Trend Micro Security Protections at Live Nation: Fixing What Keeps Us Up At Night James Patterson Wicks – June 2016.

Slides:



Advertisements
Similar presentations
Worry-Free Business Security 7
Advertisements

2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.
Introducing WatchGuard Dimension. Oceans of Log Data The 3 Dimensions of Big Data Volume –“Log Everything - Storage is Cheap” –Becomes too much data –
Security for Today’s Threat Landscape Kat Pelak 1.
Lexmark Print Management
What’s New in Exchange Online. Disclaimer This presentation contains preliminary information that may be changed substantially prior to final commercial.
SHARESYNCPage 1 of 2 ShareSync is a business-grade file sync and share service Sync files across devices Share files and folders easily and securely Business-grade.
 background and intro  client deployment  system Architecture and server deployment  behind the scenes  data protection and security  multi-server.
IT-Partners Limited © 2011 IT Partners Limited Y OUR IT SOLUTION P ARTNERS Managing Director Confidential Data Loss Prevention Sunny Ho 1.
Market Trends Enterprise Web Applications Cloud Computing SaaS Applications BYOD Data Compliance Regulations 30 Second Elevator Pitch Web browsers have.
Copyright 2009 Trend Micro Inc. OfficeScan 10.5 VDI-aware endpoint security.
Dell Connected Security Solutions Simplify & unify.
1 Managed Premises Firewall. 2 Typical Business IT Security Challenges How do I protect all my locations from malicious intruders and malware? How can.
Complete Security. Threats changing, still increasing Data everywhere, regulations growing Users everywhere, using everything We’re focused on protecting.
A virus is software that spreads from program to program, or from disk to disk, and uses each infected program or disk to make copies of itself. Basically.
 background and intro  client deployment  system Architecture and server deployment  behind the scenes  data protection and security  multi-server.
The Changing World of Endpoint Protection
Copyright 2009 Trend Micro Inc. Beyond AV security, now with DLP and web protection. Trend Micro PortalProtect SharePoint Security.
Employees use multiple devices Employees use both corporate and personal applications Data is stored in various locations Cybersecurity is a top concern.
Microsoft Virtual Academy Preparing for the Windows 8.1 MCSA Module 5: Managing Devices & Resource Access.
What’s New Data Loss Prevention 14. Information is Everywhere Brings Productivity, Agility, Convenience ……and Problems Copyright © 2015 Symantec Corporation.
ARAMA TECH D A T A P R O T E C T I O N P R O F E S S I O N A L S VISION & STRATEGY.
Kaspersky Small Office Security INTRODUCING New for 2014!
Blue Coat Confidential Web and Mobile Application Controls Timothy Chiu Director of Product Marketing, Security July 2012.
Microsoft Office 365 x The new Office for Small Businesses Robert Clark, LucidPointe Advisors4Advisors Office 365 Webinar Series.
© 2011 IBM Corporation IBM Security Services Smarter Security Enabling Growth and Innovation Obbe Knoop – Security Services Leader Pacific.
Your Office 365 Journey Prepare, Migrate, and Operate with Barracuda
Barracuda Networks. Safe Public Cloud Transitions Why Barracuda? The Challenge When organizations move workloads to the public cloud, data protection.
Small Business Solutions Copyright 2014 Trend Micro Inc.
FIND OUT WHY VIPRE IS STILL OUTPERFORMING ITS RIVALS! Distributed By: & Insert Your Logo Here.
Complete Cloud Security Anyone, anywhere, any app, any device.
FIND OUT WHY VIPRE IS STILL OUTPERFORMING ITS RIVALS! Distributed By: & Insert Your Logo Here.
©2014 Check Point Software Technologies Ltd Security Report “Critical Security Trends and What You Need to Know Today” Nick Hampson Security Engineering.
Advanced Endpoint Security Data Connectors-Charlotte January 2016
Sophos Intercept X Matt Cooke – Senior Product Marketing Manager.
Your Office 365 Journey Prepare, Migrate, and Operate with Barracuda
Cloud App Security vs. O365 Advanced Security Management
Journey to Microsoft Secure Cloud
Cloud-First, Modern Windows Management and Security
6/10/2018 5:07 PM THR2218 Deploying Windows Defender AV and more with Intune and Configuration Manager Amitai Senior Program Manager,
Protect sensitive information with Office 365 DLP
7/23/2018 6:01 PM BRK2282 Protecting complete data lifecycle using Microsoft’s information protection capabilities Gagan Gulati Alex Li Principal.
Migrate SharePoint to the cloud the Microsoft IT way
Extending classification ,labeling , and protection to 3rd party applications Kartik Microsoft Tony Digital Guardian Amit Cohen.
IWRITER 365 Offers Seamless, Easy-to-Use Solution for Using, Designing, Managing, and Sharing All Your Company Templates in Microsoft Office 365 OFFICE.
Simplify tomorrows workspace
9/14/2018 2:22 AM THR2026 Set up secure and efficient collaboration for your organization with Office 365 Joe Davies Senior Content Developer Brenda Carter.
Understanding best practices in classifying sensitive data
Office 365 with confidence: security features for Office 365
Prevent Costly Data Leaks from Microsoft Office 365
Add your services to Microsoft 365 Business
Introduction to Soonr by ….
BRK3277 Making the best of the cloud: How Exchange Online is different from Exchange on-premises Tony
Cybersecurity Strategy
Skyhigh Enables Enterprises to Use Productivity Tools of Microsoft Office 365 While Meeting Their Security, Compliance & Governance Requirements Partner.
Threat Landscape for Data Security
Multi-Farm, Cross-Continent SharePoint Architecture
Protect your OneDrive and SharePoint files on mobile devices
HW and SW Solution for Black-box attacks
11/23/2018 3:03 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Securing the Threats of Tomorrow, Today.
The Next Generation Cyber Security in the 4th Industrial Revolution
IN THE PAST, THE FIREWALL WAS THE SECURITY PERIMETER devicesdata users apps On-premises.
(With Hybrid Network Support)
4/9/ :42 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Microsoft Data Insights Summit
Comodo Dome Data Protection
Cybersecurity Simplified: Ransomware
Microsoft Virtual Academy
Cloud Computing for Wireless Networks
Presentation transcript:

Trend Micro Security Protections at Live Nation: Fixing What Keeps Us Up At Night James Patterson Wicks – June 2016

2 Who Am I? James Patterson (Pat) Wicks, CISSP Senior Director, Infrastructure Security Live Nation Entertainment, Inc. Job History: NBCUniversal, Oxygen Media, Siemens Business Systems, U.S. Army Auxiliary Police Officer – NYPD ( ) and WOPD (2010 – Present) Cyber Security Instructor, Science & Technology Enhancement Program (STEP) New York University ISTJ on the Myers-Briggs Personality Type (but a very talkative “I”)

3 10/2013 Who Are We?

4

5 [ Insert Sizzle Reel]

6 What Do We Do? 60,000,000 Fans 23,000 Events Annually Concerts in More Than 40 Countries 145 Venues in 8 Countries 2,300 Artists 60+ Festivals Concerts Ticketing World’s Leading Ticketing Company 455,000,000 Tickets Sold 180,000 Events Ticketed 12,500 Clients Ticketing in 19 Countries 12,000,000 Mobile App Installs Sponsorship and Advertising Marketing Programs for Advertisers Over 750 Brands 37,000,000 Unique Monthly Visitors 140,000,000 Names in Consumer Database 12,000,000 Social Followers Artist Nation World’s Leading Artist Management Company Manage over 280 Artists

7 What Do We Do?

8 What Keeps Us Up At Night Ticket Kiosk and POS Compromise Embedded and Legacy Operating Systems * Windows Embedded for Point of Service SP3 support ended on April 12, 2016 Support for devices using Windows XP and Windows 2000 ended in 2014 and 2010 respectively On Oct. 1, 2015, the liability for card- present fraud shifted to whichever party is the least compliant in a fraudulent transaction*

9 What Keeps Us Up At Night Ransomware Encrypting local and remote files Users downloading unfamiliar attachments infecting systems and remote files (ex. Box) Users have an expectation that IT will protect them if they make a mistake Ransomware domains up by 3,500% in Q1 of 2016* *

10 What Keeps Us Up At Night The “Cloud” Shift of Server Workloads and Applications to the Cloud (i.e. Office 365) The cost of data center operations forcing services and applications to the cloud The cost of storing log events in the cloud Attachments ed directly into online file sharing and content management services for businesses

11 What Helps Us Sleep At Night Trend Micro OfficeScan 11 on embedded operating systems Trend Micro Deep Security on back office servers for integrity monitoring and intrusion prevention Trend Micro Control Manager for centralized visibility & control across ALL Trend Micro products Ticket Kiosk and POS Compromise

12 What Helps Us Sleep At Night Ransomware Trend Micro Cloud App Security with Office365: – Uncovers ransomware and other malware in Microsoft Office files – Discovers unknown malware using pattern- less technologies – Blocks URLs leading to malware Trend Micro OfficeScan 11 monitors any suspicious file encryption activities at the endpoint and stops them by terminating or putting the process in quarantine

13 What Helps Us Sleep At Night Trend Micro Deep Security optimizes the identification of important security events and forwards suspicious events to a SIEM Trend Micro Cloud App Security: – Scans files shared from remote workers to ensure threats don’t migrate through cloud file sharing services – Data Loss Prevention (DLP) for OneDrive, SharePoint Online, Dropbox, Box, and Google Drive The “Cloud”

14 Future Initiatives Expand our Trend Micro Deep Discovery Inspector breach detection system footprint to cover international offices and data centers Evaluate effectiveness of Trend Micro Mobile Security for BYOD employees POC for Trend Micro Hosted Security for Office 365

15 We are incredibly satisfied with our OfficeScan, Deep Security and Web App Security deployments Our Trend Micro Smart Protection Complete agreement provides enterprise-class protection at small company price point Looking forward to expanding our use of Trend Micro Deep Discovery Inspector and testing Trend Micro Mobile Security and Trend Micro Hosted Security In Closing

16 Questions?