SlideShare a Scribd company logo
1 of 26
Leverage IT Operations Monitoring and
Log Data to Reduce Insider Threats
Federal Webcast
April 26, 2018
© 2018 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
•SolarWinds company overview
•2017 SolarWinds Federal Cybersecurity Survey overview
•Leveraging SolarWinds® security and network
management tools
•Best practices for combating insider threats
•Security and network management overview
•Compliance features
•SolarWinds Log & Event Manager overview
•Demonstration
•Q&A
•Additional resources
Agenda
Presented by:
Paul Parker
Chief Technologist - Federal and
National Government
paul.parker@solarwinds.com
Omar Rafik
Federal Senior Sales Engineering
Manager
omar.rafik@solarwinds.com
3
SolarWinds Overview
•Over 250,000 customers in 170 countries; SMB to
Fortune 500®
•More than 425 of the Fortune 500 are customers
•Every branch of DoD and virtually every civilian and
intelligence agency
•Maintained number one position in global market
for Network Management Software in the IDC®
Worldwide Semi-Annual Software Tracker 1H 2017
•Headquarters in Austin, TX
•Federal office in Herndon, VA
•2,200+ employees worldwide
© 2018 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
Servers &
Applications
Database
Network
Storage
Security
User
Experience
Security
Management
Log and Event
Patch
Product Mission: Enable IT and DevOps pros to
proactively and reactively monitor, alert, troubleshoot,
and resolve infrastructure issues.
What We Offer Today
• Building toward our future
Network
Management
Performance
Configuration
IP Address
VoIP
Applications and
Management
Servers and Apps
Virtualization
Storage
Database
Management
Database
Performance
Tools
Remote
Troubleshooting
Web Help Desk®
Topology Mapping
Configuration
MySQL®
Oracle®
SQL Server®
DB2®
SAP® ASE
Device Tracking
Secure File Transfer
Web Performance
Product Principles: Fast (immediate accessibility), easy
(best-in-class UX), and affordable (starting price for
agencies of all sizes).
© 2018 SolarWinds Worldwide, LLC. All Rights Reserved.
Cloud
© 2018 SolarWinds Worldwide, LLC. All rights reserved.
The SolarWinds Orion Platform
The Orion® Platform powers SolarWinds networking
and systems management products
• Modular, extensible, unified, and scalable platform for a hybrid IT world
• Unified view from network to web performance metrics for faster root cause
identification and troubleshooting
• Centralized administration, access control, advanced alerting, and reporting
5
SolarWinds 2017 Federal Cybersecurity Survey
© 2018 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
•SolarWinds contracted Market Connections
to conduct a fourth annual blind online
survey among 200 federal government IT
decision makers and influencers in July 2017
•The objectives were to determine
challenges, quantify sources and types of
threats, and explore successful
cybersecurity strategies
SOLARWINDS FEDERAL 2017 CYBERSECURITY SURVEY SUMMARY REPORT | MARKET CONNECTIONS, INC. | 703.378.2025
© 2018 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
IT SECURITY OBSTACLES, THREATS, AND BREACHES 7
• Careless/untrained insiders and foreign governments are noted as the largest sources of security threats at federal
agencies. Significantly more defense than civilian respondents indicate malicious insiders is a security threat at
their agency.
Sources of Security Threats
What are the greatest sources of IT security threats to your agency? (select all that apply)
N=200
Note: Multiple responses allowed
2%
1%
2%
12%
17%
20%
29%
34%
38%
48%
54%
0% 10% 20% 30% 40% 50% 60%
None of the above
Other
Unsure of these threats
Industrial spies
For-profit crime
Terrorists
Malicious insiders
Hacktivists
General hacking community
Foreign governments
Careless/untrained insiders
By Agency Type
Defense Civilian
40% 21%
= statistically significant difference
SOLARWINDS FEDERAL 2017 CYBERSECURITY SURVEY SUMMARY REPORT | MARKET CONNECTIONS, INC. | 703.378.2025
© 2018 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
IT SECURITY OBSTACLES, THREATS, AND BREACHES 8
• There has been no significant reduction in the various sources of security threats. Since 2014, respondents indicate
significant increases in threats from both careless/untrained and malicious insiders.
Sources of Security Threats - Trend
What are the greatest sources of IT security threats to your agency? (select all that apply)
N=200
Note: Multiple responses allowed = statistically significant difference= top 3 sources
2014 2015 2016 2017
Careless/untrained
insiders
42% 53% 48% 54%
Foreign governments 34% 38% 48% 48%
General hacking
community
47% 46% 46% 38%
Hacktivists 26% 30% 38% 34%
Malicious insiders 17% 23% 22% 29%
Terrorists 21% 18% 24% 20%
For-profit crime 11% 14% 18% 17%
Industrial spies 6% 10% 16% 12%
SOLARWINDS FEDERAL 2015 CYBERSECURITY SURVEY SUMMARY REPORT | MARKET CONNECTIONS, INC. | 703.378.2025
© 2018 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
9
Insider Threat Detection Difficulties
INSIDER BREACH CAUSES AND DETECTION DIFFICULTIES
• The volume of network activity is noted most often as what makes insider threat detection and prevention most difficult. One
third also note the lack of IT staff training, the use of cloud services, and pressure to change configuration quickly versus
securely.
In today’s environment, what makes insider threat detection and prevention more difficult?
3%
19%
22%
23%
24%
24%
26%
27%
27%
30%
34%
35%
35%
40%
0% 10% 20% 30% 40% 50%
Other
Functionality of and access to critical systems
Inadequate change control practices
Complexity of monitoring tools
Inadequate configuration management of IT…
Inadequate visibility into users’ network activity
Inadequate monitoring of storage devices
Growing adoption of BYOD
Cost of sophisticated tools
Use of mobile devices
Pressure to change IT configurations quickly…
Growing use of cloud services
Lack of IT staff training
Volume of network activity
Defense Civilian
Inadequate
configuration
management
of IT assets
17% 28%
Inadequate
monitoring of
storage
devices
18% 32%
= statistically significant difference
Note: Multiple responses allowed
N=200
IT/ Security
Staff
IT/Security
Manager/
Director
Volume of
network
activity
29% 44%
SOLARWINDS FEDERAL 2015 CYBERSECURITY SURVEY SUMMARY REPORT | MARKET CONNECTIONS, INC. | 703.378.2025
© 2018 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
4%
24%
28%
31%
33%
36%
37%
37%
41%
44%
49%
0% 10% 20% 30% 40% 50% 60%
Other
Insecure configuration of IT assets
Incorrect disposal of hardware
Not applying security updates
Incorrect use of approved personal devices
Device loss
Poor password management
Using personal devices that are against…
Accidentally deleting, corrupting or…
Data copied to insecure device
Phishing attacks
10
Accidental Insider Breach Causes
INSIDER BREACH CAUSES AND DETECTION DIFFICULTIES
• The most common causes of accidental insider IT security breaches are phishing attacks, followed by data copied to an insecure
device and accidentally deleting, corrupting, or modifying critical data.
What are the most common causes of accidental insider IT security breaches caused by the untrained or careless employee?
Note: Multiple responses allowed
N=200
Defense Civilian
Device loss 26% 43%
= statistically significant difference
IT/ Security
Staff
IT/Security
Manager/
Director
Insecure
configuration
of IT assets
17% 36%
SOLARWINDS FEDERAL 2017 CYBERSECURITY SURVEY SUMMARY REPORT | MARKET CONNECTIONS, INC. | 703.378.2025
© 2018 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
12%
10%
18%
16%
11%
14%
9%
12%
14%
16%
74%
68%
58%
59%
60%
49%
54%
45%
35%
32%
14%
22%
23%
25%
29%
37%
37%
43%
50%
52%
0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100%
APT
Mobile device theft
Physical security attacks
Insider data leakage/Theft
Denial of service
External hacking
Ransomware
Social engineering
Malware
SPAM
Decreased No Change Increased
IT SECURITY OBSTACLES, THREATS, AND BREACHES 11
• In the past 12 months, half of respondents have seen SPAM and malware increase at their agency.
