SlideShare una empresa de Scribd logo
1 de 9
ASSESS YOUR SECURITY
POSTURE TO ARM YOUR
DEFENCES
Carl Shallow
Head of Compliance & Pre-sales
www.secdata.com
1
LOOKING BACK…
• What were the risks when everything was centralised on
mainframes?

Overnight
batch
processing

Avoiding data
loss
Centralised
data storage
What was
printed?

2
LOOKING FORWARD…
• Today, we have almost come full circle…

Centralised
storage

Thin client
access

Don’t allow
data to move

3
DEFINING THE PROBLEM
• What are the concerns for companies today?
Data
•
•
•

•

•

Where is it?
Who has
access to it?
How sensitive
is it?
How sensitive
will it be in a
week, a
month or a
year?
What rules do
you have to
follow to
protect it?

Applications
•

•
•
•

•

The dangers
of downtime,
ensuring
availability
Testing
Development
Protecting
sensitive
application
data
Ensuring
perfect
performance

Physical
•
•
•
•

Ensuring
business
continuity
Robust
disaster
protection
Data
replication
Physical site
security

Connectivity
•
•

•
•
•

Bring Your
Own Device
Secure
remote
access
Cloud-based
services and
infrastructure
Virtualisation
Unified
comms and
collaboration

4
STATE OF THE MARKET
• Securing data has been a moving target for the last 20
years. Today, we’re facing:

Squeezed IT
budgets

Time
constraints

Changing
technology
and threats

Most companies are locking the stable door
after the horse has bolted!
5
WHERE ARE WE GOING?
• We’re seeing a proven track record that compliance
gives results
• Thanks to PCI compliance, credit card fraud reached a
10 year low in 2012

Established
security
frameworks

Increased
compliance
requirements

Companies
aligning to
ISO 27001

6
WHAT CAN YOU DO?
• Assess the unique vulnerabilities of your business
• Identify the greatest risks and vulnerabilities to enable
you to implement preventative protection
Risk
assessments

Security
assessments

Security as a
service

Threat
analysis

What are the
acceptable risks
and what are
the crucial areas
to protect?

SensePost

Push monitoring
data and
analytics to the
cloud and
consume as an
expert service

Assess on
demand and
model the
potential
problem

Network
Applications
Employee
training and
education

Websense,
Bluecoat,
CheckPoint,
SIEM, SkyBox

7
WHAT SHOULD YOU DO NEXT?

Perform a risk
assessment

Prioritise the
gaps

Deploy a SIEM

Implement
scanning /
patch
management

Then assess, assess, assess!
Assessment is the new incident response
8
THANK YOU
Carl Shallow
Head of Compliance and Pre-sales
carl.shallow@secdata.com
+44 1622 723400

9

Más contenido relacionado

Destacado

female feticide/Save girl child
female feticide/Save girl childfemale feticide/Save girl child
female feticide/Save girl childParas Pareek
 
Sanitation and hygiene promotion programming guidance
Sanitation and hygiene promotion programming guidanceSanitation and hygiene promotion programming guidance
Sanitation and hygiene promotion programming guidanceSekretariat Nasional
 
Sea Defences Revision
Sea Defences RevisionSea Defences Revision
Sea Defences Revisiondonotreply16
 
Allopathy vs homeopathy vs ayurveda
Allopathy vs homeopathy vs ayurvedaAllopathy vs homeopathy vs ayurveda
Allopathy vs homeopathy vs ayurvedaHealthmania Circle
 
Overview Of Naturopathic Medicine
Overview Of Naturopathic MedicineOverview Of Naturopathic Medicine
Overview Of Naturopathic Medicinejmckenziend
 
Central council for health an family welfare
Central council for health an family welfareCentral council for health an family welfare
Central council for health an family welfareSabeena Sasidharan
 
Meditation power point
Meditation power pointMeditation power point
Meditation power pointtechno UCH
 
Effects Of Yoga And Meditation
Effects Of Yoga And MeditationEffects Of Yoga And Meditation
Effects Of Yoga And Meditationtsoal
 
Nationals policies,Plans,and Programme , Community Health Nursing India
Nationals policies,Plans,and Programme , Community Health Nursing India  Nationals policies,Plans,and Programme , Community Health Nursing India
Nationals policies,Plans,and Programme , Community Health Nursing India Paul Ebenezer
 
