SlideShare a Scribd company logo
1 of 21
Information Security Assessment Process & Technology SERVICE OFFERING
Agenda Information Security and its Importance Opportune Corporate Profile and Experience Information Security Assessment Framework Methodology Approach & Timeline Deliverables Resumes 1/4/2011 Proprietary and Confidential 2
What is Information Security? Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction in order to provide: Integrity– guarding against improper information modification or destruction, and includes ensuring information non-repudiation and authenticity.  Confidentiality– preserving authorized restrictions on access and disclosure, including means for protecting personal privacy and proprietary information.  Availability– ensuring timely and reliable access to and use of information.  *Source:  United States Code:  Title 44, 3542. Definitions (b)(1) 1/4/2011 Proprietary and Confidential 3
Why is Information Security Important? Upland man indicted for allegedly damaging computer systems used to monitor off-shore oil platforms Houston Computer Administrator Sentenced to 12 Months in Prison for Hacking Former Employer’s Computer Network Student Convicted with Using University Computer Network for Denial of Service Attacks and to Control Other Computers (via "Botnet" Zombies)  March 17, 2009 Depart. Of Justice July 6, 2010 Depart. Of Justice May 26, 2010 Depart. Of Justice Stalking and Computer Intrusion Indictment Filed In Philadelphia August 5, 2010 Depart. Of Justice * Source:  Department of Justice website 1/4/2011 Proprietary and Confidential 4
Why is Information Security Important? ,[object Object]
Investor confidence or company image was damaged?
Confidential or proprietary information was leaked or destroyed?
Operational assets were tampered with?
Production data was altered?
Bid information was compromised?
The company was fined for regulatory non-compliance?
 Who should care about Information Security?
Businesses with Industrial Control Systems (i.e. SCADA and DCS).
Businesses with personal information (i.e. bank account numbers and SSN).
Businesses with disgruntled employees.
Businesses who have to comply with government and industry regulations (i.e. NERC CIP, SOX, HIPAA and PCI DSS).Exposure of Information IT Asset Abuse Regulatory Compliance Company Policy  Data Modification / Systems Sabotage Drivers Business Operations Economic Exploitation Company Image Company Assets Legal Liability ,[object Object]
Once a quarter to once a year depending on risk tolerance and compliance requirements.HSE Information Theft Denial of Services System Intrusion /  Unauthorized Access 1/4/2011 Proprietary and Confidential 5
Opportune Corporate Profile 1/4/2011 Opportune LLP Service Offering 6
Typical Consulting Firm Number of People The Opportune Advantage Number of People The Opportune Difference 10 Yrs of Experience Typical large consulting firms staff with  larger teams of less experienced resources to provide them with experience. Value Added Opportune LLP Number of People 10 Yrs of Experience Value Through Thought Leadership Opportune’s deeply experienced staff has, on average, nearly 10 years of industry or consulting experience that they bring to each client.  This means more experienced teams delivering on the projects and challenges you are facing better, faster and more economically.  10 Yrs of Experience Because Opportune’s staff are more experienced, on average, our teams can be smaller and the resources staffed will be more experienced. 1/4/2011 Proprietary and Confidential 7
Security Case Study 1 Company Profile Client is a multi-billion dollar privately held operator of oil and gas properties throughout the United States.  They have offices in 12 states with more than 700 employees.  The client has seen tremendous growth in the last few years and expects similar growth over the coming years. Business Climate In some cases, rapid growth in the last few years has outpaced the ability of IT to keep up with them.  A recent IT Organization Review exposed potential risks for the IT systems, which could impact the client’s ability to conduct business as well as their investors. Opportune Results Opportune was engaged to execute a comprehensive IT Security Assessment of all externally facing systems, external web applications, internal servers, workstations, network devices and SCADA systems.  During the engagement Opportune identified several critical risk vulnerabilities.   A “proof-of-concept” demonstrated it was possible to access investor information, confidential information and critical systems from the Internet.  Risks were prioritized so the client could begin remediation before the assessment was completed.  Opportune provided a detailed report and overall summary of all vulnerabilities and gaps discovered during the assessment.  This process provided an objective third party analysis of the risks, as well as recommendations to mitigate each vulnerability.  Finally, Opportune provided the client with a quick hit list, short-term activities and long-term roadmap to allow the client to focus their security efforts efficiently and effectively. 1/4/2011 Proprietary and Confidential 8
Security Case Study 2 Company Profile Client is one of the largest private fee mineral and royalty owners in the United States. The client owns or controls interests, either directly or through institutionally-supported partnerships, in more than 25,000 wells. Business Climate The client felt that the significant growth of their information systems over the last few years had opened them up to potential security threats both internally and externally.  They did not know where their risks were and wanted to have them identified so they could be remediated. Opportune Results The client engaged Opportune to assist in the assessment of policies, processes and procedures, including supporting information technology used to create management reports and support operating decisions. An IT security assessment was conducted across all of the company’s IT infrastructure and application assets, including a web site that supported investors.  The engagement included vulnerability assessment, penetration testing, wireless scanning, configuration review, application testing and web application testing across all internal and external IT assets.   The engagement was conducted covertly to test the detective and reactive capabilities of the IT department and to provide “Technology Recovery” to the CIO. A “proof-of-concept” demonstrated it was possible to access investor information, confidential information and from the Internet and critical systems from the internal network. 1/4/2011 Proprietary and Confidential 9

