Empowering Organisations to Thrive in the Face of Cyber Attacks An introduction to Resilient Systems Paul Ayers – General Manager, EMEA Chris Neely - Director.

Slides:



Advertisements
Similar presentations
Identity & Security. Today's IT Security challenges Rising Internal Attacks 75% of companies report insiders responsible for breaches Growing headcount.
Advertisements

Security intelligence: solving the puzzle for actionable insight Fran Howarth Senior analyst, security Bloor Research.
The New Face of Enterprise Collaboration Trends, Observations, and Lessons Learned.
Security Controls – What Works
Planning and Managing Information Security Randall Sutton, President Elytra Enterprises Inc. April 4, 2006.
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Polycom event Security Briefing 12/03/14 Level 3 Managed Security.
2007 Microsoft Office System Microsoft Partner Confidential.
Overview 4Core Technology Group, Inc. is a woman/ veteran owned full-service IT and Cyber Security firm based in Historic Petersburg, Virginia. Founded.
Demonstrating IT Relevance to Business Aligning IT and Business Goals with On Demand Automation Solutions Robert LeBlanc General Manager Tivoli Software.
Copyright © 2014 Rockwell Automation, Inc. All Rights Reserved. PUBLIC PUBLIC CO900G Electrical Controls Engineering Career Paths University of.
© 2009 IBM Corporation Delivering Quality Service with IBM Service Management April 13 th, 2009.
© 2011 IBM Corporation Smarter Software for a Smarter Planet The Capabilities of IBM Software Borislav Borissov SWG Manager, IBM.
Powered by M2m methodology diagram Anything Anywhere Our specialist expertise and partnerships have enabled us to tailor smart monitoring solutions and.
Pg 1 of 25 AGI IP-Based Network Solutions Phil Flores Major Account Manager – Cisco Systems, inc.
Project 2003 Presentation Ben Howard 15 th July 2003.
Where in the world is your data? Data Breach Analysis Angelbeat Seminar Billy Austin, President iScan Online, Inc.
Enterprise Data Management The Reuters Enterprise Platform SIBOS 2007.
NTT Com Security - Welcome to the “Attack Detection & Incident Response” Security Brunch Tom Hager Country Manager.
Connected Security Your best defense against advanced threats Anne Aarness – Intel Security.
Comprehensive Project Management Solutions with the.NET Server family.
Latest Strategies for IT Security Margaret Myers Principal Director, Deputy CIO United States Department of Defense North American Day 2006.
Legal Jeopardy: Whose Risk Is It?. SPEAKERS Jason Straight Chief Privacy Officer and Senior Vice President Cyber Risk Solutions at UnitedLex Patrick Manzo.
Michael Saucier - OSIsoft Cliff Reeves - Microsoft Your Portal to Performance An Introduction to the RtPM Platform Copyright c 2004 OSIsoft Inc. All rights.
Microsoft Azure and ServiceNow: Extending IT Best Practices to the Microsoft Cloud to Give Enterprises Total Control of Their Infrastructure MICROSOFT.
GRC: Aligning Policy, Risk and Compliance
2© Copyright 2013 EMC Corporation. All rights reserved. Cyber Intelligence Fighting Cyber Crime Insert Event Date LEADERS EDGE.
ECAT 4.1 – Rule Your Endpoints What’s New Customer Overview.
New Technology Webcast July Tyco Confidential and Proprietary Agenda Overview Why did we do this? What did we acquire? How it fits? Analytics Strategy.
How to Make Cyber Threat Intelligence Actionable
Why SIEM – Why Security Intelligence??
Enterprise Alert on Microsoft Azure Fully Automates Critical Incident Communication and Transforms It into an Intelligent, Reliable, and Mobile Experience.
Mobile Security Solution Solution Overview Check Point Mobile Threat Prevention is an innovative approach to mobile security that detects and stops advanced.
ILink Systems, Inc Feb, 2014 Government IT Solutions.
Industry Solutions Tom Ngo Chief Technology Officer.
The National Association for Information Systems Security
DevOps: Critical Success Factors in Accelerating Adoption
Increasing Information and Data Security in Today’s Cybersecurity World 2017 Conference Review 6/6/2017.
The Self-Service Business Intelligence Suite
Hurricanes, Earthquakes, and Threat Intelligence
Avenues International Inc.
Overview of the Network
Comprehensive Security and Compliance at an Affordable Price.
“Introduction to Azure Security Center”
Vikas Uberoy -Channel Director ANZ
Hybrid Management and Security
Real-time protection for web sites and web apps against ATTACKS
The Self-Service Business Intelligence Suite
Enterprise Cloud SERVICE MANAGEMENT OPERATIONS MANAGEMENT
Infrastructure, Data Center & Managed Services
Closing the Breach Detection Gap
Governance, Risk Management & Compliance (GRC) Market Share, Segmentation, Report 2024
Securing Your Digital Transformation
THE NEXT GENERATION MSSP
Detecting and Mitigating Threats: The Evolving Threat Landscape in the GCC
Logsign All-In-One Security Information and Event Management (SIEM) Solution Built on Azure Improves Security & Business Continuity MICROSOFT AZURE APP.
Attacks on The Manufacturing Industry
Securing the Threats of Tomorrow, Today.
Improve Patient Experience with Saama and Microsoft Azure
Cloud Consulting Services and Solutions
BluSync by ParaBlu Offers Secure Enterprise File Collaboration and Synchronization Solution That Uses Azure Blob Storage to Enable Secure Sharing MICROSOFT.
Kovaion Consulting IT Services Portfolio Date : Apr-2015
Overview UA has formed is forming a Security Operations Center (SOC) with Students supporting Tier 1 Activities. The SOC provides benefits to the University.
Strategic threat assessment
MAZARS’ CONSULTING PRACTICE
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
Microsoft Data Insights Summit
UDTSecure TM.
Presentation transcript:

