SlideShare a Scribd company logo
@solarwinds
Best Practices and Tools for Reducing
Insider Threats
Federal webinar
November 29, 2018
@solarwinds 2
• SolarWinds Overview
• Leading Sources of Security Threats
• Insider Threat Flow Response Process
• SolarWinds® Security and Network Tools Can Help
• Building Security Into Your IT Security Posture
• Demonstration
• Compliance Resources
• Q&A
Presented by:
Sean Martinez
Sales Engineer, Advisory
SolarWinds
sean.martinez@solarwinds.com
Agenda
© 2018 SolarWinds Worldwide, LLC. All rights reserved.
@solarwinds 3
SolarWinds at a Glance
© 2018 SolarWinds Worldwide, LLC. All Rights Reserved.
1 Customers are defined as individuals or entities that have an active subscription for our subscription products or that have purchased one or more of our perpetual license products since our inception under a unique customer identification number. We may have multiple
purchasers of our products within a single organization, each of which may be assigned a unique customer identification number and deemed a separate customer.
2 IDC defined Network Management Software functional market, IDC’s Worldwide Semiannual Software Tracker, April 2018.
#1
in Network
Management2
275,000+
customers in 190
countries1
499
of Fortune 500®
50+
IT management
products
22,000+ > 450,000+
MSPs serving organizations
Every Branch of the DoD, and
nearly every civilian and
intelligence agency
150,000+ THWACK® registered members
Founded in 1999
More than 2,400 employees
globally
Austin, TX headquarters
Herndon, VA federal office
30+ offices globally
Leader
in Remote Monitoring
and Management
SOLARWINDS FEDERAL CYBERSECURITY SURVEY SUMMARY REPORT | MARKET CONNECTIONS, INC. | 703.378.2025
© 2018 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
IT SECURITY OBSTACLES, THREATS, AND BREACHES 4
Careless/untrained insiders and foreign governments are noted as the largest sources of security threats at federal agencies.
Significantly more defense than civilian respondents indicate malicious insiders are a security threat at their agency.
Sources of Security Threats
What are the greatest sources of IT security threats to your agency? (select all that apply)
N=200
Note: Multiple responses allowed
2%
1%
2%
12%
17%
20%
29%
34%
38%
48%
54%
0% 10% 20% 30% 40% 50% 60%
None of the above
Other
Unsure of these threats
Industrial spies
For-profit crime
Terrorists
Malicious insiders
Hacktivists
General hacking community
Foreign governments
Careless/untrained insiders
By Agency Type
Defense Civilian
40% 21%
= statistically significant difference
SOLARWINDS FEDERAL CYBERSECURITY SURVEY SUMMARY REPORT | MARKET CONNECTIONS, INC. | 703.378.2025
© 2018 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
IT SECURITY OBSTACLES, THREATS, AND BREACHES 5
There has been no significant reduction in the various sources of security threats. Since 2014, respondents indicate
significant increases in threats from both careless/untrained and malicious insiders.
Sources of Security Threats - Trend
What are the greatest sources of IT security threats to your agency? (select all that apply)
N=200
Note: Multiple responses allowed = statistically significant difference= top 3 sources
2014 2015 2016 2017
Careless/untrained
insiders
42% 53% 48% 54%
Foreign governments 34% 38% 48% 48%
General hacking
community
47% 46% 46% 38%
Hacktivists 26% 30% 38% 34%
Malicious insiders 17% 23% 22% 29%
Terrorists 21% 18% 24% 20%
For-profit crime 11% 14% 18% 17%
Industrial spies 6% 10% 16% 12%
SOLARWINDS FEDERAL CYBERSECURITY SURVEY SUMMARY REPORT | MARKET CONNECTIONS, INC. | 703.378.2025
© 2018 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
6
Insider Threat Detection Difficulties
2015 CYBERSECURITY SURVEY: INSIDER BREACH CAUSES AND DETECTION DIFFICULTIES
The volume of network activity is noted most often as what makes insider threat detection and
prevention most difficult. One third also note the lack of IT staff training, the use of cloud
services, and pressure to change configuration quickly versus securely.
In today’s environment, what makes insider threat detection and prevention more difficult?
3%
19%
22%
23%
24%
24%
26%
27%
27%
30%
34%
35%
35%
40%
0% 10% 20% 30% 40% 50%
Other
Functionality of and access to critical systems
Inadequate change control practices
Complexity of monitoring tools
Inadequate configuration management of IT assets
Inadequate visibility into users’ network activity
Inadequate monitoring of storage devices
Growing adoption of BYOD
Cost of sophisticated tools
Use of mobile devices
Pressure to change IT configurations quickly more so…
Growing use of cloud services
Lack of IT staff training
Volume of network activity
Defense Civilian
Inadequate
configuration
management
of IT assets
17% 28%
Inadequate
monitoring of
storage
devices
18% 32%
= statistically significant difference
Note: Multiple responses allowed
N=200
IT/ Security
Staff
IT/Security
Manager/
Director
Volume of
network
activity
29% 44%
SOLARWINDS FEDERAL CYBERSECURITY SURVEY SUMMARY REPORT | MARKET CONNECTIONS, INC. | 703.378.2025
© 2018 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
4%
24%
28%
31%
33%
36%
37%
37%
41%
44%
49%
0% 10% 20% 30% 40% 50% 60%
Other
Insecure configuration of IT assets
Incorrect disposal of hardware
Not applying security updates
Incorrect use of approved personal devices
Device loss
Poor password management
Using personal devices that are against company IT policies
Accidentally deleting, corrupting or modifying critical data
Data copied to insecure device
Phishing attacks
7
Accidental Insider Breach Causes
2015 CYBERSECURITY SURVEY: INSIDER BREACH CAUSES AND DETECTION DIFFICULTIES
The most common causes of accidental insider IT security breaches are phishing attacks, followed by
data copied to an insecure device and accidentally deleting, corrupting, or modifying critical data.
What are the most common causes of accidental insider IT security breaches caused by the untrained or careless employee?
Note: Multiple responses allowed
N=200
Defense Civilian
Device loss 26% 43%
= statistically significant difference
IT/ Security
Staff
IT/Security
Manager/
Director
Insecure
configuration
of IT assets
17% 36%
@solarwinds 8
Insider Threat Flow Response Process
Policy Implementation:
• Reduced risk of outages and security
breaches
• Help assure service health and performance
• Stricter control of change and configuration
management process
• Faster problem identification and resolution
• Visibility to design changes that avoid future
problems
© 2018 SolarWinds Worldwide, LLC. All rights reserved.
Control
Monitor
Verify
Plan
Identify
Threat Process
Wheel
@solarwinds 9
Insider Threat: Identify
Identify:
• Updated Inventory of Infrastructure
• Understanding of your Area of
Responsibility
• Know and protect your critical assets
© 2018 SolarWinds Worldwide, LLC. All rights reserved.
Control
Monitor
Verify
Plan
Identify
Threat Process
Wheel
@solarwinds 10
Insider Threat: Control
Control:
Organizations typically have a number of tools and
processes to plan for and document expected
changes
• Develop a formalized insider threat program
• Configuration management tools can help inventory network
device configurations, assess them for compliance, and
automate change and configuration management
• Configuration Control and automation
• Security Event Appliance (SEIM) Tools to collect, correlate,
and respond to threats through automation rulesets
© 2018 SolarWinds Worldwide, LLC. All rights reserved.
Control
Monitor
Verify
Plan
Identify
Threat Process
Wheel
@solarwinds 11
Insider Threat: Monitor
Monitor:
• Deploy solutions for monitoring employee actions and
correlating information from multiple data sources
• Network, application, and system monitoring, and
management tools, provide needed visibility
• These tools continuously collect data on IT operations and
alert on anomalies
• Infrastructure performance monitoring metrics can
compliment your other security tools to help detect and
mitigate issues, such as Advanced Persistent Threats
• Infrastructure broken into different focuses:
• Systems
• Network
• Management/Mission Impact
© 2018 SolarWinds Worldwide, LLC. All rights reserved.
Control
Monitor
Verify
Plan
Identify
Threat Process
Wheel
@solarwinds 12
Insider Threat: Verify
Verify:
• Performance baselines can help identify threats, and
provide constant and valuable insight into network
activities
• Clearly document and consistently enforce policies and
controls
• Device tracking provides forensic data to help locate,
identify, and isolate threat sources, or enforce your
BYOD/mobility policies
• Key Areas:
• Reports
• Compliance
• Thresholds
© 2018 SolarWinds Worldwide, LLC. All rights reserved.
Control
Monitor
Verify
Plan
Identify
Threat Process
Wheel
@solarwinds 13
Threat Process Wheel Aligned to SolarWinds Products
© 2018 SolarWinds Worldwide, LLC. All rights reserved.