Basic Principal Of Naturopathy
Basic Principal Of NaturopathyBasic Principal Of Naturopathy
Basic Principal Of Naturopathyumashankar
 
Ectopic pregnancy
Ectopic pregnancyEctopic pregnancy
Ectopic pregnancyraj kumar
 
Child welfare activities...ppt
Child welfare activities...pptChild welfare activities...ppt
Child welfare activities...pptRahul Dhaker
 
Introduction of psychotherapy
Introduction of psychotherapyIntroduction of psychotherapy
Introduction of psychotherapyNursing Path
 
8. cesarean section
8. cesarean section8. cesarean section
8. cesarean sectionHishgeeubuns
 

Destacado (19)

female feticide/Save girl child
female feticide/Save girl childfemale feticide/Save girl child
female feticide/Save girl child
 
Sanitation and hygiene promotion programming guidance
Sanitation and hygiene promotion programming guidanceSanitation and hygiene promotion programming guidance
Sanitation and hygiene promotion programming guidance
 
Sea Defences Revision
Sea Defences RevisionSea Defences Revision
Sea Defences Revision
 
Defences to crime
Defences to crimeDefences to crime
Defences to crime
 
Allopathy vs homeopathy vs ayurveda
Allopathy vs homeopathy vs ayurvedaAllopathy vs homeopathy vs ayurveda
Allopathy vs homeopathy vs ayurveda
 
Overview Of Naturopathic Medicine
Overview Of Naturopathic MedicineOverview Of Naturopathic Medicine
Overview Of Naturopathic Medicine
 
Central council for health an family welfare
Central council for health an family welfareCentral council for health an family welfare
Central council for health an family welfare
 
Meditation power point
Meditation power pointMeditation power point
Meditation power point
 
Effects Of Yoga And Meditation
Effects Of Yoga And MeditationEffects Of Yoga And Meditation
Effects Of Yoga And Meditation
 
Indian adoption laws
Indian adoption lawsIndian adoption laws
Indian adoption laws
 
Nationals policies,Plans,and Programme , Community Health Nursing India
Nationals policies,Plans,and Programme , Community Health Nursing India  Nationals policies,Plans,and Programme , Community Health Nursing India
Nationals policies,Plans,and Programme , Community Health Nursing India
 
Basic Principal Of Naturopathy
Basic Principal Of NaturopathyBasic Principal Of Naturopathy
Basic Principal Of Naturopathy
 
Yoga and meditation lecture
Yoga and meditation lectureYoga and meditation lecture
Yoga and meditation lecture
 
Ectopic pregnancy
Ectopic pregnancyEctopic pregnancy
Ectopic pregnancy
 
Child welfare activities...ppt
Child welfare activities...pptChild welfare activities...ppt
Child welfare activities...ppt
 
Introduction of psychotherapy
Introduction of psychotherapyIntroduction of psychotherapy
Introduction of psychotherapy
 
School Nursing
School NursingSchool Nursing
School Nursing
 
8. cesarean section
8. cesarean section8. cesarean section
8. cesarean section
 
Ectopic pregnancy
Ectopic pregnancyEctopic pregnancy
Ectopic pregnancy
 

Más de SecureData Europe

FINE-TUNE IPS TO DIAL UP SECURITY
FINE-TUNE IPS TO DIAL UP SECURITYFINE-TUNE IPS TO DIAL UP SECURITY
FINE-TUNE IPS TO DIAL UP SECURITYSecureData Europe
 
Educate Your Users Not To Take The Bait: Introduction To Phishing As A Service
Educate Your Users Not To Take The Bait: Introduction To Phishing As A ServiceEducate Your Users Not To Take The Bait: Introduction To Phishing As A Service
Educate Your Users Not To Take The Bait: Introduction To Phishing As A ServiceSecureData Europe
 
Managed Security Services On The Rise
Managed Security Services On The RiseManaged Security Services On The Rise
Managed Security Services On The RiseSecureData Europe
 
Managed Next Generation Firewall Service
Managed Next Generation Firewall ServiceManaged Next Generation Firewall Service
Managed Next Generation Firewall ServiceSecureData Europe
 
Incident Response: Tools & Techniques
Incident Response: Tools & TechniquesIncident Response: Tools & Techniques
Incident Response: Tools & TechniquesSecureData Europe
 
Balance Risk With Better Threat Detection
Balance Risk With Better Threat DetectionBalance Risk With Better Threat Detection
Balance Risk With Better Threat DetectionSecureData Europe
 
