Security intelligence: solving the puzzle for actionable insight Fran Howarth Senior analyst, security Bloor Research.

Slides:



Advertisements
Similar presentations
14 September Digital Investigations With the proliferation of devices, do organisations really know where their most sensitive data is held? Companies.
Advertisements

1© Copyright 2011 EMC Corporation. All rights reserved. The Future of the Advance Soc 3rd Annual Privacy, Access and Security Congress, Ottawa, 2012 Mike.
Digital Investigations of Any Kind ONE COMPANY Cyber Intelligence Response Technology (CIRT)
Introducing WatchGuard Dimension. Oceans of Log Data The 3 Dimensions of Big Data Volume –“Log Everything - Storage is Cheap” –Becomes too much data –
The Most Analytical and Comprehensive Defense Network in a Box.
WildPackets Confidential Security It’s more than Forensics January 2007 Sales Kick-off Jay Botelho, Senior Product Manager.
© 2015 Cisco and/or its affiliates. All rights reserved. 1 The Importance of Threat-Centric Security William Young Security Solutions Architect It’s Our.
Cyber Security Discussion Craig D’Abreo – VP Security Operations.
…optimise your IT investments Spreadsheet Management Maturity Model Philip Howard Research Director – Bloor Research.
© 2012 Solera Networks. Contains confidential, proprietary, and trade secret information of Solera Networks. Any use of this work without express written.
Bank Crime Investigation Techniques by means of Forensic IT
The Difficult Road To Cybersecurity Steve Katz, CISSP Security Risk Solutions Steve Katz, CISSP Security.
IT-Partners Limited © 2011 IT Partners Limited Y OUR IT SOLUTION P ARTNERS Managing Director Confidential Data Loss Prevention Sunny Ho 1.
Telling the right story Confidential © Bloor Research 2010 …optimise your IT investments Click to edit Master subtitle style Malware—taking protection.
11 Canal Center Plaza, Alexandria, VA T F Enterprise Computing Conference (ECC) Workshop Alma R. Cole,
The Most Analytical and Comprehensive Defense Network in a Box.
…optimise your IT investments Taming the device creep Fran Howarth, Bloor Research
Alert Logic Security and Compliance Solutions for vCloud Air High-level Overview.
The Changing World of Endpoint Protection
Where in the world is your data? Data Breach Analysis Angelbeat Seminar Billy Austin, President iScan Online, Inc.
PAGE Intelligence Meets Vulnerability Management NYC ISSA January 24, 2013.
Alert Logic Security and Compliance Solutions for vCloud Air High-level Overview.
Ali Alhamdan, PhD National Information Center Ministry of Interior
…optimise your IT investments Warehousing for low latency analytics Philip Howard Research Director – Bloor Research.
Nexthink V5 Demo Security – Malicious Anomaly. Situation › Avoid damage resulting from the incident itself and the cost of the unplanned response › Protection.
Yair Grindlinger, CEO and Co-Founder Do you know who your employees are sharing their credentials with? Do they?
Take back control: taming rogue device, user and application exposures Mark Blake, Capita Secure Managed Services Chris Gothard, Colt Technology Services.
Empowering Organisations to Thrive in the Face of Cyber Attacks An introduction to Resilient Systems Paul Ayers – General Manager, EMEA Chris Neely - Director.
NTT Com Security - Welcome to the “Attack Detection & Incident Response” Security Brunch Tom Hager Country Manager.
Brandon Traffanstedt Systems Engineer - Southeast
Connected Security Your best defense against advanced threats Anne Aarness – Intel Security.
BUFFERZONE Advanced Endpoint Security Data Connectors-Charlotte January 2016 Company Confidential.
Cognitive & Organizational Challenges of Big Data in Cyber Defence. YALAVARTHI ANUSHA 1.
Rapid Detection & Incident Response What, Why and How March 2016 Ft Gordon.
ARAMA TECH D A T A P R O T E C T I O N P R O F E S S I O N A L S VISION & STRATEGY.
2© Copyright 2013 EMC Corporation. All rights reserved. Cyber Intelligence Fighting Cyber Crime Insert Event Date LEADERS EDGE.
1 Current Trends in Enterprise IT Network Security Key Takeaways Based on 100 Survey Responses © 2016 Lumeta Corporation.
Contextual Security Intelligence Suite™ Preventing Data Breaches without Constraining Business.
Why SIEM – Why Security Intelligence??
Welcome Information Security Office Services Available to Counties Security Operations Center Questions.
1 | Company Confidential The Modern Cyber Threat Pandemic Cameron Erens LogRhythm.
1© Copyright 2012 EMC Corporation. All rights reserved. Next Generation Authentication Bring Your Own security impact Tim Dumas – Technology Consultant.
AUTONOMIC COMPUTING B.Akhila Priya 06211A0504. Present-day IT environments are complex, heterogeneous in terms of software and hardware from multiple.
Loss Prevention, Auditing & Safety Conference 2009 Title Sponsor:
Tripwire Threat Intelligence Integrations. 2 Threat Landscape by the Numbers Over 390K malicious programs are found every day AV-Test.org On day 0, only.
Advanced Endpoint Security Data Connectors-Charlotte January 2016
Sophos Intercept X Matt Cooke – Senior Product Marketing Manager.
Comprehensive Security and Compliance at an Affordable Price.
Juniper Software-Defined Secure Network
Proactive Attack Prevention and Detection
6/19/2018 2:57 AM THR3092 Monitor and investigate actions on your user and data with alerts, insights and reports Binyan Chen Program Manager II, Office.
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Behavior Analytics Market to surpass $3.5bn by 2024: Global Market Insights,
KELA Targeted Cyber Intelligence
SECURITY INFORMATION AND EVENT MANAGEMENT
Prevent Costly Data Leaks from Microsoft Office 365
Healthcare Cloud Security Stack for Microsoft Azure
cyberopsalliance.com |
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Best Practices in Cyber Security Maggy Powell Senior Manager Real-Time Systems Security Exelon 21 March 2018.
PROACTIVE SNOOPING ANALYSIS
Brandon Traffanstedt Systems Engineer - Southeast
CRITICAL INFRASTRUCTURE CYBERSECURITY
Panda Adaptive Defense Platform and Services
Healthcare Cloud Security Stack for Microsoft Azure
4/9/ :42 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Best Practices in Cyber Security Maggy Powell Senior Manager Real-Time Systems Security Exelon 26 September 2018.
Cyber Security in a Risk Management Framework
Microsoft Data Insights Summit
Security intelligence: solving the puzzle for actionable insight
AIR-T11 What We’ve Learned Building a Cyber Security Operation Center: du Case Study Tamer El Refaey Senior Director, Security Monitoring and Operations.
Presentation transcript:

