SlideShare a Scribd company logo
1 of 35
Download to read offline
Makers of World’s 1st SaaS GRC
Copyright © 2020 FixNix Inc. Confidential. All rights reserved.
Are you ready for Covid19 way of Cyber Security ?
Virtual Chief Information Security Officer(V-CISO) Alliance Webinar
Occupational Safety | Business Resiliency | Network Security
vCISO.FixNix.co
IT SECURITY IN COVID-19
Presented by,
Nagesh Lad, CISSP, CISA
Speaker’s Profile
• Bachelor of Engineering (B.E.) in Electronics from Mumbai
University
• CISA, CISSP, CPISI, ACSA, DCL, ITIL, CEH, CCNA Certified
• 18+ years of industry experience
• Worked for BFSI (Stock Exchange, Banks, Clearing
Corporation, Insurance) and IT Service Industry
• Working as CISO for Private Indian Insurance Company for
more than 7 years
Agenda
• Assumptions
• Different Phases handling current Pandemic Situation
• Enabling WFH Facilities
• IT Security Practices in COVID-19
Assumptions
Organizations are following Information and Cyber Security Practices
which may include but not limit to:
• Secure Network Architecture
• Secure SDLC Practices
• Multi-layered Security Controls / Protections
• Secure Configuration Practices
• Patch Management
• Vulnerability Management
• Data backup & restoration practices
• Role based & least privilege access rights and revalidation practices
• Continuous Monitoring & Responding to Security Alerts
• & others …
Different Phases
Every organization would have gone through below phases
while handling current COVID-19 Pandemic Situation
• Invocation of BCP Plan
• Enabling WFH Facilities
• Educating Users on Do’s and Don’ts
• Re-aligning Security Controls / Practices
• Fine-tuning Monitoring Practices
Invocation of BCP
• Many organization were having documented & tested
BCP Plan
• But very few were ready for such a long lock down period
• WFH has became new way of delivering business
activities
• Many would have revised their BCP Plan to include such
pandemic scenario
ENABLING WFH
FACILITIES
Challenges Faced
• Organizations were having remote access facilities like
VPN and VDI over Internet – but for limited users
• Limited Licenses
• Limited Device Capacity
• Laptops were assigned to limited users based on their
role
• Limited Internet bandwidth
Few Approaches Taken
• Enabled VPN accesses on organization’s securely
configured laptops
• Enabled VDI over internet access for users to connect
from their personal systems
• Allowed users to take organization’s desktops at their
home – risky option if not controlled properly
Steps taken to enable WFH
• Purchased or rented Laptops in bulk quantity
• Increased licenses and capacity of VPN and VDI Solutions
• Increased internet connection bandwidth
• Enabled VPN & VDI accesses to large set of users
• Performed Risk Assessment on Service Provider’s WFH
facilities
• On-boarded new vendors who were ready to deliver services in
WFH scenario – e.g. call center agent solution for WFH
Communications from Regulator
• Regulators were sending frequent security advisories /
notifications to guide organizations
• Number of advisories received from IRDAI on WFH
Security Guidelines, BCP / DR Guidelines for COVID-19
• RBI sent notifications related to DDoS & Phishing
Campaigns from China
• Organization should monitor such communications & take
necessary actions
IT SECURITY PRACTICES
IN COVID-19
User Awareness
• Educating Users on Do’s and Don’ts for Information and
Cyber Security point of view
• Creating situation based awareness e.g.
• Conducting video conference calls,
• Accessing organization’s systems from home
• Wi-Fi Connection Security
• Handling COVID-19 phishing emails etc.
End Point Security
All organization’s end points (laptops) should be securely configured
• Normal access rights to End Users
• Installation of agents like
• Device Control Management
• Internet Proxy Client
• Host based DLP
• Antivirus
• EDR Solution
• Installation of Regular updates & patches
• Weekly complete scanning of End Point to identify / clean any
infection
Network / System Security
• Enable DDoS Protection
• External Penetration Testing to identify & mitigate vulnerability
present (if any)
• Secure Configuration Review and Vulnerability Assessment of
WFH Solutions – VPN, VDI etc.
• Vulnerability Assessments of Internet Facing Systems & Critical
Systems
• Blocking of traffic coming from out of India specially for WFH
Solutions (basis of nature of business & spread of end users)
Security Controls for VPN
• Allow access to only limited secure ports over internet
• Admin interface should be blocked over internet
• Enable 2FA Authentications mechanism
• Allow users to connect to VPN only from organization’s
securely configured laptops
• Enable secure posture validation for End Points
• Configure devices securely and test them periodically
Security Controls for VDI over Internet
• Allow access to only limited secure ports over internet
• Admin interface should be blocked over internet
• Enable 2FA Authentications mechanism
• Ensure restriction of copy-paste rights
Security of Collaboration Solutions
• Organization enabled accesses to collaboration solutions like video
