SlideShare uma empresa Scribd logo
1 de 32
Baixar para ler offline
Safeguarding the EnterpriseSafeguarding the Enterprise
a new approach
Sanjay Sahay,
IG, Karnataka
Safeguarding the EnterpriseSafeguarding the EnterpriseSafeguarding the EnterpriseSafeguarding the Enterprise
a new approacha new approacha new approacha new approach
Why?
Physical Security
Safeguarding of Data
Safeguarding the EnterpriseSafeguarding the EnterpriseSafeguarding the EnterpriseSafeguarding the Enterprise
a new approacha new approacha new approacha new approach
Structure of the Presentation
• Definition of a Safeguarded Enterprise
• New approach – Gartner White Paper
• Goals
• Security risks and key success factors• Security risks and key success factors
• Security Architecture
• Data Center, Connectivity and Application
• Application Data Security Lifecycle
• Security Information and Event Management
• Single Sign On
• The future – Cloud Computing
• Conclusion
Safeguarding the EnterpriseSafeguarding the EnterpriseSafeguarding the EnterpriseSafeguarding the Enterprise
a new approacha new approacha new approacha new approach
What is a Safeguarded Enterprise?
Safeguarded Enterprise is the sum total of a clear-cut
perception, appropriate/integrated planning,perception, appropriate/integrated planning,
documentation, meticulous execution and
dynamic/robust maintenance of enterprise security
policy at awareness, attitudinal, physical, systems,
processes, application and data dimensions throughout
the enterprise creating a near fails safe enterprise.
Sanjay Sahay
Safeguarding the EnterpriseSafeguarding the EnterpriseSafeguarding the EnterpriseSafeguarding the Enterprise
Security as a SILOSecurity as a SILOSecurity as a SILOSecurity as a SILO
• Architecture• Architecture
Business Information
• Security• Architecture
Technology
Safeguarding the EnterpriseSafeguarding the EnterpriseSafeguarding the EnterpriseSafeguarding the Enterprise
a new approacha new approacha new approacha new approach
Gartner White Paper 2006
Incorporating Security into the
Enterprise Architecture
Process
S ES ES ES E a new approacha new approacha new approacha new approach
Enterprise Information Security ArchitectureEnterprise Information Security ArchitectureEnterprise Information Security ArchitectureEnterprise Information Security Architecture
• Architecture• Architecture
Business Information
• Architecture• Architecture
SecurityTechnology
SE
9/11 a watershed in modern history
Whatever Come May…Whatever Come May…
Physical Security will Always Count!
Land, Air Or Water
Safeguarding the EnterpriseSafeguarding the EnterpriseSafeguarding the EnterpriseSafeguarding the Enterprise
a new approacha new approacha new approacha new approach
Goals
Provide structure, coherence and cohesiveness
• Must enable business-to-security alignment• Must enable business-to-security alignment
• Defined top-down beginning with business strategy
• Establish a common "language" for information for
information security within the organisation
SESESESE a new approacha new approacha new approacha new approach
Top 10 Enterprise Security RisksTop 10 Enterprise Security RisksTop 10 Enterprise Security RisksTop 10 Enterprise Security Risks
Email Attachments
VPN Tunnel Vulnerabilities
Blended Attacks
Diversionary TacticsDiversionary Tactics
Download from Websites
Supply Chain and Partners Added to the Network
Microsoft’s SOAP
Renaming Documents
Peer – to - Peer Applications
Music and Video Browsers
SESESESE a new approacha new approacha new approacha new approach
Key Success Factors of SecurityKey Success Factors of SecurityKey Success Factors of SecurityKey Success Factors of Security
a
Security Awareness
Application
Network Security
Operating
System
Security
Patch and AV
management
Application
Security
SIEM
SESESESE a new approacha new approacha new approacha new approach
Security ArchitectureSecurity ArchitectureSecurity ArchitectureSecurity Architecture
People
Processes
Technology
SESESESE a new approacha new approacha new approacha new approach
Security ArchitectureSecurity ArchitectureSecurity ArchitectureSecurity Architecture
People Processes Technology
User Awareness Policies IPS
Guidance Standards FirewallGuidance Standards Firewall
Administration Guidelines AV
Monitor Audit DLP
SIEM
SESESESE a new approacha new approacha new approacha new approach
Defense in DepthDefense in DepthDefense in DepthDefense in Depth
“Defense in Depth” which is a concept used to
describe layers of defense strategies
The components at each layer work in tandem toThe components at each layer work in tandem to
provide in tandem to provide one cohesive security
mechanism
This layered approach will also help localize the
impact if one element of the mechanism is
compromised
Safeguarding the EnterpriseSafeguarding the EnterpriseSafeguarding the EnterpriseSafeguarding the Enterprise
a new approacha new approacha new approacha new approach
Data Center, Connectivity and
Application are at the core of
Enterprise Security
Safeguarding the EnterpriseSafeguarding the EnterpriseSafeguarding the EnterpriseSafeguarding the Enterprise
a new approacha new approacha new approacha new approach
Data Center
The main purpose of a data center is
running the applications that handle the core
business and operational data of the
organization
Secure Application Usage is the Key
SESESESE a new approacha new approacha new approacha new approach
KSP Data CenterKSP Data CenterKSP Data CenterKSP Data Center
Safeguarding the EnterpriseSafeguarding the EnterpriseSafeguarding the EnterpriseSafeguarding the Enterprise
a new approacha new approacha new approacha new approach
