SlideShare ist ein Scribd-Unternehmen logo
1 von 36
© 2015 Forrester Research, Inc. Reproduction Prohibited 3@rickhholland | @terlin | @TripwireInc
© 2015 Forrester Research, Inc. Reproduction Prohibited 4
Familiar?
@rickhholland | @terlin | @TripwireInc
© 2015 Forrester Research, Inc. Reproduction Prohibited 5
Targeted-Attack Hierarchy Of Needs
Source: January 7, 2015, “Introducing Forrester's Targeted-Attack Hierarchy Of Needs, Forrester report
@rickhholland | @terlin | @TripwireInc
© 2015 Forrester Research, Inc. Reproduction Prohibited 6
Step #1
Have an actual strategy
@rickhholland | @terlin | @TripwireInc
© 2015 Forrester Research, Inc. Reproduction Prohibited 7
Expense in depth
Source: January 7, 2015, “Introducing Forrester's Targeted-Attack Hierarchy Of Needs, Forrester report
@rickhholland | @terlin | @TripwireInc
© 2015 Forrester Research, Inc. Reproduction Prohibited 8
Return on expense in depth?
Source: January 7, 2015, “Introducing Forrester's Targeted-Attack Hierarchy Of Needs, Forrester report
@rickhholland | @terlin | @TripwireInc
© 2015 Forrester Research, Inc. Reproduction Prohibited 9
Before you
invest:
• Assess your
current state
• Conduct a
gap analysis
@rickhholland | @terlin | @TripwireInc
© 2015 Forrester Research, Inc. Reproduction Prohibited 10
Components of a sound strategy
› Adopt a Zero Trust model.
• Trust but verify
• Networks are designed from the
inside out
• Inspect and log all traffic
@rickhholland | @terlin | @TripwireInc
© 2015 Forrester Research, Inc. Reproduction Prohibited 11
Components of a sound strategy
› Adopt a Zero Trust model.
• Trust but verify
• Networks are designed from the
inside out
• Inspect and log all traffic
› Data-driven security, not alert-driven
security
› Know your data
• What generates revenue?
• What assets align to this revenue?
@rickhholland | @terlin | @TripwireInc
© 2015 Forrester Research, Inc. Reproduction Prohibited 12
Step #2
Focus on fundamentals
@rickhholland
@rickhholland | @terlin | @TripwireInc
© 2015 Forrester Research, Inc. Reproduction Prohibited 13
Focus on the fundamentals
@rickhholland | @terlin | @TripwireInc
© 2015 Forrester Research, Inc. Reproduction Prohibited 14
Reduce attack surface with Vulnerability Management
› VM has always been fundamental, yet it
has been overlooked.
› The recent open source vulnerabilities
brought VM back into the spotlight.
› VM has a renewed focus within
organizations.
@rickhholland | @terlin | @TripwireInc
© 2015 Forrester Research, Inc. Reproduction Prohibited 15
Step #3
An integrated portfolio that enables orchestration
@rickhholland | @terlin | @TripwireInc
© 2015 Forrester Research, Inc. Reproduction Prohibited 16
Friction
› “Create friction for the attacker. Slow
them down, and make their job more
difficult.”
› What about all the friction we create for
ourselves?
› Reduce your internal friction and
become more agile.
@rickhholland | @terlin | @TripwireInc
© 2015 Forrester Research, Inc. Reproduction Prohibited 17
Reduce operational friction
› Evaluate your technology stack;
automate any manual tasks.
› Add developers to your team (recent
college graduates)
› Prioritize vendors who integrate within
their own portfolio as well as others.
@rickhholland | @terlin | @TripwireInc
© 2015 Forrester Research, Inc. Reproduction Prohibited 18
Integration use case examples
› Endpoint + Automated malware
analysis
• Use endpoint visibility to confirm whether
or not malware executed.
