SlideShare una empresa de Scribd logo
1 de 23
Information Security Considerations and Recommendations for IT Decision Makers and Business Unit General Managers Black Opp Systems John Reno [email_address] August  2009 August 2009 Black Opp Systems
Contents ,[object Object],[object Object],[object Object],[object Object],[object Object],August 2009 Black Opp Systems Risk Management Policy Management Business Continuity Application Security Compliance Internal Auditing Identity and Access Mgmt Encryption/Key Management Data Loss Prevention Network Monitoring SEIM Endpoint enforcement
Summary ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],August 2009 Black Opp Systems
Market Environment – General Observations ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],August 2009 Black Opp Systems
Market Environment –Information security system best practices Business Requirements Life Cycle Review Business Drivers Policy Risks  Requirements Definition Strategy Risk model Data map Control map Control Implement Manage Audit Business Enablement August 2009 Black Opp Systems
Market Environment – Information security system  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],August 2009 Black Opp Systems
Market Environment – Representative issues August 2009 Black Opp Systems Supplier Customer Shopping Purchasing Using and Maintaining Marketing Selling Shipping  Service and Support Design Development Payables Receivables Receiving Collaborative Commerce Intellectual Property Search, Discovery, Offering Reputation Trusted Transactions Integrity Electronic Funds Transfer Value Logistics/Supply Chain Management Theft Customer Relationship Management Privacy
Market Environment – Information security system ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],August 2009 Black Opp Systems
Market Environment – Threat evolution August 2009 Black Opp Systems Examples: Trends: => Attackers focus on the network layer => Proliferation of worms => Dissolving network perimeter => Attackers focus on the application layer => Attackers shift to client side attacks
Market Environment – Threat Economy August 2009 Black Opp Systems Writers Middle Men Second Stage Abusers Bot-Net Management: For Rent, for Lease, for Sale Bot-Net Creation Personal Information Electronic IP Leakage Worms Spyware Tool and Toolkit Writers Viruses Trojans Malware Writers First Stage Abusers Machine Harvesting Information Harvesting Hacker/Direct Attack Internal Theft: Abuse of Privilege Information Brokerage Spammer Phisher Extortionist/ DDoS-for-Hire Pharmer/DNS Poisoning Identity Theft Compromised Host and Application End Value Financial Fraud Commercial Sales Fraudulent Sales Advertising Revenue Espionage  (Corporate/ Government) Fame Extorted Pay-Offs Theft
Market Environment – Compliance Structure August 2009 Black Opp Systems FISMA HIPAA SOX GLB INTEL COMSEC  DoD ISO PCI SP 800-53 DCID NSA Req DoD  IA Controls 17799/ 27001 DSS Guide SP 800-68 DISA STIGS NSA  Guides Risk Management , Policy, Controls and Configuration Guidance
Market Environment – Information security system  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],August 2009 Black Opp Systems
Market Environment -The customer security system: product and service categories August 2009 Black Opp Systems Security Products Risk management Policy management Business continuity Application security Data security Encryption Endpoint and network enforcement SEIM/monitoring Security services Risk management Policy development Assessment Compliance Audit Architecture Implementation
Market Environment – Representative Security Framework (NIST) August 2009 Black Opp Systems Security Life Cycle SP 800-39 Determine security control effectiveness (i.e., controls implemented correctly, operating as intended, meeting security requirements for information system). SP 800-53A ASSESS Security Controls Define criticality/sensitivity of information system according to potential worst-case, adverse impact to mission/business. FIPS 199 / SP 800-60 CATEGORIZE Information System Continuously track changes to the information system that may affect security controls and reassess control effectiveness. SP 800-37 / SP 800-53A MONITOR Security State SP 800-37 AUTHORIZE Information System Determine risk to organizational operations and assets, individuals, other organizations, and the Nation; if acceptable, authorize operation. Implement security controls within enterprise architecture using sound systems engineering practices; apply security configuration settings. IMPLEMENT Security Controls SP 800-70 FIPS 200 / SP 800-53 SELECT  Security Controls Select baseline security controls; apply tailoring guidance and supplement controls as needed based on risk assessment. ASSESS Security Controls CATEGORIZE Information System MONITOR Security State AUTHORIZE Information System IMPLEMENT Security Controls
Market Environment – Security and Compliance Best Practices ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],August 2009 Black Opp Systems
Making Decisions ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],August 2009 Black Opp Systems
Making Decisions ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],August 2009 Black Opp Systems
Making Decisions ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],August 2009 Black Opp Systems
Making Decisions ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],August 2009 Black Opp Systems
Making Decisions ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],August 2009 Black Opp Systems
Information Security Technology Review ,[object Object],August 2009 Black Opp Systems Risk Management Policy Management Business Continuity Application Security Compliance Internal Auditing Identity and Access Management Encryption/Key Management Data Loss Prevention Network Monitoring SEIM Endpoint Enforcement
Information Security Technology Review ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],August 2009 Black Opp Systems
Resources ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],August 2009 Black Opp Systems