Control
Monitor
Verify
Plan
Identify
Log & Event
Manager
Network
Performance
Monitor
Network
Configuration
Manager
IP Address
Manager
User Device
Tracker
Patch
Manager
Server
Configuration
Monitor
Network
Topology
Mapper
Threat Process
Wheel
Network
Performance
Monitor Access Rights
Manager
@solarwinds
Security and Network Management Tools Can Help
Security and network management tools can help with compliance
• Log & Event Manager is a SIEM that uses logs
for security and compliance
• Network Performance Monitor offers continuous
monitoring, audit documentation, and reporting
• Network Configuration Manager centralizes
change management and reporting
• Patch Manager centralizes updates and helps
reduce vulnerability
• Access Rights Manager manages and audits
user access rights across your infrastructure
• Sever Configuration Monitor tracks system and
application changes
• User Device Tracker and IP Address Manager
can support compliance enforcement
Log & Event
Manager
Patch
Manager
Network
Performance
Monitor
Network
Configuration
Manager
Access Rights
Manager
Server
Configuration
Monitor
More information: http://www.solarwinds.com/federal-government/solution/cyber-security
© 2018 SolarWinds Worldwide, LLC. All rights reserved. 14
IP Address
Manager
User
Device
Tracker
@solarwinds
SolarWinds Compliance Features
• Configure correlation rules to help assure effectiveness of security controls
• Support real-time and continuous monitoring of security controls
• Monitor for Active Directory® events and changes
• Produce FISMA and DISA STIGs compliance reports from templates
• Support DISA STIGs requirements for configuration auditing, log analysis,
and broader network security
• Track and report suspicious activities/attacks to provide auditing support
Log & Event Manager can help to:
© 2018 SolarWinds Worldwide, LLC. All rights reserved. 15
@solarwinds
SolarWinds Compliance Features
• Visualize the entire environment to include interconnection to remote
sites
• Do infrastructure Key Performance Indicator monitoring
• Evaluate trend utilization for capacity planning
• Track multicast or firewall port discards
• Monitor network health and availability
• Identify protocol latency delays
• Produce audit documentation and reports
• Notify when issues occur based on thresholds and baseline from past
performance data
Network Performance Monitor can enable you to:
© 2018 SolarWinds Worldwide, LLC. All rights reserved. 16
@solarwinds
SolarWinds Compliance Features
• Inventory network device configurations, assess configurations for
compliance, and automate change and configuration management
• Implementation of configuration of security controls and help
assure effectiveness
• Producing FISMA and DISA STIGs reports, and taking corrective
actions
• Producing audit documentation and reports to support DISA CCRI
or OMB audits
Network Configuration Manager is designed to
support:
© 2018 SolarWinds Worldwide, LLC. All rights reserved. 17
@solarwinds
• Utilize WSUS or SCCM to push patches
• Set-up scheduled and on-demand patching installation
• Support Microsoft® Windows® Systems and MS patching
• Automate patching third-party applications without an agent
• Schedule patches for minimum downtime
• Tier areas of the infrastructure for the ability to recall and replace patches as
they are superseded
• Inventory software and physical components per server or workstation
Patch Manager can help you to:
• Standard Monthly Creators Update has came with no less than 3 – 5 superseding updates for BSOD Issues?
• Entire patching for the Month of October was recalled and re-released 4 weeks later than the original releases?
• Microsoft Windows Update MVPs have sent Microsoft a formal letter detailing the issues of the Windows update
Experience?
• Updates still need to be tested internally before sending out to the masses?
Did you know?
SolarWinds Compliance Features
© 2018 SolarWinds Worldwide, LLC. All rights reserved. 18
@solarwinds
SolarWinds Compliance Features
• Help improve security posture and mitigate insider threats
• Help demonstrate compliance with built-in customizable reports
• Monitor Active Directory and Microsoft® Exchange™
• Easily manage user permissions and provisioning
Access Rights Manager is designed to:
© 2018 SolarWinds Worldwide, LLC. All rights reserved. 19
• Track System and Application Changes
• Discover Changes That Were Made Offline
• Compare Configuration Changes Over Time
• Correlate Configuration Changes to Performance
• Manage Your Asset Inventory
Server Configuration Monitor can help to:
@solarwinds 20
Insider Threat: Repetition
Process Repetition:
• Policy strategy, success for all
• Simple: simplicity is key with an emphasis on
ease of use to utilize configuration
monitoring, alerting, and auditing
• Incorporate malicious and unintentional
insider threat awareness into periodic
security training for all employees
© 2018 SolarWinds Worldwide, LLC. All rights reserved.
Control
Monitor
Verify
Plan
Identify
Threat Process
Wheel
@solarwinds
• Embed security practices and conversations about good security habits within your
daily office environment
• Gamifying security training
• Document and test your security policies
• Conduct annual security awareness training
• Leverage cyber security certification training (e.g., DOD 8570)
• Document security incident reporting procedures (e.g., wallet cards, desk references, etc.)
• Utilize Two Factor Authentication
• Implement an approach styled after a Secure Development Lifecycle (SDL)
• SDLs consist of the security processes and activities performed for every software release
• Although conceived for development, their principles can be applied across your agency
• For example, by agreeing upon standard security practices for processes that involve sensitive
data, you can help instill Information Security (InfoSec) into your agency
Build Security Into Your Community
21© 2018 SolarWinds Worldwide, LLC. All Rights Reserved.
@solarwinds
Product Demonstrations
@solarwinds 23
Risk assessment dashboard
Access Rights Manager
© 2018 SolarWinds Worldwide, LLC. All Rights Reserved.
@solarwinds 24
Active Directory graphical analysis
Access Rights Manager
© 2018 SolarWinds Worldwide, LLC. All Rights Reserved.
@solarwinds
When Combating the Insider Threats
• Meeting compliance standards does not mean you are secure
• Careless or untrained insiders can be the largest source of federal security
threats
• High-performing agencies with excellent IT controls experience:
• Fewer cyberthreats
• Faster response time to threats
• Positive results from IT modernization initiatives
• Continuous review of your IT controls may help to improve your security posture
• SolarWinds has tools designed to help
25© 2018 SolarWinds Worldwide, LLC. All Rights Reserved.
@solarwinds
• Review a blog on how SolarWinds software can help with NIST FISMA/RMF compliance:
https://thwack.solarwinds.com/community/solarwinds-community/product-
blog/blog/2015/08/01/fisma-nist-800-53-compliance-with-solarwinds-products
• Review a blog on how SolarWinds software can help with DISA STIGS compliance:
https://thwack.solarwinds.com/community/solarwinds-community/product-
blog/blog/2011/09/07/disa-stig-compliance-with-log-event-manager
• Watch a federal security compliance video:
http://www.solarwinds.com/resources/videos/solarwinds-federal-security-compliance.html
• Download a compliance white paper:
http://go.solarwinds.com/Compliance_LEM_16?Program=999&c=70150000000qf3c
• Download a continuous monitoring white paper:
http://go.solarwinds.com/fedcyberWP?=70150000000Plgf
Compliance Resources
26© 2018 SolarWinds Worldwide, LLC. All Rights Reserved.
@solarwinds
Q&A
Contact Federal Sales:
877.946.3751
federalsales@solarwinds.com
27
@solarwinds
Contact Us
• Watch a short demo video: http://demo.solarwinds.com/sedemo/
• Download a free trial: http://www.solarwinds.com/downloads/
• Visit our Federal website: http://www.solarwinds.com/federal
• Call the SolarWinds Federal sales team: 877.946.3751
• Email federal sales: federalsales@solarwinds.com
• Email our Government Distributor DLT®: solarwinds@dlt.com
• Follow us on LinkedIn®: https://www.linkedin.com/company/solarwinds-government
Let us know how we can help you
© 2018 SolarWinds Worldwide, LLC. All Rights Reserved. 28
@solarwinds
The SolarWinds, SolarWinds & Design, Orion, and THWACK trademarks are
the exclusive property of SolarWinds Worldwide, LLC or its affiliates, are
registered with the U.S. Patent and Trademark Office, and may be
registered or pending registration in other countries. All other SolarWinds
trademarks, service marks, and logos may be common law marks or are
registered or pending registration. All other trademarks mentioned herein
are used for identification purposes only and are trademarks of (and may be
registered trademarks) of their respective companies.
29