Secure Connectivity is the Backbone
S ES ES ES E a new approacha new approacha new approacha new approach
KSP ConnectivityKSP ConnectivityKSP ConnectivityKSP Connectivity
Safeguarding the EnterpriseSafeguarding the EnterpriseSafeguarding the EnterpriseSafeguarding the Enterprise
a new approacha new approacha new approacha new approach
Application/s is at the heart of the
enterprise
SESESESE a new approacha new approacha new approacha new approach
The Application Data Security LifecycleThe Application Data Security LifecycleThe Application Data Security LifecycleThe Application Data Security Lifecycle
Assess Set Policies/Controls
Measure Monitor / Enforce
The Application
Data Security
Life Cycle
SESESESE a new approacha new approacha new approacha new approach
The Application Data Security LifecycleThe Application Data Security LifecycleThe Application Data Security LifecycleThe Application Data Security Lifecycle
Assess
Discover Servers and Data
Test Configuration
Evaluate Inherent Risks
Assess how and by who data and applications are used
Set Policies and Controls
Set policies automatically
Adapt to user changes
Support granular polices and controls
SESESESE a new approacha new approacha new approacha new approach
The Application Data Security LifecycleThe Application Data Security LifecycleThe Application Data Security LifecycleThe Application Data Security Lifecycle
Monitor and Enforce
Ensure separation of duties
Enforce user accountability
Capture full detailsCapture full details
Alert and block in real time
Measure
Built in & custom reports
Roll-up and drill down of data
Security event analysis
Compliance workflow
SESESESE a new approacha new approacha new approacha new approach
Security Information & Event ManagementSecurity Information & Event ManagementSecurity Information & Event ManagementSecurity Information & Event Management
Asset Discovery
Threat Detection
Vulnerability Assessment
S
I Vulnerability Assessment
Event Collection
Correlation
Event Management
Log Storage
I
E
M
SESESESE a new approacha new approacha new approacha new approach
SIEMSIEMSIEMSIEM
SIEM is a Intelligence platform helps safeguard the
business by giving you complete visibility into activity
across the IT Infrastructure
SIEM Capabilities
Data AggressionData Aggression
Correlation
Alerting
Dashboards
Compliance
Retention
SESESESE a new approacha new approacha new approacha new approach
Single Sign OnSingle Sign OnSingle Sign OnSingle Sign On
Single Sign On, SSO, is a property of access
control of multiple related, but independent
software systems.software systems.
Conversely, Single Sign Off, is the property
whereby the single action of signing out
terminates access to multiple software
systems
SESESESE a new approacha new approacha new approacha new approach
Single Sign OnSingle Sign OnSingle Sign OnSingle Sign On
More secure
Reduces password fatigue
Reduces time spend for re-entering passwordsReduces time spend for re-entering passwords
Reducing IT costs- Help desk calls about passwords
Security on all levels of entry/exit/access to systems
Centralized reporting for compliance adherence
SESESESE a new approacha new approacha new approacha new approach
Cloud Computing & SecurityCloud Computing & SecurityCloud Computing & SecurityCloud Computing & Security
There are a number of security issues/concerns associated with cloud
computing but these issues fall into two broad categories:
Security issues faced by cloud providers (organizations providing software-
platform or infrastructure-as-a-service via the cloud) and security issues facedplatform or infrastructure-as-a-service via the cloud) and security issues faced
by their customers
The provider must ensure that their infrastructure is secure and that their
clients’ data and applications are protected
The customer must ensure that the provider has taken the proper security
measures to protect their information.
SESESESE a new approacha new approacha new approacha new approach
Cloud Computing & SecurityCloud Computing & SecurityCloud Computing & SecurityCloud Computing & Security
VirtualizationVirtualizationVirtualizationVirtualization
The extensive use of virtualization in implementing
cloud infrastructure brings unique security concerns
for customers or tenants of a public cloud servicefor customers or tenants of a public cloud service
Virtualization alters the relationship between the OS
and underlying hardware - be it computing, storage or
even networking
SESESESE a new approacha new approacha new approacha new approach
Cloud Computing & SecurityCloud Computing & SecurityCloud Computing & SecurityCloud Computing & Security
VirtualizationVirtualizationVirtualizationVirtualization
•This introduces an additional layer - virtualization - that
itself must be properly configured, managed and
securedsecured
•Specific concerns include the potential to compromise
the virtualization software, or "hypervisor". While these
concerns are largely theoretical, they do exist
SESESESE a new approacha new approacha new approacha new approach
ConclusionConclusionConclusionConclusion
Complexity is our life and making it simple our goal.
Technology gains the highest end with simplistic products
and services. The complexity of IT security gets confounded
with innumerable applications, the processing power, thewith innumerable applications, the processing power, the
world wide web interface, cross enterprise collaboration and
the like. Cloud computing, though in its nascent stage has
thrown a major challenge to IT security, the success of
which would be epochal and the IT services would take a
well deserving leap forward.

