PAGE Intelligence Meets Vulnerability Management NYC ISSA January 24, 2013.

Slides:



Advertisements
Similar presentations
© 2013 Bradford Networks. All rights reserved. Rapid Threat Response From 7 Days to 7 Seconds.
Advertisements

© 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential 14854_10_2008_c1 1 Holistic Approach to Information Security Greg Carter, Cisco Security.
© 2013 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual.
Presentation by: Peter Thomas Blue Lance, Inc Using SIEM Solutions Effectively to meet Security, Audit, and Compliance Requirements.
Lloyds 360 Risk Insight Dec 2010 Malcolm Harkins Malcolm Harkins Chief Information and Security Officer General Manager Intel Information Risk and Security.
Radware DoS / DDoS Attack Mitigation System Orly Sorokin January 2013.
Cyber Security Discussion Craig D’Abreo – VP Security Operations.
Enterprise security How to bring security transparency into your organization ISSA EDUCATIONAL SESSION Nicklaus Schleicher, VP Support & Customer Service.
MIGRATION FROM SCREENOS TO JUNOS based firewall
Security Offering. Cyber Security Solutions 2 Assessment Analysis & Planning Design & Architecture Development & Implementation O&M Critical Infrastructure.
Mel Pless, Sr. Director, Solutions Consulting Guidance Software, Inc. Let’s Get Right To The Endpoint Leveraging Endpoint Data to Expose,
Demonstrating IT Relevance to Business Aligning IT and Business Goals with On Demand Automation Solutions Robert LeBlanc General Manager Tivoli Software.
SANS Technology Institute - Candidate for Master of Science Degree Implementing and Automating Critical Control 19: Secure Network Engineering for Next.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
SEC835 Database and Web application security Information Security Architecture.
Information Security Issues at Casinos and eGaming
Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 DRAFT.
Thomas Levy. Agenda 1.Aims: Reducing Cyber Risk 2.Information Risk Management 3.Secure Configuration 4.Network Security 5.Managing User Access 6.Education.
Enterprise Risk Management & IT Compliance March 30, 2010 Presented by: Ken Rowe, Director Enterprise Systems Assurance & Chief Security Officer University.
STRATEGIC INTELLIGENCE MANAGEMENT Chapter by Paul de Souza Chapter 18 - National Cyber Defense Strategy, Pg. 224.
1 CISCO SAFE: VALIDATED SECURITY REFERENCE ARCHITECTURE What It Is Business Transformation Top Questions To Ask To Initiate The Sale Where It Fits KEY.
It’s Not Just You! Your Site Looks Down From Here Santo Hartono, ANZ Country Manager March 2014 Latest Trends in Cyber Security.
Accompanying notes to presentation What you need to know This presentation is part of the Art of connecting. There are four themes in total, each with.
Security Innovation & Startup. OPEN THREAT EXCHANGE (OTX): THE HISTORY AND FUTURE OF OPEN THREAT INTELLIGENCE COMMUNITY ALIENVAULT OTX.
Where in the world is your data? Data Breach Analysis Angelbeat Seminar Billy Austin, President iScan Online, Inc.
Knowing What You Missed Forensic Techniques for Investigating Network Traffic.
Network security Product Group 2 McAfee Network Security Platform.
Nexthink V5 Demo Security – Malicious Anomaly. Situation › Avoid damage resulting from the incident itself and the cost of the unplanned response › Protection.
Take back control: taming rogue device, user and application exposures Mark Blake, Capita Secure Managed Services Chris Gothard, Colt Technology Services.
HO © 2012 Fluor. All rights reserved. Quick Wins in Vulnerability Management Classification: Confidential Owner: Michael Holcomb Approver: Phil.
Enterprise Cybersecurity Strategy
Connected Security Your best defense against advanced threats Anne Aarness – Intel Security.
ARCH-04 Before You Begin Your Transformation Project… Phillip Magnay Architect – Applied Technology.
Emerging and Evolving Cyber Threats Require Sophisticated Response and Protection Capabilities  Advanced Algorithms  Cyber Attack Detection and Machine.
ARAMA TECH D A T A P R O T E C T I O N P R O F E S S I O N A L S VISION & STRATEGY.
ARAMA TECH D A T A P R O T E C T I O N P R O F E S S I O N A L S VISION & STRATEGY.
2© Copyright 2013 EMC Corporation. All rights reserved. Cyber Intelligence Fighting Cyber Crime Insert Event Date LEADERS EDGE.
Enterprise’ Ever-Evolving Challenge & Constraints Dealing with BYOD Challenges Enable Compliance to Regulations Stay Current with New Consumption Models.
Why SIEM – Why Security Intelligence??
‘Enhanced Cyber Situational Awareness with Continuous Monitoring’ John Crupi, CTO Rick Smith, Cyber Consultant.
CLOSE THE SECURITY GAP WITH IT SOLUTIONS FROM COMPUTACENTER AND CISCO AUGUST 2014.
Welcome Information Security Office Services Available to Counties Security Operations Center Questions.
Financial Sector Cybersecurity R&D Priorities The Members of the FSSCC R&D Committee November 2014.
From Technology to Intelligence from. The Current Cyber Discussion Business leaders are more aware of Cyber Risk but ….. ‒ struggle to connect Cyber issues.
AUTONOMIC COMPUTING B.Akhila Priya 06211A0504. Present-day IT environments are complex, heterogeneous in terms of software and hardware from multiple.
Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 Juniper Security Threat Response Manager (STRM)
Tripwire Threat Intelligence Integrations. 2 Threat Landscape by the Numbers Over 390K malicious programs are found every day AV-Test.org On day 0, only.
Surveillance and Security Systems Cyber Security Integration.
Proactive Incident Response
Your Partner for Superior Cybersecurity
Proactive Attack Prevention and Detection
“Introduction to Azure Security Center”
Capabilities Matrix Access and Authentication
Introduction to a Security Intelligence Maturity Model
Advanced Threat Protection
Wenjing Lou Complex Networks and Security Research (CNSR) Lab
8 Building Blocks of National Cyber Strategies
Cyber Security in New Jersey State Government
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
PROACTIVE SNOOPING ANALYSIS
Skybox Cyber Security Best Practices
An Urgent National Imperative
Securing the Threats of Tomorrow, Today.
CRITICAL INFRASTRUCTURE CYBERSECURITY
CIPSEC architecture CIPSEC workshop Frankfurt 16/10/2018
Coordinated Security Response
The CYBERWISER.eu project
Security intelligence: solving the puzzle for actionable insight
Presentation transcript:

PAGE Intelligence Meets Vulnerability Management NYC ISSA January 24, 2013

PAGE Agenda Introductions & Agenda Vulnerability Management Today & Tomorrow CORE Insight Demonstration 2

PAGE Is Vulnerability Management Broken? “The definition of insanity is doing the same thing over and over and expecting different results.” “Is it time to rethink the vulnerability management hamster wheel?” “Shouldn’t we focus on Risk & Threats rather than vulnerabilities?” 3

PAGE What Needs to Change and Why? Defend Your Data from Mutating Threats Security Pro’s Have Yet to Adapt to New Business Models & Threats: Legacy Networks are Ill-Equipped for a Data-Centric World Existing Vulnerability Management, Incident Management and Forensic capabilities are insufficient for to detect, prioritize and address modern threats Security Pro’s Need Situational Awareness and Actionable Intelligence The Security Architecture and Operations Playbook

PAGE What Needs to Change and Why? 5 Application Security Beyond 2012 Key Findings: Applications and data are the main focus of modern cyber attacks Existing identity, endpoint and network security solutions are insufficient for their protection The changing nature of attacks from “mass” to advanced and targeted, require better technology and skills to detect and deter. Evolution Vector: Tearing Down Silos, Enabling Mass Security Adoption in 3 Directions Security Intelligence Security as a Service The combination of security, development and operations into a DevOpsSec cycle

PAGE Advancing the Vulnerability Management Approach 6 Vulnerability Scanning Threat Modeling, Analysis, & Risk Intelligence Vulnerability Validation, Consolidation & Correlation

PAGE Vulnerability Management + Intelligence Consolidate Correlate Multi-Vector Vulnerability Data Analyze Predict Material Risk Prioritize Continuously Monitor & Assess Operational Threats Vulnerability Overload - VALIDATION DEMANDING All Technical Data – NO BUSINESS INTELLIGENCE Dynamic Threat Landscape – MAKES PREDICTING RISK IMPOSSIBLE

PAGE Demonstration 8

PAGE Thank You 9