Download presentation
Presentation is loading. Please wait.
1
Cyber Exposure – The Next Frontier
YOUR NAME| TITLE
2
TOPICS Today’s IT is creating a cyber exposure gap Who’s affected?
How to reduce your cyber exposure gap We’ve divided this presentation into three sections: How today’s IT landscape is transforming into something traditional vulnerability management solutions can’t handle, and that’s creating a gap in organization’s cyber eposure We’ll talk about how that affects who’s traditionally been responsible for vulnerability management, as well as introduces new stakeholders We’ll share some techniques and ideas on how to reduce this cyber exposure gap, working with both traditional and new partners
3
Today’s IT is Creating a Cyber Exposure Gap
4
Digital Transformation is Accelerating
Every organization is transforming into an information organization Putting pressure on every function to innovate and operate faster “Bold, tightly integrated digital strategies will be the biggest differentiator between companies that win and companies that don’t.” – McKinsey & Co. Digital transformation is a reality for every organization today – no matter the industry or size, in commercial or public sector From cloud adoption that unleashes on-demand scalability, to industrial IoT that unlocks new revenue opportunities, to DevOps approaches that accelerate innovation, to new customer touchpoints that deepen customer relationships But this accelerating adoption of technology puts pressure on every function – including IT Security Without strong internal collaboration, new technologies and processes expose the organization to more cybersecurity risk than ever (Here’s a good article with examples of digital transformation across various industries: )
5
How Are You Responding? What is the organization’s digital strategy?
How is Security enabling that strategy? What are the major digital initiatives your organization is pursuing today? (pause for discussion) What consequences do those initiatives have for IT Security? How is Security enabling those initiatives? What challenges do you face in enabling them?
6
The Attack Surface is Expanding
IoT Industrial IoT ICS/SCADA Enterprise IoT Cloud Cloud Container Web app Virtual machine Mobile Laptop IT Many security teams tell us their greatest challenge is simply seeing all the assets in their environment. Difficult because legacy security tools & approaches have not kept up with new technologies adopted by IT and Line of Business Adversaries now have a much larger attack surface to probe and attack you across Think of your security team standing on the left side of this graphic looking out into the distance – and struggling to track the organization’s laptops, cloud deployments, containers, IoT assets, and more. However – adversaries can see everything and will attack wherever they find a weak link It’s a hacker’s playground and it’s growing every day Server Desktop Network infrastructure
7
Creating a Cyber Exposure Gap
IoT Industrial IoT ICS/SCADA Enterprise IoT Cloud Cloud Container Web app Virtual machine Mobile Laptop IT The CEO and board want to know: How big is our cybersecurity risk? Where does it reside? Are we reducing it fast enough? Current approaches have fallen behind the modern attack surface, and are falling further behind every day. The distance between what legacy tools provide and what security teams need today creates the cyber exposure gap This gap creates cyber risk. This gap is what Tenable is committed to solving. Server Desktop Network infrastructure
8
Cyber Exposure is an emerging discipline for:
Managing and measuring your modern attack surface to accurately understand and reduce your cyber risk
9
Why? Discovering Short-Lived Assets is Hard
Traditional: Servers Modern: Containers Request Deploy Patch Retire
10
Why? Assessing State of Cloud Environments is Hard
Visibility 8% ...companies that know the scope of shadow IT at their organizations, according to a survey by the Cloud Security Alliance Compliance 48% ...of organizations store some sensitive data, like employee records, in the cloud according to a SANS Security in the Cloud report Consistency 31% … of respondents in the same SANS report found poor configuration practices in place due to applications being spun up quickly For a second example, let’s look at cloud infrastructure. Organizations continue to adopt more and more cloud services … Amazon Web Services leads the way with Microsoft Azure, Google Cloud Services and many other providers all offering various services For most, the benefits of cloud infrastructure is well known … flexibility, ease of deployment, ease of maintenance The long-held concern that cloud is less secure than on-prem is fading. Gartner recently reported at their Risk & Security Summit that there’s growing confidence in the security of public cloud computing That said, there are unique cloud security challenges. The slide shows three from a Cloud Security Spotlight Report from earlier in 2017 that come up consistently: Visibility Compliance Setting Consistent Security Policies Why do people consistently call out these out as security challenges? Visibility: While cloud instances, like containers, can be short-lived, they also pose a visibility challenge because you may not know about them at all if they’re shadow assets. It’s so easy for anyone in the organization to spin up their own cloud instances. According to a survey last year from the Cloud Security Alliances, only 8% of companies feel they have a good handle on the scope of Shadow IT. Compliance: Most cloud providers have a shared security model where the vendor is responsible for some aspects of security and the consumer others, but consumers might always know the details of the shared responsibility or the cloud provider might not document all the details. If that’s the case, how can a cloud consumer know that what they’re doing in the cloud is complying with the regulations they fall under? And with more organizations storing sensitive data in the cloud, like the 48% noted in the SANS Security in the Cloud report, may or may not be complying with the appropriate handling of that data. Set & Measure:
11
Why? Maintaining Application Security is Hard
Number of web applications with at least ONE vulnerability1: 99.7% Average number of web application vulnerabilities2: 3 Average time to fix web application vulnerabilities2: Critical Risk: 129 days High Risk: 196 days Sources: TechRepublic, “Report: 99.7% of web apps have at least one vulnerability,” June 20, 2017 White Hat Security, “2017 Application Security Statistics Report,” July 2017
12
Who’s Affected?
