conversion
TRANSCRIPT
![Page 1: Conversion](https://reader033.vdocuments.site/reader033/viewer/2022052910/559b62ac1a28ab025f8b4868/html5/thumbnails/1.jpg)
Leron Zinatullinwww.zinatullin.com
Convergence of Physical and Information Security
@le_rond
![Page 2: Conversion](https://reader033.vdocuments.site/reader033/viewer/2022052910/559b62ac1a28ab025f8b4868/html5/thumbnails/2.jpg)
Convergence
“a trend that involves development of managed business process solutions to address risks and interdependencies between business functions and processes within the enterprise ”
Alliance for Enterprise Security Risk Management “Convergence of Enterprise Security Organizations”, 2005http://www.asisonline.org/newsroom/alliance.pdf, Web retrieve on December 22, 2009
@le_rond
![Page 3: Conversion](https://reader033.vdocuments.site/reader033/viewer/2022052910/559b62ac1a28ab025f8b4868/html5/thumbnails/3.jpg)
![Page 4: Conversion](https://reader033.vdocuments.site/reader033/viewer/2022052910/559b62ac1a28ab025f8b4868/html5/thumbnails/4.jpg)
Protection measures
@le_rond
![Page 5: Conversion](https://reader033.vdocuments.site/reader033/viewer/2022052910/559b62ac1a28ab025f8b4868/html5/thumbnails/5.jpg)
@le_rond
![Page 6: Conversion](https://reader033.vdocuments.site/reader033/viewer/2022052910/559b62ac1a28ab025f8b4868/html5/thumbnails/6.jpg)
@le_rond
![Page 7: Conversion](https://reader033.vdocuments.site/reader033/viewer/2022052910/559b62ac1a28ab025f8b4868/html5/thumbnails/7.jpg)
@le_rond
![Page 8: Conversion](https://reader033.vdocuments.site/reader033/viewer/2022052910/559b62ac1a28ab025f8b4868/html5/thumbnails/8.jpg)
@le_rond
![Page 9: Conversion](https://reader033.vdocuments.site/reader033/viewer/2022052910/559b62ac1a28ab025f8b4868/html5/thumbnails/9.jpg)
@le_rond
![Page 10: Conversion](https://reader033.vdocuments.site/reader033/viewer/2022052910/559b62ac1a28ab025f8b4868/html5/thumbnails/10.jpg)
@le_rond
![Page 11: Conversion](https://reader033.vdocuments.site/reader033/viewer/2022052910/559b62ac1a28ab025f8b4868/html5/thumbnails/11.jpg)
![Page 12: Conversion](https://reader033.vdocuments.site/reader033/viewer/2022052910/559b62ac1a28ab025f8b4868/html5/thumbnails/12.jpg)
Risk reduction
Cost savings
Disaster Recovery efficiency
@le_rond
Benefits of Convergence
![Page 13: Conversion](https://reader033.vdocuments.site/reader033/viewer/2022052910/559b62ac1a28ab025f8b4868/html5/thumbnails/13.jpg)
Security Incidents
@le_rondUS-CERT, "Cyber Security Trends, Metrics, and Security Indicators", June 16, 2009. Volume 4, Issue 1.http://www.us- cert.gov/press_room/trendsanalysisQ109.pdf, Web retrieve on December 22, 2009
![Page 14: Conversion](https://reader033.vdocuments.site/reader033/viewer/2022052910/559b62ac1a28ab025f8b4868/html5/thumbnails/14.jpg)
Liu, Simon and Cheng, Bruce; "Cyberattacks: Why, What, Who, and How", IT Pro, IEEE Computer Society, May/June 2009
Attack tool trends
@le_rond
Attack sophistication
Skillsrequired
![Page 15: Conversion](https://reader033.vdocuments.site/reader033/viewer/2022052910/559b62ac1a28ab025f8b4868/html5/thumbnails/15.jpg)
@le_rond
![Page 16: Conversion](https://reader033.vdocuments.site/reader033/viewer/2022052910/559b62ac1a28ab025f8b4868/html5/thumbnails/16.jpg)
@le_rond
![Page 17: Conversion](https://reader033.vdocuments.site/reader033/viewer/2022052910/559b62ac1a28ab025f8b4868/html5/thumbnails/17.jpg)
@le_rond
![Page 18: Conversion](https://reader033.vdocuments.site/reader033/viewer/2022052910/559b62ac1a28ab025f8b4868/html5/thumbnails/18.jpg)
Background
Salary
Training
Culture
Challenges of Convergence
@le_rond
![Page 19: Conversion](https://reader033.vdocuments.site/reader033/viewer/2022052910/559b62ac1a28ab025f8b4868/html5/thumbnails/19.jpg)
@le_rond
![Page 20: Conversion](https://reader033.vdocuments.site/reader033/viewer/2022052910/559b62ac1a28ab025f8b4868/html5/thumbnails/20.jpg)
@le_rond
![Page 21: Conversion](https://reader033.vdocuments.site/reader033/viewer/2022052910/559b62ac1a28ab025f8b4868/html5/thumbnails/21.jpg)
@le_rond
![Page 22: Conversion](https://reader033.vdocuments.site/reader033/viewer/2022052910/559b62ac1a28ab025f8b4868/html5/thumbnails/22.jpg)
@le_rond
![Page 23: Conversion](https://reader033.vdocuments.site/reader033/viewer/2022052910/559b62ac1a28ab025f8b4868/html5/thumbnails/23.jpg)
Benefits ChallengesCost savings CultureMore holistic view of risk Salary differencesReduction of risk profile Training requirementsStreamline process Lack of collaboration
Summary of Benefits and Challenges of Convergence
@le_rondAlliance for Enterprise Security Risk Management “Convergence of Enterprise Security Organizations”, 2005http://www.asisonline.org/newsroom/alliance.pdf, Web retrieve on December 22, 2009
![Page 24: Conversion](https://reader033.vdocuments.site/reader033/viewer/2022052910/559b62ac1a28ab025f8b4868/html5/thumbnails/24.jpg)
Merge physical and information security
Separate with reporting to one CSO
Keep the functions completely separate
Beginning a Convergence Program: Organizational Structure
@le_rond
![Page 25: Conversion](https://reader033.vdocuments.site/reader033/viewer/2022052910/559b62ac1a28ab025f8b4868/html5/thumbnails/25.jpg)
![Page 26: Conversion](https://reader033.vdocuments.site/reader033/viewer/2022052910/559b62ac1a28ab025f8b4868/html5/thumbnails/26.jpg)
Benefits of Convergence
Challenges of Convergences
Beginning of Converged Program
Summary
@le_rond
![Page 27: Conversion](https://reader033.vdocuments.site/reader033/viewer/2022052910/559b62ac1a28ab025f8b4868/html5/thumbnails/27.jpg)
Thank you!
@le_rond