Live Process Audit Monitoring

2
Downstream System s Impacted UNAUDITED ANOMALOUS EVENTS H ISTO R ICA L INFO RM ATIO N PRO CESSING SE C U R ITY P R O CESSES SYMANTEC RIVERBED C ISCO M IC RO SO FT C ybersecurity R isk/Fraud/AM L Loss ofP ublic Infrastructure Loss ofD efence V irus Infection DATA PROCESSING IN FO RM A TIO N CAPTURE Q uality Assurance P ackaging Accounting M ail R oom Manufacturing D igitization System s 0110000111011 NETW ORK/M IDDLEW ARE TRANSPO RT/IN TEG RA TIO N BUS Live Process A udit D ecision-Zone Inc. CORPORATE BUSINESS PRO CESS DO CUM ENTED M APS NETW ORK/M IDDLEW ARE LIVE AUDITED NORMAL EVENT LIVE A U D ITED ANOMALOUS EVENT TRANSPO R T/INTEG RA TIO N BUS LIVE U N A U D ITED EVENT LIVE A U D ITED EVENT Downstream System s Protected LIVE IN FO RM ATIO N P R O C E SSIN G LIVE SEC U R ITY PROCESSES P rotection Against C ybersecurity Threats Protection Against Risk/Fraud/AM L Threats Infrastructure Protected D efense Protected Protection Against Virus Infection Threats LIV E PR O TEC TIO N IN FO RM A TIO N CAPTURE Q uality Assurance Packaging Accounting M ailRoom M anufacturing D igitization System s 0110000111011 SYM ANTEC R IV ER B ED C ISC O M ICR O SO FT

description

Live Cyber Protection using Live Audit Monitoring Technology

Transcript of Live Process Audit Monitoring

Page 1: Live Process Audit Monitoring

Downstream Systems Impacted

UNAUDITED ANOMALOUS

EVENTS

HISTORICAL INFORMATION PROCESSING

SECURITY PROCESSES

SYMANTEC

RIVERBED

CISCO

MICROSOFT

Cybersecurity

Risk/Fraud/AML

Loss of Public Infrastructure

Loss of Defence

Virus Infection

DATA PROCESSING

INFORMATION CAPTURE

Quality Assurance

Packaging

Accounting

Mail Room

Manufacturing

Digitization

Systems

0110000111011

NETWORK/MIDDLEWARE

TRANSPORT/INTEGRATION BUS

Live Process Audit Decision-Zone Inc.

CORPORATE BUSINESS PROCESS DOCUMENTED MAPS

NETWORK/MIDDLEWARE LIVE AUDITED NORMALEVENT

LIVE AUDITED

ANOMALOUSEVENT

TRANSPORT/INTEGRATION BUS

LIVE UNAUDITED

EVENT

LIVE AUDITED

EVENT

Downstream Systems Protected

LIVE INFORMATION PROCESSING

LIVE SECURITY PROCESSES

Protection Against Cybersecurity

Threats

Protection Against Risk/Fraud/AML

Threats

Infrastructure Protected

Defense Protected

Protection Against Virus Infection

Threats

LIVE PROTECTION

INFORMATION CAPTURE

Quality Assurance

Packaging

Accounting

Mail Room

Manufacturing

Digitization

Systems

0110000111011

SYMANTEC

RIVERBED

CISCO

MICROSOFT

Page 2: Live Process Audit Monitoring

INFORMATICS MANAGEMENT MODEL

ACTIVITIESJOB ROLES

Accounting Mail Room Manufacturing

BUSINESS PROCESSES

BUSINESS PROCESSES ARE END TO END INSTRUCTIONS DEFINED IN WORKFLOW DIAGRAMS, PROCESS MAPS, STATE CHARTS, FLOWCHARTS OR OTHER DOCUMENTS ON HOW A SET OF INDEPENDENT ACTIVITIES MUST PERFORM THEIR JOBS IN TERMS OF THE CONDITIONS, TIME & SEQUENCES FOR BUILDING A WIDGET.

INDEPENDENT ACTIVITIES

PROCESS AUTOMATION

Accounting

Mail RoomAUTOMATED DATA ENTRY

ACTIVITY

PROCESS AUTOMATION IS AN APPLICATION THAT COMBINIES TWO OR MORE ACTIVITIES TO GENERATE A SINGLE AUTOMATED ACTIVITY

SECURITY PROCESS

SECURITY PROCESSES ARE APPLICATIONS THAT AUTOMATE THE DEFINED PROCESSES AND RULES FOR THE ENFORCEMENT OF ACTIVITIES WITHIN THE BUSINESS PROCESS.

PROCESS AUDIT

PROCESS AUDIT APPLICATIONS VALIDATE EACH INDEPENDANT ACTIVITY LIVE USING THE BUSINESS PROCESS DOCUMENT INSTRUCTIONS. INVALID ACTIVITIES CAN TRIGGER SECURITY PROCESSES APPLICATIONS TO ENFORCE THE INVALID ACTIVITY LIVE