SlideShare une entreprise Scribd logo
1  sur  28
© 2017 Flexera Software LLC. All rights reserved. | Company Confidential1
Do you manage software?
Understand your role in cybersecurity defense
Marcelo Pereira, Product Marketing Manager
Tim Davis, Senior Product Marketing Manager
© 2017 Flexera Software LLC. All rights reserved. | Company Confidential2
The Cyber Threat Facing All Of Us
Costs And Consequences Security Incidents and Data Breaches
Extensive downtimeExposure of intellectual property
Damage to brand
and reputation
Theft/exposure of
confidential data
Reduced
productivity levels
© 2017 Flexera Software LLC. All rights reserved. | Company Confidential3
Impact of incidents
Source: “Cisco 2017 Annual Cybersecurity Report” http://www.cisco.com/c/en/us/products/security/security-reports.html
© 2017 Flexera Software LLC. All rights reserved. | Company Confidential4
To Watch This Webinar On Demand Register Here
© 2017 Flexera Software LLC. All rights reserved. | Company Confidential5
Security Incidents versus Data Breaches
And the cost of resolving incidents
Over
100,000
security incidents in
2015
From which
3,141
Were confirmed data
breaches
Sources:
“2016 Data Breach Investigation Report” Verizon http://www.verizonenterprise.com/verizon-insights-lab/dbir/2016/
* “2015 Cost of Cyber Crime Study: Global.” Ponemon Institute. October 2015. http://www.ponemon.org/blog/2015-cost-of-cyber-crime-united-states
$21,000
a day*
© 2017 Flexera Software LLC. All rights reserved. | Company Confidential6
Companies Breached In 2016 - Highlights
© 2017 Flexera Software LLC. All rights reserved. | Company Confidential7
“The Key Goal:
Reducing Adversaries Operational Space”
- Cisco
Source: “Cisco 2017 Annual Cybersecurity Report” http://www.cisco.com/c/en/us/products/security/security-reports.html
Addressing today’s challenges for security
© 2017 Flexera Software LLC. All rights reserved. | Company Confidential8
WATCH THIS WEBINAR ON
DEMAND REGISTER HERE
© 2017 Flexera Software LLC. All rights reserved. | Company Confidential9
Resilience
Detect
RespondRecover
Prevent
Breaches WILL
happen
Prevention:
Reduce the attack
surface for hackers
© 2017 Flexera Software LLC. All rights reserved. | Company Confidential11
“A Rapidly Expanding Attack Surface
Requires an Interconnected and Integrated
Approach to Security”
- Cisco
Source: “Cisco 2017 Annual Cybersecurity Report” http://www.cisco.com/c/en/us/products/security/security-reports.html
© 2017 Flexera Software LLC. All rights reserved. | Company Confidential12
The challenge of hitting a moving target
WATCH THIS WEBINAR ON
DEMAND REGISTER HERE
© 2017 Flexera Software LLC. All rights reserved. | Company Confidential13
Role: Information Security
Evangelize security awareness
Conduct vendor risk assessment
Oversee regulatory compliance
Assess security position of infrastructure
© 2017 Flexera Software LLC. All rights reserved. | Company Confidential14
Source: “Cisco 2017 Annual Cybersecurity Report” http://www.cisco.com/c/en/us/products/security/security-reports.html
Is Security a Priority?
© 2017 Flexera Software LLC. All rights reserved. | Company Confidential15
Role: IT Security
Mitigates the risk of security incidents and breaches
Identifies and responds quickly to incidents
© 2017 Flexera Software LLC. All rights reserved. | Company Confidential16
Dealing with possible security incidents
Source: “Cisco 2017 Annual Cybersecurity Report” http://www.cisco.com/c/en/us/products/security/security-reports.html
© 2017 Flexera Software LLC. All rights reserved. | Company Confidential17
