SlideShare a Scribd company logo
Avoiding Data Breaches in 2016:
What You Need to Know
David Monahan
Research Director
Enterprise Management Associates (EMA)
David Cramer
VP of Product Management
BMC
Today’s Presenters
Slide 2 © 2016 Enterprise Management Associates, Inc.
David Monahan – Research Director, Risk and Security
David is a senior information security executive with several years of experience.
He has organized and managed both physical and information security programs,
including security and network operations (SOCs and NOCs) for organizations
ranging from Fortune 100 companies to local government and small public and
private companies.
David Cramer, VP of Product Management, BMC
David joined BMC in 2015 and serves as Vice President of Product Management for
the Cloud/DCA business unit. Prior to BMC, David was head of product management
for CA Technologies. During his tenure at CA, David was responsible for application
delivery, cloud management, virtualization and Infrastructure automation solutions.
Before joining CA, David held executive positions at AlterPoint, Motive, NetSolve, and
Nortel Networks.
Logistics for Today’s Webinar
Slide 3 © 2016 Enterprise Management Associates, Inc.
Questions
• An archived version of the event recording
will be available at
www.enterprisemanagement.com
• Log questions in the Q&A panel located on the
lower right corner of your screen
• Questions will be addressed during the Q&A
session of the event
Event recording
Event presentation
• A PDF of the PowerPoint presentation will be
emailed to you as part of the follow-up email.
Avoiding Data Breaches in 2016:
What You Need to Know
David Monahan
Research Director
Enterprise Management Associates (EMA)
David Cramer
VP of Product Management
BMC
© Copyright 5/20/2016 BMC Software, Inc5
WE LIVE IN AN INCREASINGLY
DIGITAL WORLD
© Copyright 5/20/2016 BMC Software, Inc6
© 2016 Enterprise Management Associates, Inc.
• Cyber-security/ Information Security
was an afterthought, Obligation, or
low priority insurance policy
• 51%: Spending Between 10%-24% of
IT Budget on Security
• 26%: Spending Between 20% and 30%
(They are Playing Catchup)
Have We Been Sitting in a Pot Coming to a Boil?
© Copyright 5/20/2016 BMC Software, Inc7
Keeping Organizations Secure Against Cyber
Criminals Has Never Been Tougher
97% of executives expect a rise in data breach
attempts in the next 12 months
As a result, 99% plan to invest more in security in the
next 12 months than they did in 2015.
BMC Study Shows:
Many Breaches Are Avoidable
of executives say security
breaches occur even when
vulnerabilities and their
remediation have already been
identified
44% “There’s so many more vectors that are
easier, less risky and quite often more
productive than going down that route.
This includes, of course, known
vulnerabilities for which a patch is
available but the owner hasn’t installed it.”
Rob Joyce, Chief of NSA’s Tailored Access
Operations
Decline of Baselines and Asset Prioritization
© 2016 Enterprise Management Associates, Inc.
Decline in Monitoring High Value Assets
© 2016 Enterprise Management Associates, Inc.
Decline in Security Confidence
© 2016 Enterprise Management Associates, Inc.
79% of organizations were only “somewhat confident” to “highly doubtful” that
their security program could detect a security incident before it had a significant
impact on their environment.
CVE®
(Common Vulnerabilities and Exposures)
Total Count (Oct 8, 2015): 71,951
Total Count (Nov 15, 2015): 72,805
854
(New bulletins)
38 Days
22
(per day)
8030
(per year)
“A dictionary of common security exposures and vulnerabilities”
What you know and don’t fix can
hurt you
© Copyright 5/20/2016 BMC Software, Inc13
Even “small” threats can cause “BIG” issues……
ATTACKS
80%
More than 80% of attacks target
known vulnerabilities
99.9%
FIX READY
99.9% of exploits were
compromised over a year after
the CVE was published
© Copyright 5/20/2016 BMC Software, Inc14
Visibility – you can’t
patch what you don’t
know
Downtime – hard to
schedule maintenance
times with users
Complexity –
dependencies make it
hard to isolate actions
So Why Do Vulnerabilities Go
Unaddressed?
193Days to resolve
average vulnerability
Complexity and Lack of Visibility
Slide 15 © 2014 Enterprise Management Associates, Inc.
 Drivers for Lack of Value in Tools
 #2 Tools do not provide adequate correlation of data to
business impact
 #5 Tools do not provide enough visibility into the ways
threats appear and/or propagate in the environment
 Over 90% of Outages Caused by Unscheduled or
Undocumented Changes
 #2 Tools do not provide adequate correlation of data to
business impact
 Complexity is the bane of Security
 Complexity in Tools = shelf-ware, thus lack of ROI
 Complexity in Architectures= Security Gaps and failures
© Copyright 5/20/2016 BMC Software, Inc16
OperationsSecurity
Reduce downtime
80% of downtime due to
misconfigurations
Close the window of
vulnerability
43% of companies have
had a data breach
© Copyright 5/20/2016 BMC Software, Inc17
A Three-Pronged Game Plan
To stay on top of today’s complexities, threats and opportunities,
large enterprises are developing SecOps strategies that focus on
three core areas:
People
Security and operations professionals share aligned goals for
making business systems more secure and reliable
Processes
Guide and integrate the activities and data sets of key
stakeholders in security and IT operations
Technology
Enable efficient, consistent and integrated processes to enable IT
Operations and Security efforts
© Copyright 5/20/2016 BMC Software, Inc18
People Problems
© 2016 Enterprise Management Associates, Inc.
68% of Organizations are Experiencing Security Staffing Problems!
© Copyright 5/20/2016 BMC Software, Inc19
Integration and Scalability are Crucial for Security!
• We Can’t Just Throw People at the Problem!
• 95% Organizations with 10 or less FTE
Experienced More Than 100 Severe/Critical
security alerts PER DAY
• 70%: Scalability of Automation is Important to
Meet Compliance Needs
• 93%: Integration is Important for Security
© 2016 Enterprise Management Associates, Inc.
© Copyright 5/20/2016 BMC Software, Inc20
Where Do Organization Stand
© 2016 Enterprise Management Associates, Inc.
• 88%: Integration is important for
Vulnerability Mgmt.
• 71%: Ease of Use Important for Vulnerability
Mgmt.
• 82%: Scalability is Important for Automation
solutions
• 87% : Scalability is Important when dealing
with Vulnerability Mgmt.
© Copyright 5/20/2016 BMC Software, Inc21
© Copyright 5/20/2016 BMC Software, Inc22
BMC BladeLogic: Relentless Remediation
Drag picture to placeholder or click
icon to add
Automate to eliminate threats before they become a breach
entry point
• Automatic correlation of discovered
vulnerabilities and BSA patches
— Filter to systems through operational
views
— Deploy remediation actions
• Network vulnerability identification and
remediation action capabilities
• Direct integration with Change
Management
Reduce cost and time
associated with remediating
vulnerabilities
Threats are neutralized….is that it?
52% of enterprise leaders equate
regulatory compliance with tighter security.
“We must sustain our operations and defenses before, during, and after an attack
by reducing the attack surface, continually improving defensive cyberspace
operations, and effectively commanding and controlling the DODIN.”
DISA Strategic Plan
© Copyright 5/20/2016 BMC Software, Inc24
BMC BladeLogic: Vigilant Compliance
Drag picture to placeholder or click
icon to add
Manage by policy, not just by alert…
© Copyright 5/20/2016 BMC Software, Inc25
Criteria That Decision Makers Consider Important in
SecOps Solutions
62% 58% 50%
Want flexibility to tailor the
solution to the specific
regulations in their industry
want integration with
service desks and change-
management processes
Share that they want
reporting for compliance
audits
© Copyright 5/20/2016 BMC Software, Inc26
Customer Success with SECOPS
State of Michigan
Reduced time for Audit report creation from
32 hours to 15 minutes
Reduced time for server provisioning from
2 months to 5 days
Reduced 9,000+ staff hours by
automatically remediating 94,273events
Log Your Questions in the Q&A Panel
Learn More About Leading IT Analyst Firm Enterprise
Management Associates:
http://www.enterprisemanagement.com
Slide 27 © 2016 Enterprise Management Associates, Inc.