conferencing e.g. webex, google meet, MS team, Zoom
• Earlier, such accesses were restricted to limited set of users
considering data security & other risks
• Organization should set security guidelines for users while using such
solutions. For e.g.:
• Secure distribution of meeting invite to limited required participants
• Enabling waiting room, allow known participants in the meeting
• Restricting presentation access to host
• Disabling remote accesses etc.
• Educate users on these security guidelines
• Keep software updated with latest version & patches
Firewall Rulebase
• Enable accesses basis of User roles and requirements
from VPN & VDI Systems
• Do not enable complete access to Production Network
• Block black listed IP addresses on perimeter devices
• Block IOCs available in active attacks in the news
• Periodically revalidate accesses enabled from VPN & VDI
Systems
Security Monitoring Practices
• Integrate security and audit logs from all security & perimeter
devices and from critical systems
• Fine-tune use cases basis of current situation and active attack
patterns
• Continuously Monitor & respond to DLP and EDR Alerts
• Monitor of traffic coming from VPN Users
• Perform trend analysis to identify deviation from normal
patterns
• Fine-tune Cyber Crisis Management Plan (CCMP) to include
WFH Situation
Third Party Risk
• Many organizations outsource number of activities to third party
e.g. callings, data entry
• Many of these Third Parties are connected using leased lines,
IPSec Tunnel to organization network to access applications /
systems
• Assess risk introduced by WFH facilities at third party end
• Keep eye on security news to monitor any news related
associated third parties
• Services available which monitor risks from third parties to the
organization and provides reports / alerts for the same –
organization can avail such services
Privilege Access Management
• Ensure no admin module directly available over internet
• Enable Privilege access rights using PAM Solutions
• Enable 2FA Authentication Mechanism
• Enable access rights based on role and least privilege
principles
• Periodically revalidate need for Privilege Access Rights
User Access Revalidations
• Enable user access rights “need to know” and “least
privilege” basis
• Follow entry – exit process to grant & remove access
rights
• Periodically revalidate existence of user and need of
access rights basis of user’s role
• Frequently check inactive users (e.g. inactive for 10 days)
• Remove dormant & orphan User IDs
Back to office
• Slowly governments are allowing companies to call their
employees back to office
• User may bring infected system to office
• User may also bring their personal system to office
• NAC control should be effective to keep infected system
out of network or in an isolated segment
Governance Practices
Set governance practices
• To ensure execution of all critical activities which were
getting delivered from normal work scenario
• To monitor effectiveness of security practices built &
security posture of the organization
• To identify, review & track severe risks
• To take decision on mitigation of severe risks
2
Cyber Security
and
regulatory
Problems
Mutiple standards, regulations, security standards, process across operating
geographies like ISO 27001, GDPR, CCPA, PCI DSS, etc
Increasing complex Audits involving Information Security, Compliance, Legal,
External auditors, Regulators from large enterprises to country regulators
New age Digital, Traditional, Vendor risks need different approaches to improve
Digital Risk Maturity
Cross-department collaboration and strategy as they aim to have a single
enterprise portal and backbone for managing, communicating, and
maintaining policies
Copyright © 2020 FixNix Inc. Confidential. All rights reserved.
V-CISO - How it works Copyright © 2020 FixNix Inc. Confidential. All rights reserved.
Copyright © 2020 FixNix Inc. Confidential. All rights reserved.
V-CISO on board
V-CISO on board Copyright © 2020 FixNix Inc. Confidential. All rights reserved.
Copyright © 2020 FixNix Inc. Confidential. All rights reserved.
V-CISO on board
Copyright © 2020 FixNix Inc. Confidential. All rights reserved.
V-CISO on board
V-CISO Models Copyright © 2020 FixNix Inc. Confidential. All rights reserved.
Save Over 85% in Full Time CISO salary, every year! Copyright © 2020 FixNix Inc. Confidential. All rights reserved.
❑ A simple 80 hours a month Virtual CISO plan with FixNix would cost you in
the region of $30,000 per annum where your team is going to geta V-CISO
strategizes every day 3.2 hours, 25 days a month for your organization.
❑ Whereas a full time, experienced CISO, on average, would set you back
approximately $200,000 per year (not including hiring costs, sick pay,
holiday pay and training costs and possibly redundancy payments).
Shanmugavel Sankaran
Founder, FixNix
Shan@FixNix.co
+1 925 395 3684
+91 87 90 878 222
RegTech21| Red Herring Asia 100
TieCon50| Most User Friendly GRC
Copyright © 2020 FixNix Inc. Confidential. All rights reserved.
From FixNix with for