Security intelligence: solving the puzzle for actionable insight Fran Howarth Senior analyst, security Bloor Research

telling the right story Confidential © Bloor Research

telling the right story Confidential © Bloor Research 2014 The situation today “It is not if, but when and how often” $ $$$ $ Targeted Sophisticated Well-resourced

telling the right story Confidential © Bloor Research 2014 Today’s security imperative PreventionDetectionResponse

telling the right story Confidential © Bloor Research 2014 Prevention alone is not enough PreventionDetectionResponse

telling the right story Confidential © Bloor Research 2014 Impact of malicious breaches

telling the right story Confidential © Bloor Research 2014 Detection is the new imperative PreventionDetectionResponse

telling the right story Confidential © Bloor Research 2014 Malicious breaches take time to discover

telling the right story Confidential © Bloor Research 2014 From detection to containment

telling the right story Confidential © Bloor Research 2014 Where remediation falls short PreventionDetectionResponse

telling the right story Confidential © Bloor Research 2014 Time taken to resolve a breach

telling the right story Confidential © Bloor Research 2014 The role of security intelligence platforms

telling the right story Confidential © Bloor Research 2014 Most cost-effective security tools

telling the right story Confidential © Bloor Research 2014 Core capabilities Log management and analysis Advanced analytics Continuous monitoring Automated remediation Forensics Actionable intelligence

telling the right story Confidential © Bloor Research 2014 Sample use cases Advanced threat management Compliance management Continuous monitoring Forensic investigation Fraud detection Insider threat detection Monitoring of remote facilities Network behaviour anomaly detection Support for multiple locations Web application defence