SlideShare a Scribd company logo
SMB270 Security Essentials for ITSM
Ian Aitchison, Sr Product Director
Alan Taylor, Director Sales Engineering
Security Essentials for ITSM
Closing the Gap Between Security and IT Operations
Continually maintaining a secure IT environment requires proactive best practice security activities to ensure ongoing security. In addition,
cybersecurity attacks are on the rise, resulting in high-impact breaches that demand responses. ITSM can play a part in detecting and responding
appropriately to breaches or threats. From security incident management to coordination and communication with the security team, learn how to
identify impacts, reduce risks, and deliver security controls and improvements while still maintaining end-user productivity.
Chaos
Reactive
Proactive
Optimized
Everybody Wants (or should want) to get from Reactive to Proactive
Prevention is Better than Cure
Chaos
FIRE HAZARD
Reactive
USE TOOLS TO
PREVENT,
DETECT, REACT
Proactive
DO IT PROPERLY
Tools monitor and
adjust in the way
you need to avoid
needing cure
Guidance on how
to use tools
to do the job
is Better
A maturity model of maturity models!
How mature are different IT functions
Ian Opinion
Chaos
Reactive
Proactive
Optimized
Security
ITSM
ITIL
ITAM
IAITAM BPL
DevOps
Because IT Security is about more than just
Detect, Prevent and Correct
Security and ITSM?
Yeah that’s just all SIM, right?
Secure Incident Management?
Why SIM is NOT ENOUGH
Computer security incident management is a specialized form of incident
management, the primary purpose of which is the development of a well
understood and predictable response to damaging events and computer
intrusions. Incident management requires a process and
a response team which follows this process.
ITIL 2011 activities and processes
Service Strategy
Continual Service
Improvement
Service
Operations
Service
Transition
Service Design
Financial
Management
Demand
Management
Strategy
Operations
Service Portfolio
Management
Service Level
Management
Availability
Management
Capacity
Management
Continuity
Management
Information
Security
Management
Service Catalog
Management
Supplier
Management
Change
Management
Service Asset
Config Mgmt
Release & Deploy
Management
Transition
Support and
Planning
Service
Validation and
Testing
Evaluation
Knowledge
Management
Service Desk
Incident
Management
Problem
Management
Access
Management
Event
Management
Request
Fulfillment
Process
Improvement
Tech Mgmnt
App Mgmnt
IT Ops Mgmnt
Key
Process
Function
WHERE’S
SECURITY?
EVERYWHERE!!
SIM
Security is in ITIL These are the Information Security Management sub-processes and their
process objectives:
Design of Security Controls
Process Objective: To design appropriate technical and organizational
measures in order to ensure the confidentiality, integrity, security
and availability of an organization's assets, information, data and
services.
Security Testing
Process Objective: To make sure that all security mechanisms are
subject to regular testing.
Management of Security Incidents
Process Objective: To detect and fight attacks and intrusions, and to
minimize the damage incurred by security breaches.
Security Review
Process Objective: To review if security measures and procedures are
still in line with risk perceptions from the business side, and to
verify if those measures and procedures are regularly maintained
and tested.
Get Over IT
Yeah but….
Security Controls Security Incidents
Security Testing Security Review
Security Changes
Security Improvement
ITIL GETS IT WRONG
Data security over IT security
(doesn’t worry about hacks, firewall gaps, virus, ransomware etc).
Just cares about ‘is the data in a secure position’ or not
Does not specify technical components required in place
(patch, whitelist, blacklist, threat detection etc etc)
Security is not just Something We Do
Security is also How We Do Everything We Do
ITIL 2011 activities and processes
Service Strategy
Continual Service
Improvement
Service
Operations
Service
Transition
Service Design
Financial
Management
Demand
Management
Strategy
Operations
Service Portfolio
Management
Service Level
Management
Availability
Management
Capacity
Management
Continuity
Management
Information
Security
Management
Service Catalog
Management
Supplier
Management
Change
Management
Service Asset
Config Mgmt
Release & Deploy
Management
Transition
Support and
Planning
Service
Validation and
Testing
Evaluation
Knowledge
Management
Service Desk
Incident
Management
Problem
Management
Access
Management
Event
Management
Request
Fulfillment
Process
Improvement
Tech Mgmnt
App Mgmnt
IT Ops Mgmnt
Key
Process
Function
WHERE’S
SECURITY?
EVERYWHERE!!
Warren Buffett
Cyber Resiliance?
https://www.axelos.com/resilia/what-is-resilia
1.4.5 A definition of cyber resilience
Good cyber resilience is a complete, collaborative approach