More Related Content

What's hot

Mobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best PracticesMobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best PracticesCisco Canada
 
Managing Multiple Assessments Using Zero Trust Principles
Managing Multiple Assessments Using Zero Trust PrinciplesManaging Multiple Assessments Using Zero Trust Principles
Managing Multiple Assessments Using Zero Trust PrinciplesControlCase
 
Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015Samuel Kamuli
 
Design and Evaluation of [vSoC]: Virtualised Security Operations Centre
Design and Evaluation of [vSoC]: Virtualised Security Operations Centre  Design and Evaluation of [vSoC]: Virtualised Security Operations Centre
Design and Evaluation of [vSoC]: Virtualised Security Operations Centre Napier University
 
IBM Endpoint Manager for Mobile Devices (Overview)
IBM Endpoint Manager for Mobile Devices (Overview)IBM Endpoint Manager for Mobile Devices (Overview)
IBM Endpoint Manager for Mobile Devices (Overview)Kimber Spradlin
 
Accelerating OT - A Case Study
Accelerating OT - A Case StudyAccelerating OT - A Case Study
Accelerating OT - A Case StudyDigital Bond
 
Assessing the Security of Cloud SaaS Solutions
Assessing the Security of Cloud SaaS SolutionsAssessing the Security of Cloud SaaS Solutions
Assessing the Security of Cloud SaaS SolutionsDigital Bond
 
Huntsville GovCon Growth Summit 2020 - Summit 7 - Cybersecurity Maturity Mode...
Huntsville GovCon Growth Summit 2020 - Summit 7 - Cybersecurity Maturity Mode...Huntsville GovCon Growth Summit 2020 - Summit 7 - Cybersecurity Maturity Mode...
Huntsville GovCon Growth Summit 2020 - Summit 7 - Cybersecurity Maturity Mode...Unanet
 
Company Profile
Company ProfileCompany Profile
Company Profile3SC World
 
IT Service & Asset Management Better Together
IT Service & Asset Management Better TogetherIT Service & Asset Management Better Together
IT Service & Asset Management Better TogetherIvanti
 
Building an Intelligence-Driven Security Operations Center
Building an Intelligence-Driven Security Operations CenterBuilding an Intelligence-Driven Security Operations Center
Building an Intelligence-Driven Security Operations CenterEMC
 
Top PCI Pitfalls and How to Avoid Them: The QSA’s Perspective
Top PCI Pitfalls and How to Avoid Them: The QSA’s PerspectiveTop PCI Pitfalls and How to Avoid Them: The QSA’s Perspective
Top PCI Pitfalls and How to Avoid Them: The QSA’s PerspectiveAlgoSec
 
Manoj purandare - Stratergy towards an Effective Security Operations Centre -...
Manoj purandare - Stratergy towards an Effective Security Operations Centre -...Manoj purandare - Stratergy towards an Effective Security Operations Centre -...
Manoj purandare - Stratergy towards an Effective Security Operations Centre -...Manoj Purandare ☁
 
Business Case Of Bring Your Own Device[ BYOD]
Business Case Of Bring Your Own Device[ BYOD] Business Case Of Bring Your Own Device[ BYOD]
Business Case Of Bring Your Own Device[ BYOD] Md Yousup Faruqu
 
Ooredoo%20Security%20Managed%20Services
Ooredoo%20Security%20Managed%20ServicesOoredoo%20Security%20Managed%20Services
Ooredoo%20Security%20Managed%20ServicesMuhammad Mudassar
 
Network Security, Change Control, Outsourcing
Network Security, Change Control, OutsourcingNetwork Security, Change Control, Outsourcing
Network Security, Change Control, OutsourcingNicholas Davis
 
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #5
SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #5SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #5
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #5Lisa Niles
 
Auditing & Assessing The Risk Of Cloud Service Providers at Auditworld 2015 ...
Auditing & Assessing The  Risk Of Cloud Service Providers at Auditworld 2015 ...Auditing & Assessing The  Risk Of Cloud Service Providers at Auditworld 2015 ...
Auditing & Assessing The Risk Of Cloud Service Providers at Auditworld 2015 ...Alan Yau Ti Dun
 
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #1
SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #1SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #1
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #1Lisa Niles
 

What's hot (20)

Mobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best PracticesMobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best Practices
 
Managing Multiple Assessments Using Zero Trust Principles
Managing Multiple Assessments Using Zero Trust PrinciplesManaging Multiple Assessments Using Zero Trust Principles
Managing Multiple Assessments Using Zero Trust Principles
 
Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015
 
Design and Evaluation of [vSoC]: Virtualised Security Operations Centre
Design and Evaluation of [vSoC]: Virtualised Security Operations Centre  Design and Evaluation of [vSoC]: Virtualised Security Operations Centre
Design and Evaluation of [vSoC]: Virtualised Security Operations Centre
 
