80 likes | 92 Views
Rajaram Pejaver Security Engineer, CISSP. A brief summary of Security Services that can be provided. Security Assessment. Review your computing environment. Review your operating procedures and configurations. Understand your company's specific business risks.
E N D
Rajaram PejaverSecurity Engineer, CISSP A brief summary of Security Services that can be provided.
Security Assessment • Review your computing environment. • Review your operating procedures and configurations. • Understand your company's specific business risks. • Meet Audit and Regulatory requirements • HIPAA, GLB, FDA Title 21 CFR Part 11, NY State Insurance Dept. Reg. 173… • Investigate products that will help your situation. • Recommend ways to mitigate risks and improve security.
Penetration Testing • Of Firewalls. • Of applications, networks and systems. • Use "Black Hat" tools to probe systems.
Policy Development • A security policy is a starting point for creating a secure computing system. It is a set of rules stating what is permitted and what is not permitted in a system during normal and emergency operation. The policy should balance between productivity needs (convenience), cost of implementation, and the level of risk protection required. • Sample policies: • email usage & message retention policies • Acceptable Internet usage • Firewall configuration policy • Certificate Policies (CP) & Practice Statements (CPS)
Security Architecture • Develop vision for securing a specific system or the enterprise. • Perform a “Gap Analysis” to identify the differences between current and desired situations. • Develop roadmap, deployment strategies and project plans.
Security Engineering • Adapt available products to secure the computing environment. • Build point solutions as necessary to achieve desired security. • Integration of products into current environment. • Develop operating procedures. • Sample product areas: • Public Key Infrastructure, LDAP • Access Control • Intrusion Detection • Content scanning • VPNs & Firewalls • Encryption solutions
Product Evaluation • Evaluate third party vendor products. • Negotiate product enhancements with vendor to suit specific needs. • Sample product areas (same as in previous topic)
Other strengths • Versatile • Quality and detail oriented • Excellent writing & communications skills • CISSP • References on request