SlideShare a Scribd company logo
Compiled by Paresh Thakkar CISM, MBA
Based on an original article in CSO FORUM by Paul Kenyon
Background
• Computer networks are complicated and keeping them
secure depends on a multitude of factors. However at
the core of these activities are administrative rights
that make it possible to fundamentally alter the
configuration of the desktop PC, its applications and
network linkages
• A slight error by an admin can result in malicious code
getting installed and running on the company server,
potentially compromising the company network.
• Once a problem occurs, it often unravels into a
downward spiral taking your business and reputation –
down with it.
2© Paresh Thakkar CISM, CEH, ECSA, MBA email: pcthakkar@gmail.com
Why this presentation?
• These 10 steps would help mitigate your
organisation’s risk that mostly revolve around
taking “Least Privilege” approach, meaning
end-users can perform their jobs with ease,
but without threatening organisation’s
security.
• Here are 10 steps that you can take towards
making “Least Privilege” a reality
3© Paresh Thakkar CISM, CEH, ECSA, MBA email: pcthakkar@gmail.com
• Operating systems work based on certain files
and folders that are within the Windows folder,
and registry…If these are modified without IT
department knowledge, the system can become
unstable, and the chances of Data Leakage
increase. IT should be made accountable and
responsible to control what applications a user
can install, or change.
• Regular evaluation of security risks, combined
with application whitelisting is essential in
providing an extra layer of defence.
4© Paresh Thakkar CISM, CEH, ECSA, MBA email: pcthakkar@gmail.com
• The proliferation of personal devices into the
workplace has increased complexity and cost of
defence for an organisation. Create a balance of
personal and corporate devices, and even have
role based eligibility model.
• If an employee justifies the use of a device, the
onus is on the organisation to establish its
compliance with company policy, with clear
matrix of support responsibility, and business
continuity in event of loss of device
5© Paresh Thakkar CISM, CEH, ECSA, MBA email: pcthakkar@gmail.com
• Lock down machines so users can only change
their desktop config. NOT THE CORE system –
this also reduces support calls and costs.
• Move to managed services, eg. use Microsoft
Group Policy, and Microsoft System Centre.
• These enable effective deployment of services
such as automated patch management and
software distribution/updates
6© Paresh Thakkar CISM, CEH, ECSA, MBA email: pcthakkar@gmail.com
• Security is often seen as too limiting for users
if not well-planned and implemented.
• You can actually improve the user experience
and give privilige back to users who were
previously excessively limited.
• Give users feedback on activities, rather than
completely blocking them from resources. This
would lower calls to the helpdesk, thereby
lowering support costs.
7© Paresh Thakkar CISM, CEH, ECSA, MBA email: pcthakkar@gmail.com
• Ask yourself – have I maximised the use of Active
directory in my organisation? It can be used very
effectively to derive higher efficiencies and productivity
of employee time.
• More Granular control of user activities is possible,
without adversely impacting them, thereby boosting
productivity.
• Mobile device Management solutions help comply
with company policies even with personal devices. Use
them to ensure personal devices do not leak corporate
data. Have a standard minimum configuration of
devices published.
8© Paresh Thakkar CISM, CEH, ECSA, MBA email: pcthakkar@gmail.com
• Excess admin privilege == Lost Productivity
• User who does not understand how much
power his comp+admin rights have, can be a
severe threat to your network…think Denial of
service, flood of traffic, spambot and what
not…
• Least privilege environment increases stability
of the network as well as quality of traffic on
the network
9© Paresh Thakkar CISM, CEH, ECSA, MBA email: pcthakkar@gmail.com
• Research about all compliances that your
organisation need to comply with. This will
reduce regulatory penalties. All compliance
directly or indirectly impose the minimum
privilige to complete everyday tasks.
• Eg. PCI DSS [Payment card Industry Data security
standard] states that the organisation must
ensure that privileged user IDs are restricted to
the least amount of privilege needed to perform
their jobs.
10© Paresh Thakkar CISM, CEH, ECSA, MBA email: pcthakkar@gmail.com
• Help educate the employee about safe
computing and acceptable use policy.
• Make public posters about possible threats
around them, make them visible in public
areas such as the utilities, pantry, canteen etc.
• This also helps build customer confidence,
increase reputation of the organisation, and
goodwill.
11© Paresh Thakkar CISM, CEH, ECSA, MBA email: pcthakkar@gmail.com
• Simply put, secure and managed systems are
cheaper to support, thus making security a
business enabler, rather than a cost/expense
• Publish knowledge base, Process, Work-Flows on
need to know basis, so panic calls to help desk
are avoided. Self Help systems definitely reduce
support costs.
• Continuous incremental approach to security
would see continuous reduction in support costs.
12© Paresh Thakkar CISM, CEH, ECSA, MBA email: pcthakkar@gmail.com
• As discussed in Step 1, unauthorised and uncatalogued
config changes can be disastrous. As it is, systems are
complex. Simplify by removing any local administrative
rights, intregate systems in a central active directory,
enforce group policy centrally, without which network
access is disallowed.
• Give flexibility to line of business applications, NOT the
core Operating system.
• Build a centrally available store of approved
applications that can be installed. These can be for all
the types of devices in your organisation: Blackberry,
Android, Iphone, Windows, Java etc.
13© Paresh Thakkar CISM, CEH, ECSA, MBA email: pcthakkar@gmail.com
SO, WE REDUCE INSIDER THREAT BY:
1 • REGULARLY EVALUATE RISKS
2 • MINIMISE DEVICES
3 • MOVE TO MANAGED ENVIRONMENT
4 • IMPROVE END-USER EXPERIENCE
5 • MAXIMISE THE ACTIVE DIRECTORY
6 • IMPROVE NETWORK UPTIME
7 • REGULATORY COMPLIANCE
8 • DEMONSTRATE DUE DELIGENCE
9 • ANALYSE SUPPORT COST
10 • REDUCE COMPLEXITY
14© Paresh Thakkar CISM, CEH, ECSA, MBA email: pcthakkar@gmail.com
ENDNOTE
Organisations need to leverage least privilege management to
achieve a smart balance for an IT environment where
everyone can be productive while remaining secure.
It all boils down to a logical decision:
Do you want the best of both the worlds, productivity and
security?
15
PRODUCTIVITY SECURITY
© Paresh Thakkar CISM, CEH, ECSA, MBA email: pcthakkar@gmail.com
I AM REACHABLE ON
PCTHAKKAR @ GMAIL . COM
16
@pcthakkar/pcthakkar
© Paresh Thakkar CISM, CEH, ECSA, MBA email: pcthakkar@gmail.com

