Understanding the 8 Keys to Security Success
-
Upload
securityon-demand -
Category
Technology
-
view
354 -
download
6
Transcript of Understanding the 8 Keys to Security Success
![Page 1: Understanding the 8 Keys to Security Success](https://reader035.fdocuments.us/reader035/viewer/2022062900/58e736111a28ab8f028b491b/html5/thumbnails/1.jpg)
=Understanding the 8 Keys to Security Success
![Page 2: Understanding the 8 Keys to Security Success](https://reader035.fdocuments.us/reader035/viewer/2022062900/58e736111a28ab8f028b491b/html5/thumbnails/2.jpg)
A CISO’s Competing Priorities
Manage risk and ensure the security of our organizations. Create an
environment where business can be transacted seamlessly, conveniently
and securely.
![Page 3: Understanding the 8 Keys to Security Success](https://reader035.fdocuments.us/reader035/viewer/2022062900/58e736111a28ab8f028b491b/html5/thumbnails/3.jpg)
Security success no longer means preventing a breach. It
now means achieving a balance between prevention,
compliance, threat management and preparation.
![Page 4: Understanding the 8 Keys to Security Success](https://reader035.fdocuments.us/reader035/viewer/2022062900/58e736111a28ab8f028b491b/html5/thumbnails/4.jpg)
From decades of helping organizations achieve security
success, we have come up with this list of eight things
organizations should be doing in order to achieve security
success.
![Page 5: Understanding the 8 Keys to Security Success](https://reader035.fdocuments.us/reader035/viewer/2022062900/58e736111a28ab8f028b491b/html5/thumbnails/5.jpg)
1Have a coordinated operational and technical
capability approach to prevention, detection and remediation of events and incidents.
![Page 6: Understanding the 8 Keys to Security Success](https://reader035.fdocuments.us/reader035/viewer/2022062900/58e736111a28ab8f028b491b/html5/thumbnails/6.jpg)
This sounds easy, but it requires buy-in and participation across the
organization.
Business and data owners must take ownership and responsibility for the security of data under their purview.
This often means getting non-security personnel involved in security
conversations.
![Page 7: Understanding the 8 Keys to Security Success](https://reader035.fdocuments.us/reader035/viewer/2022062900/58e736111a28ab8f028b491b/html5/thumbnails/7.jpg)
2Have a centralized, systematic (technological or otherwise) way of sharing knowledge related to
threats and incidents.
![Page 8: Understanding the 8 Keys to Security Success](https://reader035.fdocuments.us/reader035/viewer/2022062900/58e736111a28ab8f028b491b/html5/thumbnails/8.jpg)
Information regarding current and imminent threats and
incidents is extremely valuable.
This information could be used to help prevent attacks from
spreading across an enterprise. But, information silos prevent
effective notification of emerging threats and attackers use this to
their advantage. SHARING INFO
![Page 9: Understanding the 8 Keys to Security Success](https://reader035.fdocuments.us/reader035/viewer/2022062900/58e736111a28ab8f028b491b/html5/thumbnails/9.jpg)
3Stay ahead of threats with continuous configuration
management and analysis.
![Page 10: Understanding the 8 Keys to Security Success](https://reader035.fdocuments.us/reader035/viewer/2022062900/58e736111a28ab8f028b491b/html5/thumbnails/10.jpg)
Your technology is only as good as its configuration. This also requires highly trained specialists who are skilled in the use of
a particular technology.
![Page 11: Understanding the 8 Keys to Security Success](https://reader035.fdocuments.us/reader035/viewer/2022062900/58e736111a28ab8f028b491b/html5/thumbnails/11.jpg)
4Deploy the right security technology.
![Page 12: Understanding the 8 Keys to Security Success](https://reader035.fdocuments.us/reader035/viewer/2022062900/58e736111a28ab8f028b491b/html5/thumbnails/12.jpg)
Technology is the tools used by your people to enable your
processes.
Without the people and the process in place, the technology will never be fully utilized. Take the time to evaluate what you
have.
TECHNOLOGY
![Page 13: Understanding the 8 Keys to Security Success](https://reader035.fdocuments.us/reader035/viewer/2022062900/58e736111a28ab8f028b491b/html5/thumbnails/13.jpg)
5Keep systems running efficiently and beat alert fatigue with a
managed solution.
![Page 14: Understanding the 8 Keys to Security Success](https://reader035.fdocuments.us/reader035/viewer/2022062900/58e736111a28ab8f028b491b/html5/thumbnails/14.jpg)
You can’t solve security problems with technology alone.
Organizations struggle to keep up with the vast quantities of alarms and alerts that most technologies
generate. Managed security services are a great option to help one
operationalize the maintenance of systems and streamline alert triage. MALWARE
![Page 15: Understanding the 8 Keys to Security Success](https://reader035.fdocuments.us/reader035/viewer/2022062900/58e736111a28ab8f028b491b/html5/thumbnails/15.jpg)
6Respond to threats in a timely, and consistent manner.
![Page 16: Understanding the 8 Keys to Security Success](https://reader035.fdocuments.us/reader035/viewer/2022062900/58e736111a28ab8f028b491b/html5/thumbnails/16.jpg)
They key is to be able to identify those threats quickly and be
prepared with a response plan. Leveraging advanced tools such as behavioral analytics is one way to
get ahead of the curve.
Finding compromises early and being able to respond and
minimize impact is what security success is all about.
ANALYTIC TOOLS
![Page 17: Understanding the 8 Keys to Security Success](https://reader035.fdocuments.us/reader035/viewer/2022062900/58e736111a28ab8f028b491b/html5/thumbnails/17.jpg)
7Employ a consistent approach to the handling of incidents and threats from identification through
closure.
![Page 18: Understanding the 8 Keys to Security Success](https://reader035.fdocuments.us/reader035/viewer/2022062900/58e736111a28ab8f028b491b/html5/thumbnails/18.jpg)
Organizations who have a well-developed approach to working through these incidents have an
advantage.
Having a trusted partner that can provide you with actionable
intelligence helps maximize the efficacy of your team and
improves your ability to respond and contain incidents.
![Page 19: Understanding the 8 Keys to Security Success](https://reader035.fdocuments.us/reader035/viewer/2022062900/58e736111a28ab8f028b491b/html5/thumbnails/19.jpg)
8Apply metrics around the efficiency of information
security technologies, processes and people.
![Page 20: Understanding the 8 Keys to Security Success](https://reader035.fdocuments.us/reader035/viewer/2022062900/58e736111a28ab8f028b491b/html5/thumbnails/20.jpg)
Organizations that continually track key metrics are far more likely to
achieve security success.
Having the reporting and data needed to understand what is working and
what needs improvement will help you make educated decisions on what to
change, improve or do more of.
![Page 21: Understanding the 8 Keys to Security Success](https://reader035.fdocuments.us/reader035/viewer/2022062900/58e736111a28ab8f028b491b/html5/thumbnails/21.jpg)
858.693.5655 | [email protected]