SlideShare ist ein Scribd-Unternehmen logo
1 von 32
Risk Management and Remediation

  Kurt Van Etten                  Stephen Brown
  Symantec                        Arellia
  Director, Product Management    President

                                  Dan McManus
                                  Arellia
                                  Director of Sales

Risk Management and Remediation                       1
Agenda

          1       Need to Move to Risk Management

          2       Deeper Dive on Risk Manager


         3        Remediation




Risk Management and Remediation                     2
Rapid Maturation of Information Security
                                                                    Risk Scoring
                                                                         &
                                       Cyberscope                   Management
                                        Reporting


  Continuous
  Monitoring
                                                                    • Focus on top
                                                                      priorities
                                            • Reporting to higher   • Drive action to
                                            • Peer Comparison         reduce risk
                • Collection of Data
                     • Vulnerability
                     • Configuration
                     • Procedural



Risk Management and Remediation                                                         3
Symantec Approach to IT Risk Management

      How do IT risks             How do you convey       How do you
       affect your                  IT risks to your   drive measurable
        mission?                         peers?         risk reduction?




                                  CCS RISK MANAGER

            TRANSLATE                 INFLUENCE             ACT




Risk Management and Remediation                                           4
Introducing CCS Risk Manager

                                  CCS RISK MANAGER

            TRANSLATE                  INFLUENCE                    ACT


     » Define virtual              » Convey IT risk in      » Prioritize based on
       business assets               business terms           business impact

     » Connect related             » Customized views       » Align Security and
       IT assets                     for greater impact       IT Operations

     » Create business             » Justify new security   » Track risk reduction
       view of IT risk               investments              over time



Risk Management and Remediation                                                      5
Current View of IT Risk – Technology Centric




Risk Management and Remediation                6
Translating IT Risk


 Transaction
 Processing
   System




   Case
Management



Risk Management and Remediation   7
Translating IT Risk


 Transaction
 Processing
   System




   Case
Management



Risk Management and Remediation   8
Using Risk to Drive Accountability and Action


 Transaction
 Processing
   System



  Plan                                         Current   Projected   Target
 Name          Risk Objective       Status      Score      Score      Date     Owner
 Plan A
      B     Secure Configuration   Completed
                                   Submitted    3.65
                                                2.75       2.75      3/15/12    Bob
 Plan B
      C     Patch Level Standard   Completed
                                   Submitted    4.22
                                                1.81       1.81      4/11/12    Joe
 Plan A     Info Sec Standard      Completed    2.23       2.23      1/10/12    Joe
 Plan D
      C     Protect Web Servers    Completed
                                   Submitted    3.51
                                                2.10       2.10      2/28/12    Dave


Risk Management and Remediation                                                        9
CCS Risk Manager Highlights


             Define a business asset you want to manage


             Visualize and understand IT risk for this business asset


             Prioritize remediation based on IT risk, not technical severity


             Monitor risk reduction over time


Risk Management and Remediation                                                 10
Visualize and Understand IT Risk
   Enterprise Wide View of Business Risk


Risk Overview for People’s Bank




   Risk & Compliance Sales Specialist Training - CCS Risk Manager   11
Visualize and Understand IT Risk
Balanced View of Business and Operational Metrics



                                          Drill down
                                         to technical
                                            details




Risk & Compliance Sales Specialist Training - CCS Risk Manager   12
Prioritize Remediation Based on Risk
Risk Modeling




Risk Management and Remediation        13
Prioritize Remediation Based on Risk
Remediation Plan by Risk Objective




                                  Review & finalize
                                  remediation plan


Risk Management and Remediation                       14
Monitor Risk Reduction Over Time
Manage Remediation Plans




                                  Track risk reduction for
                                    remediation plans

Risk Management and Remediation                              15
Effective Risk Management

          Data Driven View of Risk
          • Cross-reference multiple data points for a true view of risk
1         • Combine 3rd party data for ‘composite’ risk score
          • Easily digest and distill data from thousands of devices


          Ability to Show Business Value
          • Map IT assets to business assets
2         • Present relevant information to business peers
          • Flexible reporting – avoid costly re-mapping efforts


          Move Beyond Risk Assessment to Risk Monitoring & Management
          • Track objectives and monitor risk over time
3         • Develop action plans to manage entire remediation process
          • Demonstrate risk reduction over time


Risk Management and Remediation                                            16
Effective Remediation
• Remediation: The act or process of correcting a fault or deficiency
• Automating Remediation can:
  – Fix 95% of Security Profile settings w/o manual intervention
  – Immediately address an environment’s post-audit vulnerability status
  – Provide significant ROI




 Risk Management and Remediation
Why Haven’t We Automated Remediation?
• Auditing and Remediation
  – Security (Auditing) vs. Operations (Change Management)
• SCAP Validated
    • Means that we can ingest SCAP audit results!!!
• Standards Enable Security
    • Common language between security and management
    • Security results become Management Tasks
• Automatic remediation for 6 well known configuration types
    • Registry settings            • Local password policies
    • Security audit               • Service configuration
    • Account lockout              • Account privileges
• Actionable, Automated, & Auditable

                                                               18

 Risk Management and Remediation
Closed Loop Direct Remediation

                                                         SCAP Audit Initiated
                                                         • FDCC
SCAP Audit Tool                       Remediation Tool
                                                         • USGCB
                                                         • STIG
                                                         • CIS




                          End Point

                                                                           19



 Risk Management and Remediation
Closed Loop Direct Remediation

                                                         Audit Complete
                                                         • Results Available
SCAP Audit Tool                       Remediation Tool     via Reporting

                                                         Security Results 
                                                         Management Tasks

                                                         Remediation Tasks
                                                         Executed
                          End Point                      • Approval Manual
                                                           and/or Automated
                                                                               20



 Risk Management and Remediation
Closed Loop Direct Remediation

                                                         Remediation Complete
                                                         • Results Available via
SCAP Audit Tool                       Remediation Tool     Reporting
                                                         Remediation Complete
                                                         • SCAP Audit Tool
                                                           Notified

                                                         SCAP Validation Audit
                          End Point
                                                         • FDCC, USGCB, etc.



 Risk Management and Remediation
Closed Loop Direct Remediation

                                                         Validation Audit
                                                         Complete
SCAP Audit Tool                       Remediation Tool   • Results Available
                                                           via Reporting




                          End Point

                                                                               22



 Risk Management and Remediation
Didn’t You Mention Something About ROI?
Example: Windows 7
 • Fix 95% of Security Profile settings w/o manual intervention
•• Post “Typical” Install an environment’s post-audit vulnerability status
    Immediately address
                          of Windows 7, run a USGCB audit
• Windows 7 installation will be around 30% compliant
 • Provide a significant ROI to a customer
   (70% failure to comply)
                                   Manual Audit Costs
                 Number of issues to address             100
                 Minutes per issue                        5
                 Total Time (Hours)                      8.33
                 Jr. Admin Salary                       $50,000
                 TOTAL COST                             $200.32
• Soft costs (unfactored): Lost productivity of Jr. Admin AND End User
• Will need to perform remediation again after next audit!

 Risk Management and Remediation
Remediation
  Actions
Security
Configuration
  Visibility
How Arellia Can Further Help Effective Risk Management




                   D
            Removing End
          Users’ Administrator
                                    A
                                  Securing Local
                                 Admin Accounts &
                 Rights             Passwords

              Application          Automating
              Whitelisting         Remediation

                    C                  B
Privilege Management:
 Increasing Security AND End User Productivity

 Privilege Management:       The ability to enable or secure
 applications through the addition or removal of user rights.

1 in 14                Programs downloaded in Windows are malicious


  43%                  2011 MS Bulletins address Privilege Exploitation


110 Million            Estimated new Windows 7 users in 2012

                       Annual cost savings per managed endpoint:
  $653                 “moderately managed” vs. “locked and well-managed”

 Risk Management and Remediation
Windows 7 End User Accounts:
  High Security Posture AND End User Productivity

  “Ideal” end user model?
  “Privilege management and
  • Standard User with elevated
 application control tools help
     privileges for predetermined
achievecustomer) functions
     (by total cost of ownership
(TCO) Cannot be doneclose to third
      – reasonably without a that
        party tool
 of a locked and well-managed
  • Balances security needs
 user, while giving users some
     with end user productivity
      ability to control their
      – Security posture remains high
              systems.”
    – End user productivity remains
      high
   Gartner: “The Cost of Removing
    – Support costs at all levels
  Administrative Rights for the Wrong
      lowered
         Users” (April 2011)


  Risk Management and Remediation
Local Administrative Rights:
The Interrogative Process

•Who has Admin Access?!?!?
•What was the justification?
•When were these waivers last reviewed?
•Where in my organization are these local end
 user accounts with admin rights?
•Why aren’t my GPOs enough?



Risk Management and Remediation
How Do I Fix This?
• Local Admin Password: Randomization & Cycling
• Discover local user accounts
   – Including accounts with admin rights
• Group Membership Enforcement
• Windows Service Account Management
• Auditing of Administrator Account Usage
• Local Security Inventory and Configuration
• Compliance Reporting




Risk Management and Remediation
www.arellia.com
                 Item                                Description
How to purchase            Sold exclusively via Symantec sales and partners

Buying Options             Available in Symantec buying programs

Contacts                   800.889.8091 (Option 1) or SalesStaff@arellia.com

Data Sheets                www.arellia.com/solutions

Forums / Documentation     portal.arellia.com/wiki

Videos (YouTube Channel)   www.youtube.com/user/ArelliaSoftwareVideo

Webcasts / Events          www.arellia.com/events

Blog                       www.arellia.com/blog

Twitter                    @ArelliaSoftware

Partner Portal             arellia.channelplace.net
Thank you!




    Copyright © 2010 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in
    the U.S. and other countries. Other names may be trademarks of their respective owners.

    This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied,
    are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.


Risk Management and Remediation                                                                                                                                                             32

Weitere ähnliche Inhalte

Was ist angesagt?

Technology leadership driving business innovation
Technology leadership driving business innovationTechnology leadership driving business innovation
Technology leadership driving business innovationJoAnna Cheshire
 
Top 5 secrets to successfully jumpstarting your cyber-risk program
Top 5 secrets to successfully jumpstarting your cyber-risk programTop 5 secrets to successfully jumpstarting your cyber-risk program
Top 5 secrets to successfully jumpstarting your cyber-risk programPriyanka Aash
 
Information Secuirty Vulnerability Management
Information Secuirty   Vulnerability ManagementInformation Secuirty   Vulnerability Management
Information Secuirty Vulnerability Managementtschraider
 
Risk management(software engineering)
Risk management(software engineering)Risk management(software engineering)
Risk management(software engineering)Priya Tomar
 
Got Your Resilience On? Reducing the Risk of Disaster with Business Continuit...
Got Your Resilience On? Reducing the Risk of Disaster with Business Continuit...Got Your Resilience On? Reducing the Risk of Disaster with Business Continuit...
Got Your Resilience On? Reducing the Risk of Disaster with Business Continuit...Healthcare Network marcus evans
 
Information Security Risk Management
Information Security Risk ManagementInformation Security Risk Management
Information Security Risk ManagementNikhil Soni
 
Demonstrating Information Security Program Effectiveness
Demonstrating Information Security Program EffectivenessDemonstrating Information Security Program Effectiveness
Demonstrating Information Security Program EffectivenessDoug Copley
 
A Practical Approach to Managing Information System Risk
A Practical Approach to Managing Information System RiskA Practical Approach to Managing Information System Risk
A Practical Approach to Managing Information System Riskamiable_indian
 
Information Security Strategic Management
Information Security Strategic ManagementInformation Security Strategic Management
Information Security Strategic ManagementMarcelo Martins
 