More Related Content

What's hot

IT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptOoXair
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Programdavidcurriecia
 
Cybersecurity Employee Training
Cybersecurity Employee TrainingCybersecurity Employee Training
Cybersecurity Employee TrainingPaige Rasid
 
Information Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn HospitalInformation Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn HospitalAtlantic Training, LLC.
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationTriCorps Technologies
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@R_Yanus
 
CyberSecurity and Importance of cybersecurity
CyberSecurity and Importance of cybersecurityCyberSecurity and Importance of cybersecurity
CyberSecurity and Importance of cybersecurityHome
 
Cybersecurity Awareness Training
Cybersecurity Awareness TrainingCybersecurity Awareness Training
Cybersecurity Awareness TrainingDave Monahan
 
Information Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier UniversityInformation Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier UniversityAtlantic Training, LLC.
 
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...Edureka!
 
Security of IOT,OT And IT.pptx
Security of IOT,OT And IT.pptxSecurity of IOT,OT And IT.pptx
Security of IOT,OT And IT.pptxMohanPandey31
 

What's hot (20)

IT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.ppt
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Program
 
Cybersecurity Employee Training
Cybersecurity Employee TrainingCybersecurity Employee Training
Cybersecurity Employee Training
 
Cyber security awareness presentation nepal
Cyber security awareness presentation nepalCyber security awareness presentation nepal
Cyber security awareness presentation nepal
 
Information Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn HospitalInformation Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn Hospital
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
 
Basic Security Training for End Users
Basic Security Training for End UsersBasic Security Training for End Users
Basic Security Training for End Users
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@
 
Cyber security training
Cyber security trainingCyber security training
Cyber security training
 
CyberSecurity and Importance of cybersecurity
CyberSecurity and Importance of cybersecurityCyberSecurity and Importance of cybersecurity
CyberSecurity and Importance of cybersecurity
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 
Information security
Information securityInformation security
Information security
 
Cybersecurity Awareness Training
Cybersecurity Awareness TrainingCybersecurity Awareness Training
Cybersecurity Awareness Training
 
Information Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier UniversityInformation Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier University
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
 
Security awareness
Security awarenessSecurity awareness
Security awareness
 
Cybersecurity - Overview
Cybersecurity  - OverviewCybersecurity  - Overview
Cybersecurity - Overview
 
Security of IOT,OT And IT.pptx
Security of IOT,OT And IT.pptxSecurity of IOT,OT And IT.pptx
Security of IOT,OT And IT.pptx
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 

Viewers also liked

4.Security Assessment And Testing
4.Security Assessment And Testing4.Security Assessment And Testing
4.Security Assessment And Testingphanleson
 
Security Procedures
Security ProceduresSecurity Procedures
Security ProceduresIan Strever
 
Requirements and Security Assessment Procedure for C7 To Be PCI DSS Compliant
Requirements and Security Assessment Procedure for C7 To Be PCI DSS CompliantRequirements and Security Assessment Procedure for C7 To Be PCI DSS Compliant
Requirements and Security Assessment Procedure for C7 To Be PCI DSS CompliantOlivia Grey
 
Next generation pentest your company cannot buy
Next generation pentest your company cannot buyNext generation pentest your company cannot buy
Next generation pentest your company cannot buyVlad Styran
 
CISSP Prep: Ch 7. Security Assessment and Testing
CISSP Prep: Ch 7. Security Assessment and TestingCISSP Prep: Ch 7. Security Assessment and Testing
CISSP Prep: Ch 7. Security Assessment and TestingSam Bowne
 
