SlideShare a Scribd company logo
~ Aegis ~
~Product overview ~
Yellow House
Consulting
Group
Copyright © 2014-15 yhcg.in
Beyond Firewalls
Protection
&
Performance
~ Aegis ~
Copyright © 2014-15 yhcg.in
 IT assessments bring in IT discipline, reality check and ensures continuous
IT maturity and readiness for the organization
 80% of large and 60% of small organizations experienced at least one
“malicious security incident” in 2014
 60% Indian IT professionals feel organizations cannot protect itself from
Cyber attacks
Why IT Security and Risk Management ?
Yellow House Consulting Group
Aegis ~ IT Security & Risk Management
DDoS, Web applications, and IT infrastructure attacks represent some of the
most critical threats to enterprises today ~ Akamai security report, Q4, 2014
Copyright © 2014-15 yhcg.in
 Hackers used email information from Mumbai firm, “Mallak Specialities
Pvt Ltd”, to fleece the firm to deposit money into bank accounts
~ 27-OCT-2014 - HC directs CBI to investigate
 19% of incidents are a results of insider privilege misuse – Verizon Report
 The ONLY way to strengthen and test your IT systems effectiveness,
efficiency & readiness of IT security is by periodic systems assessment
and vulnerability tests by a systems vendor
Why IT Security and Risk Management ?
Yellow House Consulting Group
Aegis ~ IT Security & Risk Management
Copyright © 2014-15 yhcg.in
 IT security and risk management Objectives
 Common IT assessment Observations
 What we are confident of – YHCG IT services lines
 IT for Business transformation
 What after IT assessment ?
Index
Yellow House Consulting Group
Aegis ~ IT Security & Risk Management
Copyright © 2014-15 yhcg.in
 Alignment of Business requirements with existing IT Support Systems
 Availability of mature and cost effective IT systems – for negligible down
time
 Security – Accessibility to ONLY authorized users, prevention of Data
theft and Vulnerability to unwarranted intrusions and attacks
…contd.
Risk Management Objectives – what we look for ?
Yellow House Consulting Group
Aegis ~ IT Security & Risk Management
Copyright © 2014-15 yhcg.in
 Capability – Provide users with necessary tools and solutions to
efficiently and effectively do their jobs and be flexible in adapting to
changing business needs
 Competitiveness – IT being used as an business enabler for competitive
advantage
Risk Management Objectives – what we look for ?
Yellow House Consulting Group
Aegis ~ IT Security & Risk Management
 No pre-defined IT Strategy hence absence of Business-IT Alignment
 No SOP made available for Policy reference and Security Implementation
 Absence of IT Security & Configuration management (baseline & setup) plan
 Critical lapses in IT operations control leading to attack vulnerability
…contd.
Common Observations during assessment
Copyright © 2014-15 yhcg.in
Yellow House Consulting Group
Aegis ~ IT Security & Risk Management
 Weak Network security & end-point device access
 No Data theft prevention (people, process & systems) – DLP measures
 Minimal or no documentation of planning and methodology for IT infra
forward capacity building
 Isolated planning and implementation of IT Network and security
… contd.
Common Observations during assessment
Copyright © 2014-15 yhcg.in
Yellow House Consulting Group
Aegis ~ IT Security & Risk Management
Copyright © 2014-15 yhcg.in
 No IT Disaster Recovery Plan for Business Continuity
 Low level of IT Security Maturity, IT Ops Control, Configuration
Management, Data Loss and Theft prevention
 No evidence of IT being used as an enabler to transform business
Common Observations during assessment
Yellow House Consulting Group