NIST 800-30 Intro to Conducting Risk Assessments - Part 1
NIST 800-30 Intro to Conducting Risk Assessments - Part 1NIST 800-30 Intro to Conducting Risk Assessments - Part 1
NIST 800-30 Intro to Conducting Risk Assessments - Part 1Denise Tawwab
 
Security Maturity Assessment
Security Maturity AssessmentSecurity Maturity Assessment
Security Maturity AssessmentClaude Baudoin
 
Risk Assessment And Management
Risk Assessment And ManagementRisk Assessment And Management
Risk Assessment And Managementvikasraina
 
Risk management ISO 27001 Standard
Risk management ISO 27001 StandardRisk management ISO 27001 Standard
Risk management ISO 27001 StandardTharindunuwan9
 
Risk Based Security and Self Protection Powerpoint
Risk Based Security and Self Protection PowerpointRisk Based Security and Self Protection Powerpoint
Risk Based Security and Self Protection Powerpointrandalje86
 

Was ist angesagt? (20)

ISO 27005 Risk Assessment
ISO 27005 Risk AssessmentISO 27005 Risk Assessment
ISO 27005 Risk Assessment
 
Risk Assessments
Risk AssessmentsRisk Assessments
Risk Assessments
 
Information Serurity Risk Assessment Basics
Information Serurity Risk Assessment BasicsInformation Serurity Risk Assessment Basics
Information Serurity Risk Assessment Basics
 
Information systems risk assessment frame workisraf 130215042410-phpapp01
Information systems risk assessment frame workisraf 130215042410-phpapp01Information systems risk assessment frame workisraf 130215042410-phpapp01
Information systems risk assessment frame workisraf 130215042410-phpapp01
 
Technology leadership driving business innovation
Technology leadership driving business innovationTechnology leadership driving business innovation
Technology leadership driving business innovation
 
Top 5 secrets to successfully jumpstarting your cyber-risk program
Top 5 secrets to successfully jumpstarting your cyber-risk programTop 5 secrets to successfully jumpstarting your cyber-risk program
Top 5 secrets to successfully jumpstarting your cyber-risk program
 
Information Secuirty Vulnerability Management
Information Secuirty   Vulnerability ManagementInformation Secuirty   Vulnerability Management
Information Secuirty Vulnerability Management
 
Risk management(software engineering)
Risk management(software engineering)Risk management(software engineering)
Risk management(software engineering)
 
Got Your Resilience On? Reducing the Risk of Disaster with Business Continuit...
Got Your Resilience On? Reducing the Risk of Disaster with Business Continuit...Got Your Resilience On? Reducing the Risk of Disaster with Business Continuit...
Got Your Resilience On? Reducing the Risk of Disaster with Business Continuit...
 
Security assessment isaca sv presentation jan 2016
Security assessment isaca sv presentation jan 2016Security assessment isaca sv presentation jan 2016
Security assessment isaca sv presentation jan 2016
 
Information Security Risk Management
Information Security Risk ManagementInformation Security Risk Management
Information Security Risk Management
 
Demonstrating Information Security Program Effectiveness
Demonstrating Information Security Program EffectivenessDemonstrating Information Security Program Effectiveness
Demonstrating Information Security Program Effectiveness
 
A Practical Approach to Managing Information System Risk
A Practical Approach to Managing Information System RiskA Practical Approach to Managing Information System Risk
A Practical Approach to Managing Information System Risk
 
Information Security Strategic Management
Information Security Strategic ManagementInformation Security Strategic Management
Information Security Strategic Management
 
NIST 800-30 Intro to Conducting Risk Assessments - Part 1
NIST 800-30 Intro to Conducting Risk Assessments - Part 1NIST 800-30 Intro to Conducting Risk Assessments - Part 1
NIST 800-30 Intro to Conducting Risk Assessments - Part 1
 
Security Maturity Assessment
Security Maturity AssessmentSecurity Maturity Assessment
Security Maturity Assessment
 
Does audit make us more secure
Does audit make us more secureDoes audit make us more secure
Does audit make us more secure
 
Risk Assessment And Management
Risk Assessment And ManagementRisk Assessment And Management
Risk Assessment And Management
 
Risk management ISO 27001 Standard
Risk management ISO 27001 StandardRisk management ISO 27001 Standard
Risk management ISO 27001 Standard
 
Risk Based Security and Self Protection Powerpoint
Risk Based Security and Self Protection PowerpointRisk Based Security and Self Protection Powerpoint
Risk Based Security and Self Protection Powerpoint
 

Andere mochten auch

Maintaining Brand Integrity at Scale - Affiliate Management Days SF 2015
Maintaining Brand Integrity at Scale - Affiliate Management Days SF 2015Maintaining Brand Integrity at Scale - Affiliate Management Days SF 2015
Maintaining Brand Integrity at Scale - Affiliate Management Days SF 2015Sam Engel
 
We Got a Warning Letter – Now What? How to Keep Calm in a Compliance Storm
We Got a Warning Letter – Now What? How to Keep Calm in a Compliance StormWe Got a Warning Letter – Now What? How to Keep Calm in a Compliance Storm
We Got a Warning Letter – Now What? How to Keep Calm in a Compliance StormDesign World
 
Fueling Strategic Transformation at Emirates National Oil Company
Fueling Strategic Transformation at Emirates National Oil CompanyFueling Strategic Transformation at Emirates National Oil Company
Fueling Strategic Transformation at Emirates National Oil CompanyRafael Lemaitre
 
A Case for Strategic Transformation of I.T. - A C.E.O.s Perspective
A Case for Strategic Transformation of I.T. - A C.E.O.s PerspectiveA Case for Strategic Transformation of I.T. - A C.E.O.s Perspective
A Case for Strategic Transformation of I.T. - A C.E.O.s PerspectiveRangam Bir
 
Mobile Medical Devices: A Trip to the Trenches of Design and Test
Mobile Medical Devices: A Trip to the Trenches of Design and TestMobile Medical Devices: A Trip to the Trenches of Design and Test
Mobile Medical Devices: A Trip to the Trenches of Design and TestSterling Medical Devices
 
Leveraging PowerPivot
Leveraging PowerPivotLeveraging PowerPivot
Leveraging PowerPivotDan English
 
CFPB Hot Topics in 2016
CFPB Hot Topics in 2016 CFPB Hot Topics in 2016
CFPB Hot Topics in 2016 Experian
 
QAdvis - software risk management based on IEC/ISO 62304
QAdvis - software risk management based on IEC/ISO 62304QAdvis - software risk management based on IEC/ISO 62304
QAdvis - software risk management based on IEC/ISO 62304Robert Ginsberg
 
2015 ISACA NACACS - Audit as Controls Factory
2015 ISACA NACACS - Audit as Controls Factory2015 ISACA NACACS - Audit as Controls Factory
2015 ISACA NACACS - Audit as Controls FactoryNathan Anderson
 
Digital Business 2020: Getting There from Here, Part II
Digital Business 2020: Getting There from Here, Part IIDigital Business 2020: Getting There from Here, Part II
Digital Business 2020: Getting There from Here, Part IICognizant
 
EU Medical Device Regulation: Preparing for Disruptive (yet Incomplete) Regu...
EU Medical Device Regulation:  Preparing for Disruptive (yet Incomplete) Regu...EU Medical Device Regulation:  Preparing for Disruptive (yet Incomplete) Regu...
EU Medical Device Regulation: Preparing for Disruptive (yet Incomplete) Regu...YourEncoreInc
 
Clinical Evaluation in the EU for Medical Devices: Understanding the Changes ...
Clinical Evaluation in the EU for Medical Devices: Understanding the Changes ...Clinical Evaluation in the EU for Medical Devices: Understanding the Changes ...
Clinical Evaluation in the EU for Medical Devices: Understanding the Changes ...Greenlight Guru
 
AIA SOX Conference May 2009 - CCM & Data Analytics
AIA SOX Conference May 2009 - CCM & Data AnalyticsAIA SOX Conference May 2009 - CCM & Data Analytics
AIA SOX Conference May 2009 - CCM & Data Analyticsprosenzw69
 
PECB Webinar: Aligning COBIT 5.0 and ISO/IEC 38500
PECB Webinar: Aligning COBIT 5.0 and ISO/IEC 38500PECB Webinar: Aligning COBIT 5.0 and ISO/IEC 38500
PECB Webinar: Aligning COBIT 5.0 and ISO/IEC 38500PECB
 
Effective medical device validation introduction manual advance
Effective medical device validation introduction   manual advanceEffective medical device validation introduction   manual advance
Effective medical device validation introduction manual advanceguest2d7d1cac
 
Transform IT Operations with CSC
Transform IT Operations with CSCTransform IT Operations with CSC
Transform IT Operations with CSCAmazon Web Services
 
Achieving Operational Excellence in the Upstream Oil and Gas Industry with th...
Achieving Operational Excellence in the Upstream Oil and Gas Industry with th...Achieving Operational Excellence in the Upstream Oil and Gas Industry with th...
Achieving Operational Excellence in the Upstream Oil and Gas Industry with th...Rolta
 
Transform IT Operations and Management
Transform IT Operations and ManagementTransform IT Operations and Management
Transform IT Operations and ManagementAmazon Web Services
 

Andere mochten auch (20)

Maintaining Brand Integrity at Scale - Affiliate Management Days SF 2015
Maintaining Brand Integrity at Scale - Affiliate Management Days SF 2015Maintaining Brand Integrity at Scale - Affiliate Management Days SF 2015
Maintaining Brand Integrity at Scale - Affiliate Management Days SF 2015
 
We Got a Warning Letter – Now What? How to Keep Calm in a Compliance Storm
We Got a Warning Letter – Now What? How to Keep Calm in a Compliance StormWe Got a Warning Letter – Now What? How to Keep Calm in a Compliance Storm
We Got a Warning Letter – Now What? How to Keep Calm in a Compliance Storm
 
Oil & Gas Themes 2016
Oil & Gas Themes 2016Oil & Gas Themes 2016
Oil & Gas Themes 2016
 
Fueling Strategic Transformation at Emirates National Oil Company
Fueling Strategic Transformation at Emirates National Oil CompanyFueling Strategic Transformation at Emirates National Oil Company
Fueling Strategic Transformation at Emirates National Oil Company
 
A Case for Strategic Transformation of I.T. - A C.E.O.s Perspective
A Case for Strategic Transformation of I.T. - A C.E.O.s PerspectiveA Case for Strategic Transformation of I.T. - A C.E.O.s Perspective
A Case for Strategic Transformation of I.T. - A C.E.O.s Perspective
 
Mobile Medical Devices: A Trip to the Trenches of Design and Test
Mobile Medical Devices: A Trip to the Trenches of Design and TestMobile Medical Devices: A Trip to the Trenches of Design and Test
Mobile Medical Devices: A Trip to the Trenches of Design and Test
 
Leveraging PowerPivot
Leveraging PowerPivotLeveraging PowerPivot
Leveraging PowerPivot
 
CFPB Hot Topics in 2016
CFPB Hot Topics in 2016 CFPB Hot Topics in 2016
CFPB Hot Topics in 2016
 
QAdvis - software risk management based on IEC/ISO 62304
QAdvis - software risk management based on IEC/ISO 62304QAdvis - software risk management based on IEC/ISO 62304
QAdvis - software risk management based on IEC/ISO 62304
 
2015 ISACA NACACS - Audit as Controls Factory
2015 ISACA NACACS - Audit as Controls Factory2015 ISACA NACACS - Audit as Controls Factory
2015 ISACA NACACS - Audit as Controls Factory
 
Digital Business 2020: Getting There from Here, Part II
Digital Business 2020: Getting There from Here, Part IIDigital Business 2020: Getting There from Here, Part II
Digital Business 2020: Getting There from Here, Part II
 
EU Medical Device Regulation: Preparing for Disruptive (yet Incomplete) Regu...
EU Medical Device Regulation:  Preparing for Disruptive (yet Incomplete) Regu...EU Medical Device Regulation:  Preparing for Disruptive (yet Incomplete) Regu...
EU Medical Device Regulation: Preparing for Disruptive (yet Incomplete) Regu...
 
Clinical Evaluation in the EU for Medical Devices: Understanding the Changes ...
Clinical Evaluation in the EU for Medical Devices: Understanding the Changes ...Clinical Evaluation in the EU for Medical Devices: Understanding the Changes ...
Clinical Evaluation in the EU for Medical Devices: Understanding the Changes ...
 
AIA SOX Conference May 2009 - CCM & Data Analytics
AIA SOX Conference May 2009 - CCM & Data AnalyticsAIA SOX Conference May 2009 - CCM & Data Analytics
AIA SOX Conference May 2009 - CCM & Data Analytics
 
PECB Webinar: Aligning COBIT 5.0 and ISO/IEC 38500
PECB Webinar: Aligning COBIT 5.0 and ISO/IEC 38500PECB Webinar: Aligning COBIT 5.0 and ISO/IEC 38500
PECB Webinar: Aligning COBIT 5.0 and ISO/IEC 38500
 
Effective medical device validation introduction manual advance
Effective medical device validation introduction   manual advanceEffective medical device validation introduction   manual advance
Effective medical device validation introduction manual advance
 
Transform IT Operations with CSC
Transform IT Operations with CSCTransform IT Operations with CSC
Transform IT Operations with CSC
 
Achieving Operational Excellence in the Upstream Oil and Gas Industry with th...
Achieving Operational Excellence in the Upstream Oil and Gas Industry with th...Achieving Operational Excellence in the Upstream Oil and Gas Industry with th...
Achieving Operational Excellence in the Upstream Oil and Gas Industry with th...
 
Transform IT Operations and Management
Transform IT Operations and ManagementTransform IT Operations and Management
Transform IT Operations and Management
 
CobiT Foundation Free Training
CobiT Foundation Free TrainingCobiT Foundation Free Training
CobiT Foundation Free Training
 

Ähnlich wie Risk Management and Remediation

Metrics, Risk Management & DLP
Metrics, Risk Management & DLPMetrics, Risk Management & DLP
Metrics, Risk Management & DLPRobert Kloots
 
Symantec Control Compliance Suite 11, February 2012
Symantec Control Compliance Suite 11, February 2012Symantec Control Compliance Suite 11, February 2012
Symantec Control Compliance Suite 11, February 2012Symantec
 
From technology risk_to_enterprise_risk_the_new_frontier
From technology risk_to_enterprise_risk_the_new_frontierFrom technology risk_to_enterprise_risk_the_new_frontier
From technology risk_to_enterprise_risk_the_new_frontierRamsés Gallego
 
Information Security Risk Management
Information Security Risk Management Information Security Risk Management
Information Security Risk Management Ersoy AKSOY
 
Best Practices and ROI for Risk-based Vulnerability Management
Best Practices and ROI for Risk-based Vulnerability ManagementBest Practices and ROI for Risk-based Vulnerability Management
Best Practices and ROI for Risk-based Vulnerability ManagementResolver Inc.
 
CONF. 404- Effective risk management and avoiding project disasters. A pragma...
CONF. 404- Effective risk management and avoiding project disasters. A pragma...CONF. 404- Effective risk management and avoiding project disasters. A pragma...
CONF. 404- Effective risk management and avoiding project disasters. A pragma...PMI-Montréal
 
Ta Security
Ta SecurityTa Security
Ta Securityjothsna
 
TA security
TA securityTA security
TA securitykesavars
 
S thomas sfield
S thomas sfieldS thomas sfield
S thomas sfieldNASAPMC
 
Solvency II - Programme Assurance
Solvency II - Programme AssuranceSolvency II - Programme Assurance
Solvency II - Programme Assurancegainline
 
Risk leadership perspectives Risk Manager of the Year
Risk leadership perspectives Risk Manager of the YearRisk leadership perspectives Risk Manager of the Year
Risk leadership perspectives Risk Manager of the YearKarl Davey
 
CISSP 8 Domains.pdf
CISSP 8 Domains.pdfCISSP 8 Domains.pdf
CISSP 8 Domains.pdfdotco
 
D team weekly powerpoint presentation spqm
D team weekly powerpoint presentation spqmD team weekly powerpoint presentation spqm
D team weekly powerpoint presentation spqmMiraj Mhaisuria
 
Ken Kurdziel: Enterprise Risk Management
Ken Kurdziel: Enterprise Risk ManagementKen Kurdziel: Enterprise Risk Management
Ken Kurdziel: Enterprise Risk ManagementJamesMooreCo
 
Assess Your Business Continuity Management Process
Assess Your Business Continuity Management ProcessAssess Your Business Continuity Management Process
Assess Your Business Continuity Management ProcessAnand Subramaniam
 
Solvency II -The Practicalities Around Programme Governance & Data
Solvency II -The Practicalities Around Programme Governance & Data Solvency II -The Practicalities Around Programme Governance & Data
Solvency II -The Practicalities Around Programme Governance & Data gainline
 
Integrating Risk With Earned Value
Integrating Risk With Earned ValueIntegrating Risk With Earned Value
Integrating Risk With Earned ValueGlen Alleman
 
[weave] Risk and Compliance - Less but Better, Optimizing controls
[weave] Risk and Compliance - Less but Better, Optimizing controls[weave] Risk and Compliance - Less but Better, Optimizing controls
[weave] Risk and Compliance - Less but Better, Optimizing controlsonepoint x weave
 
Operational Risk Educational Courses to be held in Kenya
Operational Risk Educational Courses to be held in KenyaOperational Risk Educational Courses to be held in Kenya
Operational Risk Educational Courses to be held in Kenyachasecooper
 

Ähnlich wie Risk Management and Remediation (20)

Metrics, Risk Management & DLP
Metrics, Risk Management & DLPMetrics, Risk Management & DLP
Metrics, Risk Management & DLP
 
Symantec Control Compliance Suite 11, February 2012
Symantec Control Compliance Suite 11, February 2012Symantec Control Compliance Suite 11, February 2012
Symantec Control Compliance Suite 11, February 2012
 
Operational risks
Operational risksOperational risks
Operational risks
 
From technology risk_to_enterprise_risk_the_new_frontier
From technology risk_to_enterprise_risk_the_new_frontierFrom technology risk_to_enterprise_risk_the_new_frontier
From technology risk_to_enterprise_risk_the_new_frontier
 
Information Security Risk Management
Information Security Risk Management Information Security Risk Management
Information Security Risk Management
 
Best Practices and ROI for Risk-based Vulnerability Management
Best Practices and ROI for Risk-based Vulnerability ManagementBest Practices and ROI for Risk-based Vulnerability Management
Best Practices and ROI for Risk-based Vulnerability Management
 
CONF. 404- Effective risk management and avoiding project disasters. A pragma...
CONF. 404- Effective risk management and avoiding project disasters. A pragma...CONF. 404- Effective risk management and avoiding project disasters. A pragma...
CONF. 404- Effective risk management and avoiding project disasters. A pragma...
 
Ta Security
Ta SecurityTa Security
Ta Security
 
TA security
TA securityTA security
TA security
 
S thomas sfield
S thomas sfieldS thomas sfield
S thomas sfield
 
Solvency II - Programme Assurance
Solvency II - Programme AssuranceSolvency II - Programme Assurance
Solvency II - Programme Assurance
 
Risk leadership perspectives Risk Manager of the Year
Risk leadership perspectives Risk Manager of the YearRisk leadership perspectives Risk Manager of the Year
Risk leadership perspectives Risk Manager of the Year
 
CISSP 8 Domains.pdf
CISSP 8 Domains.pdfCISSP 8 Domains.pdf
CISSP 8 Domains.pdf
 
D team weekly powerpoint presentation spqm
D team weekly powerpoint presentation spqmD team weekly powerpoint presentation spqm
D team weekly powerpoint presentation spqm
 
Ken Kurdziel: Enterprise Risk Management
Ken Kurdziel: Enterprise Risk ManagementKen Kurdziel: Enterprise Risk Management
Ken Kurdziel: Enterprise Risk Management
 
Assess Your Business Continuity Management Process
Assess Your Business Continuity Management ProcessAssess Your Business Continuity Management Process
Assess Your Business Continuity Management Process
 
Solvency II -The Practicalities Around Programme Governance & Data
Solvency II -The Practicalities Around Programme Governance & Data Solvency II -The Practicalities Around Programme Governance & Data
Solvency II -The Practicalities Around Programme Governance & Data
 
Integrating Risk With Earned Value
Integrating Risk With Earned ValueIntegrating Risk With Earned Value
Integrating Risk With Earned Value
 
[weave] Risk and Compliance - Less but Better, Optimizing controls
[weave] Risk and Compliance - Less but Better, Optimizing controls[weave] Risk and Compliance - Less but Better, Optimizing controls
[weave] Risk and Compliance - Less but Better, Optimizing controls
 
Operational Risk Educational Courses to be held in Kenya
Operational Risk Educational Courses to be held in KenyaOperational Risk Educational Courses to be held in Kenya
Operational Risk Educational Courses to be held in Kenya
 

Mehr von Carahsoft

Cyber V. Shark Facts
Cyber V. Shark FactsCyber V. Shark Facts
Cyber V. Shark FactsCarahsoft
 
Adobe Government Technology Livestream Agenda
Adobe Government Technology Livestream AgendaAdobe Government Technology Livestream Agenda
Adobe Government Technology Livestream AgendaCarahsoft
 
Citizen Engagement Speakers
Citizen Engagement SpeakersCitizen Engagement Speakers
Citizen Engagement SpeakersCarahsoft
 
inTTENSITY Federal Social Media Summit
inTTENSITY Federal Social Media SummitinTTENSITY Federal Social Media Summit
inTTENSITY Federal Social Media SummitCarahsoft
 
Opening Keynote and Welcome
Opening Keynote and WelcomeOpening Keynote and Welcome
Opening Keynote and WelcomeCarahsoft
 
Symantec Government Technology Summit
Symantec Government Technology SummitSymantec Government Technology Summit
Symantec Government Technology SummitCarahsoft
 
Electronic Data Discovery
Electronic Data DiscoveryElectronic Data Discovery
Electronic Data DiscoveryCarahsoft
 
Endpoint Evolution
Endpoint EvolutionEndpoint Evolution
Endpoint EvolutionCarahsoft
 
Symantec Solutions Working Together
Symantec Solutions Working TogetherSymantec Solutions Working Together
Symantec Solutions Working TogetherCarahsoft
 
Data Center Virtualization
Data Center VirtualizationData Center Virtualization
Data Center VirtualizationCarahsoft
 
User Authentication for Government
User Authentication for GovernmentUser Authentication for Government
User Authentication for GovernmentCarahsoft
 
Mobile Management
Mobile ManagementMobile Management
Mobile ManagementCarahsoft
 
Symantec government technology summit abstract
Symantec government technology summit abstractSymantec government technology summit abstract
Symantec government technology summit abstractCarahsoft
 

Mehr von Carahsoft (13)

Cyber V. Shark Facts
Cyber V. Shark FactsCyber V. Shark Facts
Cyber V. Shark Facts
 
Adobe Government Technology Livestream Agenda
Adobe Government Technology Livestream AgendaAdobe Government Technology Livestream Agenda
Adobe Government Technology Livestream Agenda
 
Citizen Engagement Speakers
Citizen Engagement SpeakersCitizen Engagement Speakers
Citizen Engagement Speakers
 
inTTENSITY Federal Social Media Summit
inTTENSITY Federal Social Media SummitinTTENSITY Federal Social Media Summit
inTTENSITY Federal Social Media Summit
 
