SlideShare uma empresa Scribd logo
1 de 23
Proposed Business Process, metrics
and tools Optimization for key IT
domain
Akin Akinfenwa
12March2019
Confused on
metrics to track,
Good Processes to
adopt, and tools
to use?
 Identity & Access Management
 Secure SDLC & Application
Security
 Endpoint Security
 Vulnerability Management
Always begin with the Story….
Key Assumptions made:
This is not specific to industry, hence the business processes in presentation, metrics, and tools are simply generic and not unique to any situation, most of the
processes could be customized to unique industries as needed. Further assumptions will be that IT controls are mapped to COBIT, NIST 800-53 or ISO 27001 already.
IDENTIFY & ACCESS
MANAGEMENT (IAM)?
IAM are Series of framework of policies, procedures
and technologies for ensuring appropriate personnel
have access to technology resources.
Identify And Access Management
Process and activities
PROVISION ENFORCEADMINISTER
 REQUEST ACCESS
 VALIDATE REQUEST
 APPROVE ACCESS
 ASSIGN AND
COMMUNICATE
ACCESS
 PLAN AND
STRATEGIZE
 MANAGE POLICIES
AND STANDARDS
 EDUCATE AND
MANAGE SYSTEMS
 MONITOR, AUDIT
AND RECONCILE
• AUTHENTICATE
• AUTHORIZE
• LOG ACTIVITIES
S Y S T E M S A N D D A T A
WHAT IS TRACKED AND MEASURED IN IDENTITY AND ACCESS MANAGEMENT?
Metric Tracked Ranking
Average number of distinct accounts (credentials) per user:
Number of unused accounts:
Number of orphaned accounts:
Number of new accounts provisioned:
Number of exceptions per access re-certification cycle
Password policy effectiveness:
Average time to provision and de-provision of a user:
Average time to provide an authorization
Average time to make changes in identity policies:
Violation of separation of duties:
High Business impact
Medium Business Impact
Low Business Impact
Management Perspective:
How well do we manage
user provisioning without
exposing the organization
to access risk.
COMMON TOOLS USED IN IDENTIFY &
ACCESS MANAGEMENT (IAM)
IAM Tools On-Premise Cloud
Forefront Identity Manager X X
Microsoft Azure Active Directory X X
Oracle Identity Management X
Okta Identity Management X X
Zoho Vault X X
OneLogin X X
LogMeIn Pro X
Auth0 X
ExcelID X X
ADManager Plus X X
IBM IAM X X
SECURE SDLC &
APPLICATION
SECURITY
Application security encompasses measures
taken to improve the security of an
application often by finding, fixing and
preventing security vulnerabilities
A secure SDLC process ensures that security
assurance activities such as penetration
testing, code review, and architecture analysis
are an integral part of the development
effort.
SECURE SDLC & APPLICATION SECURITY PROCESS
REQUIREMENTS DESIGN DEVELOPMENT TEXT DEPLOYMENT
Map Security
& Privacy
Requirements
Threat
modelling.
Security design
review
Static Analysis
Peer Review
Security test
cases
Dynamic Analysis
Final security
review
Application
security &
monitoring
Response Plan
Web application security
People
• Training
• organization
Process
• Risk management
• SDLC
• Guidelines
• Verification
Technology
• Tools
• Development
• frameworks
WHAT IS TRACKED AND MEASURED IN APPLICATION SECURITY?
Metric Tracked Ranking
Weighted Risk Trend
Remediation Calculation Window
Application Testing Coverage
Mean Time to Respond
Confirmed exploits
Confirmed Account Takeovers
High Business impact
Medium Business Impact
Low Business Impact
Management
Perspective: Can we
rely on the security
model of business
applications to operate
as intended?
Risk is very relative to industry and other controls established within the business
COMMON TOOLS USED IN APPLICATION SECURITY
Application Security tools On-Premise Cloud
Wapiti X X
Zed Attack Proxy X X
Vega X
W3af X X
Skipfish X X
Ratproxy X X
SQLMap X
Wfuzz X
Wapiti X X
Zed Attack Proxy X X
Vega X X
End Point Security
Endpoint Security/ endpoint protection is
an approach to the protection of
computer networks that are remotely
bridged to client devices.
END POINT SECURITY PROCESS
CONFIGURATION
MANAGEMENT
ANTI-MALWARE
ACCEPTABLE USE RPOLICIES
SYSTEM
MONITORING
END-POINT SECURITY
CONTROLS
DATA SECURITY
APPLICATION
SECURITY
I A M
The policies, processes and technology controls
used to protect the confidentiality, integrity, and
availability of an end point system
What is tracked and Measured in Endpoint Security?
Metric Tracked Ranking
Level of visibility the solution provides :
Types of threat detected :
OS supporting ability :
File detection :
Security controls :
High Business impact
Medium Business Impact
Low Business Impact
Management
Perspective: How well
do we manage the
end point of critical
infrastructures such
as Servers, desktop.
Common tools used in End Point Security
End Point Security tools On-Premise Cloud
Bitdefender X X
Carbon Black X X
Code42 X
Check Point X X
Comodo X X
CounterTack X X
RSA X
SentinelOne X
Sophos X X
Symantec X X
Trend Micro X X
Section Break
Insert the title of your subtitle Here
VULNERABILITY
MANAGEMENT
Vulnerability management is the process
surrounding vulnerability scanning, also taking
into account other aspects such as risk
acceptance, remediation etc.
Vulnerability Management Process
preparation
Vulnerability
scan
Define
Remediation
Implement
Remediation
Rescan
THREAT AND VULNERABILITY MANAGEMENT PROCESS
What is tracked and Measured in Vulnerability Management?
Metric Tracked Ranking
Mean Time to Detect
Mean Time to Resolve
Average Window of Exposure
Scanner Coverage
Scan Frequency by Asset Group
Average Risk by BU / Asset Group
Number of Exceptions Granted
Vulnerability Reopen Rate
% of Systems with no open High / Critical Vulnerability
High Business impact
Medium Business Impact
Low Business Impact
Management Perspective:
How well do we manage
the exposure of the
organization to
vulnerabilities by
identifying and mitigating
known vulnerabilities?
COMMON TOOLS USED IN VULNERABILITY MANAGEMENT
Vulnerability Management tools On-Premise Cloud
Comodo HackerProof X X
OpenVAS X X
Nexpose Community X
Nikto X X
Tripwire IP360 X X
Wireshark X X
Aircrack X
Nessus Professional X
Retina CS Community X X
Microsoft Baseline Security Analyzer (MBSA) X X
AlienVault USM Anywhere X
Thank you.
akin.akinfenwa@cyberopsinc.com

