SlideShare ist ein Scribd-Unternehmen logo
1 von 42
Downloaden Sie, um offline zu lesen
SMB270 Security Essentials for ITSM
Ian Aitchison, Sr Product Director
Alan Taylor, Director Sales Engineering
Security Essentials for ITSM
Closing the Gap Between Security and IT Operations
Continually maintaining a secure IT environment requires proactive best practice security activities to ensure ongoing security. In addition,
cybersecurity attacks are on the rise, resulting in high-impact breaches that demand responses. ITSM can play a part in detecting and responding
appropriately to breaches or threats. From security incident management to coordination and communication with the security team, learn how to
identify impacts, reduce risks, and deliver security controls and improvements while still maintaining end-user productivity.
Chaos
Reactive
Proactive
Optimized
Everybody Wants (or should want) to get from Reactive to Proactive
Prevention is Better than Cure
Chaos
FIRE HAZARD
Reactive
USE TOOLS TO
PREVENT,
DETECT, REACT
Proactive
DO IT PROPERLY
Tools monitor and
adjust in the way
you need to avoid
needing cure
Guidance on how
to use tools
to do the job
is Better
A maturity model of maturity models!
How mature are different IT functions
Ian Opinion
Chaos
Reactive
Proactive
Optimized
Security
ITSM
ITIL
ITAM
IAITAM BPL
DevOps
Because IT Security is about more than just
Detect, Prevent and Correct
Security and ITSM?
Yeah that’s just all SIM, right?
Secure Incident Management?
Why SIM is NOT ENOUGH
Computer security incident management is a specialized form of incident
management, the primary purpose of which is the development of a well
understood and predictable response to damaging events and computer
intrusions. Incident management requires a process and
a response team which follows this process.
ITIL 2011 activities and processes
Service Strategy
Continual Service
Improvement
Service
Operations
Service
Transition
Service Design
Financial
Management
Demand
Management
Strategy
Operations
Service Portfolio
Management
Service Level
Management
Availability
Management
Capacity
Management
Continuity
Management
Information
Security
Management
Service Catalog
Management
Supplier
Management
Change
Management
Service Asset
Config Mgmt
Release & Deploy
Management
Transition
Support and
Planning
Service
Validation and
Testing
Evaluation
Knowledge
Management
Service Desk
Incident
Management
Problem
Management
Access
Management
Event
Management
Request
Fulfillment
Process
Improvement
Tech Mgmnt
App Mgmnt
IT Ops Mgmnt
Key
Process
Function
WHERE’S
SECURITY?
EVERYWHERE!!
SIM
Security is in ITIL These are the Information Security Management sub-processes and their
process objectives:
Design of Security Controls
Process Objective: To design appropriate technical and organizational
measures in order to ensure the confidentiality, integrity, security
and availability of an organization's assets, information, data and
services.
Security Testing
Process Objective: To make sure that all security mechanisms are
subject to regular testing.
Management of Security Incidents
Process Objective: To detect and fight attacks and intrusions, and to
minimize the damage incurred by security breaches.
Security Review
Process Objective: To review if security measures and procedures are
still in line with risk perceptions from the business side, and to
verify if those measures and procedures are regularly maintained
and tested.
Get Over IT
Yeah but….
Security Controls Security Incidents
Security Testing Security Review
Security Changes
Security Improvement
ITIL GETS IT WRONG
Data security over IT security
(doesn’t worry about hacks, firewall gaps, virus, ransomware etc).
Just cares about ‘is the data in a secure position’ or not
Does not specify technical components required in place
(patch, whitelist, blacklist, threat detection etc etc)
Security is not just Something We Do
Security is also How We Do Everything We Do
ITIL 2011 activities and processes
Service Strategy
Continual Service
Improvement
Service
Operations
Service
Transition
Service Design
Financial
Management
Demand
Management
Strategy
Operations
Service Portfolio
Management
Service Level
Management
Availability
Management
Capacity
Management
Continuity
Management
Information
Security
Management
Service Catalog
Management
Supplier
Management
Change
Management
Service Asset
Config Mgmt
Release & Deploy
Management
Transition
Support and
Planning
Service
Validation and
Testing
Evaluation
Knowledge
Management
Service Desk
Incident
Management
Problem
Management
Access
Management
Event
Management
Request
Fulfillment
Process
Improvement
Tech Mgmnt
App Mgmnt
IT Ops Mgmnt
Key
Process
Function
WHERE’S
SECURITY?
EVERYWHERE!!
Warren Buffett
Cyber Resiliance?
https://www.axelos.com/resilia/what-is-resilia
1.4.5 A definition of cyber resilience
Good cyber resilience is a complete, collaborative approach
