Session

Security Operations

I. Introduction
A. Overview of Security Operations
B. Importance of Addressing Threats to Production-Operating Environment

II. Administrative Security
A. Least Privilege and Minimum Necessary Access
B. Need to Know and Separation of Duties
C. Mandatory Leave and Non-Disclosure Agreements

III. Forensics
A. Preservation of Crime Scene and Evidence
B. Forensic Media Analysis
C. Network Forensics

IV. Incident Response Management
A. Methodology Overview: Preparation, Detection, Response, Mitigation, Reporting, Recovery, Remediation, and Lessons Learned
B. Root Cause Analysis

V. Operational Preventive and Detective Controls
A. Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS)
B. Security Information and Event Management (SIEM)
C. Data Loss Prevention and Endpoint Security

VI. Asset Management
A. Configuration Management and Baselining
B. Vulnerability Management and Change Management

VII. Continuity of Operations
A. Service Level Agreements and Fault Tolerance

VIII. Business Continuity Planning (BCP) and Disaster Recovery (DR) Overview Process
A. BCP Overview: Goals and Focus
B. DRP Overview: Short-term Plan for IT-Oriented Disruptions
C. Disruptive Events: Errors, Natural Disasters, Power Problems, etc.

IX. Developing a BCP/DRP
A. High-Level Steps: Project Initiation, Scope, Business Impact Analysis, Recovery Strategy, etc.
B. Compliance with NIST SP800-34 Guidelines

X. Backups and Availability
A. Importance of Offsite Storage
B. Electronic Backups: Full, Incremental, Differential, etc.

XI. DRP Testing, Training and Awareness
A. Testing Procedures: Read-through, Walkthrough, Simulation, etc.
B. Importance of Training and Awareness

XII. Continued BCP/DR Maintenance
A. Change Management and Avoiding BCP/DRP Mistakes
B. Common Mistakes: Lack of Management Support, Inadequate Testing, Failure to Keep Plans Updated

XIII. Conclusion
A. Summary of Key Points
B. Importance of Strengthening Security Operations
C. Call to Action for Continuous Improvement

Source : CISSP guides

Divya K

World Wide Women in Cybersecurity – Bangalore Chapter Leader

Bengaluru, India

Actions

Please note that Sessionize is not responsible for the accuracy or validity of the data provided by speakers. If you suspect this profile to be fake or spam, please let us know.

Jump to top