More Related Content

What's hot

Security Best Practices for Small Business
Security Best Practices for Small BusinessSecurity Best Practices for Small Business
Security Best Practices for Small Business
Valiant Technology
 
The C-suite, the Board and Cyber-defense
The C-suite, the Board and Cyber-defenseThe C-suite, the Board and Cyber-defense
The C-suite, the Board and Cyber-defense
The Economist Media Businesses
 
How To Present Cyber Security To Senior Management Complete Deck
How To Present Cyber Security To Senior Management Complete DeckHow To Present Cyber Security To Senior Management Complete Deck
How To Present Cyber Security To Senior Management Complete Deck
SlideTeam
 
Cyber-attacks
Cyber-attacksCyber-attacks
5 Questions Executives Should Be Asking Their Security Teams
5 Questions Executives Should Be Asking Their Security Teams 5 Questions Executives Should Be Asking Their Security Teams
5 Questions Executives Should Be Asking Their Security Teams
Arun Chinnaraju MBA, PMP, CSM, CSPO, SA
 
Information security governance
Information security governanceInformation security governance
Information security governance
Koen Maris
 
Achieving Hi-Fidelity Security by Combining Packet and Endpoint Data
Achieving Hi-Fidelity Security by Combining Packet and Endpoint DataAchieving Hi-Fidelity Security by Combining Packet and Endpoint Data
Achieving Hi-Fidelity Security by Combining Packet and Endpoint Data
Enterprise Management Associates
 
Web Application Security: Connecting the Dots
Web Application Security: Connecting the DotsWeb Application Security: Connecting the Dots
Web Application Security: Connecting the Dots
InnoTech
 
Meraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldMeraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldnooralmousa
 
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
Sarah Nirschl
 
Five Essential Enterprise Architecture Practices to Create the Security-Aware...
Five Essential Enterprise Architecture Practices to Create the Security-Aware...Five Essential Enterprise Architecture Practices to Create the Security-Aware...
Five Essential Enterprise Architecture Practices to Create the Security-Aware...
UBM_Design_Central
 
An Intro to Resolver's Incident Management Application
An Intro to Resolver's Incident Management ApplicationAn Intro to Resolver's Incident Management Application
An Intro to Resolver's Incident Management Application
Resolver Inc.
 
When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...
When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...
When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...
GFI Software
 
Risk monitoring and response
Risk monitoring and responseRisk monitoring and response
Risk monitoring and response
ZyrellLalaguna
 
VIPRE Business Takes a Bite out of Bloatware
VIPRE Business Takes a Bite out of BloatwareVIPRE Business Takes a Bite out of Bloatware
VIPRE Business Takes a Bite out of Bloatware
GFI Software
 
IT Security PowerPoint Presentation Slides
IT Security PowerPoint Presentation SlidesIT Security PowerPoint Presentation Slides
IT Security PowerPoint Presentation Slides
SlideTeam
 
From checkboxes to frameworks
From checkboxes to frameworksFrom checkboxes to frameworks
From checkboxes to frameworks
Andréanne Clarke
 
Telindus cybersecurity survey_report
Telindus cybersecurity survey_reportTelindus cybersecurity survey_report
Telindus cybersecurity survey_report
ValentinGarcia32
 

What's hot (20)

Security Best Practices for Small Business
Security Best Practices for Small BusinessSecurity Best Practices for Small Business
Security Best Practices for Small Business
 
The C-suite, the Board and Cyber-defense
The C-suite, the Board and Cyber-defenseThe C-suite, the Board and Cyber-defense
The C-suite, the Board and Cyber-defense
 
How To Present Cyber Security To Senior Management Complete Deck
How To Present Cyber Security To Senior Management Complete DeckHow To Present Cyber Security To Senior Management Complete Deck
How To Present Cyber Security To Senior Management Complete Deck
 
Cyber-attacks
Cyber-attacksCyber-attacks
Cyber-attacks
 
5 Questions Executives Should Be Asking Their Security Teams
5 Questions Executives Should Be Asking Their Security Teams 5 Questions Executives Should Be Asking Their Security Teams
5 Questions Executives Should Be Asking Their Security Teams
 
