Presenter: Nick Cavalancia Auditing Evangelist 3 Ways Auditing Needs to be a Part of Your Security Strategy Brought to You by.

Slides:



Advertisements
Similar presentations
BalaBit Shell Control Box
Advertisements

Enterprise Reporter 2.0 Customer Presentation. Market Landscape.
1© Copyright 2011 EMC Corporation. All rights reserved. Anatomy of an Attack.
Steve Jordan Director. Industry Solutions 05/05/14 Managing Chaos: Data Movement in 2014.
Introducing WatchGuard Dimension. Oceans of Log Data The 3 Dimensions of Big Data Volume –“Log Everything - Storage is Cheap” –Becomes too much data –
ISecurity Complete Product Series For System i. About Raz-Lee Internationally renowned System i solutions provider Founded in 1983; 100% focused on System.
Preventing Good People From Doing Bad Things Best Practices for Cloud Security Brian Anderson Chief Marketing Officer & Author of “Preventing Good People.
Security Controls – What Works
Enterprise security How to bring security transparency into your organization ISSA EDUCATIONAL SESSION Nicklaus Schleicher, VP Support & Customer Service.
RSA Approach for Securing the Cloud Bernard Montel Directeur Technique RSA France Juillet 2010.
Contact Center Security Strategies Grant Sainsbury Practice Director, Dimension Data.
Change Auditing Software
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
Copyright 2009 Trend Micro Inc. Harish Agastya, Director Server Security Product Marketing Server Security Press Presentation.
1 Title ECI: Anatomy of a Cyber Investigation Who Are the Actors.
Copyright 2009 Trend Micro Inc. OfficeScan 10.5 VDI-aware endpoint security.
NUAGA May 22,  IT Specialist, Utah Department of Technology Services (DTS)  Assigned to Department of Alcoholic Beverage Control  PCI Professional.
(2011) Security Breach Compromises 75,000 Staff/Student Social Security Numbers Image from this Site Presenters: Aron Eisold, Matt Mickelson, Bryce Nelson,
Protecting Mainframe and Distributed Corporate Data from FTP Attacks: Introducing FTP/Security Suite Alessandro Braccia, DBA Sistemi.
Enterprise Computing Community June , 2010February 27, Information Security Industry View Linda Betz IBM Director IT Policy and Information.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
PCI: As complicated as it sounds? Gerry Lawrence CTO
1. 2 Presentation outline » IT pain points » The product » Testimonials » Kudos » Conclusion.
© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Cyber Security: Now and.
User Manager Pro Suite Taking Control of Your Systems Joe Vachon Sales Engineer November 8, 2007.
Data Center Firewall. 2 Common IT Security Challenges Does my network security protect my IT environment and sensitive data and meet the regulatory compliances?
Netwrix product briefing n4.0 Unified Auditing for Critical IT Systems.
© 2015 ForeScout Technologies, Page 2 Source: Identity Theft Resource Center Annual number of data breaches Breaches reported Average annual cost of security.
Secure Data Sharing What is it Where is it What is the Risk – Strategic > What Policy should be enforced > How can the process be Audited > Ongoing Process.
Symantec Targeted Attack Protection 1 Stopping Tomorrow’s Targeted Attacks Today iPuzzlebiz
© 2001 by Carnegie Mellon University SS5 -1 OCTAVE SM Process 5 Background on Vulnerability Evaluations Software Engineering Institute Carnegie Mellon.
Managing Data Against Insider Threats Dr. John D. Johnson, CISSP.
1 © 2001, Cisco Systems, Inc. All rights reserved. Cisco Info Center for Security Monitoring.
 Chapter 14 – Security Engineering 1 Chapter 12 Dependability and Security Specification 1.
Knowing What You Missed Forensic Techniques for Investigating Network Traffic.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Sky Advanced Threat Prevention
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 1 Automate your way to.
Part 1: Corporate Operational benefits, Non-technical information for FSOs and ISSMs/ISSOs Part 2: Technical Tips on how to conduct a better audit review.
(2011) Security Breach Compromises 75,000 Staff/Student Social Security Numbers Image from this Site Presenters: Aron Eisold, Matt Mickelson, Bryce Nelson,
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
RECLAIM CONTROL OF MOBILE AND DISTRIBUTED DATA January 13, 2016.
Rapid Detection & Incident Response What, Why and How March 2016 Ft Gordon.
Why Auditing is a Must-Have Element in Your Security Strategy. Jim Smith Director sales
Why SIEM – Why Security Intelligence??
Why IT auditing is a must in your security strategy ?
Defining your requirements for a successful security (and compliance
EAST AFRICAN DATA HANDLERS DATA SECURITY/MOBILITY
Why visibility is a must
Case Study - Target.
Cloud Firewall.
The Game has Changed… Ready or Not! Andrew Willetts Technologies, Inc.
Data Center Firewall.
Team 4 – Mack, Josh, Felicia, Kevin and Walter
Infrastructure as a Service
BOMGAR REMOTE SUPPORT Karl Lankford
Skyhigh Enables Enterprises to Use Productivity Tools of Microsoft Office 365 While Meeting Their Security, Compliance & Governance Requirements Partner.
Varonis Overview.
Active Directory Auditing Headaches (and How to Solve Them)
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
PRIVILEGED ACCOUNT ABUSE
Offices: DC, London, Sydney
National Cyber Security
Securing the Threats of Tomorrow, Today.
Managing IT Risk in a digital Transformation AGE
Protect data in core business applications
In the attack index…what number is your Company?
STEALTHbits Technologies, Inc.
Presentation transcript:

Presenter: Nick Cavalancia Auditing Evangelist 3 Ways Auditing Needs to be a Part of Your Security Strategy Brought to You by

