SIGS AFTERWORK EVENT. Security: which operational model for which scenario. Hotel Warwick - Geneva

Similar documents
Advanced Security Tester Course Outline

Google Cloud & the General Data Protection Regulation (GDPR)

A practical guide to IT security

FFIEC Cyber Security Assessment Tool. Overview and Key Considerations

locuz.com SOC Services

Security by Default: Enabling Transformation Through Cyber Resilience

RFP/RFI Questions for Managed Security Services. Sample MSSP RFP Template

ISO COMPLIANCE GUIDE. How Rapid7 Can Help You Achieve Compliance with ISO 27002

Mark Littlejohn June 23, 2016 DON T GO IT ALONE. Achieving Cyber Security using Managed Services

ADIENT VENDOR SECURITY STANDARD

SDLC Maturity Models

RFC2350 TLP1: WHITE. Έκδοση National CSIRT-CY RFC2350

HCL GRC IT AUDIT & ASSURANCE SERVICES

REAL-WORLD STRATEGIES FOR MEDICAL DEVICE SECURITY

What It Takes to be a CISO in 2017

deep (i) the most advanced solution for managed security services

Challenges 3. HAWK Introduction 4. Key Benefits 6. About Gavin Technologies 7. Our Security Practice 8. Security Services Approach 9

FIJIAN ELECTIONS OFFICE SYSTEM CONSULTANCY AUDIT. Expression of Interest (EOI) (04/2017)

Cybersecurity Roadmap: Global Healthcare Security Architecture

Security Automation & Orchestration That Won t Get You Fired. Syra Arif Advisory Security Solutions Architect November 2017

Introduction. Deployment Models. IBM Watson on the IBM Cloud Security Overview

Manchester Metropolitan University Information Security Strategy

Performing a Vendor Security Review TCTC 2017 FALL EVENT PRESENTER: KATIE MCINTOSH

Cybersecurity Auditing in an Unsecure World

GDPR Processor Security Controls. GDPR Toolkit Version 1 Datagator Ltd

Cyber Security and Data Protection: Huge Penalties, Nowhere to Hide

Security Terminology Related to a SOC

Click to edit Master title style. DIY vs. Managed SIEM

Protecting your data. EY s approach to data privacy and information security

ISO27001 Preparing your business with Snare

Nine Steps to Smart Security for Small Businesses

SECURITY INCIDENT MANAGEMENT. Solution Primer. Jenn Black. Senior Research AnalystSolutions Research and Development Office of the CISO, Optiv

Delivering Integrated Cyber Defense for the Cloud Generation Darren Thomson

Cyber Security in the time of Austerity. Shannon Simpson, CCO CNS Group

Policy Document. PomSec-AllSitesBinder\Policy Docs, CompanyWide\Policy

Cyber Security. February 13, 2018 (webinar) February 15, 2018 (in-person)

Securing the cloud ISACA Korea. Han Ther, Lee CISA, CISM, CISSP, CRISC, ITILF, MCSA

Security Operations & Analytics Services

falanx Cyber ISO 27001: How and why your organisation should get certified

TOP 10 IT SECURITY ACTIONS TO PROTECT INTERNET-CONNECTED NETWORKS AND INFORMATION

Security Metrics Framework

Technical Security Standard

Cybersecurity The Evolving Landscape

Next Generation Threats and Utilising Artificial Intelligence and Big Data Analytics. Ian Glover

SECURITY SERVICES SECURITY

Embracing a Secure Cloud. Cloud & Network Virtualisation India 2017

CompTIA Project+ (2009 Edition) Certification Examination Objectives

PCI DSS Addressing Cyber-Security Threats. ETCAA June Gabriel Leperlier

AUTHORITY FOR ELECTRICITY REGULATION

Juniper Vendor Security Requirements

Cloud Computing Lectures. Cloud Security

Security. Protect your business from security threats with Pearl Technology. The Connection That Matters Most

Bringing cyber to the Board of Directors & C-level and keeping it there. Dirk Lybaert, Proximus September 9 th 2016