New Battle Lines for Security
New Battle Lines for SecurityNew Battle Lines for Security
New Battle Lines for SecuritySecureData Europe
 

Más de SecureData Europe (9)

SecureData GI
SecureData GISecureData GI
SecureData GI
 
FINE-TUNE IPS TO DIAL UP SECURITY
FINE-TUNE IPS TO DIAL UP SECURITYFINE-TUNE IPS TO DIAL UP SECURITY
FINE-TUNE IPS TO DIAL UP SECURITY
 
Educate Your Users Not To Take The Bait: Introduction To Phishing As A Service
Educate Your Users Not To Take The Bait: Introduction To Phishing As A ServiceEducate Your Users Not To Take The Bait: Introduction To Phishing As A Service
Educate Your Users Not To Take The Bait: Introduction To Phishing As A Service
 
Managed Security Services On The Rise
Managed Security Services On The RiseManaged Security Services On The Rise
Managed Security Services On The Rise
 
Managed Next Generation Firewall Service
Managed Next Generation Firewall ServiceManaged Next Generation Firewall Service
Managed Next Generation Firewall Service
 
Incident Response: Tools & Techniques
Incident Response: Tools & TechniquesIncident Response: Tools & Techniques
Incident Response: Tools & Techniques
 
Balance Risk With Better Threat Detection
Balance Risk With Better Threat DetectionBalance Risk With Better Threat Detection
Balance Risk With Better Threat Detection
 
New Battle Lines for Security
New Battle Lines for SecurityNew Battle Lines for Security
New Battle Lines for Security
 
SORT OUT YOUR SIEM
SORT OUT YOUR SIEMSORT OUT YOUR SIEM
SORT OUT YOUR SIEM
 

Último

Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 

Último (20)

Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 

Assess Your Security Posture To Arm Your Defences

  • 1. ASSESS YOUR SECURITY POSTURE TO ARM YOUR DEFENCES Carl Shallow Head of Compliance & Pre-sales www.secdata.com 1
  • 2. LOOKING BACK… • What were the risks when everything was centralised on mainframes? Overnight batch processing Avoiding data loss Centralised data storage What was printed? 2
  • 3. LOOKING FORWARD… • Today, we have almost come full circle… Centralised storage Thin client access Don’t allow data to move 3
  • 4. DEFINING THE PROBLEM • What are the concerns for companies today? Data • • • • • Where is it? Who has access to it? How sensitive is it? How sensitive will it be in a week, a month or a year? What rules do you have to follow to protect it? Applications • • • • • The dangers of downtime, ensuring availability Testing Development Protecting sensitive application data Ensuring perfect performance Physical • • • • Ensuring business continuity Robust disaster protection Data replication Physical site security Connectivity • • • • • Bring Your Own Device Secure remote access Cloud-based services and infrastructure Virtualisation Unified comms and collaboration 4
  • 5. STATE OF THE MARKET • Securing data has been a moving target for the last 20 years. Today, we’re facing: Squeezed IT budgets Time constraints Changing technology and threats Most companies are locking the stable door after the horse has bolted! 5
  • 6. WHERE ARE WE GOING? • We’re seeing a proven track record that compliance gives results • Thanks to PCI compliance, credit card fraud reached a 10 year low in 2012 Established security frameworks Increased compliance requirements Companies aligning to ISO 27001 6
  • 7. WHAT CAN YOU DO? • Assess the unique vulnerabilities of your business • Identify the greatest risks and vulnerabilities to enable you to implement preventative protection Risk assessments Security assessments Security as a service Threat analysis What are the acceptable risks and what are the crucial areas to protect? SensePost Push monitoring data and analytics to the cloud and consume as an expert service Assess on demand and model the potential problem Network Applications Employee training and education Websense, Bluecoat, CheckPoint, SIEM, SkyBox 7
  • 8. WHAT SHOULD YOU DO NEXT? Perform a risk assessment Prioritise the gaps Deploy a SIEM Implement scanning / patch management Then assess, assess, assess! Assessment is the new incident response 8
  • 9. THANK YOU Carl Shallow Head of Compliance and Pre-sales carl.shallow@secdata.com +44 1622 723400 9

