One Failure Leads to Another: Developing Leading Indicators for Security Threats and Risks
|
|
|
- Silas Greer
- 10 years ago
- Views:
Transcription
1 One Failure Leads to Another: Developing Leading Indicators for Security Threats and Risks SESSION ID: TRM-W07 Dr. Lance Hayden Solutions Architect & Information Scientist Cisco Global Security
2 What We ll Cover Today Introductions Measures, Metrics and Indicators Leading Indicators in Security Examples Developing Leading Indicators in Your Security Program Concluding Remarks and Open for Questions 2
3 Introductions
4 Introducing Myself Dr. Lance Hayden CISSP, CISM, CRISC
5 Measures, Metrics and Indicators
6 Measures, Metrics and Indicators What does it mean to measure? [To] ascertain the size, amount, or degree of (something) by using an instrument or device marked in standard units or by comparing it with an object of known size [To] estimate or assess the importance, quality, value, or effect of (something) [To] judge someone or something by comparison with (a certain standard) 1 6
7 Measures, Metrics and Indicators Output Artifact Independent Output Trend Linked Metric Indicator Measurement Process Activity Context 7
8 Measures, Metrics and Indicators Leading and Lagging Indicators Concept borrowed from economics Use of indicators dates back to 1930 s National Bureau of Economic Research (NBER) Metrics involving economic processes found to be important in business cycles 2 Types of indicators include: Leading indicators that anticipate future cycles and events Coincident indicators that describe current state Lagging indicators that are evidence of past cycles and events 8
9 Measures, Metrics and Indicators Examples of Economic Indicators Lagging Indicators GDP drop for two consecutive quarters indicates recession Unemployment rising indicates economy has fared poorly Coincident Indicators Income and wages Leading Indicators Stock prices Retail sales Building permits 9
10 Measures, Metrics and Indicators It s very difficult to make predictions, especially about the future 3 10
11 Leading Indicators in Security
12 Drift Model of Security Failure 12
13 Leading Indicators in Security Security professionals understand the role of lagging and coincident indicators Event counts (coincident) Telemetry data (coincident) Failed audits (lagging) Security breaches (lagging) Today, security teams are looking for ways to anticipate threats and failures 13
14 Leading Indicators in Security Requirements for leading security indicators are different Leading indicators require a different approach Data collection prior to the cycle or event Proactive rather than reactive vision Creativity and imagination Leading indicators require different data sources Exploratory rather than forensic data Information investment against future insights Leading Indicators require different analysis Linking past and future measurements Looking for future trends in past data 14
15 Examples
16 Example: Making an Exception Many organizations have standard security configurations Deployment guides Standard or secure build policies for production systems Many organizations also have exception processes With approval, some systems may not have to play by the rules Allows flexibility and agility A poorly managed exception process can be a leading indicator of security risk Source: exception process of large retail company 16
17 Example: Making an Exception IT Exceptions Security Vulnerabilities Security Incidents
18 Example: Competing Priorities Security must compete with other enterprise priorities Productivity targets Revenue and cost pressures Habits and decisions, not policies, define security posture If the choice is secure or on time which will be chosen? Organizational culture defines what is truly important Changes in everyday decisions can be a leading indicator of increased security risks Source: survey responses & project data of medium ISP 18
19 Example: Competing Priorities 100% 90% 80% 70% 60% 50% 40% 30% 20% 10% 0% Q1 Q2 Q3 Q4 "I feel pressure" Project on schedule Security review complete 19
20 Developing Leading Indicators in Your Security Program
21 Developing Leading Indicators in Your Security Program Causation Correlation 21
22 Developing Leading Indicators in Your Security Program Five rules for leading security indicators One: Big events (almost) always follow small ones Two: Correlation is not causation Three: Patterns are not predictions Four: Analysis can t be (fully) automated Five: If you re sure, then you re sure to be wrong 22
23 Developing Leading Indicators in Your Security Program Five tips for leading security indicators One: Work back from known events Two: Pay attention to small failures Three: Don t let the perfect be the enemy of the good Four: Surveys make for great data Five: Don t be afraid to experiment 23
24 Thinking Differently About Indicators Let s examine a few examples Federal Reserve Beige Book 4 Published eight times per year since 1970 Completely anecdotal data Consumer Confidence Indices (Various) Survey-based data collection Responses are variants of positive, neutral, or negative Ontario Leading Indicators Project (OLIP) Designed to identify management practices that improve health and safety performance before injuries and illnesses occur Again, survey based, categorical data collection 24
25 References 1 Oxford English Dictionary 2 NBER Working Paper No.941: The Leading Indicator Approach to Economic Forecasting Retrospect and Prospect 3 Variously attributed to Yogi Berra, Niels Bohr, and Mark Twain 4 Summary of Commentary on Current Economic Conditions by Federal Reserve District (available at 25
HP Cyber Security Control Cyber Insight & Defence
HP Cyber Security Control Cyber Insight & Defence Security awareness at board level Security leadership is under immense pressure Cyber threat Extended supply chain Financial loss Reputation damage Cost
Key Considerations for Information Technology Governance. 900 Monroe NW Grand Rapids, MI 49503 (616) 632-8000
Key Considerations for Information Technology Governance What is IT Governance? Big Picture approach to information and data management Sets priorities: Managing performance Delivering value Managing risk
Organizational Issues of Implementing Intrusion Detection Systems (IDS) Shayne Pitcock, CISSP First Data Corporation
Organizational Issues of Implementing Intrusion Detection Systems (IDS) Shayne Pitcock, CISSP First Data Corporation Agenda Problem Description Issues for Consideration Mitigation of the Issues Options
Effective Threat Management. Building a complete lifecycle to manage enterprise threats.