driven by the board but involving everyone in the organization
and extending to the supply chain, partners and customers. To
balance the cyber risks faced by the business against the
opportunities and competitive advantages it can gain, effective
cyber resilience requires an enterprise-wide risk-based
strategy that proactively manages the vulnerabilities, threats,
risks and impacts on its critical information and supporting assets.
It also involves moving away from strategies that seek solely to
prevent attacks on assets to ones that include preparing for, and
recovering from, a cyber-attack.
Resilia
The critical elements of effective cyber resilience include:
●● Clear board-level ownership and responsibility for cyber resilience
●● The adoption of tailored learning and development for all staff. This in turn will establish:
●● A clear understanding of what the organization’s critical assets are,
especially with regard to information
●● A clear view of the organization’s key threats and vulnerabilities arising
from their environment, including that of their customers, partners and supply chain
●● The adoption of a common language used by all stakeholders in the
organization
●● An assessment of the organization’s cyber resilience maturity and design of
appropriate, prioritized and proportionate plans using best-practice guidance
●● An appropriate balance of controls to prevent, detect and correct.
Tools Are Good
Event
Management
Incident
Management
Major
Incident
Management
Major Breach
Response
Security
Assessment
Business
Education
Governance
and
Compliance
Security
Knowledge
Standard
Scorecards
and
Dashboards
ITSM Security Package
ITSM Security
Automatically receive detected alerts from
monitoring tools. Create ITSM ‘event’
processes with automated response
and corrective actions.
Follows ITSM Event Mgnt guidelines.
May link to Incident Management
eg, new virus detected in 25% of
machines, do we want to do
something?
Event
Management
ITSM Security
Security Incident : creation and predefined response,
escalation and resolution processes from within
service desk, from email, from self service, from voice
etc. Aligns with ITSM best practice incident
management.
May create Major Incident.
eg “I have a virus error message”, “Is this a phishing
email?”
Incident
Management
ITSM Security
Predefined Major Incident
workflow – notification, escalation,
communication, automation.
Significant business impact from
current security event
Major
Incident
Management
ITSM Security
Business response to Breach (Press,
WebSite, Internal Comms)
May be linked to Major Incident.
“We’ve been hacked!”
Major Breach
Response
ITSM Security
Planned, scheduled security
assessment exercise – internal or
external, includes assignment and
completion of corrective actions.
Vulnerability assessments, pen tests.
Security
Assessment
ITSM Security
Self Service and Knowledge
published guidelines,
recommendations and advice to
business users. Security
personal assessment and user
training tracking.
“access your security
awareness documentation and
training here”
Business
Education
ITSM Security
Reports and Evidence
data captured
automatically to ensure
compliance with GRC
requirements and
standards.
PCI, HIPAA etc
Governance
and
Compliance
ITSM Security
Latest alerts, news, best
practice, advice, warning
from the broader industry
into searchable security
knowledge base
Security
Knowledge
ITSM Security
Predefined scorecards
and dashboards for
industry security
frameworks, plus
complete business
security posture
Standard
Scorecards
and
Dashboards
Event
Management
Incident
Management
Major
Incident
Management
Major Breach
Response
Security
Assessment
Business
Education
Governance
and
Compliance
Security
Knowledge
Standard
Scorecards
and
Dashboards
ITSM Security Package
Metrics
Source : cyber resilience and ITSM, Alexos
Learn More
▪Resilia
▪ISO/IEC 27001
▪NIST
▪ITIL
▪ISO/IEC 20000
Source : cyber resilience and ITSM, Alexos
Demo time
Demo Time
1 - Event Management = Automatic Security Alert/Incident from
external monitoring tools
2 - Breach Reaction = controlled response sequence to major
security breach
3 - Dashboard - all types of security activity in one place
ALAN - what can you
do here?
Security in ITSM, also consider
▪ User record – has been security trained
▪ Change and Release – Security risk assess, security change approve
▪ Knowledge – article types ‘security’ for IT and the Business
▪ Self Service – EndUser security status, security news, security
assessments
▪ Service improvement – better secure posture is improvement too!
▪ Resolution cause – security issue?
▪ Problem Management – root cause. Eliminate future security incidents
▪ Also – is your ITSM tool secure? Often public facing, what security,
password, auditing in place?
Key Takeaways
Next Actions
SMB270: Security Essentials for ITSM

