SlideShare una empresa de Scribd logo
1 de 24
Welcome We will be starting in approximately 10 minutes ,[object Object],[object Object]
Welcome We will be starting in approximately 5 minutes ,[object Object],[object Object]
Welcome We will be starting in approximately 2 minutes ,[object Object],[object Object]
WELCOME ,[object Object],[object Object]
Prevalent MasterCard Update ,[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Questions or Issues
About Prevalent Networks ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Enterprise Governance, Risk and Compliance:  Key Concerns Symantec Control Compliance Suite 10.0 ,[object Object],[object Object],[object Object],Security Risks ,[object Object],[object Object],[object Object],Regulatory / Audit Compliance ,[object Object],[object Object],[object Object],Security and Compliance Costs
Costs of IT Compliance Remain High Symantec Control Compliance Suite 10.0 Source:  IT Policy Compliance Group n=3,000 ; Seattle Post Intelligencer - www.seattlepi.com/boeing/sox/ ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],2006 – 2008 Average Annual Regulatory Audit Spend MM
Automation Reduces Audit Costs and Improves Outcomes Symantec Control Compliance Suite 10.0 * Based on a survey of 3,280 companies Source:  IT Policy Compliance Group Automation increases audit frequency which reduces risk 0 1 2 3 4 5 6 7 Least  mature Most  mature Months between assessments Mature organizations use automation to reduce costs by up to 54% Least  mature Most  mature Relative spend on regulatory compliance 0% 20% 40% 60% 80% 100% 54% less
IT Governance Risk and Compliance is a Complex Problem Symantec Control Compliance Suite 10.0 3 rd  PARTY  EVIDENCE TECHNICAL CONTROLS ,[object Object],[object Object],[object Object],[object Object],ASSETS CONTROLS EVIDENCE NEW POLICY ,[object Object],[object Object],PROCEDURAL CONTROLS REPORT ,[object Object],REMEDIATE ,[object Object],DATA CONTROLS ,[object Object],NEW IMPROVED IMPROVED
Symantec Control Compliance Suite Symantec Control Compliance Suite 10.0 3 rd  PARTY  EVIDENCE DATA CONTROLS TECHNICAL CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],NEW ASSETS CONTROLS EVIDENCE NEW POLICY PROCEDURAL CONTROLS REPORT REMEDIATE IMPROVED IMPROVED
Symantec Control Compliance Suite Symantec Confidential
Define and Manage Policies Symantec Control Compliance Suite 10.0 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Control Compliance Suite Policy Manager POLICY Corporate Policies Lifecycle Define 1 Review 2 Track Acceptances/ Exceptions 5 Approve 3 Distribute 4
Policy-driven Risk and Compliance Management ,[object Object],[object Object],Create Map Distribute Prove Symantec Confidential ISO ,[object Object],[object Object],[object Object],[object Object],SOX PCI COBIT
Written Policy Management Symantec Confidential Display Evidence Demonstrate Coverage Distribute Define Written Policy
Automatically Assess IT Infrastructure Symantec Control Compliance Suite 10.0 Control  Compliance Suite Standards Manager ,[object Object],[object Object],[object Object],[object Object],[object Object],TECHNICAL CONTROLS Define Standards 1 Analyze and Fix 3 Managed/Unmanaged Assets 2 Evaluate (agent and/or agent-less)
Conduct Advanced Vulnerability Assessment Symantec Control Compliance Suite 10.0 Control  Compliance Suite Vulnerability Manager ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Control Compliance Suite Vulnerability Manager chains together all vulnerabilities found to uncover new, hidden issues TECHNICAL CONTROLS
Automatically Evaluate Procedural Controls Symantec Control Compliance Suite 10.0 Control  Compliance Suite Response Asset Manager PROCEDURAL CONTROLS ,[object Object],[object Object],[object Object],[object Object],[object Object],Administer Survey Analyze Results Respondents Distribute via web Consolidate responses
Identify and Prioritize Critical Assets Symantec Control Compliance Suite 10.0 ,[object Object],[object Object],[object Object],[object Object],[object Object],DATA CONTROLS Data Loss Prevention  Discover
Report on Risk and Compliance Posture Symantec Control Compliance Suite 10.0 REPORT Control Compliance Suite (Infrastructure) ,[object Object],[object Object],[object Object],[object Object],[object Object]
Remediate Deficiencies Based On Risk Symantec Control Compliance Suite 10.0 REMEDIATE Symantec ServiceDesk ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
CCS and Policy Portal Demo ,[object Object]
Questions….. ,[object Object]

