SECURITY 2.0 LUNCHEON

Similar documents
Agenda , Palo Alto Networks. Confidential and Proprietary.

Information Security for the Rest of Us

Anthony Caragol Lync MVP. Gonzalo Escarrá Lync Technical Lead

Brad Ellison Engagement Manager Aaron Saposnik Cloud Engineer

JUNIPER NETWORKS SPOTLIGHT SECURE THREAT INTELLIGENCE PLATFORM

Elliott Baretz Vice President Mark Fitzsimmons Search Engine Architect Sarah Derry Social Media Specialist SWC Technology Partners

MICROSOFT DYNAMICS CRM 2015

Click to edit Master title style. How To Choose The Right MSSP

MICROSOFT DYNAMICS CRM 2015

Anthony Caragol Gonzalo Escarrá

Report on CAP Cybersecurity November 5, 2015

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

SANS Top 20 Critical Controls for Effective Cyber Defense

Advanced Threat Detection: Necessary but Not Sufficient The First Installment in the Blinded By the Hype Series

Rachael Narel Engagement Manager Chad Dotzenrod BI Practice Lead SWC Technology Partners

IT AUDIT WHO WE ARE. Current Trends and Top Risks of /9/2015. Eric Vyverberg. Randy Armknecht. David Kupinski

Solution Brief. Aerohive and OpenDNS. Advanced Network Security for Retail Stores

Stop advanced targeted attacks, identify high risk users and control Insider Threats

Susie Cummings Vice President John Kuchta Senior Consultant

Response to Questions CML Managed Information Security

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

How Attackers are Targeting Your Mobile Devices. Wade Williamson

AppGuard. Defeats Malware

Payment Card Industry Data Security Standard

GOING BEYOND BLOCKING AN ATTACK

SECURITY PLATFORM FOR HEALTHCARE PROVIDERS

Cloud Assurance: Ensuring Security and Compliance for your IT Environment

Retention & Destruction

Personal Security Practices of the CAO

THE POWER OF THE CLOUD IS CLOSER THAN YOU THINK. Michael Lee Aaron Saposnik SWC Technology Partners

Susie Cummings Vice President

White Paper THE FOUR ATTACK VECTORS TO PREVENT OR DETECT RETAILER BREACHES. By James Christiansen, VP, Information Risk Management

Unified Threat Management, Managed Security, and the Cloud Services Model

Addressing the blind spots in your security strategy. BT, Venafi & Blue Coat

Professional Services Overview

The Hillstone and Trend Micro Joint Solution

Symantec Consulting Services

Cisco Master Security Specialization Practice Areas Summary. February 2016

Extending Threat Protection and Control to Mobile Workers with Cloud-Based Security Services > White Paper

Managed Intrusion, Detection, & Prevention Services (MIDPS) Why Sorting Solutions? Why ProtectPoint?

Prepare Yourself for the Digital Battlefield. Christopher May. 27 Feb 2014

Fortinet Advanced Threat Protection- Part 3

2012 Data Breach Investigations Report

H.I.P.A.A. Compliance Made Easy Products and Services

Top Ten Technology Risks Facing Colleges and Universities

We are Passionate about Total Security Management Architecture & Infrastructure Optimisation Review

MICROSOFT DYNAMICS CRM 2015

FROM PRODUCT TO PLATFORM

FIRN Secure Internet Bundled Services:

NEC Managed Security Services

On and off premises technologies Which is best for you?

Fighting Advanced Threats

Brad Ellison Engagement Manager Aaron Saposnik Cloud Engineer

North American Electric Reliability Corporation (NERC) Cyber Security Standard

Practice Good Enterprise Security Management. Presented by Laurence CHAN, MTR Corporation Limited

Security and Privacy

Unified Security Management and Open Threat Exchange

Brad Ellison Engagement Manager Aaron Saposnik Cloud Engineer

EXTENDING THREAT PROTECTION AND CONTROL TO MOBILE WORKERS

10 Things Every Web Application Firewall Should Provide Share this ebook

Injazat s Managed Services Portfolio

Security Services. 30 years of experience in IT business

How we see malware introduced Phishing Targeted Phishing Water hole Download (software (+ free ), music, films, serialz)

Next Generation IPS and Reputation Services

The Protection Mission a constant endeavor

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales

Enterprise Security Tactical Plan

Defending Against Data Beaches: Internal Controls for Cybersecurity

V ISA SECURITY ALERT 13 November 2015

The Evolution of the Enterprise And Enterprise Security

Cybersecurity and internal audit. August 15, 2014

Perspectives on Cybersecurity in Healthcare June 2015

Modular Network Security. Tyler Carter, McAfee Network Security

WHITE PAPER Cloud-Based, Automated Breach Detection. The Seculert Platform

SECURE POWER SYSTEMS PROFESSIONALS (SPSP) PROJECT PHASE 3, FINAL REPORT: RECRUITING, SELECTING, AND DEVELOPING SECURE POWER SYSTEMS PROFESSIONALS

EMERGING THREATS & STRATEGIES FOR DEFENSE. Stephen Coty Chief Security

The Business Case for Security Information Management

10 Best Practices to Protect Your Network presented by Saalex Information Technology and Citadel Group

Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)

Detecting Threats Via Network Anomalies. Paul Martini Cofounder and CEO iboss Cybersecurity

Cisco Master Security Specialization Practice Areas Summary. June 2015

CALNET 3 Category 7 Network Based Management Security. Table of Contents

Teradata and Protegrity High-Value Protection for High-Value Data

WHAT EVERY CEO, CIO AND CFO NEEDS TO KNOW ABOUT CYBER SECURITY.