Más contenido relacionado

La actualidad más candente

The Significance of IT Security Management & Risk Assessment
The Significance of IT Security Management & Risk AssessmentThe Significance of IT Security Management & Risk Assessment
The Significance of IT Security Management & Risk AssessmentBradley Susser
 
Security Policies and Standards
Security Policies and StandardsSecurity Policies and Standards
Security Policies and Standardsprimeteacher32
 
Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...
Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...
Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...Craig Martin
 
Information security governance
Information security governanceInformation security governance
Information security governanceKoen Maris
 
Implementing IT Security Controls
Implementing IT Security ControlsImplementing IT Security Controls
Implementing IT Security ControlsThomas Jones
 
Cmgt 582 Effective Communication / snaptutorial.com
Cmgt 582  Effective Communication / snaptutorial.comCmgt 582  Effective Communication / snaptutorial.com
Cmgt 582 Effective Communication / snaptutorial.comHarrisGeorg12
 
PTX12_Presentation_George Delikouras AIA
PTX12_Presentation_George Delikouras AIAPTX12_Presentation_George Delikouras AIA
PTX12_Presentation_George Delikouras AIAGeorge Delikouras
 
Its time to rethink everything a governance risk compliance primer
Its time to rethink everything a governance risk compliance primerIts time to rethink everything a governance risk compliance primer
Its time to rethink everything a governance risk compliance primerEnclaveSecurity
 
Practical approach to security risk management
Practical approach to security risk managementPractical approach to security risk management
Practical approach to security risk managementG3 intelligence Ltd
 
Information technology risks
Information technology risksInformation technology risks
Information technology riskssalman butt
 
It security-plan-template
It security-plan-templateIt security-plan-template
It security-plan-templatejbmills1634
 
How to set up your security policy
How to set up your security policyHow to set up your security policy
How to set up your security policyTim Wulgaert
 
Taylor&Francis_White_Paper_Satyanandan atyam
Taylor&Francis_White_Paper_Satyanandan atyamTaylor&Francis_White_Paper_Satyanandan atyam
Taylor&Francis_White_Paper_Satyanandan atyamSatyanandan Atyam
 
Infocon Bangladesh 2016
Infocon Bangladesh 2016Infocon Bangladesh 2016
Infocon Bangladesh 2016Prime Infoserv
 
Building an effective Information Security Roadmap
Building an effective Information Security RoadmapBuilding an effective Information Security Roadmap
Building an effective Information Security RoadmapElliott Franklin
 
Tripwire IP360 Vulnerability Management
Tripwire IP360 Vulnerability ManagementTripwire IP360 Vulnerability Management
Tripwire IP360 Vulnerability ManagementTripwire
 

La actualidad más candente (20)

The Significance of IT Security Management & Risk Assessment
The Significance of IT Security Management & Risk AssessmentThe Significance of IT Security Management & Risk Assessment
The Significance of IT Security Management & Risk Assessment
 
Security Policies and Standards
Security Policies and StandardsSecurity Policies and Standards
Security Policies and Standards
 
Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...
Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...
Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...
 
