Ingram Micro Cyber Security Portfolio

Similar documents
Top 20 Critical Security Controls (CSC) for Effective Cyber Defense. Christian Espinosa Alpine Security

CyberVista Certify cybervista.net

Application Security Approach

Automating the Top 20 CIS Critical Security Controls

Hacker Academy Ltd COURSES CATALOGUE. Hacker Academy Ltd. LONDON UK

Mohammad Shahadat Hossain

CISSP CEH PKI SECURITY + CEHv9: Certified Ethical Hacker. Upcoming Dates. Course Description. Course Outline

"Charting the Course... Certified Information Systems Auditor (CISA) Course Summary

locuz.com SOC Services

Cybersecurity Today Avoid Becoming a News Headline

BUILD YOUR CYBERSECURITY SKILLS WITH TRASYS INTERNATIONAL

CyberSecurity. Penetration Testing. Penetration Testing. Contact one of our specialists for more information CYBERSECURITY SERVICE DATASHEET

Certified information Systems Security Professional(CISSP) Bootcamp

FOUNDATION CERTIFICATE IN INFORMATION SECURITY v2.0 INTRODUCING THE TOP 5 DISCIPLINES IN INFORMATION SECURITY SUMMARY

Certified Information Security Manager (CISM) Course Overview

Les joies et les peines de la transformation numérique

Students should have an understanding and a working knowledge in the following topics, or attend these courses as a pre-requisite:

Certified Cyber Security Specialist

EC-Council Certified Incident Handler v2. Prepare to Handle and Respond to Security Incidents EC-COUNCIL CERTIFIED INCIDENT HANDLER 1

ITU CBS. Digital Security Capacity Building: Role of the University GLOBAL ICT CAPACITY BUILDING SYMPOSIUM SANTO DOMINGO 2018

Unlocking Potential Through Learning

DFARS Compliance. SLAIT Consulting SECURITY SERVICES. Mike D Arezzo Director of Security Services. SLAITCONSULTING.com

Certified Ethical Hacker (CEH)

Security Solutions. Overview. Business Needs

Meeting PCI DSS 3.2 Compliance with RiskSense Solutions

CIT 480: Securing Computer Systems. Putting It All Together

Security In A Box. Modular Security Services Offering - BFSI. A new concept to Security Services Delivery.

May 14, :30PM to 2:30PM CST. In Plain English: Cybersecurity and IT Exam Expectations

Pluralsight CEU-Eligible Courses for CompTIA Network+ updated March 2018

E-guide Getting your CISSP Certification

Course overview. CompTIA Security+ Certification (Exam SY0-501) Study Guide (G635eng v107)

Certified Ethical Hacker

CPTE: Certified Penetration Testing Engineer

Position Description IT Auditor

Suma Soft s IT Risk & Security Management Solutions for Global Enterprises

Security. Protect your business from security threats with Pearl Technology. The Connection That Matters Most

Wolfpack Cyber Academy Training Catalogue

CCISO Blueprint v1. EC-Council

DHG presenter. August 17, Addressing the Evolving Cybersecurity Landscape. DHG Birmingham CPE Seminar 1

Effective Strategies for Managing Cybersecurity Risks

Request for Proposal (RFP)

E-guide CISSP Prep: 4 Steps to Achieve Your Certification

Global Security Consulting Services, compliancy and risk asessment services

K12 Cybersecurity Roadmap

IMEC Cybersecurity for Manufacturers Penetration Testing and Top 10

Federal Virtual Training Environment (FedVTE) Pre-Approved for CompTIA CEUs

Total Security Management PCI DSS Compliance Guide

01/02/2014 SECURITY ASSESSMENT METHODOLOGIES SENSEPOST 2014 ALL RIGHTS RESERVED

CASP CompTIA Advanced Security Practitioner Study Guide: (Exam CAS-001)

