SlideShare a Scribd company logo
UNCOVERING THE KEY TO A
SUCCESSFUL PSIM
INSTALLATION.
Dr. Bob Banerjee
Sr. DirectorTraining and Development, NICE Systems Inc.
Vision
 Contained, big picture buy-in, simple budget
 Ensure others share baby step strategy
 Trackable goals, justifies growth, deflect
pessimists
 Scope creep: complexity and priority
confusion. Operations
 Expect to expand scope post-rollout
 Vendor claims backed in writing
Interfaces
 Kid in a candy store
 Vendor API agreements – technical and
political hurdles. Beware ‘It can…’
 Build once, maintain forever
 Integration license fees
Rollout
 Broad impact. Comfort zone. Senior
reinforcement
 Phased rollout, incorporate lessons learned
 Low hanging fruit, early success, gain trust,
grow
The Life Cycle Of Security
Operations
Time
ResourceLevel
Prediction SituationalAwareness
Reconstruction /
Investigation
Situation Management
Datafication (Big Data generation)
Alarm Correlation from Big Data
Big Data Collection
Proactive Action
based on Big Data Similarity
Alarm Unification from Big Data
Big Data Mining (Identifying Insights)
Proactive Action
based on Big Data
Abnormality
November 19th – 21st
@psoce I www.psoce.com
Hilton Long Beach & Executive Meeting Center
2013
Port Security Operations Conference & Expo
PSOCE – LA I Long Beach
Training
 PSIM impacts processes, users change
behavior
 3-6m to 2-3d. Do prior to rollout to gain
confidence
 Attrition means retraining.
 Management movement requires re-
justification (what and why)
 Minor tweaks handled by local system admin
Maintenance
 Feeding
 Resources – user, consultant, SI and vendor
 Roles – sys admin, high level config, low level
config, interfaces
CAPTURE
CORRELATE & ANALYZE
NICEValue Prop
Optimizing Security Operations; Minimizing Risk; Improving Investigations
MANAGE
Real TimeOffline PSIM &
Situation
Management
Situator
Incident
Debriefing &
Investigation
Inform
Audio
Recording &
Management
Video
Management &
Analytics
NiceVision
Web
Insight
Why NICE
SECURITY
Key Benefits
SO WHAT CAN NICE DO FOR YOU…?
Faster
Response
Better
Awareness
Efficient Use of
Resources
False Alert
Reduction
Consistency in
Handling
Learning and
Improving
The Life Cycle Of Security
Operations
Time
ResourceLevel
Prediction SituationalAwareness
Reconstruction /
Investigation
Situation Management
Better
Awareness
False Alert
Reduction
Efficient Use of
Resources
Faster
Response
Consistency
in Handling
Learning and
Improving
Learning and
Improving
Return On Investment
ROI
 Shows value and creates interest
 Helps the ‘CSO’ convince internally
 Remove opposition and doubt
 Be customer specific
 Show potential savings based
on customer specific figures
 Use our success stories
 Tools at your disposal
 Internal case study decks
 ROI ppt
 ROI excel
Better
Awareness
Faster
Response
False Alert
Reduction
Efficient Use
of Resources
Consistency in
Handling
Learning and
Improving

More Related Content

What's hot

Cyber crime with privention
Cyber crime with privention Cyber crime with privention
Cyber crime with privention Manish Dixit Ceh
 
React Faster and Better: New Approaches for Advanced Incident Response
React Faster and Better: New Approaches for Advanced Incident ResponseReact Faster and Better: New Approaches for Advanced Incident Response
React Faster and Better: New Approaches for Advanced Incident ResponseSilvioPappalardo
 
Process Safety Blind Spots: EXPOSED [Infographic]
Process Safety Blind Spots: EXPOSED [Infographic]Process Safety Blind Spots: EXPOSED [Infographic]
Process Safety Blind Spots: EXPOSED [Infographic]Darwin Jayson Mariano
 
20th March Session Five by Ramesh Shanmughanathan
20th March Session Five by Ramesh Shanmughanathan20th March Session Five by Ramesh Shanmughanathan
20th March Session Five by Ramesh ShanmughanathanSharath Kumar
 
Ensuring Full Proof Security At Xero
Ensuring Full Proof Security At XeroEnsuring Full Proof Security At Xero
Ensuring Full Proof Security At XeroCraig Walker
 
