SlideShare a Scribd company logo
© 2017 Flexera Software LLC. All rights reserved. | Company Confidential1
Do you manage software?
Understand your role in cybersecurity defense
Marcelo Pereira, Product Marketing Manager
Tim Davis, Senior Product Marketing Manager
© 2017 Flexera Software LLC. All rights reserved. | Company Confidential2
The Cyber Threat Facing All Of Us
Costs And Consequences Security Incidents and Data Breaches
Extensive downtimeExposure of intellectual property
Damage to brand
and reputation
Theft/exposure of
confidential data
Reduced
productivity levels
© 2017 Flexera Software LLC. All rights reserved. | Company Confidential3
Impact of incidents
Source: “Cisco 2017 Annual Cybersecurity Report” http://www.cisco.com/c/en/us/products/security/security-reports.html
© 2017 Flexera Software LLC. All rights reserved. | Company Confidential4
To Watch This Webinar On Demand Register Here
© 2017 Flexera Software LLC. All rights reserved. | Company Confidential5
Security Incidents versus Data Breaches
And the cost of resolving incidents
Over
100,000
security incidents in
2015
From which
3,141
Were confirmed data
breaches
Sources:
“2016 Data Breach Investigation Report” Verizon http://www.verizonenterprise.com/verizon-insights-lab/dbir/2016/
* “2015 Cost of Cyber Crime Study: Global.” Ponemon Institute. October 2015. http://www.ponemon.org/blog/2015-cost-of-cyber-crime-united-states
$21,000
a day*
© 2017 Flexera Software LLC. All rights reserved. | Company Confidential6
Companies Breached In 2016 - Highlights
© 2017 Flexera Software LLC. All rights reserved. | Company Confidential7
“The Key Goal:
Reducing Adversaries Operational Space”
- Cisco
Source: “Cisco 2017 Annual Cybersecurity Report” http://www.cisco.com/c/en/us/products/security/security-reports.html
Addressing today’s challenges for security
© 2017 Flexera Software LLC. All rights reserved. | Company Confidential8
WATCH THIS WEBINAR ON
DEMAND REGISTER HERE
© 2017 Flexera Software LLC. All rights reserved. | Company Confidential9
Resilience
Detect
RespondRecover
Prevent
Breaches WILL
happen
Prevention:
Reduce the attack
surface for hackers
© 2017 Flexera Software LLC. All rights reserved. | Company Confidential11
“A Rapidly Expanding Attack Surface
Requires an Interconnected and Integrated
Approach to Security”
- Cisco
Source: “Cisco 2017 Annual Cybersecurity Report” http://www.cisco.com/c/en/us/products/security/security-reports.html
© 2017 Flexera Software LLC. All rights reserved. | Company Confidential12
The challenge of hitting a moving target
WATCH THIS WEBINAR ON
DEMAND REGISTER HERE
© 2017 Flexera Software LLC. All rights reserved. | Company Confidential13
Role: Information Security
Evangelize security awareness
Conduct vendor risk assessment
Oversee regulatory compliance
Assess security position of infrastructure
© 2017 Flexera Software LLC. All rights reserved. | Company Confidential14
Source: “Cisco 2017 Annual Cybersecurity Report” http://www.cisco.com/c/en/us/products/security/security-reports.html
Is Security a Priority?
© 2017 Flexera Software LLC. All rights reserved. | Company Confidential15
Role: IT Security
Mitigates the risk of security incidents and breaches
Identifies and responds quickly to incidents
© 2017 Flexera Software LLC. All rights reserved. | Company Confidential16
Dealing with possible security incidents
Source: “Cisco 2017 Annual Cybersecurity Report” http://www.cisco.com/c/en/us/products/security/security-reports.html
© 2017 Flexera Software LLC. All rights reserved. | Company Confidential17
The challenge of managing software
WATCH THIS WEBINAR ON
DEMAND REGISTER HERE
© 2017 Flexera Software LLC. All rights reserved. | Company Confidential18
Role: Desktop Management
Preform application risk assessment
Restrict use of unauthorized applications
Remove unused applications
Control Self-Service deployment
© 2017 Flexera Software LLC. All rights reserved. | Company Confidential19
Global Pharmaceutical Company
89% Reduction in the number of apps from
over 3,700 applications to just 400
• Reduced attack surface
• Improved governance
• Streamlined employee choice
• Saved $1,968,000 in labor costs in the first year
© 2017 Flexera Software LLC. All rights reserved. | Company Confidential20
Role: Software Asset Management
Discover software and maintain normalized inventory
Understand application usage trends
Reduce the application footprint
© 2017 Flexera Software LLC. All rights reserved. | Company Confidential21
Chicago Public Schools
Making informed decisions to reduce new software
purchases and negotiate more favorable vendor contracts
• Identified 29,000 different applications installed
• Discovered end of life (EOL) software
• Collaborated with the security team to remediate issues
© 2017 Flexera Software LLC. All rights reserved. | Company Confidential22
Role: Patch Management
Asses and Prioritize patching
Deploy patches and verify
Align with Security policies
© 2017 Flexera Software LLC. All rights reserved. | Company Confidential23
Security Patch Management
Challenges And Misconceptions
• Patch Management = managing deployment of patches
• No synergy between security assessment and patch activities
• Patching Microsoft applications is good enough
• Focus only on the most common non-Microsoft applications
• Relying on vendor information and alerts
CONSEQUENCES:
• Non prioritized patching process
• Waste of resources
• Applications staying unpatched for
months or many times, years
• Business disruption and breaches
© 2017 Flexera Software LLC. All rights reserved. | Company Confidential24
Time To Patch!
Patch Availability On The Day of Disclosure
Source: “Flexera Software Vulnerability Review 2017.” http://www.flexerasoftware.com/enterprise/resources/research/vulnerability-review/
81%
92.5%
© 2017 Flexera Software LLC. All rights reserved. | Company Confidential25
How our customer improved their processes
68%
69%
1 staff/day
58%
25%
Daily and
Weekly
Daily and
Weekly
2+ staff/day
© 2017 Flexera Software LLC. All rights reserved. | Company Confidential26
Conclusion
Operationalize people, processes and technology
in an integrated fashion to effectively reduce the
attack surface for cybercriminals and hackers.
Maintain and share accurate inventory data
Streamline and rationalize your portfolio
Conduct risk assessment
Prioritize security patching
© 2017 Flexera Software LLC. All rights reserved. | Company Confidential27
Additional Resources
Visit us online: www.flexerasoftware.com/enterprise/resources
White Papers:
Bridging Vulnerability Management Gaps
On Demand Webinar:
SAM and Security Teams Must Join Forces to Enhance Security
Success Story:
Chicago Public Schools
Reports:
Vulnerability Review 2017
© 2017 Flexera Software LLC. All rights reserved. | Company Confidential28
WE’RE REIMAGINING THE WAY SOFTWARE IS
w w w . f l e x e r a s o f t w a r e . c o m
SOLD SECUREDMANAGEDBOUGHT
North America: 800-809-5659
Europe, Middle East & Africa: +44 (0) 870 873 6300
Asia-Pacific: +61 3 9895 2000
WATCH THIS WEBINAR ON
DEMAND REGISTER HERE

