wide monitoring platformThirdEye - LinkedIn's Business-wide monitoring platform
ThirdEye - LinkedIn's Business-wide monitoring platform
 
Solving the CIO’s Cybersecurity Dilemma
Solving the CIO’s Cybersecurity DilemmaSolving the CIO’s Cybersecurity Dilemma
Solving the CIO’s Cybersecurity Dilemma
 
Intranet implementation of Identity and Access Manager
Intranet implementation of Identity and Access ManagerIntranet implementation of Identity and Access Manager
Intranet implementation of Identity and Access Manager
 
Panda Security - Adaptive Defense
Panda Security - Adaptive DefensePanda Security - Adaptive Defense
Panda Security - Adaptive Defense
 
Cost effective cyber security
Cost effective cyber securityCost effective cyber security
Cost effective cyber security
 
TIG / Infocyte: Proactive Cybersecurity for State and Local Government
TIG / Infocyte: Proactive Cybersecurity for State and Local GovernmentTIG / Infocyte: Proactive Cybersecurity for State and Local Government
TIG / Infocyte: Proactive Cybersecurity for State and Local Government
 
CIS_Controls_v7.1_Implementation_Groups.pdf
CIS_Controls_v7.1_Implementation_Groups.pdfCIS_Controls_v7.1_Implementation_Groups.pdf
CIS_Controls_v7.1_Implementation_Groups.pdf
 
Effective Security Monitoring for IBM i: What You Need to Know
Effective Security Monitoring for IBM i: What You Need to KnowEffective Security Monitoring for IBM i: What You Need to Know
Effective Security Monitoring for IBM i: What You Need to Know
 
How to Perform Continuous Vulnerability Management
How to Perform Continuous Vulnerability ManagementHow to Perform Continuous Vulnerability Management
How to Perform Continuous Vulnerability Management
 
Maceo Wattley Contributor Infosec
Maceo Wattley Contributor InfosecMaceo Wattley Contributor Infosec
Maceo Wattley Contributor Infosec
 
Siem tools-monitor-your-network
Siem tools-monitor-your-networkSiem tools-monitor-your-network
Siem tools-monitor-your-network
 
Federal Webinar: Best Practices and Tools for Reducing Insider Threats
Federal Webinar: Best Practices and Tools for Reducing Insider ThreatsFederal Webinar: Best Practices and Tools for Reducing Insider Threats
Federal Webinar: Best Practices and Tools for Reducing Insider Threats
 
Symantec Managed AV Service - KAZ
Symantec Managed AV Service - KAZSymantec Managed AV Service - KAZ
Symantec Managed AV Service - KAZ
 

Recently uploaded

innovation in nursing practice, education and management.pptx
innovation in nursing practice, education and management.pptxinnovation in nursing practice, education and management.pptx
innovation in nursing practice, education and management.pptx
TulsiDhidhi1
 
一比一原版(QU毕业证)皇后大学毕业证如何办理
一比一原版(QU毕业证)皇后大学毕业证如何办理一比一原版(QU毕业证)皇后大学毕业证如何办理
一比一原版(QU毕业证)皇后大学毕业证如何办理
8p28uk6g
 
Chart--Time Management.pdf How to time is spent
Chart--Time Management.pdf How to time is spentChart--Time Management.pdf How to time is spent
Chart--Time Management.pdf How to time is spent
spandane
 
All the Small Things - XP2024 Bolzano/Bozen
All the Small Things - XP2024 Bolzano/BozenAll the Small Things - XP2024 Bolzano/Bozen
All the Small Things - XP2024 Bolzano/Bozen
Alberto Brandolini
 
Comparing Stability and Sustainability in Agile Systems
Comparing Stability and Sustainability in Agile SystemsComparing Stability and Sustainability in Agile Systems
Comparing Stability and Sustainability in Agile Systems
Rob Healy
 
Enriching engagement with ethical review processes
Enriching engagement with ethical review processesEnriching engagement with ethical review processes
Enriching engagement with ethical review processes
strikingabalance
 
12 steps to transform your organization into the agile org you deserve
12 steps to transform your organization into the agile org you deserve12 steps to transform your organization into the agile org you deserve
12 steps to transform your organization into the agile org you deserve
Pierre E. NEIS
 
Team Building and TUCKMANS MODEL Explained
Team Building and TUCKMANS MODEL ExplainedTeam Building and TUCKMANS MODEL Explained
Team Building and TUCKMANS MODEL Explained
iampriyanshujaiswal
 
