SlideShare a Scribd company logo
1 of 14
FIVE REASONS WHY
SECURITY NEEDS A RESET
w w w. s e c u r i t y f o c u s e s . c o m
12 November 2013

sales@secdata.com
01622 723456
1
TIME TO RESET SECURITY
Complexity in security is growing from all sides, but at the same
time, IT teams have to do more with less people – and all
without compromising data or the business. We need a new
approach – but how do we do this?

Growing
complexity
•
•
•

•

The security
landscape
has changed
Sophisticated
attacks
Many more
access points
Different data
sources

Squeeze on
IT depts
•
•

IT budgets
are under
pressure
Security
without
compromise
to
brand, data, c
ommercials

Think
differently
•

•

More
hardware
isn’t solving
the problem
Time to
approach
security in a
different way

2
IMPROVE
YOUR
VISION
SEE THE WHOLE PICTURE
Visibility across the whole of the infrastructure is the
key to improving security intelligence and taking control
of increasing complexity.

Informed
assessment

Platform
approach

Real time
correlation

Understand the
infrastructure
and gather
intelligence

For visibility you
need a platform
collecting data
from multiple
sources

Real time
monitoring and
correlation is
the foundation
for complete
security

4
YOU CAN’T
BUY
INTELLIGENCE
TECHNOLOGY ≠ INTELLIGENCE
Security intelligence isn’t something you can buy off the
shelf. Complete security goes beyond point technology
solutions to assess risk and detect threats in real-time.

People count

Correlate in
context

Early threat
detection

Intelligence is
the symbiotic
relationship of
security
managed by
bright people

When you have
visibility, expert
contextual
interpretation is
vital for security

Intelligence
creates an early
warning
platform –
beyond typical
threat detection

6
PROACTIVE
THREAT
DETECTION
PROTECT THROUGH ACTIVE DEFENCE
An end-to-end approach to security will shift security
operations from reactive to proactive. Real-time threat
detection can literally transform risk management and
security effectiveness.
Don’t just
defend

Use your
intelligence

Course of
action

What security
does today is
defend our data
– we want to do
threat mitigation

If we have the
information, we
can proactively
detect and
divert the threat

Don’t wait for
threats – use
analytics to
actively
disrupt, deny &
deceive
adversaries

8
RESPONSE
IS TOO LATE
AVOID SECURITY INCIDENTS
The best response to a security breach is to do something
about it before the event. Maintaining the intelligence
platform demands continuous expert management.

Maintain your
engine

24x7
intelligence

Security as a
service

More
complex, deeper
technology is
harder to
maintain and
support

Continuous
monitoring and
correlation of
data is
critical, but
tough to deliver
in-house

Push monitoring
data and
analytics to the
cloud and
consume as an
expert service

10
BECAUSE
YOU WANT TO
SAY ‘YES’
MAKE SECURITY BUSINESS-FRIENDLY
It’s not practical to lock down business users, or
prevent access to certain devices or applications, and you
can’t build a perimeter around your data. But your
business still needs to be run securely.
Make security
agile

Add business
value

Time for a
new approach

Abstracted
security
intelligence
enables
business agility

Integrate
security
intelligence into
big data
projects

Assess risk;
detect
threats, protect
valuable assets
and respond in
real-time

12
THANK YOU
Attend our event and learn more
about end-to-end security
www.securityfocuses.com

sales@secdata.com :: 01622 723456

13
14

More Related Content

Viewers also liked

Paul Byron Hill, CFP walks investors through wealth preservation for income w...
Paul Byron Hill, CFP walks investors through wealth preservation for income w...Paul Byron Hill, CFP walks investors through wealth preservation for income w...
Paul Byron Hill, CFP walks investors through wealth preservation for income w...wsidehank
 
Lehendakaritzaren hitzaldia - Toribio Echevarria sarien banaketa
Lehendakaritzaren hitzaldia - Toribio Echevarria sarien banaketaLehendakaritzaren hitzaldia - Toribio Echevarria sarien banaketa
Lehendakaritzaren hitzaldia - Toribio Echevarria sarien banaketaIrekia - EJGV
 
Panzerkampfwagen vi königstiger
Panzerkampfwagen vi königstigerPanzerkampfwagen vi königstiger
Panzerkampfwagen vi königstigerDieuZizou
 