Cyber Crisis Management - Kloudlearn
Cyber Crisis Management - KloudlearnCyber Crisis Management - Kloudlearn
Cyber Crisis Management - KloudlearnKloudLearn
 
Information Security Metrics - Practical Security Metrics
Information Security Metrics - Practical Security MetricsInformation Security Metrics - Practical Security Metrics
Information Security Metrics - Practical Security MetricsJack Nichelson
 
10 KEYS TO EFFECTIVE NETWORK SECURITY
10 KEYS TO EFFECTIVE NETWORK SECURITY10 KEYS TO EFFECTIVE NETWORK SECURITY
10 KEYS TO EFFECTIVE NETWORK SECURITYRazorpoint Security
 
Scammed: Defend Against Social Engineering
Scammed: Defend Against Social EngineeringScammed: Defend Against Social Engineering
Scammed: Defend Against Social EngineeringResolver Inc.
 
Cyber Defence - Service portfolio
Cyber Defence - Service portfolioCyber Defence - Service portfolio
Cyber Defence - Service portfolioKaloyan Krastev
 
Connecting the Dots Between Your Threat Tntelligence Tradecraft and Business ...
Connecting the Dots Between Your Threat Tntelligence Tradecraft and Business ...Connecting the Dots Between Your Threat Tntelligence Tradecraft and Business ...
Connecting the Dots Between Your Threat Tntelligence Tradecraft and Business ...SurfWatch Labs
 
Blue Coat Infographic: Proactive Incident response
Blue Coat Infographic: Proactive Incident response Blue Coat Infographic: Proactive Incident response
Blue Coat Infographic: Proactive Incident response Meriann Muraoka
 
Incident response
Incident responseIncident response
Incident responsebluecoatss
 
Behavior Based Safety System-Workplace Safety Training
Behavior Based Safety System-Workplace Safety TrainingBehavior Based Safety System-Workplace Safety Training
Behavior Based Safety System-Workplace Safety TrainingOnlineCompliance Panel
 
For Corporate Boards, a Cyber Security Top 10
For Corporate Boards, a Cyber Security Top 10For Corporate Boards, a Cyber Security Top 10
For Corporate Boards, a Cyber Security Top 10David X Martin
 
2 ppt final dan shoemaker dd1 stockholm presentation
2 ppt final dan shoemaker dd1 stockholm presentation2 ppt final dan shoemaker dd1 stockholm presentation
2 ppt final dan shoemaker dd1 stockholm presentationGlobalForum
 
7-lessons-learned-from-bsimm
7-lessons-learned-from-bsimm7-lessons-learned-from-bsimm
7-lessons-learned-from-bsimmMarie Peters
 
Six Mistakes of Log Management 2008
Six Mistakes of Log Management 2008Six Mistakes of Log Management 2008
Six Mistakes of Log Management 2008Anton Chuvakin
 

What's hot (20)

Cyber crime with privention
Cyber crime with privention Cyber crime with privention
Cyber crime with privention
 
React Faster and Better: New Approaches for Advanced Incident Response
React Faster and Better: New Approaches for Advanced Incident ResponseReact Faster and Better: New Approaches for Advanced Incident Response
React Faster and Better: New Approaches for Advanced Incident Response
 
Forrester Infographic
Forrester Infographic Forrester Infographic
Forrester Infographic
 
Process Safety Blind Spots: EXPOSED [Infographic]
Process Safety Blind Spots: EXPOSED [Infographic]Process Safety Blind Spots: EXPOSED [Infographic]
Process Safety Blind Spots: EXPOSED [Infographic]
 
20th March Session Five by Ramesh Shanmughanathan
20th March Session Five by Ramesh Shanmughanathan20th March Session Five by Ramesh Shanmughanathan
20th March Session Five by Ramesh Shanmughanathan
 
Ensuring Full Proof Security At Xero
Ensuring Full Proof Security At XeroEnsuring Full Proof Security At Xero
Ensuring Full Proof Security At Xero
 
Cyber Crisis Management - Kloudlearn
Cyber Crisis Management - KloudlearnCyber Crisis Management - Kloudlearn
Cyber Crisis Management - Kloudlearn
 
Information Security Metrics - Practical Security Metrics
Information Security Metrics - Practical Security MetricsInformation Security Metrics - Practical Security Metrics
Information Security Metrics - Practical Security Metrics
 
