SlideShare a Scribd company logo
3
Most read
5
Most read
8
Most read
ENTERPRISE SECURITY
ARCHITECTURE APPROACH –
CYBER RESILIENCE
MAGANATHIN VEERARAGALOO
7TH DECEMBER 2021
APPROACH
1. Risk Assessment - Security Scorecard (free assessment)
2. Asset Discovery Bit Discovery (initially free)
3. Automated Penetration Testing (Blue/Red Team Approach) – no cost
free tools
4. Vulnerability Scan – enterprise context (automated tools) –open
source
5. Active Directory and Email Analysis (Email Rectification)
6. Setup Observability going forward – proactive approach
7. Resilience Approach (Recommendation) – going forward
1. RISK ASSESSMENT
 Risk Assessment of current Environment
Use Security Scorecard – http://www.securityscorecard.com
2. ASSET DISCOVERY
• You cannot protect what you don’t know
• Asset Discovery using Bit Discovery - https://bitdiscovery.com
3. AUTOMATED PENETRATION TESTING
• Black-Box Test.
• White-Box Test.
• Network Service Penetration Testing.
• Web Application Penetration Testing.
• Wireless Penetration Testing.
• Social Engineering Penetration Testing.
• Physical Penetration Testing.
4. VULNERABILITY SCAN
• Vulnerability scanning is the process of identifying
security weaknesses and flaws in systems and
software running on them. This is an integral
component of a vulnerability
management program, which has one overarching
goal – to protect the organization from breaches
and the exposure of sensitive data. These
programs rely on assessment to gauge security
readiness and minimize risk, and vulnerability
scanning is a critical tool in the cybersecurity
toolbox.
• There are two big challenges related to traditional
vulnerability assessment – knowing what to scan
and knowing when to scan:
• Keeping an up-to-date asset inventory is an
essential first step and requires its own set of
tools and strategies.
• Making sure that your vulnerability scanning tools
cover non-traditional assets such as BYOD
devices, IoTs, mobile assets, and cloud services is
essential.
• In a world where cyber threats can come from any
5. ACTIVE DIRECTORY AND EMAIL
ANALYSIS
6. SETUP OBSERVABILITY
7. RESILIENCE APPROACH
Q&A

More Related Content

PDF
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
PDF
Introduction to Cybersecurity
PDF
Cybersecurity roadmap : Global healthcare security architecture
ODP
Cyber security awareness
PDF
Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...
PDF
Secure by Design - Security Design Principles for the Rest of Us
PPTX
Threat Hunting - Moving from the ad hoc to the formal
PDF
Cybersecurity Roadmap Development for Executives
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Introduction to Cybersecurity
Cybersecurity roadmap : Global healthcare security architecture
Cyber security awareness
Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...
Secure by Design - Security Design Principles for the Rest of Us
Threat Hunting - Moving from the ad hoc to the formal
Cybersecurity Roadmap Development for Executives

What's hot (20)

PDF
Information Security Awareness for everyone
PDF
Iso 27001
PPTX
Cyber Security Awareness Session for Executives and Non-IT professionals
PPT
Roadmap to IT Security Best Practices
PPTX
Enterprise Security Architecture Design
PPT
SABSA - Business Attributes Profiling
PPTX
Secure SDLC Framework
PPTX
PDF
Basics of Cyber Security
DOCX
Security architecture proposal template
PPTX
Cyber Security Awareness
PDF
Information Security Awareness
PDF
Cybersecurity Career Paths | Skills Required in Cybersecurity Career | Learn ...
PPTX
Build an Information Security Strategy
PPTX
Cybersecurity 1. intro to cybersecurity
PDF
Cybersecurity Skills in Industry 4.0
PPSX
2 Security Architecture+Design
PPTX
An introduction to SOC (Security Operation Center)
PPTX
Security Operation Center - Design & Build
PPTX
(ISC)2 CCSP - Certified Cloud Security Professional
Information Security Awareness for everyone
Iso 27001
Cyber Security Awareness Session for Executives and Non-IT professionals
Roadmap to IT Security Best Practices
Enterprise Security Architecture Design
SABSA - Business Attributes Profiling
Secure SDLC Framework
Basics of Cyber Security
Security architecture proposal template
Cyber Security Awareness
Information Security Awareness
Cybersecurity Career Paths | Skills Required in Cybersecurity Career | Learn ...
Build an Information Security Strategy
Cybersecurity 1. intro to cybersecurity
Cybersecurity Skills in Industry 4.0
2 Security Architecture+Design
An introduction to SOC (Security Operation Center)
Security Operation Center - Design & Build
(ISC)2 CCSP - Certified Cloud Security Professional
Ad

