SlideShare une entreprise Scribd logo
1  sur  19
REA CYBER SERVICES & DATA PROTECTION
MSP V. MSSP
Jun
2021
Shawn M Richardson, US Army (Ret)
Principal, Cyber Services | Rea & Associates, Inc.
shawn.richardson@reacpa.com
O: 234-249-3478 | M: 614.554.3450
CONFIDENTIAL
2
Presenters
Shawn M Richardson, US Army (Ret)
Principal, Cyber Services Segment
Dublin, Wooster offices
Director of MSIT, Cyber Security
Services
Trusted Advisor, Speaker, Thought
Leader
3
Presenters
Jorn Baxstrom, Manager
Manager, Managed Security & IT
Services (MSIT)
Wooster Office
Trusted Advisor, IT Services Veteran
AGENDA
 MSP vs MSSP
 Mission and Purpose
 CIA Triad
 What are the differences?
 What is a SIEM & MDR?
 How They Work Together
 Managed Security & Information Technology Services (MSIT)
 Intro to MSSP + TOA = MSIT | Security First
 Conclusion
 Questions
4
CONFIDENTIAL
REA CYBER SERVICES IMPACT STATEMENT
As Rea Ambassadors, quality counts. We all can
take ownership of this cyber epidemic by showing
others you care and let your listening fuel action.
Share your ideas and vision with not just your
clients but also your colleagues. Never stop
learning. Our learning will drive change within the
world of Cyber and protect our clients networks
from the ever-evolving treat-landscape.
5
CONFIDENTIAL
MSP V. MSSP | MISSION & PURPOSE
MSP – Managed Services Provider
 Managed Service Providers are the practice of outsourcing the
responsibility for maintaining, and anticipating need for, a
range of processes and functions of IT in order to maintain
operations (keep the lights on), improve efficiencies, and cut
expenses. Availability
6
CONFIDENTIAL
MSP V. MSSP | MISSION & PURPOSE
MSSP – Managed Security Services Provider
 A managed security service providers sole focus is to detect
and protect against ongoing threats. A firm providing
continuous managed security services coupled with best-in-
class information technology is a “Trust Oriented Approach”.
 Common services include continuous monitoring, threat
hunting, managed firewalls, vulnerability scanning and
manage/detect/respond (MDR) services to protect enterprise
data, identities, and reduce overall cost to the business.
Confidentiality & Integrity
7
CONFIDENTIAL
MSP V. MSSP | CIA TRIAD
8
CONFIDENTIAL
Confidentiality:
Protect sensitive, private
information from unauthorized
access. Confidentiality is
dependent on being able to
define and enforce certain access
levels for information organized
by who needs access to the
information and sensitivity of the
information.
Integrity:
Designed to protect data from
deletion or modification from
any unauthorized party and
ensures when an authorized
person makes a change that
should not have been made the
damage can be reversed.
Availability:
Availability of systems and
computing resources that have
architectures specifically
designed to improve
availability. This covers
hardware failures, upgrades or
power outages, or managing
several network connections to
route around various network
outages.
Principles of
Information Security
MSP V. MSSP – WHAT ARE THE DIFFERENCES? 9
Management,
Implementations, &
Outsourcing
Value Added Resellers
(VAR)
Selling Products
Stop Breaches
Continuous Security
Monitoring
CONFIDENTIAL
Managed Services Provider
MSP V. MSSP – WHAT ARE THE DIFFERENCES? 10
Stop Breaches
Continuous Security
Monitoring
CONFIDENTIAL
Managed Security Services Provider
WHAT IS A SIEM? 11
SIEM stands for Security
Information and Event
Management. SIEM
products provide real-
time analysis of security
alerts generated by
applications and network
hardware.
Security software
packages ranging from
Log Management
Systems to Security Log /
Event Management,
Security Information
Management, and
Security Event
correlation. These
features are combined
for 360-degree
protection. CONFIDENTIAL
WHAT IS MDR? 12
MDR stands for
Managed
Detection and
Response (MDR),
which is a
managed
cybersecurity
service that
generally
provides a 24/7
service for threat
detection,
response, and
remediation.
CONFIDENTIAL
MSSP + TOA = MSIT
Trust Oriented Approach
Building trust starts with leading with security first, reducing risk
to the business by:
 Learning the business to grow them safely
 Performing annual risk assessments
 Building mature cybersecurity programs
 Continuous 24x7x365 monitoring
This approach improves the overall security “health” within
businesses and allows for growth safely without compromise.
13
CONFIDENTIAL
MSSP + TOA = MSIT (CONT)
The digital transformation has evolved rapidly over the
last two decades. This transition has forced businesses to
find ways to cut costs and improve efficiencies. In most
cases, MSPs focus on availability, not confidentiality or
the integrity of data, systems, and networks. Additionally
for the last decade, security providers have been selling
solutions without understanding the business FIRST.
Then analyzing the most important assets within their
business; the data.
14
CONFIDENTIAL
MANAGED SECURITY & IT SERVICES = MSIT
15
Management,
Implementations, &
Outsourcing
Value Added Resellers
(VAR)
Selling Products
(As needed)
Stop Breaches
(MDR)
Continuous Security
Monitoring
(SIEM)
CONFIDENTIAL
Rea Cyber Services is
‘security focused’
working together
seamlessly with
governance, risk, and
compliance combining
best-in-class IT with
layered security and
continuous monitoring.
16
CONFIDENTIAL
CONCLUSION
As Rea Ambassadors, quality counts. We all
can take ownership of this epidemic by
showing others you care and let your listening
fuel action. Share your ideas with not just
your clients but also your colleagues. Invest
in your family, your community and your
future. Never stop learning.
17
CONFIDENTIAL
18
Conclusion
CONFIDENTIAL
Shawn Richardson
Principal & Director
Dublin & Wooster Offices
Direct Line
234.249.3478
shawn.richardson@reacpa.com
Jorn Baxstrom
Manager
Wooster Office
Direct Line
234.249.3451
Jorn.baxstrom@reacpa.com
19
Conclusion
CONFIDENTIAL
Thank you!
Questions???