The challenge of managing software
WATCH THIS WEBINAR ON
DEMAND REGISTER HERE
© 2017 Flexera Software LLC. All rights reserved. | Company Confidential18
Role: Desktop Management
Preform application risk assessment
Restrict use of unauthorized applications
Remove unused applications
Control Self-Service deployment
© 2017 Flexera Software LLC. All rights reserved. | Company Confidential19
Global Pharmaceutical Company
89% Reduction in the number of apps from
over 3,700 applications to just 400
• Reduced attack surface
• Improved governance
• Streamlined employee choice
• Saved $1,968,000 in labor costs in the first year
© 2017 Flexera Software LLC. All rights reserved. | Company Confidential20
Role: Software Asset Management
Discover software and maintain normalized inventory
Understand application usage trends
Reduce the application footprint
© 2017 Flexera Software LLC. All rights reserved. | Company Confidential21
Chicago Public Schools
Making informed decisions to reduce new software
purchases and negotiate more favorable vendor contracts
• Identified 29,000 different applications installed
• Discovered end of life (EOL) software
• Collaborated with the security team to remediate issues
© 2017 Flexera Software LLC. All rights reserved. | Company Confidential22
Role: Patch Management
Asses and Prioritize patching
Deploy patches and verify
Align with Security policies
© 2017 Flexera Software LLC. All rights reserved. | Company Confidential23
Security Patch Management
Challenges And Misconceptions
• Patch Management = managing deployment of patches
• No synergy between security assessment and patch activities
• Patching Microsoft applications is good enough
• Focus only on the most common non-Microsoft applications
• Relying on vendor information and alerts
CONSEQUENCES:
• Non prioritized patching process
• Waste of resources
• Applications staying unpatched for
months or many times, years
• Business disruption and breaches
© 2017 Flexera Software LLC. All rights reserved. | Company Confidential24
Time To Patch!
Patch Availability On The Day of Disclosure
Source: “Flexera Software Vulnerability Review 2017.” http://www.flexerasoftware.com/enterprise/resources/research/vulnerability-review/
81%
92.5%
© 2017 Flexera Software LLC. All rights reserved. | Company Confidential25
How our customer improved their processes
68%
69%
1 staff/day
58%
25%
Daily and
Weekly
Daily and
Weekly
2+ staff/day
© 2017 Flexera Software LLC. All rights reserved. | Company Confidential26
Conclusion
Operationalize people, processes and technology
in an integrated fashion to effectively reduce the
attack surface for cybercriminals and hackers.
Maintain and share accurate inventory data
Streamline and rationalize your portfolio
Conduct risk assessment
Prioritize security patching
© 2017 Flexera Software LLC. All rights reserved. | Company Confidential27
Additional Resources
Visit us online: www.flexerasoftware.com/enterprise/resources
White Papers:
Bridging Vulnerability Management Gaps
On Demand Webinar:
SAM and Security Teams Must Join Forces to Enhance Security
Success Story:
Chicago Public Schools
Reports:
Vulnerability Review 2017
© 2017 Flexera Software LLC. All rights reserved. | Company Confidential28
WE’RE REIMAGINING THE WAY SOFTWARE IS
w w w . f l e x e r a s o f t w a r e . c o m
SOLD SECUREDMANAGEDBOUGHT
North America: 800-809-5659
Europe, Middle East & Africa: +44 (0) 870 873 6300
Asia-Pacific: +61 3 9895 2000
WATCH THIS WEBINAR ON
DEMAND REGISTER HERE

