SlideShare a Scribd company logo
CNIT 160:
Cybersecurity
Responsibilities
4. Information Security
Program Development

Part 4

Pages 257-275
Topics in this Lecture
• Administrative Activities
• External Partnerships (p. 257)
• Compliance Management
• Personnel Management
• Project and Program Management
• Budget
• Business Case Development
• Vendor Management
• Security Program Operations
• Event Monitoring
• Vulnerability Management
• Security Program Operations
• Secure Engineering and Development
• Network Protection (p. 277)
• Endpoint Protection & Mgmt (p. 288)
• Identity and Access Management (p. 292)
Chapter Topics
For Later Lectures
• Security Program Operations
• Security Incident Management
• Security Awareness Training
• Managed Security Services Providers
• Data Security (p. 302)
• Business Continuity Planning
Chapter Topics
For Later Lectures
• IT Service Management (p. 322)
• Controls
• Metrics and Monitoring
• Continuous Improvement
Chapter Topics
For Later Lectures
Administrative Activities
External Partnerships
Law Enforcement
• Cultivate relationships in advance of
incidents
• USA
• FBI (InfraGard)
• Secret Service (HTCIA)
• Global
• Interpol
Regulators and Auditors
• Partners, not adversaries
• Understand their ethical boundaries
Standards Organizations
• PCI Security Standards Council
• Cloud Security Alliance
• Information Security Forum
• International Organization for
Standardization (ISO) and the International
Electrotechnical Commission (IEC)
Professional Organizations
• ISACA
• Developer of CISM and CISA
certifications
• ISSA (Information Systems Security
Association)
• (ISC)2 (International Information Systems
Security Certification Consortium)
• Developer of CISSP certification
Professional Organizations
• CSA (Cloud Security Alliance)
• EC-Council (International Council of
Electronic Commerce Consultants)
• Developer of CEH (Certified Ethical
Hacker) certification
• SANS
• Developer of GIAC certifications
Security Professional
Services Vendors
• Essential partners of security managers
• Must develop trusted relationships
• Virtual CISOs or CISO advisors
• Can assist with strategy for
• acquisition, implementation, and
operation of security tools
Security Product Vendors
• Need good relationships with vendors
• Often an area with problems
• Constantly changing
• New vendors, new products
Administrative Activities
Compliance Management
Compliance
• Conformance to applicable policies,
standards, regulations, and other
requirements
• Security manager must determine whether
• Information systems, processes, and
personnel
• conform to those things
Compliance or Security
• Two categories of organizations
• Compliance based
• "Check the box"
• Do the bare minimum
• Security and risk based
• Perform risk assessments, etc.
Applicability
Compliance Risk
• Risk from failure to comply
• With an applicable law or other legal
obligation
• Risks may include
• Sensitive data exposure
• Fines and sanctions
Compliance Enforcement
• Audits, control self-assessments, and other
examinations of systems and processes
• Reveal both direct risks and compliance
risk
Administrative Activities
Personnel Management
Finding and Retaining
Talent
• Shortage of skilled workers
• Retaining talent is a challenge
• They get bored and seek new challenges
• Look within your organization
• Cross over from IT to information
security
Roles and Responsibilities
• Role
• A designation that denotes a set of
responsibilities
• Examples: security manager, security engineer,
security analyst
• Responsibility
• A stated expectation of activities and
performance
• Examples: weekly scans, risk assessments,
access requests
Defining Roles and
Responsibilities
• Security manager
• Analyzes the required activities in the
security team
• Groups them along with
• Subject matter, skill levels, and other
considerations
• Gives them roles and job titles
Job Descriptions
• Formal description of a position, including
• Job title
• Work experience requirements
• Knowledge requirements
• Responsibilities
Culture
• Attitudes, practices, communication styles,
ethics, etc.
• Many organizations don't regard
information security as important
• So the security manager must promote
security awareness in subtle ways
• Developing a "culture within a culture"
Professional Development
• Constant learning
• This is combat
• The adversaries are constantly improving
Career Paths
• Most security workers change companies
every two years
• To advance to the next level
• Providing a career path can prevent that
Specialties
Certifications
(Non-Vendor)
• Security+
• Entry-level
• SSCP from (ISC)2
• More technical than CISSP