Weitere ähnliche Inhalte

Was ist angesagt?

Connection can help keep your business secure!
Connection can help keep your business secure!Connection can help keep your business secure!
Connection can help keep your business secure!Heather Salmons Newswanger
 
Information Security - Back to Basics - Own Your Vulnerabilities
Information Security - Back to Basics - Own Your VulnerabilitiesInformation Security - Back to Basics - Own Your Vulnerabilities
Information Security - Back to Basics - Own Your VulnerabilitiesJack Nichelson
 
Supplement To Student Guide Seminar 03 A 3 Nov09
Supplement To Student Guide   Seminar 03 A 3 Nov09Supplement To Student Guide   Seminar 03 A 3 Nov09
Supplement To Student Guide Seminar 03 A 3 Nov09Tammy Clark
 
The security risk management guide
The security risk management guideThe security risk management guide
The security risk management guideSergey Erohin
 
Practical approach to security risk management
Practical approach to security risk managementPractical approach to security risk management
Practical approach to security risk managementG3 intelligence Ltd
 
Build an Information Security Strategy
Build an Information Security StrategyBuild an Information Security Strategy
Build an Information Security StrategyAndrew Byers
 
Information Security Governance: Concepts, Security Management & Metrics
Information Security Governance: Concepts, Security Management & MetricsInformation Security Governance: Concepts, Security Management & Metrics
Information Security Governance: Concepts, Security Management & MetricsOxfordCambridge
 
Security Organization/ Infrastructure
Security Organization/ InfrastructureSecurity Organization/ Infrastructure
Security Organization/ InfrastructurePriyank Hada
 
Information Security Maturity Model
Information Security Maturity ModelInformation Security Maturity Model
Information Security Maturity ModelCSCJournals
 
Enterprise Security Critical Security Functions version 1.0
Enterprise Security Critical Security Functions version 1.0Enterprise Security Critical Security Functions version 1.0
Enterprise Security Critical Security Functions version 1.0Marc-Andre Heroux
 
IBM Security Strategy Overview
IBM Security Strategy OverviewIBM Security Strategy Overview
IBM Security Strategy Overviewxband
 
Business case for information security program
Business case for information security programBusiness case for information security program
Business case for information security programWilliam Godwin
 
Information security management iso27001
Information security management iso27001Information security management iso27001
Information security management iso27001Hiran Kanishka
 
Security Risk Management: ovvero come mitigare e gestire i rischi dei dati at...
Security Risk Management: ovvero come mitigare e gestire i rischi dei dati at...Security Risk Management: ovvero come mitigare e gestire i rischi dei dati at...
Security Risk Management: ovvero come mitigare e gestire i rischi dei dati at...festival ICT 2016
 
Security Maturity Assessment
Security Maturity AssessmentSecurity Maturity Assessment
Security Maturity AssessmentClaude Baudoin
 
Risk management ISO 27001 Standard
Risk management ISO 27001 StandardRisk management ISO 27001 Standard
Risk management ISO 27001 StandardTharindunuwan9
 
Information Security Governance and Strategy
Information Security Governance and Strategy Information Security Governance and Strategy
Information Security Governance and Strategy Dam Frank
 

Was ist angesagt? (20)

Security-Brochure
Security-BrochureSecurity-Brochure
Security-Brochure
 
Security-Brochure
Security-BrochureSecurity-Brochure
Security-Brochure
 
Connection can help keep your business secure!
Connection can help keep your business secure!Connection can help keep your business secure!
Connection can help keep your business secure!
 
Information Security - Back to Basics - Own Your Vulnerabilities
Information Security - Back to Basics - Own Your VulnerabilitiesInformation Security - Back to Basics - Own Your Vulnerabilities
Information Security - Back to Basics - Own Your Vulnerabilities
 
Supplement To Student Guide Seminar 03 A 3 Nov09
Supplement To Student Guide   Seminar 03 A 3 Nov09Supplement To Student Guide   Seminar 03 A 3 Nov09
Supplement To Student Guide Seminar 03 A 3 Nov09
 
The security risk management guide
The security risk management guideThe security risk management guide
The security risk management guide
 
Practical approach to security risk management
Practical approach to security risk managementPractical approach to security risk management
Practical approach to security risk management
 
Build an Information Security Strategy
Build an Information Security StrategyBuild an Information Security Strategy
Build an Information Security Strategy
 
Information Security Governance: Concepts, Security Management & Metrics
Information Security Governance: Concepts, Security Management & MetricsInformation Security Governance: Concepts, Security Management & Metrics
Information Security Governance: Concepts, Security Management & Metrics
 
Security Organization/ Infrastructure
Security Organization/ InfrastructureSecurity Organization/ Infrastructure
Security Organization/ Infrastructure
 
Information Security Maturity Model
Information Security Maturity ModelInformation Security Maturity Model
Information Security Maturity Model
 
Enterprise Security Critical Security Functions version 1.0
Enterprise Security Critical Security Functions version 1.0Enterprise Security Critical Security Functions version 1.0
Enterprise Security Critical Security Functions version 1.0
 
IBM Security Strategy Overview
IBM Security Strategy OverviewIBM Security Strategy Overview
IBM Security Strategy Overview
 
Business case for information security program
Business case for information security programBusiness case for information security program
Business case for information security program
 
Information security management iso27001
Information security management iso27001Information security management iso27001
Information security management iso27001
 
Security Risk Management: ovvero come mitigare e gestire i rischi dei dati at...
Security Risk Management: ovvero come mitigare e gestire i rischi dei dati at...Security Risk Management: ovvero come mitigare e gestire i rischi dei dati at...
Security Risk Management: ovvero come mitigare e gestire i rischi dei dati at...
 
