SlideShare uma empresa Scribd logo
1 de 51
Sorry Image Redacted for Privacy ______ Security Solutions
Security ,[object Object],Information security means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification or destruction Presented by. Peleg Holzmann, CISSP
______ & Security ,[object Object],To .... Presented by. Peleg Holzmann, CISSP
Overview: Gain Security Awareness When you hire ______ you do not get one person but rather get a team of highly trained and experienced IT professionals who are experienced in all areas of information security. ______ works with you to understand your business goals, concerns and your organizations vision to create the optimal security solution customized for your individual organization. Presented by. Peleg Holzmann, CISSP
A few questions 1. What is your corporate vision for security? 2. Where are you today? 3. Where do you want to be? 4. How do we get there? 5. Did we get there? 6. How do we keep the momentum going? Presented by. Peleg Holzmann, CISSP
One Answer Sorry Image Redacted for Privacy We can help you answer all these questions! Presented by. Peleg Holzmann, CISSP
CIA Triangle Presented by. Peleg Holzmann, CISSP
Risk Risk is  the likelihood of the occurrence of a vulnerability multiplied by the value of the information asset minus - the percentage of risk mitigated by current controls plus + the uncertainty of the current knowledge of the vulnerability. Presented by. Peleg Holzmann, CISSP
Risk $1000 $25,000 Threat $1000 $200 Presented by. Peleg Holzmann, CISSP
Layered Approach– Defense in Depth Redundancy Security Planning (IR, DR, BC) Monitoring Systems Patches & Updates Education and  Training Host IDS Firewalls Authorized Personnel Network IDS Information Network IPS Proxy Servers Systems Encryption Backups People Networks Policies and Laws Access Controls Internet Technology People Presented by. Peleg Holzmann, CISSP
Security Awareness Presented by. Peleg Holzmann, CISSP
Continual Service Improvement Presented by. Peleg Holzmann, CISSP
Typical Information Security Audit Procedure Step 1.1: NIST/ISO Security Standards Step 1: Ascertain Applicable Laws Requirements Presented by. Peleg Holzmann, CISSP
Requirements Continued InformationSecurity InformationSecurity Management System Standards / Frameworks (ISO 27000) Processes Policies Procedures Practices Accountability Compliance, Assurance, Audit Presented by. Peleg Holzmann, CISSP
Step 1 – Ascertain applicable laws/standards Determine if your organization needs to meet any laws or standards. ,[object Object]
SOX
GLBA
Etc. Determine if your organization is following any NIST/ISO Standards/Frameworks  ,[object Object]
ISO 17799
COBIT
Etc.
Determine specific requirementsPresented by. Peleg Holzmann, CISSP
Step 1 – Example HIPPA Some areas which need to be addressed and documented would include: Physical Security Systems should be located in physically secure locations, whenever possible.  Secure Locations Secure locations must have physical access controls (Card Key, door locks, etc.) that prevent unauthorized entry, particularly during periods outside of normal work hours, or when authorized personnel are not present to monitor security.  Access Control Systems Access control systems must be maintained in good working order and records of maintenance, modification and repair activities should be available.  Media Destruction and Recycling Back-up Systems and Procedures Account Management and Access Review Emergency Access Disaster Recovery… Presented by. Peleg Holzmann, CISSP
Typical Information Security Audit Procedure Step 2: Prepare Project Plan Step 1.1: NIST/ISO Security Standards Step 1: Ascertain Applicable Laws Requirements Presented by. Peleg Holzmann, CISSP
Step 2 – Project Plan Utilizing Microsoft Project design and maintain a feasible and detailed project plan. Each project plan is followed and evaluated constantly to ensure that milestones, schedules and budgets are met.   Presented by. Peleg Holzmann, CISSP
Typical Information Security Audit Procedure Documentation Review Step 3: Gather Information & Identify  Assets Step 2: Prepare Project Plan Step 1.1: NIST/ISO Security Standards Step 1: Ascertain Applicable Laws Interviews Requirements Presented by. Peleg Holzmann, CISSP
Step 3 – Gather Information Use tools, interviews and documentation review to analyze business risk profile.   Presented by. Peleg Holzmann, CISSP
Step 3 – Gather Information - Interviews Sorry Image Redacted for Privacy Presented by. Peleg Holzmann, CISSP
Step 3 – Gather Information - Software Nessus Secunia Microsoft Baseline Security Analyzer (MBSA) Presented by. Peleg Holzmann, CISSP
Step 3 – Gather Information – Documentation Review Presented by. Peleg Holzmann, CISSP
