SlideShare une entreprise Scribd logo
1  sur  30
Stay out of headlines
for non-compliance or security breach
Gant Redmon

Sridhar Karnam

Co3 Systems, General Counsel
Management

HP Enterprise Security Product

1

© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
“If you know the enemy and know
yourself, you need not fear the
result of a hundred battle”
Sun Tzu, The Art of War

2

© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
2012
Security and Compliance
becoming the same thing
- PCI, HIPAA, GLB
“75% of CISOs who experience publicly disclosed security
breaches and lack documented, tested response plans will be
fired”
- Gartner: July 2012
expediency
v. accuracy

“It’s about the response … with all hands on deck in a
coordinated manner.”
- Gant:January 2014

© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Breach Response
Track 1: Focus on cause analysis, remediation and customer
communication
Track 2: Legal compliance, communication with authorities,
corporate filings

Companies often do Track 1 and then Track 2
But these tracks don’t have to be separate.

Incident response plans need to cover more that closing the
vulnerability
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
How much does privacy cost?

© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
How much do hackers pay?

6

© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

$499
$499
$499
$399
$33
$55
$99
$88
$99
Security is a bigger than just an IT problem
Security is a board level discussion
Cyber threat
Data Breach

CISO

56% of organizations have been
94% of the data breaches were

Financial loss

$8.6M average cost associated

the target of a cyber attack

reported by third-parties

with data breach

30% market cap reduction due to

Cost of protection

11% of total IT budget spent on

Reactive vs. proactive

7

Reputation damage

97% of data breaches could have

© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

recent events

security

been avoided
Compliance landscape
Annual cost of SOX compliance:
$1.8M or equivalent cost of roughly
14.4 employees!

•

•
•
•
•

User management
Access control/authorization
Change management
Security operations
Differences is mainly in interpretation

• Leverage similarities to increase efficiencies
and reduce costs
• Consistent themes across regulations
8

NIST

SAS 70

ISO 27001

NIACAP

FISMA

FTC

SEC

• Any similarities in compliance activities?

SOX

OCC

CobiT

FERC/NERC

ISO 17799
PIPEDA
COSO

NY Privacy
J-SOX

US Patriot Act
DITSCAP

GLBA

FFIEC

© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

DATA

HIPAA

ITIL
Basel II

PCI

CA-1386

FDPA
Compliance Problem
Too complex…

Silo’d products…

Big data…

Expensive…

policies and controls
change often

don’t learn or share
information

too much data to process
and understand the
pattern

each regulation needs
resources and budget

9

© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
70% similarities between compliance & security
User
Management

IT Security

Access /
Incident
Authorization Management

SOX

HIPAA

NIST
FISMA
HIPAA

PCI
SOX

FISMA

PCI
NIST

CobiT

10

CobiT

© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

Security
Operations
Management Operations
Why use multiple tools then?

Security

Compliance

Common
Text
challenges

Operations

11

© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Best Practices

© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Vision: Consolidated view
Single view of IT security, IT operations, and IT GRC
Heat map

• Prioritization
• Heat map of risk to
business services

13

Asset mapping

• Quick isolation of
incidents and threats
• Vulnerability score and
intelligence

Risk indicators

• Aggregation of
multiple risk sources
• Risk reporting and
trending

© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

Continuous
compliance

• Continuous monitoring
• Compliance analytics
Strategy: Centralized approach
Seamless integration of security and compliance tools – No point-solutions

SECURITY
User Provisioning
Identity & Access Mgmt
Database Encryption
Anti-Virus, Endpoint
Firewall, Email Security

See
Everything

Act
Understand
Context

COMPLIANCE
User Management
Auditing and audit logs
Dashboard and Reporting
Controls monitoring
Disclosure

14

See
Everything

© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

Proactive
Risk management
Best Practice 1: Continuous monitoring
Security information and event management (SIEM) approach to continuously
and comprehensively monitor and correlate data across the organization

• Collection complete visibility
Monitoring
& alerting
Dashboar
d

Analysis

Machine
Data

IT GRC

• Search quickly to simplify IT
• IT GRC & Security in a single tool

Search
Log
Collection

15

• Analyze events in real time to deliver insight

• Reporting on log data
• IT operations through monitoring & alerting

© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Best Practice 2: Assess controls
Correlation of all the data 24/7

Real-time, cross-device
correlation of logs and events
across IT
• Correlation = Establishing relationships
• Connect roles, responsibilities, identities, history, and
trends to detect business risk violations
• Pattern recognition
• Anomaly detection
• The more you collect, the smarter it gets

16

Software

Hardware

© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

People

Process
Best Practice 3 : Unify data across IT
Convert all machine data into common format for search, report, and retention
Raw machine data
Jun 17 2009 12:16:03: %PIX-6-106015: Deny TCP (no connection) from 10.50.215.102/15605 to
204.110.227.16/443 flags FIN ACK on interface outside
Jun 17 2009 14:53:16 drop gw.foobar.com >eth0 product VPN-1 & Firewall-1 src xxx.xxx.146.12 s_port 2523 dst
xxx.xxx.10.2 service ms-sql-m proto udp rule 49

