Athena Cyber Security v1.0 - Dec 2020 - WIP - KM Feb 21

You might also like

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 19

ATHENATechnology Solutions

The Cyber Security


Partner

© 2020 Athena Technology Solutions


Confidential
Cyber Threats are “Real”
High Rate of Cyber Attacks
The US suffered 1,473 cyber attacks over the last year,
leasing to 164.6 million successful data breaches.

Hacking and Malware


Hacking and Malware causes 75% of the data breaches
in companies.

Financially Motivated
71% of data breaches are financially motivated.

Ransomware is Business
According to the FBI, approximately $1 Billion per year
are paid to ransomware scammers.

Loss of Trust
8 out of 10 US citizens fear that business are unable to
secure their personal information.
200M 191M
Total People Affected Total People Affected
Data Breaches
150M 145M
10 Biggest

Total People Affected Total People Affected

130M 110M
Total People Affected Total People Affected

94M 88M
Total People Affected Total People Affected

77M 11.5M
Total People Affected Total People Affected
Top Threat and Risks Faced in 2020
Phishing / Vishing

Business Email Compromise

Malware / Ransomware

APT

DDoS

Non-secure Mobile and Web Apps

Vulnerability

Third Service Providers (CSP/Data Custodians)

ATM Skimming
4
Cyber Security Services Portfolio

Governance, Risk & Compliance IT Security Data Protection Threat Management Security Operations Identity & Access Management

• ISO / PCI -DSS/HIPAA/GDPR/ • End Point Protection and • Data Protection • Security Posture • Identity Governance &
CCPA Consulting, Assessment Next Generation Antivirus Framework, Policies and • SOC Consulting
Assessment Administration
and Implementation Controls
• Multi Scanning Antivirus • Security Analytics Planning
• Open Source • Access Management for
• IT Security Governance, Risk Engine • Data Discovery – Check Compliance Audit Web & Mobile
Management, Reporting, • Security Dashboard Design
Mitigation & Controls, • Network & Data Centre • Data Inventory • Web Threat Detection • Directory Services
Security Management • Log Correlation & Analysis
• Compliance Management &
• APT Risk Mitigation • Privileged Access
Audit Readiness • Web & Mobile Security • Risk Profiling and Data • Alert Tuning and
Strategy Management
Classification Optimization
• Third Party Risk Assessment • Penetration Testing • Advanced Security • Mobile Security
• Data Protection(at rest, • SIEM Health Check
Testing Services
• Enterprise Security – Gap • Web Application Security, in transit, in use and
Analysis, Continuous • Audits and Assessments • Enterprise Single Sign-On
Application Security during destruction) • Incident Response
Improvement Testing
• Alarm Monitoring, SOC • IAM Architecture Design
• Asset Inventory • Threat Intelligence &
• Cyber Security Risk and • Vulnerability Assessment Management Operations
Hunting • Cloud Single Sign-On
Maturity Assessment
• Malware, Ransomware • Reporting and Continuous
• Phishing / Spoofing • Technology and Product
• Business Continuity & Disaster analysis ->This should go to Improvements
Services Selection
Recovery Planning Threat management

• Privacy Framework

5
Governance, Risk and Compliance
 Policy Management, Hardening Guidelines
GRC Tools:
 Consulting, Assessment and Implementation
• RSA Archer
ISO 27001, NIST, COBIT • MetricStream
• OneTrust
PCI –DSS
 Privacy requirements – GDPR, CCPA, HIPAA, PIPEDA
 Business Continuity and Disaster Recovery Management Services
Vendor Risk Assessment Framework:
 On-Premise /Cloud Selection Consulting • NIST
 Risk Management and services • ISO
• COBIT
 Cyber security Risk and Maturity • Atlas / Security Scoreboard
 Vendor / Third Party Risk Assessment
 Business Continuity and Disaster Recovery
 Cyber awareness /training
For Leaders , Managers and basic awareness for Senior Citizens
Privacy training
Technical certification (CompTIA, CEH, CISSP, CRISC, CISM)
Secure SDLC and OWSAP, NIST, CIS, Security testing
Cyber Project for Student
With our rich domain experience and expertise, we can quickly transform your Cybersecurity posture without affecting your key business
6
IT Infrastructure Security
 Network and Data Center Security Endpoint Security Tools:
• Server hardening • Crowd strike
• Cylance
• Network hardening
• TrendMicro
• Perimeter security • Digital Guardian
• Firewall Rule Review, Firewall Change Analysis • Metadefender, Virus Total
• Vulnerability assessment, Penetration Testing
• Patch Management
 Web Application and Mobile Security Web App and Mobile sec Tools:
• Mobile Device Management • Fortify
• Checkmarks
• Web Application Security Testing (SAST, DAST) • IBM App scan
• Multi Scanning Antivirus Engine (Code Scanning) • Now secure
• Mobile app security assessment • Burp Suite
• BOT security assessment • Nmap
• Metaspoilt
 Secure Dev Ops • AppScan
• CI/CD • Qualysguard
• Tool Integration and Automation • Acunetix
• Wireshark