› Vulnerability remediation validation
• Integrate vulnerability management with
ticketing to automate remediation
validation.
› Vulnerability management +
Governance Risk Compliance
• Provide asset states directly into GRC
solutions.
@rickhholland | @terlin | @TripwireInc
© 2015 Forrester Research, Inc. Reproduction Prohibited 19
Step 4
Prevention
@rickhholland | @terlin | @TripwireInc
© 2015 Forrester Research, Inc. Reproduction Prohibited 20
Prevention is dead, long live prevention!
› Prevention isn’t dead, imagine a world
without prevention.
› Prevention is shifting.
› Actionable threat intelligence can be used
for proactive defense.
@rickhholland | @terlin | @TripwireInc
© 2015 Forrester Research, Inc. Reproduction Prohibited 21
Step 5
Detection and response
@rickhholland | @terlin | @TripwireInc
© 2015 Forrester Research, Inc. Reproduction Prohibited 22
The threat landscape is overwhelming; threat models are
dynamic
@rickhholland | @terlin | @TripwireInc
© 2015 Forrester Research, Inc. Reproduction Prohibited 23
Adversary tiers
@rickhholland | @terlin | @TripwireInc
© 2015 Forrester Research, Inc. Reproduction Prohibited 24
Fall back to detection and response
› Detection is the only option when dealing
with higher tier adversaries.
› No single control is your breach detection
system.
› Your aggregate controls and your people
are your breach detection system.
@rickhholland | @terlin | @TripwireInc
Your enterprise
@rickhholland | @terlin | @TripwireInc
© 2015 Forrester Research, Inc. Reproduction Prohibited 26
Network controls aren’t enough
@rickhholland | @terlin | @TripwireInc
© 2015 Forrester Research, Inc. Reproduction Prohibited 27
Endpoint’s role in detection and response
› Hunting with threat intelligence
• Search for threat indicators/indicators of
compromise.
• Behavioral hunting as well, not just signatures.
› Incident response
• What other hosts have been compromised?
• How are legitimate windows tools being used
by the adversary?
@rickhholland | @terlin | @TripwireInc
© 2015 Forrester Research, Inc. Reproduction Prohibited 28
Final thought: Breach Detection Solution
› There is no single “breach detection”
solution.
› Your security tools ran by skilled staff who
are enabled by process are your breach
detection platform.
› Reduce internal friction to enable your
analysts.
@rickhholland | @terlin | @TripwireInc
© 2015 Forrester Research, Inc. Reproduction Prohibited 29
Free research plug
› Not a Forrester client, interested in free
research?
› If you participate in a confidential research
interview, I will provide a complementary
copy of the research
@rickhholland | @terlin | @TripwireInc
Adaptive
Threat
ProtectionEndpoint
Intelligence
Vulnerability
Intelligence
Threat
Intelligence
Threat
Analytics
Forensics
Zero-Day
Detection
Threat
Response
Log & Event
Intelligence
@rickhholland | @terlin | @TripwireInc
@rickhholland | @terlin | @TripwireInc
DETECTION
GAP
RESPONSE
GAP
PREVENTION
GAP
DETECTION
GAP
RESPONSE
GAP
PREVENTION
GAP
DETECTION
GAP
RESPONSE
GAP
PREVENTION
GAP
@rickhholland | @terlin | @TripwireInc
Trusted: by over half of Fortune500 and over 9,000 customers worldwide
Open: Architected for a choice of multiple threat intelligence and security
integrations
Accurate: Hi-fidelity real-time detection and prioritization - focus on what really
matters
Resilient: Proven, reliable platform for security vulnerability management and threat
protection
@rickhholland | @terlin | @TripwireInc
tripwire.com | @TripwireInc