Aegis ~ IT Security & Risk Management
 Organization’s IT Setup – managed by quality team having pre-defined
KPAs and responsibilities (in - house and/or outsourced)
 IT Framework – to implement IT Security policies and Operation Control
Systems
 IT Role - to facilitate, support and steer the organizational goals as a
Business Transformational Agent
…contd.
Post Assessment Implementation by YHCG
Copyright © 2014-15 yhcg.in
Yellow House Consulting Group
Aegis ~ IT Security & Risk Management
 Secure IT Network Architecture – Network overhauled and re-postured due
to lack of security controls & concepts like zoning & DMZ
 Security management and IT ops monitoring software Implementation
 IT Vulnerability - Overcome IT Operational Control weaknesses and
implement governance framework & security policies to mitigate Business-
IT risks
…contd.
Post Assessment Implementation by YHCG
Copyright © 2014-15 yhcg.in
Yellow House Consulting Group
Aegis ~ IT Security & Risk Management
 DLP (data loss prevention)- to be implemented at the organization level
 Disaster Recovery Plan - to be developed to support the organization’s
Business Continuity Plan
 IT Cost Control – evaluate early adoption of Hybrid Cloud solutions,
Server Virtualization and Open Source Software to reduce cost, infra
manageability and maintain high availability of certain data & software
services
…contd.
Post Assessment Implementation by YHCG
Copyright © 2014-15 yhcg.in
Yellow House Consulting Group
Aegis ~ IT Security & Risk Management
 Secure Connectivity - evaluate cost and implement VPN connectivity
for more secure connectivity between HO & branches
 IT Planning – Short / Long Term plans and Vision which include:
 Processes - tuned & in alignment with Business needs
 Systems - operational control and overhaul
 People - optimally sized trained staff augmentation to
satisfy new necessary roles and responsibilities
Post Assessment Implementation by YHCG
Copyright © 2014-15 yhcg.in
Yellow House Consulting Group
Aegis ~ IT Security & Risk Management
Copyright © 2014-15 yhcg.in
 Smart & Disciplined IT implementation can help to solve specific business
complexities and help do business effectively and efficiently
 In today’s fast paced business environment, it is about managing your
systems & data optimally so that it will transform your business
 Excellence in Technology Implementation is the best way to put distance
between a company and its competitors
 IT should not be just adopted for IT sake
IT Myth :
~ more resources, extra cost, more hardware & software
- but best-in-class practices prove otherwise
IT for Business Transformation…
Yellow House Consulting Group
Aegis ~ IT Security & Risk Management
Copyright © 2014-15 yhcg.in
 IT systems & software setup, Network & IT Security Grade - assessment
 Secure Network Design and implementation (Small and Medium businesses)
 Data Loss Prevention (DLP) – design and implementation
 Cyber defence – assessment, design and implementation
 Vulnerability assessment & Penetration Test (VAPT)
 Identity and access management - design and implementation
 Hybrid Cloud – design & implementation
YHCG service lines ……..
Yellow House Consulting Group
Aegis ~ IT Security & Risk Management
Copyright © 2014-15 yhcg.in
We can execute the implementation as per the
assessment report and recommendations
Or
We can do the Implementation handholding post
assessment as per the recommendations in the
report
What after IT assessment ?
Yellow House Consulting Group
Aegis ~ IT assessment Overview
Copyright © 2014-15 yhcg.in
Thank you !
Yellow House Consulting Group
www.yhcg.in
Yellow House Consulting Group
Aegis ~ IT Security & Risk Management