Mais conteúdo relacionado

Mais procurados

Cybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architectureCybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architecturePriyanka Aash
 
Case study financial_services
Case study financial_servicesCase study financial_services
Case study financial_servicesG. Subramanian
 
IBM Security Strategy Overview
IBM Security Strategy OverviewIBM Security Strategy Overview
IBM Security Strategy Overviewxband
 
What We’ve Learned Building a Cyber Security Operation Center: du Case Study
What We’ve Learned Building a Cyber  Security Operation Center: du Case  StudyWhat We’ve Learned Building a Cyber  Security Operation Center: du Case  Study
What We’ve Learned Building a Cyber Security Operation Center: du Case StudyPriyanka Aash
 
Software security engineering
Software security engineeringSoftware security engineering
Software security engineeringAHM Pervej Kabir
 
Software Development Life Cycle – Managing Risk and Measuring Security
Software Development Life Cycle – Managing Risk and Measuring SecuritySoftware Development Life Cycle – Managing Risk and Measuring Security
Software Development Life Cycle – Managing Risk and Measuring SecurityThomas Malmberg
 
Enterprise under attack dealing with security threats and compliance
Enterprise under attack dealing with security threats and complianceEnterprise under attack dealing with security threats and compliance
Enterprise under attack dealing with security threats and complianceSPAN Infotech (India) Pvt Ltd
 
SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1Priyanka Aash
 
Roadmap to security operations excellence
Roadmap to security operations excellenceRoadmap to security operations excellence
Roadmap to security operations excellenceErik Taavila
 
IBM Security Software Solutions - One Pager
IBM Security Software Solutions - One PagerIBM Security Software Solutions - One Pager
IBM Security Software Solutions - One PagerThierry Matusiak
 
SOC: Use cases and are we asking the right questions?
SOC: Use cases and are we asking the right questions?SOC: Use cases and are we asking the right questions?
SOC: Use cases and are we asking the right questions?Jonathan Sinclair
 
Software Security Initiatives
Software Security InitiativesSoftware Security Initiatives
Software Security InitiativesMarco Morana
 
Strategy considerations for building a security operations center
Strategy considerations for building a security operations centerStrategy considerations for building a security operations center
Strategy considerations for building a security operations centerCMR WORLD TECH
 
Certified Information Systems Security Professional
Certified Information Systems Security ProfessionalCertified Information Systems Security Professional
Certified Information Systems Security ProfessionalHelen Njuguna
 
ASMC 2017 - Martin Vliem - Security < productivity < security: syntax ...
ASMC 2017 - Martin Vliem -  Security < productivity < security: syntax ...ASMC 2017 - Martin Vliem -  Security < productivity < security: syntax ...
ASMC 2017 - Martin Vliem - Security < productivity < security: syntax ...PlatformSecurityManagement
 

Mais procurados (19)

Cybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architectureCybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architecture
 
Information Security and the SDLC
Information Security and the SDLCInformation Security and the SDLC
Information Security and the SDLC
 
Case study financial_services
Case study financial_servicesCase study financial_services
Case study financial_services
 
Secure Design: Threat Modeling
Secure Design: Threat ModelingSecure Design: Threat Modeling
Secure Design: Threat Modeling
 
IBM Security Strategy Overview
IBM Security Strategy OverviewIBM Security Strategy Overview
IBM Security Strategy Overview
 
What We’ve Learned Building a Cyber Security Operation Center: du Case Study
What We’ve Learned Building a Cyber  Security Operation Center: du Case  StudyWhat We’ve Learned Building a Cyber  Security Operation Center: du Case  Study
What We’ve Learned Building a Cyber Security Operation Center: du Case Study
 
Soc
SocSoc
Soc
 
Software security engineering
Software security engineeringSoftware security engineering
Software security engineering
 