More Related Content

What's hot

It msp white paper
It msp white paperIt msp white paper
How to Calculate ROI for Network Management & Monitoring
How to Calculate ROI for Network Management & MonitoringHow to Calculate ROI for Network Management & Monitoring
How to Calculate ROI for Network Management & Monitoring
SolarWinds
 
Cloud vs on premise guide
Cloud vs on premise guideCloud vs on premise guide
Cloud vs on premise guide
Kaizenlogcom
 
Advanced 365 SME - Disaster recovery
Advanced 365 SME - Disaster recoveryAdvanced 365 SME - Disaster recovery
Advanced 365 SME - Disaster recovery
Lee Power
 
managed-it-services
managed-it-servicesmanaged-it-services
managed-it-services
www.itcorp.com.au
 
BOSS deploy presentation
BOSS deploy presentationBOSS deploy presentation
BOSS deploy presentation
Sue Baxter
 
The System Administrator Role in the Cloud Era: Better Than Ever (ENT212) | A...
The System Administrator Role in the Cloud Era: Better Than Ever (ENT212) | A...The System Administrator Role in the Cloud Era: Better Than Ever (ENT212) | A...
The System Administrator Role in the Cloud Era: Better Than Ever (ENT212) | A...
Amazon Web Services
 
Project Proposal - Improving Employee Efficiency
Project Proposal - Improving Employee EfficiencyProject Proposal - Improving Employee Efficiency
Project Proposal - Improving Employee Efficiency
Megan B. McDaniel
 
Level Up to a Seamless End-User Experience
Level Up to a Seamless End-User ExperienceLevel Up to a Seamless End-User Experience
Level Up to a Seamless End-User Experience
VMware
 
Fixes that fail: Decommissioning
Fixes that fail: DecommissioningFixes that fail: Decommissioning
Fixes that fail: Decommissioning
Systems Thinking IT
 
Business Continuation The Basics
Business Continuation   The BasicsBusiness Continuation   The Basics
Business Continuation The Basics
guest13df88e8
 
Group 4 Networks Assessment Outline
Group 4 Networks Assessment OutlineGroup 4 Networks Assessment Outline
Group 4 Networks Assessment Outline
dgrubisa
 
Expetec Company Overview
Expetec Company OverviewExpetec Company Overview
Expetec Company Overview
expetec
 
Ch01
Ch01Ch01
The Five Myths of Cloud-Based Disaster Recovery
The Five Myths of Cloud-Based Disaster Recovery The Five Myths of Cloud-Based Disaster Recovery
The Five Myths of Cloud-Based Disaster Recovery
Axcient
 
Executive Primer on Business Continuity Planning
Executive Primer on Business Continuity PlanningExecutive Primer on Business Continuity Planning
Executive Primer on Business Continuity Planning
RickMark
 
On designing and deploying internet scale services
On designing and deploying internet scale servicesOn designing and deploying internet scale services
On designing and deploying internet scale services
billowqiu
 
Power of the Platform: Andy Walker, BMC Software
Power of the Platform: Andy Walker, BMC SoftwarePower of the Platform: Andy Walker, BMC Software
Power of the Platform: Andy Walker, BMC Software
BMC Software
 
NiTO Ebook
NiTO EbookNiTO Ebook
NiTO Ebook
NiTOROMInc
 
Silver_Pro_Active_email
Silver_Pro_Active_emailSilver_Pro_Active_email
Silver_Pro_Active_email
Jeff Stoodley
 

What's hot (20)

It msp white paper
It msp white paperIt msp white paper
It msp white paper
 
How to Calculate ROI for Network Management & Monitoring
How to Calculate ROI for Network Management & MonitoringHow to Calculate ROI for Network Management & Monitoring
How to Calculate ROI for Network Management & Monitoring
 
Cloud vs on premise guide
Cloud vs on premise guideCloud vs on premise guide
Cloud vs on premise guide
 
Advanced 365 SME - Disaster recovery
Advanced 365 SME - Disaster recoveryAdvanced 365 SME - Disaster recovery
Advanced 365 SME - Disaster recovery
 
managed-it-services
managed-it-servicesmanaged-it-services
managed-it-services
 
BOSS deploy presentation
BOSS deploy presentationBOSS deploy presentation
BOSS deploy presentation
 
The System Administrator Role in the Cloud Era: Better Than Ever (ENT212) | A...
The System Administrator Role in the Cloud Era: Better Than Ever (ENT212) | A...The System Administrator Role in the Cloud Era: Better Than Ever (ENT212) | A...
The System Administrator Role in the Cloud Era: Better Than Ever (ENT212) | A...
 