Contenu connexe

Tendances

Business Continuity, Data Privacy, and Information Security: How do they link?
Business Continuity, Data Privacy, and Information Security: How do they link?Business Continuity, Data Privacy, and Information Security: How do they link?
Business Continuity, Data Privacy, and Information Security: How do they link?
PECB
 
Accountability for Corporate Cybersecurity - Who Owns What?
Accountability for Corporate Cybersecurity - Who Owns What?Accountability for Corporate Cybersecurity - Who Owns What?
Accountability for Corporate Cybersecurity - Who Owns What?
Henry Draughon
 
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
PECB
 

Tendances (20)

Cybersecurity solution-guide
Cybersecurity solution-guideCybersecurity solution-guide
Cybersecurity solution-guide
 
2016 Scalar Security Study: The Cyber Security Readiness of Canadian Organiza...
2016 Scalar Security Study: The Cyber Security Readiness of Canadian Organiza...2016 Scalar Security Study: The Cyber Security Readiness of Canadian Organiza...
2016 Scalar Security Study: The Cyber Security Readiness of Canadian Organiza...
 
Digital Transformation and Security for the Modern Business Part 1 – Finance
Digital Transformation and Security for the Modern Business Part 1 – FinanceDigital Transformation and Security for the Modern Business Part 1 – Finance
Digital Transformation and Security for the Modern Business Part 1 – Finance
 
Security - A Digital Transformation Enabler
Security - A Digital Transformation EnablerSecurity - A Digital Transformation Enabler
Security - A Digital Transformation Enabler
 
Scalar security study2017_slideshare_rev[1]
Scalar security study2017_slideshare_rev[1]Scalar security study2017_slideshare_rev[1]
Scalar security study2017_slideshare_rev[1]
 
Kevin Watkins, Enterprise Security Architect at BAT - BAT’s Managed Security ...
Kevin Watkins, Enterprise Security Architect at BAT - BAT’s Managed Security ...Kevin Watkins, Enterprise Security Architect at BAT - BAT’s Managed Security ...
Kevin Watkins, Enterprise Security Architect at BAT - BAT’s Managed Security ...
 
Business Continuity, Data Privacy, and Information Security: How do they link?
Business Continuity, Data Privacy, and Information Security: How do they link?Business Continuity, Data Privacy, and Information Security: How do they link?
Business Continuity, Data Privacy, and Information Security: How do they link?
 
Aujas Cyber Security
Aujas Cyber SecurityAujas Cyber Security
Aujas Cyber Security
 
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA Regulation
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA RegulationTop 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA Regulation
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA Regulation
 
Accountability for Corporate Cybersecurity - Who Owns What?
Accountability for Corporate Cybersecurity - Who Owns What?Accountability for Corporate Cybersecurity - Who Owns What?
Accountability for Corporate Cybersecurity - Who Owns What?
 