13
New Stakeholders and Asset Owners Will Impact an Organization’s Cyber Exposure
OT / IoT Cloud Container OT Manager, Engineer Line of Business DevOps OT assets are becoming an expansive attack surface Shadow IT and cloud assets are creating a huge blind spot DevOps velocity requires new security approaches
14
Security Teams Need to Provide Strategic Insight and Manage Risk Across The Organization
Reduce risk across a growing modern attack surface Security Director OT Manager, Engineer DevOps Increase SOC efficiency Maintain regulatory compliance Line of Business Secure DevOps processes Decrease costs to fix defects Protect brand equity Gain strategic decision support on risk
15
How to Reduce Your Cyber Exposure Gap
So far, we’ve talked about modern assets are changing your IT landscape and also the people who contribute to it. Let’s close out today but sharing a few ideas on how to protect this modern attack surface by reducing the cyber exposure gap.
16
Addressing the Full Cyber Exposure Lifecycle
Discover Identify and map every asset for visibility across any computing environment Measure Assess Model and analyze cyber exposure to make better business and technology decisions Understand the state of all assets, including vulnerabilities, misconfigurations and other health indicators IoT OT Cloud IT Fix Analyze Prioritize which exposures to fix first, if at all, and apply the appropriate remediation technique Understand exposures in context, to prioritize remediation based on asset criticality, threat context and vulnerability severity We’re going to use this operational lifecycle of cyber exposure framework for discussion: Discover: Continuously track any asset on any computing platform, through a single solution Assess: See any type of exposure on the asset Analyze: Understand the true risk of the exposure based on asset context Fix: Use remediation guidance and integration with other systems to ensure exposures are properly addressed Measure: Model and Analyze your cyber exposure to determine if you are improving in reducing your risk
17
Discover Every Asset server desktop laptop mobile virtual public cloud web app container Earlier, we talked about how the modern attack surface and how assets like cloud instances, containers, mobile devices, IoT devices and more are creating a cyber exposure gap. Maybe because we don’t know about them, we’re not assessing everything important to them, or we’re not doing our assessments from the right perspective. To get more visibility into these modern assets, we need to look at new techniques to identify and assess them.
18
Active Scanning + Additional Data Sensors
Agent Scanning Endpoint Networks Active Scanning Intelligent Connectors Web Mobile Cloud Image Registry Continuous Monitoring Containers Virtual For many years, discovering and assessing assets was the domain of active scanning. With modern assets, additional data sensors can bring greater visibility. For example: agents to assess hard-to-scan assets. Connectors that automatically pull information from cloud providers or complementary solutions Continuous monitoring of network data Image registry information Bringing more data sensors means being able to collect more data and get a more complete picture of your cyber exposure.
19
Assess the Current State, Including Misconfigurations
Various sources such as CIS, DISA, USGBC, and vendor supplied best practice guides Examples: Educate other stakeholders Review regularly With modern assets, like traditional assets, it’s important to assess for more than just software flaws. Assessing for secure configurations is also important. Maybe even more important with some modern assets. If we go back to the conversation about cloud security challenges, more than 1/3 of SANS report respondents said they had cloud configuration issues because applications were being spun up quickly. Some good news is that CIS and other organizations that help with security baselines have introduced or are working on secure configuration guidelines for modern assets like Docker, Amazon Web Services and others. You can strictly follow these or develop your own minimum security baseline. Some guidelines to follow: Involve others Review standard
20
Assessment Extends Beyond CVEs To Include Application Vulnerabilities
The OWASP Top 10 A1 A2 A3 A4 A5 XSS INJECTION (SQL, XXE & LDAP) BROKEN AUTH AND SESSION MANAGEMENT CROSS SITE SCRIPTING (XSS) BROKEN ACCESS CONTROL SECURITY MISCONFIGURATION A6 A7 A8 A9 A10 CSRF API SENSITIVE DATA EXPOSURE INSUFFICIENT ATTACK PROTECTION CROSS SITE REQUEST FORGERY COMPONENT VULNERABILITIES UNDERPROTECTED API
21
Analyze to Prioritize Remediation Based on Context: Cloud Services Example
All cloud services are not created equal Cloud data or sensitive data? What data could be shared? Visible? What’s interacting with the cloud service? What subnets is it connecting to? Configuration issues? The context of assets is as important in modern computing environments as it has been in traditional environments. Answering questions about the type of data in the asset and what could be shared, as well as understanding what, if any parts of your internal network the cloud service is interacting with can help with prioritizing remediation of issues in cloud services. In just the past few months, organizations using Amazon services have run into issues with AWS S3 config issues. US Veteran data has been exposed, Time Warner Cable exposed 4 million customer records, 1.8 million Chicago voter records were exposed. Once you start discovering what cloud services are in your environment, analyzing them to understand what they’re doing and then setting the appropriate assessments for them can help avoid issues like these.