More Related Content

What's hot

Webinar: Maximizing the ROI of IT by Simplifying Technology Complexity
Webinar: Maximizing the ROI of IT by Simplifying Technology ComplexityWebinar: Maximizing the ROI of IT by Simplifying Technology Complexity
Webinar: Maximizing the ROI of IT by Simplifying Technology Complexity
Flexera
 
Windows 10 webinar: What’s new for IT pros Windows 10 v 1709
Windows 10 webinar: What’s new for IT pros Windows 10 v 1709Windows 10 webinar: What’s new for IT pros Windows 10 v 1709
Windows 10 webinar: What’s new for IT pros Windows 10 v 1709
Flexera
 
Webinar- How Software License Optimization Empowers IT Procurement
Webinar- How Software License Optimization Empowers IT ProcurementWebinar- How Software License Optimization Empowers IT Procurement
Webinar- How Software License Optimization Empowers IT Procurement
Flexera
 
Webinar: What's New In FlexNet Manager Suite 2018 R1
Webinar: What's New In FlexNet Manager Suite 2018 R1Webinar: What's New In FlexNet Manager Suite 2018 R1
Webinar: What's New In FlexNet Manager Suite 2018 R1
Rana Zayed
 
7 Things You Need to Know for Your Cloud-First Strategy
7 Things You Need to Know for Your Cloud-First Strategy7 Things You Need to Know for Your Cloud-First Strategy
7 Things You Need to Know for Your Cloud-First Strategy
Flexera
 
Flexera Software Toolcase for the ITAM Review Tools Day
Flexera Software Toolcase for the ITAM Review Tools Day Flexera Software Toolcase for the ITAM Review Tools Day
Flexera Software Toolcase for the ITAM Review Tools Day
Martin Thompson
 
Get a Complete View of Your Business Services and IT Estate in ServiceNow wit...
Get a Complete View of Your Business Services and IT Estate in ServiceNow wit...Get a Complete View of Your Business Services and IT Estate in ServiceNow wit...
Get a Complete View of Your Business Services and IT Estate in ServiceNow wit...
Flexera
 
10 Tips to Optimize, Automate, and Govern your Hybrid IT Environment
10 Tips to Optimize, Automate, and Govern your Hybrid IT Environment10 Tips to Optimize, Automate, and Govern your Hybrid IT Environment
10 Tips to Optimize, Automate, and Govern your Hybrid IT Environment
Flexera
 
Using Automated Policies for SaaS Governance and Compliance
Using Automated Policies for SaaS Governance and ComplianceUsing Automated Policies for SaaS Governance and Compliance
Using Automated Policies for SaaS Governance and Compliance
Flexera
 
GDPR is Here. Now What?
GDPR is Here. Now What?GDPR is Here. Now What?
GDPR is Here. Now What?
Forcepoint LLC
 
How to Keep your Atlassian Cloud Secure
How to Keep your Atlassian Cloud SecureHow to Keep your Atlassian Cloud Secure
How to Keep your Atlassian Cloud Secure
Cprime
 
Cisco Connect 2018 Singapore - Do more than keep the lights on
Cisco Connect 2018 Singapore - Do more than keep the lights onCisco Connect 2018 Singapore - Do more than keep the lights on
Cisco Connect 2018 Singapore - Do more than keep the lights on
NetworkCollaborators
 