DIS10.1 Ethical Hacking and Countermeasures

The SANS Institute Top 20 Critical Security Controls. Compliance Guide

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

IT Security Mandatory Solutions. Andris Soroka 2nd of July, RIGA

Career Paths In Cybersecurity

DXC Security Training

STUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences

Apprenticeships CYBER SECURITY HIGHER APPRENTICESHIP FROM IT TECHNICIAN TO SKILLED INFORMATION SECURITY PROFESSIONAL

CompTIA Mobility+ Certification

PCI DSS COMPLIANCE 101

Protect Your Organization from Cyber Attacks

CSWAE Certified Secure Web Application Engineer

Integrigy Consulting Overview

What every IT professional needs to know about penetration tests

Vulnerability Assessments and Penetration Testing

RFP/RFI Questions for Managed Security Services. Sample MSSP RFP Template

RiskSense Attack Surface Validation for Web Applications

Building Secure Systems

Data Sheet The PCI DSS

Virtualization Security & Audit. John Tannahill, CA, CISM, CGEIT, CRISC

Security Monitoring Engineer / (NY or NC) Director, Information Security. New York, NY or Winston-Salem, NC. Location:

Building the Cybersecurity Workforce. November 2017

Information Security Controls Policy

TRAINING CURRICULUM 2017 Q2

Understanding the Changing Cybersecurity Problem

Federal Virtual Training Environment (Fed/VTE) Pre-Approved for CompTIA CEUs

EU General Data Protection Regulation (GDPR) Achieving compliance

Certified Secure Web Application Engineer

Governance, Organisation, Law, Regulation and Standards Syllabus QAN 603/0855/2

Principles of ICT Systems and Data Security

Addressing penetration testing and vulnerabilities, and adding verification measures

Payment Card Industry - Data Security Standard (PCI-DSS) v3.2 Systems Security Standard

*** THIS DOCUMENT IS CLASSIFIED FOR PUBLIC ACCESS ***

Certified Information Systems Auditor (CISA)

Art of Performing Risk Assessments

Establishing a Credible Cybersecurity Program. September 2016

Nebraska CERT Conference

CYBER SECURITY TRAINING

DIS10.1:Ethical Hacking and Countermeasures

FDIC InTREx What Documentation Are You Expected to Have?

CCNP ROUTING & SWITCHING

University of Sunderland Business Assurance PCI Security Policy

Tips for Passing an Audit or Assessment

SECURITY+ COMPETITIVE ANALYSIS 1. GIAC GSEC 2. (ISC)2 SSCP 3. EC-COUNCIL CEH

INFORMATION SUPPLEMENT. Use of SSL/Early TLS for POS POI Terminal Connections. Date: June 2018 Author: PCI Security Standards Council

Cybersecurity for Service Providers

Surprisingly Successful: What Really Works in Cyber Defense. John Pescatore, SANS

Sage Data Security Services Directory

Penetration Testing. Strengthening your security by identifying potential cyber risks

CompTIA IT Fundamentals:

CISA Training.

Transcription:

Ingram Micro Cyber Security Portfolio Ingram Micro Inc. 1

Ingram Micro Cyber Security Portfolio Services Trainings Vendors Technical Assessment General Training Consultancy Service Certification Training Managed Security Service Specialized Training 2

Cyber Security Services 3 3

Ingram Micro Cyber Security Value Added Services Basic Technical Services Test like a hacker. Verify the strength and effectiveness of existing controls. Consultancy Services Cyber security governance, policies, and procedures. Risk assessment and compliance with laws and regulations Managed Security Services Security as a Service Regular Assessments and Continuous Monitoring. 4

Cyber Security Value Added Service - Global Offer Basic Technical Services Public Discovery Web App Assessment Vulnerability Assessment Penetration Testing Web Malware detection PCI DSS ASV Scan Source code review Data Leakage Prevention Configuration review Consultancy Services Governance & Strategy Policies & Procedures Compliance Assessment Risk Assessment Multi-Vendor Security Architecture Access Control Assessment Managed Security Services Regular Assessment SOCaaS Security Monitoring Incident Response Digital Forensics Threat Intelligence 5

