Cyber Defense Matrix Cyber Defense Matrix Identify – inventorying assets and vulnerabilities, measuring attack surface, baselining normal, risk profiling Protect – preventing or limiting impact, patching, containing, isolating, hardening, managing access, vuln remediation Recover – returning to normal operations, restoring services, documenting lessons learned Detect – discovering events, triggering on anomalies, hunting for intrusions, security analytics Respond – acting on events, eradicating intrusion, assessing damage, coordinating response, forensics Cyber Defense Matrix Keep this handy while visiting the Expo Hall Send a copy to: sounil@gmail.com with some vendor names filled in Questions? Tweet me @sounilyu Devices - workstations, servers, phones, tablets, IoT, peripherals, storage, network devices, cameras, infrastructure devices Applications - software, interactions, and application flows on the devices Network - connections and traffic flowing among devices and applications Data - Information residing on, traveling through, or processed by the resources listed above Users – The people using the resources listed above Identify – inventorying assets and vulnerabilities, measuring attack surface, baselining normal, risk profiling Protect – preventing or limiting impact, patching, containing, isolating, hardening, managing access, vuln remediation Recover – returning to normal operations, restoring services, documenting lessons learned Detect – discovering events, triggering on anomalies, hunting for intrusions, security analytics Respond – acting on events, eradicating intrusion, assessing damage, coordinating response, forensics Technology People Process Degree of Dependency Cyber Defense Matrix Keep this handy while visiting the Expo Hall Send a copy to: sounil@gmail.com with some vendor names filled in Questions? Tweet me @sounilyu Devices - workstations, servers, phones, tablets, IoT, peripherals, storage, network devices, cameras, infrastructure devices Applications - software, interactions, and application flows on the devices Network - connections and traffic flowing among devices and applications Data - Information residing on, traveling through, or processed by the resources listed above Users – The people using the resources listed above Technology People Process Degree of Dependency
Extended Cyber Defense Matrix Threat Actor Assets Vendor Assets Cloud Access Security Brokers Malware Sandboxes Customer Assets Man-in-the Middle, Man-in-the-Browser Detection and Mitigation Threat Intelligence Third Party Assessments Employee Assets Extended Cyber Defense Matrix Keep this handy while visiting the Expo Hall Send a copy to: sounil@gmail.com with some vendor names filled in. Questions? Tweet me @sounilyu Customer Profiling, Digital Fingerprinting, Bot Detection BYOD, MDM, MAM, EMM Threat Actor Assets Vendor Assets Customer Assets Employee Assets Third Party Assessments Man-in-the Middle, Man-in-the-Browser Detection and Mitigation BYOD, MDM, MAM, EMM Cloud Access Security Brokers Threat Intelligence Malware Sandboxes Extended Cyber Defense Matrix Keep this handy while visiting the Expo Hall Send a copy to: sounil@gmail.com with some vendor names filled in. Questions? Tweet me @sounilyu Customer Profiling, Digital Fingerprinting, Bot Detection