Unified data
Time (Event
name
Time)

Device
Vendor

DeviceProduct

Category
Behavior

Category
DeviceGroup

Category
Outcome

Category
Significance

Cisco

PIX

/Access

/Firewall

/Failure

/Informational/
Warning

/Access/Start

/Firewall

/Failure

/Informational/
Warning

6/17/2009
12:16:03

Deny

6/17/2009
14:53:16

Drop Checkpoint Firewall-1/VPN-1

Benefit: Single data for searching, indexing, reporting, and archiving

17

© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Best Practice 4: Next-Generation Network
Monitor network activities for malicious activity through IPS and log
Security
management
Digital Vaccine Labs
• Delivers zero-day
coverage

Next-Generation IPS
• 99.99999% of
network uptime track
record

Integrated
Policy
Next Gen FW

Next-Generation
Firewall
• Granular application
visibility and control

18

© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

Security Management
System
• Centralized
management
console across
NGIPS and NGFW
Best Practice 5: Think security from the
Develop immunity for threats right through development of applications
begining
Automated code
testing

Manual review

Testing of code during
development

19

App runtime testing
Security testing of 3rd party

Security experts

© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Best Practice 6: Incident Response
Readiness to validate and respond the incidents

Prepare

20

Assess & report

© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

Manage
Incident Response Framework
PREPARE
Improve Organizational Readiness
•
•
•
•

Assign response team
Describe environment
Simulate events and incidents
Focus on organizational gaps

REPORT
Document Results and Track
Performance
• Document incident results
• Track historical performance
• Demonstrate organizational
preparedness
• Generate audit/compliance reports
21

ASSESS
Quantify Potential Impact, Support
Privacy Impact Assessments

© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

•
•
•
•
•

Track events
Scope regulatory requirements
See $ exposure
Send notice to team
Generate PIAs

MANAGE
Easily Generate Detailed Incident
Response Plans
•
•
•
•
•

Escalate to complete IR plan
Oversee the complete plan
Assign tasks: who/what/when
Notify regulators and clients
Monitor progress to completion
Best practices from Co3 Systems’ technologies

22

© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Best practices from Co3 Systems’ technologies

23

© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Best practices from Co3 Systems’ technologies

24

© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Best practices from Co3 Systems’ technologies

25

© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Best practices from Co3 Systems’ technologies

26

© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Best practices from Co3 Systems’ technologies

27

© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
“Co3 Systems makes the process of planning for a nightmare scenario
as painless as possible, making it an Editors’ Choice.”
PC MAGAZINE, EDITOR’S CHOICE
One Alewife Center, Suite 450
Cambridge, MA 02140

“One of the hottest products at RSA…”

WWW.CO3SYS.COM

NETWORK WORLD

Gant Redmon
General Counsel
EMAIL gredmon@co3sys.com
PHONE 617.300.8136

“an invaluable weapon when responding to security incidents.”
GOVERNMENT COMPUTER NEWS
“Adding the Security Module... to this otherwise fine suite of services, Co3
has done better than a home-run...it has knocked one out of the park.”
SC MAGAZINE
Reduction in incident management
Reduces 3,000 incidents per day to
fewer than 200 per day

Up to 90%

Automated
Compliance

Huge cost savings
Average cost savings of $1,000,000
per quarter from SOX compliance
packs

$1,000,000

Resource optimization
Automation helps to process 4x more
events 24x7 resulting in better
utilization of resources

Reduction in compliance audits
Automating these compliance is one
time task and saves 90% of time every
quarter from each audit

400%

90%

NIST, ISO, PCI, SOX combined with security
Better visibility, high productivity, fewer compliance violations, simple audits,
consistent controls and processes

Simple Audits
29

© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
managed
in-house/legacy
custom apps Apps
cloud
Systems Monitoring

30

Virtual

© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

Applications

Security

SIEM
log management

Cloud
security

Insider threats

Mobile Monitoring Continuous
compliance

SaaS

350+ CEF
partners

Big Data

IT operations
Storage

Security Analytics

Thank you

Contenu connexe

Tendances

Is SIEM really Dead ? OR Can it evolve into a Platform ?
Is SIEM really Dead ? OR Can it evolve into a Platform ?Is SIEM really Dead ? OR Can it evolve into a Platform ?
Is SIEM really Dead ? OR Can it evolve into a Platform ?Aujas
 
AccelOps & SOC-NOC Convergence
AccelOps & SOC-NOC ConvergenceAccelOps & SOC-NOC Convergence
AccelOps & SOC-NOC ConvergenceStephen Tsuchiyama
 
Jervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At Odds
Jervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At OddsJervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At Odds
Jervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At Oddscentralohioissa
 