Risk Management Strategy (RMF v2)
Risk Management Strategy (RMF v2)Risk Management Strategy (RMF v2)
Risk Management Strategy (RMF v2)
 
Software Development Life Cycle – Managing Risk and Measuring Security
Software Development Life Cycle – Managing Risk and Measuring SecuritySoftware Development Life Cycle – Managing Risk and Measuring Security
Software Development Life Cycle – Managing Risk and Measuring Security
 
Enterprise under attack dealing with security threats and compliance
Enterprise under attack dealing with security threats and complianceEnterprise under attack dealing with security threats and compliance
Enterprise under attack dealing with security threats and compliance
 
SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1
 
Roadmap to security operations excellence
Roadmap to security operations excellenceRoadmap to security operations excellence
Roadmap to security operations excellence
 
IBM Security Software Solutions - One Pager
IBM Security Software Solutions - One PagerIBM Security Software Solutions - One Pager
IBM Security Software Solutions - One Pager
 
SOC: Use cases and are we asking the right questions?
SOC: Use cases and are we asking the right questions?SOC: Use cases and are we asking the right questions?
SOC: Use cases and are we asking the right questions?
 
Software Security Initiatives
Software Security InitiativesSoftware Security Initiatives
Software Security Initiatives
 
Strategy considerations for building a security operations center
Strategy considerations for building a security operations centerStrategy considerations for building a security operations center
Strategy considerations for building a security operations center
 
Certified Information Systems Security Professional
Certified Information Systems Security ProfessionalCertified Information Systems Security Professional
Certified Information Systems Security Professional
 
ASMC 2017 - Martin Vliem - Security < productivity < security: syntax ...
ASMC 2017 - Martin Vliem -  Security < productivity < security: syntax ...ASMC 2017 - Martin Vliem -  Security < productivity < security: syntax ...
ASMC 2017 - Martin Vliem - Security < productivity < security: syntax ...
 

Semelhante a Key metrics and process in cyber security case scenario

key metrics and process in cyber security case scenario
key metrics and process in cyber security case scenario key metrics and process in cyber security case scenario
key metrics and process in cyber security case scenario Skillweed
 
Smart security solutions for SMBs
Smart security solutions for SMBsSmart security solutions for SMBs
Smart security solutions for SMBsJyothi Satyanathan
 
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05 Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05 sucesuminas
 
Security Governance Isp Eng
Security Governance Isp EngSecurity Governance Isp Eng
Security Governance Isp EngMaurizio Milazzo
 
Software security engineering
Software security engineeringSoftware security engineering
Software security engineeringAHM Pervej Kabir
 
CompTIA CySA Domain 1 Threat and Vulnerability Management.pptx
CompTIA CySA Domain 1 Threat and Vulnerability Management.pptxCompTIA CySA Domain 1 Threat and Vulnerability Management.pptx
CompTIA CySA Domain 1 Threat and Vulnerability Management.pptxInfosectrain3
 
Does Anyone Remember Enterprise Security Architecture?
Does Anyone Remember Enterprise Security Architecture?Does Anyone Remember Enterprise Security Architecture?
Does Anyone Remember Enterprise Security Architecture?rbrockway
 
Comodo SOC service provider
Comodo SOC service providerComodo SOC service provider
Comodo SOC service providerpaulharry03
 
Software Security Engineering
Software Security EngineeringSoftware Security Engineering
Software Security EngineeringMarco Morana
 
II Security At Microsoft
II Security At MicrosoftII Security At Microsoft
II Security At MicrosoftMark J. Feldman
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxYoisRoberthTapiadeLa
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxVictoriaChavesta
 
Securing the Digital Frontier - An Analysis of Cybersecurity Landscape and Tr...
Securing the Digital Frontier - An Analysis of Cybersecurity Landscape and Tr...Securing the Digital Frontier - An Analysis of Cybersecurity Landscape and Tr...
Securing the Digital Frontier - An Analysis of Cybersecurity Landscape and Tr...Draup3
 
Cyber crime with privention
Cyber crime with privention Cyber crime with privention
Cyber crime with privention Manish Dixit Ceh
 
MS. Cybersecurity Reference Architecture
MS. Cybersecurity Reference ArchitectureMS. Cybersecurity Reference Architecture
MS. Cybersecurity Reference Architectureangelohammond
 
IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future IBM
 
CRS Company Overview -Feb 6 2017
CRS Company Overview -Feb 6 2017CRS Company Overview -Feb 6 2017
CRS Company Overview -Feb 6 2017Joseph John
 

Semelhante a Key metrics and process in cyber security case scenario (20)

key metrics and process in cyber security case scenario
key metrics and process in cyber security case scenario key metrics and process in cyber security case scenario
key metrics and process in cyber security case scenario
 
Smart security solutions for SMBs
Smart security solutions for SMBsSmart security solutions for SMBs
Smart security solutions for SMBs
 
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05 Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
 
Security Governance Isp Eng
Security Governance Isp EngSecurity Governance Isp Eng
Security Governance Isp Eng
 
Software security engineering
Software security engineeringSoftware security engineering
Software security engineering
 
CompTIA CySA Domain 1 Threat and Vulnerability Management.pptx
CompTIA CySA Domain 1 Threat and Vulnerability Management.pptxCompTIA CySA Domain 1 Threat and Vulnerability Management.pptx
CompTIA CySA Domain 1 Threat and Vulnerability Management.pptx
 
CCA study group
CCA study groupCCA study group
CCA study group
 
Does Anyone Remember Enterprise Security Architecture?
Does Anyone Remember Enterprise Security Architecture?Does Anyone Remember Enterprise Security Architecture?
Does Anyone Remember Enterprise Security Architecture?
 
