SlideShare ist ein Scribd-Unternehmen logo
1 von 34
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Guarding against the
Breach
The 2014 Vulnerability Landscape
Pierpaolo Ali’
South Europe Sales Director
HP Enterprise Security Products
June 17, 2014
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.2
Discover
y
The attack lifecycle
Researc
h
Our
enterprise
Their
ecosystem
Infiltration
Capture
Exfiltration
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.3
Discover
y
How we can disrupt the market
Researc
h
Our
enterprise
Their
ecosystem
Infiltration
Capture
Exfiltration
Planning
damage
mitigation
Educating users
Counter intel
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.4
Agenda
2013 Cyber Risk Report key findings
Understanding Exactly how the Attacker Ecosystem Works
HP Security Research
Building Security in Maturity Model
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
2013 Cyber Risk Report
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.6
Key Findings
Research gains attention, but vulnerability
disclosures stabilize and decrease in severity
80% of applications contain
vulnerabilities exposed by incorrect
configuration
Differing definitions of “malware” make
measuring mobile malware risk extremely
difficult
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.7
Key Findings
The attack surface allows for
multiple avenues for compromise
46% of mobile iOS and Android
applications use encryption improperly
Internet Explorer was the software most
targeted by Zero Day Initiative (ZDI)
researchers
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.8
Key Findings
SCADA systems are
increasingly targeted
Sandbox bypass vulnerabilities
are the #1 issue for Java
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.9
Conclusions
Mitigate
Risk
Respond
Appropriately
Reduce
Attack Surface
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.10
Going beyond the basics of best practices
Remember that people are part of your
organization’s perimeter too
Don’t rely solely on traditional defensive
perimeter security
Expect to be compromised
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.11
Going beyond the basics of best practices
Make security and response a continuous
process
Understand that not all information and
network assets are equal
Seek out credible and reliable security
intelligence
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Understanding exactly how the
Attacker Ecosystem Works
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.13
A recent event
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.14
Repeat attacks
Company A NEW
EVENT
Zero
Day
Company B
Company CMalicious
IP Address
Malwar
e
Variant
NEW
EVENT
NEW
EVENT
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.15
Recruiting
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.16
Job offers
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.17
Escrow services
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.18
Training
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
HP Security Research
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.20
HP Enterprise Security Products
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.21
HP Security Research
SANS, CERT, NIST, ReversingLabs, software, and reputation vendors
• ~3000 researchers
• 2000+ customers sharing data
• 7000+ managed networks globally
Ecosystem
partner
ESS
HP Security Research
Innovative research
Thought leadership
• Automatically integrated into HP products
• HP finds more vulnerabilities than the rest
of the market combined
• Top security vulnerability research
organization for the past three years
—Frost & Sullivan
Actionable security
intelligence
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.22
The Value HP TippingPoint DVLabs Provides
Vulnerability Research
 Crowd-sourced 0-day and
vulnerability research through the
Zero Day Initiative (ZDI)
 Original vulnerability research on
widely-used software
 Targeted research on emerging
threat technologies and trends
Malware Research
 Reputation feed of malicious
hosts and IP addresses
 In-depth threat research
Weekly updates for to stay ahead of the threats
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.24
Heartbleed…
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.25
Consistent delivery of quarterly content updates (03-29-2013, 06-28-2013, …)
Building Security In: HP SSR
Original Research
 Malware analysis, access control validation, …
Secure Coding Rulepacks (SCA)
 563 unique categories of vulnerabilities across
21 languages and over 720,000 individual APIs
Runtime Rulepack Kits
 HP Fortify SecurityScope
 HP Fortify Runtime Application Logging
 HP Fortify Runtime Application Protection (RTAP)
WebInspect SecureBase (WebInspect)
 Next-generation security testing capabilities
HP
0
100
200
300
400
500
600
05
Q1
05
Q3
06
Q1
06
Q3
07
Q1
07
Q3
08
Q1
08
Q3
09
Q1
09
Q3
10
Q1
10
Q3
11
Q1
11
Q3
12
Q1
12
Q3
13
Q1
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Building Security in Maturity
Model
(BSIMM)
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.27
Building BSIMM (2009)
 Big idea: Build a maturity model from actual data gathered
from 9 well known large-scale software security initiatives
 Created a software security framework
 Interviewed nine firms in-person
 Discovered 110 activities through observation
 Organized the activities in 3 levels
 Built a scorecard
 The model has been validated with data from 67 firms
 There are no special snowflakes
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.28
Prescriptive versus Descriptive Models
 Prescriptive models describe
what you should do (circa 2006)
 SAFECode
 SAMM
 MS SDL
 Touchpoints
 Every firm has a methodology
they follow (often a hybrid)
 You need an SSDL!
 Descriptive models describe
what is actually happening
 BSIMM is a descriptive model
used to measure multiple
prescriptive SSDLs
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.29
Plus 22 firms that remain anonymous
67 Firms in the BSIMM-V Community
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.30
Compare yourself with…
•Your peers
•Other business units
Track your performance over
time…
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.31
BSIMM by the Numbers
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.32
Conclusion
Don’t rely solely on traditional defensive
perimeter security.
Know thy enemy. Expect to be compromised.
Security Research can provide proactive insight
into global, vertical-specific, and geographic
threats.
BSIMM: Measure how well you’re doing
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Questions?
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.34
Join Our Conversation
We are on your side. Visit our blogs.
HP Security Research: hp.com/go/HPSRblog
HP Security Products:
hp.com/go/SecurityProductsBlog
HP Threat Briefings: hp.com/go/ThreatBriefings
BSIMM Information: bsimm.com bsimm@hp.com
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Thank You