Project Proposal - Improving Employee Efficiency
Project Proposal - Improving Employee EfficiencyProject Proposal - Improving Employee Efficiency
Project Proposal - Improving Employee Efficiency
 
Level Up to a Seamless End-User Experience
Level Up to a Seamless End-User ExperienceLevel Up to a Seamless End-User Experience
Level Up to a Seamless End-User Experience
 
Fixes that fail: Decommissioning
Fixes that fail: DecommissioningFixes that fail: Decommissioning
Fixes that fail: Decommissioning
 
Business Continuation The Basics
Business Continuation   The BasicsBusiness Continuation   The Basics
Business Continuation The Basics
 
Group 4 Networks Assessment Outline
Group 4 Networks Assessment OutlineGroup 4 Networks Assessment Outline
Group 4 Networks Assessment Outline
 
Expetec Company Overview
Expetec Company OverviewExpetec Company Overview
Expetec Company Overview
 
Ch01
Ch01Ch01
Ch01
 
The Five Myths of Cloud-Based Disaster Recovery
The Five Myths of Cloud-Based Disaster Recovery The Five Myths of Cloud-Based Disaster Recovery
The Five Myths of Cloud-Based Disaster Recovery
 
Executive Primer on Business Continuity Planning
Executive Primer on Business Continuity PlanningExecutive Primer on Business Continuity Planning
Executive Primer on Business Continuity Planning
 
On designing and deploying internet scale services
On designing and deploying internet scale servicesOn designing and deploying internet scale services
On designing and deploying internet scale services
 
Power of the Platform: Andy Walker, BMC Software
Power of the Platform: Andy Walker, BMC SoftwarePower of the Platform: Andy Walker, BMC Software
Power of the Platform: Andy Walker, BMC Software
 
NiTO Ebook
NiTO EbookNiTO Ebook
NiTO Ebook
 
Silver_Pro_Active_email
Silver_Pro_Active_emailSilver_Pro_Active_email
Silver_Pro_Active_email
 

Viewers also liked

AG Resume 2015
AG Resume 2015AG Resume 2015
AG Resume 2015
Goll Sirleaf
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
viimsikool
 
Preventing zero day cyber attacks
Preventing zero day cyber attacksPreventing zero day cyber attacks
Preventing zero day cyber attacks
Paresh Thakkar
 
CismPrepGuide
CismPrepGuideCismPrepGuide
CismPrepGuide
statisense
 
Cism course ppt
Cism course pptCism course ppt
Cism course ppt
sophiarock123
 
Fateh Jhang Field Report
Fateh Jhang Field ReportFateh Jhang Field Report
Fateh Jhang Field Report
AHMAD GHANI
 
Ammmmmmmuuuuuullllll
AmmmmmmmuuuuuullllllAmmmmmmmuuuuuullllll
Ammmmmmmuuuuuullllll
vishdhwani
 
Vet in - Edicion N°3
Vet in - Edicion N°3Vet in - Edicion N°3
Vet in - Edicion N°3
Agrovet Market Animal Health
 
Industry rfid in container yards
Industry   rfid in container yardsIndustry   rfid in container yards
Industry rfid in container yards
Paresh Thakkar
 
Day 4 mansehra balakot road section
Day 4 mansehra balakot road sectionDay 4 mansehra balakot road section
Day 4 mansehra balakot road section
kashif008
 
introducción curso de ozono
introducción curso de ozonointroducción curso de ozono
introducción curso de ozono
ZONE LIFE/OZONOVET ozonoterapia
 
William Diederich - Security Certifications: Are They Worth the Investment? A...
William Diederich - Security Certifications: Are They Worth the Investment? A...William Diederich - Security Certifications: Are They Worth the Investment? A...
William Diederich - Security Certifications: Are They Worth the Investment? A...
centralohioissa
 
Margalla hills field report
Margalla hills field reportMargalla hills field report
Margalla hills field report
AHMAD GHANI
 
Self Presentation
Self PresentationSelf Presentation
Self Presentation
PIYUSH BAJAJ
 
Soft Skills For Engineers
Soft Skills For EngineersSoft Skills For Engineers
Soft Skills For Engineers
Dr.Edward Anand.E
 
Personality of Technical Communicators
Personality of Technical CommunicatorsPersonality of Technical Communicators
Personality of Technical Communicators
Deborah E-S Hemstreet
 
Location Based Services Verhaert
Location Based Services VerhaertLocation Based Services Verhaert
Location Based Services Verhaert
Verhaert Masters in Innovation
 
My Thesis
My ThesisMy Thesis

Viewers also liked (18)

AG Resume 2015
AG Resume 2015AG Resume 2015
AG Resume 2015
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Preventing zero day cyber attacks
Preventing zero day cyber attacksPreventing zero day cyber attacks
Preventing zero day cyber attacks
 
CismPrepGuide
CismPrepGuideCismPrepGuide
CismPrepGuide
 
Cism course ppt
Cism course pptCism course ppt
Cism course ppt
 
Fateh Jhang Field Report
Fateh Jhang Field ReportFateh Jhang Field Report
Fateh Jhang Field Report
 
