Kaizen Event - Incident Response - Device Compromise (previously Malware)

1y ago
5 Views
1 Downloads
546.42 KB
10 Pages
Last View : 25d ago
Last Download : 3m ago
Upload by : Julia Hutchens
Transcription

Kaizen Event - Incident Response - Device Compromise (previously Malware) A Kaizen Event to review the Incident Response - Malware process was held on October 30-31 2014. This event focused on reviewing the current response to malware incidents and developing a more efficient conceptual process. Kaizen Attendees: Kaizen Attendees: Ryan Matteson IS - Office of the CIO Kevin Ettl ITS - Network Administration Chris Call ITS - Enterprise Systems Thomas Sibbach ITS - Operations Doug Scheel ITS - Operations Tom Sciortino ITS - Personal Technologies Richard Walls ITS - Enterprise Systems Mary Shaffer IS - Office of the CIO Tom Cubanski ITS - Application Development and Integration Rick Salomon Health Center - Technical Support Mark Smith Library - Technical Support Theresa May ITS - Continuous Improvement and Analysis (facilitator) E-Mail Distribution List: its-incident-response@calpoly.edu The its-incident-response@calpoly.edu e-mail distribution list should be used for communication regarding this project. All project status updates and information regarding this project should be sent to this list. The membership includes all who attended the Kaizen Event along with other ITS managers and staff invovled with the project. Kaizen Agenda:

Project Charter: The team created a Project Charter that outlined the process to be reviewed, start and end points, customers, partners, and constraints. There was discussion regarding the name of the process as it is managing more than malware. After a short discussion the group opted to wait until the new process was designed to determine the name of the new process. The group also discussed the constraint of responding the malware incidents within 30 minutes. Due to the seriousness of the potential damage that can be caused through malware, there was discussion on whether 30 minutes was adequate. Current State Process Map: The team developed a current state map. Through this process the team reviewed how malware incidents were categorized into three different groups based on the type of network the device was on. The groups were wireless, wired, and ResNet networks. Process steps: The team identified 52 total steps in the process broken out into four categories. Basic Process - 14 steps ResNet Process - 12 steps Wired Process - 8 steps Wireless Process - 14 steps 4 additional steps if onboarded

The team also discussed how SRS tickets were entered and updated throughout the process. While the group identified 10 steps throughout the process for creating, updating, and closing SRS tickets regarding the incident, they think that the management of SRS is actually happening more often than documented through the process map. They felt that they left steps out and that managing SRS tracking of an incident is more time consuming than reflected. Process Factors and Categories: Ryan led a discussion to help the team look at the process through a different lens. The group discussed the factors involved with devices on the network. What things do we need to worry about? The group worked through categorizing the types of devices to help form the groundwork for developing a new conceptual process to manage compromised devices on the network.

Future State Process Map: The group moved forward with developing a future state process map for the first category identified: Single User Device. This was chosen as it seemed the most straight forward. Baseline assumptions were documented:

Multi-User device types were identified: The initial goal was to overlay the category of multi-user device on top of the single-user device process. As the group started to work through adding in the next set of steps, it became apparent that it might be too difficult to combine the single-user and multi-user categories into one process. So the team proceeded with developing a multi-user process.

The group then proceeded to create a single process that included the management of single-user and multi-user devices. This was a difficult task and as the group worked through the issues it was determined that the process needed to branch into two paths to handle each type of device. There was also discussion on device risk and whether the device and/or user had recurring issues. At the end of drafting the new process, the group had a discussion on what to call the process. The group decided that 'Compromised Device Response' was an appropriate name for the new process.

With the new future state process outlined, the group discussed the need to review each process step and understand all of the activity that would occur in each step. As the process can look fairly simple, there is complexity built into each step that needs to be defined. The group reviewed the 'notify' step and outlined the activity that would need to happen within that step as follows:

A Parking Lot sheet was created to log items that were important but determined to be out-of-scope for this project. Next steps were identified:

At the end of the Kaizen, the team held a 'Report Out' session for ITS Directors and guests. Report Out Attendees: Report Out Attendees: Johanna Madjedi ITS-AVP Shawn Mehan ITS-Applications and Information Systems Paul Jurasin ITS-Enterprise Systems Sharon Anderson ITS-Administrative Computing Sharif Sharifi IS-Information Security Officer Dale Kholer Library Melinda Rojo ITS-Information Systems Darren Kraker ITS-Application Development and Integration Team members described the Kaizen Event and how they worked through developing a future state process.

Kaizen Event - Incident Response - Device Compromise (previously Malware) A Kaizen Event to review the Incident Response - Malware process was held on October 30-31 2014. This event focused on reviewing the current response to malware incidents and developing a more efficient conceptual process. Kaizen Attendees: Kaizen Attendees:

Related Documents:

2017 Shingijutsu Kaizen Training Kaizen Principles can be applied in all areas! Quality Kaizen Safety Kaizen Flow Kaizen Business Process Kaizen X. The program begins with a lecture by Mr. Chihiro Nakao, FOM (Father of Moonshine), Shingijutsu, on the basic concept of Kaizen. The participants learn about the Just-In-Time

pejoratives like Kaizen in a box, kamikaze Kaizen, Kaizen paint by numbers, popcorn Kaizen. And it's true that Kaizen events many times have been misapplied by people who miss the big picture from a lean perspective or even continuous recruitment. So what I wanted to do was bring people back to the context that Kaizen event should be within,

Agenda . 2 . Observation: This Document contains 5 Messages from Mars . Kaizen Event 4 Phase Structure 28 . Planning the Kaizen Event 29 . 30 Kaizen Conducting the Event . How to Conduct a Kaizen Event . 31 Kaizen and 8 Wastes (Muda) How to Know When Cost is NOT adding Value, DOWNTIME . 32

POINT Kaizen MINI Kaizen Kaizen BLITZ FLOW Kaizen SUPPLY CHAIN Kaizen IDEA RADIATOR “Kaizen Kanban” or “improvement project board” A “Kaizen Kanban” or “improvement board” is a visual prioritize project pipeline

JICA and MOTI agreed the study on Kaizen KU (Kaizen Unit) formed under MOTI Kaizen Project launched In 2010 Lessons from African countries that implemented Kaizen Training and Seminars were conducted Kaizen implementation commenced in 1 st batch companies Kaizen high level forum carried out Performance evaluation of implementers’carried out.

The recipient of the 1st place Global KAIZEN Award 3rd Edition will be awarded with two vouchers to participate in any KAIZEN learning program, KAIZEN Insight Tour or KAIZEN Benchmark Tour3. Learn more To find out more about the KAIZEN Awards visit https://awards.kaizen.com or contact your local business partner.

The research model was developed from Kaizen event practitioner resources, Kaizen event literature, and related process improvement sustainability and organizational change literature. The model hypothesized that Kaizen Event Characteristics, Work Area Characteristics, and Post-Event Characteristics were related to Kaizen event

The Certificate in Russian Language is six- month programme of 16 Credits. The programme aims at providing beginners with basics of Russian Language. The objective of the programme is to introduce learners to the basics of Russian grammar and phonetics so that they can read, write, listen and speak Russian in an accurate manner. The programme is bilingual (Russian/English) in medium and has .