Gartner Security & Risk Management Summit 2012
|
|
|
- Tabitha Crystal Little
- 10 years ago
- Views:
Transcription
1 Gartner Security & Risk Management Summit July 2012 Sydney, Australia gartner.com/ap/security Trip Report Strategic Roadmaps to Secure the Enterprise and Manage Risk Overview INTRODUCTION The Gartner Security & Risk Management Summit 2012 was held July, at the Sydney Convention & Exhibition Centre, Australia. The Summit drew attendees from a wide range of industries and organizations. This report provides highlights from the two-day event. At the Gartner re-launch of the Security & Risk Management Summit, attendees sought out ways to: structure and manage each individual IT security and risk program; balance and coordinate those programs, make them more efficient and effective; select approaches and vendor solutions; learn to articulate security and risk requirements in business language; integrate business continuity management with overall risk and security program; and much more. This year s summit attendees participated in on-site benefits, hearing the latest IT security, risk management and compliance, identity and access management, and business continuity management presentations from the Gartner Research community on today s most pressing topics, attending workshops and To The Point sessions run by expert analysts and industry leaders, hearing real-life experiences during peer case studies, engaging in analyst-user roundtables and one-on-one meetings with Gartner analysts, and checking out the latest solutions at Solution Showcase. 1 gartner.com/ap/security
2 Key Findings Here are key recommendations from this year s Gartner analyst sessions especially useful for your 2013 planning and strategy considerations. Keynotes Opening Keynote: Strategy into Action Road Maps to Secure the Enterprise In this well-attended opening keynote, Gartner analysts, Rob McMillan, Paul Proctor and Andrew Walls discussed how enterprise success depends on security and risk management, making it necessary for security leaders to define multiyear strategic road maps and simultaneously drive tactical operations that respond effectively and efficiently to changing business needs and rapidly evolving threats. Each analyst then explored what it means to translate strategy into action through a strategic road map that drives business success. The keynote provided attendees with trends and insights that will allow them to meet future challenges and enhance the success of their role, team and organization. Rob McMillan Gartner Closing Keynote: Security Enabling the Business Is Not a Fairytale Risk-Adjusted Value Management In this closing keynote, Paul Proctor highlighted the approach needed for outlining the value within security and risk programs. His hard hitting messages and advice is captured in the following: Security and IT risk management enabling the business is not a fairy tale; You, your program, and the organization s perception of you are huge inhibitors; You are your own worst enemy; Do not perpetuate the outdated dogma of a traditional IT security function; Define desired business outcomes and supporting business processes; Establish the causal links between risks and desired outcomes; Ask yourself what decisions your data supports above the line and Put all communication in a business context. Paul Proctor Paul Proctor Andrew Walls Vice President 2 gartner.com/ap/security
3 Guest Speaker Presentations Mock Court International You be the Judge Guilty of Failing to Protect Confidential Information? Set in a court room format, the jury (represented by the audience) watched and listened to the cross examination by lawyers to a case alleging that National Credit failed to ensure the protection of customer confidential information, to wit, names, address, contact and bank account details and alleged customer loan default details. As a result of that public disclosure and the negligence of the defendant, the plaintiffs have suffered damages. A total of $22,000,000 in damages is sought by the plaintiffs (class action) which includes financial loss and reputational damages (to businesses and individuals involved). Through a series of witness accounts, the judge delivered the verdict of Guilty and stated that the evidence of this case leads to the conclusion that the underlying causes that gave rise to the inadvertent release of confidential information lay higher up in the organization. From top to bottom the organization was infected with the disease of complacency and gross inattention to the detail of a practical IT security risk management system. Ignore Culture at Your Own Risk The Four Stages of Culture Adaptation In his keynote, Michael Henderson, The Corporate Anthropologist, outlined why organizational culture when misaligned with the business strategy should be regarded as a significant risk. Michael highlighted that culture is highly influential when it comes to business outcomes. Culture can be thought of as a group mind set, mind share or mind shift. When anyone one of these categories or combinations of a culture are misaligned with the strategy, the group mind set wins! Michael noted that risk as a concept is in fact a cultural perception. What is considered risky in one culture can quite literally be considered entertainment in another. Michael also suggested that organizations that fail to pay deliberate attention to their culture are often at risk of finding their culture has in fact become their number one competitor. Michael Henderson The Corporate Anthropologist Anthony Morris Director, Mock Court International Bruce Whitehead Director, Mock Court International 3 gartner.com/ap/security