Protecting the "Crown Jewels" by Henrik Bodskov, IBM
Protecting the "Crown Jewels" by Henrik Bodskov, IBMProtecting the "Crown Jewels" by Henrik Bodskov, IBM
Protecting the "Crown Jewels" by Henrik Bodskov, IBM
 
Securing Your "Crown Jewels": Do You Have What it Takes?
Securing Your "Crown Jewels": Do You Have What it Takes?Securing Your "Crown Jewels": Do You Have What it Takes?
Securing Your "Crown Jewels": Do You Have What it Takes?
 
Global Cybersecurity Consulting Firm
Global Cybersecurity Consulting FirmGlobal Cybersecurity Consulting Firm
Global Cybersecurity Consulting Firm
 
5 Steps to Securing Your Company's Crown Jewels
5 Steps to Securing Your Company's Crown Jewels5 Steps to Securing Your Company's Crown Jewels
5 Steps to Securing Your Company's Crown Jewels
 
Cyber Security in the Digital Age: A Survey and its Analysis
Cyber Security in the Digital Age: A Survey and its AnalysisCyber Security in the Digital Age: A Survey and its Analysis
Cyber Security in the Digital Age: A Survey and its Analysis
 
Finding and Protecting Your Organizations Crown Jewels
Finding and Protecting Your Organizations Crown JewelsFinding and Protecting Your Organizations Crown Jewels
Finding and Protecting Your Organizations Crown Jewels
 
How to Build a Successful Cybersecurity Program?
How to Build a Successful Cybersecurity Program?How to Build a Successful Cybersecurity Program?
How to Build a Successful Cybersecurity Program?
 
Integrating Cybersecurity into Supply Chain Risk Management
Integrating Cybersecurity into Supply Chain Risk ManagementIntegrating Cybersecurity into Supply Chain Risk Management
Integrating Cybersecurity into Supply Chain Risk Management
 
Digital IQ in managing risk and cyber threats
Digital IQ in managing risk and cyber threatsDigital IQ in managing risk and cyber threats
Digital IQ in managing risk and cyber threats
 
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
 

Similaire à [ON-DEMAND WEBINAR] Managed Service Providers vs Managed Security Service Providers

Infopercept - Managed Security Services Providers
Infopercept - Managed Security Services ProvidersInfopercept - Managed Security Services Providers
Infopercept - Managed Security Services Providers
Infopercept
 
IT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSALIT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSAL
CYBER SENSE
 
Too Small to Get Hacked? Think Again (Webinar)
Too Small to Get Hacked? Think Again (Webinar)Too Small to Get Hacked? Think Again (Webinar)
Too Small to Get Hacked? Think Again (Webinar)
OnRamp
 

Similaire à [ON-DEMAND WEBINAR] Managed Service Providers vs Managed Security Service Providers (20)

Information Security.pdf Information Security
Information Security.pdf Information SecurityInformation Security.pdf Information Security
Information Security.pdf Information Security
 
Did You Know Managed IT Services Can Enhance Data Security?
Did You Know Managed IT Services Can Enhance Data Security?Did You Know Managed IT Services Can Enhance Data Security?
Did You Know Managed IT Services Can Enhance Data Security?
 
What MSPs Can and Cant Do For You in 2022 Whitepaper by Protected Harbor
What MSPs Can and Cant Do For You in 2022 Whitepaper by Protected HarborWhat MSPs Can and Cant Do For You in 2022 Whitepaper by Protected Harbor
What MSPs Can and Cant Do For You in 2022 Whitepaper by Protected Harbor
 
Crucial Layers_ Exploring the Depth of Enterprise Cyber Security.pdf
Crucial Layers_ Exploring the Depth of Enterprise Cyber Security.pdfCrucial Layers_ Exploring the Depth of Enterprise Cyber Security.pdf
Crucial Layers_ Exploring the Depth of Enterprise Cyber Security.pdf
 
6 Steps to Bringing a Security Offering to Market
6 Steps to Bringing a Security Offering to Market6 Steps to Bringing a Security Offering to Market
6 Steps to Bringing a Security Offering to Market
 
Mobility Security - A Business-Centric Approach
Mobility Security - A Business-Centric ApproachMobility Security - A Business-Centric Approach
Mobility Security - A Business-Centric Approach
 
BlueVoyant: 7 Experts Share Key Questions To Ask When Evaluating Providers
BlueVoyant: 7 Experts Share Key Questions To Ask When Evaluating ProvidersBlueVoyant: 7 Experts Share Key Questions To Ask When Evaluating Providers
BlueVoyant: 7 Experts Share Key Questions To Ask When Evaluating Providers
 