driven by the board but involving everyone in the organization
and extending to the supply chain, partners and customers. To
balance the cyber risks faced by the business against the
opportunities and competitive advantages it can gain, effective
cyber resilience requires an enterprise-wide risk-based
strategy that proactively manages the vulnerabilities, threats,
risks and impacts on its critical information and supporting assets.
It also involves moving away from strategies that seek solely to
prevent attacks on assets to ones that include preparing for, and
recovering from, a cyber-attack.
Resilia
The critical elements of effective cyber resilience include:
●● Clear board-level ownership and responsibility for cyber resilience
●● The adoption of tailored learning and development for all staff. This in turn will establish:
●● A clear understanding of what the organization’s critical assets are,
especially with regard to information
●● A clear view of the organization’s key threats and vulnerabilities arising
from their environment, including that of their customers, partners and supply chain
●● The adoption of a common language used by all stakeholders in the
organization
●● An assessment of the organization’s cyber resilience maturity and design of
appropriate, prioritized and proportionate plans using best-practice guidance
●● An appropriate balance of controls to prevent, detect and correct.
Tools Are Good
Event
Management
Incident
Management
Major
Incident
Management
Major Breach
Response
Security
Assessment
Business
Education
Governance
and
Compliance
Security
Knowledge
Standard
Scorecards
and
Dashboards
ITSM Security Package
ITSM Security
Automatically receive detected alerts from
monitoring tools. Create ITSM ‘event’
processes with automated response
and corrective actions.
Follows ITSM Event Mgnt guidelines.
May link to Incident Management
eg, new virus detected in 25% of
machines, do we want to do
something?
Event
Management
ITSM Security
Security Incident : creation and predefined response,
escalation and resolution processes from within
service desk, from email, from self service, from voice
etc. Aligns with ITSM best practice incident
management.
May create Major Incident.
eg “I have a virus error message”, “Is this a phishing
email?”
Incident
Management
ITSM Security
Predefined Major Incident
workflow – notification, escalation,
communication, automation.
Significant business impact from
current security event
Major
Incident
Management
ITSM Security
Business response to Breach (Press,
WebSite, Internal Comms)
May be linked to Major Incident.
“We’ve been hacked!”
Major Breach
Response
ITSM Security
Planned, scheduled security
assessment exercise – internal or
external, includes assignment and
completion of corrective actions.
Vulnerability assessments, pen tests.
Security
Assessment
ITSM Security
Self Service and Knowledge
published guidelines,
recommendations and advice to
business users. Security
personal assessment and user
training tracking.
“access your security
awareness documentation and
training here”
Business
Education
ITSM Security
Reports and Evidence
data captured
automatically to ensure
compliance with GRC
requirements and
standards.
PCI, HIPAA etc
Governance
and
Compliance
ITSM Security
Latest alerts, news, best
practice, advice, warning
from the broader industry
into searchable security
knowledge base
Security
Knowledge
ITSM Security
Predefined scorecards
and dashboards for
industry security
frameworks, plus
complete business
security posture
Standard
Scorecards
and
Dashboards
Event
Management
Incident
Management
Major
Incident
Management
Major Breach
Response
Security
Assessment
Business
Education
Governance
and
Compliance
Security
Knowledge
Standard
Scorecards
and
Dashboards
ITSM Security Package
Metrics
Source : cyber resilience and ITSM, Alexos
Learn More
▪Resilia
▪ISO/IEC 27001
▪NIST
▪ITIL
▪ISO/IEC 20000
Source : cyber resilience and ITSM, Alexos
Demo time
Demo Time
1 - Event Management = Automatic Security Alert/Incident from
external monitoring tools
2 - Breach Reaction = controlled response sequence to major
security breach
3 - Dashboard - all types of security activity in one place
ALAN - what can you
do here?
Security in ITSM, also consider
▪ User record – has been security trained
▪ Change and Release – Security risk assess, security change approve
▪ Knowledge – article types ‘security’ for IT and the Business
▪ Self Service – EndUser security status, security news, security
assessments
▪ Service improvement – better secure posture is improvement too!
▪ Resolution cause – security issue?
▪ Problem Management – root cause. Eliminate future security incidents
▪ Also – is your ITSM tool secure? Often public facing, what security,
password, auditing in place?
Key Takeaways
Next Actions
SMB270: Security Essentials for ITSM