4 End-User Case Studies ING Direct Australia: Identity Governance Don t Just Do It! Removing unauthorised access to data was the driver for financial institution, ING Direct Australia, to implement an identity and access management control system in Prior to the implementation of SailPoint IdentityIQ, the bank had too many users with unverified access to core banking systems. This problem needed to be solved to comply with the Australian Prudential Regulatory Authority (APRA) regulations covering access rights. According to Sestanovic, ING Direct Australia learnt nine lessons from the identity and access management implementation: The importance of upfront analysis enterprises should not jump into just do it mode with IT projects but take time with the implementation. Secure project sponsorship Senior executive sponsorship was critical as identity governance offering often spans many business areas that need to commit to identity and access management (IAM). Engage business users Get buy-in from the top and drive the program top down. Select champions from the business to work with you on testing the functionality and enhancements of the system. Establish a governance committee, working group share and leverage work to accelerate enterprise level deployment. Use a small team for delivery. The technical delivery works best if dedicated and centralised. Secure commitment of subject matter experts These experts should include application support, technical infrastructure, information security and risk managers because systems such as IAM affect the whole business. Employ a technical project manager This technical project manager should have a deep knowledge of governance, risk management and compliance as well as understand the company s environment and be able to guide the implementation team through company standards and policies. Engage audit and compliance Engage an auditor to work with the company as early as possible and be a joint stakeholder in the program. Stick to your guns IT staff needed to hold true to the scope and the problem they were trying to resolve. Stay focused and work through the challenges, the benefits will come. Boral: Next Generation Firewalls The Experience at Boral An outbreak of malware on its network in 2009 forced Australian construction materials supplier, Boral, to ditch its 20-year-old firewall system and install a next generation firewall. The traditional port firewalls were no longer effective and could not deal with Web based threats and applications lurking in social networking sites or Google Apps. Boral saw the number of exploits targeting Adobe Flash and HTML/Jscript rising with the release of the Blackhole kit which is used by hackers. If you are not patched for Java or Adobe exploits, you might get a malware infection. This was exactly what happened when a Boral company PC--which was not fully patched and had Java/Adobe vulnerabilities-- visited a website containing exploits. It was subsequently compromised and the company had to deal with a malware infection in After going to market in 2010, the company selected a next generation firewall system which would perform deep inspection of Web traffic and blocking of attacks such as SQL scripting. Since the implementation, the company has been able to block viruses, spyware and exploits, control non-work related Web surfing and prevent potential threats associated with high risk apps. According to Chaudhuri, Boral can also identify users regardless of internet protocol (IP) addresses. In addition, employees can browse the Web at normal speeds while the security system is scanning for threats. The introduction of the next gen firewall meant Boral consolidated its security controls and saved $120,000 per annum in licensing and maintenance of uniform resource located (URL) filtering. Boral has also minimised data loss prevention and improved employee productivity by allowing access to specific applications. Sonali Chaudhuri IT Security and Risk Manager, Boral Source: Boral hammers security threats with next gen firewall Hamish Barwick, CIO, 17 July 2012 Anthony Sestanovic Head of IT Performance, ING Direct Source: ING Direct Australia removing identity management risks Hamish Barwick, CIO, 16 July gartner.com/ap/security
5 Selected Sessions To the Point: Quo Vadis CISO? Developing a Realistic Information Security Management Strategy Your strategy needs to be crystal clear on three elements: Where we are? Where we are going? How we will get there? Be methodical and use an evidencebased approach. Set expectations about what is achievable and what is NOT achievable (at least this time ) Tom Scholtz To the Point: Optimizing the Information Security Organization Using a Client-Focused Approach Monday Morning Assess the current state of your security and risk management organizational structure map skills to activities. Ensure that current roles and responsibilities are defined and communicated. Your Next 90 Days Develop a service catalog as a precursor to defining a service delivery model. Explore how your organization supports the goals and objectives of the business. Your Next 12 Months Evaluate your current organization structure and develop a plan to address gaps. Develop a plan to improve information security governance and its place in corporate governance. Jeffrey Wheatman Bits, Bytes and Balanced Scorecards Creating Security Metrics That Matter Focus on matching your metrics to the solution of business problems, not technology problems. Implement a tiered architecture for metrics mapping the content and context to the audience. Make sure metrics have ALL five characteristics and are flexible. Create some SLA-based metrics. Leverage additional reporting tools: Balanced scorecard Risk adjusted value management Four I Model Risk register Process maturity assessment. Jeffrey Wheatman Security and Risk Governance It s Much More Than Just Reporting Formalize a common definition of security and risk governance in your organization. Define and implement an information security and risk governance function that is integrated with the organization s corporate and IT governance functions. Focus on the governance processes and functions, rather than on the organizational position of the activities. Tom Scholtz To the Point: Articulating the Business Value of Information Security Establish the foundations: Listen to the business; understand the context Implement relevant governance structures and communication channels Establish a feedback loop. Communicate the business value of the program: Articulate the benefits in business terms Map the business drivers to actions and expected value. Justify project investment in business terms: Use balanced price/performance analysis Report back. Tom Scholtz Why Your Security Awareness Program Is Doomed (and What You Can Do to Rescue It) Action Plan for CISO s Monday Morning Review your current program for objectives and behavioral outcomes. Identify security objectives that depend on staff behavior. Next 90 Days Define two to three behavioral outcomes for this year s focus. Develop new media capabilities: tools and skills. Test market media and messages. Measure behaviors related to the defined behavioral outcomes. Next 12 Months Innovate message content and delivery mechanisms, frequent change is good. Explore new social models for support of behavioral outcomes. Andrew Walls Vice President 5 gartner.com/ap/security