Similar to Enterprise security architecture approach (20)

PPTX
Now you see me, now you don't: chasing evasive malware - Giovanni Vigna
PDF
Decision Support for Security-Control Identification Using Machine Learning
PPTX
PPTX
Vulnerability assessment and penetration testing
PPTX
501 ch 8 risk managment tool
PDF
Experience Sharing on School Pentest Project (Updated)
PDF
New Age Red Teaming - Enterprise Infilteration
PDF
Security Testing Approach for Web Application Testing.pdf
PPTX
Penetration testing dont just leave it to chance
PPTX
OpenSourceSecurityTools - UPDATED
PDF
NSA and PT
PPTX
Owasp mobile top 10
PDF
Visualization in the Age of Big Data
PDF
An overview of network penetration testing
PDF
The Joy of Proactive Security
PPTX
Web Investigation Through Penetration Tests.pptx
PPTX
How to develop an AppSec culture in your project
PPTX
Building an AppSec Culture
PPTX
Application Security - Dont leave your AppSec for the last moment Meetup 2104...
PDF
Black-Box Penetration Testing_ Advantages, Disadvantages, Techniques, and Too...
Now you see me, now you don't: chasing evasive malware - Giovanni Vigna
Decision Support for Security-Control Identification Using Machine Learning
Vulnerability assessment and penetration testing
501 ch 8 risk managment tool
Experience Sharing on School Pentest Project (Updated)
New Age Red Teaming - Enterprise Infilteration
Security Testing Approach for Web Application Testing.pdf
Penetration testing dont just leave it to chance
OpenSourceSecurityTools - UPDATED
NSA and PT
Owasp mobile top 10
Visualization in the Age of Big Data
An overview of network penetration testing
The Joy of Proactive Security
Web Investigation Through Penetration Tests.pptx
How to develop an AppSec culture in your project
Building an AppSec Culture
Application Security - Dont leave your AppSec for the last moment Meetup 2104...
Black-Box Penetration Testing_ Advantages, Disadvantages, Techniques, and Too...
Ad

More from Maganathin Veeraragaloo (20)

PPTX
MULTI-CLOUD ARCHITECTURE
PPTX
Cloud security (domain11 14)
PPTX
Cloud security (domain6 10)
PPTX
Cloud Security (Domain1- 5)
PPTX
BTABOK / ITABOK
PPTX
PPTX
Foresight 4 Cybersecurity
PPTX
Cybersecurity Capability Maturity Model (C2M2)
PPTX
CLOUD NATIVE SECURITY
PPTX
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
PPTX
ISO 27005 - Digital Trust Framework
PPTX
ITIL4 - DIGITAL TRUST FRAMEWORK
PPTX
CYBERSECURITY MESH - DIGITAL TRUST FRAMEWORK
PPTX
COBIT 2019 - DIGITAL TRUST FRAMEWORK
PPTX
Open Digital Framework from TMFORUM
PPTX
Cloud and Data Privacy
PPTX
PPTX
Multi cloud security architecture
PPTX
Multi Cloud Architecture Approach
PPTX
Domain 5 - Identity and Access Management
MULTI-CLOUD ARCHITECTURE
Cloud security (domain11 14)
Cloud security (domain6 10)
Cloud Security (Domain1- 5)
BTABOK / ITABOK
Foresight 4 Cybersecurity
Cybersecurity Capability Maturity Model (C2M2)
CLOUD NATIVE SECURITY
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
ISO 27005 - Digital Trust Framework
ITIL4 - DIGITAL TRUST FRAMEWORK
CYBERSECURITY MESH - DIGITAL TRUST FRAMEWORK
COBIT 2019 - DIGITAL TRUST FRAMEWORK
Open Digital Framework from TMFORUM
Cloud and Data Privacy
Multi cloud security architecture
Multi Cloud Architecture Approach
Domain 5 - Identity and Access Management

Recently uploaded (20)

