SlideShare une entreprise Scribd logo
1  sur  2
Télécharger pour lire hors ligne
Assessing and Remediating Business IT Security Risks
 Find the vulnerabilities before the hackers.
 Start finding your true risks with Security Assessments
 Don’t ignore it….fix it before it is exploited to your disadvantage
 A firewall is no longer enough!
 There are 2 types of businesses left in the US, those who have been
hacked, and those who don’t know it.
The adage of “if you don’t find it first, you lose” applies to Information Technology (IT)
security and compliance as much as it does in treasure hunting. Hackers have become very
sophisticated, and are out there trying to steal information from you 24x7. If you don’t find
the weak spots in your perimeter, the bad guys will, and the treasure you’ve accumulated,
whether its trade secrets, customer information, credit card data, consumer data,
healthcare data, business processes, or hard-earned profits will be lost, and may result in
business-killing lawsuits.
Secure IT environments rely heavily on a risk based security lifecycle, which starts with
broad security assessments, vulnerability testing, then remediation, implementation,
documentation, and further testing. The lifecycle then continues.
Internal IT staff often lack the time and/or lack the expertise to continuously monitor the
new ways the bad guys are looking to exploit weaknesses and to gain access to your
corporate systems. Traditional IT defenses such as patching, anti-virus, and a firewall are
no longer enough. Equilibrium’s IT professionals can work with your team to identify weak
points in your security, design and implement solutions, and test their effectiveness.
COPYRIGHT AND CONFIDENTIALITY NOTICES
© 2014 Equilibrium IT Solutions, Inc.
No part of this publication may be reproduced in whole or in part by any means (including photocopying or storage
in an information storage/retrieval system) or transmitted in any form or by any means without prior written
permission from Equilibrium.
Equilibrium Information Technology Security & Audit
Methodology
The top questions to answer are: (1) Where are my weaknesses? (2) How do I correct and
turn my weaknesses into strengths? and (3) When do I need to review and update my
security processes and procedures. The crystal ball can become clearer by understanding
the complexity of information systems, increased risks, and the need for
compliance of information systems and their relationship to enterprise success.
 Organization of Information Security
Information security organization, information security program compliance
 Security Policies, Standards and Procedures
Security policy and procedures, 3rd
party providers and subcontractors
 Compliance and Risk Management
Compliance with financial, regulatory, government and industry regulations,
risk assessment of external and internal vulnerabilities
 Human Resources Security
Human resources security, screening, information security awareness,
termination policies and procedures
 Operations Management
Operating systems management, asset management, change management,
anti-virus, backups, waste and media disposal
 Facilities and Physical Management
Facility management, facility access controls
 Security Incident and Threat Management
Incident response, monitoring and detection, patching
 Network Architecture
Network controls, data network configuration, firewalls, wireless networking,
mobile device security, BYOD
 System Security
Access control administration, user accounts, password management,
reconciliation of accounts, remote access, encryption and key management
 Application and Database Maintenance
Application development, application security architecture, deployment
processes and policies, application controls, code reviews, production system
access
 Disaster Recovery and Business Continuity Planning
Business continuity and disaster recovery contracts, locations, planning and
testing, documentation
About Us
Equilibrium specializes in providing businesses and organizations with professional IT
services. Our team of consultants, architects, technical project managers, and systems
engineers provide end-to-end integrated solutions. A major differentiator about us is that
Equilibrium’s consulting approach is truly vendor neutral. Our objectivity is a critical
component to our ethical operations and the level of trust we earn from our clients. We
function as an advocate for our clients helping them implement technology solutions that
satisfy their complex business requirements.