ServiceNow Webinar 12/1: Simplify Security Operations - Detect, Prioritize an...
ServiceNow Webinar 12/1: Simplify Security Operations - Detect, Prioritize an...ServiceNow Webinar 12/1: Simplify Security Operations - Detect, Prioritize an...
ServiceNow Webinar 12/1: Simplify Security Operations - Detect, Prioritize an...
LaRel Rogers
 
Flexera New York Tools Day
Flexera New York Tools DayFlexera New York Tools Day
Flexera New York Tools Day
Martin Thompson
 
Having Trouble Managing All Your Cloud Services? We Know!
Having Trouble Managing All Your Cloud Services? We Know!Having Trouble Managing All Your Cloud Services? We Know!
Having Trouble Managing All Your Cloud Services? We Know!
Flexera
 
How to Govern Identities and Access in Cloud Infrastructure: AppsFlyer Case S...
How to Govern Identities and Access in Cloud Infrastructure: AppsFlyer Case S...How to Govern Identities and Access in Cloud Infrastructure: AppsFlyer Case S...
How to Govern Identities and Access in Cloud Infrastructure: AppsFlyer Case S...
DevOps.com
 
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud WorldCisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
NetworkCollaborators
 
Secure Data Sharing in OpenShift Environments
Secure Data Sharing in OpenShift EnvironmentsSecure Data Sharing in OpenShift Environments
Secure Data Sharing in OpenShift Environments
DevOps.com
 
Software License Optimization Managed Services from Flexera Software
Software License Optimization Managed Services from Flexera SoftwareSoftware License Optimization Managed Services from Flexera Software
Software License Optimization Managed Services from Flexera Software
Flexera
 
Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...
Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...
Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...
NetworkCollaborators
 

What's hot (20)

Webinar: Maximizing the ROI of IT by Simplifying Technology Complexity
Webinar: Maximizing the ROI of IT by Simplifying Technology ComplexityWebinar: Maximizing the ROI of IT by Simplifying Technology Complexity
Webinar: Maximizing the ROI of IT by Simplifying Technology Complexity
 
Windows 10 webinar: What’s new for IT pros Windows 10 v 1709
Windows 10 webinar: What’s new for IT pros Windows 10 v 1709Windows 10 webinar: What’s new for IT pros Windows 10 v 1709
Windows 10 webinar: What’s new for IT pros Windows 10 v 1709
 
Webinar- How Software License Optimization Empowers IT Procurement
Webinar- How Software License Optimization Empowers IT ProcurementWebinar- How Software License Optimization Empowers IT Procurement
Webinar- How Software License Optimization Empowers IT Procurement
 
Webinar: What's New In FlexNet Manager Suite 2018 R1
Webinar: What's New In FlexNet Manager Suite 2018 R1Webinar: What's New In FlexNet Manager Suite 2018 R1
Webinar: What's New In FlexNet Manager Suite 2018 R1
 
7 Things You Need to Know for Your Cloud-First Strategy
7 Things You Need to Know for Your Cloud-First Strategy7 Things You Need to Know for Your Cloud-First Strategy
7 Things You Need to Know for Your Cloud-First Strategy
 
Flexera Software Toolcase for the ITAM Review Tools Day
Flexera Software Toolcase for the ITAM Review Tools Day Flexera Software Toolcase for the ITAM Review Tools Day
Flexera Software Toolcase for the ITAM Review Tools Day
 
Get a Complete View of Your Business Services and IT Estate in ServiceNow wit...
Get a Complete View of Your Business Services and IT Estate in ServiceNow wit...Get a Complete View of Your Business Services and IT Estate in ServiceNow wit...
Get a Complete View of Your Business Services and IT Estate in ServiceNow wit...
 
10 Tips to Optimize, Automate, and Govern your Hybrid IT Environment
10 Tips to Optimize, Automate, and Govern your Hybrid IT Environment10 Tips to Optimize, Automate, and Govern your Hybrid IT Environment
10 Tips to Optimize, Automate, and Govern your Hybrid IT Environment
 
Using Automated Policies for SaaS Governance and Compliance
Using Automated Policies for SaaS Governance and ComplianceUsing Automated Policies for SaaS Governance and Compliance
Using Automated Policies for SaaS Governance and Compliance
 
GDPR is Here. Now What?
GDPR is Here. Now What?GDPR is Here. Now What?
GDPR is Here. Now What?
 
How to Keep your Atlassian Cloud Secure
How to Keep your Atlassian Cloud SecureHow to Keep your Atlassian Cloud Secure
How to Keep your Atlassian Cloud Secure
 
Cisco Connect 2018 Singapore - Do more than keep the lights on
Cisco Connect 2018 Singapore - Do more than keep the lights onCisco Connect 2018 Singapore - Do more than keep the lights on
Cisco Connect 2018 Singapore - Do more than keep the lights on
 
ServiceNow Webinar 12/1: Simplify Security Operations - Detect, Prioritize an...
ServiceNow Webinar 12/1: Simplify Security Operations - Detect, Prioritize an...ServiceNow Webinar 12/1: Simplify Security Operations - Detect, Prioritize an...
ServiceNow Webinar 12/1: Simplify Security Operations - Detect, Prioritize an...
 