Cyber Security Services Public Discovery Report Description: Free of charge. Passive i.e. no interaction with client systems. Aims to identify publicly available information that could be exploited by hackers. Time to deliver: Two business day. Location Information Employees Search Job Postings Network Ranges Files Google Hacking Price: Free of cost for two of your clients. Search Engines Public Discovery Whois Lookup 6

Cyber Security Services Web Application Scanning Description: Available in external and internal format. Aims to test web related vulnerabilities for public facing web applications as well as internally published ones. Inject flows CSS Flows Broken Authen. Error handling Session Mgmt. Time to deliver: Three business days. Web Application Scanning Price: USD per Web Application. CSRF XSS Buffer overflow Insecure Config Denial of service 7

Cyber Security Services Vulnerability Assessment Description: Similar to Web Vulnerability Scanning, however it covers all servers, network devices, applications, and end points. Available in external and internal format. Aims to identify vulnerabilities across the clients network and recommend corrective actions. Time to deliver: Two business day. Price: USD per IP Address. Device Discovery Service Enumeration Scan Analyze & Validate Report Identify connected machines. Perform network level scans. Identify open network ports (TCP/UDP). Identify information about running services. Testing configuration. Identify missing security patches. Highlighted dangerous services. Analyze outcome. Manually verify identified vulnerabilities. Verify outcome against client s setup. Eliminate false positives. Prioritize findings according to severity and potential impact. Provide recommendation 8

Cyber Security Services - Penetration Testing Description: Available in external and internal format. Black box penetration testing is available as well. Aims to identify vulnerabilities in the network devices, servers, application, and possibly end points. Simulate a real hacking exercise. Maintain Access Reporting Target Scoping Info Gathering Target Discovery Time to deliver: Basic Five business days. Black Box Ten business days. Penetration Testing Price: Basic Penetration Testing USD per IP Address. Black Box Penetration Testing USD per IP Address. Privilege Escalation Target Exploitation Vulnerability Mapping Enumeration 9

Cyber Security Services Web Malware Detection Description: Available in external and internal format. Aims to identify malwares in customer web site(s). Protect organization s customer, reputation, and avoid blacklisting. External Links Hidden iframes Injected Links Infected Pages Behavior Analysis Time to deliver: Three business days. Web Malware Detection Price: USD per Web Application. Ref Domains Cross References Encoded Links Blacklist Lookup Infection Trends 10

How Do We Deliver Our Services External Format Ingram Micro Cyber Team DMZ Server Farm Malicious Traffic IT VLAN Marketing VLAN Finance VLAN 11

How Do We Deliver Our Services Internal Format Ingram Micro Cyber Team DMZ Servers Farm VPN/RDP Traffic IM VM Malicious Traffic IT VLAN Marketing VLAN Finance VLAN 12

Consultancy Services Organization of information security, Security strategy, structure, and roles and responsibilities Cyber Security Governance Assess change management, patch management, malware protection, and network security management processes and procedures Security Operations review Policies & Procedures review Review the design and effectiveness of established security policies and procedures Assess physical and environmental controls at data processing facilities Physical Security Assessment Consultancy Services Risk Assessment Identify risks and propose mitigation measures Incident management Access Control Review Assess incident response capabilities including prevention, detection, and recovery. Compliance Assessment Review processes for access provisioning, removal, privilege assignment, and access monitoring Assess compliance against local and international security standards and regulations 13

Cyber Security Trainings 14

Training Suite FOUNDATIONAL TRAINING 1. Fundamentals of Information Security 2. CyberSAFE: Securing Assets for the End User CERTIFICATION TRAINING 1. CFR 2. CompTIA N+ 3. CompTIA S+ 4. CASP 5. CISSP RISK MANAGEMENT 1. Fundamentals of a Formal ISRA 2. NIST SP 800-30 3. OCTAVE 4. ISO 27005 COMPLIANCE 1. PCI DSS and Payment Card Security 2. ISO 27001 15