Security Maturity Assessment
Security Maturity AssessmentSecurity Maturity Assessment
Security Maturity Assessment
 
Security Maturity Model
Security Maturity ModelSecurity Maturity Model
Security Maturity Model
 
Risk management ISO 27001 Standard
Risk management ISO 27001 StandardRisk management ISO 27001 Standard
Risk management ISO 27001 Standard
 
Information Security Governance and Strategy
Information Security Governance and Strategy Information Security Governance and Strategy
Information Security Governance and Strategy
 

Ähnlich wie SMB270: Security Essentials for ITSM

Solve the exercise in security management.pdf
Solve the exercise in security management.pdfSolve the exercise in security management.pdf
Solve the exercise in security management.pdfsdfghj21
 
Mastering Cybersecurity Risk Management: Strategies to Safeguard Your Digital...
Mastering Cybersecurity Risk Management: Strategies to Safeguard Your Digital...Mastering Cybersecurity Risk Management: Strategies to Safeguard Your Digital...
Mastering Cybersecurity Risk Management: Strategies to Safeguard Your Digital...cyberprosocial
 
Best Open Threat Management Platform in USA
Best Open Threat Management Platform in USABest Open Threat Management Platform in USA
Best Open Threat Management Platform in USACompanySeceon
 
Optimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to SuccessOptimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to SuccessSirius
 
Cybersecurity Audit
Cybersecurity AuditCybersecurity Audit
Cybersecurity AuditEC-Council
 
IT Security Incident Response for Nonprofits
IT Security Incident Response for NonprofitsIT Security Incident Response for Nonprofits
IT Security Incident Response for NonprofitsCommunity IT Innovators
 
The Crucial Role of Security Testing Services in Ensuring a Secure and Effici...
The Crucial Role of Security Testing Services in Ensuring a Secure and Effici...The Crucial Role of Security Testing Services in Ensuring a Secure and Effici...
The Crucial Role of Security Testing Services in Ensuring a Secure and Effici...AmeliaJonas2
 
Infocon Bangladesh 2016
Infocon Bangladesh 2016Infocon Bangladesh 2016
Infocon Bangladesh 2016Prime Infoserv
 
Strategic Insights on IT & Cyber Risk Assessments.pdf
Strategic Insights on IT & Cyber Risk Assessments.pdfStrategic Insights on IT & Cyber Risk Assessments.pdf
Strategic Insights on IT & Cyber Risk Assessments.pdflilabroughton259
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfAnil
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfAnil
 
Equilibrium Security Methodology 030414 Final v2
Equilibrium Security Methodology 030414 Final v2Equilibrium Security Methodology 030414 Final v2
Equilibrium Security Methodology 030414 Final v2marchharvey
 
Cyber risk management-white-paper-v8 (2) 2015
Cyber risk management-white-paper-v8 (2) 2015Cyber risk management-white-paper-v8 (2) 2015
Cyber risk management-white-paper-v8 (2) 2015Accounting_Whitepapers
 
5 THREAT AND RISK ASSESSMENT APPROACHES.pptx
5 THREAT AND RISK ASSESSMENT APPROACHES.pptx5 THREAT AND RISK ASSESSMENT APPROACHES.pptx
5 THREAT AND RISK ASSESSMENT APPROACHES.pptxBluechip Gulf IT Services
 
CompTIA CySA Domain 5 Compliance and Assessment.pptx
CompTIA CySA Domain 5 Compliance and Assessment.pptxCompTIA CySA Domain 5 Compliance and Assessment.pptx
CompTIA CySA Domain 5 Compliance and Assessment.pptxInfosectrain3
 
Cyber Families - Incident Response.pptx
Cyber Families - Incident Response.pptxCyber Families - Incident Response.pptx
Cyber Families - Incident Response.pptxKinetic Potential
 

Ähnlich wie SMB270: Security Essentials for ITSM (20)

Solve the exercise in security management.pdf
Solve the exercise in security management.pdfSolve the exercise in security management.pdf
Solve the exercise in security management.pdf
 
Mastering Cybersecurity Risk Management: Strategies to Safeguard Your Digital...
Mastering Cybersecurity Risk Management: Strategies to Safeguard Your Digital...Mastering Cybersecurity Risk Management: Strategies to Safeguard Your Digital...
Mastering Cybersecurity Risk Management: Strategies to Safeguard Your Digital...
 
