SlideShare une entreprise Scribd logo
1  sur  15
[object Object],[object Object]
Systematic IT Risk Reduction ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Tailoring Your Approach ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Security Process Assessment  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Process Improvement Cycle Assess Security Processes Rate Process Effectiveness Group & Identify Gaps Define Strategy Execute Plan
Security Process Identification ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Process Improvement Strategy Assess Security Processes Rate Process Effectiveness Group & Identify Gaps Define Remediation Execute Plan
Maturity Assessment ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Process Improvement Strategy Assess Security Processes Rate Process Effectiveness Group & Identify Gaps Define Remediation Execute Plan
Program Gap Analysis Example Processes A-D require a mitigation strategy to close the gap between the existing processes and what is required to reduce risk
Real Life Threat – Operation Aurora ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Be Watchful of Security Trends ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Process Improvement Strategy Assess Security Processes Rate Process Effectiveness Group & Identify Gaps Define Remediation Execute Plan
Mitigation Guidance ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Process Improvement Strategy Assess Security Processes Rate Process Effectiveness Group & Identify Gaps Define Remediation Execute Plan

Contenu connexe

Tendances

Comparison of it governance framework-COBIT, ITIL, BS7799
Comparison of it governance framework-COBIT, ITIL, BS7799Comparison of it governance framework-COBIT, ITIL, BS7799
Comparison of it governance framework-COBIT, ITIL, BS7799Meghna Verma
 
RDrew ITIL Presentation
RDrew ITIL PresentationRDrew ITIL Presentation
RDrew ITIL PresentationRon Drew
 
What Itil V3 Doesn’T Say About Organisational Structure
What Itil V3 Doesn’T Say About Organisational StructureWhat Itil V3 Doesn’T Say About Organisational Structure
What Itil V3 Doesn’T Say About Organisational StructurePatrick Keogh
 
IT Service Management Concept - Mamdouh Sakr
IT Service Management Concept - Mamdouh Sakr IT Service Management Concept - Mamdouh Sakr
IT Service Management Concept - Mamdouh Sakr Mamdouh Sakr
 
Introduction to ITIL v3 Foundation exam
Introduction to ITIL v3 Foundation examIntroduction to ITIL v3 Foundation exam
Introduction to ITIL v3 Foundation examKadimil
 
Information Technology Infrastructure Library
Information Technology Infrastructure LibraryInformation Technology Infrastructure Library
Information Technology Infrastructure LibraryYatish Bathla
 
Introduction to Business Process Management
Introduction to Business Process ManagementIntroduction to Business Process Management
Introduction to Business Process ManagementAlan McSweeney
 
Information technology Infrastructure library{itil}
Information technology Infrastructure library{itil}Information technology Infrastructure library{itil}
Information technology Infrastructure library{itil}Arshad Havaldar
 
Five Phase ITIL Maturity Assessment - innovate vancouver
Five Phase ITIL Maturity Assessment -  innovate vancouverFive Phase ITIL Maturity Assessment -  innovate vancouver
Five Phase ITIL Maturity Assessment - innovate vancouverInnovate Vancouver
 
Information Technology Service Management (ITSM) Implementation Methodology B...
Information Technology Service Management (ITSM) Implementation Methodology B...Information Technology Service Management (ITSM) Implementation Methodology B...
Information Technology Service Management (ITSM) Implementation Methodology B...Waqas Tariq
 
Frameworks For Predictability
Frameworks For PredictabilityFrameworks For Predictability
Frameworks For Predictabilitytlknecht
 
5 itil v3 service transition 5 v1.8
5 itil v3 service transition 5 v1.85 itil v3 service transition 5 v1.8
5 itil v3 service transition 5 v1.8Karthik Arumugham
 
ITIL v3 Foundation Presentation
ITIL v3 Foundation PresentationITIL v3 Foundation Presentation
ITIL v3 Foundation PresentationWajahat Rajab
 

Tendances (20)

Comparison of it governance framework-COBIT, ITIL, BS7799
Comparison of it governance framework-COBIT, ITIL, BS7799Comparison of it governance framework-COBIT, ITIL, BS7799
Comparison of it governance framework-COBIT, ITIL, BS7799
 
RDrew ITIL Presentation
RDrew ITIL PresentationRDrew ITIL Presentation
RDrew ITIL Presentation
 
ITIL Service Design
ITIL Service DesignITIL Service Design
ITIL Service Design
 
What Itil V3 Doesn’T Say About Organisational Structure
What Itil V3 Doesn’T Say About Organisational StructureWhat Itil V3 Doesn’T Say About Organisational Structure
What Itil V3 Doesn’T Say About Organisational Structure
 