Cscu module 12 information security and legal compliance
Cscu module 12 information security and legal complianceCscu module 12 information security and legal compliance
Cscu module 12 information security and legal complianceSejahtera Affif
 
La historia mas hermosa del mundo parte 6
La historia mas hermosa del mundo parte 6La historia mas hermosa del mundo parte 6
La historia mas hermosa del mundo parte 6Diana Rodriguez
 
Computational intelligence for big data analytics bda 2013
Computational intelligence for big data analytics   bda 2013Computational intelligence for big data analytics   bda 2013
Computational intelligence for big data analytics bda 2013oj08
 
Adicionando plugin do facebook ao portal OJS
Adicionando plugin do facebook ao portal OJSAdicionando plugin do facebook ao portal OJS
Adicionando plugin do facebook ao portal OJSLeonardo Gomes
 
Create Something Remark[et]able: How To Do Good Content Marketing
Create Something Remark[et]able: How To Do Good Content MarketingCreate Something Remark[et]able: How To Do Good Content Marketing
Create Something Remark[et]able: How To Do Good Content MarketingMichael Durwin
 

Viewers also liked (10)

ปัญหา
ปัญหาปัญหา
ปัญหา
 
Este essss
Este essssEste essss
Este essss
 
Paul Byron Hill, CFP walks investors through wealth preservation for income w...
Paul Byron Hill, CFP walks investors through wealth preservation for income w...Paul Byron Hill, CFP walks investors through wealth preservation for income w...
Paul Byron Hill, CFP walks investors through wealth preservation for income w...
 
Lehendakaritzaren hitzaldia - Toribio Echevarria sarien banaketa
Lehendakaritzaren hitzaldia - Toribio Echevarria sarien banaketaLehendakaritzaren hitzaldia - Toribio Echevarria sarien banaketa
Lehendakaritzaren hitzaldia - Toribio Echevarria sarien banaketa
 
Panzerkampfwagen vi königstiger
Panzerkampfwagen vi königstigerPanzerkampfwagen vi königstiger
Panzerkampfwagen vi königstiger
 
Cscu module 12 information security and legal compliance
Cscu module 12 information security and legal complianceCscu module 12 information security and legal compliance
Cscu module 12 information security and legal compliance
 
La historia mas hermosa del mundo parte 6
La historia mas hermosa del mundo parte 6La historia mas hermosa del mundo parte 6
La historia mas hermosa del mundo parte 6
 
Computational intelligence for big data analytics bda 2013
Computational intelligence for big data analytics   bda 2013Computational intelligence for big data analytics   bda 2013
Computational intelligence for big data analytics bda 2013
 
Adicionando plugin do facebook ao portal OJS
Adicionando plugin do facebook ao portal OJSAdicionando plugin do facebook ao portal OJS
Adicionando plugin do facebook ao portal OJS
 
Create Something Remark[et]able: How To Do Good Content Marketing
Create Something Remark[et]able: How To Do Good Content MarketingCreate Something Remark[et]able: How To Do Good Content Marketing
Create Something Remark[et]able: How To Do Good Content Marketing
 

More from SecureData Europe

FINE-TUNE IPS TO DIAL UP SECURITY
FINE-TUNE IPS TO DIAL UP SECURITYFINE-TUNE IPS TO DIAL UP SECURITY
FINE-TUNE IPS TO DIAL UP SECURITYSecureData Europe
 
Educate Your Users Not To Take The Bait: Introduction To Phishing As A Service
Educate Your Users Not To Take The Bait: Introduction To Phishing As A ServiceEducate Your Users Not To Take The Bait: Introduction To Phishing As A Service
Educate Your Users Not To Take The Bait: Introduction To Phishing As A ServiceSecureData Europe
 
Managed Security Services On The Rise
Managed Security Services On The RiseManaged Security Services On The Rise
Managed Security Services On The RiseSecureData Europe
 
Incident Response: Tools & Techniques
Incident Response: Tools & TechniquesIncident Response: Tools & Techniques
Incident Response: Tools & TechniquesSecureData Europe
 
Balance Risk With Better Threat Detection
Balance Risk With Better Threat DetectionBalance Risk With Better Threat Detection
Balance Risk With Better Threat DetectionSecureData Europe
 
New Battle Lines for Security
New Battle Lines for SecurityNew Battle Lines for Security
New Battle Lines for SecuritySecureData Europe
 