Weitere ähnliche Inhalte

Was ist angesagt?

State of Endpoint Security: The Buyers Mindset
State of Endpoint Security: The Buyers MindsetState of Endpoint Security: The Buyers Mindset
State of Endpoint Security: The Buyers MindsetCrowdStrike
 
Transitioning Government Technology
Transitioning Government TechnologyTransitioning Government Technology
Transitioning Government TechnologySqrrl
 
Carbon Black: Keys to Shutting Down Attacks
Carbon Black: Keys to Shutting Down AttacksCarbon Black: Keys to Shutting Down Attacks
Carbon Black: Keys to Shutting Down AttacksMighty Guides, Inc.
 
Using Machine Learning and Analytics to Hunt for Security Threats - Webinar
Using Machine Learning and Analytics to Hunt for Security Threats - WebinarUsing Machine Learning and Analytics to Hunt for Security Threats - Webinar
Using Machine Learning and Analytics to Hunt for Security Threats - WebinarSplunk
 
Netwatcher Credit Union Tech Talk
Netwatcher Credit Union Tech TalkNetwatcher Credit Union Tech Talk
Netwatcher Credit Union Tech TalkNetWatcher
 
DATA LOSS PREVENTION OVERVIEW
DATA LOSS PREVENTION OVERVIEWDATA LOSS PREVENTION OVERVIEW
DATA LOSS PREVENTION OVERVIEWSylvain Martinez
 
The 2018 Threat Landscape
The 2018 Threat LandscapeThe 2018 Threat Landscape
The 2018 Threat LandscapeColloqueRISQ
 
A holistic view_of_enterprise_security
A holistic view_of_enterprise_securityA holistic view_of_enterprise_security
A holistic view_of_enterprise_securityehawk01
 
The Art and Science of Alert Triage
The Art and Science of Alert TriageThe Art and Science of Alert Triage
The Art and Science of Alert TriageSqrrl
 
FusionX & Accenture: One Global Security Team
FusionX & Accenture: One Global Security TeamFusionX & Accenture: One Global Security Team
FusionX & Accenture: One Global Security Teamaccenture
 
Webinar–Financial Services Study Shows Why Investing in AppSec Matters
Webinar–Financial Services Study Shows Why Investing in AppSec MattersWebinar–Financial Services Study Shows Why Investing in AppSec Matters
Webinar–Financial Services Study Shows Why Investing in AppSec MattersSynopsys Software Integrity Group
 
Introduction to scenario based risk analysis part 2
Introduction to scenario based risk analysis  part 2Introduction to scenario based risk analysis  part 2
Introduction to scenario based risk analysis part 2"Apolonio \"Apps\"" Garcia
 
Introduction to scenario based risk analysis part 3
Introduction to scenario based risk analysis  part 3Introduction to scenario based risk analysis  part 3
Introduction to scenario based risk analysis part 3"Apolonio \"Apps\"" Garcia
 
Automate and Enhance Application Security Analysis
Automate and Enhance Application Security AnalysisAutomate and Enhance Application Security Analysis
Automate and Enhance Application Security AnalysisCarlos Andrés García
 
Threat Hunting vs. UEBA: Similarities, Differences, and How They Work Together
Threat Hunting vs. UEBA: Similarities, Differences, and How They Work Together Threat Hunting vs. UEBA: Similarities, Differences, and How They Work Together
Threat Hunting vs. UEBA: Similarities, Differences, and How They Work Together Sqrrl
 