Effective Threat Management Building a complete lifecycle to manage enterprise threats. Threat Management Lifecycle Assimilation of Operational Security Disciplines into an Interdependent System of Proactive
CaaS Think as a bad guy Petr Hněvkovský, CISA, CISSP HP Enterprise Security
CaaS Think as a bad guy Petr Hněvkovský, CISA, CISSP HP Enterprise Security 1 Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Director, IT Security District Office Kern Community College District JOB DESCRIPTION
Director, IT Security District Office Kern Community College District JOB DESCRIPTION Definition Reporting to the Chief Information Officer, the Director of IT Security develops and implements procedures,
Full-Context Forensic Analysis Using the SecureVue Unified Situational Awareness Platform
Full-Context Forensic Analysis Using the SecureVue Unified Situational Awareness Platform Solution Brief Full-Context Forensic Analysis Using the SecureVue Unified Situational Awareness Platform Finding
Be Prepared. For Anything. Cyber Security - Confronting Current & Future Threats The role of skilled professionals in maintaining cyber resilience
Cyber Security - Confronting Current & Future Threats The role of skilled professionals in maintaining cyber resilience Mike O Neill Managing Director Graeme McGowan Associate Director of Cyber Security
Become a hunter: fi nding the true value of SIEM.
Become a hunter: fi nding the true value of SIEM. When Security Information and Event Management (SIEM) hit the security scene, it was heralded as a breakthrough in threat detection. However, SIEM is just
IT Risk & Security Specialist Position Description
Specialist Position Description February 9, 2015 Specialist Position Description February 9, 2015 Page i Table of Contents General Characteristics... 1 Career Path... 2 Explanation of Proficiency Level
INFORMATION SECURITY STRATEGIC PLAN
INFORMATION SECURITY STRATEGIC PLAN UNIVERSITY OF CONNECTICUT INFORMATION SECURITY OFFICE 4/20/10 University of Connecticut / Jason Pufahl, CISSP, CISM 1 1 MISSION STATEMENT The mission of the Information
Leveraging Network and Vulnerability metrics Using RedSeal
SOLUTION BRIEF Transforming IT Security Management Via Outcome-Oriented Metrics Leveraging Network and Vulnerability metrics Using RedSeal november 2011 WHITE PAPER RedSeal Networks, Inc. 3965 Freedom
Redhawk Network Security, LLC 62958 Layton Ave., Suite One, Bend, OR 97701 [email protected] 866-605- 6328 www.redhawksecurity.
Planning Guide for Penetration Testing John Pelley, CISSP, ISSAP, MBCI Long seen as a Payment Card Industry (PCI) best practice, penetration testing has become a requirement for PCI 3.1 effective July
Data Quality and Your Digital Reputation. An Experian Data Quality Guide
Data Quality and Your Digital Reputation An Experian Data Quality Guide According to a recent Experian Data Quality study, email continues to serve as the most important communication channel for marketers.
