SlideShare una empresa de Scribd logo
1 de 22
Descargar para leer sin conexión
Developing a 360° view of risk and compliance
Michael Aminzade, Trustwave

© 2013 Trustwave Holdings, Inc.

1
Who We Are
WHO WE ARE
Company facts and figures
ESTABLISHED

1995

TRUSTED

BY OVER

2.5 MILLION BUSINESSES

GROWING

NOW OVER

1,200 EMPLOYEES

GLOBAL

CUSTOMERS IN
INNOVATING

OVER

50

96

COUNTIRES

PATENTS & COUNTING

Selected by more
enterprises for
compliance – chosen
more often than the
next 10 service
providers combined
Global Threat
Database feeds
technologies and
services with threat
intelligence
Industry’s most
holistic portfolio of
security technologies
delivered through
TrustKeeper®

*+30 patents granted; +20 patents pending

© 2013 Trustwave Holdings, Inc.

2
WHAT WE DO
Data Security and Compliance
Compliance on Demand
• Cloud-based Management
• Multi-compliance Framework
• Risk Assessment Services

Intelligence on Demand
• Managed Security Testing (MST)
• Incident Response and Readiness
• Research & Advisory

Security on Demand
• Complete Managed Service Portfolio
• Advanced Threat Correlation
• Global Operations Centers

© 2013 Trustwave Holdings, Inc.

3
AWARD-WINNING PORTFOLIO
MANAGED SECURITY SERVICES

SECURITY MANAGEMENT

Leader in Managed Security Services

Best Enterprise Security Solution (SIEM)

MSSP Growth Leadership Award
Best Managed Security Service (finalist)

Best Security Information/Event Manager Appliance
(SIEM) (finalist)

Best Global Security Company (finalist)

Best Integrated Security Solution (SIEM) (finalist)

TECHNOLOGIES

INNOVATIONS

Best Anti-Malware Solution

Innovation Award (Trustwave TrustKeeper)

Web Content Filtering Award for Secure Web Gateway

Innovation Award (PenTest Manager)

Best Network Access Control Product

Innovator (Data Loss Prevention)

Best Network Security (Web Application Firewall) (finalist)

Best Regulatory Compliance Solution (finalist)
Best Fraud Prevention (DLP, ENC, NAC, SIEM) (finalist)

© 2013 Trustwave Holdings, Inc.

4
PROMINENT THOUGHT LEADERSHIP
2013 GLOBAL SECURITY REPORT
Based on analysis of:
• More than 450 incident response
investigations and 2,500 pen tests
• More than 2 million network and
application vulnerability scans
• More than 400 Web-based data
breaches
• More than 20 billion e-mails
And contributions from law
enforcement agencies worldwide.

Download the full report: https://www.trustwave.com/2013GSR

© 2013 Trustwave Holdings, Inc.

5
UNDERSTAND
YOUR THREAT
LANDSCAPE
© 2013 Trustwave Holdings, Inc.

6
THE BIG PICTURE
Trustwave proprietary data & threat intelligence

>450
>2M
>9M
>20B

INCIDENT
RESPONSE
& FORENSIC
INVESTIGATIONS

NETWORK &
APPLICATION
VULNERABILITY
SCANS

WEB APPLICATION
ATTACKS
RESEARCHED

EMAILS COLLECTED
FROM 2007 TO 2012

>2500
>5M
~400
>3M

© 2013 Trustwave Holdings, Inc.

PENETRATION
TESTS

MALICIOUS WEBSITES
ANALYZED

PUBLICLY DISCLOSED
WEB BREACHES
IN 2012 ANALYZED

REAL-WORLD
PASSWORDS ANALYZED
FOR USAGE &
WEAKNESS TRENDS

7
THE BIG PICTURE
A global problem

© 2013 Trustwave Holdings, Inc.

8
GET THERE FIRST: THREAT INTELLIGENCE
Businesses slow to detect

TIMELINE: INTRUSTION TO CONTAINMENT

AVERAGE: 210 DAYS TO DETECTION

© 2013 Trustwave Holdings, Inc.

9
MOST ATTACKED: APPLICATIONS
Web & Mobile applications

© 2013 Trustwave Holdings, Inc.

10
UP & COMING: MOBILE DEVICES
Mobile Malware exploded

2012

400%
© 2013 Trustwave Holdings, Inc.

11
WEAKEST LINK: EMPLOYEES & USERS
Top 25 passwords

© 2013 Trustwave Holdings, Inc.

12
WEAKEST LINK: EMPLOYEES & USERS
Keyword usage in passwords

© 2013 Trustwave Holdings, Inc.

