information security
play

INFORMATION SECURITY A DAY IN THE LIFE WHO AM I? Security officer - PowerPoint PPT Presentation

INFORMATION SECURITY A DAY IN THE LIFE WHO AM I? Security officer for MIE CISSP , CISA, CGEIT, CRISC, CRMA, PMP , FLMI and studying for CISM RMR and JA Interactive session share stories THREAT SOURCES Nation States


  1. INFORMATION SECURITY A DAY IN THE LIFE

  2. WHO AM I? • Security officer for MIE • CISSP , CISA, CGEIT, CRISC, CRMA, PMP , FLMI and studying for CISM • RMR and JA • Interactive session – share stories

  3. THREAT SOURCES • Nation States https://ics-cert.us-cert.gov/content/cyber-threat-source-descriptions • Terrorists https://hitrustalliance.net/threat-catalogue/ • Industrial Spies • Organized Crime • Hacktivists • Hackers • Business Competitors • Employees – accidental or deliberate

  4. IT STARTS WITH THE DATA

  5. BUSINESS ALIGNMENT Mission of the Business Strategic Business Objectives Information Security Mission: Develop, execute and maintain a proactive, company-wide security program based on strategic business objectives Vision: Incorporate a continuous security mindset into all aspects of our business functions

  6. INFOSEC OBJECTIVES Integrity Confidentiality Availability Security Privacy

  7. GOVERNANCE Board of Directors IT Audit Committee Policies Standards Procedures InfoSec Objectives Security Team Compliance Team

  8. OWNERSHIP Data Owner Asset Inventory Data Classification Governance InfoSec Objectives

  9. BUSINESS RESILIENCY BCP DRP IRP BIA Ownership Governance InfoSec Objectives

  10. ______ MANAGEMENT Risk Analysis and Management Patch Management Resiliency Vulnerability Management Ownership Vendor/Supply Chain Management Governance InfoSec Objectives https://www.google.com/alerts# https://www.nist.gov/ https://csrc.nist.gov/ https://csrc.nist.gov/publications/detail/sp/800-30/rev-1/final https://csrc.nist.gov/publications/detail/sp/800-40/rev-3/final https://csrc.nist.gov/publications/detail/sp/800-161/final

  11. TECHNICAL CONTROLS AV IDS/IPS Encryption ______ Management Logging and Monitoring Resiliency Ownership DLP Governance InfoSec Objectives

  12. Security Spending STORY TIME Dennis steals the dinosaur embryos • Cost of a laptop is $2,000 • Additional cost of losing the laptop is $8,000 • Asset Value (AV) = $10,000 • Exposure Factor (EF) = 100% • Single Lose Expectancy = $10,000 • On average, we “lose” 3 laptops per year (ARO) • Annual Loss Expectancy (ALE) is $30,000

  13. RETURN ON SECURITY INVESTMENT ALE before encryption control $30,000 Encryption cuts EF to 20% ALE after implementing control $6,000 + Yearly cost of control $20,000 Return on Security Investment $4,000

  14. 3 RD PARTY ASSESSMENTS External Pen Test Controls Internal Pen Test ______ Management Wireless Pen Test Resiliency Social Engineering Ownership Governance InfoSec Objectives

  15. ACCESS CONTROL 3 rd Party Assessments Logical Controls Physical ______ Management Remote Resiliency Ownership Governance InfoSec Objectives

  16. KERBEROS

  17. COMPLIANCE HIPAA / HITECH Access Control FISMA 3 rd Party Assessments FFIEC Controls GLBA ______ Management SOX Resiliency Ownership GDPR, CONSENT, CCPA, PIPEDA Governance Privacy Shield InfoSec Objectives

  18. CERTIFICATIONS SOC HITRUST CSF PCI – DSS FedRAMP Cloud Security Alliance

  19. SECURITY AWARENESS New hire training Compliance and Certifications Annual refresher training Access Control 3 rd Party Assessments Monthly newsletters Controls NCSAM – October ______ Management Periodic newsflashes Resiliency Ownership Governance InfoSec Objectives

  20. DATA RECOVERABILITY Online failover replica Real-time replica offsite Security Awareness Long-term offline backup Compliance and Certifications Access Control 3 rd Party Assessments Controls ______ Management Resiliency Ownership Governance InfoSec Objectives

  21. … STILL MORE Cyber Insurance Internal & External Audits Data Recoverability Regular exclusion checks: Security Awareness OIG LEIE and SAM Compliance and Certifications Access Control 3 rd Party Assessments Controls https://oig.hhs.gov/exclusions/index.asp ______ Management Resiliency https://www.sam.gov/SAM/ Ownership Governance InfoSec Objectives

  22. INFOSEC RECAP • Not one person or a team of people; the entire organization • Defense in depth • If you see something, say something • https://www.ftc.gov/tips-advice/business-center/small- businesses/cybersecurity

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend