SlideShare ist ein Scribd-Unternehmen logo
1 von 13
Downloaden Sie, um offline zu lesen
Preventing is
Protecting
Secure Computing 2015
Preventing is Protecting - Secure Computing 2015 ©
Agenda
• IT landscape
• Areas
• Threats
• Solutions
• End Point Security
• Patch- & Lifecycle management
• End Point Protection
Preventing is Protecting - Secure Computing 2015 ©
IT Landscape - Areas
• Cloud
• WAN
• LAN
• Server
• Client
• Application
• Data
Preventing is Protecting - Secure Computing 2015 ©
IT Landscape - Threats
• 0-day exploits
• Advanced Persistant Threats
• “Generic” malware
Preventing is Protecting - Secure Computing 2015 ©
IT Landscape – Solutions
• Prevent, Detect and Contain
• Network segregation
• Rights management
• Application whitelisting
• Boundary defense
• Monitoring and logging
• Anti-exploit & anti-virus
• Intrusion prevention
• Patch- & Lifecycle management
Preventing is Protecting - Secure Computing 2015 ©
IT Landscape – Solutions (2)
• Incident response and recovery
• Backup critical systems and data
• Incident response plan
• Lessons learned
Preventing is Protecting - Secure Computing 2015 ©
Patch- & Lifecyclemanagement
• Operating sytems
• Applications
• Tools
Preventing is Protecting - Secure Computing 2015 ©
End Point Protection
• Segregate networks
• Protect and restrict privileges
• Applicationcontrol
• Limit workstation-to-workstation
• Dynamic analysis
• Monitoring and logging
• Anti-exploitation & anti-virus
• Host Intrusion Prevention System
Preventing is Protecting - Secure Computing 2015 ©
Research scope
• Monitoring and logging
• Data security
Preventing is Protecting - Secure Computing 2015 ©
Reference
• Experience
• NCSC
• NSA
Preventing is Protecting - Secure Computing 2015 ©
Questions?
• When?
• How?
• Impact?
• Recovery?
• Costs?
Preventing is Protecting - Secure Computing 2015 ©
Preventing is Protecting - Secure Computing 2015 ©
info@IndiciaTech.nl
Preventing is Protecting - Secure Computing 2015 ©

Weitere ähnliche Inhalte

Was ist angesagt?

[Cisco Connect 2018 - Vietnam] Anh duc le building a secure data center
[Cisco Connect 2018 - Vietnam] Anh duc le   building a secure data center[Cisco Connect 2018 - Vietnam] Anh duc le   building a secure data center
[Cisco Connect 2018 - Vietnam] Anh duc le building a secure data centerNur Shiqim Chok
 
Infosec 2014: Capita Customer Management: Network Visibility to Manage Firewa...
Infosec 2014: Capita Customer Management: Network Visibility to Manage Firewa...Infosec 2014: Capita Customer Management: Network Visibility to Manage Firewa...
Infosec 2014: Capita Customer Management: Network Visibility to Manage Firewa...Skybox Security
 
AWS Enterprise Summit London 2013 - Stephen Schmidt - AWS
AWS Enterprise Summit London 2013 - Stephen Schmidt - AWSAWS Enterprise Summit London 2013 - Stephen Schmidt - AWS
AWS Enterprise Summit London 2013 - Stephen Schmidt - AWSAmazon Web Services
 
Looking for a ICT Security function within ICT and looking for an employer th...
Looking for a ICT Security function within ICT and looking for an employer th...Looking for a ICT Security function within ICT and looking for an employer th...
Looking for a ICT Security function within ICT and looking for an employer th...CoolTalent
 
Cloak your critical industrial control systems before they get hacked
Cloak your critical industrial control systems before they get hackedCloak your critical industrial control systems before they get hacked
Cloak your critical industrial control systems before they get hackedTempered
 
ISO 27001 Training | ISO 27001 Implementation
ISO 27001 Training | ISO 27001 ImplementationISO 27001 Training | ISO 27001 Implementation
ISO 27001 Training | ISO 27001 Implementationhimalya sharma
 
Itir oct0714-network security-en
Itir oct0714-network security-enItir oct0714-network security-en
Itir oct0714-network security-enKBIZEAU
 
Aare reintam estonia_ciip_activites
Aare reintam estonia_ciip_activitesAare reintam estonia_ciip_activites
Aare reintam estonia_ciip_activitesS.E. CTS CERT-GOV-MD
 
Itmgen 4317 security
Itmgen 4317 securityItmgen 4317 security
Itmgen 4317 securityCisco
 
Office 365 Security: How to Safeguard Your Data
Office 365 Security: How to Safeguard Your DataOffice 365 Security: How to Safeguard Your Data
Office 365 Security: How to Safeguard Your DataBitglass
 
Secure Your Web Applications and Achieve Compliance
Secure Your Web Applications and Achieve Compliance Secure Your Web Applications and Achieve Compliance
Secure Your Web Applications and Achieve Compliance Avi Networks
 

Was ist angesagt? (15)

Linkedin
LinkedinLinkedin
Linkedin
 
[Cisco Connect 2018 - Vietnam] Anh duc le building a secure data center
[Cisco Connect 2018 - Vietnam] Anh duc le   building a secure data center[Cisco Connect 2018 - Vietnam] Anh duc le   building a secure data center
[Cisco Connect 2018 - Vietnam] Anh duc le building a secure data center
 
CSA STAR Program
CSA STAR ProgramCSA STAR Program
CSA STAR Program
 
Infosec 2014: Capita Customer Management: Network Visibility to Manage Firewa...
Infosec 2014: Capita Customer Management: Network Visibility to Manage Firewa...Infosec 2014: Capita Customer Management: Network Visibility to Manage Firewa...
Infosec 2014: Capita Customer Management: Network Visibility to Manage Firewa...
 
AWS Enterprise Summit London 2013 - Stephen Schmidt - AWS
AWS Enterprise Summit London 2013 - Stephen Schmidt - AWSAWS Enterprise Summit London 2013 - Stephen Schmidt - AWS
AWS Enterprise Summit London 2013 - Stephen Schmidt - AWS
 
Looking for a ICT Security function within ICT and looking for an employer th...
Looking for a ICT Security function within ICT and looking for an employer th...Looking for a ICT Security function within ICT and looking for an employer th...
Looking for a ICT Security function within ICT and looking for an employer th...
 
Cloak your critical industrial control systems before they get hacked
Cloak your critical industrial control systems before they get hackedCloak your critical industrial control systems before they get hacked
Cloak your critical industrial control systems before they get hacked
 
ISO 27001 Training | ISO 27001 Implementation
ISO 27001 Training | ISO 27001 ImplementationISO 27001 Training | ISO 27001 Implementation
ISO 27001 Training | ISO 27001 Implementation
 
Itir oct0714-network security-en
Itir oct0714-network security-enItir oct0714-network security-en
Itir oct0714-network security-en
 
Aare reintam estonia_ciip_activites
Aare reintam estonia_ciip_activitesAare reintam estonia_ciip_activites
Aare reintam estonia_ciip_activites
 
Iso 29001 white paper lakshy rev02_17022015 low
Iso 29001 white paper lakshy rev02_17022015 lowIso 29001 white paper lakshy rev02_17022015 low
Iso 29001 white paper lakshy rev02_17022015 low
 
Itmgen 4317 security
Itmgen 4317 securityItmgen 4317 security
Itmgen 4317 security
 
Office 365 Security: How to Safeguard Your Data
Office 365 Security: How to Safeguard Your DataOffice 365 Security: How to Safeguard Your Data
Office 365 Security: How to Safeguard Your Data
 
SIEM & IAM
SIEM & IAMSIEM & IAM
SIEM & IAM
 
Secure Your Web Applications and Achieve Compliance
Secure Your Web Applications and Achieve Compliance Secure Your Web Applications and Achieve Compliance
Secure Your Web Applications and Achieve Compliance
 

Andere mochten auch

Dissertation_MSc Human Rights
Dissertation_MSc Human RightsDissertation_MSc Human Rights
Dissertation_MSc Human RightsSally Smith
 
Proyectotic huertasorgnicasescolares 121206194340 phpapp01
Proyectotic huertasorgnicasescolares 121206194340 phpapp01Proyectotic huertasorgnicasescolares 121206194340 phpapp01
Proyectotic huertasorgnicasescolares 121206194340 phpapp01Diana Margarita Arquez Benavides
 
specification_document
specification_documentspecification_document
specification_documentRachel Garn
 
Charlie chaplin & paolo nutini new presentation
Charlie chaplin & paolo nutini new presentationCharlie chaplin & paolo nutini new presentation
Charlie chaplin & paolo nutini new presentationChrisdinaONeill
 
Reliability Study of wireless corba using Petri net and end to end instanteno...
Reliability Study of wireless corba using Petri net and end to end instanteno...Reliability Study of wireless corba using Petri net and end to end instanteno...
Reliability Study of wireless corba using Petri net and end to end instanteno...Ahmed Koriem
 
Veridian Resort Noosa p2
Veridian Resort Noosa p2Veridian Resort Noosa p2
Veridian Resort Noosa p2Lucinda Dean
 
Believe in young
Believe in youngBelieve in young
Believe in youngDaviiiid00
 
Presentación: Arquitectura y escultura de Cinquecento
Presentación: Arquitectura y escultura de CinquecentoPresentación: Arquitectura y escultura de Cinquecento
Presentación: Arquitectura y escultura de Cinquecentofrancisco gonzalez
 
Drawn Draft of Newspaper Double Page Spread
Drawn Draft of Newspaper Double Page SpreadDrawn Draft of Newspaper Double Page Spread
Drawn Draft of Newspaper Double Page SpreadMollie Owen
 
Puertas abiertas 2016
Puertas abiertas 2016Puertas abiertas 2016
Puertas abiertas 2016ColegioCN
 
Jason Dietrich Resume Updated
Jason Dietrich Resume UpdatedJason Dietrich Resume Updated
Jason Dietrich Resume UpdatedJason Dietrich
 

Andere mochten auch (15)

Dissertation_MSc Human Rights
Dissertation_MSc Human RightsDissertation_MSc Human Rights
Dissertation_MSc Human Rights
 
Graficos EPI INFO
Graficos EPI INFOGraficos EPI INFO
Graficos EPI INFO
 
Proyectotic huertasorgnicasescolares 121206194340 phpapp01
Proyectotic huertasorgnicasescolares 121206194340 phpapp01Proyectotic huertasorgnicasescolares 121206194340 phpapp01
Proyectotic huertasorgnicasescolares 121206194340 phpapp01
 
specification_document
specification_documentspecification_document
specification_document
 
Charlie chaplin & paolo nutini new presentation
Charlie chaplin & paolo nutini new presentationCharlie chaplin & paolo nutini new presentation
Charlie chaplin & paolo nutini new presentation
 
Reliability Study of wireless corba using Petri net and end to end instanteno...
Reliability Study of wireless corba using Petri net and end to end instanteno...Reliability Study of wireless corba using Petri net and end to end instanteno...
Reliability Study of wireless corba using Petri net and end to end instanteno...
 
Veridian Resort Noosa p2
Veridian Resort Noosa p2Veridian Resort Noosa p2
Veridian Resort Noosa p2
 
Believe in young
Believe in youngBelieve in young
Believe in young
 
WOW -Prabhu
WOW -PrabhuWOW -Prabhu
WOW -Prabhu
 
Presentación: Arquitectura y escultura de Cinquecento
Presentación: Arquitectura y escultura de CinquecentoPresentación: Arquitectura y escultura de Cinquecento
Presentación: Arquitectura y escultura de Cinquecento
 
Drawn Draft of Newspaper Double Page Spread
Drawn Draft of Newspaper Double Page SpreadDrawn Draft of Newspaper Double Page Spread
Drawn Draft of Newspaper Double Page Spread
 
Productos animales
Productos animalesProductos animales
Productos animales
 
SKMBT_C22016022311470
SKMBT_C22016022311470SKMBT_C22016022311470
SKMBT_C22016022311470
 
Puertas abiertas 2016
Puertas abiertas 2016Puertas abiertas 2016
Puertas abiertas 2016
 
Jason Dietrich Resume Updated
Jason Dietrich Resume UpdatedJason Dietrich Resume Updated
Jason Dietrich Resume Updated
 

Ähnlich wie Presentation IndiciaTech.nl - Preventing is Protecting

Cyber Security in the market place: HP CTO Day
Cyber Security in the market place: HP CTO DayCyber Security in the market place: HP CTO Day
Cyber Security in the market place: HP CTO DaySymantec
 
Sam Herath - Six Critical Criteria for Cloud Workload Security
Sam Herath - Six Critical Criteria for Cloud Workload SecuritySam Herath - Six Critical Criteria for Cloud Workload Security
Sam Herath - Six Critical Criteria for Cloud Workload Securitycentralohioissa
 
Cloud computing risk assesment presentation
Cloud computing risk assesment presentationCloud computing risk assesment presentation
Cloud computing risk assesment presentationAhmad El Tawil
 
Cloud computing risk assesment
Cloud computing risk assesment Cloud computing risk assesment
Cloud computing risk assesment Ahmad El Tawil
 
Why Network and Endpoint Security Isn’t Enough
Why Network and Endpoint Security Isn’t EnoughWhy Network and Endpoint Security Isn’t Enough
Why Network and Endpoint Security Isn’t EnoughImperva
 
5 Steps to Reduce Your Window of Vulnerability
5 Steps to Reduce Your Window of Vulnerability5 Steps to Reduce Your Window of Vulnerability
5 Steps to Reduce Your Window of VulnerabilitySkybox Security
 
Cloud Visibility & Cloud Data Loss Prevention Approaches
 Cloud Visibility & Cloud Data Loss Prevention Approaches Cloud Visibility & Cloud Data Loss Prevention Approaches
Cloud Visibility & Cloud Data Loss Prevention ApproachesCipherCloud
 
Security Risk Management: ovvero come mitigare e gestire i rischi dei dati at...
Security Risk Management: ovvero come mitigare e gestire i rischi dei dati at...Security Risk Management: ovvero come mitigare e gestire i rischi dei dati at...
Security Risk Management: ovvero come mitigare e gestire i rischi dei dati at...festival ICT 2016
 
1 final secnet_pci
1 final secnet_pci1 final secnet_pci
1 final secnet_pcimosyas
 
Managing End User Expectations -- The A La Carte Strategy
Managing End User Expectations --  The A La Carte StrategyManaging End User Expectations --  The A La Carte Strategy
Managing End User Expectations -- The A La Carte StrategySolarwinds N-able
 
Technology Overview - Symantec Endpoint Protection (SEP)
Technology Overview - Symantec Endpoint Protection (SEP)Technology Overview - Symantec Endpoint Protection (SEP)
Technology Overview - Symantec Endpoint Protection (SEP)Iftikhar Ali Iqbal
 
Managed Cloud and the MSP Market
Managed Cloud and the MSP MarketManaged Cloud and the MSP Market
Managed Cloud and the MSP MarketSolarwinds N-able
 
Ivanti: Access the Power of Unified IT
Ivanti: Access the Power of Unified ITIvanti: Access the Power of Unified IT
Ivanti: Access the Power of Unified ITIvanti
 
Oracle OpenWorld | CON9707 Enterprise Mobile Security Architecture beyond the...
Oracle OpenWorld | CON9707 Enterprise Mobile Security Architecture beyond the...Oracle OpenWorld | CON9707 Enterprise Mobile Security Architecture beyond the...
Oracle OpenWorld | CON9707 Enterprise Mobile Security Architecture beyond the...Indus Khaitan
 
Starting your Career in Information Security
Starting your Career in Information SecurityStarting your Career in Information Security
Starting your Career in Information SecurityAhmed Sayed-
 
Webinar-MSP+ Cyber Insurance Fina.pptx
Webinar-MSP+  Cyber Insurance Fina.pptxWebinar-MSP+  Cyber Insurance Fina.pptx
Webinar-MSP+ Cyber Insurance Fina.pptxControlCase
 
A business driven approach to security policy management a technical perspec...
A business driven approach to security policy management  a technical perspec...A business driven approach to security policy management  a technical perspec...
A business driven approach to security policy management a technical perspec...AlgoSec
 

Ähnlich wie Presentation IndiciaTech.nl - Preventing is Protecting (20)

Cyber Security in the market place: HP CTO Day
Cyber Security in the market place: HP CTO DayCyber Security in the market place: HP CTO Day
Cyber Security in the market place: HP CTO Day
 
Sam Herath - Six Critical Criteria for Cloud Workload Security
Sam Herath - Six Critical Criteria for Cloud Workload SecuritySam Herath - Six Critical Criteria for Cloud Workload Security
Sam Herath - Six Critical Criteria for Cloud Workload Security
 
Cloud computing risk assesment presentation
Cloud computing risk assesment presentationCloud computing risk assesment presentation
Cloud computing risk assesment presentation
 
Cloud computing risk assesment
Cloud computing risk assesment Cloud computing risk assesment
Cloud computing risk assesment
 
Why Network and Endpoint Security Isn’t Enough
Why Network and Endpoint Security Isn’t EnoughWhy Network and Endpoint Security Isn’t Enough
Why Network and Endpoint Security Isn’t Enough
 
5 Steps to Reduce Your Window of Vulnerability
5 Steps to Reduce Your Window of Vulnerability5 Steps to Reduce Your Window of Vulnerability
5 Steps to Reduce Your Window of Vulnerability
 
Cloud Visibility & Cloud Data Loss Prevention Approaches
 Cloud Visibility & Cloud Data Loss Prevention Approaches Cloud Visibility & Cloud Data Loss Prevention Approaches
Cloud Visibility & Cloud Data Loss Prevention Approaches
 
Security Risk Management: ovvero come mitigare e gestire i rischi dei dati at...
Security Risk Management: ovvero come mitigare e gestire i rischi dei dati at...Security Risk Management: ovvero come mitigare e gestire i rischi dei dati at...
Security Risk Management: ovvero come mitigare e gestire i rischi dei dati at...
 
1 final secnet_pci
1 final secnet_pci1 final secnet_pci
1 final secnet_pci
 
Managing End User Expectations -- The A La Carte Strategy
Managing End User Expectations --  The A La Carte StrategyManaging End User Expectations --  The A La Carte Strategy
Managing End User Expectations -- The A La Carte Strategy
 
Technology Overview - Symantec Endpoint Protection (SEP)
Technology Overview - Symantec Endpoint Protection (SEP)Technology Overview - Symantec Endpoint Protection (SEP)
Technology Overview - Symantec Endpoint Protection (SEP)
 
Tech Talks Microservices
Tech Talks MicroservicesTech Talks Microservices
Tech Talks Microservices
 
Managed Cloud and the MSP Market
Managed Cloud and the MSP MarketManaged Cloud and the MSP Market
Managed Cloud and the MSP Market
 
Ivanti: Access the Power of Unified IT
Ivanti: Access the Power of Unified ITIvanti: Access the Power of Unified IT
Ivanti: Access the Power of Unified IT
 
MultiValue Security
MultiValue SecurityMultiValue Security
MultiValue Security
 
Cisco Advanced Services
Cisco Advanced ServicesCisco Advanced Services
Cisco Advanced Services
 
Oracle OpenWorld | CON9707 Enterprise Mobile Security Architecture beyond the...
Oracle OpenWorld | CON9707 Enterprise Mobile Security Architecture beyond the...Oracle OpenWorld | CON9707 Enterprise Mobile Security Architecture beyond the...
Oracle OpenWorld | CON9707 Enterprise Mobile Security Architecture beyond the...
 
Starting your Career in Information Security
Starting your Career in Information SecurityStarting your Career in Information Security
Starting your Career in Information Security
 
Webinar-MSP+ Cyber Insurance Fina.pptx
Webinar-MSP+  Cyber Insurance Fina.pptxWebinar-MSP+  Cyber Insurance Fina.pptx
Webinar-MSP+ Cyber Insurance Fina.pptx
 
A business driven approach to security policy management a technical perspec...
A business driven approach to security policy management  a technical perspec...A business driven approach to security policy management  a technical perspec...
A business driven approach to security policy management a technical perspec...
 

Presentation IndiciaTech.nl - Preventing is Protecting

  • 1. Preventing is Protecting Secure Computing 2015 Preventing is Protecting - Secure Computing 2015 ©
  • 2. Agenda • IT landscape • Areas • Threats • Solutions • End Point Security • Patch- & Lifecycle management • End Point Protection Preventing is Protecting - Secure Computing 2015 ©
  • 3. IT Landscape - Areas • Cloud • WAN • LAN • Server • Client • Application • Data Preventing is Protecting - Secure Computing 2015 ©
  • 4. IT Landscape - Threats • 0-day exploits • Advanced Persistant Threats • “Generic” malware Preventing is Protecting - Secure Computing 2015 ©
  • 5. IT Landscape – Solutions • Prevent, Detect and Contain • Network segregation • Rights management • Application whitelisting • Boundary defense • Monitoring and logging • Anti-exploit & anti-virus • Intrusion prevention • Patch- & Lifecycle management Preventing is Protecting - Secure Computing 2015 ©
  • 6. IT Landscape – Solutions (2) • Incident response and recovery • Backup critical systems and data • Incident response plan • Lessons learned Preventing is Protecting - Secure Computing 2015 ©
  • 7. Patch- & Lifecyclemanagement • Operating sytems • Applications • Tools Preventing is Protecting - Secure Computing 2015 ©
  • 8. End Point Protection • Segregate networks • Protect and restrict privileges • Applicationcontrol • Limit workstation-to-workstation • Dynamic analysis • Monitoring and logging • Anti-exploitation & anti-virus • Host Intrusion Prevention System Preventing is Protecting - Secure Computing 2015 ©
  • 9. Research scope • Monitoring and logging • Data security Preventing is Protecting - Secure Computing 2015 ©
  • 10. Reference • Experience • NCSC • NSA Preventing is Protecting - Secure Computing 2015 ©
  • 11. Questions? • When? • How? • Impact? • Recovery? • Costs? Preventing is Protecting - Secure Computing 2015 ©
  • 12. Preventing is Protecting - Secure Computing 2015 ©
  • 13. info@IndiciaTech.nl Preventing is Protecting - Secure Computing 2015 ©