More Related Content

What's hot

Government Webinar: Five Essential IT Tools You Need Today
Government Webinar: Five Essential IT Tools You Need TodayGovernment Webinar: Five Essential IT Tools You Need Today
Government Webinar: Five Essential IT Tools You Need Today
SolarWinds
 
Improving System Upgrades and Patching using SolarWinds
Improving System Upgrades and Patching using SolarWindsImproving System Upgrades and Patching using SolarWinds
Improving System Upgrades and Patching using SolarWinds
SolarWinds
 
Monitoring and Securing Active Directory Government Webinar for the US Army
Monitoring and Securing Active Directory Government Webinar for the US ArmyMonitoring and Securing Active Directory Government Webinar for the US Army
Monitoring and Securing Active Directory Government Webinar for the US Army
SolarWinds
 
SolarWinds Public Sector Cybersecurity Survey Report 2020
SolarWinds Public Sector Cybersecurity Survey Report 2020SolarWinds Public Sector Cybersecurity Survey Report 2020
SolarWinds Public Sector Cybersecurity Survey Report 2020
SolarWinds
 
Government and Education Webinar: How to Reduce Vulnerabilities and Harden yo...
Government and Education Webinar: How to Reduce Vulnerabilities and Harden yo...Government and Education Webinar: How to Reduce Vulnerabilities and Harden yo...
Government and Education Webinar: How to Reduce Vulnerabilities and Harden yo...
SolarWinds
 
Government Webinar: Low-Cost Log, Network Configuration, and IT Monitoring So...
Government Webinar: Low-Cost Log, Network Configuration, and IT Monitoring So...Government Webinar: Low-Cost Log, Network Configuration, and IT Monitoring So...
Government Webinar: Low-Cost Log, Network Configuration, and IT Monitoring So...
SolarWinds
 
Government and Education Webinar: How the New Normal Could Improve your IT Op...
Government and Education Webinar: How the New Normal Could Improve your IT Op...Government and Education Webinar: How the New Normal Could Improve your IT Op...
Government and Education Webinar: How the New Normal Could Improve your IT Op...
SolarWinds
 
Government and Education Webinar: Technical Update and Demo of New Features
Government and Education Webinar: Technical Update and Demo of New FeaturesGovernment and Education Webinar: Technical Update and Demo of New Features
Government and Education Webinar: Technical Update and Demo of New Features
SolarWinds
 
Government and Education Webinar: Zero-Trust Panel Discussion
Government and Education Webinar: Zero-Trust Panel Discussion Government and Education Webinar: Zero-Trust Panel Discussion
Government and Education Webinar: Zero-Trust Panel Discussion
SolarWinds
 
Taming Multi-Cloud, Hybrid Cloud, Docker, and Kubernetes
Taming Multi-Cloud, Hybrid Cloud, Docker, and KubernetesTaming Multi-Cloud, Hybrid Cloud, Docker, and Kubernetes
Taming Multi-Cloud, Hybrid Cloud, Docker, and Kubernetes
SolarWinds
 
Government Webinar: RMF, DISA STIG, and NIST FISMA Compliance Using SolarWinds
Government Webinar: RMF, DISA STIG, and NIST FISMA Compliance Using SolarWindsGovernment Webinar: RMF, DISA STIG, and NIST FISMA Compliance Using SolarWinds
Government Webinar: RMF, DISA STIG, and NIST FISMA Compliance Using SolarWinds
SolarWinds
 
Infographic: SDN, BYOD and Cloud! Oh my!
Infographic: SDN, BYOD and Cloud! Oh my!Infographic: SDN, BYOD and Cloud! Oh my!
Infographic: SDN, BYOD and Cloud! Oh my!SolarWinds
 
Government Webinar: Monitoring Azure and Deploying SolarWinds on Azure Govern...
Government Webinar: Monitoring Azure and Deploying SolarWinds on Azure Govern...Government Webinar: Monitoring Azure and Deploying SolarWinds on Azure Govern...
Government Webinar: Monitoring Azure and Deploying SolarWinds on Azure Govern...
SolarWinds
 
How to Enable, Monitor, and Secure Your Remote Workforce
How to Enable, Monitor, and Secure Your Remote WorkforceHow to Enable, Monitor, and Secure Your Remote Workforce
How to Enable, Monitor, and Secure Your Remote Workforce
SolarWinds
 
Government and Education Webinar: Cyber Technology to Enable Operator Effecti...
Government and Education Webinar: Cyber Technology to Enable Operator Effecti...Government and Education Webinar: Cyber Technology to Enable Operator Effecti...
Government and Education Webinar: Cyber Technology to Enable Operator Effecti...
SolarWinds
 
If an Application Fails in the Datacenter and No Users Are On It, Will it Cut...
If an Application Fails in the Datacenter and No Users Are On It, Will it Cut...If an Application Fails in the Datacenter and No Users Are On It, Will it Cut...
If an Application Fails in the Datacenter and No Users Are On It, Will it Cut...
SolarWinds
 
Government Webinar: Preparing for CMMC Compliance Roundtable
Government Webinar: Preparing for CMMC Compliance Roundtable Government Webinar: Preparing for CMMC Compliance Roundtable
Government Webinar: Preparing for CMMC Compliance Roundtable
SolarWinds
 
Government and Education Webinar: SQL Server—Indexing for Performance
Government and Education Webinar: SQL Server—Indexing for PerformanceGovernment and Education Webinar: SQL Server—Indexing for Performance
Government and Education Webinar: SQL Server—Indexing for Performance
SolarWinds
 
The Seismic Impact of the SolarWinds Hack
The Seismic Impact of the SolarWinds HackThe Seismic Impact of the SolarWinds Hack
The Seismic Impact of the SolarWinds Hack
Nicole Fucile-Borsian
 
IT Service & Asset Management Better Together
IT Service & Asset Management Better TogetherIT Service & Asset Management Better Together
IT Service & Asset Management Better Together
Ivanti
 

What's hot (20)

Government Webinar: Five Essential IT Tools You Need Today
Government Webinar: Five Essential IT Tools You Need TodayGovernment Webinar: Five Essential IT Tools You Need Today
Government Webinar: Five Essential IT Tools You Need Today
 
Improving System Upgrades and Patching using SolarWinds
Improving System Upgrades and Patching using SolarWindsImproving System Upgrades and Patching using SolarWinds
Improving System Upgrades and Patching using SolarWinds
 
Monitoring and Securing Active Directory Government Webinar for the US Army
Monitoring and Securing Active Directory Government Webinar for the US ArmyMonitoring and Securing Active Directory Government Webinar for the US Army
Monitoring and Securing Active Directory Government Webinar for the US Army
 
SolarWinds Public Sector Cybersecurity Survey Report 2020
SolarWinds Public Sector Cybersecurity Survey Report 2020SolarWinds Public Sector Cybersecurity Survey Report 2020
SolarWinds Public Sector Cybersecurity Survey Report 2020
 
Government and Education Webinar: How to Reduce Vulnerabilities and Harden yo...
Government and Education Webinar: How to Reduce Vulnerabilities and Harden yo...Government and Education Webinar: How to Reduce Vulnerabilities and Harden yo...
Government and Education Webinar: How to Reduce Vulnerabilities and Harden yo...
 
Government Webinar: Low-Cost Log, Network Configuration, and IT Monitoring So...
Government Webinar: Low-Cost Log, Network Configuration, and IT Monitoring So...Government Webinar: Low-Cost Log, Network Configuration, and IT Monitoring So...
Government Webinar: Low-Cost Log, Network Configuration, and IT Monitoring So...
 
Government and Education Webinar: How the New Normal Could Improve your IT Op...
Government and Education Webinar: How the New Normal Could Improve your IT Op...Government and Education Webinar: How the New Normal Could Improve your IT Op...
Government and Education Webinar: How the New Normal Could Improve your IT Op...
 