IBM Endpoint Manager for Mobile Devices (Overview)
IBM Endpoint Manager for Mobile Devices (Overview)IBM Endpoint Manager for Mobile Devices (Overview)
IBM Endpoint Manager for Mobile Devices (Overview)
 
Accelerating OT - A Case Study
Accelerating OT - A Case StudyAccelerating OT - A Case Study
Accelerating OT - A Case Study
 
Assessing the Security of Cloud SaaS Solutions
Assessing the Security of Cloud SaaS SolutionsAssessing the Security of Cloud SaaS Solutions
Assessing the Security of Cloud SaaS Solutions
 
Huntsville GovCon Growth Summit 2020 - Summit 7 - Cybersecurity Maturity Mode...
Huntsville GovCon Growth Summit 2020 - Summit 7 - Cybersecurity Maturity Mode...Huntsville GovCon Growth Summit 2020 - Summit 7 - Cybersecurity Maturity Mode...
Huntsville GovCon Growth Summit 2020 - Summit 7 - Cybersecurity Maturity Mode...
 
Company Profile
Company ProfileCompany Profile
Company Profile
 
IT Service & Asset Management Better Together
IT Service & Asset Management Better TogetherIT Service & Asset Management Better Together
IT Service & Asset Management Better Together
 
Building an Intelligence-Driven Security Operations Center
Building an Intelligence-Driven Security Operations CenterBuilding an Intelligence-Driven Security Operations Center
Building an Intelligence-Driven Security Operations Center
 
Top PCI Pitfalls and How to Avoid Them: The QSA’s Perspective
Top PCI Pitfalls and How to Avoid Them: The QSA’s PerspectiveTop PCI Pitfalls and How to Avoid Them: The QSA’s Perspective
Top PCI Pitfalls and How to Avoid Them: The QSA’s Perspective
 
Manoj purandare - Stratergy towards an Effective Security Operations Centre -...
Manoj purandare - Stratergy towards an Effective Security Operations Centre -...Manoj purandare - Stratergy towards an Effective Security Operations Centre -...
Manoj purandare - Stratergy towards an Effective Security Operations Centre -...
 
Business Case Of Bring Your Own Device[ BYOD]
Business Case Of Bring Your Own Device[ BYOD] Business Case Of Bring Your Own Device[ BYOD]
Business Case Of Bring Your Own Device[ BYOD]
 
Ooredoo%20Security%20Managed%20Services
Ooredoo%20Security%20Managed%20ServicesOoredoo%20Security%20Managed%20Services
Ooredoo%20Security%20Managed%20Services
 
Network Security, Change Control, Outsourcing
Network Security, Change Control, OutsourcingNetwork Security, Change Control, Outsourcing
Network Security, Change Control, Outsourcing
 
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #5
SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #5SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #5
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #5
 
Auditing & Assessing The Risk Of Cloud Service Providers at Auditworld 2015 ...
Auditing & Assessing The  Risk Of Cloud Service Providers at Auditworld 2015 ...Auditing & Assessing The  Risk Of Cloud Service Providers at Auditworld 2015 ...
Auditing & Assessing The Risk Of Cloud Service Providers at Auditworld 2015 ...
 
IBM Qradar-Advisor
IBM Qradar-AdvisorIBM Qradar-Advisor
IBM Qradar-Advisor
 
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #1
SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #1SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #1
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #1
 

Similar to FixNix vCISO CyberSecurity Network Security for Covid91

Performing One Audit Using Zero Trust Principles
Performing One Audit Using Zero Trust PrinciplesPerforming One Audit Using Zero Trust Principles
Performing One Audit Using Zero Trust PrinciplesControlCase
 
Resume | Vijay Navgire
Resume | Vijay Navgire Resume | Vijay Navgire
Resume | Vijay Navgire Vijay Νavgire
 
Secure Cloud Hosting: Real Requirements to Protect your Data
Secure Cloud Hosting: Real Requirements to Protect your DataSecure Cloud Hosting: Real Requirements to Protect your Data
Secure Cloud Hosting: Real Requirements to Protect your DataGreat Wide Open
 
Lock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM iLock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM iPrecisely
 
VMworld 2013: Troubleshooting and Monitoring NSX Service Composer Policies
VMworld 2013: Troubleshooting and Monitoring NSX Service Composer Policies VMworld 2013: Troubleshooting and Monitoring NSX Service Composer Policies
VMworld 2013: Troubleshooting and Monitoring NSX Service Composer Policies VMworld
 
