SlideShare a Scribd company logo
1 of 42
Download to read offline
!
!"              #

                            $ %     &

    #       '      ()
                   )*

+ ,                     !

        '
-           '. /




                                2
%   0



                                             !                 "
                        #        $# %                # &       #
         # '                 (                             !       (
          "        )**           %+      ,!               -.           /
        0)         1      2       !                  0
        3            1 44
                        56       !
                        !        768 )96                  6 8 9    !


          "                                          5*
          "         !            )       :       !
               !
         )%+;           *        !               6 8<
            ,!                       "       :
           #
Why BT for Security?

                                             Industry-leading resources
 1,400 global practitioners           Comprehensive event                      Operating 9 world            Over 100 registered patents,
 with over 125 accredited            correlation platforms and                class SOCs globally            190 security papers and
   security professionals                 reporting tools                           24/7/365                     numerous books
         in the US


                                               With proven experience
   6,000 security              BT has delivered                                           Monitoring 550           Filters over 75,000
                              security services to       Over 1,500 firewalls            networks with data
 engagements in the                                                                                                viruses from client
                               over 75% of the           under management             from over 150 countries
   US since 1994                                                                                                  networks each month
                                 Fortune 500                                            and 335,000 devices


                                Delivering an integrated services portfolio
                                                                         Incorporating industry-
                                     From assessment to
                                                                          leading technology &
                                     mitigation, on a global
                                                                       services, with Counterpane
                                              basis
                                                                               at the core


                                                 Third party validation
                                                                                           Many accreditations, including BS
              Leadership position in                     Highest capability                27001/ISO 17799, SAS70-II, FIPS
          Gartner’s 2007 North American                   maturity rating                    140-2, CERT, FIRST, CLAS,
             MSSP Magic Quadrant                            from NSA                                 SANS GIAC
                                                                                                     and CHECK
1
1
           ,
2

1
1   '   3# 4




               5
1


1                 !                       5
    &   ' &                           " % "
              "           "   &               6

                      6
1
                                  6




                              6
1            ! 77
                )


1            !              -           /    & "   &
        !           &                    !             6

            - /                     &
    &                           6

                                    8 0




                        7
1 8 0 9& &

                      -       /
 $                                !           6
 $ 2 , :'
        ;      6
 $                        <
   -)) = => ; ;
   ) =(: 7 = = /
 $
     &            -       /
 $ ?&             "                   &


 $                                        ,   (6:
     .@   ( .@
           6A 6




                              8
18 0


               &

 $ 9
                   ! 6
 $     !
                         ! 6




           9
??? ; ( 7
     ) 67

 ??? ; ($
      )              !        &   ???
    ;( 7
    ) 67
     $ ( .@
        6:
     $ (
    ;( 7
    ) 67
     $ A .@
     $ A:
    ;( 7
    ) 67
     $ ( .@
        6:
     $ 77
    ;( 7
    ) 67
     $ ( .@
        6:
     $ A:
    ;( 7 '
    ) 67
     $ (6:    A .@
     $ B)
        )
                         10
; ( 7& 6 1 '+
 ) 67


 ; ( 7'
  ) 67                                   ???
 1 '+
 $               ;( 7
                  ) 67                         1 '+
 $ 1 '+                  "      '
   B)
    )                                          18 0
 $                           1 '+        !
           &
 1 '+

 $ ?                     &
        1 '+             -
                         1      /
               ;( 7 ,
               ) 67       6

                                    11
!

&       !

<           ! !
    5




                  12
1


    $                    ,
    $
    $       C

    $
    $   !            D




                13
1                          &


                      !$         !
          @   D                  !
1         8 0               6
0                            6
            !     =
    $ 1
    $ +
    $
                                     &   6



                           14
1         ?, &               &   - ? /
                                 1

              !                           6          !    ,       =
    $                            6
    $              6
    $         &        6
E                                             18 0        6
2              :
    $     :                                    '              !
                   F       -F/       6
    $     :                                          <6
2         B'
          (                               !-         B/
                                                      (
    $
    $ 2                          !F           - F/
?&                 " ?
                    1                &
                                     15
1 '+                               -
                                   1              /


 1
 1? 6
 $ 1 !              ;( 7"
                     ) 67          6
 $                                                1? D
 $ ?<                                            G
 8          '                 =1       (6
 1              1 (                                   ??? ; ( 7
                                                           ) 67
 1      '        !  H)                           I
 $     =3
       3        6    6 6 !3    3 &     3)>)3)
                                        ()3;B3           '   '   ' 'H '
                                                                     )    3




                                            16
1


1                                                     "    &
                                           '       ! ! 6
    $ %   &                                    1?
    $ %   &                !- 6
                             6                      1?     /
    $ %   &   +   '        !


