Ingram Micro Cyber Security Portfolio Ingram Micro Inc. 1
Ingram Micro Cyber Security Portfolio Services Trainings Vendors Technical Assessment General Training Consultancy Service Certification Training Managed Security Service Specialized Training 2
Cyber Security Services 3 3
Ingram Micro Cyber Security Value Added Services Basic Technical Services Test like a hacker. Verify the strength and effectiveness of existing controls. Consultancy Services Cyber security governance, policies, and procedures. Risk assessment and compliance with laws and regulations Managed Security Services Security as a Service Regular Assessments and Continuous Monitoring. 4
Cyber Security Value Added Service - Global Offer Basic Technical Services Public Discovery Web App Assessment Vulnerability Assessment Penetration Testing Web Malware detection PCI DSS ASV Scan Source code review Data Leakage Prevention Configuration review Consultancy Services Governance & Strategy Policies & Procedures Compliance Assessment Risk Assessment Multi-Vendor Security Architecture Access Control Assessment Managed Security Services Regular Assessment SOCaaS Security Monitoring Incident Response Digital Forensics Threat Intelligence 5
Cyber Security Services Public Discovery Report Description: Free of charge. Passive i.e. no interaction with client systems. Aims to identify publicly available information that could be exploited by hackers. Time to deliver: Two business day. Location Information Employees Search Job Postings Network Ranges Files Google Hacking Price: Free of cost for two of your clients. Search Engines Public Discovery Whois Lookup 6
Cyber Security Services Web Application Scanning Description: Available in external and internal format. Aims to test web related vulnerabilities for public facing web applications as well as internally published ones. Inject flows CSS Flows Broken Authen. Error handling Session Mgmt. Time to deliver: Three business days. Web Application Scanning Price: USD per Web Application. CSRF XSS Buffer overflow Insecure Config Denial of service 7
Cyber Security Services Vulnerability Assessment Description: Similar to Web Vulnerability Scanning, however it covers all servers, network devices, applications, and end points. Available in external and internal format. Aims to identify vulnerabilities across the clients network and recommend corrective actions. Time to deliver: Two business day. Price: USD per IP Address. Device Discovery Service Enumeration Scan Analyze & Validate Report Identify connected machines. Perform network level scans. Identify open network ports (TCP/UDP). Identify information about running services. Testing configuration. Identify missing security patches. Highlighted dangerous services. Analyze outcome. Manually verify identified vulnerabilities. Verify outcome against client s setup. Eliminate false positives. Prioritize findings according to severity and potential impact. Provide recommendation 8
Cyber Security Services - Penetration Testing Description: Available in external and internal format. Black box penetration testing is available as well. Aims to identify vulnerabilities in the network devices, servers, application, and possibly end points. Simulate a real hacking exercise. Maintain Access Reporting Target Scoping Info Gathering Target Discovery Time to deliver: Basic Five business days. Black Box Ten business days. Penetration Testing Price: Basic Penetration Testing USD per IP Address. Black Box Penetration Testing USD per IP Address. Privilege Escalation Target Exploitation Vulnerability Mapping Enumeration 9
Cyber Security Services Web Malware Detection Description: Available in external and internal format. Aims to identify malwares in customer web site(s). Protect organization s customer, reputation, and avoid blacklisting. External Links Hidden iframes Injected Links Infected Pages Behavior Analysis Time to deliver: Three business days. Web Malware Detection Price: USD per Web Application. Ref Domains Cross References Encoded Links Blacklist Lookup Infection Trends 10
How Do We Deliver Our Services External Format Ingram Micro Cyber Team DMZ Server Farm Malicious Traffic IT VLAN Marketing VLAN Finance VLAN 11
How Do We Deliver Our Services Internal Format Ingram Micro Cyber Team DMZ Servers Farm VPN/RDP Traffic IM VM Malicious Traffic IT VLAN Marketing VLAN Finance VLAN 12
Consultancy Services Organization of information security, Security strategy, structure, and roles and responsibilities Cyber Security Governance Assess change management, patch management, malware protection, and network security management processes and procedures Security Operations review Policies & Procedures review Review the design and effectiveness of established security policies and procedures Assess physical and environmental controls at data processing facilities Physical Security Assessment Consultancy Services Risk Assessment Identify risks and propose mitigation measures Incident management Access Control Review Assess incident response capabilities including prevention, detection, and recovery. Compliance Assessment Review processes for access provisioning, removal, privilege assignment, and access monitoring Assess compliance against local and international security standards and regulations 13
