Enterprise security How to bring security transparency into your organization ISSA EDUCATIONAL SESSION Nicklaus Schleicher, VP Support & Customer Service.

Slides:



Advertisements
Similar presentations
Presented by Nikita Shah 5th IT ( )
Advertisements

The Whole/Hole of Security Public (DoD) v. Corporate Carl Bourland US Army Judge Advocate Generals Corps.
The Threat Within September Copyright © 2004 Q1 Labs. All Rights Reserved Agenda Customer Pain Industry Solutions Network Behavior Enforcement Example.
BalaBit Shell Control Box
© 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential 14854_10_2008_c1 1 Holistic Approach to Information Security Greg Carter, Cisco Security.
1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
Presentation by: Peter Thomas Blue Lance, Inc Using SIEM Solutions Effectively to meet Security, Audit, and Compliance Requirements.
ETrust End to End Security Management Bernd Dultinger Sales Manager South CEE & Turkey.
ISecurity Complete Product Series For System i. About Raz-Lee Internationally renowned System i solutions provider Founded in 1983; 100% focused on System.
Persistent Protection Using E-DRM Technology Jason Fasoo 06/18/2008.
Managing A Secure Infrastructure – Tales From the Trenches November 6, 2003.
Cyber Security Discussion Craig D’Abreo – VP Security Operations.
Security Controls – What Works
Information Security Policies and Standards
The State of Security Management By Jim Reavis January 2003.
Boost your network security with NETASQ Vulnerability Manager.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
 Controls that provide security against internal and external threats  2 Types of access controls: › Physical controls › Logical controls.
Rethinking Security to Enable Business LJ Johnson Nike’s Global Information Security Officer August 16, 2005.
Network Access Management Trends in IT Applications for Management Prepared by: Ahmed Ibrahim S
Stephen S. Yau CSE , Fall Security Strategies.
Network Security. Trust Relationships (Trust Zones) High trust (internal) = f c (once you gain access); g p Low trust ( ) = more controls; fewer privileges.
Network security policy: best practices
Enterprise Security. Mark Bruhn, Assoc. VP, Indiana University Jack Suess, VP of IT, UMBC.
CISCO CONFIDENTIAL – DO NOT DUPLICATE OR COPY Protecting the Business Network and Resources with CiscoWorks VMS Security Management Software Girish Patel,
Presented by INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used?
Skybox® Security Solutions for Symantec CCS Comprehensive IT Governance Risk and Access Compliance Management Skybox Security's.
Information Security Compliance System Owner Training Richard Gadsden Information Security Office Office of the CIO – Information Services Sharon Knowles.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
1 Deployment of Computer Security in an Organization CE-408 Sir Syed University of Engineering & Technology 99-CE-282, 257 & 260.
Unify and Simplify: Security Management
HIPAA COMPLIANCE WITH DELL
What Keeps You Awake at Night Compliance Corporate Governance Critical Infrastructure Are there regulatory risks? Do employees respect and adhere to internal.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Dell Connected Security Solutions Simplify & unify.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Compliance Management Platform ™. Compliance Management Platform Compliance is the New Marketing – Position yourself to thrive in the new regulatory and.
Chapter 6 of the Executive Guide manual Technology.
1 CISCO SAFE: VALIDATED SECURITY REFERENCE ARCHITECTURE What It Is Business Transformation Top Questions To Ask To Initiate The Sale Where It Fits KEY.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
Unit 6b System Security Procedures and Standards Component 8 Installation and Maintenance of Health IT Systems This material was developed by Duke University,
1 © 2001, Cisco Systems, Inc. All rights reserved. Cisco Info Center for Security Monitoring.
OCTAVE-S on TradeSolution Inc.. Introduction Phase 1: Critical Assets and threats Phase 2: Critical IT Components Phase 3: Changes Required in current.
IS Network and Telecommunications Risks Chapter Six.
Knowing What You Missed Forensic Techniques for Investigating Network Traffic.
The Real Deal With SIM/SEM The Promise of Security Information / Event Management Scott Sidel Sr. Security Manager Computer Sciences Corp.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
What Can Go Wrong During a Pen-test? Effectively Engaging and Managing a Pen-test.
Identity Assurance Emory University Security Conference March 26, 2008.
Scott Charney Cybercrime and Risk Management PwC.
INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used? Tripwire.
1 OFF SYMB - 12/7/2015 Firewalls Basics. 2 OFF SYMB - 12/7/2015 Overview Why we have firewalls What a firewall does Why is the firewall configured the.
© 2008 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks of AT&T Intellectual Property. Cyber Security and the National.
Security Snapshot Assessment Maximizing Return on Security Investment What assets do we have? What is running on those assets? What is our risk level?
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Chapter 3 Pre-Incident Preparation Spring Incident Response & Computer Forensics.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
GRC: Aligning Policy, Risk and Compliance
1 Current Trends in Enterprise IT Network Security Key Takeaways Based on 100 Survey Responses © 2016 Lumeta Corporation.
Microsoft 365 Security and Compliance: Training and Resources
Cybersecurity - What’s Next? June 2017
Comprehensive Security and Compliance at an Affordable Price.
Team 1 – Incident Response
Cyber Security Enterprise Risk Management: Key to an Organization’s Resilience Richard A. Spires CEO, Learning Tree International Former CIO, IRS and.
Company Overview & Strategy
Identity & Access Management
Microsoft Data Insights Summit
Presentation transcript:

Enterprise security How to bring security transparency into your organization ISSA EDUCATIONAL SESSION Nicklaus Schleicher, VP Support & Customer Service

Enterprise security Consul  17 years of security event management experience  Winner of ISSA Organization of the Year in 2003  Founded in 1986  Worldwide presence: –US, –Europe, –Asia-Pacific, –Latin America

Enterprise security Security landscape is changing  Disappearing perimeter  More complex security devices  Heterogeneous networks  Information overload  Not enough resources  Increasing threats  Regulatory requirements  Cost pressure

Enterprise security What are customers saying  Make their security operations more efficient  Gain a holistic understanding of their overall security  Comply with regulations  Make sense out of the chaos that is a large network  Respond more quickly and intelligently to problems  Monitor and enforce business-critical policies  Conduct more effective post-event forensics and analysis  Move from auditing to monitoring

Enterprise security It’s all about Value Suppose you could protect your most valuable business assets at the lowest cost? Wouldn’t you want to know how?

Enterprise security It’s all about Your Critical Data Most security devices monitor the network perimeter. Yet key assets are on the less-protected inside. Is your core network adequately protected?

Enterprise security Lots of Products - Few Solutions Companies have invested heavily in firewalls, IDS, and AV systems, yet remain vulnerable to devastating attacks. What are you doing to continuously monitor security on your perimeter AND core networks?

Enterprise security Regulations are a worry Proliferating industry and regulatory standards raise the bar on implementing and demonstrating effective security. HIPAA, GLB, BS 7799, Basel II What is the value of effective compliance to regulations in your company?

Enterprise security The security infrastructure is in place Security Infrastructure Authorization Authentication Firewall / VPN Anti-Virus PKI OS Security Application Security Intrusion Detection Systems (IDS) Biometrics

Enterprise security But security remains a tradeoff More Openness Increased Security

Enterprise security Too many reports and alarms  From firewalls  From intrusion detection systems  From anti-virus systems  Many log files

Enterprise security Too few reports where it matters  Internal systems are not monitored enough: –Logging turned off or not understood –Reports have no real-world meaning  Comparison across systems impossible  Auditing versus company policy impossible Are you secure? “I don’t know”

Enterprise security Insiders remain a threat  Inside is as hostile as outside, but in a different way  64% of companies admit they suffer from security breaches  76% of all security breaches are due to insider work  70% of all corporate data still on mainframes

Enterprise security Security management process

Enterprise security Step one: define What’s the status?  Assess current enterprise security  Review policies  Benchmarking and gap analysis  Compliance to standards and regulations  Understand source of today’s vulnerabilities  Define metrics for success

Enterprise security Step two: protect Implementation of solution:  Implement policies  Define security procedures  Create awareness and communication  Establish administration and support roles

Enterprise security Step three: check How secure are we?:  Measure Compliance  Check for existing vulnerabilities  Modify policies and settings  Learn from intrusions and issues  Measure against metrics Security event management

Enterprise security Comprehensive approach

Enterprise security People system administrators managers finance human resource secretary on line customers / suppliers / partners hackers etc.

Enterprise security Technology operating system intrusion detection system firewalls business applications anti-virus software etc.

Enterprise security Security policy Who is allowed to do what kind of actions on what kind of documents in which period of time from which place and on which server?

Enterprise security Consul/eAudit Simplifying a complex environment…

Enterprise security Monitors output from over 50 platforms Evaluates security events, policy violations Real-time, intuitive view of network Prioritized, actionable alerts, drill-down reports Best practices baselines, HIPAA, GLB Extensive auditing, reporting and forensics Visualization, reporting and alerting Normalization and correlation Policy Consul/eAudit

Enterprise security Helping you lower the costs of security