6 Developing an Effective Identity and Access Management Program Recommendations Establish an IAM program with a vision and strategy that closely aligns with and tracks business imperatives. Seek business value beyond traditional efficiency and effectiveness benefits but focus on what is most appropriate to your organization. Embrace the challenges and opportunities of the nexus of forces and mature your IAM program to maximize value to the business. Earl Perkins Research VP Improving Your Social Risk IQ Evaluate strategic business objectives for related social issues. Include the effect of social amplification when assessing risks to business objectives. Ensure that CSR programs are built on a solid foundation of compliance and risk management, as well as employee, business partner and customer engagement. Improve your social risk IQ: Include social risk assessments in strategic planning Establish a weather bureau to track, shape and respond to social risks Proactively manage enterprise reputation Apply social media strategies to tune social amplification. French Caldwell VP & Gartner Fellow Can I Recover Through the Cloud? Managing IT Resilience Action Plan Evaluate and pilot the use of recoveryas-a-service: Qualify system image replication and failover support Consider: virtual only? VMware only? What about bare metal recovery? What about IBM, HP and Solaris platforms? Assess which CSFs are most important to you as well as how candidate providers stack up. Assess alternative providers Determine scope of self-service support Obtain credible documentation of provider operations controls Measure actual versus committed recovery times Gain a complete understanding of potential service benefits as well as the level of management support that the in-house IT team will need to provide. Tom Scholtz To the Point: Lawyers, Users and IT Security Ten Ways to Limit Risk and Improve Governance Action Plan for CISO Monday Morning Identify the state of your information governance program. Assess the level of involvement of information security in IG. Next 90 Days Develop a road map for classification and architectural integration into IG. Create a data security awareness campaign. Next 12 Months Implement a strategy for long-term integration of security and IG. Define a set of critical success factors and measures for security integration. Jeffrey Wheatman To the Point: Six Risk Techniques to Please Your Board CISOs should adopt the six risk management techniques to improve enterprise risk intelligence and risk reporting to the board. When communicating directly with the board, focus on: What enterprise objectives and strategies matter most? What s the potential impact of IT risk on those things? What are the current and proposed approaches to managing these risks? What are the next steps? French Caldwell VP & Gartner Fellow That Socrates Was Wrong A Debate on Human Nature and Its Relevance to Security Action Plan for CISOs and Risk Officers Monday Morning Review your security awareness training have you done it? Review your policy framework is it a litany of rules that no one understands, or does it have usable, understandable guidance? Next 90 Days Survey your users do they know or care about the value of security? Survey your users do they know what to do but lack the tools? Next 12 Months Refresh your security strategy to provide the tools, policies and awareness programs that your users need. Develop a marketing program to educate the organization about the importance of security. Rob McMillan, Earl Perkins, Tom Scholtz, Andrew Walls, John Girard 6 gartner.com/ap/security
7 Seven Keys to Successful and Cost-Effective Risk Oversight Review your company s current risk oversight practices to determine the overall level of maturity and alignment with public disclosures. Cultivate a greater understanding and awareness of risk through increased dialogue and an emphasis on the strategic priority of risk oversight. Weave risk oversight practices into the fabric of the business, while adopting a balanced and practical approach to risk management. Streamline risk oversight practices by clearly defining accountabilities, and by utilizing technology as an enabler of more effective risk management. French Caldwell VP & Gartner Fellow To the Point: The Realities of Cyber insurance Top 10 Considerations When Purchasing Cyberinsurance Buying in to the sales pitch. Your insurance broker. Policy complexity. Policy qualification. The pre-insurance survey. Filing claims. Selecting coverage. Understanding exclusions. The cloud. Payment of claims. Paul Proctor Teleworking Through a Disaster Case Studies of Disaster Recovery and Business Continuity Don t expect telework to help in every disaster; sometimes employees just need to survive. Practice telework as a business process, not as an occasional drill. Offer relevant training for managers and their staff. Make certain that all employees know how to use remote access, even if they are not full-time teleworkers. Ensure that your remote portals provide up-to-date links to the resources employees need. John Girard Monitoring Users for Security Intelligence Threats and Opportunities Establish effective governance first. Involve legal counsel and HR in formation of guidelines. Announce monitoring/surveillance to everyone in advance. Define the specific techniques and tools that can be used and when/ where they can be used. Make sure surveillance capabilities and actions always support agreedupon objectives and nothing more. Andrew Walls Vice President To the Point: The DLP Process More Than Just a Piece of Technology Ask yourself, Is my DLP platform an expensive brick or is it clearly contributing value? Manage the DLP platform so that it does not become a security risk itself. Work with colleagues across the organization to determine responsibilities and develop a RACI chart. Put the onus on the lines of business to define what they worry about, and turn it into a policy. Develop a meaningful metric to reflect what the events generated by that policy really mean. Tie this in with business-value-oriented metrics. Rob McMillan Deep Dive Into Internet Infrastructure Attacks Treat Internet access/availability like electricity circa Include Internet infrastructure disruption in incident response and business continuity plans. Prioritize certificate management processes and tools. When looking at wireless data service, consider mobile users and the Internet of things with an integrated approach. Lawrence Orans To the Point: Managing Identity and Access in a Hybrid World Develop a Strategy for Leveraging IAM Services in a Hybrid World. Partner with business leaders to include security/iam assessments as part of the planning process when procuring cloud-based business application services. Judge enterprise readiness to adopt IDaaS based on corporate risk goals. Understand your costs for providing internal IAM functions as a prelude to comparative shopping for clouddelivered IAM. Plan for mobile user use cases that will include employee- or consumer-owned devices and direct access to SaaS. Gregg Kreizman Vice President 7 gartner.com/ap/security