Information security governance
Information security governanceInformation security governance
Information security governance
 
Topic 6 -it_security
Topic 6 -it_securityTopic 6 -it_security
Topic 6 -it_security
 
Implementing IT Security Controls
Implementing IT Security ControlsImplementing IT Security Controls
Implementing IT Security Controls
 
Cmgt 582 Effective Communication / snaptutorial.com
Cmgt 582  Effective Communication / snaptutorial.comCmgt 582  Effective Communication / snaptutorial.com
Cmgt 582 Effective Communication / snaptutorial.com
 
PTX12_Presentation_George Delikouras AIA
PTX12_Presentation_George Delikouras AIAPTX12_Presentation_George Delikouras AIA
PTX12_Presentation_George Delikouras AIA
 
Its time to rethink everything a governance risk compliance primer
Its time to rethink everything a governance risk compliance primerIts time to rethink everything a governance risk compliance primer
Its time to rethink everything a governance risk compliance primer
 
Practical approach to security risk management
Practical approach to security risk managementPractical approach to security risk management
Practical approach to security risk management
 
Information technology risks
Information technology risksInformation technology risks
Information technology risks
 
Lesson 3- Fair Approach
Lesson 3- Fair ApproachLesson 3- Fair Approach
Lesson 3- Fair Approach
 
It security-plan-template
It security-plan-templateIt security-plan-template
It security-plan-template
 
How to set up your security policy
How to set up your security policyHow to set up your security policy
How to set up your security policy
 
Hands on IT risk assessment
Hands on IT risk assessmentHands on IT risk assessment
Hands on IT risk assessment
 
Systems Analysis
Systems AnalysisSystems Analysis
Systems Analysis
 
Taylor&Francis_White_Paper_Satyanandan atyam
Taylor&Francis_White_Paper_Satyanandan atyamTaylor&Francis_White_Paper_Satyanandan atyam
Taylor&Francis_White_Paper_Satyanandan atyam
 
Infocon Bangladesh 2016
Infocon Bangladesh 2016Infocon Bangladesh 2016
Infocon Bangladesh 2016
 
Building an effective Information Security Roadmap
Building an effective Information Security RoadmapBuilding an effective Information Security Roadmap
Building an effective Information Security Roadmap
 
Tripwire IP360 Vulnerability Management
Tripwire IP360 Vulnerability ManagementTripwire IP360 Vulnerability Management
Tripwire IP360 Vulnerability Management
 

Similar a Information Security Gm Aug09

Cyber crime with privention
Cyber crime with privention Cyber crime with privention
Cyber crime with privention Manish Dixit Ceh
 
Sudarsan Jayaraman - Open information security management maturity model
Sudarsan Jayaraman  - Open information security management maturity modelSudarsan Jayaraman  - Open information security management maturity model
Sudarsan Jayaraman - Open information security management maturity modelnooralmousa
 
Security Information Management: An introduction
Security Information Management: An introductionSecurity Information Management: An introduction
Security Information Management: An introductionSeccuris Inc.
 
SOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterSOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterMichael Nickle
 
Outsourcing Security Management
Outsourcing Security ManagementOutsourcing Security Management
Outsourcing Security ManagementNick Krym
 
From reactive to automated reducing costs through mature security processes i...
From reactive to automated reducing costs through mature security processes i...From reactive to automated reducing costs through mature security processes i...
From reactive to automated reducing costs through mature security processes i...NetIQ
 
Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013 SIEM based …
Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013   SIEM based …Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013   SIEM based …
Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013 SIEM based …Andris Soroka
 
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...IBM Security
 
II Security At Microsoft
II Security At MicrosoftII Security At Microsoft
II Security At MicrosoftMark J. Feldman
 
Maloney Slides
Maloney SlidesMaloney Slides
Maloney Slidesecommerce
 
MISTI Infosec 2010- SIEM Implementation
MISTI Infosec 2010- SIEM ImplementationMISTI Infosec 2010- SIEM Implementation
MISTI Infosec 2010- SIEM ImplementationMichael Nickle
 
Convergence innovative integration of security
Convergence   innovative integration of securityConvergence   innovative integration of security
Convergence innovative integration of securityciso_insights
 
S nandakumar
S nandakumarS nandakumar
S nandakumarIPPAI
 
S nandakumar_banglore
S nandakumar_bangloreS nandakumar_banglore
S nandakumar_bangloreIPPAI
 
Don't risk it presentation
Don't risk it presentationDon't risk it presentation
Don't risk it presentationVincent Kwon
 
AMI Security 101 - Smart Grid Security East 2011
AMI Security 101 - Smart Grid Security East 2011AMI Security 101 - Smart Grid Security East 2011
AMI Security 101 - Smart Grid Security East 2011dma1965
 
Developing an Information Security Program
Developing an Information Security ProgramDeveloping an Information Security Program
Developing an Information Security ProgramShauna_Cox
 

Similar a Information Security Gm Aug09 (20)

Cyber crime with privention
Cyber crime with privention Cyber crime with privention
Cyber crime with privention
 
Sudarsan Jayaraman - Open information security management maturity model
Sudarsan Jayaraman  - Open information security management maturity modelSudarsan Jayaraman  - Open information security management maturity model
Sudarsan Jayaraman - Open information security management maturity model
 
Security Information Management: An introduction
Security Information Management: An introductionSecurity Information Management: An introduction
Security Information Management: An introduction
 
SOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterSOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations Center
 
Outsourcing Security Management
Outsourcing Security ManagementOutsourcing Security Management
Outsourcing Security Management
 
From reactive to automated reducing costs through mature security processes i...
From reactive to automated reducing costs through mature security processes i...From reactive to automated reducing costs through mature security processes i...
From reactive to automated reducing costs through mature security processes i...
 
Arvind Mehrotra
Arvind MehrotraArvind Mehrotra
Arvind Mehrotra
 
Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013 SIEM based …
Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013   SIEM based …Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013   SIEM based …
Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013 SIEM based …
 
Core.co.enterprise.deck.06.16.10
Core.co.enterprise.deck.06.16.10Core.co.enterprise.deck.06.16.10
Core.co.enterprise.deck.06.16.10
 
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
 
II Security At Microsoft
II Security At MicrosoftII Security At Microsoft
II Security At Microsoft
 
Maloney Slides
Maloney SlidesMaloney Slides
Maloney Slides
 
MISTI Infosec 2010- SIEM Implementation
MISTI Infosec 2010- SIEM ImplementationMISTI Infosec 2010- SIEM Implementation
MISTI Infosec 2010- SIEM Implementation
 
Convergence innovative integration of security
Convergence   innovative integration of securityConvergence   innovative integration of security
Convergence innovative integration of security
 
S nandakumar
S nandakumarS nandakumar
S nandakumar
 
S nandakumar_banglore
S nandakumar_bangloreS nandakumar_banglore
S nandakumar_banglore
 
Don't risk it presentation
Don't risk it presentationDon't risk it presentation
Don't risk it presentation
 
AMI Security 101 - Smart Grid Security East 2011
AMI Security 101 - Smart Grid Security East 2011AMI Security 101 - Smart Grid Security East 2011
AMI Security 101 - Smart Grid Security East 2011
 
Developing an Information Security Program
Developing an Information Security ProgramDeveloping an Information Security Program
Developing an Information Security Program
 
It Audit And Forensics
It Audit And ForensicsIt Audit And Forensics
It Audit And Forensics
 

