SlideShare uma empresa Scribd logo
1 de 6
Security Officer Services
The Pain
• Small to medium regulated companies are under
  enormous pressure to meet security
  requirements
• Highly regulated industries are particularly hard
  hit
  – Financial Services
  – Healthcare
  – Energy
• Security programs and security professionals are
  expensive and may not fit the appetite or budget
  of the company
Solution
• Part time Chief Information Security Officer
  services
• Shared security expert services
• Tailored security program
• Open source stack to meet security controls for
  reduced cost and preloaded solutions
• Appliance based software/hardware solutions
• Pre-loaded policies, procedures, and processes
• Security assessments/trouble services
Services Provided
• Security assessments             • Controls implementation
• Security program                    – Centralized Logging
  implementation                      – Monitoring
• Support for client security         – Automated Vulnerability
  assessments                           Scanning
                                      – Encryption
• Policy, procedure, and process
                                      – Data Loss Prevention
  development
                                      – Host Intrusion Detection /
• Risk management programs              Network Intrusion Detection
• BCP/DR development                  – Network Access Control
• Application security programs       – Two factor authentication
• Security metrics                    – Identity and access control
  implementation                      – Security Incident and Event
                                        Management systems
• Privacy program                     – Patch management
  implementation                        implementation
How it works
• Phase I
  – Assessments, program development, policy
    development
• Phase II
  – Implementation of controls
• Phase III
  – On going operations
  – Hiring and training of security personnel
Fees
• Assessment on project pricing
• Retainer based (monthly) services
• Accelerated control implementation as an
  add-on
• Security remediation project management

Mais conteúdo relacionado

Mais procurados

Achieving Continuous Monitoring with Security Automation
Achieving Continuous Monitoring with Security AutomationAchieving Continuous Monitoring with Security Automation
Achieving Continuous Monitoring with Security AutomationTripwire
 
Nagios Conference 2014 - Jorge Higueros - SNAPS
Nagios Conference 2014 - Jorge Higueros - SNAPSNagios Conference 2014 - Jorge Higueros - SNAPS
Nagios Conference 2014 - Jorge Higueros - SNAPSNagios
 
Prevention is not enough
Prevention is not enoughPrevention is not enough
Prevention is not enoughNovosco
 
Decrease Cyber Risk at your Community Bank
Decrease Cyber Risk at your Community BankDecrease Cyber Risk at your Community Bank
Decrease Cyber Risk at your Community BankGreat Bay Software
 
Security and Compliance Initial Roadmap
Security and Compliance Initial Roadmap Security and Compliance Initial Roadmap
Security and Compliance Initial Roadmap Anshu Gupta
 
General and Application Control - Security and Control Issues in Informatio...
General and Application Control - Security  and Control Issues in  Informatio...General and Application Control - Security  and Control Issues in  Informatio...
General and Application Control - Security and Control Issues in Informatio...Dr. Rosemarie Sibbaluca-Guirre
 
Cybersecurity: Challenges, Initiatives, and Best Practices
Cybersecurity: Challenges, Initiatives, and Best PracticesCybersecurity: Challenges, Initiatives, and Best Practices
Cybersecurity: Challenges, Initiatives, and Best PracticesJohn Gilligan
 
Siem tools-monitor-your-network
Siem tools-monitor-your-networkSiem tools-monitor-your-network
Siem tools-monitor-your-networkhardik soni
 
Roadmap to security operations excellence
Roadmap to security operations excellenceRoadmap to security operations excellence
Roadmap to security operations excellenceErik Taavila
 
CompTIA Security+ Module1: Security fundamentals
CompTIA Security+ Module1: Security fundamentalsCompTIA Security+ Module1: Security fundamentals
CompTIA Security+ Module1: Security fundamentalsGanbayar Sukhbaatar
 
Accelerating the Path to GDPR Compliance
Accelerating the Path to GDPR ComplianceAccelerating the Path to GDPR Compliance
Accelerating the Path to GDPR ComplianceHernan Huwyler, MBA CPA
 
Cybersecurity Framework - Introduction
Cybersecurity Framework - IntroductionCybersecurity Framework - Introduction
Cybersecurity Framework - IntroductionMuhammad Akbar Yasin
 

Mais procurados (20)

