Case 2

JP Morgan Chase Bank

 

Key success stories include:

  • Development and implementation of standards, baselines and controls for the implementation of technology
  • Development of processes, procedures and governance structures to prevent circumvention of security controls
  • Audit of IT security deployments, including the build, configuration, access control and logging
  • Development of a cyber security initiative to focus on four key areas: Continued operations, strategic initiatives, additional protection and automation/monitoring

Case Description

JP Morgan Chase Bank provides global retail, investment and credit card services. Our experts worked with JP Morgan Chase for over 5 years developing their cyber security capabilities. The organisation, whilst having an established global security team, was looking to improve its IT security services through a Defence in Depth approach, along with a Security Operations Centre (SOC) and incident management capability.

We reviewed the existing cyber security technologies the organisation employed. With this knowledge, we advised on improvements and assisted with the design, implementation, configuration and system integration of a number of these improved technologies.

We worked on several key security areas including network security, application security, encryption, identity and access management, release management, vulnerability management and security incident response processes.

Final Result

The implementation of an assessment and selection of a Security Information & Event Management (SIEM) tool. Upon implementation, our team helped to configure the various SIEM logs sources and use cases to ensure that the SOC was alerted on relevant security events and could manage those accordingly. Delivery of effective Cyber Security using the following high-level approach:

  • Agreeing on security roles and responsibilities for delivery
  • Identifying and addressing immediate and urgent compromised systems and security risks
  • Establishing appropriate technical governance
  • Creating operational security controls and an auditable security schedule
  • Identifying and addressing vulnerabilities and threats as part of an ongoing programme
  • Establishing dashboards to track Crown Estate maturity against the NCSC 10 steps to Cyber Security
  • Ensuring operational reporting against Security KPIs
  • Obtaining operational evidence of following our Security processes

More Case Studies

Lloyds Bank and City of London Police

We have established long-term relationships with Lloyds Bank and City of London Police to deve… Learn More

An International Fraud and Corruption Investigation

An investigation was commissioned by the United Kingdom Foreign Office to identify evidence of corr… Learn More

An International UN Investigation

The investigation was formed after the United Nations agreed upon a resolution to investigate a terro… Learn More

Let’s Work Together