Protecting Mission-Critical Source Code from Application Security Vulnerabili...
Protecting Mission-Critical Source Code from Application Security Vulnerabili...Protecting Mission-Critical Source Code from Application Security Vulnerabili...
Protecting Mission-Critical Source Code from Application Security Vulnerabili...IBM Security
 
Top 10 SIEM Best Practices, SANS Ask the Expert
Top 10 SIEM Best Practices, SANS Ask the ExpertTop 10 SIEM Best Practices, SANS Ask the Expert
Top 10 SIEM Best Practices, SANS Ask the ExpertAccelOps
 
Automation and Orchestration - Harnessing Threat Intelligence for Better Inci...
Automation and Orchestration - Harnessing Threat Intelligence for Better Inci...Automation and Orchestration - Harnessing Threat Intelligence for Better Inci...
Automation and Orchestration - Harnessing Threat Intelligence for Better Inci...Chris Ross
 
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondHow BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondSecPod Technologies
 
Governance fail security fail
Governance fail security failGovernance fail security fail
Governance fail security failEnclaveSecurity
 
Avoiding the Data Compliance "Hot Seat"
Avoiding the Data Compliance "Hot Seat"Avoiding the Data Compliance "Hot Seat"
Avoiding the Data Compliance "Hot Seat"IBM Security
 
Building an AppSec Team Extended Cut
Building an AppSec Team Extended CutBuilding an AppSec Team Extended Cut
Building an AppSec Team Extended CutMike Spaulding
 
Protecting endpoints from targeted attacks
Protecting endpoints from targeted attacksProtecting endpoints from targeted attacks
Protecting endpoints from targeted attacksAppSense
 
Essential Power Case Study: Protecting Critical Infrastructure From Cyber Att...
Essential Power Case Study: Protecting Critical Infrastructure From Cyber Att...Essential Power Case Study: Protecting Critical Infrastructure From Cyber Att...
Essential Power Case Study: Protecting Critical Infrastructure From Cyber Att...EnergySec
 
2008: Web Application Security Tutorial
2008: Web Application Security Tutorial2008: Web Application Security Tutorial
2008: Web Application Security TutorialNeil Matatall
 
The RIPE Experience
The RIPE ExperienceThe RIPE Experience
The RIPE ExperienceDigital Bond
 
So You Got That SIEM. NOW What Do You Do?  by Dr. Anton Chuvakin
So You Got That SIEM. NOW What Do You Do?  by Dr. Anton ChuvakinSo You Got That SIEM. NOW What Do You Do?  by Dr. Anton Chuvakin
So You Got That SIEM. NOW What Do You Do?  by Dr. Anton ChuvakinAnton Chuvakin
 
Database monitoring - First and Last Line of Defense
Database monitoring - First and Last Line of Defense Database monitoring - First and Last Line of Defense
Database monitoring - First and Last Line of Defense Imperva
 
Timothy Wright & Stephen Halwes - Finding the Needle in the Hardware – Identi...
Timothy Wright & Stephen Halwes - Finding the Needle in the Hardware – Identi...Timothy Wright & Stephen Halwes - Finding the Needle in the Hardware – Identi...
Timothy Wright & Stephen Halwes - Finding the Needle in the Hardware – Identi...centralohioissa
 
Ken Czekaj & Robert Wright - Leveraging APM NPM Solutions to Compliment Cyber...
Ken Czekaj & Robert Wright - Leveraging APM NPM Solutions to Compliment Cyber...Ken Czekaj & Robert Wright - Leveraging APM NPM Solutions to Compliment Cyber...
Ken Czekaj & Robert Wright - Leveraging APM NPM Solutions to Compliment Cyber...centralohioissa
 

Tendances (20)

Is SIEM really Dead ? OR Can it evolve into a Platform ?
Is SIEM really Dead ? OR Can it evolve into a Platform ?Is SIEM really Dead ? OR Can it evolve into a Platform ?
Is SIEM really Dead ? OR Can it evolve into a Platform ?
 
Cyber threats
Cyber threatsCyber threats
Cyber threats
 
AccelOps & SOC-NOC Convergence
AccelOps & SOC-NOC ConvergenceAccelOps & SOC-NOC Convergence
AccelOps & SOC-NOC Convergence
 
Jervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At Odds
Jervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At OddsJervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At Odds
Jervis Hui - No Tradeoffs: Cloud Security & Privacy Don't Need To Be At Odds
 
Security assessment with a hint of CISSP Prep
Security assessment with a hint of CISSP PrepSecurity assessment with a hint of CISSP Prep
Security assessment with a hint of CISSP Prep
 
Protecting Mission-Critical Source Code from Application Security Vulnerabili...
Protecting Mission-Critical Source Code from Application Security Vulnerabili...Protecting Mission-Critical Source Code from Application Security Vulnerabili...
Protecting Mission-Critical Source Code from Application Security Vulnerabili...
 