Mais conteúdo relacionado

Mais procurados

Enterprise%20 security%20architecture%20 %20business%20driven%20security
Enterprise%20 security%20architecture%20 %20business%20driven%20securityEnterprise%20 security%20architecture%20 %20business%20driven%20security
Enterprise%20 security%20architecture%20 %20business%20driven%20security
wardell henley
 
general_resume_12 1 linked in
general_resume_12 1 linked ingeneral_resume_12 1 linked in
general_resume_12 1 linked in
John Masiliunas
 

Mais procurados (20)

Transform Your Security Operations with Security Automation and Orchestration
Transform Your Security Operations with Security Automation and OrchestrationTransform Your Security Operations with Security Automation and Orchestration
Transform Your Security Operations with Security Automation and Orchestration
 
Security models for security architecture
Security models for security architectureSecurity models for security architecture
Security models for security architecture
 
Best practices for automating cloud security processes with Evident.io and AWS
Best practices for automating cloud security processes with Evident.io and AWSBest practices for automating cloud security processes with Evident.io and AWS
Best practices for automating cloud security processes with Evident.io and AWS
 
How PagerDuty Achieved End-to-End Visibility with Splunk and AWS Webinar Deck
How PagerDuty Achieved End-to-End Visibility with Splunk and AWS Webinar DeckHow PagerDuty Achieved End-to-End Visibility with Splunk and AWS Webinar Deck
How PagerDuty Achieved End-to-End Visibility with Splunk and AWS Webinar Deck
 
Why CSA Australia
Why CSA AustraliaWhy CSA Australia
Why CSA Australia
 
Open Security and Privacy Reference Architecture
Open Security and Privacy Reference Architecture Open Security and Privacy Reference Architecture
Open Security and Privacy Reference Architecture
 