Comodo SOC service provider
Comodo SOC service providerComodo SOC service provider
Comodo SOC service provider
 
Software Security Engineering
Software Security EngineeringSoftware Security Engineering
Software Security Engineering
 
II Security At Microsoft
II Security At MicrosoftII Security At Microsoft
II Security At Microsoft
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
 
Securing the Digital Frontier - An Analysis of Cybersecurity Landscape and Tr...
Securing the Digital Frontier - An Analysis of Cybersecurity Landscape and Tr...Securing the Digital Frontier - An Analysis of Cybersecurity Landscape and Tr...
Securing the Digital Frontier - An Analysis of Cybersecurity Landscape and Tr...
 
CRISC Course Preview
CRISC Course PreviewCRISC Course Preview
CRISC Course Preview
 
Cyber crime with privention
Cyber crime with privention Cyber crime with privention
Cyber crime with privention
 
MS. Cybersecurity Reference Architecture
MS. Cybersecurity Reference ArchitectureMS. Cybersecurity Reference Architecture
MS. Cybersecurity Reference Architecture
 
IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future
 
IAM Solution
IAM  SolutionIAM  Solution
IAM Solution
 
CRS Company Overview -Feb 6 2017
CRS Company Overview -Feb 6 2017CRS Company Overview -Feb 6 2017
CRS Company Overview -Feb 6 2017
 

Mais de Bim Akinfenwa

GRC Program KPIs and KRIs
GRC Program KPIs and KRIsGRC Program KPIs and KRIs
GRC Program KPIs and KRIsBim Akinfenwa
 
GDPR Compliance KPIs and KRIs
GDPR Compliance KPIs and KRIsGDPR Compliance KPIs and KRIs
GDPR Compliance KPIs and KRIsBim Akinfenwa
 
Data Privacy KPIs and KRIs
Data Privacy KPIs and KRIsData Privacy KPIs and KRIs
Data Privacy KPIs and KRIsBim Akinfenwa
 
Operational Technology (OT) Facility KPIs and KRIs
Operational Technology (OT) Facility KPIs and KRIsOperational Technology (OT) Facility KPIs and KRIs
Operational Technology (OT) Facility KPIs and KRIsBim Akinfenwa
 
Vulnerability Management KPIs and KRIs
Vulnerability Management KPIs and KRIsVulnerability Management KPIs and KRIs
Vulnerability Management KPIs and KRIsBim Akinfenwa
 
Cloud Deployment KPIs and KRIs
Cloud Deployment KPIs and KRIsCloud Deployment KPIs and KRIs
Cloud Deployment KPIs and KRIsBim Akinfenwa
 
Asset Management KPIs and KRIs
Asset Management KPIs and KRIsAsset Management KPIs and KRIs
Asset Management KPIs and KRIsBim Akinfenwa
 
Incident Response KPIs and KRIs
Incident Response KPIs and KRIsIncident Response KPIs and KRIs
Incident Response KPIs and KRIsBim Akinfenwa
 
Third-Party Vendor Risk Management KPIs and KRIs
Third-Party Vendor Risk Management KPIs and KRIsThird-Party Vendor Risk Management KPIs and KRIs
Third-Party Vendor Risk Management KPIs and KRIsBim Akinfenwa
 
Cyber IAM KPIs and KRIs
Cyber IAM KPIs and KRIsCyber IAM KPIs and KRIs
Cyber IAM KPIs and KRIsBim Akinfenwa
 
FedRAMP Compliance KPIs and KRIs
FedRAMP Compliance KPIs and KRIsFedRAMP Compliance KPIs and KRIs
FedRAMP Compliance KPIs and KRIsBim Akinfenwa
 
SOX Section 404 KPIs and KRIs
SOX Section 404 KPIs and KRIsSOX Section 404 KPIs and KRIs
SOX Section 404 KPIs and KRIsBim Akinfenwa
 
Data Governance KPIs and KRIs
Data Governance KPIs and KRIsData Governance KPIs and KRIs
Data Governance KPIs and KRIsBim Akinfenwa
 
Risk Assessment KPIs and KRIs:
Risk Assessment KPIs and KRIs:Risk Assessment KPIs and KRIs:
Risk Assessment KPIs and KRIs:Bim Akinfenwa
 
NERC-CIP Compliance KPIs and KRIs
NERC-CIP Compliance KPIs and KRIsNERC-CIP Compliance KPIs and KRIs
NERC-CIP Compliance KPIs and KRIsBim Akinfenwa
 
Threat Intelligence KPIs and KRIs
Threat Intelligence KPIs and KRIsThreat Intelligence KPIs and KRIs
Threat Intelligence KPIs and KRIsBim Akinfenwa
 

Mais de Bim Akinfenwa (20)

