Case Study: Financial Credit Union
|
|
|
- Bennett Page
- 10 years ago
- Views:
Transcription
1 Case Study: Financial Credit Union
2 Financial Credit Union Credit Union gains Compliance and Protection in One Solution This credit union is one of the largest in Australia and, for this case study, prefers not to be named. Key members of its information security team, however, are willing to discuss its Huntsman deployment one-to-one with genuinely interested parties. For this case study, we ll call it Star Credit Union (Star). Star is one of Australia s largest customer-owned financial institutions, and provides everyday banking products and services in a highly people- and service-oriented environment. Star has won many awards for its outstanding customer service and financial loan products. As a financial institution, Star has to demonstrate compliance with the PCI-DSS standard, which was the fundamental driver behind the need to acquire a new security solution. A related goal was compliance with the guidelines in the ISO standard and APRA s Prudential Practice Guide for managing security risk in information and information technology (PPG234) which is similar to COBIT (USA) and ITIL (UK). FOCUS ON THE VITAL, RISKY FEW With membership nearing half a million, the number of security events across Star s network - from branches and ATMs to internet and mobile banking was becoming very difficult for the security team to manage. Star needed a security solution that could automatically triage events, so the security team could focus on the vital few that posed potential threat, and not be swamped by the trivial many. We needed a solution that could correlate all these alerts, Star s CSO explains, from across all our channels and other security solutions like firewalls, intrusion detection systems and so on. We needed a solution that could correlate all these alerts from across all our channels and other security solutions like firewalls, intrusion detection systems and so on Tier-3 Pty Ltd, All rights reserved
3 Other capabilities that the new system had to demonstrate included ability to: Monitor alerts from across the network in real time; Interpret the information collected in the event logs for risks and threats; Fully comply with PCI-DSS; and Align IT security practices with APRA PPG234 and ISO guidelines. FLEXIBLE, KNOWLEDGEABLE & GOOD VALUE The above are issues that typically can be addressed by Security and Event Management (SIEM) systems, and Star investigated several of them. We chose Huntsman Enterprise SIEM because it matched the best SIEM systems for functionality, says Star s CSO, but it was a lot more flexible than the others. Huntsman also offered exceptional value, which was an important consideration for us. Being a credit union, we re owned by members and it s their money. Another key factor in Star s decision was familiarity with APRA s PPG234, its guidelines and how to map to them. Being an Australian company with a variety of financial institutions as customers, Huntsman Security s people were well-versed in PPG234 compared to overseas competitors, who either didn t have the flexibility or the desire to adapt to local guides like PPG234. We saw PPG234 as a good way to ensure optimal implementation of a SIEM system, Star s CSP explains, so familiarity with it was a bonus. Working with Huntsman Security had other advantages for Star too. Huntsman Security was established and is headquartered in Sydney and, according to the CSO for Star, that meant: The company s pioneering and adaptive approach to its customers was very accessible to us if we needed assistance at the start or wanted to discuss technical issues. It also meant we had direct access if we wanted to suggest new features we d like in Huntsman down the track. We chose Tier-3 Huntsman SIEM because it matches the best SIEM systems for functionality, but it was a lot more flexible than the others. Huntsman also offered exceptional value, which was an important consideration for us. Being a credit union, we re owned by members and it s their money Tier-3 Pty Ltd, All rights reserved
