SlideShare a Scribd company logo
Internal I.T. Security

Security within an organization’s network
Contents




4/5/2010     Soumitri   2
Overview
• Brief introduction to what this niche segment
  is all about
• IT Security comprises:
      o People, Processes & Technologies
      o Network, Application, Database, Endpoint, Messaging
      o Policy definition, Policy enforcement, Monitoring &
        Reporting




4/5/2010                       Soumitri                       3
Industry Perspective - People
• Identity and Access Management
      – Identity Management
           • Enterprise Employee Directory
      – Access Management
           • Single Sign On, Web Sign On, Tokens, Smart Cards, etc
      – Privilege Management
           • Layered solutions, Segregation of Duties
      – Audit & Reporting
      – Education & Training
4/5/2010                         Soumitri                            4
Industry Perspective - Process
• Risk Management
      – Risk Modeling Tools
• Policy Design & Development
      – Templates, External Consultants, etc
• Business Continuity & Disaster Recovery
      – Multiple Geographic Storage Sites
• Incident & Threat Management
      – Incident Response Platforms

4/5/2010                      Soumitri         5
Industry Perspective - Process (2)
• Information Asset Management
      – Inventory of Assets (includes People)
• Systems Development
      – Architecture
      – Modeling Tools
      – Coding Standards
• Operations Management
      – Monitoring Tools

4/5/2010                    Soumitri            6
Industry Perspective - Technology
• Network
      – Perimeter security: Firewalls, WLAN, VPN, NIDPS
• Application
      – Coding standards: Static Analysis Tools, Monitoring
• Database
      – Privilege Management: Encryption, Monitoring
• Endpoint
      – Desktops & Servers: Anti-Virus, DLP Suites, Encryption
• Messaging
      – Anti-Spam/Virus/Malware, Encryption
• Data
      – Disk & File encryption, Monitoring & Management, DRM

4/5/2010                          Soumitri                       7
What is DLP?
• Data Leak Protection:
    “Systems that identify, monitor, and protect data in use, data in motion,
    and data at rest through deep content inspection, contextual security
    analysis of transaction and with a centralized management framework”
• Data at Rest – Endpoint actions
• Data in Motion – Network actions
• Data in Use – Data storage
• Systems are designed to detect and prevent the unauthorized
  use and transmission of confidential information



4/5/2010                            Soumitri                                8
DLP Process
1)     Define Confidential Policy
2)     Discover Exposed Data
3)     Enforce Policy
4)     Feedback & Corrective Mechanism
5)     Report Generation and Management




4/5/2010               Soumitri           9
Usage & Benefits
• Demonstrates Regulatory Compliance
      – HIPAA, GLBA, PCI, BASEL II, SOX
• Helps prevent Identity Theft
• Seamless integration in PMO
• Protects Brand & Reputation




4/5/2010                        Soumitri   10
Conclusion
• Internal IT Security is an evolving technology
• It is a niche area requiring domain & technical
  expertise
• Compliance: PCI, SOX, BASEL II, GLBA
      – At least one compliance knowledge is needed
• Certifications: SSCP, CISSP
• More Info: International Information Systems
  Security Certification Consortium website
4/5/2010                   Soumitri                   11
Conclusion (2)
• Career Path: External Security Consultants, IT
  Security Officer, CISO
• Management & Communication skills are
  required
• Firm Knowledge of:
      –    Organization’s strategic objectives
      –    Management issues
      –    Impact of Security policies on Business functions
      –    Comprehensive Technical Info
      –    Future Trends
4/5/2010                         Soumitri                      12
Thank You
                &
           Best Wishes



4/5/2010       Soumitri   13

More Related Content

PPTX
Information security - what is going on 2016
PPTX
Identity theft and data responsibilities
PPTX
Data security
PDF
Tax Preparers Presentation
PDF
VISULOX-Summary-SN
PDF
OTechs Information Security Training Course
DOC
Ofer Cohen - areas of expertise
Information security - what is going on 2016
Identity theft and data responsibilities
Data security
Tax Preparers Presentation
VISULOX-Summary-SN
OTechs Information Security Training Course
Ofer Cohen - areas of expertise

What's hot (19)

