© 2009 idbi intech, inc. all rights reserved.idbi intech confidential 1 information (data) security...

11
© 2009 IDBI Intech, Inc. All rights reserved. IDBI Intech Confidential 1 Information (Data) Security & Risk Mitigation

Upload: wesley-oconnor

Post on 26-Dec-2015

214 views

Category:

Documents


2 download

TRANSCRIPT

Page 1: © 2009 IDBI Intech, Inc. All rights reserved.IDBI Intech Confidential 1 Information (Data) Security & Risk Mitigation

© 2009 IDBI Intech, Inc. All rights reserved. IDBI Intech Confidential 1

Information (Data) Security & Risk Mitigation

Page 2: © 2009 IDBI Intech, Inc. All rights reserved.IDBI Intech Confidential 1 Information (Data) Security & Risk Mitigation

© 2009 IDBI Intech, Inc. All rights reserved. IDBI Intech Confidential 2

IT Act 2000 Amendment (Sec 43 A)

Corporate Bodies like Banks handling sensitive personal data to implement and practice reasonable security practices and procedures.

Damages by way of compensation to person affected without any upper limit.

Page 3: © 2009 IDBI Intech, Inc. All rights reserved.IDBI Intech Confidential 1 Information (Data) Security & Risk Mitigation

© 2009 IDBI Intech, Inc. All rights reserved. IDBI Intech Confidential 3

Information Security- Myths

Passwords are enough

to secure our

business

Data backups are enough

Why plan for BCP ?Information Security

is

responsibility of IT…

Our existing Security controls are adequate

to prevent any information loss

Page 4: © 2009 IDBI Intech, Inc. All rights reserved.IDBI Intech Confidential 1 Information (Data) Security & Risk Mitigation

© 2009 IDBI Intech, Inc. All rights reserved. IDBI Intech Confidential 4

Information Security- Reality

Critical data is accessible to others because I have left my PC/terminal unattended

Worm infecting my machine can bring down the entire network

My account is used to commit fraud because my password is weak /shared

Page 5: © 2009 IDBI Intech, Inc. All rights reserved.IDBI Intech Confidential 1 Information (Data) Security & Risk Mitigation

© 2009 IDBI Intech, Inc. All rights reserved. IDBI Intech Confidential 5

Why Information Security?

Confidentiality, Integrity, Availability

People are the weakest link in Information Security

To know Security Responsibilities

To know Information Security Risks associated with their job responsibilities

Adherence to the Organizational security policies

Page 6: © 2009 IDBI Intech, Inc. All rights reserved.IDBI Intech Confidential 1 Information (Data) Security & Risk Mitigation

© 2009 IDBI Intech, Inc. All rights reserved. IDBI Intech Confidential 6

Information Security Risks

Online Frauds Hacking Attacks Phishing / Vishing Attacks Spam Data Theft Insecure Business Applications Malware / Spyware Virus / Worm / Trojan Attacks Denial of Service (DOS) Attacks Lack of User Awareness

Page 7: © 2009 IDBI Intech, Inc. All rights reserved.IDBI Intech Confidential 1 Information (Data) Security & Risk Mitigation

© 2009 IDBI Intech, Inc. All rights reserved. IDBI Intech Confidential 7

Risk Mitigation Measures

Infrastructure Set up• DR Site

• DR Drills

• Updated BCP

Critical Applications• High Availability Clusters/Multiple Servers

• Application Security Testing

• Parameter Fine Tuning

• Hardened Operating Systems

• Strong Physical Security/Surveillance Camera/Biometric Access

Page 8: © 2009 IDBI Intech, Inc. All rights reserved.IDBI Intech Confidential 1 Information (Data) Security & Risk Mitigation

© 2009 IDBI Intech, Inc. All rights reserved. IDBI Intech Confidential 8

Risk Mitigation Measures

Delivery Channels• Secured Indirect Access to CBS

• Independent Systems

• Encrypted Data Exchange across systems

• Multiple Authentication

Outsourced Services• Drafting and Monitoring of SLAs

• Non Disclosure Clauses

• Review and Monitoring of Reports and Outputs

• Third Party Employee Background Checks

Page 9: © 2009 IDBI Intech, Inc. All rights reserved.IDBI Intech Confidential 1 Information (Data) Security & Risk Mitigation

© 2009 IDBI Intech, Inc. All rights reserved. IDBI Intech Confidential 9

Risk Mitigation Measures

Users• Need to know basis

• Periodic Review of Access rights

• Strong Authentications

• Awareness Training

Networks• Intrusion Detection/Prevention Systems

• Internal and External Firewalls

• Periodic Penetration Testing

• 24x7 Cyber Policing/Monitoring Attacks

• Virus/Worm/Malware/Spyware Protection

• Regular Security Updates – IPS/IDS, Anti-Virus

Page 10: © 2009 IDBI Intech, Inc. All rights reserved.IDBI Intech Confidential 1 Information (Data) Security & Risk Mitigation

© 2009 IDBI Intech, Inc. All rights reserved. IDBI Intech Confidential 10

Information Security Practices

Information Security Management System Information Security Policy & Procedures Continuous Risk Assessment Information Security Incident Management Business Continuity/Disaster Recovery Plans Information Systems Audit Network Security Audit Application Security Testing Vulnerability Assessment/Penetration Testing Security Operations Centre (SOC)/Cyber Policing Control Room Awareness Trainings

Page 11: © 2009 IDBI Intech, Inc. All rights reserved.IDBI Intech Confidential 1 Information (Data) Security & Risk Mitigation

© 2009 IDBI Intech, Inc. All rights reserved. IDBI Intech Confidential 11

Thank You