Protecting Your Business from Unauthorized IBM i Access
Protecting Your Business from Unauthorized IBM i AccessProtecting Your Business from Unauthorized IBM i Access
Protecting Your Business from Unauthorized IBM i AccessPrecisely
 
Patch your workplaces at home, in a meeting center or at the office
Patch your workplaces at home, in a meeting center or at the officePatch your workplaces at home, in a meeting center or at the office
Patch your workplaces at home, in a meeting center or at the officeIvanti
 
PCI DSS Business as Usual
PCI DSS Business as UsualPCI DSS Business as Usual
PCI DSS Business as UsualControlCase
 
Cyberteq - Cyber Security for Telecom.pdf
Cyberteq - Cyber Security for Telecom.pdfCyberteq - Cyber Security for Telecom.pdf
Cyberteq - Cyber Security for Telecom.pdfssuser8717cc
 
Dealing with Web Application Security, Regulation Style
Dealing with Web Application Security, Regulation StyleDealing with Web Application Security, Regulation Style
Dealing with Web Application Security, Regulation StyleRochester Security Summit
 
Improving System Upgrades and Patching using SolarWinds
Improving System Upgrades and Patching using SolarWindsImproving System Upgrades and Patching using SolarWinds
Improving System Upgrades and Patching using SolarWindsSolarWinds
 
Network security, change control, outsourcing
Network security, change control, outsourcingNetwork security, change control, outsourcing
Network security, change control, outsourcingNicholas Davis
 
Cybersecurity Insiders Webinar - Zero Trust: Best Practices for Securing the...
Cybersecurity Insiders Webinar  - Zero Trust: Best Practices for Securing the...Cybersecurity Insiders Webinar  - Zero Trust: Best Practices for Securing the...
Cybersecurity Insiders Webinar - Zero Trust: Best Practices for Securing the...Ivanti
 
What is the UK Cyber Essentials scheme?
What is the  UK Cyber Essentials scheme?What is the  UK Cyber Essentials scheme?
What is the UK Cyber Essentials scheme?IT Governance Ltd
 
Government Webinar: Five Essential IT Tools You Need Today
Government Webinar: Five Essential IT Tools You Need TodayGovernment Webinar: Five Essential IT Tools You Need Today
Government Webinar: Five Essential IT Tools You Need TodaySolarWinds
 
The New Assure Security: Complete IBM i Compliance and Security
The New Assure Security: Complete IBM i Compliance and SecurityThe New Assure Security: Complete IBM i Compliance and Security
The New Assure Security: Complete IBM i Compliance and SecurityPrecisely
 
Cybersecurity
Cybersecurity Cybersecurity
Cybersecurity nado-web
 
PCI DSS Business as Usual (BAU)
PCI DSS Business as Usual (BAU)PCI DSS Business as Usual (BAU)
PCI DSS Business as Usual (BAU)ControlCase
 

Similar to FixNix vCISO CyberSecurity Network Security for Covid91 (20)

Performing One Audit Using Zero Trust Principles
Performing One Audit Using Zero Trust PrinciplesPerforming One Audit Using Zero Trust Principles
Performing One Audit Using Zero Trust Principles
 
BEST CYBER SECURITY PRACTICES
BEST CYBER SECURITY PRACTICESBEST CYBER SECURITY PRACTICES
BEST CYBER SECURITY PRACTICES
 
Resume | Vijay Navgire
Resume | Vijay Navgire Resume | Vijay Navgire
Resume | Vijay Navgire
 
Secure Cloud Hosting: Real Requirements to Protect your Data
Secure Cloud Hosting: Real Requirements to Protect your DataSecure Cloud Hosting: Real Requirements to Protect your Data
Secure Cloud Hosting: Real Requirements to Protect your Data
 
Lock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM iLock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM i
 
VMworld 2013: Troubleshooting and Monitoring NSX Service Composer Policies
VMworld 2013: Troubleshooting and Monitoring NSX Service Composer Policies VMworld 2013: Troubleshooting and Monitoring NSX Service Composer Policies
VMworld 2013: Troubleshooting and Monitoring NSX Service Composer Policies
 
Protecting Your Business from Unauthorized IBM i Access
Protecting Your Business from Unauthorized IBM i AccessProtecting Your Business from Unauthorized IBM i Access
Protecting Your Business from Unauthorized IBM i Access
 
Patch your workplaces at home, in a meeting center or at the office
Patch your workplaces at home, in a meeting center or at the officePatch your workplaces at home, in a meeting center or at the office
Patch your workplaces at home, in a meeting center or at the office
 
PCI DSS Business as Usual
PCI DSS Business as UsualPCI DSS Business as Usual
PCI DSS Business as Usual
 
Cyberteq - Cyber Security for Telecom.pdf
Cyberteq - Cyber Security for Telecom.pdfCyberteq - Cyber Security for Telecom.pdf
Cyberteq - Cyber Security for Telecom.pdf
 