Avoiding The Seven Deadly Sins of IT
Avoiding The Seven Deadly Sins of ITAvoiding The Seven Deadly Sins of IT
Avoiding The Seven Deadly Sins of IT
 
Information security governance
Information security governanceInformation security governance
Information security governance
 
Achieving Hi-Fidelity Security by Combining Packet and Endpoint Data
Achieving Hi-Fidelity Security by Combining Packet and Endpoint DataAchieving Hi-Fidelity Security by Combining Packet and Endpoint Data
Achieving Hi-Fidelity Security by Combining Packet and Endpoint Data
 
Web Application Security: Connecting the Dots
Web Application Security: Connecting the DotsWeb Application Security: Connecting the Dots
Web Application Security: Connecting the Dots
 
Meraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldMeraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless world
 
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
 
Five Essential Enterprise Architecture Practices to Create the Security-Aware...
Five Essential Enterprise Architecture Practices to Create the Security-Aware...Five Essential Enterprise Architecture Practices to Create the Security-Aware...
Five Essential Enterprise Architecture Practices to Create the Security-Aware...
 
An Intro to Resolver's Incident Management Application
An Intro to Resolver's Incident Management ApplicationAn Intro to Resolver's Incident Management Application
An Intro to Resolver's Incident Management Application
 
Insights on it risk bcm
Insights on it risk bcmInsights on it risk bcm
Insights on it risk bcm
 
When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...
When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...
When Less is More: Why Small Companies Should Think Outside the(Red/Yellow) B...
 
Risk monitoring and response
Risk monitoring and responseRisk monitoring and response
Risk monitoring and response
 
VIPRE Business Takes a Bite out of Bloatware
VIPRE Business Takes a Bite out of BloatwareVIPRE Business Takes a Bite out of Bloatware
VIPRE Business Takes a Bite out of Bloatware
 
IT Security PowerPoint Presentation Slides
IT Security PowerPoint Presentation SlidesIT Security PowerPoint Presentation Slides
IT Security PowerPoint Presentation Slides
 
From checkboxes to frameworks
From checkboxes to frameworksFrom checkboxes to frameworks
From checkboxes to frameworks
 
Telindus cybersecurity survey_report
Telindus cybersecurity survey_reportTelindus cybersecurity survey_report
Telindus cybersecurity survey_report
 

Viewers also liked

Shooting schedule-location
Shooting schedule-locationShooting schedule-location
Shooting schedule-location
rhsmediastudies
 
Apunte teorico 4° y 5° año 13 14
Apunte teorico 4° y 5° año 13 14Apunte teorico 4° y 5° año 13 14
Apunte teorico 4° y 5° año 13 14lipdv
 
Compliance watcher A legal compliance tool
Compliance watcher A legal compliance toolCompliance watcher A legal compliance tool
Compliance watcher A legal compliance tool
karisma hirapara
 
Design for Testability in Practice
Design for Testability in PracticeDesign for Testability in Practice
Design for Testability in Practice
TechWell
 
Epay ppp
Epay pppEpay ppp
effect of ethanolic extract of the leaves of plant annona squamosa on hematol...
effect of ethanolic extract of the leaves of plant annona squamosa on hematol...effect of ethanolic extract of the leaves of plant annona squamosa on hematol...
effect of ethanolic extract of the leaves of plant annona squamosa on hematol...
IJEAB
 
Construction Services from Magicman
Construction Services from MagicmanConstruction Services from Magicman
Construction Services from Magicman
MagicmanRepair
 
Gain Control over Fast-Paced IT with Enterprise Class Workload Automation
Gain Control over Fast-Paced IT with Enterprise Class Workload AutomationGain Control over Fast-Paced IT with Enterprise Class Workload Automation
Gain Control over Fast-Paced IT with Enterprise Class Workload Automation
Enterprise Management Associates
 
Tablas
TablasTablas
Distance Estimation to Image Objects Using Adapted Scale
Distance Estimation to Image Objects Using Adapted ScaleDistance Estimation to Image Objects Using Adapted Scale
Distance Estimation to Image Objects Using Adapted Scale
theijes
 
Polimerizacion por emulsion 1
Polimerizacion por emulsion 1Polimerizacion por emulsion 1
Polimerizacion por emulsion 1
delangelow luevano
 
Secreto a voces de la Estética 2015
Secreto a voces de la Estética 2015Secreto a voces de la Estética 2015
Secreto a voces de la Estética 2015
juan carlos hevia bernales
 
Los Códigos De Banderas 1
Los Códigos  De  Banderas 1Los Códigos  De  Banderas 1
Los Códigos De Banderas 1lipdv
 
5 Best Practices for Application-aware Network Performance Management (AANPM)...
5 Best Practices for Application-aware Network Performance Management (AANPM)...5 Best Practices for Application-aware Network Performance Management (AANPM)...
5 Best Practices for Application-aware Network Performance Management (AANPM)...
Enterprise Management Associates
 

Viewers also liked (16)

Shooting schedule-location
Shooting schedule-locationShooting schedule-location
Shooting schedule-location
 
Apunte teorico 4° y 5° año 13 14
Apunte teorico 4° y 5° año 13 14Apunte teorico 4° y 5° año 13 14
Apunte teorico 4° y 5° año 13 14
 
Compliance watcher A legal compliance tool
Compliance watcher A legal compliance toolCompliance watcher A legal compliance tool
Compliance watcher A legal compliance tool
 
Design for Testability in Practice
Design for Testability in PracticeDesign for Testability in Practice
Design for Testability in Practice
 
Epay ppp
Epay pppEpay ppp
Epay ppp
 
effect of ethanolic extract of the leaves of plant annona squamosa on hematol...
effect of ethanolic extract of the leaves of plant annona squamosa on hematol...effect of ethanolic extract of the leaves of plant annona squamosa on hematol...
effect of ethanolic extract of the leaves of plant annona squamosa on hematol...
 