Ammmmmmmuuuuuullllll
AmmmmmmmuuuuuullllllAmmmmmmmuuuuuullllll
Ammmmmmmuuuuuullllll
 
Vet in - Edicion N°3
Vet in - Edicion N°3Vet in - Edicion N°3
Vet in - Edicion N°3
 
Industry rfid in container yards
Industry   rfid in container yardsIndustry   rfid in container yards
Industry rfid in container yards
 
Day 4 mansehra balakot road section
Day 4 mansehra balakot road sectionDay 4 mansehra balakot road section
Day 4 mansehra balakot road section
 
introducción curso de ozono
introducción curso de ozonointroducción curso de ozono
introducción curso de ozono
 
William Diederich - Security Certifications: Are They Worth the Investment? A...
William Diederich - Security Certifications: Are They Worth the Investment? A...William Diederich - Security Certifications: Are They Worth the Investment? A...
William Diederich - Security Certifications: Are They Worth the Investment? A...
 
Margalla hills field report
Margalla hills field reportMargalla hills field report
Margalla hills field report
 
Self Presentation
Self PresentationSelf Presentation
Self Presentation
 
Soft Skills For Engineers
Soft Skills For EngineersSoft Skills For Engineers
Soft Skills For Engineers
 
Personality of Technical Communicators
Personality of Technical CommunicatorsPersonality of Technical Communicators
Personality of Technical Communicators
 
Location Based Services Verhaert
Location Based Services VerhaertLocation Based Services Verhaert
Location Based Services Verhaert
 
My Thesis
My ThesisMy Thesis
My Thesis
 

Similar to Top 10 steps towards eliminating inside threats by paresh thakkar

5 Reasons Why IT Managed Services in Washington, DC, Are the Best.pdf
5 Reasons Why IT Managed Services in Washington, DC, Are the Best.pdf5 Reasons Why IT Managed Services in Washington, DC, Are the Best.pdf
5 Reasons Why IT Managed Services in Washington, DC, Are the Best.pdf
BerryHughes
 
NLOGIX
NLOGIXNLOGIX
Best practices-in-lifecycle-management-white-paper-15663
Best practices-in-lifecycle-management-white-paper-15663Best practices-in-lifecycle-management-white-paper-15663
Best practices-in-lifecycle-management-white-paper-15663
dbrea
 
ISS CAPSTONE TEAM
ISS CAPSTONE TEAMISS CAPSTONE TEAM
ISS CAPSTONE TEAM
Jonathan Fuller
 
Puppet automated config_mgmt
Puppet automated config_mgmtPuppet automated config_mgmt
Puppet automated config_mgmt
uNIX Jim
 
More
MoreMore
Risk aware query replacement approach for secure databases performance manage...
Risk aware query replacement approach for secure databases performance manage...Risk aware query replacement approach for secure databases performance manage...
Risk aware query replacement approach for secure databases performance manage...
LeMeniz Infotech
 
Brighttalk brining it all together - final
Brighttalk   brining it all together - finalBrighttalk   brining it all together - final
Brighttalk brining it all together - final
Andrew White
 
NG-Brochure
NG-BrochureNG-Brochure
NG-Brochure
Trevor Gordon
 
The New Rules For IT Security - SME's
The New Rules For IT Security - SME'sThe New Rules For IT Security - SME's
The New Rules For IT Security - SME's
Bright Technology
 
NARCA Presentation - IT Best Practice
NARCA Presentation - IT Best PracticeNARCA Presentation - IT Best Practice
NARCA Presentation - IT Best Practice
Brenda Majewski
 
How to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackHow to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT Stack
ThousandEyes
 
How to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackHow to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT Stack
ThousandEyes
 
Ppt Template
Ppt TemplatePpt Template
Ppt Template
papdev
 
CMMS Basics and Beyond: How to Get the Most Out of Maintenance Management Sof...
CMMS Basics and Beyond: How to Get the Most Out of Maintenance Management Sof...CMMS Basics and Beyond: How to Get the Most Out of Maintenance Management Sof...
CMMS Basics and Beyond: How to Get the Most Out of Maintenance Management Sof...
Margeaux Girardin
 
UnitOnePresentationSlides.pptx
UnitOnePresentationSlides.pptxUnitOnePresentationSlides.pptx
UnitOnePresentationSlides.pptx
BLACKSPAROW
 
Best practices in networks and infrastructure
Best practices in networks and infrastructureBest practices in networks and infrastructure
Best practices in networks and infrastructure
nicholas njoroge
 
The Advantages and Pitfalls of Data Centre Consolidation
The Advantages and Pitfalls of Data Centre ConsolidationThe Advantages and Pitfalls of Data Centre Consolidation
The Advantages and Pitfalls of Data Centre Consolidation
DAYWATCHER.COM
 
Zinia managed services brochure
Zinia managed services brochureZinia managed services brochure
Zinia managed services brochure
David Pereira
 
MIS.pptx
MIS.pptxMIS.pptx
MIS.pptx
Pradeep Jangra
 

Similar to Top 10 steps towards eliminating inside threats by paresh thakkar (20)

5 Reasons Why IT Managed Services in Washington, DC, Are the Best.pdf
5 Reasons Why IT Managed Services in Washington, DC, Are the Best.pdf5 Reasons Why IT Managed Services in Washington, DC, Are the Best.pdf
5 Reasons Why IT Managed Services in Washington, DC, Are the Best.pdf
 
