lewan technology jeff wilkinson cissp · 2018-03-28 · 6. check it 5. fix it 7. avoid it we manage...
TRANSCRIPT
![Page 1: Lewan Technology Jeff Wilkinson CISSP · 2018-03-28 · 6. Check it 5. Fix it 7. Avoid it We manage your technology, so you can manage your business. THREE PILLARS OF SECURITY •](https://reader034.vdocuments.us/reader034/viewer/2022042300/5ecb1a6c0918266ede1c59c0/html5/thumbnails/1.jpg)
We manage your technology, so you can manage your business.
REAL AND RELEVANT SECURITY
Lewan Technology
Jeff Wilkinson
CISSP
We manage your technology, so you can manage your business.
WHAT IS AT RISK?
![Page 2: Lewan Technology Jeff Wilkinson CISSP · 2018-03-28 · 6. Check it 5. Fix it 7. Avoid it We manage your technology, so you can manage your business. THREE PILLARS OF SECURITY •](https://reader034.vdocuments.us/reader034/viewer/2022042300/5ecb1a6c0918266ede1c59c0/html5/thumbnails/2.jpg)
We manage your technology, so you can manage your business.
DO YOU KNOW YOUR THREAT?
• Nation state
• Organized CrimeExternal
• Environmental
• Information Technology InfrastructureInternal
• Disgruntled
• UnknowningEmployee
We manage your technology, so you can manage your business.
DO YOU KNOW YOUR ASSETS?
Hardware
Company
BYOD
Software
Company owned
SAAS
Data
Intellectual Property
PII/PHI/CC
![Page 3: Lewan Technology Jeff Wilkinson CISSP · 2018-03-28 · 6. Check it 5. Fix it 7. Avoid it We manage your technology, so you can manage your business. THREE PILLARS OF SECURITY •](https://reader034.vdocuments.us/reader034/viewer/2022042300/5ecb1a6c0918266ede1c59c0/html5/thumbnails/3.jpg)
We manage your technology, so you can manage your business.
DO YOU KNOW YOUR VULNERABILITIES?
External
• Web site coding
• Misconfigured equipment
• unpatched
Internal
• Patching
• Unknown applications
• BYOD
Employee
• Training?
• Fraud
• Knowingly exfiltrating Intellectual Property
We manage your technology, so you can manage your business.
THINGS TO THINK ABOUT?
• Do you have firewalls?• Are they Application firewalls?
• Are they installed to any framework or industry standard?
• Do you control internet access?
• Is your network segmented or flat?
• Do you patch more than just Microsoft?
• Do you have any monitoring capability?
• Are you doing end user security training/validation?
![Page 4: Lewan Technology Jeff Wilkinson CISSP · 2018-03-28 · 6. Check it 5. Fix it 7. Avoid it We manage your technology, so you can manage your business. THREE PILLARS OF SECURITY •](https://reader034.vdocuments.us/reader034/viewer/2022042300/5ecb1a6c0918266ede1c59c0/html5/thumbnails/4.jpg)
We manage your technology, so you can manage your business.
WHAT FACTORS ARE LIMITING YOU?
• Lack of management support?
• Budget restraints?
• Lack of Personnel and correct skills?
• Lack of Visibility to what’s on your network?
• Alert fatigue?
We manage your technology, so you can manage your business.
TRENDS AND REAL STORIES
• Experian and rippling effect
![Page 5: Lewan Technology Jeff Wilkinson CISSP · 2018-03-28 · 6. Check it 5. Fix it 7. Avoid it We manage your technology, so you can manage your business. THREE PILLARS OF SECURITY •](https://reader034.vdocuments.us/reader034/viewer/2022042300/5ecb1a6c0918266ede1c59c0/html5/thumbnails/5.jpg)
We manage your technology, so you can manage your business.
EXAMPLE RISK MANAGEMENT PROGRAM
Risk Management
1. What do I have? 2. How Scary is it? 3. Should I fix it?
4. Write it down
5. Fix it6. Check it
7. Avoid it
We manage your technology, so you can manage your business.
THREE PILLARS OF SECURITY
• Defend• Activities or equipment that defend your IT services by either
eliminating vulnerabilities or actively blocking malicious activities that are known.
• Detect• Detection and analysis of possible malicious activity. This can
lead to defensive action
• Comply• Activity and analysis required by Government Compliance
requirements. These can further heighten the security awareness/stance of an organization
![Page 6: Lewan Technology Jeff Wilkinson CISSP · 2018-03-28 · 6. Check it 5. Fix it 7. Avoid it We manage your technology, so you can manage your business. THREE PILLARS OF SECURITY •](https://reader034.vdocuments.us/reader034/viewer/2022042300/5ecb1a6c0918266ede1c59c0/html5/thumbnails/6.jpg)
We manage your technology, so you can manage your business.
PILLAR 1: DEFEND
• Defensive activities• Operational Patching• Endpoint Protection• Firewall Management• Email Security• URL Protection• Intrusion Protection Service• Network Access Control
• Identity, 2 Factor, controlled access to network
We manage your technology, so you can manage your business.
PILLAR 2: DETECT
• Detection activities
• Incident response assistance
• Network Intrusion/Breach Detection
• Bot-Net Detection
• SIEM (Servers, Desktops, Network Devices)
• Host Intrusion Detection
• Asset Discovery (know what’s on your network)
![Page 7: Lewan Technology Jeff Wilkinson CISSP · 2018-03-28 · 6. Check it 5. Fix it 7. Avoid it We manage your technology, so you can manage your business. THREE PILLARS OF SECURITY •](https://reader034.vdocuments.us/reader034/viewer/2022042300/5ecb1a6c0918266ede1c59c0/html5/thumbnails/7.jpg)
We manage your technology, so you can manage your business.
PILLAR 3: COMPLY
• Services that address compliance needs
• Asset Management
• Vulnerability Management
• Log Management/Forensics
• Compliance Reporting (PCI, HIPAA, FIIEC, ISO
27001, etc.)
• File Change Monitoring
We manage your technology, so you can manage your business.
MATURITY PYRAMID
Security Framework
SIEM – Some Policies –Processes and Procedures
Incident Response Plan Dedicated Security Staff
Limited defined Processes and Procedures –Centralized Logging – Advanced Malware
Protection – Breach Detection
Application Firewall – Intrusion Protection Service – Network Access Control – Data Loss Protection – User Awareness
Training
Firewall – URL Filtering – Email filtering – Antivirus
![Page 8: Lewan Technology Jeff Wilkinson CISSP · 2018-03-28 · 6. Check it 5. Fix it 7. Avoid it We manage your technology, so you can manage your business. THREE PILLARS OF SECURITY •](https://reader034.vdocuments.us/reader034/viewer/2022042300/5ecb1a6c0918266ede1c59c0/html5/thumbnails/8.jpg)
We manage your technology, so you can manage your business.
TAKE HOME QUESTIONS
• Who is accountable/responsible:• Risk Management?
• Data Classification
• Infrastructure Security
• Incident Response
• Do you have and follow Policies/Procedures/Processes?
• What makes your company special? Are you protecting that critical asset?