13
MANAGING
RISK IN YOUR
ORGANISATION
© 2013 Trustwave Holdings, Inc.

14
TODAY’S SECURITY LANDSCAPE
BUSINESS ENABLERS
Web & Social
Media

CYBERCRIME

Mobile &
BYOD

REGULATIONS
Web & Mobile
Applications

Big Data

BREACHES

© 2013 Trustwave Holdings, Inc.

15
HOW MUCH RISK ARE YOU WILLING TO ACCEPT?

© 2013 Trustwave Holdings, Inc.

16
360°: POTENTIAL AREAS OF RISK
Management and
Governance

Policy and
Procedure

Business Strategy

Your organisation

Security
Maintenance

Technical
Controls

Physical Security

© 2013 Trustwave Holdings, Inc.

17
ARE YOU ASKING THE RIGHT QUESTIONS?
MANAGEMENT & GOVERNANCE
What is your senior
managements level of
involvement in defining your
level of risk and are the
necessary disaster recovery
measures in place?

TECHNICAL CONTROLS
Do you have the necessary
technical solutions and
controls in place to prevent
unauthorised access to your
systems and data?

POLICY & PROCEDURE
Do you have the structures in
place to enable your
employees to report security
incidents and are you fully
aware of your legal
responsibilities?

PHYSICAL SECURITY
How do you monitor and
control physical access to
your business critical
locations and data storage
centres?

© 2013 Trustwave Holdings, Inc.

SECURITY MAINTENANCE
How often do you assess and
test your business critical
applications and systems and
do you have a change control
structure in place?

BUSINESS STRATEGY
Do you store and process
sensitive data and how do you
manage access to that
information for either remote
employees or third-party
vendors?

18
RISK
MATURITY
ASSESSMENT
© 2013 Trustwave Holdings, Inc.

19
TRUSTWAVE RISK MATURITY ASSESSMENT
Understand your current level of risk
WHAT IS THE TRUSTWAVE RISK MATURITY ASSESSMENT
•

Online multiple choice questionnaire, taking no more
than 5 - 10 minutes to complete

•

Developed by our experienced RISK consultants as a
result of customer feedback

WHY TAKE THE TRUSTWAVE RISK MATURITY ASSESSMENT
•

A detailed report with customised recommendations to
help you identify areas of risk across your organisation

•

Benchmark your organisation against industry standards
and best practices

Take your complimentary risk assessment today:
https://www2.trustwave.com/risk-maturity-assessment.html?ls=EBF

© 2013 Trustwave Holdings, Inc.

20
WANT TO KNOW MORE?

Contact our distributor in Sweden:
Inuit AB
www.inuit.se
sales@inuit.se
+46 (0)8 753 05 10

© 2013 Trustwave Holdings, Inc.

21
THANK YOU.
QUESTIONS?

© 2013 Trustwave Holdings, Inc.

22

Más contenido relacionado

La actualidad más candente

Global Cybersecurity Consulting Firm
Global Cybersecurity Consulting FirmGlobal Cybersecurity Consulting Firm
Global Cybersecurity Consulting Firmwilsonconsulting1
 
Marlabs Capabilities Overview: Cyber Security Services
Marlabs Capabilities Overview: Cyber Security Services Marlabs Capabilities Overview: Cyber Security Services
Marlabs Capabilities Overview: Cyber Security Services Marlabs
 
Super CISO 2020: How to Keep Your Job
Super CISO 2020: How to Keep Your JobSuper CISO 2020: How to Keep Your Job
Super CISO 2020: How to Keep Your JobPriyanka Aash
 
Security Program Development for the Hipster Company
Security Program Development for the Hipster CompanySecurity Program Development for the Hipster Company
Security Program Development for the Hipster CompanyPriyanka Aash
 
Seen at InfoSec Europe 2015: Spot your Snowden!
Seen at InfoSec Europe 2015: Spot your Snowden!Seen at InfoSec Europe 2015: Spot your Snowden!
Seen at InfoSec Europe 2015: Spot your Snowden!John Wallix
 
To MSSP or not to MSSP IISF 2015
To MSSP or not to MSSP IISF 2015To MSSP or not to MSSP IISF 2015
To MSSP or not to MSSP IISF 2015Paul Hogan
 
Scott Hogg - Gtri cloud security knowledge and certs
Scott Hogg - Gtri cloud security knowledge and certsScott Hogg - Gtri cloud security knowledge and certs
Scott Hogg - Gtri cloud security knowledge and certsTrish McGinity, CCSK
 