Comprehensive Cloud Security Requires an Automated Approach
Comprehensive Cloud Security Requires an Automated ApproachComprehensive Cloud Security Requires an Automated Approach
Comprehensive Cloud Security Requires an Automated Approach
 
CSA Standards Development Summary
CSA Standards Development SummaryCSA Standards Development Summary
CSA Standards Development Summary
 
2010-02 Building Security Architecture Framework
2010-02 Building Security Architecture Framework 2010-02 Building Security Architecture Framework
2010-02 Building Security Architecture Framework
 
Enterprise%20 security%20architecture%20 %20business%20driven%20security
Enterprise%20 security%20architecture%20 %20business%20driven%20securityEnterprise%20 security%20architecture%20 %20business%20driven%20security
Enterprise%20 security%20architecture%20 %20business%20driven%20security
 
Security Consulting Services
Security Consulting ServicesSecurity Consulting Services
Security Consulting Services
 
ePlus Enabling a Total Healthcare IT Transformation to Deliver the Future of ...
ePlus Enabling a Total Healthcare IT Transformation to Deliver the Future of ...ePlus Enabling a Total Healthcare IT Transformation to Deliver the Future of ...
ePlus Enabling a Total Healthcare IT Transformation to Deliver the Future of ...
 
10 KEYS TO EFFECTIVE NETWORK SECURITY
10 KEYS TO EFFECTIVE NETWORK SECURITY10 KEYS TO EFFECTIVE NETWORK SECURITY
10 KEYS TO EFFECTIVE NETWORK SECURITY
 
general_resume_12 1 linked in
general_resume_12 1 linked ingeneral_resume_12 1 linked in
general_resume_12 1 linked in
 
SplunkLive! London 2017 - Building an Analytics Driven Security Operation Cen...
SplunkLive! London 2017 - Building an Analytics Driven Security Operation Cen...SplunkLive! London 2017 - Building an Analytics Driven Security Operation Cen...
SplunkLive! London 2017 - Building an Analytics Driven Security Operation Cen...
 
eGestalt Announces Next Generation Security Posture Management with Aegify
eGestalt Announces Next Generation Security Posture Management with AegifyeGestalt Announces Next Generation Security Posture Management with Aegify
eGestalt Announces Next Generation Security Posture Management with Aegify
 
New technologies - Amer Haza'a
New technologies - Amer Haza'aNew technologies - Amer Haza'a
New technologies - Amer Haza'a
 
Sleeping well with cloud services
Sleeping well with cloud servicesSleeping well with cloud services
Sleeping well with cloud services
 
Kevin Watkins, Enterprise Security Architect at BAT - BAT’s Managed Security ...
Kevin Watkins, Enterprise Security Architect at BAT - BAT’s Managed Security ...Kevin Watkins, Enterprise Security Architect at BAT - BAT’s Managed Security ...
Kevin Watkins, Enterprise Security Architect at BAT - BAT’s Managed Security ...
 
AURISEG CONSULTING PRIVATE LIMITED
AURISEG CONSULTING PRIVATE LIMITED AURISEG CONSULTING PRIVATE LIMITED
AURISEG CONSULTING PRIVATE LIMITED
 

Semelhante a Safeguarding the Enterprise. A new approach.

Dave Tyson Profile for CISO Insights
Dave Tyson Profile for CISO InsightsDave Tyson Profile for CISO Insights
Dave Tyson Profile for CISO Insights
ciso_insights
 
Application Security Maturity Model
Application Security Maturity ModelApplication Security Maturity Model
Application Security Maturity Model
Security Innovation
 

Semelhante a Safeguarding the Enterprise. A new approach. (20)

Building Elastic into security operations
Building Elastic into security operationsBuilding Elastic into security operations
Building Elastic into security operations
 
SecOps.pdf
SecOps.pdfSecOps.pdf
SecOps.pdf
 
Safeguarding the Enterprise
Safeguarding the EnterpriseSafeguarding the Enterprise
Safeguarding the Enterprise
 
Zero Trust vs Defense in Depth
Zero Trust vs Defense in DepthZero Trust vs Defense in Depth
Zero Trust vs Defense in Depth
 