Typical Information Security Audit Procedure Documentation Review Step 3: Gather Information & Identify  Assets Step 2: Prepare Project Plan Step 4: Perform Risk Analysis Step 1.1: NIST/ISO Security Standards Step 1: Ascertain Applicable Laws Interviews Requirements Presented by. Peleg Holzmann, CISSP
Step 4 – Perform Risk Analysis Risk is  the likelihood of the occurrence of a vulnerability multiplied by the value of the information asset minus - the percentage of risk mitigated by current controls plus + the uncertainty of the current knowledge of the vulnerability. Presented by. Peleg Holzmann, CISSP
System Boundary System Functions Systems & Data Criticality System & Data Sensitivity Hardware Software System Interfaces Data & Information People System Mission History of system attacks Outside agency data Step 6: Impact Analysis  Loss of CIA Threat Statement Step 2: Threat Identification Step 3: Vulnerability Identification Step 4: Control Analysis Step 7: Risk Determination Step 5: Likelihood determination Step 1: System Characterization Prior Risk Assessments Prior Audits Security Requirements Security Test Results List of Potential Vulnerabilities Current Controls Planned Controls List of current & planned controls Threat Source Motivation Threat Capacity Nature of Vulnerability Current Controls Impact Rating Mission impact analysis Asset criticality assessment Data criticality Data sensitivity Impact Ratings Likelihood of threat exploitation Magnitude of impact Adequacy of planned & Implemented controls Risk & Associated Risk Levels Presented by. Peleg Holzmann, CISSP
Step 4 – Perform Risk Analysis (Quantitative)  Quantitative Approach (more detailed and longer time frame) Single Loss Expectancy (SLE) Annualized Rate of Occurrence (ARO) Annualized Loss Expectancy (ALE) SLE x ARO = ALE  Cost Basis Analysis (CBA) Annualized Cost of Safeguard (ACS) CBA = ALE (prior) – ALE (Post) - ACS Presented by. Peleg Holzmann, CISSP
Step 4 – Perform Risk Analysis (Qualitative)  Qualitative Approach (Faster and Cheaper) Low, Medium, High, Very High Assign a degree to the asset then create a RISK Matrix Chart similar to sample shown. Presented by. Peleg Holzmann, CISSP
Step 4 – Perform Risk Analysis At ______ we use both in combination: Quantitative and Qualitative to produce the most accurate risk matrix. Sorry Image Redacted for Privacy Quantitative Qualitative Presented by. Peleg Holzmann, CISSP
Step 4 – Perform Risk Analysis At ______ we use both in combination: Quantitative and Qualitative to produce the most accurate risk matrix. Identify Information Assets Implement  Control Plan for Maintenance Vulnerability  Worksheet Access Control Measure Risk to Asset Control Strategy And Plan Adequate Controls? Adequate Risk? YES NO YES NO Presented by. Peleg Holzmann, CISSP
Typical Information Security Audit Procedure Documentation Review Step 3: Gather Information & Identify  Assets Step 5: Report Findings &  Recommendations Step 2: Prepare Project Plan Step 4: Perform Risk Analysis Step 1.1: NIST/ISO Security Standards Step 1: Ascertain Applicable Laws Interviews Requirements Presented by. Peleg Holzmann, CISSP
Step 5 – Report Findings and Recommendations Presented by. Peleg Holzmann, CISSP
Typical Information Security Audit Procedure Documentation Review Step 6: Prepare  Implementation Plan Step 3: Gather Information & Identify  Assets Step 5: Report Findings &  Recommendations Step 2: Prepare Project Plan Step 4: Perform Risk Analysis Step 1.1: NIST/ISO Security Standards Step 1: Ascertain Applicable Laws Interviews Requirements Presented by. Peleg Holzmann, CISSP
Step 6 – Implementation Plan Presented by. Peleg Holzmann, CISSP
Step 4 – Example of Patches and Vulnerabilities Sorry Image Redacted for Privacy Presented by. Peleg Holzmann, CISSP
Typical Information Security Audit Procedure Documentation Review Step 6: Prepare  Implementation Plan Step 7: Continual Service  Improvement Step 3: Gather Information & Identify  Assets Step 5: Report Findings &  Recommendations Step 2: Prepare Project Plan Step 4: Perform Risk Analysis Step 1.1: NIST/ISO Security Standards Step 1: Ascertain Applicable Laws Interviews Requirements Presented by. Peleg Holzmann, CISSP
Step 7: Continual Service Improvement Presented by. Peleg Holzmann, CISSP
Some Examples…. Presented by. Peleg Holzmann, CISSP
Firewall Rules Sorry Image Redacted for Privacy Presented by. Peleg Holzmann, CISSP
Wi-Fi Site Analysis Presented by. Peleg Holzmann, CISSP
Network Analysis Sorry Image Redacted for Privacy Presented by. Peleg Holzmann, CISSP
Documentation – MacAfee Epolicy Orchestrator  Sorry Image Redacted for Privacy Presented by. Peleg Holzmann, CISSP
Patch / Change Management Report Sorry Image Redacted for Privacy Presented by. Peleg Holzmann, CISSP
Risk Assessment Sorry Image Redacted for Privacy Presented by. Peleg Holzmann, CISSP