8 R Trip report Protecting Your Network in the BYOD Era Aim for a contain strategy initially. Evolve to an embrace strategy by: Developing policies to complement mobile strategy Implementing technologies (for example, MDM and HVD) that mitigate the security risk of BYOD Lawrence Orans Architectural Approaches to Reduce Mobile Computing Risks Use managed diversity to decide which platforms can be supported for typical company use cases and to decide how much support will be offered. Use trust boundaries and the supporting strategic mobile security technologies to decide how much the information will be made available to mobile users. Give up on the idea of trusting the platform. Require BYOD users to opt-in to company MDM in a trade for access to business systems John Girard To the Point: Developing and Implementing a Superior Mobile Device Policy Require users to opt-in to company MDM in a trade for access to business systems. Use trust and the supporting technologies as a decision point for the information made available to mobile users. Where possible, limit user access to basic PIM functions; fi lter sensitive materials; and deliver rich applications via portals, rather than storing data on the mobile device. Place the responsibility and the liability for consumer device security and policy compliance where it belongs: with the business units and the users. John Girard THaNKS To our 2012 SpoNSorS premier SpoNSorS Silver SpoNSorS platinum SpoNSorS Save THe DaTe Gartner Security & Risk Management Summit 2013 will take place in Sydney on August Be sure to bookmark the website gartner.com/ap/security and check back for 2013 Summit updates. 8 gartner.com/ap/security
Gartner Security & Risk Management Summit 2014
Gartner Security & Risk Management Summit 2014 25 26 August Hilton Sydney, Australia gartner.com/ap/security Smart Risk Balancing Security and Opportunity Hot Topics People-Centric Security Governance
Gartner Security & Risk Management Summit 2015
EARLY-BIRD Discount Save $300 by 4 September Gartner Security & Risk Management 2015 2 3 November Raffles Hotel, Dubai, UAE gartner.com/me/security Manage Risk and Deliver Security in a Digital World Hot
Analyst Biography Symposium Presentations Example Issues He Can Assist With
Neil Chandler BI & Analytics Neil focuses on business intelligence, analytics and performance management. This includes writing about and advising organisations about market trends, vendors, service providers
Gartner Security & Risk Management Summit 2015
EARLY-BIRD Discount Save 325 by 17 July Gartner Security & Risk Management Summit 2015 14 15 September London, UK gartnerevent.com/eu/security The World s Most Important Gathering for Security and Risk
BRIDGE. the gaps between IT, cloud service providers, and the business. IT service management for the cloud. Business white paper
BRIDGE the gaps between IT, cloud service providers, and the business. IT service management for the cloud Business white paper Executive summary Today, with more and more cloud services materializing,
How to ensure control and security when moving to SaaS/cloud applications
How to ensure control and security when moving to SaaS/cloud applications Stéphane Hurtaud Partner Information & Technology Risk Deloitte Laurent de la Vaissière Directeur Information & Technology Risk
Vulnerability Management
Vulnerability Management Buyer s Guide Buyer s Guide 01 Introduction 02 Key Components 03 Other Considerations About Rapid7 01 INTRODUCTION Exploiting weaknesses in browsers, operating systems and other
Guardian365. Managed IT Support Services Suite
Guardian365 Managed IT Support Services Suite What will you get from us? Award Winning Team Deloitte Best Managed Company in 2015. Ranked in the Top 3 globally for Best Managed Service Desk by the Service
Gartner Security & Risk Management Summit 2015
EARLY-BIRD Discount Save $400 by 26 June Gartner Security & Risk Management Summit 2015 24 25 August Hilton Sydney gartner.com/ap/security Manage Risk and Deliver Security in a Digital World Hot topics
While you are waiting for our webinar to begin, you might be interested in the downloads on the Attachment tab:
While you are waiting for our webinar to begin, you might be interested in the downloads on the Attachment tab: A copy of today s presentation and our Upcoming webinars Information on how to dial in if
The Protection Mission a constant endeavor
a constant endeavor The IT Protection Mission a constant endeavor As businesses become more and more dependent on IT, IT must face a higher bar for preparedness Cyber preparedness is the process of ensuring
Be Prepared. For Anything. Cyber Security - Confronting Current & Future Threats The role of skilled professionals in maintaining cyber resilience
Cyber Security - Confronting Current & Future Threats The role of skilled professionals in maintaining cyber resilience Mike O Neill Managing Director Graeme McGowan Associate Director of Cyber Security
End-user Security Analytics Strengthens Protection with ArcSight
Case Study for XY Bank End-user Security Analytics Strengthens Protection with ArcSight INTRODUCTION Detect and respond to advanced persistent threats (APT) in real-time with Nexthink End-user Security
Strategic Planning. Key Initiative Overview
David Aron Research Vice President This overview provides a high-level description of the Strategic Planning Key Initiative. IT leaders can use it to create strategies that help the business win, and change
B2C, B2B and B2E:! Leveraging IAM to Achieve Real Business Value
B2C, B2B and B2E:! Leveraging IAM to Achieve Real Business Value IDM, 12 th November 2014 Colin Miles Chief Technology Officer, Pirean Copyright 2014 Pirean Limited. All rights reserved. Safe Harbor All
Click to edit Master title style
EVOLUTION OF CYBERSECURITY Click to edit Master title style IDENTIFYING BEST PRACTICES PHILIP DIEKHOFF, IT RISK SERVICES TECHNOLOGY THE DARK SIDE AGENDA Defining cybersecurity Assessing your cybersecurity
State of Minnesota. Enterprise Security Strategic Plan. Fiscal Years 2009 2013
State of Minnesota Enterprise Security Strategic Plan Fiscal Years 2009 2013 Jointly Prepared By: Office of Enterprise Technology - Enterprise Security Office Members of the Information Security Council
Experience the commitment WHITE PAPER. Information Security Continuous Monitoring. Charting the Right Course. cgi.com 2014 CGI GROUP INC.