Are you ready for the next attack? Reviewing the SP Security Checklist
Are you ready for the next attack? Reviewing the SP Security ChecklistAre you ready for the next attack? Reviewing the SP Security Checklist
Are you ready for the next attack? Reviewing the SP Security ChecklistAPNIC
 

Was ist angesagt? (20)

State of Endpoint Security: The Buyers Mindset
State of Endpoint Security: The Buyers MindsetState of Endpoint Security: The Buyers Mindset
State of Endpoint Security: The Buyers Mindset
 
Transitioning Government Technology
Transitioning Government TechnologyTransitioning Government Technology
Transitioning Government Technology
 
Carbon Black: Keys to Shutting Down Attacks
Carbon Black: Keys to Shutting Down AttacksCarbon Black: Keys to Shutting Down Attacks
Carbon Black: Keys to Shutting Down Attacks
 
Using Machine Learning and Analytics to Hunt for Security Threats - Webinar
Using Machine Learning and Analytics to Hunt for Security Threats - WebinarUsing Machine Learning and Analytics to Hunt for Security Threats - Webinar
Using Machine Learning and Analytics to Hunt for Security Threats - Webinar
 
Netwatcher Credit Union Tech Talk
Netwatcher Credit Union Tech TalkNetwatcher Credit Union Tech Talk
Netwatcher Credit Union Tech Talk
 
Making Network Security Relevant
Making Network Security RelevantMaking Network Security Relevant
Making Network Security Relevant
 
DATA LOSS PREVENTION OVERVIEW
DATA LOSS PREVENTION OVERVIEWDATA LOSS PREVENTION OVERVIEW
DATA LOSS PREVENTION OVERVIEW
 
The 2018 Threat Landscape
The 2018 Threat LandscapeThe 2018 Threat Landscape
The 2018 Threat Landscape
 
A holistic view_of_enterprise_security
A holistic view_of_enterprise_securityA holistic view_of_enterprise_security
A holistic view_of_enterprise_security
 
Forrester Emerging MSSP Wave
Forrester Emerging MSSP WaveForrester Emerging MSSP Wave
Forrester Emerging MSSP Wave
 
The Art and Science of Alert Triage
The Art and Science of Alert TriageThe Art and Science of Alert Triage
The Art and Science of Alert Triage
 
FusionX & Accenture: One Global Security Team
FusionX & Accenture: One Global Security TeamFusionX & Accenture: One Global Security Team
FusionX & Accenture: One Global Security Team
 
Webinar–Financial Services Study Shows Why Investing in AppSec Matters
Webinar–Financial Services Study Shows Why Investing in AppSec MattersWebinar–Financial Services Study Shows Why Investing in AppSec Matters
Webinar–Financial Services Study Shows Why Investing in AppSec Matters
 
Introduction to scenario based risk analysis part 2
Introduction to scenario based risk analysis  part 2Introduction to scenario based risk analysis  part 2
Introduction to scenario based risk analysis part 2
 
Introduction to scenario based risk analysis part 3
Introduction to scenario based risk analysis  part 3Introduction to scenario based risk analysis  part 3
Introduction to scenario based risk analysis part 3
 
Automate and Enhance Application Security Analysis
Automate and Enhance Application Security AnalysisAutomate and Enhance Application Security Analysis
Automate and Enhance Application Security Analysis
 
Introduction to Scenario Based Risk Analysis
Introduction to Scenario Based Risk AnalysisIntroduction to Scenario Based Risk Analysis
Introduction to Scenario Based Risk Analysis
 
Threat Hunting vs. UEBA: Similarities, Differences, and How They Work Together
Threat Hunting vs. UEBA: Similarities, Differences, and How They Work Together Threat Hunting vs. UEBA: Similarities, Differences, and How They Work Together
Threat Hunting vs. UEBA: Similarities, Differences, and How They Work Together
 
Data Science for Cyber Risk
Data Science for Cyber RiskData Science for Cyber Risk
Data Science for Cyber Risk
 
Are you ready for the next attack? Reviewing the SP Security Checklist
Are you ready for the next attack? Reviewing the SP Security ChecklistAre you ready for the next attack? Reviewing the SP Security Checklist
Are you ready for the next attack? Reviewing the SP Security Checklist
 

Ähnlich wie HP Software Performance Tour 2014 - Guarding against the Data Breach

3 tips to funding your security program
3 tips to funding your security program3 tips to funding your security program
3 tips to funding your security programCloudBees
 