10 KEYS TO EFFECTIVE NETWORK SECURITY
10 KEYS TO EFFECTIVE NETWORK SECURITY10 KEYS TO EFFECTIVE NETWORK SECURITY
10 KEYS TO EFFECTIVE NETWORK SECURITY
 
Scammed: Defend Against Social Engineering
Scammed: Defend Against Social EngineeringScammed: Defend Against Social Engineering
Scammed: Defend Against Social Engineering
 
Cyber Defence - Service portfolio
Cyber Defence - Service portfolioCyber Defence - Service portfolio
Cyber Defence - Service portfolio
 
Sect f41
Sect f41Sect f41
Sect f41
 
Connecting the Dots Between Your Threat Tntelligence Tradecraft and Business ...
Connecting the Dots Between Your Threat Tntelligence Tradecraft and Business ...Connecting the Dots Between Your Threat Tntelligence Tradecraft and Business ...
Connecting the Dots Between Your Threat Tntelligence Tradecraft and Business ...
 
Blue Coat Infographic: Proactive Incident response
Blue Coat Infographic: Proactive Incident response Blue Coat Infographic: Proactive Incident response
Blue Coat Infographic: Proactive Incident response
 
Incident response
Incident responseIncident response
Incident response
 
Behavior Based Safety System-Workplace Safety Training
Behavior Based Safety System-Workplace Safety TrainingBehavior Based Safety System-Workplace Safety Training
Behavior Based Safety System-Workplace Safety Training
 
For Corporate Boards, a Cyber Security Top 10
For Corporate Boards, a Cyber Security Top 10For Corporate Boards, a Cyber Security Top 10
For Corporate Boards, a Cyber Security Top 10
 
2 ppt final dan shoemaker dd1 stockholm presentation
2 ppt final dan shoemaker dd1 stockholm presentation2 ppt final dan shoemaker dd1 stockholm presentation
2 ppt final dan shoemaker dd1 stockholm presentation
 
7-lessons-learned-from-bsimm
7-lessons-learned-from-bsimm7-lessons-learned-from-bsimm
7-lessons-learned-from-bsimm
 
Six Mistakes of Log Management 2008
Six Mistakes of Log Management 2008Six Mistakes of Log Management 2008
Six Mistakes of Log Management 2008
 

Similar to Uncovering the key to a successful psim installation

Enterprise incident response 2017
Enterprise incident response   2017Enterprise incident response   2017
Enterprise incident response 2017zapp0
 
Information Security Awareness And Training Business Case For Web Based Solut...
Information Security Awareness And Training Business Case For Web Based Solut...Information Security Awareness And Training Business Case For Web Based Solut...
Information Security Awareness And Training Business Case For Web Based Solut...Michael Kaishar, MSIA | CISSP
 
NIST Critical Security Framework (CSF)
NIST Critical Security Framework (CSF) NIST Critical Security Framework (CSF)
NIST Critical Security Framework (CSF) Priyanka Aash
 
Why CISOs Need a New Approach to Enhance Attack Surface Visibility.pdf
Why CISOs Need a New Approach to Enhance Attack Surface Visibility.pdfWhy CISOs Need a New Approach to Enhance Attack Surface Visibility.pdf
Why CISOs Need a New Approach to Enhance Attack Surface Visibility.pdfEnterprise Insider
 
ION-E Defense In Depth Presentation for The Institiute of Internal Auditors
ION-E Defense In Depth Presentation for The Institiute of Internal AuditorsION-E Defense In Depth Presentation for The Institiute of Internal Auditors
ION-E Defense In Depth Presentation for The Institiute of Internal Auditorsmdagrossa
 
Operation: Next Summit Takeaways
Operation: Next Summit TakeawaysOperation: Next Summit Takeaways
Operation: Next Summit Takeawaysaccenture
 
Assocham conf grc sept 13
Assocham conf  grc  sept 13Assocham conf  grc  sept 13
Assocham conf grc sept 13subramanian K
 
Cyber presentation spet 2019 v8sentfor upload
Cyber presentation spet 2019 v8sentfor uploadCyber presentation spet 2019 v8sentfor upload
Cyber presentation spet 2019 v8sentfor uploadsavassociates1
 
Weakest links of an organization's Cybersecurity chain
Weakest links of an organization's Cybersecurity chainWeakest links of an organization's Cybersecurity chain
Weakest links of an organization's Cybersecurity chainSanjay Chadha, CPA, CA
 
What CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber SecurityWhat CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber SecurityKaryl Scott
 
Transforming Information Security: Designing a State-of-the-Art Extended Team
Transforming Information Security: Designing a State-of-the-Art Extended TeamTransforming Information Security: Designing a State-of-the-Art Extended Team
Transforming Information Security: Designing a State-of-the-Art Extended TeamEMC
 
Aberdeen Group Presents: Video Intelligence to Secure and Grow
Aberdeen  Group Presents: Video Intelligence to Secure and GrowAberdeen  Group Presents: Video Intelligence to Secure and Grow
Aberdeen Group Presents: Video Intelligence to Secure and Grow3VR Inc.
 