Security Incidents
Security IncidentsSecurity Incidents
Security Incidents
 
AWS Summit Singapore 2019 | Banking in the Cloud: 10 Lessons Learned
AWS Summit Singapore 2019 | Banking in the Cloud: 10 Lessons LearnedAWS Summit Singapore 2019 | Banking in the Cloud: 10 Lessons Learned
AWS Summit Singapore 2019 | Banking in the Cloud: 10 Lessons Learned
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Security-by-Design in Enterprise Architecture
Security-by-Design in Enterprise ArchitectureSecurity-by-Design in Enterprise Architecture
Security-by-Design in Enterprise Architecture
 
Securing Sensitive Data in Your Hybrid Cloud
Securing Sensitive Data in Your Hybrid CloudSecuring Sensitive Data in Your Hybrid Cloud
Securing Sensitive Data in Your Hybrid Cloud
 
Cloud transformation Service in Hy.pdf
Cloud transformation Service in Hy.pdfCloud transformation Service in Hy.pdf
Cloud transformation Service in Hy.pdf
 
Интуитивная сеть как платформа для надежного бизнеса
Интуитивная сеть как платформа для надежного бизнесаИнтуитивная сеть как платформа для надежного бизнеса
Интуитивная сеть как платформа для надежного бизнеса
 
Does Anyone Remember Enterprise Security Architecture?
Does Anyone Remember Enterprise Security Architecture?Does Anyone Remember Enterprise Security Architecture?
Does Anyone Remember Enterprise Security Architecture?
 
Seeing More Clearly: How Essilor Overcame 3 Common Cloud Security Challenges ...
Seeing More Clearly: How Essilor Overcame 3 Common Cloud Security Challenges ...Seeing More Clearly: How Essilor Overcame 3 Common Cloud Security Challenges ...
Seeing More Clearly: How Essilor Overcame 3 Common Cloud Security Challenges ...
 
Protecting Agile Transformation through Secure DevOps (DevSecOps)
Protecting Agile Transformation through Secure DevOps (DevSecOps)Protecting Agile Transformation through Secure DevOps (DevSecOps)
Protecting Agile Transformation through Secure DevOps (DevSecOps)
 
Dave Tyson Profile for CISO Insights
Dave Tyson Profile for CISO InsightsDave Tyson Profile for CISO Insights
Dave Tyson Profile for CISO Insights
 
SplunkLive! Munich 2018: Use Splunk for incident Response, Orchestration and ...
SplunkLive! Munich 2018: Use Splunk for incident Response, Orchestration and ...SplunkLive! Munich 2018: Use Splunk for incident Response, Orchestration and ...
SplunkLive! Munich 2018: Use Splunk for incident Response, Orchestration and ...
 
Application Security Maturity Model
Application Security Maturity ModelApplication Security Maturity Model
Application Security Maturity Model
 
Secure Data Center for Enterprise— Threat Management with NextGen IPS
Secure Data Center for Enterprise— Threat Management with NextGen IPSSecure Data Center for Enterprise— Threat Management with NextGen IPS
Secure Data Center for Enterprise— Threat Management with NextGen IPS
 
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdfMicrosoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
 
Cloud Adoption Framework Secure Overview
Cloud Adoption Framework Secure OverviewCloud Adoption Framework Secure Overview
Cloud Adoption Framework Secure Overview
 

Mais de ADGP, Public Grivences, Bangalore

Mais de ADGP, Public Grivences, Bangalore (20)

Towards Making Smart Policing a Reality for India
Towards Making Smart Policing a Reality for IndiaTowards Making Smart Policing a Reality for India
Towards Making Smart Policing a Reality for India
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
CCTNS & Homeland Security
CCTNS & Homeland SecurityCCTNS & Homeland Security
CCTNS & Homeland Security
 
Secure it0001
Secure it0001Secure it0001
Secure it0001
 
e-gov: Secure IT 2014
e-gov: Secure IT 2014e-gov: Secure IT 2014
e-gov: Secure IT 2014
 
Asymmetric warfare for geoworld
Asymmetric warfare for geoworldAsymmetric warfare for geoworld
Asymmetric warfare for geoworld
 