Government and Education Webinar: Technical Update and Demo of New Features
Government and Education Webinar: Technical Update and Demo of New FeaturesGovernment and Education Webinar: Technical Update and Demo of New Features
Government and Education Webinar: Technical Update and Demo of New Features
 
Government and Education Webinar: Zero-Trust Panel Discussion
Government and Education Webinar: Zero-Trust Panel Discussion Government and Education Webinar: Zero-Trust Panel Discussion
Government and Education Webinar: Zero-Trust Panel Discussion
 
Taming Multi-Cloud, Hybrid Cloud, Docker, and Kubernetes
Taming Multi-Cloud, Hybrid Cloud, Docker, and KubernetesTaming Multi-Cloud, Hybrid Cloud, Docker, and Kubernetes
Taming Multi-Cloud, Hybrid Cloud, Docker, and Kubernetes
 
Government Webinar: RMF, DISA STIG, and NIST FISMA Compliance Using SolarWinds
Government Webinar: RMF, DISA STIG, and NIST FISMA Compliance Using SolarWindsGovernment Webinar: RMF, DISA STIG, and NIST FISMA Compliance Using SolarWinds
Government Webinar: RMF, DISA STIG, and NIST FISMA Compliance Using SolarWinds
 
Infographic: SDN, BYOD and Cloud! Oh my!
Infographic: SDN, BYOD and Cloud! Oh my!Infographic: SDN, BYOD and Cloud! Oh my!
Infographic: SDN, BYOD and Cloud! Oh my!
 
Government Webinar: Monitoring Azure and Deploying SolarWinds on Azure Govern...
Government Webinar: Monitoring Azure and Deploying SolarWinds on Azure Govern...Government Webinar: Monitoring Azure and Deploying SolarWinds on Azure Govern...
Government Webinar: Monitoring Azure and Deploying SolarWinds on Azure Govern...
 
How to Enable, Monitor, and Secure Your Remote Workforce
How to Enable, Monitor, and Secure Your Remote WorkforceHow to Enable, Monitor, and Secure Your Remote Workforce
How to Enable, Monitor, and Secure Your Remote Workforce
 
Government and Education Webinar: Cyber Technology to Enable Operator Effecti...
Government and Education Webinar: Cyber Technology to Enable Operator Effecti...Government and Education Webinar: Cyber Technology to Enable Operator Effecti...
Government and Education Webinar: Cyber Technology to Enable Operator Effecti...
 
If an Application Fails in the Datacenter and No Users Are On It, Will it Cut...
If an Application Fails in the Datacenter and No Users Are On It, Will it Cut...If an Application Fails in the Datacenter and No Users Are On It, Will it Cut...
If an Application Fails in the Datacenter and No Users Are On It, Will it Cut...
 
Government Webinar: Preparing for CMMC Compliance Roundtable
Government Webinar: Preparing for CMMC Compliance Roundtable Government Webinar: Preparing for CMMC Compliance Roundtable
Government Webinar: Preparing for CMMC Compliance Roundtable
 
Government and Education Webinar: SQL Server—Indexing for Performance
Government and Education Webinar: SQL Server—Indexing for PerformanceGovernment and Education Webinar: SQL Server—Indexing for Performance
Government and Education Webinar: SQL Server—Indexing for Performance
 
The Seismic Impact of the SolarWinds Hack
The Seismic Impact of the SolarWinds HackThe Seismic Impact of the SolarWinds Hack
The Seismic Impact of the SolarWinds Hack
 
IT Service & Asset Management Better Together
IT Service & Asset Management Better TogetherIT Service & Asset Management Better Together
IT Service & Asset Management Better Together
 

Similar to Federal Webinar: Best Practices and Tools for Reducing Insider Threats

Data erasure's role in limiting cyber attacks
Data erasure's role in limiting cyber attacksData erasure's role in limiting cyber attacks
Data erasure's role in limiting cyber attacks
Blancco
 
CCA study group
CCA study groupCCA study group
CCA study group
IIBA UK Chapter
 
SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)Norm Barber
 
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoftHow Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
OSIsoft, LLC
 
SolarWinds Federal Cybersecurity Survey 2017: Government Regulations, IT Mode...
SolarWinds Federal Cybersecurity Survey 2017: Government Regulations, IT Mode...SolarWinds Federal Cybersecurity Survey 2017: Government Regulations, IT Mode...
SolarWinds Federal Cybersecurity Survey 2017: Government Regulations, IT Mode...
SolarWinds
 
Cybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 Trends
Cybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 TrendsCybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 Trends
Cybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 Trends
Ivanti
 
Developing a Continuous Monitoring Action Plan
Developing a Continuous Monitoring Action PlanDeveloping a Continuous Monitoring Action Plan
Developing a Continuous Monitoring Action Plan
Tripwire
 
[Webinar] Supercharging Security with Behavioral Analytics
[Webinar] Supercharging Security with Behavioral Analytics[Webinar] Supercharging Security with Behavioral Analytics
[Webinar] Supercharging Security with Behavioral Analytics
Interset
 
Smart security solutions for SMBs
Smart security solutions for SMBsSmart security solutions for SMBs
Smart security solutions for SMBsJyothi Satyanathan
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
Anil
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
Anil
 
Threat Detection as presented at the 2016 DGI Cyber security Conference
Threat Detection as presented at the 2016 DGI Cyber security ConferenceThreat Detection as presented at the 2016 DGI Cyber security Conference
Threat Detection as presented at the 2016 DGI Cyber security Conference
SolarWinds
 
Get Ready for Syncsort's New Best-of-Breed Security Solution
Get Ready for Syncsort's New Best-of-Breed Security SolutionGet Ready for Syncsort's New Best-of-Breed Security Solution
Get Ready for Syncsort's New Best-of-Breed Security Solution
Precisely
 
5 steps-to-mobile-risk-management-whitepaper-golden-gekko
5 steps-to-mobile-risk-management-whitepaper-golden-gekko5 steps-to-mobile-risk-management-whitepaper-golden-gekko
5 steps-to-mobile-risk-management-whitepaper-golden-gekko
DMI
 
Luncheon 2015-06-18 Security Industry 2.0: Survival in the Boardroom by David...
Luncheon 2015-06-18 Security Industry 2.0: Survival in the Boardroom by David...Luncheon 2015-06-18 Security Industry 2.0: Survival in the Boardroom by David...
Luncheon 2015-06-18 Security Industry 2.0: Survival in the Boardroom by David...
North Texas Chapter of the ISSA
 
Security metrics
Security metrics Security metrics
Security metrics
PRAYAGRAJ11
 
Introduction to Incident Response Management
Introduction to Incident Response ManagementIntroduction to Incident Response Management
Introduction to Incident Response Management
Don Caeiro
 
Retail Security: Closing the Threat Gap
Retail Security: Closing the Threat GapRetail Security: Closing the Threat Gap
Retail Security: Closing the Threat Gap
Tripwire
 
The Hacker Playbook: How to Think like a Cybercriminal to Reduce Risk
The Hacker Playbook: How to Think like a Cybercriminal to Reduce RiskThe Hacker Playbook: How to Think like a Cybercriminal to Reduce Risk
The Hacker Playbook: How to Think like a Cybercriminal to Reduce Risk
BeyondTrust
 

Similar to Federal Webinar: Best Practices and Tools for Reducing Insider Threats (20)

Data erasure's role in limiting cyber attacks
Data erasure's role in limiting cyber attacksData erasure's role in limiting cyber attacks
Data erasure's role in limiting cyber attacks
 
CCA study group
CCA study groupCCA study group
CCA study group
 
SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)
 
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoftHow Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
 
SolarWinds Federal Cybersecurity Survey 2017: Government Regulations, IT Mode...
SolarWinds Federal Cybersecurity Survey 2017: Government Regulations, IT Mode...SolarWinds Federal Cybersecurity Survey 2017: Government Regulations, IT Mode...
SolarWinds Federal Cybersecurity Survey 2017: Government Regulations, IT Mode...
 
