Top Banner
*HCL Confidential Unlocking the Potential of Integrated GRC – IT Security and Business Risks in a Digital World “Advisory” & “Technology” Services Implementation Analytics Advisory HCL Governance Risk & Compliance Practice http://www.hclisd.com/Governance-Risk-Compliance-Consulting.aspx
14

Unlocking the Potential of Integrated GRC – IT Security ...€¦ · Unlocking the Potential of Integrated GRC – IT Security and Business Risks in a Digital World “Advisory”

May 29, 2020

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Unlocking the Potential of Integrated GRC – IT Security ...€¦ · Unlocking the Potential of Integrated GRC – IT Security and Business Risks in a Digital World “Advisory”

*HCL Confidential

Unlocking the Potential of Integrated GRC – IT Security and Business Risks in a Digital World

“Advisory” & “Technology” ServicesImplementation

AnalyticsAdvisory

HCL Governance Risk & Compliance Practicehttp://www.hclisd.com/Governance-Risk-Compliance-Consulting.aspx

Page 2: Unlocking the Potential of Integrated GRC – IT Security ...€¦ · Unlocking the Potential of Integrated GRC – IT Security and Business Risks in a Digital World “Advisory”

*HCL Confidential

Agenda

2

Digital Risks & Security Challenges

2

3 What Research Tell Us ?

4

5

CxO Challenges & Priorities

1

Integrated GRC Program

What do we do about it ?

Page 3: Unlocking the Potential of Integrated GRC – IT Security ...€¦ · Unlocking the Potential of Integrated GRC – IT Security and Business Risks in a Digital World “Advisory”

*HCL Confidential

Current Landscape of Digital Risks

3

1) User and application access controls

2) Documentation

3) PC and laptop access controls

4) Configuration and change management

5) IT security policies and standards

6) Auditing and reporting

7) Database access controls

8) Information access controls

9) Email, Web and Internet access controls

10) Asset classifications

N: 1560

IT Security = 7 of the Top 10

Source: IT PCG

Rank Norm and lagging firms Percentage 1 User and application

access controls63%

2 IT security policies and standards

63%

3 IT configuration change management

60%

4 IT auditing and reporting 54%

5 Application development and maintenance

50%

Leading cause of Deficienciesamong Norm and Lagging Firms

Page 4: Unlocking the Potential of Integrated GRC – IT Security ...€¦ · Unlocking the Potential of Integrated GRC – IT Security and Business Risks in a Digital World “Advisory”

*HCL Confidential

Future trends for digital risks

4

Information Explosion

ConnectedTechnology

Virtual Business

ConnectedPeople

Page 5: Unlocking the Potential of Integrated GRC – IT Security ...€¦ · Unlocking the Potential of Integrated GRC – IT Security and Business Risks in a Digital World “Advisory”

*HCL Confidential

Security Challenges are Complex

5

ApplicationsWeb

ApplicationsSystems

ApplicationsWeb 2.0 Mobile

Applications

InfrastructureDatacenters PCs Laptops Mobile Cloud Non-traditional

Data At rest In motionUnstructuredStructured

PeopleHackers Suppliers

Consultants Terrorists

Employees Outsourcers

Customers

Employees

Unstructured

Web 2.0Systems Applications

Outsourcers

Structured In motion

Customers

Mobile Applications

Page 6: Unlocking the Potential of Integrated GRC – IT Security ...€¦ · Unlocking the Potential of Integrated GRC – IT Security and Business Risks in a Digital World “Advisory”

*HCL Confidential

C-Suite Priorities are feeling the impact

Priority Risks Impact

Priority Risks Impact

Priority Risks Impact

Page 7: Unlocking the Potential of Integrated GRC – IT Security ...€¦ · Unlocking the Potential of Integrated GRC – IT Security and Business Risks in a Digital World “Advisory”

*HCL Confidential

C-Suite Priorities are feeling the impact….Cont’d

7

7

Priority Risks Impact

7

Priority Risks Impact

Page 8: Unlocking the Potential of Integrated GRC – IT Security ...€¦ · Unlocking the Potential of Integrated GRC – IT Security and Business Risks in a Digital World “Advisory”