Achieving Continuous Monitoring with Security Automation
Achieving Continuous Monitoring with Security AutomationAchieving Continuous Monitoring with Security Automation
Achieving Continuous Monitoring with Security Automation
 
Security and Control Issues in information Systems
Security and Control Issues in information SystemsSecurity and Control Issues in information Systems
Security and Control Issues in information Systems
 
Nagios Conference 2014 - Jorge Higueros - SNAPS
Nagios Conference 2014 - Jorge Higueros - SNAPSNagios Conference 2014 - Jorge Higueros - SNAPS
Nagios Conference 2014 - Jorge Higueros - SNAPS
 
Auditing information System
Auditing information SystemAuditing information System
Auditing information System
 
Prevention is not enough
Prevention is not enoughPrevention is not enough
Prevention is not enough
 
Decrease Cyber Risk at your Community Bank
Decrease Cyber Risk at your Community BankDecrease Cyber Risk at your Community Bank
Decrease Cyber Risk at your Community Bank
 
Security and Compliance Initial Roadmap
Security and Compliance Initial Roadmap Security and Compliance Initial Roadmap
Security and Compliance Initial Roadmap
 
General and Application Control - Security and Control Issues in Informatio...
General and Application Control - Security  and Control Issues in  Informatio...General and Application Control - Security  and Control Issues in  Informatio...
General and Application Control - Security and Control Issues in Informatio...
 
Cybersecurity: Challenges, Initiatives, and Best Practices
Cybersecurity: Challenges, Initiatives, and Best PracticesCybersecurity: Challenges, Initiatives, and Best Practices
Cybersecurity: Challenges, Initiatives, and Best Practices
 
Lesson 1
Lesson 1Lesson 1
Lesson 1
 
Siem tools-monitor-your-network
Siem tools-monitor-your-networkSiem tools-monitor-your-network
Siem tools-monitor-your-network
 
Roadmap to security operations excellence
Roadmap to security operations excellenceRoadmap to security operations excellence
Roadmap to security operations excellence
 
Securitymetrics
SecuritymetricsSecuritymetrics
Securitymetrics
 
Lesson 1- Risk Managment
Lesson 1- Risk ManagmentLesson 1- Risk Managment
Lesson 1- Risk Managment
 
Computrace grc
Computrace grcComputrace grc
Computrace grc
 
CompTIA Security+ Module1: Security fundamentals
CompTIA Security+ Module1: Security fundamentalsCompTIA Security+ Module1: Security fundamentals
CompTIA Security+ Module1: Security fundamentals
 
Accelerating the Path to GDPR Compliance
Accelerating the Path to GDPR ComplianceAccelerating the Path to GDPR Compliance
Accelerating the Path to GDPR Compliance
 
Cybersecurity Framework - Introduction
Cybersecurity Framework - IntroductionCybersecurity Framework - Introduction
Cybersecurity Framework - Introduction
 
Lesson 1- Intrusion Detection
Lesson 1- Intrusion DetectionLesson 1- Intrusion Detection
Lesson 1- Intrusion Detection
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 

Destaque

Website Security, Maintenance and Optimisation - Conetix
Website Security, Maintenance and Optimisation - ConetixWebsite Security, Maintenance and Optimisation - Conetix
Website Security, Maintenance and Optimisation - ConetixTim Butler
 
3 Pros and Cons of using IT Contractors
3 Pros and Cons of using IT Contractors 3 Pros and Cons of using IT Contractors
3 Pros and Cons of using IT Contractors John Wallix
 
Petunjuk Penggunaan Aplikasi e‐Purchasing Produk Barang/Jasa Pemerintah Untuk...
Petunjuk Penggunaan Aplikasi e‐Purchasing Produk Barang/Jasa Pemerintah Untuk...Petunjuk Penggunaan Aplikasi e‐Purchasing Produk Barang/Jasa Pemerintah Untuk...
Petunjuk Penggunaan Aplikasi e‐Purchasing Produk Barang/Jasa Pemerintah Untuk...Muhammad Iqbal Gaznur
 
Top 10 Qualities Every Excellent Security Guard Should Have
Top 10 Qualities Every Excellent Security Guard Should HaveTop 10 Qualities Every Excellent Security Guard Should Have
Top 10 Qualities Every Excellent Security Guard Should HaveGrant Heanes
 
Pros And Cons Of Outsourcing Bus Operations
Pros And Cons Of Outsourcing Bus OperationsPros And Cons Of Outsourcing Bus Operations
Pros And Cons Of Outsourcing Bus OperationsJaspal Singh
 
PC Maintenance Security and Troubleshooting
PC Maintenance Security and TroubleshootingPC Maintenance Security and Troubleshooting
PC Maintenance Security and TroubleshootingThe Toolbox, Inc.
 