The Management Guide: From Projects to Portfolio
The Management Guide: From Projects to PortfolioThe Management Guide: From Projects to Portfolio
The Management Guide: From Projects to Portfolio
Ahmed AbdelMoneim
 
Strategic Org Design with Org Topologies™
Strategic Org Design with Org Topologies™Strategic Org Design with Org Topologies™
Strategic Org Design with Org Topologies™
Alexey Krivitsky
 
Ganpati Kumar Choudhary Indian Ethos PPT.pptx
Ganpati Kumar Choudhary Indian Ethos PPT.pptxGanpati Kumar Choudhary Indian Ethos PPT.pptx
Ganpati Kumar Choudhary Indian Ethos PPT.pptx
GanpatiKumarChoudhar
 
Colby Hobson: Residential Construction Leader Building a Solid Reputation Thr...
Colby Hobson: Residential Construction Leader Building a Solid Reputation Thr...Colby Hobson: Residential Construction Leader Building a Solid Reputation Thr...
Colby Hobson: Residential Construction Leader Building a Solid Reputation Thr...
dsnow9802
 
20240608 QFM019 Engineering Leadership Reading List May 2024
20240608 QFM019 Engineering Leadership Reading List May 202420240608 QFM019 Engineering Leadership Reading List May 2024
20240608 QFM019 Engineering Leadership Reading List May 2024
Matthew Sinclair
 
Sethurathnam Ravi: A Legacy in Finance and Leadership
Sethurathnam Ravi: A Legacy in Finance and LeadershipSethurathnam Ravi: A Legacy in Finance and Leadership
Sethurathnam Ravi: A Legacy in Finance and Leadership
Anjana Josie
 
Conflict resololution,role of hr in resolution
Conflict resololution,role of hr in resolutionConflict resololution,role of hr in resolution
Conflict resololution,role of hr in resolution
Dr. Christine Ngari ,Ph.D (HRM)
 
Myrna Story of Leadership and Management
Myrna Story of Leadership and ManagementMyrna Story of Leadership and Management
Myrna Story of Leadership and Management
Waleed Kamal
 
Impact of Effective Performance Appraisal Systems on Employee Motivation and ...
Impact of Effective Performance Appraisal Systems on Employee Motivation and ...Impact of Effective Performance Appraisal Systems on Employee Motivation and ...
Impact of Effective Performance Appraisal Systems on Employee Motivation and ...
Dr. Nazrul Islam
 
Stuart Wilson the teams I have led - 2024
Stuart Wilson the teams I have led - 2024Stuart Wilson the teams I have led - 2024
Stuart Wilson the teams I have led - 2024
stuwilson.co.uk
 
Addiction to Winning Across Diverse Populations.pdf
Addiction to Winning Across Diverse Populations.pdfAddiction to Winning Across Diverse Populations.pdf
Addiction to Winning Across Diverse Populations.pdf
Bill641377
 
Designing and Sustaining Large-Scale Value-Centered Agile Ecosystems (powered...
Designing and Sustaining Large-Scale Value-Centered Agile Ecosystems (powered...Designing and Sustaining Large-Scale Value-Centered Agile Ecosystems (powered...
Designing and Sustaining Large-Scale Value-Centered Agile Ecosystems (powered...
Alexey Krivitsky
 

Recently uploaded (20)

innovation in nursing practice, education and management.pptx
innovation in nursing practice, education and management.pptxinnovation in nursing practice, education and management.pptx
innovation in nursing practice, education and management.pptx
 
一比一原版(QU毕业证)皇后大学毕业证如何办理
一比一原版(QU毕业证)皇后大学毕业证如何办理一比一原版(QU毕业证)皇后大学毕业证如何办理
一比一原版(QU毕业证)皇后大学毕业证如何办理
 
Chart--Time Management.pdf How to time is spent
Chart--Time Management.pdf How to time is spentChart--Time Management.pdf How to time is spent
Chart--Time Management.pdf How to time is spent
 
All the Small Things - XP2024 Bolzano/Bozen
All the Small Things - XP2024 Bolzano/BozenAll the Small Things - XP2024 Bolzano/Bozen
All the Small Things - XP2024 Bolzano/Bozen
 
Comparing Stability and Sustainability in Agile Systems
Comparing Stability and Sustainability in Agile SystemsComparing Stability and Sustainability in Agile Systems
Comparing Stability and Sustainability in Agile Systems
 