4 Key Benefits of Managed IT Security Services – Devlabs Global
4 Key Benefits of Managed IT Security Services – Devlabs Global4 Key Benefits of Managed IT Security Services – Devlabs Global
4 Key Benefits of Managed IT Security Services – Devlabs Global
 
Security Operations Center
Security Operations CenterSecurity Operations Center
Security Operations Center
 
What is a Managed Service Provider (MSP) & What Does They Do.pdf
What is a Managed Service Provider (MSP) & What Does They Do.pdfWhat is a Managed Service Provider (MSP) & What Does They Do.pdf
What is a Managed Service Provider (MSP) & What Does They Do.pdf
 
Mastering IT - A Guide to Managed Services Excellence.pdf
Mastering IT - A Guide to Managed Services Excellence.pdfMastering IT - A Guide to Managed Services Excellence.pdf
Mastering IT - A Guide to Managed Services Excellence.pdf
 
NUS-ISS Learning Day 2019-Architecting security in the digital age
NUS-ISS Learning Day 2019-Architecting security in the digital ageNUS-ISS Learning Day 2019-Architecting security in the digital age
NUS-ISS Learning Day 2019-Architecting security in the digital age
 
Business Potential with Managed IT Services and Sustainable Growth at HEX64.docx
Business Potential with Managed IT Services and Sustainable Growth at HEX64.docxBusiness Potential with Managed IT Services and Sustainable Growth at HEX64.docx
Business Potential with Managed IT Services and Sustainable Growth at HEX64.docx
 
Infopercept - Managed Security Services Providers
Infopercept - Managed Security Services ProvidersInfopercept - Managed Security Services Providers
Infopercept - Managed Security Services Providers
 
IT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSALIT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSAL
 
Security and Risk Mitigation
Security and Risk MitigationSecurity and Risk Mitigation
Security and Risk Mitigation
 
Crucial Steps to Cyber Resilience: Understanding the Role of Security Services
Crucial Steps to Cyber Resilience: Understanding the Role of Security ServicesCrucial Steps to Cyber Resilience: Understanding the Role of Security Services
Crucial Steps to Cyber Resilience: Understanding the Role of Security Services
 
Too Small to Get Hacked? Think Again (Webinar)
Too Small to Get Hacked? Think Again (Webinar)Too Small to Get Hacked? Think Again (Webinar)
Too Small to Get Hacked? Think Again (Webinar)
 
The Three Major Goals of Cybersecurity for Business Organizations-precise tes...
The Three Major Goals of Cybersecurity for Business Organizations-precise tes...The Three Major Goals of Cybersecurity for Business Organizations-precise tes...
The Three Major Goals of Cybersecurity for Business Organizations-precise tes...
 
Distribution: Industries we Serve
Distribution: Industries we ServeDistribution: Industries we Serve
Distribution: Industries we Serve
 

Plus de Rea & Associates

[ON-DEMAND WEBINAR] COVID 2.0 | Tips To Address New Cases, Mask Mandates, & V...
[ON-DEMAND WEBINAR] COVID 2.0 | Tips To Address New Cases, Mask Mandates, & V...[ON-DEMAND WEBINAR] COVID 2.0 | Tips To Address New Cases, Mask Mandates, & V...
[ON-DEMAND WEBINAR] COVID 2.0 | Tips To Address New Cases, Mask Mandates, & V...
Rea & Associates
 
[ON-DEMAND WEBINAR] Revealing The State & Local Tax Considerations Of A Remot...
[ON-DEMAND WEBINAR] Revealing The State & Local Tax Considerations Of A Remot...[ON-DEMAND WEBINAR] Revealing The State & Local Tax Considerations Of A Remot...
[ON-DEMAND WEBINAR] Revealing The State & Local Tax Considerations Of A Remot...
Rea & Associates
 
[ON-DEMAND WEBINAR] How To Hire More Employees & Keep Them Happy: Tips To Att...
[ON-DEMAND WEBINAR] How To Hire More Employees & Keep Them Happy: Tips To Att...[ON-DEMAND WEBINAR] How To Hire More Employees & Keep Them Happy: Tips To Att...
[ON-DEMAND WEBINAR] How To Hire More Employees & Keep Them Happy: Tips To Att...
Rea & Associates
 