Opening Keynote and Welcome
Opening Keynote and WelcomeOpening Keynote and Welcome
Opening Keynote and Welcome
 
Symantec Government Technology Summit
Symantec Government Technology SummitSymantec Government Technology Summit
Symantec Government Technology Summit
 
Electronic Data Discovery
Electronic Data DiscoveryElectronic Data Discovery
Electronic Data Discovery
 
Endpoint Evolution
Endpoint EvolutionEndpoint Evolution
Endpoint Evolution
 
Symantec Solutions Working Together
Symantec Solutions Working TogetherSymantec Solutions Working Together
Symantec Solutions Working Together
 
Data Center Virtualization
Data Center VirtualizationData Center Virtualization
Data Center Virtualization
 
User Authentication for Government
User Authentication for GovernmentUser Authentication for Government
User Authentication for Government
 
Mobile Management
Mobile ManagementMobile Management
Mobile Management
 
Symantec government technology summit abstract
Symantec government technology summit abstractSymantec government technology summit abstract
Symantec government technology summit abstract
 

Kürzlich hochgeladen

International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...ssuserf63bd7
 
8447779800, Low rate Call girls in Dwarka mor Delhi NCR
8447779800, Low rate Call girls in Dwarka mor Delhi NCR8447779800, Low rate Call girls in Dwarka mor Delhi NCR
8447779800, Low rate Call girls in Dwarka mor Delhi NCRashishs7044
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCRashishs7044
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyotictsugar
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607dollysharma2066
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMVoces Mineras
 
Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Peter Ward
 
Guide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFGuide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFChandresh Chudasama
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Servicecallgirls2057
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaoncallgirls2057
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Anamaria Contreras
 
PB Project 1: Exploring Your Personal Brand
PB Project 1: Exploring Your Personal BrandPB Project 1: Exploring Your Personal Brand
PB Project 1: Exploring Your Personal BrandSharisaBethune
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Seta Wicaksana
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Pereraictsugar
 
Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMintel Group
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdfShaun Heinrichs
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCRashishs7044
 

Kürzlich hochgeladen (20)

International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...
 
8447779800, Low rate Call girls in Dwarka mor Delhi NCR
8447779800, Low rate Call girls in Dwarka mor Delhi NCR8447779800, Low rate Call girls in Dwarka mor Delhi NCR
8447779800, Low rate Call girls in Dwarka mor Delhi NCR
 
Call Us ➥9319373153▻Call Girls In North Goa
Call Us ➥9319373153▻Call Girls In North GoaCall Us ➥9319373153▻Call Girls In North Goa
Call Us ➥9319373153▻Call Girls In North Goa
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
 
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyot
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQM
 
Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...
 
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCREnjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
 
Guide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFGuide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDF
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.
 
PB Project 1: Exploring Your Personal Brand
PB Project 1: Exploring Your Personal BrandPB Project 1: Exploring Your Personal Brand
PB Project 1: Exploring Your Personal Brand
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Perera
 
Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 Edition
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
 