Cisco IT Technology Tutorial Overview of ITIL at Cisco
Cisco IT Technology Tutorial Overview of ITIL at Cisco Ian Reddy, IT Manager David Lietzell, IT Program Manager May 2009 Produced by the Cisco on Cisco team within Cisco IT 2007 Cisco Systems, Inc. All
Effective Software Security Management
Effective Software Security Management choosing the right drivers for applying application security Author: Dharmesh M Mehta [email protected] / [email protected] Table of Contents Abstract... 1
ITIL v3 Service Manager Bridge
ITIL v3 Service Manager Bridge Course Length: 5 Days Course Overview This 5 day hands on, certification training program enables ITIL Version 2 certified Service Managers to upgrade their Service Manager
FIVE PRACTICAL STEPS
WHITEPAPER FIVE PRACTICAL STEPS To Protecting Your Organization Against Breach How Security Intelligence & Reducing Information Risk Play Strategic Roles in Driving Your Business CEOs, CIOs, CTOs, AND
Cyber Security and Information Assurance Controls Prevention and Reaction NOVEMBER 2013
Cyber Security and Information Assurance Controls Prevention and Reaction 1 About Enterprise Risk Management Capabilities Cyber Security Risk Management Information Assurance Strategic Governance Regulatory
Real World Application and Usage of IBM Advanced Analytics Technology
Real World Application and Usage of IBM Advanced Analytics Technology Anthony J. Young Pre-Sales Architect for IBM Advanced Analytics February 21, 2014 Welcome Anthony J. Young Lives in Austin, TX Focused
Enterprise Cloud Security via DevSecOps
SESSION ID: ASD-T08 Enterprise Cloud via DevSecOps Shannon Leitz Sr Mgr, Cloud & DevSecOps Leader Intuit Information @devsecops Scott C Kennedy Scientist Intuit Information @scknogas Agenda Who we are
Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA. Cyber: The Catalyst to Transform the Security Program
Cyber: The Catalyst to Transform the Security Program Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA A Common Language? Hyper Connected World Rapid IT Evolution Agile Targeted Threat
White Paper Achieving GLBA Compliance through Security Information Management. White Paper / GLBA
White Paper Achieving GLBA Compliance through Security Information Management White Paper / GLBA Contents Executive Summary... 1 Introduction: Brief Overview of GLBA... 1 The GLBA Challenge: Securing Financial
LIST OF MAJOR LEADING & LAGGING ECONOMIC INDICATORS
APRIL 2014 LIST OF MAJOR LEADING & LAGGING ECONOMIC INDICATORS Most economists talk about where the economy is headed it s what they do. Paying attention to economic indicators can give you an idea of
Building Security into the Software Life Cycle
Building Security into the Software Life Cycle A Business Case Marco M. Morana Senior Consultant Foundstone Professional Services, a Division of McAfee Outline» Glossary» What is at risk, what we do about
Automated IT Asset Management Maximize organizational value using BMC Track-It! WHITE PAPER
Automated IT Asset Management Maximize organizational value using BMC Track-It! WHITE PAPER CONTENTS ADAPTING TO THE CONSTANTLY CHANGING ENVIRONMENT....................... 1 THE FOUR KEY BENEFITS OF AUTOMATION..................................
Executive Summary. 3 Attracting ~ ~ ~ ~ ~ ~ ~ ~ ~ ~
Visa Small Business REPORT AUGUST 0 Spend Insights Visa Small Business Spend Insights monitors the economic confidence of U.S. small business owners by analyzing Visa Business card spend data and responses
Technology Solutions for NERC CIP Compliance June 25, 2015
Technology Solutions for NERC CIP Compliance June 25, 2015 2 Encari s Focus is providing NERC CIP Compliance Products and Services for Generation and Transmission Utilities, Municipalities and Cooperatives
Motorola Enterprise Mobility Services. Maximize the value of your mobility solutions
Motorola Enterprise Mobility Services Maximize the value of your mobility solutions Motorola Enterprise Mobility Services: Service with a difference for maximum success and maximum business advantage
How To Buy Nitro Security
McAfee Acquires NitroSecurity McAfee announced that it has closed the acquisition of privately owned NitroSecurity. 1. Who is NitroSecurity? What do they do? NitroSecurity develops high-performance security
Security Information Management (SIM)
1. A few general security slides 2. What is a SIM and why is it needed 3. What are the features and functions of a SIM 4. SIM evaluation criteria 5. First Q&A 6. SIM Case Studies 7. Final Q&A Brian T.
IMPROVING RISK VISIBILITY AND SECURITY POSTURE WITH IDENTITY INTELLIGENCE
IMPROVING RISK VISIBILITY AND SECURITY POSTURE WITH IDENTITY INTELLIGENCE ABSTRACT Changing regulatory requirements, increased attack surfaces and a need to more efficiently deliver access to the business
So Why on Earth Would You WANT To be a CISO?