NLOGIX
NLOGIXNLOGIX
NLOGIX
 
Best practices-in-lifecycle-management-white-paper-15663
Best practices-in-lifecycle-management-white-paper-15663Best practices-in-lifecycle-management-white-paper-15663
Best practices-in-lifecycle-management-white-paper-15663
 
ISS CAPSTONE TEAM
ISS CAPSTONE TEAMISS CAPSTONE TEAM
ISS CAPSTONE TEAM
 
Puppet automated config_mgmt
Puppet automated config_mgmtPuppet automated config_mgmt
Puppet automated config_mgmt
 
More
MoreMore
More
 
Risk aware query replacement approach for secure databases performance manage...
Risk aware query replacement approach for secure databases performance manage...Risk aware query replacement approach for secure databases performance manage...
Risk aware query replacement approach for secure databases performance manage...
 
Brighttalk brining it all together - final
Brighttalk   brining it all together - finalBrighttalk   brining it all together - final
Brighttalk brining it all together - final
 
NG-Brochure
NG-BrochureNG-Brochure
NG-Brochure
 
The New Rules For IT Security - SME's
The New Rules For IT Security - SME'sThe New Rules For IT Security - SME's
The New Rules For IT Security - SME's
 
NARCA Presentation - IT Best Practice
NARCA Presentation - IT Best PracticeNARCA Presentation - IT Best Practice
NARCA Presentation - IT Best Practice
 
How to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackHow to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT Stack
 
How to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackHow to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT Stack
 
Ppt Template
Ppt TemplatePpt Template
Ppt Template
 
CMMS Basics and Beyond: How to Get the Most Out of Maintenance Management Sof...
CMMS Basics and Beyond: How to Get the Most Out of Maintenance Management Sof...CMMS Basics and Beyond: How to Get the Most Out of Maintenance Management Sof...
CMMS Basics and Beyond: How to Get the Most Out of Maintenance Management Sof...
 
UnitOnePresentationSlides.pptx
UnitOnePresentationSlides.pptxUnitOnePresentationSlides.pptx
UnitOnePresentationSlides.pptx
 
Best practices in networks and infrastructure
Best practices in networks and infrastructureBest practices in networks and infrastructure
Best practices in networks and infrastructure
 
The Advantages and Pitfalls of Data Centre Consolidation
The Advantages and Pitfalls of Data Centre ConsolidationThe Advantages and Pitfalls of Data Centre Consolidation
The Advantages and Pitfalls of Data Centre Consolidation
 
Zinia managed services brochure
Zinia managed services brochureZinia managed services brochure
Zinia managed services brochure
 
MIS.pptx
MIS.pptxMIS.pptx
MIS.pptx
 

Recently uploaded

NewBase 20 June 2024 Energy News issue - 1731 by Khaled Al Awadi_compressed.pdf
NewBase 20 June 2024  Energy News issue - 1731 by Khaled Al Awadi_compressed.pdfNewBase 20 June 2024  Energy News issue - 1731 by Khaled Al Awadi_compressed.pdf
NewBase 20 June 2024 Energy News issue - 1731 by Khaled Al Awadi_compressed.pdf
Khaled Al Awadi
 
Dpboss Satta Matta Matka Kalyan Chart Indian Matka
Dpboss Satta Matta Matka Kalyan Chart Indian MatkaDpboss Satta Matta Matka Kalyan Chart Indian Matka
Dpboss Satta Matta Matka Kalyan Chart Indian Matka
Dpboss Matka
 
❽❽❻❼❼❻❻❸❾❻ DPBOSS NET SPBOSS SATTA MATKA RESULT KALYAN MATKA GUESSING FREE KA...
❽❽❻❼❼❻❻❸❾❻ DPBOSS NET SPBOSS SATTA MATKA RESULT KALYAN MATKA GUESSING FREE KA...❽❽❻❼❼❻❻❸❾❻ DPBOSS NET SPBOSS SATTA MATKA RESULT KALYAN MATKA GUESSING FREE KA...
❽❽❻❼❼❻❻❸❾❻ DPBOSS NET SPBOSS SATTA MATKA RESULT KALYAN MATKA GUESSING FREE KA...
essorprof62
 
TriStar Gold Corporate Presentation - June 2024
TriStar Gold Corporate Presentation - June 2024TriStar Gold Corporate Presentation - June 2024
TriStar Gold Corporate Presentation - June 2024
Adnet Communications
 
PDT 99 - $3.5M - Seed - Feel Therapeutics.pdf
PDT 99 - $3.5M - Seed - Feel Therapeutics.pdfPDT 99 - $3.5M - Seed - Feel Therapeutics.pdf
PDT 99 - $3.5M - Seed - Feel Therapeutics.pdf
HajeJanKamps
 
L'indice de performance des ports à conteneurs de l'année 2023
L'indice de performance des ports à conteneurs de l'année 2023L'indice de performance des ports à conteneurs de l'année 2023
L'indice de performance des ports à conteneurs de l'année 2023
SPATPortToamasina
 
Lukas Rycek - GreenChemForCE - project structure.pptx
Lukas Rycek - GreenChemForCE - project structure.pptxLukas Rycek - GreenChemForCE - project structure.pptx
Lukas Rycek - GreenChemForCE - project structure.pptx
pavelborek
 