ITSM in an Agile World - Scott Goh-Davis, Solutions Engineer APAC, Atlassian ...
ITSM in an Agile World - Scott Goh-Davis, Solutions Engineer APAC, Atlassian ...ITSM in an Agile World - Scott Goh-Davis, Solutions Engineer APAC, Atlassian ...
ITSM in an Agile World - Scott Goh-Davis, Solutions Engineer APAC, Atlassian ...Amazon Web Services Korea
 
Why ISO 27001 for an Organisation
Why ISO 27001 for an OrganisationWhy ISO 27001 for an Organisation
Why ISO 27001 for an OrganisationSyed Azher
 
Getting your Strategy Right – in a SMAC World!
Getting your Strategy Right – in a SMAC World!Getting your Strategy Right – in a SMAC World!
Getting your Strategy Right – in a SMAC World!Continuity and Resilience
 
Convergence innovative integration of security
Convergence   innovative integration of securityConvergence   innovative integration of security
Convergence innovative integration of securityciso_insights
 
SOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterSOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterMichael Nickle
 
IT Compliance: Shifting from Cost Center to Profit Center
IT Compliance: Shifting from Cost Center to Profit CenterIT Compliance: Shifting from Cost Center to Profit Center
IT Compliance: Shifting from Cost Center to Profit CenterGary Pennington
 

Similar to Uncovering the key to a successful psim installation (20)

Enterprise incident response 2017
Enterprise incident response   2017Enterprise incident response   2017
Enterprise incident response 2017
 
Information Security Awareness And Training Business Case For Web Based Solut...
Information Security Awareness And Training Business Case For Web Based Solut...Information Security Awareness And Training Business Case For Web Based Solut...
Information Security Awareness And Training Business Case For Web Based Solut...
 
NIST Critical Security Framework (CSF)
NIST Critical Security Framework (CSF) NIST Critical Security Framework (CSF)
NIST Critical Security Framework (CSF)
 
MikeChen TD Risk Analyst 20160626
MikeChen TD Risk Analyst 20160626MikeChen TD Risk Analyst 20160626
MikeChen TD Risk Analyst 20160626
 
Why CISOs Need a New Approach to Enhance Attack Surface Visibility.pdf
Why CISOs Need a New Approach to Enhance Attack Surface Visibility.pdfWhy CISOs Need a New Approach to Enhance Attack Surface Visibility.pdf
Why CISOs Need a New Approach to Enhance Attack Surface Visibility.pdf
 
ION-E Defense In Depth Presentation for The Institiute of Internal Auditors
ION-E Defense In Depth Presentation for The Institiute of Internal AuditorsION-E Defense In Depth Presentation for The Institiute of Internal Auditors
ION-E Defense In Depth Presentation for The Institiute of Internal Auditors
 
Operation: Next Summit Takeaways
Operation: Next Summit TakeawaysOperation: Next Summit Takeaways
Operation: Next Summit Takeaways
 
Applying Lean for information security operations centre
Applying Lean for information security operations centreApplying Lean for information security operations centre
Applying Lean for information security operations centre
 
Assocham conf grc sept 13
Assocham conf  grc  sept 13Assocham conf  grc  sept 13
Assocham conf grc sept 13
 
Cyber presentation spet 2019 v8sentfor upload
Cyber presentation spet 2019 v8sentfor uploadCyber presentation spet 2019 v8sentfor upload
Cyber presentation spet 2019 v8sentfor upload
 
Weakest links of an organization's Cybersecurity chain
Weakest links of an organization's Cybersecurity chainWeakest links of an organization's Cybersecurity chain
Weakest links of an organization's Cybersecurity chain
 
What CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber SecurityWhat CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber Security
 