Change in Security Threats
In the past 12 months, has your agency seen any changes in the following types of cyber security threats?
N=200
Leveraging SolarWinds Security and
Network Management Tools
Best Practices for Combating Insider Threats
© 2018 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
•Know and protect your critical assets
•Develop a formalized insider threat program
•Deploy solutions for monitoring employees actions and correlating information from
multiple data sources
•Clearly document and consistently enforce policies and controls
•Incorporate malicious and unintentional insider threat awareness into periodic security
training for all employees
Source: CERT Insider Threat Center https://insights.sei.cmu.edu/sei_blog/2017/11/5-best-practices-to-prevent-insider-threat.html
Security and Network Management Tools Can Help
Security and network management tools can help with compliance
• Configuration management software centralizes
change management and reporting
• Log and event management (SIEM) software
uses logs for security and compliance
• Patch management software centralizes updates
and reduces vulnerability
• Device tracking, IP management, and switch
port management for compliance enforcement
• Network management software for continuous
monitoring, audit documentation, and reporting
Log and Event
Management
Patch
Management
Network
Management
Configuration
Management
IP Address
Management
User Device
Tracking
More information: http://www.solarwinds.com/federal-government/solution/cyber-security
© 2018 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
SolarWinds Compliance Features
• Inventory network device configurations, assess configurations for compliance,
and automate change and configuration management
• Implement configuration of security controls and help assure effectiveness
• Produce FISMA and DISA STIGs reports and take corrective actions
• Produce audit documentation and reports to support DISA CCRI or OMB audits
Network Configuration Manager
• Configure correlation rules to help assure effectiveness of security controls
• Real-time and continuous monitoring of security controls
• Monitor for Active Directory® events and changes
• Produce FISMA and DISA STIGs compliance reports from templates
• Supports DISA STIGs requirements for configuration auditing, log analysis,
and broader network security
• Tracks and report suspicious activities/attacks to provide auditing support
Log & Event Manager
© 2018 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
SolarWinds Compliance Features
• Trend utilization for capacity planning
• Track multicast or firewall port discards
• Monitor network health and availability
• Identify protocol latency delays
• Produce audit documentation and reports
Network Performance Monitor
• Automate patching of Microsoft® and third-party applications to help
improve compliance
• Schedule patches for minimum downtime
• Inventory software and physical components per server or workstation
Patch Manager
© 2018 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
A Need for Monitoring Active Directory
•Targeted attacks are more sophisticated
•It is difficult to completely prevent attacks by just
defending the border
•Attackers remain within the systems of an organization
and cleverly steal information over a long period of time
•If detection is delayed, damages increase. It is critical to
detect as soon as possible to stop the attack
•Monitoring Active Directory is a critical layer of your
defense, especially when it comes to detection of breach
“Our daily life, economic vitality, and national security depend on
a stable, safe, and resilient cyberspace.”
Department of Homeland Security Cybersecurity Topics Page
https://www.dhs.gov/topic/cybersecurity
© 2018 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
Monitoring for Active Directory Events and Changes
•User events
New user creation | user lock-out event | user-enabled event | user deleted
•Authentication events
User logons | failed logons
(Windows® 10 Logon/Logoff Auditing can generate 27 different types of events)
(For object access in Windows 10, auditing events can generate 41 events)
•Group changes
Adding to groups | removing from groups | creating new groups
•Policy changes
Group policy | audit policy
•Password resets
Verify admin changes | verify users comply with internal policies and procedures
© 2018 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
SolarWinds Log & Event Manager
© 2018 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
Log & Event Manager
Powerful and affordable SIEM
•Scalable and easy collection of network device,
machine, and cloud logs
•Real-time, in-memory event correlation
•Define rules and configure alerts
•Advanced IT search for event forensic analysis
•Threat intelligence feed integration
•Log data compression and retention
•Single sign-on/smart card integration
•Embedded, real-time file integrity monitoring
• Built-in Active Responses
•USB Defender®
•Out-of-the-box security and compliance reporting
templates
•Easy to use and deploy
•Links: Data - Demo - Resource
© 2018 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
Demonstration
When Fighting Against Insider Threats …
© 2018 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
•Meeting compliance standards does not mean you are secure
•High-performing agencies with excellent IT controls experience:
• Fewer cyberthreats
• Faster response time to threats
• Positive results from IT modernization initiatives
• Continuous review of your IT controls improves your security posture
• SolarWinds has tools to help
• Download the full 2017 survey results online at:
http://www.solarwinds.com/resources/survey/solarwinds-federal-cybersecurity-survey-summary-report-2017
• Download the full 2015 survey results online at:
http://www.solarwinds.com/resources/survey/solarwinds-federal-cybersecurity-survey-summary-report-2015
• Review a blog on how SolarWinds software can help with NIST FISMA/RMF compliance:
https://thwack.solarwinds.com/community/solarwinds-community/product-blog/blog/2015/08/01/fisma-nist-800-53-
compliance-with-solarwinds-products
• Review a blog on how SolarWinds software can help with DISA STIG compliance:
https://thwack.solarwinds.com/community/solarwinds-community/product-blog/blog/2011/09/07/disa-stig-
compliance-with-log-event-manager
• Watch a federal security compliance video:
http://www.solarwinds.com/resources/videos/solarwinds-federal-security-compliance.html
• Download a SIEM white paper:
http://www.solarwinds.com/resources/whitepaper/siem-speeds-time-to-resolution.html
• Download a continuous monitoring white paper:
http://go.solarwinds.com/fedcyberWP?=70150000000Plgf
Compliance Resources
© 2018 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
© 2018 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
Contact Federal Sales:
877.946.3751
federalsales@solarwinds.com
Contact Us
•Watch a short demo video: http://demo.solarwinds.com/sedemo/
•Download a free trial: http://www.solarwinds.com/downloads/
•Visit our Federal website: http://www.solarwinds.com/federal
•Call the SolarWinds Federal sales team: 877.946.3751
•Email federal sales: federalsales@solarwinds.com
•Email our Government Distributor DLT®: solarwinds@dlt.com
•Follow us on LinkedIn®: https://www.linkedin.com/company/solarwinds-government
• Let us know how we can help you
© 2017 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
SolarWinds, SolarWinds & Design, Orion, and Thwack are the exclusive
property of SolarWinds Worldwide, LLC or its affiliates, are registered
with the U.S. Patent and Trademark Office, and may be registered or
pending registration in other countries. All other SolarWinds
trademarks, service marks, and logos may be common law marks or are
registered or pending registration. All other trademarks mentioned
herein are used for identification purposes only and are trademarks of
(and may be registered trademarks) of their respective companies.