Criminal Education: Lessons from the Criminals and Their Methods
Criminal Education: Lessons from the Criminals and Their MethodsCriminal Education: Lessons from the Criminals and Their Methods
Criminal Education: Lessons from the Criminals and Their MethodsHP Enterprise Italia
 
Stop looking for the silver bullet start thinking like a bad guy - IDC IT Sec...
Stop looking for the silver bullet start thinking like a bad guy - IDC IT Sec...Stop looking for the silver bullet start thinking like a bad guy - IDC IT Sec...
Stop looking for the silver bullet start thinking like a bad guy - IDC IT Sec...Jimmy Blake
 
Are your Cloud Services Secure and Compliant today?
Are your Cloud Services Secure and Compliant today?Are your Cloud Services Secure and Compliant today?
Are your Cloud Services Secure and Compliant today?Sridhar Karnam
 
Digital government presentation final
Digital government presentation finalDigital government presentation final
Digital government presentation finalShirlie23
 
Retail security-services--client-presentation
Retail security-services--client-presentationRetail security-services--client-presentation
Retail security-services--client-presentationJoseph Schorr
 
Protecting What Matters...An Enterprise Approach to Cloud Security
Protecting What Matters...An Enterprise Approach to Cloud SecurityProtecting What Matters...An Enterprise Approach to Cloud Security
Protecting What Matters...An Enterprise Approach to Cloud SecurityInnoTech
 
The 6th Element in the Mobile Application Lifecycle
The 6th Element in the Mobile Application LifecycleThe 6th Element in the Mobile Application Lifecycle
The 6th Element in the Mobile Application LifecyclePronq by HP
 
Top 10 tips for effective SOC/NOC collaboration or integration
Top 10 tips for effective SOC/NOC collaboration or integrationTop 10 tips for effective SOC/NOC collaboration or integration
Top 10 tips for effective SOC/NOC collaboration or integrationSridhar Karnam
 
Primendi Visiooniseminar 2014 - Kuidas lahendada võrgu turvalisus mobiilses k...
Primendi Visiooniseminar 2014 - Kuidas lahendada võrgu turvalisus mobiilses k...Primendi Visiooniseminar 2014 - Kuidas lahendada võrgu turvalisus mobiilses k...
Primendi Visiooniseminar 2014 - Kuidas lahendada võrgu turvalisus mobiilses k...Primend
 
Dynamic Cyber Defense
Dynamic Cyber DefenseDynamic Cyber Defense
Dynamic Cyber DefenseEnergySec
 
Stay out of headlines for non compliance or data breach
Stay out of headlines for non compliance or data breachStay out of headlines for non compliance or data breach
Stay out of headlines for non compliance or data breachSridhar Karnam
 
The new dominant companies are running on data
The new dominant companies are running on data The new dominant companies are running on data
The new dominant companies are running on data SnapLogic
 
Mobility Why? What does it means to us?
Mobility Why? What does it means to us?Mobility Why? What does it means to us?
Mobility Why? What does it means to us?Pronq by HP
 
Big Data LDN 2017: The New Dominant Companies Are Running on Data
Big Data LDN 2017: The New Dominant Companies Are Running on DataBig Data LDN 2017: The New Dominant Companies Are Running on Data
Big Data LDN 2017: The New Dominant Companies Are Running on DataMatt Stubbs
 
Big Data LDN 2017: The New Dominant Companies Are Running on Data
Big Data LDN 2017: The New Dominant Companies Are Running on DataBig Data LDN 2017: The New Dominant Companies Are Running on Data
Big Data LDN 2017: The New Dominant Companies Are Running on DataMatt Stubbs
 
Incorporating cloud computing for enhanced communication v2
Incorporating cloud computing for enhanced communication v2Incorporating cloud computing for enhanced communication v2
Incorporating cloud computing for enhanced communication v2Christian Verstraete
 
SDN Realized Application Directed Networking
SDN Realized Application Directed NetworkingSDN Realized Application Directed Networking
SDN Realized Application Directed NetworkingOpen Networking Summits
 
HP Helion - Copaco Cloud Event 2015 (break-out 4)
HP Helion - Copaco Cloud Event 2015 (break-out 4)HP Helion - Copaco Cloud Event 2015 (break-out 4)
HP Helion - Copaco Cloud Event 2015 (break-out 4)Copaco Nederland
 