Transforming Information Security: Designing a State-of-the-Art Extended Team
Transforming Information Security: Designing a State-of-the-Art Extended TeamTransforming Information Security: Designing a State-of-the-Art Extended Team
Transforming Information Security: Designing a State-of-the-Art Extended Team
 
Aberdeen Group Presents: Video Intelligence to Secure and Grow
Aberdeen  Group Presents: Video Intelligence to Secure and GrowAberdeen  Group Presents: Video Intelligence to Secure and Grow
Aberdeen Group Presents: Video Intelligence to Secure and Grow
 
ITSM in an Agile World - Scott Goh-Davis, Solutions Engineer APAC, Atlassian ...
ITSM in an Agile World - Scott Goh-Davis, Solutions Engineer APAC, Atlassian ...ITSM in an Agile World - Scott Goh-Davis, Solutions Engineer APAC, Atlassian ...
ITSM in an Agile World - Scott Goh-Davis, Solutions Engineer APAC, Atlassian ...
 
Why ISO 27001 for an Organisation
Why ISO 27001 for an OrganisationWhy ISO 27001 for an Organisation
Why ISO 27001 for an Organisation
 
Getting your Strategy Right – in a SMAC World!
Getting your Strategy Right – in a SMAC World!Getting your Strategy Right – in a SMAC World!
Getting your Strategy Right – in a SMAC World!
 
Convergence innovative integration of security
Convergence   innovative integration of securityConvergence   innovative integration of security
Convergence innovative integration of security
 
SOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterSOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations Center
 
IT Compliance: Shifting from Cost Center to Profit Center
IT Compliance: Shifting from Cost Center to Profit CenterIT Compliance: Shifting from Cost Center to Profit Center
IT Compliance: Shifting from Cost Center to Profit Center
 

Recently uploaded

A Guideline to Zendesk to Re:amaze Data Migration
A Guideline to Zendesk to Re:amaze Data MigrationA Guideline to Zendesk to Re:amaze Data Migration
A Guideline to Zendesk to Re:amaze Data MigrationHelp Desk Migration
 
Accelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with PlatformlessAccelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with PlatformlessWSO2
 
De mooiste recreatieve routes ontdekken met RouteYou en FME
De mooiste recreatieve routes ontdekken met RouteYou en FMEDe mooiste recreatieve routes ontdekken met RouteYou en FME
De mooiste recreatieve routes ontdekken met RouteYou en FMEJelle | Nordend
 
10 Essential Software Testing Tools You Need to Know About.pdf
10 Essential Software Testing Tools You Need to Know About.pdf10 Essential Software Testing Tools You Need to Know About.pdf
10 Essential Software Testing Tools You Need to Know About.pdfkalichargn70th171
 
How to install and activate eGrabber JobGrabber
How to install and activate eGrabber JobGrabberHow to install and activate eGrabber JobGrabber
How to install and activate eGrabber JobGrabbereGrabber
 
A Guideline to Gorgias to to Re:amaze Data Migration
A Guideline to Gorgias to to Re:amaze Data MigrationA Guideline to Gorgias to to Re:amaze Data Migration
A Guideline to Gorgias to to Re:amaze Data MigrationHelp Desk Migration
 
Facemoji Keyboard released its 2023 State of Emoji report, outlining the most...
Facemoji Keyboard released its 2023 State of Emoji report, outlining the most...Facemoji Keyboard released its 2023 State of Emoji report, outlining the most...
Facemoji Keyboard released its 2023 State of Emoji report, outlining the most...rajkumar669520
 
Advanced Flow Concepts Every Developer Should Know
Advanced Flow Concepts Every Developer Should KnowAdvanced Flow Concepts Every Developer Should Know
Advanced Flow Concepts Every Developer Should KnowPeter Caitens
 
SOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBrokerSOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBrokerSOCRadar
 
Into the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdfInto the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdfOrtus Solutions, Corp
 
Agnieszka Andrzejewska - BIM School Course in Kraków
Agnieszka Andrzejewska - BIM School Course in KrakówAgnieszka Andrzejewska - BIM School Course in Kraków
Agnieszka Andrzejewska - BIM School Course in Krakówbim.edu.pl
 
KLARNA - Language Models and Knowledge Graphs: A Systems Approach
KLARNA -  Language Models and Knowledge Graphs: A Systems ApproachKLARNA -  Language Models and Knowledge Graphs: A Systems Approach
KLARNA - Language Models and Knowledge Graphs: A Systems ApproachNeo4j
 
