SlideShare a Scribd company logo
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Unlocking High Fidelity Security 2019
David Monahan
Managing Research Director, Security and Risk Management
Enterprise Management Associates
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING2 © 2019 Enterprise Management Associates
Watch the On-Demand Webinar
• Watch the Unlocking High Fidelity Security On-
Demand webinar is available here:
http://info.enterprisemanagement.com/achieving-high-
fidelity-security-webinar-ws
• Check out upcoming webinars from EMA here:
http://www.enterprisemanagement.com/freeResearch
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING3 © 2019 Enterprise Management Associates, Inc.
Today’s Speaker
David Monahan, Managing Research Director, Security
and Risk Management, EMA
David is a senior information security executive with years of
experience. He has organized and managed both physical
and information security programs, including security and
network operations (SOCs and NOCs) for organizations
ranging from Fortune 100 companies to local government and
small public and private companies. He has diverse audit,
compliance, risk, and privacy experience, such as providing
strategic and tactical leadership to develop, architect, and
deploy assurance controls, delivering process and policy
documentation and training, and working on educational and
technical solutions.
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING4 © 2019 Enterprise Management Associates, Inc.
Logistics
An archived version of the event
recording will be available at
www.enterprisemanagement.com
• Log questions in the chat panel
located on the lower left-hand corner
of your screen
• Questions will be addressed during
the Q&A session of the event
QUESTIONS
EVENT RECORDING
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING5 © 2019 Enterprise Management Associates, Inc.
Sponsors
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING6 © 2019 Enterprise Management Associates, Inc.
Demographics
• Focused on North America
• 42% Director and above
• Org Sizes:
• 25% SMB, 47% Midsized, 28% Enterprise
• Top 5 industries:
• MSSP
• Healthcare/Medical/Pharma
• Manufacturing
• Tech
• Retail/Wholesale Consumer goods
• Average budget increases:
• Security falls between 8%-10%
• IT falls between 10% and 15%
• ~10% of organizations have increases of 25% or more!
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Disconnect in Security Perceptions
Slide 7 © 2019 Enterprise Management Associates, Inc.
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING8 © 2019 Enterprise Management Associates, Inc.
Security Program Maturity
13%
56%
26%
5%
1%
Superior
Very Good
Good
Fair
Poor
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING9 © 2019 Enterprise Management Associates, Inc.
Security Access to Data For Investigations
47%
44%
8%
1%
33%
35%
20%
14%
33%
31%
24%
11%
They have direct access to all of the data or systems
They have direct access to most of the data or systems
They have direct access to some of the data or systems
They do not have direct access unless they request it
Sr. Mgmt Mid Mgmt Front line Ops
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING10 © 2019 Enterprise Management Associates, Inc.
Comfortability with Current Organizational
Cyber-Risk
22%
39%
28%
8%
4%
Wholly comfortable
Generally comfortable,
but with some reservations
Moderately comfortable
Moderately uncomfortable
Very uncomfortable
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING11 © 2019 Enterprise Management Associates, Inc.
Respondents Wholly Comfortable with Current
Organizational Cyber-Risk By Role
30%
11%
16%
Sr. Mgmt
Middle Mgmt.
Front line Ops
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING12 © 2019 Enterprise Management Associates, Inc.
Perspective on Current Controls Effectiveness
33%
24%
20%
Sr Mgmt
Mdl Mgmt
Ops
Outstanding Prevention
37%
30%
20%
Sr Mgmt
Mdl Mgmt
Ops
Outstanding Detection
30%
24%
27%
Sr Mgmt
Mdl Mgmtbreach (C)
Ops
Outstanding-Quantifying
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Security Controls
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING14 © 2019 Enterprise Management Associates, Inc.
Top Three Least Effective Cyber-security
Controls
36%
34%
31%
26%
Data loss prevention/detection
Vulnerability management
Breach investigation and incident response
Confident in all areas listed
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING15 © 2019 Enterprise Management Associates, Inc.
Most Significant Impact on Security Posture
44%
45%
11%
26%
63%
11%
38%
42%
20%
More efficient internal processes and IT hygiene
Additional security technologies/product/solutions
Employee awareness
Sr. Mgmt. Mid Mgmt. Front line Ops
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Security Services Adoption
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING17 © 2019 Enterprise Management Associates, Inc.
2018 Security Service Spending
6%
10%
19%
51%
7%
7%
Yes. We spend between 75% and 89% of our
security budget with MSSPs.
Yes. We spend between 50% and 74% of our
security budget with MSSPs.
Yes. We spend between 25% and 49% of our
security budget with MSSPs.
Yes. We spend between 10% and 24% of our
security budget with MSSPs.
None, but we are investigating engaging a provider.
None, and we have no interest in investigating.
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Perspective on Tools and Skills for
Effective Secops
18 © 2019 Enterprise Management Associates, Inc.
47%
23%
22%
6%
2%
Yes
No, but I believe we are 90% or better on the way
No, but I believe we are 75% to 89% on the way
No, but I believe we are 50% to 74% on the way
No, and we need to make significant progress
Tools
50%
23%
19%
8%
1%
Yes
No, but I believe we are 90% or better on the way
No, but I believe we are 75% to 89% on the way
No, but I believe we are 50% to 74% on the way
No, and we need to make significant progress
Skills
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Security Services Consumption
19 © 2019 Enterprise Management Associates, Inc.
52%
49%
47%
24x7 security incident monitoring
Managed firewall
Risk assessment
Top 3 Services Used
61%
50%
39%
24x7 security incident monitoring
Managed detection and response
Risk assessment
Top 3 Service Under Consideration
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Top 5 Drivers for Security Services
Adoption
20 © 2019 Enterprise Management Associates, Inc.
38%
37%
36%
35%
34%
Believe that the MSSP can do it better regardless of in-
house cost
Better value/ROI than performing the tasks in-house
Believe that the MSSP can do it better regardless of skills
in-house
Cost to hire currently available personnel compared to cost
of MSSP
Want to focus on the core business
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Identifying and Stopping Breaches
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING22 © 2019 Enterprise Management Associates, Inc.
The Stage Attacks are Identified and Stopped
15%
13%
15%
17%
11%
9%
11%
9%
16%
15%
12%
16%
11%
9%
10%
11%
Inside perimeter reconnaissance
Initial infiltration/landing/delivery
Host/user exploitation
When malware/tools are installed
Command and control
Lateral movement
Data exfiltration
Post event(s)
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING23 © 2019 Enterprise Management Associates, Inc.
Tope 3 Data Sources for Early Detection of an
Attack of Breach
49%
42%
41%
Vulnerability assessment data
Dark web monitoring
Perimeter protection tools (DDoS, firewall, IPS,
web proxy, etc.)
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING24 © 2019 Enterprise Management Associates, Inc.
Importance of Having a Single Security
Console
46%
39%
13%
2%
0%
Very important
Important
Somewhat important
Somewhat unimportant
Not important at all
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING25 © 2019 Enterprise Management Associates, Inc.
Defense Control Testing
29%
38%
38%
36%
39%
40%
42%
69%
57%
59%
60%
56%
56%
54%
Evaluate policies
Test IR procedures
Evaluate incident monitoring and alerting systems
configurations/parameters
Evaluate operational procedures
Conduct testing on our perimeter defensive configurations
Conduct testing on our internal defensive technology
configurations
Perform penetration testing on critical systems
More often than semi-annually Annually to semi-annually
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING26 © 2019 Enterprise Management Associates, Inc.
Improving Controls Testing Would Improve
Security
72%
72%
70%
Evaluate incident monitoring and alerting systems
configurations/parameters
Conduct testing on our perimeter defensive
configurations
Conduct testing on our internal defensive technology
configurations
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Tools and Data Integrations
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING28 © 2019 Enterprise Management Associates, Inc.
Data Integration Methods- Very Important to
Indispensable Tool Selection Criteria
61%
59%
60%
59%
59%
Cloud or On-premises third-party data analysis tools
On-premises or Cloud-based third-party data collection tools
Third-party data integration tools
Vendor-created open APIs
Vendor partnership-driven integrations
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING29 © 2019 Enterprise Management Associates, Inc.
Top 3 Challenges Inhibiting Security Data
Integration
49%
46%
41%
Lack of vendor-enabled integrations
Lack of analysis capabilities in the solution
Lack of vendor-supplied open APIs creating an in
ability to inject/import information
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Automation
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING31 © 2019 Enterprise Management Associates, Inc.
Trust/Preference in Fully Automatic Actions vs.
Manually-Gated Automated Actions
60%
40%
More automated
More automatic
Definitions:
Automated—The detection system performs incident detection, data gathering,
and data analysis, then presents findings and recommendations for resolution to a
person who authorizes the system to execute a resolution process.
Automatic—The detection system performs incident detection, data gathering,
and data analysis, and at least an initial attempt at resolution, before presenting
the outcome to a person who closes the case. Case closure may be performed by
the system if successful outcome can be verified.
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING32 © 2019 Enterprise Management Associates, Inc.
Influencers on Purchase of Security Tools for
Automation (5-point scale)
3.7
3.2
2.9
2.8
2.4
Accuracy
Integration
Scalability
Ease of use
Price
Security
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING33 © 2019 Enterprise Management Associates, Inc.
Percentage of Process Automation in Secops
29%
40%
31%
Manual
Automated
Fully Automatic
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING34 © 2019 Enterprise Management Associates, Inc.
Importance of Automation for Achieving
SecOps Goals
33%
48%
16%
2%
Extremely important
Very important
Moderately important
Somewhat important
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING35 © 2019 Enterprise Management Associates, Inc.
Importance of Breach Simulation Automation
For Achieving SecOps Goals
46%
38%
14%
2%
Extremely important
Very important
Moderately important
Somewhat important
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING36 © 2019 Enterprise Management Associates, Inc.
Importance of Automation in Achieving Breach
Detection and Incident Response
47%
40%
12%
1%
47%
39%
12%
2%
Very important
Important
Somewhat important
Somewhat unimportant
Breach Detection IR
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Network Security
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING38 © 2019 Enterprise Management Associates, Inc.
Greatest Value Data for Early Breach Detection
60%
40%
Network data
Endpoint data
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING39 © 2019 Enterprise Management Associates, Inc.
Data Stored for Incident Investigations
67%
51%
50%
3%
Flow data
Packet
information
Metadata
I don't know
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING40 © 2019 Enterprise Management Associates, Inc.
Data Stored for Incident Investigations
67%
51%
50%
3%
Flow data
Packet
information
Metadata
I don't know
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING41 © 2019 Enterprise Management Associates, Inc.
Value of Network Metadata for Investigations
14%
65%
20%
1%
Extremely valuable
Very valuable
Moderately
valuable
Not very valuable
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Vulnerability & Penetration Testing, and
Remediation
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING43 © 2019 Enterprise Management Associates, Inc.
Impact on Critical Systems From Penetration
Testing
32%
52%
12%
3%
We have experienced an outage or serious
performance impact
We have not experienced an outage or serious
performance impact
We have not used penetration testing.
I don't know if we have used penetration testing.
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING44 © 2019 Enterprise Management Associates, Inc.
Lack of Effectiveness of Vuln Mgmt. Systems
43%
42%
Attack-Path
Business Risk
Good to Poor
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING45 © 2019 Enterprise Management Associates, Inc.
Security Budget Investments in Pre-breach
Readiness tools
8%
40%
19%
16%
10%
7%
We are not currently investing in this area
<10%
Between 11% and 15%
Between 16% and 20%
More than 20%
I don't know
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING46 © 2019 Enterprise Management Associates, Inc.
Awareness of Commercially Available Attack
Path Identification Systems
29%
71%
Yes
No
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Other Trends
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING48 © 2019 Enterprise Management Associates, Inc.
Questions
Get the report at
http://bit.ly/2ngu7ZR

