Compliance: What Does Security
                                                   Have To Do With It?




                                           Thank you for joining us.
                                       The webinar will start shortly.



© nCircle 2012. All rights reserved.
Compliance: What Does Security
                                                   Have To Do With It?




© nCircle 2012. All rights reserved.
Introductions: Panelists



                                                        Rodney Brown
                                                        CISSP, GIAC GISP, ITILv3




         Andrew Storms                                                                          Shelley Boose
         Dir. Security Operations                                                               Dir., Public Relation
         nCircle




                 Tim Erlin                                                            Elizabeth Ireland
                 Dir., IT Security and Risk Strategy                                  VP, Marketing
                 nCircle

3   © nCircle 2012 All rights reserved.                nCircle Company Confidential
Which compliance regulations does your
     organization need to comply with? (check all that
     apply)
                                     SOX
                                     NERC
                                     FISMA
                                     HIPAA
                                     PCI
                                     GLBA
                                     PIPEDA
                                     Too many to name

4   © nCircle 2012 All rights reserved.            nCircle Company Confidential
How often does your organization have audits?
                                         Annually
                                         Quarterly
                                         Monthly
                                         Auditors live here




5   © nCircle 2012 All rights reserved.              nCircle Company Confidential
Does your security team spend too much time on
     audit requests?
                                   Seems like that’s all we do
                                   Audit requests take at more than half of our time
                                   Occasional resource problem
                                   We have plenty of resources to do both




6   © nCircle 2012 All rights reserved.           nCircle Company Confidential
In your experience, how aligned are security and
     compliance efforts?
                          Mostly aligned
                          Somewhat aligned
                          Barely related




7   © nCircle 2012 All rights reserved.   nCircle Company Confidential
Does your security team have the necessary
       executive support?
                             Yes
                             No
                             What executive support?




8   © nCircle 2012 All rights reserved.   nCircle Company Confidential
In your organization, do security efforts suffer
     because compliance requirements drive the
     budget?
                          Yes
                          No




9   © nCircle 2012 All rights reserved.   nCircle Company Confidential
What percentage of your security operations
      program is automated?
                                          25% or less
                                          26 – 50%
                                          more than 50%




10   © nCircle 2012 All rights reserved.            nCircle Company Confidential
In which of the following types of tools has your
       organization invested the most budget?
                                     Vulnerability management
                                     Configuration auditing
                                     Patch management
                                     Identity and access management
                                     Antivirus and endpoint protection
                                     Penetration testing
                                     Malware detection
                                     Data loss prevention
                                     Governance risk and compliance
                                     Other
11   © nCircle 2012 All rights reserved.              nCircle Company Confidential
What’s the next major tool investment your
      organization has planned?
                                    Vulnerability management
                                    Configuration auditing
                                    Patch management
                                    Identity and access management
                                    Antivirus and endpoint protection
                                    Penetration testing
                                    Malware detection
                                    Data loss prevention
                                    Governance risk and compliance
                                    Other
12   © nCircle 2012 All rights reserved.              nCircle Company Confidential
Thank you for participating!




        Continue the conversation in our online community
        connect.ncircle.com




13   © nCircle 2012 All rights reserved.   nCircle Company Confidential

Compliance what does security have to do with it

  • 1.
    Compliance: What DoesSecurity Have To Do With It? Thank you for joining us. The webinar will start shortly. © nCircle 2012. All rights reserved.
  • 2.
    Compliance: What DoesSecurity Have To Do With It? © nCircle 2012. All rights reserved.
  • 3.
    Introductions: Panelists Rodney Brown CISSP, GIAC GISP, ITILv3 Andrew Storms Shelley Boose Dir. Security Operations Dir., Public Relation nCircle Tim Erlin Elizabeth Ireland Dir., IT Security and Risk Strategy VP, Marketing nCircle 3 © nCircle 2012 All rights reserved. nCircle Company Confidential
  • 4.
    Which compliance regulationsdoes your organization need to comply with? (check all that apply)  SOX  NERC  FISMA  HIPAA  PCI  GLBA  PIPEDA  Too many to name 4 © nCircle 2012 All rights reserved. nCircle Company Confidential
  • 5.
    How often doesyour organization have audits?  Annually  Quarterly  Monthly  Auditors live here 5 © nCircle 2012 All rights reserved. nCircle Company Confidential
  • 6.
    Does your securityteam spend too much time on audit requests?  Seems like that’s all we do  Audit requests take at more than half of our time  Occasional resource problem  We have plenty of resources to do both 6 © nCircle 2012 All rights reserved. nCircle Company Confidential
  • 7.
    In your experience,how aligned are security and compliance efforts?  Mostly aligned  Somewhat aligned  Barely related 7 © nCircle 2012 All rights reserved. nCircle Company Confidential
  • 8.
    Does your securityteam have the necessary executive support?  Yes  No  What executive support? 8 © nCircle 2012 All rights reserved. nCircle Company Confidential
  • 9.
    In your organization,do security efforts suffer because compliance requirements drive the budget?  Yes  No 9 © nCircle 2012 All rights reserved. nCircle Company Confidential
  • 10.
    What percentage ofyour security operations program is automated?  25% or less  26 – 50%  more than 50% 10 © nCircle 2012 All rights reserved. nCircle Company Confidential
  • 11.
    In which ofthe following types of tools has your organization invested the most budget?  Vulnerability management  Configuration auditing  Patch management  Identity and access management  Antivirus and endpoint protection  Penetration testing  Malware detection  Data loss prevention  Governance risk and compliance  Other 11 © nCircle 2012 All rights reserved. nCircle Company Confidential
  • 12.
    What’s the nextmajor tool investment your organization has planned?  Vulnerability management  Configuration auditing  Patch management  Identity and access management  Antivirus and endpoint protection  Penetration testing  Malware detection  Data loss prevention  Governance risk and compliance  Other 12 © nCircle 2012 All rights reserved. nCircle Company Confidential
  • 13.
    Thank you forparticipating! Continue the conversation in our online community connect.ncircle.com 13 © nCircle 2012 All rights reserved. nCircle Company Confidential