More Related Content

What's hot

Governance of security operation centers
Governance of security operation centersGovernance of security operation centers
Governance of security operation centers
Brencil Kaimba
 
Security architecture frameworks
Security architecture frameworksSecurity architecture frameworks
Security architecture frameworks
John Arnold
 
Proteus OCM Company Profile
Proteus OCM Company ProfileProteus OCM Company Profile
Proteus OCM Company Profile
KGanzy
 
IT Risk Management & Compliance
IT Risk Management & ComplianceIT Risk Management & Compliance
IT Risk Management & Compliance
rhanna11
 
Hp It Performance Suite Customer Presentation
Hp It Performance Suite Customer PresentationHp It Performance Suite Customer Presentation
Hp It Performance Suite Customer Presentation
esbosman
 
Does Anyone Remember Enterprise Security Architecture?
Does Anyone Remember Enterprise Security Architecture?Does Anyone Remember Enterprise Security Architecture?
Does Anyone Remember Enterprise Security Architecture?
rbrockway
 
Brandon Consulting Overview
Brandon Consulting OverviewBrandon Consulting Overview
Brandon Consulting Overview
Ronan Martin
 
Security Modelling in ArchiMate
Security Modelling in ArchiMateSecurity Modelling in ArchiMate
Security Modelling in ArchiMate
PECB
 
Ruben Melendez - Economically Justifying IT Security Initiatives
Ruben Melendez - Economically Justifying IT Security InitiativesRuben Melendez - Economically Justifying IT Security Initiatives
Ruben Melendez - Economically Justifying IT Security Initiatives
centralohioissa
 
The infrastructure and the security essentials of information technology in a...
The infrastructure and the security essentials of information technology in a...The infrastructure and the security essentials of information technology in a...
The infrastructure and the security essentials of information technology in a...
adeel hamid
 
Information Security Architecture: Building Security Into Your Organziation
Information Security Architecture: Building Security Into Your OrganziationInformation Security Architecture: Building Security Into Your Organziation
Information Security Architecture: Building Security Into Your Organziation
Seccuris Inc.
 
The Future of Technology Operations
The Future of Technology OperationsThe Future of Technology Operations
The Future of Technology Operations
Ivanti
 
Cyber Crime Conference 2017 - DFLabs Supervised Active Intelligence - Andrea ...
Cyber Crime Conference 2017 - DFLabs Supervised Active Intelligence - Andrea ...Cyber Crime Conference 2017 - DFLabs Supervised Active Intelligence - Andrea ...
Cyber Crime Conference 2017 - DFLabs Supervised Active Intelligence - Andrea ...
DFLABS SRL
 
Presentation to Irish ISSA Conference 12-May-11
Presentation to Irish ISSA Conference 12-May-11Presentation to Irish ISSA Conference 12-May-11
Presentation to Irish ISSA Conference 12-May-11
Michael Ofarrell
 
The Economics of Security
The Economics of SecurityThe Economics of Security
The Economics of Security
Network Intelligence India
 
The privacy and security implications of AI, big data and predictive analytics
The privacy and security implications of AI, big data and predictive analyticsThe privacy and security implications of AI, big data and predictive analytics
The privacy and security implications of AI, big data and predictive analytics
Dan Michaluk
 
Full Cybersecurity Regulations Overview for DoD Prime and Subcontractors
Full Cybersecurity Regulations Overview for DoD Prime and SubcontractorsFull Cybersecurity Regulations Overview for DoD Prime and Subcontractors
Full Cybersecurity Regulations Overview for DoD Prime and Subcontractors
Ignyte Assurance Platform
 
How to minimize threats in your information system using network segregation?
How to minimize threats in your information system using network segregation? How to minimize threats in your information system using network segregation?
How to minimize threats in your information system using network segregation?
PECB
 
Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...
Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...
Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...
Craig Martin
 

What's hot (19)

Governance of security operation centers
Governance of security operation centersGovernance of security operation centers
Governance of security operation centers
 
Security architecture frameworks
Security architecture frameworksSecurity architecture frameworks
Security architecture frameworks
 
Proteus OCM Company Profile
Proteus OCM Company ProfileProteus OCM Company Profile
Proteus OCM Company Profile
 
IT Risk Management & Compliance
IT Risk Management & ComplianceIT Risk Management & Compliance
IT Risk Management & Compliance
 
Hp It Performance Suite Customer Presentation
Hp It Performance Suite Customer PresentationHp It Performance Suite Customer Presentation
Hp It Performance Suite Customer Presentation
 
Does Anyone Remember Enterprise Security Architecture?
Does Anyone Remember Enterprise Security Architecture?Does Anyone Remember Enterprise Security Architecture?
Does Anyone Remember Enterprise Security Architecture?
 
Brandon Consulting Overview
Brandon Consulting OverviewBrandon Consulting Overview
Brandon Consulting Overview
 
Security Modelling in ArchiMate
Security Modelling in ArchiMateSecurity Modelling in ArchiMate
Security Modelling in ArchiMate
 
Ruben Melendez - Economically Justifying IT Security Initiatives
Ruben Melendez - Economically Justifying IT Security InitiativesRuben Melendez - Economically Justifying IT Security Initiatives
Ruben Melendez - Economically Justifying IT Security Initiatives
 
The infrastructure and the security essentials of information technology in a...
The infrastructure and the security essentials of information technology in a...The infrastructure and the security essentials of information technology in a...
The infrastructure and the security essentials of information technology in a...
 
