SlideShare a Scribd company logo
Security 2025 - Way Forward
Information Security Risk
Assessment
08 April 2025
Agenda
1- Cybersecurity Current
State 2025
3- Cybersecurity Strategy and Initiatives
2025
2- Cybersecurity Way Forward 2025
4- People Agenda – Security
resources
Taly – Cybersecurity Current State 2025
External
/
Internet
/
DMZ
Application/Sensor
LAN
IAM, Network Security, Security
Infrastructure and GRC
UNMANAGED / MANAGED CLIENTS Security and Monitoring
Endpoint Security
Endpoint Protection (EPP)
Endpoint Encryption (EEE)
Endpoint DLP
EDR
AD Authentication
VPN Client
Mobile Device Management
(MDM)
NAC
MFA
UBA
Application Whitelisting
NG Firewall
IPS
Web filtering
DLP
Antimalware
HSM
NPM/APM
DLP
EDR
FIM
GRC
GSLB
EDR
DDI
Email
Gateway
Sandbox
Load Balancer
Honeypot
Network Taps
IRR/ASM
Secure File
Transfer
Patch
Management
WAF App DDOS
FIM VPN
DB Encryption
Vul. Mgmt.
DAM
ATM Security
IAM/PAM XDR
ITSM
File and Folder Encryption
Control and Technology in place.
Control and Technology not in place.
Control and Technology require re-visit.
Data Discovery & Classification
Container
Security
SOAR
SAST/DAST
Security Domain Level 1
Initial
(Incomplete)
Level 2
Managed
(Repeatable)
Level 3
Defined
(Standardized)
Level 4
Quantitatively
Managed
Level 5
Optimizing
(Stable and
Flexible)
Identity, Consent & Privileged
Access Management
Security Infrastructure
Network Security
GRC, Security architecture and
design
System, Application, Mobile App
Security
24x7 Security monitoring & alerting
and SOC
VAPT, Security testing, and Breach
& Attack Simulations (BAS)
Security Team Resources & End-
user Security Awareness
Digital Delivery and Transformation
Office Security
CBE mandates, Cybersecurity
Framework
Internal Audit, and External Audit
requirements fulfillment
SOP, Policies, KPIs, KRIs
Taly – Cybersecurity Current State 2025
Control and Technology in place.
Control and Technology not in place.
Control and Technology require re-visit.
External
/
Internet
/
DMZ
Application/Sensor
LAN
IAM, Network Security, Security
Infrastructure and GRC
UNMANAGED / MANAGED CLIENTS Security and Monitoring
Endpoint Security
Endpoint Protection (EPP)
Endpoint Encryption (EEE)
Endpoint DLP
EDR
AD Authentication
VPN Client
Mobile Device Management
(MDM)
NAC
MFA
UBA
Application Whitelisting
NG Firewall
IPS
Web filtering
DLP
Antimalware
HSM
NPM/APM
DLP
EDR
FIM
GRC
GSLB
EDR
DDI
Email
Gateway
Sandbox
Load Balancer
Honeypot
Network Taps
IRR/ASM
Secure File
Transfer
Patch
Management
WAF App DDOS
FIM VPN
DB Encryption
Vul. Mgmt.
DAM
ATM Security
IAM/PAM XDR
ITSM
File and Folder Encryption
Data Discovery & Classification
Container
Security
SOAR
SAST/DAST
Security Domain Level 1
Initial
(Incomplete)
Level 2
Managed
(Repeatable)
Level 3
Defined
(Standardized)
Level 4
Quantitatively
Managed
Level 5
Optimizing
(Stable and
Flexible)
Identity, Consent & Privileged
Access Management
Security Infrastructure
Network Security
GRC, Security architecture and
design
System, Application, Mobile App
Security
24x7 Security monitoring & alerting
and SOC
VAPT, Security testing, and Breach
& Attack Simulations (BAS)
Security Team Resources & End-
user Security Awareness
Digital Delivery and Transformation
Office Security
CBE mandates, Cybersecurity
Framework
Internal Audit, and External Audit
requirements fulfillment
SOP, Policies, KPIs, KRIs
Taly – Cybersecurity Strategy and
Initiatives 2025
Leverage Security Benchmarks and Compliance Standards – CP Compliance Program
Fulfill CBE Cybersecurity, Audit, Governance, Compliance and Risk requirements
Enhance Cybersecurity Maturity – MP Maturity Program
Revamp existing controls to meet industry standards and business needs , Building new required controls
Stability Program and Enhance Customer Experience – SP Stability Program
