1 / 15

Why does IT Security fail? …and what you can do about it Sponsored by

Why does IT Security fail? …and what you can do about it Sponsored by. Business reality. The modern enterprise Depends on its IT assets (internal) Must interact with vendors, suppliers and partners Must trust internal users …aye, there’s the rub. Security challenges.

dympna
Download Presentation

Why does IT Security fail? …and what you can do about it Sponsored by

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Why does IT Security fail? …and what you can do about it Sponsored by

  2. Business reality • The modern enterprise • Depends on its IT assets (internal) • Must interact with vendors, suppliers and partners • Must trust internal users • …aye, there’s the rub

  3. Security challenges • Mammals -- conditioned to fear what we see…but… • Can’t “see” cyber security threats • We consider warnings from “experts” as fanciful (does not apply to me) • Examples • SQL Injection • Now the #1 threat to the Web+db app • Considered implausible a few years back • USB devices – Insider Threat • Great power, great responsibility • Great potential for misuse/abuse/loss/productivity • Auditors - Compliance

  4. Fast Facts

  5. The nature of the attack • Readily recognized • Low & Slow, harder to recognize • Zero Day, not yet known • Why are they attacking? • Financial gain • Because they can • Because it’s become much easier

  6. Attack Taxonomy

  7. 2010 Data Breach Report

  8. Back to basics • Understand your environment • Baseline behavior • Know users, systems -- normal patterns • Establish ground rules • Define policies, enforce them • Gather data, look at it for patterns • Technology can help…but… • People are the key

  9. Your tax dollars at work http://csrc.nist.gov/groups/SMA/fisma/Risk-Management-Framework/index.html

  10. Maintain Balance • Between detection and prevention • Between technology and people • Between benefit and cost • Between power & ease-of-use

  11. Business constraints • Medium Enterprise has: • All the technical and regulatory challenges of large enterprises…but… • Smaller budget and manpower and has less time to implement solutions • Medium Enterprise needs: • Big, strong capabilities • But, solutions must be EASY to manage

  12. 10 Quick Wins • Maintain, monitor, analyze audit logs • Control use of admin privileges • Account monitoring & control • Data loss prevention (USB) • Inventory of software • IT Policy changes • Unauthorized IT configuration changes • Secure configuration • Malware defense • Monitor virtual infrastructure

  13. EventTracker • A dashboard of security and event information • What is happening – Detect & avoid • Users, Systems, Apps, FW, Flow, USB, VMware • What has happened – Analyze & avoid • Report, Analysis, Search • What is different – Control & avoid • Change Audit, Config Assessment • Compliance • PCI-DSS, FISMA, HIPAA, NERC, SAS70, SOX, CAG,…

  14. Industry Leading Gartner EventTracker software is suited for midsize businesses that require one product that provides log management, SEM, compliance reporting and operations monitoring Included on the Magic Quadrant for Security Information and Event Management, 2009 Award Winning

  15. Further Information www.prismmicrosys.com

More Related