Flexera New York Tools Day
Flexera New York Tools DayFlexera New York Tools Day
Flexera New York Tools Day
 
Having Trouble Managing All Your Cloud Services? We Know!
Having Trouble Managing All Your Cloud Services? We Know!Having Trouble Managing All Your Cloud Services? We Know!
Having Trouble Managing All Your Cloud Services? We Know!
 
How to Govern Identities and Access in Cloud Infrastructure: AppsFlyer Case S...
How to Govern Identities and Access in Cloud Infrastructure: AppsFlyer Case S...How to Govern Identities and Access in Cloud Infrastructure: AppsFlyer Case S...
How to Govern Identities and Access in Cloud Infrastructure: AppsFlyer Case S...
 
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud WorldCisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
 
Secure Data Sharing in OpenShift Environments
Secure Data Sharing in OpenShift EnvironmentsSecure Data Sharing in OpenShift Environments
Secure Data Sharing in OpenShift Environments
 
Software License Optimization Managed Services from Flexera Software
Software License Optimization Managed Services from Flexera SoftwareSoftware License Optimization Managed Services from Flexera Software
Software License Optimization Managed Services from Flexera Software
 
Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...
Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...
Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...
 

Similar to Do You Manage Software? Understanding Your Role in Cybersecurity Defense

Six Steps to Secure Access for Privileged Insiders & Vendors
Six Steps to Secure Access for Privileged Insiders & VendorsSix Steps to Secure Access for Privileged Insiders & Vendors
Six Steps to Secure Access for Privileged Insiders & Vendors
Bomgar
 
Security and Data Breach
Security and Data BreachSecurity and Data Breach
Security and Data Breach
DevOps Indonesia
 
5 Mobile App Security MUST-DOs in 2018
5 Mobile App Security MUST-DOs in 20185 Mobile App Security MUST-DOs in 2018
5 Mobile App Security MUST-DOs in 2018
NowSecure
 
Application Security in a DevOps World
Application Security in a DevOps WorldApplication Security in a DevOps World
Application Security in a DevOps World
CA Technologies
 
Protecting What Matters Most – Data
Protecting What Matters Most – DataProtecting What Matters Most – Data
Protecting What Matters Most – Data
Fujitsu Middle East
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security Program
CA Technologies
 
Integrating AppSec into Your DevSecOps on AWS - DEM14 - AWS re:Inforce 2019
Integrating AppSec into Your DevSecOps on AWS - DEM14 - AWS re:Inforce 2019 Integrating AppSec into Your DevSecOps on AWS - DEM14 - AWS re:Inforce 2019
Integrating AppSec into Your DevSecOps on AWS - DEM14 - AWS re:Inforce 2019
Amazon Web Services
 
Vetting Mobile Apps for Corporate Use: Security Essentials
Vetting Mobile Apps for Corporate Use: Security EssentialsVetting Mobile Apps for Corporate Use: Security Essentials
Vetting Mobile Apps for Corporate Use: Security Essentials
NowSecure
 
Synopsys Security Event Israel Presentation: Keynote: Securing Your Software,...
Synopsys Security Event Israel Presentation: Keynote: Securing Your Software,...Synopsys Security Event Israel Presentation: Keynote: Securing Your Software,...
Synopsys Security Event Israel Presentation: Keynote: Securing Your Software,...
Synopsys Software Integrity Group
 
Responding to the Pandemic: Information Security and Technology Trends
Responding to the Pandemic: Information Security and Technology Trends Responding to the Pandemic: Information Security and Technology Trends
Responding to the Pandemic: Information Security and Technology Trends
Enterprise Management Associates
 
Top 6 Web Application Security Best Practices.pdf
Top 6 Web Application Security Best Practices.pdfTop 6 Web Application Security Best Practices.pdf
Top 6 Web Application Security Best Practices.pdf
SolviosTechnology
 
Understanding Your Attack Surface and Detecting & Mitigating External Threats
Understanding Your Attack Surface and Detecting & Mitigating External ThreatsUnderstanding Your Attack Surface and Detecting & Mitigating External Threats
Understanding Your Attack Surface and Detecting & Mitigating External Threats
Ulf Mattsson
 
Cisco Connect 2018 Thailand - Changing the security equation demetris booth_c...
Cisco Connect 2018 Thailand - Changing the security equation demetris booth_c...Cisco Connect 2018 Thailand - Changing the security equation demetris booth_c...
Cisco Connect 2018 Thailand - Changing the security equation demetris booth_c...
NetworkCollaborators
 
Solving for Compliance: Mobile app security for banking and financial services
Solving for Compliance: Mobile app security for banking and financial servicesSolving for Compliance: Mobile app security for banking and financial services
Solving for Compliance: Mobile app security for banking and financial services
NowSecure
 
Cisco Connect 2018 Malaysia - Cisco incident response services-strengthen you...
Cisco Connect 2018 Malaysia - Cisco incident response services-strengthen you...Cisco Connect 2018 Malaysia - Cisco incident response services-strengthen you...
Cisco Connect 2018 Malaysia - Cisco incident response services-strengthen you...
NetworkCollaborators
 
Cybersecurity - How to Protect your Organisation from Cybersecurity Threats
Cybersecurity - How to Protect your Organisation from Cybersecurity Threats Cybersecurity - How to Protect your Organisation from Cybersecurity Threats
Cybersecurity - How to Protect your Organisation from Cybersecurity Threats
Craig Thornton
 
