ALERTING
LOGGING AND AUTOMATED
YOUR IT COMPLIANCE PARTNER
GO BEYOND THE CHECKLIST
Webinar
Agenda
1
2
3
4
5
6
7
About ControlCase
Risk Summary
Why You Need Logging
and Alerting
Overview of the Services
Architecture
Features
Q &A
2
About
ControlCase
About the
Risks
About the
Services
Open Forum
ControlCase. All Rights Reserved.
ControlCase
Snapshot
ControlCase. All Rights Reserved.
4
ControlCase Overview
Best-in-Class
Compliance
Platform
 ControlCase is revolutionizing the way enterprises and
organizations deal with the numerous and frequently
changing IT compliance and regulatory requirements
 Proprietary software, including appliance and SaaS
solutions, that enable CaaS (GRC and Data Discovery)
 Compelling proprietary offering combining
proprietary software, certification/audits, and
managed services on a single platform.
 One AuditTM enables our clientele to Assess once:
Comply to Many
 Leadership positions in the PCI DSS, SOC 2, ISO
27001, HIPAA, HITRUST, FedRAMP and CMMC
domains
 Serving over 1,000 customers
 Global footprint with offices in the U.S., LATAM, Europe, India, Canada, and UAE
 Leverages an offshore delivery infrastructure for competitive advantage
 IT compliance manager for multiple industry segments including banking, service providers,
retail, hospitality, and telecom
Provider of Compliance as a Service (CaaS) subscription-based offering bundling proprietary GRC
software and managed services
Global Vision &
Solutions Enhancement
Founded in
2004
Headquartered
in
Fairfax,
VA
Offices in
U.S.,
Canada,
India
250+
Employees
ControlCase. All Rights Reserved.
ControlCase Snapshot
ControlCase. All Rights Reserved. 5
CERTIFICATION AND CONTINUOUS COMPLIANCE SERVICES
Go beyond the auditor’s checklist to: Dramatically reduce the time, cost, and burden of maintaining IT compliance and becoming certified.
Demonstrate
compliance more
efficiently and cost
effectively (cost
certainty)
Offload much of
the compliance
burden to a
trusted
compliance
partner
Improve
efficiencies by
doing more with
less resources
and gain
compliance peace
of mind
1,000+
CLIENTS
10,000+
IT SECURITY
CERTIFICATIONS
275+
SECURITY
EXPERTS
ControlCase Snapshot – Solution
ControlCase. All Rights Reserved. 6
Partnership
Approach
Compliance
HUBTM
+ =
IT Certification
Services
Continuous
Compliance
Services
&
Certification
and Continuous
Compliance
Services
Certification Services
One Audit
Assess Once. Comply to Many.
ControlCase. All Rights Reserved. 7
Host:
HOST
PRESENTER
Chad Leedy Elswick Lai
Manager, Cybersecurity Services
Director, Strategic Accounts
ControlCase. All Rights Reserved.
What Are the Risks in Today’s World
ControlCase. All Rights Reserved. 9
Cybersecurity
Risks
Insider
Threats
Regulatory &
Compliance
Risks
Operational
Impact​
Business
Risks
Unauthorized
Access and
Intrusions
Malicious
Insider Activity
Non-Compliance
Fines and
Penalties
System
Failures
Loss of
Productivity
Data Breaches
and Exfiltration
Policy Violations Audit Failures IT Misconfigurations
Downtime and
Disruptions
(implied from
context)
Malware and
Ransomware
Attacks
Unintentional
Insider Errors
Data Retention
Violations
ControlCase Logging and
Automated Alerting Solution
ControlCase. All Rights Reserved. 10
Proactive Cross Layer
Threat Detection & Real-
Time Monitoring
Centralized Log
Management & Enhanced
Visibility
Automated Alerts & Incident
Response through AI & ML
powered engine
Regulatory Compliance
& Data Integrity
Scalability, Observability &
Cost Efficiency
Improved Operational
Efficiency
© ControlCase. All Rights Reserved. 11
Log Evidence
Collections
ControlCase will collect logs
from all the in-scope assets
File Integrity
Monitoring
Implemented and
collected with Malicious
Hash checks
Log Retention
for 13 months
Stored on cloud and can be
extracted when needed
Dashboard and
Reports
Provide overview and
Insights​
Monthly Assessments
and Asset Review
Disconnected assets and unaddressed
alerts
Automated Realtime
Alerting
Fulfill compliance needs and
monitor security incidents.​
Log Management
and Configuration
All logs will securely be pushed to
the XDR solution via the collector
or over API.
