The [Cyber Security] Blair Witch Project: What Lurks in the Shadows of Your Network
-
Upload
beyondtrust -
Category
Software
-
view
278 -
download
0
Transcript of The [Cyber Security] Blair Witch Project: What Lurks in the Shadows of Your Network
The [Cyber Security] Blair Witch Project:
What Lurks in the Shadows of Your Network
Cyber Security Strategist,
Dawn-Marie Hutchinson
Track, classify and
control
Data Inventory
Hardware
Inventory
Application
inventory
User Inventory
Identify
Maximize business
value and
investments by
having the right stuff protecting
the right things.
Protect
Detect
• Anomalies
and events
• Continuous
Monitoring
• Detection
Processes
“I’m afraid to close my eyes. I’m afraid to open them.”
• Clear Objectives
• Mature Processes
• Gumption
• Beyond
Compliance
• Securing Trust
Security Maturity
• Careful analysis increases certainty – Can locate lost/stolen data
– Can account for malware changes, attacking IP’s
– Can run scans across entire network
– Can better account for PII and PHI sources
• Establish Communication Plans
• Understand your backup and recovery strategy
Recover & Recover
© 2015 Dawn-Marie Hutchinson All Rights Reserved.
• Preparedness
• Analysis
• Mitigation
• Incident
Response
Dawn-Marie Hutchinson
Cyber Security Strategist Email: [email protected]
Phone: 267-615-8331
Twitter: Ciso_Advantage
Experience in direct oversight and management of Information
Security Operations, Privacy and Governance Risk and Compliance management and initiatives.
• 2015 CRN Women of the Channel Power 50 Award Winner
• 2015 Cyber Security Canon Committee Member
• 2014 Evanta CISO Breakaway Leadership Nominee
12
Network Security
Scanning
Enterprise Vulnerability
Management
Dynamic Web
Application Scanning
Cloud-Based
Perimeter Scanning
Privileged Password
Management
Privilege
Management
Auditing &
Protection
Active Directory
Bridging
The BeyondInsight IT Risk Management Platform
EXTENSIVE
REPORTING
CENTRAL DATA
WAREHOUSE
ASSET
DISCOVERY
ASSET
PROFILING
ASSET SMART
GROUPS
USER
MANAGEMENT
WORKFLOW &
NOTIFICATION
THIRD-PARTY
INTEGRATION
Retina Vulnerability Management Solutions
PowerBroker Privileged Account Management Solutions
ADVANCED THREAT
ANALYTICS
NETWORK
INFRASTRUCTURE
MOBILE, VIRTUAL
AND CLOUD
APPLICATIONS &
DATABASES SERVERS & DESKTOPS
ACTIVE DIRECTORY,
EXCHANGE, FILE SYS.
© 2015 BeyondTrust Software