Alfresco Virtual DevCon 2020 - Security First!
Alfresco Virtual DevCon 2020 - Security First!Alfresco Virtual DevCon 2020 - Security First!
Alfresco Virtual DevCon 2020 - Security First!
Jason Jolley
 
Implementing a Security Management Framework
Implementing a Security Management FrameworkImplementing a Security Management Framework
Implementing a Security Management Framework
Joseph Wynn
 
SecDevOps: afaste-se dos ciberataques sem complicar o dia a dia dos desenvolv...
SecDevOps: afaste-se dos ciberataques sem complicar o dia a dia dos desenvolv...SecDevOps: afaste-se dos ciberataques sem complicar o dia a dia dos desenvolv...
SecDevOps: afaste-se dos ciberataques sem complicar o dia a dia dos desenvolv...
Dárcio Takara
 
3 Enablers of Successful Cyber Attacks and How to Thwart Them
3 Enablers of Successful Cyber Attacks and How to Thwart Them3 Enablers of Successful Cyber Attacks and How to Thwart Them
3 Enablers of Successful Cyber Attacks and How to Thwart Them
IBM Security
 

Similar to Do You Manage Software? Understanding Your Role in Cybersecurity Defense (20)

Six Steps to Secure Access for Privileged Insiders & Vendors
Six Steps to Secure Access for Privileged Insiders & VendorsSix Steps to Secure Access for Privileged Insiders & Vendors
Six Steps to Secure Access for Privileged Insiders & Vendors
 
Security and Data Breach
Security and Data BreachSecurity and Data Breach
Security and Data Breach
 
5 Mobile App Security MUST-DOs in 2018
5 Mobile App Security MUST-DOs in 20185 Mobile App Security MUST-DOs in 2018
5 Mobile App Security MUST-DOs in 2018
 
Application Security in a DevOps World
Application Security in a DevOps WorldApplication Security in a DevOps World
Application Security in a DevOps World
 
Protecting What Matters Most – Data
Protecting What Matters Most – DataProtecting What Matters Most – Data
Protecting What Matters Most – Data
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security Program
 
Integrating AppSec into Your DevSecOps on AWS - DEM14 - AWS re:Inforce 2019
Integrating AppSec into Your DevSecOps on AWS - DEM14 - AWS re:Inforce 2019 Integrating AppSec into Your DevSecOps on AWS - DEM14 - AWS re:Inforce 2019
Integrating AppSec into Your DevSecOps on AWS - DEM14 - AWS re:Inforce 2019
 
Vetting Mobile Apps for Corporate Use: Security Essentials
Vetting Mobile Apps for Corporate Use: Security EssentialsVetting Mobile Apps for Corporate Use: Security Essentials
Vetting Mobile Apps for Corporate Use: Security Essentials
 
Synopsys Security Event Israel Presentation: Keynote: Securing Your Software,...
Synopsys Security Event Israel Presentation: Keynote: Securing Your Software,...Synopsys Security Event Israel Presentation: Keynote: Securing Your Software,...
Synopsys Security Event Israel Presentation: Keynote: Securing Your Software,...
 
Responding to the Pandemic: Information Security and Technology Trends
Responding to the Pandemic: Information Security and Technology Trends Responding to the Pandemic: Information Security and Technology Trends
Responding to the Pandemic: Information Security and Technology Trends
 
Top 6 Web Application Security Best Practices.pdf
Top 6 Web Application Security Best Practices.pdfTop 6 Web Application Security Best Practices.pdf
Top 6 Web Application Security Best Practices.pdf
 
Understanding Your Attack Surface and Detecting & Mitigating External Threats
Understanding Your Attack Surface and Detecting & Mitigating External ThreatsUnderstanding Your Attack Surface and Detecting & Mitigating External Threats
Understanding Your Attack Surface and Detecting & Mitigating External Threats
 
Cisco Connect 2018 Thailand - Changing the security equation demetris booth_c...
Cisco Connect 2018 Thailand - Changing the security equation demetris booth_c...Cisco Connect 2018 Thailand - Changing the security equation demetris booth_c...
Cisco Connect 2018 Thailand - Changing the security equation demetris booth_c...
 
Solving for Compliance: Mobile app security for banking and financial services
Solving for Compliance: Mobile app security for banking and financial servicesSolving for Compliance: Mobile app security for banking and financial services
Solving for Compliance: Mobile app security for banking and financial services
 
Cisco Connect 2018 Malaysia - Cisco incident response services-strengthen you...
Cisco Connect 2018 Malaysia - Cisco incident response services-strengthen you...Cisco Connect 2018 Malaysia - Cisco incident response services-strengthen you...
Cisco Connect 2018 Malaysia - Cisco incident response services-strengthen you...
 
Cybersecurity - How to Protect your Organisation from Cybersecurity Threats
Cybersecurity - How to Protect your Organisation from Cybersecurity Threats Cybersecurity - How to Protect your Organisation from Cybersecurity Threats
Cybersecurity - How to Protect your Organisation from Cybersecurity Threats
 
Alfresco Virtual DevCon 2020 - Security First!
Alfresco Virtual DevCon 2020 - Security First!Alfresco Virtual DevCon 2020 - Security First!
Alfresco Virtual DevCon 2020 - Security First!
 
