understanding the 8 keys to security success

21
= Understanding the 8 Keys to Security Success

Upload: securityon-demand

Post on 07-Apr-2017

354 views

Category:

Technology


6 download

TRANSCRIPT

Page 1: Understanding the 8 Keys to Security Success

=Understanding the 8 Keys to Security Success

Page 2: Understanding the 8 Keys to Security Success

A CISO’s Competing Priorities

Manage risk and ensure the security of our organizations. Create an

environment where business can be transacted seamlessly, conveniently

and securely.

Page 3: Understanding the 8 Keys to Security Success

Security success no longer means preventing a breach. It

now means achieving a balance between prevention,

compliance, threat management and preparation.

Page 4: Understanding the 8 Keys to Security Success

From decades of helping organizations achieve security

success, we have come up with this list of eight things

organizations should be doing in order to achieve security

success.

Page 5: Understanding the 8 Keys to Security Success

1Have a coordinated operational and technical

capability approach to prevention, detection and remediation of events and incidents.

Page 6: Understanding the 8 Keys to Security Success

This sounds easy, but it requires buy-in and participation across the

organization.

Business and data owners must take ownership and responsibility for the security of data under their purview.

This often means getting non-security personnel involved in security

conversations.

Page 7: Understanding the 8 Keys to Security Success

2Have a centralized, systematic (technological or otherwise) way of sharing knowledge related to

threats and incidents.

Page 8: Understanding the 8 Keys to Security Success

Information regarding current and imminent threats and

incidents is extremely valuable.

This information could be used to help prevent attacks from

spreading across an enterprise. But, information silos prevent

effective notification of emerging threats and attackers use this to

their advantage. SHARING INFO

Page 9: Understanding the 8 Keys to Security Success

3Stay ahead of threats with continuous configuration

management and analysis.

Page 10: Understanding the 8 Keys to Security Success

Your technology is only as good as its configuration. This also requires highly trained specialists who are skilled in the use of

a particular technology.

Page 11: Understanding the 8 Keys to Security Success

4Deploy the right security technology.

Page 12: Understanding the 8 Keys to Security Success

Technology is the tools used by your people to enable your

processes.

Without the people and the process in place, the technology will never be fully utilized. Take the time to evaluate what you

have.

TECHNOLOGY

Page 13: Understanding the 8 Keys to Security Success

5Keep systems running efficiently and beat alert fatigue with a

managed solution.

Page 14: Understanding the 8 Keys to Security Success

You can’t solve security problems with technology alone.

Organizations struggle to keep up with the vast quantities of alarms and alerts that most technologies

generate. Managed security services are a great option to help one

operationalize the maintenance of systems and streamline alert triage. MALWARE

Page 15: Understanding the 8 Keys to Security Success

6Respond to threats in a timely, and consistent manner.

Page 16: Understanding the 8 Keys to Security Success

They key is to be able to identify those threats quickly and be

prepared with a response plan. Leveraging advanced tools such as behavioral analytics is one way to

get ahead of the curve.

Finding compromises early and being able to respond and

minimize impact is what security success is all about.

ANALYTIC TOOLS

Page 17: Understanding the 8 Keys to Security Success

7Employ a consistent approach to the handling of incidents and threats from identification through

closure.

Page 18: Understanding the 8 Keys to Security Success

Organizations who have a well-developed approach to working through these incidents have an

advantage.

Having a trusted partner that can provide you with actionable

intelligence helps maximize the efficacy of your team and

improves your ability to respond and contain incidents.

Page 19: Understanding the 8 Keys to Security Success

8Apply metrics around the efficiency of information

security technologies, processes and people.

Page 20: Understanding the 8 Keys to Security Success

Organizations that continually track key metrics are far more likely to

achieve security success.

Having the reporting and data needed to understand what is working and

what needs improvement will help you make educated decisions on what to

change, improve or do more of.

Page 21: Understanding the 8 Keys to Security Success

858.693.5655 | [email protected]