Weitere ähnliche Inhalte

Ähnlich wie 5 Steps to Defend from Targeted Attacks with Security Integration

5 Habits of Highly Effective Endpoint Threat Protection
5 Habits of Highly Effective Endpoint Threat Protection5 Habits of Highly Effective Endpoint Threat Protection
5 Habits of Highly Effective Endpoint Threat ProtectionTripwire
 
Data-Driven is Passé: Transform Into An Insights-Driven Enterprise
Data-Driven is Passé: Transform Into An Insights-Driven EnterpriseData-Driven is Passé: Transform Into An Insights-Driven Enterprise
Data-Driven is Passé: Transform Into An Insights-Driven EnterpriseDenodo
 
Top Trends for Hadoop in 2015
Top Trends for Hadoop in 2015Top Trends for Hadoop in 2015
Top Trends for Hadoop in 2015Hortonworks
 
Actian forrester- hortonworks
Actian   forrester- hortonworksActian   forrester- hortonworks
Actian forrester- hortonworksHortonworks
 
National DevOps conference 2016
National DevOps conference 2016National DevOps conference 2016
National DevOps conference 2016ECS Digital
 
National DevOps conference 2016
National DevOps conference 2016National DevOps conference 2016
National DevOps conference 2016ECS Digital
 
The Business Side | Translating and the Computer
The Business Side | Translating and the ComputerThe Business Side | Translating and the Computer
The Business Side | Translating and the ComputerRichard Brooks
 
Amy DeMartine - 7 Habits of Rugged DevOps
Amy DeMartine - 7 Habits of Rugged DevOpsAmy DeMartine - 7 Habits of Rugged DevOps
Amy DeMartine - 7 Habits of Rugged DevOpsSeniorStoryteller
 
Making Predictive Analytics Practical: How Marketing Can Drive Engagement
Making Predictive Analytics Practical: How Marketing Can Drive EngagementMaking Predictive Analytics Practical: How Marketing Can Drive Engagement
Making Predictive Analytics Practical: How Marketing Can Drive EngagementProgress® Sitefinity™
 
The State of Application Security: Hackers On Steroids
The State of Application Security: Hackers On SteroidsThe State of Application Security: Hackers On Steroids
The State of Application Security: Hackers On SteroidsImperva
 
Protecting endpoints from targeted attacks
Protecting endpoints from targeted attacksProtecting endpoints from targeted attacks
Protecting endpoints from targeted attacksAppSense
 
WSO2Con EU 2016: Keynote - How To Become A Digital Predator
WSO2Con EU 2016: Keynote - How To Become A Digital PredatorWSO2Con EU 2016: Keynote - How To Become A Digital Predator
WSO2Con EU 2016: Keynote - How To Become A Digital PredatorWSO2
 
Streaming analytics webinar | 9.13.16 | Guest: Mike Gualtieri from Forrester
Streaming analytics webinar | 9.13.16 | Guest: Mike Gualtieri from ForresterStreaming analytics webinar | 9.13.16 | Guest: Mike Gualtieri from Forrester
Streaming analytics webinar | 9.13.16 | Guest: Mike Gualtieri from ForresterCubic Corporation
 
How to Find the Right Market Intelligence Technology for Your Company
How to Find the Right Market Intelligence Technology for Your CompanyHow to Find the Right Market Intelligence Technology for Your Company
How to Find the Right Market Intelligence Technology for Your CompanyIntelCollab.com
 
Future-Proof Your Streaming Analytics Architecture- StreamAnalytix Webinar
Future-Proof Your Streaming Analytics Architecture- StreamAnalytix WebinarFuture-Proof Your Streaming Analytics Architecture- StreamAnalytix Webinar
Future-Proof Your Streaming Analytics Architecture- StreamAnalytix WebinarImpetus Technologies
 
Nate Eliott Forrester presentation for WOMMA
Nate Eliott Forrester presentation for WOMMANate Eliott Forrester presentation for WOMMA
Nate Eliott Forrester presentation for WOMMACleverGirlsColl
 
Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)Sqrrl
 
Growing our Business. Growing our Team.
Growing our Business. Growing our Team.Growing our Business. Growing our Team.
Growing our Business. Growing our Team.Richard Brooks
 
Safeguard Commercial Success with a Strategic Monitoring Approach
Safeguard Commercial Success with a Strategic Monitoring ApproachSafeguard Commercial Success with a Strategic Monitoring Approach
Safeguard Commercial Success with a Strategic Monitoring Approachmadelinestack
 

Ähnlich wie 5 Steps to Defend from Targeted Attacks with Security Integration (20)

5 Habits of Highly Effective Endpoint Threat Protection
5 Habits of Highly Effective Endpoint Threat Protection5 Habits of Highly Effective Endpoint Threat Protection
5 Habits of Highly Effective Endpoint Threat Protection
 
Data-Driven is Passé: Transform Into An Insights-Driven Enterprise
Data-Driven is Passé: Transform Into An Insights-Driven EnterpriseData-Driven is Passé: Transform Into An Insights-Driven Enterprise
Data-Driven is Passé: Transform Into An Insights-Driven Enterprise
 
Top Trends for Hadoop in 2015
Top Trends for Hadoop in 2015Top Trends for Hadoop in 2015
Top Trends for Hadoop in 2015
 
Actian forrester- hortonworks
Actian   forrester- hortonworksActian   forrester- hortonworks
Actian forrester- hortonworks
 