Implementing a Security Management Framework
Implementing a Security Management FrameworkImplementing a Security Management Framework
Implementing a Security Management Framework
 
SecDevOps: afaste-se dos ciberataques sem complicar o dia a dia dos desenvolv...
SecDevOps: afaste-se dos ciberataques sem complicar o dia a dia dos desenvolv...SecDevOps: afaste-se dos ciberataques sem complicar o dia a dia dos desenvolv...
SecDevOps: afaste-se dos ciberataques sem complicar o dia a dia dos desenvolv...
 
3 Enablers of Successful Cyber Attacks and How to Thwart Them
3 Enablers of Successful Cyber Attacks and How to Thwart Them3 Enablers of Successful Cyber Attacks and How to Thwart Them
3 Enablers of Successful Cyber Attacks and How to Thwart Them
 

More from Flexera

Make Smarter Cloud Decisions at Every Step of Your Journey
Make Smarter Cloud Decisions at Every Step of Your JourneyMake Smarter Cloud Decisions at Every Step of Your Journey
Make Smarter Cloud Decisions at Every Step of Your Journey
Flexera
 
The Practical Approach for End-to-End SaaS Management
The Practical Approach for End-to-End SaaS ManagementThe Practical Approach for End-to-End SaaS Management
The Practical Approach for End-to-End SaaS Management
Flexera
 
The Role of In-House & External Counsel in Managing Open Source Software
The Role of In-House & External Counsel in Managing Open Source SoftwareThe Role of In-House & External Counsel in Managing Open Source Software
The Role of In-House & External Counsel in Managing Open Source Software
Flexera
 
Addressing Open Source Risks During M&A: A Legal View
Addressing Open Source Risks During M&A: A Legal ViewAddressing Open Source Risks During M&A: A Legal View
Addressing Open Source Risks During M&A: A Legal View
Flexera
 
Webinar: What's New In FlexNet Manager Suite 2018 R1
Webinar: What's New In FlexNet Manager Suite 2018 R1Webinar: What's New In FlexNet Manager Suite 2018 R1
Webinar: What's New In FlexNet Manager Suite 2018 R1
Flexera
 
Open Source Security - It can be done easily.
Open Source Security - It can be done easily.Open Source Security - It can be done easily.
Open Source Security - It can be done easily.
Flexera
 
Software Distribution, Customer Experience and the IoT: Get Ready for Fast, S...
Software Distribution, Customer Experience and the IoT: Get Ready for Fast, S...Software Distribution, Customer Experience and the IoT: Get Ready for Fast, S...
Software Distribution, Customer Experience and the IoT: Get Ready for Fast, S...
Flexera
 
Don’t Let Hackers Breach Your Data: Shutting Your Risk Window on Apache Struts2
Don’t Let Hackers Breach Your Data:  Shutting Your Risk Window on Apache Struts2Don’t Let Hackers Breach Your Data:  Shutting Your Risk Window on Apache Struts2
Don’t Let Hackers Breach Your Data: Shutting Your Risk Window on Apache Struts2
Flexera
 
Digital Transformation, Cloud Adoption and the Impact on SAM and Security
Digital Transformation, Cloud Adoption and the Impact on SAM and SecurityDigital Transformation, Cloud Adoption and the Impact on SAM and Security
Digital Transformation, Cloud Adoption and the Impact on SAM and Security
Flexera
 
10 Steps to Simplify your Windows 10 Migration
10 Steps to Simplify your Windows 10 Migration10 Steps to Simplify your Windows 10 Migration
10 Steps to Simplify your Windows 10 Migration
Flexera
 
Webinar: Making the Move to SaaS - Commercial and Licensing Implications
Webinar: Making the Move to SaaS - Commercial and Licensing ImplicationsWebinar: Making the Move to SaaS - Commercial and Licensing Implications
Webinar: Making the Move to SaaS - Commercial and Licensing Implications
Flexera
 
Cybersecurity Strategy Must Include Software License Optimization
Cybersecurity Strategy Must Include Software License OptimizationCybersecurity Strategy Must Include Software License Optimization
Cybersecurity Strategy Must Include Software License Optimization
Flexera
 
Webinar: The Power of Normalized Inventory
Webinar: The Power of Normalized InventoryWebinar: The Power of Normalized Inventory
Webinar: The Power of Normalized Inventory
Flexera
 
Windows 10 One Year Later: What’s Holding You Back?
Windows 10 One Year Later: What’s Holding You Back? Windows 10 One Year Later: What’s Holding You Back?
Windows 10 One Year Later: What’s Holding You Back?
Flexera
 
Webinar: What's New in FlexNet Manager Suite 2016
Webinar: What's New in FlexNet Manager Suite 2016Webinar: What's New in FlexNet Manager Suite 2016
Webinar: What's New in FlexNet Manager Suite 2016
Flexera
 

More from Flexera (15)

Make Smarter Cloud Decisions at Every Step of Your Journey
Make Smarter Cloud Decisions at Every Step of Your JourneyMake Smarter Cloud Decisions at Every Step of Your Journey
Make Smarter Cloud Decisions at Every Step of Your Journey
 
The Practical Approach for End-to-End SaaS Management
The Practical Approach for End-to-End SaaS ManagementThe Practical Approach for End-to-End SaaS Management
The Practical Approach for End-to-End SaaS Management
 
