CISM

Course
Time
8 hours 39 minutes
Difficulty
Intermediate
CEU/CPE
9

Video Transcription

00:03
All right, let's go ahead and look at security program operations. So when we're talking about operations, we're talking about those day to day things that our security program has to account for. We've gotta monitor the network and ensure that
00:17
there's nothing malicious going on or and even not malicious. There's nothing that violates a security policy.
00:24
One. Scan the network for malicious codes. We want to choreograph the network in such a way that we have availability as appropriate. But we also don't compromise security for that purpose. So we segment
00:39
the network into trusted versus untrusted. We use firewalls. In order to do that,
00:44
we have to have a means of responding to incidents as they happen. Another part of operations is planning for business continuity, right? Making sure that as we make changes on the network many times, people think of BCP is kind of a long term, not day to day
01:00
business continuity. Planning is always going on, just like risk planning
01:04
is always going on in your network. Always
01:08
in the back of our mind, we think, How's the business going? Keep going
01:12
all right. Service providers will talk a little bit about Cloud management service level agreements. So security, proper program operations again, the day to day stuff that we do as security professionals. All right, so the first piece event monitoring so
01:30
events, you know, if we want to call an event, an event can simply be defined as a change in ST.
01:38
Not good, not bad. It just is. Deanna service started
01:42
this file was accessed that to a right that doesn't necessarily mean anything. Usually
01:49
there were more concerned with these events once they elevate to an incident. And an incident is events that have a negative impact on the system.
01:59
But wouldn't we rather catch them before they become incidents? Right. So if I'm aware of the events that are going on in my network, I can have a better chance at mitigating or preventing ideally the incidents. So the tools that we have, we review logs. Honey pots are great, um,
02:17
sources of information because
02:20
they're vulnerable, or at least a peer vulnerable to an attacker. And when the attacker tries to compromise the system
02:28
that honey pot records all his actions. So I get a little bit of knowledge about what that Attackers doing
02:34
intrusion, detection and prevention systems are going to mitigate the threats of malicious activity on my network detection systems. Detect they don't stop. Prevention systems do actually stopped by sending a TCP reset or some means,
02:52
uh, to the source of the activity.
02:54
Now, usually systems today
02:58
they're not one or the other. They're a combination of the two, their ideas and I p s all world up into one.
03:04
All right. Sim systems thes air about, um,
03:07
aggregation
03:08
gathering information about threats pulling information from log files, whether their firewalls or honey pots or whatever providing a central location with which I confuse those.
03:21
And that stands for security event, an incident monitoring systems. This idea of orchestration, automation that's all they're getting at. That is Let's have an automated means toe pull log information event information from all my devices in the network. And that's tremendously helpful
03:40
in a medium
03:42
toe Lord Chuy's company,
03:45
Vulnerability Management.
03:46
And that comes from event management, right? Let's keep our eyes on the events before we start to have compromises. But vulnerabilities are the weakness. Right? When we're talking about an event
03:59
we're looking at, the possibility of vulnerabilities been compromised. But when we're looking just a vulnerabilities like you don't have risk
04:06
if you don't have a weakness, right? So when we look at the weaknesses, we call those vulnerabilities. We're looking at ways that we remain vulnerable
04:17
and their security scans that test the system. You know, looking for open ports. And that falls into vulnerability assessments there. Just scanning tools that might help you map out the network, for instance,
04:33
so that once at the network mapped out, then I can run in the Vulnerability Assessment Owner particular system.
04:40
And then I can try penetration tests to try to exploit. So usually these three go together, scan the network, find your target test for open ports or assess vulnerabilities, then try to exploit with a pen test.
04:56
You don't know if your system is configured in such a way that it can withstand an attack until you test it
05:04
right. You can audit all day long, and audit will tell you if you're following policy. But only a test will show you
05:12
the rial, the real success or give you a better indication the real success of configuration
05:19
and like I mentioned auditing, are we in compliance? And that's the question we want to answer with auditing A. Are we in compliance? Then the next question. Will it work? That's got to come from a pen test. But when we're looking at auditing an audit has to be objective.
05:39
You can get objective it. Ian House. I'm not saying you have to outsource,
05:43
but it has to be objective. So what that means is, if your auditors are reporting to a supervisor of the team you're auditing, that's not a very clear path, right? There's a little conflict of interest there.
05:56
Um, if you're auditing yourself, usually not so objective, Man, I did a lousy job on this date night. That's never been put in a report. I've written not ones.
06:06
So we need objectivity.
06:10
We have to scope the off it that has to be detailed and specified. Is it this particular system? Is that this particular network or sub net?
06:19
Is it
06:20
specifically an application or an individual? What is the audit?
06:25
Okay, we will also have to document our approach. How are we going to approach the audit? What's our methodology? And then, of course, any constraints that air in place, we may only be able to conduct an audit between certain hours using certain tools. And then, of course, we document our reports. So
06:44
those are the five components
06:46
of of the report. And let me tell you, up with the coppers has five components and I said objective. Certainly. An audit needs to be objective. Absolutely. But in this context, I miss Red. In this context, I would look at it as part of your report should address. What's the objective of the office?
07:06
Why couldn't we just have different words in the English language for different things? So I just miss read that. But certainly an audit has to be objective. But these five components are the five components of a report. So what's the objective of the audit? How big is the audit? What's its scope? What's our methodology? Are there constraints?
07:27
And then, ultimately the report rule
07:29
include what was right. The result is

Up Next

CISM

Cybrary's Certified Information Security Manager (CISM) course is a great fit for IT professionals looking to move up in their organization and advance their careers and/or current CISMs looking to learn about the latest trends in the IT industry.

Instructed By

Instructor Profile Image
Kelly Handerhan
Senior Instructor