You are on page 1of 16

Guide to Cybersecurity Framework

– Become Cyber Resilient

ProcessIT Global Private Limited 1


Cybersecurity is a living process which
demands continuous efforts to improve
upon our own weaknesses

ProcessIT Global Private Limited 2


Key Requirements to build a successful
cybersecurity program
• Discipline
• Attention to details
• Zero Complacency
• Proactive Communication
• Choosing the Right Framework

ProcessIT Global Private Limited 3


Approach Methodology

Cybersecurity Services –
Based on NIST 1.1
Framework

ProcessIT Global Private Limited 4


ProcessIT Global Private Limited 5
Identify

Develop organizational understanding to


manage cybersecurity risk to systems,
assets, data, and capabilities.
Identify Activities

Business Asset
• Identify critical business processes
Environment Management
[ID.BE] [ID.AM] • Document Information flows
• Establish policies for cybersecurity that
includes roles and responsibilities
• Maintain hardware and software
inventory
Risk Assessment • Identify contracts with external partners
Governance [ID.RA]
[ID.GV] • Identify Risk Management processes
Protect

Develop and implement the appropriate


safeguards to ensure delivery of services.
Protect Activities
• Manage access to assets and
Information
Protection
information
Maintenance Processes and • Conduct regular backups
[PR.MA] Procedures
Awareness [PR.IP] • Protect sensitive data
and Training • Patch operating systems and
Identity [PR.AT] applications
Management and Data
Access Control Security • Create response and recovery
[PR.AC] [PR.DS] plans
Protective
• Protect your network
Technology
[PR.PT] • Train your employees
Detect
Develop and
implement the
appropriate activities
to identify the
occurrence of a
cybersecurity event.
Detect Activities

Anomalies
• Install and update anti-virus
and Events
and other malware detection
[DE.AE]
software

• Know what are expected data


flows for your business
Continuous
Monitoring
[DE.CM] • Maintain and monitor logs
Respond Pillar

Response • Coordinate with internal and


Planning external stakeholders
[RS.RP]
• Ensure response plans are
tested

Communications • Ensure response plans are


[RS.CO]
updated
Recover
Develop and implement the
appropriate activities to
maintain plans for
resilience and to restore
any capabilities or
services that were
impaired due to a
cybersecurity event.
Recover Activities
• Manage public relations and
Recovery company reputation
Planning
[RC.RP] • Communicate with internal
and external stakeholders

• Ensure recovery plans are


Communications updated
[RC.CO]
• Consider cyber insurance
Advisory

Solution
Maintenance
Architecting

Accelerating your Cyber Service Offerings


Resilience Program
Audit Implementation

Support

ProcessIT Global Private Limited 15


IDENTITY AND ACCESS
MANAGEMENT
•Adaptive Identity
Governance
•Adaptive Access
Management
•Adaptive Privilege User

APP SECURITY
• Static, Dynamic, & GOVERNANCE RISK
Runtime AND COMPLIANCE
•application testing
• eDiscovery & Classification
•Application security-as-a-
service •Information Management
•Dev-sec-ops

OUR
TECHNOLOGY
EXPERTISE
DATA SECURITY END POINT SECURITY
• Data De-identification • Lifecycle management
(encryption/tokenization) •Patching &
•Key management containerization
•H/W-based trust •Application virtualization
assurance •Mobile and Server
•Messaging security Management

SECURITY OPERATIONS
• Real-time detection
•Workflow automation
•Open source data
ingestion
•Hunt and investigation

ProcessIT Global Private Limited 16

You might also like