Академический Документы
Профессиональный Документы
Культура Документы
Pramod Parajuli
Consultant
Information Security, Compliance, and S/W
Development
Datum Systems Pvt. Ltd.
2
WHY WOULD WE CARE?
Source
Rising to the challenge of securing mobile and cloud, IBM Security for Mobile and Cloud, 2015, IBM.com/security 3
PROBLEM AND SOLUTION
Source
2015 Global Cybersecurity Megatrends with U.S. Spotlight, 2015, Raytheon.com/cyber 4
SCENARIO RISE IN
AWARENESS
Security controls
Cost-based approach and ROI
Frameworks
Compliance-based approach
Source
Information Security - 2015 Trends, Topics & Research, Gartner.com 6
Will security really help the
businesses to grow?
TO BE, OR NOT TO BE: THAT IS THE QUESTION
Hamlet, Act III, Scene I
Risk-Based Approach
7
CYBER SECURITY AND BUSINESS
PROCESS
Business
Business
Process Cyber Security Monitoring and
Process
Standardizatio Parameterization Control
Parameterization
n
8
EXAMPLE - Services delivery
What is at the stake if service is not delivered?
What will happen if wrong service is delivered?
What will happen if Quality of Service is
compromised?
Who will be affected?
How will it affect overall business objectives?
9
EXAMPLE - Procurement
10
RISKS
Information not available to right person/entity in
right time
Service not available to right person/entity in
right time
Difficulty in meeting business-level QoS
assurance
Non-compliance
11
RISKS-BASED APPROACH
Factors
Human the stakeholders, human firewalls
Documentation established procedures
Business processes critical business process and their
impact
Data where is the data?
Technology tuning configurations
Physical security controls
12
FURTHER MORE
13
WRITE TO ME:
pramodparajuli@gmail.com
THANK YOU.
14