Best Open Threat Management Platform in USA
Best Open Threat Management Platform in USABest Open Threat Management Platform in USA
Best Open Threat Management Platform in USA
 
Cybersecurity
Cybersecurity Cybersecurity
Cybersecurity
 
Grupo 4 - TEMA II.pptx
Grupo 4  - TEMA II.pptxGrupo 4  - TEMA II.pptx
Grupo 4 - TEMA II.pptx
 
Optimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to SuccessOptimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to Success
 
Role management
Role managementRole management
Role management
 
Cybersecurity Audit
Cybersecurity AuditCybersecurity Audit
Cybersecurity Audit
 
IT Security Incident Response for Nonprofits
IT Security Incident Response for NonprofitsIT Security Incident Response for Nonprofits
IT Security Incident Response for Nonprofits
 
The Crucial Role of Security Testing Services in Ensuring a Secure and Effici...
The Crucial Role of Security Testing Services in Ensuring a Secure and Effici...The Crucial Role of Security Testing Services in Ensuring a Secure and Effici...
The Crucial Role of Security Testing Services in Ensuring a Secure and Effici...
 
Infocon Bangladesh 2016
Infocon Bangladesh 2016Infocon Bangladesh 2016
Infocon Bangladesh 2016
 
Strategic Insights on IT & Cyber Risk Assessments.pdf
Strategic Insights on IT & Cyber Risk Assessments.pdfStrategic Insights on IT & Cyber Risk Assessments.pdf
Strategic Insights on IT & Cyber Risk Assessments.pdf
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
 
Equilibrium Security Methodology 030414 Final v2
Equilibrium Security Methodology 030414 Final v2Equilibrium Security Methodology 030414 Final v2
Equilibrium Security Methodology 030414 Final v2
 
Cyber risk management-white-paper-v8 (2) 2015
Cyber risk management-white-paper-v8 (2) 2015Cyber risk management-white-paper-v8 (2) 2015
Cyber risk management-white-paper-v8 (2) 2015
 
5 THREAT AND RISK ASSESSMENT APPROACHES.pptx
5 THREAT AND RISK ASSESSMENT APPROACHES.pptx5 THREAT AND RISK ASSESSMENT APPROACHES.pptx
5 THREAT AND RISK ASSESSMENT APPROACHES.pptx
 
CompTIA CySA Domain 5 Compliance and Assessment.pptx
CompTIA CySA Domain 5 Compliance and Assessment.pptxCompTIA CySA Domain 5 Compliance and Assessment.pptx
CompTIA CySA Domain 5 Compliance and Assessment.pptx
 
Cyber Families - Incident Response.pptx
Cyber Families - Incident Response.pptxCyber Families - Incident Response.pptx
Cyber Families - Incident Response.pptx
 
It risk assessment
It risk assessmentIt risk assessment
It risk assessment
 

Mehr von Ivanti

2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Patch Tuesday de Abril
Patch Tuesday de AbrilPatch Tuesday de Abril
Patch Tuesday de AbrilIvanti
 
Français Patch Tuesday - Avril
Français Patch Tuesday - AvrilFrançais Patch Tuesday - Avril
Français Patch Tuesday - AvrilIvanti
 
Patch Tuesday Italia Aprile
Patch Tuesday Italia AprilePatch Tuesday Italia Aprile
Patch Tuesday Italia AprileIvanti
 
Français Patch Tuesday - Mars
Français Patch Tuesday - MarsFrançais Patch Tuesday - Mars
Français Patch Tuesday - MarsIvanti
 
Patch Tuesday de Marzo
Patch Tuesday de MarzoPatch Tuesday de Marzo
Patch Tuesday de MarzoIvanti
 
Patch Tuesday Italia Marzo
Patch Tuesday Italia MarzoPatch Tuesday Italia Marzo
Patch Tuesday Italia MarzoIvanti
 
March Patch Tuesday
March Patch TuesdayMarch Patch Tuesday
March Patch TuesdayIvanti
 
Patch Tuesday de Febrero
Patch Tuesday de FebreroPatch Tuesday de Febrero
Patch Tuesday de FebreroIvanti
 
2024 Français Patch Tuesday - Février
2024 Français Patch Tuesday - Février2024 Français Patch Tuesday - Février
2024 Français Patch Tuesday - FévrierIvanti
 
Patch Tuesday Italia Febbraio
Patch Tuesday Italia FebbraioPatch Tuesday Italia Febbraio
Patch Tuesday Italia FebbraioIvanti
 
2024 February Patch Tuesday
2024 February Patch Tuesday2024 February Patch Tuesday
2024 February Patch TuesdayIvanti
 
2024 Enero Patch Tuesday
2024 Enero Patch Tuesday2024 Enero Patch Tuesday
2024 Enero Patch TuesdayIvanti
 
2024 Janvier Patch Tuesday
2024 Janvier Patch Tuesday2024 Janvier Patch Tuesday
2024 Janvier Patch TuesdayIvanti
 
2024 Gennaio Patch Tuesday
2024 Gennaio Patch Tuesday2024 Gennaio Patch Tuesday
2024 Gennaio Patch TuesdayIvanti
 
Patch Tuesday de Enero
Patch Tuesday de EneroPatch Tuesday de Enero
Patch Tuesday de EneroIvanti
 
Français Patch Tuesday – Janvier
Français Patch Tuesday – JanvierFrançais Patch Tuesday – Janvier
Français Patch Tuesday – JanvierIvanti
 