Information Security Benchmarking 2015
Information Security Benchmarking 2015Information Security Benchmarking 2015
Information Security Benchmarking 2015Capgemini
 
Building an effective Information Security Roadmap
Building an effective Information Security RoadmapBuilding an effective Information Security Roadmap
Building an effective Information Security RoadmapElliott Franklin
 

Viewers also liked (7)

4.Security Assessment And Testing
4.Security Assessment And Testing4.Security Assessment And Testing
4.Security Assessment And Testing
 
Security Procedures
Security ProceduresSecurity Procedures
Security Procedures
 
Requirements and Security Assessment Procedure for C7 To Be PCI DSS Compliant
Requirements and Security Assessment Procedure for C7 To Be PCI DSS CompliantRequirements and Security Assessment Procedure for C7 To Be PCI DSS Compliant
Requirements and Security Assessment Procedure for C7 To Be PCI DSS Compliant
 
Next generation pentest your company cannot buy
Next generation pentest your company cannot buyNext generation pentest your company cannot buy
Next generation pentest your company cannot buy
 
CISSP Prep: Ch 7. Security Assessment and Testing
CISSP Prep: Ch 7. Security Assessment and TestingCISSP Prep: Ch 7. Security Assessment and Testing
CISSP Prep: Ch 7. Security Assessment and Testing
 
Information Security Benchmarking 2015
Information Security Benchmarking 2015Information Security Benchmarking 2015
Information Security Benchmarking 2015
 
Building an effective Information Security Roadmap
Building an effective Information Security RoadmapBuilding an effective Information Security Roadmap
Building an effective Information Security Roadmap
 

Similar to Information Security Assessment Process & Technology Guide

IS4799 Final Project (1)
IS4799 Final Project (1)IS4799 Final Project (1)
IS4799 Final Project (1)Mark Milburn
 
Case Study
Case StudyCase Study
Case Studylneut03
 
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...abhichowdary16
 
Final Exam Case Study (3)
Final Exam   Case Study (3)Final Exam   Case Study (3)
Final Exam Case Study (3)Kathy_67
 
Security Testing In The Secured World
Security Testing In The Secured WorldSecurity Testing In The Secured World
Security Testing In The Secured WorldJennifer Mary
 
IT General Controls Presentation at IIA Vadodara Audit Club
IT General Controls Presentation at IIA Vadodara Audit ClubIT General Controls Presentation at IIA Vadodara Audit Club
IT General Controls Presentation at IIA Vadodara Audit ClubKaushal Trivedi
 
Corporate Public Investigations
Corporate Public InvestigationsCorporate Public Investigations
Corporate Public InvestigationsCTIN
 
Proteus OCM Company Profile
Proteus OCM Company ProfileProteus OCM Company Profile
Proteus OCM Company ProfileKGanzy
 
9-Steps-Info-Sec-Whitepaper-final.pdf
9-Steps-Info-Sec-Whitepaper-final.pdf9-Steps-Info-Sec-Whitepaper-final.pdf
9-Steps-Info-Sec-Whitepaper-final.pdfSoniaCristina49
 
f6_cyber_security_and_your_agency.pdf
f6_cyber_security_and_your_agency.pdff6_cyber_security_and_your_agency.pdf
f6_cyber_security_and_your_agency.pdfSurendhar57
 
Mergers and Acquisition Security - Areas of Interest
Mergers and Acquisition Security - Areas of InterestMergers and Acquisition Security - Areas of Interest
Mergers and Acquisition Security - Areas of InterestMatthew Rosenquist
 
Dancyrityshy 1foundatioieh
Dancyrityshy 1foundatioiehDancyrityshy 1foundatioieh
Dancyrityshy 1foundatioiehAnne Starr
 
Proactive information security michael
Proactive information security michael Proactive information security michael
Proactive information security michael Priyanka Aash
 
Resume: The Complete Guide to Cybersecurity Risks and Controls
Resume: The Complete Guide to Cybersecurity Risks and ControlsResume: The Complete Guide to Cybersecurity Risks and Controls
Resume: The Complete Guide to Cybersecurity Risks and ControlsRd. R. Agung Trimanda
 
2. IntroductionYou are employed with Government Security Consu.docx
2. IntroductionYou are employed with Government Security Consu.docx2. IntroductionYou are employed with Government Security Consu.docx
2. IntroductionYou are employed with Government Security Consu.docxstandfordabbot
 