Notas del editor

  1. Introduce myself and my background of 30 years IT employment with the majority of it in IT security. When I started the new kid on the block was the VAX VMS which still relied on disk platters and tape backups. Access was granted through a Front End Processor and one of the primary concerns was to make sure that everything had been printed. It seemed to a naïve operator that the soul purpose of these “big” systems was to print, of course they were doing a lot more than that, processing and storing data via very specific applications. Nobody worked from home and BYOD was a Sony Walkman……Happy days.Our idea of Security and DR was to have a numeric keypad on the computer room door and to take one of the disk platters over to another building on a weekly basis!One job that we did then that shouldn’t have changed was to check the logs daily and look for any odd events.
  2. So what has changed in all those years……. Well having decentralised everything and moved the processing power (and data) out to the end point we are now looking at ways to control the data and one of the options is to centralise the data and prevent it from ending up on the end point.We are achieving this by improving the way we deliver the data by implementing application acceleration systems , such as F5, Bluecoat, Netscaler etc. or as we used to call them “Front End Processors” and accessing the application and data through thin client. It is unlikely now that we will ever get away now from having data at the endpoint but as data connections and applications become faster it is becoming acceptable to keep critical and sensitive in one place and protect it from moving and we are becoming better at doing that.
  3. DataIn my experience of performing security reviews and audits, most customers face the same problems. We try to focus on the data element as that tends to unearth all of the other areas. Our approach is to sit down with various representatives from the business and discuss what types of data they use , how often, where they think it is stored , the sensitivity of it now, next week and in the future. During this phase we also try and establish if there are any governing bodies or security frameworks that the customer has to adhere to.ApplicationsAn easily overlooked area but can be just as critical as the data if this is under valued. Our interests are in the availability, management and development of the applications.PhysicalOur main interests are around DR but quite often we find inadequate physical security, which, when companies have spent a lot of time and effort on securing the logical perimeter is disappointing to find the fire door wedged open.ConnectivityFalls under the availability , as we extend our usage of different devices we introduce additional risks associated with these devices and the methods they use to connect. The introduction of cloud services and storage brings greater flexibility and some additional compliance concerns (saviour or sinner?)
  4. The threat landscape is continually changing, as we make positive steps and improvements other new risk and attack scenarios are developed. As it says here it is a moving target and our job is to prevent as much bad stuff as possible given both the budget and time constraints all companies face.We must work in partnership to sensibly assess the risks faced and prioritise our approach. It is perfectly acceptable to accept some risk but only after we have assessed the impact and likelihood of it occuring.
  5. A solid security framework will ensure that you cover all of the obvious points. I’m not particularly interested in HVAC but unless I include it in my assessment I could be missing something that potentially could cause a problem in the future.If you don’t have an industry specific security framework, you aren’t a merchant, on the US Stock market , manufacture drugs or handle sensitive personal data then make up your own security framework to follow. Take something like ISO 27001 and edit it down to suit your needs and ability…….. Or call us in and we will help you.
  6. I apologies for the next bit about egg sucking but it is important if you aren’t doing it already.As already mentioned in lieu of an industry specific Security Framework , set up your own but make sure it includes a structured risk assessment that covers all the areas logical, physical, people etc.This is a manual process and will involve you talking to all aspects of the business to get their views on what is important to them, how long they could live without it and also what they do to reduce their own risk. Once you have done that it would be worth getting an independent assessment of your perimeter, most of us aren’t well versed on abusing security vulnerabilities so call in an expert to assess and help you find some weak points.If you don’t practise security monitoring or have a SIEM solution deployed , investigate push that as a service to the cloud. In most cases this has limited sensitivity and rarely needs keeping after a year so it is one of the few areas that does lend itself to “Cloud” solutionLikewise, threat analysis, we are seeing more and more vendors producing very good threat analysis packages and coupled with systems that have visibilty of your own landscape can give you early warning signals on new threats.
  7. So in summaryDo the risk assessment – get somebody in to help start this process, you sometimes don’t see your own risks until somebody asks the right (or wrong) questionPrioritise the gaps – you will already be ahead of the game by knowing what the gaps are. Allocate as many of the tasks to existing personnel you think they have the capability to remediate the gap but check with them, I’ve seen OS and Application patch management come up so many times as a gap and it’s still a gap a year late when I re-check and this isn’t because IT are lazy and don’t want to do it, it’s because they don’t always have the right tools.If you do nothing else – deploy a SIEM before you buy the next fancy trojan bad boy hacking detection and prevention widgetExternal and Internal scanning will at least give you visibility and the urge to patch the most critical systemsA bit like the Plan , Do, Check, Act – schedule regular tests of all your systems and continually perform them.