Top 10 SIEM Best Practices, SANS Ask the Expert
Top 10 SIEM Best Practices, SANS Ask the ExpertTop 10 SIEM Best Practices, SANS Ask the Expert
Top 10 SIEM Best Practices, SANS Ask the Expert
 
Automation and Orchestration - Harnessing Threat Intelligence for Better Inci...
Automation and Orchestration - Harnessing Threat Intelligence for Better Inci...Automation and Orchestration - Harnessing Threat Intelligence for Better Inci...
Automation and Orchestration - Harnessing Threat Intelligence for Better Inci...
 
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondHow BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
 
Governance fail security fail
Governance fail security failGovernance fail security fail
Governance fail security fail
 
Avoiding the Data Compliance "Hot Seat"
Avoiding the Data Compliance "Hot Seat"Avoiding the Data Compliance "Hot Seat"
Avoiding the Data Compliance "Hot Seat"
 
Building an AppSec Team Extended Cut
Building an AppSec Team Extended CutBuilding an AppSec Team Extended Cut
Building an AppSec Team Extended Cut
 
Protecting endpoints from targeted attacks
Protecting endpoints from targeted attacksProtecting endpoints from targeted attacks
Protecting endpoints from targeted attacks
 
Essential Power Case Study: Protecting Critical Infrastructure From Cyber Att...
Essential Power Case Study: Protecting Critical Infrastructure From Cyber Att...Essential Power Case Study: Protecting Critical Infrastructure From Cyber Att...
Essential Power Case Study: Protecting Critical Infrastructure From Cyber Att...
 
2008: Web Application Security Tutorial
2008: Web Application Security Tutorial2008: Web Application Security Tutorial
2008: Web Application Security Tutorial
 
The RIPE Experience
The RIPE ExperienceThe RIPE Experience
The RIPE Experience
 
So You Got That SIEM. NOW What Do You Do?  by Dr. Anton Chuvakin
So You Got That SIEM. NOW What Do You Do?  by Dr. Anton ChuvakinSo You Got That SIEM. NOW What Do You Do?  by Dr. Anton Chuvakin
So You Got That SIEM. NOW What Do You Do?  by Dr. Anton Chuvakin
 
Database monitoring - First and Last Line of Defense
Database monitoring - First and Last Line of Defense Database monitoring - First and Last Line of Defense
Database monitoring - First and Last Line of Defense
 
Timothy Wright & Stephen Halwes - Finding the Needle in the Hardware – Identi...
Timothy Wright & Stephen Halwes - Finding the Needle in the Hardware – Identi...Timothy Wright & Stephen Halwes - Finding the Needle in the Hardware – Identi...
Timothy Wright & Stephen Halwes - Finding the Needle in the Hardware – Identi...
 
Ken Czekaj & Robert Wright - Leveraging APM NPM Solutions to Compliment Cyber...
Ken Czekaj & Robert Wright - Leveraging APM NPM Solutions to Compliment Cyber...Ken Czekaj & Robert Wright - Leveraging APM NPM Solutions to Compliment Cyber...
Ken Czekaj & Robert Wright - Leveraging APM NPM Solutions to Compliment Cyber...
 

Similaire à Stay out of headlines for non compliance or data breach

HPE-Security update talk presented in Vienna to partners on 15th April 2016
HPE-Security update talk presented in Vienna to partners on 15th April 2016HPE-Security update talk presented in Vienna to partners on 15th April 2016
HPE-Security update talk presented in Vienna to partners on 15th April 2016SteveAtHPE
 
Inteligentní ochrana osobních údajů v procesu digitální transformace
Inteligentní ochrana osobních údajů v procesu digitální transformaceInteligentní ochrana osobních údajů v procesu digitální transformace
Inteligentní ochrana osobních údajů v procesu digitální transformaceMarketingArrowECS_CZ
 
Bridging the Gap Between Your Security Defenses and Critical Data
Bridging the Gap Between Your Security Defenses and Critical DataBridging the Gap Between Your Security Defenses and Critical Data
Bridging the Gap Between Your Security Defenses and Critical DataIBM Security
 
Are your Cloud Services Secure and Compliant today?
Are your Cloud Services Secure and Compliant today?Are your Cloud Services Secure and Compliant today?
Are your Cloud Services Secure and Compliant today?Sridhar Karnam
 
Dynamic Cyber Defense
Dynamic Cyber DefenseDynamic Cyber Defense
Dynamic Cyber DefenseEnergySec
 
Security Analytics and Big Data: What You Need to Know
Security Analytics and Big Data: What You Need to KnowSecurity Analytics and Big Data: What You Need to Know
Security Analytics and Big Data: What You Need to KnowMapR Technologies
 
Information security trends and concerns
Information security trends and concernsInformation security trends and concerns
Information security trends and concernsJohn Napier
 
Incident Response: Don't Mess It Up, Here's How To Get It Right
Incident Response: Don't Mess It Up, Here's How To Get It RightIncident Response: Don't Mess It Up, Here's How To Get It Right
Incident Response: Don't Mess It Up, Here's How To Get It RightResilient Systems
 