Protect Your Customers Data from Cyberattacks
Protect Your Customers Data from CyberattacksProtect Your Customers Data from Cyberattacks
Protect Your Customers Data from CyberattacksSAP Customer Experience
 

Ähnlich wie HP Software Performance Tour 2014 - Guarding against the Data Breach (20)

3 tips to funding your security program
3 tips to funding your security program3 tips to funding your security program
3 tips to funding your security program
 
Criminal Education: Lessons from the Criminals and Their Methods
Criminal Education: Lessons from the Criminals and Their MethodsCriminal Education: Lessons from the Criminals and Their Methods
Criminal Education: Lessons from the Criminals and Their Methods
 
Stop looking for the silver bullet start thinking like a bad guy - IDC IT Sec...
Stop looking for the silver bullet start thinking like a bad guy - IDC IT Sec...Stop looking for the silver bullet start thinking like a bad guy - IDC IT Sec...
Stop looking for the silver bullet start thinking like a bad guy - IDC IT Sec...
 
Are your Cloud Services Secure and Compliant today?
Are your Cloud Services Secure and Compliant today?Are your Cloud Services Secure and Compliant today?
Are your Cloud Services Secure and Compliant today?
 
Digital government presentation final
Digital government presentation finalDigital government presentation final
Digital government presentation final
 
Retail security-services--client-presentation
Retail security-services--client-presentationRetail security-services--client-presentation
Retail security-services--client-presentation
 
Protecting What Matters...An Enterprise Approach to Cloud Security
Protecting What Matters...An Enterprise Approach to Cloud SecurityProtecting What Matters...An Enterprise Approach to Cloud Security
Protecting What Matters...An Enterprise Approach to Cloud Security
 
The 6th Element in the Mobile Application Lifecycle
The 6th Element in the Mobile Application LifecycleThe 6th Element in the Mobile Application Lifecycle
The 6th Element in the Mobile Application Lifecycle
 
Top 10 tips for effective SOC/NOC collaboration or integration
Top 10 tips for effective SOC/NOC collaboration or integrationTop 10 tips for effective SOC/NOC collaboration or integration
Top 10 tips for effective SOC/NOC collaboration or integration
 
Primendi Visiooniseminar 2014 - Kuidas lahendada võrgu turvalisus mobiilses k...
Primendi Visiooniseminar 2014 - Kuidas lahendada võrgu turvalisus mobiilses k...Primendi Visiooniseminar 2014 - Kuidas lahendada võrgu turvalisus mobiilses k...
Primendi Visiooniseminar 2014 - Kuidas lahendada võrgu turvalisus mobiilses k...
 
Dynamic Cyber Defense
Dynamic Cyber DefenseDynamic Cyber Defense
Dynamic Cyber Defense
 
Stay out of headlines for non compliance or data breach
Stay out of headlines for non compliance or data breachStay out of headlines for non compliance or data breach
Stay out of headlines for non compliance or data breach
 
The new dominant companies are running on data
The new dominant companies are running on data The new dominant companies are running on data
The new dominant companies are running on data
 
Mobility Why? What does it means to us?
Mobility Why? What does it means to us?Mobility Why? What does it means to us?
Mobility Why? What does it means to us?
 
Big Data LDN 2017: The New Dominant Companies Are Running on Data
Big Data LDN 2017: The New Dominant Companies Are Running on DataBig Data LDN 2017: The New Dominant Companies Are Running on Data
Big Data LDN 2017: The New Dominant Companies Are Running on Data
 
Big Data LDN 2017: The New Dominant Companies Are Running on Data
Big Data LDN 2017: The New Dominant Companies Are Running on DataBig Data LDN 2017: The New Dominant Companies Are Running on Data
Big Data LDN 2017: The New Dominant Companies Are Running on Data
 
Incorporating cloud computing for enhanced communication v2
Incorporating cloud computing for enhanced communication v2Incorporating cloud computing for enhanced communication v2
Incorporating cloud computing for enhanced communication v2
 
SDN Realized Application Directed Networking
SDN Realized Application Directed NetworkingSDN Realized Application Directed Networking
SDN Realized Application Directed Networking
 
HP Helion - Copaco Cloud Event 2015 (break-out 4)
HP Helion - Copaco Cloud Event 2015 (break-out 4)HP Helion - Copaco Cloud Event 2015 (break-out 4)
HP Helion - Copaco Cloud Event 2015 (break-out 4)
 
Protect Your Customers Data from Cyberattacks
Protect Your Customers Data from CyberattacksProtect Your Customers Data from Cyberattacks
Protect Your Customers Data from Cyberattacks
 