Más contenido relacionado

La actualidad más candente

What is a Firewall Risk Assessment?
What is a Firewall Risk Assessment?What is a Firewall Risk Assessment?
What is a Firewall Risk Assessment?VISTA InfoSec
 
IFCA Congress How the post-pandemic will shape the compliance agenda
IFCA Congress How the post-pandemic will shape the compliance agendaIFCA Congress How the post-pandemic will shape the compliance agenda
IFCA Congress How the post-pandemic will shape the compliance agendaHernan Huwyler, MBA CPA
 
TalaTek Enterprise Compliance Management Solution
TalaTek Enterprise Compliance Management SolutionTalaTek Enterprise Compliance Management Solution
TalaTek Enterprise Compliance Management SolutionBaan
 
Cyber Security Audits and Risk Management 20160119
Cyber Security Audits and Risk Management 20160119Cyber Security Audits and Risk Management 20160119
Cyber Security Audits and Risk Management 20160119FitCEO, Inc. (FCI)
 
INFOSECFORCE Risk Management Framework Transition Plan
INFOSECFORCE Risk Management Framework Transition PlanINFOSECFORCE Risk Management Framework Transition Plan
INFOSECFORCE Risk Management Framework Transition PlanBill Ross
 
The Demystification of successful cybersecurity initiatives.
The Demystification of successful cybersecurity initiatives.The Demystification of successful cybersecurity initiatives.
The Demystification of successful cybersecurity initiatives.FitCEO, Inc. (FCI)
 
Healthcare It Security Risk 0310
Healthcare It Security Risk 0310Healthcare It Security Risk 0310
Healthcare It Security Risk 0310John Reno
 
Audit Practice at CipherTechs
Audit Practice at CipherTechsAudit Practice at CipherTechs
Audit Practice at CipherTechsMordecai Kraushar
 
It Audit Expectations High Detail
It Audit Expectations   High DetailIt Audit Expectations   High Detail
It Audit Expectations High Detailecarrow
 
Boards of Directors and GDPR Prof. Hernan Huwyler, MBA CPA
Boards of Directors and GDPR Prof. Hernan Huwyler, MBA CPABoards of Directors and GDPR Prof. Hernan Huwyler, MBA CPA
Boards of Directors and GDPR Prof. Hernan Huwyler, MBA CPAHernan Huwyler, MBA CPA
 
Master Class Cyber Compliance IE Law School IE Busines School
Master Class Cyber Compliance IE Law School IE Busines SchoolMaster Class Cyber Compliance IE Law School IE Busines School
Master Class Cyber Compliance IE Law School IE Busines SchoolHernan Huwyler, MBA CPA
 
Hernan huwyler - Recovering From a Breach
Hernan huwyler - Recovering From a BreachHernan huwyler - Recovering From a Breach
Hernan huwyler - Recovering From a BreachHernan Huwyler, MBA CPA
 
Kaseya Connect 2011 Policy Management
Kaseya Connect 2011   Policy ManagementKaseya Connect 2011   Policy Management
Kaseya Connect 2011 Policy ManagementKaseya
 
TrustedAgent GRC for Vulnerability Management and Continuous Monitoring
TrustedAgent GRC for Vulnerability Management and Continuous MonitoringTrustedAgent GRC for Vulnerability Management and Continuous Monitoring
TrustedAgent GRC for Vulnerability Management and Continuous MonitoringTri Phan
 
Completing fedramp-security-authorization-process
Completing fedramp-security-authorization-processCompleting fedramp-security-authorization-process
Completing fedramp-security-authorization-processTuan Phan
 