Dealing with Web Application Security, Regulation Style
Dealing with Web Application Security, Regulation StyleDealing with Web Application Security, Regulation Style
Dealing with Web Application Security, Regulation Style
 
NAC_p3.pptx
NAC_p3.pptxNAC_p3.pptx
NAC_p3.pptx
 
Improving System Upgrades and Patching using SolarWinds
Improving System Upgrades and Patching using SolarWindsImproving System Upgrades and Patching using SolarWinds
Improving System Upgrades and Patching using SolarWinds
 
Network security, change control, outsourcing
Network security, change control, outsourcingNetwork security, change control, outsourcing
Network security, change control, outsourcing
 
Cybersecurity Insiders Webinar - Zero Trust: Best Practices for Securing the...
Cybersecurity Insiders Webinar  - Zero Trust: Best Practices for Securing the...Cybersecurity Insiders Webinar  - Zero Trust: Best Practices for Securing the...
Cybersecurity Insiders Webinar - Zero Trust: Best Practices for Securing the...
 
What is the UK Cyber Essentials scheme?
What is the  UK Cyber Essentials scheme?What is the  UK Cyber Essentials scheme?
What is the UK Cyber Essentials scheme?
 
Government Webinar: Five Essential IT Tools You Need Today
Government Webinar: Five Essential IT Tools You Need TodayGovernment Webinar: Five Essential IT Tools You Need Today
Government Webinar: Five Essential IT Tools You Need Today
 
The New Assure Security: Complete IBM i Compliance and Security
The New Assure Security: Complete IBM i Compliance and SecurityThe New Assure Security: Complete IBM i Compliance and Security
The New Assure Security: Complete IBM i Compliance and Security
 
Cybersecurity
Cybersecurity Cybersecurity
Cybersecurity
 
PCI DSS Business as Usual (BAU)
PCI DSS Business as Usual (BAU)PCI DSS Business as Usual (BAU)
PCI DSS Business as Usual (BAU)
 

More from Shanmugavel Sankaran

The Virtual Security Officer Platform
The Virtual Security Officer PlatformThe Virtual Security Officer Platform
The Virtual Security Officer PlatformShanmugavel Sankaran
 
Wilson Sonsini Executive Orders on TikTok and WeChat: Ambiguity and a Few Oth...
Wilson Sonsini Executive Orders on TikTok and WeChat: Ambiguity and a Few Oth...Wilson Sonsini Executive Orders on TikTok and WeChat: Ambiguity and a Few Oth...
Wilson Sonsini Executive Orders on TikTok and WeChat: Ambiguity and a Few Oth...Shanmugavel Sankaran
 
national standards of People's Republic of China
national standards of People's Republic of China national standards of People's Republic of China
national standards of People's Republic of China Shanmugavel Sankaran
 
FixNix and life of Chief Nixer__ A photo essay
FixNix and life of Chief Nixer__ A photo essayFixNix and life of Chief Nixer__ A photo essay
FixNix and life of Chief Nixer__ A photo essayShanmugavel Sankaran
 

More from Shanmugavel Sankaran (9)

Educate empower experience
Educate empower experienceEducate empower experience
Educate empower experience
 
The Virtual Security Officer Platform
The Virtual Security Officer PlatformThe Virtual Security Officer Platform
The Virtual Security Officer Platform
 
Wilson Sonsini Executive Orders on TikTok and WeChat: Ambiguity and a Few Oth...
Wilson Sonsini Executive Orders on TikTok and WeChat: Ambiguity and a Few Oth...Wilson Sonsini Executive Orders on TikTok and WeChat: Ambiguity and a Few Oth...
Wilson Sonsini Executive Orders on TikTok and WeChat: Ambiguity and a Few Oth...
 
national standards of People's Republic of China
national standards of People's Republic of China national standards of People's Republic of China
national standards of People's Republic of China
 
World earth day
World earth dayWorld earth day
World earth day
 
Cyber security for journalists
Cyber security for journalistsCyber security for journalists
Cyber security for journalists
 
FixNix and life of Chief Nixer__ A photo essay
FixNix and life of Chief Nixer__ A photo essayFixNix and life of Chief Nixer__ A photo essay
FixNix and life of Chief Nixer__ A photo essay
 
PCI-DSS for IDRBT
PCI-DSS for IDRBTPCI-DSS for IDRBT
PCI-DSS for IDRBT
 
Learning from great souls..
Learning from great souls..Learning from great souls..
Learning from great souls..
 