Secure Cities 2013
Secure Cities 2013Secure Cities 2013
Secure Cities 2013
 
Secure IT 2014
Secure IT 2014Secure IT 2014
Secure IT 2014
 
Secure IT 2014
Secure IT 2014Secure IT 2014
Secure IT 2014
 
Wipro and KSP - Police IT Change Management Workshop
Wipro and KSP - Police IT Change Management Workshop Wipro and KSP - Police IT Change Management Workshop
Wipro and KSP - Police IT Change Management Workshop
 
KSP Composite Computerization Model
KSP Composite Computerization ModelKSP Composite Computerization Model
KSP Composite Computerization Model
 
Cyber security and Homeland security
Cyber security and Homeland securityCyber security and Homeland security
Cyber security and Homeland security
 
CCTNS Karnataka Overview
CCTNS Karnataka OverviewCCTNS Karnataka Overview
CCTNS Karnataka Overview
 
Xime erp creation & change management 18082013
Xime erp creation & change management 18082013Xime erp creation & change management 18082013
Xime erp creation & change management 18082013
 
Technological framework
Technological frameworkTechnological framework
Technological framework
 
Cii iq's national business excellence conclave 2013
Cii   iq's national business excellence conclave 2013Cii   iq's national business excellence conclave 2013
Cii iq's national business excellence conclave 2013
 
E gov championship workshop bangalore 21082013
E gov championship workshop bangalore 21082013E gov championship workshop bangalore 21082013
E gov championship workshop bangalore 21082013
 
Homeland security – A Robust Counter Terrorism Mechanism
Homeland security – A Robust Counter Terrorism MechanismHomeland security – A Robust Counter Terrorism Mechanism
Homeland security – A Robust Counter Terrorism Mechanism
 
Leadership casestudy
Leadership casestudyLeadership casestudy
Leadership casestudy
 
Reaching out to the unreached
Reaching out to the unreachedReaching out to the unreached
Reaching out to the unreached
 

Último

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Último (20)

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 

Safeguarding the Enterprise. A new approach.