Mais conteúdo relacionado

Mais procurados

Root Cause Analysis - methods and best practice
Root Cause Analysis - methods and best practiceRoot Cause Analysis - methods and best practice
Root Cause Analysis - methods and best practiceMedgate Inc.
 
Safety Lifecycle Management - Emerson Exchange 2010 - Meet the Experts
Safety Lifecycle Management - Emerson Exchange 2010 - Meet the Experts Safety Lifecycle Management - Emerson Exchange 2010 - Meet the Experts
Safety Lifecycle Management - Emerson Exchange 2010 - Meet the Experts Mike Boudreaux
 
Sil assessment Risk Graph and LOPA Training iFluids
Sil assessment Risk Graph and LOPA Training iFluidsSil assessment Risk Graph and LOPA Training iFluids
Sil assessment Risk Graph and LOPA Training iFluidsJohn Kingsley
 
Part 4 of 6 - Analysis Phase - Safety Lifecycle Seminar - Emerson Exchange 2010
Part 4 of 6 - Analysis Phase - Safety Lifecycle Seminar - Emerson Exchange 2010Part 4 of 6 - Analysis Phase - Safety Lifecycle Seminar - Emerson Exchange 2010
Part 4 of 6 - Analysis Phase - Safety Lifecycle Seminar - Emerson Exchange 2010Mike Boudreaux
 
Safety life cycle seminar IEC61511
Safety life cycle seminar IEC61511Safety life cycle seminar IEC61511
Safety life cycle seminar IEC61511Luis Atencio
 
Assess all the things
Assess all the thingsAssess all the things
Assess all the thingsJerod Brennen
 

Mais procurados (6)

Root Cause Analysis - methods and best practice
Root Cause Analysis - methods and best practiceRoot Cause Analysis - methods and best practice
Root Cause Analysis - methods and best practice
 
Safety Lifecycle Management - Emerson Exchange 2010 - Meet the Experts
Safety Lifecycle Management - Emerson Exchange 2010 - Meet the Experts Safety Lifecycle Management - Emerson Exchange 2010 - Meet the Experts
Safety Lifecycle Management - Emerson Exchange 2010 - Meet the Experts
 
Sil assessment Risk Graph and LOPA Training iFluids
Sil assessment Risk Graph and LOPA Training iFluidsSil assessment Risk Graph and LOPA Training iFluids
Sil assessment Risk Graph and LOPA Training iFluids
 
Part 4 of 6 - Analysis Phase - Safety Lifecycle Seminar - Emerson Exchange 2010
Part 4 of 6 - Analysis Phase - Safety Lifecycle Seminar - Emerson Exchange 2010Part 4 of 6 - Analysis Phase - Safety Lifecycle Seminar - Emerson Exchange 2010
Part 4 of 6 - Analysis Phase - Safety Lifecycle Seminar - Emerson Exchange 2010
 
Safety life cycle seminar IEC61511
Safety life cycle seminar IEC61511Safety life cycle seminar IEC61511
Safety life cycle seminar IEC61511
 
Assess all the things
Assess all the thingsAssess all the things
Assess all the things
 

Destaque

Llanos orientales
Llanos orientalesLlanos orientales
Llanos orientalesJohn Medina
 
presentaciones de power point
presentaciones de power pointpresentaciones de power point
presentaciones de power pointSamuel opalinski
 
Sit con Enfoqque
Sit con Enfoqque Sit con Enfoqque
Sit con Enfoqque ConectaDEL
 
Orientaciones generales[1]
Orientaciones generales[1]Orientaciones generales[1]
Orientaciones generales[1]Anelin Montero
 
UF MBA Brand Exploratory
UF MBA  Brand ExploratoryUF MBA  Brand Exploratory
UF MBA Brand Exploratorywestka2004
 
Sexismo
SexismoSexismo
Sexismomaltux
 
Paises Colonizados - Egipto
Paises Colonizados - EgiptoPaises Colonizados - Egipto
Paises Colonizados - EgiptoLucca Adell
 
II Encuentro de la Seguridad Integral, Seg2 2010 - Eulen Seguridad
II Encuentro de la Seguridad Integral, Seg2   2010 - Eulen SeguridadII Encuentro de la Seguridad Integral, Seg2   2010 - Eulen Seguridad
II Encuentro de la Seguridad Integral, Seg2 2010 - Eulen SeguridadRicardo Cañizares Sales
 
A Viga Mestra Dos Contratos De Engenharia
A Viga Mestra Dos Contratos De EngenhariaA Viga Mestra Dos Contratos De Engenharia
A Viga Mestra Dos Contratos De EngenhariaFernando Henrique Cunha
 
Musstanser Tinauli portfolio (v2)
Musstanser Tinauli portfolio (v2)Musstanser Tinauli portfolio (v2)
Musstanser Tinauli portfolio (v2)Musstanser Tinauli
 
Mk0013– marketing research
Mk0013– marketing researchMk0013– marketing research
Mk0013– marketing researchRohit Mishra
 
Comenius Countries
Comenius CountriesComenius Countries
Comenius CountriesConxi López
 