2024 January Patch Tuesday
2024 January Patch Tuesday2024 January Patch Tuesday
2024 January Patch TuesdayIvanti
 
Patch Tuesday de Diciembre
Patch Tuesday de DiciembrePatch Tuesday de Diciembre
Patch Tuesday de DiciembreIvanti
 
Français Patch Tuesday – Décembre
Français Patch Tuesday – DécembreFrançais Patch Tuesday – Décembre
Français Patch Tuesday – DécembreIvanti
 

Mehr von Ivanti (20)

2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Patch Tuesday de Abril
Patch Tuesday de AbrilPatch Tuesday de Abril
Patch Tuesday de Abril
 
Français Patch Tuesday - Avril
Français Patch Tuesday - AvrilFrançais Patch Tuesday - Avril
Français Patch Tuesday - Avril
 
Patch Tuesday Italia Aprile
Patch Tuesday Italia AprilePatch Tuesday Italia Aprile
Patch Tuesday Italia Aprile
 
Français Patch Tuesday - Mars
Français Patch Tuesday - MarsFrançais Patch Tuesday - Mars
Français Patch Tuesday - Mars
 
Patch Tuesday de Marzo
Patch Tuesday de MarzoPatch Tuesday de Marzo
Patch Tuesday de Marzo
 
Patch Tuesday Italia Marzo
Patch Tuesday Italia MarzoPatch Tuesday Italia Marzo
Patch Tuesday Italia Marzo
 
March Patch Tuesday
March Patch TuesdayMarch Patch Tuesday
March Patch Tuesday
 
Patch Tuesday de Febrero
Patch Tuesday de FebreroPatch Tuesday de Febrero
Patch Tuesday de Febrero
 
2024 Français Patch Tuesday - Février
2024 Français Patch Tuesday - Février2024 Français Patch Tuesday - Février
2024 Français Patch Tuesday - Février
 
Patch Tuesday Italia Febbraio
Patch Tuesday Italia FebbraioPatch Tuesday Italia Febbraio
Patch Tuesday Italia Febbraio
 
2024 February Patch Tuesday
2024 February Patch Tuesday2024 February Patch Tuesday
2024 February Patch Tuesday
 
2024 Enero Patch Tuesday
2024 Enero Patch Tuesday2024 Enero Patch Tuesday
2024 Enero Patch Tuesday
 
2024 Janvier Patch Tuesday
2024 Janvier Patch Tuesday2024 Janvier Patch Tuesday
2024 Janvier Patch Tuesday
 
2024 Gennaio Patch Tuesday
2024 Gennaio Patch Tuesday2024 Gennaio Patch Tuesday
2024 Gennaio Patch Tuesday
 
Patch Tuesday de Enero
Patch Tuesday de EneroPatch Tuesday de Enero
Patch Tuesday de Enero
 
Français Patch Tuesday – Janvier
Français Patch Tuesday – JanvierFrançais Patch Tuesday – Janvier
Français Patch Tuesday – Janvier
 
2024 January Patch Tuesday
2024 January Patch Tuesday2024 January Patch Tuesday
2024 January Patch Tuesday
 
Patch Tuesday de Diciembre
Patch Tuesday de DiciembrePatch Tuesday de Diciembre
Patch Tuesday de Diciembre
 
Français Patch Tuesday – Décembre
Français Patch Tuesday – DécembreFrançais Patch Tuesday – Décembre
Français Patch Tuesday – Décembre
 

Kürzlich hochgeladen

8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech studentsHimanshiGarg82
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsArshad QA
 
Chinsurah Escorts ☎️8617697112 Starting From 5K to 15K High Profile Escorts ...
Chinsurah Escorts ☎️8617697112  Starting From 5K to 15K High Profile Escorts ...Chinsurah Escorts ☎️8617697112  Starting From 5K to 15K High Profile Escorts ...
Chinsurah Escorts ☎️8617697112 Starting From 5K to 15K High Profile Escorts ...Nitya salvi
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Steffen Staab
 
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...SelfMade bd
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...harshavardhanraghave
 
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfonteinmasabamasaba
 
%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrandmasabamasaba
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...Health
 
VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnAmarnathKambale
 
Announcing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK SoftwareAnnouncing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK SoftwareJim McKeeth
 
%+27788225528 love spells in Vancouver Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Vancouver Psychic Readings, Attraction spells,Br...%+27788225528 love spells in Vancouver Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Vancouver Psychic Readings, Attraction spells,Br...masabamasaba
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisamasabamasaba
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️Delhi Call girls
 
%in Lydenburg+277-882-255-28 abortion pills for sale in Lydenburg
%in Lydenburg+277-882-255-28 abortion pills for sale in Lydenburg%in Lydenburg+277-882-255-28 abortion pills for sale in Lydenburg
%in Lydenburg+277-882-255-28 abortion pills for sale in Lydenburgmasabamasaba
 