• GIAC from SANS
• CEH from EC-Council
• CCSP from Cloud Security Alliance
• CISSP from (ISC)2
• Essential. Non-technical.
• CSSLP (Certified Secure Software Lifecycle
Professional) from (ISC)2
• Essential. Non-technical.
Certifications
(Non-Vendor)
• ISACA Certifications
• CISM (Certified Information Security
Manager)
• CISA (Certified Information Systems
Auditor)
• CRISC (Certified in Risk and Information
Systems Control)
Certifications
(Non-Vendor)
• Check Point Certified Security
Administrator (CCSA)
• Certified Forensic Security Responder
(CFSR) from Guidance Software
• Radware Certified Security Specialist
(RCSS)
• Metasploit Certified Specialist from Rapid7
• WhiteHat Certified Secure Developer
Certifications
(Vendor)
Training
Training
• Minimum: one week
• Often employers reimburse college tuition
• I know DriveSavers gives six weeks of
training a year
• Employees stay there for decades
Splunk
From https://www.greatplacetowork.com/certified-company/1300565
Ch 4d-1
Administrative Activities
Project and Program Management
Projects
• The field is in continuous change
• Project
• A group activity to achieve a particular
aim
• Program Management
• Management of several concurrent
projects
Administrative Activities
Budget
Activities to Include
Return on Security
Investment (ROSI)
• Security improvements don't increase
revenue or lower costs
• The benefit is risk reduction
• Difficult to justify to management
Administrative Activities
Business Case Development
Business Case
• The rationale for making a business
investment
• Used to justify making an investment
• And to support management of the
investment later
• Explains the benefits of the investment
Feasibility
• Feasibility study
• Defines the business problem
• Describes a number of potential
solutions
• Business case should go further
• And include figures for costs and benefits
Business Case Contents
• Business problem
• Feasibility study results
• Increased revenue or efficiency analysis
• High-level project plan
• Timeline and number of people
• Budget
• Metrics
• Risks
Administrative Activities
Vendor Management
Trust Relationships
• Security managers need deep, trusted
relationships with security services
vendors
• Must confide challenges to a vendor
• And get advice that will benefit the
business
• Not just make a sale
Security Program
Operations
Security Program Operations
Topics
• In this lesson
• Event Monitoring
• Vulnerability Management
Security Program Operations
Topics
• For future lessons
• Secure Engineering and Development
• Network Protection
• Endpoint Protection and Management
• Identity and Access Management
Security Program Operations
Topics (continued)
• For future lessons
• Security Incident Management Security
Awareness Training
• Managed Security Service Providers
(MSSPs)
• Data Security
• Business Continuity Planning
Event Monitoring
Log Reviews
• Many devices have logs
• Firewalls, servers, operating systems...
• Log review used to be a daily activity
• Now most organizations perform real-time
event monitoring
Centralized Log
Managment
• All the events are sent to a log server
• Archives events so they can be reviewed
• Used by the SEIM (next slide)
SEIM (Security Event and
Incident Management)
• A system that correlates events from many
sources
• Splunk is the industry leader
Threat Intelligence
• SIEMs can ingest threat intelligence feeds
• External sources of adversary information
• Such as IP addresses of known attackers
Orchestration
• A scripted, automated response
• Automatically or manually triggered when
specific events occur
• Automates repetitive tasks
• Makes response much faster
Security Program Operations
Vulnerability Management
Vulnerability Managment
• The practice of periodically examing
information systems
• To discover exploitable vulnerabilities
• With analysis and decisions about
remediation
Scanning Tools
Vulnerability Management
Activities
• Periodic scanning
• Analysis of scan results
• Common Vulnerability Scoring System
(CVSS)
• Contextual criticality
• Delivery of scan results to asset owners
• Remediation
Common Vulnerability
Scoring System (CVSS)
• Open framework
• Rates vulnerabilities from 0 to 10
• Includes exploitability, impact, and
complexity
Vulnerability Identification
Techniques
• Security scan
• With an automated tool
• Penetration test
• People simulating an attacker
• Social engineering assessment
• Phishing or other attacks against humans
Patch Management
• Adding vendor patches to IT systems,
tools, and applications
• Only the smallest organizations can do it
manually
• Automated tools ensure that all systems
are patched consistently
Ch 4d-2