Studiovity film pre-production and screenwriting software
Studiovity film pre-production and screenwriting softwareStudiovity film pre-production and screenwriting software
Studiovity film pre-production and screenwriting softwareinfo611746
 
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERRORTROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERRORTier1 app
 
How To Build a Successful SaaS Design.pdf
How To Build a Successful SaaS Design.pdfHow To Build a Successful SaaS Design.pdf
How To Build a Successful SaaS Design.pdfayushiqss
 
Implementing KPIs and Right Metrics for Agile Delivery Teams.pdf
Implementing KPIs and Right Metrics for Agile Delivery Teams.pdfImplementing KPIs and Right Metrics for Agile Delivery Teams.pdf
Implementing KPIs and Right Metrics for Agile Delivery Teams.pdfVictor Lopez
 
AI/ML Infra Meetup | Improve Speed and GPU Utilization for Model Training & S...
AI/ML Infra Meetup | Improve Speed and GPU Utilization for Model Training & S...AI/ML Infra Meetup | Improve Speed and GPU Utilization for Model Training & S...
AI/ML Infra Meetup | Improve Speed and GPU Utilization for Model Training & S...Alluxio, Inc.
 
Designing for Privacy in Amazon Web Services
Designing for Privacy in Amazon Web ServicesDesigning for Privacy in Amazon Web Services
Designing for Privacy in Amazon Web ServicesKrzysztofKkol1
 
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?XfilesPro
 

Recently uploaded (20)

A Guideline to Zendesk to Re:amaze Data Migration
A Guideline to Zendesk to Re:amaze Data MigrationA Guideline to Zendesk to Re:amaze Data Migration
A Guideline to Zendesk to Re:amaze Data Migration
 
Accelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with PlatformlessAccelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with Platformless
 
De mooiste recreatieve routes ontdekken met RouteYou en FME
De mooiste recreatieve routes ontdekken met RouteYou en FMEDe mooiste recreatieve routes ontdekken met RouteYou en FME
De mooiste recreatieve routes ontdekken met RouteYou en FME
 
10 Essential Software Testing Tools You Need to Know About.pdf
10 Essential Software Testing Tools You Need to Know About.pdf10 Essential Software Testing Tools You Need to Know About.pdf
10 Essential Software Testing Tools You Need to Know About.pdf
 
How to install and activate eGrabber JobGrabber
How to install and activate eGrabber JobGrabberHow to install and activate eGrabber JobGrabber
How to install and activate eGrabber JobGrabber
 
A Guideline to Gorgias to to Re:amaze Data Migration
A Guideline to Gorgias to to Re:amaze Data MigrationA Guideline to Gorgias to to Re:amaze Data Migration
A Guideline to Gorgias to to Re:amaze Data Migration
 
Facemoji Keyboard released its 2023 State of Emoji report, outlining the most...
Facemoji Keyboard released its 2023 State of Emoji report, outlining the most...Facemoji Keyboard released its 2023 State of Emoji report, outlining the most...
Facemoji Keyboard released its 2023 State of Emoji report, outlining the most...
 
Corporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMSCorporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMS
 
Advanced Flow Concepts Every Developer Should Know
Advanced Flow Concepts Every Developer Should KnowAdvanced Flow Concepts Every Developer Should Know
Advanced Flow Concepts Every Developer Should Know
 
SOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBrokerSOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBroker
 
Into the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdfInto the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdf
 
Agnieszka Andrzejewska - BIM School Course in Kraków
Agnieszka Andrzejewska - BIM School Course in KrakówAgnieszka Andrzejewska - BIM School Course in Kraków
Agnieszka Andrzejewska - BIM School Course in Kraków
 
KLARNA - Language Models and Knowledge Graphs: A Systems Approach
KLARNA -  Language Models and Knowledge Graphs: A Systems ApproachKLARNA -  Language Models and Knowledge Graphs: A Systems Approach
KLARNA - Language Models and Knowledge Graphs: A Systems Approach
 
Studiovity film pre-production and screenwriting software
Studiovity film pre-production and screenwriting softwareStudiovity film pre-production and screenwriting software
Studiovity film pre-production and screenwriting software
 
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERRORTROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
 
How To Build a Successful SaaS Design.pdf
How To Build a Successful SaaS Design.pdfHow To Build a Successful SaaS Design.pdf
How To Build a Successful SaaS Design.pdf
 