National DevOps conference 2016
National DevOps conference 2016National DevOps conference 2016
National DevOps conference 2016
 
National DevOps conference 2016
National DevOps conference 2016National DevOps conference 2016
National DevOps conference 2016
 
The Business Side | Translating and the Computer
The Business Side | Translating and the ComputerThe Business Side | Translating and the Computer
The Business Side | Translating and the Computer
 
Thought Leadership: The Next Wave In B2B Marketing - Laura Ramos, Forrester
Thought Leadership: The Next Wave In B2B Marketing - Laura Ramos, ForresterThought Leadership: The Next Wave In B2B Marketing - Laura Ramos, Forrester
Thought Leadership: The Next Wave In B2B Marketing - Laura Ramos, Forrester
 
Amy DeMartine - 7 Habits of Rugged DevOps
Amy DeMartine - 7 Habits of Rugged DevOpsAmy DeMartine - 7 Habits of Rugged DevOps
Amy DeMartine - 7 Habits of Rugged DevOps
 
Making Predictive Analytics Practical: How Marketing Can Drive Engagement
Making Predictive Analytics Practical: How Marketing Can Drive EngagementMaking Predictive Analytics Practical: How Marketing Can Drive Engagement
Making Predictive Analytics Practical: How Marketing Can Drive Engagement
 
The State of Application Security: Hackers On Steroids
The State of Application Security: Hackers On SteroidsThe State of Application Security: Hackers On Steroids
The State of Application Security: Hackers On Steroids
 
Protecting endpoints from targeted attacks
Protecting endpoints from targeted attacksProtecting endpoints from targeted attacks
Protecting endpoints from targeted attacks
 
WSO2Con EU 2016: Keynote - How To Become A Digital Predator
WSO2Con EU 2016: Keynote - How To Become A Digital PredatorWSO2Con EU 2016: Keynote - How To Become A Digital Predator
WSO2Con EU 2016: Keynote - How To Become A Digital Predator
 
Streaming analytics webinar | 9.13.16 | Guest: Mike Gualtieri from Forrester
Streaming analytics webinar | 9.13.16 | Guest: Mike Gualtieri from ForresterStreaming analytics webinar | 9.13.16 | Guest: Mike Gualtieri from Forrester
Streaming analytics webinar | 9.13.16 | Guest: Mike Gualtieri from Forrester
 
How to Find the Right Market Intelligence Technology for Your Company
How to Find the Right Market Intelligence Technology for Your CompanyHow to Find the Right Market Intelligence Technology for Your Company
How to Find the Right Market Intelligence Technology for Your Company
 
Future-Proof Your Streaming Analytics Architecture- StreamAnalytix Webinar
Future-Proof Your Streaming Analytics Architecture- StreamAnalytix WebinarFuture-Proof Your Streaming Analytics Architecture- StreamAnalytix Webinar
Future-Proof Your Streaming Analytics Architecture- StreamAnalytix Webinar
 
Nate Eliott Forrester presentation for WOMMA
Nate Eliott Forrester presentation for WOMMANate Eliott Forrester presentation for WOMMA
Nate Eliott Forrester presentation for WOMMA
 
Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)
 
Growing our Business. Growing our Team.
Growing our Business. Growing our Team.Growing our Business. Growing our Team.
Growing our Business. Growing our Team.
 
Safeguard Commercial Success with a Strategic Monitoring Approach
Safeguard Commercial Success with a Strategic Monitoring ApproachSafeguard Commercial Success with a Strategic Monitoring Approach
Safeguard Commercial Success with a Strategic Monitoring Approach
 

Mehr von Tripwire

Mind the Cybersecurity Gap - Why Compliance Isn't Enough
Mind the Cybersecurity Gap - Why Compliance Isn't EnoughMind the Cybersecurity Gap - Why Compliance Isn't Enough
Mind the Cybersecurity Gap - Why Compliance Isn't EnoughTripwire
 
Data Privacy Day 2022: Tips to Ensure Data Privacy
Data Privacy Day 2022: Tips to Ensure Data PrivacyData Privacy Day 2022: Tips to Ensure Data Privacy
Data Privacy Day 2022: Tips to Ensure Data PrivacyTripwire
 
