Title: Establishing an Effective IT Security Program A Holistic View Ann Marie Beasley, VP Strategies
1Establishing an Effective IT Security ProgramA
Holistic ViewAnn Marie Beasley, VP Strategies
Solutions
2Security Program Drivers
92 businesses attacked in 2003 75 acknowledge
the fact 4 measure impact 12.5B!!
Source Computer Economics 2003
- Workforce Mobility
- Infrastructure Consolidation
- IT Complexity
- Customer Connectivity Demands
40countries haveadopted e-commercelaws
FISMA HIPAA GLBA
PATRIOT Basel II NERC
Sarbanes-Oxley EU Data Protection Privacy
3Stopping the Bullet
- QuestionHow do you stop a bullet that has
already been fired?
4Challenges
- Need to ensure integrity (security
availability) of IT - Must be able to respond quickly during crises
with minimal loss of information - Beyond guarding the network, must ensure it is
configured, patched correctly - Improve asset management Can only protect what
you can identify and inventory - Strenuous requirements such as FISMA
incorporating the above with staff training,
incident preparedness, etc.
5A back-to-basics approach
- Create and maintain an accurate asset inventory
- Analyze all the functions of each system
- Perform a risk assessment
- Develop a prioritized risk strategy
Re-think security
- Understand every aspect of your environment
- Be proactive to prevent problems
- Count on qualified service providers for
assessment, testing, and design - Improve alerting systems
Increase threat awareness
- Understand current state of threat activity
- Know what to do in response
- Be alert to new vulnerabilities and the
potential harm if exploited - Increase efficiency
Improve alerting system
6Elements of a Comprehensive Security Program
- Assure security policy compliance
- Receive early awareness of threats
- Prevent detect attacks breaches
- Protect privacy of information
- Discover track HW/SW assets
- Provision, update configure systems via
automated policies - Instantly push security patches signatures to
all managed devices - Assure software license compliance remove
unauthorized applications - De-provision repurpose systems securely
- Rapidly easily recover from loss of critical
systems information - Insure via policies that adequate storage
available for applications backup - Create secure archives for preserving information
assets
7Security Program Take-Aways
- Get prepared for new vulnerabilities and more
aggressive and complex attacks
Adopt the right framework for comprehensive
enterprise security
Demand an early warning system that provides the
most time to prevent attack and/or minimize damage
Drive to an architecture that provides integrated
protection and integrated management
Build in effective management capabilities to
address all aspects of securing and managing the
infrastructure