Enhance Cybersecurity visibility, enable digital transformation and shifting left all security controls
Plan Employee Onboarding, Awareness and Education – EP Employee Program
Zero-day Onboarding/Offboarding/Transfer, enhance employee awareness
Develop, Document and Publish SOP, Policies, KPIs, KRIs – PP Policy/Procedures Program
Review/update current policies, procedures, KPIs and KRIs, and generate required
Project – Priority 1 Project Brief/Recommendation Strategic
Objective
Target date/Estimated Cost
EGRC, Security architecture and
design
Designing, acquiring and building an Enterprise GRC platform, that automates the work associated
with the documentation and reporting of the risk management and compliance activities.
RFP Shared with all stakeholders waiting for Business response to release.
CP
PP
Initiation End of Q1 – 2025.
Delivery End of Q3 – 2025.
Budget: 400 KUSD
ITSM Designing, acquiring and building an IT Service management platform that automates end-to-end IT
service delivery to meet business goals, including the creation, delivery, and support of IT services.
RFP Shared with all stakeholders waiting for Business response to release.
PP
EP
CP
Initiation End of Q4 – 2024.
Delivery End of Q4 – 2025.
Budget: 600 KUSD
Identity, Consent & Privileged Access
Management
Designing, acquiring and building an identity and access management platform that defines how
users, admins, and 3rd
party access Taly resources/services and what they can do with those
resources/services.
RFP under preparation, currently demos being conducted to define best practice meeting business
requirements.
CP
EP
MP
Initiation End of Q1 – 2025.
Delivery End of Q4 – 2025.
Budget: 600 KUSD
Mobile Application Shielding
SAST/DAST
Designing, acquiring and building Application security platform.
Demos being conducted for Mobile application shielding, to be followed by RFP
Fortify Application Security scanning acquired and, in the process, to implement
CP
MP
Initiation End of Q1 – 2025.
Delivery End of Q2 – 2025.
Budget: 800 KUSD
Data Security Designing, acquiring and building an end-to-end data discovery, data classification and data
protection platforms.
RFP under development parallel to demos to consider suitable technologies to cover data security
aspects
MP
CP
Initiation End of Q4 – 2024
Delivery End of Q3 – 2025.
Budget: 500 KUSD
Container Security Designing, acquiring and building a unified platform that address vulnerability management,
compliance, runtime protection and network security requirements for Taly Digital services.
Demos conducted with business (TO) and will consider as part of Firewall Tech refresh program
with Palo Alto.
SP
MP
Initiation End of Q1 – 2025.
Delivery End of Q2 – 2025.
Budget: 300 KUSD
Network Taps, NPM/APM, NDR Designing, acquiring and building a platform that provides perfect visibility over network,
applications and security traffic.
Demos and POCs started with market leading vendors to be followed by releasing RFP.
SP
MP
CP
Initiation End of Q1 – 2025.
Delivery End of Q2 – 2025.
Budget: 800 KUSD
SOP, Policies, KPIs, KRIs Reviewing, updating, developing, approving and publishing all IT relevant SOPs, Policies, KPIs and
KRIs.
IT GRC team started the mission focusing on reviewing current against audit requirements to
update and develop the needed SOPs, and Policies, will start afterwards in the KPIs and KRIs.
PP
CP
Initiation End of Q1 – 2025.
Delivery End of Q2 – 2025.
Budget: NA
Taly – Security Initiatives 2025
Taly – People Agenda
Security
Teams
IAM Security infra Network Security SOC Info Sec
3 3 2 7 External + 2 Internal 2
No IAM members in the organization leading operational instability and lack of controls.
No Security Infrastructure Team in place covering Endpoint, Data and Application Security.
No Information Security Team in place covering Vulnerability, and Patch management.
Thank You