Contenu connexe

Tendances

Tendances (20)

Webinar: Maximizing the ROI of IT by Simplifying Technology Complexity
Webinar: Maximizing the ROI of IT by Simplifying Technology ComplexityWebinar: Maximizing the ROI of IT by Simplifying Technology Complexity
Webinar: Maximizing the ROI of IT by Simplifying Technology Complexity
 
Windows 10 webinar: What’s new for IT pros Windows 10 v 1709
Windows 10 webinar: What’s new for IT pros Windows 10 v 1709Windows 10 webinar: What’s new for IT pros Windows 10 v 1709
Windows 10 webinar: What’s new for IT pros Windows 10 v 1709
 
Webinar- How Software License Optimization Empowers IT Procurement
Webinar- How Software License Optimization Empowers IT ProcurementWebinar- How Software License Optimization Empowers IT Procurement
Webinar- How Software License Optimization Empowers IT Procurement
 
Webinar: What's New In FlexNet Manager Suite 2018 R1
Webinar: What's New In FlexNet Manager Suite 2018 R1Webinar: What's New In FlexNet Manager Suite 2018 R1
Webinar: What's New In FlexNet Manager Suite 2018 R1
 
7 Things You Need to Know for Your Cloud-First Strategy
7 Things You Need to Know for Your Cloud-First Strategy7 Things You Need to Know for Your Cloud-First Strategy
7 Things You Need to Know for Your Cloud-First Strategy
 
Flexera Software Toolcase for the ITAM Review Tools Day
Flexera Software Toolcase for the ITAM Review Tools Day Flexera Software Toolcase for the ITAM Review Tools Day
Flexera Software Toolcase for the ITAM Review Tools Day
 
Get a Complete View of Your Business Services and IT Estate in ServiceNow wit...
Get a Complete View of Your Business Services and IT Estate in ServiceNow wit...Get a Complete View of Your Business Services and IT Estate in ServiceNow wit...
Get a Complete View of Your Business Services and IT Estate in ServiceNow wit...
 
10 Tips to Optimize, Automate, and Govern your Hybrid IT Environment
10 Tips to Optimize, Automate, and Govern your Hybrid IT Environment10 Tips to Optimize, Automate, and Govern your Hybrid IT Environment
10 Tips to Optimize, Automate, and Govern your Hybrid IT Environment
 
Using Automated Policies for SaaS Governance and Compliance
Using Automated Policies for SaaS Governance and ComplianceUsing Automated Policies for SaaS Governance and Compliance
Using Automated Policies for SaaS Governance and Compliance
 
GDPR is Here. Now What?
GDPR is Here. Now What?GDPR is Here. Now What?
GDPR is Here. Now What?
 
How to Keep your Atlassian Cloud Secure
How to Keep your Atlassian Cloud SecureHow to Keep your Atlassian Cloud Secure
How to Keep your Atlassian Cloud Secure
 
Cisco Connect 2018 Singapore - Do more than keep the lights on
Cisco Connect 2018 Singapore - Do more than keep the lights onCisco Connect 2018 Singapore - Do more than keep the lights on
Cisco Connect 2018 Singapore - Do more than keep the lights on
 
ServiceNow Webinar 12/1: Simplify Security Operations - Detect, Prioritize an...
ServiceNow Webinar 12/1: Simplify Security Operations - Detect, Prioritize an...ServiceNow Webinar 12/1: Simplify Security Operations - Detect, Prioritize an...
ServiceNow Webinar 12/1: Simplify Security Operations - Detect, Prioritize an...
 
Flexera New York Tools Day
Flexera New York Tools DayFlexera New York Tools Day
Flexera New York Tools Day
 
Having Trouble Managing All Your Cloud Services? We Know!
Having Trouble Managing All Your Cloud Services? We Know!Having Trouble Managing All Your Cloud Services? We Know!
Having Trouble Managing All Your Cloud Services? We Know!
 
How to Govern Identities and Access in Cloud Infrastructure: AppsFlyer Case S...
How to Govern Identities and Access in Cloud Infrastructure: AppsFlyer Case S...How to Govern Identities and Access in Cloud Infrastructure: AppsFlyer Case S...
How to Govern Identities and Access in Cloud Infrastructure: AppsFlyer Case S...
 
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud WorldCisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
 
Secure Data Sharing in OpenShift Environments
Secure Data Sharing in OpenShift EnvironmentsSecure Data Sharing in OpenShift Environments
Secure Data Sharing in OpenShift Environments
 
Software License Optimization Managed Services from Flexera Software
Software License Optimization Managed Services from Flexera SoftwareSoftware License Optimization Managed Services from Flexera Software
Software License Optimization Managed Services from Flexera Software
 
Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...
Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...
Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...
 

