100% found this document useful (1 vote)
192 views

IT Security

The document discusses security and fraud risk trends for 2019 and provides strategies for organizations to address common challenges. It outlines Gartner's top 7 security trends, including the growing costs of data breaches and challenges with legacy security technologies. The document recommends implementing a zero trust model with continuous user monitoring and sensitive data mapping. It also discusses conducting a current state security assessment and developing a future state roadmap with initiatives focused on people, processes, and technologies. The overall goal is to help organizations improve their security maturity over time.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
192 views

IT Security

The document discusses security and fraud risk trends for 2019 and provides strategies for organizations to address common challenges. It outlines Gartner's top 7 security trends, including the growing costs of data breaches and challenges with legacy security technologies. The document recommends implementing a zero trust model with continuous user monitoring and sensitive data mapping. It also discusses conducting a current state security assessment and developing a future state roadmap with initiatives focused on people, processes, and technologies. The overall goal is to help organizations improve their security maturity over time.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 23

Security and Fraud Risk

Setiawan is currently heading the IT Security at Tokopedia. His


main responsibilities are to grow the team and expand
Tokopedia's capabilities in protecting its critical assets effectively
while rendering the services to the users. He has been working for
more than 14 (fourteen) years as IT professional ranging from
Software Developer, System Administrator, Database
Administrator, Project Manager, and IT Security.

SETIAWAN HERMANTO Prior joining Tokopedia, he was a Senior Manager at EY’s


Cybersecurity – Risk Advisory Services practice and acting as
technical practice leader for cybersecurity team in Indonesia for
Head of IT Security over than 7 (seven) years. He has helped numerous clients
Tokopedia enhance their cybersecurity controls and capabilities through
rendered services such as penetration testing, third-party
security assessment, and cybersecurity transformation. The
engagements involve local and global teams.
TABLE OF CONTENTS

01 SECURITY AND RISK TREND


Gartner released 7 security and risk trends for 2019.
Common challenges and how to address them

02 SECURITY ROADMAP
The common approach in improving security maturity
in the organization

03 FRAMEWORK AND PRINCIPLES


The common framework and principles in improving
security and fraud controls

04 KEY TAKEAWAYS
The summary points of today presentation
01
SECURITY AND RISK TREND
Gartner released 7 security and risk trends for 2019.
Common challenges and how to address them
Gartner Top 7 Security and Risk Trends for 2019

1. Leading SRM (Security and Risk Management) leaders are creating pragmatic risk appetite
statements linked to business outcomes to engage their stakeholders more effectively

2. There is renewed interest in implementing or maturing security operations centers (SOCs) with a
focus on threat detection and response

3. Leading organizations are utilizing a data security governance framework to prioritize data
security investments

4. “Passwordless” authentication is achieving market traction, driven by demand and the availability
of biometrics and strong hardware-based authentication methods

5. Security product vendors are increasingly offering premium services to help customers get more
immediate value and to assist in skills training

6. Leading organizations are investing in and maturing their cloud security competency as it
becomes the mainstream computing platform

7. The strategic CARTA (Continuous Adaptive Risk and Trust Assessment) approach to security is
starting to appear in more traditional security markets
Cost of data breach

IBM Security and Ponemon Institute


release the 2019 Cost of a Data Breach
Report. Based on in-depth interviews
with more than 500 companies around
the world who have experienced a data
breach between July 2018 and April 2019,
the analysis in this research study takes
into account hundreds of cost factors,
from legal, regulatory and technical
activities, to loss of brand equity,
customer turnover, and the drain on
employee productivity.

reference:
https://databreachcalculator.mybluemix.
net/executive-summary
Challenges with legacy security technologies

NETWORK DEVICES APPLICATION


There will be more users Customers will have more Internal users will consume
outside of the enterprise unmanaged devices more apps delivered from
accessing services than connecting to services than outside of the enterprise
inside managed devices network than from the
inside
Zero Trust implementation

Continuous monitor the


Design the optimal
user behaviour through
sensitive data flow to gain
robust security analytics
effective protection
solution

Map Enable
sensitive data flow security analytics

Activate
Identify Devise
security automation
sensitive data Zero Trust perimeter
and orchestration

Understand what to Apply and enforce adequate Establish effective security


protect, how sensitive the security controls around response using defined
data, and who use the data sensitive data, including playbook by embracing
strict access automation
02
SECURITY ROADMAP
The common approach in
improving security maturity in the
organization
What needs to do to start improving your security

CURRENT STATE ASSESSMENT FUTURE STATE ASSESSMENT


Understand the current state of your The management determines the future
company by reviewing available state of the company, translated into
documentations, activity logs, and security initiatives in a form of roadmap
interviewing relevant personnel. and detail activities to be done in
achieving the goals
High level activities in doing current state
assessment

■ Obtain required information such as but not limited to


policy, procedure, and other documentations
■ Review the available documentations referring to the
NIST Cybersecurity Framework (CSF)
CURRENT STATE ASSESSMENT
■ Conduct interview sessions with relevant personnel to
acquire the current capabilities and controls
Understand the current state of your ■ Determine the current state level of each NIST CSF
company by reviewing available
function, category and subcategory, as current
documentations, activity logs, and
interviewing relevant personnel. organization’s maturity
■ Present and confirm the current state level or the
current maturity of the organization to relevant
personnel
High level activities in doing future state assessment

