IT Security
IT Security
02 SECURITY ROADMAP
The common approach in improving security maturity
in the organization
04 KEY TAKEAWAYS
The summary points of today presentation
01
SECURITY AND RISK TREND
Gartner released 7 security and risk trends for 2019.
Common challenges and how to address them
Gartner Top 7 Security and Risk Trends for 2019
1. Leading SRM (Security and Risk Management) leaders are creating pragmatic risk appetite
statements linked to business outcomes to engage their stakeholders more effectively
2. There is renewed interest in implementing or maturing security operations centers (SOCs) with a
focus on threat detection and response
3. Leading organizations are utilizing a data security governance framework to prioritize data
security investments
4. “Passwordless” authentication is achieving market traction, driven by demand and the availability
of biometrics and strong hardware-based authentication methods
5. Security product vendors are increasingly offering premium services to help customers get more
immediate value and to assist in skills training
6. Leading organizations are investing in and maturing their cloud security competency as it
becomes the mainstream computing platform
7. The strategic CARTA (Continuous Adaptive Risk and Trust Assessment) approach to security is
starting to appear in more traditional security markets
Cost of data breach
reference:
https://databreachcalculator.mybluemix.
net/executive-summary
Challenges with legacy security technologies
Map Enable
sensitive data flow security analytics
Activate
Identify Devise
security automation
sensitive data Zero Trust perimeter
and orchestration
PROCESS TECHNOLOGY
03
FRAMEWORK AND PRINCIPLES
The common framework and
principles in improving security
and fraud controls
“Security vulnerability and technology in
overall ease fraudulent activities”
一SETIAWAN HERMANTO
The framework that can be used in improving cybersecurity and fraud controls
Understanding relevant Outlining appropriate Defining the appropriate Including appropriate Identifies appropriate
risks to systems, people, safeguards to ensure activities to identify the activities to take action activities to maintain plans
assets, data, and delivery of critical occurrence of a regarding a detected for resilience and to restore
capabilities. Understanding infrastructure services. The cybersecurity and fraud cybersecurity incident. The any capabilities or services
the business context, the Protect Function supports event. The Detect Function Respond Function supports that were impaired due to a
resources that support the ability to limit or enables timely discovery of the ability to contain the cybersecurity incident. The
critical functions, and the contain the impact of a cybersecurity and fraud impact of a potential Recover Function supports
related relevant fraud and potential fraud and events. cybersecurity or fraud timely recovery to normal
cybersecurity risks. Identify cybersecurity event. incident operations to reduce the
Function enables an impact from a
organization to focus and cybersecurity or fraud
prioritize its efforts, incident
consistent with its risk
management strategy and
business needs
People, Process, and Technology elements in the framework
The actors who do the actions are The policy and procedure are defined to The implemented technology has to
defined and should meet the minimum regulate the performed activities, which address the high impact and should
competency to ensure the activities can can result effective and efficient promote automation in its orchestration
be performed accordingly collaboration among teams
Security and risk in product development
During this phase, security and Security and fraud teams develop Security and fraud teams test the
fraud teams have to understand the test case scenarios which developed function or function to
the business requirements and could be leveraged during the ensure no vulnerability posed.
assess / identify security and testing and build the rules engine
fraud risks. The risk assessment for fraud. The result of testing (report) can
produces necessary controls be used as lesson learned to
(corrective, preventive, and Within this phase, the standards improve standards. Thus,
detective) are used as the guidance in the continuous improvement can be
development. No proper done to improve the application
The standards of controls which standards might pose quality effectively and efficiently.
have to be followed are unnecessary vulnerability which
distributed to relevant teams. can be leveraged by fraudsters or
attackers.
Access control principles
■ Understanding the context of the organization and identifying your “crown jewels” are mandatory
things to do before taking any actions to improve your security and fraud controls, otherwise,
ineffective controls might be gained
■ Every company has to be ready in any circumstances toward security or fraud incidents which
might be caused by internal or external party because it’s NOT about “if” but “when”
■ The organization is required to switch from reactive to proactive (active defense) mindset by
devising a roadmap used to guide the improvement in security and fraud, which comprises of
People, Process, and Technology facets
■ Any implementation related to security or fraud has to consider the risk assessment results to
acquire optimum benefit
■ The company should apply the most suitable approach or framework in every phase of product
development to mitigate the risks
THANKS!
Does anyone have any questions?
[email protected]
+62 819 0503 0358
tokopedia.com