SlideShare a Scribd company logo
From Reactive To Automated:Reducing Costs Through Mature Security ProcessesJörn DierksChiefSecurityStrategist EMEAjoern.dierks@netiq.com
Solving Cross-Discipline Problems2ProcessPeopleTechnologyInfrastructure & ApplicationsProvisioningHRComplianceHelpdeskNetIQNOCIncidentSecurityChangeBusinessOwnersOther Mgmt VendorsBusiness Processes
ProcessPeopleTechnologyInfrastructure & ApplicationsProvisioningHRCross-Product Integration ComplianceHelpdeskNetIQNOCIncidentSecurityChangeBusinessOwnersOther Mgmt VendorsBusiness ProcessesSolving Cross-Discipline Problems3
The Role of IT Process Automation –Bridging Silos Between Business and ITToolsToolsBusinessConfiguration & Identity AuditingService  / Help DeskSecurity Info & Event ManagementEvent Correlation & AnalysisIT GRCMSLMIT ProcessAutomationVulnerability AssessmentSystems & App Monitoring Perimeter & Network SecurityNetwork MonitoringContent Monitoring /  DLPResponse TimeMonitoringOperationsSecurityPolicyAwarenessConfiguration & Patch ManagementCMDBAV / Malware ProtectionIdentity ManagementResponsibilities Shared between Security & OperationsContinuityManagementCapacity & AvailabilityManagementReleaseManagementIncident & Problem Management Configuration & ChangeManagement
5Security & CompliancePerformance & Availability Identity & Access5© 2010 NetIQ Corporation. All rights reserved.About NetIQManage and audit user entitlements
Track privileged user activity
Protect the integrity of key systems and files
Monitor access to sensitive information
Simplify compliance reportingIT ProcessAutomationMonitor and manage heterogeneous environments including custom applications
IT Service validation and end-user performance  monitoring
Dynamic provisioning of  large-scale monitoring with exceptions
Functional and hierarchical Incident escalation
Deliver & manage differentiated service levels
User Provisioning Lifecycle Management
Centralize Unix account management through Active Directory
Reduce number of privileged users
Secure delegated administration
Windows and Exchange MigrationAddressing Insider ThreatPrivileged User MonitoringAddressing Compliance RequirementsBusiness Exception ManagementEnd-User Policy Management andAwarenessUse-Cases In This Presentation

More Related Content

PPTX
A Smarter, More Secure Internet of Things
PPTX
Leveraging Identity to Manage Change and Complexity
PPTX
Building A Cloud-Ready Security Program
PDF
Cloud Identity
PDF
Security - A Digital Transformation Enabler
PDF
NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...
PPTX
Two Peas in a Pod: Cloud Security and Mobile Security
PPTX
Cloud Security: A Business-Centric Approach in 12 Steps
A Smarter, More Secure Internet of Things
Leveraging Identity to Manage Change and Complexity
Building A Cloud-Ready Security Program
Cloud Identity
Security - A Digital Transformation Enabler
NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...
Two Peas in a Pod: Cloud Security and Mobile Security
Cloud Security: A Business-Centric Approach in 12 Steps

What's hot (18)

PDF
Identiverse Zero Trust Customer Briefing, Identiverse 2019
PDF
2021 English Part One Anti-phishing Webinar Presentation Slides
PDF
Why Executives Underinvest In Cybersecurity
PPTX
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
PPT
IBM Security Strategy Intelligence,
PDF
Securing Your Cloud Applications
PDF
Total Digital Security Introduction 4.2
PPTX
New CISO - The First 90 Days
PPTX
SANS Critical Security Controls Summit London 2013
PPTX
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
PDF
"Thinking diffrent" about your information security strategy
PDF
Fortifying Cyber Defense: How to Act Now to Protect Global Supply Chains
PPTX
A Non-Salesy Intro to the Ivanti Porfolio
PDF
Kista watson summit final public version
PPTX
Security Management in the Cloud
PDF
Bring Your Own Device (BYOD)
PPTX
Cloud security - Auditing and Compliance
PDF
Energy Industry Organizational Strategies to Increase Cyber Resiliency
Identiverse Zero Trust Customer Briefing, Identiverse 2019
2021 English Part One Anti-phishing Webinar Presentation Slides
Why Executives Underinvest In Cybersecurity
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
IBM Security Strategy Intelligence,
Securing Your Cloud Applications
Total Digital Security Introduction 4.2
New CISO - The First 90 Days
SANS Critical Security Controls Summit London 2013
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
"Thinking diffrent" about your information security strategy
Fortifying Cyber Defense: How to Act Now to Protect Global Supply Chains
A Non-Salesy Intro to the Ivanti Porfolio
Kista watson summit final public version
Security Management in the Cloud
Bring Your Own Device (BYOD)
Cloud security - Auditing and Compliance
Energy Industry Organizational Strategies to Increase Cyber Resiliency
Ad