*HCL Confidential

What do we do about it ? – Ask 5 Simple questions

1. What data is being collected, transacted on, transmitted, or stored, and for what purpose?

2. How are authentication and authorization being accomplished?

3. What are the communications channels between each component of the system and do they cross any network boundaries?

4. Does the solution involve: an Application Service Provider, data in the Cloud, an externally facing service?

5. Are there any regulatory laws, statutes, and/or compliance that must be met?

8

Page 9: Unlocking the Potential of Integrated GRC – IT Security ...€¦ · Unlocking the Potential of Integrated GRC – IT Security and Business Risks in a Digital World “Advisory”

*HCL Confidential

What do we do about it? – Establishing Integrated Framework

9

Identify the Data Sensors

Integrate the Data Sensors

Monitor the Data Sensors

Configure Map Test Load

Monitor & Report the Integrated

Output

Document Data Transformation

(Source to Target)

Determine Data Sources

KNOW YOUR DATA SENSORS

Page 10: Unlocking the Potential of Integrated GRC – IT Security ...€¦ · Unlocking the Potential of Integrated GRC – IT Security and Business Risks in a Digital World “Advisory”

*HCL Confidential

What do we do about it….Cont’d

10

Security Risk Management

Operations Management

Incident Management

• Identify threats and vulnerabilities• Integrate Risk Sensors• Prioritize projects and investments to mitigate risk

Business & IT Governance

• Optimize operational efficiency• Maximize visibility and monitoring

• Fast detection and response• Incident lifecycle

management

Reassess business risk and critical assets

• Business objectives• Critical business processes and assets• Risk tolerance

Page 11: Unlocking the Potential of Integrated GRC – IT Security ...€¦ · Unlocking the Potential of Integrated GRC – IT Security and Business Risks in a Digital World “Advisory”

*HCL Confidential

How do get there

11

OperationsManagement

Incident Management

Security RiskManagement

Business & ITGovernance

Current state Desired state

Siloed monitoring Correlation and prioritization

Advanced analytics

Bare minimum tools

Compliance-driven controls

Risk-based controls and monitoring

Newspaper view of risk

Follow industry practices

Manage business-specific risks

Security buried inside IT

Basic guidelines defined by business

Security is part of every business process

TACTICAL STRATEGIC

Page 12: Unlocking the Potential of Integrated GRC – IT Security ...€¦ · Unlocking the Potential of Integrated GRC – IT Security and Business Risks in a Digital World “Advisory”

*HCL Confidential

Integrated GRC Workflow – IT Security

12

SIEM

Business Units

Company

Page 13: Unlocking the Potential of Integrated GRC – IT Security ...€¦ · Unlocking the Potential of Integrated GRC – IT Security and Business Risks in a Digital World “Advisory”

*HCL Confidential

Integrated GRC Reporting Theme

13

Identity and Access Management 

Mainframe Security

Virtual System Security

Database Monitoring and Protection

Encryption and Key Lifecycle Management

App Vulnerability Scanning

Access and Entitlement Management

Web Application Firewall

Data Loss Prevention

SOA Security

Intrusion Prevention System

Messaging Security

Data Masking

Threat Management

SIEMand

Log Mgmt

SIEMand

Log Mgmt

Governance, Risk & Compliance PlatformGovernance, Risk & Compliance Platform

E‐mail Security

Application Security

Web/URL Filtering

Vulnerability  Assessment

Security Events and Logs

Identity Management

Data Security

Access Management

Physical Security

GRC

Capture PROCESS

Provide ASSURANCE

Enable INTELLIGENCE

Improve RESILIENCENetwork Security Penetration Testing

Page 14: Unlocking the Potential of Integrated GRC – IT Security ...€¦ · Unlocking the Potential of Integrated GRC – IT Security and Business Risks in a Digital World “Advisory”

*HCL Confidential

Thank You

14

To see how HCL GRC – Information Security Services can benefit your organization and to have our representative contact you, please write to [email protected] visit:http://www.hclisd.com/Governance-Risk-Compliance-Consulting.aspx