Information Security Architecture: Building Security Into Your Organziation
Information Security Architecture: Building Security Into Your OrganziationInformation Security Architecture: Building Security Into Your Organziation
Information Security Architecture: Building Security Into Your Organziation
 
The Future of Technology Operations
The Future of Technology OperationsThe Future of Technology Operations
The Future of Technology Operations
 
Cyber Crime Conference 2017 - DFLabs Supervised Active Intelligence - Andrea ...
Cyber Crime Conference 2017 - DFLabs Supervised Active Intelligence - Andrea ...Cyber Crime Conference 2017 - DFLabs Supervised Active Intelligence - Andrea ...
Cyber Crime Conference 2017 - DFLabs Supervised Active Intelligence - Andrea ...
 
Presentation to Irish ISSA Conference 12-May-11
Presentation to Irish ISSA Conference 12-May-11Presentation to Irish ISSA Conference 12-May-11
Presentation to Irish ISSA Conference 12-May-11
 
The Economics of Security
The Economics of SecurityThe Economics of Security
The Economics of Security
 
The privacy and security implications of AI, big data and predictive analytics
The privacy and security implications of AI, big data and predictive analyticsThe privacy and security implications of AI, big data and predictive analytics
The privacy and security implications of AI, big data and predictive analytics
 
Full Cybersecurity Regulations Overview for DoD Prime and Subcontractors
Full Cybersecurity Regulations Overview for DoD Prime and SubcontractorsFull Cybersecurity Regulations Overview for DoD Prime and Subcontractors
Full Cybersecurity Regulations Overview for DoD Prime and Subcontractors
 
How to minimize threats in your information system using network segregation?
How to minimize threats in your information system using network segregation? How to minimize threats in your information system using network segregation?
How to minimize threats in your information system using network segregation?
 
Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...
Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...
Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...
 

Viewers also liked

PRINCE2 sertificate
PRINCE2 sertificatePRINCE2 sertificate
PRINCE2 sertificateTanya Mie
 
Internationa-day
Internationa-dayInternationa-day
Internationa-day
Maria Kaestner
 
Ледовое побоище. Игошин Э.В.
Ледовое побоище. Игошин Э.В.Ледовое побоище. Игошин Э.В.
Ледовое побоище. Игошин Э.В.
Larisa Zaytseva
 
испарение( Абдиевой Мадины 8г)
испарение( Абдиевой Мадины 8г)испарение( Абдиевой Мадины 8г)
испарение( Абдиевой Мадины 8г)
Madina2001
 
Coinfection
CoinfectionCoinfection
Coinfection
Alba Ceballos
 
72599249_1374821_6183739_1057
72599249_1374821_6183739_105772599249_1374821_6183739_1057
72599249_1374821_6183739_1057
Deepak Chakraborty
 
Sp 2 unit 1 ¿quién soy yo adjective agreement
Sp 2 unit 1 ¿quién soy yo    adjective agreementSp 2 unit 1 ¿quién soy yo    adjective agreement
Sp 2 unit 1 ¿quién soy yo adjective agreement
Mark Pendarvis
 
EITI after 10
EITI after 10EITI after 10
EITI after 10
Devex
 
Statista_Company_Brochure_EU
Statista_Company_Brochure_EUStatista_Company_Brochure_EU
Statista_Company_Brochure_EU
Williamstein
 
How to drive traffic from twitter
How to drive traffic from twitterHow to drive traffic from twitter
projects-apps
projects-appsprojects-apps
projects-apps
Željko Domiter
 
Agile Lean Conference 2016 - Pecis _ Servant leadership e lean
Agile Lean Conference 2016 -  Pecis _ Servant leadership e leanAgile Lean Conference 2016 -  Pecis _ Servant leadership e lean
Agile Lean Conference 2016 - Pecis _ Servant leadership e lean
Agile Lean Conference
 
On Dadaji 2'nd Edition (Amiyaroy Choudhary)
On Dadaji 2'nd Edition (Amiyaroy Choudhary)On Dadaji 2'nd Edition (Amiyaroy Choudhary)
On Dadaji 2'nd Edition (Amiyaroy Choudhary)
Truth Within
 
