Enterprise Visibility & Security Analytics Rocky DeStefano, VP of Strategy & Technology.

Slides:



Advertisements
Similar presentations
1© Copyright 2011 EMC Corporation. All rights reserved. The Future of the Advance Soc 3rd Annual Privacy, Access and Security Congress, Ottawa, 2012 Mike.
Advertisements

1© Copyright 2011 EMC Corporation. All rights reserved. Anatomy of an Attack.
Malware\Host Analysis for Level 1 Analysts “Decrease exposure time from detection to eradication” Garrett Schubert – EMC Corporation Critical Incident.
Lynn Ray ISO Towson University Strategic Planning for IT Security Copyright Lynn Ray, This work is the intellectual property rights of the author.
© 2013 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual.
The Most Analytical and Comprehensive Defense Network in a Box.
David A. Brown Chief Information Security Officer State of Ohio
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Logistics Adventures in Operations Research Intermodal Asset Management.
W w w. f a c t i v a. c o m © 2002 Dow Jones Reuters Business Interactive LLC (trading as Factiva). All rights reserved. The Keys to Successful Strategic.
OPM Cybersecurity Competencies by Occupation (Technical Competencies) Information Technology Management Series Electronics Engineering.
S5-1 © 2001 Carnegie Mellon University OCTAVE SM Process 5 Identify Key Components Software Engineering Institute Carnegie Mellon University Pittsburgh,
Developing Network Security Strategies Network Security D ESIGN Network Security M ECHANISMS.
Security Track Day 1 Richard Stiennon Chief Research Analyst IT-Harvest Blog: ThreatChaos.com twitter.com/stiennon IT-Harvest Confidential.
Security Offering. Cyber Security Solutions 2 Assessment Analysis & Planning Design & Architecture Development & Implementation O&M Critical Infrastructure.
© 2012 Solera Networks. Contains confidential, proprietary, and trade secret information of Solera Networks. Any use of this work without express written.
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
Navigating the Maze How to sell to the public sector Adrian Farley Chief Deputy CIO State of California
11 Canal Center Plaza, Alexandria, VA T F Enterprise Computing Conference (ECC) Workshop Alma R. Cole,
The Most Analytical and Comprehensive Defense Network in a Box.
N-Wave Shareholders Meeting May 23, 2012 N-Wave Security Update Lisa
© 2001 by Carnegie Mellon University PSM-1 OCTAVE SM : Senior Management Briefing Software Engineering Institute Carnegie Mellon University Pittsburgh,
© 2001 Carnegie Mellon University S8A-1 OCTAVE SM Process 8 Develop Protection Strategy Workshop A: Protection Strategy Development Software Engineering.
Duke Medicine IT Strategy Jeffrey Ferranti, MD Chief Information Officer / VP Medical Informatics Duke Medicine April 17, 2015.
Thomas Levy. Agenda 1.Aims: Reducing Cyber Risk 2.Information Risk Management 3.Secure Configuration 4.Network Security 5.Managing User Access 6.Education.
Computer & Network Security
Delivering Materiel Readiness “THE FUTURE OF ARMY LOGISTICS” March 2004 BG Charlie Fletcher United States Army Deputy G-4 NDIA.
Class 8 The State of Cybercrime Today- Threads & Solutions.
Corporate Information Reconnaissance Cell (CIRC).
Network Security. Need for security  Connecting to the Internet is quickly becoming a necessity for companies/ individuals  Understand the security.
Office of Campus Information Security Driving a Security Architecture by Assessing Risk Stefan Wahe Sr. Information Security Analyst.
Clinical Computing Secure, reliable technology that improves clinical workflow at the point of care.
SEC835 Security in Databases and Web applications Presentation.
EISA (Enterprise Information Security Architecture) - detailed description of security processes and procedures to develop compliance with strategic goals.