More Related Content

What's hot

How Automation and Orchestration Can Help Bridge the IT Security Skills Gap
How Automation and Orchestration Can Help Bridge the IT Security Skills GapHow Automation and Orchestration Can Help Bridge the IT Security Skills Gap
How Automation and Orchestration Can Help Bridge the IT Security Skills Gap
Enterprise Management Associates
 
2018 U.S State of Cybercrime
2018 U.S State of Cybercrime2018 U.S State of Cybercrime
2018 U.S State of Cybercrime
IDG
 
Accelerating Enhanced Threat Identification and Incident Investigation
Accelerating Enhanced Threat Identification and Incident InvestigationAccelerating Enhanced Threat Identification and Incident Investigation
Accelerating Enhanced Threat Identification and Incident Investigation
Enterprise Management Associates
 
International Technology Adoption & Workforce Issues Study - Canadian Summary
International Technology Adoption & Workforce Issues Study - Canadian SummaryInternational Technology Adoption & Workforce Issues Study - Canadian Summary
International Technology Adoption & Workforce Issues Study - Canadian Summary
CompTIA
 
International Technology Adoption & Workforce Issues Study - UK Summary
International Technology Adoption & Workforce Issues Study - UK SummaryInternational Technology Adoption & Workforce Issues Study - UK Summary
International Technology Adoption & Workforce Issues Study - UK Summary
CompTIA
 
Managed Detection and Response: Selective Outsourcing for Understaffed SOCs a...
Managed Detection and Response: Selective Outsourcing for Understaffed SOCs a...Managed Detection and Response: Selective Outsourcing for Understaffed SOCs a...
Managed Detection and Response: Selective Outsourcing for Understaffed SOCs a...
Enterprise Management Associates
 
The State of IT Security for 2019
The State of IT Security for 2019The State of IT Security for 2019
The State of IT Security for 2019
Precisely
 
IT Alert Management Survey Results - February 2013
IT Alert Management Survey Results - February 2013IT Alert Management Survey Results - February 2013
IT Alert Management Survey Results - February 2013
SolarWinds
 
Taking the Pulse of IT Security for 2019: Results from Syncsort's Security Su...
Taking the Pulse of IT Security for 2019: Results from Syncsort's Security Su...Taking the Pulse of IT Security for 2019: Results from Syncsort's Security Su...
Taking the Pulse of IT Security for 2019: Results from Syncsort's Security Su...
Precisely
 
Iso 27001 2005- by netpeckers consulting
Iso 27001 2005- by netpeckers consultingIso 27001 2005- by netpeckers consulting
Iso 27001 2005- by netpeckers consulting
Iskcon Ahmedabad
 
Va\\lue of e-safebusiness solutions
Va\\lue of e-safebusiness solutionsVa\\lue of e-safebusiness solutions
Va\\lue of e-safebusiness solutions
iansadler
 
Event 16 12-15 global information security workforce study 1.0
Event 16 12-15 global information security workforce study 1.0Event 16 12-15 global information security workforce study 1.0
Event 16 12-15 global information security workforce study 1.0
isc2-hellenic
 
2021 IDG Security Priorities Study
2021 IDG Security Priorities Study2021 IDG Security Priorities Study
2021 IDG Security Priorities Study
IDG
 
Telindus cybersecurity survey_report
Telindus cybersecurity survey_reportTelindus cybersecurity survey_report
Telindus cybersecurity survey_report
ValentinGarcia32
 
2018 State of Cyber Resilience Insurance
2018 State of Cyber Resilience Insurance2018 State of Cyber Resilience Insurance
2018 State of Cyber Resilience Insurance
Accenture Insurance
 
International Technology Adoption & Workforce Issues Study - Thailand Summary
International Technology Adoption & Workforce Issues Study - Thailand SummaryInternational Technology Adoption & Workforce Issues Study - Thailand Summary
International Technology Adoption & Workforce Issues Study - Thailand Summary
CompTIA
 
A Definitive Market Guide to Deception Technology
A Definitive Market Guide to Deception TechnologyA Definitive Market Guide to Deception Technology
A Definitive Market Guide to Deception Technology
Enterprise Management Associates
 
Harvey Nash UK & IRE Cyber Security Survey 2016
Harvey Nash UK & IRE Cyber Security Survey 2016Harvey Nash UK & IRE Cyber Security Survey 2016
Harvey Nash UK & IRE Cyber Security Survey 2016
Bryan Smith
 
SVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - OverviewSVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - Overview
Silicon Valley Bank
 
SVB Cybersecurity Impact on Innovation Report
SVB Cybersecurity Impact on Innovation ReportSVB Cybersecurity Impact on Innovation Report
SVB Cybersecurity Impact on Innovation Report
Silicon Valley Bank
 

What's hot (20)

How Automation and Orchestration Can Help Bridge the IT Security Skills Gap
How Automation and Orchestration Can Help Bridge the IT Security Skills GapHow Automation and Orchestration Can Help Bridge the IT Security Skills Gap
How Automation and Orchestration Can Help Bridge the IT Security Skills Gap
 
2018 U.S State of Cybercrime
2018 U.S State of Cybercrime2018 U.S State of Cybercrime
2018 U.S State of Cybercrime
 
Accelerating Enhanced Threat Identification and Incident Investigation
Accelerating Enhanced Threat Identification and Incident InvestigationAccelerating Enhanced Threat Identification and Incident Investigation
Accelerating Enhanced Threat Identification and Incident Investigation
 
International Technology Adoption & Workforce Issues Study - Canadian Summary
International Technology Adoption & Workforce Issues Study - Canadian SummaryInternational Technology Adoption & Workforce Issues Study - Canadian Summary
International Technology Adoption & Workforce Issues Study - Canadian Summary
 
International Technology Adoption & Workforce Issues Study - UK Summary
International Technology Adoption & Workforce Issues Study - UK SummaryInternational Technology Adoption & Workforce Issues Study - UK Summary
International Technology Adoption & Workforce Issues Study - UK Summary
 
Managed Detection and Response: Selective Outsourcing for Understaffed SOCs a...
Managed Detection and Response: Selective Outsourcing for Understaffed SOCs a...Managed Detection and Response: Selective Outsourcing for Understaffed SOCs a...
Managed Detection and Response: Selective Outsourcing for Understaffed SOCs a...
 
The State of IT Security for 2019
The State of IT Security for 2019The State of IT Security for 2019
The State of IT Security for 2019
 
IT Alert Management Survey Results - February 2013
IT Alert Management Survey Results - February 2013IT Alert Management Survey Results - February 2013
IT Alert Management Survey Results - February 2013
 
Taking the Pulse of IT Security for 2019: Results from Syncsort's Security Su...
Taking the Pulse of IT Security for 2019: Results from Syncsort's Security Su...Taking the Pulse of IT Security for 2019: Results from Syncsort's Security Su...
Taking the Pulse of IT Security for 2019: Results from Syncsort's Security Su...
 
Iso 27001 2005- by netpeckers consulting
Iso 27001 2005- by netpeckers consultingIso 27001 2005- by netpeckers consulting
Iso 27001 2005- by netpeckers consulting
 
Va\\lue of e-safebusiness solutions
Va\\lue of e-safebusiness solutionsVa\\lue of e-safebusiness solutions
Va\\lue of e-safebusiness solutions
 
Event 16 12-15 global information security workforce study 1.0
Event 16 12-15 global information security workforce study 1.0Event 16 12-15 global information security workforce study 1.0
Event 16 12-15 global information security workforce study 1.0
 
2021 IDG Security Priorities Study
2021 IDG Security Priorities Study2021 IDG Security Priorities Study
2021 IDG Security Priorities Study
 
Telindus cybersecurity survey_report
Telindus cybersecurity survey_reportTelindus cybersecurity survey_report
Telindus cybersecurity survey_report
 
2018 State of Cyber Resilience Insurance
2018 State of Cyber Resilience Insurance2018 State of Cyber Resilience Insurance
2018 State of Cyber Resilience Insurance
 
International Technology Adoption & Workforce Issues Study - Thailand Summary
International Technology Adoption & Workforce Issues Study - Thailand SummaryInternational Technology Adoption & Workforce Issues Study - Thailand Summary
International Technology Adoption & Workforce Issues Study - Thailand Summary
 
A Definitive Market Guide to Deception Technology
A Definitive Market Guide to Deception TechnologyA Definitive Market Guide to Deception Technology
A Definitive Market Guide to Deception Technology
 
Harvey Nash UK & IRE Cyber Security Survey 2016
Harvey Nash UK & IRE Cyber Security Survey 2016Harvey Nash UK & IRE Cyber Security Survey 2016
Harvey Nash UK & IRE Cyber Security Survey 2016
 
SVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - OverviewSVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - Overview
 
SVB Cybersecurity Impact on Innovation Report
SVB Cybersecurity Impact on Innovation ReportSVB Cybersecurity Impact on Innovation Report
SVB Cybersecurity Impact on Innovation Report
 

Similar to Unlocking High Fidelity Security

Transform Your Security Operations with Security Automation and Orchestration
Transform Your Security Operations with Security Automation and OrchestrationTransform Your Security Operations with Security Automation and Orchestration
Transform Your Security Operations with Security Automation and Orchestration
Enterprise Management Associates
 
The Great Scheduler Migration
The Great Scheduler MigrationThe Great Scheduler Migration
The Great Scheduler Migration
Enterprise Management Associates
 
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
Enterprise Management Associates
 
Achieving Hi-Fidelity Security by Combining Packet and Endpoint Data
Achieving Hi-Fidelity Security by Combining Packet and Endpoint DataAchieving Hi-Fidelity Security by Combining Packet and Endpoint Data
Achieving Hi-Fidelity Security by Combining Packet and Endpoint Data
Enterprise Management Associates
 
Enterprise Service Management (ESM): How to Build High-Value Services on Exis...
Enterprise Service Management (ESM): How to Build High-Value Services on Exis...Enterprise Service Management (ESM): How to Build High-Value Services on Exis...
Enterprise Service Management (ESM): How to Build High-Value Services on Exis...
Enterprise Management Associates
 
Network Performance Management Strategies for the Digital Enterprise
Network Performance Management Strategies for the Digital EnterpriseNetwork Performance Management Strategies for the Digital Enterprise
Network Performance Management Strategies for the Digital Enterprise
Enterprise Management Associates
 
Preparing for the Future of Enterprise Mobility -- Insights Not to Miss
Preparing for the Future of Enterprise Mobility -- Insights Not to MissPreparing for the Future of Enterprise Mobility -- Insights Not to Miss
Preparing for the Future of Enterprise Mobility -- Insights Not to Miss
Enterprise Mobile
 
Automation, AI, and Analytics: Reinventing ITSM
Automation, AI, and Analytics: Reinventing ITSMAutomation, AI, and Analytics: Reinventing ITSM
Automation, AI, and Analytics: Reinventing ITSM
Enterprise Management Associates
 
AFCEA Cybersecurity through Continuous Monitoring: SolarWinds Survey Results ...
AFCEA Cybersecurity through Continuous Monitoring: SolarWinds Survey Results ...AFCEA Cybersecurity through Continuous Monitoring: SolarWinds Survey Results ...
AFCEA Cybersecurity through Continuous Monitoring: SolarWinds Survey Results ...
SolarWinds
 
Tomorrow-Ready ITSM Today: 3 Key Strategies
Tomorrow-Ready ITSM Today: 3 Key StrategiesTomorrow-Ready ITSM Today: 3 Key Strategies
Tomorrow-Ready ITSM Today: 3 Key Strategies
Enterprise Management Associates
 
Data-Driven IT Automation: A Vision for the Modern CIO
Data-Driven IT Automation: A Vision for the Modern CIOData-Driven IT Automation: A Vision for the Modern CIO
Data-Driven IT Automation: A Vision for the Modern CIO
Enterprise Management Associates
 
Achieve IT Operations Success with a Unified Approach to Network Monitoring
Achieve IT Operations Success with a Unified Approach to Network MonitoringAchieve IT Operations Success with a Unified Approach to Network Monitoring
Achieve IT Operations Success with a Unified Approach to Network Monitoring
Enterprise Management Associates
 
Democratizing IT Automation in a Multi-Cloud World
Democratizing IT Automation in a Multi-Cloud WorldDemocratizing IT Automation in a Multi-Cloud World
Democratizing IT Automation in a Multi-Cloud World
Enterprise Management Associates
 
TLS 1.3 Adoption in the Enterprise: Growing Encryption Use Extends to New St...
TLS 1.3 Adoption in the Enterprise:  Growing Encryption Use Extends to New St...TLS 1.3 Adoption in the Enterprise:  Growing Encryption Use Extends to New St...
TLS 1.3 Adoption in the Enterprise: Growing Encryption Use Extends to New St...
Enterprise Management Associates
 
How to Reduce the Attack Surface Created by Your Cyber-Tools
How to Reduce the Attack Surface Created by Your Cyber-ToolsHow to Reduce the Attack Surface Created by Your Cyber-Tools
How to Reduce the Attack Surface Created by Your Cyber-Tools
Enterprise Management Associates
 
Achieving Effective Identity and Access Governance
Achieving Effective Identity and Access GovernanceAchieving Effective Identity and Access Governance
Achieving Effective Identity and Access Governance
Enterprise Management Associates
 
IT Service Modeling in the Age of Cloud and Containers
IT Service Modeling in the Age of Cloud and ContainersIT Service Modeling in the Age of Cloud and Containers
IT Service Modeling in the Age of Cloud and Containers
Enterprise Management Associates
 
Cloud Migration Checklist: A Better Way to Set Priorities, Assess Your Progre...
Cloud Migration Checklist: A Better Way to Set Priorities, Assess Your Progre...Cloud Migration Checklist: A Better Way to Set Priorities, Assess Your Progre...
Cloud Migration Checklist: A Better Way to Set Priorities, Assess Your Progre...
Enterprise Management Associates
 
ARC's Bob Mick's Cyber Security Standards Presentation at ARC's 2008 Industry...
ARC's Bob Mick's Cyber Security Standards Presentation at ARC's 2008 Industry...ARC's Bob Mick's Cyber Security Standards Presentation at ARC's 2008 Industry...
ARC's Bob Mick's Cyber Security Standards Presentation at ARC's 2008 Industry...
ARC Advisory Group
 
Advancing Identity and Access Management to the Next Level with Contextual Aw...
Advancing Identity and Access Management to the Next Level with Contextual Aw...Advancing Identity and Access Management to the Next Level with Contextual Aw...
Advancing Identity and Access Management to the Next Level with Contextual Aw...
Enterprise Management Associates
 

Similar to Unlocking High Fidelity Security (20)

Transform Your Security Operations with Security Automation and Orchestration
Transform Your Security Operations with Security Automation and OrchestrationTransform Your Security Operations with Security Automation and Orchestration
Transform Your Security Operations with Security Automation and Orchestration
 
The Great Scheduler Migration
The Great Scheduler MigrationThe Great Scheduler Migration
The Great Scheduler Migration
 
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
 
Achieving Hi-Fidelity Security by Combining Packet and Endpoint Data
Achieving Hi-Fidelity Security by Combining Packet and Endpoint DataAchieving Hi-Fidelity Security by Combining Packet and Endpoint Data
Achieving Hi-Fidelity Security by Combining Packet and Endpoint Data
 
Enterprise Service Management (ESM): How to Build High-Value Services on Exis...
Enterprise Service Management (ESM): How to Build High-Value Services on Exis...Enterprise Service Management (ESM): How to Build High-Value Services on Exis...
Enterprise Service Management (ESM): How to Build High-Value Services on Exis...
 