4 EASY UPGRADE & FAST ALERTING The initial deployment focused on compliance with financial industry standards, basic network security, and collection of event logs for forensic analysis and audit. At the time, the operational team was the main user, managing Huntsman through the central LiveView console, assisted by sets of standard queries that allowed fast on-screen retrieval of operational information from across the network. Once Huntsman had proved itself in operational terms, its use was extended to the teams that managed Star s network, servers and applications. That meant that all teams in the IT group were using Huntsman for alerting, querying and reporting on security events, which substantially increased demand for centralised data storage and access. This is where Huntsman s flexibility to scale proved invaluable: Star simply upgraded to a bigger configuration and increased the forensic database with zero downtime. Huntsman s unique behavioural capability has proven itself too. Using its patented Behaviour Anomaly Detection, Huntsman alerted IT security staff about unusual, suspicious activity detected on an executive s laptop while it was connected to the Star network. As it turned out, the laptop had been compromised and was acting as a router to exfiltrate data. This unusual activity was detected, triaged as risky, and alerted early to the IT team. As a result, the risk was mitigated before any significant data had been compromised. At Star, Huntsman has proven its capability and value many times across all areas of compliance, network security and IT operations Tier-3 Pty Ltd, All rights reserved
5 Huntsman Tier-3 Pty Ltd Asia Pacific EMEA North Asia Americas t: t: t: toll free: e: [email protected] e: [email protected] e: [email protected] e: [email protected] Level 2, 11 Help Street 100 Pall Mall, St James TUC Bldg. 7F, Iwamoto-cho, Suite 400, 71 Stevenson Street Chatswood NSW 2067 London SW1Y 5NQ Chiyoda-ku, Tokyo San Francisco California huntsmansecurity.com linkedin.com/company/tier-3-pty-ltd twitter.com/tier3huntsman All rights reserved. Huntsman is a registered Trademark of Tier-3 Pty Ltd
Compliance Guide: PCI DSS
Compliance Guide: PCI DSS PCI DSS Compliance Compliance mapping using Huntsman INTRODUCTION The Payment Card Industry Data Security Standard (PCI DSS) was developed with industry support by the PCI Security
Compliance Guide: ASD ISM OVERVIEW
Compliance Guide: ASD ISM OVERVIEW Australian Information Security Manual Mapping to the Principles using Huntsman INTRODUCTION In June 2010, The Australian Government Protective Security Policy Framework
Compliance Overview: FISMA / NIST SP800 53
Compliance Overview: FISMA / NIST SP800 53 FISMA / NIST SP800 53: Compliance Overview With Huntsman SIEM The US Federal Information Security Management Act (FISMA) is now a key element of the US Government
Cyber Risk Reduction: Why Automated Threat Verification is key
Cyber Risk Reduction: Why Automated Threat Verification is key Automated threat verification: The new stage between detection and resolution Alarmingly, recent findings indicate that organisations are
QRadar SIEM 6.3 Datasheet
QRadar SIEM 6.3 Datasheet Overview Q1 Labs flagship solution QRadar SIEM is unrivaled in its ability to provide an organization centralized IT security command and control. The unique capabilities of QRadar
How To Improve Your Security System Of Knowledge (Siem)
The State of SIEM in The State of SIEM in WHY ONLY THE SMARTEST WILL OUTWIT TODAY S ATTACKERS Security Information Event Management systems (SIEMs) have become an important part of information assurance
Scalability in Log Management
Whitepaper Scalability in Log Management Research 010-021609-02 ArcSight, Inc. 5 Results Way, Cupertino, CA 95014, USA www.arcsight.com [email protected] Corporate Headquarters: 1-888-415-ARST EMEA Headquarters:
End-user Security Analytics Strengthens Protection with ArcSight
Case Study for XY Bank End-user Security Analytics Strengthens Protection with ArcSight INTRODUCTION Detect and respond to advanced persistent threats (APT) in real-time with Nexthink End-user Security
How To Buy Nitro Security
McAfee Acquires NitroSecurity McAfee announced that it has closed the acquisition of privately owned NitroSecurity. 1. Who is NitroSecurity? What do they do? NitroSecurity develops high-performance security
Log Management: 5 Steps to Success
Log Management: 5 Steps to Success LogLogic, Inc Worldwide Headquarters 110 Rose Orchard Way, Ste. 200 San Jose, CA 95134 United States US Toll Free: 888 347 3883 Tel: +1 408 215 5900 Fax: +1 408 321 8717
The Sophos Security Heartbeat:
The Sophos Security Heartbeat: Enabling Synchronized Security Today organizations deploy multiple layers of security to provide what they perceive as best protection ; a defense-in-depth approach that
Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense
A Trend Micro Whitepaper I February 2016 Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense How Trend Micro Deep Security Can Help: A Mapping to the SANS Top 20 Critical
LogInspect 5 Product Features Robust. Dynamic. Unparalleled.