ISACA ISSA Presentation
ISACA ISSA PresentationISACA ISSA Presentation
ISACA ISSA Presentation
 
Cybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 Trends
Cybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 TrendsCybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 Trends
Cybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 Trends
 
Developing a Continuous Monitoring Action Plan
Developing a Continuous Monitoring Action PlanDeveloping a Continuous Monitoring Action Plan
Developing a Continuous Monitoring Action Plan
 
[Webinar] Supercharging Security with Behavioral Analytics
[Webinar] Supercharging Security with Behavioral Analytics[Webinar] Supercharging Security with Behavioral Analytics
[Webinar] Supercharging Security with Behavioral Analytics
 
Smart security solutions for SMBs
Smart security solutions for SMBsSmart security solutions for SMBs
Smart security solutions for SMBs
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
 
Threat Detection as presented at the 2016 DGI Cyber security Conference
Threat Detection as presented at the 2016 DGI Cyber security ConferenceThreat Detection as presented at the 2016 DGI Cyber security Conference
Threat Detection as presented at the 2016 DGI Cyber security Conference
 
Get Ready for Syncsort's New Best-of-Breed Security Solution
Get Ready for Syncsort's New Best-of-Breed Security SolutionGet Ready for Syncsort's New Best-of-Breed Security Solution
Get Ready for Syncsort's New Best-of-Breed Security Solution
 
5 steps-to-mobile-risk-management-whitepaper-golden-gekko
5 steps-to-mobile-risk-management-whitepaper-golden-gekko5 steps-to-mobile-risk-management-whitepaper-golden-gekko
5 steps-to-mobile-risk-management-whitepaper-golden-gekko
 
Luncheon 2015-06-18 Security Industry 2.0: Survival in the Boardroom by David...
Luncheon 2015-06-18 Security Industry 2.0: Survival in the Boardroom by David...Luncheon 2015-06-18 Security Industry 2.0: Survival in the Boardroom by David...
Luncheon 2015-06-18 Security Industry 2.0: Survival in the Boardroom by David...
 
Security metrics
Security metrics Security metrics
Security metrics
 
Introduction to Incident Response Management
Introduction to Incident Response ManagementIntroduction to Incident Response Management
Introduction to Incident Response Management
 
Retail Security: Closing the Threat Gap
Retail Security: Closing the Threat GapRetail Security: Closing the Threat Gap
Retail Security: Closing the Threat Gap
 
The Hacker Playbook: How to Think like a Cybercriminal to Reduce Risk
The Hacker Playbook: How to Think like a Cybercriminal to Reduce RiskThe Hacker Playbook: How to Think like a Cybercriminal to Reduce Risk
The Hacker Playbook: How to Think like a Cybercriminal to Reduce Risk
 

More from SolarWinds

SolarWinds Government and Education Webinar: Greatest SolarWinds Features I N...
SolarWinds Government and Education Webinar: Greatest SolarWinds Features I N...SolarWinds Government and Education Webinar: Greatest SolarWinds Features I N...
SolarWinds Government and Education Webinar: Greatest SolarWinds Features I N...
SolarWinds
 
SolarWinds Government and Education Webinar: Gaps Exist in Your Monitoring In...
SolarWinds Government and Education Webinar: Gaps Exist in Your Monitoring In...SolarWinds Government and Education Webinar: Gaps Exist in Your Monitoring In...
SolarWinds Government and Education Webinar: Gaps Exist in Your Monitoring In...
SolarWinds
 
Government Webinar: Alerting and Reporting in the Age of Observability
Government Webinar: Alerting and Reporting in the Age of ObservabilityGovernment Webinar: Alerting and Reporting in the Age of Observability
Government Webinar: Alerting and Reporting in the Age of Observability
SolarWinds
 
Government and Education Webinar: Full Stack Observability
Government and Education Webinar: Full Stack ObservabilityGovernment and Education Webinar: Full Stack Observability
Government and Education Webinar: Full Stack Observability
SolarWinds
 
Government and Education Webinar: Public Sector Cybersecurity Survey - What I...
Government and Education Webinar: Public Sector Cybersecurity Survey - What I...Government and Education Webinar: Public Sector Cybersecurity Survey - What I...
Government and Education Webinar: Public Sector Cybersecurity Survey - What I...
SolarWinds
 
Becoming Secure By Design: Questions You Should Ask Your Software Vendors
Becoming Secure By Design: Questions You Should Ask Your Software VendorsBecoming Secure By Design: Questions You Should Ask Your Software Vendors
Becoming Secure By Design: Questions You Should Ask Your Software Vendors
SolarWinds
 
Government and Education Webinar: Real-Time Mission, CIO, and Command Dashboards
Government and Education Webinar: Real-Time Mission, CIO, and Command DashboardsGovernment and Education Webinar: Real-Time Mission, CIO, and Command Dashboards
Government and Education Webinar: Real-Time Mission, CIO, and Command Dashboards
SolarWinds
 
Government and Education Webinar: Simplify Your Database Performance Manageme...
Government and Education Webinar: Simplify Your Database Performance Manageme...Government and Education Webinar: Simplify Your Database Performance Manageme...
Government and Education Webinar: Simplify Your Database Performance Manageme...
SolarWinds
 
Government and Education Webinar: SolarWinds Orion Platform: Audit and Stream...
Government and Education Webinar: SolarWinds Orion Platform: Audit and Stream...Government and Education Webinar: SolarWinds Orion Platform: Audit and Stream...
Government and Education Webinar: SolarWinds Orion Platform: Audit and Stream...
SolarWinds
 
Government and Education Webinar: Leverage Automation to Improve IT Operations
Government and Education Webinar: Leverage Automation to Improve IT OperationsGovernment and Education Webinar: Leverage Automation to Improve IT Operations
Government and Education Webinar: Leverage Automation to Improve IT Operations
SolarWinds
 
Government and Education Webinar: Improving Application Performance
Government and Education Webinar: Improving Application PerformanceGovernment and Education Webinar: Improving Application Performance
Government and Education Webinar: Improving Application Performance
SolarWinds
 
Government and Education: IT Tools to Support Your Hybrid Workforce
Government and Education: IT Tools to Support Your Hybrid WorkforceGovernment and Education: IT Tools to Support Your Hybrid Workforce
Government and Education: IT Tools to Support Your Hybrid Workforce
SolarWinds
 
Government and Education Webinar: There's More Than One Way to Monitor SQL Da...
Government and Education Webinar: There's More Than One Way to Monitor SQL Da...Government and Education Webinar: There's More Than One Way to Monitor SQL Da...
Government and Education Webinar: There's More Than One Way to Monitor SQL Da...
SolarWinds
 
SolarWinds Government and Education Webinar: Virtual Technology Briefing 08.0...
SolarWinds Government and Education Webinar: Virtual Technology Briefing 08.0...SolarWinds Government and Education Webinar: Virtual Technology Briefing 08.0...
SolarWinds Government and Education Webinar: Virtual Technology Briefing 08.0...
SolarWinds
 
Government and Education: Leveraging The SolarWinds Orion Assistance Program ...
Government and Education: Leveraging The SolarWinds Orion Assistance Program ...Government and Education: Leveraging The SolarWinds Orion Assistance Program ...
Government and Education: Leveraging The SolarWinds Orion Assistance Program ...
SolarWinds
 
Government and Education Webinar: SQL Server—Advanced Performance Tuning
Government and Education Webinar: SQL Server—Advanced Performance Tuning Government and Education Webinar: SQL Server—Advanced Performance Tuning
Government and Education Webinar: SQL Server—Advanced Performance Tuning
SolarWinds
 
Government and Education Webinar: Recovering IP Addresses on Your Network
Government and Education Webinar: Recovering IP Addresses on Your NetworkGovernment and Education Webinar: Recovering IP Addresses on Your Network
Government and Education Webinar: Recovering IP Addresses on Your Network
SolarWinds
 
Government and Education Webinar: Optimize Performance With Advanced Host Mon...
Government and Education Webinar: Optimize Performance With Advanced Host Mon...Government and Education Webinar: Optimize Performance With Advanced Host Mon...
Government and Education Webinar: Optimize Performance With Advanced Host Mon...
SolarWinds
 
Government and Education Webinar: Conquering Remote Work IT Challenges
Government and Education Webinar: Conquering Remote Work IT Challenges Government and Education Webinar: Conquering Remote Work IT Challenges
Government and Education Webinar: Conquering Remote Work IT Challenges
SolarWinds
 
Government and Education Webinar: Leveraging SolarWinds to Improve Remote Emp...
Government and Education Webinar: Leveraging SolarWinds to Improve Remote Emp...Government and Education Webinar: Leveraging SolarWinds to Improve Remote Emp...
Government and Education Webinar: Leveraging SolarWinds to Improve Remote Emp...
SolarWinds
 

More from SolarWinds (20)

SolarWinds Government and Education Webinar: Greatest SolarWinds Features I N...
SolarWinds Government and Education Webinar: Greatest SolarWinds Features I N...SolarWinds Government and Education Webinar: Greatest SolarWinds Features I N...
SolarWinds Government and Education Webinar: Greatest SolarWinds Features I N...
 