Implementing KPIs and Right Metrics for Agile Delivery Teams.pdf
Implementing KPIs and Right Metrics for Agile Delivery Teams.pdfImplementing KPIs and Right Metrics for Agile Delivery Teams.pdf
Implementing KPIs and Right Metrics for Agile Delivery Teams.pdf
 
AI/ML Infra Meetup | Improve Speed and GPU Utilization for Model Training & S...
AI/ML Infra Meetup | Improve Speed and GPU Utilization for Model Training & S...AI/ML Infra Meetup | Improve Speed and GPU Utilization for Model Training & S...
AI/ML Infra Meetup | Improve Speed and GPU Utilization for Model Training & S...
 
Designing for Privacy in Amazon Web Services
Designing for Privacy in Amazon Web ServicesDesigning for Privacy in Amazon Web Services
Designing for Privacy in Amazon Web Services
 
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
 

Uncovering the key to a successful psim installation

  • 1. UNCOVERING THE KEY TO A SUCCESSFUL PSIM INSTALLATION. Dr. Bob Banerjee Sr. DirectorTraining and Development, NICE Systems Inc.
  • 2. Vision  Contained, big picture buy-in, simple budget  Ensure others share baby step strategy  Trackable goals, justifies growth, deflect pessimists  Scope creep: complexity and priority confusion. Operations  Expect to expand scope post-rollout  Vendor claims backed in writing
  • 3. Interfaces  Kid in a candy store  Vendor API agreements – technical and political hurdles. Beware ‘It can…’  Build once, maintain forever  Integration license fees
  • 4. Rollout  Broad impact. Comfort zone. Senior reinforcement  Phased rollout, incorporate lessons learned  Low hanging fruit, early success, gain trust, grow
  • 5. The Life Cycle Of Security Operations Time ResourceLevel Prediction SituationalAwareness Reconstruction / Investigation Situation Management
  • 6. Datafication (Big Data generation) Alarm Correlation from Big Data Big Data Collection Proactive Action based on Big Data Similarity Alarm Unification from Big Data Big Data Mining (Identifying Insights) Proactive Action based on Big Data Abnormality November 19th – 21st @psoce I www.psoce.com Hilton Long Beach & Executive Meeting Center 2013 Port Security Operations Conference & Expo PSOCE – LA I Long Beach
  • 7. Training  PSIM impacts processes, users change behavior  3-6m to 2-3d. Do prior to rollout to gain confidence  Attrition means retraining.  Management movement requires re- justification (what and why)  Minor tweaks handled by local system admin
  • 8. Maintenance  Feeding  Resources – user, consultant, SI and vendor  Roles – sys admin, high level config, low level config, interfaces
  • 9. CAPTURE CORRELATE & ANALYZE NICEValue Prop Optimizing Security Operations; Minimizing Risk; Improving Investigations MANAGE Real TimeOffline PSIM & Situation Management Situator Incident Debriefing & Investigation Inform Audio Recording & Management Video Management & Analytics NiceVision Web Insight
  • 11. Key Benefits SO WHAT CAN NICE DO FOR YOU…? Faster Response Better Awareness Efficient Use of Resources False Alert Reduction Consistency in Handling Learning and Improving
  • 12. The Life Cycle Of Security Operations Time ResourceLevel Prediction SituationalAwareness Reconstruction / Investigation Situation Management Better Awareness False Alert Reduction Efficient Use of Resources Faster Response Consistency in Handling Learning and Improving Learning and Improving
  • 13. Return On Investment ROI  Shows value and creates interest  Helps the ‘CSO’ convince internally  Remove opposition and doubt  Be customer specific  Show potential savings based on customer specific figures  Use our success stories  Tools at your disposal  Internal case study decks  ROI ppt  ROI excel Better Awareness Faster Response False Alert Reduction Efficient Use of Resources Consistency in Handling Learning and Improving

