cyber observer presentation

21

Upload: shimon-becker

Post on 23-Jan-2015

94 views

Category:

Technology


2 download

DESCRIPTION

In order to be cyber secure you need regularly to manage the implementation of ISO 27K 14 domains. You regularly need to Manage complicated architecture, operate dozens of tools, Managers, Administrators, Suppliers, Budgets and to ensure that all is UP AND RUNNING, PROTECTING and sending you ALERTS right on time. That’s what CyberObserver does.

TRANSCRIPT

Page 1: Cyber observer Presentation
Page 2: Cyber observer Presentation

The CyberObserver management Compliance solution

Page 3: Cyber observer Presentation

The Business

In order to be cyber secure you need regularly to manage the implementation of ISO 27K 14 domains.

You regularly need to Manage complicated architecture, operate dozens of tools, Managers, Administrators, Suppliers, Budgets and to ensure that all is UP AND RUNNING, PROTECTING and sending you ALERTS right on time.

See Tools for Automating the Critical Controls : www.counciloncybersecurity.org/practice-areas/technology

That’s what CyberObserver does

Page 4: Cyber observer Presentation

To produce a uniform Cyber Security organizational language, a visual display of the services, goals, people and technology, with integrated KPI's and alerts, for better decision making, in order to monitor the Architecture and the compliance/regulatory demands of Cyber security standards & technologies.

Scope

A comprehensive, Effective , management-level Cyber management tool is essential in today’s complex Cyber challenge.

Page 5: Cyber observer Presentation

• CyberObserver provides a comprehensive, high-level cyber security Architecture view.

• CyberObserver uniquely delivers a real-time cyber security monitoring and compliance status.

• CyberObserver is a business-oriented management and control framework designed for managers.

• CyberObserver is visual, simple, easy cyber security management tool, enables executives to easily receive information and take decisions.

Page 6: Cyber observer Presentation

Cyber Security Operation Center

Page 7: Cyber observer Presentation

Cyber Security Operation Center

Page 8: Cyber observer Presentation

Cyber Security Operation Center

Page 9: Cyber observer Presentation

Cyber Security Operation Center

Page 10: Cyber observer Presentation

• Network Security includes:

• Application Security

• DB Security

• Middleware Security• OS Security

• Network Security• SOC, Employees, Suppliers

o Network Separationo Secure network connectivity

ISO27K Cyber Security IT Infrastructure domain example

o Network gates security Management

Page 11: Cyber observer Presentation

• Network Security includes:

• Application Security

• DB Security

• Middleware Security• OS Security

• Network Security• SOC, Employees, Suppliers

o Network Separationo Secure network connectivity

ISO27K Cyber Security IT Infrastructure domain example

o Network gates security Management

Page 12: Cyber observer Presentation

o Network gates security Managemento Management and authorization o KPI’s & Alerts

o Gate Asset Management

Page 13: Cyber observer Presentation

o Network gates security Managemento Management and authorization o KPI’s & Alerts

o Gate Asset Management

Page 14: Cyber observer Presentation

o Network gates security Managemento Management and authorization o KPI’s & Alerts

o Gate Asset Management

Page 15: Cyber observer Presentation

Mobile View

Page 16: Cyber observer Presentation

Situation rooms View

Page 17: Cyber observer Presentation

• In a short period of time a visual Infographics services view is being built, allows the managers to study the compliance and the performance of all services according to the ISO27K standards.

• Problems and failures floats and real-time performance analysis is made clear, making decisions based on real time information and efficiency.

• Organizational efficiency is accompanied by continuous feedback from the system and the agreed level of service is maintained.

Summary

Page 18: Cyber observer Presentation

• Visual Infographics of services, contexts, goals and performance with real time KPI’s creates ISO27K compliance transparency.

• Compliance transparency creates awareness, everyone in the organization is aware of the purposes, see the big picture, understands and works in harmony for the common targets.

Page 19: Cyber observer Presentation

• While cyber security is challenged by a growing number of risks, regulation requirements and IT tools, organization executives CyberObserver gives total security and compliance picture, on-line, in a simple business language.

• CyberObserver is Unique, comprehensive and Effective Cyber management tool to deal with today’s Cyber complex challenge.

• CyberObserver uniquely delivers a real-time cyber security monitoring and ISO27K compliance status.  

 • CyberObserver ranks the ISO27K 14 Cyber Security Domains and

Sub Domains and calculate continuously real time Cyber Security Ranking Score that reflects the Cyber Security status.

Benefits

Page 20: Cyber observer Presentation

• CyberObserver gives Significant improvement in OPEX.

• CyberObserver creates clear authority and responsibility views.

• CyberObserver creates Uniform organizational language and COLLABORATION using the Infographics .

• CyberObserver is Visual, Simple, Easy Infographics management tool enables executives to easily receive information and take decisions

• CyberObserver makes ISO27K technology and demands accessible and less complicated.

Page 21: Cyber observer Presentation