Vice President of Products and Global Marketing, RiskSense, Inc.

Slides:



Advertisements
Similar presentations
Security Life Cycle for Advanced Threats
Advertisements

Cisco Confidential 1 © 2010 Cisco and/or its affiliates. All rights reserved. Next Generation Monitoring in Cisco Security Cloud Leon De Jager and Nitin.
A Covenant University Presentation By Favour Femi-Oyewole, BSc, MSc (Computer Science), MSc (Information Security) Certified COBIT 5 Assessor /Certified.
16254_08_2002 © 2002, Cisco Systems, Inc. All rights reserved. Cisco’s Security Vision Mario Mazzola Chief Development Officer August 29, 2002.
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Building Your Security Strategy with 3D.
1 Deployment of Computer Security in an Organization CE-408 Sir Syed University of Engineering & Technology 99-CE-282, 257 & 260.
Dell Connected Security Solutions Simplify & unify.
©2014 Bit9. All Rights Reserved Endpoint Threat Prevention Charles Roussey | Sr. Sales Engineer Detection and Response in Seconds.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
1 CISCO SAFE: VALIDATED SECURITY REFERENCE ARCHITECTURE What It Is Business Transformation Top Questions To Ask To Initiate The Sale Where It Fits KEY.
The Changing World of Endpoint Protection
Network security Product Group 2 McAfee Network Security Platform.
Copyright © 2014 Juniper Networks, Inc. 1 Juniper Unite Cloud-Enabled Enterprise Juniper’s Innovation in Enterprise Networks.
Nov 22/26 Tech Forum 2015 Roberto Trinconi Cloud the New Path to the Business Leadership.
Connected Security Your best defense against advanced threats Anne Aarness – Intel Security.
The cost of Cybercrime 1 Steve Lamb Regional Marketing Manager – EMEA, Enterprise Security Products Twitter: actionlamb.
Part 1: Corporate Operational benefits, Non-technical information for FSOs and ISSMs/ISSOs Part 2: Technical Tips on how to conduct a better audit review.
IS3220 Information Technology Infrastructure Security
Infrastructure for the People-Ready Business. Presentation Outline POINT B: Pro-actively work with your Account manager to go thru the discovery process.
1Copyright © 2015 Blue Coat Systems Inc. All Rights Reserved. BLUE COAT SYSTEMS CORPORATE OVERVIEW May 2015.
©2015 Check Point Software Technologies Ltd. 1 [Restricted] ONLY for designated groups and individuals CHECK POINT MOBILE THREAT PREVENTION.
CLOSE THE SECURITY GAP WITH IT SOLUTIONS FROM COMPUTACENTER AND CISCO AUGUST 2014.
Welcome Information Security Office Services Available to Counties Security Operations Center Questions.
Small Business Solutions Copyright 2014 Trend Micro Inc.
Mobile Security Solution Solution Overview Check Point Mobile Threat Prevention is an innovative approach to mobile security that detects and stops advanced.
1© Copyright 2012 EMC Corporation. All rights reserved. Next Generation Authentication Bring Your Own security impact Tim Dumas – Technology Consultant.
CAMPUS LAN DESIGN GUIDE Design Considerations for the High-Performance Campus LAN.
Tripwire Threat Intelligence Integrations. 2 Threat Landscape by the Numbers Over 390K malicious programs are found every day AV-Test.org On day 0, only.
Protect your Digital Enterprise
2017 Security Predictions from FortiGuard Labs
Your Partner for Superior Cybersecurity
IoT Security Part 2, The Malware
OIT Security Operations
Stop Cyber Threats With Adaptive Micro-Segmentation
Comprehensive Security and Compliance at an Affordable Price.
FORCEPOINT Moving Your Business Forward Without Fear
AT&T Premises-Based Firewall Enhanced SBS Solution
“Introduction to Azure Security Center”
The Game has Changed… Ready or Not! Andrew Willetts Technologies, Inc.
Hybrid Management and Security
Business At the Speed of Cyber
Real-time protection for web sites and web apps against ATTACKS
Director of Sales Engineering, RiskSense, Inc.
Best Practices for Securing Hybrid Clouds
Advanced Borderless Network Architecture Sales Exam practice-questions.html.
Forensics Week 11.
Matt G change over point ?
BOMGAR REMOTE SUPPORT Karl Lankford
CompTIA CAS-003 Exam Study Material - CompTIA CAS-003 Exam Dumps Realexamdumps.com
Virtual Private Network (VPN) Market
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fuel Cell Market size worth $25.5bn by 2024 Dynamic Application Security.
Company Overview & Strategy
Building a Security Operations Center
Technology Management- A CIO Perspective
Securing Cloud-Native Applications Jason Schmitt CEO
Healthcare Cloud Security Stack for Microsoft Azure
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Check Point Connectra NGX R60
Shifting from “Incident” to “Continuous” Response
Securing the Internet of Things: Key Insights and Best Practices Across the Industry Theresa Bui Revon IoT Cloud Strategy.
Securing the Threats of Tomorrow, Today.
Brandon Traffanstedt Systems Engineer - Southeast
Secure once, run anywhere Simplify your security with Sophos
Healthcare Cloud Security Stack for Microsoft Azure
Sachiko A. Kuwabara, PhD, MA
Demystifying the Cloud
IT Management Services Infrastructure Services
Strengthening the GDPR business opportunity with Microsoft 365
The Intelligent Enterprise and SAP Business One
AIR-T11 What We’ve Learned Building a Cyber Security Operation Center: du Case Study Tamer El Refaey Senior Director, Security Monitoring and Operations.
Presentation transcript:

Vice President of Products and Global Marketing, RiskSense, Inc. Best Practices Revealed: A Blueprint for a Modern Enterprise Security Program Dr. Torsten George Vice President of Products and Global Marketing, RiskSense, Inc.

