InfoSec Professionals

Mission

Ensuring the confidentiality, integrity, and availability of information assets through proactive defense, continuous monitoring, and rapid response.

Core Focus

  • Threat Prevention
  • Security Operations
  • Risk Management
  • Business Enablement

Standard Frameworks

  • NIST CSF (Identify, Protect, Detect, Respond, Recover)
  • ISO 27001/27002
  • SANS Critical Controls

Threat Prevention & Security Operations

Asset Management & Scope

Scope Definition

  • Operating Systems
  • Network Devices
  • Applications & Databases
  • Cloud Infrastructure

Asset Management

  • Code Review
  • Physical Security assets
  • Mobile Devices & Apps
  • Containers & IoT
  • OT/SCADA

Attack Surface Management

  • Cloud misconfiguration testing
  • Identify (Periodic or Continuous)
  • Classify
  • Risk Based Approach
  • Prioritize (e.g., use of EPSS)

Mitigation & Metrics

Mitigation Actions

  • Fix
  • Verify
  • False positive management

Measuring Effectiveness

  • Baseline establishment
  • Metrics definition
  • Application Security KPIs

Application Security

Development & Standards

  • Application Development Standards
  • Secure Code Training and Review
  • Integration to SDLC and Project Delivery
  • Change Control
  • File Integrity Monitoring (FIM)

Protection & Testing

  • Web Application Firewall (WAF)
  • Application Vulnerability Testing
  • Inventory open source components
  • Source code supply chain security
  • API Security

Network Defense & Infrastructure

Network Security

  • Firewalls
  • Network IPS and IDS
  • Proxy/Content Filtering
  • DNS security/ filtering
  • DDoS Protection

Hardening & Endpoints

  • Hardening guidelines
  • Desktop security
  • Anti Malware, Anti-spam
  • Patching
  • Encryption, SSL, PKI

Awareness & Checks

  • Security Health Checks
  • Public software repositories
  • Awareness training
  • DLP (Data Loss Prevention)

Threat Detection (NIST CSF Detect)

SOC Operations & Skills

SOC Management

  • SOC Resource Mgmt
  • SOC Staff continuous training
  • Shift management
  • SOC procedures
  • SOC Metrics and Reports
  • SOC and NOC Integration
  • SOC Tech stack management

Analysis & Logic

  • Log Analysis/correlation/SIEM
  • Alerting (IDS/IPS, FIM, WAF, Anti Malware)
  • NetFlow analysis
  • Threat hunting and Insider threat
  • MSSP integration
  • Long term trend analysis
  • Unstructured data from IoT

Advanced Capabilities

  • Threat Detection capability assessment
  • Gap assessment & Prioritization
  • SOC DR exercise
  • Partnerships with ISACs
  • Integrate new data sources

Skills Development

Emerging Skills

  • Machine Learning (Understand Algorithm Biases, model training)
  • IoT (Autonomous Vehicles, Drones, Medical Devices, ICS)
  • MITRE ATT&CK
  • Soft skills
  • DevOps Integration

Tech Integration

  • Use of AI, GenAI and Data Analytics
  • Use of computer vision in physical security
  • Log Anomaly Detection
  • Red team/blue team exercises
  • Integrate threat intelligence platform (TIP)
  • Deception technologies for breach detection
  • Full packet inspection
  • Detect misconfigurations
  • Integrate Cloud based tools

Incident Management (NIST CSF Respond & Recover)

Response & Forensics

Incident Response Capability

  • Create adequate Incident Response capability
  • Incident Response Playbooks
  • Incident Readiness Assessment
  • Forensic Investigation
  • Data Breach Preparation

Preparedness Activities

  • Update and Test Incident Response Plan
  • Set Leadership Expectations
  • Forensic and IR Partner, retainer
  • Adequate Logging
  • Breach exercises (simulations)
  • First responders Training
  • IR Playbook testing
  • Media Relations

Business Continuity

  • Business Continuity Planning
  • Post-incident analysis
  • Cyber Risk Insurance
  • Managing relationships with law enforcement