Métricas em Mídias Sociais - MBA Gestão Estratégica de Mídias Sociais (aula 02)
Métricas em Mídias Sociais - MBA Gestão Estratégica de Mídias Sociais (aula 02)Métricas em Mídias Sociais - MBA Gestão Estratégica de Mídias Sociais (aula 02)
Métricas em Mídias Sociais - MBA Gestão Estratégica de Mídias Sociais (aula 02)Tarcízio Silva
 
Sevicios De Calidad Y Distintivos H Y M
Sevicios De Calidad Y Distintivos H Y MSevicios De Calidad Y Distintivos H Y M
Sevicios De Calidad Y Distintivos H Y Mguest9a3aa8
 

Destaque (20)

Llanos orientales
Llanos orientalesLlanos orientales
Llanos orientales
 
presentaciones de power point
presentaciones de power pointpresentaciones de power point
presentaciones de power point
 
Sit con Enfoqque
Sit con Enfoqque Sit con Enfoqque
Sit con Enfoqque
 
Conacyt
ConacytConacyt
Conacyt
 
Orientaciones generales[1]
Orientaciones generales[1]Orientaciones generales[1]
Orientaciones generales[1]
 
UF MBA Brand Exploratory
UF MBA  Brand ExploratoryUF MBA  Brand Exploratory
UF MBA Brand Exploratory
 
Xbox system
Xbox systemXbox system
Xbox system
 
Sexismo
SexismoSexismo
Sexismo
 
Lotusphere 2012 - What's new in ibm connections
Lotusphere 2012 - What's new in ibm connectionsLotusphere 2012 - What's new in ibm connections
Lotusphere 2012 - What's new in ibm connections
 
Paises Colonizados - Egipto
Paises Colonizados - EgiptoPaises Colonizados - Egipto
Paises Colonizados - Egipto
 
Gradientes
GradientesGradientes
Gradientes
 
II Encuentro de la Seguridad Integral, Seg2 2010 - Eulen Seguridad
II Encuentro de la Seguridad Integral, Seg2   2010 - Eulen SeguridadII Encuentro de la Seguridad Integral, Seg2   2010 - Eulen Seguridad
II Encuentro de la Seguridad Integral, Seg2 2010 - Eulen Seguridad
 
A Viga Mestra Dos Contratos De Engenharia
A Viga Mestra Dos Contratos De EngenhariaA Viga Mestra Dos Contratos De Engenharia
A Viga Mestra Dos Contratos De Engenharia
 
Musstanser Tinauli portfolio (v2)
Musstanser Tinauli portfolio (v2)Musstanser Tinauli portfolio (v2)
Musstanser Tinauli portfolio (v2)
 
Mk0013– marketing research
Mk0013– marketing researchMk0013– marketing research
Mk0013– marketing research
 
Comenius Countries
Comenius CountriesComenius Countries
Comenius Countries
 
AgileCamp 2014 Track 4: Your Plans meet Reality with Lean Canvas
AgileCamp 2014 Track 4: Your Plans meet Reality with Lean CanvasAgileCamp 2014 Track 4: Your Plans meet Reality with Lean Canvas
AgileCamp 2014 Track 4: Your Plans meet Reality with Lean Canvas
 
Métricas em Mídias Sociais - MBA Gestão Estratégica de Mídias Sociais (aula 02)
Métricas em Mídias Sociais - MBA Gestão Estratégica de Mídias Sociais (aula 02)Métricas em Mídias Sociais - MBA Gestão Estratégica de Mídias Sociais (aula 02)
Métricas em Mídias Sociais - MBA Gestão Estratégica de Mídias Sociais (aula 02)
 
Sevicios De Calidad Y Distintivos H Y M
Sevicios De Calidad Y Distintivos H Y MSevicios De Calidad Y Distintivos H Y M
Sevicios De Calidad Y Distintivos H Y M
 
Guia paa 1
Guia paa 1Guia paa 1
Guia paa 1
 

Semelhante a Presentation (2010)

Gs Us Roadmap For A World Class Information Security Management System– Isoie...
Gs Us Roadmap For A World Class Information Security Management System– Isoie...Gs Us Roadmap For A World Class Information Security Management System– Isoie...
Gs Us Roadmap For A World Class Information Security Management System– Isoie...Tammy Clark
 
How to assess and manage cyber risk
How to assess and manage cyber riskHow to assess and manage cyber risk
How to assess and manage cyber riskStephen Cobb
 
Slide Deck – Class Session 1 – FRSecure CISSP Mentor Program
Slide Deck – Class Session 1 – FRSecure CISSP Mentor ProgramSlide Deck – Class Session 1 – FRSecure CISSP Mentor Program
Slide Deck – Class Session 1 – FRSecure CISSP Mentor ProgramFRSecure
 
Implementation of security standards and procedures
Implementation of security standards and proceduresImplementation of security standards and procedures
Implementation of security standards and proceduresStevenSegaert
 