■ Assess conditions of expected future state level for


each function, category and subcategory
■ Develop roadmap and security initiatives including
detailed activities to be performed to reach expected
future state maturity level FUTURE STATE ASSESSMENT
■ Provide the list of required personnel to confirm
roadmap and detailed activities The management determines the future
■ Conduct workshop sessions with relevant personnel state of the company, translated into
to present roadmap and detailed activities and receive security initiatives in a form of roadmap
feedback and detail activities to be done in
achieving the goals
Focus area of having security initiatives

The organization structure has to align with


the overall security initiatives. Thus, the
implementation and the operational of
expected activities can be performed
The policy and procedure has to be in effectively
place. The governed activities can lead to PEOPLE
effective and efficient activities performed
by relevant persons in the organisation

IMPLEMENTATION The priority of the technology


DOMAIN implementation has to refer to area which has
lower maturity and high impact if security
incident happens

PROCESS TECHNOLOGY
03
FRAMEWORK AND PRINCIPLES
The common framework and
principles in improving security
and fraud controls
“Security vulnerability and technology in
overall ease fraudulent activities”

一SETIAWAN HERMANTO
The framework that can be used in improving cybersecurity and fraud controls

IDENTIFY PROTECT DETECT RESPOND RECOVER

Understanding relevant Outlining appropriate Defining the appropriate Including appropriate Identifies appropriate
risks to systems, people, safeguards to ensure activities to identify the activities to take action activities to maintain plans
assets, data, and delivery of critical occurrence of a regarding a detected for resilience and to restore
capabilities. Understanding infrastructure services. The cybersecurity and fraud cybersecurity incident. The any capabilities or services
the business context, the Protect Function supports event. The Detect Function Respond Function supports that were impaired due to a
resources that support the ability to limit or enables timely discovery of the ability to contain the cybersecurity incident. The
critical functions, and the contain the impact of a cybersecurity and fraud impact of a potential Recover Function supports
related relevant fraud and potential fraud and events. cybersecurity or fraud timely recovery to normal
cybersecurity risks. Identify cybersecurity event. incident operations to reduce the
Function enables an impact from a
organization to focus and cybersecurity or fraud
prioritize its efforts, incident
consistent with its risk
management strategy and
business needs
People, Process, and Technology elements in the framework

IDENTIFY PROTECT DETECT RESPOND RECOVER

PEOPLE PROCESS TECHNOLOGY

The actors who do the actions are The policy and procedure are defined to The implemented technology has to
defined and should meet the minimum regulate the performed activities, which address the high impact and should
competency to ensure the activities can can result effective and efficient promote automation in its orchestration
be performed accordingly collaboration among teams
Security and risk in product development

Design Build Test

During this phase, security and Security and fraud teams develop Security and fraud teams test the
fraud teams have to understand the test case scenarios which developed function or function to
the business requirements and could be leveraged during the ensure no vulnerability posed.
assess / identify security and testing and build the rules engine
fraud risks. The risk assessment for fraud. The result of testing (report) can
produces necessary controls be used as lesson learned to
(corrective, preventive, and Within this phase, the standards improve standards. Thus,
detective) are used as the guidance in the continuous improvement can be
development. No proper done to improve the application
The standards of controls which standards might pose quality effectively and efficiently.
have to be followed are unnecessary vulnerability which
distributed to relevant teams. can be leveraged by fraudsters or
attackers.
Access control principles

Validation process to check


whether the user has proper
authorization to perform the
activities inside the system

AUTHENTICATION AUTHORIZATION ACCOUNTING


Identification of users by Log of activities performed by the
validating the inputted users inside the system, including
username and password the authentication process and in
against the stored username particular the activities related to
and password data modification
Access framework
PLAN ■ Identify the sensitive data to protect along with relevant team who access
■ Define and apply Authentication, Authorization, and Accounting principles in the
The identification of
necessary actions to system
run the operation ■ Group the privilege as best as possible (consider department, function, etc)
■ Devise Access Matrix and gain approval from relevant stakeholders

DO ■ Review submitted request referring to Access Matrix


■ Grant the access manually or automatically (via API)
The activities
performed during ■ Revoke the granted access when the user is not more eligible
the operational

CHECK ■ Review the granted access with Access Matrix


■ Document and report the review result
The review of
operational activities ■ Integrate with security analytics to orchestrate automation
to validate the
conformity

ACT ■ Follow up the recommendation


■ Define necessary actions to improve the process to uphold
The optimization of
performed activities continuous improvement
to gain effectiveness
04
KEY TAKEAWAYS
The summary of information
given in this presentation
Summary points of today

■ Understanding the context of the organization and identifying your “crown jewels” are mandatory
things to do before taking any actions to improve your security and fraud controls, otherwise,
ineffective controls might be gained

■ Every company has to be ready in any circumstances toward security or fraud incidents which
might be caused by internal or external party because it’s NOT about “if” but “when”

■ The organization is required to switch from reactive to proactive (active defense) mindset by
devising a roadmap used to guide the improvement in security and fraud, which comprises of
People, Process, and Technology facets

■ Any implementation related to security or fraud has to consider the risk assessment results to
acquire optimum benefit

■ The company should apply the most suitable approach or framework in every phase of product
development to mitigate the risks
THANKS!
Does anyone have any questions?

[email protected]
+62 819 0503 0358
tokopedia.com

You might also like