NOTICE TO ALL PROSPECTIVE RESPONDENTS RFP 18-ITSS/CY. Addendum No. 1 issued September 7, RFI responses are in red bold print

Watson Developer Cloud Security Overview

Incident Response Lessons From the Front Lines. Session 276, March 8, 2018 Nolan Garrett, CISO, Children s Hospital Los Angeles

Information Security Controls Policy

Incident Response. Tony Drewitt Head of Consultancy IT Governance Ltd

PCI Policy Compliance Using Information Security Policies Made Easy. PCI Policy Compliance Information Shield Page 1

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO

Department of Defense Cybersecurity Requirements: What Businesses Need to Know?

Cyber Criminal Methods & Prevention Techniques. By

IT Governance ISO/IEC 27001:2013 ISMS Implementation. Service description. Protect Comply Thrive

Continuous protection to reduce risk and maintain production availability

Certified Information Systems Auditor (CISA)

Recommendations for Implementing an Information Security Framework for Life Science Organizations

CCISO Blueprint v1. EC-Council

UK Permanent Salary Index November 2013 Based on registered vacancies and actual placements

A1 Information Security Supplier / Provider Requirements

"Charting the Course... Certified Information Systems Auditor (CISA) Course Summary

White Paper. How to Write an MSSP RFP

ISO/IEC Solution Brief ISO/IEC EventTracker 8815 Centre Park Drive, Columbia MD 21045

INFORMATION SECURITY. One line heading. > One line subheading. A briefing on the information security controls at Computershare

Controlled Document Page 1 of 6. Effective Date: 6/19/13. Approved by: CAB/F. Approved on: 6/19/13. Version Supersedes:

DEFINITIONS AND REFERENCES

General Data Protection Regulation

Protecting Against Online Fraud. F5 EMEA Webinar August 2014

Cloud Security Strategy - Adapt to Changes with Security Automation -

Establishing a Framework for Effective Testing and Validation of Critical Infrastructure Cyber-Security

Digital Forensics Readiness PREPARE BEFORE AN INCIDENT HAPPENS

CyberEdge. End-to-End Cyber Risk Management Solutions

How to Prepare a Response to Cyber Attack for a Multinational Company.

Cybersecurity What Companies are Doing & How to Evaluate. Miguel Romero - NAIC David Gunkel & Dan Ford Rook Security

Bradford J. Willke. 19 September 2007

Department of Management Services REQUEST FOR INFORMATION

Stakeholders Analysis

Cybersecurity Today Avoid Becoming a News Headline

Data Management and Security in the GDPR Era

DHG presenter. August 17, Addressing the Evolving Cybersecurity Landscape. DHG Birmingham CPE Seminar 1

What every IT professional needs to know about penetration tests

External Supplier Control Obligations. Cyber Security

LTI Security Services. Intelligent & integrated Approach to Cyber & Digital Security

Security+ SY0-501 Study Guide Table of Contents

Solution Pack. Managed Services Virtual Private Cloud Security Features Selections and Prerequisites

Level 2 Cambridge Technical in IT

CSIRT in general CSIRT Service Categories Reactive Services Proactive services Security Quality Management Services CSIRT. Brmlab, hackerspace Prague

Too Little Too Late: Top Reasons Why You Got Hacked

Data Protection. Practical Strategies for Getting it Right. Jamie Ross Data Security Day June 8, 2016

Position Title: IT Security Specialist

existing customer base (commercial and guidance and directives and all Federal regulations as federal)

Transcription:

SIGS AFTERWORK EVENT Security: which operational model for which scenario Hotel Warwick - Geneva

Johny Gasser Information Security & Compliance Officer (for a global customer) Orange Business Services Thierry Clavel Corporate Security & Lawful Interception Manager Salt Mobile SA

AGENDA Focus on the outsourcing of Security and not IT Devices management Governance Control Assurance Security Incident Response Intelligence Summary Scenarios Advices Real life feedback