LogInspect 5 Product Features Robust. Dynamic. Unparalleled. Enjoy ultra fast search capabilities in simple and complex modes optimized for Big Data Easily filter and display relevant topics, eg: Top 10
Tripwire Log Center NEXT GENERATION LOG AND EVENT MANAGEMENT WHITE PAPER
Tripwire Log Center NEXT GENERATION LOG AND EVENT MANAGEMENT WHITE PAPER Introduction A decade or more ago, logs of events recorded by firewalls, intrusion detection systems and other network devices were
LogPoint 5.1 Product Features Robust. Dynamic. Unparalleled.
LogPoint 5.1 Product Features Robust. Dynamic. Unparalleled. LOGPOINT Enjoy ultra fast search capabilities in simple and complex modes optimized for Big Data Easily filter and display relevant topics,
Monitoring Windows Workstations Seven Important Events
Monitoring Windows Workstations Seven Important Events White Paper 8815 Centre Park Drive Publication Date: October 1, 2009 Columbia MD 21045 877.333.1433 ABSTRACT Monitoring event logs from workstations
Eoin Thornton Senior Security Architect Zinopy Security Ltd.
RSA envision: Transform your Security Operations A Technical overview & demo of RSA envision The Information Log Management Platform for Security and Compliance Success Eoin Thornton Senior Security Architect
Is your SIEM ready.???
New security threats: Is your SIEM ready.??? May 2011 Security is more than just compliance Compliance Measure of processes and procedures Conformity with policy and directive Reporting against rules Security
NitroView. Content Aware SIEM TM. Unified Security and Compliance Unmatched Speed and Scale. Application Data Monitoring. Database Monitoring
NitroView Unified Security and Compliance Unmatched Speed and Scale Application Data Monitoring Database Monitoring Log Management Content Aware SIEM TM IPS Today s security challenges demand a new approach
NetIQ FISMA Compliance & Risk Management Solutions
N E T I Q C O M P L I A N C E S E R I E S NetIQ FISMA Compliance & Risk Management Solutions The Federal Information Security Management Act (FISMA) requires federal agencies to create and implement a
Managed Services. From Brennan IT
Managed Services From Brennan IT Managed Services From Brennan IT Let us simplify the management of your IT and help deliver technology solutions that work exactly the way you want. 01 Key Benefits 02
Monitoring Microsoft SQL Server Audit Logs with EventTracker The Importance of Consolidation, Correlation, and Detection Enterprise Security Series
Monitoring Microsoft SQL Server Audit Logs with EventTracker The Importance of Consolidation, Correlation, and Detection Enterprise Security Series White Paper Publication Date: Feb 28, 2014 EventTracker
Caretower s SIEM Managed Security Services
Caretower s SIEM Managed Security Services Enterprise Security Manager MSS -TRUE 24/7 Service I.T. Security Specialists Caretower s SIEM Managed Security Services 1 Challenges & Solution Challenges During
IBM QRadar as a Service
Government Efficiency through Innovative Reform IBM QRadar as a Service Service Definition Copyright IBM Corporation 2014 Table of Contents IBM Cloud Overview... 2 IBM/Sentinel PaaS... 2 QRadar... 2 Major
The Snare Agents Commercial or Open Source? - White Paper -
The Snare Agents Commercial or Open Source? - White Paper - A Prophecy International Company Introduction to Agents The SNARE agent is the industry standard for logging security events and is used with
Top 10 reasons to move to the cloud
Checklist: Top 10 reasons to move to the cloud WHITE PAPER Checklist: Top 10 reasons to move to the cloud There are many reasons to move to the cloud, including rapid deployment, reduced support, improved
Using Snare Agents for File Integrity Monitoring (FIM)
Using Snare Agents for File Integrity Monitoring (FIM) Intersect Alliance International Pty Ltd. All rights reserved worldwide. Intersect Alliance Pty Ltd shall not be liable for errors contained herein
Lumension Guide to Patch Management Best Practices
Lumension Guide to Patch Management Best Practices With the sophistication and sheer volume of exploits targeting major applications and operating systems, the speed of assessment and deployment of security
DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND LOG MANAGER
DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND Introduction > New security threats are emerging all the time, from new forms of malware and web application exploits that target
How To Implement Data Loss Prevention
Data Loss Prevention Implementation Initiatives THE HITACHI WAY White Paper By HitachiSoft America Security Solutions Group September, 2009 HITACHI SOFTWARE ENGINEERING AMERICA, LTD. Executive Summary
IBM Security QRadar Risk Manager
IBM Security QRadar Risk Manager Proactively manage vulnerabilities and network device configuration to reduce risk, improve compliance Highlights Visualize current and potential network traffic patterns
Tripwire Log Center NEXT GENERATION LOG AND EVENT MANAGEMENT WHITE PAPER
Tripwire Log Center NEXT GENERATION LOG AND EVENT MANAGEMENT WHITE PAPER Introduction A decade or more ago, logs of events recorded by firewalls, intrusion detection systems and other network devices were
SCADA SYSTEMS AND SECURITY WHITEPAPER
SCADA SYSTEMS AND SECURITY WHITEPAPER Abstract: This paper discusses some of the options available to companies concerned with the threat of cyber attack on their critical infrastructure, who as part of
What should you expect a privileged access management solution to do?
