CYBER SECURITY OPERATION CENTER

Similar documents
10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS

Security Awareness Training Courses

Security Monitoring Engineer / (NY or NC) Director, Information Security. New York, NY or Winston-Salem, NC. Location:

MEETING ISO STANDARDS

T-SURE VIGILANCE CYBER SECURITY OPERATIONS CENTRE

RSA INCIDENT RESPONSE SERVICES

Protecting Against Online Fraud. F5 EMEA Webinar August 2014

CHALLENGES GOVERNANCE INTEGRATION SECURITY

CYBER SOLUTIONS & THREAT INTELLIGENCE

THE EFFECTIVE APPROACH TO CYBER SECURITY VALIDATION BREACH & ATTACK SIMULATION

Cyber Security Technologies

Industry 4.0 = Security 4.0?

RSA INCIDENT RESPONSE SERVICES

National Cyber Security Operations Center (N-CSOC) Stakeholders' Conference

CA Security Management

Vulnerability Management. June Risk Advisory

Protect Your Organization from Cyber Attacks

Sage Data Security Services Directory

How Breaches Really Happen

CYBER RESILIENCE & INCIDENT RESPONSE

Managed Enterprise Phishing Protection. Comprehensive protection delivered 24/7 by anti-phishing experts

Case Study. Encode helps University of Aberdeen strengthen security and reduce false positives with advanced security intelligence platform

DATA SHEET RSA NETWITNESS PLATFORM PROFESSIONAL SERVICES ACCELERATE TIME-TO-VALUE & MAXIMIZE ROI

Cybersecurity Auditing in an Unsecure World

ISO COMPLIANCE GUIDE. How Rapid7 Can Help You Achieve Compliance with ISO 27002

Samu Konttinen, CEO, F-Secure WE ARE F-SECURE. 1 F-Secure

BHConsulting. Your trusted cybersecurity partner

DIGITAL TRUST Making digital work by making digital secure

BHConsulting. Your trusted cybersecurity partner

GDPR: Get Prepared! A Checklist for Implementing a Security and Event Management Tool. Contact. Ashley House, Ashley Road London N17 9LZ

INNOVATIVE IT- SECURITY FOR THE BANKING AND PAYMENT INDUSTRY

Built-in functionality of CYBERQUEST

Cyber COBIT. Ophir Zilbiger, CEO SECOZ Shay Zandani, CEO CyberARM. December 2013

DHG presenter. August 17, Addressing the Evolving Cybersecurity Landscape. DHG Birmingham CPE Seminar 1

MITIGATE CYBER ATTACK RISK

Don t Be the Next Headline! PHI and Cyber Security in Outsourced Services.

the SWIFT Customer Security

Forensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services

Are we breached? Deloitte's Cyber Threat Hunting

Technology Risk Management in Banking Industry. Rocky Cheng General Manager, Information Technology, Bank of China (Hong Kong) Limited

Gujarat Forensic Sciences University

Technical Brochure F-SECURE THREAT SHIELD

Key Findings from the Global State of Information Security Survey 2017 Indonesian Insights

M&A Cyber Security Due Diligence

4-6 Opportunities Significant value in using SPARKL for Security

Cyber Security Strategy

Enhancing the Cybersecurity of Federal Information and Assets through CSIP

EVENT BROCHURE SECURITY WORLD APRIL 2017 MELIA HANOI HOTEL HOSTED BY ORGANIZED BY SUPPORTED BY.

Securing the SMB Cloud Generation

Bachelor of Information Technology

A practical guide to IT security

UK Permanent Salary Index November 2013 Based on registered vacancies and actual placements

Getting over Ransomware - Plan your Strategy for more Advanced Threats

This document provides a general overview of information security at Aegon UK for existing and prospective clients.

Welcome to Worldpay Gateway Services

ABB Ability Cyber Security Services Protection against cyber threats takes ability

Cyber security tips and self-assessment for business

FFIEC Cyber Security Assessment Tool. Overview and Key Considerations

CYBER SECURITY TRAINING

Keep the Door Open for Users and Closed to Hackers

M a d. Take control of your digital security. Advisory & Audit Security Testing Certification Services Training & Awareness

भ रत य ररज़र व ब क. Setting up and Operationalising Cyber Security Operation Centre (C-SOC)

IMPACT Global Response Centre. Technical Note GLOBAL RESPONSE CENTRE

Cyber Security Detection Technology for your Security Operations Centre. IT Security made in Europe

New York Cybersecurity. New York Cybersecurity. Requirements for Financial Services Companies (23NYCRR 500) Solution Brief

BIG DATA INDUSTRY PAPER

Guidelines. on the security measures for operational and security risks of payment services under Directive (EU) 2015/2366 (PSD2) EBA/GL/2017/17

