A Perfect Storm: More Security Threats and More Compliance Costs

Post on 24-May-2015

393 views 1 download

Tags:

description

We will cover… Perfect Storm of Compliance and Security Demands View into the Future of IT Compliance Next Practices for Security & Compliance Visibility, Intelligence, and Automation are Key

Transcript of A Perfect Storm: More Security Threats and More Compliance Costs

A Perfect Storm: MoreSecurity Threats andMore ComplianceCosts

A Perfect Storm: More Security Threats and More Compliance Costs Paul Reymann, CEO, ReymannGroup, Inc.

IT SECURITY & COMPLIANCE AUTOMATION

We will cover…

Perfect Storm of Compliance and Security Demands

View into the Future of IT Compliance

Next Practices for Security & Compliance

Visibility, Intelligence, and Automation are Key

IT SECURITY & COMPLIANCE AUTOMATION

Perfect Storm of Legislation & Compliance

Increasing role of NIST;

Licensing & certification standards;

Off-the-shelf product certification;

Automated & continuous security to detect, report, respond to, contain, & mitigate incidents.

SOX, FISMA, HIPAA,

GLBA, PCI

JSOX, MITS, EU,

ISO

HITECH Act, Dodd-Frank Act

Cyber Security Act

Cyber Enhancement Act

ICE Act

DATA

IT SECURITY & COMPLIANCE AUTOMATION5

IT SECURITY & COMPLIANCE AUTOMATION6

A More Challenging Environment

IT SECURITY & COMPLIANCE AUTOMATION

Des

ired

Sta

te

No Visibility

Drifting

High-riskTemporary

Success

Time

What Hasn’t Worked:Periodic Assessments Create Data But Limited Intelligence

IT SECURITY & COMPLIANCE AUTOMATION

Assess & Achieve

Maintain

Non-stop monitoring & collectionDynamic analysis to find suspicious activitiesAlert on impact to policyRemediate options to speed remedy

Maintain: Security, Compliance & Operations

Des

ired

Sta

te

Time

IT SECURITY & COMPLIANCE AUTOMATION

6 Steps for Managing Compliance

Step 1. Obtain security and compliance best practice expertise and resources.

Step 2. Quantify the effect of compliance and each security event.

Step 3. Cost-effectively build a security and compliance management program.

Step 4. Address specific and immediate short-term risk.

Step 5. Automate and standardize best practices for managed compliance.

Step 6. Consolidate compliance requirements into a “golden standard,”         creating a swift and repeatable audit reporting process.

IT SECURITY & COMPLIANCE AUTOMATION

How do you get started?

Select the right technologies for:• Log Management• Security Event Monitoring• Tracking & monitoring access to the network• File Integrity, Policy Compliance, and Remediation Management

Automate & centralize the compliance process and technologies

Visibility Intelligence Automation

IT SECURITY & COMPLIANCE AUTOMATION

Additional Thought Leadership

• Summarizes key points• Describes the affect of compliance

vs. noncompliance• Explains how to consolidate

compliance requirements into a “golden standard,” creating a swift and repeatable audit reporting process.

• Offers a Due Diligence Checklist• Complimentary copy

Questions

Paul Reymann

(410) 956-7336

paul@reymanngroup.com

www.verticalenabler.com

Cindy Valladares

cvalladares@tripwire.com

www.tripwire.comTripwire Americas: 1.800.TRIPWIRETripwire EMEA: +44 (0) 20 7382 5420Tripwire Japan: +812.53206.8610Tripwire Singapore: +65 6733 5051Tripwire Australia-New Zealand: +61 (0) 402 138 980

THANK YOU!

Cindy Valladarescvalladares@tripwire.com