Ransomware Specific

Ransomware Defense

  • Identify critical systems
  • Perform ransomware BIA
  • Tie with BC/DR Plans
  • Devise containment strategy
  • Ensure adequate backups
  • Periodic backup test
  • Offline backups in case backup is ransomed
  • Mock exercises
  • Implement machine integrity checking

Automation & SOAR

  • Playbooks
  • Supply chain incident mgmt
  • Keep inventory of software components
  • Integrate into vulnerability mgmt
  • Integrate into SDLC and risk mgmt process

Identity Management (IAM)

Core IAM

  • Identity Credentialing
  • User Provisioning and Identity Life Cycle Management
  • Single Sign On (SSO, Simplified sign on)
  • Repository (LDAP/Active Directory, Cloud Identity, Local ID stores)
  • Federation, SAML, Shibboleth
  • 2-Factor (multi-factor) Authentication - MFA

Authentication Methods

  • Authenticator Apps
  • Tokens and cards
  • One time passcodes
  • Role-Based Access Control (RBAC)
  • Customer Identity - Ecommerce and Mobile Apps
  • Password resets/self-service
  • HR Process Integration

Advanced & Zero Trust

  • Integrating cloud-based identities
  • IoT device identities
  • IAM SaaS solutions
  • Unified identity profiles
  • Password-less authentication (Voice, Face, Passkey)
  • IAM with Zero Trust technologies
  • Use of public identity (Google, FB etc.)
  • OAuth, OpenID, Digital Certificates
  • Privileged Access Management (PAM)
  • API authentication and secrets management

Governance, Risk & Compliance (GRC)

Strategy & Frameworks

Governance Structure

  • Strategy and business alignment
  • Security policies, standards
  • Legal, regulatory and contract
  • Risk Mgmt/Control Frameworks
  • NIST - relevant NIST standards
  • ISO, COSO, COBIT, ITIL
  • FAIR, FISMA, CMMC

Mgmt & Visibility

  • Visibility across multiple frameworks
  • Roles and Responsibilities (RACI charts)
  • Data Ownership, sharing, and data privacy
  • Conflict Management
  • Metrics and Reporting (Operational, Executive)
  • Validating effectiveness of metrics

Strategic Initiatives

  • IT, OT, IoT/IIoT Convergence
  • Explore options for cooperative SOC, collaborative infosec
  • Tools and vendors consolidation
  • Evaluating control effectiveness
  • Maintain a roadmap/plan for 1-3 years
  • Board oversight and board presentations
  • Security Team Branding
  • Aligning with Corporate Objectives

Politics & Value

  • Continuous Mgmt Updates, metrics
  • Negotiation, give and take
  • Corporate politics, picking battles carefully
  • Innovation and Value Creation
  • Expectations Management
  • Show progress/ risk reduction
  • ROSI (Return on Security Investment)

Architecture & Remote Work

Remote Work

  • Enable Secure Application access
  • Secure expanded attack surface
  • Security of sensitive data accessed from home
  • Zero trust access to applications

Security Architecture

  • Traditional Network Segmentation
  • Micro segmentation strategy
  • Application protection
  • Defense-in-depth
  • Remote Access strategies
  • Encryption Technologies
  • Backup/Replication/Multiple Sites
  • Cloud/Hybrid/Multiple Cloud Vendors

Modern Infrastructure

  • Software Defined Networking
  • Network Function Virtualization
  • Zero trust models and roadmap
  • SASE/SSE strategy, vendors
  • Overlay networks, secure enclaves

Automation and Analytics

DevOps & Ops

  • Secure DevOps, DevSecOps
  • Embedding security tools in CI/CD pipelines
  • Automate threat hunting
  • Automate risk scoring
  • Automate asset inventory
  • Secure infrastructure as code
  • Automate API inventory
  • Automate risk register

Response & Compliance

  • Automate security metrics
  • Automate incident response where applicable
  • Automate compliance checks
  • Automate patching

Risk Management

General Risk

  • Physical Security
  • Vulnerability Management
  • Ongoing risk assessments/pen testing
  • Code Reviews, SAST
  • Use of Risk Assessment Methodology and framework
  • Policies and Procedures
  • Phishing and Associate Awareness

Quantification & Registers

  • Third party risk management (TPRM) automation
  • Cyber Risk Quantification (CRQ)
  • Maintain Centralized Risk Register
  • Loss, Fraud prevention