Managed Security Services for Data

Jumpstarting Your Security Awareness Program

Enterprise Security Platform for Government

By John Pirc. THREAT DETECTION HAS moved beyond signature-based firewalls EDITOR S DESK SECURITY 7 AWARD WINNERS ENHANCED THREAT DETECTION

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

Protecting the Infrastructure: Symantec Web Gateway

Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services

Case Study: Security Implementation for a Non-Profit Hospital

APPLICATION PROGRAMMING INTERFACE

Department of Management Services. Request for Information

Firewall Administration and Management

Cloud Services Prevent Zero-day and Targeted Attacks Tom De Belie Security Engineer. [Restricted] ONLY for designated groups and individuals

WildFire. Preparing for Modern Network Attacks

A Channel Company White Paper. Online Security. Beyond Malware and Antivirus. Brought to You By:

POLIWALL: AHEAD OF THE FIREWALL

Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense

Transcription:

PROTECTING YOUR ORGANIZATION SECURITY 2.0 LUNCHEON AGAINST CYBER THREATS Tommy Montgomery, Principal Consultant Viral Dhimar, Consultant Adam Ferguson, VP October 22, 2014

#SWCEvents

Security 2.0: Next Generation Security Solutions Demonstration: Palo Alto Q&A SECURITY THREATS MALWARE FIREWALLS NETWORK

About SWC Technology Partners SWC is a leading provider of innovative IT solutions for the mid-market. For more than 30 years, SWC has excelled at providing strategic guidance and delivering best-in-class solutions tailored to fit growing organizations.

About SWC Technology Partners Collaboration Business Intelligence CRM Custom Development

About SWC Technology Partners Digital Creative and Design Web Design Digital Marketing Platforms Search Engine Optimization Search Engine Marketing Social Media Videography

About SWC Technology Partners Architecture & Strategy Information Security System Center Unified Communications Desktop Management, Deployment & Virtualization

About SWC Technology Partners Monitor and Manage Service Desk Remote and Onsite Support Enhanced Managed Services Zephyr EDI and Data Exchange Solutions

About SWC Technology Partners At SWC we get past the hype and help our clients use the cloud to move their business to new heights. Advisory Software Recovery Network

Awards

SWC Security Services TECHNICAL SECURITY Vulnerability Assessment Penetration Testing Web Application Testing Security Infrastructure Implementation Business Continuity Disaster Recovery Access Control & Management RISK Security Assessment Policy Design & Review Control Analysis Security Program Development Threat Profiling Phishing Campaigns User Awareness COMPLIANCE PCI Preparation HIPAA Readiness Review ISO 27001 / 27002 Gap Analysis Standards & Framework Design MANAGED SERVICES Managed & Monitored Firewall Virtual CIO Security Log Review IPS / IDS Tuning / Management Managed Vulnerability Scanning Next Generation Firewall Web Application Firewall Threat Intelligence Bulletins CERTIFICATIONS: CISSP, ISSMP, CISM, GPEN, C EH, GCFW, CCNA & CCNP 2014 SWC Technology Partners

Consequences of Failing to Act X CEO and CIO Lost Job X Loss of Customer Confidence X Millions in Financial Losses X Significant Shareholder Loss

Real World Example The Target Breach HVAC Midsize Business 1 Attacker phishes in malware to contractor Retail POS Terminal Attacker locates POS terminals and infects with malware 5 Malware scrapes RAM for CC data and stages on Windows server 6 2 Attacker leverages stolen credentials to connect to portal Windows Server Contractor Portal Firewall 4 Attacker finds and infects internal server Exfiltration FTP Servers 7 Stolen data is exfiltrated to Russian FTP servers 3 FireEye appliances detects attacker attempting to infect server. Target fails to act.

Security 1.0 No Mature Security Program Traditional Firewalls No Application Awareness Signature Based Anti-Virus No Directory Integration

Security 2.0 Information Security Program Next Generation Firewalls Next Generation Malware Protection Holistic Integration

Security Program Foundation Information Security Program Definition: The comprehensive, organized collection of polices, documents and processes that are used to continuously deliver information security across the enterprise

Security Program Foundation GOVERNANCE SECURITY AWARENESS DISASTER PLANNING INFORMATION SECURITY PROGRAM SECURITY ARCHITECTURE IT SECURITY OPERATIONS RISK MANAGEMENT

Advanced Malware Detection Advanced malware detection uses behavior to identify malware, unlike traditional defenses relying on signatures Inspects data coming into and leaving your network Protects against zero-day attacks with sandboxing Detects and blocks communication to botnet controllers Leverages a data sharing network

FireEye Alerts

Next Generation Firewalls Provides Application Aware Connection Tracking Integrates with Active Directory Enables User Based Filtering URL Filtering IPS Firewalls Identifies Systems Connected to Botnets Easy to Understand, Visually Rich Single Pane Traffic View Robust Reporting Full Product Integration

Demonstration PALO ALTO DEMO

Tying It All Together Technology is but the foundation must be in place to manage and empower it A solid security program will justify the technology investment Security awareness training reduces user risk An incident response plan as part of a security program is key to acting on alerts from technology in place Use the right technology, not just names that you have heard of SECURITY THREATS MALWARE FIREWALLS NETWORK

Why SWC? Balance of Technical, Business and Process Trusted, Established Partner with Over 30 Years Experience Holistic Approach Practicality We Get Security is Not Everyone's #1 Priority Wide Range of Solutions

Thank You For Your Time! COMPLIMENTARY SECURITY OFFER: luncheon we would like to offer you a COMPLIMENTARY SECURITY 2.0 READINESS CONSULTATION. Just let us know if you are interested on our feedback form. To learn more, please contact: Tommy Montgomery Principal Consultant Tommy.Montgomery@SWC.com 630.371.9423 Adam Ferguson Vice President, Client Engagement Adam.Ferguson@SWC.com 630.286.8124