[ON-DEMAND WEBINAR] CPA Pros Prepare For The 2020 Medicaid School Program (MSP)
[ON-DEMAND WEBINAR] CPA Pros Prepare For The 2020 Medicaid School Program (MSP)[ON-DEMAND WEBINAR] CPA Pros Prepare For The 2020 Medicaid School Program (MSP)
[ON-DEMAND WEBINAR] CPA Pros Prepare For The 2020 Medicaid School Program (MSP)
Rea & Associates
 
[ON-DEMAND RECORDING] Deep Impact: Is Your Manufacturing Company On A Collisi...
[ON-DEMAND RECORDING] Deep Impact: Is Your Manufacturing Company On A Collisi...[ON-DEMAND RECORDING] Deep Impact: Is Your Manufacturing Company On A Collisi...
[ON-DEMAND RECORDING] Deep Impact: Is Your Manufacturing Company On A Collisi...
Rea & Associates
 
[ON-DEMAND WEBINAR] Security Wars: Episode 2 | CMMC: Return of The Process Fo...
[ON-DEMAND WEBINAR] Security Wars: Episode 2 | CMMC: Return of The Process Fo...[ON-DEMAND WEBINAR] Security Wars: Episode 2 | CMMC: Return of The Process Fo...
[ON-DEMAND WEBINAR] Security Wars: Episode 2 | CMMC: Return of The Process Fo...
Rea & Associates
 
[ON-DEMAND WEBINAR] Construction Companies: Manage Cyber Risk Exposure & Prev...
[ON-DEMAND WEBINAR] Construction Companies: Manage Cyber Risk Exposure & Prev...[ON-DEMAND WEBINAR] Construction Companies: Manage Cyber Risk Exposure & Prev...
[ON-DEMAND WEBINAR] Construction Companies: Manage Cyber Risk Exposure & Prev...
Rea & Associates
 
[ON-DEMAND WEBINAR] Covid Vaccine & HIPAA: Can Employers To Receive The COVID...
[ON-DEMAND WEBINAR] Covid Vaccine & HIPAA: Can Employers To Receive The COVID...[ON-DEMAND WEBINAR] Covid Vaccine & HIPAA: Can Employers To Receive The COVID...
[ON-DEMAND WEBINAR] Covid Vaccine & HIPAA: Can Employers To Receive The COVID...
Rea & Associates
 
[ON-DEMAND RECORDING] Managing Remote Employees, HR Policies, Sales Tax, & Ot...
[ON-DEMAND RECORDING] Managing Remote Employees, HR Policies, Sales Tax, & Ot...[ON-DEMAND RECORDING] Managing Remote Employees, HR Policies, Sales Tax, & Ot...
[ON-DEMAND RECORDING] Managing Remote Employees, HR Policies, Sales Tax, & Ot...
Rea & Associates
 

Plus de Rea & Associates (20)

2022 Rea & Associates' Cybersecurity Conference
2022 Rea & Associates' Cybersecurity Conference 2022 Rea & Associates' Cybersecurity Conference
2022 Rea & Associates' Cybersecurity Conference
 
Rea & Associates' Manufacturing Day 2022
Rea & Associates' Manufacturing Day 2022Rea & Associates' Manufacturing Day 2022
Rea & Associates' Manufacturing Day 2022
 
Rea & Associates - 4th Annual Construction Kickoff
Rea & Associates - 4th Annual Construction KickoffRea & Associates - 4th Annual Construction Kickoff
Rea & Associates - 4th Annual Construction Kickoff
 
Rea Manufacturing Day 2021
Rea Manufacturing Day 2021Rea Manufacturing Day 2021
Rea Manufacturing Day 2021
 
HR Compliance & Insurance Benefit Perspectives: What Employers Should Be Awar...
HR Compliance & Insurance Benefit Perspectives: What Employers Should Be Awar...HR Compliance & Insurance Benefit Perspectives: What Employers Should Be Awar...
HR Compliance & Insurance Benefit Perspectives: What Employers Should Be Awar...
 
LIVE EVENT - 3rd Annual Fall Construction Risk Update - September 30
LIVE EVENT - 3rd Annual Fall Construction Risk Update - September 30LIVE EVENT - 3rd Annual Fall Construction Risk Update - September 30
LIVE EVENT - 3rd Annual Fall Construction Risk Update - September 30
 
[ON-DEMAND WEBINAR] COVID 2.0 | Tips To Address New Cases, Mask Mandates, & V...
[ON-DEMAND WEBINAR] COVID 2.0 | Tips To Address New Cases, Mask Mandates, & V...[ON-DEMAND WEBINAR] COVID 2.0 | Tips To Address New Cases, Mask Mandates, & V...
[ON-DEMAND WEBINAR] COVID 2.0 | Tips To Address New Cases, Mask Mandates, & V...
 