Mehr von HP Enterprise Italia

Come fare business con i big data in concreto
Come fare business con i big data in concretoCome fare business con i big data in concreto
Come fare business con i big data in concretoHP Enterprise Italia
 
A walkthrough of HP Helion OpenStack
A walkthrough of HP Helion OpenStackA walkthrough of HP Helion OpenStack
A walkthrough of HP Helion OpenStackHP Enterprise Italia
 
Smart Building Management Solutions: MCUBO Energy
Smart Building Management Solutions: MCUBO EnergySmart Building Management Solutions: MCUBO Energy
Smart Building Management Solutions: MCUBO EnergyHP Enterprise Italia
 
DC4Cities Environmentally Sustainable Datacenters for Smart Cities
DC4Cities Environmentally Sustainable Datacenters for Smart CitiesDC4Cities Environmentally Sustainable Datacenters for Smart Cities
DC4Cities Environmentally Sustainable Datacenters for Smart CitiesHP Enterprise Italia
 
Soluzione Smart Building Management MCUBO Energy
Soluzione Smart Building Management MCUBO EnergySoluzione Smart Building Management MCUBO Energy
Soluzione Smart Building Management MCUBO EnergyHP Enterprise Italia
 
HP Gen9: Leading in the coumpute era
HP Gen9: Leading in the coumpute eraHP Gen9: Leading in the coumpute era
HP Gen9: Leading in the coumpute eraHP Enterprise Italia
 
La governance dei dati raggiunge la piena maturità
La governance dei dati raggiunge la piena maturitàLa governance dei dati raggiunge la piena maturità
La governance dei dati raggiunge la piena maturitàHP Enterprise Italia
 
Notebook HP EliteBook Folio 1040 G1
Notebook HP EliteBook Folio 1040 G1Notebook HP EliteBook Folio 1040 G1
Notebook HP EliteBook Folio 1040 G1HP Enterprise Italia
 
HP Project and Portfolio Management
HP Project and Portfolio ManagementHP Project and Portfolio Management
HP Project and Portfolio ManagementHP Enterprise Italia
 
Hp application portfolio management software
Hp application portfolio management softwareHp application portfolio management software
Hp application portfolio management softwareHP Enterprise Italia
 
Hp application performance center software
Hp application performance center softwareHp application performance center software
Hp application performance center softwareHP Enterprise Italia
 
HP Business & Application Integration
HP Business & Application IntegrationHP Business & Application Integration
HP Business & Application IntegrationHP Enterprise Italia
 
MailUp e HP StoreVirtual VSA: storage virtuale, scalabilità reale
MailUp e HP StoreVirtual VSA: storage virtuale, scalabilità realeMailUp e HP StoreVirtual VSA: storage virtuale, scalabilità reale
MailUp e HP StoreVirtual VSA: storage virtuale, scalabilità realeHP Enterprise Italia
 
HP Software Performance Tour 2014 - Vincere i Big Data con HP HAVEn
HP Software Performance Tour 2014 - Vincere i Big Data con HP HAVEnHP Software Performance Tour 2014 - Vincere i Big Data con HP HAVEn
HP Software Performance Tour 2014 - Vincere i Big Data con HP HAVEnHP Enterprise Italia
 

Mehr von HP Enterprise Italia (20)

Come fare business con i big data in concreto
Come fare business con i big data in concretoCome fare business con i big data in concreto
Come fare business con i big data in concreto
 
A walkthrough of HP Helion OpenStack
A walkthrough of HP Helion OpenStackA walkthrough of HP Helion OpenStack
A walkthrough of HP Helion OpenStack
 
Smart Building Management Solutions: MCUBO Energy
Smart Building Management Solutions: MCUBO EnergySmart Building Management Solutions: MCUBO Energy
Smart Building Management Solutions: MCUBO Energy
 
HP Biometric Handwritten Solution
HP Biometric Handwritten SolutionHP Biometric Handwritten Solution
HP Biometric Handwritten Solution
 
DC4Cities Environmentally Sustainable Datacenters for Smart Cities
DC4Cities Environmentally Sustainable Datacenters for Smart CitiesDC4Cities Environmentally Sustainable Datacenters for Smart Cities
DC4Cities Environmentally Sustainable Datacenters for Smart Cities
 
Soluzione Smart Building Management MCUBO Energy
Soluzione Smart Building Management MCUBO EnergySoluzione Smart Building Management MCUBO Energy
Soluzione Smart Building Management MCUBO Energy
 