External Supplier Control Obligations. Cyber Security

Architektura bezpieczeństwa dla otwartych zintegrowanych systemów administracji publicznej

SECURITY SERVICES SECURITY

85% 89% 10/5/2018. Do You Have A Firewall Around Your Cloud? Conquering The Big Threats & Challenges

Bringing cyber to the Board of Directors & C-level and keeping it there. Dirk Lybaert, Proximus September 9 th 2016

Information Security Controls Policy

Unlocking the Power of the Cloud

CYBER SECURITY AND THE PENSIONS INDUSTRY Karen Tasker 1 February 2018

ADVANCED SECURITY MECHANISMS TO PROTECT ASSETS AND NETWORKS: SOFTWARE-DEFINED SECURITY

E-guide Getting your CISSP Certification

Arbor Networks Spectrum. Wim De Niel Consulting Engineer EMEA

Discover the world s payments

RSA Advanced Security Operations Richard Nichols, Director EMEA. Copyright 2015 EMC Corporation. All rights reserved. 1

Click to edit Master title style. DIY vs. Managed SIEM

ForeScout CounterACT. Continuous Monitoring and Mitigation. Real-time Visibility. Network Access Control. Endpoint Compliance.

Six Weeks to Security Operations The AMP Story. Mike Byrne Cyber Security AMP

ENISA & Cybersecurity. Dr. Udo Helmbrecht Executive Director, European Network & Information Security Agency (ENISA) 25 October 2010

WHITEPAPER. How to secure your Post-perimeter world

Delivering Integrated Cyber Defense for the Cloud Generation Darren Thomson

Phishing Activity Trends Report August, 2006

2017 Annual Meeting of Members and Board of Directors Meeting

Security by Default: Enabling Transformation Through Cyber Resilience

TOP 10 IT SECURITY ACTIONS TO PROTECT INTERNET-CONNECTED NETWORKS AND INFORMATION

AKAMAI CLOUD SECURITY SOLUTIONS

Easy Activation Effortless web-based administration that can be activated in as little as one business day - no integration or migration necessary.

Digital Forensics Readiness PREPARE BEFORE AN INCIDENT HAPPENS

CTI Capability Maturity Model Marco Lourenco

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE

Electronic payments in the Netherlands

A Survival Guide to Continuity of Operations. David B. Little Senior Principal Product Specialist

FTA 2017 SEATTLE. Cybersecurity and the State Tax Threat Environment. Copyright FireEye, Inc. All rights reserved.

2015 VORMETRIC INSIDER THREAT REPORT

Altius IT Policy Collection Compliance and Standards Matrix

Transcription:

CYBER OPERATION CENTER Reply s new Cyber Security Operation Centre is a structure specialised in the provision of Premium-level security services, tailored to the customer's needs, processes, and the specific threats characteristic of the sector in which it operates. Communication Valley Reply s Cyber Security Operation Centre, created to meet the security needs of banks and financial institutions, makes its assets and expertise available to companies operating in equally complex environments including the Retail, Manufacturing and Utilities sectors.

SECURE YOUR BUSINESS 24 HOURS A DAY, 365 DAYS A YEAR CYBER OPERATION CENTER

The Cyber Security Operation Centre is a veritable watchtower manned 24 x 7 x 365 days a year by a team of Security Analysts, System Engineers, Security Testers and Malware Specialists. The services offered by the Cyber Security Operation Centre (CSOC) rely on a new security monitoring model based on a first level of highly specialised analysts. From the very first service level, the model reduces reaction times and speeds up the implementation of the necessary countermeasures. Preventive detection and real time management of security incidents are factors of primary importance for ensuring an adequate level of network, data and services protection for businesses. The Cyber Security Operation Centre is a space where a team of experts carries out real time monitoring, security assessments and security device management, relying on leading-edge technologies. THE PROACTIVELY DETECT ATTACKS AND CYBER THREATS CYBER 1 FRAUD 2 DETECT AND MANAGE FRAUDS ACROSS ALL CHANNELS GUARANTEE SECURE AND EFFICIENT ACCESS TO CORPORATE APPLICATIONS AND DATA ANYTIME AND EVERYWHERE ENTERPRISE MOBILITY 4 MANAGED NETWORK 3 SHARE THE RESPONSIBILITY OF KEEPING YOUR NETWORK MANAGED AND SECURE