Maintenance management in operations management
Maintenance management in operations managementMaintenance management in operations management
Maintenance management in operations managementShereen Shahana
 
STANDART OPERATING PROCEDURE TEAM MITRA PENGAMAN INTERNAL
STANDART OPERATING PROCEDURE TEAM MITRA PENGAMAN INTERNALSTANDART OPERATING PROCEDURE TEAM MITRA PENGAMAN INTERNAL
STANDART OPERATING PROCEDURE TEAM MITRA PENGAMAN INTERNALKARYA DHARMA JAYA
 
Contract labour in india
Contract labour in indiaContract labour in india
Contract labour in indiaSuhaib Khan
 
Maintenance management
Maintenance managementMaintenance management
Maintenance managementawantika diwan
 
Types of maintenance
Types of maintenanceTypes of maintenance
Types of maintenanceAbhik Rathod
 
Compliance under labour laws in india
Compliance under labour laws in indiaCompliance under labour laws in india
Compliance under labour laws in indiaAmrik Singh
 
Maintenance Management
Maintenance ManagementMaintenance Management
Maintenance ManagementBisina Keshara
 

Destaque (18)

Website Security, Maintenance and Optimisation - Conetix
Website Security, Maintenance and Optimisation - ConetixWebsite Security, Maintenance and Optimisation - Conetix
Website Security, Maintenance and Optimisation - Conetix
 
3 Pros and Cons of using IT Contractors
3 Pros and Cons of using IT Contractors 3 Pros and Cons of using IT Contractors
3 Pros and Cons of using IT Contractors
 
Petunjuk Penggunaan Aplikasi e‐Purchasing Produk Barang/Jasa Pemerintah Untuk...
Petunjuk Penggunaan Aplikasi e‐Purchasing Produk Barang/Jasa Pemerintah Untuk...Petunjuk Penggunaan Aplikasi e‐Purchasing Produk Barang/Jasa Pemerintah Untuk...
Petunjuk Penggunaan Aplikasi e‐Purchasing Produk Barang/Jasa Pemerintah Untuk...
 
Security kpi
Security kpiSecurity kpi
Security kpi
 
Top 10 Qualities Every Excellent Security Guard Should Have
Top 10 Qualities Every Excellent Security Guard Should HaveTop 10 Qualities Every Excellent Security Guard Should Have
Top 10 Qualities Every Excellent Security Guard Should Have
 
Pros And Cons Of Outsourcing Bus Operations
Pros And Cons Of Outsourcing Bus OperationsPros And Cons Of Outsourcing Bus Operations
Pros And Cons Of Outsourcing Bus Operations
 
PC Maintenance Security and Troubleshooting
PC Maintenance Security and TroubleshootingPC Maintenance Security and Troubleshooting
PC Maintenance Security and Troubleshooting
 
Maintenance management in operations management
Maintenance management in operations managementMaintenance management in operations management
Maintenance management in operations management
 
Contract cleaning
Contract cleaningContract cleaning
Contract cleaning
 
STANDART OPERATING PROCEDURE TEAM MITRA PENGAMAN INTERNAL
STANDART OPERATING PROCEDURE TEAM MITRA PENGAMAN INTERNALSTANDART OPERATING PROCEDURE TEAM MITRA PENGAMAN INTERNAL
STANDART OPERATING PROCEDURE TEAM MITRA PENGAMAN INTERNAL
 
Contract labour in india
Contract labour in indiaContract labour in india
Contract labour in india
 
Sop for security
Sop for securitySop for security
Sop for security
 
Maintenance management
Maintenance managementMaintenance management
Maintenance management
 
Maintenance
MaintenanceMaintenance
Maintenance
 
Maintenence management
Maintenence managementMaintenence management
Maintenence management
 
Types of maintenance
Types of maintenanceTypes of maintenance
Types of maintenance
 