Leveraging HPCC Systems as Part of an Information Security, Privacy, and Comp...
Leveraging HPCC Systems as Part of an Information Security, Privacy, and Comp...Leveraging HPCC Systems as Part of an Information Security, Privacy, and Comp...
Leveraging HPCC Systems as Part of an Information Security, Privacy, and Comp...HPCC Systems
 
Cyber Warfare e scenari di mercato
Cyber Warfare e scenari di mercatoCyber Warfare e scenari di mercato
Cyber Warfare e scenari di mercatoHP Enterprise Italia
 
Ciso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityCiso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityPriyanka Aash
 
Protecting health and life science organizations from breaches and ransomware
Protecting health and life science organizations from breaches and ransomwareProtecting health and life science organizations from breaches and ransomware
Protecting health and life science organizations from breaches and ransomwareCloudera, Inc.
 
Enterprise GRC for PEoplesoft
Enterprise GRC for PEoplesoftEnterprise GRC for PEoplesoft
Enterprise GRC for PEoplesoftAppsian
 
Protect & Defend Your Critical Infrastructure
Protect & Defend Your Critical InfrastructureProtect & Defend Your Critical Infrastructure
Protect & Defend Your Critical InfrastructureQ1 Labs
 
Data Security: What Every Leader Needs to Know
Data Security: What Every Leader Needs to KnowData Security: What Every Leader Needs to Know
Data Security: What Every Leader Needs to KnowRoger Hagedorn
 
Securing Your Digital Transformation: Cybersecurity and You
Securing Your Digital Transformation: Cybersecurity and YouSecuring Your Digital Transformation: Cybersecurity and You
Securing Your Digital Transformation: Cybersecurity and YouSAP Ariba
 
GDPR 9 Step SIEM Implementation Checklist
GDPR 9 Step SIEM Implementation ChecklistGDPR 9 Step SIEM Implementation Checklist
GDPR 9 Step SIEM Implementation ChecklistNetworkIQ
 
Module 02 Performance Risk-based Analytics With all the advancem
Module 02 Performance Risk-based Analytics With all the advancemModule 02 Performance Risk-based Analytics With all the advancem
Module 02 Performance Risk-based Analytics With all the advancemIlonaThornburg83
 
The 4 Challenges of Managing Privacy Incident Response
The 4 Challenges of Managing Privacy Incident ResponseThe 4 Challenges of Managing Privacy Incident Response
The 4 Challenges of Managing Privacy Incident ResponseElizabeth Dimit
 
3 tips to funding your security program
3 tips to funding your security program3 tips to funding your security program
3 tips to funding your security programCloudBees
 

Similaire à Stay out of headlines for non compliance or data breach (20)

HPE-Security update talk presented in Vienna to partners on 15th April 2016
HPE-Security update talk presented in Vienna to partners on 15th April 2016HPE-Security update talk presented in Vienna to partners on 15th April 2016
HPE-Security update talk presented in Vienna to partners on 15th April 2016
 
Inteligentní ochrana osobních údajů v procesu digitální transformace
Inteligentní ochrana osobních údajů v procesu digitální transformaceInteligentní ochrana osobních údajů v procesu digitální transformace
Inteligentní ochrana osobních údajů v procesu digitální transformace
 
Bridging the Gap Between Your Security Defenses and Critical Data
Bridging the Gap Between Your Security Defenses and Critical DataBridging the Gap Between Your Security Defenses and Critical Data
Bridging the Gap Between Your Security Defenses and Critical Data
 
Are your Cloud Services Secure and Compliant today?
Are your Cloud Services Secure and Compliant today?Are your Cloud Services Secure and Compliant today?
Are your Cloud Services Secure and Compliant today?
 
Dynamic Cyber Defense
Dynamic Cyber DefenseDynamic Cyber Defense
Dynamic Cyber Defense
 
Security Analytics and Big Data: What You Need to Know
Security Analytics and Big Data: What You Need to KnowSecurity Analytics and Big Data: What You Need to Know
Security Analytics and Big Data: What You Need to Know
 
Information security trends and concerns
Information security trends and concernsInformation security trends and concerns
Information security trends and concerns
 
Incident Response: Don't Mess It Up, Here's How To Get It Right
Incident Response: Don't Mess It Up, Here's How To Get It RightIncident Response: Don't Mess It Up, Here's How To Get It Right
Incident Response: Don't Mess It Up, Here's How To Get It Right
 
Leveraging HPCC Systems as Part of an Information Security, Privacy, and Comp...
Leveraging HPCC Systems as Part of an Information Security, Privacy, and Comp...Leveraging HPCC Systems as Part of an Information Security, Privacy, and Comp...
Leveraging HPCC Systems as Part of an Information Security, Privacy, and Comp...
 