Cyber Security Trainings 14
Training Suite FOUNDATIONAL TRAINING 1. Fundamentals of Information Security 2. CyberSAFE: Securing Assets for the End User CERTIFICATION TRAINING 1. CFR 2. CompTIA N+ 3. CompTIA S+ 4. CASP 5. CISSP RISK MANAGEMENT 1. Fundamentals of a Formal ISRA 2. NIST SP 800-30 3. OCTAVE 4. ISO 27005 COMPLIANCE 1. PCI DSS and Payment Card Security 2. ISO 27001 15
Training Suite: Foundational Training 1. FUNDAMENTALS OF INFORMATION SECURITY Basic tenets of information security Why Information Security matters How to implement basic security practices Case study and Hands-on workshop Technology users with a basic understanding of technical concepts Course Duration: 1 day 2. CYBERSAFE: SECURING ASSETS FOR THE END USER The need for information security Securing end-point devices such as laptops, desktops, mobile devices, etc. Secure use of the internet Basic users of desktops, laptops, tablets, mobile devices for activities including web browsing and email Course Duration: ½ day 16
Training Suite: Certification Training 1. CompTIA SECURITY PLUS (S+) Implementation, management, monitoring and troubleshooting of security as it spans across infrastructure, applications and operations Technology professionals who wish to further their IT career by acquiring foundational knowledge of security Course Duration: 5 days 2. CompTIA NETWORK PLUS (N+) Configuration, management, and troubleshooting of common wired and wireless network devices and/or support. Course Duration: 5 days Entry-level technology professionals who wish to increase their knowledge of networking and acquire the skills to required for a career in network administration 17
Training Suite: Certification Training 3. CYBER SECURITY FIRST RESPONDER (CFR) A comprehensive approach to security Correct incident response mechanism Cyber Security Professionals who monitor and detect security incidents Course Duration: 5 days 4. CompTIA ADVANCED SECURITY PRACTITIONER (CASP) Enterprise security, risk management and incident response, Research and analysis integration of computing, communications and business disciplines Technical integration of enterprise components IT professionals with strong knowledge of security Course Duration: 5 days 18
Training Suite: Certification Training 5. CERTIFIED INFORMATION SYSTEMS SECURITY PROFESSIONAL (CISSP) Identification and reinforcement of the 8 domains of the (ISC)2 CISSP CBK Course Duration: 5 days Advanced technology/information security professionals including auditors, security consultants, risk managers, network security engineers 19
Training Suite: Risk Management 1. FORMAL INFORMATION SECURITY RISK ASSESSMENT The role of information security risk assessment in Information risk professionals, information assurance securing an enterprise professionals, auditors, pen-testers, incident How to do a formal information security risk assessment responders, etc. Case study and Hands-on Workshop Course Duration: 2 days 2. RISK ASSESSMENT AS PER NIST SP 800-30 Fundamentals of information security risk assessment How to do a formal information security risk assessment as per the NIST SP 800-30 methodology Case study and Hands-on Workshop Information risk professionals, information assurance professionals, auditors, pen-testers, incident responders, etc. Course Duration: 2 days 20
Training Suite: Risk Management 3. RISK ASSESSMENT AS PER ISO 27005 Fundamentals of information security risk assessment How to do a formal information security risk assessment as per the ISO 27005 methodology Case study and Hands-on Workshop Information risk professionals, information assurance professionals, auditors, pen-testers, incident responders, etc. Course Duration: 2 days 4. RISK ASSESSMENT AS PER OCTAVE Fundamentals of information security risk assessment How to do a formal information security risk assessment as per the OCTAVE methodology Case study and Hands-on Workshop Information risk professionals, information assurance professionals, auditors, pen-testers, incident responders, etc. Course Duration: 2 days 21
Training Suite: Compliance 1. PCI DSS Fundamentals of payment card security The 12 PCI DSS Requirements Common challenges in implementation Critical success factors Case Study and Hands-on workshop Information risk professionals, information assurance professionals, auditors, individuals who process card information Course Duration: 2 days 2. ISO 27001 Fundamentals of an ISMS ISO 27001 Controls Common challenges in implementation Critical success factors Case study and Hands-on Workshop Information risk professionals, information assurance professionals, auditors, individuals who process card information Course Duration: 2 days 22
Training Approach CONTENT DELIVERY 20% HANDS-ON Case Study Group activity workshop HANDOUTS Tailored approach Foster critical thinking Implementation challenges Printed training material Case study exercise sheet Additional reading list 23
Trainer Profiles CERTIFICATION EXPERIENCE GLOBAL REFERENCE CISSP CISA CRISC CEH CCSP CCNA CPISI ISO 27001 LA ISO 31000 LA PCI QSA cert. Banking Energy IT Services Telecom Ecommerce 1100 professionals trained in 3 continents 24