HP Gen9: Leading in the coumpute era
HP Gen9: Leading in the coumpute eraHP Gen9: Leading in the coumpute era
HP Gen9: Leading in the coumpute era
 
La governance dei dati raggiunge la piena maturità
La governance dei dati raggiunge la piena maturitàLa governance dei dati raggiunge la piena maturità
La governance dei dati raggiunge la piena maturità
 
HP Pro x2 612 G1
HP Pro x2 612 G1HP Pro x2 612 G1
HP Pro x2 612 G1
 
Tablet HP ElitePad 1000 G2
Tablet HP ElitePad 1000 G2Tablet HP ElitePad 1000 G2
Tablet HP ElitePad 1000 G2
 
Notebook HP EliteBook Folio 1040 G1
Notebook HP EliteBook Folio 1040 G1Notebook HP EliteBook Folio 1040 G1
Notebook HP EliteBook Folio 1040 G1
 
HP Project and Portfolio Management
HP Project and Portfolio ManagementHP Project and Portfolio Management
HP Project and Portfolio Management
 
Hp application portfolio management software
Hp application portfolio management softwareHp application portfolio management software
Hp application portfolio management software
 
Hp application performance center software
Hp application performance center softwareHp application performance center software
Hp application performance center software
 
HP Business & Application Integration
HP Business & Application IntegrationHP Business & Application Integration
HP Business & Application Integration
 
Gen9 - Panoramica sul prodotto
Gen9 - Panoramica sul prodottoGen9 - Panoramica sul prodotto
Gen9 - Panoramica sul prodotto
 
Gen9 - Domande frequenti
Gen9 - Domande frequentiGen9 - Domande frequenti
Gen9 - Domande frequenti
 
CIO Survey 2014
CIO Survey 2014CIO Survey 2014
CIO Survey 2014
 
MailUp e HP StoreVirtual VSA: storage virtuale, scalabilità reale
MailUp e HP StoreVirtual VSA: storage virtuale, scalabilità realeMailUp e HP StoreVirtual VSA: storage virtuale, scalabilità reale
MailUp e HP StoreVirtual VSA: storage virtuale, scalabilità reale
 
HP Software Performance Tour 2014 - Vincere i Big Data con HP HAVEn
HP Software Performance Tour 2014 - Vincere i Big Data con HP HAVEnHP Software Performance Tour 2014 - Vincere i Big Data con HP HAVEn
HP Software Performance Tour 2014 - Vincere i Big Data con HP HAVEn
 

Kürzlich hochgeladen

SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 

Kürzlich hochgeladen (20)

SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 

HP Software Performance Tour 2014 - Guarding against the Data Breach

  • 1. © Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Guarding against the Breach The 2014 Vulnerability Landscape Pierpaolo Ali’ South Europe Sales Director HP Enterprise Security Products June 17, 2014
  • 2. © Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.2 Discover y The attack lifecycle Researc h Our enterprise Their ecosystem Infiltration Capture Exfiltration
  • 3. © Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.3 Discover y How we can disrupt the market Researc h Our enterprise Their ecosystem Infiltration Capture Exfiltration Planning damage mitigation Educating users Counter intel
  • 4. © Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.4 Agenda 2013 Cyber Risk Report key findings Understanding Exactly how the Attacker Ecosystem Works HP Security Research Building Security in Maturity Model
  • 5. © Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 2013 Cyber Risk Report
  • 6. © Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.6 Key Findings Research gains attention, but vulnerability disclosures stabilize and decrease in severity 80% of applications contain vulnerabilities exposed by incorrect configuration Differing definitions of “malware” make measuring mobile malware risk extremely difficult
  • 7. © Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.7 Key Findings The attack surface allows for multiple avenues for compromise 46% of mobile iOS and Android applications use encryption improperly Internet Explorer was the software most targeted by Zero Day Initiative (ZDI) researchers
  • 8. © Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.8 Key Findings SCADA systems are increasingly targeted Sandbox bypass vulnerabilities are the #1 issue for Java
  • 9. © Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.9 Conclusions Mitigate Risk Respond Appropriately Reduce Attack Surface
  • 10. © Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.10 Going beyond the basics of best practices Remember that people are part of your organization’s perimeter too Don’t rely solely on traditional defensive perimeter security Expect to be compromised
  • 11. © Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.11 Going beyond the basics of best practices Make security and response a continuous process Understand that not all information and network assets are equal Seek out credible and reliable security intelligence
  • 12. © Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Understanding exactly how the Attacker Ecosystem Works
  • 13. © Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.13 A recent event
  • 14. © Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.14 Repeat attacks Company A NEW EVENT Zero Day Company B Company CMalicious IP Address Malwar e Variant NEW EVENT NEW EVENT
  • 15. © Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.15 Recruiting
  • 16. © Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.16 Job offers
  • 17. © Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.17 Escrow services
  • 18. © Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.18 Training
  • 19. © Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Security Research
  • 20. © Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.20 HP Enterprise Security Products
  • 21. © Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.21 HP Security Research SANS, CERT, NIST, ReversingLabs, software, and reputation vendors • ~3000 researchers • 2000+ customers sharing data • 7000+ managed networks globally Ecosystem partner ESS HP Security Research Innovative research Thought leadership • Automatically integrated into HP products • HP finds more vulnerabilities than the rest of the market combined • Top security vulnerability research organization for the past three years —Frost & Sullivan Actionable security intelligence
  • 22. © Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.22 The Value HP TippingPoint DVLabs Provides Vulnerability Research  Crowd-sourced 0-day and vulnerability research through the Zero Day Initiative (ZDI)  Original vulnerability research on widely-used software  Targeted research on emerging threat technologies and trends Malware Research  Reputation feed of malicious hosts and IP addresses  In-depth threat research Weekly updates for to stay ahead of the threats
  • 23. © Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.24 Heartbleed…
  • 24. © Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.25 Consistent delivery of quarterly content updates (03-29-2013, 06-28-2013, …) Building Security In: HP SSR Original Research  Malware analysis, access control validation, … Secure Coding Rulepacks (SCA)  563 unique categories of vulnerabilities across 21 languages and over 720,000 individual APIs Runtime Rulepack Kits  HP Fortify SecurityScope  HP Fortify Runtime Application Logging  HP Fortify Runtime Application Protection (RTAP) WebInspect SecureBase (WebInspect)  Next-generation security testing capabilities HP 0 100 200 300 400 500 600 05 Q1 05 Q3 06 Q1 06 Q3 07 Q1 07 Q3 08 Q1 08 Q3 09 Q1 09 Q3 10 Q1 10 Q3 11 Q1 11 Q3 12 Q1 12 Q3 13 Q1
  • 25. © Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Building Security in Maturity Model (BSIMM)
  • 26. © Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.27 Building BSIMM (2009)  Big idea: Build a maturity model from actual data gathered from 9 well known large-scale software security initiatives  Created a software security framework  Interviewed nine firms in-person  Discovered 110 activities through observation  Organized the activities in 3 levels  Built a scorecard  The model has been validated with data from 67 firms  There are no special snowflakes
  • 27. © Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.28 Prescriptive versus Descriptive Models  Prescriptive models describe what you should do (circa 2006)  SAFECode  SAMM  MS SDL  Touchpoints  Every firm has a methodology they follow (often a hybrid)  You need an SSDL!  Descriptive models describe what is actually happening  BSIMM is a descriptive model used to measure multiple prescriptive SSDLs
  • 28. © Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.29 Plus 22 firms that remain anonymous 67 Firms in the BSIMM-V Community
  • 29. © Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.30 Compare yourself with… •Your peers •Other business units Track your performance over time…
  • 30. © Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.31 BSIMM by the Numbers
  • 31. © Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.32 Conclusion Don’t rely solely on traditional defensive perimeter security. Know thy enemy. Expect to be compromised. Security Research can provide proactive insight into global, vertical-specific, and geographic threats. BSIMM: Measure how well you’re doing
  • 32. © Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Questions?
  • 33. © Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.34 Join Our Conversation We are on your side. Visit our blogs. HP Security Research: hp.com/go/HPSRblog HP Security Products: hp.com/go/SecurityProductsBlog HP Threat Briefings: hp.com/go/ThreatBriefings BSIMM Information: bsimm.com bsimm@hp.com
  • 34. © Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Thank You

Hinweis der Redaktion

  1. Origin: 2009, explain the idea. What are people really doing? Talked to Microsoft, Google, Adobe, DTCC, Intel, Goldman, JMPC, … Gather data Discuss data Create framework  110 distinct activities. Example: Use a static analysis tool, know your top x vulns, do security training, … In 3 levels: Easy, medium, hard (Rocket science) For each of the 9 firms build a scorecard Now: 67 firms No special snow flakes
  2. Most important difference: Perscriptive vs descriptive. Not competing. You need both!
  3. 22 anonymous. No need to have your logo here. Look for more participants. Especially in Europe.