Similaire à Do You Manage Software? Understanding Your Role in Cybersecurity Defense

Understanding Your Attack Surface and Detecting & Mitigating External Threats
Understanding Your Attack Surface and Detecting & Mitigating External ThreatsUnderstanding Your Attack Surface and Detecting & Mitigating External Threats
Understanding Your Attack Surface and Detecting & Mitigating External Threats
Ulf Mattsson
 

Similaire à Do You Manage Software? Understanding Your Role in Cybersecurity Defense (20)

Six Steps to Secure Access for Privileged Insiders & Vendors
Six Steps to Secure Access for Privileged Insiders & VendorsSix Steps to Secure Access for Privileged Insiders & Vendors
Six Steps to Secure Access for Privileged Insiders & Vendors
 
Security and Data Breach
Security and Data BreachSecurity and Data Breach
Security and Data Breach
 
5 Mobile App Security MUST-DOs in 2018
5 Mobile App Security MUST-DOs in 20185 Mobile App Security MUST-DOs in 2018
5 Mobile App Security MUST-DOs in 2018
 
Application Security in a DevOps World
Application Security in a DevOps WorldApplication Security in a DevOps World
Application Security in a DevOps World
 
Protecting What Matters Most – Data
Protecting What Matters Most – DataProtecting What Matters Most – Data
Protecting What Matters Most – Data
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security Program
 
Integrating AppSec into Your DevSecOps on AWS - DEM14 - AWS re:Inforce 2019
Integrating AppSec into Your DevSecOps on AWS - DEM14 - AWS re:Inforce 2019 Integrating AppSec into Your DevSecOps on AWS - DEM14 - AWS re:Inforce 2019
Integrating AppSec into Your DevSecOps on AWS - DEM14 - AWS re:Inforce 2019
 
Vetting Mobile Apps for Corporate Use: Security Essentials
Vetting Mobile Apps for Corporate Use: Security EssentialsVetting Mobile Apps for Corporate Use: Security Essentials
Vetting Mobile Apps for Corporate Use: Security Essentials
 
Synopsys Security Event Israel Presentation: Keynote: Securing Your Software,...
Synopsys Security Event Israel Presentation: Keynote: Securing Your Software,...Synopsys Security Event Israel Presentation: Keynote: Securing Your Software,...
Synopsys Security Event Israel Presentation: Keynote: Securing Your Software,...
 
Responding to the Pandemic: Information Security and Technology Trends
Responding to the Pandemic: Information Security and Technology Trends Responding to the Pandemic: Information Security and Technology Trends
Responding to the Pandemic: Information Security and Technology Trends
 
Top 6 Web Application Security Best Practices.pdf
Top 6 Web Application Security Best Practices.pdfTop 6 Web Application Security Best Practices.pdf
Top 6 Web Application Security Best Practices.pdf
 
Understanding Your Attack Surface and Detecting & Mitigating External Threats
Understanding Your Attack Surface and Detecting & Mitigating External ThreatsUnderstanding Your Attack Surface and Detecting & Mitigating External Threats
Understanding Your Attack Surface and Detecting & Mitigating External Threats
 
Cisco Connect 2018 Thailand - Changing the security equation demetris booth_c...
Cisco Connect 2018 Thailand - Changing the security equation demetris booth_c...Cisco Connect 2018 Thailand - Changing the security equation demetris booth_c...
Cisco Connect 2018 Thailand - Changing the security equation demetris booth_c...
 
Solving for Compliance: Mobile app security for banking and financial services
Solving for Compliance: Mobile app security for banking and financial servicesSolving for Compliance: Mobile app security for banking and financial services
Solving for Compliance: Mobile app security for banking and financial services
 
Cisco Connect 2018 Malaysia - Cisco incident response services-strengthen you...
Cisco Connect 2018 Malaysia - Cisco incident response services-strengthen you...Cisco Connect 2018 Malaysia - Cisco incident response services-strengthen you...
Cisco Connect 2018 Malaysia - Cisco incident response services-strengthen you...
 
Cybersecurity - How to Protect your Organisation from Cybersecurity Threats
Cybersecurity - How to Protect your Organisation from Cybersecurity Threats Cybersecurity - How to Protect your Organisation from Cybersecurity Threats
Cybersecurity - How to Protect your Organisation from Cybersecurity Threats
 
Alfresco Virtual DevCon 2020 - Security First!
Alfresco Virtual DevCon 2020 - Security First!Alfresco Virtual DevCon 2020 - Security First!
Alfresco Virtual DevCon 2020 - Security First!
 