So Why on Earth Would You WANT To be a CISO? SESSION ID: PROF-M05A Todd Fitzgerald CISSP, CISA, CISM, CRISC, CGEIT, PMP, ISO27000, CIPP, CIPP/US, ITILV3f Global Director of Information Security Grant Thornton
THE DELOITTE CFO SURVEY 2015 Q2 RESULTS PATH TO GROWTH
THE DELOITTE CFO SURVEY 2015 Q2 RESULTS PATH TO GROWTH 2 Contents Key points from the 2015 Q2 Survey 4 Economic context 5 The economy and CFOs outlook 6 Funding 7 Cash flow and risk 8 M&A 9 A note on methodology
Front Metrics Technologies Pvt. Ltd. Capacity Management Policy, Process & Procedures Document
Pvt. Ltd. Capacity Management Policy, Process & Procedures Document Client: Pvt. Ltd. Date : 03/04/2011 Version : 0.6 GENERAL Description Purpose Applicable to Supersedes This document establishes a Capacity
Threat Intelligence: The More You Know the Less Damage They Can Do. Charles Kolodgy Research VP, Security Products
Threat Intelligence: The More You Know the Less Damage They Can Do Charles Kolodgy Research VP, Security Products IDC Visit us at IDC.com and follow us on Twitter: @IDC 2 Agenda Evolving Threat Environment
CFIR - Finance IT 2015 Cyber security September 2015
www.pwc.dk Cyber security Audit. Tax. Consulting. Our global team and credentials Our team helps organisations understand dynamic cyber challenges, adapt and respond to risks inherent to their business
SOLUTION WHITE PAPER. Remedyforce Powerful Platform
SOLUTION WHITE PAPER Remedyforce Powerful Platform INTRODUCTION Any type of service desk needs a powerful technology platform to support their customers. However, several challenges arise when attempting
Cisco Unified Communications and Collaboration technology is changing the way we go about the business of the University.
Data Sheet Cisco Optimization s Optimize Your Solution using Cisco Expertise and Leading Practices Optimizing Your Business Architecture Today, enabling business innovation and agility is about being able
Cybersecurity@RTD Program Overview and 2015 Outlook
Cybersecurity@RTD Program Overview and 2015 Outlook Finance & Administration Committee Meeting February 10, 2015 Sheri Le, Manager of Cybersecurity RTD Information Technology Department of Finance & Administration
Accenture Intelligent Security for the Digital Enterprise. Archer s important role in solving today's pressing security challenges
Accenture Intelligent Security for the Digital Enterprise Archer s important role in solving today's pressing security challenges The opportunity to improve cyber security has never been greater 229 2,287
Cisco Unified Security Metrics: Measuring Your Organization s Security Health
Cisco Unified Security Metrics: Measuring Your Organization s Security Health SESSION ID: SEC-W05 Hessel Heerebout Manager, Application Security and Governance Cisco @InfoSec_Metrics You will take away
Identifying & Implementing Quick Wins
Identifying & Implementing Quick Wins 1 Executive Summary........3 2 Introduction....... 5 3 Key Steps to Quick Wins....... 7 4 Sample Quick Wins...8 4.1 People Quick Wins... 8 4.2 Process Quick Wins......9
Information Security Awareness: How to Get Users Asking for More
Information Security Awareness: How to Get Users Asking for More Kelley J. Bogart, CISSP Senior Information Security Analyst, University of Arizona Synopsis Any effective information security program has
FnB User Master Class
FnB User Master Class FnB User Master Class is designed with the everyday user in mind, providing them with the ability and confidence to manage FnB. The class will cover all aspects of stock management.
INFORMATION TECHNOLOGY FOR MINNESOTA GOVERNMENT. Doomed by Design: Unearthing the Problems with Government Security Programs
INFORMATION TECHNOLOGY FOR MINNESOTA GOVERNMENT Doomed by Design: Unearthing the Problems with Government Security Programs Christopher Buse Assistant Commissioner & State CISO June 12, 2014 AGENDA State
QRadar SIEM and FireEye MPS Integration
QRadar SIEM and FireEye MPS Integration March 2014 1 IBM QRadar Security Intelligence Platform Providing actionable intelligence INTELLIGENT Correlation, analysis and massive data reduction AUTOMATED Driving
IBM QRadar Security Intelligence April 2013
IBM QRadar Security Intelligence April 2013 1 2012 IBM Corporation Today s Challenges 2 Organizations Need an Intelligent View into Their Security Posture 3 What is Security Intelligence? Security Intelligence
WHITE PAPER. Automated IT Asset Management Maximize Organizational Value Using Numara Track-It! p: 813.227.4900 f: 813.227.4501 www.numarasoftware.