More Related Content

PDF
CNIT 160 4d Security Program Management (Part 4)
PDF
CNIT 160: 3. Information Risk Management (Part 4)
PDF
CNIT 160 Ch 4 Information Security Program Development (Part 3)
PDF
CNIT 160 4b: Security Program Management (Part 2)
PDF
CNIT 160 Ch 4c: Security Program Development (Part 3)
PDF
CNIT 160 4e Security Program Management (Part 5)
PDF
CNIT 160: Ch 2b: Security Strategy Development
PDF
1. Security and Risk Management
CNIT 160 4d Security Program Management (Part 4)
CNIT 160: 3. Information Risk Management (Part 4)
CNIT 160 Ch 4 Information Security Program Development (Part 3)
CNIT 160 4b: Security Program Management (Part 2)
CNIT 160 Ch 4c: Security Program Development (Part 3)
CNIT 160 4e Security Program Management (Part 5)
CNIT 160: Ch 2b: Security Strategy Development
1. Security and Risk Management

What's hot (20)

PDF
CNIT 160 Ch 4a: Information Security Programs
PDF
CNIT 160 Ch 4b: Security Program Management
PDF
CNIT 160: Ch 3c: The Risk Management Life Cycle
PDF
Ch 3a: Risk Management Concepts
PDF
2. Asset Security
PDF
CNIT 160: Ch 3d: Operational Risk Management
PDF
CNIT 160: Ch 3a: Risk Management Concepts & Implementing a Program
PDF
6. Security Assessment and Testing
PDF
CISSP Prep: Ch 1: Security Governance Through Principles and Policies
PDF
CNIT 160: Ch 2a: Introduction to Information Security Governance
PDF
CNIT 160 Ch 4a: Information Security Programs
PDF
CNIT 160: Ch 3c: The Risk Management Life Cycle
PDF
CNIT 160 Ch 4b: Security Program Management
PPTX
CISSP - Security Assessment
PDF
3. Security Engineering
PDF
7. Security Operations
PDF
3. Security Engineering
PPTX
Chapter 5 - Identity Management
PPTX
Chapter 1 Law & Ethics
PDF
1. Security and Risk Management
CNIT 160 Ch 4a: Information Security Programs
CNIT 160 Ch 4b: Security Program Management
CNIT 160: Ch 3c: The Risk Management Life Cycle
Ch 3a: Risk Management Concepts
2. Asset Security
CNIT 160: Ch 3d: Operational Risk Management
CNIT 160: Ch 3a: Risk Management Concepts & Implementing a Program
6. Security Assessment and Testing
CISSP Prep: Ch 1: Security Governance Through Principles and Policies
CNIT 160: Ch 2a: Introduction to Information Security Governance
CNIT 160 Ch 4a: Information Security Programs
CNIT 160: Ch 3c: The Risk Management Life Cycle
CNIT 160 Ch 4b: Security Program Management
CISSP - Security Assessment
3. Security Engineering
7. Security Operations
3. Security Engineering
Chapter 5 - Identity Management
Chapter 1 Law & Ethics
1. Security and Risk Management
Ad

Similar to CNIT 160 4d Security Program Management (Part 4) (20)