Compliance under labour laws in india
Compliance under labour laws in indiaCompliance under labour laws in india
Compliance under labour laws in india
 
Maintenance Management
Maintenance ManagementMaintenance Management
Maintenance Management
 

Semelhante a Contract Security Officer Services

iuvo Technologies Business & IT Leadership Symposium 2019 - Michael Joseph
iuvo Technologies Business & IT Leadership Symposium 2019 - Michael Josephiuvo Technologies Business & IT Leadership Symposium 2019 - Michael Joseph
iuvo Technologies Business & IT Leadership Symposium 2019 - Michael JosephiuvoTechnologies
 
Metrics, Risk Management & DLP
Metrics, Risk Management & DLPMetrics, Risk Management & DLP
Metrics, Risk Management & DLPRobert Kloots
 
CNIT 160 Ch 4a: Information Security Programs
CNIT 160 Ch 4a: Information Security ProgramsCNIT 160 Ch 4a: Information Security Programs
CNIT 160 Ch 4a: Information Security ProgramsSam Bowne
 
CNIT 160: Ch 2b: Security Strategy Development
CNIT 160: Ch 2b: Security Strategy DevelopmentCNIT 160: Ch 2b: Security Strategy Development
CNIT 160: Ch 2b: Security Strategy DevelopmentSam Bowne
 
CNIT 160 Ch 4a: Information Security Programs
CNIT 160 Ch 4a: Information Security ProgramsCNIT 160 Ch 4a: Information Security Programs
CNIT 160 Ch 4a: Information Security ProgramsSam Bowne
 
Risk Management Methodology
Risk Management MethodologyRisk Management Methodology
Risk Management Methodologylaurahees
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness TrainingDaniel P Wallace
 
Assessing System Risk the Smart Way
Assessing System Risk the Smart WayAssessing System Risk the Smart Way
Assessing System Risk the Smart WaySecurity Innovation
 
Cybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your OrganizationCybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your OrganizationMcKonly & Asbury, LLP
 
ISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process OverviewISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process OverviewShankar Subramaniyan
 
Current & Emerging Cyber Security Threats
Current & Emerging Cyber Security ThreatsCurrent & Emerging Cyber Security Threats
Current & Emerging Cyber Security ThreatsNCC Group
 
Meletis BelsisManaging and enforcing information security
Meletis BelsisManaging and enforcing information securityMeletis BelsisManaging and enforcing information security
Meletis BelsisManaging and enforcing information securityMeletis Belsis MPhil/MRes/BSc
 
Risk Based Security and Self Protection Powerpoint
Risk Based Security and Self Protection PowerpointRisk Based Security and Self Protection Powerpoint
Risk Based Security and Self Protection Powerpointrandalje86
 
Tecnologie a supporto dei controlli di sicurezza fondamentali
Tecnologie a supporto dei controlli di sicurezza fondamentaliTecnologie a supporto dei controlli di sicurezza fondamentali
Tecnologie a supporto dei controlli di sicurezza fondamentaliJürgen Ambrosi
 
IT Compliance and Governance with DLP Controls and Vulnerability Scanning Sof...
IT Compliance and Governance with DLP Controls and Vulnerability Scanning Sof...IT Compliance and Governance with DLP Controls and Vulnerability Scanning Sof...
IT Compliance and Governance with DLP Controls and Vulnerability Scanning Sof...Skoda Minotti
 
Today's Cyber Challenges: Methodology to Secure Your Business
Today's Cyber Challenges: Methodology to Secure Your BusinessToday's Cyber Challenges: Methodology to Secure Your Business
Today's Cyber Challenges: Methodology to Secure Your BusinessJoAnna Cheshire
 

Semelhante a Contract Security Officer Services (20)

iuvo Technologies Business & IT Leadership Symposium 2019 - Michael Joseph
iuvo Technologies Business & IT Leadership Symposium 2019 - Michael Josephiuvo Technologies Business & IT Leadership Symposium 2019 - Michael Joseph
iuvo Technologies Business & IT Leadership Symposium 2019 - Michael Joseph
 
Metrics, Risk Management & DLP
Metrics, Risk Management & DLPMetrics, Risk Management & DLP
Metrics, Risk Management & DLP
 