Network Performance Management Strategies for the Digital Enterprise
Network Performance Management Strategies for the Digital EnterpriseNetwork Performance Management Strategies for the Digital Enterprise
Network Performance Management Strategies for the Digital Enterprise
 
Preparing for the Future of Enterprise Mobility -- Insights Not to Miss
Preparing for the Future of Enterprise Mobility -- Insights Not to MissPreparing for the Future of Enterprise Mobility -- Insights Not to Miss
Preparing for the Future of Enterprise Mobility -- Insights Not to Miss
 
Automation, AI, and Analytics: Reinventing ITSM
Automation, AI, and Analytics: Reinventing ITSMAutomation, AI, and Analytics: Reinventing ITSM
Automation, AI, and Analytics: Reinventing ITSM
 
AFCEA Cybersecurity through Continuous Monitoring: SolarWinds Survey Results ...
AFCEA Cybersecurity through Continuous Monitoring: SolarWinds Survey Results ...AFCEA Cybersecurity through Continuous Monitoring: SolarWinds Survey Results ...
AFCEA Cybersecurity through Continuous Monitoring: SolarWinds Survey Results ...
 
Tomorrow-Ready ITSM Today: 3 Key Strategies
Tomorrow-Ready ITSM Today: 3 Key StrategiesTomorrow-Ready ITSM Today: 3 Key Strategies
Tomorrow-Ready ITSM Today: 3 Key Strategies
 
Data-Driven IT Automation: A Vision for the Modern CIO
Data-Driven IT Automation: A Vision for the Modern CIOData-Driven IT Automation: A Vision for the Modern CIO
Data-Driven IT Automation: A Vision for the Modern CIO
 
Achieve IT Operations Success with a Unified Approach to Network Monitoring
Achieve IT Operations Success with a Unified Approach to Network MonitoringAchieve IT Operations Success with a Unified Approach to Network Monitoring
Achieve IT Operations Success with a Unified Approach to Network Monitoring
 
Democratizing IT Automation in a Multi-Cloud World
Democratizing IT Automation in a Multi-Cloud WorldDemocratizing IT Automation in a Multi-Cloud World
Democratizing IT Automation in a Multi-Cloud World
 
TLS 1.3 Adoption in the Enterprise: Growing Encryption Use Extends to New St...
TLS 1.3 Adoption in the Enterprise:  Growing Encryption Use Extends to New St...TLS 1.3 Adoption in the Enterprise:  Growing Encryption Use Extends to New St...
TLS 1.3 Adoption in the Enterprise: Growing Encryption Use Extends to New St...
 
How to Reduce the Attack Surface Created by Your Cyber-Tools
How to Reduce the Attack Surface Created by Your Cyber-ToolsHow to Reduce the Attack Surface Created by Your Cyber-Tools
How to Reduce the Attack Surface Created by Your Cyber-Tools
 
Achieving Effective Identity and Access Governance
Achieving Effective Identity and Access GovernanceAchieving Effective Identity and Access Governance
Achieving Effective Identity and Access Governance
 
IT Service Modeling in the Age of Cloud and Containers
IT Service Modeling in the Age of Cloud and ContainersIT Service Modeling in the Age of Cloud and Containers
IT Service Modeling in the Age of Cloud and Containers
 
Cloud Migration Checklist: A Better Way to Set Priorities, Assess Your Progre...
Cloud Migration Checklist: A Better Way to Set Priorities, Assess Your Progre...Cloud Migration Checklist: A Better Way to Set Priorities, Assess Your Progre...
Cloud Migration Checklist: A Better Way to Set Priorities, Assess Your Progre...
 
ARC's Bob Mick's Cyber Security Standards Presentation at ARC's 2008 Industry...
ARC's Bob Mick's Cyber Security Standards Presentation at ARC's 2008 Industry...ARC's Bob Mick's Cyber Security Standards Presentation at ARC's 2008 Industry...
ARC's Bob Mick's Cyber Security Standards Presentation at ARC's 2008 Industry...
 
Advancing Identity and Access Management to the Next Level with Contextual Aw...
Advancing Identity and Access Management to the Next Level with Contextual Aw...Advancing Identity and Access Management to the Next Level with Contextual Aw...
Advancing Identity and Access Management to the Next Level with Contextual Aw...
 

More from Enterprise Management Associates

Expert Insights: Rethinking Your Network Operations Toolset as Cisco Prime En...
Expert Insights: Rethinking Your Network Operations Toolset as Cisco Prime En...Expert Insights: Rethinking Your Network Operations Toolset as Cisco Prime En...
Expert Insights: Rethinking Your Network Operations Toolset as Cisco Prime En...
Enterprise Management Associates
 
Highlights from the EMA Radar™ Report for Workload Automation and Orchestrati...
Highlights from the EMA Radar™ Report for Workload Automation and Orchestrati...Highlights from the EMA Radar™ Report for Workload Automation and Orchestrati...
Highlights from the EMA Radar™ Report for Workload Automation and Orchestrati...
Enterprise Management Associates
 
Real-world incident response, management, and prevention
Real-world incident response, management, and preventionReal-world incident response, management, and prevention
Real-world incident response, management, and prevention
Enterprise Management Associates
 
Observability: Challenges, Priorities, Solutions, and the Role of OpenTelemetry
Observability: Challenges, Priorities, Solutions, and the Role of OpenTelemetryObservability: Challenges, Priorities, Solutions, and the Role of OpenTelemetry
Observability: Challenges, Priorities, Solutions, and the Role of OpenTelemetry
Enterprise Management Associates
 
NetSecOps: Examining How Network and Security Teams Collaborate for a Better ...
NetSecOps: Examining How Network and Security Teams Collaborate for a Better ...NetSecOps: Examining How Network and Security Teams Collaborate for a Better ...
NetSecOps: Examining How Network and Security Teams Collaborate for a Better ...
Enterprise Management Associates
 
Modern ITSM—the untapped game-changer for midsize organizations
Modern ITSM—the untapped game-changer for midsize organizationsModern ITSM—the untapped game-changer for midsize organizations
Modern ITSM—the untapped game-changer for midsize organizations
Enterprise Management Associates
 
Unveiling Strategic Trends in Global Finance, Banking, and Insurance - IT Ex...
Unveiling Strategic Trends in Global Finance, Banking, and Insurance -  IT Ex...Unveiling Strategic Trends in Global Finance, Banking, and Insurance -  IT Ex...
Unveiling Strategic Trends in Global Finance, Banking, and Insurance - IT Ex...
Enterprise Management Associates
 
Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...
Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...
Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...
Enterprise Management Associates
 