More from SecureData Europe (8)

SecureData GI
SecureData GISecureData GI
SecureData GI
 
FINE-TUNE IPS TO DIAL UP SECURITY
FINE-TUNE IPS TO DIAL UP SECURITYFINE-TUNE IPS TO DIAL UP SECURITY
FINE-TUNE IPS TO DIAL UP SECURITY
 
Educate Your Users Not To Take The Bait: Introduction To Phishing As A Service
Educate Your Users Not To Take The Bait: Introduction To Phishing As A ServiceEducate Your Users Not To Take The Bait: Introduction To Phishing As A Service
Educate Your Users Not To Take The Bait: Introduction To Phishing As A Service
 
Managed Security Services On The Rise
Managed Security Services On The RiseManaged Security Services On The Rise
Managed Security Services On The Rise
 
Incident Response: Tools & Techniques
Incident Response: Tools & TechniquesIncident Response: Tools & Techniques
Incident Response: Tools & Techniques
 
Balance Risk With Better Threat Detection
Balance Risk With Better Threat DetectionBalance Risk With Better Threat Detection
Balance Risk With Better Threat Detection
 
New Battle Lines for Security
New Battle Lines for SecurityNew Battle Lines for Security
New Battle Lines for Security
 
SORT OUT YOUR SIEM
SORT OUT YOUR SIEMSORT OUT YOUR SIEM
SORT OUT YOUR SIEM
 

Recently uploaded

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 

Recently uploaded (20)

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 

Five Reasons Why Security Needs A Reset

  • 1. FIVE REASONS WHY SECURITY NEEDS A RESET w w w. s e c u r i t y f o c u s e s . c o m 12 November 2013 sales@secdata.com 01622 723456 1
  • 2. TIME TO RESET SECURITY Complexity in security is growing from all sides, but at the same time, IT teams have to do more with less people – and all without compromising data or the business. We need a new approach – but how do we do this? Growing complexity • • • • The security landscape has changed Sophisticated attacks Many more access points Different data sources Squeeze on IT depts • • IT budgets are under pressure Security without compromise to brand, data, c ommercials Think differently • • More hardware isn’t solving the problem Time to approach security in a different way 2
  • 4. SEE THE WHOLE PICTURE Visibility across the whole of the infrastructure is the key to improving security intelligence and taking control of increasing complexity. Informed assessment Platform approach Real time correlation Understand the infrastructure and gather intelligence For visibility you need a platform collecting data from multiple sources Real time monitoring and correlation is the foundation for complete security 4
  • 6. TECHNOLOGY ≠ INTELLIGENCE Security intelligence isn’t something you can buy off the shelf. Complete security goes beyond point technology solutions to assess risk and detect threats in real-time. People count Correlate in context Early threat detection Intelligence is the symbiotic relationship of security managed by bright people When you have visibility, expert contextual interpretation is vital for security Intelligence creates an early warning platform – beyond typical threat detection 6
  • 8. PROTECT THROUGH ACTIVE DEFENCE An end-to-end approach to security will shift security operations from reactive to proactive. Real-time threat detection can literally transform risk management and security effectiveness. Don’t just defend Use your intelligence Course of action What security does today is defend our data – we want to do threat mitigation If we have the information, we can proactively detect and divert the threat Don’t wait for threats – use analytics to actively disrupt, deny & deceive adversaries 8
  • 10. AVOID SECURITY INCIDENTS The best response to a security breach is to do something about it before the event. Maintaining the intelligence platform demands continuous expert management. Maintain your engine 24x7 intelligence Security as a service More complex, deeper technology is harder to maintain and support Continuous monitoring and correlation of data is critical, but tough to deliver in-house Push monitoring data and analytics to the cloud and consume as an expert service 10
  • 12. MAKE SECURITY BUSINESS-FRIENDLY It’s not practical to lock down business users, or prevent access to certain devices or applications, and you can’t build a perimeter around your data. But your business still needs to be run securely. Make security agile Add business value Time for a new approach Abstracted security intelligence enables business agility Integrate security intelligence into big data projects Assess risk; detect threats, protect valuable assets and respond in real-time 12
  • 13. THANK YOU Attend our event and learn more about end-to-end security www.securityfocuses.com sales@secdata.com :: 01622 723456 13
  • 14. 14