Enriching engagement with ethical review processes
Enriching engagement with ethical review processesEnriching engagement with ethical review processes
Enriching engagement with ethical review processes
 
12 steps to transform your organization into the agile org you deserve
12 steps to transform your organization into the agile org you deserve12 steps to transform your organization into the agile org you deserve
12 steps to transform your organization into the agile org you deserve
 
Team Building and TUCKMANS MODEL Explained
Team Building and TUCKMANS MODEL ExplainedTeam Building and TUCKMANS MODEL Explained
Team Building and TUCKMANS MODEL Explained
 
The Management Guide: From Projects to Portfolio
The Management Guide: From Projects to PortfolioThe Management Guide: From Projects to Portfolio
The Management Guide: From Projects to Portfolio
 
Strategic Org Design with Org Topologies™
Strategic Org Design with Org Topologies™Strategic Org Design with Org Topologies™
Strategic Org Design with Org Topologies™
 
Ganpati Kumar Choudhary Indian Ethos PPT.pptx
Ganpati Kumar Choudhary Indian Ethos PPT.pptxGanpati Kumar Choudhary Indian Ethos PPT.pptx
Ganpati Kumar Choudhary Indian Ethos PPT.pptx
 
Colby Hobson: Residential Construction Leader Building a Solid Reputation Thr...
Colby Hobson: Residential Construction Leader Building a Solid Reputation Thr...Colby Hobson: Residential Construction Leader Building a Solid Reputation Thr...
Colby Hobson: Residential Construction Leader Building a Solid Reputation Thr...
 
20240608 QFM019 Engineering Leadership Reading List May 2024
20240608 QFM019 Engineering Leadership Reading List May 202420240608 QFM019 Engineering Leadership Reading List May 2024
20240608 QFM019 Engineering Leadership Reading List May 2024
 
Sethurathnam Ravi: A Legacy in Finance and Leadership
Sethurathnam Ravi: A Legacy in Finance and LeadershipSethurathnam Ravi: A Legacy in Finance and Leadership
Sethurathnam Ravi: A Legacy in Finance and Leadership
 
Conflict resololution,role of hr in resolution
Conflict resololution,role of hr in resolutionConflict resololution,role of hr in resolution
Conflict resololution,role of hr in resolution
 
Myrna Story of Leadership and Management
Myrna Story of Leadership and ManagementMyrna Story of Leadership and Management
Myrna Story of Leadership and Management
 
Impact of Effective Performance Appraisal Systems on Employee Motivation and ...
Impact of Effective Performance Appraisal Systems on Employee Motivation and ...Impact of Effective Performance Appraisal Systems on Employee Motivation and ...
Impact of Effective Performance Appraisal Systems on Employee Motivation and ...
 
Stuart Wilson the teams I have led - 2024
Stuart Wilson the teams I have led - 2024Stuart Wilson the teams I have led - 2024
Stuart Wilson the teams I have led - 2024
 
Addiction to Winning Across Diverse Populations.pdf
Addiction to Winning Across Diverse Populations.pdfAddiction to Winning Across Diverse Populations.pdf
Addiction to Winning Across Diverse Populations.pdf
 
Designing and Sustaining Large-Scale Value-Centered Agile Ecosystems (powered...
Designing and Sustaining Large-Scale Value-Centered Agile Ecosystems (powered...Designing and Sustaining Large-Scale Value-Centered Agile Ecosystems (powered...
Designing and Sustaining Large-Scale Value-Centered Agile Ecosystems (powered...
 