Implementing a Security Management Framework
Implementing a Security Management FrameworkImplementing a Security Management Framework
Implementing a Security Management Framework
 
SecDevOps: afaste-se dos ciberataques sem complicar o dia a dia dos desenvolv...
SecDevOps: afaste-se dos ciberataques sem complicar o dia a dia dos desenvolv...SecDevOps: afaste-se dos ciberataques sem complicar o dia a dia dos desenvolv...
SecDevOps: afaste-se dos ciberataques sem complicar o dia a dia dos desenvolv...
 
3 Enablers of Successful Cyber Attacks and How to Thwart Them
3 Enablers of Successful Cyber Attacks and How to Thwart Them3 Enablers of Successful Cyber Attacks and How to Thwart Them
3 Enablers of Successful Cyber Attacks and How to Thwart Them
 

Plus de Flexera

Plus de Flexera (15)

Make Smarter Cloud Decisions at Every Step of Your Journey
Make Smarter Cloud Decisions at Every Step of Your JourneyMake Smarter Cloud Decisions at Every Step of Your Journey
Make Smarter Cloud Decisions at Every Step of Your Journey
 
The Practical Approach for End-to-End SaaS Management
The Practical Approach for End-to-End SaaS ManagementThe Practical Approach for End-to-End SaaS Management
The Practical Approach for End-to-End SaaS Management
 
The Role of In-House & External Counsel in Managing Open Source Software
The Role of In-House & External Counsel in Managing Open Source SoftwareThe Role of In-House & External Counsel in Managing Open Source Software
The Role of In-House & External Counsel in Managing Open Source Software
 
Addressing Open Source Risks During M&A: A Legal View
Addressing Open Source Risks During M&A: A Legal ViewAddressing Open Source Risks During M&A: A Legal View
Addressing Open Source Risks During M&A: A Legal View
 
Webinar: What's New In FlexNet Manager Suite 2018 R1
Webinar: What's New In FlexNet Manager Suite 2018 R1Webinar: What's New In FlexNet Manager Suite 2018 R1
Webinar: What's New In FlexNet Manager Suite 2018 R1
 
Open Source Security - It can be done easily.
Open Source Security - It can be done easily.Open Source Security - It can be done easily.
Open Source Security - It can be done easily.
 
Software Distribution, Customer Experience and the IoT: Get Ready for Fast, S...
Software Distribution, Customer Experience and the IoT: Get Ready for Fast, S...Software Distribution, Customer Experience and the IoT: Get Ready for Fast, S...
Software Distribution, Customer Experience and the IoT: Get Ready for Fast, S...
 
Don’t Let Hackers Breach Your Data: Shutting Your Risk Window on Apache Struts2
Don’t Let Hackers Breach Your Data:  Shutting Your Risk Window on Apache Struts2Don’t Let Hackers Breach Your Data:  Shutting Your Risk Window on Apache Struts2
Don’t Let Hackers Breach Your Data: Shutting Your Risk Window on Apache Struts2
 
Digital Transformation, Cloud Adoption and the Impact on SAM and Security
Digital Transformation, Cloud Adoption and the Impact on SAM and SecurityDigital Transformation, Cloud Adoption and the Impact on SAM and Security
Digital Transformation, Cloud Adoption and the Impact on SAM and Security
 
10 Steps to Simplify your Windows 10 Migration
10 Steps to Simplify your Windows 10 Migration10 Steps to Simplify your Windows 10 Migration
10 Steps to Simplify your Windows 10 Migration
 
Webinar: Making the Move to SaaS - Commercial and Licensing Implications
Webinar: Making the Move to SaaS - Commercial and Licensing ImplicationsWebinar: Making the Move to SaaS - Commercial and Licensing Implications
Webinar: Making the Move to SaaS - Commercial and Licensing Implications
 
Cybersecurity Strategy Must Include Software License Optimization
Cybersecurity Strategy Must Include Software License OptimizationCybersecurity Strategy Must Include Software License Optimization
Cybersecurity Strategy Must Include Software License Optimization
 
Webinar: The Power of Normalized Inventory
Webinar: The Power of Normalized InventoryWebinar: The Power of Normalized Inventory
Webinar: The Power of Normalized Inventory
 
Windows 10 One Year Later: What’s Holding You Back?
Windows 10 One Year Later: What’s Holding You Back? Windows 10 One Year Later: What’s Holding You Back?
Windows 10 One Year Later: What’s Holding You Back?
 