ITIL V3 Overview
ITIL V3 OverviewITIL V3 Overview
ITIL V3 Overview
 
IT Service Management Concept - Mamdouh Sakr
IT Service Management Concept - Mamdouh Sakr IT Service Management Concept - Mamdouh Sakr
IT Service Management Concept - Mamdouh Sakr
 
Introduction to ITIL v3 Foundation exam
Introduction to ITIL v3 Foundation examIntroduction to ITIL v3 Foundation exam
Introduction to ITIL v3 Foundation exam
 
Information Technology Infrastructure Library
Information Technology Infrastructure LibraryInformation Technology Infrastructure Library
Information Technology Infrastructure Library
 
Introduction to Business Process Management
Introduction to Business Process ManagementIntroduction to Business Process Management
Introduction to Business Process Management
 
ITIL PPT
ITIL PPTITIL PPT
ITIL PPT
 
Information technology Infrastructure library{itil}
Information technology Infrastructure library{itil}Information technology Infrastructure library{itil}
Information technology Infrastructure library{itil}
 
Five Phase ITIL Maturity Assessment - innovate vancouver
Five Phase ITIL Maturity Assessment -  innovate vancouverFive Phase ITIL Maturity Assessment -  innovate vancouver
Five Phase ITIL Maturity Assessment - innovate vancouver
 
Information Technology Service Management (ITSM) Implementation Methodology B...
Information Technology Service Management (ITSM) Implementation Methodology B...Information Technology Service Management (ITSM) Implementation Methodology B...
Information Technology Service Management (ITSM) Implementation Methodology B...
 
Frameworks For Predictability
Frameworks For PredictabilityFrameworks For Predictability
Frameworks For Predictability
 
ITIL® v3 Overview
ITIL® v3 OverviewITIL® v3 Overview
ITIL® v3 Overview
 
ICT service management implementation overview-
ICT service management implementation overview-ICT service management implementation overview-
ICT service management implementation overview-
 
1 itil v3 overview ver1.8
1 itil v3 overview ver1.81 itil v3 overview ver1.8
1 itil v3 overview ver1.8
 
7 itil v3 csi 7 v1.8
7 itil v3 csi 7 v1.87 itil v3 csi 7 v1.8
7 itil v3 csi 7 v1.8
 
5 itil v3 service transition 5 v1.8
5 itil v3 service transition 5 v1.85 itil v3 service transition 5 v1.8
5 itil v3 service transition 5 v1.8
 
ITIL v3 Foundation Presentation
ITIL v3 Foundation PresentationITIL v3 Foundation Presentation
ITIL v3 Foundation Presentation
 

Similaire à Assessing Your IT Security Processes

Cyber crime with privention
Cyber crime with privention Cyber crime with privention
Cyber crime with privention Manish Dixit Ceh
 
Happiest Minds NIST CSF compliance Brochure
Happiest Minds NIST  CSF compliance BrochureHappiest Minds NIST  CSF compliance Brochure
Happiest Minds NIST CSF compliance BrochureSuresh Kanniappan
 
Governance Risk and Compliance for SAP
Governance Risk and Compliance for SAPGovernance Risk and Compliance for SAP
Governance Risk and Compliance for SAPPECB
 
Business case for information security program
Business case for information security programBusiness case for information security program
Business case for information security programWilliam Godwin
 
Business case for Information Security program
Business case for Information Security programBusiness case for Information Security program
Business case for Information Security programWilliam Godwin
 
II Security At Microsoft
II Security At MicrosoftII Security At Microsoft
II Security At MicrosoftMark J. Feldman
 
Power your businesswith risk informed decisions
Power your businesswith risk informed decisionsPower your businesswith risk informed decisions
Power your businesswith risk informed decisionsAlireza Ghahrood
 
Software Security Initiatives
Software Security InitiativesSoftware Security Initiatives
Software Security InitiativesMarco Morana
 
Pragmatic CyberSecurity and Risk Reduction
Pragmatic CyberSecurity and Risk ReductionPragmatic CyberSecurity and Risk Reduction
Pragmatic CyberSecurity and Risk ReductionBruce Hafner
 
Risk Assessment Framework
Risk Assessment FrameworkRisk Assessment Framework
Risk Assessment FrameworkJhurt7103
 
Convergence innovative integration of security
Convergence   innovative integration of securityConvergence   innovative integration of security
Convergence innovative integration of securityciso_insights
 
Saikiran_CV_Operational Risk_updated
Saikiran_CV_Operational Risk_updatedSaikiran_CV_Operational Risk_updated
Saikiran_CV_Operational Risk_updatedkonchada
 
