+ All Categories
Home > Documents > Lewan Technology Jeff Wilkinson CISSP · 2018-03-28 · 6. Check it 5. Fix it 7. Avoid it We manage...

Lewan Technology Jeff Wilkinson CISSP · 2018-03-28 · 6. Check it 5. Fix it 7. Avoid it We manage...

Date post: 23-May-2020
Category:
Upload: others
View: 1 times
Download: 0 times
Share this document with a friend
8
We manage your technology, so you can manage your business. REAL AND RELEVANT SECURITY Lewan Technology Jeff Wilkinson CISSP We manage your technology, so you can manage your business. WHAT IS AT RISK?
Transcript
Page 1: Lewan Technology Jeff Wilkinson CISSP · 2018-03-28 · 6. Check it 5. Fix it 7. Avoid it We manage your technology, so you can manage your business. THREE PILLARS OF SECURITY •

We manage your technology, so you can manage your business.

REAL AND RELEVANT SECURITY

Lewan Technology

Jeff Wilkinson

CISSP

We manage your technology, so you can manage your business.

WHAT IS AT RISK?

Page 2: Lewan Technology Jeff Wilkinson CISSP · 2018-03-28 · 6. Check it 5. Fix it 7. Avoid it We manage your technology, so you can manage your business. THREE PILLARS OF SECURITY •

We manage your technology, so you can manage your business.

DO YOU KNOW YOUR THREAT?

• Nation state

• Organized CrimeExternal

• Environmental

• Information Technology InfrastructureInternal

• Disgruntled

• UnknowningEmployee

We manage your technology, so you can manage your business.

DO YOU KNOW YOUR ASSETS?

Hardware

Company

BYOD

Software

Company owned

SAAS

Data

Intellectual Property

PII/PHI/CC

Page 3: Lewan Technology Jeff Wilkinson CISSP · 2018-03-28 · 6. Check it 5. Fix it 7. Avoid it We manage your technology, so you can manage your business. THREE PILLARS OF SECURITY •

We manage your technology, so you can manage your business.

DO YOU KNOW YOUR VULNERABILITIES?

External

• Web site coding

• Misconfigured equipment

• unpatched

Internal

• Patching

• Unknown applications

• BYOD

Employee

• Training?

• Fraud

• Knowingly exfiltrating Intellectual Property

We manage your technology, so you can manage your business.

THINGS TO THINK ABOUT?

• Do you have firewalls?• Are they Application firewalls?

• Are they installed to any framework or industry standard?

• Do you control internet access?

• Is your network segmented or flat?

• Do you patch more than just Microsoft?

• Do you have any monitoring capability?

• Are you doing end user security training/validation?

Page 4: Lewan Technology Jeff Wilkinson CISSP · 2018-03-28 · 6. Check it 5. Fix it 7. Avoid it We manage your technology, so you can manage your business. THREE PILLARS OF SECURITY •

We manage your technology, so you can manage your business.

WHAT FACTORS ARE LIMITING YOU?

• Lack of management support?

• Budget restraints?

• Lack of Personnel and correct skills?

• Lack of Visibility to what’s on your network?

• Alert fatigue?

We manage your technology, so you can manage your business.

TRENDS AND REAL STORIES

• Experian and rippling effect

Page 5: Lewan Technology Jeff Wilkinson CISSP · 2018-03-28 · 6. Check it 5. Fix it 7. Avoid it We manage your technology, so you can manage your business. THREE PILLARS OF SECURITY •

We manage your technology, so you can manage your business.

EXAMPLE RISK MANAGEMENT PROGRAM

Risk Management

1. What do I have? 2. How Scary is it? 3. Should I fix it?

4. Write it down

5. Fix it6. Check it

7. Avoid it

We manage your technology, so you can manage your business.

THREE PILLARS OF SECURITY

• Defend• Activities or equipment that defend your IT services by either

eliminating vulnerabilities or actively blocking malicious activities that are known.

• Detect• Detection and analysis of possible malicious activity. This can

lead to defensive action

• Comply• Activity and analysis required by Government Compliance

requirements. These can further heighten the security awareness/stance of an organization

Page 6: Lewan Technology Jeff Wilkinson CISSP · 2018-03-28 · 6. Check it 5. Fix it 7. Avoid it We manage your technology, so you can manage your business. THREE PILLARS OF SECURITY •

We manage your technology, so you can manage your business.

PILLAR 1: DEFEND

• Defensive activities• Operational Patching• Endpoint Protection• Firewall Management• Email Security• URL Protection• Intrusion Protection Service• Network Access Control

• Identity, 2 Factor, controlled access to network

We manage your technology, so you can manage your business.

PILLAR 2: DETECT

• Detection activities

• Incident response assistance

• Network Intrusion/Breach Detection

• Bot-Net Detection

• SIEM (Servers, Desktops, Network Devices)

• Host Intrusion Detection

• Asset Discovery (know what’s on your network)

Page 7: Lewan Technology Jeff Wilkinson CISSP · 2018-03-28 · 6. Check it 5. Fix it 7. Avoid it We manage your technology, so you can manage your business. THREE PILLARS OF SECURITY •

We manage your technology, so you can manage your business.

PILLAR 3: COMPLY

• Services that address compliance needs

• Asset Management

• Vulnerability Management

• Log Management/Forensics

• Compliance Reporting (PCI, HIPAA, FIIEC, ISO

27001, etc.)

• File Change Monitoring

We manage your technology, so you can manage your business.

MATURITY PYRAMID

Security Framework

SIEM – Some Policies –Processes and Procedures

Incident Response Plan Dedicated Security Staff

Limited defined Processes and Procedures –Centralized Logging – Advanced Malware

Protection – Breach Detection

Application Firewall – Intrusion Protection Service – Network Access Control – Data Loss Protection – User Awareness

Training

Firewall – URL Filtering – Email filtering – Antivirus

Page 8: Lewan Technology Jeff Wilkinson CISSP · 2018-03-28 · 6. Check it 5. Fix it 7. Avoid it We manage your technology, so you can manage your business. THREE PILLARS OF SECURITY •

We manage your technology, so you can manage your business.

TAKE HOME QUESTIONS

• Who is accountable/responsible:• Risk Management?

• Data Classification

• Infrastructure Security

• Incident Response

• Do you have and follow Policies/Procedures/Processes?

• What makes your company special? Are you protecting that critical asset?


Recommended