Recently uploaded

Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxmarlenawright1
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxPooja Bhuva
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfDr Vijay Vishwakarma
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxUmeshTimilsina1
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...Nguyen Thanh Tu Collection
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxannathomasp01
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxDr. Ravikiran H M Gowda
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Pooja Bhuva
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jisc
 

Recently uploaded (20)

Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 

FixNix vCISO CyberSecurity Network Security for Covid91

  • 1. Makers of World’s 1st SaaS GRC Copyright © 2020 FixNix Inc. Confidential. All rights reserved. Are you ready for Covid19 way of Cyber Security ? Virtual Chief Information Security Officer(V-CISO) Alliance Webinar Occupational Safety | Business Resiliency | Network Security vCISO.FixNix.co
  • 2. IT SECURITY IN COVID-19 Presented by, Nagesh Lad, CISSP, CISA
  • 3. Speaker’s Profile • Bachelor of Engineering (B.E.) in Electronics from Mumbai University • CISA, CISSP, CPISI, ACSA, DCL, ITIL, CEH, CCNA Certified • 18+ years of industry experience • Worked for BFSI (Stock Exchange, Banks, Clearing Corporation, Insurance) and IT Service Industry • Working as CISO for Private Indian Insurance Company for more than 7 years
  • 4. Agenda • Assumptions • Different Phases handling current Pandemic Situation • Enabling WFH Facilities • IT Security Practices in COVID-19
  • 5. Assumptions Organizations are following Information and Cyber Security Practices which may include but not limit to: • Secure Network Architecture • Secure SDLC Practices • Multi-layered Security Controls / Protections • Secure Configuration Practices • Patch Management • Vulnerability Management • Data backup & restoration practices • Role based & least privilege access rights and revalidation practices • Continuous Monitoring & Responding to Security Alerts • & others …
  • 6. Different Phases Every organization would have gone through below phases while handling current COVID-19 Pandemic Situation • Invocation of BCP Plan • Enabling WFH Facilities • Educating Users on Do’s and Don’ts • Re-aligning Security Controls / Practices • Fine-tuning Monitoring Practices
  • 7. Invocation of BCP • Many organization were having documented & tested BCP Plan • But very few were ready for such a long lock down period • WFH has became new way of delivering business activities • Many would have revised their BCP Plan to include such pandemic scenario
  • 9. Challenges Faced • Organizations were having remote access facilities like VPN and VDI over Internet – but for limited users • Limited Licenses • Limited Device Capacity • Laptops were assigned to limited users based on their role • Limited Internet bandwidth
  • 10. Few Approaches Taken • Enabled VPN accesses on organization’s securely configured laptops • Enabled VDI over internet access for users to connect from their personal systems • Allowed users to take organization’s desktops at their home – risky option if not controlled properly
  • 11. Steps taken to enable WFH • Purchased or rented Laptops in bulk quantity • Increased licenses and capacity of VPN and VDI Solutions • Increased internet connection bandwidth • Enabled VPN & VDI accesses to large set of users • Performed Risk Assessment on Service Provider’s WFH facilities • On-boarded new vendors who were ready to deliver services in WFH scenario – e.g. call center agent solution for WFH
  • 12. Communications from Regulator • Regulators were sending frequent security advisories / notifications to guide organizations • Number of advisories received from IRDAI on WFH Security Guidelines, BCP / DR Guidelines for COVID-19 • RBI sent notifications related to DDoS & Phishing Campaigns from China • Organization should monitor such communications & take necessary actions
  • 14. User Awareness • Educating Users on Do’s and Don’ts for Information and Cyber Security point of view • Creating situation based awareness e.g. • Conducting video conference calls, • Accessing organization’s systems from home • Wi-Fi Connection Security • Handling COVID-19 phishing emails etc.
  • 15. End Point Security All organization’s end points (laptops) should be securely configured • Normal access rights to End Users • Installation of agents like • Device Control Management • Internet Proxy Client • Host based DLP • Antivirus • EDR Solution • Installation of Regular updates & patches • Weekly complete scanning of End Point to identify / clean any infection
  • 16. Network / System Security • Enable DDoS Protection • External Penetration Testing to identify & mitigate vulnerability present (if any) • Secure Configuration Review and Vulnerability Assessment of WFH Solutions – VPN, VDI etc. • Vulnerability Assessments of Internet Facing Systems & Critical Systems • Blocking of traffic coming from out of India specially for WFH Solutions (basis of nature of business & spread of end users)
  • 17. Security Controls for VPN • Allow access to only limited secure ports over internet • Admin interface should be blocked over internet • Enable 2FA Authentications mechanism • Allow users to connect to VPN only from organization’s securely configured laptops • Enable secure posture validation for End Points • Configure devices securely and test them periodically