Training Suite: Foundational Training 1. FUNDAMENTALS OF INFORMATION SECURITY Basic tenets of information security Why Information Security matters How to implement basic security practices Case study and Hands-on workshop Technology users with a basic understanding of technical concepts Course Duration: 1 day 2. CYBERSAFE: SECURING ASSETS FOR THE END USER The need for information security Securing end-point devices such as laptops, desktops, mobile devices, etc. Secure use of the internet Basic users of desktops, laptops, tablets, mobile devices for activities including web browsing and email Course Duration: ½ day 16

Training Suite: Certification Training 1. CompTIA SECURITY PLUS (S+) Implementation, management, monitoring and troubleshooting of security as it spans across infrastructure, applications and operations Technology professionals who wish to further their IT career by acquiring foundational knowledge of security Course Duration: 5 days 2. CompTIA NETWORK PLUS (N+) Configuration, management, and troubleshooting of common wired and wireless network devices and/or support. Course Duration: 5 days Entry-level technology professionals who wish to increase their knowledge of networking and acquire the skills to required for a career in network administration 17

Training Suite: Certification Training 3. CYBER SECURITY FIRST RESPONDER (CFR) A comprehensive approach to security Correct incident response mechanism Cyber Security Professionals who monitor and detect security incidents Course Duration: 5 days 4. CompTIA ADVANCED SECURITY PRACTITIONER (CASP) Enterprise security, risk management and incident response, Research and analysis integration of computing, communications and business disciplines Technical integration of enterprise components IT professionals with strong knowledge of security Course Duration: 5 days 18

Training Suite: Certification Training 5. CERTIFIED INFORMATION SYSTEMS SECURITY PROFESSIONAL (CISSP) Identification and reinforcement of the 8 domains of the (ISC)2 CISSP CBK Course Duration: 5 days Advanced technology/information security professionals including auditors, security consultants, risk managers, network security engineers 19

Training Suite: Risk Management 1. FORMAL INFORMATION SECURITY RISK ASSESSMENT The role of information security risk assessment in Information risk professionals, information assurance securing an enterprise professionals, auditors, pen-testers, incident How to do a formal information security risk assessment responders, etc. Case study and Hands-on Workshop Course Duration: 2 days 2. RISK ASSESSMENT AS PER NIST SP 800-30 Fundamentals of information security risk assessment How to do a formal information security risk assessment as per the NIST SP 800-30 methodology Case study and Hands-on Workshop Information risk professionals, information assurance professionals, auditors, pen-testers, incident responders, etc. Course Duration: 2 days 20

Training Suite: Risk Management 3. RISK ASSESSMENT AS PER ISO 27005 Fundamentals of information security risk assessment How to do a formal information security risk assessment as per the ISO 27005 methodology Case study and Hands-on Workshop Information risk professionals, information assurance professionals, auditors, pen-testers, incident responders, etc. Course Duration: 2 days 4. RISK ASSESSMENT AS PER OCTAVE Fundamentals of information security risk assessment How to do a formal information security risk assessment as per the OCTAVE methodology Case study and Hands-on Workshop Information risk professionals, information assurance professionals, auditors, pen-testers, incident responders, etc. Course Duration: 2 days 21

Training Suite: Compliance 1. PCI DSS Fundamentals of payment card security The 12 PCI DSS Requirements Common challenges in implementation Critical success factors Case Study and Hands-on workshop Information risk professionals, information assurance professionals, auditors, individuals who process card information Course Duration: 2 days 2. ISO 27001 Fundamentals of an ISMS ISO 27001 Controls Common challenges in implementation Critical success factors Case study and Hands-on Workshop Information risk professionals, information assurance professionals, auditors, individuals who process card information Course Duration: 2 days 22

Training Approach CONTENT DELIVERY 20% HANDS-ON Case Study Group activity workshop HANDOUTS Tailored approach Foster critical thinking Implementation challenges Printed training material Case study exercise sheet Additional reading list 23

Trainer Profiles CERTIFICATION EXPERIENCE GLOBAL REFERENCE CISSP CISA CRISC CEH CCSP CCNA CPISI ISO 27001 LA ISO 31000 LA PCI QSA cert. Banking Energy IT Services Telecom Ecommerce 1100 professionals trained in 3 continents 24