ITIL Overview Elaine Riedel SECURA Insurance ITIL Information

  • Slides: 20
Download presentation
ITIL Overview Elaine Riedel – SECURA Insurance

ITIL Overview Elaine Riedel – SECURA Insurance

ITIL • Information Technology Infrastructure Library, ITIL is defined as a framework with a

ITIL • Information Technology Infrastructure Library, ITIL is defined as a framework with a set of best practices for delivering efficient IT support services. . Companies adopt ITIL to realize their business benefits faster with defined processes and enabled by the right technology. • ITIL is the most widely adopted best practice for IT Service Management (ITSM) worldwide.

ITIL 4 Practices

ITIL 4 Practices

Most Implemented ITIL 4 Processes • Request Mgmt: I want something NEW from IT.

Most Implemented ITIL 4 Processes • Request Mgmt: I want something NEW from IT. • Incident Mgmt: I had something and now it isn’t working. • Problem Mgmt: One or more incidents with the same root cause. • Change Mgmt: Minimize risk to business operations by coordinating changes in the IT environment. • Asset Mgmt: Tracking all IT assets (hardware, software, servers, routers, etc. )

ITSM Tools

ITSM Tools

Incident Ticket Example

Incident Ticket Example

IT KPIs

IT KPIs

Service Desk KPI Dashboard Key Performance Indicators

Service Desk KPI Dashboard Key Performance Indicators

ITIL Certifications

ITIL Certifications

Questions? ?

Questions? ?

Information Security Practices and Certifications for Hacking into Your Career Brian Lindow SECURA Insurance

Information Security Practices and Certifications for Hacking into Your Career Brian Lindow SECURA Insurance

Latest Scary Stats • April 15 th 2021; US Formally Attributes Solar. Winds Attack

Latest Scary Stats • April 15 th 2021; US Formally Attributes Solar. Winds Attack to Russian Intelligence Agency • Ransomware damage costs to companies will be over $11. 5 billion in 2019 • A business will fall victim to a ransomware attack every 14 seconds • Biggest attack vector is by phishing email • 95% of all cyber attacks are financially motivated • 95% of all successful cyber attacks is cause by human error • The average time to identify a breach in 2020 was 228 days • Estimates show there have been as many as 192, 000 coronavirus-related cyberattacks per week in May 2020 alone, a 30% increase compared to April

Advanced Persistent Threats (APT) • An advanced persistent threat (APT) is a stealthy threat

Advanced Persistent Threats (APT) • An advanced persistent threat (APT) is a stealthy threat actor, typically a nation state, state-sponsored group, or organized crime which gains unauthorized access to a computer network and remains undetected for an extended period. • Such threat actors' motivations are typically political or economic with no fear of prosecution.

Social Engineering

Social Engineering

Social Engineering • “You don’t need as many technical skills to find one person

Social Engineering • “You don’t need as many technical skills to find one person who might be willing, in a moment of weakness, to open up an attachment that contains malicious content. ” • Only about 3% of the malware the bad actor runs tries to exploit a technical flaw. The other 97% is trying to trick a user through some type of social engineering scheme. • Classic phishing and spear phishing emails still work • Phone Impersonations or known of Vishing • Social Media Pretexting

Pillars of Information Security • Confidentiality, Integrity, and Availability (CIA) • Defense in Depth

Pillars of Information Security • Confidentiality, Integrity, and Availability (CIA) • Defense in Depth with layers of security controls • The employees are the new “human firewall” and keep training • A breach is a matter of “when” and not “if” • Practice the cyber breach response including the roles of the executives • Focus on protecting the “crown jewels” • “Zero Trust”: Newer concept centered on the belief that organizations should not automatically trust anything inside or outside

Careers in Cyber Security • Information Security Analyst/Engineer/Architect • Security Systems Administrator • Identity

Careers in Cyber Security • Information Security Analyst/Engineer/Architect • Security Systems Administrator • Identity and Access Management (IAM) Analyst, Authentication and Authorization • Security Operations Center (SOC) staff • Forensic Security Analyst • Information Security Management/Chief Information Security Officer (CISO) • Penetration Tester/Ethical Hacker Information Security careers to grow by 31% in next ten years

Certifications in Cyber Security Courses can be taken by a wide variety of high

Certifications in Cyber Security Courses can be taken by a wide variety of high education institutions • Certified Information System Security Professional (CISSP) • Certified Information Security Manager (CISM) • Certified Ethical Hacker (CEH) • Certified Cloud Security Professional (CCSP) Vendor specific such as: • Cisco Certified Network Professional (CCNP) • Microsoft 365 Certified: Security Administrator Associate • AWS Certified Security

Defending with Machine Learning • New vendors provide a device that plugs into the

Defending with Machine Learning • New vendors provide a device that plugs into the network/cloud and “learns” from looking at patterns in the network traffic. • The device capabilities include • Machine learning capabilities • Complex algorithms and probabilistic mathematics • Figures out the usual pattern of each user and device in a network. • After detection, the software can alert or stop the attack