  • 1. Safeguarding the EnterpriseSafeguarding the Enterprise a new approach Sanjay Sahay, IG, Karnataka
  • 2. Safeguarding the EnterpriseSafeguarding the EnterpriseSafeguarding the EnterpriseSafeguarding the Enterprise a new approacha new approacha new approacha new approach Why? Physical Security Safeguarding of Data
  • 3. Safeguarding the EnterpriseSafeguarding the EnterpriseSafeguarding the EnterpriseSafeguarding the Enterprise a new approacha new approacha new approacha new approach Structure of the Presentation • Definition of a Safeguarded Enterprise • New approach – Gartner White Paper • Goals • Security risks and key success factors• Security risks and key success factors • Security Architecture • Data Center, Connectivity and Application • Application Data Security Lifecycle • Security Information and Event Management • Single Sign On • The future – Cloud Computing • Conclusion
  • 4. Safeguarding the EnterpriseSafeguarding the EnterpriseSafeguarding the EnterpriseSafeguarding the Enterprise a new approacha new approacha new approacha new approach What is a Safeguarded Enterprise? Safeguarded Enterprise is the sum total of a clear-cut perception, appropriate/integrated planning,perception, appropriate/integrated planning, documentation, meticulous execution and dynamic/robust maintenance of enterprise security policy at awareness, attitudinal, physical, systems, processes, application and data dimensions throughout the enterprise creating a near fails safe enterprise. Sanjay Sahay
  • 5. Safeguarding the EnterpriseSafeguarding the EnterpriseSafeguarding the EnterpriseSafeguarding the Enterprise Security as a SILOSecurity as a SILOSecurity as a SILOSecurity as a SILO • Architecture• Architecture Business Information • Security• Architecture Technology
  • 6. Safeguarding the EnterpriseSafeguarding the EnterpriseSafeguarding the EnterpriseSafeguarding the Enterprise a new approacha new approacha new approacha new approach Gartner White Paper 2006 Incorporating Security into the Enterprise Architecture Process
  • 7. S ES ES ES E a new approacha new approacha new approacha new approach Enterprise Information Security ArchitectureEnterprise Information Security ArchitectureEnterprise Information Security ArchitectureEnterprise Information Security Architecture • Architecture• Architecture Business Information • Architecture• Architecture SecurityTechnology
  • 8. SE 9/11 a watershed in modern history Whatever Come May…Whatever Come May… Physical Security will Always Count! Land, Air Or Water
  • 9. Safeguarding the EnterpriseSafeguarding the EnterpriseSafeguarding the EnterpriseSafeguarding the Enterprise a new approacha new approacha new approacha new approach Goals Provide structure, coherence and cohesiveness • Must enable business-to-security alignment• Must enable business-to-security alignment • Defined top-down beginning with business strategy • Establish a common "language" for information for information security within the organisation
  • 10. SESESESE a new approacha new approacha new approacha new approach Top 10 Enterprise Security RisksTop 10 Enterprise Security RisksTop 10 Enterprise Security RisksTop 10 Enterprise Security Risks Email Attachments VPN Tunnel Vulnerabilities Blended Attacks Diversionary TacticsDiversionary Tactics Download from Websites Supply Chain and Partners Added to the Network Microsoft’s SOAP Renaming Documents Peer – to - Peer Applications Music and Video Browsers
  • 11. SESESESE a new approacha new approacha new approacha new approach Key Success Factors of SecurityKey Success Factors of SecurityKey Success Factors of SecurityKey Success Factors of Security a Security Awareness Application Network Security Operating System Security Patch and AV management Application Security SIEM
  • 12. SESESESE a new approacha new approacha new approacha new approach Security ArchitectureSecurity ArchitectureSecurity ArchitectureSecurity Architecture People Processes Technology
  • 13. SESESESE a new approacha new approacha new approacha new approach Security ArchitectureSecurity ArchitectureSecurity ArchitectureSecurity Architecture People Processes Technology User Awareness Policies IPS Guidance Standards FirewallGuidance Standards Firewall Administration Guidelines AV Monitor Audit DLP SIEM
  • 14. SESESESE a new approacha new approacha new approacha new approach Defense in DepthDefense in DepthDefense in DepthDefense in Depth “Defense in Depth” which is a concept used to describe layers of defense strategies The components at each layer work in tandem toThe components at each layer work in tandem to provide in tandem to provide one cohesive security mechanism This layered approach will also help localize the impact if one element of the mechanism is compromised
  • 15.
  • 16. Safeguarding the EnterpriseSafeguarding the EnterpriseSafeguarding the EnterpriseSafeguarding the Enterprise a new approacha new approacha new approacha new approach Data Center, Connectivity and Application are at the core of Enterprise Security
  • 17. Safeguarding the EnterpriseSafeguarding the EnterpriseSafeguarding the EnterpriseSafeguarding the Enterprise a new approacha new approacha new approacha new approach Data Center The main purpose of a data center is running the applications that handle the core business and operational data of the organization Secure Application Usage is the Key
  • 18. SESESESE a new approacha new approacha new approacha new approach KSP Data CenterKSP Data CenterKSP Data CenterKSP Data Center
  • 19. Safeguarding the EnterpriseSafeguarding the EnterpriseSafeguarding the EnterpriseSafeguarding the Enterprise a new approacha new approacha new approacha new approach Secure Connectivity is the Backbone