ION-E Defense In Depth Presentation for The Institiute of Internal Auditors
ION-E Defense In Depth Presentation for The Institiute of Internal AuditorsION-E Defense In Depth Presentation for The Institiute of Internal Auditors
ION-E Defense In Depth Presentation for The Institiute of Internal Auditorsmdagrossa
 
Developing A Risk Based Information Security Program
Developing A Risk Based Information Security ProgramDeveloping A Risk Based Information Security Program
Developing A Risk Based Information Security ProgramTammy Clark
 
Redspin Webinar - Prepare for a HIPAA Security Risk Analysis
Redspin Webinar - Prepare for a HIPAA Security Risk AnalysisRedspin Webinar - Prepare for a HIPAA Security Risk Analysis
Redspin Webinar - Prepare for a HIPAA Security Risk AnalysisRedspin, Inc.
 
Career In Information security
Career In Information securityCareer In Information security
Career In Information securityAnant Shrivastava
 
Data Security For Compliance 2
Data Security For Compliance 2Data Security For Compliance 2
Data Security For Compliance 2Flaskdata.io
 
isms-presentation.ppt
isms-presentation.pptisms-presentation.ppt
isms-presentation.pptHasnolAhmad2
 
ISMS Part I
ISMS Part IISMS Part I
ISMS Part Ikhushboo
 
What Suppliers Don't Tell You About Security?
What Suppliers Don't Tell You About Security?What Suppliers Don't Tell You About Security?
What Suppliers Don't Tell You About Security?PECB
 
Overcoming the Challenges of Conducting a SRA
Overcoming the Challenges of Conducting a SRAOvercoming the Challenges of Conducting a SRA
Overcoming the Challenges of Conducting a SRAMatt Moneypenny
 
Slide Deck - CISSP Mentor Program Class Session 1
Slide Deck - CISSP Mentor Program Class Session 1Slide Deck - CISSP Mentor Program Class Session 1
Slide Deck - CISSP Mentor Program Class Session 1FRSecure
 
Гірка правда про безпеку програмного забезпечення, Володимир Стиран
Гірка правда про безпеку програмного забезпечення, Володимир СтиранГірка правда про безпеку програмного забезпечення, Володимир Стиран
Гірка правда про безпеку програмного забезпечення, Володимир СтиранSigma Software
 
Sigma Open Tech Week: Bitter Truth About Software Security
Sigma Open Tech Week: Bitter Truth About Software SecuritySigma Open Tech Week: Bitter Truth About Software Security
Sigma Open Tech Week: Bitter Truth About Software SecurityVlad Styran
 
[Webinar Slides] Data Privacy Solving Negligence, Bad Practices, Access Contr...
[Webinar Slides] Data Privacy Solving Negligence, Bad Practices, Access Contr...[Webinar Slides] Data Privacy Solving Negligence, Bad Practices, Access Contr...
[Webinar Slides] Data Privacy Solving Negligence, Bad Practices, Access Contr...AIIM International
 
Something Fun About Using SIEM by Dr. Anton Chuvakin
Something Fun About Using SIEM by Dr. Anton ChuvakinSomething Fun About Using SIEM by Dr. Anton Chuvakin
Something Fun About Using SIEM by Dr. Anton ChuvakinAnton Chuvakin
 

Semelhante a Presentation (2010) (20)

Gs Us Roadmap For A World Class Information Security Management System– Isoie...
Gs Us Roadmap For A World Class Information Security Management System– Isoie...Gs Us Roadmap For A World Class Information Security Management System– Isoie...
Gs Us Roadmap For A World Class Information Security Management System– Isoie...
 
Cissp Study notes.pdf
Cissp Study notes.pdfCissp Study notes.pdf
Cissp Study notes.pdf
 
How to assess and manage cyber risk
How to assess and manage cyber riskHow to assess and manage cyber risk
How to assess and manage cyber risk
 
Notes prep guide
Notes prep guideNotes prep guide
Notes prep guide
 
Slide Deck – Class Session 1 – FRSecure CISSP Mentor Program
Slide Deck – Class Session 1 – FRSecure CISSP Mentor ProgramSlide Deck – Class Session 1 – FRSecure CISSP Mentor Program
Slide Deck – Class Session 1 – FRSecure CISSP Mentor Program
 
Implementation of security standards and procedures
Implementation of security standards and proceduresImplementation of security standards and procedures
Implementation of security standards and procedures
 
ION-E Defense In Depth Presentation for The Institiute of Internal Auditors
ION-E Defense In Depth Presentation for The Institiute of Internal AuditorsION-E Defense In Depth Presentation for The Institiute of Internal Auditors
ION-E Defense In Depth Presentation for The Institiute of Internal Auditors
 
Developing A Risk Based Information Security Program
Developing A Risk Based Information Security ProgramDeveloping A Risk Based Information Security Program
Developing A Risk Based Information Security Program
 