Webinar: What's New in FlexNet Manager Suite 2016
Webinar: What's New in FlexNet Manager Suite 2016Webinar: What's New in FlexNet Manager Suite 2016
Webinar: What's New in FlexNet Manager Suite 2016
 

Dernier

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Dernier (20)

FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 

Do You Manage Software? Understanding Your Role in Cybersecurity Defense

  • 1. © 2017 Flexera Software LLC. All rights reserved. | Company Confidential1 Do you manage software? Understand your role in cybersecurity defense Marcelo Pereira, Product Marketing Manager Tim Davis, Senior Product Marketing Manager
  • 2. © 2017 Flexera Software LLC. All rights reserved. | Company Confidential2 The Cyber Threat Facing All Of Us Costs And Consequences Security Incidents and Data Breaches Extensive downtimeExposure of intellectual property Damage to brand and reputation Theft/exposure of confidential data Reduced productivity levels
  • 3. © 2017 Flexera Software LLC. All rights reserved. | Company Confidential3 Impact of incidents Source: “Cisco 2017 Annual Cybersecurity Report” http://www.cisco.com/c/en/us/products/security/security-reports.html
  • 4. © 2017 Flexera Software LLC. All rights reserved. | Company Confidential4 To Watch This Webinar On Demand Register Here
  • 5. © 2017 Flexera Software LLC. All rights reserved. | Company Confidential5 Security Incidents versus Data Breaches And the cost of resolving incidents Over 100,000 security incidents in 2015 From which 3,141 Were confirmed data breaches Sources: “2016 Data Breach Investigation Report” Verizon http://www.verizonenterprise.com/verizon-insights-lab/dbir/2016/ * “2015 Cost of Cyber Crime Study: Global.” Ponemon Institute. October 2015. http://www.ponemon.org/blog/2015-cost-of-cyber-crime-united-states $21,000 a day*
  • 6. © 2017 Flexera Software LLC. All rights reserved. | Company Confidential6 Companies Breached In 2016 - Highlights
  • 7. © 2017 Flexera Software LLC. All rights reserved. | Company Confidential7 “The Key Goal: Reducing Adversaries Operational Space” - Cisco Source: “Cisco 2017 Annual Cybersecurity Report” http://www.cisco.com/c/en/us/products/security/security-reports.html Addressing today’s challenges for security
  • 8. © 2017 Flexera Software LLC. All rights reserved. | Company Confidential8 WATCH THIS WEBINAR ON DEMAND REGISTER HERE
  • 9. © 2017 Flexera Software LLC. All rights reserved. | Company Confidential9 Resilience Detect RespondRecover Prevent Breaches WILL happen
  • 11. © 2017 Flexera Software LLC. All rights reserved. | Company Confidential11 “A Rapidly Expanding Attack Surface Requires an Interconnected and Integrated Approach to Security” - Cisco Source: “Cisco 2017 Annual Cybersecurity Report” http://www.cisco.com/c/en/us/products/security/security-reports.html
  • 12. © 2017 Flexera Software LLC. All rights reserved. | Company Confidential12 The challenge of hitting a moving target WATCH THIS WEBINAR ON DEMAND REGISTER HERE
  • 13. © 2017 Flexera Software LLC. All rights reserved. | Company Confidential13 Role: Information Security Evangelize security awareness Conduct vendor risk assessment Oversee regulatory compliance Assess security position of infrastructure
  • 14. © 2017 Flexera Software LLC. All rights reserved. | Company Confidential14 Source: “Cisco 2017 Annual Cybersecurity Report” http://www.cisco.com/c/en/us/products/security/security-reports.html Is Security a Priority?
  • 15. © 2017 Flexera Software LLC. All rights reserved. | Company Confidential15 Role: IT Security Mitigates the risk of security incidents and breaches Identifies and responds quickly to incidents
