WEBINAR Exterminate Your Bugs With Vulnerability Management

Slides:



Advertisements
Similar presentations
1© Copyright 2011 EMC Corporation. All rights reserved. The Future of the Advance Soc 3rd Annual Privacy, Access and Security Congress, Ottawa, 2012 Mike.
Advertisements

© 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential 14854_10_2008_c1 1 Holistic Approach to Information Security Greg Carter, Cisco Security.
A Federated Approach to Systems Management Todd Nugent Mike Huffstatler Sr. Product Specialist Systems Engineer.
© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Security Services Svetlana.
Demonstrating IT Relevance to Business Aligning IT and Business Goals with On Demand Automation Solutions Robert LeBlanc General Manager Tivoli Software.
Get Complete IT Compliance: Reduce Risk and Cost Jonathan CISO, Qualys Seth Automation Specialist, BMC.
Website Hardening HUIT IT Security | Sep
Lean and (Prepared for) Mean: Application Security Program Essentials Philip J. Beyer - Texas Education Agency John B. Dickson.
SEC835 Database and Web application security Information Security Architecture.
Dell Connected Security Solutions Simplify & unify.
EEye Digital Security    On the Frontline of the Threat Landscape: Simple configuration goes a long way.
Automating Enterprise IT Management by Leveraging Security Content Automation Protocol (SCAP) John M. Gilligan May, 2009.
Auditing IT Vulnerabilities IT vulnerabilities are weaknesses or exposures in IT assets or processes that may lead to a business risk or security risk.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Rob Davidson, Partner Technology Specialist Microsoft Management Servers: Using management to stay secure.
MANAGED SECURITY TESTING PROACTIVELY MANAGING VULNERABILITIES.
Copyright © 2015 Centrify Corporation. All Rights Reserved. 1 Company Overview & Strategy Lance McAndrew Product Line Sales Engineer.
Infrastructure for the People-Ready Business. Presentation Outline POINT B: Pro-actively work with your Account manager to go thru the discovery process.
1 Current Trends in Enterprise IT Network Security Key Takeaways Based on 100 Survey Responses © 2016 Lumeta Corporation.
1© Copyright 2012 EMC Corporation. All rights reserved. Next Generation Authentication Bring Your Own security impact Tim Dumas – Technology Consultant.
Webinar The Business Impact Of Mobile Engagement Ted Schadler Vice President and Principal Analyst Coauthor of Empowered December 13, Please call.
Defining your requirements for a successful security (and compliance
Increasing Information and Data Security in Today’s Cybersecurity World 2017 Conference Review 6/6/2017.
Your Partner for Superior Cybersecurity
Shadow Brokers – Details on Leaked Cyberintelligence Tools and Vulnerabilities A brief research note for Info-Tech’s members.
3 Do you monitor for unauthorized intrusion activity?
WEBINAR Managing The Data Explosion: Forrester’s Business Intelligence And Analytics Software Forecast Boris Evelson, Vice President, Principal Analyst.
Distributed Asset Management Making The Business Case
Transforming business
The Game has Changed… Ready or Not! Andrew Willetts Technologies, Inc.
Lessons Learned: Implementing a Vulnerability Management Program
WEBINAR The Total Economic Impact Of Software-As-A-Service
Hybrid Management and Security
Real-time protection for web sites and web apps against ATTACKS
How Enterprise Social Listening Platforms Enable Insights Across The Organization
WEBINAR The Rise Of Insights Services
Webinar Optimize Your Business Applications Strategy
What if tomorrow never comes
Webinar Test Drive! Forrester’s US Mobile Auto Insurance Rankings
Speaker’s Name, SAP Month 00, 2017
COMPTIA CAS-003 Dumps VCE
Microsoft 365 – Make it real with GTM Accelerators
Making Information Security Manageable with GRC
Company Overview & Strategy
Healthcare Cloud Security Stack for Microsoft Azure
Making Information Security Actionable with GRC
Cyber Exposure – The Next Frontier
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Shifting from “Incident” to “Continuous” Response
Skybox Cyber Security Best Practices
Cybersecurity Special Public Meeting/Commission Workshop for Natural Gas Utilities September 27, 2018.
Security Essentials for Small Businesses
Securing the Threats of Tomorrow, Today.
Holistic Approach to Information Security
Panda Adaptive Defense Platform and Services
William Band, Vice President, Principal Analyst
Healthcare Cloud Security Stack for Microsoft Azure
Dan Bieler, Principal Analyst
Healthcare Cloud Security Stack for Microsoft Azure
Cyber Risk & Cyber Insurance - Overview
Healthcare Cloud Security Stack for Microsoft Azure
Windows 10 Enterprise subscriptions in CSP – Messaging Summary
1 5 Identify Connect Leverage MOBILE-READY SINGLE PLATFORM
SERVICENOW GOVERNANCE, RISK, AND COMPLIANCE
Managing IT Risk in a digital Transformation AGE
3 Do you monitor for unauthorized intrusion activity?
Healthcare Cloud Security Stack for Microsoft Azure
Healthcare Cloud Security Stack for Microsoft Azure
V1.1 1.
3 Do you monitor for unauthorized intrusion activity?
Presentation transcript:

WEBINAR Exterminate Your Bugs With Vulnerability Management Rick Holland, Principal Analyst Kelley Mak, Researcher June 11, 2015. Call in at 10:55 a.m. Eastern time

Image source: Flickr (https://www.flickr.com/)

Image source: Flickr (https://www.flickr.com/)

Agenda The struggle is real. The threat landscape doesn’t help. Re-evaluate vulnerability management. You need continuous monitoring. Exploring the vulnerability management market

All aboard the struggle bus

But compliance . . .