Similar to From reactive to automated reducing costs through mature security processes info security europe 2011 (20)

PPT
How much does it cost to be Secure?
PDF
Security a Revenue Center: How Security Can Drive Your Business
PPTX
Security Baselines and Risk Assessments
PPTX
Infosec policies to appsec standards ed final
PDF
IT General Controls Presentation at IIA Vadodara Audit Club
PDF
Emerging Trends in Information Privacy and Security
PDF
Emerging Trends in Information Privacy and Security
PDF
Security Change Management: Agility vs. Control
PDF
BetterCloud Whitepaper: Fixing IT's Blindspots – 8 Critical Security and Mana...
PDF
Defcon 22-tim-mcguffin-one-man-shop
PPTX
ISStateGovtProposal
PPTX
Information security trends and concerns
PPTX
5 Clear Signs You Need Security Policy Automation
PPT
Cyber crime with privention
PDF
5 things you didn't know you could do with security policy management
PPTX
Enterprise IT Security| CIO Innovation and Leadership
DOCX
Security Policies and Implementation IssuesLecture 5How to D.docx
PPTX
Continuous Compliance 14.9.2016
PPT
Lunch and Learn: June 29, 2010
PDF
CNIT 160: Ch 2b: Security Strategy Development
How much does it cost to be Secure?
Security a Revenue Center: How Security Can Drive Your Business
Security Baselines and Risk Assessments
Infosec policies to appsec standards ed final
IT General Controls Presentation at IIA Vadodara Audit Club
Emerging Trends in Information Privacy and Security
Emerging Trends in Information Privacy and Security
Security Change Management: Agility vs. Control
BetterCloud Whitepaper: Fixing IT's Blindspots – 8 Critical Security and Mana...
Defcon 22-tim-mcguffin-one-man-shop
ISStateGovtProposal
Information security trends and concerns
5 Clear Signs You Need Security Policy Automation
Cyber crime with privention
5 things you didn't know you could do with security policy management
Enterprise IT Security| CIO Innovation and Leadership
Security Policies and Implementation IssuesLecture 5How to D.docx
Continuous Compliance 14.9.2016
Lunch and Learn: June 29, 2010
CNIT 160: Ch 2b: Security Strategy Development
Ad

More from NetIQ (20)

PDF
Open Enterprise Server With Windows
PDF
Big Payoffs With BYOD and Mobility
PDF
Mobile Apps in Your Business
PPTX
Advanced Persistent Threat - Evaluating Effective Responses
PPTX
BrainShare 2014
PDF
Paraca Inc.
PDF
The University of Westminster Saves Time and Money with Identity Manager
PDF
The London School of Hygiene & Tropical Medicine Accelerates and Streamlines ...
PDF
Swisscard Saves Time and Effort in Managing User Access
PDF
Vodacom Tightens Security with Identity Manager from NetIQ
PDF
University of Dayton Ensures Compliance with Sentinel Log Manager
PDF
Nippon Light Metal Forges a Disaster Recovery Solution with NetIQ
PDF
Nexus Differentiates Itself and Grows Its Capabilities with Operations Center
PDF
Netiq css huntington_bank
PDF
Professional Services Company Boosts Security, Facilitates Compliance, Automa...
PDF
NetIQ Identity Manager Unites Hanshan Normal University
PDF
Handelsbanken Takes Control of Identity Management with NetIQ
PDF
Millions of People Depend on Datang Xianyi Technology and NetIQ
PDF
bluesource Uses NetIQ AppManager to Offer Standout Managed Service
PDF
Central Denmark Region Strengthens Administrative Security with Identity Mana...
Open Enterprise Server With Windows
Big Payoffs With BYOD and Mobility
Mobile Apps in Your Business
Advanced Persistent Threat - Evaluating Effective Responses
BrainShare 2014
Paraca Inc.
The University of Westminster Saves Time and Money with Identity Manager
The London School of Hygiene & Tropical Medicine Accelerates and Streamlines ...
Swisscard Saves Time and Effort in Managing User Access
Vodacom Tightens Security with Identity Manager from NetIQ
University of Dayton Ensures Compliance with Sentinel Log Manager
Nippon Light Metal Forges a Disaster Recovery Solution with NetIQ
Nexus Differentiates Itself and Grows Its Capabilities with Operations Center
Netiq css huntington_bank
Professional Services Company Boosts Security, Facilitates Compliance, Automa...
NetIQ Identity Manager Unites Hanshan Normal University
Handelsbanken Takes Control of Identity Management with NetIQ
Millions of People Depend on Datang Xianyi Technology and NetIQ
bluesource Uses NetIQ AppManager to Offer Standout Managed Service
Central Denmark Region Strengthens Administrative Security with Identity Mana...

