Presentation is loading. Please wait.

Presentation is loading. Please wait.

Formulating a Security Policy for the Modern IT Landscape.

Similar presentations


Presentation on theme: "Formulating a Security Policy for the Modern IT Landscape."— Presentation transcript:

1 Formulating a Security Policy for the Modern IT Landscape

2 Founder L0pht Heavy Industries Creator Whacked Mac Archives Founder @Stake Testified to Congress on “Weak Computer Security in Government” Blackhat, Defcon, HOPE – MTV, ABC, CNN Editor Hacker News Network Strategist Tenable Network Security cthomas@tenable.comcthomas@tenable.com @spacerog Cris Thomas Space Rogue

3 How can you know if you are taking the right steps and if you are doing enough to protect your assets and business?

4 Will we be the next headline? Where are our Risks How effective is our security How do we measure success What to invest in next?

5 Best Practices The 20 Critical Security Controls from the SANS Institute and the Council on CyberSecurityCritical Security Controls The NIST Cybersecurity FrameworkNIST Cybersecurity Framework The National Campaign for Cyber Hygiene from the Center for Internet Security and the Council on CyberSecurityNational Campaign for Cyber Hygiene The PCI Data Security StandardPCI Data Security Standard

6 Best Practices The 20 Critical Security Controls from the SANS Institute and the Council on CyberSecurityCritical Security Controls The NIST Cybersecurity FrameworkNIST Cybersecurity Framework The National Campaign for Cyber Hygiene from the Center for Internet Security and the Council on CyberSecurityNational Campaign for Cyber Hygiene The PCI Data Security StandardPCI Data Security Standard

7 FUNDAMENTALS PRACTICE THE FIRST

8 TENABLE’S 5 CRITICAL CYBER CONTROLS

9 INVENTORY YOUR ASSETS 1 Software Hardware BYOD Virtual systems Cloud apps SoftwareHardwareBYOD Virtual systems Cloud apps

10 CONTINUOUSLY PATCH 2 Detect public vulnerabilities Find machines that are missing patches Operating systems Applications Infrastructure Detect public vulnerabilities Find machines that are missing patches Operating systems ApplicationsInfrastructure

11 SECURE THE NETWORK 3 Anti-virus Application white listing Intrusion prevention Access control Threat subscriptions Segment your network and data Anti-virus Application white listing Intrusion prevention Access control Threat subscriptions Segment your network and data

12 LIMIT USER ACCESS 4 No default accounts Enforce strong passwords Log all accesses Review which account have access to which resources Review which accounts have access to which resources Log all accesses Enforce strong passwords No default accounts

13 SEARCH FOR MALWARE 5 Malware Bad guys Insiders MalwareBad guysInsiders

14 The Modern Landscape Next Gen Vulnerability Management Malware Detection Compliance and Patch Monitoring Network Behavior Analysis Log Collection Forensic Analysis Incident Response Mobile, Virtual and Cloud Coverage

15


Download ppt "Formulating a Security Policy for the Modern IT Landscape."

Similar presentations


Ads by Google