Contenu connexe

Tendances

Security Lifecycle Management
Security Lifecycle ManagementSecurity Lifecycle Management
Security Lifecycle ManagementBarry Caplin
 
IT Governance Roles and Data Governance - Hernan Huwyler
IT Governance Roles and Data Governance - Hernan HuwylerIT Governance Roles and Data Governance - Hernan Huwyler
IT Governance Roles and Data Governance - Hernan HuwylerHernan Huwyler, MBA CPA
 
Is iso 27001, an answer to security
Is iso 27001, an answer to securityIs iso 27001, an answer to security
Is iso 27001, an answer to securityRaghunath G
 
Chapter 3: Information Security Framework
Chapter 3: Information Security FrameworkChapter 3: Information Security Framework
Chapter 3: Information Security FrameworkNada G.Youssef
 
Cybersecurity 101 - Auditing Cyber Security
Cybersecurity 101 - Auditing Cyber SecurityCybersecurity 101 - Auditing Cyber Security
Cybersecurity 101 - Auditing Cyber SecurityEryk Budi Pratama
 
PCI DSS Compliance and Security: Harmony or Discord?
PCI DSS Compliance and Security: Harmony or Discord?PCI DSS Compliance and Security: Harmony or Discord?
PCI DSS Compliance and Security: Harmony or Discord?Lumension
 
Security management and tools
Security management and toolsSecurity management and tools
Security management and toolsVibhor Raut
 
Understanding security operation.pptx
Understanding security operation.pptxUnderstanding security operation.pptx
Understanding security operation.pptxPiyush Jain
 
1. security management practices
1. security management practices1. security management practices
1. security management practices7wounders
 
Proactive information security michael
Proactive information security michael Proactive information security michael
Proactive information security michael Priyanka Aash
 
Data Sheet For Erg
Data Sheet For ErgData Sheet For Erg
Data Sheet For Ergmjschreck
 
Domain 5 - Identity and Access Management
Domain 5 - Identity and Access Management Domain 5 - Identity and Access Management
Domain 5 - Identity and Access Management Maganathin Veeraragaloo
 
Integrating Physical And Logical Security
Integrating Physical And Logical SecurityIntegrating Physical And Logical Security
Integrating Physical And Logical SecurityJorge Sebastiao
 
Chapter 12 iso 27001 awareness
Chapter 12 iso 27001 awarenessChapter 12 iso 27001 awareness
Chapter 12 iso 27001 awarenessnewbie2019
 
Security Operation Center Fundamental
Security Operation Center FundamentalSecurity Operation Center Fundamental
Security Operation Center FundamentalAmir Hossein Zargaran
 

Tendances (20)

Security Lifecycle Management
Security Lifecycle ManagementSecurity Lifecycle Management
Security Lifecycle Management
 
IT Governance Roles and Data Governance - Hernan Huwyler
IT Governance Roles and Data Governance - Hernan HuwylerIT Governance Roles and Data Governance - Hernan Huwyler
IT Governance Roles and Data Governance - Hernan Huwyler
 
Is iso 27001, an answer to security
Is iso 27001, an answer to securityIs iso 27001, an answer to security
Is iso 27001, an answer to security
 
Chapter 3: Information Security Framework
Chapter 3: Information Security FrameworkChapter 3: Information Security Framework
Chapter 3: Information Security Framework
 
Cybersecurity 101 - Auditing Cyber Security
Cybersecurity 101 - Auditing Cyber SecurityCybersecurity 101 - Auditing Cyber Security
Cybersecurity 101 - Auditing Cyber Security
 
PCI DSS Compliance and Security: Harmony or Discord?
PCI DSS Compliance and Security: Harmony or Discord?PCI DSS Compliance and Security: Harmony or Discord?
PCI DSS Compliance and Security: Harmony or Discord?
 
Security management and tools
Security management and toolsSecurity management and tools
Security management and tools
 
Understanding security operation.pptx
Understanding security operation.pptxUnderstanding security operation.pptx
Understanding security operation.pptx
 
1. security management practices
1. security management practices1. security management practices
1. security management practices
 
Proactive information security michael
Proactive information security michael Proactive information security michael
Proactive information security michael
 
Cisa 2013 ch5
Cisa 2013 ch5Cisa 2013 ch5
Cisa 2013 ch5
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 
Data Sheet For Erg
Data Sheet For ErgData Sheet For Erg
Data Sheet For Erg
 
Domain 5 - Identity and Access Management
Domain 5 - Identity and Access Management Domain 5 - Identity and Access Management
Domain 5 - Identity and Access Management
 
Integrating Physical And Logical Security
Integrating Physical And Logical SecurityIntegrating Physical And Logical Security
Integrating Physical And Logical Security
 