More Related Content

What's hot

Government and Education Webinar: Zero-Trust Panel Discussion
Government and Education Webinar: Zero-Trust Panel Discussion Government and Education Webinar: Zero-Trust Panel Discussion
Government and Education Webinar: Zero-Trust Panel Discussion SolarWinds
 
Government and Education Webinar: How the New Normal Could Improve your IT Op...
Government and Education Webinar: How the New Normal Could Improve your IT Op...Government and Education Webinar: How the New Normal Could Improve your IT Op...
Government and Education Webinar: How the New Normal Could Improve your IT Op...SolarWinds
 
Federal Webinar: Technical Update and Demo of New Features
Federal Webinar: Technical Update and Demo of New FeaturesFederal Webinar: Technical Update and Demo of New Features
Federal Webinar: Technical Update and Demo of New FeaturesSolarWinds
 
Government Webinar: Five Essential IT Tools You Need Today
Government Webinar: Five Essential IT Tools You Need TodayGovernment Webinar: Five Essential IT Tools You Need Today
Government Webinar: Five Essential IT Tools You Need TodaySolarWinds
 
Government Webinar: RMF, DISA STIG, and NIST FISMA Compliance Using SolarWinds
Government Webinar: RMF, DISA STIG, and NIST FISMA Compliance Using SolarWindsGovernment Webinar: RMF, DISA STIG, and NIST FISMA Compliance Using SolarWinds
Government Webinar: RMF, DISA STIG, and NIST FISMA Compliance Using SolarWindsSolarWinds
 
Government and Education Webinar: How to Reduce Vulnerabilities and Harden yo...
Government and Education Webinar: How to Reduce Vulnerabilities and Harden yo...Government and Education Webinar: How to Reduce Vulnerabilities and Harden yo...
Government and Education Webinar: How to Reduce Vulnerabilities and Harden yo...SolarWinds
 
Government and Education Webinar: Technical Update and Demo of New Features
Government and Education Webinar: Technical Update and Demo of New FeaturesGovernment and Education Webinar: Technical Update and Demo of New Features
Government and Education Webinar: Technical Update and Demo of New FeaturesSolarWinds
 
Improving System Upgrades and Patching using SolarWinds
Improving System Upgrades and Patching using SolarWindsImproving System Upgrades and Patching using SolarWinds
Improving System Upgrades and Patching using SolarWindsSolarWinds
 
5 Essential Capabilities You Need to Tackle Cyber Threats
5 Essential Capabilities You Need to Tackle Cyber Threats5 Essential Capabilities You Need to Tackle Cyber Threats
5 Essential Capabilities You Need to Tackle Cyber ThreatsSolarWinds
 
Government Webinar: Monitoring Azure and Deploying SolarWinds on Azure Govern...
Government Webinar: Monitoring Azure and Deploying SolarWinds on Azure Govern...Government Webinar: Monitoring Azure and Deploying SolarWinds on Azure Govern...
Government Webinar: Monitoring Azure and Deploying SolarWinds on Azure Govern...SolarWinds
 
Government and Education Webinar: Cyber Technology to Enable Operator Effecti...
Government and Education Webinar: Cyber Technology to Enable Operator Effecti...Government and Education Webinar: Cyber Technology to Enable Operator Effecti...
Government and Education Webinar: Cyber Technology to Enable Operator Effecti...SolarWinds
 
Infographic: SDN, BYOD and Cloud! Oh my!
Infographic: SDN, BYOD and Cloud! Oh my!Infographic: SDN, BYOD and Cloud! Oh my!
Infographic: SDN, BYOD and Cloud! Oh my!SolarWinds
 
The Seismic Impact of the SolarWinds Hack
The Seismic Impact of the SolarWinds HackThe Seismic Impact of the SolarWinds Hack
The Seismic Impact of the SolarWinds HackNicole Fucile-Borsian
 
How to Enable, Monitor, and Secure Your Remote Workforce
How to Enable, Monitor, and Secure Your Remote WorkforceHow to Enable, Monitor, and Secure Your Remote Workforce
How to Enable, Monitor, and Secure Your Remote WorkforceSolarWinds
 
Becoming Secure By Design: Questions You Should Ask Your Software Vendors
Becoming Secure By Design: Questions You Should Ask Your Software VendorsBecoming Secure By Design: Questions You Should Ask Your Software Vendors
Becoming Secure By Design: Questions You Should Ask Your Software VendorsSolarWinds
 
Government and Education Webinar: SolarWinds Orion Platform: Audit and Stream...
Government and Education Webinar: SolarWinds Orion Platform: Audit and Stream...Government and Education Webinar: SolarWinds Orion Platform: Audit and Stream...
Government and Education Webinar: SolarWinds Orion Platform: Audit and Stream...SolarWinds
 
Managing Multiple Assessments Using Zero Trust Principles
Managing Multiple Assessments Using Zero Trust PrinciplesManaging Multiple Assessments Using Zero Trust Principles
Managing Multiple Assessments Using Zero Trust PrinciplesControlCase
 
Practical steps for assessing tablet & mobile device security
Practical steps for assessing tablet & mobile device securityPractical steps for assessing tablet & mobile device security
Practical steps for assessing tablet & mobile device securityEnclaveSecurity
 
Top Five Security Must-Haves for Office 365
Top Five Security Must-Haves for Office 365Top Five Security Must-Haves for Office 365
Top Five Security Must-Haves for Office 365Imperva
 
DGI Compliance Webinar
DGI Compliance WebinarDGI Compliance Webinar
DGI Compliance WebinarSolarWinds
 

What's hot (20)

Government and Education Webinar: Zero-Trust Panel Discussion
Government and Education Webinar: Zero-Trust Panel Discussion Government and Education Webinar: Zero-Trust Panel Discussion
Government and Education Webinar: Zero-Trust Panel Discussion
 
Government and Education Webinar: How the New Normal Could Improve your IT Op...
Government and Education Webinar: How the New Normal Could Improve your IT Op...Government and Education Webinar: How the New Normal Could Improve your IT Op...
Government and Education Webinar: How the New Normal Could Improve your IT Op...
 
Federal Webinar: Technical Update and Demo of New Features
Federal Webinar: Technical Update and Demo of New FeaturesFederal Webinar: Technical Update and Demo of New Features
Federal Webinar: Technical Update and Demo of New Features
 
Government Webinar: Five Essential IT Tools You Need Today
Government Webinar: Five Essential IT Tools You Need TodayGovernment Webinar: Five Essential IT Tools You Need Today
Government Webinar: Five Essential IT Tools You Need Today
 
Government Webinar: RMF, DISA STIG, and NIST FISMA Compliance Using SolarWinds
Government Webinar: RMF, DISA STIG, and NIST FISMA Compliance Using SolarWindsGovernment Webinar: RMF, DISA STIG, and NIST FISMA Compliance Using SolarWinds
Government Webinar: RMF, DISA STIG, and NIST FISMA Compliance Using SolarWinds
 
Government and Education Webinar: How to Reduce Vulnerabilities and Harden yo...
Government and Education Webinar: How to Reduce Vulnerabilities and Harden yo...Government and Education Webinar: How to Reduce Vulnerabilities and Harden yo...
Government and Education Webinar: How to Reduce Vulnerabilities and Harden yo...
 
Government and Education Webinar: Technical Update and Demo of New Features
Government and Education Webinar: Technical Update and Demo of New FeaturesGovernment and Education Webinar: Technical Update and Demo of New Features
Government and Education Webinar: Technical Update and Demo of New Features
 
Improving System Upgrades and Patching using SolarWinds
Improving System Upgrades and Patching using SolarWindsImproving System Upgrades and Patching using SolarWinds
Improving System Upgrades and Patching using SolarWinds
 
5 Essential Capabilities You Need to Tackle Cyber Threats
5 Essential Capabilities You Need to Tackle Cyber Threats5 Essential Capabilities You Need to Tackle Cyber Threats
5 Essential Capabilities You Need to Tackle Cyber Threats
 
Government Webinar: Monitoring Azure and Deploying SolarWinds on Azure Govern...
Government Webinar: Monitoring Azure and Deploying SolarWinds on Azure Govern...Government Webinar: Monitoring Azure and Deploying SolarWinds on Azure Govern...
Government Webinar: Monitoring Azure and Deploying SolarWinds on Azure Govern...
 