  • 16. © 2017 Flexera Software LLC. All rights reserved. | Company Confidential16 Dealing with possible security incidents Source: “Cisco 2017 Annual Cybersecurity Report” http://www.cisco.com/c/en/us/products/security/security-reports.html
  • 17. © 2017 Flexera Software LLC. All rights reserved. | Company Confidential17 The challenge of managing software WATCH THIS WEBINAR ON DEMAND REGISTER HERE
  • 18. © 2017 Flexera Software LLC. All rights reserved. | Company Confidential18 Role: Desktop Management Preform application risk assessment Restrict use of unauthorized applications Remove unused applications Control Self-Service deployment
  • 19. © 2017 Flexera Software LLC. All rights reserved. | Company Confidential19 Global Pharmaceutical Company 89% Reduction in the number of apps from over 3,700 applications to just 400 • Reduced attack surface • Improved governance • Streamlined employee choice • Saved $1,968,000 in labor costs in the first year
  • 20. © 2017 Flexera Software LLC. All rights reserved. | Company Confidential20 Role: Software Asset Management Discover software and maintain normalized inventory Understand application usage trends Reduce the application footprint
  • 21. © 2017 Flexera Software LLC. All rights reserved. | Company Confidential21 Chicago Public Schools Making informed decisions to reduce new software purchases and negotiate more favorable vendor contracts • Identified 29,000 different applications installed • Discovered end of life (EOL) software • Collaborated with the security team to remediate issues
  • 22. © 2017 Flexera Software LLC. All rights reserved. | Company Confidential22 Role: Patch Management Asses and Prioritize patching Deploy patches and verify Align with Security policies
  • 23. © 2017 Flexera Software LLC. All rights reserved. | Company Confidential23 Security Patch Management Challenges And Misconceptions • Patch Management = managing deployment of patches • No synergy between security assessment and patch activities • Patching Microsoft applications is good enough • Focus only on the most common non-Microsoft applications • Relying on vendor information and alerts CONSEQUENCES: • Non prioritized patching process • Waste of resources • Applications staying unpatched for months or many times, years • Business disruption and breaches
  • 24. © 2017 Flexera Software LLC. All rights reserved. | Company Confidential24 Time To Patch! Patch Availability On The Day of Disclosure Source: “Flexera Software Vulnerability Review 2017.” http://www.flexerasoftware.com/enterprise/resources/research/vulnerability-review/ 81% 92.5%
  • 25. © 2017 Flexera Software LLC. All rights reserved. | Company Confidential25 How our customer improved their processes 68% 69% 1 staff/day 58% 25% Daily and Weekly Daily and Weekly 2+ staff/day
  • 26. © 2017 Flexera Software LLC. All rights reserved. | Company Confidential26 Conclusion Operationalize people, processes and technology in an integrated fashion to effectively reduce the attack surface for cybercriminals and hackers. Maintain and share accurate inventory data Streamline and rationalize your portfolio Conduct risk assessment Prioritize security patching
  • 27. © 2017 Flexera Software LLC. All rights reserved. | Company Confidential27 Additional Resources Visit us online: www.flexerasoftware.com/enterprise/resources White Papers: Bridging Vulnerability Management Gaps On Demand Webinar: SAM and Security Teams Must Join Forces to Enhance Security Success Story: Chicago Public Schools Reports: Vulnerability Review 2017
  • 28. © 2017 Flexera Software LLC. All rights reserved. | Company Confidential28 WE’RE REIMAGINING THE WAY SOFTWARE IS w w w . f l e x e r a s o f t w a r e . c o m SOLD SECUREDMANAGEDBOUGHT North America: 800-809-5659 Europe, Middle East & Africa: +44 (0) 870 873 6300 Asia-Pacific: +61 3 9895 2000 WATCH THIS WEBINAR ON DEMAND REGISTER HERE