SolarWinds Government and Education Webinar: Gaps Exist in Your Monitoring In...
SolarWinds Government and Education Webinar: Gaps Exist in Your Monitoring In...SolarWinds Government and Education Webinar: Gaps Exist in Your Monitoring In...
SolarWinds Government and Education Webinar: Gaps Exist in Your Monitoring In...
 
Government Webinar: Alerting and Reporting in the Age of Observability
Government Webinar: Alerting and Reporting in the Age of ObservabilityGovernment Webinar: Alerting and Reporting in the Age of Observability
Government Webinar: Alerting and Reporting in the Age of Observability
 
Government and Education Webinar: Full Stack Observability
Government and Education Webinar: Full Stack ObservabilityGovernment and Education Webinar: Full Stack Observability
Government and Education Webinar: Full Stack Observability
 
Government and Education Webinar: Public Sector Cybersecurity Survey - What I...
Government and Education Webinar: Public Sector Cybersecurity Survey - What I...Government and Education Webinar: Public Sector Cybersecurity Survey - What I...
Government and Education Webinar: Public Sector Cybersecurity Survey - What I...
 
Becoming Secure By Design: Questions You Should Ask Your Software Vendors
Becoming Secure By Design: Questions You Should Ask Your Software VendorsBecoming Secure By Design: Questions You Should Ask Your Software Vendors
Becoming Secure By Design: Questions You Should Ask Your Software Vendors
 
Government and Education Webinar: Real-Time Mission, CIO, and Command Dashboards
Government and Education Webinar: Real-Time Mission, CIO, and Command DashboardsGovernment and Education Webinar: Real-Time Mission, CIO, and Command Dashboards
Government and Education Webinar: Real-Time Mission, CIO, and Command Dashboards
 
Government and Education Webinar: Simplify Your Database Performance Manageme...
Government and Education Webinar: Simplify Your Database Performance Manageme...Government and Education Webinar: Simplify Your Database Performance Manageme...
Government and Education Webinar: Simplify Your Database Performance Manageme...
 
Government and Education Webinar: SolarWinds Orion Platform: Audit and Stream...
Government and Education Webinar: SolarWinds Orion Platform: Audit and Stream...Government and Education Webinar: SolarWinds Orion Platform: Audit and Stream...
Government and Education Webinar: SolarWinds Orion Platform: Audit and Stream...
 
Government and Education Webinar: Leverage Automation to Improve IT Operations
Government and Education Webinar: Leverage Automation to Improve IT OperationsGovernment and Education Webinar: Leverage Automation to Improve IT Operations
Government and Education Webinar: Leverage Automation to Improve IT Operations
 
Government and Education Webinar: Improving Application Performance
Government and Education Webinar: Improving Application PerformanceGovernment and Education Webinar: Improving Application Performance
Government and Education Webinar: Improving Application Performance
 
Government and Education: IT Tools to Support Your Hybrid Workforce
Government and Education: IT Tools to Support Your Hybrid WorkforceGovernment and Education: IT Tools to Support Your Hybrid Workforce
Government and Education: IT Tools to Support Your Hybrid Workforce
 
Government and Education Webinar: There's More Than One Way to Monitor SQL Da...
Government and Education Webinar: There's More Than One Way to Monitor SQL Da...Government and Education Webinar: There's More Than One Way to Monitor SQL Da...
Government and Education Webinar: There's More Than One Way to Monitor SQL Da...
 
SolarWinds Government and Education Webinar: Virtual Technology Briefing 08.0...
SolarWinds Government and Education Webinar: Virtual Technology Briefing 08.0...SolarWinds Government and Education Webinar: Virtual Technology Briefing 08.0...
SolarWinds Government and Education Webinar: Virtual Technology Briefing 08.0...
 
Government and Education: Leveraging The SolarWinds Orion Assistance Program ...
Government and Education: Leveraging The SolarWinds Orion Assistance Program ...Government and Education: Leveraging The SolarWinds Orion Assistance Program ...
Government and Education: Leveraging The SolarWinds Orion Assistance Program ...
 
Government and Education Webinar: SQL Server—Advanced Performance Tuning
Government and Education Webinar: SQL Server—Advanced Performance Tuning Government and Education Webinar: SQL Server—Advanced Performance Tuning
Government and Education Webinar: SQL Server—Advanced Performance Tuning
 
Government and Education Webinar: Recovering IP Addresses on Your Network
Government and Education Webinar: Recovering IP Addresses on Your NetworkGovernment and Education Webinar: Recovering IP Addresses on Your Network
Government and Education Webinar: Recovering IP Addresses on Your Network
 
Government and Education Webinar: Optimize Performance With Advanced Host Mon...
Government and Education Webinar: Optimize Performance With Advanced Host Mon...Government and Education Webinar: Optimize Performance With Advanced Host Mon...
Government and Education Webinar: Optimize Performance With Advanced Host Mon...
 
Government and Education Webinar: Conquering Remote Work IT Challenges
Government and Education Webinar: Conquering Remote Work IT Challenges Government and Education Webinar: Conquering Remote Work IT Challenges
Government and Education Webinar: Conquering Remote Work IT Challenges
 
Government and Education Webinar: Leveraging SolarWinds to Improve Remote Emp...
Government and Education Webinar: Leveraging SolarWinds to Improve Remote Emp...Government and Education Webinar: Leveraging SolarWinds to Improve Remote Emp...
Government and Education Webinar: Leveraging SolarWinds to Improve Remote Emp...
 

Recently uploaded

OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoamOpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
takuyayamamoto1800
 
First Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User EndpointsFirst Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User Endpoints
Globus
 
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdfDominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
AMB-Review
 
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Globus
 
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
Hivelance Technology
 
Accelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with PlatformlessAccelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with Platformless
WSO2
 
SOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBrokerSOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar
 
Developing Distributed High-performance Computing Capabilities of an Open Sci...
Developing Distributed High-performance Computing Capabilities of an Open Sci...Developing Distributed High-performance Computing Capabilities of an Open Sci...
Developing Distributed High-performance Computing Capabilities of an Open Sci...
Globus
 
Software Testing Exam imp Ques Notes.pdf
Software Testing Exam imp Ques Notes.pdfSoftware Testing Exam imp Ques Notes.pdf
Software Testing Exam imp Ques Notes.pdf
MayankTawar1
 
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data AnalysisProviding Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Globus
 
Using IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New ZealandUsing IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New Zealand
IES VE
 
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
informapgpstrackings
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2
 
Corporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMSCorporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMS
Tendenci - The Open Source AMS (Association Management Software)
 
A Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdfA Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdf
kalichargn70th171
 
How to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good PracticesHow to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good Practices
Globus
 
Enhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdfEnhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdf
Globus
 
De mooiste recreatieve routes ontdekken met RouteYou en FME
De mooiste recreatieve routes ontdekken met RouteYou en FMEDe mooiste recreatieve routes ontdekken met RouteYou en FME
De mooiste recreatieve routes ontdekken met RouteYou en FME
Jelle | Nordend
 
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Shahin Sheidaei
 
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
XfilesPro
 

Recently uploaded (20)

OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoamOpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
 
First Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User EndpointsFirst Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User Endpoints
 
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdfDominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
 
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
 
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
 
Accelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with PlatformlessAccelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with Platformless
 
SOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBrokerSOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBroker
 
Developing Distributed High-performance Computing Capabilities of an Open Sci...
Developing Distributed High-performance Computing Capabilities of an Open Sci...Developing Distributed High-performance Computing Capabilities of an Open Sci...
Developing Distributed High-performance Computing Capabilities of an Open Sci...
 