GRC Program KPIs and KRIs
GRC Program KPIs and KRIsGRC Program KPIs and KRIs
GRC Program KPIs and KRIs
 
GDPR Compliance KPIs and KRIs
GDPR Compliance KPIs and KRIsGDPR Compliance KPIs and KRIs
GDPR Compliance KPIs and KRIs
 
Data Privacy KPIs and KRIs
Data Privacy KPIs and KRIsData Privacy KPIs and KRIs
Data Privacy KPIs and KRIs
 
BCDR KPIs and KRIs
BCDR KPIs and KRIsBCDR KPIs and KRIs
BCDR KPIs and KRIs
 
Operational Technology (OT) Facility KPIs and KRIs
Operational Technology (OT) Facility KPIs and KRIsOperational Technology (OT) Facility KPIs and KRIs
Operational Technology (OT) Facility KPIs and KRIs
 
Vulnerability Management KPIs and KRIs
Vulnerability Management KPIs and KRIsVulnerability Management KPIs and KRIs
Vulnerability Management KPIs and KRIs
 
Cloud Deployment KPIs and KRIs
Cloud Deployment KPIs and KRIsCloud Deployment KPIs and KRIs
Cloud Deployment KPIs and KRIs
 
Asset Management KPIs and KRIs
Asset Management KPIs and KRIsAsset Management KPIs and KRIs
Asset Management KPIs and KRIs
 
Incident Response KPIs and KRIs
Incident Response KPIs and KRIsIncident Response KPIs and KRIs
Incident Response KPIs and KRIs
 
Third-Party Vendor Risk Management KPIs and KRIs
Third-Party Vendor Risk Management KPIs and KRIsThird-Party Vendor Risk Management KPIs and KRIs
Third-Party Vendor Risk Management KPIs and KRIs
 
Cyber IAM KPIs and KRIs
Cyber IAM KPIs and KRIsCyber IAM KPIs and KRIs
Cyber IAM KPIs and KRIs
 
FedRAMP Compliance KPIs and KRIs
FedRAMP Compliance KPIs and KRIsFedRAMP Compliance KPIs and KRIs
FedRAMP Compliance KPIs and KRIs
 
SOX Section 404 KPIs and KRIs
SOX Section 404 KPIs and KRIsSOX Section 404 KPIs and KRIs
SOX Section 404 KPIs and KRIs
 
SIEM KPIs and KRIs
SIEM KPIs and KRIsSIEM KPIs and KRIs
SIEM KPIs and KRIs
 
RMF KPIs and KRIs
RMF KPIs and KRIsRMF KPIs and KRIs
RMF KPIs and KRIs
 
Data Governance KPIs and KRIs
Data Governance KPIs and KRIsData Governance KPIs and KRIs
Data Governance KPIs and KRIs
 
Risk Assessment KPIs and KRIs:
Risk Assessment KPIs and KRIs:Risk Assessment KPIs and KRIs:
Risk Assessment KPIs and KRIs:
 
NERC-CIP Compliance KPIs and KRIs
NERC-CIP Compliance KPIs and KRIsNERC-CIP Compliance KPIs and KRIs
NERC-CIP Compliance KPIs and KRIs
 
Threat Intelligence KPIs and KRIs
Threat Intelligence KPIs and KRIsThreat Intelligence KPIs and KRIs
Threat Intelligence KPIs and KRIs
 
SDLC KPIs and KRIs
SDLC KPIs and KRIsSDLC KPIs and KRIs
SDLC KPIs and KRIs
 

Último

The Impact of Digital Technologies
The Impact of Digital Technologies The Impact of Digital Technologies
The Impact of Digital Technologies bruguardarib
 
Master the Art of Digital Recruitment in Asia.pdf
Master the Art of Digital Recruitment in Asia.pdfMaster the Art of Digital Recruitment in Asia.pdf
Master the Art of Digital Recruitment in Asia.pdfHigher Education Marketing
 
Common Culture: Paul Willis Symbolic Creativity
Common Culture: Paul Willis Symbolic CreativityCommon Culture: Paul Willis Symbolic Creativity
Common Culture: Paul Willis Symbolic CreativityMonishka Adhikari
 
pptx.marketing strategy of tanishq. pptx
pptx.marketing strategy of tanishq. pptxpptx.marketing strategy of tanishq. pptx
pptx.marketing strategy of tanishq. pptxarsathsahil
 
Influencer Marketing Power point presentation
Influencer Marketing  Power point presentationInfluencer Marketing  Power point presentation
Influencer Marketing Power point presentationdgtivemarketingagenc
 
Research and Discovery Tools for Experimentation - 17 Apr 2024 - v 2.3 (1).pdf
Research and Discovery Tools for Experimentation - 17 Apr 2024 - v 2.3 (1).pdfResearch and Discovery Tools for Experimentation - 17 Apr 2024 - v 2.3 (1).pdf
Research and Discovery Tools for Experimentation - 17 Apr 2024 - v 2.3 (1).pdfVWO
 
What are the 4 characteristics of CTAs that convert?
What are the 4 characteristics of CTAs that convert?What are the 4 characteristics of CTAs that convert?
What are the 4 characteristics of CTAs that convert?Juan Pineda
 