New Age Red Teaming - Enterprise Infilteration
New Age Red Teaming - Enterprise InfilterationNew Age Red Teaming - Enterprise Infilteration
New Age Red Teaming - Enterprise InfilterationShritam Bhowmick
 

Similar to Information Security Assessment Process & Technology Guide (20)

IS4799 Final Project (1)
IS4799 Final Project (1)IS4799 Final Project (1)
IS4799 Final Project (1)
 
Case Study
Case StudyCase Study
Case Study
 
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
 
Final Exam Case Study (3)
Final Exam   Case Study (3)Final Exam   Case Study (3)
Final Exam Case Study (3)
 
Security Testing In The Secured World
Security Testing In The Secured WorldSecurity Testing In The Secured World
Security Testing In The Secured World
 
IT General Controls Presentation at IIA Vadodara Audit Club
IT General Controls Presentation at IIA Vadodara Audit ClubIT General Controls Presentation at IIA Vadodara Audit Club
IT General Controls Presentation at IIA Vadodara Audit Club
 
Corporate Public Investigations
Corporate Public InvestigationsCorporate Public Investigations
Corporate Public Investigations
 
Proteus OCM Company Profile
Proteus OCM Company ProfileProteus OCM Company Profile
Proteus OCM Company Profile
 
InsiderAttack_p3.ppt
InsiderAttack_p3.pptInsiderAttack_p3.ppt
InsiderAttack_p3.ppt
 
9-Steps-Info-Sec-Whitepaper-final.pdf
9-Steps-Info-Sec-Whitepaper-final.pdf9-Steps-Info-Sec-Whitepaper-final.pdf
9-Steps-Info-Sec-Whitepaper-final.pdf
 
f6_cyber_security_and_your_agency.pdf
f6_cyber_security_and_your_agency.pdff6_cyber_security_and_your_agency.pdf
f6_cyber_security_and_your_agency.pdf
 
Information Security
Information SecurityInformation Security
Information Security
 
Eng Solutions - Capability Statement-Latest
Eng Solutions - Capability Statement-LatestEng Solutions - Capability Statement-Latest
Eng Solutions - Capability Statement-Latest
 
Mergers and Acquisition Security - Areas of Interest
Mergers and Acquisition Security - Areas of InterestMergers and Acquisition Security - Areas of Interest
Mergers and Acquisition Security - Areas of Interest
 
Dancyrityshy 1foundatioieh
Dancyrityshy 1foundatioiehDancyrityshy 1foundatioieh
Dancyrityshy 1foundatioieh
 
Proactive information security michael
Proactive information security michael Proactive information security michael
Proactive information security michael
 
Resume: The Complete Guide to Cybersecurity Risks and Controls
Resume: The Complete Guide to Cybersecurity Risks and ControlsResume: The Complete Guide to Cybersecurity Risks and Controls
Resume: The Complete Guide to Cybersecurity Risks and Controls
 
2. IntroductionYou are employed with Government Security Consu.docx
2. IntroductionYou are employed with Government Security Consu.docx2. IntroductionYou are employed with Government Security Consu.docx
2. IntroductionYou are employed with Government Security Consu.docx
 
Secure Iowa Oct 2016
Secure Iowa Oct 2016Secure Iowa Oct 2016
Secure Iowa Oct 2016
 
New Age Red Teaming - Enterprise Infilteration
New Age Red Teaming - Enterprise InfilterationNew Age Red Teaming - Enterprise Infilteration
New Age Red Teaming - Enterprise Infilteration
 