Investigations &
Integrations
On-demand support available
ControlCase offers as Logging
and Automated Alerting
This is how we achieve compliance with
ControlCase LAAS service and with less customer
intervention needed
PCI DSS, HITRUST, SOC2, ISO 27001 HIPPA, GDPR
CERTIFICATIONS ASSESSMENTS
ControlCase. All Rights Reserved.
ControlCase. All Rights Reserved. 12
CC Que No. PCI DSS 4.0
ISO
27001:2022
HIPAA SOC2
68
10.2.1 , 10.2.1.1, 10.2.1.2,
10.2.1.3, 10.2.1.4, 10.2.1.5,
10.2.1.6, 10.2.1.7
8.15, 8.16
164.308(a)(1)(ii)(D)
164.308(a)(5)(ii)(C)
164.312(b)
69
10.6.1, 10.6.2, 10.6.3.a,
10.6.3.b
8.17 164.312(b)
70 10.3.1, 10.3.2, 10.3.3, 10.3.4 5.33 164.312(b)
71
10.4.1.a, 10.4.1.b, 10.4.1.1,
12.5.1.a, 12.5.1.b, 12.5.1.c
8.15, 7.4, 8.16 164.312(b)
80
11.5.1.a, 11.5.1.b, 11.5.1.c,
12.10.3
8.21 164.308(a)(6) CC6.6, CC7.2
81 10.3.4 164.308(a)(6) CC7.2
234
10.7.1.a, 10.7.1.b, 10.7.2.a,
10.7.2.b, 10.7.3.a, 10.7.3.b
• Out of 100 questions 7 question
covered for PCI DSS.
• PCI Requirement 10 covered
with few requirement of 11 and
12. For ISO 27001, covers
control 5 and 8
• No customer intervention or
resource allocation needed for
evidences.
• Evidence for respective
questions are collected and
automatically by ControlCase on
behalf of customer
Compliance HubTM Portal Questions Coverage in LAAS
ControlCase Architecture for implementation
ControlCase. All Rights Reserved. 13
All
communications
TLS
Network Devices
Servers and Endpoints
Applications and Databases
Existing Solutions,
alerts and Events
Remote Endpoints
API
Webhook
Token
Lambda
EventHub's
Log router
Collector
SSL
SSL
Security
Team
Agent
SAAS Applications
3rd Party Agents
Analytics
Platform
Additional Features and Integrations available
ControlCase. All Rights Reserved. 14
Many more feature and Integrations are available with our solution and can be used.
XDR
Threat Intel
Threat Hunting
Network Sensor
Decoy Systems
Storage Geo Locations
ControlCase. All Rights Reserved. 15
CALIFORNIA
INDIA
SINGAPORE
CHILE
CANADA
US
EUROPE
JAPAN
AUS
Benefits of ControlCase LAAS over other solutions
ControlCase. All Rights Reserved. 16
Dedicated support
from skilled
professionals
On Request
assistance in
Investigation
Assistance During
integration
Custom collection
based on
technology
Multiple logging
methodology
Fulfill compliance
needs and data
provisioning.
Monthly review of
your environment
No log drop
Value Proposition to Customer
for LAAS
Cost
efficiency
Boost
Productivity
Faster
Incident
Response
Real
World
Results
Global
Connection
No need to hire
in-house experts
Get enterprise
grade tools and
support
Let your IT team
focus of strategic
projects
We will handle
freeing up your
team for high
value tasks
With automated
analysis we
reduce MTTD
and MTTR
We have helped
companies
reduce downtime
by 30%
Increased
performance
by 25%
Log Analysis and
correlations are
always done and
compared against
most updated
signatures.
Extending the POWER of the Agent.
ControlCase. All Rights Reserved. 18
WHICH CAN DO
SCANNING
CAN ALSO DO
LOGGING
Extending the POWER of the Agent.
19
Vulnerability Scan
Authenticated Result
Anywhere Scan data
Policy Checks
Realtime Data Detailed Inventory
Faster Remediation
6 hours Automation
ControlCase. All Rights Reserved.
Extending the POWER with the Security Console
20
Network Devices
Servers and Endpoints
Collector
SSL
Agent
SECURITY
CONSOLE
Security
Team
Vulnerability
Assessment
ControlCase. All Rights Reserved.
Analytics and
Vulnerability
Management ​
Platform ​
Value Proposition to Customer
21
Continuous and
Comprehensive Visibility of
Vulnerable data
Prioritized Risk-Based
Remediation
Automated Workflows
and Integrations
Enhanced Security
Posture
ControlCase. All Rights Reserved.
Together,
We Deliver
22
ControlCase. All Rights Reserved.
