Download presentation
Presentation is loading. Please wait.
1
Cyber Defense Matrix Cyber Defense Matrix
Identify – inventorying assets and vulnerabilities, measuring attack surface, baselining normal, risk profiling Protect – preventing or limiting impact, patching, containing, isolating, hardening, managing access, vuln remediation Recover – returning to normal operations, restoring services, documenting lessons learned Detect – discovering events, triggering on anomalies, hunting for intrusions, security analytics Respond – acting on events, eradicating intrusion, assessing damage, coordinating response, forensics Cyber Defense Matrix Keep this handy while visiting the Expo Hall Send a copy to: with some vendor names filled in Questions? Tweet Devices - workstations, servers, phones, tablets, IoT, peripherals, storage, network devices, cameras, infrastructure devices Applications - software, interactions, and application flows on the devices Network - connections and traffic flowing among devices and applications Data - Information residing on, traveling through, or processed by the resources listed above Users – The people using the resources listed above Identify – inventorying assets and vulnerabilities, measuring attack surface, baselining normal, risk profiling Protect – preventing or limiting impact, patching, containing, isolating, hardening, managing access, vuln remediation Recover – returning to normal operations, restoring services, documenting lessons learned Detect – discovering events, triggering on anomalies, hunting for intrusions, security analytics Respond – acting on events, eradicating intrusion, assessing damage, coordinating response, forensics Technology People Process Degree of Dependency Cyber Defense Matrix Keep this handy while visiting the Expo Hall Send a copy to: with some vendor names filled in Questions? Tweet Devices - workstations, servers, phones, tablets, IoT, peripherals, storage, network devices, cameras, infrastructure devices Applications - software, interactions, and application flows on the devices Network - connections and traffic flowing among devices and applications Data - Information residing on, traveling through, or processed by the resources listed above Users – The people using the resources listed above Technology People Process Degree of Dependency
2
Extended Cyber Defense Matrix
Threat Actor Assets Vendor Assets Cloud Access Security Brokers Malware Sandboxes Customer Assets Man-in-the Middle, Man-in-the-Browser Detection and Mitigation Threat Intelligence Third Party Assessments Employee Assets Extended Cyber Defense Matrix Keep this handy while visiting the Expo Hall Send a copy to: with some vendor names filled in. Questions? Tweet Customer Profiling, Digital Fingerprinting, Bot Detection BYOD, MDM, MAM, EMM Threat Actor Assets Vendor Assets Customer Assets Employee Assets Third Party Assessments Man-in-the Middle, Man-in-the-Browser Detection and Mitigation BYOD, MDM, MAM, EMM Cloud Access Security Brokers Threat Intelligence Malware Sandboxes Extended Cyber Defense Matrix Keep this handy while visiting the Expo Hall Send a copy to: with some vendor names filled in. Questions? Tweet Customer Profiling, Digital Fingerprinting, Bot Detection
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.