Software Testing Exam imp Ques Notes.pdf
Software Testing Exam imp Ques Notes.pdfSoftware Testing Exam imp Ques Notes.pdf
Software Testing Exam imp Ques Notes.pdf
 
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data AnalysisProviding Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
 
Using IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New ZealandUsing IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New Zealand
 
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
Field Employee Tracking System| MiTrack App| Best Employee Tracking Solution|...
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
 
Corporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMSCorporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMS
 
A Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdfA Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdf
 
How to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good PracticesHow to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good Practices
 
Enhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdfEnhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdf
 
De mooiste recreatieve routes ontdekken met RouteYou en FME
De mooiste recreatieve routes ontdekken met RouteYou en FMEDe mooiste recreatieve routes ontdekken met RouteYou en FME
De mooiste recreatieve routes ontdekken met RouteYou en FME
 
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
 
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
 

Federal Webinar: Best Practices and Tools for Reducing Insider Threats

  • 1. @solarwinds Best Practices and Tools for Reducing Insider Threats Federal webinar November 29, 2018
  • 2. @solarwinds 2 • SolarWinds Overview • Leading Sources of Security Threats • Insider Threat Flow Response Process • SolarWinds® Security and Network Tools Can Help • Building Security Into Your IT Security Posture • Demonstration • Compliance Resources • Q&A Presented by: Sean Martinez Sales Engineer, Advisory SolarWinds sean.martinez@solarwinds.com Agenda © 2018 SolarWinds Worldwide, LLC. All rights reserved.
  • 3. @solarwinds 3 SolarWinds at a Glance © 2018 SolarWinds Worldwide, LLC. All Rights Reserved. 1 Customers are defined as individuals or entities that have an active subscription for our subscription products or that have purchased one or more of our perpetual license products since our inception under a unique customer identification number. We may have multiple purchasers of our products within a single organization, each of which may be assigned a unique customer identification number and deemed a separate customer. 2 IDC defined Network Management Software functional market, IDC’s Worldwide Semiannual Software Tracker, April 2018. #1 in Network Management2 275,000+ customers in 190 countries1 499 of Fortune 500® 50+ IT management products 22,000+ > 450,000+ MSPs serving organizations Every Branch of the DoD, and nearly every civilian and intelligence agency 150,000+ THWACK® registered members Founded in 1999 More than 2,400 employees globally Austin, TX headquarters Herndon, VA federal office 30+ offices globally Leader in Remote Monitoring and Management
  • 4. SOLARWINDS FEDERAL CYBERSECURITY SURVEY SUMMARY REPORT | MARKET CONNECTIONS, INC. | 703.378.2025 © 2018 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED. IT SECURITY OBSTACLES, THREATS, AND BREACHES 4 Careless/untrained insiders and foreign governments are noted as the largest sources of security threats at federal agencies. Significantly more defense than civilian respondents indicate malicious insiders are a security threat at their agency. Sources of Security Threats What are the greatest sources of IT security threats to your agency? (select all that apply) N=200 Note: Multiple responses allowed 2% 1% 2% 12% 17% 20% 29% 34% 38% 48% 54% 0% 10% 20% 30% 40% 50% 60% None of the above Other Unsure of these threats Industrial spies For-profit crime Terrorists Malicious insiders Hacktivists General hacking community Foreign governments Careless/untrained insiders By Agency Type Defense Civilian 40% 21% = statistically significant difference
  • 5. SOLARWINDS FEDERAL CYBERSECURITY SURVEY SUMMARY REPORT | MARKET CONNECTIONS, INC. | 703.378.2025 © 2018 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED. IT SECURITY OBSTACLES, THREATS, AND BREACHES 5 There has been no significant reduction in the various sources of security threats. Since 2014, respondents indicate significant increases in threats from both careless/untrained and malicious insiders. Sources of Security Threats - Trend What are the greatest sources of IT security threats to your agency? (select all that apply) N=200 Note: Multiple responses allowed = statistically significant difference= top 3 sources 2014 2015 2016 2017 Careless/untrained insiders 42% 53% 48% 54% Foreign governments 34% 38% 48% 48% General hacking community 47% 46% 46% 38% Hacktivists 26% 30% 38% 34% Malicious insiders 17% 23% 22% 29% Terrorists 21% 18% 24% 20% For-profit crime 11% 14% 18% 17% Industrial spies 6% 10% 16% 12%
  • 6. SOLARWINDS FEDERAL CYBERSECURITY SURVEY SUMMARY REPORT | MARKET CONNECTIONS, INC. | 703.378.2025 © 2018 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED. 6 Insider Threat Detection Difficulties 2015 CYBERSECURITY SURVEY: INSIDER BREACH CAUSES AND DETECTION DIFFICULTIES The volume of network activity is noted most often as what makes insider threat detection and prevention most difficult. One third also note the lack of IT staff training, the use of cloud services, and pressure to change configuration quickly versus securely. In today’s environment, what makes insider threat detection and prevention more difficult? 3% 19% 22% 23% 24% 24% 26% 27% 27% 30% 34% 35% 35% 40% 0% 10% 20% 30% 40% 50% Other Functionality of and access to critical systems Inadequate change control practices Complexity of monitoring tools Inadequate configuration management of IT assets Inadequate visibility into users’ network activity Inadequate monitoring of storage devices Growing adoption of BYOD Cost of sophisticated tools Use of mobile devices Pressure to change IT configurations quickly more so… Growing use of cloud services Lack of IT staff training Volume of network activity Defense Civilian Inadequate configuration management of IT assets 17% 28% Inadequate monitoring of storage devices 18% 32% = statistically significant difference Note: Multiple responses allowed N=200 IT/ Security Staff IT/Security Manager/ Director Volume of network activity 29% 44%
  • 7. SOLARWINDS FEDERAL CYBERSECURITY SURVEY SUMMARY REPORT | MARKET CONNECTIONS, INC. | 703.378.2025 © 2018 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED. 4% 24% 28% 31% 33% 36% 37% 37% 41% 44% 49% 0% 10% 20% 30% 40% 50% 60% Other Insecure configuration of IT assets Incorrect disposal of hardware Not applying security updates Incorrect use of approved personal devices Device loss Poor password management Using personal devices that are against company IT policies Accidentally deleting, corrupting or modifying critical data Data copied to insecure device Phishing attacks 7 Accidental Insider Breach Causes 2015 CYBERSECURITY SURVEY: INSIDER BREACH CAUSES AND DETECTION DIFFICULTIES The most common causes of accidental insider IT security breaches are phishing attacks, followed by data copied to an insecure device and accidentally deleting, corrupting, or modifying critical data. What are the most common causes of accidental insider IT security breaches caused by the untrained or careless employee? Note: Multiple responses allowed N=200 Defense Civilian Device loss 26% 43% = statistically significant difference IT/ Security Staff IT/Security Manager/ Director Insecure configuration of IT assets 17% 36%
  • 8. @solarwinds 8 Insider Threat Flow Response Process Policy Implementation: • Reduced risk of outages and security breaches • Help assure service health and performance • Stricter control of change and configuration management process • Faster problem identification and resolution • Visibility to design changes that avoid future problems © 2018 SolarWinds Worldwide, LLC. All rights reserved. Control Monitor Verify Plan Identify Threat Process Wheel
  • 9. @solarwinds 9 Insider Threat: Identify Identify: • Updated Inventory of Infrastructure • Understanding of your Area of Responsibility • Know and protect your critical assets © 2018 SolarWinds Worldwide, LLC. All rights reserved. Control Monitor Verify Plan Identify Threat Process Wheel
  • 10. @solarwinds 10 Insider Threat: Control Control: Organizations typically have a number of tools and processes to plan for and document expected changes • Develop a formalized insider threat program • Configuration management tools can help inventory network device configurations, assess them for compliance, and automate change and configuration management • Configuration Control and automation • Security Event Appliance (SEIM) Tools to collect, correlate, and respond to threats through automation rulesets © 2018 SolarWinds Worldwide, LLC. All rights reserved. Control Monitor Verify Plan Identify Threat Process Wheel
  • 11. @solarwinds 11 Insider Threat: Monitor Monitor: • Deploy solutions for monitoring employee actions and correlating information from multiple data sources • Network, application, and system monitoring, and management tools, provide needed visibility • These tools continuously collect data on IT operations and alert on anomalies • Infrastructure performance monitoring metrics can compliment your other security tools to help detect and mitigate issues, such as Advanced Persistent Threats • Infrastructure broken into different focuses: • Systems • Network • Management/Mission Impact © 2018 SolarWinds Worldwide, LLC. All rights reserved. Control Monitor Verify Plan Identify Threat Process Wheel