WHITE PAPER By Tony Thomas Senior Network Engineer and Product Manager Numara TM Software Inc. ADAPTING TO THE CONSTANTLY CHANGING IT ENVIRONMENT The challenge in controlling the corporate IT infrastructure
Leveraging a Maturity Model to Achieve Proactive Compliance
Leveraging a Maturity Model to Achieve Proactive Compliance White Paper: Proactive Compliance Leveraging a Maturity Model to Achieve Proactive Compliance Contents Introduction............................................................................................
COBIT 5: A New Governance Framework for Managing & Auditing the Technology Environment CS 6-7: Tuesday, July 7 3:30-4:30
COBIT 5: A New Governance Framework for Managing & Auditing the Technology Environment CS 6-7: Tuesday, July 7 3:30-4:30 Presented by: Nelson Gibbs CIA, CRMA, CISA, CISM, CGEIT, CRISC, CISSP [email protected]
JOB DESCRIPTION CONTRACTUAL POSITION
Ref #: IT/P /01 JOB DESCRIPTION CONTRACTUAL POSITION JOB TITLE: INFORMATION AND COMMUNICATIONS TECHNOLOGY (ICT) SECURITY SPECIALIST JOB SUMMARY: The incumbent is required to provide specialized technical
SECURITY OPERATIONS CENTER (SOC) Implementing Security Monitoring in Small and Mid-Sized Organizations
SECURITY OPERATIONS CENTER (SOC) Implementing Security Monitoring in Small and Mid-Sized Organizations A White Paper Presented by: MindPoint Group, LLC 8078 Edinburgh Drive Springfield, VA 22153 (o) 703.636.2033
PCI DSS Top 10 Reports March 2011
PCI DSS Top 10 Reports March 2011 The Payment Card Industry Data Security Standard (PCI DSS) Requirements 6, 10 and 11 can be the most costly and resource intensive to meet as they require log management,
ITIL: Service Operation
ITIL: Service Operation Course Course Chapter 01 - Course Lesson: Course Organization Welcome to the Course! Mentoring Community s Why Are You Here? Using Bloom s Taxonomy What do you Expect? Housekeeping
Scalability in Log Management
Whitepaper Scalability in Log Management Research 010-021609-02 ArcSight, Inc. 5 Results Way, Cupertino, CA 95014, USA www.arcsight.com [email protected] Corporate Headquarters: 1-888-415-ARST EMEA Headquarters:
Achieving Control: The Four Critical Success Factors of Change Management. Technology Concepts & Business Considerations
Achieving Control: The Four Critical Success Factors of Change Management Technology Concepts & Business Considerations T e c h n i c a l W H I T E P A P E R Table of Contents Executive Summary...........................................................
De-Risking the Supply Chain: Cisco s Risk Intelligence and Analytic Tools
CASE STUDY Cisco Systems Based on an interview with James Steele, Program Director, Supply Chain Risk Management, Cisco, August 8 2011 De-Risking the Supply Chain: Cisco s Risk Intelligence and Analytic
CORE INSIGHT ENTERPRISE: CSO USE CASES FOR ENTERPRISE SECURITY TESTING AND MEASUREMENT
CORE INSIGHT ENTERPRISE: CSO USE CASES FOR ENTERPRISE SECURITY TESTING AND MEASUREMENT How advancements in automated security testing software empower organizations to continuously measure information
Cybersecurity Audit Why are we still Vulnerable? November 30, 2015
Cybersecurity Audit Why are we still Vulnerable? November 30, 2015 John R. Robles, CISA, CISM, CRISC www.johnrrobles.com [email protected] 787-647-3961 John R. Robles- 787-647-3961 1 9/11-2001 The event
Data Driven Security Framework to Success
Data Driven Security Framework to Success Presented by Leonard Jacobs, MBA, CISSP, CSSA Founder, President and CEO of Netsecuris Inc. 1 Topics The Explosion of Security Data Threat-centric Security vs.
Cyber Security Consultancy Standard. Version 0.2 Crown Copyright 2015 All Rights Reserved. Page 1 of 13
Cyber Security Consultancy Standard Version 0.2 Crown Copyright 2015 All Rights Reserved Page 1 of 13 Contents 1. Overview... 3 2. Assessment approach... 4 3. Requirements... 5 3.1 Service description...