End-to-End Visibility:
From Collection to
Exposure to Exploitation
Accelerated
Response:
Link vulnerabilities to
active threats from
logs for smarter and
faster action
Normalized Data:
Unified views for
security, risk, and
compliance posture
ControlCase. All Rights Reserved.
Q&A – Open Forum
Thank
You

Logging and Automated Alerting Webinar.pdf

  • 1.
    ALERTING LOGGING AND AUTOMATED YOURIT COMPLIANCE PARTNER GO BEYOND THE CHECKLIST Webinar
  • 2.
    Agenda 1 2 3 4 5 6 7 About ControlCase Risk Summary WhyYou Need Logging and Alerting Overview of the Services Architecture Features Q &A 2 About ControlCase About the Risks About the Services Open Forum ControlCase. All Rights Reserved.
  • 3.
  • 4.
    4 ControlCase Overview Best-in-Class Compliance Platform  ControlCaseis revolutionizing the way enterprises and organizations deal with the numerous and frequently changing IT compliance and regulatory requirements  Proprietary software, including appliance and SaaS solutions, that enable CaaS (GRC and Data Discovery)  Compelling proprietary offering combining proprietary software, certification/audits, and managed services on a single platform.  One AuditTM enables our clientele to Assess once: Comply to Many  Leadership positions in the PCI DSS, SOC 2, ISO 27001, HIPAA, HITRUST, FedRAMP and CMMC domains  Serving over 1,000 customers  Global footprint with offices in the U.S., LATAM, Europe, India, Canada, and UAE  Leverages an offshore delivery infrastructure for competitive advantage  IT compliance manager for multiple industry segments including banking, service providers, retail, hospitality, and telecom Provider of Compliance as a Service (CaaS) subscription-based offering bundling proprietary GRC software and managed services Global Vision & Solutions Enhancement Founded in 2004 Headquartered in Fairfax, VA Offices in U.S., Canada, India 250+ Employees ControlCase. All Rights Reserved.
  • 5.
    ControlCase Snapshot ControlCase. AllRights Reserved. 5 CERTIFICATION AND CONTINUOUS COMPLIANCE SERVICES Go beyond the auditor’s checklist to: Dramatically reduce the time, cost, and burden of maintaining IT compliance and becoming certified. Demonstrate compliance more efficiently and cost effectively (cost certainty) Offload much of the compliance burden to a trusted compliance partner Improve efficiencies by doing more with less resources and gain compliance peace of mind 1,000+ CLIENTS 10,000+ IT SECURITY CERTIFICATIONS 275+ SECURITY EXPERTS
  • 6.
    ControlCase Snapshot –Solution ControlCase. All Rights Reserved. 6 Partnership Approach Compliance HUBTM + = IT Certification Services Continuous Compliance Services & Certification and Continuous Compliance Services
  • 7.
    Certification Services One Audit AssessOnce. Comply to Many. ControlCase. All Rights Reserved. 7
  • 8.
    Host: HOST PRESENTER Chad Leedy ElswickLai Manager, Cybersecurity Services Director, Strategic Accounts ControlCase. All Rights Reserved.
  • 9.
    What Are theRisks in Today’s World ControlCase. All Rights Reserved. 9 Cybersecurity Risks Insider Threats Regulatory & Compliance Risks Operational Impact​ Business Risks Unauthorized Access and Intrusions Malicious Insider Activity Non-Compliance Fines and Penalties System Failures Loss of Productivity Data Breaches and Exfiltration Policy Violations Audit Failures IT Misconfigurations Downtime and Disruptions (implied from context) Malware and Ransomware Attacks Unintentional Insider Errors Data Retention Violations
  • 10.
    ControlCase Logging and AutomatedAlerting Solution ControlCase. All Rights Reserved. 10 Proactive Cross Layer Threat Detection & Real- Time Monitoring Centralized Log Management & Enhanced Visibility Automated Alerts & Incident Response through AI & ML powered engine Regulatory Compliance & Data Integrity Scalability, Observability & Cost Efficiency Improved Operational Efficiency
  • 11.
    © ControlCase. AllRights Reserved. 11 Log Evidence Collections ControlCase will collect logs from all the in-scope assets File Integrity Monitoring Implemented and collected with Malicious Hash checks Log Retention for 13 months Stored on cloud and can be extracted when needed Dashboard and Reports Provide overview and Insights​ Monthly Assessments and Asset Review Disconnected assets and unaddressed alerts Automated Realtime Alerting Fulfill compliance needs and monitor security incidents.​ Log Management and Configuration All logs will securely be pushed to the XDR solution via the collector or over API. Investigations & Integrations On-demand support available ControlCase offers as Logging and Automated Alerting This is how we achieve compliance with ControlCase LAAS service and with less customer intervention needed PCI DSS, HITRUST, SOC2, ISO 27001 HIPPA, GDPR CERTIFICATIONS ASSESSMENTS ControlCase. All Rights Reserved.