Experience the commitment WHITE PAPER Information Security Continuous Monitoring Charting the Right Course May 2014 cgi.com 2014 CGI GROUP INC. During the last few months of 2013, six federal agencies
ITIL and IT Operations Optimization
ITIL and IT Operations Optimization Ed Holub, Research VP 17 June 2009 Gartner Webinar Notes accompany this presentation. Please select Notes Page view. These materials can be reproduced only with written
Domain 1 The Process of Auditing Information Systems
Certified Information Systems Auditor (CISA ) Certification Course Description Our 5-day ISACA Certified Information Systems Auditor (CISA) training course equips information professionals with the knowledge
1. For each of the 25 questions, multiply each question response risk value (1-5) by the number of times it was chosen by the survey takers.
Employee Security Awareness Survey Trenton Bond [email protected] Admin - Version 1.3 Security Awareness One of the most significant security risks that organizations and corporations face today is
Delivering value to the business with IAM
Delivering value to the business with IAM IDM, 18 th June 2014 Colin Miles Chief Technology Officer, Pirean Copyright 2014 Pirean Limited. All rights reserved. Safe Harbor All statements other than statements
How To Protect Your Cloud From Attack
A Trend Micro White Paper August 2015 Trend Micro Cloud Protection Security for Your Unique Cloud Infrastructure Contents Introduction...3 Private Cloud...4 VM-Level Security...4 Agentless Security to
Table of contents. Best practices in open source governance. Managing the selection and proliferation of open source software across your enterprise
Best practices in open source governance Managing the selection and proliferation of open source software across your enterprise Table of contents The importance of open source governance... 2 Executive
Building a Roadmap to Robust Identity and Access Management
Building a Roadmap to Robust Identity and Access Management Elevating IAM from Responsive to Proactive From cases involving private retailers to government agencies, instances of organizations failing
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to
By John Pirc. THREAT DETECTION HAS moved beyond signature-based firewalls EDITOR S DESK SECURITY 7 AWARD WINNERS ENHANCED THREAT DETECTION
THE NEXT (FRONT) TIER IN SECURITY When conventional security falls short, breach detection systems and other tier 2 technologies can bolster your network s defenses. By John Pirc THREAT HAS moved beyond
CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility
CYBER SECURITY AND RISK MANAGEMENT An Executive level responsibility Cyberspace poses risks as well as opportunities Cyber security risks are a constantly evolving threat to an organisation s ability to
WHITE PAPER. 7 Keys to. successful. Organizational Change Management. Why Your CRM Program Needs Change Management and Tips for Getting Started
7 Keys to successful Organizational Change Management Why Your CRM Program Needs Change Management and Tips for Getting Started CONTENTS 2 Executive Summary 3 7 Keys to a Comprehensive Change Management
Gartner Application Architecture, Development & Integration Summit 2014
Gartner Application Architecture, Development & Integration Summit 2014 21 22 July Hilton Sydney, Australia gartner.com/ap/aadi Transform Your Applications Strategy for a Digital World hot TOPICS Flexible
HP ENTERPRISE SECURITY. Protecting the Instant-On Enterprise
HP ENTERPRISE SECURITY Protecting the Instant-On Enterprise HP SECURITY INTELLIGENCE AND RISK MANAGEMENT PLATFORM Advanced Protection Against Advanced Threats 360 Security Monitoring to Detect Incidents
A Websense White Paper Implementing Best Practices for Web 2.0 Security with the Websense Web Security Gateway
A Websense White Paper Implementing Best Practices for Web 2.0 Security with the Websense Web Security Gateway Table of Contents Introduction... 3 Implementing Best Practices with the Websense Web Security
How to Justify Your Security Assessment Budget
2BWhite Paper How to Justify Your Security Assessment Budget Building a Business Case For Penetration Testing WHITE PAPER Introduction Penetration testing has been established as a standard security practice
University of Hawaii Information Technology Services Strategic Plan May 22, 2015. Looking Forward to 2020 and Beyond [V15-1]
University of Hawaii Information Technology Services Strategic Plan May 22, 2015 [V15-1] I. Introduction This Information Technology Services (ITS) Strategic Plan, Looking Forward to 2020 and Beyond, updates
CYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES
POINT OF VIEW CYBERSECURITY IN FINANCIAL SERVICES Financial services institutions are globally challenged to keep pace with changing and covert cybersecurity threats while relying on traditional response
CYBER SECURITY, A GROWING CIO PRIORITY
www.wipro.com CYBER SECURITY, A GROWING CIO PRIORITY Bivin John Verghese, Practitioner - Managed Security Services, Wipro Ltd. Contents 03 ------------------------------------- Abstract 03 -------------------------------------
Defending Against Data Beaches: Internal Controls for Cybersecurity
Defending Against Data Beaches: Internal Controls for Cybersecurity Presented by: Michael Walter, Managing Director and Chris Manning, Associate Director Protiviti Atlanta Office Agenda Defining Cybersecurity
THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS
THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS Download the entire guide and follow the conversation at SecurityRoundtable.org Collaboration and communication between technical
Web application security Executive brief Managing a growing threat: an executive s guide to Web application security.