Redspin Webinar - Prepare for a HIPAA Security Risk Analysis
Redspin Webinar - Prepare for a HIPAA Security Risk AnalysisRedspin Webinar - Prepare for a HIPAA Security Risk Analysis
Redspin Webinar - Prepare for a HIPAA Security Risk Analysis
 
Career In Information security
Career In Information securityCareer In Information security
Career In Information security
 
Data Security For Compliance 2
Data Security For Compliance 2Data Security For Compliance 2
Data Security For Compliance 2
 
isms-presentation.ppt
isms-presentation.pptisms-presentation.ppt
isms-presentation.ppt
 
ISMS Part I
ISMS Part IISMS Part I
ISMS Part I
 
What Suppliers Don't Tell You About Security?
What Suppliers Don't Tell You About Security?What Suppliers Don't Tell You About Security?
What Suppliers Don't Tell You About Security?
 
Overcoming the Challenges of Conducting a SRA
Overcoming the Challenges of Conducting a SRAOvercoming the Challenges of Conducting a SRA
Overcoming the Challenges of Conducting a SRA
 
Slide Deck - CISSP Mentor Program Class Session 1
Slide Deck - CISSP Mentor Program Class Session 1Slide Deck - CISSP Mentor Program Class Session 1
Slide Deck - CISSP Mentor Program Class Session 1
 
Гірка правда про безпеку програмного забезпечення, Володимир Стиран
Гірка правда про безпеку програмного забезпечення, Володимир СтиранГірка правда про безпеку програмного забезпечення, Володимир Стиран
Гірка правда про безпеку програмного забезпечення, Володимир Стиран
 
Sigma Open Tech Week: Bitter Truth About Software Security
Sigma Open Tech Week: Bitter Truth About Software SecuritySigma Open Tech Week: Bitter Truth About Software Security
Sigma Open Tech Week: Bitter Truth About Software Security
 
[Webinar Slides] Data Privacy Solving Negligence, Bad Practices, Access Contr...
[Webinar Slides] Data Privacy Solving Negligence, Bad Practices, Access Contr...[Webinar Slides] Data Privacy Solving Negligence, Bad Practices, Access Contr...
[Webinar Slides] Data Privacy Solving Negligence, Bad Practices, Access Contr...
 
Something Fun About Using SIEM by Dr. Anton Chuvakin
Something Fun About Using SIEM by Dr. Anton ChuvakinSomething Fun About Using SIEM by Dr. Anton Chuvakin
Something Fun About Using SIEM by Dr. Anton Chuvakin
 

Mais de Peleg

Itil v3
Itil v3Itil v3
Itil v3Peleg
 
Final introduction
Final introductionFinal introduction
Final introductionPeleg
 
Continual Service Improvment
Continual Service ImprovmentContinual Service Improvment
Continual Service ImprovmentPeleg
 
Service Operation
Service OperationService Operation
Service OperationPeleg
 
Service Transition
Service TransitionService Transition
Service TransitionPeleg
 
Service Design
Service DesignService Design
Service DesignPeleg
 
Service Strategy
Service StrategyService Strategy
Service StrategyPeleg
 
Introduction
IntroductionIntroduction
IntroductionPeleg
 
Lesson 2
Lesson 2Lesson 2
Lesson 2Peleg
 
Lesson 1
Lesson 1Lesson 1
Lesson 1Peleg
 
Lesson 0
Lesson 0Lesson 0
Lesson 0Peleg
 

Mais de Peleg (11)

Itil v3
Itil v3Itil v3
Itil v3
 
Final introduction
Final introductionFinal introduction
Final introduction
 
Continual Service Improvment
Continual Service ImprovmentContinual Service Improvment
Continual Service Improvment
 
Service Operation
Service OperationService Operation
Service Operation
 
Service Transition
Service TransitionService Transition
Service Transition
 
Service Design
Service DesignService Design
Service Design
 
Service Strategy
Service StrategyService Strategy
Service Strategy
 
Introduction
IntroductionIntroduction
Introduction
 
Lesson 2
Lesson 2Lesson 2
Lesson 2
 
Lesson 1
Lesson 1Lesson 1
Lesson 1
 
Lesson 0
Lesson 0Lesson 0
Lesson 0
 

Presentation (2010)