Key Challenges Facing IT/OT: Hear From The Experts
Key Challenges Facing IT/OT: Hear From The ExpertsKey Challenges Facing IT/OT: Hear From The Experts
Key Challenges Facing IT/OT: Hear From The ExpertsTripwire
 
Tripwire Energy Working Group: TIV Demo
Tripwire Energy Working Group: TIV Demo Tripwire Energy Working Group: TIV Demo
Tripwire Energy Working Group: TIV Demo Tripwire
 
Tripwire Energy Working Group Session w/Dale Peterson
Tripwire Energy Working Group Session w/Dale PetersonTripwire Energy Working Group Session w/Dale Peterson
Tripwire Energy Working Group Session w/Dale PetersonTripwire
 
Tripwire Energy Working Group: CIP Solutions and Baseline Walk-Through
Tripwire Energy Working Group: CIP Solutions and Baseline Walk-Through Tripwire Energy Working Group: CIP Solutions and Baseline Walk-Through
Tripwire Energy Working Group: CIP Solutions and Baseline Walk-Through Tripwire
 
Tripwire Energy Working Group: Customer Session with Chase Cole
Tripwire Energy Working Group: Customer Session with Chase ColeTripwire Energy Working Group: Customer Session with Chase Cole
Tripwire Energy Working Group: Customer Session with Chase ColeTripwire
 
Tripwire Energy Working Group: Keynote w/Patrick Miller
Tripwire Energy Working Group: Keynote w/Patrick Miller Tripwire Energy Working Group: Keynote w/Patrick Miller
Tripwire Energy Working Group: Keynote w/Patrick Miller Tripwire
 
World Book Day: Cybersecurity’s Quietest Celebration
World Book Day: Cybersecurity’s Quietest CelebrationWorld Book Day: Cybersecurity’s Quietest Celebration
World Book Day: Cybersecurity’s Quietest CelebrationTripwire
 
Tripwire Retail Security 2020 Survey: Key Findings
Tripwire Retail Security 2020 Survey: Key FindingsTripwire Retail Security 2020 Survey: Key Findings
Tripwire Retail Security 2020 Survey: Key FindingsTripwire
 
Key Findings: Tripwire COVID-19 Cybersecurity Impact Report
Key Findings: Tripwire COVID-19 Cybersecurity Impact ReportKey Findings: Tripwire COVID-19 Cybersecurity Impact Report
Key Findings: Tripwire COVID-19 Cybersecurity Impact ReportTripwire
 
The Adventures of Captain Tripwire: Coloring Book!
The Adventures of Captain Tripwire: Coloring Book!The Adventures of Captain Tripwire: Coloring Book!
The Adventures of Captain Tripwire: Coloring Book!Tripwire
 
Industrial Cybersecurity: Practical Tips for IT & OT Collaboration
Industrial Cybersecurity: Practical Tips for IT & OT CollaborationIndustrial Cybersecurity: Practical Tips for IT & OT Collaboration
Industrial Cybersecurity: Practical Tips for IT & OT CollaborationTripwire
 
The Adventures of Captain Tripwire #1: Captain Tripwire Faces the Indefensibl...
The Adventures of Captain Tripwire #1: Captain Tripwire Faces the Indefensibl...The Adventures of Captain Tripwire #1: Captain Tripwire Faces the Indefensibl...
The Adventures of Captain Tripwire #1: Captain Tripwire Faces the Indefensibl...Tripwire
 
Tripwire 2019 Skills Gap Survey: Key Findings
Tripwire 2019 Skills Gap Survey: Key FindingsTripwire 2019 Skills Gap Survey: Key Findings
Tripwire 2019 Skills Gap Survey: Key FindingsTripwire
 
A Look Back at 2018: The Most Memorable Cyber Moments
A Look Back at 2018: The Most Memorable Cyber MomentsA Look Back at 2018: The Most Memorable Cyber Moments
A Look Back at 2018: The Most Memorable Cyber MomentsTripwire
 
Time for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass Audits
Time for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass AuditsTime for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass Audits
Time for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass AuditsTripwire
 
Tripwire State of Cyber Hygiene 2018 Report: Key Findings
Tripwire State of Cyber Hygiene 2018 Report: Key FindingsTripwire State of Cyber Hygiene 2018 Report: Key Findings
Tripwire State of Cyber Hygiene 2018 Report: Key FindingsTripwire
 
