Convergence of IT and Physical Security Industry Initiatives

Similar documents
CCISO Blueprint v1. EC-Council

NERC Staff Organization Chart Budget 2018

NERC Staff Organization Chart

Designing and Building a Cybersecurity Program

NERC Staff Organization Chart Budget 2019

Managing Trust in e-health with Federated Identity Management

Helping Meet the OMB Directive

NERC Staff Organization Chart Budget 2019

NERC Staff Organization Chart Budget

NERC Staff Organization Chart Budget 2017

Jim Reavis CEO and Founder Cloud Security Alliance December 2017

NERC Staff Organization Chart Budget 2017

Trusted Computing Today: Benefits and Solutions

NERC Staff Organization Chart 2015 Budget

What It Takes to be a CISO in 2017

Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud

You Might Know Us As. Copyright 2016 TierPoint, LLC. All rights reserved.

RSA Solution Brief. The RSA Solution for VMware. Key Manager RSA. RSA Solution Brief

Legal, Ethical, and Professional Issues in Information Security

BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE

Incident Response. Is Your CSIRT Program Ready for the 21 st Century?

CSIRT in general CSIRT Service Categories Reactive Services Proactive services Security Quality Management Services CSIRT. Brmlab, hackerspace Prague

Security+ SY0-501 Study Guide Table of Contents

National Cyber Security Operations Center (N-CSOC) Stakeholders' Conference

Operations & Technology Seminar. Tuesday, November 8, 2016 Crowne Plaza Monroe, Monroe Township, NJ

Healthcare Security Professional Roundtable. The Eighth National HIPAA Summit Monday, March 8, 2004

SNIA/DMTF Work Register. Version 1.3

Future-ready security for small and mid-size enterprises

WORKSHARE SECURITY OVERVIEW

Digital Forensics Readiness PREPARE BEFORE AN INCIDENT HAPPENS

Enterprise & Cloud Security

Clearing the Path to PCI DSS Version 2.0 Compliance

Product Brief. Circles of Trust.

Standard CIP 007 4a Cyber Security Systems Security Management

Internet of Things Toolkit for Small and Medium Businesses

@SNIA. Learn More About SNIA Membership

Credit Card Data Compromise: Incident Response Plan

AAPA Smart Ports. Cyber Management for Ports Panel. Small Port Cyber Security Workshops. March 6, 2018

CA Security Management

Standard for Security of Information Technology Resources

John Snare Chair Standards Australia Committee IT/12/4

locuz.com SOC Services

IBM Security Intelligence on Cloud

ISO/IEC Solution Brief ISO/IEC EventTracker 8815 Centre Park Drive, Columbia MD 21045

WHITE PAPER OCTOBER 2017 VMWARE ENTERPRISE RESILIENCY. Integrating Resiliency into Our Culture and DNA

FiXs - Federated and Secure Identity Management in Operation

MANAGEMENT OF INFORMATION SECURITY INCIDENTS

Certified Information Security Manager (CISM) Course Overview

Accelerate Your Cloud Journey

Canadian Access Federation: Trust Assertion Document (TAD)

Open Group Security Forum Overview

Medical Device Vulnerability Management

CND Exam Blueprint v2.0

Projectplace: A Secure Project Collaboration Solution

IT Security Mandatory Solutions. Andris Soroka 2nd of July, RIGA

Make IR Effective with Risk Evaluation and Reporting

Security and resilience in Information Society: the European approach

Cisco Meraki Privacy and Security Practices. List of Technical and Organizational Measures

The Common Controls Framework BY ADOBE

Broward County RFP TEC P1

PULLING OUR SOCS UP VODAFONE GROUP AT RSAC Emma Smith. Andy Talbot. Group Technology Security Director Vodafone Group Plc

NATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium

How AlienVault ICS SIEM Supports Compliance with CFATS

IBM Case Manager on Cloud

DHS ID & CREDENTIALING INITIATIVE IPT MEETING

SOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT

standards and so the text is not to be used for commercial purposes, gain or as a source of profit. Any changes to the slides or incorporation in

User-to-Data-Center Access Control Using TrustSec Design Guide

HPH SCC CYBERSECURITY WORKING GROUP

Addressing Vulnerabilities By Integrating Your Incident Response Plans. Brian Coates Enaxis Consulting

Ο ρόλος της τεχνολογίας στο ταξίδι της συμμόρφωσης με τον Γενικό Κανονισμό. Αντιγόνη Παπανικολάου & Νίκος Αναστόπουλος

the SWIFT Customer Security

TEL2813/IS2820 Security Management

RICK RAMPOLLA WHO WE ARE. ITDM Security Operations, Publix Super Markets Inc.