Most Impressive Construction Leaders in Tech, Making Waves in the Industry, 2...
Most Impressive Construction Leaders in Tech, Making Waves in the Industry, 2...Most Impressive Construction Leaders in Tech, Making Waves in the Industry, 2...
Most Impressive Construction Leaders in Tech, Making Waves in the Industry, 2...CIO Business World
 
The 10 Most Inspirational Leaders LEADING THE WAY TO SUCCESS, 2024
The 10 Most Inspirational Leaders LEADING THE WAY TO SUCCESS, 2024The 10 Most Inspirational Leaders LEADING THE WAY TO SUCCESS, 2024
The 10 Most Inspirational Leaders LEADING THE WAY TO SUCCESS, 2024CIO Business World
 
Red bull marketing presentation pptxxxxx
Red bull marketing presentation pptxxxxxRed bull marketing presentation pptxxxxx
Red bull marketing presentation pptxxxxx216310017
 
Snapshot of Consumer Behaviors of March 2024-EOLiSurvey (EN).pdf
Snapshot of Consumer Behaviors of March 2024-EOLiSurvey (EN).pdfSnapshot of Consumer Behaviors of March 2024-EOLiSurvey (EN).pdf
Snapshot of Consumer Behaviors of March 2024-EOLiSurvey (EN).pdfEastern Online-iSURVEY
 
Inbound Marekting 2.0 - The Paradigm Shift in Marketing | Axon Garside
Inbound Marekting 2.0 - The Paradigm Shift in Marketing | Axon GarsideInbound Marekting 2.0 - The Paradigm Shift in Marketing | Axon Garside
Inbound Marekting 2.0 - The Paradigm Shift in Marketing | Axon Garsiderobwhite630290
 
What I learned from auditing over 1,000,000 websites - SERP Conf 2024 Patrick...
What I learned from auditing over 1,000,000 websites - SERP Conf 2024 Patrick...What I learned from auditing over 1,000,000 websites - SERP Conf 2024 Patrick...
What I learned from auditing over 1,000,000 websites - SERP Conf 2024 Patrick...Ahrefs
 
Digital Marketing Spotlight: Lifecycle Advertising Strategies.pdf
Digital Marketing Spotlight: Lifecycle Advertising Strategies.pdfDigital Marketing Spotlight: Lifecycle Advertising Strategies.pdf
Digital Marketing Spotlight: Lifecycle Advertising Strategies.pdfDemandbase
 
DGR_Digital Advertising Strategies for a Cookieless World_Presentation.pdf
DGR_Digital Advertising Strategies for a Cookieless World_Presentation.pdfDGR_Digital Advertising Strategies for a Cookieless World_Presentation.pdf
DGR_Digital Advertising Strategies for a Cookieless World_Presentation.pdfDemandbase
 
Storyboards for my Final Major Project Video
Storyboards for my Final Major Project VideoStoryboards for my Final Major Project Video
Storyboards for my Final Major Project VideoSineadBidwell
 
The 10 Most Influential CMO's Leading the Way of Success, 2024 (Final file) (...
The 10 Most Influential CMO's Leading the Way of Success, 2024 (Final file) (...The 10 Most Influential CMO's Leading the Way of Success, 2024 (Final file) (...
The 10 Most Influential CMO's Leading the Way of Success, 2024 (Final file) (...CIO Business World
 
(Generative) AI & Marketing: - Out of the Hype - Empowering the Marketing M...
(Generative) AI & Marketing: - Out of the Hype - Empowering the Marketing M...(Generative) AI & Marketing: - Out of the Hype - Empowering the Marketing M...
(Generative) AI & Marketing: - Out of the Hype - Empowering the Marketing M...Hugues Rey
 
5 Digital Marketing Tips | Devherds Software Solutions
5 Digital Marketing Tips | Devherds Software Solutions5 Digital Marketing Tips | Devherds Software Solutions
5 Digital Marketing Tips | Devherds Software SolutionsDevherds Software Solutions
 
marketing strategy of tanishq word PPROJECT.pdf
marketing strategy of tanishq word PPROJECT.pdfmarketing strategy of tanishq word PPROJECT.pdf
marketing strategy of tanishq word PPROJECT.pdfarsathsahil
 

Último (20)

The Impact of Digital Technologies
The Impact of Digital Technologies The Impact of Digital Technologies
The Impact of Digital Technologies
 
Master the Art of Digital Recruitment in Asia.pdf
Master the Art of Digital Recruitment in Asia.pdfMaster the Art of Digital Recruitment in Asia.pdf
Master the Art of Digital Recruitment in Asia.pdf
 
Common Culture: Paul Willis Symbolic Creativity
Common Culture: Paul Willis Symbolic CreativityCommon Culture: Paul Willis Symbolic Creativity
Common Culture: Paul Willis Symbolic Creativity
 
pptx.marketing strategy of tanishq. pptx
pptx.marketing strategy of tanishq. pptxpptx.marketing strategy of tanishq. pptx
pptx.marketing strategy of tanishq. pptx
 
Influencer Marketing Power point presentation
Influencer Marketing  Power point presentationInfluencer Marketing  Power point presentation
Influencer Marketing Power point presentation
 
Research and Discovery Tools for Experimentation - 17 Apr 2024 - v 2.3 (1).pdf
Research and Discovery Tools for Experimentation - 17 Apr 2024 - v 2.3 (1).pdfResearch and Discovery Tools for Experimentation - 17 Apr 2024 - v 2.3 (1).pdf
Research and Discovery Tools for Experimentation - 17 Apr 2024 - v 2.3 (1).pdf
 
What are the 4 characteristics of CTAs that convert?
What are the 4 characteristics of CTAs that convert?What are the 4 characteristics of CTAs that convert?
What are the 4 characteristics of CTAs that convert?
 