Security Management | System Administration
Security Management | System AdministrationSecurity Management | System Administration
Security Management | System AdministrationLisa Dowdell, MSISTM
 
Metric stream elevating your compliance program with technology
Metric stream elevating your compliance program with technologyMetric stream elevating your compliance program with technology
Metric stream elevating your compliance program with technologyHernan Huwyler, MBA CPA
 
Developing a Continuous Monitoring Action Plan
Developing a Continuous Monitoring Action PlanDeveloping a Continuous Monitoring Action Plan
Developing a Continuous Monitoring Action PlanTripwire
 
Qa Financials - 10 Smart Controls for Software Development
Qa Financials  - 10 Smart Controls for Software DevelopmentQa Financials  - 10 Smart Controls for Software Development
Qa Financials - 10 Smart Controls for Software DevelopmentHernan Huwyler, MBA CPA
 

La actualidad más candente (20)

What is a Firewall Risk Assessment?
What is a Firewall Risk Assessment?What is a Firewall Risk Assessment?
What is a Firewall Risk Assessment?
 
IFCA Congress How the post-pandemic will shape the compliance agenda
IFCA Congress How the post-pandemic will shape the compliance agendaIFCA Congress How the post-pandemic will shape the compliance agenda
IFCA Congress How the post-pandemic will shape the compliance agenda
 
TalaTek Enterprise Compliance Management Solution
TalaTek Enterprise Compliance Management SolutionTalaTek Enterprise Compliance Management Solution
TalaTek Enterprise Compliance Management Solution
 
Cyber Security Audits and Risk Management 20160119
Cyber Security Audits and Risk Management 20160119Cyber Security Audits and Risk Management 20160119
Cyber Security Audits and Risk Management 20160119
 
INFOSECFORCE Risk Management Framework Transition Plan
INFOSECFORCE Risk Management Framework Transition PlanINFOSECFORCE Risk Management Framework Transition Plan
INFOSECFORCE Risk Management Framework Transition Plan
 
The Demystification of successful cybersecurity initiatives.
The Demystification of successful cybersecurity initiatives.The Demystification of successful cybersecurity initiatives.
The Demystification of successful cybersecurity initiatives.
 
Healthcare It Security Risk 0310
Healthcare It Security Risk 0310Healthcare It Security Risk 0310
Healthcare It Security Risk 0310
 
Audit Practice at CipherTechs
Audit Practice at CipherTechsAudit Practice at CipherTechs
Audit Practice at CipherTechs
 
It Audit Expectations High Detail
It Audit Expectations   High DetailIt Audit Expectations   High Detail
It Audit Expectations High Detail
 
Boards of Directors and GDPR Prof. Hernan Huwyler, MBA CPA
Boards of Directors and GDPR Prof. Hernan Huwyler, MBA CPABoards of Directors and GDPR Prof. Hernan Huwyler, MBA CPA
Boards of Directors and GDPR Prof. Hernan Huwyler, MBA CPA
 
Master Class Cyber Compliance IE Law School IE Busines School
Master Class Cyber Compliance IE Law School IE Busines SchoolMaster Class Cyber Compliance IE Law School IE Busines School
Master Class Cyber Compliance IE Law School IE Busines School
 
Security and-visibility
Security and-visibilitySecurity and-visibility
Security and-visibility
 
Hernan huwyler - Recovering From a Breach
Hernan huwyler - Recovering From a BreachHernan huwyler - Recovering From a Breach
Hernan huwyler - Recovering From a Breach
 
Kaseya Connect 2011 Policy Management
Kaseya Connect 2011   Policy ManagementKaseya Connect 2011   Policy Management
Kaseya Connect 2011 Policy Management
 
TrustedAgent GRC for Vulnerability Management and Continuous Monitoring
TrustedAgent GRC for Vulnerability Management and Continuous MonitoringTrustedAgent GRC for Vulnerability Management and Continuous Monitoring
TrustedAgent GRC for Vulnerability Management and Continuous Monitoring
 
Completing fedramp-security-authorization-process
Completing fedramp-security-authorization-processCompleting fedramp-security-authorization-process
Completing fedramp-security-authorization-process
 