More Related Content

What's hot

Connection can help keep your business secure!
Connection can help keep your business secure!Connection can help keep your business secure!
Connection can help keep your business secure!
Heather Salmons Newswanger
 
Information Security - Back to Basics - Own Your Vulnerabilities
Information Security - Back to Basics - Own Your VulnerabilitiesInformation Security - Back to Basics - Own Your Vulnerabilities
Information Security - Back to Basics - Own Your Vulnerabilities
Jack Nichelson
 
Supplement To Student Guide Seminar 03 A 3 Nov09
Supplement To Student Guide   Seminar 03 A 3 Nov09Supplement To Student Guide   Seminar 03 A 3 Nov09
Supplement To Student Guide Seminar 03 A 3 Nov09
Tammy Clark
 
The security risk management guide
The security risk management guideThe security risk management guide
The security risk management guideSergey Erohin
 
Practical approach to security risk management
Practical approach to security risk managementPractical approach to security risk management
Practical approach to security risk management
G3 intelligence Ltd
 
Build an Information Security Strategy
Build an Information Security StrategyBuild an Information Security Strategy
Build an Information Security Strategy
Andrew Byers
 
Information Security Governance: Concepts, Security Management & Metrics
Information Security Governance: Concepts, Security Management & MetricsInformation Security Governance: Concepts, Security Management & Metrics
Information Security Governance: Concepts, Security Management & Metrics
OxfordCambridge
 
Security Organization/ Infrastructure
Security Organization/ InfrastructureSecurity Organization/ Infrastructure
Security Organization/ InfrastructurePriyank Hada
 
Information Security Maturity Model
Information Security Maturity ModelInformation Security Maturity Model
Information Security Maturity Model
CSCJournals
 
Enterprise Security Critical Security Functions version 1.0
Enterprise Security Critical Security Functions version 1.0Enterprise Security Critical Security Functions version 1.0
Enterprise Security Critical Security Functions version 1.0
Marc-Andre Heroux
 
IBM Security Strategy Overview
IBM Security Strategy OverviewIBM Security Strategy Overview
IBM Security Strategy Overview
xband
 
Business case for information security program
Business case for information security programBusiness case for information security program
Business case for information security programWilliam Godwin
 
Information security management iso27001
Information security management iso27001Information security management iso27001
Information security management iso27001
Hiran Kanishka
 
Security Risk Management: ovvero come mitigare e gestire i rischi dei dati at...
Security Risk Management: ovvero come mitigare e gestire i rischi dei dati at...Security Risk Management: ovvero come mitigare e gestire i rischi dei dati at...
Security Risk Management: ovvero come mitigare e gestire i rischi dei dati at...
festival ICT 2016
 
Security Maturity Assessment
Security Maturity AssessmentSecurity Maturity Assessment
Security Maturity AssessmentClaude Baudoin
 
Risk management ISO 27001 Standard
Risk management ISO 27001 StandardRisk management ISO 27001 Standard
Risk management ISO 27001 Standard
Tharindunuwan9
 
Information Security Governance and Strategy
Information Security Governance and Strategy Information Security Governance and Strategy
Information Security Governance and Strategy
Dam Frank
 

What's hot (20)

Security-Brochure
Security-BrochureSecurity-Brochure
Security-Brochure
 
Security-Brochure
Security-BrochureSecurity-Brochure
Security-Brochure
 
Connection can help keep your business secure!
Connection can help keep your business secure!Connection can help keep your business secure!
Connection can help keep your business secure!
 
Information Security - Back to Basics - Own Your Vulnerabilities
Information Security - Back to Basics - Own Your VulnerabilitiesInformation Security - Back to Basics - Own Your Vulnerabilities
Information Security - Back to Basics - Own Your Vulnerabilities
 
Supplement To Student Guide Seminar 03 A 3 Nov09
Supplement To Student Guide   Seminar 03 A 3 Nov09Supplement To Student Guide   Seminar 03 A 3 Nov09
Supplement To Student Guide Seminar 03 A 3 Nov09
 
The security risk management guide
The security risk management guideThe security risk management guide
The security risk management guide
 
Practical approach to security risk management
Practical approach to security risk managementPractical approach to security risk management
Practical approach to security risk management
 
Build an Information Security Strategy
Build an Information Security StrategyBuild an Information Security Strategy
Build an Information Security Strategy
 
Information Security Governance: Concepts, Security Management & Metrics
Information Security Governance: Concepts, Security Management & MetricsInformation Security Governance: Concepts, Security Management & Metrics
Information Security Governance: Concepts, Security Management & Metrics
 
Security Organization/ Infrastructure
Security Organization/ InfrastructureSecurity Organization/ Infrastructure
Security Organization/ Infrastructure
 
Information Security Maturity Model
Information Security Maturity ModelInformation Security Maturity Model
Information Security Maturity Model
 
Enterprise Security Critical Security Functions version 1.0
Enterprise Security Critical Security Functions version 1.0Enterprise Security Critical Security Functions version 1.0
Enterprise Security Critical Security Functions version 1.0
 
IBM Security Strategy Overview
IBM Security Strategy OverviewIBM Security Strategy Overview
IBM Security Strategy Overview
 
Business case for information security program
Business case for information security programBusiness case for information security program
Business case for information security program
 
Information security management iso27001
Information security management iso27001Information security management iso27001
Information security management iso27001
 
Security Risk Management: ovvero come mitigare e gestire i rischi dei dati at...
Security Risk Management: ovvero come mitigare e gestire i rischi dei dati at...Security Risk Management: ovvero come mitigare e gestire i rischi dei dati at...
Security Risk Management: ovvero come mitigare e gestire i rischi dei dati at...
 