  • 1. Sorry Image Redacted for Privacy ______ Security Solutions
  • 2.
  • 3.
  • 4. Overview: Gain Security Awareness When you hire ______ you do not get one person but rather get a team of highly trained and experienced IT professionals who are experienced in all areas of information security. ______ works with you to understand your business goals, concerns and your organizations vision to create the optimal security solution customized for your individual organization. Presented by. Peleg Holzmann, CISSP
  • 5. A few questions 1. What is your corporate vision for security? 2. Where are you today? 3. Where do you want to be? 4. How do we get there? 5. Did we get there? 6. How do we keep the momentum going? Presented by. Peleg Holzmann, CISSP
  • 6. One Answer Sorry Image Redacted for Privacy We can help you answer all these questions! Presented by. Peleg Holzmann, CISSP
  • 7. CIA Triangle Presented by. Peleg Holzmann, CISSP
  • 8. Risk Risk is the likelihood of the occurrence of a vulnerability multiplied by the value of the information asset minus - the percentage of risk mitigated by current controls plus + the uncertainty of the current knowledge of the vulnerability. Presented by. Peleg Holzmann, CISSP
  • 9. Risk $1000 $25,000 Threat $1000 $200 Presented by. Peleg Holzmann, CISSP
  • 10. Layered Approach– Defense in Depth Redundancy Security Planning (IR, DR, BC) Monitoring Systems Patches & Updates Education and Training Host IDS Firewalls Authorized Personnel Network IDS Information Network IPS Proxy Servers Systems Encryption Backups People Networks Policies and Laws Access Controls Internet Technology People Presented by. Peleg Holzmann, CISSP
  • 11. Security Awareness Presented by. Peleg Holzmann, CISSP
  • 12. Continual Service Improvement Presented by. Peleg Holzmann, CISSP
  • 13. Typical Information Security Audit Procedure Step 1.1: NIST/ISO Security Standards Step 1: Ascertain Applicable Laws Requirements Presented by. Peleg Holzmann, CISSP
  • 14. Requirements Continued InformationSecurity InformationSecurity Management System Standards / Frameworks (ISO 27000) Processes Policies Procedures Practices Accountability Compliance, Assurance, Audit Presented by. Peleg Holzmann, CISSP
  • 15.
  • 16. SOX
  • 17. GLBA
  • 18.
  • 20. COBIT
  • 21. Etc.
  • 22. Determine specific requirementsPresented by. Peleg Holzmann, CISSP
  • 23. Step 1 – Example HIPPA Some areas which need to be addressed and documented would include: Physical Security Systems should be located in physically secure locations, whenever possible. Secure Locations Secure locations must have physical access controls (Card Key, door locks, etc.) that prevent unauthorized entry, particularly during periods outside of normal work hours, or when authorized personnel are not present to monitor security. Access Control Systems Access control systems must be maintained in good working order and records of maintenance, modification and repair activities should be available. Media Destruction and Recycling Back-up Systems and Procedures Account Management and Access Review Emergency Access Disaster Recovery… Presented by. Peleg Holzmann, CISSP
  • 24. Typical Information Security Audit Procedure Step 2: Prepare Project Plan Step 1.1: NIST/ISO Security Standards Step 1: Ascertain Applicable Laws Requirements Presented by. Peleg Holzmann, CISSP
  • 25. Step 2 – Project Plan Utilizing Microsoft Project design and maintain a feasible and detailed project plan. Each project plan is followed and evaluated constantly to ensure that milestones, schedules and budgets are met. Presented by. Peleg Holzmann, CISSP
  • 26. Typical Information Security Audit Procedure Documentation Review Step 3: Gather Information & Identify Assets Step 2: Prepare Project Plan Step 1.1: NIST/ISO Security Standards Step 1: Ascertain Applicable Laws Interviews Requirements Presented by. Peleg Holzmann, CISSP
  • 27. Step 3 – Gather Information Use tools, interviews and documentation review to analyze business risk profile. Presented by. Peleg Holzmann, CISSP
  • 28. Step 3 – Gather Information - Interviews Sorry Image Redacted for Privacy Presented by. Peleg Holzmann, CISSP
  • 29. Step 3 – Gather Information - Software Nessus Secunia Microsoft Baseline Security Analyzer (MBSA) Presented by. Peleg Holzmann, CISSP
  • 30. Step 3 – Gather Information – Documentation Review Presented by. Peleg Holzmann, CISSP
  • 31. Typical Information Security Audit Procedure Documentation Review Step 3: Gather Information & Identify Assets Step 2: Prepare Project Plan Step 4: Perform Risk Analysis Step 1.1: NIST/ISO Security Standards Step 1: Ascertain Applicable Laws Interviews Requirements Presented by. Peleg Holzmann, CISSP
  • 32. Step 4 – Perform Risk Analysis Risk is the likelihood of the occurrence of a vulnerability multiplied by the value of the information asset minus - the percentage of risk mitigated by current controls plus + the uncertainty of the current knowledge of the vulnerability. Presented by. Peleg Holzmann, CISSP