CYBER Cyber Security Management services are designed to guarantee the customer s core security management activities. In particular, the Security Monitoring service is the primary tool for detecting and managing security incidents. This service is based on the collection and correlation of events related to the customer s infrastructure, applications and systems. All the information is collected by the Advanced Security Analytics platform, which facilitates the analysis of events gathered from heterogeneous sources and from different customers. Based on this approach, the CSOC maximises the ability to identify even the most sophisticated forms of attacks, while ensuring, through the logical separation of data and information relating to different clients, the highest level of privacy. The same platform is used by System Engineers and by Malware Specialists to provide vertical services such as: Cyber Threat Intelligence, Breach Detection and Domain Monitoring. CYBER 1 TESTING ASSESSMENT SYSTEM POLICY 1,1 DEVICE STRONG AUTHENTICATION 1,2 CYBER THREAT INTELLIGENCE CREDENTIAL / CREDIT CARD MONITORING BREACH DETECTION & EARLY WARNING DARK WEB THREAT MONITORING ANTI DEFACEMENT & DOMAIN MONITORING 1,3 LOG MONITORING SIEM & CONFIGURATION 1,4 FRAUD With the widespread use of online and multichannel services, there has been a corresponding increase in fraudulent activity, in terms of both volume and complexity. These activities are generally aimed at identity and credential theft or the acquisition of other information useful for committing fraud. CSOC s Fraud Management services focus on the identification and analysis of Malware for different types of devices, on the detection and shutdown of clone sites used to conduct phishing campaigns, on the analysis of fraudulent financial transactions and, in the event of complex fraud scenarios, on security incident investigations including forensic analysis. The CSOC offers technologies and applications that facilitate the detection of fraud, thanks to analysis and the identification of abnormal behaviour within browsing sessions. FRAUD ACTIVE FRAUD PREVENTION AND MALWARE INTELLIGENCE MOBILE ROGUE APPLICATION HUNTER ANTIPHISHING BRAND ABUSE MONITORING SOCIAL MEDIA THREAT MONITORING 2 2,1 2,2 2,3 2,4

COMMUNICATION VALLEY REPLY MANAGED NETWORK Managed Network Security services are designed to support the unified management of network infrastructure, harmonising access and management systems for service devices operating across CSOC s various customers. A single management console allows System Engineers to take action in an organised and structured manner, both with regard to incident management, as well as in relation to ordinary and extraordinary management, including patching, tuning and change activities. The distinctive elements characterising the Centre s infrastructure are: Flexibility in managing the different technologies used by our customers. Standardisation and sharing of methods for accessing and managing systems. Security and compartmental structuring, both with regard to customer environments, as well as CSOC s infrastructure. Diligent configuration management, with appropriate storage, backups and versioning. High level of reliability and redundancy. MANAGED NETWORK SECURE NETWORK DESIGN AND IMPLEMENTATION NETWORKING REMOTE & ON-SITE SUPPORT DEVICE & SOFTWARE SUPPLY AND SUPPORT NETWORK ENGINEER SUPPORT NOC & COMPLEX NETWORK CONSULTING 3 3,1 3,2 3,3 3,4 ENTERPRISE MOBILITY The incremental use of mobile devices and related content has fuelled the need for enterprise-specific tools and services aimed at the regulation of mobile applications and associated security. Today, the growing adoption of personal devices within business contexts (Bring Your Own Device) represents an opportunity for companies, and at the same time, a risk. The CSOC is able to support the customer in developing a strategy designed to maximise the benefits of the BYOD model, without overlooking the necessary adherence to security policies. End User Computing services are used to monitor and manage workstations, mobile applications and their security, ensuring a specialised contribution for customers based on 8 x 5 or 24 x 7 service models, depending on individual requirements. CSOC s Enterprise Mobility Services support customers in the management of devices and mobile applications, to ensure full compatibility with Mobile Device Management platforms and adherence to core security principles. The CSOC supports the customer both in the development of secure business applications, as well as in securing third party applications. ENTERPRISE MOBILITY END USER COMPUTING DEVICE MOBILE APPLICATION IDENTITY & 4 4,1 4,2 4,3 4,4

COMMUNICATION VALLEY REPLY Communication Valley Reply is the Reply Group company that specialises in providing managed security services. Through its Cyber Security Operation Center an ISO27001-certified European centre of expertise in the managed security services sector that operates on a 24/7 basis, 365 days per year the company ensures business continuity and fraud prevention for companies with regard to threat intelligence, fraud detection and management, security monitoring and testing, and managed network security. With more than 15 years of experience, Communication Valley Reply provides specialised services for the finance sector in the identification and analysis of malware, in the detection of websites created for conducting special phishing campaigns, and in the analysis of fraudulent, often highly complex transactions, including forensic analyses. CYBER OPERATION CENTER Via Robert Koch 1/4, Torre B, 20152 Milano, Italy COMMUNICATION VALLEY REPLY ITALY Via Robert Koch 1/4, Torre B, 20152 Milano, Italy www.communicationvalley.com csoc@reply.com GERMANY Arnulfstraße 27, 80335 München, Germany UK 38 Grosvenor Gardens London, SW1W 0EB, United Kingdom