PDF
Driving Innovation & Growth, Scalable Startup IT Services That Deliver Result...
PPTX
ENTREPRENEURSHIP..PPT.pptx..1234567891011
PPTX
Peerless Plumbing Company-Fort Worth.pptx
PDF
Chapter 3 - Business environment - Final.pdf
PDF
Chapter 1 - Introduction to management.pdf
PPTX
TimeBee vs. Toggl: Which Time Tracking Tool is Best for You?
PDF
Decision trees for high uncertainty decisions
PDF
Pollitrace pitch deck- Ai powered multiple species
PPT
chap9.New Product Development product lifecycle.ppt
PPTX
The Evolution of Search- Behaviour.pptx
PDF
AI Cloud Sprawl Is Real—Here’s How CXOs Can Regain Control Before It Costs Mi...
PDF
Meme Coin Empire- Launch, Scale & Earn $500K-Month_3.pdf
PPTX
_From Idea to Revenue How First-Time Founders Are Monetizing Faster in 2025.pptx
PDF
Why Has Vertical Farming Recently Become More Economical.pdf
PPT
Chap8. Product & Service Strategy and branding
PPTX
ELS-07 Lifeskills ToT PPt-Adama (ABE).pptx
PDF
Investment Risk Assessment Brief: Zacharia Ali and Associated Entities
PDF
initiate-entrepreneurship-in-healthcare-service-management-in-sierra-leone.pdf
PPTX
Process-and-Ethics-in-Research-1.potatoi
PPTX
Daily stand up meeting on the various business
Driving Innovation & Growth, Scalable Startup IT Services That Deliver Result...
ENTREPRENEURSHIP..PPT.pptx..1234567891011
Peerless Plumbing Company-Fort Worth.pptx
Chapter 3 - Business environment - Final.pdf
Chapter 1 - Introduction to management.pdf
TimeBee vs. Toggl: Which Time Tracking Tool is Best for You?
Decision trees for high uncertainty decisions
Pollitrace pitch deck- Ai powered multiple species
chap9.New Product Development product lifecycle.ppt
The Evolution of Search- Behaviour.pptx
AI Cloud Sprawl Is Real—Here’s How CXOs Can Regain Control Before It Costs Mi...
Meme Coin Empire- Launch, Scale & Earn $500K-Month_3.pdf
_From Idea to Revenue How First-Time Founders Are Monetizing Faster in 2025.pptx
Why Has Vertical Farming Recently Become More Economical.pdf
Chap8. Product & Service Strategy and branding
ELS-07 Lifeskills ToT PPt-Adama (ABE).pptx
Investment Risk Assessment Brief: Zacharia Ali and Associated Entities
initiate-entrepreneurship-in-healthcare-service-management-in-sierra-leone.pdf
Process-and-Ethics-in-Research-1.potatoi
Daily stand up meeting on the various business

Enterprise security architecture approach

  • 1. ENTERPRISE SECURITY ARCHITECTURE APPROACH – CYBER RESILIENCE MAGANATHIN VEERARAGALOO 7TH DECEMBER 2021
  • 2. APPROACH 1. Risk Assessment - Security Scorecard (free assessment) 2. Asset Discovery Bit Discovery (initially free) 3. Automated Penetration Testing (Blue/Red Team Approach) – no cost free tools 4. Vulnerability Scan – enterprise context (automated tools) –open source 5. Active Directory and Email Analysis (Email Rectification) 6. Setup Observability going forward – proactive approach 7. Resilience Approach (Recommendation) – going forward
  • 3. 1. RISK ASSESSMENT  Risk Assessment of current Environment Use Security Scorecard – http://www.securityscorecard.com
  • 4. 2. ASSET DISCOVERY • You cannot protect what you don’t know • Asset Discovery using Bit Discovery - https://bitdiscovery.com
  • 5. 3. AUTOMATED PENETRATION TESTING • Black-Box Test. • White-Box Test. • Network Service Penetration Testing. • Web Application Penetration Testing. • Wireless Penetration Testing. • Social Engineering Penetration Testing. • Physical Penetration Testing.
  • 6. 4. VULNERABILITY SCAN • Vulnerability scanning is the process of identifying security weaknesses and flaws in systems and software running on them. This is an integral component of a vulnerability management program, which has one overarching goal – to protect the organization from breaches and the exposure of sensitive data. These programs rely on assessment to gauge security readiness and minimize risk, and vulnerability scanning is a critical tool in the cybersecurity toolbox. • There are two big challenges related to traditional vulnerability assessment – knowing what to scan and knowing when to scan: • Keeping an up-to-date asset inventory is an essential first step and requires its own set of tools and strategies. • Making sure that your vulnerability scanning tools cover non-traditional assets such as BYOD devices, IoTs, mobile assets, and cloud services is essential. • In a world where cyber threats can come from any
  • 7. 5. ACTIVE DIRECTORY AND EMAIL ANALYSIS
  • 10. Q&A