PPTX
Professional Designations IT Assurance
PPT
SLVA - Security monitoring and reporting itweb workshop
PPTX
Cybersecurity Frameworks and You: The Perfect Match
PPT
Introduction to information security
PPT
01Introduction to Information Security.ppt
PPTX
Assessing System Risk the Smart Way
PDF
Careers in Cyber Security
PDF
What Skills Does A Cybersecurity Analyst Need.pdf
PDF
CISSP Certification Course InfosecTrain.pdf
PDF
CISSP Preview - For the next generation of Security Leaders
PDF
Today's Cyber Challenges: Methodology to Secure Your Business
PPTX
Building Your Information Security Program: Frameworks & Metrics
PDF
cissp-course content.pdf & cissp description
PDF
CISSP _Course _Description and course overview
PDF
ISO27001: Implementation & Certification Process Overview
PDF
CISSP - Certified Information Systems Security Professional
PPTX
CyberSec First Responder: Incident Response & Threat Analysis // CyberSAFE: S...
PDF
Cervone uof t - nist framework (1)
PDF
CNIT 121: 2 IR Management Handbook
PPTX
Nist 800 53 deep dive 20210813
Professional Designations IT Assurance
SLVA - Security monitoring and reporting itweb workshop
Cybersecurity Frameworks and You: The Perfect Match
Introduction to information security
01Introduction to Information Security.ppt
Assessing System Risk the Smart Way
Careers in Cyber Security
What Skills Does A Cybersecurity Analyst Need.pdf
CISSP Certification Course InfosecTrain.pdf
CISSP Preview - For the next generation of Security Leaders
Today's Cyber Challenges: Methodology to Secure Your Business
Building Your Information Security Program: Frameworks & Metrics
cissp-course content.pdf & cissp description
CISSP _Course _Description and course overview
ISO27001: Implementation & Certification Process Overview
CISSP - Certified Information Systems Security Professional
CyberSec First Responder: Incident Response & Threat Analysis // CyberSAFE: S...
Cervone uof t - nist framework (1)
CNIT 121: 2 IR Management Handbook
Nist 800 53 deep dive 20210813
Ad

More from Sam Bowne (20)

PDF
Introduction to the Class & CISSP Certification
PDF
Cyberwar
PDF
3: DNS vulnerabilities
PDF
8. Software Development Security
PDF
4 Mapping the Application
PDF
3. Attacking iOS Applications (Part 2)
PDF
12 Elliptic Curves
PDF
11. Diffie-Hellman
PDF
2a Analyzing iOS Apps Part 1
PDF
9 Writing Secure Android Applications
PDF
12 Investigating Windows Systems (Part 2 of 3)
PDF
10 RSA
PDF
12 Investigating Windows Systems (Part 1 of 3
PDF
9. Hard Problems
PDF
8 Android Implementation Issues (Part 1)
PDF
11 Analysis Methodology
PDF
8. Authenticated Encryption
PDF
7. Attacking Android Applications (Part 2)
PDF
7. Attacking Android Applications (Part 1)
PDF
5. Stream Ciphers
Introduction to the Class & CISSP Certification
Cyberwar
3: DNS vulnerabilities
8. Software Development Security
4 Mapping the Application
3. Attacking iOS Applications (Part 2)
12 Elliptic Curves
11. Diffie-Hellman
2a Analyzing iOS Apps Part 1
9 Writing Secure Android Applications
12 Investigating Windows Systems (Part 2 of 3)
10 RSA
12 Investigating Windows Systems (Part 1 of 3
9. Hard Problems
8 Android Implementation Issues (Part 1)
11 Analysis Methodology
8. Authenticated Encryption
7. Attacking Android Applications (Part 2)
7. Attacking Android Applications (Part 1)
5. Stream Ciphers

Recently uploaded (20)

PDF
RMMM.pdf make it easy to upload and study
PDF
O7-L3 Supply Chain Operations - ICLT Program
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PDF
Pre independence Education in Inndia.pdf
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PDF
01-Introduction-to-Information-Management.pdf
PPTX
Institutional Correction lecture only . . .
PDF
Microbial disease of the cardiovascular and lymphatic systems
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PPTX
PPH.pptx obstetrics and gynecology in nursing
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PDF
Classroom Observation Tools for Teachers
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PPTX
Cell Structure & Organelles in detailed.
PDF
Computing-Curriculum for Schools in Ghana
PPTX
master seminar digital applications in india
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
RMMM.pdf make it easy to upload and study
O7-L3 Supply Chain Operations - ICLT Program
human mycosis Human fungal infections are called human mycosis..pptx
Pre independence Education in Inndia.pdf
O5-L3 Freight Transport Ops (International) V1.pdf
01-Introduction-to-Information-Management.pdf
Institutional Correction lecture only . . .
Microbial disease of the cardiovascular and lymphatic systems
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
Microbial diseases, their pathogenesis and prophylaxis
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PPH.pptx obstetrics and gynecology in nursing
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
Classroom Observation Tools for Teachers
Renaissance Architecture: A Journey from Faith to Humanism
Cell Structure & Organelles in detailed.
Computing-Curriculum for Schools in Ghana
master seminar digital applications in india
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf

CNIT 160 4d Security Program Management (Part 4)