Chapter 12 iso 27001 awareness
Chapter 12 iso 27001 awarenessChapter 12 iso 27001 awareness
Chapter 12 iso 27001 awareness
 
Information Security Policies and Standards
Information Security Policies and StandardsInformation Security Policies and Standards
Information Security Policies and Standards
 
CCA study group
CCA study groupCCA study group
CCA study group
 
Security Operation Center Fundamental
Security Operation Center FundamentalSecurity Operation Center Fundamental
Security Operation Center Fundamental
 
Cisa 2013 ch0
Cisa 2013 ch0Cisa 2013 ch0
Cisa 2013 ch0
 

En vedette (17)

Centro regional de formación de profesores de castilla
Centro regional de formación de profesores de castillaCentro regional de formación de profesores de castilla
Centro regional de formación de profesores de castilla
 
Hitzel b2 les espaces
Hitzel b2 les espacesHitzel b2 les espaces
Hitzel b2 les espaces
 
القلب العربي
القلب العربيالقلب العربي
القلب العربي
 
June 2014 calendar
June 2014 calendarJune 2014 calendar
June 2014 calendar
 
Brochure front
Brochure frontBrochure front
Brochure front
 
Gaby soriano 2 le conditionnel passé
Gaby soriano 2 le conditionnel passéGaby soriano 2 le conditionnel passé
Gaby soriano 2 le conditionnel passé
 
مخربش سعيد ) وداع)
      مخربش سعيد  ) وداع)      مخربش سعيد  ) وداع)
مخربش سعيد ) وداع)
 
Estandares tic para el desarrollo profesional docente
Estandares tic para el desarrollo profesional docenteEstandares tic para el desarrollo profesional docente
Estandares tic para el desarrollo profesional docente
 
PT Aide Resume New WORD
PT Aide Resume New WORDPT Aide Resume New WORD
PT Aide Resume New WORD
 
Topicoral
TopicoralTopicoral
Topicoral
 
Programa del rally 2014
Programa del rally 2014Programa del rally 2014
Programa del rally 2014
 
Bab 4
Bab 4Bab 4
Bab 4
 
Artikel prefab beton
Artikel prefab betonArtikel prefab beton
Artikel prefab beton
 
Materiales para el aula
Materiales para el aulaMateriales para el aula
Materiales para el aula
 
NotesPV Panel Back Sheet
NotesPV Panel Back SheetNotesPV Panel Back Sheet
NotesPV Panel Back Sheet
 
Screencasts handout
Screencasts handoutScreencasts handout
Screencasts handout
 
Paralegal Certificate
Paralegal CertificateParalegal Certificate
Paralegal Certificate
 

Similaire à Equilibrium Security Methodology 030414 Final v2

Cybersecurity risk assessments help organizations identify.pdf
Cybersecurity risk assessments help organizations identify.pdfCybersecurity risk assessments help organizations identify.pdf
Cybersecurity risk assessments help organizations identify.pdfTheWalkerGroup1
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfAnil
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfAnil
 
The Three Major Goals of Cybersecurity for Business Organizations-precise tes...
The Three Major Goals of Cybersecurity for Business Organizations-precise tes...The Three Major Goals of Cybersecurity for Business Organizations-precise tes...
The Three Major Goals of Cybersecurity for Business Organizations-precise tes...Precise Testing Solution
 
Optimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to SuccessOptimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to SuccessSirius
 
5 Steps to Mobile Risk Management
5 Steps to Mobile Risk Management5 Steps to Mobile Risk Management
5 Steps to Mobile Risk ManagementDMIMarketing
 
Mobile Security: 5 Steps to Mobile Risk Management
Mobile Security: 5 Steps to Mobile Risk ManagementMobile Security: 5 Steps to Mobile Risk Management
Mobile Security: 5 Steps to Mobile Risk ManagementDMIMarketing
 
Strategic Insights on IT & Cyber Risk Assessments.pdf
Strategic Insights on IT & Cyber Risk Assessments.pdfStrategic Insights on IT & Cyber Risk Assessments.pdf
Strategic Insights on IT & Cyber Risk Assessments.pdflilabroughton259
 