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware ProblemThe Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware ProblemEric Vanderburg
 
The Measure of Success: Security Metrics to Tell Your Story
The Measure of Success: Security Metrics to Tell Your StoryThe Measure of Success: Security Metrics to Tell Your Story
The Measure of Success: Security Metrics to Tell Your StoryPriyanka Aash
 
Security Operation Center Fundamental
Security Operation Center FundamentalSecurity Operation Center Fundamental
Security Operation Center FundamentalAmir Hossein Zargaran
 
Managed Cyber Security Services
Managed Cyber Security ServicesManaged Cyber Security Services
Managed Cyber Security ServicesMichael Bowers
 
Cybersecurity Series SEIM Log Analysis
Cybersecurity Series  SEIM Log AnalysisCybersecurity Series  SEIM Log Analysis
Cybersecurity Series SEIM Log AnalysisJim Kaplan CIA CFE
 
Finding and Protecting Your Organizations Crown Jewels
Finding and Protecting Your Organizations Crown JewelsFinding and Protecting Your Organizations Crown Jewels
Finding and Protecting Your Organizations Crown JewelsDoug Landoll
 
[ON-DEMAND WEBINAR] Managed Service Providers vs Managed Security Service Pro...
[ON-DEMAND WEBINAR] Managed Service Providers vs Managed Security Service Pro...[ON-DEMAND WEBINAR] Managed Service Providers vs Managed Security Service Pro...
[ON-DEMAND WEBINAR] Managed Service Providers vs Managed Security Service Pro...Rea & Associates
 
Big Data Analytics for Cyber Security: A Quick Overview
Big Data Analytics for Cyber Security: A Quick OverviewBig Data Analytics for Cyber Security: A Quick Overview
Big Data Analytics for Cyber Security: A Quick OverviewFemi Ashaye
 
5 Steps to Securing Your Company's Crown Jewels
5 Steps to Securing Your Company's Crown Jewels5 Steps to Securing Your Company's Crown Jewels
5 Steps to Securing Your Company's Crown JewelsIBM Security
 
Cybersecurity: Quick Preparedness Assessment
Cybersecurity: Quick Preparedness AssessmentCybersecurity: Quick Preparedness Assessment
Cybersecurity: Quick Preparedness AssessmentCBIZ, Inc.
 
The Real Costs of SIEM vs. Managed Security Service
The Real Costs of SIEM vs. Managed Security ServiceThe Real Costs of SIEM vs. Managed Security Service
The Real Costs of SIEM vs. Managed Security ServiceF-Secure Corporation
 
20161021 JS Cybersecurity Service Proposal
20161021 JS Cybersecurity Service Proposal20161021 JS Cybersecurity Service Proposal
20161021 JS Cybersecurity Service ProposalCarl Bradley Pate
 
The State Of Information and Cyber Security in 2016
The State Of Information and Cyber Security in 2016The State Of Information and Cyber Security in 2016
The State Of Information and Cyber Security in 2016Shannon G., MBA
 

La actualidad más candente (20)

Global Cybersecurity Consulting Firm
Global Cybersecurity Consulting FirmGlobal Cybersecurity Consulting Firm
Global Cybersecurity Consulting Firm
 
Marlabs Capabilities Overview: Cyber Security Services
Marlabs Capabilities Overview: Cyber Security Services Marlabs Capabilities Overview: Cyber Security Services
Marlabs Capabilities Overview: Cyber Security Services
 
Super CISO 2020: How to Keep Your Job
Super CISO 2020: How to Keep Your JobSuper CISO 2020: How to Keep Your Job
Super CISO 2020: How to Keep Your Job
 
Security Program Development for the Hipster Company
Security Program Development for the Hipster CompanySecurity Program Development for the Hipster Company
Security Program Development for the Hipster Company
 
Seen at InfoSec Europe 2015: Spot your Snowden!
Seen at InfoSec Europe 2015: Spot your Snowden!Seen at InfoSec Europe 2015: Spot your Snowden!
Seen at InfoSec Europe 2015: Spot your Snowden!
 
