Agenda• IT landscape
• Areas• Threats• Solutions
• End Point Security• Patch- & Lifecycle management• End Point Protection
Preventing is Protecting - Secure Computing 2015 ©
IT Landscape - Areas• Cloud• WAN• LAN• Server• Client• Application• Data
Preventing is Protecting - Secure Computing 2015 ©
IT Landscape - Threats• 0-day exploits• Advanced Persistant Threats• “Generic” malware
Preventing is Protecting - Secure Computing 2015 ©
IT Landscape – Solutions• Prevent, Detect and Contain
• Network segregation• Rights management• Application whitelisting• Boundary defense• Monitoring and logging• Anti-exploit & anti-virus• Intrusion prevention• Patch- & Lifecycle management
Preventing is Protecting - Secure Computing 2015 ©
IT Landscape – Solutions (2)• Incident response and recovery
• Backup critical systems and data• Incident response plan• Lessons learned
Preventing is Protecting - Secure Computing 2015 ©
Patch- & Lifecyclemanagement• Operating sytems• Applications• Tools
Preventing is Protecting - Secure Computing 2015 ©
End Point Protection• Segregate networks• Protect and restrict privileges• Applicationcontrol• Limit workstation-to-workstation• Dynamic analysis• Monitoring and logging• Anti-exploitation & anti-virus• Host Intrusion Prevention System
Preventing is Protecting - Secure Computing 2015 ©
Research scope• Monitoring and logging• Data security
Preventing is Protecting - Secure Computing 2015 ©
Questions?• When?• How?• Impact?• Recovery?• Costs?
Preventing is Protecting - Secure Computing 2015 ©
[email protected] is Protecting - Secure Computing 2015 ©
Top Related