Cyber Warfare e scenari di mercato
Cyber Warfare e scenari di mercatoCyber Warfare e scenari di mercato
Cyber Warfare e scenari di mercato
 
Ciso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityCiso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data security
 
Protecting health and life science organizations from breaches and ransomware
Protecting health and life science organizations from breaches and ransomwareProtecting health and life science organizations from breaches and ransomware
Protecting health and life science organizations from breaches and ransomware
 
Enterprise GRC for PEoplesoft
Enterprise GRC for PEoplesoftEnterprise GRC for PEoplesoft
Enterprise GRC for PEoplesoft
 
Protect & Defend Your Critical Infrastructure
Protect & Defend Your Critical InfrastructureProtect & Defend Your Critical Infrastructure
Protect & Defend Your Critical Infrastructure
 
Data Security: What Every Leader Needs to Know
Data Security: What Every Leader Needs to KnowData Security: What Every Leader Needs to Know
Data Security: What Every Leader Needs to Know
 
Securing Your Digital Transformation: Cybersecurity and You
Securing Your Digital Transformation: Cybersecurity and YouSecuring Your Digital Transformation: Cybersecurity and You
Securing Your Digital Transformation: Cybersecurity and You
 
GDPR 9 Step SIEM Implementation Checklist
GDPR 9 Step SIEM Implementation ChecklistGDPR 9 Step SIEM Implementation Checklist
GDPR 9 Step SIEM Implementation Checklist
 
Module 02 Performance Risk-based Analytics With all the advancem
Module 02 Performance Risk-based Analytics With all the advancemModule 02 Performance Risk-based Analytics With all the advancem
Module 02 Performance Risk-based Analytics With all the advancem
 
The 4 Challenges of Managing Privacy Incident Response
The 4 Challenges of Managing Privacy Incident ResponseThe 4 Challenges of Managing Privacy Incident Response
The 4 Challenges of Managing Privacy Incident Response
 
3 tips to funding your security program
3 tips to funding your security program3 tips to funding your security program
3 tips to funding your security program
 

Plus de Sridhar Karnam

Learn and enjoy at RSAC 2017
Learn and enjoy at RSAC 2017Learn and enjoy at RSAC 2017
Learn and enjoy at RSAC 2017Sridhar Karnam
 
Securing your IT infrastructure with SOC-NOC collaboration TWP
Securing your IT infrastructure with SOC-NOC collaboration TWPSecuring your IT infrastructure with SOC-NOC collaboration TWP
Securing your IT infrastructure with SOC-NOC collaboration TWPSridhar Karnam
 
Big Data Security with HP ArcSight
Big Data Security with HP ArcSightBig Data Security with HP ArcSight
Big Data Security with HP ArcSightSridhar Karnam
 
Big Data Security Analytics (BDSA) with Randy Franklin
Big Data Security Analytics (BDSA) with Randy FranklinBig Data Security Analytics (BDSA) with Randy Franklin
Big Data Security Analytics (BDSA) with Randy FranklinSridhar Karnam
 

Plus de Sridhar Karnam (6)

Learn and enjoy at RSAC 2017
Learn and enjoy at RSAC 2017Learn and enjoy at RSAC 2017
Learn and enjoy at RSAC 2017
 
Securing your IT infrastructure with SOC-NOC collaboration TWP
Securing your IT infrastructure with SOC-NOC collaboration TWPSecuring your IT infrastructure with SOC-NOC collaboration TWP
Securing your IT infrastructure with SOC-NOC collaboration TWP
 
Big Data Security with HP ArcSight
Big Data Security with HP ArcSightBig Data Security with HP ArcSight
Big Data Security with HP ArcSight
 
Big Data Security Analytics (BDSA) with Randy Franklin
Big Data Security Analytics (BDSA) with Randy FranklinBig Data Security Analytics (BDSA) with Randy Franklin
Big Data Security Analytics (BDSA) with Randy Franklin
 
Test
TestTest
Test
 
optical illusions
optical illusionsoptical illusions
optical illusions
 

Dernier

Ryan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate AgentsRyan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate AgentsRyan Mahoney
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 

Dernier (20)

Ryan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate AgentsRyan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 

