Presentation is loading. Please wait.

Presentation is loading. Please wait.

2 Assessing the Threatscape Addressing compliance requirements Respond, dont just report Youre already a statistic, how do you rebound? Q&A.

Similar presentations


Presentation on theme: "2 Assessing the Threatscape Addressing compliance requirements Respond, dont just report Youre already a statistic, how do you rebound? Q&A."— Presentation transcript:

1

2 2 Assessing the Threatscape Addressing compliance requirements Respond, dont just report Youre already a statistic, how do you rebound? Q&A

3 3

4 4 91% of companies have experienced at least one IT security event from an external source. 90% of all cyber crime costs are those caused by web attacks, malicious code and malicious insiders. Security Breach Statistics* *Statistics collected from Gartner, Forrester, Ponemon, Kaspersky, Eschelon

5 5 Due to complexity, over 70% of organizations still not adequately securing critical systems. The median annualized cost of breaches is $3.8 million per year, (range: $1M to $52M/yr) Security Breach Statistics

6 6 96% of attacks were not highly difficult 94% of all data compromised involved servers 85% of breaches took weeks or more to discover 92% of incidents were discovered by a third party 97% of breaches were avoidable 96% of victims subject to PCI DSS had not achieved compliance A study conducted by the Verizon RISK Team

7 7 Data breaches Data loss/leakage Account/service traffic hijacking Insecure interfaces and APIs Denial of service Malicious insiders Insufficient due diligence Technology vulnerabilities Social Engineering Viruses, phishing, malware, spyware Employees exposing information Carelessness/lax security policies According to Cloud Security Alliance

8 8 Source: www.securelist.comwww.securelist.com Kaspersky Bulletin

9 9 And then this happens…. … that becomes this … which ultimately ends up with this …followed by this They all start off like this

10 10 I get audited. I get audited a lot. - Michael Tampone Chief Technology Officer Sterling Risk

11 11 FFIEC PCI / DSS CIP Sarbanes Oxley GLBA FISMA NERC HIPAA FERPA SB-1386 (California)

12 12 Its expensive Its time consuming Its resource heavy Perceived imbalance in the risk/reward quotient -Weve got it covered -We havent been attacked/complacency -Were too small for hackers to care/notice Expertise difficult to retain …but it doesnt have to be MSPAlliance says: Unemployment for IT security is <1%. And once found, theyre expensive to keep. In fact their salaries doubled in past 3 years.

13 13 Preventive/Preemptive policies Centralized control Automation Transaction Anomaly Prevention Minimize end user impact Consistency Maintain and enforce standards Minimizing management and operational cost Best practices

14 14 Continuous monitoring discovers red flags (via Log/SIEM) but too often reviewed days/weeks later Doesnt FIX the problem Signatures will not detect anything unusual in a zero-day exploit Doesnt maintain continuous integrity of files/apps/registry

15 15 Real-time configuration mgmt Recovery back to ideal state Automated alerts and repair Avoid unauthorized changes that threaten compliance Demonstrate control of computing environment Change management Reduce support incidents

16 16 (3.11)Implement automated configuration monitoring system to analyze hardware and software changes, network configuration changes, and other modifications affecting the security of the system. *Source SANS 20 Critical Controls SANS offers 12 critical controls for implementation, automation, and measurement. Security Configuration Management applies to 8 of those guidelines, most notably

17 17 Reduce, remove security threats Reduce operational downtime Reduce support incidents by 80% Automate security compliance policy Increase application availability Reduce case resolution times and repeat cases Reduce on-site or remote service requests Integrates with existing infrastructure Automated compliance reporting Improve customer satisfaction

18 18 Demonstration

19 19 Innovative Software Company Over 12 years in the marketplace 1,000s of customer deployments globally Proven and patented technology IT organizations will fail to successfully manage their PC environment if they have not addressed the biggest issue: complexity … Persystent Suite … does provide configuration drift management functionality. Customers

20 20 Bob Whirley Utopic Software bobwhirley@utopicsoftware.com 727-512-9001 www.utopicsoftware.com


Download ppt "2 Assessing the Threatscape Addressing compliance requirements Respond, dont just report Youre already a statistic, how do you rebound? Q&A."

Similar presentations


Ads by Google