Security Maturity Assessment
Security Maturity AssessmentSecurity Maturity Assessment
Security Maturity Assessment
 
Security Maturity Model
Security Maturity ModelSecurity Maturity Model
Security Maturity Model
 
Risk management ISO 27001 Standard
Risk management ISO 27001 StandardRisk management ISO 27001 Standard
Risk management ISO 27001 Standard
 
Information Security Governance and Strategy
Information Security Governance and Strategy Information Security Governance and Strategy
Information Security Governance and Strategy
 

Similar to SMB270: Security Essentials for ITSM

Solve the exercise in security management.pdf
Solve the exercise in security management.pdfSolve the exercise in security management.pdf
Solve the exercise in security management.pdf
sdfghj21
 
Mastering Cybersecurity Risk Management: Strategies to Safeguard Your Digital...
Mastering Cybersecurity Risk Management: Strategies to Safeguard Your Digital...Mastering Cybersecurity Risk Management: Strategies to Safeguard Your Digital...
Mastering Cybersecurity Risk Management: Strategies to Safeguard Your Digital...
cyberprosocial
 
Best Open Threat Management Platform in USA
Best Open Threat Management Platform in USABest Open Threat Management Platform in USA
Best Open Threat Management Platform in USA
CompanySeceon
 
Cybersecurity
Cybersecurity Cybersecurity
Cybersecurity
BernardinoMelgar1
 
Grupo 4 - TEMA II.pptx
Grupo 4  - TEMA II.pptxGrupo 4  - TEMA II.pptx
Grupo 4 - TEMA II.pptx
BernardinoMelgar1
 
Optimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to SuccessOptimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to Success
Sirius
 
Role management
Role managementRole management
Role management
Abidullah Zarghoon
 
Cybersecurity Audit
Cybersecurity AuditCybersecurity Audit
Cybersecurity Audit
EC-Council
 
IT Security Incident Response for Nonprofits
IT Security Incident Response for NonprofitsIT Security Incident Response for Nonprofits
IT Security Incident Response for Nonprofits
Community IT Innovators
 
The Crucial Role of Security Testing Services in Ensuring a Secure and Effici...
The Crucial Role of Security Testing Services in Ensuring a Secure and Effici...The Crucial Role of Security Testing Services in Ensuring a Secure and Effici...
The Crucial Role of Security Testing Services in Ensuring a Secure and Effici...
AmeliaJonas2
 
Small Business Playbook for Security and Compliance Success.pdf
Small Business Playbook for Security and Compliance Success.pdfSmall Business Playbook for Security and Compliance Success.pdf
Small Business Playbook for Security and Compliance Success.pdf
elizabethrdusek
 
Small Business Playbook for Security and Compliance Success.pptx
Small Business Playbook for Security and Compliance Success.pptxSmall Business Playbook for Security and Compliance Success.pptx
Small Business Playbook for Security and Compliance Success.pptx
elizabethrdusek
 
Infocon Bangladesh 2016
Infocon Bangladesh 2016Infocon Bangladesh 2016
Infocon Bangladesh 2016
Prime Infoserv
 
Strategic Insights on IT & Cyber Risk Assessments.pdf
Strategic Insights on IT & Cyber Risk Assessments.pdfStrategic Insights on IT & Cyber Risk Assessments.pdf
Strategic Insights on IT & Cyber Risk Assessments.pdf
lilabroughton259
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
Anil
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
Anil
 
Equilibrium Security Methodology 030414 Final v2
Equilibrium Security Methodology 030414 Final v2Equilibrium Security Methodology 030414 Final v2
Equilibrium Security Methodology 030414 Final v2marchharvey
 
Cyber risk management-white-paper-v8 (2) 2015
Cyber risk management-white-paper-v8 (2) 2015Cyber risk management-white-paper-v8 (2) 2015
Cyber risk management-white-paper-v8 (2) 2015
Accounting_Whitepapers
 
5 THREAT AND RISK ASSESSMENT APPROACHES.pptx
5 THREAT AND RISK ASSESSMENT APPROACHES.pptx5 THREAT AND RISK ASSESSMENT APPROACHES.pptx
5 THREAT AND RISK ASSESSMENT APPROACHES.pptx
Bluechip Gulf IT Services
 
CompTIA CySA Domain 5 Compliance and Assessment.pptx
CompTIA CySA Domain 5 Compliance and Assessment.pptxCompTIA CySA Domain 5 Compliance and Assessment.pptx
CompTIA CySA Domain 5 Compliance and Assessment.pptx
Infosectrain3
 

Similar to SMB270: Security Essentials for ITSM (20)

Solve the exercise in security management.pdf
Solve the exercise in security management.pdfSolve the exercise in security management.pdf
Solve the exercise in security management.pdf
 
Mastering Cybersecurity Risk Management: Strategies to Safeguard Your Digital...
Mastering Cybersecurity Risk Management: Strategies to Safeguard Your Digital...Mastering Cybersecurity Risk Management: Strategies to Safeguard Your Digital...
Mastering Cybersecurity Risk Management: Strategies to Safeguard Your Digital...
 
