Top Banner
Next Generation Security Operations From SOC to C-SOC Reserve Bank Information Technology Private Limited Operational Excellence Webinar Series ReBIT with BlockArmour & NetMonastery
13

Next Generation Security Operations · Next Generation Security Operations From SOC to C-SOC Reserve Bank Information Technology Private Limited Operational Excellence Webinar Series

Jun 10, 2020

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Next Generation Security Operations · Next Generation Security Operations From SOC to C-SOC Reserve Bank Information Technology Private Limited Operational Excellence Webinar Series

Next Generation Security Operations From SOC to C-SOC

Reserve Bank Information Technology Private Limited

Operational Excellence Webinar Series

ReBIT with BlockArmour & NetMonastery

Page 2: Next Generation Security Operations · Next Generation Security Operations From SOC to C-SOC Reserve Bank Information Technology Private Limited Operational Excellence Webinar Series

Panelists

Narayan Neelakantan, Co-Founder & CEO, Block ArmourCo-founder Block Armour – a blockchain based cyber security product startup.

Prior to founding Block Armour, he worked with National Stock Exchange (NSE) as Head - IT Risk & Compliance & CISO

Shomiron Das Gupta, Founder Netmonastery

Founded Netmonastery in 2002 - delivers quality attack detection products and services to its customers. Experience of building detection strategies for the most advanced security operations centers in the world.

Page 3: Next Generation Security Operations · Next Generation Security Operations From SOC to C-SOC Reserve Bank Information Technology Private Limited Operational Excellence Webinar Series

Panelists

Abhijit Dhongade, Co-Founder & CTO, Block Armour

Prior to founding Block Armour, he worked with National Stock Exchange (NSE) as Head – Security Operations Center. He has more than a decade of professional experience and is considered an expert in the areas of Security Incident and Event Management (SIEM) systems, Security Operations Center (SOC) and Incident Response (IR).

Vivek Srivastav, ReBITSenior Vice President, Research and Innovation

Moderate the forum.

Page 4: Next Generation Security Operations · Next Generation Security Operations From SOC to C-SOC Reserve Bank Information Technology Private Limited Operational Excellence Webinar Series

Agenda

● Brief overview/background of the Operational Excellence Program

● CSOC in RBI’s Cybersecurity Framework

● Next Generation Security Operations - Threats, Functions and Tooling

● Advanced SOC Capabilities

● Q/A Session

Page 5: Next Generation Security Operations · Next Generation Security Operations From SOC to C-SOC Reserve Bank Information Technology Private Limited Operational Excellence Webinar Series

BackgroundReBIT’s Operational Excellence

Program

Page 6: Next Generation Security Operations · Next Generation Security Operations From SOC to C-SOC Reserve Bank Information Technology Private Limited Operational Excellence Webinar Series

Operational Excellence Webinar

Operational Excellence Webinars

Playbooks

FAQ

Recordings&

Materials

Tools

http://webinar.rebit.org.in

Page 7: Next Generation Security Operations · Next Generation Security Operations From SOC to C-SOC Reserve Bank Information Technology Private Limited Operational Excellence Webinar Series

Webinars

Operational Excellence - Campaigns

Anti-Phishing Campaign

(DMARC Implementation)

Patch Management

(best practices)

SOC Operation

(best practices and capability

development)

DNS Governance

(DNSSEC Implementation)

Page 8: Next Generation Security Operations · Next Generation Security Operations From SOC to C-SOC Reserve Bank Information Technology Private Limited Operational Excellence Webinar Series

RBI’s Cybersecurity FrameworkCyber Security Framework

Cyber Security Policy Cyber Security Strategy

Continuous Surveillance

Annex 2 - Cyber Security Operation

Centre (C-SOC)

Risk/Gap Assessment

IT Architecture

Network and Database Security

Protection of consumer information

Cyber Crisis Management Plan

Cyber Security Preparedness Indicator Reporting

Cyber Incidents

Annex 3 - Cyber Security Incident Reporting (CSIR)Organization

StructureCyber Security

Awareness

Annex 1 - Baseline Cyber Security and Resilience Requirements

Page 9: Next Generation Security Operations · Next Generation Security Operations From SOC to C-SOC Reserve Bank Information Technology Private Limited Operational Excellence Webinar Series

Cyber Security Operations Center (C-SOC)

SOC tools

NetworkUserApplication

Rules&

Analytics

HoneyPots

Dashboard & Oversight

Top Management/Board Briefing on Threat Intelligence

Incident Management

Threat Feed

Incident Reporting

Page 10: Next Generation Security Operations · Next Generation Security Operations From SOC to C-SOC Reserve Bank Information Technology Private Limited Operational Excellence Webinar Series

Next Generation Security Operations -

Threats, Functions and Tooling

Page 11: Next Generation Security Operations · Next Generation Security Operations From SOC to C-SOC Reserve Bank Information Technology Private Limited Operational Excellence Webinar Series

SOC - Levels of Maturity

Log Monitoring & Analysis

SIEM

Advanced use of analytics

Threat Intelligence

Respond Recover

Incident Response

Incident Management

Security Monitoring

Page 12: Next Generation Security Operations · Next Generation Security Operations From SOC to C-SOC Reserve Bank Information Technology Private Limited Operational Excellence Webinar Series

Q/APlease raise hand and we will unmute you for your questions.

Alternatively please share your questions in the chat window.

Page 13: Next Generation Security Operations · Next Generation Security Operations From SOC to C-SOC Reserve Bank Information Technology Private Limited Operational Excellence Webinar Series

Cyber Security Operations Center (C-SOC)

SOC tools

NetworkUserApplication

Rules&

Analytics

HoneyPots

Dashboard & Oversight

Top Management/Board Briefing on Threat Intelligence

Incident Management

Threat Feed

Incident Reporting

Next: Webinar on Honeypots and Deception Technologies