Security Snapshot Assessment Maximizing Return on Security Investment What assets do we have? What is running on those assets? What is our risk level?

Slides:



Advertisements
Similar presentations
1 IT Risk Management in Government Jonathan Smith Sr. Risk Manager Commonwealth Security and Risk Management October 1,
Advertisements

Nishidh, CISSP. To comply with Sarbanes oxley and other legislations To comply with industry standards and business partner requirements To protect.
© QinetiQ North America, Inc QinetiQ North America, Inc. 1 Implementing an Enterprise Security Framework – Safeguarding Your Most.
Information System Audit : © South-Asian Management Technologies Foundation Chapter 4: Information System Audit Requirements.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential 14854_10_2008_c1 1 Holistic Approach to Information Security Greg Carter, Cisco Security.
Preventing Good People From Doing Bad Things Best Practices for Cloud Security Brian Anderson Chief Marketing Officer & Author of “Preventing Good People.
SACM Terminology Nancy Cam-Winget, David Waltermire, March.
The State of Security Management By Jim Reavis January 2003.
Enterprise security How to bring security transparency into your organization ISSA EDUCATIONAL SESSION Nicklaus Schleicher, VP Support & Customer Service.
Larry Edie & Annie Ballew.  Who are you users?  What do you know about your users?  How can you cost-effectively manage this information?  How can.
© Copyright Lumension Security Lumension Security PatchLink Enterprise Reporting™ 6.4 Overview and What’s New.
Module 2 Segregation of Duties Case Study Individual Assignment
Vulnerability and Configuration Management Best Practices for State and Local Governments Jonathan Trull, CISO, Qualys, Inc.
Affiliated Information Security Collaborative An Affiliated Enterprise Approach to Information Security Deans and Vice Presidents Meeting April 17, 2014.
Demonstrating IT Relevance to Business Aligning IT and Business Goals with On Demand Automation Solutions Robert LeBlanc General Manager Tivoli Software.
VULNERABILITY MANAGEMENT Moving Away from the Compliance Checkbox Towards Continuous Discovery.
Copyright © Panaya Oracle ® E-Business Suite Testing: How to Get Your Business Users On-Board Amir Farhi Director, Product Marketing.
© 2012 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual.
Cloud Attributes Business Challenges Influence Your IT Solutions Business to IT Conversation Microsoft is Changing too Supporting System Center In House.
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
Vulnerability Management Dimension Data – Tom Gilis 24 November 2011.
A Balancing Act Between Risk Appetite and Risk Tolerance Federal Information Systems Security Educators’ Association Conference March 2005 Ezra Cornell.
© 2009 IBM Corporation Delivering Quality Service with IBM Service Management April 13 th, 2009.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Unify and Simplify: Security Management
HIPAA COMPLIANCE WITH DELL
 Protect customers with more secure software  Reduce the number of vulnerabilities  Reduce the severity of vulnerabilities  Address compliance requirements.
The Chicken or the Egg: A study of Risk Management and Strategic Planning Presented by Raven Henderson Raven Lane, LLC.
PATCH MANAGEMENT: Issues and Practical Solutions Presented by: ISSA Vancouver Chapter March 4, 2004.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
DISCOVER IT PEACE OF MIND Staying HIPAA-Compliant Revised: April 13, 2015.
1 CISCO SAFE: VALIDATED SECURITY REFERENCE ARCHITECTURE What It Is Business Transformation Top Questions To Ask To Initiate The Sale Where It Fits KEY.
Committee of Sponsoring Organizations of The Treadway Commission Formed in 1985 to sponsor the National Commission on Fraudulent Financial Reporting “Internal.
Copyright Security-Assessment.com 2004 Vulnerability Management Explained By Peter Benson.
1 © 2001, Cisco Systems, Inc. All rights reserved. Cisco Info Center for Security Monitoring.
The Infrastructure Optimization Journey Kamel Abu Ayash Microsoft Corporation.
Auditing IT Vulnerabilities IT vulnerabilities are weaknesses or exposures in IT assets or processes that may lead to a business risk or security risk.
IT Security – Scanning / Vulnerability Assessment David Geick State of Connecticut IT Security.
111 © 2005 EMC Corporation. All rights reserved. Achieving Business Resilience 2005 Business Continuity and Corporate Security Show & Conference Stephen.
Rob Davidson, Partner Technology Specialist Microsoft Management Servers: Using management to stay secure.
Compuware Corporation Deliver Reliable Applications Faster Dave Kapelanski Automated Testing Manager.
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Module 7: Designing Security for Accounts and Services.
GRC: Aligning Policy, Risk and Compliance
Chapter 8 : Management of Security Lecture #1-Week 13 Dr.Khalid Dr. Mohannad Information Security CIT 460 Information Security Dr.Khalid Dr. Mohannad 1.
Welcome Information Security Office Services Available to Counties Security Operations Center Questions.
- Company Confidential - Corporate Overview March 2015.
Managed IT Services JND Consulting Group LLC
Tripwire Threat Intelligence Integrations. 2 Threat Landscape by the Numbers Over 390K malicious programs are found every day AV-Test.org On day 0, only.
Security and resilience for Smart Hospitals Key findings
EAST AFRICAN DATA HANDLERS DATA SECURITY/MOBILITY
Cisco Compliance Management and Configuration Service
HP BSA Essentials Community Overview
Security Patching.
Citrix: Proactively Addressing Enterprise Wide Access Compliance with SAP® Access Violation Management Company Citrix Systems Inc. Headquarters Ft. Lauderdale,
DISASTER RECOVERY INSTITUTE INTERNATIONAL
Compliance with hardening standards
Transforming IT Management
Building a Security Operations Center
Cyber Exposure – The Next Frontier
Automate Managing Oracle License Entitlements
A Process View of the Supply Chain
JOINED AT THE HIP: DEVSECOPS AND CLOUD-BASED ASSETS
Enhanced alerting and collaborative incident management
Increase and Improve your PC management with Windows Intune
The MobileIron® Threat Detection difference:
Internal Control Internal control is the process designed and affected by owners, management, and other personnel. It is implemented to address business.
Albeado - Enabling Smart Energy
IT Management Services Infrastructure Services
Presentation transcript:

Security Snapshot Assessment Maximizing Return on Security Investment What assets do we have? What is running on those assets? What is our risk level? What are the high-risk areas? How does risk compare to our security policy? Have we achieved an acceptable level of security? Are we compliant with our internal security policies? What are the areas of non- compliance? What resources do we have to allocate? How do we assign remediation tasks? How do we automate patch deployments? Maximizing Return on Security Investment

Configuration Management The rising number of vulnerabilities demands a review of the processes and resources needed to effectively deal with increased exposure -- Source: CERT Data. This rapid acceleration from vulnerability disclosure to widespread attacks represents today’s most critical network security risk

Business Continuity The integration of enterprise applications (ERP, SFA, Financials, Call Center, Help Desk, etc.) are creating complex business processes that require 24x7 availability These business processes rely on network devices within an infrastructure –Servers, routers, switches, etc. An attack on one network device can have ripple affects on a business process, shutting down services across a network, and crippling business continuity

4 Regulatory Compliance Many companies now face board-level inquiries into their security practices Scope of compliance is now a business and technology issue –Security programs must be developed, implemented and maintained –Identify and assess the risks threatening customer data –Generate timely, accurate and actionable information about their exposures Internal policies must be created, implemented and enforced –Identify which technologies, methods and people are most vulnerable –Have a consistent baseline of questions around standards, practices, configurations and vulnerabilities GLB

Host-level Threat Mitigation Configuration Management Remediation Management Asset Inventory Security Management Security Puzzle Security Policy Enforcement Security Snapshot Assessment Business Continuity Post-Attack Forensics Eliminate losses associated with events that can be identified and corrected Accurately identify and fix network-wide vulnerabilities expeditiously Ongoing, proactive network threat reduction Reduce manhours required to correct issues Executive level reporting / Verification of threat reduction process