Best Open Threat Management Platform in USA
Best Open Threat Management Platform in USABest Open Threat Management Platform in USA
Best Open Threat Management Platform in USA
 
Cybersecurity
Cybersecurity Cybersecurity
Cybersecurity
 
Grupo 4 - TEMA II.pptx
Grupo 4  - TEMA II.pptxGrupo 4  - TEMA II.pptx
Grupo 4 - TEMA II.pptx
 
Optimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to SuccessOptimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to Success
 
Role management
Role managementRole management
Role management
 
Cybersecurity Audit
Cybersecurity AuditCybersecurity Audit
Cybersecurity Audit
 
IT Security Incident Response for Nonprofits
IT Security Incident Response for NonprofitsIT Security Incident Response for Nonprofits
IT Security Incident Response for Nonprofits
 
The Crucial Role of Security Testing Services in Ensuring a Secure and Effici...
The Crucial Role of Security Testing Services in Ensuring a Secure and Effici...The Crucial Role of Security Testing Services in Ensuring a Secure and Effici...
The Crucial Role of Security Testing Services in Ensuring a Secure and Effici...
 
Small Business Playbook for Security and Compliance Success.pdf
Small Business Playbook for Security and Compliance Success.pdfSmall Business Playbook for Security and Compliance Success.pdf
Small Business Playbook for Security and Compliance Success.pdf
 
Small Business Playbook for Security and Compliance Success.pptx
Small Business Playbook for Security and Compliance Success.pptxSmall Business Playbook for Security and Compliance Success.pptx
Small Business Playbook for Security and Compliance Success.pptx
 
Infocon Bangladesh 2016
Infocon Bangladesh 2016Infocon Bangladesh 2016
Infocon Bangladesh 2016
 
Strategic Insights on IT & Cyber Risk Assessments.pdf
Strategic Insights on IT & Cyber Risk Assessments.pdfStrategic Insights on IT & Cyber Risk Assessments.pdf
Strategic Insights on IT & Cyber Risk Assessments.pdf
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
 
Equilibrium Security Methodology 030414 Final v2
Equilibrium Security Methodology 030414 Final v2Equilibrium Security Methodology 030414 Final v2
Equilibrium Security Methodology 030414 Final v2
 
Cyber risk management-white-paper-v8 (2) 2015
Cyber risk management-white-paper-v8 (2) 2015Cyber risk management-white-paper-v8 (2) 2015
Cyber risk management-white-paper-v8 (2) 2015
 
5 THREAT AND RISK ASSESSMENT APPROACHES.pptx
5 THREAT AND RISK ASSESSMENT APPROACHES.pptx5 THREAT AND RISK ASSESSMENT APPROACHES.pptx
5 THREAT AND RISK ASSESSMENT APPROACHES.pptx
 
CompTIA CySA Domain 5 Compliance and Assessment.pptx
CompTIA CySA Domain 5 Compliance and Assessment.pptxCompTIA CySA Domain 5 Compliance and Assessment.pptx
CompTIA CySA Domain 5 Compliance and Assessment.pptx
 

More from Ivanti

Français Patch Tuesday - Mai
Français Patch Tuesday - MaiFrançais Patch Tuesday - Mai
Français Patch Tuesday - Mai
Ivanti
 
Patch Tuesday de Mayo
Patch Tuesday de MayoPatch Tuesday de Mayo
Patch Tuesday de Mayo
Ivanti
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
Ivanti
 
Patch Tuesday Italia Maggio
Patch Tuesday Italia MaggioPatch Tuesday Italia Maggio
Patch Tuesday Italia Maggio
Ivanti
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
Ivanti
 
Patch Tuesday de Abril
Patch Tuesday de AbrilPatch Tuesday de Abril
Patch Tuesday de Abril
Ivanti
 
Français Patch Tuesday - Avril
Français Patch Tuesday - AvrilFrançais Patch Tuesday - Avril
Français Patch Tuesday - Avril
Ivanti
 
Patch Tuesday Italia Aprile
Patch Tuesday Italia AprilePatch Tuesday Italia Aprile
Patch Tuesday Italia Aprile
Ivanti
 
Français Patch Tuesday - Mars
Français Patch Tuesday - MarsFrançais Patch Tuesday - Mars
Français Patch Tuesday - Mars
Ivanti
 
Patch Tuesday de Marzo
Patch Tuesday de MarzoPatch Tuesday de Marzo
Patch Tuesday de Marzo
Ivanti
 
Patch Tuesday Italia Marzo
Patch Tuesday Italia MarzoPatch Tuesday Italia Marzo
Patch Tuesday Italia Marzo
Ivanti
 
March Patch Tuesday
March Patch TuesdayMarch Patch Tuesday
March Patch Tuesday
Ivanti
 
Patch Tuesday de Febrero
Patch Tuesday de FebreroPatch Tuesday de Febrero
Patch Tuesday de Febrero
Ivanti
 
2024 Français Patch Tuesday - Février
2024 Français Patch Tuesday - Février2024 Français Patch Tuesday - Février
2024 Français Patch Tuesday - Février
Ivanti
 
Patch Tuesday Italia Febbraio
Patch Tuesday Italia FebbraioPatch Tuesday Italia Febbraio
Patch Tuesday Italia Febbraio
Ivanti
 