  • 33. System Boundary System Functions Systems & Data Criticality System & Data Sensitivity Hardware Software System Interfaces Data & Information People System Mission History of system attacks Outside agency data Step 6: Impact Analysis Loss of CIA Threat Statement Step 2: Threat Identification Step 3: Vulnerability Identification Step 4: Control Analysis Step 7: Risk Determination Step 5: Likelihood determination Step 1: System Characterization Prior Risk Assessments Prior Audits Security Requirements Security Test Results List of Potential Vulnerabilities Current Controls Planned Controls List of current & planned controls Threat Source Motivation Threat Capacity Nature of Vulnerability Current Controls Impact Rating Mission impact analysis Asset criticality assessment Data criticality Data sensitivity Impact Ratings Likelihood of threat exploitation Magnitude of impact Adequacy of planned & Implemented controls Risk & Associated Risk Levels Presented by. Peleg Holzmann, CISSP
  • 34. Step 4 – Perform Risk Analysis (Quantitative) Quantitative Approach (more detailed and longer time frame) Single Loss Expectancy (SLE) Annualized Rate of Occurrence (ARO) Annualized Loss Expectancy (ALE) SLE x ARO = ALE Cost Basis Analysis (CBA) Annualized Cost of Safeguard (ACS) CBA = ALE (prior) – ALE (Post) - ACS Presented by. Peleg Holzmann, CISSP
  • 35. Step 4 – Perform Risk Analysis (Qualitative) Qualitative Approach (Faster and Cheaper) Low, Medium, High, Very High Assign a degree to the asset then create a RISK Matrix Chart similar to sample shown. Presented by. Peleg Holzmann, CISSP
  • 36. Step 4 – Perform Risk Analysis At ______ we use both in combination: Quantitative and Qualitative to produce the most accurate risk matrix. Sorry Image Redacted for Privacy Quantitative Qualitative Presented by. Peleg Holzmann, CISSP
  • 37. Step 4 – Perform Risk Analysis At ______ we use both in combination: Quantitative and Qualitative to produce the most accurate risk matrix. Identify Information Assets Implement Control Plan for Maintenance Vulnerability Worksheet Access Control Measure Risk to Asset Control Strategy And Plan Adequate Controls? Adequate Risk? YES NO YES NO Presented by. Peleg Holzmann, CISSP
  • 38. Typical Information Security Audit Procedure Documentation Review Step 3: Gather Information & Identify Assets Step 5: Report Findings & Recommendations Step 2: Prepare Project Plan Step 4: Perform Risk Analysis Step 1.1: NIST/ISO Security Standards Step 1: Ascertain Applicable Laws Interviews Requirements Presented by. Peleg Holzmann, CISSP
  • 39. Step 5 – Report Findings and Recommendations Presented by. Peleg Holzmann, CISSP
  • 40. Typical Information Security Audit Procedure Documentation Review Step 6: Prepare Implementation Plan Step 3: Gather Information & Identify Assets Step 5: Report Findings & Recommendations Step 2: Prepare Project Plan Step 4: Perform Risk Analysis Step 1.1: NIST/ISO Security Standards Step 1: Ascertain Applicable Laws Interviews Requirements Presented by. Peleg Holzmann, CISSP
  • 41. Step 6 – Implementation Plan Presented by. Peleg Holzmann, CISSP
  • 42. Step 4 – Example of Patches and Vulnerabilities Sorry Image Redacted for Privacy Presented by. Peleg Holzmann, CISSP
  • 43. Typical Information Security Audit Procedure Documentation Review Step 6: Prepare Implementation Plan Step 7: Continual Service Improvement Step 3: Gather Information & Identify Assets Step 5: Report Findings & Recommendations Step 2: Prepare Project Plan Step 4: Perform Risk Analysis Step 1.1: NIST/ISO Security Standards Step 1: Ascertain Applicable Laws Interviews Requirements Presented by. Peleg Holzmann, CISSP
  • 44. Step 7: Continual Service Improvement Presented by. Peleg Holzmann, CISSP
  • 45. Some Examples…. Presented by. Peleg Holzmann, CISSP
  • 46. Firewall Rules Sorry Image Redacted for Privacy Presented by. Peleg Holzmann, CISSP
  • 47. Wi-Fi Site Analysis Presented by. Peleg Holzmann, CISSP
  • 48. Network Analysis Sorry Image Redacted for Privacy Presented by. Peleg Holzmann, CISSP
  • 49. Documentation – MacAfee Epolicy Orchestrator Sorry Image Redacted for Privacy Presented by. Peleg Holzmann, CISSP
  • 50. Patch / Change Management Report Sorry Image Redacted for Privacy Presented by. Peleg Holzmann, CISSP
  • 51. Risk Assessment Sorry Image Redacted for Privacy Presented by. Peleg Holzmann, CISSP
  • 52. Documentation Review / Audits Sorry Image Redacted for Privacy Presented by. Peleg Holzmann, CISSP
  • 53. Documentation Work Area Recovery Recommendations Sorry Image Redacted for Privacy Presented by. Peleg Holzmann, CISSP
  • 54. Documentation Business Impact Analysis (BIA) Sorry Image Redacted for Privacy Presented by. Peleg Holzmann, CISSP
  • 55. Control Objective Sorry Image Redacted for Privacy Presented by. Peleg Holzmann, CISSP
  • 56. Policy Document Sorry Image Redacted for Privacy Presented by. Peleg Holzmann, CISSP
  • 57. Standards Document Sorry Image Redacted for Privacy Presented by. Peleg Holzmann, CISSP
  • 58. We help you assemble your complete security solution Presented by. Peleg Holzmann, CISSP