IMG_20240615_091110.pdf dpboss guessing
IMG_20240615_091110.pdf dpboss  guessingIMG_20240615_091110.pdf dpboss  guessing
Stainless Steel Conveyor Manufacturers Chennai
Stainless Steel Conveyor Manufacturers ChennaiStainless Steel Conveyor Manufacturers Chennai
Stainless Steel Conveyor Manufacturers Chennai
ConveyorSystem
 
Satta Matka Dpboss Kalyan Matka Results Kalyan Chart
Satta Matka Dpboss Kalyan Matka Results Kalyan ChartSatta Matka Dpboss Kalyan Matka Results Kalyan Chart
Satta Matka Dpboss Kalyan Matka Results Kalyan Chart
Satta Matka Dpboss Kalyan Matka Results
 
High-Quality IPTV Monthly Subscription for $15
High-Quality IPTV Monthly Subscription for $15High-Quality IPTV Monthly Subscription for $15
High-Quality IPTV Monthly Subscription for $15
advik4387
 
Kanban Coaching Exchange with Dave White - Example SDR Report
Kanban Coaching Exchange with Dave White - Example SDR ReportKanban Coaching Exchange with Dave White - Example SDR Report
Kanban Coaching Exchange with Dave White - Example SDR Report
Helen Meek
 
Easy Earnings Through Refer and Earn Apps Without KYC.pptx
Easy Earnings Through Refer and Earn Apps Without KYC.pptxEasy Earnings Through Refer and Earn Apps Without KYC.pptx
Easy Earnings Through Refer and Earn Apps Without KYC.pptx
Fx Lotus
 
Satta Matka Dpboss Kalyan Matka Results Kalyan Chart
Satta Matka Dpboss Kalyan Matka Results Kalyan ChartSatta Matka Dpboss Kalyan Matka Results Kalyan Chart
Satta Matka Dpboss Kalyan Matka Results Kalyan Chart
Satta Matka Dpboss Kalyan Matka Results
 
Satta Matka Dpboss Kalyan Matka Results Kalyan Chart
Satta Matka Dpboss Kalyan Matka Results Kalyan ChartSatta Matka Dpboss Kalyan Matka Results Kalyan Chart
Satta Matka Dpboss Kalyan Matka Results Kalyan Chart
Satta Matka Dpboss Kalyan Matka Results
 
Sustainable Logistics for Cost Reduction_ IPLTech Electric's Eco-Friendly Tra...
Sustainable Logistics for Cost Reduction_ IPLTech Electric's Eco-Friendly Tra...Sustainable Logistics for Cost Reduction_ IPLTech Electric's Eco-Friendly Tra...
Sustainable Logistics for Cost Reduction_ IPLTech Electric's Eco-Friendly Tra...
IPLTech Electric
 
Science Around Us Module 2 Matter Around Us
Science Around Us Module 2 Matter Around UsScience Around Us Module 2 Matter Around Us
Science Around Us Module 2 Matter Around Us
PennapaKeavsiri
 
AI Transformation Playbook: Thinking AI-First for Your Business
AI Transformation Playbook: Thinking AI-First for Your BusinessAI Transformation Playbook: Thinking AI-First for Your Business
AI Transformation Playbook: Thinking AI-First for Your Business
Arijit Dutta
 
Adani Group's Active Interest In Increasing Its Presence in the Cement Manufa...
Adani Group's Active Interest In Increasing Its Presence in the Cement Manufa...Adani Group's Active Interest In Increasing Its Presence in the Cement Manufa...
Adani Group's Active Interest In Increasing Its Presence in the Cement Manufa...
Adani case
 
deft. 2024 pricing guide for onboarding
deft.  2024 pricing guide for onboardingdeft.  2024 pricing guide for onboarding
deft. 2024 pricing guide for onboarding
hello960827
 

Recently uploaded (20)

NewBase 20 June 2024 Energy News issue - 1731 by Khaled Al Awadi_compressed.pdf
NewBase 20 June 2024  Energy News issue - 1731 by Khaled Al Awadi_compressed.pdfNewBase 20 June 2024  Energy News issue - 1731 by Khaled Al Awadi_compressed.pdf
NewBase 20 June 2024 Energy News issue - 1731 by Khaled Al Awadi_compressed.pdf
 
Dpboss Satta Matta Matka Kalyan Chart Indian Matka
Dpboss Satta Matta Matka Kalyan Chart Indian MatkaDpboss Satta Matta Matka Kalyan Chart Indian Matka
Dpboss Satta Matta Matka Kalyan Chart Indian Matka
 
❽❽❻❼❼❻❻❸❾❻ DPBOSS NET SPBOSS SATTA MATKA RESULT KALYAN MATKA GUESSING FREE KA...
❽❽❻❼❼❻❻❸❾❻ DPBOSS NET SPBOSS SATTA MATKA RESULT KALYAN MATKA GUESSING FREE KA...❽❽❻❼❼❻❻❸❾❻ DPBOSS NET SPBOSS SATTA MATKA RESULT KALYAN MATKA GUESSING FREE KA...
❽❽❻❼❼❻❻❸❾❻ DPBOSS NET SPBOSS SATTA MATKA RESULT KALYAN MATKA GUESSING FREE KA...
 