Agenda GA  Security Breaches and Data Leaks in the News & Reality  Where Does Auditing Fit?  Why is Auditing Necessary?  Goals Auditing Helps With  Can Auditing Complement Threat Defense Mechanisms?  A 10K Foot View of a Simple Security Strategy  IT Systems Critical for Auditing  Netwrix Auditor  Conclusion  Questions & Answers

Security Breaches and Data Leaks in the News

What Typically Hits the Headlines?  General public impacted  Large numbers  High profile companies / state sponsored attacks

Malware to Steal Specific Data  Target breach, 2013  The Home Depot breach, 2014

Sophisticated Targeted Attacks  JP Morgan Chase breach, 2014  “Stuxnet” worm targeting specific organizations

Uncovered Vulnerabilities that may be Exploited by Hackers  Heartbleed  Shellshock

The Reality of Data Breaches and Leaks PwC 2014 Information Security Breaches Survey 81% of large and 60% of small firms had a security breach 63% of large organizations had staff related incidents 55% of large organizations suffered from outsider attacks Verizon 2014 Data Breach Investigations Report 88% of insider incidents were due to privilege misuse 22% of organizations detected insider misuse within weeks, 11% within months Thycotic 2014 “Black Hat” Hacker Survey Primary attack targets: IT Admins (30%) and contractors (40%) 99% of hackers believe simple hacking tactics are still effective 88% of hackers believe their own private information is at risk

Security Breaches and Data Leaks in Reality

PwC “Information Security Breaches” Survey, 2014: 81% of large and 60% of small firms had a security breach 63% of large organizations had staff related incidents 55% of large organizations suffered from outsider attacks

Verizon “Data Breach Investigations” Report, 2014: 88% of insider incidents were due to privilege misuse 22% of organizations detected insider misuse within weeks, 11% within months

Thycotic “Black Hat” Hacker Survey, 2014: Primary attack targets: Contractors (40%) and IT admins (30%) 99% of hackers believe simple hacking tactics are still effective

Where Does Auditing Fit?  For many, auditing is an afterthought  For many, auditing is merely a “once-a-year” part of an overall security strategy  Just documenting changes is not enough  Checking security state at a single point in time doesn’t provide the visibility

So Why is Auditing Necessary? IT changes happen… o Undocumented o Unlogged o Unapproved… 57% Make changes without documenting 46% Make changes that impact security 52% Make changes that impact availability 62% Have no ability to audit changes 42% Make changes across multiple systems

Goals Auditing Helps With  Security Enhancement  Achieving Regulatory Compliance and Passing Audits  Achieving Operational Efficiency

1. Assess 2. Assign 3. Audit A 10,000 Foot View: 3 High-Level Steps How Auditing Can Solidify Your Security Strategy

1. Assess 2. Assign 3. Audit A 10,000 Foot View: 3 High-Level Steps How Auditing Can Solidify Your Security Strategy

1. Assess 2. Assign 3. Audit A 10,000 Foot View: 3 High-Level Steps How Auditing Can Solidify Your Security Strategy

A 10,000 Foot View: 3 High-Level Steps How Auditing Can Solidify Your Security Strategy 1. Assess 2. Assign 3. Audit

IT Systems Critical for Auditing Active Directory SharePoint SQL Server VMware Windows Server File Servers Exchange IT-Auditing

Exchange File Servers SharePoint SQL Server VMware Windows Server Active Directory IT Systems Critical for Auditing

About Netwrix Corporation Year of foundation: 2006 Headquarters location: Irvine, California Global customer base: 6000 Recognition: Among the fastest growing software companies in the US with more than 70 industry awards from Redmond Magazine, SC Magazine, WindowsIT Pro and others Customer support: global 24/5 support with 97% customer satisfaction

Netwrix Locations Year of foundation: 2006 Headquarters location: Irvine, California Global customer base: 6000 Corporate Headquarters: 300 Spectrum Center Drive #1100 Irvine, CA

About Netwrix Auditor Netwrix Auditor enables # completevisibility into both security configuration and data access within the IT infrastructure by providing actionable audit data about who changed what, when and where and who has access to what

Netwrix Auditor Benefits Eliminates blind spots and makes it easy to identify changes that violate corporate security policies thus helping detect suspicious user activity and prevent breaches. Provides actionable audit data required to prove that the organization’s IT compliance program adheres to PCI DSS, HIPAA, SOX, FISMA/NIST , COBIT, ISO/IEC and other audits. Relieves IT departments of manual crawling through disparate array of event logs to get the information about who changed what, when and where and who has access to what. Strengthens Security Streamlines ComplianceOptimizes Operations

Netwrix Auditor Applications Scope Active Directory changes; Group Policy changes; State-in-Time information on configurations; real-time alerts; AD change rollback; inactive user tracking and password expiration alerting Changes to Windows-based file servers, EMC Storage and NetApp Filers; State-in-Time information on configurations. SharePoint farm configuration changes, security and content changes Exchange changes and non- owner mailbox access auditing SQL configuration and database content changes Changes to configuration of Windows-based servers; Event Logs, Syslog, Cisco, IIS, DNS; User activity video recording VMware vSphere changes Netwrix Auditor for Active Directory Netwrix Auditor for Exchange Netwrix Auditor for File Servers Netwrix Auditor for SharePoint Netwrix Auditor for SQL Server Netwrix Auditor for VMware Netwrix Auditor for Windows Server

Netwrix Auditor Conceptual Model

Conclusion  Companies make undocumented changes on a daily basis. Changes coming from outsiders is not mythic either.  Security is never a static thing but is a multi-faceted process.  Change Auditing should be a part of your holistic security strategy and an ongoing exercise mirroring the dynamic nature of your environment.

Presenter: Nick Cavalancia Auditing Evangelist Thank you for your attention! Questions? Brought to You by