CNIT 160 Ch 4a: Information Security Programs
CNIT 160 Ch 4a: Information Security ProgramsCNIT 160 Ch 4a: Information Security Programs
CNIT 160 Ch 4a: Information Security Programs
 
CNIT 160: Ch 2b: Security Strategy Development
CNIT 160: Ch 2b: Security Strategy DevelopmentCNIT 160: Ch 2b: Security Strategy Development
CNIT 160: Ch 2b: Security Strategy Development
 
CNIT 160 Ch 4a: Information Security Programs
CNIT 160 Ch 4a: Information Security ProgramsCNIT 160 Ch 4a: Information Security Programs
CNIT 160 Ch 4a: Information Security Programs
 
Risk Management Methodology
Risk Management MethodologyRisk Management Methodology
Risk Management Methodology
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Assessing System Risk the Smart Way
Assessing System Risk the Smart WayAssessing System Risk the Smart Way
Assessing System Risk the Smart Way
 
Cyber Security Needs and Challenges
Cyber Security Needs and ChallengesCyber Security Needs and Challenges
Cyber Security Needs and Challenges
 
Steps in it audit
Steps in it auditSteps in it audit
Steps in it audit
 
Cybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your OrganizationCybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your Organization
 
IT security consultancy company profile
IT security consultancy company profileIT security consultancy company profile
IT security consultancy company profile
 
ISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process OverviewISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process Overview
 
Current & Emerging Cyber Security Threats
Current & Emerging Cyber Security ThreatsCurrent & Emerging Cyber Security Threats
Current & Emerging Cyber Security Threats
 
Meletis BelsisManaging and enforcing information security
Meletis BelsisManaging and enforcing information securityMeletis BelsisManaging and enforcing information security
Meletis BelsisManaging and enforcing information security
 
Risk Based Security and Self Protection Powerpoint
Risk Based Security and Self Protection PowerpointRisk Based Security and Self Protection Powerpoint
Risk Based Security and Self Protection Powerpoint
 
Tecnologie a supporto dei controlli di sicurezza fondamentali
Tecnologie a supporto dei controlli di sicurezza fondamentaliTecnologie a supporto dei controlli di sicurezza fondamentali
Tecnologie a supporto dei controlli di sicurezza fondamentali
 
Web Application Security: Beyond PEN Testing
Web Application Security: Beyond PEN TestingWeb Application Security: Beyond PEN Testing
Web Application Security: Beyond PEN Testing
 
IT Compliance and Governance with DLP Controls and Vulnerability Scanning Sof...
IT Compliance and Governance with DLP Controls and Vulnerability Scanning Sof...IT Compliance and Governance with DLP Controls and Vulnerability Scanning Sof...
IT Compliance and Governance with DLP Controls and Vulnerability Scanning Sof...
 
Today's Cyber Challenges: Methodology to Secure Your Business
Today's Cyber Challenges: Methodology to Secure Your BusinessToday's Cyber Challenges: Methodology to Secure Your Business
Today's Cyber Challenges: Methodology to Secure Your Business
 

Contract Security Officer Services

  • 2. The Pain • Small to medium regulated companies are under enormous pressure to meet security requirements • Highly regulated industries are particularly hard hit – Financial Services – Healthcare – Energy • Security programs and security professionals are expensive and may not fit the appetite or budget of the company
  • 3. Solution • Part time Chief Information Security Officer services • Shared security expert services • Tailored security program • Open source stack to meet security controls for reduced cost and preloaded solutions • Appliance based software/hardware solutions • Pre-loaded policies, procedures, and processes • Security assessments/trouble services
  • 4. Services Provided • Security assessments • Controls implementation • Security program – Centralized Logging implementation – Monitoring • Support for client security – Automated Vulnerability assessments Scanning – Encryption • Policy, procedure, and process – Data Loss Prevention development – Host Intrusion Detection / • Risk management programs Network Intrusion Detection • BCP/DR development – Network Access Control • Application security programs – Two factor authentication • Security metrics – Identity and access control implementation – Security Incident and Event Management systems • Privacy program – Patch management implementation implementation
  • 5. How it works • Phase I – Assessments, program development, policy development • Phase II – Implementation of controls • Phase III – On going operations – Hiring and training of security personnel
  • 6. Fees • Assessment on project pricing • Retainer based (monthly) services • Accelerated control implementation as an add-on • Security remediation project management