Hello! MEET YOUR PRESENTERS Erin Farrelly Tracy Kingsley - - PowerPoint PPT Presentation

hello
SMART_READER_LITE
LIVE PREVIEW

Hello! MEET YOUR PRESENTERS Erin Farrelly Tracy Kingsley - - PowerPoint PPT Presentation

Hello! MEET YOUR PRESENTERS Erin Farrelly Tracy Kingsley Supervisor, Tier Two Support Manager, IT Services 2 Todays Session WHAT WELL COVER ITIL - People, Process, Technology 1 First Line of Defense 2 What is Incident Management?


slide-1
SLIDE 1
slide-2
SLIDE 2

Erin Farrelly Tracy Kingsley

Hello!

MEET YOUR PRESENTERS

Supervisor, Tier Two Support Manager, IT Services

2

slide-3
SLIDE 3

Today’s Session

WHAT WE’LL COVER

ITIL - People, Process, Technology

1

First Line of Defense

2

What is Incident Management?

3

Cyber Attacks

4

3

slide-4
SLIDE 4

ITIL – People, Technology and Process

ITIL is a set of detailed practices for IT service management (ITSM) M) that focuses on aligning IT services with the needs of business.

4

slide-5
SLIDE 5

Traditional IT vs ITSM Process

Trad aditional tional I/T becomes mes ITSM Process ss Technology focus

Process focus "Fire-fighting"

Preventative Reactive

Proactive Users

Customers Centralized, done in-house

Distributed, sourced Isolated, silos

Integrated, enterprise-wide "One off", adhoc

Repeatable, accountable Informal processes

Formal best practices IT internal perspective

Business perspective Operational specific

Service orientation

5

slide-6
SLIDE 6

Tiered Support

Tier 1

Applicant Support

Tier 2

Partner Support and Tier 1 Escalation

Tier 3

Escalation

6

slide-7
SLIDE 7

First Line of Defense

7

slide-8
SLIDE 8

AppDynamics

8

slide-9
SLIDE 9

Ghost Inspector Alert

9

slide-10
SLIDE 10

10

slide-11
SLIDE 11

Pagerduty

Digital Operations Management Platform

  • Gain full-stack visibility into service health
  • Automate on-call management

How?

  • By centralizing and triggering advanced workflows for

data from any source, the platform arms OCAS teams with insights to orchestrate the ideal real-time, business-wide response every time.

11

slide-12
SLIDE 12

12

slide-13
SLIDE 13

Incident Management Process

1 Reported

  • Create ticket
  • Triage and prioritize

incident

Analyzed

  • Analyze ticket
  • Find Solution

Resolved

  • Implement solution
  • Close incident

2 3

13

slide-14
SLIDE 14

Discover Investigate Scope Communicate

Remember to D.I.S.C.O.!

Report and log incident. Assess incident using ITIL criteria. Confirm existence

  • f issue.

Determine

  • impact. (What?

Who? How many?) Alert internal stakeholders of Sev 1 incident.

Organize

Assume Response Lead role. Assemble response team and set up War Room.

14

slide-15
SLIDE 15

15

slide-16
SLIDE 16

What do we Already do?

  • Intrusion detection and monitoring at our hosting facility and our network.
  • Spam filter on our email servers and MS ATP (Advance Threat Protection) which is a feature

in O365.

  • Require staff to have complex passwords that have letters, numbers and symbols so they

are harder for cyber criminals to steal. Also require changes to passwords every 90 days.

  • Anti-virus, malware programs are installed on all PC.
  • Keep up-to-date on software patches for OS as well as business software.
  • Block access to websites flagged as malicious.
  • Block emails flagged as malicious.
  • Two-part authentication from external sources – VPN clients when working from home.

16

slide-17
SLIDE 17

Real Mail vs. Spam

17

slide-18
SLIDE 18

What can you do?

  • Keeping a clean machine—checking with your IT Services team to know what is allowed to

be installed on your work devices and what you are plugging into your USB ports.

  • Avoiding suspicious links— avoid sketchy downloads. If a link looks odd, even if it comes

from a familiar source, DO not to click on it.

  • Using strong passwords—Stolen credentials are a common way for criminals to gain access

to your network. Don’t use the same password for work and personal accounts.

  • Saving important information on the network — so that it can be backed up and restored.

Don’t store the only copy of that important document on your local computer!

  • If you are working from home, do not allow your children or other family members to use

your work computer.

  • Don’t keep any sensitive materials on your local computer. i.e. credit card numbers,

employee information, reports containing applicant information, excel files which contain student information.

  • Don’t write passwords down on pieces of paper- EVER. Don’t share them with anyone.

18

slide-19
SLIDE 19

Phishing Trip

19

slide-20
SLIDE 20