Defend Your Data Now with the MITRE ATT&CK Framework
Defend Your Data Now with the MITRE ATT&CK FrameworkDefend Your Data Now with the MITRE ATT&CK Framework
Defend Your Data Now with the MITRE ATT&CK FrameworkTripwire
 
Defending Critical Infrastructure Against Cyber Attacks
Defending Critical Infrastructure Against Cyber AttacksDefending Critical Infrastructure Against Cyber Attacks
Defending Critical Infrastructure Against Cyber AttacksTripwire
 

Mehr von Tripwire (20)

Mind the Cybersecurity Gap - Why Compliance Isn't Enough
Mind the Cybersecurity Gap - Why Compliance Isn't EnoughMind the Cybersecurity Gap - Why Compliance Isn't Enough
Mind the Cybersecurity Gap - Why Compliance Isn't Enough
 
Data Privacy Day 2022: Tips to Ensure Data Privacy
Data Privacy Day 2022: Tips to Ensure Data PrivacyData Privacy Day 2022: Tips to Ensure Data Privacy
Data Privacy Day 2022: Tips to Ensure Data Privacy
 
Key Challenges Facing IT/OT: Hear From The Experts
Key Challenges Facing IT/OT: Hear From The ExpertsKey Challenges Facing IT/OT: Hear From The Experts
Key Challenges Facing IT/OT: Hear From The Experts
 
Tripwire Energy Working Group: TIV Demo
Tripwire Energy Working Group: TIV Demo Tripwire Energy Working Group: TIV Demo
Tripwire Energy Working Group: TIV Demo
 
Tripwire Energy Working Group Session w/Dale Peterson
Tripwire Energy Working Group Session w/Dale PetersonTripwire Energy Working Group Session w/Dale Peterson
Tripwire Energy Working Group Session w/Dale Peterson
 
Tripwire Energy Working Group: CIP Solutions and Baseline Walk-Through
Tripwire Energy Working Group: CIP Solutions and Baseline Walk-Through Tripwire Energy Working Group: CIP Solutions and Baseline Walk-Through
Tripwire Energy Working Group: CIP Solutions and Baseline Walk-Through
 
Tripwire Energy Working Group: Customer Session with Chase Cole
Tripwire Energy Working Group: Customer Session with Chase ColeTripwire Energy Working Group: Customer Session with Chase Cole
Tripwire Energy Working Group: Customer Session with Chase Cole
 
Tripwire Energy Working Group: Keynote w/Patrick Miller
Tripwire Energy Working Group: Keynote w/Patrick Miller Tripwire Energy Working Group: Keynote w/Patrick Miller
Tripwire Energy Working Group: Keynote w/Patrick Miller
 
World Book Day: Cybersecurity’s Quietest Celebration
World Book Day: Cybersecurity’s Quietest CelebrationWorld Book Day: Cybersecurity’s Quietest Celebration
World Book Day: Cybersecurity’s Quietest Celebration
 
Tripwire Retail Security 2020 Survey: Key Findings
Tripwire Retail Security 2020 Survey: Key FindingsTripwire Retail Security 2020 Survey: Key Findings
Tripwire Retail Security 2020 Survey: Key Findings
 
Key Findings: Tripwire COVID-19 Cybersecurity Impact Report
Key Findings: Tripwire COVID-19 Cybersecurity Impact ReportKey Findings: Tripwire COVID-19 Cybersecurity Impact Report
Key Findings: Tripwire COVID-19 Cybersecurity Impact Report
 
The Adventures of Captain Tripwire: Coloring Book!
The Adventures of Captain Tripwire: Coloring Book!The Adventures of Captain Tripwire: Coloring Book!
The Adventures of Captain Tripwire: Coloring Book!
 
Industrial Cybersecurity: Practical Tips for IT & OT Collaboration
Industrial Cybersecurity: Practical Tips for IT & OT CollaborationIndustrial Cybersecurity: Practical Tips for IT & OT Collaboration
Industrial Cybersecurity: Practical Tips for IT & OT Collaboration
 
The Adventures of Captain Tripwire #1: Captain Tripwire Faces the Indefensibl...
The Adventures of Captain Tripwire #1: Captain Tripwire Faces the Indefensibl...The Adventures of Captain Tripwire #1: Captain Tripwire Faces the Indefensibl...
The Adventures of Captain Tripwire #1: Captain Tripwire Faces the Indefensibl...
 