Information Security Incident Response Plan

Forensics and Active Protection

Maintaining Resiliency Within the Defense Industrial Base Through Preparedness Response and Recovery

Canadian Access Federation: Trust Assertion Document (TAD)

Cisco ASA 5500 Series IPS Solution

No IT Audit Staff? How to Hack an IT Audit. Presenters. Mark Bednarz, Partner-In-Charge, Risk Advisory PKF O Connor Davies, LLP

SOC-2 Requirement Solution Brief. EventTracker 8815 Centre Park Drive, Columbia MD SOC-2

Minimum Security Standards for Networked Devices

DigiCert Certified Partner Program. Delivering Confidence for Customers and Consumers by Securing Websites and Applications

Cloud Computing. Faculty of Information Systems. Duc.NHM. nhmduc.wordpress.com

An Operational Cyber Security Perspective on Emerging Challenges. Michael Misumi CIO Johns Hopkins University Applied Physics Lab (JHU/APL)

Shon Harris s Newly Updated CISSP Materials

Clearing the Path to PCI DSS Version 2.0 Compliance

Standard CIP Cyber Security Systems Security Management

Ransomware A case study of the impact, recovery and remediation events

PROTECTION FOR WORKSTATIONS, SERVERS, AND TERMINAL DEVICES ENDPOINT SECURITY NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY

A Strategy for a secure Information Society Dialogue, Partnership and empowerment

We are releasing 7 pages of responsive documents. Pursuant to FOIA, certain information has been redacted as it is exempt from release.

Standard CIP 007 3a Cyber Security Systems Security Management

Securing the Cloud Today: How do we get there?

Poor PAM processes and policies leave the crown jewels susceptible to security breaches Global Survey of IT Security Professionals

Canadian Access Federation: Trust Assertion Document (TAD)

NIST Revision 2: Guide to Industrial Control Systems (ICS) Security

Interagency Advisory Board Meeting Agenda, April 27, 2011

MEMBERSHIP. Learn how you can get involved with SNIA

CITY OF MONTEBELLO SYSTEMS MANAGER

Transcription:

Convergence of IT and Physical Security Industry Initiatives SCA - 3/9/04

Organizational Challenge Ira Simon VP Channel/Direct Feild Marketing Martha (Angie) Barragan Assiatant Annamarie O'Connor Div. AVP Cynthia Mutell Manager Donna Anderson Manager/Director David Miller Manager/Director Diane Pereira Manager/Director Raoul Lake Sr. VP Josh Horstmann VP Anthony Swierkot VP Marketing Channel Field Marketing Channel Promotions Partner Program Channel Solution Mktg Team Channel Logistics Licensing/OEM Marketing Marketing Comm. Channel/FM Central Services NA Direct Field Marketing Sales Call Center See Seperate Sheet Canada Eufemia Fortunato Anne Carracino Manager Channel Key Accounts NA Kimberly Altenberg Enterprise Modeling Diane Murtha-Fitzpatrick Security Elissa Li Vecchi 1-tier (ESP) Products Ed Cegleski Jennifer Endelson Gavin Creado Joseph Bova Kathleen Lopez Patty Arcari Elizabeth Stackowitz Jennifer Keating Tracy Schultz Allison Reichel Loretta Scott Jean Brase IM Solution Team EM Solution Team Nada Valvasori Fiona Goy Leigh Lebow Dina Manor Deana-Ro Mickels Kristana Kane Carmen Munsch Distribution Marketing Stacie Avena Lesley Foehrenbach Mary Gavin Brenda Miller Promotions Betsy Leigner Denise Licari Michelle Traina Storage Rebecca Salie Melinda Smith IT Security Group Business Intelligence Robert Bolds Gloria Worland ebusiness Transformation & Integration Ed Blum John Dilley Bill Clarke ebusbiness Solutions/Training Marina Dierks Geographic Team 6 Plus Federal. West Enterprise Mgt. Keith Wilson Jim Anderson Joe Loveless Security Open Storage Main Frame Solution Team Mark Newberry Tina Linkens Tiffany Crane Physical Security Group South Central Ed Zacharkevics Dale Jaquette Mid West Jeff Ramm Hugo Malavet South East Bob Bresnahan Wendy Blake Mid Atlantic Dawn Smith-McBratney Shannon Schneiders North East Bernard Klopfer Micki Divitorrio Federal Karen Mocbeichel