Transcending Passwords: Emerging Trends in Authentication
Transcending Passwords: Emerging Trends in AuthenticationTranscending Passwords: Emerging Trends in Authentication
Transcending Passwords: Emerging Trends in Authentication
Enterprise Management Associates
 
Modernize NetOps with Business-Aware Network Monitoring
Modernize NetOps with Business-Aware Network MonitoringModernize NetOps with Business-Aware Network Monitoring
Modernize NetOps with Business-Aware Network Monitoring
Enterprise Management Associates
 
Navigating the Complexity of Distributed Microservices across AWS, Azure, and...
Navigating the Complexity of Distributed Microservices across AWS, Azure, and...Navigating the Complexity of Distributed Microservices across AWS, Azure, and...
Navigating the Complexity of Distributed Microservices across AWS, Azure, and...
Enterprise Management Associates
 
Navigating Today’s Threat Landscape: Discussing Hype vs. Reality
Navigating Today’s Threat Landscape: Discussing Hype vs. RealityNavigating Today’s Threat Landscape: Discussing Hype vs. Reality
Navigating Today’s Threat Landscape: Discussing Hype vs. Reality
Enterprise Management Associates
 
Kubernetes Unveiled: Trends, Challenges, and Opportunities
Kubernetes Unveiled: Trends, Challenges, and OpportunitiesKubernetes Unveiled: Trends, Challenges, and Opportunities
Kubernetes Unveiled: Trends, Challenges, and Opportunities
Enterprise Management Associates
 
DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-...
DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-...DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-...
DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-...
Enterprise Management Associates
 
Challenges and Best Practices for Securing Modern Operational Technology Netw...
Challenges and Best Practices for Securing Modern Operational Technology Netw...Challenges and Best Practices for Securing Modern Operational Technology Netw...
Challenges and Best Practices for Securing Modern Operational Technology Netw...
Enterprise Management Associates
 
CMDB in Cloud Times: Myths, Mistakes, and Mastery
CMDB in Cloud Times: Myths, Mistakes, and Mastery CMDB in Cloud Times: Myths, Mistakes, and Mastery
CMDB in Cloud Times: Myths, Mistakes, and Mastery
Enterprise Management Associates
 
Modernizing Network Engineering and Operations in the Era of Hybrid and Remot...
Modernizing Network Engineering and Operations in the Era of Hybrid and Remot...Modernizing Network Engineering and Operations in the Era of Hybrid and Remot...
Modernizing Network Engineering and Operations in the Era of Hybrid and Remot...
Enterprise Management Associates
 
Why Should Organizations Consider Extended Detection and Response (XDR)?
Why Should Organizations Consider Extended Detection and Response (XDR)?Why Should Organizations Consider Extended Detection and Response (XDR)?
Why Should Organizations Consider Extended Detection and Response (XDR)?
Enterprise Management Associates
 
Five Managed SD-WAN Trends to Watch in 2023
Five Managed SD-WAN Trends to Watch in 2023Five Managed SD-WAN Trends to Watch in 2023
Five Managed SD-WAN Trends to Watch in 2023
Enterprise Management Associates
 
Moving Beyond Remote Access: Discover the Power of Zero Trust Network Access
Moving Beyond Remote Access: Discover the Power of Zero Trust Network AccessMoving Beyond Remote Access: Discover the Power of Zero Trust Network Access
Moving Beyond Remote Access: Discover the Power of Zero Trust Network Access
Enterprise Management Associates
 

More from Enterprise Management Associates (20)

Expert Insights: Rethinking Your Network Operations Toolset as Cisco Prime En...
Expert Insights: Rethinking Your Network Operations Toolset as Cisco Prime En...Expert Insights: Rethinking Your Network Operations Toolset as Cisco Prime En...
Expert Insights: Rethinking Your Network Operations Toolset as Cisco Prime En...
 
Highlights from the EMA Radar™ Report for Workload Automation and Orchestrati...
Highlights from the EMA Radar™ Report for Workload Automation and Orchestrati...Highlights from the EMA Radar™ Report for Workload Automation and Orchestrati...
Highlights from the EMA Radar™ Report for Workload Automation and Orchestrati...
 
Real-world incident response, management, and prevention
Real-world incident response, management, and preventionReal-world incident response, management, and prevention
Real-world incident response, management, and prevention
 
Observability: Challenges, Priorities, Solutions, and the Role of OpenTelemetry
Observability: Challenges, Priorities, Solutions, and the Role of OpenTelemetryObservability: Challenges, Priorities, Solutions, and the Role of OpenTelemetry
Observability: Challenges, Priorities, Solutions, and the Role of OpenTelemetry
 
NetSecOps: Examining How Network and Security Teams Collaborate for a Better ...
NetSecOps: Examining How Network and Security Teams Collaborate for a Better ...NetSecOps: Examining How Network and Security Teams Collaborate for a Better ...
NetSecOps: Examining How Network and Security Teams Collaborate for a Better ...
 
Modern ITSM—the untapped game-changer for midsize organizations
Modern ITSM—the untapped game-changer for midsize organizationsModern ITSM—the untapped game-changer for midsize organizations
Modern ITSM—the untapped game-changer for midsize organizations
 
Unveiling Strategic Trends in Global Finance, Banking, and Insurance - IT Ex...
Unveiling Strategic Trends in Global Finance, Banking, and Insurance -  IT Ex...Unveiling Strategic Trends in Global Finance, Banking, and Insurance -  IT Ex...
Unveiling Strategic Trends in Global Finance, Banking, and Insurance - IT Ex...
 
Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...
Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...
Unlocking Master Data Management (MDM) Success: Real-World Insights and Strat...
 
Transcending Passwords: Emerging Trends in Authentication
Transcending Passwords: Emerging Trends in AuthenticationTranscending Passwords: Emerging Trends in Authentication
Transcending Passwords: Emerging Trends in Authentication
 
Modernize NetOps with Business-Aware Network Monitoring
Modernize NetOps with Business-Aware Network MonitoringModernize NetOps with Business-Aware Network Monitoring
Modernize NetOps with Business-Aware Network Monitoring
 
Navigating the Complexity of Distributed Microservices across AWS, Azure, and...
Navigating the Complexity of Distributed Microservices across AWS, Azure, and...Navigating the Complexity of Distributed Microservices across AWS, Azure, and...
Navigating the Complexity of Distributed Microservices across AWS, Azure, and...
 
Navigating Today’s Threat Landscape: Discussing Hype vs. Reality
Navigating Today’s Threat Landscape: Discussing Hype vs. RealityNavigating Today’s Threat Landscape: Discussing Hype vs. Reality
Navigating Today’s Threat Landscape: Discussing Hype vs. Reality
 
Kubernetes Unveiled: Trends, Challenges, and Opportunities
Kubernetes Unveiled: Trends, Challenges, and OpportunitiesKubernetes Unveiled: Trends, Challenges, and Opportunities
Kubernetes Unveiled: Trends, Challenges, and Opportunities
 
DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-...
DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-...DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-...
DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-...
 