2024 February Patch Tuesday
2024 February Patch Tuesday2024 February Patch Tuesday
2024 February Patch Tuesday
Ivanti
 
2024 Enero Patch Tuesday
2024 Enero Patch Tuesday2024 Enero Patch Tuesday
2024 Enero Patch Tuesday
Ivanti
 
2024 Janvier Patch Tuesday
2024 Janvier Patch Tuesday2024 Janvier Patch Tuesday
2024 Janvier Patch Tuesday
Ivanti
 
2024 Gennaio Patch Tuesday
2024 Gennaio Patch Tuesday2024 Gennaio Patch Tuesday
2024 Gennaio Patch Tuesday
Ivanti
 
Patch Tuesday de Enero
Patch Tuesday de EneroPatch Tuesday de Enero
Patch Tuesday de Enero
Ivanti
 

More from Ivanti (20)

Français Patch Tuesday - Mai
Français Patch Tuesday - MaiFrançais Patch Tuesday - Mai
Français Patch Tuesday - Mai
 
Patch Tuesday de Mayo
Patch Tuesday de MayoPatch Tuesday de Mayo
Patch Tuesday de Mayo
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
Patch Tuesday Italia Maggio
Patch Tuesday Italia MaggioPatch Tuesday Italia Maggio
Patch Tuesday Italia Maggio
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Patch Tuesday de Abril
Patch Tuesday de AbrilPatch Tuesday de Abril
Patch Tuesday de Abril
 
Français Patch Tuesday - Avril
Français Patch Tuesday - AvrilFrançais Patch Tuesday - Avril
Français Patch Tuesday - Avril
 
Patch Tuesday Italia Aprile
Patch Tuesday Italia AprilePatch Tuesday Italia Aprile
Patch Tuesday Italia Aprile
 
Français Patch Tuesday - Mars
Français Patch Tuesday - MarsFrançais Patch Tuesday - Mars
Français Patch Tuesday - Mars
 
Patch Tuesday de Marzo
Patch Tuesday de MarzoPatch Tuesday de Marzo
Patch Tuesday de Marzo
 
Patch Tuesday Italia Marzo
Patch Tuesday Italia MarzoPatch Tuesday Italia Marzo
Patch Tuesday Italia Marzo
 
March Patch Tuesday
March Patch TuesdayMarch Patch Tuesday
March Patch Tuesday
 
Patch Tuesday de Febrero
Patch Tuesday de FebreroPatch Tuesday de Febrero
Patch Tuesday de Febrero
 
2024 Français Patch Tuesday - Février
2024 Français Patch Tuesday - Février2024 Français Patch Tuesday - Février
2024 Français Patch Tuesday - Février
 
Patch Tuesday Italia Febbraio
Patch Tuesday Italia FebbraioPatch Tuesday Italia Febbraio
Patch Tuesday Italia Febbraio
 
2024 February Patch Tuesday
2024 February Patch Tuesday2024 February Patch Tuesday
2024 February Patch Tuesday
 
2024 Enero Patch Tuesday
2024 Enero Patch Tuesday2024 Enero Patch Tuesday
2024 Enero Patch Tuesday
 
2024 Janvier Patch Tuesday
2024 Janvier Patch Tuesday2024 Janvier Patch Tuesday
2024 Janvier Patch Tuesday
 
2024 Gennaio Patch Tuesday
2024 Gennaio Patch Tuesday2024 Gennaio Patch Tuesday
2024 Gennaio Patch Tuesday
 
Patch Tuesday de Enero
Patch Tuesday de EneroPatch Tuesday de Enero
Patch Tuesday de Enero
 

Recently uploaded

Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus
 
Cyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdfCyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdf
Cyanic lab
 
Corporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMSCorporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMS
Tendenci - The Open Source AMS (Association Management Software)
 
Enhancing Project Management Efficiency_ Leveraging AI Tools like ChatGPT.pdf
Enhancing Project Management Efficiency_ Leveraging AI Tools like ChatGPT.pdfEnhancing Project Management Efficiency_ Leveraging AI Tools like ChatGPT.pdf
Enhancing Project Management Efficiency_ Leveraging AI Tools like ChatGPT.pdf
Jay Das
 
Large Language Models and the End of Programming
Large Language Models and the End of ProgrammingLarge Language Models and the End of Programming
Large Language Models and the End of Programming
Matt Welsh
 
A Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdfA Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdf
kalichargn70th171
 
A Sighting of filterA in Typelevel Rite of Passage
A Sighting of filterA in Typelevel Rite of PassageA Sighting of filterA in Typelevel Rite of Passage
A Sighting of filterA in Typelevel Rite of Passage
Philip Schwarz
 
BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024
Ortus Solutions, Corp
 
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, BetterWebinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
XfilesPro
 
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Globus
 
Into the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdfInto the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdf
Ortus Solutions, Corp
 
Understanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSageUnderstanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSage
Globus
 
How to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good PracticesHow to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good Practices
Globus
 
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
informapgpstrackings
 
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Mind IT Systems
 
RISE with SAP and Journey to the Intelligent Enterprise
RISE with SAP and Journey to the Intelligent EnterpriseRISE with SAP and Journey to the Intelligent Enterprise
RISE with SAP and Journey to the Intelligent Enterprise
Srikant77
 