[ON-DEMAND WEBINAR] Revealing The State & Local Tax Considerations Of A Remot...
[ON-DEMAND WEBINAR] Revealing The State & Local Tax Considerations Of A Remot...[ON-DEMAND WEBINAR] Revealing The State & Local Tax Considerations Of A Remot...
[ON-DEMAND WEBINAR] Revealing The State & Local Tax Considerations Of A Remot...
 
[ON-DEMAND WEBINAR] How To Hire More Employees & Keep Them Happy: Tips To Att...
[ON-DEMAND WEBINAR] How To Hire More Employees & Keep Them Happy: Tips To Att...[ON-DEMAND WEBINAR] How To Hire More Employees & Keep Them Happy: Tips To Att...
[ON-DEMAND WEBINAR] How To Hire More Employees & Keep Them Happy: Tips To Att...
 
[ON-DEMAND WEBINAR] CPA Pros Prepare For The 2020 Medicaid School Program (MSP)
[ON-DEMAND WEBINAR] CPA Pros Prepare For The 2020 Medicaid School Program (MSP)[ON-DEMAND WEBINAR] CPA Pros Prepare For The 2020 Medicaid School Program (MSP)
[ON-DEMAND WEBINAR] CPA Pros Prepare For The 2020 Medicaid School Program (MSP)
 
[ON-DEMAND RECORDING] Deep Impact: Is Your Manufacturing Company On A Collisi...
[ON-DEMAND RECORDING] Deep Impact: Is Your Manufacturing Company On A Collisi...[ON-DEMAND RECORDING] Deep Impact: Is Your Manufacturing Company On A Collisi...
[ON-DEMAND RECORDING] Deep Impact: Is Your Manufacturing Company On A Collisi...
 
[ON-DEMAND WEBINAR] Security Wars: Episode 2 | CMMC: Return of The Process Fo...
[ON-DEMAND WEBINAR] Security Wars: Episode 2 | CMMC: Return of The Process Fo...[ON-DEMAND WEBINAR] Security Wars: Episode 2 | CMMC: Return of The Process Fo...
[ON-DEMAND WEBINAR] Security Wars: Episode 2 | CMMC: Return of The Process Fo...
 
[ON-DEMAND WEBINAR] Construction Companies: Manage Cyber Risk Exposure & Prev...
[ON-DEMAND WEBINAR] Construction Companies: Manage Cyber Risk Exposure & Prev...[ON-DEMAND WEBINAR] Construction Companies: Manage Cyber Risk Exposure & Prev...
[ON-DEMAND WEBINAR] Construction Companies: Manage Cyber Risk Exposure & Prev...
 
[ON-DEMAND WEBINAR] Covid Vaccine & HIPAA: Can Employers To Receive The COVID...
[ON-DEMAND WEBINAR] Covid Vaccine & HIPAA: Can Employers To Receive The COVID...[ON-DEMAND WEBINAR] Covid Vaccine & HIPAA: Can Employers To Receive The COVID...
[ON-DEMAND WEBINAR] Covid Vaccine & HIPAA: Can Employers To Receive The COVID...
 
[ON-DEMAND RECORDING] Managing Remote Employees, HR Policies, Sales Tax, & Ot...
[ON-DEMAND RECORDING] Managing Remote Employees, HR Policies, Sales Tax, & Ot...[ON-DEMAND RECORDING] Managing Remote Employees, HR Policies, Sales Tax, & Ot...
[ON-DEMAND RECORDING] Managing Remote Employees, HR Policies, Sales Tax, & Ot...
 
EPISODE 1 | Security Wars: A New Goal: CMMC Compliance & Department of Defens...
EPISODE 1 | Security Wars: A New Goal: CMMC Compliance & Department of Defens...EPISODE 1 | Security Wars: A New Goal: CMMC Compliance & Department of Defens...
EPISODE 1 | Security Wars: A New Goal: CMMC Compliance & Department of Defens...
 
[ON-DEMAND WEBINAR] Understanding SOC2: A SOC 2 Guide for Managed Service Pro...
[ON-DEMAND WEBINAR] Understanding SOC2: A SOC 2 Guide for Managed Service Pro...[ON-DEMAND WEBINAR] Understanding SOC2: A SOC 2 Guide for Managed Service Pro...
[ON-DEMAND WEBINAR] Understanding SOC2: A SOC 2 Guide for Managed Service Pro...
 