DOCX
PPTX
Tips memulai karir di cybersecurity
PPTX
Data security strategies and drivers
DOC
JM_Resume
PPTX
Edge pereira oss304 tech ed australia regulatory compliance and microsoft off...
PDF
TechTalks | Software Security 101: What Every Startup Needs to Know to Protec...
PPTX
Introduction to Security (Hardware, Software, Data & Policies)
PDF
Classification-HowToBoostInformationProtection
PPT
Security In Web Conferencing
PPTX
Data protection and security
PPTX
Fasoo Secure Document (FSD) for SharePoint
PPTX
Ethical hacking
PPTX
NRF Presentation v2
PPTX
Cyber security
KEY
New Massachusetts Data Privacy Regulation
PPTX
Tyler Technology Expo
PDF
Data Security Solutions_2010 @Vilnius December Opening
PDF
Intro to information security
PDF
Karel Obluk (Evolution Equity Partners) - Cybersecurity: Challenges and Oppor...
Tips memulai karir di cybersecurity
Data security strategies and drivers
JM_Resume
Edge pereira oss304 tech ed australia regulatory compliance and microsoft off...
TechTalks | Software Security 101: What Every Startup Needs to Know to Protec...
Introduction to Security (Hardware, Software, Data & Policies)
Classification-HowToBoostInformationProtection
Security In Web Conferencing
Data protection and security
Fasoo Secure Document (FSD) for SharePoint
Ethical hacking
NRF Presentation v2
Cyber security
New Massachusetts Data Privacy Regulation
Tyler Technology Expo
Data Security Solutions_2010 @Vilnius December Opening
Intro to information security
Karel Obluk (Evolution Equity Partners) - Cybersecurity: Challenges and Oppor...
Ad

Similar to IT Security Guest Lecture (20)

PPTX
CISA Training - Chapter 4 - 2016
PDF
Rothke stimulating your career as an information security professional
PPTX
TECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFE
PPTX
Information security: importance of having defined policy & process
PPT
It Audit And Forensics
PDF
Information Security for Small Business
PDF
Information Security for Small Business
PPT
002.itsecurity bcp v1
PDF
Leading Practices in Information Security & Privacy
PDF
Emerging Trends in Information Privacy and Security
PDF
Emerging Trends in Information Privacy and Security
PDF
How to Build and Implement your Company's Information Security Program
PDF
IS3 Capabilities Brief
PPTX
Data Management - NA CACS 2009
PPT
Lecture Data Classification And Data Loss Prevention
PPT
Data Classification And Loss Prevention
PPT
Lecture data classification_and_data_loss_prevention
PDF
Is3 Capabilities Brief
PPT
Securing your esi_piedmont
CISA Training - Chapter 4 - 2016
Rothke stimulating your career as an information security professional
TECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFE
Information security: importance of having defined policy & process
It Audit And Forensics
Information Security for Small Business
Information Security for Small Business
002.itsecurity bcp v1
Leading Practices in Information Security & Privacy
Emerging Trends in Information Privacy and Security
Emerging Trends in Information Privacy and Security
How to Build and Implement your Company's Information Security Program
IS3 Capabilities Brief
Data Management - NA CACS 2009
Lecture Data Classification And Data Loss Prevention
Data Classification And Loss Prevention
Lecture data classification_and_data_loss_prevention
Is3 Capabilities Brief
Securing your esi_piedmont
Ad

Recently uploaded (20)

PDF
Approach and Philosophy of On baking technology
PDF
Hindi spoken digit analysis for native and non-native speakers
PDF
Accuracy of neural networks in brain wave diagnosis of schizophrenia
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
Encapsulation theory and applications.pdf
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
Web App vs Mobile App What Should You Build First.pdf
PPTX
OMC Textile Division Presentation 2021.pptx
PDF
WOOl fibre morphology and structure.pdf for textiles
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
Hybrid model detection and classification of lung cancer
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PDF
Zenith AI: Advanced Artificial Intelligence
PDF
August Patch Tuesday
PPTX
cloud_computing_Infrastucture_as_cloud_p
PDF
Heart disease approach using modified random forest and particle swarm optimi...
Approach and Philosophy of On baking technology
Hindi spoken digit analysis for native and non-native speakers
Accuracy of neural networks in brain wave diagnosis of schizophrenia
NewMind AI Weekly Chronicles - August'25-Week II
Encapsulation theory and applications.pdf
Assigned Numbers - 2025 - Bluetooth® Document
Web App vs Mobile App What Should You Build First.pdf
OMC Textile Division Presentation 2021.pptx
WOOl fibre morphology and structure.pdf for textiles
Programs and apps: productivity, graphics, security and other tools
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
MIND Revenue Release Quarter 2 2025 Press Release
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
Hybrid model detection and classification of lung cancer
Univ-Connecticut-ChatGPT-Presentaion.pdf
Zenith AI: Advanced Artificial Intelligence
August Patch Tuesday
cloud_computing_Infrastucture_as_cloud_p
Heart disease approach using modified random forest and particle swarm optimi...