Most Impressive Construction Leaders in Tech, Making Waves in the Industry, 2...
Most Impressive Construction Leaders in Tech, Making Waves in the Industry, 2...Most Impressive Construction Leaders in Tech, Making Waves in the Industry, 2...
Most Impressive Construction Leaders in Tech, Making Waves in the Industry, 2...
 
The 10 Most Inspirational Leaders LEADING THE WAY TO SUCCESS, 2024
The 10 Most Inspirational Leaders LEADING THE WAY TO SUCCESS, 2024The 10 Most Inspirational Leaders LEADING THE WAY TO SUCCESS, 2024
The 10 Most Inspirational Leaders LEADING THE WAY TO SUCCESS, 2024
 
Red bull marketing presentation pptxxxxx
Red bull marketing presentation pptxxxxxRed bull marketing presentation pptxxxxx
Red bull marketing presentation pptxxxxx
 
Snapshot of Consumer Behaviors of March 2024-EOLiSurvey (EN).pdf
Snapshot of Consumer Behaviors of March 2024-EOLiSurvey (EN).pdfSnapshot of Consumer Behaviors of March 2024-EOLiSurvey (EN).pdf
Snapshot of Consumer Behaviors of March 2024-EOLiSurvey (EN).pdf
 
Inbound Marekting 2.0 - The Paradigm Shift in Marketing | Axon Garside
Inbound Marekting 2.0 - The Paradigm Shift in Marketing | Axon GarsideInbound Marekting 2.0 - The Paradigm Shift in Marketing | Axon Garside
Inbound Marekting 2.0 - The Paradigm Shift in Marketing | Axon Garside
 
What I learned from auditing over 1,000,000 websites - SERP Conf 2024 Patrick...
What I learned from auditing over 1,000,000 websites - SERP Conf 2024 Patrick...What I learned from auditing over 1,000,000 websites - SERP Conf 2024 Patrick...
What I learned from auditing over 1,000,000 websites - SERP Conf 2024 Patrick...
 
Digital Marketing Spotlight: Lifecycle Advertising Strategies.pdf
Digital Marketing Spotlight: Lifecycle Advertising Strategies.pdfDigital Marketing Spotlight: Lifecycle Advertising Strategies.pdf
Digital Marketing Spotlight: Lifecycle Advertising Strategies.pdf
 
DGR_Digital Advertising Strategies for a Cookieless World_Presentation.pdf
DGR_Digital Advertising Strategies for a Cookieless World_Presentation.pdfDGR_Digital Advertising Strategies for a Cookieless World_Presentation.pdf
DGR_Digital Advertising Strategies for a Cookieless World_Presentation.pdf
 
Storyboards for my Final Major Project Video
Storyboards for my Final Major Project VideoStoryboards for my Final Major Project Video
Storyboards for my Final Major Project Video
 
The 10 Most Influential CMO's Leading the Way of Success, 2024 (Final file) (...
The 10 Most Influential CMO's Leading the Way of Success, 2024 (Final file) (...The 10 Most Influential CMO's Leading the Way of Success, 2024 (Final file) (...
The 10 Most Influential CMO's Leading the Way of Success, 2024 (Final file) (...
 
(Generative) AI & Marketing: - Out of the Hype - Empowering the Marketing M...
(Generative) AI & Marketing: - Out of the Hype - Empowering the Marketing M...(Generative) AI & Marketing: - Out of the Hype - Empowering the Marketing M...
(Generative) AI & Marketing: - Out of the Hype - Empowering the Marketing M...
 
5 Digital Marketing Tips | Devherds Software Solutions
5 Digital Marketing Tips | Devherds Software Solutions5 Digital Marketing Tips | Devherds Software Solutions
5 Digital Marketing Tips | Devherds Software Solutions
 
marketing strategy of tanishq word PPROJECT.pdf
marketing strategy of tanishq word PPROJECT.pdfmarketing strategy of tanishq word PPROJECT.pdf
marketing strategy of tanishq word PPROJECT.pdf
 