Security Management | System Administration
Security Management | System AdministrationSecurity Management | System Administration
Security Management | System Administration
 
Metric stream elevating your compliance program with technology
Metric stream elevating your compliance program with technologyMetric stream elevating your compliance program with technology
Metric stream elevating your compliance program with technology
 
Developing a Continuous Monitoring Action Plan
Developing a Continuous Monitoring Action PlanDeveloping a Continuous Monitoring Action Plan
Developing a Continuous Monitoring Action Plan
 
Qa Financials - 10 Smart Controls for Software Development
Qa Financials  - 10 Smart Controls for Software DevelopmentQa Financials  - 10 Smart Controls for Software Development
Qa Financials - 10 Smart Controls for Software Development
 

Similar a Lunch and Learn: June 29, 2010

Data Security Service Offering-v3
Data Security Service Offering-v3Data Security Service Offering-v3
Data Security Service Offering-v3Abe Newton
 
Webinar: How to Ace Your SaaS-based EDC System Validation for Sponsors and CROs
Webinar: How to Ace Your SaaS-based EDC System Validation for Sponsors and CROsWebinar: How to Ace Your SaaS-based EDC System Validation for Sponsors and CROs
Webinar: How to Ace Your SaaS-based EDC System Validation for Sponsors and CROsStatistics & Data Corporation
 
Info Security & PCI(original)
Info Security & PCI(original)Info Security & PCI(original)
Info Security & PCI(original)NCTechSymposium
 
Information Security Program & PCI Compliance Planning for your Business
Information Security Program & PCI Compliance Planning for your BusinessInformation Security Program & PCI Compliance Planning for your Business
Information Security Program & PCI Compliance Planning for your BusinessLaura Perry
 
Microsoft Windows 7 Enhanced Security And Control
Microsoft Windows 7 Enhanced Security And ControlMicrosoft Windows 7 Enhanced Security And Control
Microsoft Windows 7 Enhanced Security And ControlMicrosoft TechNet
 
Critical Security And Compliance Issues In Internet Banking
Critical Security And Compliance Issues In Internet BankingCritical Security And Compliance Issues In Internet Banking
Critical Security And Compliance Issues In Internet BankingThomas Donofrio
 
Comptia security-sy0-401
Comptia security-sy0-401Comptia security-sy0-401
Comptia security-sy0-401pgupta101
 
SAP Security & Compliance Audits. Find your vulnerabilities before you get hu...
SAP Security & Compliance Audits. Find your vulnerabilities before you get hu...SAP Security & Compliance Audits. Find your vulnerabilities before you get hu...
SAP Security & Compliance Audits. Find your vulnerabilities before you get hu...akquinet enterprise solutions GmbH
 
How much does it cost to be Secure?
How much does it cost to be Secure?How much does it cost to be Secure?
How much does it cost to be Secure?mbmobile
 
Securing control systems v0.4
Securing control systems v0.4Securing control systems v0.4
Securing control systems v0.4CrispnCrunch
 
Securing Call Center Recordings Webinar 4 16 09
Securing Call Center Recordings Webinar 4 16 09Securing Call Center Recordings Webinar 4 16 09
Securing Call Center Recordings Webinar 4 16 09Ginney McAdams
 
SharePoint Governance and Compliance
SharePoint Governance and ComplianceSharePoint Governance and Compliance
SharePoint Governance and ComplianceSPC Adriatics
 
SharePoint Governance and Compliance
SharePoint Governance and ComplianceSharePoint Governance and Compliance
SharePoint Governance and ComplianceAlistair Pugin
 
Symantec control compliance suite
Symantec control compliance suiteSymantec control compliance suite
Symantec control compliance suiteSymantec
 
Security Readiness Profile
Security Readiness ProfileSecurity Readiness Profile
Security Readiness Profilepds2k.com
 

Similar a Lunch and Learn: June 29, 2010 (20)

Data Security Service Offering-v3
Data Security Service Offering-v3Data Security Service Offering-v3
Data Security Service Offering-v3
 