  • 12. @solarwinds 12 Insider Threat: Verify Verify: • Performance baselines can help identify threats, and provide constant and valuable insight into network activities • Clearly document and consistently enforce policies and controls • Device tracking provides forensic data to help locate, identify, and isolate threat sources, or enforce your BYOD/mobility policies • Key Areas: • Reports • Compliance • Thresholds © 2018 SolarWinds Worldwide, LLC. All rights reserved. Control Monitor Verify Plan Identify Threat Process Wheel
  • 13. @solarwinds 13 Threat Process Wheel Aligned to SolarWinds Products © 2018 SolarWinds Worldwide, LLC. All rights reserved. Control Monitor Verify Plan Identify Log & Event Manager Network Performance Monitor Network Configuration Manager IP Address Manager User Device Tracker Patch Manager Server Configuration Monitor Network Topology Mapper Threat Process Wheel Network Performance Monitor Access Rights Manager
  • 14. @solarwinds Security and Network Management Tools Can Help Security and network management tools can help with compliance • Log & Event Manager is a SIEM that uses logs for security and compliance • Network Performance Monitor offers continuous monitoring, audit documentation, and reporting • Network Configuration Manager centralizes change management and reporting • Patch Manager centralizes updates and helps reduce vulnerability • Access Rights Manager manages and audits user access rights across your infrastructure • Sever Configuration Monitor tracks system and application changes • User Device Tracker and IP Address Manager can support compliance enforcement Log & Event Manager Patch Manager Network Performance Monitor Network Configuration Manager Access Rights Manager Server Configuration Monitor More information: http://www.solarwinds.com/federal-government/solution/cyber-security © 2018 SolarWinds Worldwide, LLC. All rights reserved. 14 IP Address Manager User Device Tracker
  • 15. @solarwinds SolarWinds Compliance Features • Configure correlation rules to help assure effectiveness of security controls • Support real-time and continuous monitoring of security controls • Monitor for Active Directory® events and changes • Produce FISMA and DISA STIGs compliance reports from templates • Support DISA STIGs requirements for configuration auditing, log analysis, and broader network security • Track and report suspicious activities/attacks to provide auditing support Log & Event Manager can help to: © 2018 SolarWinds Worldwide, LLC. All rights reserved. 15
  • 16. @solarwinds SolarWinds Compliance Features • Visualize the entire environment to include interconnection to remote sites • Do infrastructure Key Performance Indicator monitoring • Evaluate trend utilization for capacity planning • Track multicast or firewall port discards • Monitor network health and availability • Identify protocol latency delays • Produce audit documentation and reports • Notify when issues occur based on thresholds and baseline from past performance data Network Performance Monitor can enable you to: © 2018 SolarWinds Worldwide, LLC. All rights reserved. 16
  • 17. @solarwinds SolarWinds Compliance Features • Inventory network device configurations, assess configurations for compliance, and automate change and configuration management • Implementation of configuration of security controls and help assure effectiveness • Producing FISMA and DISA STIGs reports, and taking corrective actions • Producing audit documentation and reports to support DISA CCRI or OMB audits Network Configuration Manager is designed to support: © 2018 SolarWinds Worldwide, LLC. All rights reserved. 17
  • 18. @solarwinds • Utilize WSUS or SCCM to push patches • Set-up scheduled and on-demand patching installation • Support Microsoft® Windows® Systems and MS patching • Automate patching third-party applications without an agent • Schedule patches for minimum downtime • Tier areas of the infrastructure for the ability to recall and replace patches as they are superseded • Inventory software and physical components per server or workstation Patch Manager can help you to: • Standard Monthly Creators Update has came with no less than 3 – 5 superseding updates for BSOD Issues? • Entire patching for the Month of October was recalled and re-released 4 weeks later than the original releases? • Microsoft Windows Update MVPs have sent Microsoft a formal letter detailing the issues of the Windows update Experience? • Updates still need to be tested internally before sending out to the masses? Did you know? SolarWinds Compliance Features © 2018 SolarWinds Worldwide, LLC. All rights reserved. 18
  • 19. @solarwinds SolarWinds Compliance Features • Help improve security posture and mitigate insider threats • Help demonstrate compliance with built-in customizable reports • Monitor Active Directory and Microsoft® Exchange™ • Easily manage user permissions and provisioning Access Rights Manager is designed to: © 2018 SolarWinds Worldwide, LLC. All rights reserved. 19 • Track System and Application Changes • Discover Changes That Were Made Offline • Compare Configuration Changes Over Time • Correlate Configuration Changes to Performance • Manage Your Asset Inventory Server Configuration Monitor can help to:
  • 20. @solarwinds 20 Insider Threat: Repetition Process Repetition: • Policy strategy, success for all • Simple: simplicity is key with an emphasis on ease of use to utilize configuration monitoring, alerting, and auditing • Incorporate malicious and unintentional insider threat awareness into periodic security training for all employees © 2018 SolarWinds Worldwide, LLC. All rights reserved. Control Monitor Verify Plan Identify Threat Process Wheel
  • 21. @solarwinds • Embed security practices and conversations about good security habits within your daily office environment • Gamifying security training • Document and test your security policies • Conduct annual security awareness training • Leverage cyber security certification training (e.g., DOD 8570) • Document security incident reporting procedures (e.g., wallet cards, desk references, etc.) • Utilize Two Factor Authentication • Implement an approach styled after a Secure Development Lifecycle (SDL) • SDLs consist of the security processes and activities performed for every software release • Although conceived for development, their principles can be applied across your agency • For example, by agreeing upon standard security practices for processes that involve sensitive data, you can help instill Information Security (InfoSec) into your agency Build Security Into Your Community 21© 2018 SolarWinds Worldwide, LLC. All Rights Reserved.
  • 23. @solarwinds 23 Risk assessment dashboard Access Rights Manager © 2018 SolarWinds Worldwide, LLC. All Rights Reserved.
  • 24. @solarwinds 24 Active Directory graphical analysis Access Rights Manager © 2018 SolarWinds Worldwide, LLC. All Rights Reserved.
  • 25. @solarwinds When Combating the Insider Threats • Meeting compliance standards does not mean you are secure • Careless or untrained insiders can be the largest source of federal security threats • High-performing agencies with excellent IT controls experience: • Fewer cyberthreats • Faster response time to threats • Positive results from IT modernization initiatives • Continuous review of your IT controls may help to improve your security posture • SolarWinds has tools designed to help 25© 2018 SolarWinds Worldwide, LLC. All Rights Reserved.
  • 26. @solarwinds • Review a blog on how SolarWinds software can help with NIST FISMA/RMF compliance: https://thwack.solarwinds.com/community/solarwinds-community/product- blog/blog/2015/08/01/fisma-nist-800-53-compliance-with-solarwinds-products • Review a blog on how SolarWinds software can help with DISA STIGS compliance: https://thwack.solarwinds.com/community/solarwinds-community/product- blog/blog/2011/09/07/disa-stig-compliance-with-log-event-manager • Watch a federal security compliance video: http://www.solarwinds.com/resources/videos/solarwinds-federal-security-compliance.html • Download a compliance white paper: http://go.solarwinds.com/Compliance_LEM_16?Program=999&c=70150000000qf3c • Download a continuous monitoring white paper: http://go.solarwinds.com/fedcyberWP?=70150000000Plgf Compliance Resources 26© 2018 SolarWinds Worldwide, LLC. All Rights Reserved.
  • 28. @solarwinds Contact Us • Watch a short demo video: http://demo.solarwinds.com/sedemo/ • Download a free trial: http://www.solarwinds.com/downloads/ • Visit our Federal website: http://www.solarwinds.com/federal • Call the SolarWinds Federal sales team: 877.946.3751 • Email federal sales: federalsales@solarwinds.com • Email our Government Distributor DLT®: solarwinds@dlt.com • Follow us on LinkedIn®: https://www.linkedin.com/company/solarwinds-government Let us know how we can help you © 2018 SolarWinds Worldwide, LLC. All Rights Reserved. 28
  • 29. @solarwinds The SolarWinds, SolarWinds & Design, Orion, and THWACK trademarks are the exclusive property of SolarWinds Worldwide, LLC or its affiliates, are registered with the U.S. Patent and Trademark Office, and may be registered or pending registration in other countries. All other SolarWinds trademarks, service marks, and logos may be common law marks or are registered or pending registration. All other trademarks mentioned herein are used for identification purposes only and are trademarks of (and may be registered trademarks) of their respective companies. 29

Editor's Notes

  1. Explain that the yellow oval indicates a statistically significant difference and that this notation will be used throughout the results slides
  2. 6
  3. 7
  4. Notes to Sean- added ARM to Control; moved SCM under Monitor; added NPM to Identify (discovery). SAM also has a discovery role; SCM and WHD have asset management features (not in slide).
  5. SDLs are becoming widespread across industries, and Microsoft® has released its own SDL for others to use as an example.