Too many vulnerabilities, not enough time

Get your priorities straight! Image source: YouTube (https://www.youtube.com/)

CVSS only? SMH Results from the study: 94% to 95% of vulnerability should be skipped. Patching high/medium with exploits in exploit kits (Metasploit) improves efforts by 62.81%. Patching high/medium with proof-of-concept exploits from white hats improves efforts by 19.64%. Patching just high/medium improves efforts by 3.2%.

Image source: National Vulnerability Database (https://nvd.nist.gov/)

We are supposed to be a unit Image source: Flickr (https://www.flickr.com/)

But what should we be worried about?

The age of the customer A 20-year business cycle in which the most successful enterprises will reinvent themselves to systematically understand and serve increasingly powerful customers

The age of the customer Source: October 10, 2013, “Competitive Strategy In The Age Of The Customer” Forrester report

Breach costs continue to rise 23% Increase in the total cost of a data breach $3.7 million Average total cost of a data breach Source: “2015 Cost of Data Breach Study: Global Analysis,” Ponemon Institute, May 2015

Targeted attacks outpace broad attacks Image source: CyberFactors (http://cyberfactors.com/)

There’s a bug in your pocket Employees work outside of the corporate at least a few times a month. 61% 43% 31% Source: Forrester’s Global Business Technographics® Telecommunications And Mobility Workforce Survey, 2015

Don’t let your cloud drift away Configuration management Governance

Hyperconnected IoT increases risks 1011101010011110101001100001011101 Thin g Thing 3 1 2

The vulnerability management life cycle

Traditional vulnerability scanning Tactical and little value Vulnerability counting Infrastructure focus Checkbox security Image source: Flickr (https://www.flickr.com/)

Discover What should I scan? How often? How about credentialed scans?

It’s all about the data! Do you know what your high-risk data (and assets) are? If you cannot triage based off data value, you will have a garbage-in/garbage-out scenario.

Data security and control framework Source: June 5, 2014, “The Future Of Data Security: A Zero Trust Approach” Forrester report

No more scanning in silos Complete picture Infrastructure Database Web application

Assess How do I make sense of this information? How do I prioritize? How does this relate to my organization?

Forrester’s Prioritized Patching Process (P3) Source: November 11, 2013, “Introducing Forrester’s Prioritized Patching Process (P3)” Forrester report

Report How do I communicate these results? How do I work with my counterparts in the organization?

Reduce the friction Communication Automated workflow Ticketing systems Validation scanning Collaboration tools

Image source: Flickr (https://www.flickr.com/)

Remediate What are the target metrics for remediation? What constitutes a successful VM program?

Track what matters You can’t manage what you don’t measure. Track effort required for the operation of the VM solution as well as operational remediation. During post incident after action reviews, reconcile the VM program policies associated with compromised assets. Base metrics upon priority of asset. Tie it back to the business.

Validate What’s next? Am I done?

Adopt continuous monitoring Don’t think of CM as a requirement for federal agencies. CM is real-time visibility into the risks of your company’s assets. Move beyond snapshot/periodic assessment of risk. Evaluate continuous monitoring options, whether passive or agent- based.

The scanner days are behind us . . . Vulnerability management market trends: Scanners are commoditized. Vendors are collapsing the scanning stack. To vulnerability management and beyond! Vulnerability management needs to address the new digital age.

Integration and orchestration Source: January 7, 2015, “Forrester’s Targeted-Attack Hierarchy Of Needs: Assess Your Core Capabilities” Forrester report

Attack path modeling These tools help S&R pros map network topology to understand vulnerable systems based on attack paths within the environment. Example vendors: Core Security, RedSeal Networks, and Skybox Security

Governance, risk, and compliance Integration with GRC platforms brings enriched business context, workflow, and risk analysis. Example vendors: RSA Archer, LogicManager, Modulo Security, and Rsam

Remediation automation Workflow tools help S&R and I&O pros communicate and close the loop on vulnerabilities. Example vendors: BMC Software and ServiceNow

Penetration testing Incorporate the results of penetration testing into your vulnerability management. Commercial products: Core Security (Core Impact), Immunity (Canvas), and Rapid7 (Metasploit) Consulting services: Digital Defense, NopSec, and Synack

Key criteria for evaluating VM Evaluation criteria Network device coverage Asset discovery and classification Vulnerability information Distributed scanning and scalability/flexibility Mobile/cloud scanning Application-level scanning Unified infrastructure with web application and database scanning Prioritization Deployment models Remediation and integrations Administration and reporting

Next steps: Optimize remediation Know your data. Identify and protect your toxic data. Implement data discovery and data classification. Understand the business. Know your adversary. Focus efforts on areas that deserve the most attention based on adversary intelligence. Look at managed services. Managed services can lift the burden off of security operations. Leverage managed services for IT operations if a relationship is already there.

Rick Holland +1 469.221.5359 rholland@forrester.com Kelley Mak +1 212.857.0789 kmak@forrester.com