To MSSP or not to MSSP IISF 2015
To MSSP or not to MSSP IISF 2015To MSSP or not to MSSP IISF 2015
To MSSP or not to MSSP IISF 2015
 
Scott Hogg - Gtri cloud security knowledge and certs
Scott Hogg - Gtri cloud security knowledge and certsScott Hogg - Gtri cloud security knowledge and certs
Scott Hogg - Gtri cloud security knowledge and certs
 
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware ProblemThe Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
 
The Measure of Success: Security Metrics to Tell Your Story
The Measure of Success: Security Metrics to Tell Your StoryThe Measure of Success: Security Metrics to Tell Your Story
The Measure of Success: Security Metrics to Tell Your Story
 
Security Operation Center Fundamental
Security Operation Center FundamentalSecurity Operation Center Fundamental
Security Operation Center Fundamental
 
Managed Cyber Security Services
Managed Cyber Security ServicesManaged Cyber Security Services
Managed Cyber Security Services
 
Cybersecurity Series SEIM Log Analysis
Cybersecurity Series  SEIM Log AnalysisCybersecurity Series  SEIM Log Analysis
Cybersecurity Series SEIM Log Analysis
 
Finding and Protecting Your Organizations Crown Jewels
Finding and Protecting Your Organizations Crown JewelsFinding and Protecting Your Organizations Crown Jewels
Finding and Protecting Your Organizations Crown Jewels
 
[ON-DEMAND WEBINAR] Managed Service Providers vs Managed Security Service Pro...
[ON-DEMAND WEBINAR] Managed Service Providers vs Managed Security Service Pro...[ON-DEMAND WEBINAR] Managed Service Providers vs Managed Security Service Pro...
[ON-DEMAND WEBINAR] Managed Service Providers vs Managed Security Service Pro...
 
Big Data Analytics for Cyber Security: A Quick Overview
Big Data Analytics for Cyber Security: A Quick OverviewBig Data Analytics for Cyber Security: A Quick Overview
Big Data Analytics for Cyber Security: A Quick Overview
 
5 Steps to Securing Your Company's Crown Jewels
5 Steps to Securing Your Company's Crown Jewels5 Steps to Securing Your Company's Crown Jewels
5 Steps to Securing Your Company's Crown Jewels
 
Cybersecurity: Quick Preparedness Assessment
Cybersecurity: Quick Preparedness AssessmentCybersecurity: Quick Preparedness Assessment
Cybersecurity: Quick Preparedness Assessment
 
The Real Costs of SIEM vs. Managed Security Service
The Real Costs of SIEM vs. Managed Security ServiceThe Real Costs of SIEM vs. Managed Security Service
The Real Costs of SIEM vs. Managed Security Service
 
20161021 JS Cybersecurity Service Proposal
20161021 JS Cybersecurity Service Proposal20161021 JS Cybersecurity Service Proposal
20161021 JS Cybersecurity Service Proposal
 
The State Of Information and Cyber Security in 2016
The State Of Information and Cyber Security in 2016The State Of Information and Cyber Security in 2016
The State Of Information and Cyber Security in 2016
 

Destacado

Destacado (20)

Letter of recommendation
Letter of recommendationLetter of recommendation
Letter of recommendation
 
Astley re kelly study
Astley re kelly studyAstley re kelly study
Astley re kelly study
 
Taulukko väestöstä 3
Taulukko väestöstä 3Taulukko väestöstä 3
Taulukko väestöstä 3
 
Email
EmailEmail
Email
 
Ailyn
AilynAilyn
Ailyn
 
Entering into the UAE Final Copy (2)
Entering into the UAE Final Copy (2)Entering into the UAE Final Copy (2)
Entering into the UAE Final Copy (2)
 
Arpita CV New-1 (1)
Arpita CV New-1 (1)Arpita CV New-1 (1)
Arpita CV New-1 (1)
 
uPoGPpb.ppt
uPoGPpb.pptuPoGPpb.ppt
uPoGPpb.ppt
 
Mario Benedetti
Mario BenedettiMario Benedetti
Mario Benedetti
 
Dr. atkinson's message
Dr. atkinson's messageDr. atkinson's message
Dr. atkinson's message
 
15 pomysłów na Wielkanoc
15 pomysłów na Wielkanoc15 pomysłów na Wielkanoc
15 pomysłów na Wielkanoc
 
archana.MCA (exp)
archana.MCA (exp)archana.MCA (exp)
archana.MCA (exp)
 
Designing 4 Disabilities
Designing 4 DisabilitiesDesigning 4 Disabilities
Designing 4 Disabilities
 
CV-NERMIN AKBAS
CV-NERMIN AKBASCV-NERMIN AKBAS
CV-NERMIN AKBAS
 
Viamente GPS & Driver Behavior
Viamente GPS & Driver Behavior Viamente GPS & Driver Behavior
Viamente GPS & Driver Behavior
 