  • 12.
    ControlCase. All RightsReserved. 12 CC Que No. PCI DSS 4.0 ISO 27001:2022 HIPAA SOC2 68 10.2.1 , 10.2.1.1, 10.2.1.2, 10.2.1.3, 10.2.1.4, 10.2.1.5, 10.2.1.6, 10.2.1.7 8.15, 8.16 164.308(a)(1)(ii)(D) 164.308(a)(5)(ii)(C) 164.312(b) 69 10.6.1, 10.6.2, 10.6.3.a, 10.6.3.b 8.17 164.312(b) 70 10.3.1, 10.3.2, 10.3.3, 10.3.4 5.33 164.312(b) 71 10.4.1.a, 10.4.1.b, 10.4.1.1, 12.5.1.a, 12.5.1.b, 12.5.1.c 8.15, 7.4, 8.16 164.312(b) 80 11.5.1.a, 11.5.1.b, 11.5.1.c, 12.10.3 8.21 164.308(a)(6) CC6.6, CC7.2 81 10.3.4 164.308(a)(6) CC7.2 234 10.7.1.a, 10.7.1.b, 10.7.2.a, 10.7.2.b, 10.7.3.a, 10.7.3.b • Out of 100 questions 7 question covered for PCI DSS. • PCI Requirement 10 covered with few requirement of 11 and 12. For ISO 27001, covers control 5 and 8 • No customer intervention or resource allocation needed for evidences. • Evidence for respective questions are collected and automatically by ControlCase on behalf of customer Compliance HubTM Portal Questions Coverage in LAAS
  • 13.
    ControlCase Architecture forimplementation ControlCase. All Rights Reserved. 13 All communications TLS Network Devices Servers and Endpoints Applications and Databases Existing Solutions, alerts and Events Remote Endpoints API Webhook Token Lambda EventHub's Log router Collector SSL SSL Security Team Agent SAAS Applications 3rd Party Agents Analytics Platform
  • 14.
    Additional Features andIntegrations available ControlCase. All Rights Reserved. 14 Many more feature and Integrations are available with our solution and can be used. XDR Threat Intel Threat Hunting Network Sensor Decoy Systems
  • 15.
    Storage Geo Locations ControlCase.All Rights Reserved. 15 CALIFORNIA INDIA SINGAPORE CHILE CANADA US EUROPE JAPAN AUS
  • 16.
    Benefits of ControlCaseLAAS over other solutions ControlCase. All Rights Reserved. 16 Dedicated support from skilled professionals On Request assistance in Investigation Assistance During integration Custom collection based on technology Multiple logging methodology Fulfill compliance needs and data provisioning. Monthly review of your environment No log drop
  • 17.
    Value Proposition toCustomer for LAAS Cost efficiency Boost Productivity Faster Incident Response Real World Results Global Connection No need to hire in-house experts Get enterprise grade tools and support Let your IT team focus of strategic projects We will handle freeing up your team for high value tasks With automated analysis we reduce MTTD and MTTR We have helped companies reduce downtime by 30% Increased performance by 25% Log Analysis and correlations are always done and compared against most updated signatures.
  • 18.
    Extending the POWERof the Agent. ControlCase. All Rights Reserved. 18 WHICH CAN DO SCANNING CAN ALSO DO LOGGING
  • 19.
    Extending the POWERof the Agent. 19 Vulnerability Scan Authenticated Result Anywhere Scan data Policy Checks Realtime Data Detailed Inventory Faster Remediation 6 hours Automation ControlCase. All Rights Reserved.
  • 20.
    Extending the POWERwith the Security Console 20 Network Devices Servers and Endpoints Collector SSL Agent SECURITY CONSOLE Security Team Vulnerability Assessment ControlCase. All Rights Reserved. Analytics and Vulnerability Management ​ Platform ​
  • 21.
    Value Proposition toCustomer 21 Continuous and Comprehensive Visibility of Vulnerable data Prioritized Risk-Based Remediation Automated Workflows and Integrations Enhanced Security Posture ControlCase. All Rights Reserved.
  • 22.
    Together, We Deliver 22 ControlCase. AllRights Reserved. End-to-End Visibility: From Collection to Exposure to Exploitation Accelerated Response: Link vulnerabilities to active threats from logs for smarter and faster action Normalized Data: Unified views for security, risk, and compliance posture
  • 23.
    ControlCase. All RightsReserved. Q&A – Open Forum
  • 24.