The Basics of Security and Risk Analysis
The Basics of Security and Risk AnalysisThe Basics of Security and Risk Analysis
The Basics of Security and Risk Analysislearfield
 
SMB270: Security Essentials for ITSM
SMB270: Security Essentials for ITSMSMB270: Security Essentials for ITSM
SMB270: Security Essentials for ITSMIvanti
 
Information Security Background
Information Security BackgroundInformation Security Background
Information Security BackgroundNicholas Davis
 
Information security background
Information security backgroundInformation security background
Information security backgroundNicholas Davis
 
The Legal Case for Cybersecurity
The Legal Case for CybersecurityThe Legal Case for Cybersecurity
The Legal Case for CybersecurityShawn Tuma
 
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdf
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdfWhat Is Digital Asset Security. What Are the Risks Associated With It.docx.pdf
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdfSecureCurve
 
Vskills Certified Network Security Professional Sample Material
Vskills Certified Network Security Professional Sample MaterialVskills Certified Network Security Professional Sample Material
Vskills Certified Network Security Professional Sample MaterialVskills
 
5 steps-to-mobile-risk-management-whitepaper-golden-gekko
5 steps-to-mobile-risk-management-whitepaper-golden-gekko5 steps-to-mobile-risk-management-whitepaper-golden-gekko
5 steps-to-mobile-risk-management-whitepaper-golden-gekkoDMI
 
OSB50: Operational Security: State of the Union
OSB50: Operational Security: State of the UnionOSB50: Operational Security: State of the Union
OSB50: Operational Security: State of the UnionIvanti
 

Similaire à Equilibrium Security Methodology 030414 Final v2 (20)

Cybersecurity risk assessments help organizations identify.pdf
Cybersecurity risk assessments help organizations identify.pdfCybersecurity risk assessments help organizations identify.pdf
Cybersecurity risk assessments help organizations identify.pdf
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
 
The Three Major Goals of Cybersecurity for Business Organizations-precise tes...
The Three Major Goals of Cybersecurity for Business Organizations-precise tes...The Three Major Goals of Cybersecurity for Business Organizations-precise tes...
The Three Major Goals of Cybersecurity for Business Organizations-precise tes...
 
Optimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to SuccessOptimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to Success
 
5 Steps to Mobile Risk Management
5 Steps to Mobile Risk Management5 Steps to Mobile Risk Management
5 Steps to Mobile Risk Management
 
Cyber Security | Information Security
Cyber Security  | Information SecurityCyber Security  | Information Security
Cyber Security | Information Security
 
Measures to Avoid Cyber-attacks
Measures to Avoid Cyber-attacksMeasures to Avoid Cyber-attacks
Measures to Avoid Cyber-attacks
 
Measure To Avoid Cyber Attacks
Measure To Avoid Cyber AttacksMeasure To Avoid Cyber Attacks
Measure To Avoid Cyber Attacks
 
Mobile Security: 5 Steps to Mobile Risk Management
Mobile Security: 5 Steps to Mobile Risk ManagementMobile Security: 5 Steps to Mobile Risk Management
Mobile Security: 5 Steps to Mobile Risk Management
 
Strategic Insights on IT & Cyber Risk Assessments.pdf
Strategic Insights on IT & Cyber Risk Assessments.pdfStrategic Insights on IT & Cyber Risk Assessments.pdf
Strategic Insights on IT & Cyber Risk Assessments.pdf
 
The Basics of Security and Risk Analysis
The Basics of Security and Risk AnalysisThe Basics of Security and Risk Analysis
The Basics of Security and Risk Analysis
 
SMB270: Security Essentials for ITSM
SMB270: Security Essentials for ITSMSMB270: Security Essentials for ITSM
SMB270: Security Essentials for ITSM
 
Information Security Background
Information Security BackgroundInformation Security Background
Information Security Background
 
Information security background
Information security backgroundInformation security background
Information security background
 
The Legal Case for Cybersecurity
The Legal Case for CybersecurityThe Legal Case for Cybersecurity
The Legal Case for Cybersecurity
 