[ON-DEMAND WEBINAR] Third Annual Construction Industry Kickoff | Rea & Associ...
[ON-DEMAND WEBINAR] Third Annual Construction Industry Kickoff | Rea & Associ...[ON-DEMAND WEBINAR] Third Annual Construction Industry Kickoff | Rea & Associ...
[ON-DEMAND WEBINAR] Third Annual Construction Industry Kickoff | Rea & Associ...
 
[ON-DEMAND WEBINAR] New Year, New COVID 19 Vaccine, New Unemployment Rules, N...
[ON-DEMAND WEBINAR] New Year, New COVID 19 Vaccine, New Unemployment Rules, N...[ON-DEMAND WEBINAR] New Year, New COVID 19 Vaccine, New Unemployment Rules, N...
[ON-DEMAND WEBINAR] New Year, New COVID 19 Vaccine, New Unemployment Rules, N...
 
[ON-DEMAND WEBINAR] Next Steps In COVID 19 Protocols & Compliance
[ON-DEMAND WEBINAR] Next Steps In COVID 19 Protocols & Compliance[ON-DEMAND WEBINAR] Next Steps In COVID 19 Protocols & Compliance
[ON-DEMAND WEBINAR] Next Steps In COVID 19 Protocols & Compliance
 

Dernier

Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan CytotecJual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
ZurliaSoop
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
daisycvs
 

Dernier (20)

Pre Engineered Building Manufacturers Hyderabad.pptx
Pre Engineered  Building Manufacturers Hyderabad.pptxPre Engineered  Building Manufacturers Hyderabad.pptx
Pre Engineered Building Manufacturers Hyderabad.pptx
 
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
 
Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
 
Falcon Invoice Discounting: Aviate Your Cash Flow Challenges
Falcon Invoice Discounting: Aviate Your Cash Flow ChallengesFalcon Invoice Discounting: Aviate Your Cash Flow Challenges
Falcon Invoice Discounting: Aviate Your Cash Flow Challenges
 
Buy Verified TransferWise Accounts From Seosmmearth
Buy Verified TransferWise Accounts From SeosmmearthBuy Verified TransferWise Accounts From Seosmmearth
Buy Verified TransferWise Accounts From Seosmmearth
 
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan CytotecJual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
 
Buy gmail accounts.pdf buy Old Gmail Accounts
Buy gmail accounts.pdf buy Old Gmail AccountsBuy gmail accounts.pdf buy Old Gmail Accounts
Buy gmail accounts.pdf buy Old Gmail Accounts
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
 
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGParadip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
 
Rice Manufacturers in India | Shree Krishna Exports
Rice Manufacturers in India | Shree Krishna ExportsRice Manufacturers in India | Shree Krishna Exports
Rice Manufacturers in India | Shree Krishna Exports
 
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAIGetting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
 
TVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdf
TVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdfTVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdf
TVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdf
 
Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024
 
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
 

[ON-DEMAND WEBINAR] Managed Service Providers vs Managed Security Service Providers