Differences between IT and Physical Security Differences in Reporting lines Culture Procedures Security controls Leading to separation of Audit trail Risk management Provisioning Policies update/definition With consequences including Delays in response due to coordination Potential vulnerabilities Cost inefficiencies

Security Enterprise Goal Business Processes HR IT Infrastructure Business Security Customer Relationship Business Applications System Facilities Physical Security IT Security Storage Manag

Un-integrated Responsibilities Business Security Processes Policy Setting User Provisioning & Asset Security Monitoring and Auditing Incident Response Business Continuity Plan Physical Security IT Security Card Issuance & Revocation Access Device Monitoring Access Violation Handling Journal Manag ement Emergency Access Process Firewalls and VPNs Antivirus & Vulnerability Mgt Intrusion Detection & Prevention User Access Mgt Backup and Recovery

Integration Points System Monitoring Security Reporting Log Policy Physical Security Devices User Provisioning IT Access Control Building Access Control User provisioning - enables users to be set up with access devices with a consistent set of data associated with each user which integrates with enterprise identity management Policy - sets the controls used by the devices (when raise alerts, what level of logging, what access enforced) Security reporting - enables device settings to be reported on Log management - enables centralized management of journals and normalization into a consistent format System monitoring - enables IT security event management to monitor physical devices and correlate attributes such as location with network and other intrusion monitoring systems.

OSE Cross-industry forum Develop interoperability specifications in the area of security management Bring together the disparate technologies making up today s security infrastructures Allow for optimal security and operational efficiencies, Respect organization-specific operational requirements. Educate White papers and best practices Specifications are published and made available to standard organizations

IEEE-ISTO Formed in January 1999 as an independent 501(c)(6) Not-for-Profit Corporation Provides both legal and day-to-day support infrastructure for standards related high-tech consortia Affiliated with the IEEE and the IEEE Standards Association Offices located at IEEE Operations Center in Piscataway, NJ. Provides OSE support in following areas: Legal Umbrella HQ Office Program Financial Membership Administration IT Support www.ieee-isto.org

IEEE-ISTO Manages industry initiatives Focus on Interoperability and Conformance program management Other Projects VoiceXML Forum s certification activities Liberty Alliance SyncML Initiative, Ltd Wireless Village Board 1 Representative of Each Sponsor Member Chair, Vice Chair, Secretary, Treasurer Coordinates Finances, Marketing and Recruitment Technical Council 1 Technical Representative of Each Sponsor Coordinates all Technical Activities of OSE Meetings open to Sponsors and Contributors Technical Subcommittees Comprised of Sponsor and Contributor Members Contributor Members Full Participation and Voting in Subcommittees Listed as a member on the website Supporter Members Review Specs prior to publication Participate in All-Member Meetings

OSE Activities Standards profiling Best practices Physbits Model and interchange formats SIA Performance standard Joint Work/Liaisons OSIPS UL Liberty INCITS M1

Physbits Auditability and forensics capability across all systems Event format standardization and secure logs connectivity Anomalous behavior detection Strong Authentication Centralized credential management system May, but need not, leverage dual purpose access cards for enhanced authentication Provisioning Common user management procedures

Use cases Provision new employee Incident handling e.g. Access IT system in restricted area User leaves the organization Extended vacation Compromised credential Report (entitlements & violations) e.g. Compliance audit Incident investigation (current & historic) Change policy

OSE Workplan Initial Focus Security Event format Event taxonomy Interchange formats Transport mappings Relationships to other work Performance standard definition Future Focus Additional white papers and implementation guidance Physbits Provisioning Policy management Biometric profile Audit trail best practices and storage

OSE Goal Reduce exposure resulting from physical access to IT resources Accurately detect attacks from within corporate networks Enhance organizational collaboration Simplified auditing Simplified administration Further Information email: Info@opensecurityexchange.com web: http://opensecurityexchange.com