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdf
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdfWhat Is Digital Asset Security. What Are the Risks Associated With It.docx.pdf
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdf
 
Vskills Certified Network Security Professional Sample Material
Vskills Certified Network Security Professional Sample MaterialVskills Certified Network Security Professional Sample Material
Vskills Certified Network Security Professional Sample Material
 
5 steps-to-mobile-risk-management-whitepaper-golden-gekko
5 steps-to-mobile-risk-management-whitepaper-golden-gekko5 steps-to-mobile-risk-management-whitepaper-golden-gekko
5 steps-to-mobile-risk-management-whitepaper-golden-gekko
 
OSB50: Operational Security: State of the Union
OSB50: Operational Security: State of the UnionOSB50: Operational Security: State of the Union
OSB50: Operational Security: State of the Union
 

Equilibrium Security Methodology 030414 Final v2

  • 1. Assessing and Remediating Business IT Security Risks  Find the vulnerabilities before the hackers.  Start finding your true risks with Security Assessments  Don’t ignore it….fix it before it is exploited to your disadvantage  A firewall is no longer enough!  There are 2 types of businesses left in the US, those who have been hacked, and those who don’t know it. The adage of “if you don’t find it first, you lose” applies to Information Technology (IT) security and compliance as much as it does in treasure hunting. Hackers have become very sophisticated, and are out there trying to steal information from you 24x7. If you don’t find the weak spots in your perimeter, the bad guys will, and the treasure you’ve accumulated, whether its trade secrets, customer information, credit card data, consumer data, healthcare data, business processes, or hard-earned profits will be lost, and may result in business-killing lawsuits. Secure IT environments rely heavily on a risk based security lifecycle, which starts with broad security assessments, vulnerability testing, then remediation, implementation, documentation, and further testing. The lifecycle then continues. Internal IT staff often lack the time and/or lack the expertise to continuously monitor the new ways the bad guys are looking to exploit weaknesses and to gain access to your corporate systems. Traditional IT defenses such as patching, anti-virus, and a firewall are no longer enough. Equilibrium’s IT professionals can work with your team to identify weak points in your security, design and implement solutions, and test their effectiveness.
  • 2. COPYRIGHT AND CONFIDENTIALITY NOTICES © 2014 Equilibrium IT Solutions, Inc. No part of this publication may be reproduced in whole or in part by any means (including photocopying or storage in an information storage/retrieval system) or transmitted in any form or by any means without prior written permission from Equilibrium. Equilibrium Information Technology Security & Audit Methodology The top questions to answer are: (1) Where are my weaknesses? (2) How do I correct and turn my weaknesses into strengths? and (3) When do I need to review and update my security processes and procedures. The crystal ball can become clearer by understanding the complexity of information systems, increased risks, and the need for compliance of information systems and their relationship to enterprise success.  Organization of Information Security Information security organization, information security program compliance  Security Policies, Standards and Procedures Security policy and procedures, 3rd party providers and subcontractors  Compliance and Risk Management Compliance with financial, regulatory, government and industry regulations, risk assessment of external and internal vulnerabilities  Human Resources Security Human resources security, screening, information security awareness, termination policies and procedures  Operations Management Operating systems management, asset management, change management, anti-virus, backups, waste and media disposal  Facilities and Physical Management Facility management, facility access controls  Security Incident and Threat Management Incident response, monitoring and detection, patching  Network Architecture Network controls, data network configuration, firewalls, wireless networking, mobile device security, BYOD  System Security Access control administration, user accounts, password management, reconciliation of accounts, remote access, encryption and key management  Application and Database Maintenance Application development, application security architecture, deployment processes and policies, application controls, code reviews, production system access  Disaster Recovery and Business Continuity Planning Business continuity and disaster recovery contracts, locations, planning and testing, documentation About Us Equilibrium specializes in providing businesses and organizations with professional IT services. Our team of consultants, architects, technical project managers, and systems engineers provide end-to-end integrated solutions. A major differentiator about us is that Equilibrium’s consulting approach is truly vendor neutral. Our objectivity is a critical component to our ethical operations and the level of trust we earn from our clients. We function as an advocate for our clients helping them implement technology solutions that satisfy their complex business requirements.