AI Pilot Review: The World’s First Virtual Assistant Marketing Suite
AI Pilot Review: The World’s First Virtual Assistant Marketing SuiteAI Pilot Review: The World’s First Virtual Assistant Marketing Suite
AI Pilot Review: The World’s First Virtual Assistant Marketing Suite
Google
 
Enhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdfEnhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdf
Globus
 
May Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdfMay Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdf
Adele Miller
 
Prosigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology SolutionsProsigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology Solutions
Prosigns
 

Recently uploaded (20)

Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024
 
Cyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdfCyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdf
 
Corporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMSCorporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMS
 
Enhancing Project Management Efficiency_ Leveraging AI Tools like ChatGPT.pdf
Enhancing Project Management Efficiency_ Leveraging AI Tools like ChatGPT.pdfEnhancing Project Management Efficiency_ Leveraging AI Tools like ChatGPT.pdf
Enhancing Project Management Efficiency_ Leveraging AI Tools like ChatGPT.pdf
 
Large Language Models and the End of Programming
Large Language Models and the End of ProgrammingLarge Language Models and the End of Programming
Large Language Models and the End of Programming
 
A Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdfA Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdf
 
A Sighting of filterA in Typelevel Rite of Passage
A Sighting of filterA in Typelevel Rite of PassageA Sighting of filterA in Typelevel Rite of Passage
A Sighting of filterA in Typelevel Rite of Passage
 
BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024
 
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, BetterWebinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
 
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
 
Into the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdfInto the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdf
 
Understanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSageUnderstanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSage
 
How to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good PracticesHow to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good Practices
 
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
 
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...
 
RISE with SAP and Journey to the Intelligent Enterprise
RISE with SAP and Journey to the Intelligent EnterpriseRISE with SAP and Journey to the Intelligent Enterprise
RISE with SAP and Journey to the Intelligent Enterprise
 
AI Pilot Review: The World’s First Virtual Assistant Marketing Suite
AI Pilot Review: The World’s First Virtual Assistant Marketing SuiteAI Pilot Review: The World’s First Virtual Assistant Marketing Suite
AI Pilot Review: The World’s First Virtual Assistant Marketing Suite
 
Enhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdfEnhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdf
 
May Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdfMay Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdf
 
Prosigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology SolutionsProsigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology Solutions
 