It Audit And Forensics
It Audit And ForensicsIt Audit And Forensics
It Audit And Forensics
 
Webinar: How to Ace Your SaaS-based EDC System Validation for Sponsors and CROs
Webinar: How to Ace Your SaaS-based EDC System Validation for Sponsors and CROsWebinar: How to Ace Your SaaS-based EDC System Validation for Sponsors and CROs
Webinar: How to Ace Your SaaS-based EDC System Validation for Sponsors and CROs
 
Info Security & PCI(original)
Info Security & PCI(original)Info Security & PCI(original)
Info Security & PCI(original)
 
Information Security Program & PCI Compliance Planning for your Business
Information Security Program & PCI Compliance Planning for your BusinessInformation Security Program & PCI Compliance Planning for your Business
Information Security Program & PCI Compliance Planning for your Business
 
The Information Office
The Information OfficeThe Information Office
The Information Office
 
David Whitaker: Managing Your Vendors
David Whitaker: Managing Your VendorsDavid Whitaker: Managing Your Vendors
David Whitaker: Managing Your Vendors
 
Microsoft Windows 7 Enhanced Security And Control
Microsoft Windows 7 Enhanced Security And ControlMicrosoft Windows 7 Enhanced Security And Control
Microsoft Windows 7 Enhanced Security And Control
 
Critical Security And Compliance Issues In Internet Banking
Critical Security And Compliance Issues In Internet BankingCritical Security And Compliance Issues In Internet Banking
Critical Security And Compliance Issues In Internet Banking
 
Comptia security-sy0-401
Comptia security-sy0-401Comptia security-sy0-401
Comptia security-sy0-401
 
SAP Security & Compliance Audits. Find your vulnerabilities before you get hu...
SAP Security & Compliance Audits. Find your vulnerabilities before you get hu...SAP Security & Compliance Audits. Find your vulnerabilities before you get hu...
SAP Security & Compliance Audits. Find your vulnerabilities before you get hu...
 
In sync10 grc_suite
In sync10 grc_suiteIn sync10 grc_suite
In sync10 grc_suite
 
Corporate Cyber Program
Corporate Cyber ProgramCorporate Cyber Program
Corporate Cyber Program
 
How much does it cost to be Secure?
How much does it cost to be Secure?How much does it cost to be Secure?
How much does it cost to be Secure?
 
Securing control systems v0.4
Securing control systems v0.4Securing control systems v0.4
Securing control systems v0.4
 
Securing Call Center Recordings Webinar 4 16 09
Securing Call Center Recordings Webinar 4 16 09Securing Call Center Recordings Webinar 4 16 09
Securing Call Center Recordings Webinar 4 16 09
 
SharePoint Governance and Compliance
SharePoint Governance and ComplianceSharePoint Governance and Compliance
SharePoint Governance and Compliance
 
SharePoint Governance and Compliance
SharePoint Governance and ComplianceSharePoint Governance and Compliance
SharePoint Governance and Compliance
 
Symantec control compliance suite
Symantec control compliance suiteSymantec control compliance suite
Symantec control compliance suite
 
Security Readiness Profile
Security Readiness ProfileSecurity Readiness Profile
Security Readiness Profile
 

Último

Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 

Último (20)

Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 

Lunch and Learn: June 29, 2010

  • 1.
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10. Automation Reduces Audit Costs and Improves Outcomes Symantec Control Compliance Suite 10.0 * Based on a survey of 3,280 companies Source: IT Policy Compliance Group Automation increases audit frequency which reduces risk 0 1 2 3 4 5 6 7 Least mature Most mature Months between assessments Mature organizations use automation to reduce costs by up to 54% Least mature Most mature Relative spend on regulatory compliance 0% 20% 40% 60% 80% 100% 54% less
  • 11.
  • 12.
  • 13. Symantec Control Compliance Suite Symantec Confidential
  • 14.
  • 15.
  • 16. Written Policy Management Symantec Confidential Display Evidence Demonstrate Coverage Distribute Define Written Policy
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.