Risk Management and Remediation

  • 1. Risk Management and Remediation Kurt Van Etten Stephen Brown Symantec Arellia Director, Product Management President Dan McManus Arellia Director of Sales Risk Management and Remediation 1
  • 2. Agenda 1 Need to Move to Risk Management 2 Deeper Dive on Risk Manager 3 Remediation Risk Management and Remediation 2
  • 3. Rapid Maturation of Information Security Risk Scoring & Cyberscope Management Reporting Continuous Monitoring • Focus on top priorities • Reporting to higher • Drive action to • Peer Comparison reduce risk • Collection of Data • Vulnerability • Configuration • Procedural Risk Management and Remediation 3
  • 4. Symantec Approach to IT Risk Management How do IT risks How do you convey How do you affect your IT risks to your drive measurable mission? peers? risk reduction? CCS RISK MANAGER TRANSLATE INFLUENCE ACT Risk Management and Remediation 4
  • 5. Introducing CCS Risk Manager CCS RISK MANAGER TRANSLATE INFLUENCE ACT » Define virtual » Convey IT risk in » Prioritize based on business assets business terms business impact » Connect related » Customized views » Align Security and IT assets for greater impact IT Operations » Create business » Justify new security » Track risk reduction view of IT risk investments over time Risk Management and Remediation 5
  • 6. Current View of IT Risk – Technology Centric Risk Management and Remediation 6
  • 7. Translating IT Risk Transaction Processing System Case Management Risk Management and Remediation 7
  • 8. Translating IT Risk Transaction Processing System Case Management Risk Management and Remediation 8
  • 9. Using Risk to Drive Accountability and Action Transaction Processing System Plan Current Projected Target Name Risk Objective Status Score Score Date Owner Plan A B Secure Configuration Completed Submitted 3.65 2.75 2.75 3/15/12 Bob Plan B C Patch Level Standard Completed Submitted 4.22 1.81 1.81 4/11/12 Joe Plan A Info Sec Standard Completed 2.23 2.23 1/10/12 Joe Plan D C Protect Web Servers Completed Submitted 3.51 2.10 2.10 2/28/12 Dave Risk Management and Remediation 9
  • 10. CCS Risk Manager Highlights  Define a business asset you want to manage  Visualize and understand IT risk for this business asset  Prioritize remediation based on IT risk, not technical severity  Monitor risk reduction over time Risk Management and Remediation 10
  • 11. Visualize and Understand IT Risk Enterprise Wide View of Business Risk Risk Overview for People’s Bank Risk & Compliance Sales Specialist Training - CCS Risk Manager 11
  • 12. Visualize and Understand IT Risk Balanced View of Business and Operational Metrics Drill down to technical details Risk & Compliance Sales Specialist Training - CCS Risk Manager 12
  • 13. Prioritize Remediation Based on Risk Risk Modeling Risk Management and Remediation 13
  • 14. Prioritize Remediation Based on Risk Remediation Plan by Risk Objective Review & finalize remediation plan Risk Management and Remediation 14
  • 15. Monitor Risk Reduction Over Time Manage Remediation Plans Track risk reduction for remediation plans Risk Management and Remediation 15
  • 16. Effective Risk Management Data Driven View of Risk • Cross-reference multiple data points for a true view of risk 1 • Combine 3rd party data for ‘composite’ risk score • Easily digest and distill data from thousands of devices Ability to Show Business Value • Map IT assets to business assets 2 • Present relevant information to business peers • Flexible reporting – avoid costly re-mapping efforts Move Beyond Risk Assessment to Risk Monitoring & Management • Track objectives and monitor risk over time 3 • Develop action plans to manage entire remediation process • Demonstrate risk reduction over time Risk Management and Remediation 16
  • 17. Effective Remediation • Remediation: The act or process of correcting a fault or deficiency • Automating Remediation can: – Fix 95% of Security Profile settings w/o manual intervention – Immediately address an environment’s post-audit vulnerability status – Provide significant ROI Risk Management and Remediation
  • 18. Why Haven’t We Automated Remediation? • Auditing and Remediation – Security (Auditing) vs. Operations (Change Management) • SCAP Validated • Means that we can ingest SCAP audit results!!! • Standards Enable Security • Common language between security and management • Security results become Management Tasks • Automatic remediation for 6 well known configuration types • Registry settings • Local password policies • Security audit • Service configuration • Account lockout • Account privileges • Actionable, Automated, & Auditable 18 Risk Management and Remediation
  • 19. Closed Loop Direct Remediation SCAP Audit Initiated • FDCC SCAP Audit Tool Remediation Tool • USGCB • STIG • CIS End Point 19 Risk Management and Remediation
  • 20. Closed Loop Direct Remediation Audit Complete • Results Available SCAP Audit Tool Remediation Tool via Reporting Security Results  Management Tasks Remediation Tasks Executed End Point • Approval Manual and/or Automated 20 Risk Management and Remediation
  • 21. Closed Loop Direct Remediation Remediation Complete • Results Available via SCAP Audit Tool Remediation Tool Reporting Remediation Complete • SCAP Audit Tool Notified SCAP Validation Audit End Point • FDCC, USGCB, etc. Risk Management and Remediation
  • 22. Closed Loop Direct Remediation Validation Audit Complete SCAP Audit Tool Remediation Tool • Results Available via Reporting End Point 22 Risk Management and Remediation
  • 23. Didn’t You Mention Something About ROI? Example: Windows 7 • Fix 95% of Security Profile settings w/o manual intervention •• Post “Typical” Install an environment’s post-audit vulnerability status Immediately address of Windows 7, run a USGCB audit • Windows 7 installation will be around 30% compliant • Provide a significant ROI to a customer (70% failure to comply) Manual Audit Costs Number of issues to address 100 Minutes per issue 5 Total Time (Hours) 8.33 Jr. Admin Salary $50,000 TOTAL COST $200.32 • Soft costs (unfactored): Lost productivity of Jr. Admin AND End User • Will need to perform remediation again after next audit! Risk Management and Remediation
  • 26. How Arellia Can Further Help Effective Risk Management D Removing End Users’ Administrator A Securing Local Admin Accounts & Rights Passwords Application Automating Whitelisting Remediation C B
  • 27. Privilege Management: Increasing Security AND End User Productivity Privilege Management: The ability to enable or secure applications through the addition or removal of user rights. 1 in 14 Programs downloaded in Windows are malicious 43% 2011 MS Bulletins address Privilege Exploitation 110 Million Estimated new Windows 7 users in 2012 Annual cost savings per managed endpoint: $653 “moderately managed” vs. “locked and well-managed” Risk Management and Remediation
  • 28. Windows 7 End User Accounts: High Security Posture AND End User Productivity “Ideal” end user model? “Privilege management and • Standard User with elevated application control tools help privileges for predetermined achievecustomer) functions (by total cost of ownership (TCO) Cannot be doneclose to third – reasonably without a that party tool of a locked and well-managed • Balances security needs user, while giving users some with end user productivity ability to control their – Security posture remains high systems.” – End user productivity remains high Gartner: “The Cost of Removing – Support costs at all levels Administrative Rights for the Wrong lowered Users” (April 2011) Risk Management and Remediation
  • 29. Local Administrative Rights: The Interrogative Process •Who has Admin Access?!?!? •What was the justification? •When were these waivers last reviewed? •Where in my organization are these local end user accounts with admin rights? •Why aren’t my GPOs enough? Risk Management and Remediation
  • 30. How Do I Fix This? • Local Admin Password: Randomization & Cycling • Discover local user accounts – Including accounts with admin rights • Group Membership Enforcement • Windows Service Account Management • Auditing of Administrator Account Usage • Local Security Inventory and Configuration • Compliance Reporting Risk Management and Remediation
  • 31. www.arellia.com Item Description How to purchase Sold exclusively via Symantec sales and partners Buying Options Available in Symantec buying programs Contacts 800.889.8091 (Option 1) or SalesStaff@arellia.com Data Sheets www.arellia.com/solutions Forums / Documentation portal.arellia.com/wiki Videos (YouTube Channel) www.youtube.com/user/ArelliaSoftwareVideo Webcasts / Events www.arellia.com/events Blog www.arellia.com/blog Twitter @ArelliaSoftware Partner Portal arellia.channelplace.net
  • 32. Thank you! Copyright © 2010 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. Risk Management and Remediation 32

Hinweis der Redaktion

  1. Allows you to define what can be remediated automatically vs. what may require manual review (based upon organization policy)
  2. ARELLIARather than becoming another assessment focused tool, we created a tool to drive automated remediation using SCAP and the underlying open standardsESRS enables Operations to:Identify or import issues from an SCAP assessment productAutomate the remediation tasksPredefine remediation tasks that meet requirements for change management approvalEach security policy provides quick information on:Assessments completedCompliance trend over timeIndividual computer compliance scoresRemediation actions can be automatically generated after an assessment and can be approved from the Remediation Approvals tab.