Challenges and Best Practices for Securing Modern Operational Technology Netw...
Challenges and Best Practices for Securing Modern Operational Technology Netw...Challenges and Best Practices for Securing Modern Operational Technology Netw...
Challenges and Best Practices for Securing Modern Operational Technology Netw...
 
CMDB in Cloud Times: Myths, Mistakes, and Mastery
CMDB in Cloud Times: Myths, Mistakes, and Mastery CMDB in Cloud Times: Myths, Mistakes, and Mastery
CMDB in Cloud Times: Myths, Mistakes, and Mastery
 
Modernizing Network Engineering and Operations in the Era of Hybrid and Remot...
Modernizing Network Engineering and Operations in the Era of Hybrid and Remot...Modernizing Network Engineering and Operations in the Era of Hybrid and Remot...
Modernizing Network Engineering and Operations in the Era of Hybrid and Remot...
 
Why Should Organizations Consider Extended Detection and Response (XDR)?
Why Should Organizations Consider Extended Detection and Response (XDR)?Why Should Organizations Consider Extended Detection and Response (XDR)?
Why Should Organizations Consider Extended Detection and Response (XDR)?
 
Five Managed SD-WAN Trends to Watch in 2023
Five Managed SD-WAN Trends to Watch in 2023Five Managed SD-WAN Trends to Watch in 2023
Five Managed SD-WAN Trends to Watch in 2023
 
Moving Beyond Remote Access: Discover the Power of Zero Trust Network Access
Moving Beyond Remote Access: Discover the Power of Zero Trust Network AccessMoving Beyond Remote Access: Discover the Power of Zero Trust Network Access
Moving Beyond Remote Access: Discover the Power of Zero Trust Network Access
 

Recently uploaded

Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdfAI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
Techgropse Pvt.Ltd.
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
Zilliz
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
Wouter Lemaire
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 

Recently uploaded (20)

Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdfAI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 