Web application security Executive brief Managing a growing threat: an executive s guide to Web application security. Danny Allan, strategic research analyst, IBM Software Group Contents 2 Introduction
What if your Disaster Recovery Plan were put to the test?
The Content Experts WEBINAR HIGHLIGHTS What if your Disaster Recovery Plan were put to the test? July 22, 2015 SPONSORED BY Held on July 22, 2015, this webinar on disaster recovery was facilitated by Jim
Information Technology 2016-2021 Strategic Plan
Information Technology 2016-2021 Strategic Plan Draft Table of Contents Table of Contents... 3 Introduction... 4 Mission of IT... 4 Primary Service Delivery Objectives... 4 Availability of Systems...
Organizational Structure What Works
Organizational Structure What Works Evan Wheeler Director, Omgeo Session ID: PROF-001 Session Classification: Professional Development Once you have gotten past the first few months, you will be presented
Address C-level Cybersecurity issues to enable and secure Digital transformation
Home Overview Challenges Global Resource Growth Impacting Industries Address C-level Cybersecurity issues to enable and secure Digital transformation We support cybersecurity transformations with assessments,
Corporate Incident Response. Why You Can t Afford to Ignore It
Corporate Incident Response Why You Can t Afford to Ignore It Whether your company needs to comply with new legislation, defend against financial loss, protect its corporate reputation or a combination
04 Executive Summary. 08 What is a BI Strategy. 10 BI Strategy Overview. 24 Getting Started. 28 How SAP Can Help. 33 More Information
1 BI STRATEGY 3 04 Executive Summary 08 What is a BI Strategy 10 BI Strategy Overview 24 Getting Started 28 How SAP Can Help 33 More Information 5 EXECUTIVE SUMMARY EXECUTIVE SUMMARY TOP 10 BUSINESS PRIORITIES
My Experience. Serve Users in a Way that Serves the Business.
Infrastructure Services the way we do it My Experience Serve Users in a Way that Serves the Business. A Smarter Strategy for Empowering Users IT has entered a new era, and CIOs need to perform a delicate
Enterprise Security Tactical Plan
Enterprise Security Tactical Plan Fiscal Years 2011 2012 (July 1, 2010 to June 30, 2012) Prepared By: State Chief Information Security Officer The Information Security Council State of Minnesota Enterprise
How to start a software security initiative within your organization: a maturity based and metrics driven approach OWASP
How to start a software security initiative within your organization: a maturity based and metrics driven approach Marco Morana OWASP Lead/ TISO Citigroup OWASP Application Security For E-Government Copyright
Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense
A Trend Micro Whitepaper I February 2016 Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense How Trend Micro Deep Security Can Help: A Mapping to the SANS Top 20 Critical
CGI Cyber Risk Advisory and Management Services for Insurers
CGI Cyber Risk Advisory and Management Services for Insurers Minimizing Cyber Risks cgi.com 3 As organizations seek to create value in today s highly interconnected world, they inherently increase their
Buyer s Guide & Workbook
SEO SOFTWARE PLATFORM Buyer s Guide & Workbook Data-Driven Insights, Monitoring and Reporting for SEO + Social + Content SEO Software Platform: Buyer s Guide & Workbook Digital marketing professionals
What is Penetration Testing?
White Paper What is Penetration Testing? An Introduction for IT Managers What Is Penetration Testing? Penetration testing is the process of identifying security gaps in your IT infrastructure by mimicking
The Benefits of an Integrated Approach to Security in the Cloud
The Benefits of an Integrated Approach to Security in the Cloud Judith Hurwitz President and CEO Marcia Kaufman COO and Principal Analyst Daniel Kirsch Senior Analyst Sponsored by IBM Introduction The
WHAT ARE THE BENEFITS OF OUTSOURCING NETWORK SECURITY?