Tripwire 2019 Skills Gap Survey: Key Findings
Tripwire 2019 Skills Gap Survey: Key FindingsTripwire 2019 Skills Gap Survey: Key Findings
Tripwire 2019 Skills Gap Survey: Key Findings
 
A Look Back at 2018: The Most Memorable Cyber Moments
A Look Back at 2018: The Most Memorable Cyber MomentsA Look Back at 2018: The Most Memorable Cyber Moments
A Look Back at 2018: The Most Memorable Cyber Moments
 
Time for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass Audits
Time for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass AuditsTime for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass Audits
Time for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass Audits
 
Tripwire State of Cyber Hygiene 2018 Report: Key Findings
Tripwire State of Cyber Hygiene 2018 Report: Key FindingsTripwire State of Cyber Hygiene 2018 Report: Key Findings
Tripwire State of Cyber Hygiene 2018 Report: Key Findings
 
Defend Your Data Now with the MITRE ATT&CK Framework
Defend Your Data Now with the MITRE ATT&CK FrameworkDefend Your Data Now with the MITRE ATT&CK Framework
Defend Your Data Now with the MITRE ATT&CK Framework
 
Defending Critical Infrastructure Against Cyber Attacks
Defending Critical Infrastructure Against Cyber AttacksDefending Critical Infrastructure Against Cyber Attacks
Defending Critical Infrastructure Against Cyber Attacks
 

Kürzlich hochgeladen

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 

Kürzlich hochgeladen (20)