Recently uploaded (20)

PPT
Teaching material agriculture food technology
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Advanced Soft Computing BINUS July 2025.pdf
PPTX
breach-and-attack-simulation-cybersecurity-india-chennai-defenderrabbit-2025....
PDF
Advanced IT Governance
PDF
Machine learning based COVID-19 study performance prediction
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPTX
Big Data Technologies - Introduction.pptx
PDF
solutions_manual_-_materials___processing_in_manufacturing__demargo_.pdf
PDF
GDG Cloud Iasi [PUBLIC] Florian Blaga - Unveiling the Evolution of Cybersecur...
Teaching material agriculture food technology
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Advanced Soft Computing BINUS July 2025.pdf
breach-and-attack-simulation-cybersecurity-india-chennai-defenderrabbit-2025....
Advanced IT Governance
Machine learning based COVID-19 study performance prediction
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
MYSQL Presentation for SQL database connectivity
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Reach Out and Touch Someone: Haptics and Empathic Computing
Review of recent advances in non-invasive hemoglobin estimation
Advanced methodologies resolving dimensionality complications for autism neur...
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Big Data Technologies - Introduction.pptx
solutions_manual_-_materials___processing_in_manufacturing__demargo_.pdf
GDG Cloud Iasi [PUBLIC] Florian Blaga - Unveiling the Evolution of Cybersecur...

From reactive to automated reducing costs through mature security processes info security europe 2011