WHAT ARE THE BENEFITS OF OUTSOURCING NETWORK SECURITY? Contents Introduction.... 3 What Types of Network Security Services are Available?... 4 Penetration Testing and Vulnerability Assessment... 4 Cyber
By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015
Community Bank Auditors Group Cybersecurity What you need to do now June 9, 2015 By: Gerald Gagne MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2015 Wolf & Company, P.C. Cybersecurity
Securing the Cloud with IBM Security Systems. IBM Security Systems. 2012 IBM Corporation. 2012 2012 IBM IBM Corporation Corporation
Securing the Cloud with IBM Security Systems 1 2012 2012 IBM IBM Corporation Corporation IBM Point of View: Cloud can be made secure for business As with most new technology paradigms, security concerns
Changing the Enterprise Security Landscape
Changing the Enterprise Security Landscape Petr Hněvkovský Presales Consultant, ArcSight EMEA HP Enterprise Security Products 2012 Hewlett-Packard Development Company, L.P. The information contained herein
SECURITY 2.0 LUNCHEON
PROTECTING YOUR ORGANIZATION SECURITY 2.0 LUNCHEON AGAINST CYBER THREATS Tommy Montgomery, Principal Consultant Viral Dhimar, Consultant Adam Ferguson, VP October 22, 2014 #SWCEvents Security 2.0: Next
Partnership prospectus
Partnership prospectus Why NextGen Government, why now? Ground breaking progress has been made in the approach to digital government over the last few years, which the new Digital Transformation Office
TERMS OF REFERENCE (TORs) OF CONSULTANTS - (EAG) 1. Reporting Function. The Applications Consultant reports directly to the CIO
TERMS OF REFERENCE (TORs) OF CONSULTANTS - (EAG) Consultant - Enterprise Systems & Applications 1. Reporting Function. The Applications Consultant reports directly to the CIO 2. Qualification and Experience
Accenture Technology Consulting. Clearing the Path for Business Growth
Accenture Technology Consulting Clearing the Path for Business Growth Mega technology waves are impacting and shaping organizations in a profound way When a company s executive management team considers
Seven Practical Steps to Delivering More Secure Software. January 2011
Seven Practical Steps to Delivering More Secure Software January 2011 Table of Contents Actions You Can Take Today 3 Delivering More Secure Code: The Seven Steps 4 Step 1: Quick Evaluation and Plan 5 Step
The Business Case for Information Security. White Paper
The Business Case for Information Security White Paper Version 1.0 Background Creating a compelling business case for information security can be a challenge. It s sometimes difficult to identify or articulate
Italy. EY s Global Information Security Survey 2013
Italy EY s Global Information Security Survey 2013 EY s Global Information Security Survey 2013 This year s survey our 16th edition captures the responses of 1,909 C-suite and senior level IT and information
Service Desk Institute 10 Steps To Successful ITSM Tool Selection
Service Desk Institute 10 Steps To Successful ITSM Tool Selection Introduction The one decision that really makes a difference for both consumers of IT and our service desk analysts is the one to replace
Vulnerability management lifecycle: defining vulnerability management
Framework for building a vulnerability management lifecycle program http://searchsecurity.techtarget.com/magazinecontent/framework-for-building-avulnerability-management-lifecycle-program August 2011 By
2011 Forrester Research, Inc. Reproduction Prohibited
1 2011 Forrester Research, Inc. Reproduction Prohibited Information Security Metrics Present Information that Matters to the Business Ed Ferrara, Principal Research Analyst July 12, 2011 2 2009 2011 Forrester
SESSION 709 Wednesday, November 4, 9:00am - 10:00am Track: Strategic View
SESSION 709 Wednesday, November 4, 9:00am - 10:00am Track: Strategic View The Business of IT Provisioning Bill Irvine Transformation Strategist, Accelerate Innovation, VMware [email protected] Session
Information Security Services
Information Security Services Information Security In 2013, Symantec reported a 62% increase in data breaches over 2012. These data breaches had tremendous impacts on many companies, resulting in intellectual
Nine Steps to Smart Security for Small Businesses
Nine Steps to Smart Security for Small Businesses by David Lacey Co-Founder, Jericho Forum Courtesy of TABLE OF CONTENTS INTRODUCTION... 1 WHY SHOULD I BOTHER?... 1 AREN T FIREWALLS AND ANTI-VIRUS ENOUGH?...