Saikiran_CV_Operational Risk_updated
Saikiran_CV_Operational Risk_updatedSaikiran_CV_Operational Risk_updated
Saikiran_CV_Operational Risk_updatedkonchada
 
Meraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldMeraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldnooralmousa
 
Gs Us Roadmap For A World Class Information Security Management System– Isoie...
Gs Us Roadmap For A World Class Information Security Management System– Isoie...Gs Us Roadmap For A World Class Information Security Management System– Isoie...
Gs Us Roadmap For A World Class Information Security Management System– Isoie...Tammy Clark
 
Software Engineering
Software EngineeringSoftware Engineering
Software EngineeringVijayapriyaP1
 
Getting Executive Support for a Software Security Program
Getting Executive Support for a Software Security ProgramGetting Executive Support for a Software Security Program
Getting Executive Support for a Software Security ProgramCigital
 

Similaire à Assessing Your IT Security Processes (20)

Cyber crime with privention
Cyber crime with privention Cyber crime with privention
Cyber crime with privention
 
Happiest Minds NIST CSF compliance Brochure
Happiest Minds NIST  CSF compliance BrochureHappiest Minds NIST  CSF compliance Brochure
Happiest Minds NIST CSF compliance Brochure
 
Governance Risk and Compliance for SAP
Governance Risk and Compliance for SAPGovernance Risk and Compliance for SAP
Governance Risk and Compliance for SAP
 
Business case for information security program
Business case for information security programBusiness case for information security program
Business case for information security program
 
Business case for Information Security program
Business case for Information Security programBusiness case for Information Security program
Business case for Information Security program
 
RISE's Training Catalog
RISE's Training CatalogRISE's Training Catalog
RISE's Training Catalog
 
II Security At Microsoft
II Security At MicrosoftII Security At Microsoft
II Security At Microsoft
 
Power your businesswith risk informed decisions
Power your businesswith risk informed decisionsPower your businesswith risk informed decisions
Power your businesswith risk informed decisions
 
Software Security Initiatives
Software Security InitiativesSoftware Security Initiatives
Software Security Initiatives
 
Pragmatic CyberSecurity and Risk Reduction
Pragmatic CyberSecurity and Risk ReductionPragmatic CyberSecurity and Risk Reduction
Pragmatic CyberSecurity and Risk Reduction
 
Risk Assessment Framework
Risk Assessment FrameworkRisk Assessment Framework
Risk Assessment Framework
 
Applying Lean for information security operations centre
Applying Lean for information security operations centreApplying Lean for information security operations centre
Applying Lean for information security operations centre
 
Auditing
AuditingAuditing
Auditing
 
Convergence innovative integration of security
Convergence   innovative integration of securityConvergence   innovative integration of security
Convergence innovative integration of security
 
Saikiran_CV_Operational Risk_updated
Saikiran_CV_Operational Risk_updatedSaikiran_CV_Operational Risk_updated
Saikiran_CV_Operational Risk_updated
 
Saikiran_CV_Operational Risk_updated
Saikiran_CV_Operational Risk_updatedSaikiran_CV_Operational Risk_updated
Saikiran_CV_Operational Risk_updated
 
Meraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldMeraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless world
 
Gs Us Roadmap For A World Class Information Security Management System– Isoie...
Gs Us Roadmap For A World Class Information Security Management System– Isoie...Gs Us Roadmap For A World Class Information Security Management System– Isoie...
Gs Us Roadmap For A World Class Information Security Management System– Isoie...
 
Software Engineering
Software EngineeringSoftware Engineering
Software Engineering
 
Getting Executive Support for a Software Security Program
Getting Executive Support for a Software Security ProgramGetting Executive Support for a Software Security Program
Getting Executive Support for a Software Security Program
 

Assessing Your IT Security Processes

  • 1.
  • 2.
  • 3.
  • 4.
  • 5. Process Improvement Cycle Assess Security Processes Rate Process Effectiveness Group & Identify Gaps Define Strategy Execute Plan
  • 6.
  • 7. Process Improvement Strategy Assess Security Processes Rate Process Effectiveness Group & Identify Gaps Define Remediation Execute Plan
  • 8.
  • 9. Process Improvement Strategy Assess Security Processes Rate Process Effectiveness Group & Identify Gaps Define Remediation Execute Plan
  • 10. Program Gap Analysis Example Processes A-D require a mitigation strategy to close the gap between the existing processes and what is required to reduce risk
  • 11.
  • 12.
  • 13. Process Improvement Strategy Assess Security Processes Rate Process Effectiveness Group & Identify Gaps Define Remediation Execute Plan
  • 14.
  • 15. Process Improvement Strategy Assess Security Processes Rate Process Effectiveness Group & Identify Gaps Define Remediation Execute Plan