SlideShare a Scribd company logo
1 of 7
Download to read offline
Security Operations
How do we know that an organisation is
ready for security monitoring?
About Author
Stephen Raju
Lead GRC Analyst at Aleph Tav Technologies with more than 4 years of
experience in improving resilience in corporate and governmental organisations
through Information Security Consulting, Implementation, Operations and Audit.
You can reach me on:
https://www.linkedin.com/in/stephenrajuc
https://twitter.com/stephenrajuc
Bubble Highlight
How do i
know?
Am I ready for
Cyber Security
Monitoring
Do I need to be
monitored?
Why!?
Business owners as well as MSSPs need to find answers
to this question.
Business Owners:
Who - CEO, CTO, CISO.
What - Is our organisation ready for
cyber security monitoring?
Managed Security Service Provider:
Who – Pre-Sales, SOC Head.
What - Can I deliver value through
security monitoring service, to
someone who is not ready for
monitoring?
How do I check my readiness?
Three steps to assess your readiness for cyber security monitoring:
1.Does my business allow for security monitoring of IT infra?
2.Are IT solutions installed and configured as per industry best practices?
3.Do I have personnel to manage IT infrastructure continuously?
If YES to all three questions, you are ready to be monitored.
If NO, fill the gaps in consultation with a Security Service/Solution Provider.
Decision-making flowchart
IT Operations
allowed for Security
Monitoring
Re-configure
Yes
No
Yes
Implement IT
infrastructure
management
No
IT solutions
are configured
as per best
practices
Continuously
Managed by
IT personnel
No
Yes
Thank you 

More Related Content

Viewers also liked

Irrigation: making the most of your water
Irrigation: making the most of your waterIrrigation: making the most of your water
Irrigation: making the most of your waterCaleb M Carter
 
Stimulating Creativity
Stimulating CreativityStimulating Creativity
Stimulating CreativityMchamp08
 
Вулканы
ВулканыВулканы
ВулканыLotosPlay
 
Физиологические адаптации
Физиологические адаптацииФизиологические адаптации
Физиологические адаптацииLotosPlay
 
Дыхание растений
Дыхание растенийДыхание растений
Дыхание растенийLotosPlay
 
How to sell tickets to a charity function
How to sell tickets to a charity functionHow to sell tickets to a charity function
How to sell tickets to a charity functionAlison Breton
 
Water efficiency in cool season hay production
Water efficiency in cool season hay productionWater efficiency in cool season hay production
Water efficiency in cool season hay productionCaleb M Carter
 
Pesticide record keeping for the commercial applicator
Pesticide record keeping for the commercial applicatorPesticide record keeping for the commercial applicator
Pesticide record keeping for the commercial applicatorCaleb M Carter
 
Химический состав клетки
Химический состав клеткиХимический состав клетки
Химический состав клеткиLotosPlay
 
Планеты - гиганты
Планеты - гигантыПланеты - гиганты
Планеты - гигантыLotosPlay
 
My name is tony
My name is tonyMy name is tony
My name is tonymonobird
 
Строение стебля
Строение стебляСтроение стебля
Строение стебляLotosPlay
 

Viewers also liked (16)

Irrigation: making the most of your water
Irrigation: making the most of your waterIrrigation: making the most of your water
Irrigation: making the most of your water
 
Stimulating Creativity
Stimulating CreativityStimulating Creativity
Stimulating Creativity
 
Вулканы
ВулканыВулканы
Вулканы
 
97865113 carmen-de-posadas-kiwi (1)
97865113 carmen-de-posadas-kiwi (1)97865113 carmen-de-posadas-kiwi (1)
97865113 carmen-de-posadas-kiwi (1)
 
Физиологические адаптации
Физиологические адаптацииФизиологические адаптации
Физиологические адаптации
 
Дыхание растений
Дыхание растенийДыхание растений
Дыхание растений
 
Tugas SO2 muh. irwandi 10 332
Tugas SO2 muh. irwandi 10 332Tugas SO2 muh. irwandi 10 332
Tugas SO2 muh. irwandi 10 332
 
How to sell tickets to a charity function
How to sell tickets to a charity functionHow to sell tickets to a charity function
How to sell tickets to a charity function
 
Water efficiency in cool season hay production
Water efficiency in cool season hay productionWater efficiency in cool season hay production
Water efficiency in cool season hay production
 
How To Needle
How To NeedleHow To Needle
How To Needle
 
Pesticide record keeping for the commercial applicator
Pesticide record keeping for the commercial applicatorPesticide record keeping for the commercial applicator
Pesticide record keeping for the commercial applicator
 
Informatica
InformaticaInformatica
Informatica
 
Химический состав клетки
Химический состав клеткиХимический состав клетки
Химический состав клетки
 
Планеты - гиганты
Планеты - гигантыПланеты - гиганты
Планеты - гиганты
 
My name is tony
My name is tonyMy name is tony
My name is tony
 
Строение стебля
Строение стебляСтроение стебля
Строение стебля
 

Recently uploaded

Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfFIDO Alliance
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...ScyllaDB
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Hiroshi SHIBATA
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!Memoori
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfFIDO Alliance
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsLeah Henrickson
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...panagenda
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024Stephen Perrenod
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfFIDO Alliance
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessUXDXConf
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireExakis Nelite
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftshyamraj55
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch TuesdayIvanti
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptxFIDO Alliance
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...FIDO Alliance
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxFIDO Alliance
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctBrainSell Technologies
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxFIDO Alliance
 
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPTiSEO AI
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfFIDO Alliance
 

Recently uploaded (20)

Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoft
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 

Security Operations Readiness for Small companies

  • 1. Security Operations How do we know that an organisation is ready for security monitoring?
  • 2. About Author Stephen Raju Lead GRC Analyst at Aleph Tav Technologies with more than 4 years of experience in improving resilience in corporate and governmental organisations through Information Security Consulting, Implementation, Operations and Audit. You can reach me on: https://www.linkedin.com/in/stephenrajuc https://twitter.com/stephenrajuc
  • 3. Bubble Highlight How do i know? Am I ready for Cyber Security Monitoring Do I need to be monitored? Why!?
  • 4. Business owners as well as MSSPs need to find answers to this question. Business Owners: Who - CEO, CTO, CISO. What - Is our organisation ready for cyber security monitoring? Managed Security Service Provider: Who – Pre-Sales, SOC Head. What - Can I deliver value through security monitoring service, to someone who is not ready for monitoring?
  • 5. How do I check my readiness? Three steps to assess your readiness for cyber security monitoring: 1.Does my business allow for security monitoring of IT infra? 2.Are IT solutions installed and configured as per industry best practices? 3.Do I have personnel to manage IT infrastructure continuously? If YES to all three questions, you are ready to be monitored. If NO, fill the gaps in consultation with a Security Service/Solution Provider.
  • 6. Decision-making flowchart IT Operations allowed for Security Monitoring Re-configure Yes No Yes Implement IT infrastructure management No IT solutions are configured as per best practices Continuously Managed by IT personnel No Yes