Cover stroy
Cover stroyCover stroy
Cover stroy
 
Construction Services from Magicman
Construction Services from MagicmanConstruction Services from Magicman
Construction Services from Magicman
 
Gain Control over Fast-Paced IT with Enterprise Class Workload Automation
Gain Control over Fast-Paced IT with Enterprise Class Workload AutomationGain Control over Fast-Paced IT with Enterprise Class Workload Automation
Gain Control over Fast-Paced IT with Enterprise Class Workload Automation
 
Tablas
TablasTablas
Tablas
 
Distance Estimation to Image Objects Using Adapted Scale
Distance Estimation to Image Objects Using Adapted ScaleDistance Estimation to Image Objects Using Adapted Scale
Distance Estimation to Image Objects Using Adapted Scale
 
Polimerizacion por emulsion 1
Polimerizacion por emulsion 1Polimerizacion por emulsion 1
Polimerizacion por emulsion 1
 
Secreto a voces de la Estética 2015
Secreto a voces de la Estética 2015Secreto a voces de la Estética 2015
Secreto a voces de la Estética 2015
 
Los Códigos De Banderas 1
Los Códigos  De  Banderas 1Los Códigos  De  Banderas 1
Los Códigos De Banderas 1
 
5 Best Practices for Application-aware Network Performance Management (AANPM)...
5 Best Practices for Application-aware Network Performance Management (AANPM)...5 Best Practices for Application-aware Network Performance Management (AANPM)...
5 Best Practices for Application-aware Network Performance Management (AANPM)...
 
Arte sano 02 diciembre2011[1]
Arte sano 02 diciembre2011[1]Arte sano 02 diciembre2011[1]
Arte sano 02 diciembre2011[1]
 

Similar to Avoiding Data Breaches in 2016: What You Need to Know

Responding to the Pandemic: Information Security and Technology Trends
Responding to the Pandemic: Information Security and Technology Trends Responding to the Pandemic: Information Security and Technology Trends
Responding to the Pandemic: Information Security and Technology Trends
Enterprise Management Associates
 
Cybersecurity In The Cognitive Era: Priming Your Digital Immune System
Cybersecurity In The Cognitive Era: Priming Your Digital Immune SystemCybersecurity In The Cognitive Era: Priming Your Digital Immune System
Cybersecurity In The Cognitive Era: Priming Your Digital Immune System
IBM Security
 
How to Secure Your IaaS and PaaS Environments
How to Secure Your IaaS and PaaS EnvironmentsHow to Secure Your IaaS and PaaS Environments
How to Secure Your IaaS and PaaS Environments
Info-Tech Research Group
 
Treating Security Like a Product
Treating Security Like a ProductTreating Security Like a Product
Treating Security Like a Product
VMware Tanzu
 
How to Connect Your Server Room to the Board Room – Before a Data Breach Occurs
How to Connect Your Server Room to the Board Room – Before a Data Breach OccursHow to Connect Your Server Room to the Board Room – Before a Data Breach Occurs
How to Connect Your Server Room to the Board Room – Before a Data Breach Occurs
SurfWatch Labs
 
Cloud Services: Resolving the Trust vs. Uptake Paradox
Cloud Services: Resolving the Trust vs. Uptake ParadoxCloud Services: Resolving the Trust vs. Uptake Paradox
Cloud Services: Resolving the Trust vs. Uptake Paradox
cVidya Networks
 
Webinar-MSP+ Cyber Insurance Fina.pptx
Webinar-MSP+  Cyber Insurance Fina.pptxWebinar-MSP+  Cyber Insurance Fina.pptx
Webinar-MSP+ Cyber Insurance Fina.pptx
ControlCase
 
Securing the C-Suite: Cybersecurity Perspectives from the Boardroom
Securing the C-Suite: Cybersecurity Perspectives from the BoardroomSecuring the C-Suite: Cybersecurity Perspectives from the Boardroom
Securing the C-Suite: Cybersecurity Perspectives from the Boardroom
IBM Security
 
Government and Education Webinar: How the New Normal Could Improve your IT Op...
Government and Education Webinar: How the New Normal Could Improve your IT Op...Government and Education Webinar: How the New Normal Could Improve your IT Op...
Government and Education Webinar: How the New Normal Could Improve your IT Op...
SolarWinds
 
EMA Network Security Survey Findings (SEP 2016)
EMA Network Security Survey Findings (SEP 2016)EMA Network Security Survey Findings (SEP 2016)
EMA Network Security Survey Findings (SEP 2016)
Lora O'Haver
 
Unlocking High Fidelity Security
Unlocking High Fidelity SecurityUnlocking High Fidelity Security
Unlocking High Fidelity Security
Enterprise Management Associates
 
Cybersecurity in the Cognitive Era: Priming Your Digital Immune System
Cybersecurity in the Cognitive Era: Priming Your Digital Immune SystemCybersecurity in the Cognitive Era: Priming Your Digital Immune System
Cybersecurity in the Cognitive Era: Priming Your Digital Immune System
IBM Security
 
What’s the State of Your Endpoint Security?
What’s the State of Your    Endpoint Security?What’s the State of Your    Endpoint Security?
What’s the State of Your Endpoint Security?
IBM Security
 
Governance Risk and Compliance for SAP
Governance Risk and Compliance for SAPGovernance Risk and Compliance for SAP
Governance Risk and Compliance for SAP
PECB
 
ciso-platform-annual-summit-2013-ciso assessment exec summary _ibm
ciso-platform-annual-summit-2013-ciso assessment exec summary _ibmciso-platform-annual-summit-2013-ciso assessment exec summary _ibm
ciso-platform-annual-summit-2013-ciso assessment exec summary _ibm
Priyanka Aash
 
How Preparation and Strategy Can Be Used to Fight and Defeat Any Ransomware A...
How Preparation and Strategy Can Be Used to Fight and Defeat Any Ransomware A...How Preparation and Strategy Can Be Used to Fight and Defeat Any Ransomware A...
How Preparation and Strategy Can Be Used to Fight and Defeat Any Ransomware A...
Aggregage
 
ML in GRC: Cybersecurity versus Governance, Risk Management, and Compliance
ML in GRC: Cybersecurity versus Governance, Risk Management, and ComplianceML in GRC: Cybersecurity versus Governance, Risk Management, and Compliance
ML in GRC: Cybersecurity versus Governance, Risk Management, and Compliance
BigML, Inc
 