What should you expect a privileged access management solution to do? BY CHRIS PACE Head of Product Marketing WALLIX I 2016 What should you expect a privileged access management solution to do? Traditionally
How To Manage Log Management
: Leveraging the Best in Database Security, Security Event Management and Change Management to Achieve Transparency LogLogic, Inc 110 Rose Orchard Way, Ste. 200 San Jose, CA 95134 United States US Toll
Assuria can help protectively monitor firewalls for PCI compliance. Assuria can also check the configurations of personal firewalls on host devices
The Payment Card Industry (PCI) Data Security Standard (DSS) provides an actionable framework for developing a robust payment card data security process. The Payment Application Data Security Standard
Injazat s Managed Services Portfolio
Injazat s Managed Services Portfolio Overview Premium Managed Services to Transform Your IT Environment Injazat s Premier Tier IV Data Center is built to offer the highest level of security and reliability.
Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM) How Does Your Business Benefit? intigrow White Paper By Wes Lambert Security Consultant [email protected] intigrow is a global enterprise security
IBM Security QRadar Risk Manager
IBM Security QRadar Risk Manager Proactively manage vulnerabilities and network device configuration to reduce risk, improve compliance Highlights Collect network security device configuration data to
IT Security. Securing Your Business Investments
Securing Your Business Investments IT Security NCS GROUP OFFICES Australia Bahrain China Hong Kong SAR India Korea Malaysia Philippines Singapore Sri Lanka Securing Your Business Investments! Information
Business Case Outsourcing Information Security: The Benefits of a Managed Security Service
Business Case Outsourcing Information Security: The Benefits of a Managed Security Service seccuris.com (866) 644-8442 Contents Introduction... 3 Full- Time Experts vs. a Part- Time In- House Staff...
Assuria from ZeroDayLab
Passionate about Total Security Management Assuria from ZeroDayLab Forensic Log Management SIM/SIEM2 As one of Europe s leading IT Security Consulting companies, ZeroDayLab has been carrying out Security
TOP 10 WAYS TO ADDRESS PCI DSS COMPLIANCE. ebook Series
TOP 10 WAYS TO ADDRESS PCI DSS COMPLIANCE ebook Series 2 Headlines have been written, fines have been issued and companies around the world have been challenged to find the resources, time and capital
Defending the Database Techniques and best practices
ISACA Houston: Grounding Security & Compliance Where The Data Lives Mark R. Trinidad Product Manager [email protected] March 19, 2009 Agenda Understanding the Risk Changing threat landscape The target
SYSPRO Integration SYSPRO Integration Framework
SYSPRO Integration SYSPRO Integration Framework Framework Introducing SYSPRO SYSPRO is an internationally-recognized, leading provider of enterprise business solutions. Formed in 1978, SYSPRO was one of
Endpoint Security for DeltaV Systems
DeltaV Systems Service Data Sheet Endpoint Security for DeltaV Systems Essential protection that consolidates endpoint and data security. Reduces the time and effort spent deploying and managing security
SecureVue Product Brochure
SecureVue unifies next-generation SIEM, security configuration auditing, compliance automation and contextual forensic analysis into a single platform, delivering situational awareness, operational efficiency
Best Practices for Building a Security Operations Center
OPERATIONS SECURITY Best Practices for Building a Security Operations Center Diana Kelley and Ron Moritz If one cannot effectively manage the growing volume of security events flooding the enterprise,
On-Premises DDoS Mitigation for the Enterprise
On-Premises DDoS Mitigation for the Enterprise FIRST LINE OF DEFENSE Pocket Guide The Challenge There is no doubt that cyber-attacks are growing in complexity and sophistication. As a result, a need has
Multi-layered Security Solutions for VoIP Protection
Multi-layered Security Solutions for VoIP Protection Copyright 2005 internet Security Systems, Inc. All rights reserved worldwide Multi-layered Security Solutions for VoIP Protection An ISS Whitepaper