Unlocking High Fidelity Security

  • 1. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Unlocking High Fidelity Security 2019 David Monahan Managing Research Director, Security and Risk Management Enterprise Management Associates
  • 2. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING2 © 2019 Enterprise Management Associates Watch the On-Demand Webinar • Watch the Unlocking High Fidelity Security On- Demand webinar is available here: http://info.enterprisemanagement.com/achieving-high- fidelity-security-webinar-ws • Check out upcoming webinars from EMA here: http://www.enterprisemanagement.com/freeResearch
  • 3. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING3 © 2019 Enterprise Management Associates, Inc. Today’s Speaker David Monahan, Managing Research Director, Security and Risk Management, EMA David is a senior information security executive with years of experience. He has organized and managed both physical and information security programs, including security and network operations (SOCs and NOCs) for organizations ranging from Fortune 100 companies to local government and small public and private companies. He has diverse audit, compliance, risk, and privacy experience, such as providing strategic and tactical leadership to develop, architect, and deploy assurance controls, delivering process and policy documentation and training, and working on educational and technical solutions.
  • 4. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING4 © 2019 Enterprise Management Associates, Inc. Logistics An archived version of the event recording will be available at www.enterprisemanagement.com • Log questions in the chat panel located on the lower left-hand corner of your screen • Questions will be addressed during the Q&A session of the event QUESTIONS EVENT RECORDING
  • 5. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING5 © 2019 Enterprise Management Associates, Inc. Sponsors
  • 6. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING6 © 2019 Enterprise Management Associates, Inc. Demographics • Focused on North America • 42% Director and above • Org Sizes: • 25% SMB, 47% Midsized, 28% Enterprise • Top 5 industries: • MSSP • Healthcare/Medical/Pharma • Manufacturing • Tech • Retail/Wholesale Consumer goods • Average budget increases: • Security falls between 8%-10% • IT falls between 10% and 15% • ~10% of organizations have increases of 25% or more!
  • 7. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Disconnect in Security Perceptions Slide 7 © 2019 Enterprise Management Associates, Inc.
  • 8. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING8 © 2019 Enterprise Management Associates, Inc. Security Program Maturity 13% 56% 26% 5% 1% Superior Very Good Good Fair Poor
  • 9. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING9 © 2019 Enterprise Management Associates, Inc. Security Access to Data For Investigations 47% 44% 8% 1% 33% 35% 20% 14% 33% 31% 24% 11% They have direct access to all of the data or systems They have direct access to most of the data or systems They have direct access to some of the data or systems They do not have direct access unless they request it Sr. Mgmt Mid Mgmt Front line Ops
  • 10. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING10 © 2019 Enterprise Management Associates, Inc. Comfortability with Current Organizational Cyber-Risk 22% 39% 28% 8% 4% Wholly comfortable Generally comfortable, but with some reservations Moderately comfortable Moderately uncomfortable Very uncomfortable
  • 11. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING11 © 2019 Enterprise Management Associates, Inc. Respondents Wholly Comfortable with Current Organizational Cyber-Risk By Role 30% 11% 16% Sr. Mgmt Middle Mgmt. Front line Ops
  • 12. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING12 © 2019 Enterprise Management Associates, Inc. Perspective on Current Controls Effectiveness 33% 24% 20% Sr Mgmt Mdl Mgmt Ops Outstanding Prevention 37% 30% 20% Sr Mgmt Mdl Mgmt Ops Outstanding Detection 30% 24% 27% Sr Mgmt Mdl Mgmtbreach (C) Ops Outstanding-Quantifying
  • 13. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Security Controls
  • 14. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING14 © 2019 Enterprise Management Associates, Inc. Top Three Least Effective Cyber-security Controls 36% 34% 31% 26% Data loss prevention/detection Vulnerability management Breach investigation and incident response Confident in all areas listed
  • 15. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING15 © 2019 Enterprise Management Associates, Inc. Most Significant Impact on Security Posture 44% 45% 11% 26% 63% 11% 38% 42% 20% More efficient internal processes and IT hygiene Additional security technologies/product/solutions Employee awareness Sr. Mgmt. Mid Mgmt. Front line Ops
  • 16. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Security Services Adoption
  • 17. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING17 © 2019 Enterprise Management Associates, Inc. 2018 Security Service Spending 6% 10% 19% 51% 7% 7% Yes. We spend between 75% and 89% of our security budget with MSSPs. Yes. We spend between 50% and 74% of our security budget with MSSPs. Yes. We spend between 25% and 49% of our security budget with MSSPs. Yes. We spend between 10% and 24% of our security budget with MSSPs. None, but we are investigating engaging a provider. None, and we have no interest in investigating.
  • 18. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Perspective on Tools and Skills for Effective Secops 18 © 2019 Enterprise Management Associates, Inc. 47% 23% 22% 6% 2% Yes No, but I believe we are 90% or better on the way No, but I believe we are 75% to 89% on the way No, but I believe we are 50% to 74% on the way No, and we need to make significant progress Tools 50% 23% 19% 8% 1% Yes No, but I believe we are 90% or better on the way No, but I believe we are 75% to 89% on the way No, but I believe we are 50% to 74% on the way No, and we need to make significant progress Skills
  • 19. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Security Services Consumption 19 © 2019 Enterprise Management Associates, Inc. 52% 49% 47% 24x7 security incident monitoring Managed firewall Risk assessment Top 3 Services Used 61% 50% 39% 24x7 security incident monitoring Managed detection and response Risk assessment Top 3 Service Under Consideration
  • 20. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Top 5 Drivers for Security Services Adoption 20 © 2019 Enterprise Management Associates, Inc. 38% 37% 36% 35% 34% Believe that the MSSP can do it better regardless of in- house cost Better value/ROI than performing the tasks in-house Believe that the MSSP can do it better regardless of skills in-house Cost to hire currently available personnel compared to cost of MSSP Want to focus on the core business
  • 21. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Identifying and Stopping Breaches
  • 22. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING22 © 2019 Enterprise Management Associates, Inc. The Stage Attacks are Identified and Stopped 15% 13% 15% 17% 11% 9% 11% 9% 16% 15% 12% 16% 11% 9% 10% 11% Inside perimeter reconnaissance Initial infiltration/landing/delivery Host/user exploitation When malware/tools are installed Command and control Lateral movement Data exfiltration Post event(s)
  • 23. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING23 © 2019 Enterprise Management Associates, Inc. Tope 3 Data Sources for Early Detection of an Attack of Breach 49% 42% 41% Vulnerability assessment data Dark web monitoring Perimeter protection tools (DDoS, firewall, IPS, web proxy, etc.)
  • 24. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING24 © 2019 Enterprise Management Associates, Inc. Importance of Having a Single Security Console 46% 39% 13% 2% 0% Very important Important Somewhat important Somewhat unimportant Not important at all
  • 25. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING25 © 2019 Enterprise Management Associates, Inc. Defense Control Testing 29% 38% 38% 36% 39% 40% 42% 69% 57% 59% 60% 56% 56% 54% Evaluate policies Test IR procedures Evaluate incident monitoring and alerting systems configurations/parameters Evaluate operational procedures Conduct testing on our perimeter defensive configurations Conduct testing on our internal defensive technology configurations Perform penetration testing on critical systems More often than semi-annually Annually to semi-annually
  • 26. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING26 © 2019 Enterprise Management Associates, Inc. Improving Controls Testing Would Improve Security 72% 72% 70% Evaluate incident monitoring and alerting systems configurations/parameters Conduct testing on our perimeter defensive configurations Conduct testing on our internal defensive technology configurations
  • 27. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Tools and Data Integrations
  • 28. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING28 © 2019 Enterprise Management Associates, Inc. Data Integration Methods- Very Important to Indispensable Tool Selection Criteria 61% 59% 60% 59% 59% Cloud or On-premises third-party data analysis tools On-premises or Cloud-based third-party data collection tools Third-party data integration tools Vendor-created open APIs Vendor partnership-driven integrations
  • 29. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING29 © 2019 Enterprise Management Associates, Inc. Top 3 Challenges Inhibiting Security Data Integration 49% 46% 41% Lack of vendor-enabled integrations Lack of analysis capabilities in the solution Lack of vendor-supplied open APIs creating an in ability to inject/import information
  • 30. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Automation
  • 31. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING31 © 2019 Enterprise Management Associates, Inc. Trust/Preference in Fully Automatic Actions vs. Manually-Gated Automated Actions 60% 40% More automated More automatic Definitions: Automated—The detection system performs incident detection, data gathering, and data analysis, then presents findings and recommendations for resolution to a person who authorizes the system to execute a resolution process. Automatic—The detection system performs incident detection, data gathering, and data analysis, and at least an initial attempt at resolution, before presenting the outcome to a person who closes the case. Case closure may be performed by the system if successful outcome can be verified.
  • 32. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING32 © 2019 Enterprise Management Associates, Inc. Influencers on Purchase of Security Tools for Automation (5-point scale) 3.7 3.2 2.9 2.8 2.4 Accuracy Integration Scalability Ease of use Price Security
  • 33. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING33 © 2019 Enterprise Management Associates, Inc. Percentage of Process Automation in Secops 29% 40% 31% Manual Automated Fully Automatic
  • 34. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING34 © 2019 Enterprise Management Associates, Inc. Importance of Automation for Achieving SecOps Goals 33% 48% 16% 2% Extremely important Very important Moderately important Somewhat important
  • 35. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING35 © 2019 Enterprise Management Associates, Inc. Importance of Breach Simulation Automation For Achieving SecOps Goals 46% 38% 14% 2% Extremely important Very important Moderately important Somewhat important
  • 36. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING36 © 2019 Enterprise Management Associates, Inc. Importance of Automation in Achieving Breach Detection and Incident Response 47% 40% 12% 1% 47% 39% 12% 2% Very important Important Somewhat important Somewhat unimportant Breach Detection IR
  • 37. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Network Security
  • 38. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING38 © 2019 Enterprise Management Associates, Inc. Greatest Value Data for Early Breach Detection 60% 40% Network data Endpoint data
  • 39. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING39 © 2019 Enterprise Management Associates, Inc. Data Stored for Incident Investigations 67% 51% 50% 3% Flow data Packet information Metadata I don't know
  • 40. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING40 © 2019 Enterprise Management Associates, Inc. Data Stored for Incident Investigations 67% 51% 50% 3% Flow data Packet information Metadata I don't know
  • 41. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING41 © 2019 Enterprise Management Associates, Inc. Value of Network Metadata for Investigations 14% 65% 20% 1% Extremely valuable Very valuable Moderately valuable Not very valuable
  • 42. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Vulnerability & Penetration Testing, and Remediation
  • 43. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING43 © 2019 Enterprise Management Associates, Inc. Impact on Critical Systems From Penetration Testing 32% 52% 12% 3% We have experienced an outage or serious performance impact We have not experienced an outage or serious performance impact We have not used penetration testing. I don't know if we have used penetration testing.
  • 44. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING44 © 2019 Enterprise Management Associates, Inc. Lack of Effectiveness of Vuln Mgmt. Systems 43% 42% Attack-Path Business Risk Good to Poor
  • 45. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING45 © 2019 Enterprise Management Associates, Inc. Security Budget Investments in Pre-breach Readiness tools 8% 40% 19% 16% 10% 7% We are not currently investing in this area <10% Between 11% and 15% Between 16% and 20% More than 20% I don't know
  • 46. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING46 © 2019 Enterprise Management Associates, Inc. Awareness of Commercially Available Attack Path Identification Systems 29% 71% Yes No
  • 47. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING Other Trends
  • 48. IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING48 © 2019 Enterprise Management Associates, Inc. Questions Get the report at http://bit.ly/2ngu7ZR