Critical Security Controls & Effective Cyber Defense Hasain “The Wolf”
Operating Systems Concepts 1/e Ruth Watson Chapter 9 Chapter 9 Accounts and Groups Ruth Watson.
Strategy: Focus on the foundation of the service catalog Strategy : Implement a personal network Strategy : Invest in tools that empower Principle: Users.
Cyber Security in the Post-AV Era Amit Mital Chief Technology Officer General Manager, Emerging Endpoints Business Unit.
Project Communication Management Manage Communications - Inputs Inputs Communications Management Plan Work Performance Reports Enterprise Environmental.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
Providing intelligent maintenance solutions for intelligent aircraft.
Keynote 9: Cyber Security in Emerging C4I Systems: Deployment and Implementation Perspectives By Eric J. Eifert, Sr. VP of DarkMatter’s Managed Security.
Information Security tools for records managers Frank Rankin.
ARAMA TECH D A T A P R O T E C T I O N P R O F E S S I O N A L S VISION & STRATEGY.
SAP BO ONLINE TRAINING B Y H YDERABADSYS O NLINE T RAINING Contact Us: INDIA: USA:
Contextual Security Intelligence Suite™ Preventing Data Breaches without Constraining Business.
Financial Sector Cybersecurity R&D Priorities The Members of the FSSCC R&D Committee November 2014.
© 2010 IBM Corporation STRATEGIC ADVISORY COUNCIL MARCH 2011 Enterprise Architecture - Advisory Discussion – Greg Dietzel Vice President, Client Unit Director,
Kevin Watson and Ammar Ammar IT Asset Visibility.
Visual Analytics for Cyber Defense Decision-Making Anita D’Amico, Ph.D. Secure Decisions division of Applied Visions, Inc.
Tripwire Threat Intelligence Integrations. 2 Threat Landscape by the Numbers Over 390K malicious programs are found every day AV-Test.org On day 0, only.
Proactive Incident Response
Sales Play - ADP 2.0 HPE ArcSight Partner Enablement
Your Partner for Superior Cybersecurity
OIT Security Operations
Rapid Launch Workshop ©CC BY-SA.
Critical Security Controls
iShop Training Module Access & Security
Cyber Security Enterprise Risk Management: Key to an Organization’s Resilience Richard A. Spires CEO, Learning Tree International Former CIO, IRS and.
Active Cyber Security, OnDemand
Securing the Law Firm Myth vs. Reality vs. Practicality:
Get instant internet security | | Wire IT Solutions
Shifting from “Incident” to “Continuous” Response
Securing the Threats of Tomorrow, Today.
What are the Resilience Mechanisms? Hugo Pereira Evoleo Technologies
CIPSEC architecture CIPSEC workshop Frankfurt 16/10/2018
Counter APT Counter APT HUNT operations combine best of breed endpoint detection response technology with an experienced cadre of cybersecurity experts.
Security intelligence: solving the puzzle for actionable insight
DBA Robotic Process Automation Diagram Template
DBA Situational Decision Automation Diagram Template
Presentation transcript:

Enterprise Visibility & Security Analytics Rocky DeStefano, VP of Strategy & Technology

Enterprise Visibility Context Speed Flexibility Expertise Systems, Networks, Applications, Account Information. Asset, Threat, Vulnerability, Function, Owner, Criticality Adversaries adjust in seconds, Enterprises weeks/months Authority to change tools, tactics, visibility and to instrument as needed. Security Analysis, System/Network/Memory Forensics, Malware Reversing, Enterprise Architecture. Process Standardized, communicated, trained and robust enough to flex when necessary. Creating and Maintaining a Defensible Enterprise

Logging Network Operating System Application Forensics NetworkEnd PointMemory Contextual Information Asset Information Business Function VulnerabilityCriticalityCorrelations Personality User Admins Service Accounts IntelligenceBehaviors Complete Enterprise Visibility

Click Security Security Intelligence Maturity Model

Thank you