TriStar Gold Corporate Presentation - June 2024
TriStar Gold Corporate Presentation - June 2024TriStar Gold Corporate Presentation - June 2024
TriStar Gold Corporate Presentation - June 2024
 
PDT 99 - $3.5M - Seed - Feel Therapeutics.pdf
PDT 99 - $3.5M - Seed - Feel Therapeutics.pdfPDT 99 - $3.5M - Seed - Feel Therapeutics.pdf
PDT 99 - $3.5M - Seed - Feel Therapeutics.pdf
 
L'indice de performance des ports à conteneurs de l'année 2023
L'indice de performance des ports à conteneurs de l'année 2023L'indice de performance des ports à conteneurs de l'année 2023
L'indice de performance des ports à conteneurs de l'année 2023
 
Lukas Rycek - GreenChemForCE - project structure.pptx
Lukas Rycek - GreenChemForCE - project structure.pptxLukas Rycek - GreenChemForCE - project structure.pptx
Lukas Rycek - GreenChemForCE - project structure.pptx
 
IMG_20240615_091110.pdf dpboss guessing
IMG_20240615_091110.pdf dpboss  guessingIMG_20240615_091110.pdf dpboss  guessing
IMG_20240615_091110.pdf dpboss guessing
 
Stainless Steel Conveyor Manufacturers Chennai
Stainless Steel Conveyor Manufacturers ChennaiStainless Steel Conveyor Manufacturers Chennai
Stainless Steel Conveyor Manufacturers Chennai
 
Satta Matka Dpboss Kalyan Matka Results Kalyan Chart
Satta Matka Dpboss Kalyan Matka Results Kalyan ChartSatta Matka Dpboss Kalyan Matka Results Kalyan Chart
Satta Matka Dpboss Kalyan Matka Results Kalyan Chart
 
High-Quality IPTV Monthly Subscription for $15
High-Quality IPTV Monthly Subscription for $15High-Quality IPTV Monthly Subscription for $15
High-Quality IPTV Monthly Subscription for $15
 
Kanban Coaching Exchange with Dave White - Example SDR Report
Kanban Coaching Exchange with Dave White - Example SDR ReportKanban Coaching Exchange with Dave White - Example SDR Report
Kanban Coaching Exchange with Dave White - Example SDR Report
 
Easy Earnings Through Refer and Earn Apps Without KYC.pptx
Easy Earnings Through Refer and Earn Apps Without KYC.pptxEasy Earnings Through Refer and Earn Apps Without KYC.pptx
Easy Earnings Through Refer and Earn Apps Without KYC.pptx
 
Satta Matka Dpboss Kalyan Matka Results Kalyan Chart
Satta Matka Dpboss Kalyan Matka Results Kalyan ChartSatta Matka Dpboss Kalyan Matka Results Kalyan Chart
Satta Matka Dpboss Kalyan Matka Results Kalyan Chart
 
Satta Matka Dpboss Kalyan Matka Results Kalyan Chart
Satta Matka Dpboss Kalyan Matka Results Kalyan ChartSatta Matka Dpboss Kalyan Matka Results Kalyan Chart
Satta Matka Dpboss Kalyan Matka Results Kalyan Chart
 
Sustainable Logistics for Cost Reduction_ IPLTech Electric's Eco-Friendly Tra...
Sustainable Logistics for Cost Reduction_ IPLTech Electric's Eco-Friendly Tra...Sustainable Logistics for Cost Reduction_ IPLTech Electric's Eco-Friendly Tra...
Sustainable Logistics for Cost Reduction_ IPLTech Electric's Eco-Friendly Tra...
 
Science Around Us Module 2 Matter Around Us
Science Around Us Module 2 Matter Around UsScience Around Us Module 2 Matter Around Us
Science Around Us Module 2 Matter Around Us
 
AI Transformation Playbook: Thinking AI-First for Your Business
AI Transformation Playbook: Thinking AI-First for Your BusinessAI Transformation Playbook: Thinking AI-First for Your Business
AI Transformation Playbook: Thinking AI-First for Your Business
 
Adani Group's Active Interest In Increasing Its Presence in the Cement Manufa...
Adani Group's Active Interest In Increasing Its Presence in the Cement Manufa...Adani Group's Active Interest In Increasing Its Presence in the Cement Manufa...
Adani Group's Active Interest In Increasing Its Presence in the Cement Manufa...
 
deft. 2024 pricing guide for onboarding
deft.  2024 pricing guide for onboardingdeft.  2024 pricing guide for onboarding
deft. 2024 pricing guide for onboarding
 