Government and Education Webinar: Cyber Technology to Enable Operator Effecti...
Government and Education Webinar: Cyber Technology to Enable Operator Effecti...Government and Education Webinar: Cyber Technology to Enable Operator Effecti...
Government and Education Webinar: Cyber Technology to Enable Operator Effecti...
 
Infographic: SDN, BYOD and Cloud! Oh my!
Infographic: SDN, BYOD and Cloud! Oh my!Infographic: SDN, BYOD and Cloud! Oh my!
Infographic: SDN, BYOD and Cloud! Oh my!
 
The Seismic Impact of the SolarWinds Hack
The Seismic Impact of the SolarWinds HackThe Seismic Impact of the SolarWinds Hack
The Seismic Impact of the SolarWinds Hack
 
How to Enable, Monitor, and Secure Your Remote Workforce
How to Enable, Monitor, and Secure Your Remote WorkforceHow to Enable, Monitor, and Secure Your Remote Workforce
How to Enable, Monitor, and Secure Your Remote Workforce
 
Becoming Secure By Design: Questions You Should Ask Your Software Vendors
Becoming Secure By Design: Questions You Should Ask Your Software VendorsBecoming Secure By Design: Questions You Should Ask Your Software Vendors
Becoming Secure By Design: Questions You Should Ask Your Software Vendors
 
Government and Education Webinar: SolarWinds Orion Platform: Audit and Stream...
Government and Education Webinar: SolarWinds Orion Platform: Audit and Stream...Government and Education Webinar: SolarWinds Orion Platform: Audit and Stream...
Government and Education Webinar: SolarWinds Orion Platform: Audit and Stream...
 
Managing Multiple Assessments Using Zero Trust Principles
Managing Multiple Assessments Using Zero Trust PrinciplesManaging Multiple Assessments Using Zero Trust Principles
Managing Multiple Assessments Using Zero Trust Principles
 
Practical steps for assessing tablet & mobile device security
Practical steps for assessing tablet & mobile device securityPractical steps for assessing tablet & mobile device security
Practical steps for assessing tablet & mobile device security
 
Top Five Security Must-Haves for Office 365
Top Five Security Must-Haves for Office 365Top Five Security Must-Haves for Office 365
Top Five Security Must-Haves for Office 365
 
DGI Compliance Webinar
DGI Compliance WebinarDGI Compliance Webinar
DGI Compliance Webinar
 

Similar to Federal Webinar: Leverage IT Operations Monitoring and Log Data to Reduce Insider Threats

SolarWinds Federal Cybersecurity Survey 2017: Government Regulations, IT Mode...
SolarWinds Federal Cybersecurity Survey 2017: Government Regulations, IT Mode...SolarWinds Federal Cybersecurity Survey 2017: Government Regulations, IT Mode...
SolarWinds Federal Cybersecurity Survey 2017: Government Regulations, IT Mode...SolarWinds
 
Cybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 Trends
Cybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 TrendsCybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 Trends
Cybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 TrendsIvanti
 
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...Cristian Garcia G.
 
[Webinar] Supercharging Security with Behavioral Analytics
[Webinar] Supercharging Security with Behavioral Analytics[Webinar] Supercharging Security with Behavioral Analytics
[Webinar] Supercharging Security with Behavioral AnalyticsInterset
 
Where There Is Smoke, There is Fire: Extracting Actionable Intelligence from ...
Where There Is Smoke, There is Fire: Extracting Actionable Intelligence from ...Where There Is Smoke, There is Fire: Extracting Actionable Intelligence from ...
Where There Is Smoke, There is Fire: Extracting Actionable Intelligence from ...Enterprise Management Associates
 
A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...Judith Beckhard Cardoso
 
SolarWinds Federal Webinar: Government Cyber Security Survey: What you told us
SolarWinds Federal Webinar: Government Cyber Security Survey: What you told us SolarWinds Federal Webinar: Government Cyber Security Survey: What you told us
SolarWinds Federal Webinar: Government Cyber Security Survey: What you told us SolarWinds
 
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoftHow Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoftOSIsoft, LLC
 
Security Incident Response Readiness Survey
Security Incident Response Readiness Survey  Security Incident Response Readiness Survey
Security Incident Response Readiness Survey Rahul Neel Mani
 
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...Enterprise Management Associates
 
06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware
06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware
06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMwareVMUG IT
 
Vulnerability Management – Opportunities and Challenges!
Vulnerability Management – Opportunities and Challenges!Vulnerability Management – Opportunities and Challenges!
Vulnerability Management – Opportunities and Challenges!Outpost24
 
Threat Detection as presented at the 2016 DGI Cyber security Conference
Threat Detection as presented at the 2016 DGI Cyber security ConferenceThreat Detection as presented at the 2016 DGI Cyber security Conference
Threat Detection as presented at the 2016 DGI Cyber security ConferenceSolarWinds
 
Get Ready for Syncsort's New Best-of-Breed Security Solution
Get Ready for Syncsort's New Best-of-Breed Security SolutionGet Ready for Syncsort's New Best-of-Breed Security Solution
Get Ready for Syncsort's New Best-of-Breed Security SolutionPrecisely
 
SolarWinds Federal Cybersecurity Survey 2016
SolarWinds Federal Cybersecurity Survey 2016SolarWinds Federal Cybersecurity Survey 2016
SolarWinds Federal Cybersecurity Survey 2016SolarWinds
 
SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)Norm Barber
 
Data erasure's role in limiting cyber attacks
Data erasure's role in limiting cyber attacksData erasure's role in limiting cyber attacks
Data erasure's role in limiting cyber attacksBlancco
 
Learning from Verizon 2017 Data Breach Investigations Report – The New Targets
Learning from Verizon 2017 Data Breach Investigations Report – The New TargetsLearning from Verizon 2017 Data Breach Investigations Report – The New Targets
Learning from Verizon 2017 Data Breach Investigations Report – The New TargetsUlf Mattsson
 

Similar to Federal Webinar: Leverage IT Operations Monitoring and Log Data to Reduce Insider Threats (20)

SolarWinds Federal Cybersecurity Survey 2017: Government Regulations, IT Mode...
SolarWinds Federal Cybersecurity Survey 2017: Government Regulations, IT Mode...SolarWinds Federal Cybersecurity Survey 2017: Government Regulations, IT Mode...
SolarWinds Federal Cybersecurity Survey 2017: Government Regulations, IT Mode...
 
Cybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 Trends
Cybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 TrendsCybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 Trends
Cybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 Trends
 
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
 
[Webinar] Supercharging Security with Behavioral Analytics
[Webinar] Supercharging Security with Behavioral Analytics[Webinar] Supercharging Security with Behavioral Analytics
[Webinar] Supercharging Security with Behavioral Analytics
 
Where There Is Smoke, There is Fire: Extracting Actionable Intelligence from ...
Where There Is Smoke, There is Fire: Extracting Actionable Intelligence from ...Where There Is Smoke, There is Fire: Extracting Actionable Intelligence from ...
Where There Is Smoke, There is Fire: Extracting Actionable Intelligence from ...
 
A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...
 
SolarWinds Federal Webinar: Government Cyber Security Survey: What you told us
SolarWinds Federal Webinar: Government Cyber Security Survey: What you told us SolarWinds Federal Webinar: Government Cyber Security Survey: What you told us
SolarWinds Federal Webinar: Government Cyber Security Survey: What you told us
 
The State of Threat Detection 2019
The State of Threat Detection 2019The State of Threat Detection 2019
The State of Threat Detection 2019
 
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoftHow Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
 
Security Incident Response Readiness Survey
Security Incident Response Readiness Survey  Security Incident Response Readiness Survey
Security Incident Response Readiness Survey
 
ISACA ISSA Presentation
ISACA ISSA PresentationISACA ISSA Presentation
ISACA ISSA Presentation
 
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
 
06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware
06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware
06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware
 
Vulnerability Management – Opportunities and Challenges!
Vulnerability Management – Opportunities and Challenges!Vulnerability Management – Opportunities and Challenges!
Vulnerability Management – Opportunities and Challenges!
 