Notas del editor

  1. In talking to our customers we have found that their compliance challenges typically fall into these 3 categories (1) IT Risks (2) Regulatory or Compliance Readiness (3) Security and Compliance Costs: IT Risks Security threats are growing in number and sophistication Large complex IT infrastructures make it difficult to control deviations from standards or configuration drift Most of our customers have to comply with a growing number of industry regulations and internal mandates For example, today’s average enterprise is exploring 17 standards and frameworks, according to Symantec’s 2010 State of the Enterprise Security study Audit Readiness Many companies we speak to have challenges providing auditable evidence of their compliance posture and are simply not confident of passing upcoming audits They realize the need to increase the frequency of compliance assessments but this is a costly proposition when compliance processes are handled manually Security and Compliance Costs Many companies we speak to still resort to checklists and ad hoc controls Most still have a silo’d approach towards compliance, with overlapping regulatory requirements leading to redundant efforts because of IT control overlaps This leads to overspending on the audit process in order to eventually pass – the IT Policy Compliance Group notes that 70% are spending 2x more on audits than needed (IT Policy Compliance Group 2008 Annual Report - Independent research consortium made up of over 3,000 members and 26 advisory firms. This benchmark research was conducted with over 2,600 firms – 90% of which were located in North America.)
  2. Compliance also costs real money on an on-going basis Boeing paid $165M to pass its SOX audit from 2004 through 2007: three and a half times more than similar Aerospace companies They needed 1 audit firm and 2 consulting firms to assist in closing the gap for SOX The root problems uncovered by these SOX 404 controls tests were inconsistent information security policies, procedures and controls Boeing is not alone: 70% of organizations are spending twice as much as is necessary to pass audits according to the IT Policy Compliance Group The connection between information security and audit has been proven from recent research: organizations who are not doing anything about audit are the same organizations experiencing the highest levels of data loss and theft (IT Policy Compliance Group)
  3. Automation can not only reduce compliance costs but also IT risks The graph on the left shows how automation can facilitate more frequent audit checks which ultimately reduces risk amongst the most mature companies. The risks we are referring to include theft or loss of customer data, compliance deficiencies that must be corrected to pass an audit and business downtime from IT disruptions/failures Audit costs are a function of 3 things (1) # of controls you need to evaluate (2) frequency of evaluation (3) # of times you run controls/fix errors before you become compliant The graph on the right shows that as companies move from low maturity to high maturity initially the cost of compliance increases. This is because of two things Firstly, immature companies typically use multiple point solutions to manage policies, assets and distribute questionnaires driving up costs Secondly as a company moves along the maturity curve they tend to assess controls more frequently which also drives up costs It’s only when a they consolidate efforts under one automated compliance solution that they can reduce these costs by up to 54%
  4. As you already know, Control Compliance Suite is a fully-automated solution designed to effectively manage your IT risk and compliance challenges at lower levels of cost and complexity CCS 10.0 delivers added value by providing even greater visibility into your IT risk and compliance posture for improved decision making This is achieved by integrating content awareness from Symantec Data Loss Prevention, adding advanced vulnerability assessment capabilities and providing the ability to automatically collect and manage data evidence from multiple external sources To compliment these capabilities, CCS 10.0 features dynamic Web-based dashboards making it possible to get the right information to the right people quickly and easily
  5. With CCS you can leverage a database of 125 sample policies and policy templates covering multiple best practice frameworks and industry regulations As regulations change have a team in TX who monitor changes and translate into technical and procedural control statements so you don’t have to (feed live updates quarterly) CCS is purpose-built to manage the full policy lifecycle: define, review, input, approval & distribution It includes a policy “map” view that provides visual representation of what policies align to which regulations and frameworks, so that you can quickly identify any gaps You can also define a superset of control requirements across multiple regulations, frameworks and policies enabling you to avoid control overlaps and prioritize these high value controls
  6. Policy Manager does 4 key things: Define written policies (with CCS 8.5 we also ship with many pre-built policy templates) Electronically distribute these policies and track acceptances/exceptions Demonstrate coverage of mandated control objectives. Collect evidence and report on compliance levels.