  • 1. From Reactive To Automated:Reducing Costs Through Mature Security ProcessesJörn DierksChiefSecurityStrategist EMEAjoern.dierks@netiq.com
  • 2. Solving Cross-Discipline Problems2ProcessPeopleTechnologyInfrastructure & ApplicationsProvisioningHRComplianceHelpdeskNetIQNOCIncidentSecurityChangeBusinessOwnersOther Mgmt VendorsBusiness Processes
  • 3. ProcessPeopleTechnologyInfrastructure & ApplicationsProvisioningHRCross-Product Integration ComplianceHelpdeskNetIQNOCIncidentSecurityChangeBusinessOwnersOther Mgmt VendorsBusiness ProcessesSolving Cross-Discipline Problems3
  • 4. The Role of IT Process Automation –Bridging Silos Between Business and ITToolsToolsBusinessConfiguration & Identity AuditingService / Help DeskSecurity Info & Event ManagementEvent Correlation & AnalysisIT GRCMSLMIT ProcessAutomationVulnerability AssessmentSystems & App Monitoring Perimeter & Network SecurityNetwork MonitoringContent Monitoring / DLPResponse TimeMonitoringOperationsSecurityPolicyAwarenessConfiguration & Patch ManagementCMDBAV / Malware ProtectionIdentity ManagementResponsibilities Shared between Security & OperationsContinuityManagementCapacity & AvailabilityManagementReleaseManagementIncident & Problem Management Configuration & ChangeManagement
  • 5. 5Security & CompliancePerformance & Availability Identity & Access5© 2010 NetIQ Corporation. All rights reserved.About NetIQManage and audit user entitlements
  • 7. Protect the integrity of key systems and files
  • 8. Monitor access to sensitive information
  • 9. Simplify compliance reportingIT ProcessAutomationMonitor and manage heterogeneous environments including custom applications
  • 10. IT Service validation and end-user performance monitoring
  • 11. Dynamic provisioning of large-scale monitoring with exceptions
  • 12. Functional and hierarchical Incident escalation
  • 13. Deliver & manage differentiated service levels
  • 15. Centralize Unix account management through Active Directory
  • 16. Reduce number of privileged users
  • 18. Windows and Exchange MigrationAddressing Insider ThreatPrivileged User MonitoringAddressing Compliance RequirementsBusiness Exception ManagementEnd-User Policy Management andAwarenessUse-Cases In This Presentation
  • 20. Another Challenge toConsider…Source: “Data Loss RisksDuring Downsizing“, Ponemon Institute LLC, 23 Feb 2009
  • 21. Policies, procedures and standardsClear guidelinesPolicies as a key for your organizationStandardize assetsIdentity & access controlData ClassificationAccess controlManage islands of identity(Privileged) User monitoringAuditsNot a one-time effortRegular auditsThorough auditsRegulationsDifficult to do manuallyReporting neededThree Important Subjects9Photo by: Giorgio Monteforti: http://www.flickr.com/photos/11139043@N00/1439804758/
  • 22. Mapping Subjects To TechnologyBACWorkflow & Process AutomationIdentity & AccessManagementIT Infrastructure Windows Systems
  • 23. Unix & Linux Systems
  • 25. Security & Network Devices
  • 29. etc.Active DirectoryPolicy Management& User AwarenessConfiguration &Compliance ManagementPrivileged User Monitoring, SIEM
  • 30. Security Process AutomationFORRESTER® Required  Optional* Determined using the Aegis ROI calculator developed by Forrester Consulting based on a representative customer with 1,000 servers.
  • 31. Use Case #1Insider ThreatIncident Automation withPrivileged User Monitoring
  • 32. Automated IncidentManagement Workflow13DataWarehouseCMDBChange ManagementIncident Management ConsoleWorkflow / ProcessEventAdministratorAutomated event detection & response:Reduces time to response
  • 35. Lowers impact on administratorsRemediation
  • 36. Use Case #2Business Exception Management Automation in Compliance Management
  • 37. 8Workflow / Process1. Policy Templates assess complianceNetIQ Secure Configuration Manager detects non-compliant systems3SystemOwner2.Secure Configuration Manager tells Aegis about the Compliance problemAegis starts Non-Compliance Workflow943. Aegis emails the system ownerInforms about the problems foundApproval & ExceptionManagement ProcessSystem Owner analyzes the issuesThen he tells Aegis that he wants to create an exception for one of the issues752105. Aegis informs the Security Officer about the exception creation requestEnsures that no exceptions get created without approval6Compliance & Configuration ManagementSecurityOfficer6.Security Officer approves exception requestHe can do that either by email or through the Aegis web consoleResults:No exceptions get created without prior approval
  • 38. Security Processes are followed through
  • 39. Compliance Issues are tracked consistently
  • 40. There’s always a consistent result of a workflow7.Aegis creates the exception in NetIQ Secure Configuration Manager and approves the exceptionAll details about the approvals process are added into the notes section of the exception1018. Administrator is notified about the exception approval and creationAlso, he’s asked if he wants to re-run the policy templateManual WorkloadAutomated Workload9.The System Owner confirms…10. Aegis tells Secure Configuration Manager to re-run the Policy TemplatesBusiness System
  • 41. Where do I start? – Process Automation Lifecycle
  • 42. Policies, proceduresandstandardsClear guidelinesPoliciesas a keyforyourorganizationStandardizeassetsAchievePolicy ComplianceConfiguration & Compliance ManagementAutomatedException & Approval ManagementMonitor Privileged User ActivitySIEM & Access MonitoringAutomatedIncident Management, Escalation & AlertingSummary – Remember… 1… 2… 3…!BACWorkflow & Process AutomationIdentity & AccessManagementIT Infrastructure Windows Systems
  • 43. Unix & Linux Systems
  • 45. Security & Network Devices
  • 49. etc.Active DirectoryPolicy Management& User AwarenessConfiguration &Compliance ManagementPrivileged User Monitoring, SIEM