  • 20. S ES ES ES E a new approacha new approacha new approacha new approach KSP ConnectivityKSP ConnectivityKSP ConnectivityKSP Connectivity
  • 21. Safeguarding the EnterpriseSafeguarding the EnterpriseSafeguarding the EnterpriseSafeguarding the Enterprise a new approacha new approacha new approacha new approach Application/s is at the heart of the enterprise
  • 22. SESESESE a new approacha new approacha new approacha new approach The Application Data Security LifecycleThe Application Data Security LifecycleThe Application Data Security LifecycleThe Application Data Security Lifecycle Assess Set Policies/Controls Measure Monitor / Enforce The Application Data Security Life Cycle
  • 23. SESESESE a new approacha new approacha new approacha new approach The Application Data Security LifecycleThe Application Data Security LifecycleThe Application Data Security LifecycleThe Application Data Security Lifecycle Assess Discover Servers and Data Test Configuration Evaluate Inherent Risks Assess how and by who data and applications are used Set Policies and Controls Set policies automatically Adapt to user changes Support granular polices and controls
  • 24. SESESESE a new approacha new approacha new approacha new approach The Application Data Security LifecycleThe Application Data Security LifecycleThe Application Data Security LifecycleThe Application Data Security Lifecycle Monitor and Enforce Ensure separation of duties Enforce user accountability Capture full detailsCapture full details Alert and block in real time Measure Built in & custom reports Roll-up and drill down of data Security event analysis Compliance workflow
  • 25. SESESESE a new approacha new approacha new approacha new approach Security Information & Event ManagementSecurity Information & Event ManagementSecurity Information & Event ManagementSecurity Information & Event Management Asset Discovery Threat Detection Vulnerability Assessment S I Vulnerability Assessment Event Collection Correlation Event Management Log Storage I E M
  • 26. SESESESE a new approacha new approacha new approacha new approach SIEMSIEMSIEMSIEM SIEM is a Intelligence platform helps safeguard the business by giving you complete visibility into activity across the IT Infrastructure SIEM Capabilities Data AggressionData Aggression Correlation Alerting Dashboards Compliance Retention
  • 27. SESESESE a new approacha new approacha new approacha new approach Single Sign OnSingle Sign OnSingle Sign OnSingle Sign On Single Sign On, SSO, is a property of access control of multiple related, but independent software systems.software systems. Conversely, Single Sign Off, is the property whereby the single action of signing out terminates access to multiple software systems
  • 28. SESESESE a new approacha new approacha new approacha new approach Single Sign OnSingle Sign OnSingle Sign OnSingle Sign On More secure Reduces password fatigue Reduces time spend for re-entering passwordsReduces time spend for re-entering passwords Reducing IT costs- Help desk calls about passwords Security on all levels of entry/exit/access to systems Centralized reporting for compliance adherence
  • 29. SESESESE a new approacha new approacha new approacha new approach Cloud Computing & SecurityCloud Computing & SecurityCloud Computing & SecurityCloud Computing & Security There are a number of security issues/concerns associated with cloud computing but these issues fall into two broad categories: Security issues faced by cloud providers (organizations providing software- platform or infrastructure-as-a-service via the cloud) and security issues facedplatform or infrastructure-as-a-service via the cloud) and security issues faced by their customers The provider must ensure that their infrastructure is secure and that their clients’ data and applications are protected The customer must ensure that the provider has taken the proper security measures to protect their information.
  • 30. SESESESE a new approacha new approacha new approacha new approach Cloud Computing & SecurityCloud Computing & SecurityCloud Computing & SecurityCloud Computing & Security VirtualizationVirtualizationVirtualizationVirtualization The extensive use of virtualization in implementing cloud infrastructure brings unique security concerns for customers or tenants of a public cloud servicefor customers or tenants of a public cloud service Virtualization alters the relationship between the OS and underlying hardware - be it computing, storage or even networking
  • 31. SESESESE a new approacha new approacha new approacha new approach Cloud Computing & SecurityCloud Computing & SecurityCloud Computing & SecurityCloud Computing & Security VirtualizationVirtualizationVirtualizationVirtualization •This introduces an additional layer - virtualization - that itself must be properly configured, managed and securedsecured •Specific concerns include the potential to compromise the virtualization software, or "hypervisor". While these concerns are largely theoretical, they do exist
  • 32. SESESESE a new approacha new approacha new approacha new approach ConclusionConclusionConclusionConclusion Complexity is our life and making it simple our goal. Technology gains the highest end with simplistic products and services. The complexity of IT security gets confounded with innumerable applications, the processing power, thewith innumerable applications, the processing power, the world wide web interface, cross enterprise collaboration and the like. Cloud computing, though in its nascent stage has thrown a major challenge to IT security, the success of which would be epochal and the IT services would take a well deserving leap forward.