Total IT Security Spend +26.1% $116 billion $92 billion +19.6% +8.2% $76.9 billion $71.1 billion +7.9% $65.9 billion 2013 2014 2015 2016 2019 Source: Gartner, Gartner Says Worldwide Information Security Spending Will Grow Almost…, August 2014; Gartner Summit, June 2016 2

Cyber Reality Check Source: http://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/; as of April 25, 2017 3

A Growing Attack Surface Public Internet VPN Mobile Workers Mobile Connectivity Email and Web Traffic Web Properties Headquarters Munich Branch Office Cloud Deployments- Amazon Web Services, Google, MS Azure Partner, Contractor Access- Environmental Controls, POS, CRM Remote Offices Third-Party Datacenter Applications Mobile Phone Smart Watch Tablet Appliances Security Systems Google TV Apple TV Netflix Gaming Systems Engine computer Wi-Fi Bluetooth Vendor Supply Chain Computer Lights GPS Entertainment Paris Branch Office 4

Manual Data Aggregation Today’s Cyber Security Challenges + + + + Silo-Based Security Tools A Growing Attack Surface Manual Data Aggregation and Analysis Lack of Context Reactive Mitigation 5

Today’s Cyber Security Approach 6

Network layer is primary defense perimeter Cyber Security Limitations | One Dimensional Network layer is primary defense perimeter 7

Source: Verizon 2016 Data Breach Report Fact Check: Cyber Risk is Everywhere Source: Verizon 2016 Data Breach Report 8

Source: RiskSense Research Center Cyber Security Limitations | NVD-Focus Source: RiskSense Research Center 9

Source: Verizon 2016 Data Breach Report Fact Check: Time-to-Remediation Matters Source: Verizon 2016 Data Breach Report 10

Today’s Cyber Security Limitations | CVE-Focus 10 9 Scanner Reported CVVS 8 Threat-Contextualized Severity Score 7 6 POODLE Vulnerability 5 Severity 4 3 2 1 50,000 100,000 150,000 200,000 250,000 300,000 Vulnerability Count 11

Emerging Market Requirements The ongoing skills and expertise shortage, and increasing escalation in the threat activity, will hasten the move to full and semi-automation of operational activities. To enable a truly adaptive and risk-based response to advanced threats, the core of a next-generation security protection process will be continuous, pervasive monitoring, and visibility that are constantly analyzed for indications of compromise. Enterprise monitoring should be pervasive and encompass as many layers of the IT stack as possible, including network activity, endpoints, system interactions, application transactions and user activity monitoring. Source: Gartner, Designing an Adaptive Security Architecture for Protection from Advanced Attacks, January 2016 Gartner, Innovation Tech Insight for Security Operations, Analytics and Reporting, November 2015 12

Action vs. Reaction LEADING LAGGING Cyber Risk Management Proactive Vulnerability • Configuration • Network • Policy • Proactive Reactive Attack 13

Cyber Risk vs. Threat and Vulnerability Management 14

An Intelligence-Driven Approach 15

Identify and Prioritize Risk-based prioritization Contextualized with external threat data (e.g., malware) 16

Analyze | Asset and Organizational Level Security Score Methodology (RS3) CVE CWE OWASP Database Vulnerabilities Exploit Malware CVVS Default Passwords Proof of Concept IP Reputation IP-Based Accessibility Firewall Rules User-Specific Business Criticality Business Criticality from Asset Management System 17

Visualize 18

Cover Network, Applications, and Databases Cyber risk score for a system, consisting of applications, databases, and network components.

Visualization of application attack path analysis Analyze | Application Layer Visualization of application attack path analysis 20

Assign tickets and trigger pre-defined workflows Orchestrate Assign tickets and trigger pre-defined workflows 21

Pro-Active Cyber Risk Management | Benefits Shortens Time-to- Remediation Increases Operational Efficiency Strengthens Security Programs Improves Cyber Hygiene Minimizes Cyber Risks 22

One of the nation’s largest universities was able to Success Stories One of the nation’s largest universities was able to Testimonials: “RiskSense lets us cut the data and take a different view and helps us prioritize what we should be working on. That’s where we really found a lot of value.” – CISO, Fortune 200 Telecom Company 23

Questions and Answers Session Okay, are there any questions? 24

RiskSense | Who We Are Pioneer in a $2.5 billion market Privately held with investments from Paladin Capital, Sun Mountain Capital, EPIC Venture, Jump Capital, and CenturyLink Growing 50+% year-over-year since 2013 Software-as-a-Service and Managed Services business model 150+ customers Close to 100 employees Offices in Albuquerque, NM and in Sunnyvale, CA Research, innovation-driven 25

The Solution | The RiskSense Platform 26

DON’T REACT TO ATTACKS. BE PRO-ACTIVE! Contact RiskSense at +1 505.217.9422 • info@risksense.com 27