Top 10 steps towards eliminating inside threats by paresh thakkar

  • 1. Compiled by Paresh Thakkar CISM, MBA Based on an original article in CSO FORUM by Paul Kenyon
  • 2. Background • Computer networks are complicated and keeping them secure depends on a multitude of factors. However at the core of these activities are administrative rights that make it possible to fundamentally alter the configuration of the desktop PC, its applications and network linkages • A slight error by an admin can result in malicious code getting installed and running on the company server, potentially compromising the company network. • Once a problem occurs, it often unravels into a downward spiral taking your business and reputation – down with it. 2© Paresh Thakkar CISM, CEH, ECSA, MBA email: pcthakkar@gmail.com
  • 3. Why this presentation? • These 10 steps would help mitigate your organisation’s risk that mostly revolve around taking “Least Privilege” approach, meaning end-users can perform their jobs with ease, but without threatening organisation’s security. • Here are 10 steps that you can take towards making “Least Privilege” a reality 3© Paresh Thakkar CISM, CEH, ECSA, MBA email: pcthakkar@gmail.com
  • 4. • Operating systems work based on certain files and folders that are within the Windows folder, and registry…If these are modified without IT department knowledge, the system can become unstable, and the chances of Data Leakage increase. IT should be made accountable and responsible to control what applications a user can install, or change. • Regular evaluation of security risks, combined with application whitelisting is essential in providing an extra layer of defence. 4© Paresh Thakkar CISM, CEH, ECSA, MBA email: pcthakkar@gmail.com
  • 5. • The proliferation of personal devices into the workplace has increased complexity and cost of defence for an organisation. Create a balance of personal and corporate devices, and even have role based eligibility model. • If an employee justifies the use of a device, the onus is on the organisation to establish its compliance with company policy, with clear matrix of support responsibility, and business continuity in event of loss of device 5© Paresh Thakkar CISM, CEH, ECSA, MBA email: pcthakkar@gmail.com
  • 6. • Lock down machines so users can only change their desktop config. NOT THE CORE system – this also reduces support calls and costs. • Move to managed services, eg. use Microsoft Group Policy, and Microsoft System Centre. • These enable effective deployment of services such as automated patch management and software distribution/updates 6© Paresh Thakkar CISM, CEH, ECSA, MBA email: pcthakkar@gmail.com
  • 7. • Security is often seen as too limiting for users if not well-planned and implemented. • You can actually improve the user experience and give privilige back to users who were previously excessively limited. • Give users feedback on activities, rather than completely blocking them from resources. This would lower calls to the helpdesk, thereby lowering support costs. 7© Paresh Thakkar CISM, CEH, ECSA, MBA email: pcthakkar@gmail.com
  • 8. • Ask yourself – have I maximised the use of Active directory in my organisation? It can be used very effectively to derive higher efficiencies and productivity of employee time. • More Granular control of user activities is possible, without adversely impacting them, thereby boosting productivity. • Mobile device Management solutions help comply with company policies even with personal devices. Use them to ensure personal devices do not leak corporate data. Have a standard minimum configuration of devices published. 8© Paresh Thakkar CISM, CEH, ECSA, MBA email: pcthakkar@gmail.com
  • 9. • Excess admin privilege == Lost Productivity • User who does not understand how much power his comp+admin rights have, can be a severe threat to your network…think Denial of service, flood of traffic, spambot and what not… • Least privilege environment increases stability of the network as well as quality of traffic on the network 9© Paresh Thakkar CISM, CEH, ECSA, MBA email: pcthakkar@gmail.com
  • 10. • Research about all compliances that your organisation need to comply with. This will reduce regulatory penalties. All compliance directly or indirectly impose the minimum privilige to complete everyday tasks. • Eg. PCI DSS [Payment card Industry Data security standard] states that the organisation must ensure that privileged user IDs are restricted to the least amount of privilege needed to perform their jobs. 10© Paresh Thakkar CISM, CEH, ECSA, MBA email: pcthakkar@gmail.com
  • 11. • Help educate the employee about safe computing and acceptable use policy. • Make public posters about possible threats around them, make them visible in public areas such as the utilities, pantry, canteen etc. • This also helps build customer confidence, increase reputation of the organisation, and goodwill. 11© Paresh Thakkar CISM, CEH, ECSA, MBA email: pcthakkar@gmail.com
  • 12. • Simply put, secure and managed systems are cheaper to support, thus making security a business enabler, rather than a cost/expense • Publish knowledge base, Process, Work-Flows on need to know basis, so panic calls to help desk are avoided. Self Help systems definitely reduce support costs. • Continuous incremental approach to security would see continuous reduction in support costs. 12© Paresh Thakkar CISM, CEH, ECSA, MBA email: pcthakkar@gmail.com
  • 13. • As discussed in Step 1, unauthorised and uncatalogued config changes can be disastrous. As it is, systems are complex. Simplify by removing any local administrative rights, intregate systems in a central active directory, enforce group policy centrally, without which network access is disallowed. • Give flexibility to line of business applications, NOT the core Operating system. • Build a centrally available store of approved applications that can be installed. These can be for all the types of devices in your organisation: Blackberry, Android, Iphone, Windows, Java etc. 13© Paresh Thakkar CISM, CEH, ECSA, MBA email: pcthakkar@gmail.com
  • 14. SO, WE REDUCE INSIDER THREAT BY: 1 • REGULARLY EVALUATE RISKS 2 • MINIMISE DEVICES 3 • MOVE TO MANAGED ENVIRONMENT 4 • IMPROVE END-USER EXPERIENCE 5 • MAXIMISE THE ACTIVE DIRECTORY 6 • IMPROVE NETWORK UPTIME 7 • REGULATORY COMPLIANCE 8 • DEMONSTRATE DUE DELIGENCE 9 • ANALYSE SUPPORT COST 10 • REDUCE COMPLEXITY 14© Paresh Thakkar CISM, CEH, ECSA, MBA email: pcthakkar@gmail.com
  • 15. ENDNOTE Organisations need to leverage least privilege management to achieve a smart balance for an IT environment where everyone can be productive while remaining secure. It all boils down to a logical decision: Do you want the best of both the worlds, productivity and security? 15 PRODUCTIVITY SECURITY © Paresh Thakkar CISM, CEH, ECSA, MBA email: pcthakkar@gmail.com
  • 16. I AM REACHABLE ON PCTHAKKAR @ GMAIL . COM 16 @pcthakkar/pcthakkar © Paresh Thakkar CISM, CEH, ECSA, MBA email: pcthakkar@gmail.com