Threat Detection as presented at the 2016 DGI Cyber security Conference
Threat Detection as presented at the 2016 DGI Cyber security ConferenceThreat Detection as presented at the 2016 DGI Cyber security Conference
Threat Detection as presented at the 2016 DGI Cyber security Conference
 
Get Ready for Syncsort's New Best-of-Breed Security Solution
Get Ready for Syncsort's New Best-of-Breed Security SolutionGet Ready for Syncsort's New Best-of-Breed Security Solution
Get Ready for Syncsort's New Best-of-Breed Security Solution
 
SolarWinds Federal Cybersecurity Survey 2016
SolarWinds Federal Cybersecurity Survey 2016SolarWinds Federal Cybersecurity Survey 2016
SolarWinds Federal Cybersecurity Survey 2016
 
SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)
 
Data erasure's role in limiting cyber attacks
Data erasure's role in limiting cyber attacksData erasure's role in limiting cyber attacks
Data erasure's role in limiting cyber attacks
 
Learning from Verizon 2017 Data Breach Investigations Report – The New Targets
Learning from Verizon 2017 Data Breach Investigations Report – The New TargetsLearning from Verizon 2017 Data Breach Investigations Report – The New Targets
Learning from Verizon 2017 Data Breach Investigations Report – The New Targets
 

More from SolarWinds

SolarWinds Government and Education Webinar: Greatest SolarWinds Features I N...
SolarWinds Government and Education Webinar: Greatest SolarWinds Features I N...SolarWinds Government and Education Webinar: Greatest SolarWinds Features I N...
SolarWinds Government and Education Webinar: Greatest SolarWinds Features I N...SolarWinds
 
SolarWinds Government and Education Webinar: Gaps Exist in Your Monitoring In...
SolarWinds Government and Education Webinar: Gaps Exist in Your Monitoring In...SolarWinds Government and Education Webinar: Gaps Exist in Your Monitoring In...
SolarWinds Government and Education Webinar: Gaps Exist in Your Monitoring In...SolarWinds
 
Government Webinar: Alerting and Reporting in the Age of Observability
Government Webinar: Alerting and Reporting in the Age of ObservabilityGovernment Webinar: Alerting and Reporting in the Age of Observability
Government Webinar: Alerting and Reporting in the Age of ObservabilitySolarWinds
 
Government and Education Webinar: Full Stack Observability
Government and Education Webinar: Full Stack ObservabilityGovernment and Education Webinar: Full Stack Observability
Government and Education Webinar: Full Stack ObservabilitySolarWinds
 
Government and Education Webinar: Public Sector Cybersecurity Survey - What I...
Government and Education Webinar: Public Sector Cybersecurity Survey - What I...Government and Education Webinar: Public Sector Cybersecurity Survey - What I...
Government and Education Webinar: Public Sector Cybersecurity Survey - What I...SolarWinds
 
Government and Education Webinar: Real-Time Mission, CIO, and Command Dashboards
Government and Education Webinar: Real-Time Mission, CIO, and Command DashboardsGovernment and Education Webinar: Real-Time Mission, CIO, and Command Dashboards
Government and Education Webinar: Real-Time Mission, CIO, and Command DashboardsSolarWinds
 
Government and Education Webinar: Simplify Your Database Performance Manageme...
Government and Education Webinar: Simplify Your Database Performance Manageme...Government and Education Webinar: Simplify Your Database Performance Manageme...
Government and Education Webinar: Simplify Your Database Performance Manageme...SolarWinds
 
Government and Education Webinar: Leverage Automation to Improve IT Operations
Government and Education Webinar: Leverage Automation to Improve IT OperationsGovernment and Education Webinar: Leverage Automation to Improve IT Operations
Government and Education Webinar: Leverage Automation to Improve IT OperationsSolarWinds
 
Government and Education Webinar: Improving Application Performance
Government and Education Webinar: Improving Application PerformanceGovernment and Education Webinar: Improving Application Performance
Government and Education Webinar: Improving Application PerformanceSolarWinds
 
Government and Education: IT Tools to Support Your Hybrid Workforce
Government and Education: IT Tools to Support Your Hybrid WorkforceGovernment and Education: IT Tools to Support Your Hybrid Workforce
Government and Education: IT Tools to Support Your Hybrid WorkforceSolarWinds
 
Government and Education Webinar: There's More Than One Way to Monitor SQL Da...
Government and Education Webinar: There's More Than One Way to Monitor SQL Da...Government and Education Webinar: There's More Than One Way to Monitor SQL Da...
Government and Education Webinar: There's More Than One Way to Monitor SQL Da...SolarWinds
 
SolarWinds Government and Education Webinar: Virtual Technology Briefing 08.0...
SolarWinds Government and Education Webinar: Virtual Technology Briefing 08.0...SolarWinds Government and Education Webinar: Virtual Technology Briefing 08.0...
SolarWinds Government and Education Webinar: Virtual Technology Briefing 08.0...SolarWinds
 
Government and Education: Leveraging The SolarWinds Orion Assistance Program ...
Government and Education: Leveraging The SolarWinds Orion Assistance Program ...Government and Education: Leveraging The SolarWinds Orion Assistance Program ...
Government and Education: Leveraging The SolarWinds Orion Assistance Program ...SolarWinds
 
Government and Education Webinar: SQL Server—Advanced Performance Tuning
Government and Education Webinar: SQL Server—Advanced Performance Tuning Government and Education Webinar: SQL Server—Advanced Performance Tuning
Government and Education Webinar: SQL Server—Advanced Performance Tuning SolarWinds
 
Government and Education Webinar: Recovering IP Addresses on Your Network
Government and Education Webinar: Recovering IP Addresses on Your NetworkGovernment and Education Webinar: Recovering IP Addresses on Your Network
Government and Education Webinar: Recovering IP Addresses on Your NetworkSolarWinds
 
Government and Education Webinar: Optimize Performance With Advanced Host Mon...
Government and Education Webinar: Optimize Performance With Advanced Host Mon...Government and Education Webinar: Optimize Performance With Advanced Host Mon...
Government and Education Webinar: Optimize Performance With Advanced Host Mon...SolarWinds
 
Government and Education Webinar: Conquering Remote Work IT Challenges
Government and Education Webinar: Conquering Remote Work IT Challenges Government and Education Webinar: Conquering Remote Work IT Challenges
Government and Education Webinar: Conquering Remote Work IT Challenges SolarWinds
 
Government and Education Webinar: SQL Server—Indexing for Performance
Government and Education Webinar: SQL Server—Indexing for PerformanceGovernment and Education Webinar: SQL Server—Indexing for Performance
Government and Education Webinar: SQL Server—Indexing for PerformanceSolarWinds
 
Government Webinar: Preparing for CMMC Compliance Roundtable
Government Webinar: Preparing for CMMC Compliance Roundtable Government Webinar: Preparing for CMMC Compliance Roundtable
Government Webinar: Preparing for CMMC Compliance Roundtable SolarWinds
 
Government Webinar: Low-Cost Log, Network Configuration, and IT Monitoring So...
Government Webinar: Low-Cost Log, Network Configuration, and IT Monitoring So...Government Webinar: Low-Cost Log, Network Configuration, and IT Monitoring So...
Government Webinar: Low-Cost Log, Network Configuration, and IT Monitoring So...SolarWinds
 

More from SolarWinds (20)

SolarWinds Government and Education Webinar: Greatest SolarWinds Features I N...
SolarWinds Government and Education Webinar: Greatest SolarWinds Features I N...SolarWinds Government and Education Webinar: Greatest SolarWinds Features I N...
SolarWinds Government and Education Webinar: Greatest SolarWinds Features I N...
 