LEAN Project: Incident Reduction

  • 1. SAGNIK PAL PROGRAM MANAGER, IT Services, INDIA : sagnik.pal@gmail.com : http://in.linkedin.com/in/sagnikpal/ LEAN PROJECT: INCIDENT REDUCTION 20% 20%
  • 2. Business Case: < --Customer omitted--> uses SSIM (Symantec Security Information Manager) tool for Security event correlation. Different categories of security incidents are reported on a daily basis from the Entire Network infrastructure. The number of incidents is approximately 20000 per month Problem Statement: • Analyzing of all Security Incidents and reporting is not possible with only 2 resources, lot of genuine incidents are not being reported and further remediated. • Other category of Security Incidents are going unreported • Drop in performance of SSIM due to High Database utilization • Unwanted escalations due to False Positives Goal Statement: • Identify and reduce security incidents in all categories • All categories of security incidents to be monitored • Improve the SSIM tool performance & database utilization LEAN PROJECT OVERVIEW Business: < - - Omitted - - > Stakeholders: < - - Omitted - - > Metrics Impacted: Alerting of Critical Incidents Methodology Used: Mistake Proofing, MUDA In scope: Monitoring of Security incidents Out scope: Remediation of Security incidents Improvements: False positives eliminated and only genuine incidents reported that are monitored and RCA identified for each incident
  • 3. Post Lean Process: • Reduction in number of security incidents reported • RCA can be provided for all incidents in top 5 categories • Better FTE Utilization with focus on all Security incidents • Most False positives eliminated Advantages: • Reduction in False positive alarms • All Incidents can be monitored due to lower volume • RCA for all security incidents and status Report – Timely Fashion • Time Reduced for monitoring all incidents and maintaining daily tracker Lessons Learned: False Positives can be kept to a minimum if we fine-tune rules/queries and exclude authentic devices. Saved time can be used for value added initiatives in the process. MUDA in Monitoring can be avoided by simple tweaking and customization of monitored parameters Pre Lean Process: • Many security incidents were unreported • Difficult to monitor huge volume of security incidents under all categories on SSIM • Delay in monitoring due to drop in system performance Implementation Details: • Redundant Rules and incidents were deleted • Authorized devices were white listed, rules were tweaked/fine tuned to get genuine incidents • Increased rigor in remediation of infections and follow-up for installation of patches Process Controls: Daily monitoring of all incidents What is a False Positive in case of Security Incidents? Any Official ISS Scanner / Qualys / ITAM / CA Unicenter servers being reported as a malicious source carrying out Intrusive scans on the network LEAN PROJECT DETAILS: INCIDENT REDUCTION
  • 4. Pre Lean 3 Mins 2 Mins 5 Mins Incident Count =550 Post Lean Incident Count =30 LEAN Action : Exclusion of all Official Vulnerability Scanners / ITAM / CA Unicenter servers from respective Rules Still 30 incidents occur due to either genuine cases or any new servers introduced E-mails are sent only for genuine incidents which is 5 VALUE STREAM MAPPING Send email for incidents with details Identify if it is a genuine incident Monitor the incidents Logon to Jump Box As per daily task list, need to monitor SSIM for incidents START STOP 3 Mins 2 Mins 5 Mins Send email for incidents with details Identify if it is a genuine incident Monitor the incidents Logon to Jump Box As per daily task list, need to monitor SSIM for incidents START STOP
  • 5. The Seven Deadly Wastes Motion Defects Inventory Transportation Overproduction Waiting MonitoringProcess Product People Pre-Lean Post-Lean 550 incidents per day pertaining to different categories which is a high volume Entire shift spent on the monitoring of all the security incident Incidents out of any Official ISS Scanner/ Qualys, ITAM / CA Unicenter servers being reported as a malicious source carrying out Intrusive scans on the network are eliminated, resulting in only few incidents Misses in monitoring of all other security incidents Timely monitoring and RCA for all security incidents Total time spent per day = 545*5 + 5*10= 2775 man mins Total time spent per day = 25*5 + 5*10 =175 man mins spend per day to monitor all incidents MUDA ANALYSIS
  • 6. Pre LEAN Post LEAN Item Time in Hrs FTE Available time per month (22 * 8) 176 Time Spent on incident analysis per month (Pre LEAN) 1035.98 Time Spent on incident analysis post incident reduction per month (Post LEAN) 64.24 Effort Saved out of LEAN (Hrs/Month) 971.74 FTE saved 5.51 Cost Savings on FTE Avoidance per annum $ 291522 Compliance : Better focus on analyzing all threats /security incidents due to elimination of false positives Productivity Saving : 971.74 hrs/month Item Time in Hrs Average no. of incidents per day 550 Time taken for analysis of 545 incidents (545*5 mins) per day 46.25 Time taken on sending mails for genuine incidents (5*10 mins) per day 0.84 Total Time taken per month (22*47.09 hrs) 1035.98 Item Time in Hrs Average no. of incidents per day 30 Time taken for 30 incidents per day (25*5 + 5*10) 2.92 Total Time taken per month (22 * 2.92 ) 64.24 BENEFIT QUANTIFICATION
  • 7. QUESTIONS / FEEDBACK If you have a question or a feedback related to LEAN Implementation, do write to Sagnik Pal at sagnik.pal@gmail.com