More Related Content

DOCX
CV of Mohan M
PDF
Development and Third Party Maintenance for the IBM Mainframe (L. De Bruyn)
 
PPTX
Embedding Security in IT Projects
PPTX
Espion and SureSkills Presentation - Your Journey To A Secure Cloud
PDF
GRCAlert Capabilities Deck - 2018
PPTX
Modern Architectures
PDF
I Syed, Sr. Consultant - Enterprise Information Security Governance, Risk, Co...
DOCX
general_resume_12 1 linked in
CV of Mohan M
Development and Third Party Maintenance for the IBM Mainframe (L. De Bruyn)
 
Embedding Security in IT Projects
Espion and SureSkills Presentation - Your Journey To A Secure Cloud
GRCAlert Capabilities Deck - 2018
Modern Architectures
I Syed, Sr. Consultant - Enterprise Information Security Governance, Risk, Co...
general_resume_12 1 linked in

Similar to ISACA , Tally Risk Assessment and design document (20)

PPTX
IBM Relay 2015: Securing the Future
 
PDF
Mark Sudan Non-ATS Resume / Curriculum Vitae
PPTX
Walls of Steel, Doors of Wood - Relevance of Application Security
PDF
Enterprise Architecture - Information Security
PPTX
Security as an Enabler for the Digital World - CISO Perspective
PPTX
Business value of Enterprise Security Architecture
PDF
Security_360_Marketing_Package
PPT
Sify - IT Management Services
PDF
Adaptive & Unified Approach to Risk Management & Compliance-via-ccf
PDF
Nine23
DOCX
Pankaj's Resume Information Security Professional
PPTX
RSA: CSA GRC Stack Update for the CSA Atlanta Chapter
PDF
APBI Briefing Slides 9 May 2022
PPT
6 Dg Carrier Services Deck.101609
PDF
Finto InfoSec ExIBM- CISSP ITIL CCSP CCIE JNCIS MCP 8.5 Yrs
PPSX
Omnitech Corporate Presentation
PPT
VetsAmerica Vets GWAC Team Capabilities
PPTX
QRadar_on_Cloud_client_presentation.PPTX
PDF
Ahmed El Mawaziny CV
IBM Relay 2015: Securing the Future
 
Mark Sudan Non-ATS Resume / Curriculum Vitae
Walls of Steel, Doors of Wood - Relevance of Application Security
Enterprise Architecture - Information Security
Security as an Enabler for the Digital World - CISO Perspective
Business value of Enterprise Security Architecture
Security_360_Marketing_Package
Sify - IT Management Services
Adaptive & Unified Approach to Risk Management & Compliance-via-ccf
Nine23
Pankaj's Resume Information Security Professional
RSA: CSA GRC Stack Update for the CSA Atlanta Chapter
APBI Briefing Slides 9 May 2022
6 Dg Carrier Services Deck.101609
Finto InfoSec ExIBM- CISSP ITIL CCSP CCIE JNCIS MCP 8.5 Yrs
Omnitech Corporate Presentation
VetsAmerica Vets GWAC Team Capabilities
QRadar_on_Cloud_client_presentation.PPTX
Ahmed El Mawaziny CV
Ad

Recently uploaded (20)

PDF
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
PPTX
Internet of Things (IOT) - A guide to understanding
PPTX
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
PPTX
Geodesy 1.pptx...............................................
PPTX
UNIT 4 Total Quality Management .pptx
PPTX
Construction Project Organization Group 2.pptx
PPTX
Strings in CPP - Strings in C++ are sequences of characters used to store and...
PPTX
additive manufacturing of ss316l using mig welding
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PPT
Project quality management in manufacturing
PPTX
bas. eng. economics group 4 presentation 1.pptx
PPTX
Lecture Notes Electrical Wiring System Components
PPTX
Lesson 3_Tessellation.pptx finite Mathematics
PPTX
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
PPTX
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PPTX
CH1 Production IntroductoryConcepts.pptx
PPTX
Welding lecture in detail for understanding
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
Internet of Things (IOT) - A guide to understanding
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
Geodesy 1.pptx...............................................
UNIT 4 Total Quality Management .pptx
Construction Project Organization Group 2.pptx
Strings in CPP - Strings in C++ are sequences of characters used to store and...
additive manufacturing of ss316l using mig welding
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
Project quality management in manufacturing
bas. eng. economics group 4 presentation 1.pptx
Lecture Notes Electrical Wiring System Components
Lesson 3_Tessellation.pptx finite Mathematics
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
CH1 Production IntroductoryConcepts.pptx
Welding lecture in detail for understanding
Ad