Empowering Organisations to Thrive in the Face of Cyber Attacks An introduction to Resilient Systems Paul Ayers – General Manager, EMEA Chris Neely - Director of Sales Engineering, EMEA

Resilient Systems, Inc. – Proprietary and Confidential | 2 AGENDA ► Market Landscape ► About us ► New incident response model ► How it works ► Live demonstration

Resilient Systems, Inc. – Proprietary and Confidential | 3 Global State of Information Security 2015 The Rise of Cyber Incidents Dramatic increase of security incidents and breaches

Resilient Systems, Inc. – Proprietary and Confidential | 4 Average spend in 2 years Prevent & Protect Detect & Respond 77% 61% 75% 60% Average spend today Median spend today Median spend in 2 years 23% 39% 25% 40% Average spend in 2 years Average spend today Median spend today Median spend in 2 years Massive move in security spending is underway Research conducted April ‘15 by Pierre Audion Consultants

Resilient Systems, Inc. – Proprietary and Confidential | 5 ► Proven and Robust Processes / Best Practice ► Historically rudimentary tooling ► Now a defined market Incident Response evolution Spreadsheets Sharepoint Ticketing “Security incident response platforms (SIRPs) contain specialized capabilities intended specifically to support the response to security incidents” Technology Overview for Security Incident Response Platforms Incident Response Evolution

Resilient Systems, Inc. – Proprietary and Confidential | 6 OUR MISSION Resilient Systems empowers organizations to thrive in the face of cyberattacks and business crises.

Resilient Systems, Inc. – Proprietary and Confidential | 7 Pioneers in incident response ► Founded in 2010, created the first Incident Response Platform (IRP) ► Winning awards for innovation — and so are our customers ► World leader in incident response management bringing together people, process and technology ► Bruce Schneier, CTO — the leading security industry guru ► Headquartered in Cambridge, MA and London, UK Resilient Systems Most Innovative Product In Germany

Resilient Systems, Inc. – Proprietary and Confidential | 8 Why response SERVICES PRODUCTS PREVENTIONDETECTIONRESPONSE

Resilient Systems, Inc. – Proprietary and Confidential | 9 Select global customers PROFESSIONAL SERVICESTELECOM CRITICAL INFRASTRUCTURE HEALTHCARE MANUFACTURING TECHNOLOGY FINANCIAL RETAIL INSURANCE FEDERAL HOSPITALITY

Resilient Systems, Inc. – Proprietary and Confidential | 10 PLATFORM OVERVIEW

Resilient Systems, Inc. – Proprietary and Confidential | 11 A new approach to incident response Brings together people, process and technology to transform, orchestrate and empower your incident response

Resilient Systems, Inc. – Proprietary and Confidential | 12 A new approach to incident response It enables rapid collaboration within the IR Team and across the organization MARKETINGLEGALBUSINESSCISO CSIRTSOCFORENSICSIR

Resilient Systems, Inc. – Proprietary and Confidential | 13 A new approach to incident response ► Action plans (NIST) ► Organizational SOPs ► Event orchestration ► Task management ► Global data privacy obligations ► Tabletop exercises

Resilient Systems, Inc. – Proprietary and Confidential | 14 A new approach to incident response Brings together all your existing security investments in one place

Resilient Systems, Inc. – Proprietary and Confidential | 15 ► Creates a single hub for all IR ► Empowers teams to work more intelligently ► Agile platform ► Custom Action Module ► Compatible with all other systems Our unique value INTELLIGENCE FEEDS SIEM EXTERNAL COMMUNICATION CONFIGURATION MGT SANDBOX ASSET DATABASE FORENSICS CUSTOM PORTAL TICKETING INCIDENT RESPONSE PLATFORM

Resilient Systems, Inc. – Proprietary and Confidential | 16 ► Directory ► Endpoint forensics ► Threat Intelligence ► Endpoint controls ► Network controls INFRASTRUCTURE INTEGRATION EASY COLLABORATION AUTOMATED ESCALATION WEB FORM TROUBLE TICKETING ENTRY WIZARD SIEM DASHBOARDS & REPORTING TEAM UTILIZATION CSO DASHBOARD INCIDENT TIMELINE STATUS INCIDENTS BY TYPE OVER TIME CUSTOM DASHBOARDS & REPORTS Resilient incident response platform RESILIENT IRP MODULES PRIVACY SECURITY ACTION

Resilient Systems, Inc. – Proprietary and Confidential | 17 Sample case study – Fusion Project Resilient Platform Threat Services TIFP Aggregated Normalized ► iSIGHT ► FS-ISAC ► Etc. Analyst Action Module Remedy AD CMDB Escalate / Sync QRadar Splunk Blue CoatTaniumBit 9Bromium Artifact Lookup Escalate / Sync Enrich

Resilient Systems, Inc. – Proprietary and Confidential | 18 DEMONSTRATION

Resilient Systems, Inc. – Proprietary and Confidential | 19 Q & A