| Data Connectors: Atlanta, GA

Slides:



Advertisements
Similar presentations
Built on the Powerful Microsoft Azure Platform, EventsAIR Provides a Turnkey, Robust Technology Solution for Professional Event Organizers MICROSOFT AZURE.
Advertisements

Symantec Vision and Strategy for the Information-Centric Enterprise Muhamed Bavçiç Senior Technology Consultant SEE.
Greg Pierce| Concerto Cloud Services Which Cloud is Right for Microsoft CRM?
Duncan Fraiser, Adam Gambrell, Lisa Schalk, Emily Williams
User Services. Services Desktop Support Technical Support Help Desk User Services Customer Relationship Management.
Financial Advisory & Litigation Consulting Services Risk Management 2006 September 14-15, 2006 The Metropolitan Club, New York, NY Workshop B: Information.
InformationWeek 2014 Strategic Security Survey Research Findings © 2014 Property of UBM Tech; All Rights Reserved.
This is the best Power Point Template ever. It comes with over 5 styles of colors and include lots of features. Serving New England Businesses Since 1988.
Dell Connected Security Solutions Simplify & unify.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
1 The New Security Blueprint : Challenges & Opportunities Ajay Goel, Managing Director, Symantec India & SAARC Sept 1, 2011.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Alert Logic Provides a Fully Managed Security and Compliance Solution Based in the Cloud, Powered by the Robust Microsoft Azure Platform MICROSOFT AZURE.
Cloud Computing Project By:Jessica, Fadiah, and Bill.
Company small business cloud solution Client UNIVERSITY OF BEDFORDSHIRE.
Best Practices for a Successful SaaS Implementation Joseph H. Aston, Oracle Project Lead Velocity Technology Solutions September 18, 2015.
Websense SLP (Software Licensing Program) Sherri Conover Websense Business Unit Manager March 17, 2010.
ARAMA TECH D A T A P R O T E C T I O N P R O F E S S I O N A L S VISION & STRATEGY.
1© Copyright 2015 EMC Corporation. All rights reserved. FEDERATION ENTERPRISE HYBRID CLOUD OPERATION SERVICES FULL RANGE OF SERVICES TO ASSIST YOUR STAFF.
VDI AND DAAS – SAY WHAT?!? Bob Marshall, MD MPH MISM FAAFP Faculty, Valley Family Medicine Residency Faculty, DoD Clinical Informatics Fellowship.
ARAMA TECH D A T A P R O T E C T I O N P R O F E S S I O N A L S VISION & STRATEGY.
© 2011 IBM Corporation IBM Security Services Smarter Security Enabling Growth and Innovation Obbe Knoop – Security Services Leader Pacific.
Why SIEM – Why Security Intelligence??
CLOSE THE SECURITY GAP WITH IT SOLUTIONS FROM COMPUTACENTER AND CISCO AUGUST 2014.
Messaging | Hiring Manager
SAM Baseline Review Engagement
Your Partner for Superior Cybersecurity
Your Office 365 Journey Prepare, Migrate, and Operate with Barracuda
Fourth Dimension Technologies
Avenues International Inc.
Taking Lessons from End Users, “Convergence” Rises from the Ashes
Partner Toolbox Cloud Infrastructure & Management
AT&T Premises-Based Firewall Enhanced SBS Solution
Cyber Security Enterprise Risk Management: Key to an Organization’s Resilience Richard A. Spires CEO, Learning Tree International Former CIO, IRS and.
Cisco 2017 Security Annual Report
Operational Technology Information Technology
Barracuda Networks Creates Next-Generation Security Solutions That Enable Customers to Accelerate Their Adoption of Microsoft Azure MICROSOFT AZURE APP.
WEBINAR The Total Economic Impact Of Software-As-A-Service
What is Cloud Computing - How cloud computing help your Business?
Cloud vs. On-premise 5 Advantages of Cloud Deployment
| Data Connectors: Atlanta, GA
CIOs, IT, and Digital Transformation
Driving Digital Business with SAP Digital Business Services
CCNET Managed Services
William Band, Vice President, Principal Analyst
Workgroup Technology Partners
Veeam Backup Repository
Mobile workforce management solution
Cloud Testing Shilpi Chugh.
I have many checklists: how do I get started with cyber security?
Replace with Application Image
Your Next LIMS: SaaS or On-Premise? Presented by:
File Manager for Microsoft Office 365, SharePoint, and OneDrive: Extensible Via Custom Connectors in Enterprise Deployments, Ideal for End Users OFFICE.
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
SMB practice development: Security play
MyCloudIT Enables Partners to Drive Their Cloud Profitability Using CSP-Enabled Desktop Hosting Automation with Microsoft Azure and Office 365 MICROSOFT.
Panda Adaptive Defense Platform and Services
SMB practice development: Security play
TEMPLATE NOTES Our datasheet and mini-case study templates are formatted specifically for consistency of branding at Microsoft. Please do not alter font.
RICOH ePresentment and Payment May 2018
Cloud computing Technology: innovation. Points  Cloud Computing and Social Network Sites have become major trends not only in business but also in various.
Windows 10 Enterprise subscriptions in CSP – Messaging Summary
NSX Data Center for Security
Supply Chain Transformation Highlights
Managed Content Services
(With Hybrid Network Support)
Technology Convergence
Capitalize on Your Business’s Technology
OU BATTLECARD: Oracle Identity Management Training
OU BATTLECARD: Oracle SOA Training & Certification
Presentation transcript:

1.18.2017 | Data Connectors: Atlanta, GA Mind the Gaps: Leveraging “Security as a Service” to Gain Cyber Advantage 1.18.2017 | Data Connectors: Atlanta, GA Alex Knight, Director of Security Product Strategy aknight@controlscan.com | 404.920.4455

An expanding perimeter with more points of vulnerability, Technology Continues to Open Up New Frontiers “Internet of Things” connected sensors and monitors Cloud storage and infrastructure Mobile access “Shadow IT” implementation of SaaS business applications More points of vulnerability, more surface area for attacks, global accessibility An expanding perimeter with more points of vulnerability, more surface area for attacks, offering global accessibility © ControlScan 2017

These gaps are further manifested in survey after survey… We’re Creating Gaps in Our Ability to Protect Data Technology adoption is outpacing security and compliance Attackers are evolving and innovating as fast or faster We struggle to keep up with the basics Gaps are forming between what’s truly required to maintain security and… What is typically in place What can realistically be maintained These gaps are further manifested in survey after survey… © ControlScan 2017

Security Threat Management” “The Current State of Security Threat Management” Lack of internal resources and insufficient budget are preventing IT teams from creating a strong security posture for their organizations What does this mean? 52% 1/3 62% of in-house IT teams do not include an information security professional have the same security budget this year that they had in 2015 – and 2014 feel their organization's security-related investments are not sufficient for their business's level of risk “Just not enough technology or knowledge.” 52% 29% 48% are attempting to monitor security logs in-house (without in-house security expertise) aren’t monitoring their logs at all are trying to conduct their own security risk assessments © ControlScan 2017

Spotting the Gaps Before You’re Tripped by Them 1 Eyes on Security : incorporating security into “business as usual” 2 Access to Expertise : on-the-spot experience and knowledge 3 Best Practices, Proven Processes : consistent, predictable execution 4 Defense in Depth : belts and suspenders for your infrastructure security 5 Adaptability : rapid response in the face of new threats and internal changes 6 Financial Flexibility : flexibility in executing a security & compliance strategy © ControlScan 2017

The Results of Gap Inaction and Indecision Breaches of sensitive data Disruption/distraction within operational areas Unbudgeted costs to remediate/recover Fines levied for contractual/compliance violations Complex efforts to recover Ongoing, closer scrutiny Erosion of brand name and customer confidence © ControlScan 2017

Leveraging Security As A Service © ControlScan 2017

Eyes on Security 1 2 3 Continuous security monitoring Time for discovery and response 3 Leveraged insight across multiple environments © ControlScan 2017

Access to Expertise 1 2 3 Security hiring challenges continue to grow Opportunities for experts-on-demand 3 Requirements for ongoing training & development © ControlScan 2017

Best Practices; Proven Processes Best practices surfaced from industries and frameworks Predictable deployments Consistent operations SLA-backed reporting © ControlScan 2017

SIEM Defense in Depth Directory Services Data Management Security MSSP Sec Ops Directory Services Data Management Security Network Email Physical Multi-layered defenses More challenging for the attacker; contingency when a layer fails Layers as “services” often easier to add or shift Firewall Active Directory Routers Data Loss Spam Alarms IPS Data in Motion Malware Switches Users Malware Surveillance WAF Access Control Wireless Groups Data at Rest Phishing End Point © ControlScan 2017

Adaptability Leveraging best-of-breed solutions Expansion & refinement of in-place solutions Taking advantage of latest features/functions in solution upgrades Overall elasticity of solution to manage environmental growth and change © ControlScan 2017

Financial Flexibility Procured Internally Year 1 Year 2 Year 3 Total Hardware purchase $1,995 Software license $1,333 $3,999 Annual maintenance Staff ($120k, 2%) $2,400 $7,200 Training $300 $900 Total: $14,094 MSSP Year 1 Year 2 Year 3 Total Installation & setup $250 Service subscription fee $2,400 $7,200 Total: $7,450 © ControlScan 2017

So What’s the Downside? Cost perceptions Trust issues (parallels with cloud computing) Loss of control Potential loss of internal SME/competency over time Hard to bring back in house MSSP understanding of internal culture/dynamics More limited choices in technology © ControlScan 2017

Consider This When Selecting a Partner 1 Competence in Security + Compliance : They should be considered in tandem 2 Certifications : Proof points for ongoing investment in education & development 3 Flexibility : Willingness to adapt solutions to your business vs. one size fits all 4 Holistic : Lifecycle support from “Identify” to “Recover” 5 Balanced : Solutions supporting both “Protect” and “Detect” © ControlScan 2017

Thank You Alex Knight Visit Us At: Director of Security Product Strategy P: 404.920.4455 Email: aknight@controlscan.com 11475 Great Oaks Way Suite 300 Alpharetta, GA 30022 controlscan.com Visit Us At: https://www.controlscan.com/security-threat-management-research-report/ https://www.controlscan.com/blog https://www.pcicomplianceguide.org Be Social With Us! © ControlScan 2017