DEVICES MANAGEMENT What Firewalls Anti-malwares gateways IPS Proxies Encryption IAM Advanced Threats Protection CASB Why and when Resources shortage Lack of competencies Costs saving Consolidation / Centralization Security incident How Rules & configurations management HW/SW monitoring & maintenance Lifecycle management Licenses management DDoS management XaaS

DEVICES MANAGEMENT Advices & Real Life Feedback RACI for EVERY activity Detail activities You validate the changes & controls Vulnerabilities management HW / SW supported by vendor (release management) Who pays what? You shall have the right to oppose a veto to a technology selection

GOVERNANCE What Establishing policies Security Awareness RFP, providers selection Products selection Body renting Why and when Resources shortage Lack of competencies Merge, acquisition Security incident How Security Expert / Officer as a service Consulting mandates

GOVERNANCE Advices & Real Life Feedback Define required competences You shall have the right to replace un-adapted resource Trust the person, not the company Policies / awareness have to be tailored Detail content of deliverables

CONTROL ASSURANCE What Pen Tests Vulnerabilities Assessment Audits Code review Why and when Lack of competencies Resources shortage Independence Security incident CYA policy How Perform pen testing Run vulnerability scans Carry out audits Execute code review

CONTROL ASSURANCE Advices & Real Life Feedback Define deliverables (quality, granularity, format, language, etc.) Ask for example of reports and verify pen testers reputation Describe boundaries No black box - Do your home work! No actions are taken without your formal approval Validates actions prior execution (clear communication)

INCIDENT RESPONSE What Why and when Incident support & assistance Onsite assistance to manage incident Crisis management (including communications, etc..) Forensics evidences collection Security incident Lack of competencies Resources shortage How Security Expert / Officer as a service (on / off site) On demand services (i.e. Forensics investigation)

INCIDENT RESPONSE Advices Real Life & Feedback Real Life Feedback Advices Clear definitions and thresholds (security incident, crisis, etc..) Outline required competencies 24x7x365, on both side Define SLAs with penalties <IMAGE THERE> Define locations & availabilities Define rate card for outsourced services

INTELLIGENCE What Early sign of attacks Targeted Phishing attacks (against your organisation or your Customers) Why and when Security incident Lack of competencies Data leak detection (confidential documents available on the web/darkweb) Resources shortage Hack detection Detection of compromised devices from external sources Potential target (vertical sectors, R&D, etc.) How CyberSOC Specialized Security Analysts SIEM <IMAGE THERE>

INTELLIGENCE Advices & Real Life Feedback FIRST, define you needs and stay focused Verify available scenarios defined by services providers Always perform a proof of concept Ensure real time (24x7x365) On call Experts <IMAGE THERE>

CONSIDERING OUTSOURCING Remember that partnership exists in Dreamland Services Providers are responsible, YOU remain accountable Define / identify clear objectives (why do we want to outsource security?) Do not blindly follow best practices You need to be mature and outsource what is working Never ever outsource the RFP and contract creation & negotiation Remember: you can stop RFP at any time if objectives are not met <IMAGE THERE>

BEFORE CONTRACT SIGNATURE If objectives cannot be met, you can always stop negotiations Define details now, after it will be at bigger costs (grey zones show dark side of people) Systems lifecycle, services enhancement and innovation have to be well detailed (costs / trigger / responsibilities, etc.) Vocabulary (i.e. security incident) SLAs without penalties are SLOs Service Level Objectives BMW KPI (Business oriented, Measured and Well defined) <IMAGE THERE> Ask for available options, you will understand what is NOT included Add a few consulting days for the unexpected Define deliverables (periodicity, samples, content (incl. raw data) Audit right, external reports (i.e. ISAE 3402, SSAE16, ISO 27k, etc.) Early termination & exit procedures

CONTRACT EXECUTION Be strict from the beginning (but fair) Trust, but verify - Periodic controls (including sub contractors) <IMAGE THERE> Verify periodically that deliverable are properly distributed and understood by stakeholders Adapt deliverables over time

TAKE AWAY You don t need someone to tell you what you need Cheap is always expensive (Service Providers need to earn money) Details / Transparency / Controls