Case 2
JP Morgan Chase Bank
Key success stories include:
- Development and implementation of standards, baselines and controls for the implementation of technology
- Development of processes, procedures and governance structures to prevent circumvention of security controls
- Audit of IT security deployments, including the build, configuration, access control and logging
- Development of a cyber security initiative to focus on four key areas: Continued operations, strategic initiatives, additional protection and automation/monitoring
Case Description
JP Morgan Chase Bank provides global retail, investment and credit card services. Our experts worked with JP Morgan Chase for over 5 years developing their cyber security capabilities. The organisation, whilst having an established global security team, was looking to improve its IT security services through a Defence in Depth approach, along with a Security Operations Centre (SOC) and incident management capability.
We reviewed the existing cyber security technologies the organisation employed. With this knowledge, we advised on improvements and assisted with the design, implementation, configuration and system integration of a number of these improved technologies.
We worked on several key security areas including network security, application security, encryption, identity and access management, release management, vulnerability management and security incident response processes.
Final Result
The implementation of an assessment and selection of a Security Information & Event Management (SIEM) tool. Upon implementation, our team helped to configure the various SIEM logs sources and use cases to ensure that the SOC was alerted on relevant security events and could manage those accordingly. Delivery of effective Cyber Security using the following high-level approach:
- Agreeing on security roles and responsibilities for delivery
- Identifying and addressing immediate and urgent compromised systems and security risks
- Establishing appropriate technical governance
- Creating operational security controls and an auditable security schedule
- Identifying and addressing vulnerabilities and threats as part of an ongoing programme
- Establishing dashboards to track Crown Estate maturity against the NCSC 10 steps to Cyber Security
- Ensuring operational reporting against Security KPIs
- Obtaining operational evidence of following our Security processes
More Case Studies
Lloyds Bank and City of London Police
We have established long-term relationships with Lloyds Bank and City of London Police to deve… Learn More
An International Fraud and Corruption Investigation
An investigation was commissioned by the United Kingdom Foreign Office to identify evidence of corr… Learn More
An International UN Investigation
The investigation was formed after the United Nations agreed upon a resolution to investigate a terro… Learn More