10 Smart Ideas for. Keeping Data Safe. From Hackers
0100101001001010010001010010101001010101001000000100101001010101010010101010010100 0100101001001010010001010010101001010101001000000100101001010101010010101010010100000 0100101001001010010001010010101001010101001000000100101001010101010010101010010100000
How To Use Social Media To Improve Your Business
IBM Software Business Analytics Social Analytics Social Business Analytics Gaining business value from social media 2 Social Business Analytics Contents 2 Overview 3 Analytics as a competitive advantage
The Value of Vulnerability Management*
The Value of Vulnerability Management* *ISACA/IIA Dallas Presented by: Robert Buchheit, Director Advisory Practice, Dallas Ricky Allen, Manager Advisory Practice, Houston *connectedthinking PwC Agenda
Close the security gap with a unified approach. Detect, block and remediate risks faster with end-to-end visibility of the security cycle
Close the security gap with a unified approach Detect, block and remediate risks faster with end-to-end visibility of the security cycle Events are not correlated. Tools are not integrated. Teams are not
THE 7 STEPS TO A SUCCESSFUL CRM IMPLEMENTATION DEPLOYING CRM IN THE NEW ERA OF CONNECTED CUSTOMERS
THE NEW ERA OF ABOUT THE AUTHOR Paul Rogers is the Head of Customer Experience and CRM within HCL s Applications Division. Based in London, Paul is responsible for leading HCL s CRM consulting and technology
The Business Continuity Maturity Continuum
The Business Continuity Maturity Continuum Nick Benvenuto & Brian Zawada Protiviti Inc. 2004 Protiviti Inc. EOE Agenda Terminology Risk Management Infrastructure Discussion A Proposed Continuity Maturity
January IIA / ISACA Joint Meeting Pre-meeting. Cybersecurity Update for Internal Auditors. Matt Wilson, PwC Risk Assurance Director
January IIA / ISACA Joint Meeting Pre-meeting Cybersecurity Update for Internal Auditors Matt Wilson, Risk Assurance Director Introduction and agenda Themes from The Global State of Information Security
SYMPOSIUM PROGRAM DAY ONE
Tuesday 26 th August 2014 9.00am - 5.30pm RACV City Club, Melbourne SYMPOSIUM PROGRAM DAY ONE 8:30am Registration Opens Location: Foyer Level 2 9:00am 9:10am Symposium Welcome Speaker: Tom Garcia, Chief
I D C E V E N T P R O C E E D I N G S
I D C E V E N T P R O C E E D I N G S As i a / P a c i f i c Perspecti ve s : N a vi g a t i n g t h e D a t a c e n t e r Security I m p e r a t i ve September 2014 By Chuang Shyne-Song; Program Director,
Cybersecurity as a Risk Factor in doing business
Cybersecurity as a Risk Factor in doing business 1 Data is the new raw material of business Economist UK, 2013. In trying to defend everything he defended nothing Frederick the Great, Prussia 1712-86.
Data Management in the Cloud Era
In This Paper In cloud environments, using multiple point products for data management often results in diminishing returns Single-vendor solutions enable enterprises to leverage their cloud investments
Vendor Focus for IBM Global Services: Consulting Services for Cloud Computing
Research Publication Date: 22 February 2010 ID Number: G00174046 Vendor Focus for IBM Global Services: Consulting Services for Cloud Computing Susan Tan Amid the hype and buzz of cloud computing are very
MSc Cyber Security. identity. hacker. virus. network. information
identity MSc Cyber Security hacker virus QA is the foremost provider of education in the UK. We work with individuals at all stages of their careers, from our award-winning apprenticeship programmes, through
Gartner IT Financial, Procurement & Asset Management Summit 2014. Trip Report. Overview
Gartner IT Financial, Procurement & Asset Management Summit 2014 Driving Business Outcomes: Control Costs, Mitigate Risks and Sustain Innovation Trip Report The Gartner IT Financial, Procurement & Asset
ORGANIZED FOR BUSINESS: BUILDING A CONTEMPORARY IT OPERATING MODEL
ORGANIZED FOR BUSINESS: BUILDING A CONTEMPORARY IT OPERATING MODEL Time is running out for the traditional, monopolistic IT model now that users have so many alternatives readily available. Today s enterprises
Reducing Application Vulnerabilities by Security Engineering
Reducing Application Vulnerabilities by Security Engineering - Subash Newton Manager Projects (Non Functional Testing, PT CoE Group) 2008, Cognizant Technology Solutions. All Rights Reserved. The information
Industrial Cyber Security Risk Manager. Proactively Monitor, Measure and Manage Cyber Security Risk
Industrial Cyber Security Risk Manager Proactively Monitor, Measure and Manage Cyber Security Risk With Today s Cyber Threats, How Secure is Your Control System? Today, industrial organizations are faced
!!!!! White Paper. Understanding The Role of Data Governance To Support A Self-Service Environment. Sponsored by
White Paper Understanding The Role of Data Governance To Support A Self-Service Environment Sponsored by Sponsored by MicroStrategy Incorporated Founded in 1989, MicroStrategy (Nasdaq: MSTR) is a leading
What Do You Mean My Cloud Data Isn t Secure?
Kaseya White Paper What Do You Mean My Cloud Data Isn t Secure? Understanding Your Level of Data Protection www.kaseya.com As today s businesses transition more critical applications to the cloud, there
White Paper. What the ideal cloud-based web security service should provide. the tools and services to look for
White Paper What the ideal cloud-based web security service should provide A White Paper by Bloor Research Author : Fran Howarth Publish date : February 2010 The components required of an effective web
Why you should adopt the NIST Cybersecurity Framework
www.pwc.com/cybersecurity Why you should adopt the NIST Cybersecurity Framework May 2014 The National Institute of Standards and Technology Cybersecurity Framework may be voluntary, but it offers potential
Rethinking Information Security for Advanced Threats. CEB Information Risk Leadership Council
Rethinking Information Security for Advanced Threats CEB Information Risk Leadership Council Advanced threats differ from conventional security threats along many dimensions, making them much more difficult
INSIGHTS AND RESOURCES FOR THE CYBERSECURITY PROFESSIONAL
INSIGHTS AND RESOURCES FOR THE CYBERSECURITY PROFESSIONAL BY 2 In enterprise IT, there is a single point where everything that matters in information, technology and business converges: Cybersecurity Nexus
