Presentation is loading. Please wait.

Presentation is loading. Please wait.

Security Track Day 1 Richard Stiennon Chief Research Analyst IT-Harvest Blog: ThreatChaos.com twitter.com/stiennon IT-Harvest Confidential.

Similar presentations


Presentation on theme: "Security Track Day 1 Richard Stiennon Chief Research Analyst IT-Harvest Blog: ThreatChaos.com twitter.com/stiennon IT-Harvest Confidential."— Presentation transcript:

1 Security Track Day 1 Richard Stiennon Chief Research Analyst IT-Harvest Blog: ThreatChaos.com twitter.com/stiennon IT-Harvest Confidential

2 Blog: www.ThreatChaos.com twitter.com/cyberwar IT-Harvest Confidential

3 The Week’s Agenda Today, August 2, 2010 What CXOs consistently fail to grasp about enterprise security Day 2 Getting beyond vulnerabilities; resilience in security architectures Day 3 Threat and risk management Day 4 Security and ROI Day 5 Data protection: strategies inside and outside the enterprise IT-Harvest Confidential

4 What CXOs consistently fail to grasp about enterprise security IT-Harvest Confidential 1. The difference between good security operations and good security Good security operations keep your IT functions working. They include the mundane tasks of maintaining logs, blocking viruses and worms, fixing vulnerabilities, and incident recovery as well as compliance and audit.

5 Three simple rules of good security IT-Harvest Confidential 1. Secure networks assume that hosts are hostile 2. Secure hosts assume the network is hostile 3. Secure applications assume the user is hostile

6 Why security investments never end Every new technology evolution increases productivity, access to information, and reliance on the network. It also exposes operations to new threats. New requirements for security investment are NOT driven by vendors. Today's worry: targeted attacks IT-Harvest Confidential

7 Audit and compliance get in the way of good security IT-Harvest Confidential HIPPA, GLB, SOX, PCI are just the beginning. 40 bills pending in Congress, not to mention EU, India, China, and Australia Do not let compliance demands get in the way of protecting your critical information assets!

8 IT-Harvest Confidential Blog: www.threatchaos.com email: richard@it-harvest.comrichard@it-harvest.com twitter.com/cyberwar


Download ppt "Security Track Day 1 Richard Stiennon Chief Research Analyst IT-Harvest Blog: ThreatChaos.com twitter.com/stiennon IT-Harvest Confidential."

Similar presentations


Ads by Google