Security intelligence: solving the puzzle for actionable insight

Slides:



Advertisements
Similar presentations
14 September Digital Investigations With the proliferation of devices, do organisations really know where their most sensitive data is held? Companies.
Advertisements

1© Copyright 2011 EMC Corporation. All rights reserved. The Future of the Advance Soc 3rd Annual Privacy, Access and Security Congress, Ottawa, 2012 Mike.
Digital Investigations of Any Kind ONE COMPANY Cyber Intelligence Response Technology (CIRT)
Security intelligence: solving the puzzle for actionable insight Fran Howarth Senior analyst, security Bloor Research.
Introducing WatchGuard Dimension. Oceans of Log Data The 3 Dimensions of Big Data Volume –“Log Everything - Storage is Cheap” –Becomes too much data –
The Most Analytical and Comprehensive Defense Network in a Box.
© 2015 Cisco and/or its affiliates. All rights reserved. 1 The Importance of Threat-Centric Security William Young Security Solutions Architect It’s Our.
Cyber Security Discussion Craig D’Abreo – VP Security Operations.
IT-Partners Limited © 2011 IT Partners Limited Y OUR IT SOLUTION P ARTNERS Managing Director Confidential Data Loss Prevention Sunny Ho 1.
Telling the right story Confidential © Bloor Research 2010 …optimise your IT investments Click to edit Master subtitle style Malware—taking protection.
11 Canal Center Plaza, Alexandria, VA T F Enterprise Computing Conference (ECC) Workshop Alma R. Cole,
The Most Analytical and Comprehensive Defense Network in a Box.
Alert Logic Security and Compliance Solutions for vCloud Air High-level Overview.
The Changing World of Endpoint Protection
Where in the world is your data? Data Breach Analysis Angelbeat Seminar Billy Austin, President iScan Online, Inc.
PAGE Intelligence Meets Vulnerability Management NYC ISSA January 24, 2013.
Alert Logic Security and Compliance Solutions for vCloud Air High-level Overview.
Ali Alhamdan, PhD National Information Center Ministry of Interior
Nexthink V5 Demo Security – Malicious Anomaly. Situation › Avoid damage resulting from the incident itself and the cost of the unplanned response › Protection.
Take back control: taming rogue device, user and application exposures Mark Blake, Capita Secure Managed Services Chris Gothard, Colt Technology Services.
1© Copyright 2014 EMC Corporation. All rights reserved. Applying the Power of Data Analytics to Cyber Security Dr. Robert W. Griffin Chief Security Architect.
Brandon Traffanstedt Systems Engineer - Southeast
BUFFERZONE Advanced Endpoint Security Data Connectors-Charlotte January 2016 Company Confidential.
Cognitive & Organizational Challenges of Big Data in Cyber Defence. YALAVARTHI ANUSHA 1.
Rapid Detection & Incident Response What, Why and How March 2016 Ft Gordon.
ARAMA TECH D A T A P R O T E C T I O N P R O F E S S I O N A L S VISION & STRATEGY.
2© Copyright 2013 EMC Corporation. All rights reserved. Cyber Intelligence Fighting Cyber Crime Insert Event Date LEADERS EDGE.
1 Current Trends in Enterprise IT Network Security Key Takeaways Based on 100 Survey Responses © 2016 Lumeta Corporation.
Contextual Security Intelligence Suite™ Preventing Data Breaches without Constraining Business.
Trusting your organisation UK Card Fraud Conference 2012 Keith Dewey, 28 March 2012.
Why SIEM – Why Security Intelligence??
Welcome Information Security Office Services Available to Counties Security Operations Center Questions.
Vulnerability / Cybersecurity Research Discussion Dwayne Melancon, CISA Chief Technology Officer and VP of Research & Development.
AUTONOMIC COMPUTING B.Akhila Priya 06211A0504. Present-day IT environments are complex, heterogeneous in terms of software and hardware from multiple.
Loss Prevention, Auditing & Safety Conference 2009 Title Sponsor:
FROM SECURITY DATA TO SECURITY INTELLIGENCE ZULFIKAR RAMZAN, CTO, RSA.
Tripwire Threat Intelligence Integrations. 2 Threat Landscape by the Numbers Over 390K malicious programs are found every day AV-Test.org On day 0, only.
Surveillance and Security Systems Cyber Security Integration.
Advanced Endpoint Security Data Connectors-Charlotte January 2016
Sophos Intercept X Matt Cooke – Senior Product Marketing Manager.
Your Partner for Superior Cybersecurity
Comprehensive Security and Compliance at an Affordable Price.
Juniper Software-Defined Secure Network
Proactive Attack Prevention and Detection
Hybrid Management and Security
Real-time protection for web sites and web apps against ATTACKS
6/19/2018 2:57 AM THR3092 Monitor and investigate actions on your user and data with alerts, insights and reports Binyan Chen Program Manager II, Office.
Active Cyber Security, OnDemand
Rules of Thumb to Mathematical Rule- A Cyber Security Journey
KELA Targeted Cyber Intelligence
SECURITY INFORMATION AND EVENT MANAGEMENT
Prevent Costly Data Leaks from Microsoft Office 365
THE NEXT GENERATION MSSP
Detecting and Mitigating Threats: The Evolving Threat Landscape in the GCC
Healthcare Cloud Security Stack for Microsoft Azure
cyberopsalliance.com |
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Best Practices in Cyber Security Maggy Powell Senior Manager Real-Time Systems Security Exelon 21 March 2018.
PROACTIVE SNOOPING ANALYSIS
Securing the Threats of Tomorrow, Today.
Brandon Traffanstedt Systems Engineer - Southeast
CRITICAL INFRASTRUCTURE CYBERSECURITY
Panda Adaptive Defense Platform and Services
Healthcare Cloud Security Stack for Microsoft Azure
Case Study 1: Security Considerations
4/9/ :42 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Best Practices in Cyber Security Maggy Powell Senior Manager Real-Time Systems Security Exelon 26 September 2018.
Cyber Security in a Risk Management Framework
Microsoft Data Insights Summit
AIR-T11 What We’ve Learned Building a Cyber Security Operation Center: du Case Study Tamer El Refaey Senior Director, Security Monitoring and Operations.
Presentation transcript:

Security intelligence: solving the puzzle for actionable insight Fran Howarth Senior analyst, Security Bloor Research

“It is not if, but when and how often” The situation today “It is not if, but when and how often” $ Targeted Sophisticated Well-resourced

Today’s security imperative Prevention Detection Response

Prevention alone is not enough Detection Response

Impact of malicious breaches

Detection is the new imperative Prevention Detection Response

Malicious breaches take time to discover

From detection to containment

Where remediation falls short Prevention Detection Response

Time taken to resolve a breach

The role of security intelligence platforms

Most cost-effective security tools

Core capabilities Actionable intelligence Forensics Log management and analysis Advanced analytics Continuous monitoring Automated remediation Forensics Actionable intelligence

Sample use cases Advanced threat management Compliance management Continuous monitoring Forensic investigation Fraud detection Insider threat detection Monitoring of remote facilities Network behaviour anomaly detection Support for multiple locations Web application defence