Alissa Mickelson
Alissa MickelsonAlissa Mickelson
Alissa Mickelson
 
Amelita
AmelitaAmelita
Amelita
 
Turbó fokozat
Turbó fokozatTurbó fokozat
Turbó fokozat
 
Swan.bolouri
Swan.bolouriSwan.bolouri
Swan.bolouri
 
Notiplastic agosto 2014
Notiplastic agosto 2014Notiplastic agosto 2014
Notiplastic agosto 2014
 

Similar a Developing a 360° view of risk and compliance

MCGlobalTech Service Presentation
MCGlobalTech Service PresentationMCGlobalTech Service Presentation
MCGlobalTech Service PresentationWilliam McBorrough
 
CYBER-i Corporate Dossier
CYBER-i Corporate Dossier  CYBER-i Corporate Dossier
CYBER-i Corporate Dossier AGC Networks Ltd
 
Luncheon 2015-06-18 Security Industry 2.0: Survival in the Boardroom by David...
Luncheon 2015-06-18 Security Industry 2.0: Survival in the Boardroom by David...Luncheon 2015-06-18 Security Industry 2.0: Survival in the Boardroom by David...
Luncheon 2015-06-18 Security Industry 2.0: Survival in the Boardroom by David...North Texas Chapter of the ISSA
 
MCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationMCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationWilliam McBorrough
 
SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)Norm Barber
 
Cyber Security Demistyified
Cyber Security DemistyifiedCyber Security Demistyified
Cyber Security DemistyifiedMicrosoft UK
 
Smart security solutions for SMBs
Smart security solutions for SMBsSmart security solutions for SMBs
Smart security solutions for SMBsJyothi Satyanathan
 
Cyberteq - Cyber Security for Telecom.pdf
Cyberteq - Cyber Security for Telecom.pdfCyberteq - Cyber Security for Telecom.pdf
Cyberteq - Cyber Security for Telecom.pdfssuser8717cc
 
Company Profile
Company ProfileCompany Profile
Company Profile3SC World
 
CipherCloud_Corporate Overview
CipherCloud_Corporate OverviewCipherCloud_Corporate Overview
CipherCloud_Corporate OverviewScott Dierks
 
IT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSALIT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSALCYBER SENSE
 
Why Network and Endpoint Security Isn’t Enough
Why Network and Endpoint Security Isn’t EnoughWhy Network and Endpoint Security Isn’t Enough
Why Network and Endpoint Security Isn’t EnoughImperva
 
Journey to the Cloud: Securing Your AWS Applications - April 2015
Journey to the Cloud: Securing Your AWS Applications - April 2015Journey to the Cloud: Securing Your AWS Applications - April 2015
Journey to the Cloud: Securing Your AWS Applications - April 2015Alert Logic
 
GPS - Corporate Overview
GPS - Corporate OverviewGPS - Corporate Overview
GPS - Corporate OverviewTawnia Beckwith
 
Security_360_Marketing_Package
Security_360_Marketing_PackageSecurity_360_Marketing_Package
Security_360_Marketing_PackageRandy B.
 
Application Security: Safeguarding Data, Protecting Reputations
Application Security: Safeguarding Data, Protecting ReputationsApplication Security: Safeguarding Data, Protecting Reputations
Application Security: Safeguarding Data, Protecting ReputationsCognizant
 
Mobility Security - A Business-Centric Approach
Mobility Security - A Business-Centric ApproachMobility Security - A Business-Centric Approach
Mobility Security - A Business-Centric ApproachOmar Khawaja
 

Similar a Developing a 360° view of risk and compliance (20)

Application Hackers Have A Handbook. Why Shouldn't You?
Application Hackers Have A Handbook. Why Shouldn't You?Application Hackers Have A Handbook. Why Shouldn't You?
Application Hackers Have A Handbook. Why Shouldn't You?
 
MCGlobalTech Service Presentation
MCGlobalTech Service PresentationMCGlobalTech Service Presentation
MCGlobalTech Service Presentation
 
CYBER-i Corporate Dossier
CYBER-i Corporate Dossier  CYBER-i Corporate Dossier
CYBER-i Corporate Dossier
 
Luncheon 2015-06-18 Security Industry 2.0: Survival in the Boardroom by David...
Luncheon 2015-06-18 Security Industry 2.0: Survival in the Boardroom by David...Luncheon 2015-06-18 Security Industry 2.0: Survival in the Boardroom by David...
Luncheon 2015-06-18 Security Industry 2.0: Survival in the Boardroom by David...
 
MCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationMCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service Presentation
 
SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)
 
Cyber Security Demistyified
Cyber Security DemistyifiedCyber Security Demistyified
Cyber Security Demistyified
 
Cyberlink Deck
Cyberlink DeckCyberlink Deck
Cyberlink Deck
 
Smart security solutions for SMBs
Smart security solutions for SMBsSmart security solutions for SMBs
Smart security solutions for SMBs
 
Cyberteq - Cyber Security for Telecom.pdf
Cyberteq - Cyber Security for Telecom.pdfCyberteq - Cyber Security for Telecom.pdf
Cyberteq - Cyber Security for Telecom.pdf
 
Company Profile
Company ProfileCompany Profile
Company Profile
 
CipherCloud_Corporate Overview
CipherCloud_Corporate OverviewCipherCloud_Corporate Overview
CipherCloud_Corporate Overview
 
Secure Iowa Oct 2016
Secure Iowa Oct 2016Secure Iowa Oct 2016
Secure Iowa Oct 2016
 
IT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSALIT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSAL
 
Why Network and Endpoint Security Isn’t Enough
Why Network and Endpoint Security Isn’t EnoughWhy Network and Endpoint Security Isn’t Enough
Why Network and Endpoint Security Isn’t Enough
 
Journey to the Cloud: Securing Your AWS Applications - April 2015
Journey to the Cloud: Securing Your AWS Applications - April 2015Journey to the Cloud: Securing Your AWS Applications - April 2015
Journey to the Cloud: Securing Your AWS Applications - April 2015
 
GPS - Corporate Overview
GPS - Corporate OverviewGPS - Corporate Overview
GPS - Corporate Overview
 
Security_360_Marketing_Package
Security_360_Marketing_PackageSecurity_360_Marketing_Package
Security_360_Marketing_Package
 
Application Security: Safeguarding Data, Protecting Reputations
Application Security: Safeguarding Data, Protecting ReputationsApplication Security: Safeguarding Data, Protecting Reputations
Application Security: Safeguarding Data, Protecting Reputations
 
Mobility Security - A Business-Centric Approach
Mobility Security - A Business-Centric ApproachMobility Security - A Business-Centric Approach
Mobility Security - A Business-Centric Approach
 

Más de Inuit AB

PowerShell som ett verktyg för cyberattacker
PowerShell som ett verktyg för cyberattackerPowerShell som ett verktyg för cyberattacker
PowerShell som ett verktyg för cyberattackerInuit AB
 
5 reasons to use OpManager Plus
5 reasons to use OpManager Plus5 reasons to use OpManager Plus
5 reasons to use OpManager PlusInuit AB
 
IT asset management in ServiceDesk Plus
IT asset management in ServiceDesk PlusIT asset management in ServiceDesk Plus
IT asset management in ServiceDesk PlusInuit AB
 
New OpManager v12
New OpManager v12New OpManager v12
New OpManager v12Inuit AB
 
Sammanfattning av 2014 Trustwave Global Security Report
Sammanfattning av 2014 Trustwave Global Security Report Sammanfattning av 2014 Trustwave Global Security Report
Sammanfattning av 2014 Trustwave Global Security Report Inuit AB
 
Overcoming Cyber Attacks
Overcoming Cyber AttacksOvercoming Cyber Attacks
Overcoming Cyber AttacksInuit AB
 
Varför älskar kunderna ServiceDesk Plus?
Varför älskar kunderna ServiceDesk Plus?Varför älskar kunderna ServiceDesk Plus?
Varför älskar kunderna ServiceDesk Plus?Inuit AB
 
Applikationssäkerhet - Infographic
 Applikationssäkerhet - Infographic Applikationssäkerhet - Infographic
Applikationssäkerhet - InfographicInuit AB
 
Viktigt med processer för Luleå Tekniska Universitet
Viktigt med processer för Luleå Tekniska UniversitetViktigt med processer för Luleå Tekniska Universitet
Viktigt med processer för Luleå Tekniska UniversitetInuit AB
 
Inuit forum 1-2014 - Reportage från ManageEngine användarkonferens
Inuit forum 1-2014 - Reportage från ManageEngine användarkonferensInuit forum 1-2014 - Reportage från ManageEngine användarkonferens
Inuit forum 1-2014 - Reportage från ManageEngine användarkonferensInuit AB
 
Få kontroll över ärenden, resurser och processer med ServiceDesk Plus
Få kontroll över ärenden, resurser och processer med ServiceDesk PlusFå kontroll över ärenden, resurser och processer med ServiceDesk Plus
Få kontroll över ärenden, resurser och processer med ServiceDesk PlusInuit AB
 

Más de Inuit AB (11)

PowerShell som ett verktyg för cyberattacker
PowerShell som ett verktyg för cyberattackerPowerShell som ett verktyg för cyberattacker
PowerShell som ett verktyg för cyberattacker
 