SolarWinds Government and Education Webinar: Gaps Exist in Your Monitoring In...
SolarWinds Government and Education Webinar: Gaps Exist in Your Monitoring In...SolarWinds Government and Education Webinar: Gaps Exist in Your Monitoring In...
SolarWinds Government and Education Webinar: Gaps Exist in Your Monitoring In...
 
Government Webinar: Alerting and Reporting in the Age of Observability
Government Webinar: Alerting and Reporting in the Age of ObservabilityGovernment Webinar: Alerting and Reporting in the Age of Observability
Government Webinar: Alerting and Reporting in the Age of Observability
 
Government and Education Webinar: Full Stack Observability
Government and Education Webinar: Full Stack ObservabilityGovernment and Education Webinar: Full Stack Observability
Government and Education Webinar: Full Stack Observability
 
Government and Education Webinar: Public Sector Cybersecurity Survey - What I...
Government and Education Webinar: Public Sector Cybersecurity Survey - What I...Government and Education Webinar: Public Sector Cybersecurity Survey - What I...
Government and Education Webinar: Public Sector Cybersecurity Survey - What I...
 
Government and Education Webinar: Real-Time Mission, CIO, and Command Dashboards
Government and Education Webinar: Real-Time Mission, CIO, and Command DashboardsGovernment and Education Webinar: Real-Time Mission, CIO, and Command Dashboards
Government and Education Webinar: Real-Time Mission, CIO, and Command Dashboards
 
Government and Education Webinar: Simplify Your Database Performance Manageme...
Government and Education Webinar: Simplify Your Database Performance Manageme...Government and Education Webinar: Simplify Your Database Performance Manageme...
Government and Education Webinar: Simplify Your Database Performance Manageme...
 
Government and Education Webinar: Leverage Automation to Improve IT Operations
Government and Education Webinar: Leverage Automation to Improve IT OperationsGovernment and Education Webinar: Leverage Automation to Improve IT Operations
Government and Education Webinar: Leverage Automation to Improve IT Operations
 
Government and Education Webinar: Improving Application Performance
Government and Education Webinar: Improving Application PerformanceGovernment and Education Webinar: Improving Application Performance
Government and Education Webinar: Improving Application Performance
 
Government and Education: IT Tools to Support Your Hybrid Workforce
Government and Education: IT Tools to Support Your Hybrid WorkforceGovernment and Education: IT Tools to Support Your Hybrid Workforce
Government and Education: IT Tools to Support Your Hybrid Workforce
 
Government and Education Webinar: There's More Than One Way to Monitor SQL Da...
Government and Education Webinar: There's More Than One Way to Monitor SQL Da...Government and Education Webinar: There's More Than One Way to Monitor SQL Da...
Government and Education Webinar: There's More Than One Way to Monitor SQL Da...
 
SolarWinds Government and Education Webinar: Virtual Technology Briefing 08.0...
SolarWinds Government and Education Webinar: Virtual Technology Briefing 08.0...SolarWinds Government and Education Webinar: Virtual Technology Briefing 08.0...
SolarWinds Government and Education Webinar: Virtual Technology Briefing 08.0...
 
Government and Education: Leveraging The SolarWinds Orion Assistance Program ...
Government and Education: Leveraging The SolarWinds Orion Assistance Program ...Government and Education: Leveraging The SolarWinds Orion Assistance Program ...
Government and Education: Leveraging The SolarWinds Orion Assistance Program ...
 
Government and Education Webinar: SQL Server—Advanced Performance Tuning
Government and Education Webinar: SQL Server—Advanced Performance Tuning Government and Education Webinar: SQL Server—Advanced Performance Tuning
Government and Education Webinar: SQL Server—Advanced Performance Tuning
 
Government and Education Webinar: Recovering IP Addresses on Your Network
Government and Education Webinar: Recovering IP Addresses on Your NetworkGovernment and Education Webinar: Recovering IP Addresses on Your Network
Government and Education Webinar: Recovering IP Addresses on Your Network
 
Government and Education Webinar: Optimize Performance With Advanced Host Mon...
Government and Education Webinar: Optimize Performance With Advanced Host Mon...Government and Education Webinar: Optimize Performance With Advanced Host Mon...
Government and Education Webinar: Optimize Performance With Advanced Host Mon...
 
Government and Education Webinar: Conquering Remote Work IT Challenges
Government and Education Webinar: Conquering Remote Work IT Challenges Government and Education Webinar: Conquering Remote Work IT Challenges
Government and Education Webinar: Conquering Remote Work IT Challenges
 
Government and Education Webinar: SQL Server—Indexing for Performance
Government and Education Webinar: SQL Server—Indexing for PerformanceGovernment and Education Webinar: SQL Server—Indexing for Performance
Government and Education Webinar: SQL Server—Indexing for Performance
 
Government Webinar: Preparing for CMMC Compliance Roundtable
Government Webinar: Preparing for CMMC Compliance Roundtable Government Webinar: Preparing for CMMC Compliance Roundtable
Government Webinar: Preparing for CMMC Compliance Roundtable
 
Government Webinar: Low-Cost Log, Network Configuration, and IT Monitoring So...
Government Webinar: Low-Cost Log, Network Configuration, and IT Monitoring So...Government Webinar: Low-Cost Log, Network Configuration, and IT Monitoring So...
Government Webinar: Low-Cost Log, Network Configuration, and IT Monitoring So...
 

Recently uploaded

Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about usDynamic Netsoft
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - InfographicHr365.us smith
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityNeo4j
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number SystemsJheuzeDellosa
 
Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...aditisharan08
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...harshavardhanraghave
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptkotipi9215
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)OPEN KNOWLEDGE GmbH
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...Christina Lin
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationkaushalgiri8080
 

Recently uploaded (20)

Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about us
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - Infographic
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number Systems
 
Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.ppt
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanation
 

Federal Webinar: Leverage IT Operations Monitoring and Log Data to Reduce Insider Threats