  • 1. REA CYBER SERVICES & DATA PROTECTION MSP V. MSSP Jun 2021 Shawn M Richardson, US Army (Ret) Principal, Cyber Services | Rea & Associates, Inc. shawn.richardson@reacpa.com O: 234-249-3478 | M: 614.554.3450 CONFIDENTIAL
  • 2. 2 Presenters Shawn M Richardson, US Army (Ret) Principal, Cyber Services Segment Dublin, Wooster offices Director of MSIT, Cyber Security Services Trusted Advisor, Speaker, Thought Leader
  • 3. 3 Presenters Jorn Baxstrom, Manager Manager, Managed Security & IT Services (MSIT) Wooster Office Trusted Advisor, IT Services Veteran
  • 4. AGENDA  MSP vs MSSP  Mission and Purpose  CIA Triad  What are the differences?  What is a SIEM & MDR?  How They Work Together  Managed Security & Information Technology Services (MSIT)  Intro to MSSP + TOA = MSIT | Security First  Conclusion  Questions 4 CONFIDENTIAL
  • 5. REA CYBER SERVICES IMPACT STATEMENT As Rea Ambassadors, quality counts. We all can take ownership of this cyber epidemic by showing others you care and let your listening fuel action. Share your ideas and vision with not just your clients but also your colleagues. Never stop learning. Our learning will drive change within the world of Cyber and protect our clients networks from the ever-evolving treat-landscape. 5 CONFIDENTIAL
  • 6. MSP V. MSSP | MISSION & PURPOSE MSP – Managed Services Provider  Managed Service Providers are the practice of outsourcing the responsibility for maintaining, and anticipating need for, a range of processes and functions of IT in order to maintain operations (keep the lights on), improve efficiencies, and cut expenses. Availability 6 CONFIDENTIAL
  • 7. MSP V. MSSP | MISSION & PURPOSE MSSP – Managed Security Services Provider  A managed security service providers sole focus is to detect and protect against ongoing threats. A firm providing continuous managed security services coupled with best-in- class information technology is a “Trust Oriented Approach”.  Common services include continuous monitoring, threat hunting, managed firewalls, vulnerability scanning and manage/detect/respond (MDR) services to protect enterprise data, identities, and reduce overall cost to the business. Confidentiality & Integrity 7 CONFIDENTIAL
  • 8. MSP V. MSSP | CIA TRIAD 8 CONFIDENTIAL Confidentiality: Protect sensitive, private information from unauthorized access. Confidentiality is dependent on being able to define and enforce certain access levels for information organized by who needs access to the information and sensitivity of the information. Integrity: Designed to protect data from deletion or modification from any unauthorized party and ensures when an authorized person makes a change that should not have been made the damage can be reversed. Availability: Availability of systems and computing resources that have architectures specifically designed to improve availability. This covers hardware failures, upgrades or power outages, or managing several network connections to route around various network outages. Principles of Information Security
  • 9. MSP V. MSSP – WHAT ARE THE DIFFERENCES? 9 Management, Implementations, & Outsourcing Value Added Resellers (VAR) Selling Products Stop Breaches Continuous Security Monitoring CONFIDENTIAL Managed Services Provider
  • 10. MSP V. MSSP – WHAT ARE THE DIFFERENCES? 10 Stop Breaches Continuous Security Monitoring CONFIDENTIAL Managed Security Services Provider
  • 11. WHAT IS A SIEM? 11 SIEM stands for Security Information and Event Management. SIEM products provide real- time analysis of security alerts generated by applications and network hardware. Security software packages ranging from Log Management Systems to Security Log / Event Management, Security Information Management, and Security Event correlation. These features are combined for 360-degree protection. CONFIDENTIAL
  • 12. WHAT IS MDR? 12 MDR stands for Managed Detection and Response (MDR), which is a managed cybersecurity service that generally provides a 24/7 service for threat detection, response, and remediation. CONFIDENTIAL
  • 13. MSSP + TOA = MSIT Trust Oriented Approach Building trust starts with leading with security first, reducing risk to the business by:  Learning the business to grow them safely  Performing annual risk assessments  Building mature cybersecurity programs  Continuous 24x7x365 monitoring This approach improves the overall security “health” within businesses and allows for growth safely without compromise. 13 CONFIDENTIAL
  • 14. MSSP + TOA = MSIT (CONT) The digital transformation has evolved rapidly over the last two decades. This transition has forced businesses to find ways to cut costs and improve efficiencies. In most cases, MSPs focus on availability, not confidentiality or the integrity of data, systems, and networks. Additionally for the last decade, security providers have been selling solutions without understanding the business FIRST. Then analyzing the most important assets within their business; the data. 14 CONFIDENTIAL
  • 15. MANAGED SECURITY & IT SERVICES = MSIT 15 Management, Implementations, & Outsourcing Value Added Resellers (VAR) Selling Products (As needed) Stop Breaches (MDR) Continuous Security Monitoring (SIEM) CONFIDENTIAL Rea Cyber Services is ‘security focused’ working together seamlessly with governance, risk, and compliance combining best-in-class IT with layered security and continuous monitoring.
  • 17. CONCLUSION As Rea Ambassadors, quality counts. We all can take ownership of this epidemic by showing others you care and let your listening fuel action. Share your ideas with not just your clients but also your colleagues. Invest in your family, your community and your future. Never stop learning. 17 CONFIDENTIAL
  • 18. 18 Conclusion CONFIDENTIAL Shawn Richardson Principal & Director Dublin & Wooster Offices Direct Line 234.249.3478 shawn.richardson@reacpa.com Jorn Baxstrom Manager Wooster Office Direct Line 234.249.3451 Jorn.baxstrom@reacpa.com

Notes de l'éditeur

  1. Security must assume everything coming into the network is bad. SIEMs assume everything is good until proven bad. Therefore, SIEMs are not built for security. MDRs use SIEM or build their own engine with an SIEM like approach. SIEMS should feed into orchestration platforms.
  2. This image will NEVER change. However, our segments mission is to articulate the inherent risk within this image to our clients.