SMB270: Security Essentials for ITSM

  • 1.
  • 2.
  • 3. SMB270 Security Essentials for ITSM Ian Aitchison, Sr Product Director Alan Taylor, Director Sales Engineering
  • 4. Security Essentials for ITSM Closing the Gap Between Security and IT Operations Continually maintaining a secure IT environment requires proactive best practice security activities to ensure ongoing security. In addition, cybersecurity attacks are on the rise, resulting in high-impact breaches that demand responses. ITSM can play a part in detecting and responding appropriately to breaches or threats. From security incident management to coordination and communication with the security team, learn how to identify impacts, reduce risks, and deliver security controls and improvements while still maintaining end-user productivity.
  • 5. Chaos Reactive Proactive Optimized Everybody Wants (or should want) to get from Reactive to Proactive
  • 6. Prevention is Better than Cure Chaos FIRE HAZARD Reactive USE TOOLS TO PREVENT, DETECT, REACT Proactive DO IT PROPERLY Tools monitor and adjust in the way you need to avoid needing cure
  • 7. Guidance on how to use tools to do the job is Better
  • 8. A maturity model of maturity models! How mature are different IT functions Ian Opinion Chaos Reactive Proactive Optimized Security ITSM ITIL ITAM IAITAM BPL DevOps
  • 9. Because IT Security is about more than just Detect, Prevent and Correct
  • 10.
  • 11. Security and ITSM? Yeah that’s just all SIM, right? Secure Incident Management?
  • 12. Why SIM is NOT ENOUGH Computer security incident management is a specialized form of incident management, the primary purpose of which is the development of a well understood and predictable response to damaging events and computer intrusions. Incident management requires a process and a response team which follows this process.
  • 13. ITIL 2011 activities and processes Service Strategy Continual Service Improvement Service Operations Service Transition Service Design Financial Management Demand Management Strategy Operations Service Portfolio Management Service Level Management Availability Management Capacity Management Continuity Management Information Security Management Service Catalog Management Supplier Management Change Management Service Asset Config Mgmt Release & Deploy Management Transition Support and Planning Service Validation and Testing Evaluation Knowledge Management Service Desk Incident Management Problem Management Access Management Event Management Request Fulfillment Process Improvement Tech Mgmnt App Mgmnt IT Ops Mgmnt Key Process Function WHERE’S SECURITY? EVERYWHERE!! SIM
  • 14. Security is in ITIL These are the Information Security Management sub-processes and their process objectives: Design of Security Controls Process Objective: To design appropriate technical and organizational measures in order to ensure the confidentiality, integrity, security and availability of an organization's assets, information, data and services. Security Testing Process Objective: To make sure that all security mechanisms are subject to regular testing. Management of Security Incidents Process Objective: To detect and fight attacks and intrusions, and to minimize the damage incurred by security breaches. Security Review Process Objective: To review if security measures and procedures are still in line with risk perceptions from the business side, and to verify if those measures and procedures are regularly maintained and tested.
  • 15. Get Over IT Yeah but…. Security Controls Security Incidents Security Testing Security Review Security Changes Security Improvement
  • 16. ITIL GETS IT WRONG Data security over IT security (doesn’t worry about hacks, firewall gaps, virus, ransomware etc). Just cares about ‘is the data in a secure position’ or not Does not specify technical components required in place (patch, whitelist, blacklist, threat detection etc etc)
  • 17. Security is not just Something We Do Security is also How We Do Everything We Do
  • 18. ITIL 2011 activities and processes Service Strategy Continual Service Improvement Service Operations Service Transition Service Design Financial Management Demand Management Strategy Operations Service Portfolio Management Service Level Management Availability Management Capacity Management Continuity Management Information Security Management Service Catalog Management Supplier Management Change Management Service Asset Config Mgmt Release & Deploy Management Transition Support and Planning Service Validation and Testing Evaluation Knowledge Management Service Desk Incident Management Problem Management Access Management Event Management Request Fulfillment Process Improvement Tech Mgmnt App Mgmnt IT Ops Mgmnt Key Process Function WHERE’S SECURITY? EVERYWHERE!!
  • 19.
  • 22. 1.4.5 A definition of cyber resilience Good cyber resilience is a complete, collaborative approach driven by the board but involving everyone in the organization and extending to the supply chain, partners and customers. To balance the cyber risks faced by the business against the opportunities and competitive advantages it can gain, effective cyber resilience requires an enterprise-wide risk-based strategy that proactively manages the vulnerabilities, threats, risks and impacts on its critical information and supporting assets. It also involves moving away from strategies that seek solely to prevent attacks on assets to ones that include preparing for, and recovering from, a cyber-attack.
  • 23. Resilia The critical elements of effective cyber resilience include: ●● Clear board-level ownership and responsibility for cyber resilience ●● The adoption of tailored learning and development for all staff. This in turn will establish: ●● A clear understanding of what the organization’s critical assets are, especially with regard to information ●● A clear view of the organization’s key threats and vulnerabilities arising from their environment, including that of their customers, partners and supply chain ●● The adoption of a common language used by all stakeholders in the organization ●● An assessment of the organization’s cyber resilience maturity and design of appropriate, prioritized and proportionate plans using best-practice guidance ●● An appropriate balance of controls to prevent, detect and correct.
  • 26. ITSM Security Automatically receive detected alerts from monitoring tools. Create ITSM ‘event’ processes with automated response and corrective actions. Follows ITSM Event Mgnt guidelines. May link to Incident Management eg, new virus detected in 25% of machines, do we want to do something? Event Management
  • 27. ITSM Security Security Incident : creation and predefined response, escalation and resolution processes from within service desk, from email, from self service, from voice etc. Aligns with ITSM best practice incident management. May create Major Incident. eg “I have a virus error message”, “Is this a phishing email?” Incident Management
  • 28. ITSM Security Predefined Major Incident workflow – notification, escalation, communication, automation. Significant business impact from current security event Major Incident Management
  • 29. ITSM Security Business response to Breach (Press, WebSite, Internal Comms) May be linked to Major Incident. “We’ve been hacked!” Major Breach Response
  • 30. ITSM Security Planned, scheduled security assessment exercise – internal or external, includes assignment and completion of corrective actions. Vulnerability assessments, pen tests. Security Assessment
  • 31. ITSM Security Self Service and Knowledge published guidelines, recommendations and advice to business users. Security personal assessment and user training tracking. “access your security awareness documentation and training here” Business Education
  • 32. ITSM Security Reports and Evidence data captured automatically to ensure compliance with GRC requirements and standards. PCI, HIPAA etc Governance and Compliance
  • 33. ITSM Security Latest alerts, news, best practice, advice, warning from the broader industry into searchable security knowledge base Security Knowledge
  • 34. ITSM Security Predefined scorecards and dashboards for industry security frameworks, plus complete business security posture Standard Scorecards and Dashboards
  • 36. Metrics Source : cyber resilience and ITSM, Alexos
  • 37. Learn More ▪Resilia ▪ISO/IEC 27001 ▪NIST ▪ITIL ▪ISO/IEC 20000 Source : cyber resilience and ITSM, Alexos
  • 39. Demo Time 1 - Event Management = Automatic Security Alert/Incident from external monitoring tools 2 - Breach Reaction = controlled response sequence to major security breach 3 - Dashboard - all types of security activity in one place ALAN - what can you do here?
  • 40. Security in ITSM, also consider ▪ User record – has been security trained ▪ Change and Release – Security risk assess, security change approve ▪ Knowledge – article types ‘security’ for IT and the Business ▪ Self Service – EndUser security status, security news, security assessments ▪ Service improvement – better secure posture is improvement too! ▪ Resolution cause – security issue? ▪ Problem Management – root cause. Eliminate future security incidents ▪ Also – is your ITSM tool secure? Often public facing, what security, password, auditing in place?