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfonteinmasabamasaba
 
The Top App Development Trends Shaping the Industry in 2024-25 .pdf
The Top App Development Trends Shaping the Industry in 2024-25 .pdfThe Top App Development Trends Shaping the Industry in 2024-25 .pdf
The Top App Development Trends Shaping the Industry in 2024-25 .pdfayushiqss
 
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdfintroduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdfVishalKumarJha10
 

Kürzlich hochgeladen (20)

8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
Chinsurah Escorts ☎️8617697112 Starting From 5K to 15K High Profile Escorts ...
Chinsurah Escorts ☎️8617697112  Starting From 5K to 15K High Profile Escorts ...Chinsurah Escorts ☎️8617697112  Starting From 5K to 15K High Profile Escorts ...
Chinsurah Escorts ☎️8617697112 Starting From 5K to 15K High Profile Escorts ...
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learn
 
Announcing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK SoftwareAnnouncing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK Software
 
%+27788225528 love spells in Vancouver Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Vancouver Psychic Readings, Attraction spells,Br...%+27788225528 love spells in Vancouver Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Vancouver Psychic Readings, Attraction spells,Br...
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
%in Lydenburg+277-882-255-28 abortion pills for sale in Lydenburg
%in Lydenburg+277-882-255-28 abortion pills for sale in Lydenburg%in Lydenburg+277-882-255-28 abortion pills for sale in Lydenburg
%in Lydenburg+277-882-255-28 abortion pills for sale in Lydenburg
 
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
 
The Top App Development Trends Shaping the Industry in 2024-25 .pdf
The Top App Development Trends Shaping the Industry in 2024-25 .pdfThe Top App Development Trends Shaping the Industry in 2024-25 .pdf
The Top App Development Trends Shaping the Industry in 2024-25 .pdf
 
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdfintroduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
 