Key metrics and process in cyber security case scenario

  • 1. Proposed Business Process, metrics and tools Optimization for key IT domain Akin Akinfenwa 12March2019
  • 2. Confused on metrics to track, Good Processes to adopt, and tools to use?  Identity & Access Management  Secure SDLC & Application Security  Endpoint Security  Vulnerability Management Always begin with the Story…. Key Assumptions made: This is not specific to industry, hence the business processes in presentation, metrics, and tools are simply generic and not unique to any situation, most of the processes could be customized to unique industries as needed. Further assumptions will be that IT controls are mapped to COBIT, NIST 800-53 or ISO 27001 already.
  • 4. IAM are Series of framework of policies, procedures and technologies for ensuring appropriate personnel have access to technology resources.
  • 5. Identify And Access Management Process and activities PROVISION ENFORCEADMINISTER  REQUEST ACCESS  VALIDATE REQUEST  APPROVE ACCESS  ASSIGN AND COMMUNICATE ACCESS  PLAN AND STRATEGIZE  MANAGE POLICIES AND STANDARDS  EDUCATE AND MANAGE SYSTEMS  MONITOR, AUDIT AND RECONCILE • AUTHENTICATE • AUTHORIZE • LOG ACTIVITIES S Y S T E M S A N D D A T A
  • 6. WHAT IS TRACKED AND MEASURED IN IDENTITY AND ACCESS MANAGEMENT? Metric Tracked Ranking Average number of distinct accounts (credentials) per user: Number of unused accounts: Number of orphaned accounts: Number of new accounts provisioned: Number of exceptions per access re-certification cycle Password policy effectiveness: Average time to provision and de-provision of a user: Average time to provide an authorization Average time to make changes in identity policies: Violation of separation of duties: High Business impact Medium Business Impact Low Business Impact Management Perspective: How well do we manage user provisioning without exposing the organization to access risk.
  • 7. COMMON TOOLS USED IN IDENTIFY & ACCESS MANAGEMENT (IAM) IAM Tools On-Premise Cloud Forefront Identity Manager X X Microsoft Azure Active Directory X X Oracle Identity Management X Okta Identity Management X X Zoho Vault X X OneLogin X X LogMeIn Pro X Auth0 X ExcelID X X ADManager Plus X X IBM IAM X X
  • 9. Application security encompasses measures taken to improve the security of an application often by finding, fixing and preventing security vulnerabilities A secure SDLC process ensures that security assurance activities such as penetration testing, code review, and architecture analysis are an integral part of the development effort.
  • 10. SECURE SDLC & APPLICATION SECURITY PROCESS REQUIREMENTS DESIGN DEVELOPMENT TEXT DEPLOYMENT Map Security & Privacy Requirements Threat modelling. Security design review Static Analysis Peer Review Security test cases Dynamic Analysis Final security review Application security & monitoring Response Plan Web application security People • Training • organization Process • Risk management • SDLC • Guidelines • Verification Technology • Tools • Development • frameworks
  • 11. WHAT IS TRACKED AND MEASURED IN APPLICATION SECURITY? Metric Tracked Ranking Weighted Risk Trend Remediation Calculation Window Application Testing Coverage Mean Time to Respond Confirmed exploits Confirmed Account Takeovers High Business impact Medium Business Impact Low Business Impact Management Perspective: Can we rely on the security model of business applications to operate as intended? Risk is very relative to industry and other controls established within the business
  • 12. COMMON TOOLS USED IN APPLICATION SECURITY Application Security tools On-Premise Cloud Wapiti X X Zed Attack Proxy X X Vega X W3af X X Skipfish X X Ratproxy X X SQLMap X Wfuzz X Wapiti X X Zed Attack Proxy X X Vega X X
  • 14. Endpoint Security/ endpoint protection is an approach to the protection of computer networks that are remotely bridged to client devices.
  • 15. END POINT SECURITY PROCESS CONFIGURATION MANAGEMENT ANTI-MALWARE ACCEPTABLE USE RPOLICIES SYSTEM MONITORING END-POINT SECURITY CONTROLS DATA SECURITY APPLICATION SECURITY I A M The policies, processes and technology controls used to protect the confidentiality, integrity, and availability of an end point system
  • 16. What is tracked and Measured in Endpoint Security? Metric Tracked Ranking Level of visibility the solution provides : Types of threat detected : OS supporting ability : File detection : Security controls : High Business impact Medium Business Impact Low Business Impact Management Perspective: How well do we manage the end point of critical infrastructures such as Servers, desktop.
  • 17. Common tools used in End Point Security End Point Security tools On-Premise Cloud Bitdefender X X Carbon Black X X Code42 X Check Point X X Comodo X X CounterTack X X RSA X SentinelOne X Sophos X X Symantec X X Trend Micro X X
  • 18. Section Break Insert the title of your subtitle Here VULNERABILITY MANAGEMENT
  • 19. Vulnerability management is the process surrounding vulnerability scanning, also taking into account other aspects such as risk acceptance, remediation etc.
  • 21. What is tracked and Measured in Vulnerability Management? Metric Tracked Ranking Mean Time to Detect Mean Time to Resolve Average Window of Exposure Scanner Coverage Scan Frequency by Asset Group Average Risk by BU / Asset Group Number of Exceptions Granted Vulnerability Reopen Rate % of Systems with no open High / Critical Vulnerability High Business impact Medium Business Impact Low Business Impact Management Perspective: How well do we manage the exposure of the organization to vulnerabilities by identifying and mitigating known vulnerabilities?
  • 22. COMMON TOOLS USED IN VULNERABILITY MANAGEMENT Vulnerability Management tools On-Premise Cloud Comodo HackerProof X X OpenVAS X X Nexpose Community X Nikto X X Tripwire IP360 X X Wireshark X X Aircrack X Nessus Professional X Retina CS Community X X Microsoft Baseline Security Analyzer (MBSA) X X AlienVault USM Anywhere X