Security Track Day 1 Richard Stiennon Chief Research Analyst IT-Harvest Blog: ThreatChaos.com twitter.com/stiennon IT-Harvest Confidential
Blog: twitter.com/cyberwar IT-Harvest Confidential
The Week’s Agenda Today, August 2, 2010 What CXOs consistently fail to grasp about enterprise security Day 2 Getting beyond vulnerabilities; resilience in security architectures Day 3 Threat and risk management Day 4 Security and ROI Day 5 Data protection: strategies inside and outside the enterprise IT-Harvest Confidential
What CXOs consistently fail to grasp about enterprise security IT-Harvest Confidential 1. The difference between good security operations and good security Good security operations keep your IT functions working. They include the mundane tasks of maintaining logs, blocking viruses and worms, fixing vulnerabilities, and incident recovery as well as compliance and audit.
Three simple rules of good security IT-Harvest Confidential 1. Secure networks assume that hosts are hostile 2. Secure hosts assume the network is hostile 3. Secure applications assume the user is hostile
Why security investments never end Every new technology evolution increases productivity, access to information, and reliance on the network. It also exposes operations to new threats. New requirements for security investment are NOT driven by vendors. Today's worry: targeted attacks IT-Harvest Confidential
Audit and compliance get in the way of good security IT-Harvest Confidential HIPPA, GLB, SOX, PCI are just the beginning. 40 bills pending in Congress, not to mention EU, India, China, and Australia Do not let compliance demands get in the way of protecting your critical information assets!
IT-Harvest Confidential Blog: twitter.com/cyberwar