2 Assessing the Threatscape Addressing compliance requirements Respond, dont just report Youre already a statistic, how do you rebound? Q&A.

Slides:



Advertisements
Similar presentations
1© Copyright 2011 EMC Corporation. All rights reserved. The Future of the Advance Soc 3rd Annual Privacy, Access and Security Congress, Ottawa, 2012 Mike.
Advertisements

Information Privacy and Data Protection Lexpert Seminar David YoungDecember 9, 2013 Breach Prevention – Due Diligence and Risk Reduction.
Digital Investigations of Any Kind ONE COMPANY Cyber Intelligence Response Technology (CIRT)
2 Assessing the Threatscape Addressing compliance requirements Respond, don’t just report You’re already a statistic, how do you rebound? Q&A.
Security, Privacy and the Cloud Connecticut Community Providers’ Association June 20, 2014 Steven R Bulmer, VP of Professional Services.
Information Security Jim Cusson, CISSP. Largest Breaches 110, NorthgateArinso, Verity Trustees 6, Aurora St. Luke's Medical.
Information & Communication Technologies NMSU All About Discovery! Risk-Based Information Security Program at NMSU presented by Norma Grijalva.
Information Security in Higher Education Today Current Threats
W w w. d u a n e m o r r i s. c o m Duane Morris - Firm and Affiliate Offices New York | London | Chicago | Houston | Philadelphia | San Diego | San Francisco.
Global Information Security Issues According to the E&Y Global Survey, Managers Say the Right Thing… –90% of 1400 companies surveyed in 66 countries say.
Information & Communication Technologies NMSU All About Discovery! Risk-Based Information Security Program at NMSU presented by Norma Grijalva.
Get Complete IT Compliance: Reduce Risk and Cost Jonathan CISO, Qualys Seth Automation Specialist, BMC.
Citadel Security Software Presents Are you Vulnerable? Bill Diamond Senior Security Engineer
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
1 Title ECI: Anatomy of a Cyber Investigation Who Are the Actors.
Security Imperatives in a New Workplace Partnering to Protect Digital Information in the 21st Century Presented by Michael Ferris, Alaska Enterprise Solutions.
Protecting Mainframe and Distributed Corporate Data from FTP Attacks: Introducing FTP/Security Suite Alessandro Braccia, DBA Sistemi.
Did You Hear That Alarm? The impacts of hitting the information security snooze button.
PCI: As complicated as it sounds? Gerry Lawrence CTO
WHAT EVERY RISK MANAGER NEEDS TO KNOW ABOUT DATA SECURITY RIMS Rocky Mountain Chapter Meeting Thursday, July 25, :30 am – 12:30 pm.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Security Awareness: Applying Practical Security in Your World Chapter 1: Introduction to Security.
Fraud and Prevention: Lessons from the Fire Service August 24,
Enterprise Risk Management & IT Compliance March 30, 2010 Presented by: Ken Rowe, Director Enterprise Systems Assurance & Chief Security Officer University.
© 2015 ForeScout Technologies, Page 2 Source: Identity Theft Resource Center Annual number of data breaches Breaches reported Average annual cost of security.
Robert W. Carruth, CSP, ARM-P Risk Control Manager NCACC Risk Management Services.
Data Security: Steps to Improved Information Security September 22, 2015 Presented by: Alex Henderson General Counsel and Chief Administrative Officer.
Managing Data Against Insider Threats Dr. John D. Johnson, CISSP.
Frontline Enterprise Security
Tamra Pawloski Jeff Miller. The views, information, and content expressed herein are those of the authors and do not necessarily represent the views of.
Current Security Threats and Prevention Measures Relating to Cloud Services, Hadoop Concurrent Processing, and Big Data ATHER SHARIF, SARAH COONEY, SHENGQI.
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. State of Network Security.
Data Security & Privacy: Fundamental Risk Mitigation Tactics 360° of IT Compliance Anthony Perkins, Shareholder Business Law Practice Group Data Security.
Visibility. Intelligence. response Information Security: Risk Management or Business Enablement? Mike Childs Vice President Rook Security.
The cost of Cybercrime 1 Steve Lamb Regional Marketing Manager – EMEA, Enterprise Security Products Twitter: actionlamb.
What does it mean for Records and Information Management.
Information Security and Technology Overview Presented By: Enterprise Risk Management (ERM) Division Jill Martucci, CISA, SSCP, Senior Allison Hall, Experienced.
HOW TO AVOID COMMON DATA BREACH PITFALLS IAPP Privacy Academy 2014.
Security Policy and Key Management Centrally Manage Encryption Keys - Oracle TDE, SQL Server TDE and Vormetric. Tina Stewart, Vice President.
September 20, 2016 How to Defend Your Organization from a Cyber Breach LTC Tim Bloechl (U.S. Army, Ret.) Director, Cyber Security Business.
Protect your Digital Enterprise
Michael Wright • Chief Security Officer • Tech Lock
CYBERSECURITY SOLUTIONS
[Internal Use] for Check Point employees​
Comprehensive Security and Compliance at an Affordable Price.
Team 1 – Incident Response
Regulatory Compliance
Current ‘Hot Topics’ in Information Security Governance Auditing
F5 PRO ASSETS We’ve created these Pro Assets to help you communicate the ideas in this article to your team. Feel free to remove these intro pages, and.
F5 PRO ASSETS We’ve created these Pro Assets to help you communicate to your team the importance of app security and performance. Feel free to remove.
UNIVERSITY Common Cyber Security Myths An Update on Cyber Security.
Securing Information Systems
Information Security: Risk Management or Business Enablement?
Cybersecurity Awareness
Data Security Team 1.
Agenda Consumer ID theft issues Data breach trends Laws and regulations Assessing and mitigating your risk.
CYBER CRIME Matthew Purchase.
General Counsel and Chief Privacy Officer
National Cyber Security
Network Security Best Practices
Brandon Traffanstedt Systems Engineer - Southeast
Keeping your data, money & reputation safe
CONTENTS BACKGROUND CLOUD MODELS SECURITY CONSIDERATIONS MANAGING RISK.
Anatomy of a Large Scale Attack
Threat Monitoring and Defense A fully managed and monitored security and compliance solution for cloud, hybrid, & on-premises infrastructure.
Managing IT Risk in a digital Transformation AGE
Information Protection
DATA BREACHES 6 4 , 9 3 There were…
Information Protection
Presentation transcript:

2 Assessing the Threatscape Addressing compliance requirements Respond, dont just report Youre already a statistic, how do you rebound? Q&A

3

4 91% of companies have experienced at least one IT security event from an external source. 90% of all cyber crime costs are those caused by web attacks, malicious code and malicious insiders. Security Breach Statistics* *Statistics collected from Gartner, Forrester, Ponemon, Kaspersky, Eschelon

5 Due to complexity, over 70% of organizations still not adequately securing critical systems. The median annualized cost of breaches is $3.8 million per year, (range: $1M to $52M/yr) Security Breach Statistics

6 96% of attacks were not highly difficult 94% of all data compromised involved servers 85% of breaches took weeks or more to discover 92% of incidents were discovered by a third party 97% of breaches were avoidable 96% of victims subject to PCI DSS had not achieved compliance A study conducted by the Verizon RISK Team

7 Data breaches Data loss/leakage Account/service traffic hijacking Insecure interfaces and APIs Denial of service Malicious insiders Insufficient due diligence Technology vulnerabilities Social Engineering Viruses, phishing, malware, spyware Employees exposing information Carelessness/lax security policies According to Cloud Security Alliance

8 Source: Kaspersky Bulletin

9 And then this happens…. … that becomes this … which ultimately ends up with this …followed by this They all start off like this

10 I get audited. I get audited a lot. - Michael Tampone Chief Technology Officer Sterling Risk

11 FFIEC PCI / DSS CIP Sarbanes Oxley GLBA FISMA NERC HIPAA FERPA SB-1386 (California)

12 Its expensive Its time consuming Its resource heavy Perceived imbalance in the risk/reward quotient -Weve got it covered -We havent been attacked/complacency -Were too small for hackers to care/notice Expertise difficult to retain …but it doesnt have to be MSPAlliance says: Unemployment for IT security is <1%. And once found, theyre expensive to keep. In fact their salaries doubled in past 3 years.

13 Preventive/Preemptive policies Centralized control Automation Transaction Anomaly Prevention Minimize end user impact Consistency Maintain and enforce standards Minimizing management and operational cost Best practices

14 Continuous monitoring discovers red flags (via Log/SIEM) but too often reviewed days/weeks later Doesnt FIX the problem Signatures will not detect anything unusual in a zero-day exploit Doesnt maintain continuous integrity of files/apps/registry

15 Real-time configuration mgmt Recovery back to ideal state Automated alerts and repair Avoid unauthorized changes that threaten compliance Demonstrate control of computing environment Change management Reduce support incidents

16 (3.11)Implement automated configuration monitoring system to analyze hardware and software changes, network configuration changes, and other modifications affecting the security of the system. *Source SANS 20 Critical Controls SANS offers 12 critical controls for implementation, automation, and measurement. Security Configuration Management applies to 8 of those guidelines, most notably

17 Reduce, remove security threats Reduce operational downtime Reduce support incidents by 80% Automate security compliance policy Increase application availability Reduce case resolution times and repeat cases Reduce on-site or remote service requests Integrates with existing infrastructure Automated compliance reporting Improve customer satisfaction

18 Demonstration

19 Innovative Software Company Over 12 years in the marketplace 1,000s of customer deployments globally Proven and patented technology IT organizations will fail to successfully manage their PC environment if they have not addressed the biggest issue: complexity … Persystent Suite … does provide configuration drift management functionality. Customers

20 Bob Whirley Utopic Software