The Role of In-House & External Counsel in Managing Open Source Software
The Role of In-House & External Counsel in Managing Open Source SoftwareThe Role of In-House & External Counsel in Managing Open Source Software
The Role of In-House & External Counsel in Managing Open Source Software
 
Addressing Open Source Risks During M&A: A Legal View
Addressing Open Source Risks During M&A: A Legal ViewAddressing Open Source Risks During M&A: A Legal View
Addressing Open Source Risks During M&A: A Legal View
 
Webinar: What's New In FlexNet Manager Suite 2018 R1
Webinar: What's New In FlexNet Manager Suite 2018 R1Webinar: What's New In FlexNet Manager Suite 2018 R1
Webinar: What's New In FlexNet Manager Suite 2018 R1
 
Open Source Security - It can be done easily.
Open Source Security - It can be done easily.Open Source Security - It can be done easily.
Open Source Security - It can be done easily.
 
Software Distribution, Customer Experience and the IoT: Get Ready for Fast, S...
Software Distribution, Customer Experience and the IoT: Get Ready for Fast, S...Software Distribution, Customer Experience and the IoT: Get Ready for Fast, S...
Software Distribution, Customer Experience and the IoT: Get Ready for Fast, S...
 
Don’t Let Hackers Breach Your Data: Shutting Your Risk Window on Apache Struts2
Don’t Let Hackers Breach Your Data:  Shutting Your Risk Window on Apache Struts2Don’t Let Hackers Breach Your Data:  Shutting Your Risk Window on Apache Struts2
Don’t Let Hackers Breach Your Data: Shutting Your Risk Window on Apache Struts2
 
Digital Transformation, Cloud Adoption and the Impact on SAM and Security
Digital Transformation, Cloud Adoption and the Impact on SAM and SecurityDigital Transformation, Cloud Adoption and the Impact on SAM and Security
Digital Transformation, Cloud Adoption and the Impact on SAM and Security
 
10 Steps to Simplify your Windows 10 Migration
10 Steps to Simplify your Windows 10 Migration10 Steps to Simplify your Windows 10 Migration
10 Steps to Simplify your Windows 10 Migration
 
Webinar: Making the Move to SaaS - Commercial and Licensing Implications
Webinar: Making the Move to SaaS - Commercial and Licensing ImplicationsWebinar: Making the Move to SaaS - Commercial and Licensing Implications
Webinar: Making the Move to SaaS - Commercial and Licensing Implications
 
Cybersecurity Strategy Must Include Software License Optimization
Cybersecurity Strategy Must Include Software License OptimizationCybersecurity Strategy Must Include Software License Optimization
Cybersecurity Strategy Must Include Software License Optimization
 
Webinar: The Power of Normalized Inventory
Webinar: The Power of Normalized InventoryWebinar: The Power of Normalized Inventory
Webinar: The Power of Normalized Inventory
 
Windows 10 One Year Later: What’s Holding You Back?
Windows 10 One Year Later: What’s Holding You Back? Windows 10 One Year Later: What’s Holding You Back?
Windows 10 One Year Later: What’s Holding You Back?
 
Webinar: What's New in FlexNet Manager Suite 2016
Webinar: What's New in FlexNet Manager Suite 2016Webinar: What's New in FlexNet Manager Suite 2016
Webinar: What's New in FlexNet Manager Suite 2016
 

Recently uploaded

Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 

Recently uploaded (20)

Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 

Do You Manage Software? Understanding Your Role in Cybersecurity Defense

  • 1. © 2017 Flexera Software LLC. All rights reserved. | Company Confidential1 Do you manage software? Understand your role in cybersecurity defense Marcelo Pereira, Product Marketing Manager Tim Davis, Senior Product Marketing Manager
  • 2. © 2017 Flexera Software LLC. All rights reserved. | Company Confidential2 The Cyber Threat Facing All Of Us Costs And Consequences Security Incidents and Data Breaches Extensive downtimeExposure of intellectual property Damage to brand and reputation Theft/exposure of confidential data Reduced productivity levels
  • 3. © 2017 Flexera Software LLC. All rights reserved. | Company Confidential3 Impact of incidents Source: “Cisco 2017 Annual Cybersecurity Report” http://www.cisco.com/c/en/us/products/security/security-reports.html
  • 4. © 2017 Flexera Software LLC. All rights reserved. | Company Confidential4 To Watch This Webinar On Demand Register Here
  • 5. © 2017 Flexera Software LLC. All rights reserved. | Company Confidential5 Security Incidents versus Data Breaches And the cost of resolving incidents Over 100,000 security incidents in 2015 From which 3,141 Were confirmed data breaches Sources: “2016 Data Breach Investigation Report” Verizon http://www.verizonenterprise.com/verizon-insights-lab/dbir/2016/ * “2015 Cost of Cyber Crime Study: Global.” Ponemon Institute. October 2015. http://www.ponemon.org/blog/2015-cost-of-cyber-crime-united-states $21,000 a day*
  • 6. © 2017 Flexera Software LLC. All rights reserved. | Company Confidential6 Companies Breached In 2016 - Highlights
  • 7. © 2017 Flexera Software LLC. All rights reserved. | Company Confidential7 “The Key Goal: Reducing Adversaries Operational Space” - Cisco Source: “Cisco 2017 Annual Cybersecurity Report” http://www.cisco.com/c/en/us/products/security/security-reports.html Addressing today’s challenges for security
  • 8. © 2017 Flexera Software LLC. All rights reserved. | Company Confidential8 WATCH THIS WEBINAR ON DEMAND REGISTER HERE
  • 9. © 2017 Flexera Software LLC. All rights reserved. | Company Confidential9 Resilience Detect RespondRecover Prevent Breaches WILL happen
  • 11. © 2017 Flexera Software LLC. All rights reserved. | Company Confidential11 “A Rapidly Expanding Attack Surface Requires an Interconnected and Integrated Approach to Security” - Cisco Source: “Cisco 2017 Annual Cybersecurity Report” http://www.cisco.com/c/en/us/products/security/security-reports.html
  • 12. © 2017 Flexera Software LLC. All rights reserved. | Company Confidential12 The challenge of hitting a moving target WATCH THIS WEBINAR ON DEMAND REGISTER HERE
  • 13. © 2017 Flexera Software LLC. All rights reserved. | Company Confidential13 Role: Information Security Evangelize security awareness Conduct vendor risk assessment Oversee regulatory compliance Assess security position of infrastructure
  • 14. © 2017 Flexera Software LLC. All rights reserved. | Company Confidential14 Source: “Cisco 2017 Annual Cybersecurity Report” http://www.cisco.com/c/en/us/products/security/security-reports.html Is Security a Priority?
  • 15. © 2017 Flexera Software LLC. All rights reserved. | Company Confidential15 Role: IT Security Mitigates the risk of security incidents and breaches Identifies and responds quickly to incidents
  • 16. © 2017 Flexera Software LLC. All rights reserved. | Company Confidential16 Dealing with possible security incidents Source: “Cisco 2017 Annual Cybersecurity Report” http://www.cisco.com/c/en/us/products/security/security-reports.html
  • 17. © 2017 Flexera Software LLC. All rights reserved. | Company Confidential17 The challenge of managing software WATCH THIS WEBINAR ON DEMAND REGISTER HERE
  • 18. © 2017 Flexera Software LLC. All rights reserved. | Company Confidential18 Role: Desktop Management Preform application risk assessment Restrict use of unauthorized applications Remove unused applications Control Self-Service deployment
  • 19. © 2017 Flexera Software LLC. All rights reserved. | Company Confidential19 Global Pharmaceutical Company 89% Reduction in the number of apps from over 3,700 applications to just 400 • Reduced attack surface • Improved governance • Streamlined employee choice • Saved $1,968,000 in labor costs in the first year
  • 20. © 2017 Flexera Software LLC. All rights reserved. | Company Confidential20 Role: Software Asset Management Discover software and maintain normalized inventory Understand application usage trends Reduce the application footprint
  • 21. © 2017 Flexera Software LLC. All rights reserved. | Company Confidential21 Chicago Public Schools Making informed decisions to reduce new software purchases and negotiate more favorable vendor contracts • Identified 29,000 different applications installed • Discovered end of life (EOL) software • Collaborated with the security team to remediate issues
  • 22. © 2017 Flexera Software LLC. All rights reserved. | Company Confidential22 Role: Patch Management Asses and Prioritize patching Deploy patches and verify Align with Security policies
  • 23. © 2017 Flexera Software LLC. All rights reserved. | Company Confidential23 Security Patch Management Challenges And Misconceptions • Patch Management = managing deployment of patches • No synergy between security assessment and patch activities • Patching Microsoft applications is good enough • Focus only on the most common non-Microsoft applications • Relying on vendor information and alerts CONSEQUENCES: • Non prioritized patching process • Waste of resources • Applications staying unpatched for months or many times, years • Business disruption and breaches
  • 24. © 2017 Flexera Software LLC. All rights reserved. | Company Confidential24 Time To Patch! Patch Availability On The Day of Disclosure Source: “Flexera Software Vulnerability Review 2017.” http://www.flexerasoftware.com/enterprise/resources/research/vulnerability-review/ 81% 92.5%
  • 25. © 2017 Flexera Software LLC. All rights reserved. | Company Confidential25 How our customer improved their processes 68% 69% 1 staff/day 58% 25% Daily and Weekly Daily and Weekly 2+ staff/day
  • 26. © 2017 Flexera Software LLC. All rights reserved. | Company Confidential26 Conclusion Operationalize people, processes and technology in an integrated fashion to effectively reduce the attack surface for cybercriminals and hackers. Maintain and share accurate inventory data Streamline and rationalize your portfolio Conduct risk assessment Prioritize security patching
  • 27. © 2017 Flexera Software LLC. All rights reserved. | Company Confidential27 Additional Resources Visit us online: www.flexerasoftware.com/enterprise/resources White Papers: Bridging Vulnerability Management Gaps On Demand Webinar: SAM and Security Teams Must Join Forces to Enhance Security Success Story: Chicago Public Schools Reports: Vulnerability Review 2017
  • 28. © 2017 Flexera Software LLC. All rights reserved. | Company Confidential28 WE’RE REIMAGINING THE WAY SOFTWARE IS w w w . f l e x e r a s o f t w a r e . c o m SOLD SECUREDMANAGEDBOUGHT North America: 800-809-5659 Europe, Middle East & Africa: +44 (0) 870 873 6300 Asia-Pacific: +61 3 9895 2000 WATCH THIS WEBINAR ON DEMAND REGISTER HERE