Data Centric Approach

  • Data Discovery
  • Data Classification
  • Access Control
  • Data Loss Prevention - DLP
  • Customer and Partner Access
  • Encryption/Masking
  • Monitoring and Alerting

Operational Technologies

  • Industrial Controls Systems
  • PLCs
  • SCADA
  • HMIs

Legal, Data & Compliance

Legal

  • Data Discovery and Data Ownership
  • Vendor Contracts
  • Investigations/Forensics
  • Attorney-Client Privileges
  • Data Retention and Destruction

Compliance Standards

  • CCPA, GDPR & other data privacy laws
  • PCI
  • SOX
  • HIPAA and HITECH
  • Regular Audits
  • SSAE 18
  • NIST/FISMA
  • CMMC
  • HITRUST
  • DORA
  • SEC notification requirements
  • Other compliance needs

Project Delivery Lifecycle

Embedding Security

  • Embedding security in Project Requirements
  • Threat modeling and Design reviews
  • Security Testing
  • Certification and Accreditation

Artificial Intelligence and Generative AI (GenAI)

Governance & Ethics

  • AI Governance, Policies, Transparency
  • LLMs, Chatbots, Agents, RAG
  • Safe and ethical uses of GenAI
  • NIST AI Risk Mgmt Framework

Security of AI

  • Secure AI/GenAI models
  • Protecting Intellectual Property
  • Securing training and test data
  • Adversarial attacks
  • OWASP Top 10 LLM and GenAI risk
  • AI/GenAI testing tools

AI for InfoSec

  • Identify GenAI plausible use cases
  • AI enabled security tools, threat detection
  • Train InfoSec teams on AI technologies
  • Use of GenAI in task automation

Business Enablement

Mergers and Acquisitions

  • Acquisition Risk Assessment
  • Network/Application/Cloud Integration Cost
  • IAM integration
  • Security tools rationalization

Cloud Computing

  • Multi-Cloud architecture
  • Strategy and Guidelines
  • Cloud Security Posture Management (CSPM)
  • Ownership/Liability/Incidents
  • SaaS Strategy
  • Vendor's Financial Strength
  • SLAs
  • Infrastructure Audit

Cloud Details

  • Proof of Application Security
  • Disaster Recovery Posture
  • Data ownership, compliance
  • Integration of Identity Management/Federation/SSO
  • SaaS Policy and Guidelines
  • Cloud log integration/APIs
  • Virtualized security appliances
  • Cloud-native apps security
  • Containers-to-container communication security
  • Service mesh, micro services
  • Serverless computing security

Mobile, IoT & Emerging Tech

Mobile Technologies

  • Technology advancements
  • Lost/Stolen devices
  • BYOD and MDM (Mobile Device Management)
  • Mobile Apps Inventory

IoT (Internet of Things)

  • IOT Frameworks
  • Hardware/Devices security features
  • IOT Communication Protocols
  • Device Identity, Auth and Integrity
  • Over the Air updates

IoT Use Cases

  • Track and Trace
  • Condition Based Monitoring
  • Customer Experience
  • Smart Grid
  • Smart Cities / Communities
  • IoT SaaS Platforms
  • Augmented and Virtual Reality
  • Drones
  • Edge Computing

Processes & Industry Trends

Processes

  • HR/On Boarding/Termination
  • Business Partnerships
  • Agility, Business Continuity and Disaster Recovery

Trends

  • Understand industry trends (e.g. retail, financials, etc)
  • Evaluating Emerging Technologies (Quantum, Crypto, GenAI etc.)

Team Management

Budget & Projects

  • Manage Infosec Budget
  • Managing Security Projects
  • Business Case Development
  • Alignment with IT Projects
  • Consulting and outsourcing
  • CapEx and OpEx considerations
  • Technology amortization
  • Retire redundant & under utilized tools

Staffing & Balance

  • Staffing and Talent Management
  • Recruiting, performance and retention
  • Staff burnout prevention
  • Balance FTE and contractors
  • Staff training and skills update
  • Balancing budget for People, Training, and Tools/Technology/Hardware, travel, conferences
01 / 18