Top 6 Web Application Security Best Practices.pdf
Top 6 Web Application Security Best Practices.pdfTop 6 Web Application Security Best Practices.pdf
Top 6 Web Application Security Best Practices.pdf
SolviosTechnology
 
IBM - IAM Security and Trends
IBM - IAM Security and TrendsIBM - IAM Security and Trends
IBM - IAM Security and Trends
IBM Sverige
 
Protect your hybrid workforce across the attack chain
Protect your hybrid workforce across the attack chainProtect your hybrid workforce across the attack chain
Protect your hybrid workforce across the attack chain
David J Rosenthal
 

Similar to Avoiding Data Breaches in 2016: What You Need to Know (20)

Responding to the Pandemic: Information Security and Technology Trends
Responding to the Pandemic: Information Security and Technology Trends Responding to the Pandemic: Information Security and Technology Trends
Responding to the Pandemic: Information Security and Technology Trends
 
Cybersecurity In The Cognitive Era: Priming Your Digital Immune System
Cybersecurity In The Cognitive Era: Priming Your Digital Immune SystemCybersecurity In The Cognitive Era: Priming Your Digital Immune System
Cybersecurity In The Cognitive Era: Priming Your Digital Immune System
 
How to Secure Your IaaS and PaaS Environments
How to Secure Your IaaS and PaaS EnvironmentsHow to Secure Your IaaS and PaaS Environments
How to Secure Your IaaS and PaaS Environments
 
Treating Security Like a Product
Treating Security Like a ProductTreating Security Like a Product
Treating Security Like a Product
 
How to Connect Your Server Room to the Board Room – Before a Data Breach Occurs
How to Connect Your Server Room to the Board Room – Before a Data Breach OccursHow to Connect Your Server Room to the Board Room – Before a Data Breach Occurs
How to Connect Your Server Room to the Board Room – Before a Data Breach Occurs
 
Cloud Services: Resolving the Trust vs. Uptake Paradox
Cloud Services: Resolving the Trust vs. Uptake ParadoxCloud Services: Resolving the Trust vs. Uptake Paradox
Cloud Services: Resolving the Trust vs. Uptake Paradox
 
Webinar-MSP+ Cyber Insurance Fina.pptx
Webinar-MSP+  Cyber Insurance Fina.pptxWebinar-MSP+  Cyber Insurance Fina.pptx
Webinar-MSP+ Cyber Insurance Fina.pptx
 
Securing the C-Suite: Cybersecurity Perspectives from the Boardroom
Securing the C-Suite: Cybersecurity Perspectives from the BoardroomSecuring the C-Suite: Cybersecurity Perspectives from the Boardroom
Securing the C-Suite: Cybersecurity Perspectives from the Boardroom
 
Government and Education Webinar: How the New Normal Could Improve your IT Op...
Government and Education Webinar: How the New Normal Could Improve your IT Op...Government and Education Webinar: How the New Normal Could Improve your IT Op...
Government and Education Webinar: How the New Normal Could Improve your IT Op...
 
EMA Network Security Survey Findings (SEP 2016)
EMA Network Security Survey Findings (SEP 2016)EMA Network Security Survey Findings (SEP 2016)
EMA Network Security Survey Findings (SEP 2016)
 
Unlocking High Fidelity Security
Unlocking High Fidelity SecurityUnlocking High Fidelity Security
Unlocking High Fidelity Security
 
Cybersecurity in the Cognitive Era: Priming Your Digital Immune System
Cybersecurity in the Cognitive Era: Priming Your Digital Immune SystemCybersecurity in the Cognitive Era: Priming Your Digital Immune System
Cybersecurity in the Cognitive Era: Priming Your Digital Immune System
 
What’s the State of Your Endpoint Security?
What’s the State of Your    Endpoint Security?What’s the State of Your    Endpoint Security?
What’s the State of Your Endpoint Security?
 
Governance Risk and Compliance for SAP
Governance Risk and Compliance for SAPGovernance Risk and Compliance for SAP
Governance Risk and Compliance for SAP
 
ciso-platform-annual-summit-2013-ciso assessment exec summary _ibm
ciso-platform-annual-summit-2013-ciso assessment exec summary _ibmciso-platform-annual-summit-2013-ciso assessment exec summary _ibm
ciso-platform-annual-summit-2013-ciso assessment exec summary _ibm
 
How Preparation and Strategy Can Be Used to Fight and Defeat Any Ransomware A...
How Preparation and Strategy Can Be Used to Fight and Defeat Any Ransomware A...How Preparation and Strategy Can Be Used to Fight and Defeat Any Ransomware A...
How Preparation and Strategy Can Be Used to Fight and Defeat Any Ransomware A...
 
ML in GRC: Cybersecurity versus Governance, Risk Management, and Compliance
ML in GRC: Cybersecurity versus Governance, Risk Management, and ComplianceML in GRC: Cybersecurity versus Governance, Risk Management, and Compliance
ML in GRC: Cybersecurity versus Governance, Risk Management, and Compliance
 
Top 6 Web Application Security Best Practices.pdf
Top 6 Web Application Security Best Practices.pdfTop 6 Web Application Security Best Practices.pdf
Top 6 Web Application Security Best Practices.pdf
 
IBM - IAM Security and Trends
IBM - IAM Security and TrendsIBM - IAM Security and Trends
IBM - IAM Security and Trends
 
Protect your hybrid workforce across the attack chain
Protect your hybrid workforce across the attack chainProtect your hybrid workforce across the attack chain
Protect your hybrid workforce across the attack chain
 

More from Enterprise Management Associates

Expert Insights: Rethinking Your Network Operations Toolset as Cisco Prime En...
Expert Insights: Rethinking Your Network Operations Toolset as Cisco Prime En...Expert Insights: Rethinking Your Network Operations Toolset as Cisco Prime En...
Expert Insights: Rethinking Your Network Operations Toolset as Cisco Prime En...
Enterprise Management Associates
 
Highlights from the EMA Radar™ Report for Workload Automation and Orchestrati...
Highlights from the EMA Radar™ Report for Workload Automation and Orchestrati...Highlights from the EMA Radar™ Report for Workload Automation and Orchestrati...
Highlights from the EMA Radar™ Report for Workload Automation and Orchestrati...
Enterprise Management Associates
 