22
Prioritize What to Fix Why reduce cyber exposure?
Attack surface hardening Asset inventory Patch auditing Prioritizing what to fix starts by asking these two questions: Why does your organization want to reduce cyber exposure … or in other words, what is the goal of your vuln management program How will measure and display it? Let’s move to the next slide to share a few ideas Our suggestion on prioritizing what to fix is to include modern assets in your prioritization … Once you discover them, then assess and analyze their potential impact to your organization’s cyber exposure, don’t treat them as separate or more/less important than any other assets. You should consider them as part of your IT landscape.
23
Prevent Vulnerabilities By Fixing Vulnerabilities Prior to Deployment
Integrate security into the DevOps toolchain Identify and remediate vulnerabilities before they are exploitable Ensure all assets are secure and compliant before production
24
Category Description Goal Example Metric
Attack surface hardening How exposed is my organization? Make attack surface as small as possible % exploitable vulnerabilities on internet-facing systems Asset inventory Do I know what needs protecting? Effectiveness at collecting accurate accounting of vulnerabilities – including for systems that require credentials % of systems discovered vs scanned in last 30 days Patch auditing Are my systems up to date? Effectiveness of patch process for security, feature/functionality, and warranty needs % of systems patched in last 30 days Here’s some detail on how you might measure whether or not you’re meeting the goals suggested on the previous slide. The first idea on the slide is here is Attack Surface Hardening, making your attack surface as small as possible. If that goal makes sense, you can track metrics like the percent of exploitable systems that are internet facing. Again going back to part 1 of our conversation today, your organization might decide to implement the 5 Critical Controls and have an initial goal of ensuring you inventory all assets so you know what needs protecting. Here, a metric like % of systems discovered vs scanned in the past XX days is one you could track and focus on. A final idea, and one that many customers focus on is Patch auditing - making sure systems are up to date. One metric to track effectiveness for this goal is the % of systems that are patched in the past 30 days. These goals don’t have to be mutually exclusive … you might have one or more of them for your organization. Or you might start with one and add others as it makes sense.
25
Summary Assess Analyze Fix Measure IoT OT Cloud IT Discover Modern computing today is made up of both traditional and modern assets Don’t let either increase your cyber exposure Follow an operational security lifecycle: Discover – Assess – Analyze – Fix
26
Technology Leadership
Why Tenable 8 Technology Leadership Creator of Nessus and relentless innovator advancing modern cybersecurity – from IT to cloud to IoT and OT Singular Vision #1 Vulnerability Management technology in the world, pioneering Cyber Exposure to help customers measure & reduce cybersecurity risk Customer Commitment Complete dedication to our customers’ success – every day, in all we do
27
Top 10 US Financial Institutions
Tenable at a Glance Founded in 2002 Exploded with the widespread adoption of Nessus and later, SecurityCenter Released Tenable.io in 2017 to introduce the first cyber exposure platform and evolve vulnerability management Relentless innovator: “Tenable has [massive] brand equity with Nessus, yet [is] one of the most forward-thinking companies in VM.” – Forrester, 2017 24,000+ Customers 1.6M Global Users 800+ Employees 50% 100% 80% We’re a “fifteen year young” company with the wisdom of experienced security professionals, and the ambition of industry pioneers. From Nessus to SecurityCenter to Tenable.io, Tenable has defined and re-defined vulnerability management. With Cyber Exposure, we’re raising the bar and innovating even faster than ever – all so we can solve your hardest problems. We’re honored by the company we keep – including over half of the Fortune 500 and leading organizations in every industry and geography. Fortune 500 Top 10 US Tech Companies Top 10 US Financial Institutions
28
If you are flying blind to a widening Cyber Exposure Gap, that’s just untenable.
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.