Presentation is loading. Please wait.

Presentation is loading. Please wait.

What if tomorrow never comes

Similar presentations


Presentation on theme: "What if tomorrow never comes"— Presentation transcript:

1 What if tomorrow never comes
Kent Agerlund Principal Consultant CTGlobal

2 Kent Agerlund

3 Agenda The Storm is now Why is it so difficult
How can Configuration Manager be used to mitigate the risk

4 The STORM is NOW WannaCry, Adylkuzz and Petya are a great examples how neglecting security patches can have a catastrophic impact on businesses.

5 It took 7 minutes from first incident until all devices were down
Our estimated loss is $278 million We thought it was just another evening with no We realized no one owned the incident. We have plans for earthquakes, terror attacks, flooding – but not cyberattacks

6 42% Top External Intrusion Method: Software Vulnerabilities
Software Vulnerabilities and Patching At the center of security incidents Top External Intrusion Method: Software Vulnerabilities 42% - Forrester Clients report: “Remediation is a perennial point of failure in vulnerability management programs.” - Gartner

7 It takes organizations much longer to apply security patches than it takes hackers to ramp up the exploitation of unpatched vulnerabilities...

8 The risk window The time between the disclosure of a vulnerability, and the time to identifying and fixing that vulnerability in your environment Intro to risk window.

9 Risk Window: from awareness to mitigation

10 Risk Window: from awareness to mitigation
Average time from Disclosure to first Exploitation: 30 days1 Average time from Identification to Remediation: 186 days2 The Risk Window: 156 days 1 – Source: “2016 Data Breach Investigation Report” Verizon 2 – Source: “2016 State of Vulnerability Risk Management” NopSec

11 Pencentage of applications patched withing 30 days of disclosure
(secure) The Attack Surface 1 – Source: “2017 Data Breach Investigation Report” Verizon

12 Patch Management challenges, tips and tricks

13 Security Patch Management
Misconceptions Consequences No synergy between security assessment and patch activities Patching Microsoft applications is good enough Focus only on the most common non- Microsoft applications Relying on vendor information and alerts Non prioritized patching process Waste of resources Applications staying unpatched for months or many times, years Security incidents leading to business disruption and breaches Presentation title and date

14 The Gap

15 The critical gap “The most critical point in a VM process is the handover of identified vulnerabilities to the team responsible for remediating them (usually by applying patches). Just sending a report with thousands of vulnerabilities to the operations team to fix is one of the most common ways to fail in VM’’ *Gartner Report - A Guidance Framework for Developing and implementing Vulnerability Management

16 Main business challenges
Infrastructure components Visual Insight to the entire process No teamwork No sponsor Tools before process Process before goal Many vendors out there Flexera SVM & CSI Invanti Microsoft SCUP tools

17 Demo

18 The Toolbelt The right tool for the right job Vulnerabilities
3rd party integration Software update Configuration Items Scripts Vulnerabilities Operating System Hardware Application Drivers

19 Vulnerabilities: Operating system
Goal Process Environments Understand the Windows Defense stack Pre breach Post breach Health attestation Device guard Device control Security policies Credential Guard Windows Hallo Encryption Windows Information Protection Conditional Access SmartScreen Applocker Device Guard Defender Device protection Indentity protection Information protection Threat resistance Breach detection, investigation & response

20 Demo

21 Vulnerabilities: Applications
Who own’s the process Application owners Security Operations I’m patching Adobe & JAVA in addition to the apps my Boss hears about in the news

22 Demo

23 Vulnerabilities: Drivers
Why on Earth would I want to rock a boat I need a reason Windows 10 Servicing

24 Demo

25 Wrap-up It’s your choice, the Hurricane or the mild storm
Configuration Manager & EM+S are important tools in the belt If you wait, tomorrow might very well be to late


Download ppt "What if tomorrow never comes"

Similar presentations


Ads by Google