IT Security Guest Lecture

  • 1. Internal I.T. Security Security within an organization’s network
  • 2. Contents 4/5/2010 Soumitri 2
  • 3. Overview • Brief introduction to what this niche segment is all about • IT Security comprises: o People, Processes & Technologies o Network, Application, Database, Endpoint, Messaging o Policy definition, Policy enforcement, Monitoring & Reporting 4/5/2010 Soumitri 3
  • 4. Industry Perspective - People • Identity and Access Management – Identity Management • Enterprise Employee Directory – Access Management • Single Sign On, Web Sign On, Tokens, Smart Cards, etc – Privilege Management • Layered solutions, Segregation of Duties – Audit & Reporting – Education & Training 4/5/2010 Soumitri 4
  • 5. Industry Perspective - Process • Risk Management – Risk Modeling Tools • Policy Design & Development – Templates, External Consultants, etc • Business Continuity & Disaster Recovery – Multiple Geographic Storage Sites • Incident & Threat Management – Incident Response Platforms 4/5/2010 Soumitri 5
  • 6. Industry Perspective - Process (2) • Information Asset Management – Inventory of Assets (includes People) • Systems Development – Architecture – Modeling Tools – Coding Standards • Operations Management – Monitoring Tools 4/5/2010 Soumitri 6
  • 7. Industry Perspective - Technology • Network – Perimeter security: Firewalls, WLAN, VPN, NIDPS • Application – Coding standards: Static Analysis Tools, Monitoring • Database – Privilege Management: Encryption, Monitoring • Endpoint – Desktops & Servers: Anti-Virus, DLP Suites, Encryption • Messaging – Anti-Spam/Virus/Malware, Encryption • Data – Disk & File encryption, Monitoring & Management, DRM 4/5/2010 Soumitri 7
  • 8. What is DLP? • Data Leak Protection: “Systems that identify, monitor, and protect data in use, data in motion, and data at rest through deep content inspection, contextual security analysis of transaction and with a centralized management framework” • Data at Rest – Endpoint actions • Data in Motion – Network actions • Data in Use – Data storage • Systems are designed to detect and prevent the unauthorized use and transmission of confidential information 4/5/2010 Soumitri 8
  • 9. DLP Process 1) Define Confidential Policy 2) Discover Exposed Data 3) Enforce Policy 4) Feedback & Corrective Mechanism 5) Report Generation and Management 4/5/2010 Soumitri 9
  • 10. Usage & Benefits • Demonstrates Regulatory Compliance – HIPAA, GLBA, PCI, BASEL II, SOX • Helps prevent Identity Theft • Seamless integration in PMO • Protects Brand & Reputation 4/5/2010 Soumitri 10
  • 11. Conclusion • Internal IT Security is an evolving technology • It is a niche area requiring domain & technical expertise • Compliance: PCI, SOX, BASEL II, GLBA – At least one compliance knowledge is needed • Certifications: SSCP, CISSP • More Info: International Information Systems Security Certification Consortium website 4/5/2010 Soumitri 11
  • 12. Conclusion (2) • Career Path: External Security Consultants, IT Security Officer, CISO • Management & Communication skills are required • Firm Knowledge of: – Organization’s strategic objectives – Management issues – Impact of Security policies on Business functions – Comprehensive Technical Info – Future Trends 4/5/2010 Soumitri 12
  • 13. Thank You & Best Wishes 4/5/2010 Soumitri 13