Strong Security for Your Weak Link: Implementing People-Centric Security Jennifer Cheng, Director of Product Marketing.

Slides:



Advertisements
Similar presentations
1© Copyright 2014 EMC Corporation. All rights reserved. Securing the Cloud Gintaras Pelenis Field Technologist RSA, the Security Division of EMC
Advertisements

Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin CHAPTER FOUR ETHICS AND INFORMATION SECURITY: MIS BUSINESS CONCERNS.
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 4 ETHICS AND INFORMATION SECURITY Business Driven Information Systems 2e.
MyCloudIT Removes the Complexity of Moving Cloud Customers’ Entire IT Infrastructures to Microsoft Azure – Including the Desktop MICROSOFT AZURE ISV: MYCLOUDIT.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Copyright 2011 Trend Micro Inc. Trend Micro Web Security- Overview.
InformationWeek 2014 Strategic Security Survey Research Findings © 2014 Property of UBM Tech; All Rights Reserved.
Information Security Phishing Update CTC
Director of Research, SANS Institute
BUSINESS B1 Information Security.
Robbie Upcroft Sales Manager - SMB & Distribution, Asia-Pacific
Dell Connected Security Solutions Simplify & unify.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
Akamai Technologies - Overview RSA ® Conference 2013.
Symantec Targeted Attack Protection 1 Stopping Tomorrow’s Targeted Attacks Today iPuzzlebiz
CIO Perspectives on Security Fabrício Brasileiro Regional Sales Manager.
Insider Threat Nation States Cyber Crime Hactivist Cyber Terrorist IndustrializedHackers Dynamic Cyber Security Landscape Cyber Actors ThreatsThreats.
Bizfss File Sync and Sharing Solution, Built on Microsoft Azure, Allows Businesses to Sync, Share, Back Up Using Their Own Cloud Storage MICROSOFT AZURE.
Yair Grindlinger, CEO and Co-Founder Do you know who your employees are sharing their credentials with? Do they?
Free, online, technical courses Take a free online course. Microsoft Virtual Academy.
Mailjet and Microsoft Azure Offer All-in-One Infrastructure and Deliverability while Saving IT and Enterprise Time and Money with Scalability MICROSOFT.
Power LogOn® Adds Card-Based, Multi- Factor Authentication to Microsoft Azure Logon, Plus Password Management for All Other Logons MICROSOFT AZURE ISV.
Bring Your Own Security (BYOS™): Deploy Applications in a Manageable Java Container with Waratek Locker on Microsoft Azure MICROSOFT AZURE ISV PROFILE:
With xTV, Quickly Build Your Enterprise.TV Network, a Single-Destination, Real-Time Stream of Information to Inform Customers, Employees, Partners & Investors.
Copyright © 2015 Centrify Corporation. All Rights Reserved. 1 Company Overview & Strategy Lance McAndrew Product Line Sales Engineer.
DenyAll Delivering Next-Generation Application Security to the Microsoft Azure Platform to Secure Cloud-Based and Hybrid Application Deployments MICROSOFT.
1 #UPAugusta Today’s Topics What are Deadly IT Sins? Know them. Fear them. Fix them. #UPAugusta201 6.
2© Copyright 2013 EMC Corporation. All rights reserved. Cyber Intelligence Fighting Cyber Crime Insert Event Date LEADERS EDGE.
Enterprise Mobility Suite: Simplify security, stay productive Protect data and empower workers Unsecured company data can cost millions in lost research,
Overture Is a Unique Omni-channel E-commerce Platform that Leverages the Power of Microsoft Azure to Orchestrate Every Customer Transaction MICROSOFT AZURE.
© 2011 IBM Corporation IBM Security Services Smarter Security Enabling Growth and Innovation Obbe Knoop – Security Services Leader Pacific.
CLOSE THE SECURITY GAP WITH IT SOLUTIONS FROM COMPUTACENTER AND CISCO AUGUST 2014.
An Introduction to Deception Based Technology Asif Yaqub Nick Palmer February 5, 2016.
TruSTAR Sensitive & Proprietary Cloud CISC: Cyber incident exchange and collaboration February, 2016 “We cannot solve problems with the same thinking we.
Get Full Protection on Microsoft Azure with Symantec™ Endpoint Protection 12.1 MICROSOFT AZURE ISV PROFILE: SYMANTEC Symantec™ Endpoint Protection is an.
Discover How You Can Increase Collaboration with External Partners While Reducing Your Cost in Managing an Extranet from the Azure Cloud MICROSOFT AZURE.
No boundaries with Unified Web Security Solutions Steven Vlastra Sr. Systems Engineer - Benelux.
Copyright © 2015 Centrify Corporation. All Rights Reserved. 1 Securing Enterprise Identities Against Cyberthreats Brian Krause Manager of North America.
Advanced Endpoint Security Data Connectors-Charlotte January 2016
Internal Security Threats
Comprehensive Security and Compliance at an Affordable Price.
Cisco 2017 Security Annual Report
Accelerate GDPR compliance with Microsoft 365
Cloud Security IS Application-Centric Security
Hybrid Management and Security
Journey to Microsoft Secure Cloud
Firefish Software for Professional Recruiters Stays Available Around the Clock from Any Device and Anywhere by Using the Microsoft Azure Platform Partner.
Measure Effectiveness of Communication, Engage Your Employees, and Bridge Communication Gaps with Sparrow App and Power of Microsoft Azure MICROSOFT AZURE.
BioCatch Fights Financial Fraud and Detects Online Threats via Behavioral Biometrics, All Powered by the Microsoft Azure Platform MICROSOFT AZURE TECH.
Office 365 with confidence: security features for Office 365
Jon Peppler, Menlo Security Channels
Cybersecurity Awareness
BRK3277 Making the best of the cloud: How Exchange Online is different from Exchange on-premises Tony
Built on the Powerful Microsoft Azure Platform, iSwarm Helps Businesses Analyze Social Media Conversations, then Connect with Individuals MICROSOFT AZURE.
Strong Security for Your Weak Link:
Home Internet Vulnerabilities
CloudLabs, Powered by Azure, Enables the Quick, Easy, Cost-Effective Management, Distribution of Online Training Labs for Education and Business MICROSOFT.
Navigating Security Seas in a Small Ship with a Limited Crew
Real World Advanced Threat Protection
Securing the Threats of Tomorrow, Today.
Secure once, run anywhere Simplify your security with Sophos
Chris Ince ISO Lead Auditor Security Risk Management Ltd
Information Protection
Microsoft Data Insights Summit
<offer name> with Microsoft 365 Business Secure Deployment
Introduction to Symantec Security Service
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fuel Cell Market size worth $25.5bn by 2024 Low Power Wide Area Network.
Microsoft Data Insights Summit
Threat Landscape Update
Information Protection
Presentation transcript:

Strong Security for Your Weak Link: Implementing People-Centric Security Jennifer Cheng, Director of Product Marketing

Copyright © 2015 Proofpoint, Inc. All Rights Reserved. 2 Current security tools are ineffective at stopping even commodity threats, let alone targeted attacks..03% Dridex.02% Dyre ? Targeted Today’s security tools are failing.

Copyright © 2015 Proofpoint, Inc. All Rights Reserved. 3 Advanced threats target the way people work. Source: Verizon DBIR. >90% of targeted attacks start with <10% start from web, social and other sources 100% of targeted attacks affect people

Copyright © 2015 Proofpoint, Inc. All Rights Reserved. 4 People are creating more data to protect. Average user creates 2TB of data/year Humans create up to 80% of an organization’s total data Typical attack surface up 44X Source: IDC.

Copyright © 2015 Proofpoint, Inc. All Rights Reserved. 5 The way people work is changing. Cloud Endpoints Networks

Copyright © 2015 Proofpoint, Inc. All Rights Reserved. 6 Is the way you work being used against you? Mobile Social Media Customer Service and Support Brand Engagement Applications Personal and Corporate Data Web Authentication Employee Identity

Copyright © 2015 Proofpoint, Inc. All Rights Reserved. 7 What is your social media security risk? Account Takeover Fraudulent Accounts Malware “Troll” Content Spam

Copyright © 2015 Proofpoint, Inc. All Rights Reserved. 8 Are your mobile apps leaking data? “75% of all mobile security breaches will be through apps” (Gartner IT Infrastructure & Operations Management Summit 2014)

Copyright © 2015 Proofpoint, Inc. All Rights Reserved. 9 Key Findings of The Human Factor 2015 On average, users click 1-in-25 malicious links in phish 66% of clicks occur within 24 hours after the message is received Peak delivery times are during business hours 1-in-5 clicks on malicious links occur off the network Attackers adapt faster than users can be educated

Copyright © 2015 Proofpoint, Inc. All Rights Reserved. 10 Can you tell when you’re being attacked?

Copyright © 2015 Proofpoint, Inc. All Rights Reserved. 11 Stopping Advanced Threats Know bad actors and tools across the attack chain, updating the defenses continuously. Be in the flow of the attack channels to provide comprehensive protection. Stop attacks everywhere people use the target channel, on network or off, on any device. See EverythingCorrelate EverythingProtect Everywhere ACTION INSIGHT

Copyright © 2015 Proofpoint, Inc. All Rights Reserved. 12 The Right Approach: 1. Stop advanced threats before they get to people 2.Protect the information people create to reduce the attack surface and compliance risk 3.Enable your people to respond quickly when things go wrong

Copyright © 2015 Proofpoint, Inc. All Rights Reserved. 13 proofpoint Next-generation cybersecurity to protect the way people work today