SMB270: Security Essentials for ITSM

  • 1.
  • 2.
  • 3. SMB270 Security Essentials for ITSM Ian Aitchison, Sr Product Director Alan Taylor, Director Sales Engineering
  • 4. Security Essentials for ITSM Closing the Gap Between Security and IT Operations Continually maintaining a secure IT environment requires proactive best practice security activities to ensure ongoing security. In addition, cybersecurity attacks are on the rise, resulting in high-impact breaches that demand responses. ITSM can play a part in detecting and responding appropriately to breaches or threats. From security incident management to coordination and communication with the security team, learn how to identify impacts, reduce risks, and deliver security controls and improvements while still maintaining end-user productivity.
  • 5. Chaos Reactive Proactive Optimized Everybody Wants (or should want) to get from Reactive to Proactive
  • 6. Prevention is Better than Cure Chaos FIRE HAZARD Reactive USE TOOLS TO PREVENT, DETECT, REACT Proactive DO IT PROPERLY Tools monitor and adjust in the way you need to avoid needing cure
  • 7. Guidance on how to use tools to do the job is Better
  • 8. A maturity model of maturity models! How mature are different IT functions Ian Opinion Chaos Reactive Proactive Optimized Security ITSM ITIL ITAM IAITAM BPL DevOps
  • 9. Because IT Security is about more than just Detect, Prevent and Correct
  • 10.
  • 11. Security and ITSM? Yeah that’s just all SIM, right? Secure Incident Management?
  • 12. Why SIM is NOT ENOUGH Computer security incident management is a specialized form of incident management, the primary purpose of which is the development of a well understood and predictable response to damaging events and computer intrusions. Incident management requires a process and a response team which follows this process.
  • 13. ITIL 2011 activities and processes Service Strategy Continual Service Improvement Service Operations Service Transition Service Design Financial Management Demand Management Strategy Operations Service Portfolio Management Service Level Management Availability Management Capacity Management Continuity Management Information Security Management Service Catalog Management Supplier Management Change Management Service Asset Config Mgmt Release & Deploy Management Transition Support and Planning Service Validation and Testing Evaluation Knowledge Management Service Desk Incident Management Problem Management Access Management Event Management Request Fulfillment Process Improvement Tech Mgmnt App Mgmnt IT Ops Mgmnt Key Process Function WHERE’S SECURITY? EVERYWHERE!! SIM
  • 14. Security is in ITIL These are the Information Security Management sub-processes and their process objectives: Design of Security Controls Process Objective: To design appropriate technical and organizational measures in order to ensure the confidentiality, integrity, security and availability of an organization's assets, information, data and services. Security Testing Process Objective: To make sure that all security mechanisms are subject to regular testing. Management of Security Incidents Process Objective: To detect and fight attacks and intrusions, and to minimize the damage incurred by security breaches. Security Review Process Objective: To review if security measures and procedures are still in line with risk perceptions from the business side, and to verify if those measures and procedures are regularly maintained and tested.
  • 15. Get Over IT Yeah but…. Security Controls Security Incidents Security Testing Security Review Security Changes Security Improvement
  • 16. ITIL GETS IT WRONG Data security over IT security (doesn’t worry about hacks, firewall gaps, virus, ransomware etc). Just cares about ‘is the data in a secure position’ or not Does not specify technical components required in place (patch, whitelist, blacklist, threat detection etc etc)
  • 17. Security is not just Something We Do Security is also How We Do Everything We Do
  • 18. ITIL 2011 activities and processes Service Strategy Continual Service Improvement Service Operations Service Transition Service Design Financial Management Demand Management Strategy Operations Service Portfolio Management Service Level Management Availability Management Capacity Management Continuity Management Information Security Management Service Catalog Management Supplier Management Change Management Service Asset Config Mgmt Release & Deploy Management Transition Support and Planning Service Validation and Testing Evaluation Knowledge Management Service Desk Incident Management Problem Management Access Management Event Management Request Fulfillment Process Improvement Tech Mgmnt App Mgmnt IT Ops Mgmnt Key Process Function WHERE’S SECURITY? EVERYWHERE!!
  • 19.
  • 22. 1.4.5 A definition of cyber resilience Good cyber resilience is a complete, collaborative approach driven by the board but involving everyone in the organization and extending to the supply chain, partners and customers. To balance the cyber risks faced by the business against the opportunities and competitive advantages it can gain, effective cyber resilience requires an enterprise-wide risk-based strategy that proactively manages the vulnerabilities, threats, risks and impacts on its critical information and supporting assets. It also involves moving away from strategies that seek solely to prevent attacks on assets to ones that include preparing for, and recovering from, a cyber-attack.
  • 23. Resilia The critical elements of effective cyber resilience include: ●● Clear board-level ownership and responsibility for cyber resilience ●● The adoption of tailored learning and development for all staff. This in turn will establish: ●● A clear understanding of what the organization’s critical assets are, especially with regard to information ●● A clear view of the organization’s key threats and vulnerabilities arising from their environment, including that of their customers, partners and supply chain ●● The adoption of a common language used by all stakeholders in the organization ●● An assessment of the organization’s cyber resilience maturity and design of appropriate, prioritized and proportionate plans using best-practice guidance ●● An appropriate balance of controls to prevent, detect and correct.
  • 26. ITSM Security Automatically receive detected alerts from monitoring tools. Create ITSM ‘event’ processes with automated response and corrective actions. Follows ITSM Event Mgnt guidelines. May link to Incident Management eg, new virus detected in 25% of machines, do we want to do something? Event Management
  • 27. ITSM Security Security Incident : creation and predefined response, escalation and resolution processes from within service desk, from email, from self service, from voice etc. Aligns with ITSM best practice incident management. May create Major Incident. eg “I have a virus error message”, “Is this a phishing email?” Incident Management
  • 28. ITSM Security Predefined Major Incident workflow – notification, escalation, communication, automation. Significant business impact from current security event Major Incident Management
  • 29. ITSM Security Business response to Breach (Press, WebSite, Internal Comms) May be linked to Major Incident. “We’ve been hacked!” Major Breach Response
  • 30. ITSM Security Planned, scheduled security assessment exercise – internal or external, includes assignment and completion of corrective actions. Vulnerability assessments, pen tests. Security Assessment
  • 31. ITSM Security Self Service and Knowledge published guidelines, recommendations and advice to business users. Security personal assessment and user training tracking. “access your security awareness documentation and training here” Business Education
  • 32. ITSM Security Reports and Evidence data captured automatically to ensure compliance with GRC requirements and standards. PCI, HIPAA etc Governance and Compliance
  • 33. ITSM Security Latest alerts, news, best practice, advice, warning from the broader industry into searchable security knowledge base Security Knowledge
  • 34. ITSM Security Predefined scorecards and dashboards for industry security frameworks, plus complete business security posture Standard Scorecards and Dashboards
  • 36. Metrics Source : cyber resilience and ITSM, Alexos
  • 37. Learn More ▪Resilia ▪ISO/IEC 27001 ▪NIST ▪ITIL ▪ISO/IEC 20000 Source : cyber resilience and ITSM, Alexos
  • 39. Demo Time 1 - Event Management = Automatic Security Alert/Incident from external monitoring tools 2 - Breach Reaction = controlled response sequence to major security breach 3 - Dashboard - all types of security activity in one place ALAN - what can you do here?
  • 40. Security in ITSM, also consider ▪ User record – has been security trained ▪ Change and Release – Security risk assess, security change approve ▪ Knowledge – article types ‘security’ for IT and the Business ▪ Self Service – EndUser security status, security news, security assessments ▪ Service improvement – better secure posture is improvement too! ▪ Resolution cause – security issue? ▪ Problem Management – root cause. Eliminate future security incidents ▪ Also – is your ITSM tool secure? Often public facing, what security, password, auditing in place?