5 reasons to use OpManager Plus
5 reasons to use OpManager Plus5 reasons to use OpManager Plus
5 reasons to use OpManager Plus
 
IT asset management in ServiceDesk Plus
IT asset management in ServiceDesk PlusIT asset management in ServiceDesk Plus
IT asset management in ServiceDesk Plus
 
New OpManager v12
New OpManager v12New OpManager v12
New OpManager v12
 
Sammanfattning av 2014 Trustwave Global Security Report
Sammanfattning av 2014 Trustwave Global Security Report Sammanfattning av 2014 Trustwave Global Security Report
Sammanfattning av 2014 Trustwave Global Security Report
 
Overcoming Cyber Attacks
Overcoming Cyber AttacksOvercoming Cyber Attacks
Overcoming Cyber Attacks
 
Varför älskar kunderna ServiceDesk Plus?
Varför älskar kunderna ServiceDesk Plus?Varför älskar kunderna ServiceDesk Plus?
Varför älskar kunderna ServiceDesk Plus?
 
Applikationssäkerhet - Infographic
 Applikationssäkerhet - Infographic Applikationssäkerhet - Infographic
Applikationssäkerhet - Infographic
 
Viktigt med processer för Luleå Tekniska Universitet
Viktigt med processer för Luleå Tekniska UniversitetViktigt med processer för Luleå Tekniska Universitet
Viktigt med processer för Luleå Tekniska Universitet
 
Inuit forum 1-2014 - Reportage från ManageEngine användarkonferens
Inuit forum 1-2014 - Reportage från ManageEngine användarkonferensInuit forum 1-2014 - Reportage från ManageEngine användarkonferens
Inuit forum 1-2014 - Reportage från ManageEngine användarkonferens
 
Få kontroll över ärenden, resurser och processer med ServiceDesk Plus
Få kontroll över ärenden, resurser och processer med ServiceDesk PlusFå kontroll över ärenden, resurser och processer med ServiceDesk Plus
Få kontroll över ärenden, resurser och processer med ServiceDesk Plus
 

Último

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 

Último (20)