Real-world incident response, management, and prevention
Real-world incident response, management, and preventionReal-world incident response, management, and prevention
Real-world incident response, management, and prevention
Enterprise Management Associates
 
Observability: Challenges, Priorities, Solutions, and the Role of OpenTelemetry
Observability: Challenges, Priorities, Solutions, and the Role of OpenTelemetryObservability: Challenges, Priorities, Solutions, and the Role of OpenTelemetry
Observability: Challenges, Priorities, Solutions, and the Role of OpenTelemetry
Enterprise Management Associates
 
NetSecOps: Examining How Network and Security Teams Collaborate for a Better ...
NetSecOps: Examining How Network and Security Teams Collaborate for a Better ...NetSecOps: Examining How Network and Security Teams Collaborate for a Better ...
NetSecOps: Examining How Network and Security Teams Collaborate for a Better ...
Enterprise Management Associates
 
Modern ITSM—the untapped game-changer for midsize organizations
Modern ITSM—the untapped game-changer for midsize organizationsModern ITSM—the untapped game-changer for midsize organizations
Modern ITSM—the untapped game-changer for midsize organizations
Enterprise Management Associates
 
Unveiling Strategic Trends in Global Finance, Banking, and Insurance - IT Ex...
Unveiling Strategic Trends in Global Finance, Banking, and Insurance -  IT Ex...Unveiling Strategic Trends in Global Finance, Banking, and Insurance -  IT Ex...
Unveiling Strategic Trends in Global Finance, Banking, and Insurance - IT Ex...
Enterprise Management Associates
 
Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...
Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...
Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...
Enterprise Management Associates
 
Transcending Passwords: Emerging Trends in Authentication
Transcending Passwords: Emerging Trends in AuthenticationTranscending Passwords: Emerging Trends in Authentication
Transcending Passwords: Emerging Trends in Authentication
Enterprise Management Associates
 
Modernize NetOps with Business-Aware Network Monitoring
Modernize NetOps with Business-Aware Network MonitoringModernize NetOps with Business-Aware Network Monitoring
Modernize NetOps with Business-Aware Network Monitoring
Enterprise Management Associates
 
Navigating the Complexity of Distributed Microservices across AWS, Azure, and...
Navigating the Complexity of Distributed Microservices across AWS, Azure, and...Navigating the Complexity of Distributed Microservices across AWS, Azure, and...
Navigating the Complexity of Distributed Microservices across AWS, Azure, and...
Enterprise Management Associates
 
Navigating Today’s Threat Landscape: Discussing Hype vs. Reality
Navigating Today’s Threat Landscape: Discussing Hype vs. RealityNavigating Today’s Threat Landscape: Discussing Hype vs. Reality
Navigating Today’s Threat Landscape: Discussing Hype vs. Reality
Enterprise Management Associates
 
Kubernetes Unveiled: Trends, Challenges, and Opportunities
Kubernetes Unveiled: Trends, Challenges, and OpportunitiesKubernetes Unveiled: Trends, Challenges, and Opportunities
Kubernetes Unveiled: Trends, Challenges, and Opportunities
Enterprise Management Associates
 
DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-...
DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-...DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-...
DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-...
Enterprise Management Associates
 
Challenges and Best Practices for Securing Modern Operational Technology Netw...
Challenges and Best Practices for Securing Modern Operational Technology Netw...Challenges and Best Practices for Securing Modern Operational Technology Netw...
Challenges and Best Practices for Securing Modern Operational Technology Netw...
Enterprise Management Associates
 
CMDB in Cloud Times: Myths, Mistakes, and Mastery
CMDB in Cloud Times: Myths, Mistakes, and Mastery CMDB in Cloud Times: Myths, Mistakes, and Mastery
CMDB in Cloud Times: Myths, Mistakes, and Mastery
Enterprise Management Associates
 
Modernizing Network Engineering and Operations in the Era of Hybrid and Remot...
Modernizing Network Engineering and Operations in the Era of Hybrid and Remot...Modernizing Network Engineering and Operations in the Era of Hybrid and Remot...
Modernizing Network Engineering and Operations in the Era of Hybrid and Remot...
Enterprise Management Associates
 
Why Should Organizations Consider Extended Detection and Response (XDR)?
Why Should Organizations Consider Extended Detection and Response (XDR)?Why Should Organizations Consider Extended Detection and Response (XDR)?
Why Should Organizations Consider Extended Detection and Response (XDR)?
Enterprise Management Associates
 
Five Managed SD-WAN Trends to Watch in 2023
Five Managed SD-WAN Trends to Watch in 2023Five Managed SD-WAN Trends to Watch in 2023
Five Managed SD-WAN Trends to Watch in 2023
Enterprise Management Associates
 
Moving Beyond Remote Access: Discover the Power of Zero Trust Network Access
Moving Beyond Remote Access: Discover the Power of Zero Trust Network AccessMoving Beyond Remote Access: Discover the Power of Zero Trust Network Access
Moving Beyond Remote Access: Discover the Power of Zero Trust Network Access
Enterprise Management Associates
 

More from Enterprise Management Associates (20)

Expert Insights: Rethinking Your Network Operations Toolset as Cisco Prime En...
Expert Insights: Rethinking Your Network Operations Toolset as Cisco Prime En...Expert Insights: Rethinking Your Network Operations Toolset as Cisco Prime En...
Expert Insights: Rethinking Your Network Operations Toolset as Cisco Prime En...
 
Highlights from the EMA Radar™ Report for Workload Automation and Orchestrati...
Highlights from the EMA Radar™ Report for Workload Automation and Orchestrati...Highlights from the EMA Radar™ Report for Workload Automation and Orchestrati...
Highlights from the EMA Radar™ Report for Workload Automation and Orchestrati...
 
Real-world incident response, management, and prevention
Real-world incident response, management, and preventionReal-world incident response, management, and prevention
Real-world incident response, management, and prevention
 
Observability: Challenges, Priorities, Solutions, and the Role of OpenTelemetry
Observability: Challenges, Priorities, Solutions, and the Role of OpenTelemetryObservability: Challenges, Priorities, Solutions, and the Role of OpenTelemetry
Observability: Challenges, Priorities, Solutions, and the Role of OpenTelemetry
 
NetSecOps: Examining How Network and Security Teams Collaborate for a Better ...
NetSecOps: Examining How Network and Security Teams Collaborate for a Better ...NetSecOps: Examining How Network and Security Teams Collaborate for a Better ...
NetSecOps: Examining How Network and Security Teams Collaborate for a Better ...
 