Green Jewel of Melrose
Green Jewel of MelroseGreen Jewel of Melrose
Green Jewel of MelroseMaria Kaestner
 
Costa rica trip for forum pt
Costa rica trip for forum ptCosta rica trip for forum pt
Costa rica trip for forum pt
Mark Pendarvis
 
R r
R rR r
Psiko yoga pausoka
Psiko yoga pausokaPsiko yoga pausoka
Psiko yoga pausoka
idoialariz
 

Viewers also liked (17)

PRINCE2 sertificate
PRINCE2 sertificatePRINCE2 sertificate
PRINCE2 sertificate
 
Internationa-day
Internationa-dayInternationa-day
Internationa-day
 
Ледовое побоище. Игошин Э.В.
Ледовое побоище. Игошин Э.В.Ледовое побоище. Игошин Э.В.
Ледовое побоище. Игошин Э.В.
 
испарение( Абдиевой Мадины 8г)
испарение( Абдиевой Мадины 8г)испарение( Абдиевой Мадины 8г)
испарение( Абдиевой Мадины 8г)
 
Coinfection
CoinfectionCoinfection
Coinfection
 
72599249_1374821_6183739_1057
72599249_1374821_6183739_105772599249_1374821_6183739_1057
72599249_1374821_6183739_1057
 
Sp 2 unit 1 ¿quién soy yo adjective agreement
Sp 2 unit 1 ¿quién soy yo    adjective agreementSp 2 unit 1 ¿quién soy yo    adjective agreement
Sp 2 unit 1 ¿quién soy yo adjective agreement
 
EITI after 10
EITI after 10EITI after 10
EITI after 10
 
Statista_Company_Brochure_EU
Statista_Company_Brochure_EUStatista_Company_Brochure_EU
Statista_Company_Brochure_EU
 
How to drive traffic from twitter
How to drive traffic from twitterHow to drive traffic from twitter
How to drive traffic from twitter
 
projects-apps
projects-appsprojects-apps
projects-apps
 
Agile Lean Conference 2016 - Pecis _ Servant leadership e lean
Agile Lean Conference 2016 -  Pecis _ Servant leadership e leanAgile Lean Conference 2016 -  Pecis _ Servant leadership e lean
Agile Lean Conference 2016 - Pecis _ Servant leadership e lean
 
On Dadaji 2'nd Edition (Amiyaroy Choudhary)
On Dadaji 2'nd Edition (Amiyaroy Choudhary)On Dadaji 2'nd Edition (Amiyaroy Choudhary)
On Dadaji 2'nd Edition (Amiyaroy Choudhary)
 
Green Jewel of Melrose
Green Jewel of MelroseGreen Jewel of Melrose
Green Jewel of Melrose
 
Costa rica trip for forum pt
Costa rica trip for forum ptCosta rica trip for forum pt
Costa rica trip for forum pt
 
R r
R rR r
R r
 
Psiko yoga pausoka
Psiko yoga pausokaPsiko yoga pausoka
Psiko yoga pausoka
 

Similar to YHCG - IT Security and Risk Management

10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should Know10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should Know
IBM Security
 
IT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSALIT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSAL
CYBER SENSE
 
Skillmine CISO as service
Skillmine CISO as serviceSkillmine CISO as service
Skillmine CISO as service
Skillmine Technology Consulting
 
Omzig
OmzigOmzig
Laser App Conference 2017 - Sid Yenamandra, Entreda
Laser App Conference 2017 - Sid Yenamandra, EntredaLaser App Conference 2017 - Sid Yenamandra, Entreda
Laser App Conference 2017 - Sid Yenamandra, Entreda
Laser App Software
 
CV of Mohan M
CV of Mohan MCV of Mohan M
CV of Mohan M
Mohan M
 
Pankaj's Resume Information Security Professional
Pankaj's Resume Information Security ProfessionalPankaj's Resume Information Security Professional
Pankaj's Resume Information Security Professional
Pankaj Kumar
 
CV_Anil K Dubey V1.1
CV_Anil K Dubey V1.1CV_Anil K Dubey V1.1
InDefend-Integrated Data Privacy Offerings
InDefend-Integrated Data Privacy Offerings  InDefend-Integrated Data Privacy Offerings
InDefend-Integrated Data Privacy Offerings
Data Resolve Technologies Pvt. Ltd.
 
MCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationMCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service Presentation
William McBorrough
 
Whitepaper: IP Risk Assessment & Loss Prevention - Happiest Minds
Whitepaper: IP Risk Assessment & Loss Prevention - Happiest MindsWhitepaper: IP Risk Assessment & Loss Prevention - Happiest Minds
Whitepaper: IP Risk Assessment & Loss Prevention - Happiest Minds
Happiest Minds Technologies
 
MCGlobalTech Service Presentation
MCGlobalTech Service PresentationMCGlobalTech Service Presentation
MCGlobalTech Service Presentation
William McBorrough
 
20th March Session Five by Ramesh Shanmughanathan
20th March Session Five by Ramesh Shanmughanathan20th March Session Five by Ramesh Shanmughanathan
20th March Session Five by Ramesh Shanmughanathan
Sharath Kumar
 
gtipl_profile.pptx
gtipl_profile.pptxgtipl_profile.pptx
gtipl_profile.pptx
ssuser41d278
 
Cyber risk management-white-paper-v8 (2) 2015
Cyber risk management-white-paper-v8 (2) 2015Cyber risk management-white-paper-v8 (2) 2015
Cyber risk management-white-paper-v8 (2) 2015
Accounting_Whitepapers
 
Case study financial_services
Case study financial_servicesCase study financial_services
Case study financial_services
G. Subramanian
 
Smart security solutions for SMBs
Smart security solutions for SMBsSmart security solutions for SMBs
Smart security solutions for SMBs
Jyothi Satyanathan
 
NUS-ISS Learning Day 2019-Architecting security in the digital age
NUS-ISS Learning Day 2019-Architecting security in the digital ageNUS-ISS Learning Day 2019-Architecting security in the digital age
NUS-ISS Learning Day 2019-Architecting security in the digital age
NUS-ISS
 
Core.co.enterprise.deck.06.16.10
Core.co.enterprise.deck.06.16.10Core.co.enterprise.deck.06.16.10
Core.co.enterprise.deck.06.16.10
Core Security Technologies
 
IT governance and Information System Security
IT governance and Information System SecurityIT governance and Information System Security
IT governance and Information System Security
CSSRL PUNE
 

Similar to YHCG - IT Security and Risk Management (20)

10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should Know10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should Know
 
IT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSALIT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSAL
 
Skillmine CISO as service
Skillmine CISO as serviceSkillmine CISO as service
Skillmine CISO as service
 
Omzig
OmzigOmzig
Omzig
 
Laser App Conference 2017 - Sid Yenamandra, Entreda
Laser App Conference 2017 - Sid Yenamandra, EntredaLaser App Conference 2017 - Sid Yenamandra, Entreda
Laser App Conference 2017 - Sid Yenamandra, Entreda
 
CV of Mohan M
CV of Mohan MCV of Mohan M
CV of Mohan M
 
Pankaj's Resume Information Security Professional
Pankaj's Resume Information Security ProfessionalPankaj's Resume Information Security Professional
Pankaj's Resume Information Security Professional
 
CV_Anil K Dubey V1.1
CV_Anil K Dubey V1.1CV_Anil K Dubey V1.1
CV_Anil K Dubey V1.1
 
InDefend-Integrated Data Privacy Offerings
InDefend-Integrated Data Privacy Offerings  InDefend-Integrated Data Privacy Offerings
InDefend-Integrated Data Privacy Offerings
 
MCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationMCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service Presentation
 
Whitepaper: IP Risk Assessment & Loss Prevention - Happiest Minds
Whitepaper: IP Risk Assessment & Loss Prevention - Happiest MindsWhitepaper: IP Risk Assessment & Loss Prevention - Happiest Minds
Whitepaper: IP Risk Assessment & Loss Prevention - Happiest Minds
 
MCGlobalTech Service Presentation
MCGlobalTech Service PresentationMCGlobalTech Service Presentation
MCGlobalTech Service Presentation
 
