Posts

Bypassing Security Control for VIPs !

Image
Risk Vs Threat Vs Vulnerability  Its connected to previous posts and thoughts... On many Organizations to satisfy the personalities seems bypassing Security controls for VIPs where i refer those VIP are high value assets and crown jewel of organizations.  Controls we are deploying should be process oriented not personal oriented. Agree IT is to support Business, Of-course. But in this new era many business undoubtedly connected to NET and its should protected.  Referring to RISK equation as below;  Risk = Threat * Vulnerability * Asset Value  In Simple language : forgot the Car key in side the Car is an Vulnerability, threat here is where we put the car & key, in City or Village, ie how potential on vulnerability. Asset value is what kind car we using Maruti or Ferrari :) . The term “vulnerability” refers to the security flaws (Weakness ) in a system that allow an attack to be successful. Threat is the frequency of potentially a...

Security Incident Hand-off

Image
"Organization QWERTY Data loss for 10,000 record and its share value may drop " Rumor inside. I personally prefer to do  "Security  Hand-Off process"  while identifying the security incident based on the nature and directly impact the reputation or share values should be handled by experts from cyber security incident management ( like IBM CERT and ERS) and organization's CISO to lead the situation. Its mandate to have participation from customer side to validate the impact and its take necessary actions. Of course, among IT and Incident management peoples should have proper education on Cyber security and how to handle such substations and avoid rumor's. Which help organization to contain the situation to controlled manner to take right action. Then general incident team make such issues as noise and spread unhealthy news across and lead to dis agreed messages to outsides. and even some best practices in general Incident management practice need ...

Slideshare link for my public presentations

Image
Please refer the  slideshare Channel for slide documentation for below topics; 1. network basics and security components brief on functionality 2. vulnerability management  overview 3. virtualization and virtual security integration with IPS services 4. Intrusion detection and prevention system brief 5. Datalake and information security review

Disconnect in organization’s Information Security vision ( expected level vs. implemented level)

Image
Disconnect in organization’s Information Security vision   E xpected level vs. implemented level; Why there is always disconnect in organizations Information Security strategies in terms of accepted level vs. implemented level!!!     In this era of global economy, ever-changing threat land scape and   enterprise risk due to cross-organization, collaborations and online trading’s bring information security has become business opportunity making service than ever thought possible.  First, Organizations slightly struggling to discover their Crown jewels (Critical business machines include Sensitive data stored) in the perimeter less network, if they did next step to identify the   proper controls to protect (CIA -Confidentiality , Integrity and Availability). Here I believe most organizations getting misdirected due to short sights and some individual’s viewpoints. We have great practices on foundational-Common system - industrial architect and ...

Threat Vs Vulnerability Vs Risk (In layman story)

 In Simple language  : we forgot take out the key from the Car  in public area is an Vulnerability and the  Threat here is where we put the car & key, is it in City area or in a Village ! ?, that is, how  much probability on potential to the vulnerability.  and finally , the Asset value is what kind car we using Ford or Ferrari  :). The term “vulnerability” refers to the security flaws (Weakness ) in a system that allow an attack to be successful. Threat is the frequency or probability of potentially adverse events.  Risk = Threat * Vulnerability * Asset Value  Come to Tech Scenario :Think we left server / laptop unlocked in home or office a vulnerability assessment is the process of identifying and quantifying vulnerabilities in an environment. It is an in-depth evaluation of your posture, indicating weaknesses as well as providing the appropriate mitigation procedures required to either eliminate those weakne...

‘Lazy’ in pet name called comfort!!

Image
Don’t be lazy to set minimum level of required security! Information Technology era shrinks the global economy into small virtual village with good and bad, as always two side of one coin, yes as usual olds were foresighted. Internet, Cloud and Big data are now great enabler for business and life. But some where we should keep the limit as it’s shouldn’t peak nose into our privacy and healthy life!!!  Each new technology brings human to more comfort than had and its make humans lazier and weaker. Anyway here I’m not focusing on life style and health impacts. As I’m fan of Wills Smith and his movie I, Robot, in the movie plot robot had the “three laws of robotics”   directives - to never harm a human or let a human come to harm, to always obey humans unless this violates the First Law, and to protect its own existence unless this violates the First or Second Laws. The reason I mentioned here human is important than any other. But our views are changing, Yes, we al...