Stay out of headlines for non compliance or data breach

  • 1. Stay out of headlines for non-compliance or security breach Gant Redmon Sridhar Karnam Co3 Systems, General Counsel Management HP Enterprise Security Product 1 © Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 2. “If you know the enemy and know yourself, you need not fear the result of a hundred battle” Sun Tzu, The Art of War 2 © Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 2012
  • 3. Security and Compliance becoming the same thing - PCI, HIPAA, GLB “75% of CISOs who experience publicly disclosed security breaches and lack documented, tested response plans will be fired” - Gartner: July 2012 expediency v. accuracy “It’s about the response … with all hands on deck in a coordinated manner.” - Gant:January 2014 © Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 4. Breach Response Track 1: Focus on cause analysis, remediation and customer communication Track 2: Legal compliance, communication with authorities, corporate filings Companies often do Track 1 and then Track 2 But these tracks don’t have to be separate. Incident response plans need to cover more that closing the vulnerability © Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 5. How much does privacy cost? © Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 6. How much do hackers pay? 6 © Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. $499 $499 $499 $399 $33 $55 $99 $88 $99
  • 7. Security is a bigger than just an IT problem Security is a board level discussion Cyber threat Data Breach CISO 56% of organizations have been 94% of the data breaches were Financial loss $8.6M average cost associated the target of a cyber attack reported by third-parties with data breach 30% market cap reduction due to Cost of protection 11% of total IT budget spent on Reactive vs. proactive 7 Reputation damage 97% of data breaches could have © Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. recent events security been avoided
  • 8. Compliance landscape Annual cost of SOX compliance: $1.8M or equivalent cost of roughly 14.4 employees! • • • • • User management Access control/authorization Change management Security operations Differences is mainly in interpretation • Leverage similarities to increase efficiencies and reduce costs • Consistent themes across regulations 8 NIST SAS 70 ISO 27001 NIACAP FISMA FTC SEC • Any similarities in compliance activities? SOX OCC CobiT FERC/NERC ISO 17799 PIPEDA COSO NY Privacy J-SOX US Patriot Act DITSCAP GLBA FFIEC © Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. DATA HIPAA ITIL Basel II PCI CA-1386 FDPA
  • 9. Compliance Problem Too complex… Silo’d products… Big data… Expensive… policies and controls change often don’t learn or share information too much data to process and understand the pattern each regulation needs resources and budget 9 © Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 10. 70% similarities between compliance & security User Management IT Security Access / Incident Authorization Management SOX HIPAA NIST FISMA HIPAA PCI SOX FISMA PCI NIST CobiT 10 CobiT © Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Security Operations Management Operations
  • 11. Why use multiple tools then? Security Compliance Common Text challenges Operations 11 © Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 12. Best Practices © Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 13. Vision: Consolidated view Single view of IT security, IT operations, and IT GRC Heat map • Prioritization • Heat map of risk to business services 13 Asset mapping • Quick isolation of incidents and threats • Vulnerability score and intelligence Risk indicators • Aggregation of multiple risk sources • Risk reporting and trending © Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Continuous compliance • Continuous monitoring • Compliance analytics
  • 14. Strategy: Centralized approach Seamless integration of security and compliance tools – No point-solutions SECURITY User Provisioning Identity & Access Mgmt Database Encryption Anti-Virus, Endpoint Firewall, Email Security See Everything Act Understand Context COMPLIANCE User Management Auditing and audit logs Dashboard and Reporting Controls monitoring Disclosure 14 See Everything © Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Proactive Risk management
  • 15. Best Practice 1: Continuous monitoring Security information and event management (SIEM) approach to continuously and comprehensively monitor and correlate data across the organization • Collection complete visibility Monitoring & alerting Dashboar d Analysis Machine Data IT GRC • Search quickly to simplify IT • IT GRC & Security in a single tool Search Log Collection 15 • Analyze events in real time to deliver insight • Reporting on log data • IT operations through monitoring & alerting © Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 16. Best Practice 2: Assess controls Correlation of all the data 24/7 Real-time, cross-device correlation of logs and events across IT • Correlation = Establishing relationships • Connect roles, responsibilities, identities, history, and trends to detect business risk violations • Pattern recognition • Anomaly detection • The more you collect, the smarter it gets 16 Software Hardware © Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. People Process
  • 17. Best Practice 3 : Unify data across IT Convert all machine data into common format for search, report, and retention Raw machine data Jun 17 2009 12:16:03: %PIX-6-106015: Deny TCP (no connection) from 10.50.215.102/15605 to 204.110.227.16/443 flags FIN ACK on interface outside Jun 17 2009 14:53:16 drop gw.foobar.com >eth0 product VPN-1 & Firewall-1 src xxx.xxx.146.12 s_port 2523 dst xxx.xxx.10.2 service ms-sql-m proto udp rule 49 Unified data Time (Event name Time) Device Vendor DeviceProduct Category Behavior Category DeviceGroup Category Outcome Category Significance Cisco PIX /Access /Firewall /Failure /Informational/ Warning /Access/Start /Firewall /Failure /Informational/ Warning 6/17/2009 12:16:03 Deny 6/17/2009 14:53:16 Drop Checkpoint Firewall-1/VPN-1 Benefit: Single data for searching, indexing, reporting, and archiving 17 © Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 18. Best Practice 4: Next-Generation Network Monitor network activities for malicious activity through IPS and log Security management Digital Vaccine Labs • Delivers zero-day coverage Next-Generation IPS • 99.99999% of network uptime track record Integrated Policy Next Gen FW Next-Generation Firewall • Granular application visibility and control 18 © Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Security Management System • Centralized management console across NGIPS and NGFW
  • 19. Best Practice 5: Think security from the Develop immunity for threats right through development of applications begining Automated code testing Manual review Testing of code during development 19 App runtime testing Security testing of 3rd party Security experts © Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 20. Best Practice 6: Incident Response Readiness to validate and respond the incidents Prepare 20 Assess & report © Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Manage
  • 21. Incident Response Framework PREPARE Improve Organizational Readiness • • • • Assign response team Describe environment Simulate events and incidents Focus on organizational gaps REPORT Document Results and Track Performance • Document incident results • Track historical performance • Demonstrate organizational preparedness • Generate audit/compliance reports 21 ASSESS Quantify Potential Impact, Support Privacy Impact Assessments © Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. • • • • • Track events Scope regulatory requirements See $ exposure Send notice to team Generate PIAs MANAGE Easily Generate Detailed Incident Response Plans • • • • • Escalate to complete IR plan Oversee the complete plan Assign tasks: who/what/when Notify regulators and clients Monitor progress to completion
  • 22. Best practices from Co3 Systems’ technologies 22 © Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 23. Best practices from Co3 Systems’ technologies 23 © Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 24. Best practices from Co3 Systems’ technologies 24 © Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 25. Best practices from Co3 Systems’ technologies 25 © Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 26. Best practices from Co3 Systems’ technologies 26 © Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 27. Best practices from Co3 Systems’ technologies 27 © Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 28. “Co3 Systems makes the process of planning for a nightmare scenario as painless as possible, making it an Editors’ Choice.” PC MAGAZINE, EDITOR’S CHOICE One Alewife Center, Suite 450 Cambridge, MA 02140 “One of the hottest products at RSA…” WWW.CO3SYS.COM NETWORK WORLD Gant Redmon General Counsel EMAIL gredmon@co3sys.com PHONE 617.300.8136 “an invaluable weapon when responding to security incidents.” GOVERNMENT COMPUTER NEWS “Adding the Security Module... to this otherwise fine suite of services, Co3 has done better than a home-run...it has knocked one out of the park.” SC MAGAZINE
  • 29. Reduction in incident management Reduces 3,000 incidents per day to fewer than 200 per day Up to 90% Automated Compliance Huge cost savings Average cost savings of $1,000,000 per quarter from SOX compliance packs $1,000,000 Resource optimization Automation helps to process 4x more events 24x7 resulting in better utilization of resources Reduction in compliance audits Automating these compliance is one time task and saves 90% of time every quarter from each audit 400% 90% NIST, ISO, PCI, SOX combined with security Better visibility, high productivity, fewer compliance violations, simple audits, consistent controls and processes Simple Audits 29 © Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 30. managed in-house/legacy custom apps Apps cloud Systems Monitoring 30 Virtual © Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Applications Security SIEM log management Cloud security Insider threats Mobile Monitoring Continuous compliance SaaS 350+ CEF partners Big Data IT operations Storage Security Analytics Thank you