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 

5 Steps to Defend from Targeted Attacks with Security Integration

  • 1.
  • 2.
  • 3. © 2015 Forrester Research, Inc. Reproduction Prohibited 3@rickhholland | @terlin | @TripwireInc
  • 4. © 2015 Forrester Research, Inc. Reproduction Prohibited 4 Familiar? @rickhholland | @terlin | @TripwireInc
  • 5. © 2015 Forrester Research, Inc. Reproduction Prohibited 5 Targeted-Attack Hierarchy Of Needs Source: January 7, 2015, “Introducing Forrester's Targeted-Attack Hierarchy Of Needs, Forrester report @rickhholland | @terlin | @TripwireInc
  • 6. © 2015 Forrester Research, Inc. Reproduction Prohibited 6 Step #1 Have an actual strategy @rickhholland | @terlin | @TripwireInc
  • 7. © 2015 Forrester Research, Inc. Reproduction Prohibited 7 Expense in depth Source: January 7, 2015, “Introducing Forrester's Targeted-Attack Hierarchy Of Needs, Forrester report @rickhholland | @terlin | @TripwireInc
  • 8. © 2015 Forrester Research, Inc. Reproduction Prohibited 8 Return on expense in depth? Source: January 7, 2015, “Introducing Forrester's Targeted-Attack Hierarchy Of Needs, Forrester report @rickhholland | @terlin | @TripwireInc
  • 9. © 2015 Forrester Research, Inc. Reproduction Prohibited 9 Before you invest: • Assess your current state • Conduct a gap analysis @rickhholland | @terlin | @TripwireInc
  • 10. © 2015 Forrester Research, Inc. Reproduction Prohibited 10 Components of a sound strategy › Adopt a Zero Trust model. • Trust but verify • Networks are designed from the inside out • Inspect and log all traffic @rickhholland | @terlin | @TripwireInc
  • 11. © 2015 Forrester Research, Inc. Reproduction Prohibited 11 Components of a sound strategy › Adopt a Zero Trust model. • Trust but verify • Networks are designed from the inside out • Inspect and log all traffic › Data-driven security, not alert-driven security › Know your data • What generates revenue? • What assets align to this revenue? @rickhholland | @terlin | @TripwireInc
  • 12. © 2015 Forrester Research, Inc. Reproduction Prohibited 12 Step #2 Focus on fundamentals @rickhholland @rickhholland | @terlin | @TripwireInc
  • 13. © 2015 Forrester Research, Inc. Reproduction Prohibited 13 Focus on the fundamentals @rickhholland | @terlin | @TripwireInc
  • 14. © 2015 Forrester Research, Inc. Reproduction Prohibited 14 Reduce attack surface with Vulnerability Management › VM has always been fundamental, yet it has been overlooked. › The recent open source vulnerabilities brought VM back into the spotlight. › VM has a renewed focus within organizations. @rickhholland | @terlin | @TripwireInc
  • 15. © 2015 Forrester Research, Inc. Reproduction Prohibited 15 Step #3 An integrated portfolio that enables orchestration @rickhholland | @terlin | @TripwireInc
  • 16. © 2015 Forrester Research, Inc. Reproduction Prohibited 16 Friction › “Create friction for the attacker. Slow them down, and make their job more difficult.” › What about all the friction we create for ourselves? › Reduce your internal friction and become more agile. @rickhholland | @terlin | @TripwireInc
  • 17. © 2015 Forrester Research, Inc. Reproduction Prohibited 17 Reduce operational friction › Evaluate your technology stack; automate any manual tasks. › Add developers to your team (recent college graduates) › Prioritize vendors who integrate within their own portfolio as well as others. @rickhholland | @terlin | @TripwireInc
  • 18. © 2015 Forrester Research, Inc. Reproduction Prohibited 18 Integration use case examples › Endpoint + Automated malware analysis • Use endpoint visibility to confirm whether or not malware executed. › Vulnerability remediation validation • Integrate vulnerability management with ticketing to automate remediation validation. › Vulnerability management + Governance Risk Compliance • Provide asset states directly into GRC solutions. @rickhholland | @terlin | @TripwireInc
  • 19. © 2015 Forrester Research, Inc. Reproduction Prohibited 19 Step 4 Prevention @rickhholland | @terlin | @TripwireInc
  • 20. © 2015 Forrester Research, Inc. Reproduction Prohibited 20 Prevention is dead, long live prevention! › Prevention isn’t dead, imagine a world without prevention. › Prevention is shifting. › Actionable threat intelligence can be used for proactive defense. @rickhholland | @terlin | @TripwireInc
  • 21. © 2015 Forrester Research, Inc. Reproduction Prohibited 21 Step 5 Detection and response @rickhholland | @terlin | @TripwireInc
  • 22. © 2015 Forrester Research, Inc. Reproduction Prohibited 22 The threat landscape is overwhelming; threat models are dynamic @rickhholland | @terlin | @TripwireInc
  • 23. © 2015 Forrester Research, Inc. Reproduction Prohibited 23 Adversary tiers @rickhholland | @terlin | @TripwireInc
  • 24. © 2015 Forrester Research, Inc. Reproduction Prohibited 24 Fall back to detection and response › Detection is the only option when dealing with higher tier adversaries. › No single control is your breach detection system. › Your aggregate controls and your people are your breach detection system. @rickhholland | @terlin | @TripwireInc
  • 25. Your enterprise @rickhholland | @terlin | @TripwireInc
  • 26. © 2015 Forrester Research, Inc. Reproduction Prohibited 26 Network controls aren’t enough @rickhholland | @terlin | @TripwireInc
  • 27. © 2015 Forrester Research, Inc. Reproduction Prohibited 27 Endpoint’s role in detection and response › Hunting with threat intelligence • Search for threat indicators/indicators of compromise. • Behavioral hunting as well, not just signatures. › Incident response • What other hosts have been compromised? • How are legitimate windows tools being used by the adversary? @rickhholland | @terlin | @TripwireInc
  • 28. © 2015 Forrester Research, Inc. Reproduction Prohibited 28 Final thought: Breach Detection Solution › There is no single “breach detection” solution. › Your security tools ran by skilled staff who are enabled by process are your breach detection platform. › Reduce internal friction to enable your analysts. @rickhholland | @terlin | @TripwireInc
  • 29. © 2015 Forrester Research, Inc. Reproduction Prohibited 29 Free research plug › Not a Forrester client, interested in free research? › If you participate in a confidential research interview, I will provide a complementary copy of the research @rickhholland | @terlin | @TripwireInc
  • 30.
  • 32. @rickhholland | @terlin | @TripwireInc
  • 34. Trusted: by over half of Fortune500 and over 9,000 customers worldwide Open: Architected for a choice of multiple threat intelligence and security integrations Accurate: Hi-fidelity real-time detection and prioritization - focus on what really matters Resilient: Proven, reliable platform for security vulnerability management and threat protection @rickhholland | @terlin | @TripwireInc
  • 35.

Hinweis der Redaktion

  1. Source: Stock.xchng