20th March Session Five by Ramesh Shanmughanathan
20th March Session Five by Ramesh Shanmughanathan20th March Session Five by Ramesh Shanmughanathan
20th March Session Five by Ramesh Shanmughanathan
 
gtipl_profile.pptx
gtipl_profile.pptxgtipl_profile.pptx
gtipl_profile.pptx
 
Cyber risk management-white-paper-v8 (2) 2015
Cyber risk management-white-paper-v8 (2) 2015Cyber risk management-white-paper-v8 (2) 2015
Cyber risk management-white-paper-v8 (2) 2015
 
Case study financial_services
Case study financial_servicesCase study financial_services
Case study financial_services
 
Smart security solutions for SMBs
Smart security solutions for SMBsSmart security solutions for SMBs
Smart security solutions for SMBs
 
NUS-ISS Learning Day 2019-Architecting security in the digital age
NUS-ISS Learning Day 2019-Architecting security in the digital ageNUS-ISS Learning Day 2019-Architecting security in the digital age
NUS-ISS Learning Day 2019-Architecting security in the digital age
 
Core.co.enterprise.deck.06.16.10
Core.co.enterprise.deck.06.16.10Core.co.enterprise.deck.06.16.10
Core.co.enterprise.deck.06.16.10
 
IT governance and Information System Security
IT governance and Information System SecurityIT governance and Information System Security
IT governance and Information System Security
 