Notes de l'éditeur

  1. Our point of view, simply stated, is that to realize our ideas, we all need the best information and applications delivered quickly and securely, whether traditionally, mobile,or in the cloud.Weneed the best information and applicationsOur employees and colleagues need the best information and applicationsOur customers and partners need the best information and applications.
  2. At HP, we believe that we live in a time of limitless possibilities, a time in human history where our creativity, passion, energy, and vision all have the potential to be made real. To have a meaningful impact on your world. Cloud services, the free flow of capital, and borderless access to talent and markets mean that even the smallest business can act with the scale of an enterprise while enterprises are now free to act with the speed of a startup.  The challenge is, how do you capitalize on opportunities quickly while navigating risk:(Suggest picking 2 or 3 of the bullets and making personal with a customer example. Below are few possibilities):Whether it’s to create new business and IT delivery models… Consider European pharmaceutical company, Novo Nordisk, who created an entirely new business model – a “pharma cloud” of IT services based on HP’s cloud solution -- they could sell to other pharma companies.Whether it’s to speed innovation cyclesDelta Air Lines is a great example here – using our application quality software, they’ve been able to shave 50% of the time out of testing cycles so they can deliver new capabilities to Delta.com and their mobile properties to improve customer experience.Or whether it’s mining vast, rich data setsTake online social game provider, Zynga – who is able with HP Vertica to analyze tens of billions of rows of data every day to improve the financial performance of their games.
  3. Yes, you are under attack now, your organization is under attack, your personal computer and mobile devices are under attack now. Your data is no longer secure. Your privacy may be breached.Security is a board level discussion now. The Chief Information Security Officer sits at the heart of the response to the growing threat. They have increased budgets now to address the growing threat and to keep the IT organizations safe. 56% ORGANIZATIONS HAVE BEEN THE TARGET OF NATION-STATE CYBER ATTACK – so there is a 50% chance that your organization may be attackedCLICKAlso,Gartner survey of Enterprise CIO’s the 5 biggest challenges that enterprise faced in Security and risk were: Managing RiskReduce CAPEXFill Security GapsOptimize security gapsAdapt to changing regulations
  4. Assess the effectiveness of internal controls Proactively manage complianceReduce operational cost of complianceidentify gaps that present a risk integrity and availability of regulated informationDemonstrate compliance to auditorsChange management of regulations
  5. Over 7500 security vulnerability filters