Nguyễn Tấn Vi - office of the CISO

23
Office of the CISO

Transcript of Nguyễn Tấn Vi - office of the CISO

Page 1: Nguyễn Tấn Vi - office of the CISO

Office of the CISO

Page 2: Nguyễn Tấn Vi - office of the CISO

Xin cảm ơn các nhà tài trợ

Page 3: Nguyễn Tấn Vi - office of the CISO

About me

@vikjava

Page 4: Nguyễn Tấn Vi - office of the CISO

What will be covered?

StrategicDetectionMetricsReport

Page 5: Nguyễn Tấn Vi - office of the CISO

THE FAST AND THE FURIOUS

Page 6: Nguyễn Tấn Vi - office of the CISO

Strategic

Page 7: Nguyễn Tấn Vi - office of the CISO

Business

Page 8: Nguyễn Tấn Vi - office of the CISO

Policy

Page 9: Nguyễn Tấn Vi - office of the CISO
Page 10: Nguyễn Tấn Vi - office of the CISO

Infrastructure security

Page 11: Nguyễn Tấn Vi - office of the CISO
Page 12: Nguyễn Tấn Vi - office of the CISO

Infra & operations

Page 13: Nguyễn Tấn Vi - office of the CISO
Page 14: Nguyễn Tấn Vi - office of the CISO

Monitoring

Authentication and AuthorizationSystems and Data ChangeNetwork ActivityResource Access Malware Activity Failure and Critical Error

Page 15: Nguyễn Tấn Vi - office of the CISO

Detection of Possible Brute Force AttackDetection of Insider Threat

Check Event ID 4663 & more:Top malicious DNS requests from user.Incidents from users reported at DLP, spam

filtering, web proxy, etc.Transmission of sensitive data in plain text.3rd party users network resource access.Resource access outside business hours.Sensitive resource access failure by user.Privileged user access by resource criticality,

access failure, etc.Systems and Data Change

Detection

Page 16: Nguyễn Tấn Vi - office of the CISO

Application Defense CheckTop Web application Attacks per server Malicious SQL commands issued by

administrator.Applications suspicious performance indicator,

resource utilization vector.Application Platform (OS) patch-related status.Web attacks post configuration changed on

applications.

Page 17: Nguyễn Tấn Vi - office of the CISO

Malware CheckUnusual network traffic spikes to and from sources.Endpoints with maximum number of malware threats.Top trends of malware observed; detected, prevented,

mitigated.Brute force pattern check on Bastion host.

Page 18: Nguyễn Tấn Vi - office of the CISO
Page 19: Nguyễn Tấn Vi - office of the CISO

Metrics

Function Management Perspective Defined Metrics Incident Management How well do we detect, accurately

identify, handle, and recover from security incidents?

Mean Time to Incident Discovery Number of Incidents Mean Time Between Security Incidents Mean Time to Incident Recovery

Vulnerability Management How well do we manage the exposure of the organization to vulnerabilities by identifying and mitigating known vulnerabilities?

Vulnerability Scanning Coverage Percent of Systems with No Known

Severe Vulnerabilities Mean Time to Mitigate Vulnerabilities Number of Known Vulnerabilities

Patch Management How well are we able to maintain the patch state of our systems?

Patch Policy Compliance Patch Management Coverage Mean Time to Patch

Application Security Can we rely on the security model of business applications to operate as intended?

Number of Applications Percent of Critical Applications Risk Assessment Coverage Security Testing Coverage

Configuration Management How do changes to system configurations affect the security of the organization?

Mean Time to Complete Changes Percent of Changes with Security

Reviews Percent of Changes with Security

Exceptions

Financial Metrics What is the level and purpose of spending on information security?

IT Security Spending as % of IT Budget IT Security Budget Allocation

Page 20: Nguyễn Tấn Vi - office of the CISO

Report

Page 21: Nguyễn Tấn Vi - office of the CISO
Page 22: Nguyễn Tấn Vi - office of the CISO
Page 23: Nguyễn Tấn Vi - office of the CISO

Questionsor

Comments