  • 1. Leverage IT Operations Monitoring and Log Data to Reduce Insider Threats Federal Webcast April 26, 2018
  • 2. © 2018 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED. •SolarWinds company overview •2017 SolarWinds Federal Cybersecurity Survey overview •Leveraging SolarWinds® security and network management tools •Best practices for combating insider threats •Security and network management overview •Compliance features •SolarWinds Log & Event Manager overview •Demonstration •Q&A •Additional resources Agenda Presented by: Paul Parker Chief Technologist - Federal and National Government paul.parker@solarwinds.com Omar Rafik Federal Senior Sales Engineering Manager omar.rafik@solarwinds.com
  • 3. 3 SolarWinds Overview •Over 250,000 customers in 170 countries; SMB to Fortune 500® •More than 425 of the Fortune 500 are customers •Every branch of DoD and virtually every civilian and intelligence agency •Maintained number one position in global market for Network Management Software in the IDC® Worldwide Semi-Annual Software Tracker 1H 2017 •Headquarters in Austin, TX •Federal office in Herndon, VA •2,200+ employees worldwide © 2018 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED. Servers & Applications Database Network Storage Security User Experience
  • 4. Security Management Log and Event Patch Product Mission: Enable IT and DevOps pros to proactively and reactively monitor, alert, troubleshoot, and resolve infrastructure issues. What We Offer Today • Building toward our future Network Management Performance Configuration IP Address VoIP Applications and Management Servers and Apps Virtualization Storage Database Management Database Performance Tools Remote Troubleshooting Web Help Desk® Topology Mapping Configuration MySQL® Oracle® SQL Server® DB2® SAP® ASE Device Tracking Secure File Transfer Web Performance Product Principles: Fast (immediate accessibility), easy (best-in-class UX), and affordable (starting price for agencies of all sizes). © 2018 SolarWinds Worldwide, LLC. All Rights Reserved. Cloud
  • 5. © 2018 SolarWinds Worldwide, LLC. All rights reserved. The SolarWinds Orion Platform The Orion® Platform powers SolarWinds networking and systems management products • Modular, extensible, unified, and scalable platform for a hybrid IT world • Unified view from network to web performance metrics for faster root cause identification and troubleshooting • Centralized administration, access control, advanced alerting, and reporting 5
  • 6. SolarWinds 2017 Federal Cybersecurity Survey © 2018 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED. •SolarWinds contracted Market Connections to conduct a fourth annual blind online survey among 200 federal government IT decision makers and influencers in July 2017 •The objectives were to determine challenges, quantify sources and types of threats, and explore successful cybersecurity strategies
  • 7. SOLARWINDS FEDERAL 2017 CYBERSECURITY SURVEY SUMMARY REPORT | MARKET CONNECTIONS, INC. | 703.378.2025 © 2018 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED. IT SECURITY OBSTACLES, THREATS, AND BREACHES 7 • Careless/untrained insiders and foreign governments are noted as the largest sources of security threats at federal agencies. Significantly more defense than civilian respondents indicate malicious insiders is a security threat at their agency. Sources of Security Threats What are the greatest sources of IT security threats to your agency? (select all that apply) N=200 Note: Multiple responses allowed 2% 1% 2% 12% 17% 20% 29% 34% 38% 48% 54% 0% 10% 20% 30% 40% 50% 60% None of the above Other Unsure of these threats Industrial spies For-profit crime Terrorists Malicious insiders Hacktivists General hacking community Foreign governments Careless/untrained insiders By Agency Type Defense Civilian 40% 21% = statistically significant difference
  • 8. SOLARWINDS FEDERAL 2017 CYBERSECURITY SURVEY SUMMARY REPORT | MARKET CONNECTIONS, INC. | 703.378.2025 © 2018 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED. IT SECURITY OBSTACLES, THREATS, AND BREACHES 8 • There has been no significant reduction in the various sources of security threats. Since 2014, respondents indicate significant increases in threats from both careless/untrained and malicious insiders. Sources of Security Threats - Trend What are the greatest sources of IT security threats to your agency? (select all that apply) N=200 Note: Multiple responses allowed = statistically significant difference= top 3 sources 2014 2015 2016 2017 Careless/untrained insiders 42% 53% 48% 54% Foreign governments 34% 38% 48% 48% General hacking community 47% 46% 46% 38% Hacktivists 26% 30% 38% 34% Malicious insiders 17% 23% 22% 29% Terrorists 21% 18% 24% 20% For-profit crime 11% 14% 18% 17% Industrial spies 6% 10% 16% 12%
  • 9. SOLARWINDS FEDERAL 2015 CYBERSECURITY SURVEY SUMMARY REPORT | MARKET CONNECTIONS, INC. | 703.378.2025 © 2018 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED. 9 Insider Threat Detection Difficulties INSIDER BREACH CAUSES AND DETECTION DIFFICULTIES • The volume of network activity is noted most often as what makes insider threat detection and prevention most difficult. One third also note the lack of IT staff training, the use of cloud services, and pressure to change configuration quickly versus securely. In today’s environment, what makes insider threat detection and prevention more difficult? 3% 19% 22% 23% 24% 24% 26% 27% 27% 30% 34% 35% 35% 40% 0% 10% 20% 30% 40% 50% Other Functionality of and access to critical systems Inadequate change control practices Complexity of monitoring tools Inadequate configuration management of IT… Inadequate visibility into users’ network activity Inadequate monitoring of storage devices Growing adoption of BYOD Cost of sophisticated tools Use of mobile devices Pressure to change IT configurations quickly… Growing use of cloud services Lack of IT staff training Volume of network activity Defense Civilian Inadequate configuration management of IT assets 17% 28% Inadequate monitoring of storage devices 18% 32% = statistically significant difference Note: Multiple responses allowed N=200 IT/ Security Staff IT/Security Manager/ Director Volume of network activity 29% 44%
  • 10. SOLARWINDS FEDERAL 2015 CYBERSECURITY SURVEY SUMMARY REPORT | MARKET CONNECTIONS, INC. | 703.378.2025 © 2018 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED. 4% 24% 28% 31% 33% 36% 37% 37% 41% 44% 49% 0% 10% 20% 30% 40% 50% 60% Other Insecure configuration of IT assets Incorrect disposal of hardware Not applying security updates Incorrect use of approved personal devices Device loss Poor password management Using personal devices that are against… Accidentally deleting, corrupting or… Data copied to insecure device Phishing attacks 10 Accidental Insider Breach Causes INSIDER BREACH CAUSES AND DETECTION DIFFICULTIES • The most common causes of accidental insider IT security breaches are phishing attacks, followed by data copied to an insecure device and accidentally deleting, corrupting, or modifying critical data. What are the most common causes of accidental insider IT security breaches caused by the untrained or careless employee? Note: Multiple responses allowed N=200 Defense Civilian Device loss 26% 43% = statistically significant difference IT/ Security Staff IT/Security Manager/ Director Insecure configuration of IT assets 17% 36%
  • 11. SOLARWINDS FEDERAL 2017 CYBERSECURITY SURVEY SUMMARY REPORT | MARKET CONNECTIONS, INC. | 703.378.2025 © 2018 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED. 12% 10% 18% 16% 11% 14% 9% 12% 14% 16% 74% 68% 58% 59% 60% 49% 54% 45% 35% 32% 14% 22% 23% 25% 29% 37% 37% 43% 50% 52% 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% APT Mobile device theft Physical security attacks Insider data leakage/Theft Denial of service External hacking Ransomware Social engineering Malware SPAM Decreased No Change Increased IT SECURITY OBSTACLES, THREATS, AND BREACHES 11 • In the past 12 months, half of respondents have seen SPAM and malware increase at their agency. Change in Security Threats In the past 12 months, has your agency seen any changes in the following types of cyber security threats? N=200
  • 12. Leveraging SolarWinds Security and Network Management Tools
  • 13. Best Practices for Combating Insider Threats © 2018 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED. •Know and protect your critical assets •Develop a formalized insider threat program •Deploy solutions for monitoring employees actions and correlating information from multiple data sources •Clearly document and consistently enforce policies and controls •Incorporate malicious and unintentional insider threat awareness into periodic security training for all employees Source: CERT Insider Threat Center https://insights.sei.cmu.edu/sei_blog/2017/11/5-best-practices-to-prevent-insider-threat.html
  • 14. Security and Network Management Tools Can Help Security and network management tools can help with compliance • Configuration management software centralizes change management and reporting • Log and event management (SIEM) software uses logs for security and compliance • Patch management software centralizes updates and reduces vulnerability • Device tracking, IP management, and switch port management for compliance enforcement • Network management software for continuous monitoring, audit documentation, and reporting Log and Event Management Patch Management Network Management Configuration Management IP Address Management User Device Tracking More information: http://www.solarwinds.com/federal-government/solution/cyber-security © 2018 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
  • 15. SolarWinds Compliance Features • Inventory network device configurations, assess configurations for compliance, and automate change and configuration management • Implement configuration of security controls and help assure effectiveness • Produce FISMA and DISA STIGs reports and take corrective actions • Produce audit documentation and reports to support DISA CCRI or OMB audits Network Configuration Manager • Configure correlation rules to help assure effectiveness of security controls • Real-time and continuous monitoring of security controls • Monitor for Active Directory® events and changes • Produce FISMA and DISA STIGs compliance reports from templates • Supports DISA STIGs requirements for configuration auditing, log analysis, and broader network security • Tracks and report suspicious activities/attacks to provide auditing support Log & Event Manager © 2018 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
  • 16. SolarWinds Compliance Features • Trend utilization for capacity planning • Track multicast or firewall port discards • Monitor network health and availability • Identify protocol latency delays • Produce audit documentation and reports Network Performance Monitor • Automate patching of Microsoft® and third-party applications to help improve compliance • Schedule patches for minimum downtime • Inventory software and physical components per server or workstation Patch Manager © 2018 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
  • 17. A Need for Monitoring Active Directory •Targeted attacks are more sophisticated •It is difficult to completely prevent attacks by just defending the border •Attackers remain within the systems of an organization and cleverly steal information over a long period of time •If detection is delayed, damages increase. It is critical to detect as soon as possible to stop the attack •Monitoring Active Directory is a critical layer of your defense, especially when it comes to detection of breach “Our daily life, economic vitality, and national security depend on a stable, safe, and resilient cyberspace.” Department of Homeland Security Cybersecurity Topics Page https://www.dhs.gov/topic/cybersecurity © 2018 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
  • 18. Monitoring for Active Directory Events and Changes •User events New user creation | user lock-out event | user-enabled event | user deleted •Authentication events User logons | failed logons (Windows® 10 Logon/Logoff Auditing can generate 27 different types of events) (For object access in Windows 10, auditing events can generate 41 events) •Group changes Adding to groups | removing from groups | creating new groups •Policy changes Group policy | audit policy •Password resets Verify admin changes | verify users comply with internal policies and procedures © 2018 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
  • 19. SolarWinds Log & Event Manager © 2018 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
  • 20. Log & Event Manager Powerful and affordable SIEM •Scalable and easy collection of network device, machine, and cloud logs •Real-time, in-memory event correlation •Define rules and configure alerts •Advanced IT search for event forensic analysis •Threat intelligence feed integration •Log data compression and retention •Single sign-on/smart card integration •Embedded, real-time file integrity monitoring • Built-in Active Responses •USB Defender® •Out-of-the-box security and compliance reporting templates •Easy to use and deploy •Links: Data - Demo - Resource © 2018 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
  • 22. When Fighting Against Insider Threats … © 2018 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED. •Meeting compliance standards does not mean you are secure •High-performing agencies with excellent IT controls experience: • Fewer cyberthreats • Faster response time to threats • Positive results from IT modernization initiatives • Continuous review of your IT controls improves your security posture • SolarWinds has tools to help
  • 23. • Download the full 2017 survey results online at: http://www.solarwinds.com/resources/survey/solarwinds-federal-cybersecurity-survey-summary-report-2017 • Download the full 2015 survey results online at: http://www.solarwinds.com/resources/survey/solarwinds-federal-cybersecurity-survey-summary-report-2015 • Review a blog on how SolarWinds software can help with NIST FISMA/RMF compliance: https://thwack.solarwinds.com/community/solarwinds-community/product-blog/blog/2015/08/01/fisma-nist-800-53- compliance-with-solarwinds-products • Review a blog on how SolarWinds software can help with DISA STIG compliance: https://thwack.solarwinds.com/community/solarwinds-community/product-blog/blog/2011/09/07/disa-stig- compliance-with-log-event-manager • Watch a federal security compliance video: http://www.solarwinds.com/resources/videos/solarwinds-federal-security-compliance.html • Download a SIEM white paper: http://www.solarwinds.com/resources/whitepaper/siem-speeds-time-to-resolution.html • Download a continuous monitoring white paper: http://go.solarwinds.com/fedcyberWP?=70150000000Plgf Compliance Resources © 2018 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
  • 24. © 2018 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED. Contact Federal Sales: 877.946.3751 federalsales@solarwinds.com
  • 25. Contact Us •Watch a short demo video: http://demo.solarwinds.com/sedemo/ •Download a free trial: http://www.solarwinds.com/downloads/ •Visit our Federal website: http://www.solarwinds.com/federal •Call the SolarWinds Federal sales team: 877.946.3751 •Email federal sales: federalsales@solarwinds.com •Email our Government Distributor DLT®: solarwinds@dlt.com •Follow us on LinkedIn®: https://www.linkedin.com/company/solarwinds-government • Let us know how we can help you © 2017 SOLARWINDS WORLDWIDE, LLC. ALL RIGHTS RESERVED.
  • 26. SolarWinds, SolarWinds & Design, Orion, and Thwack are the exclusive property of SolarWinds Worldwide, LLC or its affiliates, are registered with the U.S. Patent and Trademark Office, and may be registered or pending registration in other countries. All other SolarWinds trademarks, service marks, and logos may be common law marks or are registered or pending registration. All other trademarks mentioned herein are used for identification purposes only and are trademarks of (and may be registered trademarks) of their respective companies.