Our experts would analyze your pain areas, and suggest/implement the best solution in the industry
7
Data Protection
 Data Security Policy, Standards, Procedures and framework Data Protection Tools:
 Classification and Segregation of Data • McAfee DLP
• Sophos Safeguard Encryption
 IT Asset management, Asset Classification
• Symantec DLP
 Data Discovery • Trend Micro
• OneTrust (Data Privacy)
 Data Storage Encryption, Back Up, DLP, SIEM, MDM, DRM
• CoSoSys Endpoint Protector
• SECLORE

“Data is the new Oil”, we help you to protect your Data /IP with no compromise to your Business
8
Security Operations
 Security Operation Centre (SOC) consulting and implementation
• SOC setup Security orchestration and Response
• 24/7 monitoring (SOAR / SOC) Tools:
• Reporting and Continuous Improvements • IBMQRadar
• Auditing and Compliance • Splunk
• Elastic
 Security Dashboard Design • Exabeam
 Log Correlation & Analysis
 Alert Tuning and Optimization
 SIEM & SOAR SIEM Tools:
• AlienVault
• Splunk
• Fortinet
• Rapid 7
• Log rhythm

With best-in-class infrastructure, we monitor your infrastructure 24/7/365 and take quick actions to keep your
9
Infra systems up and running
Threat and Forensic Management
 Security Posture Assessment

 Software Composition Analysis

 Web Threat Detection

 APT Risk Mitigation Strategy

 Advanced Security Testing Services

 Forensic analysis and Response

 Threat Intelligence & Hunting

 Phishing / Spoofing Services (Simulation, live hacking)

16
Identity and Access Management
 Identity Governance & Administration

 Enterprise Authentication

• Multi factor

 Directory Services

 Privileged Access Management (CyberArk, Savyint, OneIdentity, SailPoint – Please reconfirm if they have PAM as they are known for IDAM
solution)

 Cloud identity

 Technology Integration and Product Selection

15
Product Landscape

11
VCISO as a Service
 Provide leadership on Risk, Governance, Incident Response, Disaster Recovery & Business Continuity

 Provide Expert assessment on security threats, risks and compliance

 Provide consultation to build effective cybersecurity & resiliency program

 Facilitate the integration of security into your business strategy, process & culture

 Manage the development, roll-out, and ongoing maintenance of cybersecurity programs

 Assist with integration and interpretation of information security program controls

 Serve as an Industry expert (HIPAA, PCI-DSS, NIST, ISO 27001, various standards, and compliances)

 Serve as security liaison to auditors, assessors, and examiners

13
Testimony
Athena consistently exceeds our business targets, overcomes
challenges and goes the extra mile.~ Great Company, Excellent
Team and Partner.

14
CONTACT US
We look forward to hearing from you.

915 Corporate Way


in LinkedIn/athenatec
Fremont, CA

Web Info@athenatec.com +1 510.687.0900


Thank You

ATHENA
Technology Solutions

Digitizing the Manufacturing Enterprise


Backup Slides

ATHENA
Technology Solutions

Digitizing the Manufacturing Enterprise


Top Threat and Risks Faced in 2020
Phishing / Vishing

Business Email Compromise

Malware / Ransomeware

APT

DDos

Non-Secure Mobile and Web Apps

Vulnerability

Third Service Providers (CSP/Data Custodians)

ATM Skimming
4
Case Study

12

You might also like