ISACA , Tally Risk Assessment and design document

  • 1. Security 2025 - Way Forward Information Security Risk Assessment 08 April 2025
  • 2. Agenda 1- Cybersecurity Current State 2025 3- Cybersecurity Strategy and Initiatives 2025 2- Cybersecurity Way Forward 2025 4- People Agenda – Security resources
  • 3. Taly – Cybersecurity Current State 2025 External / Internet / DMZ Application/Sensor LAN IAM, Network Security, Security Infrastructure and GRC UNMANAGED / MANAGED CLIENTS Security and Monitoring Endpoint Security Endpoint Protection (EPP) Endpoint Encryption (EEE) Endpoint DLP EDR AD Authentication VPN Client Mobile Device Management (MDM) NAC MFA UBA Application Whitelisting NG Firewall IPS Web filtering DLP Antimalware HSM NPM/APM DLP EDR FIM GRC GSLB EDR DDI Email Gateway Sandbox Load Balancer Honeypot Network Taps IRR/ASM Secure File Transfer Patch Management WAF App DDOS FIM VPN DB Encryption Vul. Mgmt. DAM ATM Security IAM/PAM XDR ITSM File and Folder Encryption Control and Technology in place. Control and Technology not in place. Control and Technology require re-visit. Data Discovery & Classification Container Security SOAR SAST/DAST Security Domain Level 1 Initial (Incomplete) Level 2 Managed (Repeatable) Level 3 Defined (Standardized) Level 4 Quantitatively Managed Level 5 Optimizing (Stable and Flexible) Identity, Consent & Privileged Access Management Security Infrastructure Network Security GRC, Security architecture and design System, Application, Mobile App Security 24x7 Security monitoring & alerting and SOC VAPT, Security testing, and Breach & Attack Simulations (BAS) Security Team Resources & End- user Security Awareness Digital Delivery and Transformation Office Security CBE mandates, Cybersecurity Framework Internal Audit, and External Audit requirements fulfillment SOP, Policies, KPIs, KRIs
  • 4. Taly – Cybersecurity Current State 2025 Control and Technology in place. Control and Technology not in place. Control and Technology require re-visit. External / Internet / DMZ Application/Sensor LAN IAM, Network Security, Security Infrastructure and GRC UNMANAGED / MANAGED CLIENTS Security and Monitoring Endpoint Security Endpoint Protection (EPP) Endpoint Encryption (EEE) Endpoint DLP EDR AD Authentication VPN Client Mobile Device Management (MDM) NAC MFA UBA Application Whitelisting NG Firewall IPS Web filtering DLP Antimalware HSM NPM/APM DLP EDR FIM GRC GSLB EDR DDI Email Gateway Sandbox Load Balancer Honeypot Network Taps IRR/ASM Secure File Transfer Patch Management WAF App DDOS FIM VPN DB Encryption Vul. Mgmt. DAM ATM Security IAM/PAM XDR ITSM File and Folder Encryption Data Discovery & Classification Container Security SOAR SAST/DAST Security Domain Level 1 Initial (Incomplete) Level 2 Managed (Repeatable) Level 3 Defined (Standardized) Level 4 Quantitatively Managed Level 5 Optimizing (Stable and Flexible) Identity, Consent & Privileged Access Management Security Infrastructure Network Security GRC, Security architecture and design System, Application, Mobile App Security 24x7 Security monitoring & alerting and SOC VAPT, Security testing, and Breach & Attack Simulations (BAS) Security Team Resources & End- user Security Awareness Digital Delivery and Transformation Office Security CBE mandates, Cybersecurity Framework Internal Audit, and External Audit requirements fulfillment SOP, Policies, KPIs, KRIs
  • 5. Taly – Cybersecurity Strategy and Initiatives 2025 Leverage Security Benchmarks and Compliance Standards – CP Compliance Program Fulfill CBE Cybersecurity, Audit, Governance, Compliance and Risk requirements Enhance Cybersecurity Maturity – MP Maturity Program Revamp existing controls to meet industry standards and business needs , Building new required controls Stability Program and Enhance Customer Experience – SP Stability Program Enhance Cybersecurity visibility, enable digital transformation and shifting left all security controls Plan Employee Onboarding, Awareness and Education – EP Employee Program Zero-day Onboarding/Offboarding/Transfer, enhance employee awareness Develop, Document and Publish SOP, Policies, KPIs, KRIs – PP Policy/Procedures Program Review/update current policies, procedures, KPIs and KRIs, and generate required