Information Security Assessment Process & Technology Guide

  • 1. Information Security Assessment Process & Technology SERVICE OFFERING
  • 2. Agenda Information Security and its Importance Opportune Corporate Profile and Experience Information Security Assessment Framework Methodology Approach & Timeline Deliverables Resumes 1/4/2011 Proprietary and Confidential 2
  • 3. What is Information Security? Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction in order to provide: Integrity– guarding against improper information modification or destruction, and includes ensuring information non-repudiation and authenticity. Confidentiality– preserving authorized restrictions on access and disclosure, including means for protecting personal privacy and proprietary information. Availability– ensuring timely and reliable access to and use of information. *Source: United States Code: Title 44, 3542. Definitions (b)(1) 1/4/2011 Proprietary and Confidential 3
  • 4. Why is Information Security Important? Upland man indicted for allegedly damaging computer systems used to monitor off-shore oil platforms Houston Computer Administrator Sentenced to 12 Months in Prison for Hacking Former Employer’s Computer Network Student Convicted with Using University Computer Network for Denial of Service Attacks and to Control Other Computers (via "Botnet" Zombies) March 17, 2009 Depart. Of Justice July 6, 2010 Depart. Of Justice May 26, 2010 Depart. Of Justice Stalking and Computer Intrusion Indictment Filed In Philadelphia August 5, 2010 Depart. Of Justice * Source: Department of Justice website 1/4/2011 Proprietary and Confidential 4
  • 5.
  • 6. Investor confidence or company image was damaged?
  • 7. Confidential or proprietary information was leaked or destroyed?
  • 8. Operational assets were tampered with?
  • 10. Bid information was compromised?
  • 11. The company was fined for regulatory non-compliance?
  • 12. Who should care about Information Security?
  • 13. Businesses with Industrial Control Systems (i.e. SCADA and DCS).
  • 14. Businesses with personal information (i.e. bank account numbers and SSN).
  • 16.
  • 17. Once a quarter to once a year depending on risk tolerance and compliance requirements.HSE Information Theft Denial of Services System Intrusion / Unauthorized Access 1/4/2011 Proprietary and Confidential 5
  • 18. Opportune Corporate Profile 1/4/2011 Opportune LLP Service Offering 6
  • 19. Typical Consulting Firm Number of People The Opportune Advantage Number of People The Opportune Difference 10 Yrs of Experience Typical large consulting firms staff with larger teams of less experienced resources to provide them with experience. Value Added Opportune LLP Number of People 10 Yrs of Experience Value Through Thought Leadership Opportune’s deeply experienced staff has, on average, nearly 10 years of industry or consulting experience that they bring to each client. This means more experienced teams delivering on the projects and challenges you are facing better, faster and more economically. 10 Yrs of Experience Because Opportune’s staff are more experienced, on average, our teams can be smaller and the resources staffed will be more experienced. 1/4/2011 Proprietary and Confidential 7
  • 20. Security Case Study 1 Company Profile Client is a multi-billion dollar privately held operator of oil and gas properties throughout the United States. They have offices in 12 states with more than 700 employees. The client has seen tremendous growth in the last few years and expects similar growth over the coming years. Business Climate In some cases, rapid growth in the last few years has outpaced the ability of IT to keep up with them. A recent IT Organization Review exposed potential risks for the IT systems, which could impact the client’s ability to conduct business as well as their investors. Opportune Results Opportune was engaged to execute a comprehensive IT Security Assessment of all externally facing systems, external web applications, internal servers, workstations, network devices and SCADA systems. During the engagement Opportune identified several critical risk vulnerabilities. A “proof-of-concept” demonstrated it was possible to access investor information, confidential information and critical systems from the Internet. Risks were prioritized so the client could begin remediation before the assessment was completed. Opportune provided a detailed report and overall summary of all vulnerabilities and gaps discovered during the assessment. This process provided an objective third party analysis of the risks, as well as recommendations to mitigate each vulnerability. Finally, Opportune provided the client with a quick hit list, short-term activities and long-term roadmap to allow the client to focus their security efforts efficiently and effectively. 1/4/2011 Proprietary and Confidential 8
  • 21. Security Case Study 2 Company Profile Client is one of the largest private fee mineral and royalty owners in the United States. The client owns or controls interests, either directly or through institutionally-supported partnerships, in more than 25,000 wells. Business Climate The client felt that the significant growth of their information systems over the last few years had opened them up to potential security threats both internally and externally. They did not know where their risks were and wanted to have them identified so they could be remediated. Opportune Results The client engaged Opportune to assist in the assessment of policies, processes and procedures, including supporting information technology used to create management reports and support operating decisions. An IT security assessment was conducted across all of the company’s IT infrastructure and application assets, including a web site that supported investors. The engagement included vulnerability assessment, penetration testing, wireless scanning, configuration review, application testing and web application testing across all internal and external IT assets. The engagement was conducted covertly to test the detective and reactive capabilities of the IT department and to provide “Technology Recovery” to the CIO. A “proof-of-concept” demonstrated it was possible to access investor information, confidential information and from the Internet and critical systems from the internal network. 1/4/2011 Proprietary and Confidential 9