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 

Developing a 360° view of risk and compliance

  • 1. Developing a 360° view of risk and compliance Michael Aminzade, Trustwave © 2013 Trustwave Holdings, Inc. 1
  • 2. Who We Are WHO WE ARE Company facts and figures ESTABLISHED 1995 TRUSTED BY OVER 2.5 MILLION BUSINESSES GROWING NOW OVER 1,200 EMPLOYEES GLOBAL CUSTOMERS IN INNOVATING OVER 50 96 COUNTIRES PATENTS & COUNTING Selected by more enterprises for compliance – chosen more often than the next 10 service providers combined Global Threat Database feeds technologies and services with threat intelligence Industry’s most holistic portfolio of security technologies delivered through TrustKeeper® *+30 patents granted; +20 patents pending © 2013 Trustwave Holdings, Inc. 2
  • 3. WHAT WE DO Data Security and Compliance Compliance on Demand • Cloud-based Management • Multi-compliance Framework • Risk Assessment Services Intelligence on Demand • Managed Security Testing (MST) • Incident Response and Readiness • Research & Advisory Security on Demand • Complete Managed Service Portfolio • Advanced Threat Correlation • Global Operations Centers © 2013 Trustwave Holdings, Inc. 3
  • 4. AWARD-WINNING PORTFOLIO MANAGED SECURITY SERVICES SECURITY MANAGEMENT Leader in Managed Security Services Best Enterprise Security Solution (SIEM) MSSP Growth Leadership Award Best Managed Security Service (finalist) Best Security Information/Event Manager Appliance (SIEM) (finalist) Best Global Security Company (finalist) Best Integrated Security Solution (SIEM) (finalist) TECHNOLOGIES INNOVATIONS Best Anti-Malware Solution Innovation Award (Trustwave TrustKeeper) Web Content Filtering Award for Secure Web Gateway Innovation Award (PenTest Manager) Best Network Access Control Product Innovator (Data Loss Prevention) Best Network Security (Web Application Firewall) (finalist) Best Regulatory Compliance Solution (finalist) Best Fraud Prevention (DLP, ENC, NAC, SIEM) (finalist) © 2013 Trustwave Holdings, Inc. 4
  • 5. PROMINENT THOUGHT LEADERSHIP 2013 GLOBAL SECURITY REPORT Based on analysis of: • More than 450 incident response investigations and 2,500 pen tests • More than 2 million network and application vulnerability scans • More than 400 Web-based data breaches • More than 20 billion e-mails And contributions from law enforcement agencies worldwide. Download the full report: https://www.trustwave.com/2013GSR © 2013 Trustwave Holdings, Inc. 5
  • 6. UNDERSTAND YOUR THREAT LANDSCAPE © 2013 Trustwave Holdings, Inc. 6
  • 7. THE BIG PICTURE Trustwave proprietary data & threat intelligence >450 >2M >9M >20B INCIDENT RESPONSE & FORENSIC INVESTIGATIONS NETWORK & APPLICATION VULNERABILITY SCANS WEB APPLICATION ATTACKS RESEARCHED EMAILS COLLECTED FROM 2007 TO 2012 >2500 >5M ~400 >3M © 2013 Trustwave Holdings, Inc. PENETRATION TESTS MALICIOUS WEBSITES ANALYZED PUBLICLY DISCLOSED WEB BREACHES IN 2012 ANALYZED REAL-WORLD PASSWORDS ANALYZED FOR USAGE & WEAKNESS TRENDS 7
  • 8. THE BIG PICTURE A global problem © 2013 Trustwave Holdings, Inc. 8
  • 9. GET THERE FIRST: THREAT INTELLIGENCE Businesses slow to detect TIMELINE: INTRUSTION TO CONTAINMENT AVERAGE: 210 DAYS TO DETECTION © 2013 Trustwave Holdings, Inc. 9
  • 10. MOST ATTACKED: APPLICATIONS Web & Mobile applications © 2013 Trustwave Holdings, Inc. 10
  • 11. UP & COMING: MOBILE DEVICES Mobile Malware exploded 2012 400% © 2013 Trustwave Holdings, Inc. 11
  • 12. WEAKEST LINK: EMPLOYEES & USERS Top 25 passwords © 2013 Trustwave Holdings, Inc. 12
  • 13. WEAKEST LINK: EMPLOYEES & USERS Keyword usage in passwords © 2013 Trustwave Holdings, Inc. 13
  • 14. MANAGING RISK IN YOUR ORGANISATION © 2013 Trustwave Holdings, Inc. 14
  • 15. TODAY’S SECURITY LANDSCAPE BUSINESS ENABLERS Web & Social Media CYBERCRIME Mobile & BYOD REGULATIONS Web & Mobile Applications Big Data BREACHES © 2013 Trustwave Holdings, Inc. 15
  • 16. HOW MUCH RISK ARE YOU WILLING TO ACCEPT? © 2013 Trustwave Holdings, Inc. 16
  • 17. 360°: POTENTIAL AREAS OF RISK Management and Governance Policy and Procedure Business Strategy Your organisation Security Maintenance Technical Controls Physical Security © 2013 Trustwave Holdings, Inc. 17
  • 18. ARE YOU ASKING THE RIGHT QUESTIONS? MANAGEMENT & GOVERNANCE What is your senior managements level of involvement in defining your level of risk and are the necessary disaster recovery measures in place? TECHNICAL CONTROLS Do you have the necessary technical solutions and controls in place to prevent unauthorised access to your systems and data? POLICY & PROCEDURE Do you have the structures in place to enable your employees to report security incidents and are you fully aware of your legal responsibilities? PHYSICAL SECURITY How do you monitor and control physical access to your business critical locations and data storage centres? © 2013 Trustwave Holdings, Inc. SECURITY MAINTENANCE How often do you assess and test your business critical applications and systems and do you have a change control structure in place? BUSINESS STRATEGY Do you store and process sensitive data and how do you manage access to that information for either remote employees or third-party vendors? 18
  • 20. TRUSTWAVE RISK MATURITY ASSESSMENT Understand your current level of risk WHAT IS THE TRUSTWAVE RISK MATURITY ASSESSMENT • Online multiple choice questionnaire, taking no more than 5 - 10 minutes to complete • Developed by our experienced RISK consultants as a result of customer feedback WHY TAKE THE TRUSTWAVE RISK MATURITY ASSESSMENT • A detailed report with customised recommendations to help you identify areas of risk across your organisation • Benchmark your organisation against industry standards and best practices Take your complimentary risk assessment today: https://www2.trustwave.com/risk-maturity-assessment.html?ls=EBF © 2013 Trustwave Holdings, Inc. 20
  • 21. WANT TO KNOW MORE? Contact our distributor in Sweden: Inuit AB www.inuit.se sales@inuit.se +46 (0)8 753 05 10 © 2013 Trustwave Holdings, Inc. 21
  • 22. THANK YOU. QUESTIONS? © 2013 Trustwave Holdings, Inc. 22