Evaluating, choosing and implementing a SIEM solution. Dan Han, Virginia Commonwealth University
Evaluating, choosing and implementing a SIEM solution Dan Han, Virginia Commonwealth University A little about me Worked in IT for about 15 years Worked in Application Development, Desktop Support, Server
Passive Logging. Intrusion Detection System (IDS): Software that automates this process
Passive Logging Intrusion Detection: Monitor events, analyze for signs of incidents Look for violations or imminent violations of security policies accepted use policies standard security practices Intrusion
Protecting Your Organisation from Targeted Cyber Intrusion
Protecting Your Organisation from Targeted Cyber Intrusion How the 35 mitigations against targeted cyber intrusion published by Defence Signals Directorate can be implemented on the Microsoft technology
SANS Top 20 Critical Controls for Effective Cyber Defense
WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a
10 Reasons Your Existing SIEM Isn t Good Enough
Technical Whitepaper 10 Reasons Your Existing SIEM Isn t Good Enough eiqnetworks, Inc. World Headquarters 31 Nagog Park Acton, MA 01720 978.266.9933 www.eiqnetworks.com TABLE OF CONTENTS SECTION PAGE Introduction......................................................
White Paper. Safety by design. Fleet Communications. NEC Australia au.nec.com
Safety by design Fleet Communications NEC Australia au.nec.com Communications and workplace safety The use of communications tools while driving is a well-documented workplace risk for fleet vehicle operators
Organizations Must Employ Effective Data Security Strategies
Research Publication Date: 30 August 2005 ID Number: G00123639 Organizations Must Employ Effective Data Security Strategies Rich Mogull Organizations can best protect data through a hierarchical data security
State of SIEM Challenges, Myths & technology Landscape 4/21/2013 1
State of SIEM Challenges, Myths & technology Landscape 4/21/2013 1 Introduction What s in a name? SIEM? SEM? SIM? Technology Drivers Challenges & Technology Overview Deciding what s right for you Worst
Changes to your Bank of Queensland Credit Card
Changes to your Bank of Queensland Credit Card Contents Page Change of name 3 Interest Repayments 3 Fees and charges 4 Rewards 5 Additional benefits and protections 7 Account features and access 7 Additional
Extreme Networks Security Analytics G2 Risk Manager
DATA SHEET Extreme Networks Security Analytics G2 Risk Manager Proactively manage vulnerabilities and network device configuration to reduce risk, improve compliance HIGHLIGHTS Visualize current and potential
Incident Response. Six Best Practices for Managing Cyber Breaches. Nick Pollard, Senior Director Professional Services EMEA / APAC, Guidance Software
Incident Response Six Best Practices for Managing Cyber Breaches Nick Pollard, Senior Director Professional Services EMEA / APAC, Guidance Software www.encase.com 2014 Guidance Software Inc., All Rights
Netwrix Auditor. Сomplete visibility into who changed what, when and where and who has access to what across the entire IT infrastructure
Netwrix Auditor Сomplete visibility into who changed what, when and where and who has access to what across the entire IT infrastructure netwrix.com netwrix.com/social 01 Product Overview Netwrix Auditor
PCI DSS Best Practices with Snare Enterprise Agents PCI DSS Best Practices with Snare Enterprise Agents
PCI DSS Best Practices with Snare Enterprise InterSect Alliance International Pty Ltd Page 1 of 9 About this document The PCI/DSS documentation provides guidance on a set of baseline security measures
Quantium captures new niche in data analytics market
Quantium captures new niche in data analytics market MapR Distribution for Apache Hadoop and Cisco UCS cut query time by 92 percent, improve accuracy of results With the Cisco-MapR platform, Quantium has
SYSPRO Reporting Services
SYSPRO Reporting Services Desktop to the Boardroom Preview Document Introduction SYSPRO Reporting Services is the next-generation reporting system planned to replace all standard reports within the SYSPRO
IBM Security Operations Center Poland! Wrocław! Daniel Donhefner SOC Manager!