  • 22.
  • 23. Foundation - Theframework’s foundation is the consideration of both the probability and likelihood of undesired events.
  • 24. Assessment - When identifying and quantifying vulnerabilities to prioritize the resulting risk, the framework helps ensure the client will focus on mitigating the most critical items first.
  • 25. Leverage - Additionally, use of our framework ensures that clients will be using a repeatable process that can be leveraged over time, well beyond the initial assessment.
  • 29.
  • 30. Scan
  • 32.
  • 39. PrioritizeRemediate Evaluate 1/4/2011 Proprietary and Confidential 10
  • 40. Information Security Assessment Methodology Opportune’s Information Security Assessment Methodology provides fast, ACTIONABLE results. Confirm Assessment Scope Scope Review Security Policies Conduct External Vulnerability Scans Conduct Internal Vulnerability Scans Conduct Web Application Scans Conduct Wireless Scans Conduct Modem Scans Review Physical Security Measures (i.e. data center access) Discover Critical Vulnerability Remediation Y Critical Issues? Evaluate Conduct Gap Analysis Against Best Practices and Industry Regulations Execute Ethical Hacking/ Penetration Tests Analyze Identified Vulnerabilities Review Network, Server and Other OS Configuration Assess Risk N N Resolved? Remediate (Planning) Y Document Remediation Items and Recommendations Develop Remediation Roadmap Present Final Report and Oral Presentation 1/4/2011 Proprietary and Confidential 11
  • 41. Approach & Timeline This is a typical timeline for an Opportune Information Security Assessment project. Some of these activities may adjust based on the outcome of the scope phase. Project Kick Off Scope Discover Evaluate Project Delivery Remediate (Plan) Status Checkpoint Management Update Meeting Proprietary and Confidential 1/4/2011 12
  • 42. Approach – Scope Opportune will leverage similar techniques an attacker would use to compromise information and systems. To ensure a comprehensive assessment is performed, multiple services are utilized to provide an overall understanding of potential exposure and risk. 1/4/2011 Proprietary and Confidential 13
  • 43.
  • 44. Recommend strategic and detailed technology and process adjustments that will help optimize security currently deployed by the organization as well as recommend additional solutions. 1/4/2011 Proprietary and Confidential 14
  • 45. Approach - Administrative Security Assessment Opportune will evaluate the security policies, procedures, processes, training, capabilities and awareness within the organization. 1/4/2011 Proprietary and Confidential 15
  • 46. Approach - Physical Security Assessment Opportune will review key areas where IT assets reside by evaluating the overall Physical Security of locations such as: Data Centers and Network Closets. 1/4/2011 Proprietary and Confidential 16
  • 47. Opportune will analyze and prioritize vulnerabilities using a risk based approach. Critical items can be acted on during the engagement to provide the most benefit to the organization. Approach - Prioritization Risks Are categorized into four levels. 1/4/2011 Proprietary and Confidential 17
  • 48. Deliverables The following deliverables will be supplied upon conclusion of the assessment: Executive summary report, Including: Summary of Scope Approach and Methodology High level Observations and Findings Quick Hit List Short-term and Strategic Recommendations Detailed report, including: Methodology Leveraged Positive Security Aspects Identified Overall Risk Rating Detailed Technical Vulnerability Findings Assignment of a Risk Rating for Each Vulnerability Supporting Exhibits For Identified Vulnerabilities Detailed Technical Remediation Steps Oral presentation 1/4/2011 Proprietary and Confidential 18
  • 49. Appendix A - Penetration Testing Approach Leveraging information gathered from the vulnerability assessment, Opportune will attempt to gain access to the systems by exploiting verified vulnerabilities. Opportune will utilize similar attack methods and vectors that malicious attackers might use to compromise systems and information. Activities: The result of the Penetration Testing will provide the information necessary to perform a risk assessment and prioritized remediation roadmap. 1/4/2011 Proprietary and Confidential 19
  • 50.
  • 51. Scanning the user session lifecycle to identify vulnerabilities.
  • 52. Exploitation of vulnerabilities to attempt to access data and/or systems.
  • 53. Password cracking to try and gain access with elevated privileges on target devices.Key Assessment Areas 1/4/2011 Proprietary and Confidential 20
  • 54. Appendix A - Wireless Security Scanning Approach Wireless access points will be mapped and their authentication mechanisms identified if possible. Once the access points have been identified, the access points and associated networks will be exploited using discovered vulnerabilities. Activities: 1/4/2011 Proprietary and Confidential 21