Criticism of Implementation of ITSM & ISO20000 in IT Banking Industry. Presented by: Agus Sutiawan, MIT, CISA, CISM, ITIL, BSMR3
Criticism of Implementation of ITSM & ISO20000 in IT Banking Industry Presented by: Agus Sutiawan, MIT, CISA, CISM, ITIL, BSMR3 Outline What is IT Service Management What is ISO 20000 Step by step implementation
Protecting against cyber threats and security breaches
Protecting against cyber threats and security breaches IBM APT Survival Kit Alberto Benavente Martínez [email protected] IBM Security Services Jun 11, 2015 (Madrid, Spain) 12015 IBM Corporation So
Tivoli Security Information and Event Manager V1.0
Tivoli Security Information and Event Manager V1.0 Summary Security information and event management (SIEM) is a primary concern of the CIOs and CISOs in many enterprises. They need to centralize security-relevant
how can I improve performance of my customer service level agreements while reducing cost?
SOLUTION BRIEF CA Business Service Insight for Service Level Management how can I improve performance of my customer service level agreements while reducing cost? agility made possible By automating service
Governance, Risk, and Compliance (GRC) White Paper
Governance, Risk, and Compliance (GRC) White Paper Table of Contents: Purpose page 2 Introduction _ page 3 What is GRC _ page 3 GRC Concepts _ page 4 Integrated Approach and Methodology page 4 Diagram:
Defending against modern threats Kruger National Park ICCWS 2015
Defending against modern threats Kruger National Park ICCWS 2015 Herman Opperman (CISSP, ncse, MCSE-Sec) - Architect, Cybersecurity Global Practice Microsoft Corporation Trends from the field Perimeter
Security and Privacy Trends 2014
2014 Agenda Today s cyber threats 3 You could be under cyber attack now! Improve 6 Awareness of cyber threats propels improvements Expand 11 Leading practices to combat cyber threats Innovate 20 To survive,
End-user Security Analytics Strengthens Protection with ArcSight
Case Study for XY Bank End-user Security Analytics Strengthens Protection with ArcSight INTRODUCTION Detect and respond to advanced persistent threats (APT) in real-time with Nexthink End-user Security
Cloud Infrastructure Security Management
www.netconsulting.co.uk Cloud Infrastructure Security Management Visualise your cloud network, identify security gaps and reduce the risks of cyber attacks. Being able to see, understand and control your
with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief
RSA Solution Brief Streamlining Security Operations with Managing RSA the Lifecycle of Data Loss Prevention and Encryption RSA envision Keys with Solutions RSA Key Manager RSA Solution Brief 1 Who is asking
When someone asks, How s the economy. A New Look at Economic Indexes for the States in the Third District. Theodore M. Crone*
A New Look at Economic Indexes for the States in the Third District Theodore M. Crone A New Look at Economic Indexes For the States in the Third District *Ted Crone is a vice president in the Research
CYBER SECURITY, A GROWING CIO PRIORITY
www.wipro.com CYBER SECURITY, A GROWING CIO PRIORITY Bivin John Verghese, Practitioner - Managed Security Services, Wipro Ltd. Contents 03 ------------------------------------- Abstract 03 -------------------------------------
Threat Intelligence: An Essential Component of Cyber Incident Response. Jeanie M Larson, CISSP-ISSMP, CISM, CRISC
Threat Intelligence: An Essential Component of Cyber Incident Response Jeanie M Larson, CISSP-ISSMP, CISM, CRISC What are we going to cover? Setting the Stage Why is Incident Response Critical? Cyber Threat
I D C A N A L Y S T C O N N E C T I O N
I D C A N A L Y S T C O N N E C T I O N Robert Westervelt Research Manager, Security Products T h e R o l e a nd Value of Continuous Security M o nitoring August 2015 Continuous security monitoring (CSM)
WHAT S NEW NAV NEWS VIEW FROM 2 NAV ADD - ONS INDUSTRY FOCUS NAV TIPS VOL 1 ISSUE 1
VOL 1 ISSUE 1 WHAT S NEW Clients First introduces Innovative ERP Recession Delivery Model - a no-gimmick methodology that permits businesses to implement Microsoft Dynamics ERP software with no risk and
Business Case Outsourcing Information Security: The Benefits of a Managed Security Service
Business Case Outsourcing Information Security: The Benefits of a Managed Security Service seccuris.com (866) 644-8442 Contents Introduction... 3 Full- Time Experts vs. a Part- Time In- House Staff...