  • 6. Project – Priority 1 Project Brief/Recommendation Strategic Objective Target date/Estimated Cost EGRC, Security architecture and design Designing, acquiring and building an Enterprise GRC platform, that automates the work associated with the documentation and reporting of the risk management and compliance activities. RFP Shared with all stakeholders waiting for Business response to release. CP PP Initiation End of Q1 – 2025. Delivery End of Q3 – 2025. Budget: 400 KUSD ITSM Designing, acquiring and building an IT Service management platform that automates end-to-end IT service delivery to meet business goals, including the creation, delivery, and support of IT services. RFP Shared with all stakeholders waiting for Business response to release. PP EP CP Initiation End of Q4 – 2024. Delivery End of Q4 – 2025. Budget: 600 KUSD Identity, Consent & Privileged Access Management Designing, acquiring and building an identity and access management platform that defines how users, admins, and 3rd party access Taly resources/services and what they can do with those resources/services. RFP under preparation, currently demos being conducted to define best practice meeting business requirements. CP EP MP Initiation End of Q1 – 2025. Delivery End of Q4 – 2025. Budget: 600 KUSD Mobile Application Shielding SAST/DAST Designing, acquiring and building Application security platform. Demos being conducted for Mobile application shielding, to be followed by RFP Fortify Application Security scanning acquired and, in the process, to implement CP MP Initiation End of Q1 – 2025. Delivery End of Q2 – 2025. Budget: 800 KUSD Data Security Designing, acquiring and building an end-to-end data discovery, data classification and data protection platforms. RFP under development parallel to demos to consider suitable technologies to cover data security aspects MP CP Initiation End of Q4 – 2024 Delivery End of Q3 – 2025. Budget: 500 KUSD Container Security Designing, acquiring and building a unified platform that address vulnerability management, compliance, runtime protection and network security requirements for Taly Digital services. Demos conducted with business (TO) and will consider as part of Firewall Tech refresh program with Palo Alto. SP MP Initiation End of Q1 – 2025. Delivery End of Q2 – 2025. Budget: 300 KUSD Network Taps, NPM/APM, NDR Designing, acquiring and building a platform that provides perfect visibility over network, applications and security traffic. Demos and POCs started with market leading vendors to be followed by releasing RFP. SP MP CP Initiation End of Q1 – 2025. Delivery End of Q2 – 2025. Budget: 800 KUSD SOP, Policies, KPIs, KRIs Reviewing, updating, developing, approving and publishing all IT relevant SOPs, Policies, KPIs and KRIs. IT GRC team started the mission focusing on reviewing current against audit requirements to update and develop the needed SOPs, and Policies, will start afterwards in the KPIs and KRIs. PP CP Initiation End of Q1 – 2025. Delivery End of Q2 – 2025. Budget: NA Taly – Security Initiatives 2025
  • 7. Taly – People Agenda Security Teams IAM Security infra Network Security SOC Info Sec 3 3 2 7 External + 2 Internal 2 No IAM members in the organization leading operational instability and lack of controls. No Security Infrastructure Team in place covering Endpoint, Data and Application Security. No Information Security Team in place covering Vulnerability, and Patch management.