Get Complete IT Compliance: Reduce Risk and Cost Jonathan CISO, Qualys Seth Automation Specialist, BMC.

Slides:



Advertisements
Similar presentations
University of Florida Incident Tracking and Reporting Kathy Bergsma
Advertisements

Preventing Good People From Doing Bad Things Best Practices for Cloud Security Brian Anderson Chief Marketing Officer & Author of “Preventing Good People.
©2014 Bit9. All Rights Reserved Building a Continuous Response Architecture.
Know the Client Own the Problem Share the Solution The 2005 Case for Information Technology Security October 14, 2004.
Global Information Security Issues According to the E&Y Global Survey, Managers Say the Right Thing… –90% of 1400 companies surveyed in 66 countries say.
Computer Security: Principles and Practice
Vulnerability and Configuration Management Best Practices for State and Local Governments Jonathan Trull, CISO, Qualys, Inc.
Mel Pless, Sr. Director, Solutions Consulting Guidance Software, Inc. Let’s Get Right To The Endpoint Leveraging Endpoint Data to Expose,
Network security policy: best practices
IT:Network:Microsoft Applications
The Difficult Road To Cybersecurity Steve Katz, CISSP Security Risk Solutions Steve Katz, CISSP Security.
SEC835 Database and Web application security Information Security Architecture.
Did You Hear That Alarm? The impacts of hitting the information security snooze button.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
1 Figure 1-17: Security Management Security is a Primarily a Management Issue, not a Technology Issue Top-to-Bottom Commitment  Top-management commitment.
Case Study: Department of Revenue Data Breach National Association of State Auditors, Comptrollers and Treasurers March 21, 2013.
Dell Connected Security Solutions Simplify & unify.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
EEye Digital Security    On the Frontline of the Threat Landscape: Simple configuration goes a long way.
PATCH MANAGEMENT: Issues and Practical Solutions Presented by: ISSA Vancouver Chapter March 4, 2004.
© 2015 ForeScout Technologies, Page 2 Source: Identity Theft Resource Center Annual number of data breaches Breaches reported Average annual cost of security.
Copyright Security-Assessment.com 2004 Vulnerability Management Explained By Peter Benson.
ITPD PRODUCTION SUPPORT PROCESS OCTOBER 8, /23/2015 Guiding Principles 1.Resolve production issues in a timely and effective manner 2.Manage.
Where in the world is your data? Data Breach Analysis Angelbeat Seminar Billy Austin, President iScan Online, Inc.
Appendix C: Designing an Operations Framework to Manage Security.
ISS SiteProtector and Internet Scanner LanAdmin Group Meeting 12/8/2005.
Internet Security Breach & Its Impact on Business Operations Kim Nguyen Manish Shirke Wa Mo Saravanan Velrajan.
TOP 10 TECHNOLOGY INITIATIVES © Robert G. Parker S-1 Issues Loss or theft of mobile devices Lack of MDM (mobile device management) software Cloud.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
PMC Update on Cyber Sprint June 18, Overview: 30-Day Cyber Sprint 1.Interagency Cyber Sprint Team: Launched June 11 and executing against the.
HO © 2012 Fluor. All rights reserved. Quick Wins in Vulnerability Management Classification: Confidential Owner: Michael Holcomb Approver: Phil.
IT Security Policy: Case Study March 2008 Copyright , All Rights Reserved.
Rob Davidson, Partner Technology Specialist Microsoft Management Servers: Using management to stay secure.
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. State of Network Security.
MANAGED SECURITY TESTING PROACTIVELY MANAGING VULNERABILITIES.
The cost of Cybercrime 1 Steve Lamb Regional Marketing Manager – EMEA, Enterprise Security Products Twitter: actionlamb.
15 years of Web Security © 2015 WhiteHat Security, Inc. Jeremiah Grossman Founder WhiteHat Security, Inc. The Rebellious Teenage Years.
Albany Bank Corporation Security Incident Management Program.
Security Outsourcing Melissa Karolewski. Overview Introduction Definitions Offshoring MSSP Outsourcing Advice Vendors MSSPs Benefits & Risks Security.
©2015 Check Point Software Technologies Ltd. 1 [Restricted] ONLY for designated groups and individuals CHECK POINT MOBILE THREAT PREVENTION.
1 Current Trends in Enterprise IT Network Security Key Takeaways Based on 100 Survey Responses © 2016 Lumeta Corporation.
HOW TO AVOID COMMON DATA BREACH PITFALLS IAPP Privacy Academy 2014.
Why SIEM – Why Security Intelligence??
BizSmart Lunch & Learn Webinar Information Security and Protecting your business With the increased risk of some sort of cyber- attack over the past few.
Vulnerability / Cybersecurity Research Discussion Dwayne Melancon, CISA Chief Technology Officer and VP of Research & Development.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
Telephone : +234 (0) | Website : Registered company : Telephone : +234.
Tripwire Threat Intelligence Integrations. 2 Threat Landscape by the Numbers Over 390K malicious programs are found every day AV-Test.org On day 0, only.
Cybersecurity as a Business Differentiator
Michael Wright • Chief Security Officer • Tech Lock
Cisco Compliance Management and Configuration Service
Cybersecurity - What’s Next? June 2017
Healthcare Cybersecurity: State of Industry
Comprehensive Security and Compliance at an Affordable Price.
Lessons Learned: Implementing a Vulnerability Management Program
Compliance with hardening standards
F5 PRO ASSETS We’ve created these Pro Assets to help you communicate to your team the importance of app security and performance. Feel free to remove.
Cyber Protections: First Step, Risk Assessment
Protect Your Critical Business Applications With Website Security Testing.
Healthcare Cloud Security Stack for Microsoft Azure
Skybox Cyber Security Best Practices
National Cyber Security
Security Essentials for Small Businesses
CRITICAL INFRASTRUCTURE CYBERSECURITY
No!. [NEXT SLIDE] LOGO HERE.
Information Protection
DATA BREACHES 6 4 , 9 3 There were…
Figuring out CyberSecurity Return On Investment
Information Protection
AIR-T11 What We’ve Learned Building a Cyber Security Operation Center: du Case Study Tamer El Refaey Senior Director, Security Monitoring and Operations.
Presentation transcript:

Get Complete IT Compliance: Reduce Risk and Cost Jonathan CISO, Qualys Seth Automation Specialist, BMC

The Great Divide 2

DevOps Security 3

Attack-Defend Cycle (OODA Loop) 4

Threats + Vulnerabilities = Breaches 5

Major Constraints on DevOps and Security Teams 6

Laws of Vulnerabilities Half-Life – time interval for reducing occurrence of a vulnerability by half. Prevalence – turnover rate of vulnerabilities in the “Top 20” list during a year. Persistence – total lifespan of vulnerabilities Exploitation – time interval between an exploit announcement and the first attack 7

Half-Life 29.5 Days 8

Persistence Indefinite Stabilize at 5-10% 9

Exploitation Average: < 10 days Critical client vulnerabilities: < 48 hours – Exploit Kits offer money back guarantees / Next day delivery 10

Bridging the Divide Vulnerability and configuration management should be an essential part of any security program Learn to speak the same language Integrate VM/CM solution with patch & configuration management systems, asset inventory systems, ticketing systems, configuration systems (BMC BladeLogic), and reporting systems for best results 11

Continuous Security and Compliance 12

Continuous Security and Compliance 13

Continuous Security and Compliance 14

Continuous Security and Compliance 15

ATTACKS 80 % More than 80% of attacks target known vulnerabilities 79 % PATCHES 79% of vulnerabilities have patches available on day of disclosure Most breaches exploit known vulnerabilities

So why do breaches still happen? 193 Days to resolve vulnerabilities Coverage – you can’t patch what you don’t know Downtime – hard to schedule maintenance times with users Complexity – dependencies make it hard to isolate actions

The SecOps Gap

OperationsSecurity Reduce downtime 80% of downtime due to misconfigurations Close the window of vulnerability 193 days to patch known vulnerabilities

Records breached in ,023,108,267 Number of breach incidents 1,541 Breached records increase from last year 78% The results of disconnected security

Closed-Loop Compliance DISCOVER REMEDIATE DEFINE AUDIT GOVERN

BMC and Qualys DISCOVER REMEDIATE DEFINE AUDIT GOVERN Identify unmanaged systems (“shadow IT”) 01 Reconcile data from different repositories 02 Plan and execute complete remediation actions 04 Assess true security status 03 Prioritize by vulnerability, business priority, or logical grouping 05 Integrate change approval process & full audit trail 06

The SecOps Portal

Remediation

How to schedule vulnerabilities to be fixed using patches Emergency Fix Request Approval “Go Fix It button” Select what to remediate Scheduling & Approvals

How to select and schedule vulnerabilities that can be fixed using configuration packages. Use a Config package Configuration Packages

Job results for remediation group actions Results

Next Steps For more information on Intelligent Compliance and Closing the SecOps Gap: -Contacts -Seth -Jonathon Trull - -Resources -The webinar replay link and other resources will be ed to you after the webinar. -Additional resources online - -

Sources "More than 90% of recent breaches were preventable– remediation for exploited vulnerabilities was available on the day each breach occurred and, if applied, would likely have averted the breach." - Online Trust Alliance (OTA), 2015 Data Protection Best Practices and Risk Assessment Guides "The average cost of a data breach to a company has reached $195 per record lost, or around US $5.85 million per breach event.", "Research indicates 43% of firms had a data breach in the past year. " - "Ponemon Cost of Data Breach 2013", 2014 Cost of Data Breach Study, Ponemon Institute, May 5, 2014 "70% of companies hit by data breaches in 2014 learned of the breach from outsiders." - PWC 2014 Information Security Breaches Survey "79% of vulnerabilities have patches available on day of disclosure." - Secunia Research: The Secunia Vulnerability Report 2014 "More than 80% of attacks target known vulnerabilities" - F-Secure: Companies Risking Their Assets with Outdated Software "On average, it takes 193 days to patch an identified vulnerability." - WEBSITE SECURITY STATISTICS REPORT - WhiteHat Security "1.1 billion records were compromised (that are known) across 3014 data breach incidents in 2014." - Risk Based Security has released its 2014 Year-End Data Breach QuickView Report YEDataBreachQuickView.pdfhttp:// YEDataBreachQuickView.pdf "Many firms feel their annual security budgets are only about 50% of what they really need to adequately address the problem."- EY, Under Cyber Attack: EY's Global Information Security Survey _2013_Global_Information_Security_Survey/$FILE/EY-GISS-Under-cyber-attack.pdfhttp:// _2013_Global_Information_Security_Survey/$FILE/EY-GISS-Under-cyber-attack.pdf "61% of CEOs are concerned about security, up from 48% last year." - PwC’s 18th Annual Global CEO Survey "According to Mandiant, the median time taken for organizations to detect that threat groups are present on their network is 229 days— just a few days shy of eight months. " Threat Report - Mandiant

Thank you! Questions? Find out more: bmc.com/secops