  • 18. Security Controls for VDI over Internet • Allow access to only limited secure ports over internet • Admin interface should be blocked over internet • Enable 2FA Authentications mechanism • Ensure restriction of copy-paste rights
  • 19. Security of Collaboration Solutions • Organization enabled accesses to collaboration solutions like video conferencing e.g. webex, google meet, MS team, Zoom • Earlier, such accesses were restricted to limited set of users considering data security & other risks • Organization should set security guidelines for users while using such solutions. For e.g.: • Secure distribution of meeting invite to limited required participants • Enabling waiting room, allow known participants in the meeting • Restricting presentation access to host • Disabling remote accesses etc. • Educate users on these security guidelines • Keep software updated with latest version & patches
  • 20. Firewall Rulebase • Enable accesses basis of User roles and requirements from VPN & VDI Systems • Do not enable complete access to Production Network • Block black listed IP addresses on perimeter devices • Block IOCs available in active attacks in the news • Periodically revalidate accesses enabled from VPN & VDI Systems
  • 21. Security Monitoring Practices • Integrate security and audit logs from all security & perimeter devices and from critical systems • Fine-tune use cases basis of current situation and active attack patterns • Continuously Monitor & respond to DLP and EDR Alerts • Monitor of traffic coming from VPN Users • Perform trend analysis to identify deviation from normal patterns • Fine-tune Cyber Crisis Management Plan (CCMP) to include WFH Situation
  • 22. Third Party Risk • Many organizations outsource number of activities to third party e.g. callings, data entry • Many of these Third Parties are connected using leased lines, IPSec Tunnel to organization network to access applications / systems • Assess risk introduced by WFH facilities at third party end • Keep eye on security news to monitor any news related associated third parties • Services available which monitor risks from third parties to the organization and provides reports / alerts for the same – organization can avail such services
  • 23. Privilege Access Management • Ensure no admin module directly available over internet • Enable Privilege access rights using PAM Solutions • Enable 2FA Authentication Mechanism • Enable access rights based on role and least privilege principles • Periodically revalidate need for Privilege Access Rights
  • 24. User Access Revalidations • Enable user access rights “need to know” and “least privilege” basis • Follow entry – exit process to grant & remove access rights • Periodically revalidate existence of user and need of access rights basis of user’s role • Frequently check inactive users (e.g. inactive for 10 days) • Remove dormant & orphan User IDs
  • 25. Back to office • Slowly governments are allowing companies to call their employees back to office • User may bring infected system to office • User may also bring their personal system to office • NAC control should be effective to keep infected system out of network or in an isolated segment
  • 26. Governance Practices Set governance practices • To ensure execution of all critical activities which were getting delivered from normal work scenario • To monitor effectiveness of security practices built & security posture of the organization • To identify, review & track severe risks • To take decision on mitigation of severe risks
  • 27. 2 Cyber Security and regulatory Problems Mutiple standards, regulations, security standards, process across operating geographies like ISO 27001, GDPR, CCPA, PCI DSS, etc Increasing complex Audits involving Information Security, Compliance, Legal, External auditors, Regulators from large enterprises to country regulators New age Digital, Traditional, Vendor risks need different approaches to improve Digital Risk Maturity Cross-department collaboration and strategy as they aim to have a single enterprise portal and backbone for managing, communicating, and maintaining policies Copyright © 2020 FixNix Inc. Confidential. All rights reserved.
  • 28. V-CISO - How it works Copyright © 2020 FixNix Inc. Confidential. All rights reserved.
  • 29. Copyright © 2020 FixNix Inc. Confidential. All rights reserved. V-CISO on board
  • 30. V-CISO on board Copyright © 2020 FixNix Inc. Confidential. All rights reserved.
  • 31. Copyright © 2020 FixNix Inc. Confidential. All rights reserved. V-CISO on board
  • 32. Copyright © 2020 FixNix Inc. Confidential. All rights reserved. V-CISO on board
  • 33. V-CISO Models Copyright © 2020 FixNix Inc. Confidential. All rights reserved.
  • 34. Save Over 85% in Full Time CISO salary, every year! Copyright © 2020 FixNix Inc. Confidential. All rights reserved. ❑ A simple 80 hours a month Virtual CISO plan with FixNix would cost you in the region of $30,000 per annum where your team is going to geta V-CISO strategizes every day 3.2 hours, 25 days a month for your organization. ❑ Whereas a full time, experienced CISO, on average, would set you back approximately $200,000 per year (not including hiring costs, sick pay, holiday pay and training costs and possibly redundancy payments).
  • 35. Shanmugavel Sankaran Founder, FixNix Shan@FixNix.co +1 925 395 3684 +91 87 90 878 222 RegTech21| Red Herring Asia 100 TieCon50| Most User Friendly GRC Copyright © 2020 FixNix Inc. Confidential. All rights reserved. From FixNix with for