YHCG - IT Security and Risk Management

  • 1. ~ Aegis ~ ~Product overview ~ Yellow House Consulting Group Copyright © 2014-15 yhcg.in Beyond Firewalls Protection & Performance ~ Aegis ~
  • 2. Copyright © 2014-15 yhcg.in  IT assessments bring in IT discipline, reality check and ensures continuous IT maturity and readiness for the organization  80% of large and 60% of small organizations experienced at least one “malicious security incident” in 2014  60% Indian IT professionals feel organizations cannot protect itself from Cyber attacks Why IT Security and Risk Management ? Yellow House Consulting Group Aegis ~ IT Security & Risk Management DDoS, Web applications, and IT infrastructure attacks represent some of the most critical threats to enterprises today ~ Akamai security report, Q4, 2014
  • 3. Copyright © 2014-15 yhcg.in  Hackers used email information from Mumbai firm, “Mallak Specialities Pvt Ltd”, to fleece the firm to deposit money into bank accounts ~ 27-OCT-2014 - HC directs CBI to investigate  19% of incidents are a results of insider privilege misuse – Verizon Report  The ONLY way to strengthen and test your IT systems effectiveness, efficiency & readiness of IT security is by periodic systems assessment and vulnerability tests by a systems vendor Why IT Security and Risk Management ? Yellow House Consulting Group Aegis ~ IT Security & Risk Management
  • 4. Copyright © 2014-15 yhcg.in  IT security and risk management Objectives  Common IT assessment Observations  What we are confident of – YHCG IT services lines  IT for Business transformation  What after IT assessment ? Index Yellow House Consulting Group Aegis ~ IT Security & Risk Management
  • 5. Copyright © 2014-15 yhcg.in  Alignment of Business requirements with existing IT Support Systems  Availability of mature and cost effective IT systems – for negligible down time  Security – Accessibility to ONLY authorized users, prevention of Data theft and Vulnerability to unwarranted intrusions and attacks …contd. Risk Management Objectives – what we look for ? Yellow House Consulting Group Aegis ~ IT Security & Risk Management
  • 6. Copyright © 2014-15 yhcg.in  Capability – Provide users with necessary tools and solutions to efficiently and effectively do their jobs and be flexible in adapting to changing business needs  Competitiveness – IT being used as an business enabler for competitive advantage Risk Management Objectives – what we look for ? Yellow House Consulting Group Aegis ~ IT Security & Risk Management
  • 7.  No pre-defined IT Strategy hence absence of Business-IT Alignment  No SOP made available for Policy reference and Security Implementation  Absence of IT Security & Configuration management (baseline & setup) plan  Critical lapses in IT operations control leading to attack vulnerability …contd. Common Observations during assessment Copyright © 2014-15 yhcg.in Yellow House Consulting Group Aegis ~ IT Security & Risk Management
  • 8.  Weak Network security & end-point device access  No Data theft prevention (people, process & systems) – DLP measures  Minimal or no documentation of planning and methodology for IT infra forward capacity building  Isolated planning and implementation of IT Network and security … contd. Common Observations during assessment Copyright © 2014-15 yhcg.in Yellow House Consulting Group Aegis ~ IT Security & Risk Management
  • 9. Copyright © 2014-15 yhcg.in  No IT Disaster Recovery Plan for Business Continuity  Low level of IT Security Maturity, IT Ops Control, Configuration Management, Data Loss and Theft prevention  No evidence of IT being used as an enabler to transform business Common Observations during assessment Yellow House Consulting Group Aegis ~ IT Security & Risk Management
  • 10.  Organization’s IT Setup – managed by quality team having pre-defined KPAs and responsibilities (in - house and/or outsourced)  IT Framework – to implement IT Security policies and Operation Control Systems  IT Role - to facilitate, support and steer the organizational goals as a Business Transformational Agent …contd. Post Assessment Implementation by YHCG Copyright © 2014-15 yhcg.in Yellow House Consulting Group Aegis ~ IT Security & Risk Management
  • 11.  Secure IT Network Architecture – Network overhauled and re-postured due to lack of security controls & concepts like zoning & DMZ  Security management and IT ops monitoring software Implementation  IT Vulnerability - Overcome IT Operational Control weaknesses and implement governance framework & security policies to mitigate Business- IT risks …contd. Post Assessment Implementation by YHCG Copyright © 2014-15 yhcg.in Yellow House Consulting Group Aegis ~ IT Security & Risk Management
  • 12.  DLP (data loss prevention)- to be implemented at the organization level  Disaster Recovery Plan - to be developed to support the organization’s Business Continuity Plan  IT Cost Control – evaluate early adoption of Hybrid Cloud solutions, Server Virtualization and Open Source Software to reduce cost, infra manageability and maintain high availability of certain data & software services …contd. Post Assessment Implementation by YHCG Copyright © 2014-15 yhcg.in Yellow House Consulting Group Aegis ~ IT Security & Risk Management
  • 13.  Secure Connectivity - evaluate cost and implement VPN connectivity for more secure connectivity between HO & branches  IT Planning – Short / Long Term plans and Vision which include:  Processes - tuned & in alignment with Business needs  Systems - operational control and overhaul  People - optimally sized trained staff augmentation to satisfy new necessary roles and responsibilities Post Assessment Implementation by YHCG Copyright © 2014-15 yhcg.in Yellow House Consulting Group Aegis ~ IT Security & Risk Management
  • 14. Copyright © 2014-15 yhcg.in  Smart & Disciplined IT implementation can help to solve specific business complexities and help do business effectively and efficiently  In today’s fast paced business environment, it is about managing your systems & data optimally so that it will transform your business  Excellence in Technology Implementation is the best way to put distance between a company and its competitors  IT should not be just adopted for IT sake IT Myth : ~ more resources, extra cost, more hardware & software - but best-in-class practices prove otherwise IT for Business Transformation… Yellow House Consulting Group Aegis ~ IT Security & Risk Management
  • 15. Copyright © 2014-15 yhcg.in  IT systems & software setup, Network & IT Security Grade - assessment  Secure Network Design and implementation (Small and Medium businesses)  Data Loss Prevention (DLP) – design and implementation  Cyber defence – assessment, design and implementation  Vulnerability assessment & Penetration Test (VAPT)  Identity and access management - design and implementation  Hybrid Cloud – design & implementation YHCG service lines …….. Yellow House Consulting Group Aegis ~ IT Security & Risk Management
  • 16. Copyright © 2014-15 yhcg.in We can execute the implementation as per the assessment report and recommendations Or We can do the Implementation handholding post assessment as per the recommendations in the report What after IT assessment ? Yellow House Consulting Group Aegis ~ IT assessment Overview
  • 17. Copyright © 2014-15 yhcg.in Thank you ! Yellow House Consulting Group www.yhcg.in Yellow House Consulting Group Aegis ~ IT Security & Risk Management