Editor's Notes

  1. Intro and Agenda (5) 2017 SolarWinds Federal Cybersecurity Survey Overview (13) Leveraging SolarWinds® Security and Network Management Tools (12) Log & Event Manager Overview (5) Demonstration (15) Q&A and closing (10)
  2. We have a link to the survey results at the end of the presentation, and we also have copies available at our booth.
  3. Explain that the yellow oval indicates a statistically significant difference and that this notation will be used throughout the results slides
  4. 9
  5. 10
  6. SPAM, malware and other threats are increasing as you see here. And human error is a factor here, making it one of the most common threats. The increased sophistication of threats, volume of attacks, and end-user policy violations make agencies more vulnerable than ever. As well discuss further after the survey results, continuously monitoring systems and networks, can help agencies safeguard against insider threats, and quickly identify and fix vulnerabilities.
  7. Configure correlation rules to help assure effectiveness of security controls LEM includes several out of the box correlation rules to provide assurance that your security controls are operating effectively. This can be achieved via log ingestion from a wide range of sources. LEM’s rules can validate that your firewalls are appropriately blocking traffic according to your ACL’s, validate that accounts are being locked out in accordance with your policy, files and folders are being accessed appropriately (and many more).   Real-time and continuous monitoring of security controls LEM collects, normalizes and correlates logs in real-time to provide instantaneous and continuous monitoring of your log data. LEM’s powerful correlation engine can leverage hundreds of out of the box rules for suspicious activity. LEM also provides Active Response technology to automatically stop malicious insiders in their tracks and prevent potential breaches.   Monitor for Active Directory® events and changes LEM includes a wealth of predefined content for Active Directory monitoring, including charts, filters, rules and reports. LEM can capture logs from your AD servers to capture successful and failed logons to your domain, password changes, group changes (users being assigned permissions and add/removed from groups), account lockouts and disablement, Group Policy Changes and more. Active Directory audit proven reports enable you to quickly report on changes to your AD users, groups and environment.   Produce FISMA and DISA STIGs compliance reports from templates There are FISMA reports out of the box – can leverage Nicole’s blog post on Thwack on FISMA for content. DISA STIGs may be a better fit for NCM.   Supports DISA STIGs requirements for configuration auditing, log analysis, and broader network security LEM can validate that configuration changes have been implemented in order to comply with DISA STIGs. LEM also performs real-time log analysis and provides visibility into what is happening on your network.     Tracks and report suspicious activities/attacks to provide auditing support LEM’s correlation engine can identify and respond to suspicious activity in real-time. A lot of tools can generate an alert if suspicious activity is identified, however LEM takes this a step further with its Active Response capabilities. You can log off a user, shut down machines, block USB devices and firewall ports, prevent an application launching and many more actions.