IBM Security Operations Center Poland! Wrocław! Daniel Donhefner SOC Manager! IBM can provide unmatched global coverage and security awareness! 4,300 Strategic outsourcing security delivery resources 1,200
Simplifying Branch Office Security
Simplifying Branch Office Security By Udo Kerst, Director Product Management Network Security It is more important than ever to secure your business. Malware, botnets and other malicious programs threaten
Defending Against Data Beaches: Internal Controls for Cybersecurity
Defending Against Data Beaches: Internal Controls for Cybersecurity Presented by: Michael Walter, Managing Director and Chris Manning, Associate Director Protiviti Atlanta Office Agenda Defining Cybersecurity
Security management solutions White paper. IBM Tivoli and Consul: Facilitating security audit and compliance for heterogeneous environments.
Security management solutions White paper IBM Tivoli and Consul: Facilitating security audit and March 2007 2 Contents 2 Overview 3 Identify today s challenges in security audit and compliance 3 Discover
CAPABILITY STATEMENT
WHO WE ARE UberGlobal Enterprise is the dedicated government and enterprise business division of Australian web service provider, UberGlobal. UberGlobal was founded through the merger of a number of medium
Boosting enterprise security with integrated log management
IBM Software Thought Leadership White Paper May 2013 Boosting enterprise security with integrated log management Reduce security risks and improve compliance across diverse IT environments 2 Boosting enterprise
Endpoint Security - HIPS. egambit, your defensive cyber-weapon system. You have the players. We have the game.
egambit Endpoint Security - egambit, your defensive cyber-weapon system. You have the players. We have the game. TEHTRI-Security 2010-2015 www.tehtri-security.com Endpoint Security In this document, we
WHITE PAPER. Attaining HIPAA Compliance with Retina Vulnerability Assessment Technology
WHITE PAPER Attaining HIPAA Compliance with Retina Vulnerability Assessment Technology Table of Contents Overview 3 HIPAA & Retina Enterprise Edition 3 Six Steps of Vulnerability Assessment & Remediation
Service Definition Document
Service Definition Document QinetiQ Secure Cloud Protective Monitoring Service (AWARE) QinetiQ Secure Cloud Protective Monitoring Service (DETER) Secure Multi-Tenant Protective Monitoring Service (AWARE)
The Education Fellowship Finance Centralisation IT Security Strategy
The Education Fellowship Finance Centralisation IT Security Strategy Introduction This strategy outlines the security systems in place to optimise, manage and protect The Education Fellowship data and
By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015
Community Bank Auditors Group Cybersecurity What you need to do now June 9, 2015 By: Gerald Gagne MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2015 Wolf & Company, P.C. Cybersecurity
DETECT AND RESPOND TO THREATS FROM THE DATA CENTER TO THE CLOUD
SOLUTION OVERVIEW: ALERT LOGIC THREAT MANAGER WITH ACTIVEWATCH DETECT AND RESPOND TO THREATS FROM THE DATA CENTER TO THE CLOUD Protecting your infrastructure requires you to detect threats, identify suspicious
Defining, building, and making use cases work
Defining, building, and making use cases work Paul Brettle Presales Manager, Americas Pacific Region What is a use case? Compliance FISMA, PCI, SOX, etc Network security firewalls, IDS, routers & switches
WHITE PAPER. How to simplify and control the cardholder security environment
WHITE PAPER How to simplify and control the cardholder security environment Document Version V1-0 Document Set: QCC Information Security Prepared By Nick Prescot - QCC Information Security Ltd Sponsored