Information Security Gm Aug09

  • 1. Information Security Considerations and Recommendations for IT Decision Makers and Business Unit General Managers Black Opp Systems John Reno [email_address] August 2009 August 2009 Black Opp Systems
  • 2.
  • 3.
  • 4.
  • 5. Market Environment –Information security system best practices Business Requirements Life Cycle Review Business Drivers Policy Risks Requirements Definition Strategy Risk model Data map Control map Control Implement Manage Audit Business Enablement August 2009 Black Opp Systems
  • 6.
  • 7. Market Environment – Representative issues August 2009 Black Opp Systems Supplier Customer Shopping Purchasing Using and Maintaining Marketing Selling Shipping Service and Support Design Development Payables Receivables Receiving Collaborative Commerce Intellectual Property Search, Discovery, Offering Reputation Trusted Transactions Integrity Electronic Funds Transfer Value Logistics/Supply Chain Management Theft Customer Relationship Management Privacy
  • 8.
  • 9. Market Environment – Threat evolution August 2009 Black Opp Systems Examples: Trends: => Attackers focus on the network layer => Proliferation of worms => Dissolving network perimeter => Attackers focus on the application layer => Attackers shift to client side attacks
  • 10. Market Environment – Threat Economy August 2009 Black Opp Systems Writers Middle Men Second Stage Abusers Bot-Net Management: For Rent, for Lease, for Sale Bot-Net Creation Personal Information Electronic IP Leakage Worms Spyware Tool and Toolkit Writers Viruses Trojans Malware Writers First Stage Abusers Machine Harvesting Information Harvesting Hacker/Direct Attack Internal Theft: Abuse of Privilege Information Brokerage Spammer Phisher Extortionist/ DDoS-for-Hire Pharmer/DNS Poisoning Identity Theft Compromised Host and Application End Value Financial Fraud Commercial Sales Fraudulent Sales Advertising Revenue Espionage (Corporate/ Government) Fame Extorted Pay-Offs Theft
  • 11. Market Environment – Compliance Structure August 2009 Black Opp Systems FISMA HIPAA SOX GLB INTEL COMSEC DoD ISO PCI SP 800-53 DCID NSA Req DoD IA Controls 17799/ 27001 DSS Guide SP 800-68 DISA STIGS NSA Guides Risk Management , Policy, Controls and Configuration Guidance
  • 12.
  • 13. Market Environment -The customer security system: product and service categories August 2009 Black Opp Systems Security Products Risk management Policy management Business continuity Application security Data security Encryption Endpoint and network enforcement SEIM/monitoring Security services Risk management Policy development Assessment Compliance Audit Architecture Implementation
  • 14. Market Environment – Representative Security Framework (NIST) August 2009 Black Opp Systems Security Life Cycle SP 800-39 Determine security control effectiveness (i.e., controls implemented correctly, operating as intended, meeting security requirements for information system). SP 800-53A ASSESS Security Controls Define criticality/sensitivity of information system according to potential worst-case, adverse impact to mission/business. FIPS 199 / SP 800-60 CATEGORIZE Information System Continuously track changes to the information system that may affect security controls and reassess control effectiveness. SP 800-37 / SP 800-53A MONITOR Security State SP 800-37 AUTHORIZE Information System Determine risk to organizational operations and assets, individuals, other organizations, and the Nation; if acceptable, authorize operation. Implement security controls within enterprise architecture using sound systems engineering practices; apply security configuration settings. IMPLEMENT Security Controls SP 800-70 FIPS 200 / SP 800-53 SELECT Security Controls Select baseline security controls; apply tailoring guidance and supplement controls as needed based on risk assessment. ASSESS Security Controls CATEGORIZE Information System MONITOR Security State AUTHORIZE Information System IMPLEMENT Security Controls
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.

Notas del editor

  1. Title Month Year
  2. Title Month Year