Modern ITSM—the untapped game-changer for midsize organizations
Modern ITSM—the untapped game-changer for midsize organizationsModern ITSM—the untapped game-changer for midsize organizations
Modern ITSM—the untapped game-changer for midsize organizations
 
Unveiling Strategic Trends in Global Finance, Banking, and Insurance - IT Ex...
Unveiling Strategic Trends in Global Finance, Banking, and Insurance -  IT Ex...Unveiling Strategic Trends in Global Finance, Banking, and Insurance -  IT Ex...
Unveiling Strategic Trends in Global Finance, Banking, and Insurance - IT Ex...
 
Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...
Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...
Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...
 
Transcending Passwords: Emerging Trends in Authentication
Transcending Passwords: Emerging Trends in AuthenticationTranscending Passwords: Emerging Trends in Authentication
Transcending Passwords: Emerging Trends in Authentication
 
Modernize NetOps with Business-Aware Network Monitoring
Modernize NetOps with Business-Aware Network MonitoringModernize NetOps with Business-Aware Network Monitoring
Modernize NetOps with Business-Aware Network Monitoring
 
Navigating the Complexity of Distributed Microservices across AWS, Azure, and...
Navigating the Complexity of Distributed Microservices across AWS, Azure, and...Navigating the Complexity of Distributed Microservices across AWS, Azure, and...
Navigating the Complexity of Distributed Microservices across AWS, Azure, and...
 
Navigating Today’s Threat Landscape: Discussing Hype vs. Reality
Navigating Today’s Threat Landscape: Discussing Hype vs. RealityNavigating Today’s Threat Landscape: Discussing Hype vs. Reality
Navigating Today’s Threat Landscape: Discussing Hype vs. Reality
 
Kubernetes Unveiled: Trends, Challenges, and Opportunities
Kubernetes Unveiled: Trends, Challenges, and OpportunitiesKubernetes Unveiled: Trends, Challenges, and Opportunities
Kubernetes Unveiled: Trends, Challenges, and Opportunities
 
DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-...
DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-...DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-...
DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-...
 
Challenges and Best Practices for Securing Modern Operational Technology Netw...
Challenges and Best Practices for Securing Modern Operational Technology Netw...Challenges and Best Practices for Securing Modern Operational Technology Netw...
Challenges and Best Practices for Securing Modern Operational Technology Netw...
 
CMDB in Cloud Times: Myths, Mistakes, and Mastery
CMDB in Cloud Times: Myths, Mistakes, and Mastery CMDB in Cloud Times: Myths, Mistakes, and Mastery
CMDB in Cloud Times: Myths, Mistakes, and Mastery
 
Modernizing Network Engineering and Operations in the Era of Hybrid and Remot...
Modernizing Network Engineering and Operations in the Era of Hybrid and Remot...Modernizing Network Engineering and Operations in the Era of Hybrid and Remot...
Modernizing Network Engineering and Operations in the Era of Hybrid and Remot...
 
Why Should Organizations Consider Extended Detection and Response (XDR)?
Why Should Organizations Consider Extended Detection and Response (XDR)?Why Should Organizations Consider Extended Detection and Response (XDR)?
Why Should Organizations Consider Extended Detection and Response (XDR)?
 
Five Managed SD-WAN Trends to Watch in 2023
Five Managed SD-WAN Trends to Watch in 2023Five Managed SD-WAN Trends to Watch in 2023
Five Managed SD-WAN Trends to Watch in 2023
 
Moving Beyond Remote Access: Discover the Power of Zero Trust Network Access
Moving Beyond Remote Access: Discover the Power of Zero Trust Network AccessMoving Beyond Remote Access: Discover the Power of Zero Trust Network Access
Moving Beyond Remote Access: Discover the Power of Zero Trust Network Access
 

Recently uploaded

PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
UiPathCommunity
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 

Recently uploaded (20)

PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 

Avoiding Data Breaches in 2016: What You Need to Know

  • 1. Avoiding Data Breaches in 2016: What You Need to Know David Monahan Research Director Enterprise Management Associates (EMA) David Cramer VP of Product Management BMC
  • 2. Today’s Presenters Slide 2 © 2016 Enterprise Management Associates, Inc. David Monahan – Research Director, Risk and Security David is a senior information security executive with several years of experience. He has organized and managed both physical and information security programs, including security and network operations (SOCs and NOCs) for organizations ranging from Fortune 100 companies to local government and small public and private companies. David Cramer, VP of Product Management, BMC David joined BMC in 2015 and serves as Vice President of Product Management for the Cloud/DCA business unit. Prior to BMC, David was head of product management for CA Technologies. During his tenure at CA, David was responsible for application delivery, cloud management, virtualization and Infrastructure automation solutions. Before joining CA, David held executive positions at AlterPoint, Motive, NetSolve, and Nortel Networks.
  • 3. Logistics for Today’s Webinar Slide 3 © 2016 Enterprise Management Associates, Inc. Questions • An archived version of the event recording will be available at www.enterprisemanagement.com • Log questions in the Q&A panel located on the lower right corner of your screen • Questions will be addressed during the Q&A session of the event Event recording Event presentation • A PDF of the PowerPoint presentation will be emailed to you as part of the follow-up email.
  • 4. Avoiding Data Breaches in 2016: What You Need to Know David Monahan Research Director Enterprise Management Associates (EMA) David Cramer VP of Product Management BMC
  • 5. © Copyright 5/20/2016 BMC Software, Inc5 WE LIVE IN AN INCREASINGLY DIGITAL WORLD
  • 6. © Copyright 5/20/2016 BMC Software, Inc6 © 2016 Enterprise Management Associates, Inc. • Cyber-security/ Information Security was an afterthought, Obligation, or low priority insurance policy • 51%: Spending Between 10%-24% of IT Budget on Security • 26%: Spending Between 20% and 30% (They are Playing Catchup) Have We Been Sitting in a Pot Coming to a Boil?
  • 7. © Copyright 5/20/2016 BMC Software, Inc7 Keeping Organizations Secure Against Cyber Criminals Has Never Been Tougher 97% of executives expect a rise in data breach attempts in the next 12 months As a result, 99% plan to invest more in security in the next 12 months than they did in 2015.
  • 8. BMC Study Shows: Many Breaches Are Avoidable of executives say security breaches occur even when vulnerabilities and their remediation have already been identified 44% “There’s so many more vectors that are easier, less risky and quite often more productive than going down that route. This includes, of course, known vulnerabilities for which a patch is available but the owner hasn’t installed it.” Rob Joyce, Chief of NSA’s Tailored Access Operations
  • 9. Decline of Baselines and Asset Prioritization © 2016 Enterprise Management Associates, Inc.
  • 10. Decline in Monitoring High Value Assets © 2016 Enterprise Management Associates, Inc.
  • 11. Decline in Security Confidence © 2016 Enterprise Management Associates, Inc. 79% of organizations were only “somewhat confident” to “highly doubtful” that their security program could detect a security incident before it had a significant impact on their environment.
  • 12. CVE® (Common Vulnerabilities and Exposures) Total Count (Oct 8, 2015): 71,951 Total Count (Nov 15, 2015): 72,805 854 (New bulletins) 38 Days 22 (per day) 8030 (per year) “A dictionary of common security exposures and vulnerabilities” What you know and don’t fix can hurt you
  • 13. © Copyright 5/20/2016 BMC Software, Inc13 Even “small” threats can cause “BIG” issues…… ATTACKS 80% More than 80% of attacks target known vulnerabilities 99.9% FIX READY 99.9% of exploits were compromised over a year after the CVE was published
  • 14. © Copyright 5/20/2016 BMC Software, Inc14 Visibility – you can’t patch what you don’t know Downtime – hard to schedule maintenance times with users Complexity – dependencies make it hard to isolate actions So Why Do Vulnerabilities Go Unaddressed? 193Days to resolve average vulnerability
  • 15. Complexity and Lack of Visibility Slide 15 © 2014 Enterprise Management Associates, Inc.  Drivers for Lack of Value in Tools  #2 Tools do not provide adequate correlation of data to business impact  #5 Tools do not provide enough visibility into the ways threats appear and/or propagate in the environment  Over 90% of Outages Caused by Unscheduled or Undocumented Changes  #2 Tools do not provide adequate correlation of data to business impact  Complexity is the bane of Security  Complexity in Tools = shelf-ware, thus lack of ROI  Complexity in Architectures= Security Gaps and failures
  • 16. © Copyright 5/20/2016 BMC Software, Inc16 OperationsSecurity Reduce downtime 80% of downtime due to misconfigurations Close the window of vulnerability 43% of companies have had a data breach
  • 17. © Copyright 5/20/2016 BMC Software, Inc17 A Three-Pronged Game Plan To stay on top of today’s complexities, threats and opportunities, large enterprises are developing SecOps strategies that focus on three core areas: People Security and operations professionals share aligned goals for making business systems more secure and reliable Processes Guide and integrate the activities and data sets of key stakeholders in security and IT operations Technology Enable efficient, consistent and integrated processes to enable IT Operations and Security efforts
  • 18. © Copyright 5/20/2016 BMC Software, Inc18 People Problems © 2016 Enterprise Management Associates, Inc. 68% of Organizations are Experiencing Security Staffing Problems!
  • 19. © Copyright 5/20/2016 BMC Software, Inc19 Integration and Scalability are Crucial for Security! • We Can’t Just Throw People at the Problem! • 95% Organizations with 10 or less FTE Experienced More Than 100 Severe/Critical security alerts PER DAY • 70%: Scalability of Automation is Important to Meet Compliance Needs • 93%: Integration is Important for Security © 2016 Enterprise Management Associates, Inc.
  • 20. © Copyright 5/20/2016 BMC Software, Inc20 Where Do Organization Stand © 2016 Enterprise Management Associates, Inc. • 88%: Integration is important for Vulnerability Mgmt. • 71%: Ease of Use Important for Vulnerability Mgmt. • 82%: Scalability is Important for Automation solutions • 87% : Scalability is Important when dealing with Vulnerability Mgmt.
  • 21. © Copyright 5/20/2016 BMC Software, Inc21
  • 22. © Copyright 5/20/2016 BMC Software, Inc22 BMC BladeLogic: Relentless Remediation Drag picture to placeholder or click icon to add Automate to eliminate threats before they become a breach entry point • Automatic correlation of discovered vulnerabilities and BSA patches — Filter to systems through operational views — Deploy remediation actions • Network vulnerability identification and remediation action capabilities • Direct integration with Change Management Reduce cost and time associated with remediating vulnerabilities
  • 23. Threats are neutralized….is that it? 52% of enterprise leaders equate regulatory compliance with tighter security. “We must sustain our operations and defenses before, during, and after an attack by reducing the attack surface, continually improving defensive cyberspace operations, and effectively commanding and controlling the DODIN.” DISA Strategic Plan
  • 24. © Copyright 5/20/2016 BMC Software, Inc24 BMC BladeLogic: Vigilant Compliance Drag picture to placeholder or click icon to add Manage by policy, not just by alert…
  • 25. © Copyright 5/20/2016 BMC Software, Inc25 Criteria That Decision Makers Consider Important in SecOps Solutions 62% 58% 50% Want flexibility to tailor the solution to the specific regulations in their industry want integration with service desks and change- management processes Share that they want reporting for compliance audits
  • 26. © Copyright 5/20/2016 BMC Software, Inc26 Customer Success with SECOPS State of Michigan Reduced time for Audit report creation from 32 hours to 15 minutes Reduced time for server provisioning from 2 months to 5 days Reduced 9,000+ staff hours by automatically remediating 94,273events
  • 27. Log Your Questions in the Q&A Panel Learn More About Leading IT Analyst Firm Enterprise Management Associates: http://www.enterprisemanagement.com Slide 27 © 2016 Enterprise Management Associates, Inc.