Editor's Notes

  1. Initial Visioning Scope – confined, not everything. Other departments need to know the big picture and give their buy-in, but not smother the initial project. Budget from one place, else competing priorities. If you start small, and intend to grow big, you need the confidence that the organization shares that vision. Tangible and measurable goals (saving headcount, alarm reaction time, incident closure time, reduce false alarms, reduce time to be and prove compliance, reduce complaints of other people not knowing, etc. If it meets them, then it is successful – no statements like ‘it isn’t used or it doesn’t do what we want it to. Scope creep pre-installation, beware of touching too many other systems and departments because of added complexity. Also beware of moving from physical security to operations – complexity and especially priorities. Expanding scope post-installation, people start realizing the potential impact once they see it live. It is important to capture these feedback ideas else you start getting ‘well it doesn’t do X’ which affects adoption. Ensure any claims or promises from the vendor are backed up by their professional services group in writing.
  2. Interfaces Kid in a candy store – ‘we can pull everything together’. Decide what you want to achieve, and let that drive what you want to integrate. Vendor integration agreements – technical and political challenges. Some APIs better than others, supported better, reverse engineering, 1-way or 2-way. Rate of change, also previous integration may be old enough that major rework has to be done to incorporate functionality that did not exist before, or was not implemented. May perceive integration as a threat, loosening choke hold on the customer. A VMS or PACS vendor may have a proprietary PSIM roadmap and may want to exclude any other. Beware the vendor who claims they can integrate to X – demand a letter from X indicating that they will cooperate, and check potential license fees.
  3. Rollout Sudden change is rarely well received – yanks us out of our comfort zone. Need senior enforcement that this PSIM, the new system of record, is the new way, so people stop using backdoors or other workarounds. Complex projects are invariably better rolled out in phases. Lessons learned can be fed in. If too many stakeholders then makes priorities complicated. Smaller budget, and proof of meeting original goals establishes faith and can further justify investment.
  4. We can also look at the effort the customer puts into handling each one of these stages, this is an illustration of course but in reality every incident has certain characteristics that we can influence and improve, in the following slides we will discuss how we can improve various aspects of incident handling
  5. Training Reduces training from 3-6 months to 2-3 days. Do this prior to roll out to gain end user confidence. PSIM affects many people and the way they work, training and practice is more important from a behavioral modification point of view that learning how to use the system. Attrition at the operator level demands continuous training classes. Movement in the management sometimes requires ‘re-justification’ as to why the system does what it does, and in the way it does it. For system administration, frequent tasks should be handled by permanent staff to expedite. PSIM is at the hub of how people and systems interoperate – if it needs tweaking then it may look disproportionately bad if it takes too long.
  6. Maintenance Monster has to be fed – far from set and forget. It is the center of everything. 4 typical categories of resources that engage: end user, consultant, SI and vendor. 3 broad categories of maintenance work, system admin such as managing users and privileges, contact info and designing real-time reports. High Level System Configuration such as adding/replacing sensors, modifying maps, creating and modifying business rules and procedures, creating reports. Low Level System Configuration such as adding a new or updated subsystem. Interface development and revision.
  7. Looking at our portfolio we can emphasize that we have products that capture and analyze information in the bottom 2 products Our strength is on adding value to your security operations through smart content analytics sensor correlation that help you make sense of your security big data and increase efficiency and effectiveness. Another talking point is that we help you manage your security needs in real-time and post event Another element of our physical security portfolio is the newly added web insight solution – which compliments our offering with cyber insights (which are taken from open source web) which compliments the solution through the entire life cycle of the event, from prediction, to real time information flow through post event investigation The bottom line is that we help you optimize security operations, reduce risk, and improve investigations We can also emphasize that our products capture masses of data, and add value to your security operations through content analytics and correlations to help make sense of the overflow of information Another talking point is that we help you manage all of that in real time as well as post event Another element of our physical security portfolio is the newly added web insight The bottom line is that we help you optimize security operations, reduce risk, and improve investigations
  8. Here are the main benefits that NICE can provide These areas apply to almost all customer sin all domains, the trick is to use your customers specific examples and their potential benefits
  9. Now if we go back to the typical life cycle of an incident we can see the benefits we discussed cover and have an impact on all stages of the process, in the end of the day we reduce the overall effort and the overall time needed to handle incidents. It is important to take your customer’s specific situation, choose the right benefits that make sense for them and show how the improvement can be achieved
  10. Discussing ROI has a specifically strong impact on the sales process, as you have seem throughout the presentation many of the benefits can be associated to measurable ROI (and if not measureable then certainly implied ROI), this always creates more interests, helps our customer gain internal support and budgets and creates a higher level discussion. It doesn’t always have to be “mathematically” proven, its enough to establish the expectation of significant savings Important to remember – be specific (this requires some preparation on the customer specific case). We have quick a few cases you can learn from, they are described in details in our internal case studies, and in addition there are ROI tools you can use