  7. CCS Standards Manager uses proven, trusted BindView and ESM technologies, developed over 12+ years of experience Standards Manger allows you to determine which IT controls are needed and map them to external regulations/ best practices and internal policies You can leverage best in class pre-packaged content - we have over 2,900 control statements mapped to thousands of technical and procedural controls Standards Manger features an Entitlements Module that automatically reviews entitlements to sensitive data – you can even set up periodic review and approval cycles to ensure permissions granted to sensitive data are tracked over time You can automatically identify any deviations from technical standards or configuration drift (for networked servers/ desktops/ databases/directories) It also gathers compliance evidence via a flexible agent-based or agentless method so you can answer key questions like “Which accounts lack passwords or have weak or expired passwords?” “When was the last time each application on each machine was updated?”
  8. CCS VM delivers end to end discovery and vulnerability assessment of Web applications, databases, servers and other network devices It includes vulnerability detection for AJAX and Web 2.0 applications Features vulnerability content for most popular database management systems - MySQL®, Sybase®,Informix®, Oracle®, PostgreSQL and others You can map out your extended network identifying threats from both managed and unmanaged devices to gain a single view of security threats across IT infrastructure (chaining) A unique risk scoring algorithm provides insight into whether or not a vulnerability is exploitable CCS VM includes support for Supervisory Control and Data Acquisition (SCADA) systems (critical for NERC initiatives)
  9. RAM automates the assessment of procedural controls governing employee behavior We offers out of the box, comprehensive coverage for 60+ regulations, frameworks & best practices that are translated into questionnaires to assess the effectiveness of your procedural controls… so you don’t have to RAM uses a web-based survey tool with analytical capabilities that allows you to poll business owners on the completion of required procedures It integrates with Active Directory so you can filter who you survey You can conduct risk-weighted surveys, viewing and sorting responses by any variable, such as asset, respondent, regulation, policy or procedure and then rank deficiencies based on risk Following the distribution of new policies you can track responses such as acceptances, clarification requests and exception requests RAM facilitates more frequent evaluation of your procedural controls, improving you risk and compliance posture Usage scenarios include: conducting security awareness training to track retention of policies and procedures/ conducting vendor assessments to ensure appropriate safe-handling of controls and procedures for PII and other confidential information
  10. Symantec DLP is now tightly integrated with CCS 10.0 so you can ensure IT assets with the most sensitive information comply with security and regulatory policies Symantec DLP scans networks, endpoints and servers to locate sensitive data and sends incident and asset data back to CCS for analysis and review CCS then creates an asset group by tagging these assets with sensitive information so you can prioritize them for technical controls evaluations and elevate hardening measures accordingly
  11. CCS 10.0 features highly customizable dashboards allowing you to select from multiple panel views and filtering options, build actionable reports, and drill down to granular data to discover root causes and isolate problem areas. For example, you can deliver reports that show the percentage of systems in compliance with security standards for each business unit while allowing users to see exactly which servers met or failed to meet standards Dashboards combine data gathered from all assets, data sets, controls and policies in one location to facilitate comprehensive analysis of your IT risk and compliance posture Since there is no additional software required—these browser-based dashboards ensure low-cost, low-risk end-user deployment
  12. CCS allows you to prioritize remediation efforts based on risk and the importance of the asset so you focus on fixing the most critical deviations first CCS quantifies risk based on the industry-standard risk-scoring algorithm – the Common Vulnerability Scoring System (CVSS). Based on a range of 1-10 – high risk assets like PCI servers have a higher risk score You can also assign a compliance score – the higher the score is the more important it is that the asset be in compliance (e.g. could set a compliance score of 99% for external facing web server but lower for print server) CCS offers out-of-the-box integration with Symantec’s Altiris Service Desk 7 – closed loop remediation. Once CCS detects a compliance failure you can initiate automated remediation ticketing where tickets are created on the back end and automatically verified when closed CCS delivers open-loop remediation with other popular systems (Remedy, HP Service Desk) – assisted ticket creation via API This triggered workflow reduces burden on helpdesks and ensures quicker response