1                     1?     =
    $                         ;( J
                               ) 67                  !-        /
                  -           /
    $         !                                !
    $             @           @        &           -F/
    $

                                  17
1       (


                         &          1 '+
                         ???D ; ( 7
                               ) 67
2                                    "'
                                      :       !"
!                    1
                %E               &        ?    -? /

    $   ?            '
    $   ?                !       '            -    '
            /                !




                                     18
1? 4


+                     "
       1?           B")>
                    7()6
+                       "
1?     I    B"))
             )(76




                    19
=            1


"
    ?<


                      ; ( 71 8 0
                       ) 67
    & 6(
     7                         ? &                 - ?/
                                                      6

      &
                  ,          ! 18 0                 &
                        !6
         =3
         3    6              6   3    3   K   K1    K     6

                                 20
?         &                   $                4


                  &                                        6
    $ %               5                                !
              &                                    6
    $         &
                      "                                        & 6
    $
                          "            F   2       " 5
                                                     &     6




                                  21
#                   #
$               3
$                                        !
$                                                !       ?
$           &       '                                &

$   %
$

        &
$           !               &       "
$                                                    18 0
$
$                               '            &
                                    22
0                            !&               6
$               !                                  8 0
        6
    &           "
                             !
$ %
            !                        !6
0 &                 &
$                                            ! "   "
        "   0                    6
0
$                   "                6
$       &                                @             6

                        23
,
$               @                 &                             !
                !&                 !                    6
$                        @
                                                                ?
            6
$                                  @                                6

    ,                                  '                    !
$       ,                         @
                     &                          &   6
$
                "            ?6
$   ,                                       &
    ,            6
                                       24
1       !                                       =
$
$                                         ?6
                             !   &              "
                     !               @
    &                                          ?6
            !                             ,
                         !           ?6




                25
&                     @ -
                        / 8 0
                         1               @   D   !6
                          =
$         18 0                   !   &
$           !        18 0                !
$ &              6




                            26
1



    9                     =
    $       9
    $   9
    $                              - ."   %   " 6/
    $                 3
    $
    $           9
            ?
    $             9       "
                & "



                              27
!$           , 7 6B
                          6 6(


                                  !   ?
$                    -
        /                &            ?6
F
    !
$                -
        /                &            ?6




            28
!

    ,                     !               "
                                      ?       6
        &                 @
        ?&                            !
                                  6
1                =
$                             !                   ?
             !
$       ;( 7
        ) 67
$
$
          ,          76
                      )


                          29
$   , ( 67
                                            6 67

              &       '
                      !
$        "0                    "
        "                      ! " 6
?                 &
                                                    6
    &                                           &
,                              ,            6




                          30
&   $       , > 6B
                                      6 67


                                 "
    &   6
F                                    "        "
        &                        6
$
$   !
            !            !   &

$           3
$               &




                    31
7 67$ 1
         7                                          !


%
             @
$       ,
$                         3                         &       6
F                                 @                 ,       "
             3
            & 6
                  3                            "&
                                           6
F                 @           D                         - , 7 6>
                                                           6 ( /
$                                              &        @
    &                 6
                                      32
1           3                             $       , 7 6:
                                                   6 7

2           3                    &
                     ?
            6
    $            !
                !
    $                    !                        !

        ,                        6
E
    $           3
                6
    $ ?<         3                            3   &
            "                "        &
                     6
                                 33
#                                                     $       , 7 67
                                                               6 7
%                      "                 "        !                     "
                                                          ,
                        @                         6
2                      @            ,
     &
    $ 7 67%
       7
          @        ,                                          3
               &       6
    $ 7 67 F
       7                            @                     ,         "
               3
        & 6
    $ 7 67
       7                   3                     "&
                               6
    $ 7 67 F
       7                   @    D                                 - ,       7 6>
                                                                             ( /
                               &             @                    &             6
                                    34
'
$ L                    !
$
$
        & 6
(             )
$ .
$             ,   ,        6
$ L                    "       =

                  &            &



                  35
!                   !
$ 8
$ 2         +                   &       +        !
$ 9             ;( 7
                 ) 67


$               !                   !                    1
        1                   &           ! &                  !
                !           !


$ 0
$ ?                 '                                <           &
$                   &
                                            36
1


                                      "       "
        !"#"     "                        $   $ 6
    $                         !           6
    $        '                    !


    $    D           &




                         37
1


              1?
               8?
    $ E       !         !             8?
    $                   8?        "
2 1           1     (
    $     1   (
    $




                             38
1                                  %

0
    $       6                  6                                     6    6
1?               !                                               E
    $       =3
            3             !6                6                        6!       6
            !'      -              '                         /
    $       6        ! 6
                      '                                              6    6
        %       0          !
    $       6                      !6   3

    $                &
    $       6         6            3    3       K        6


                                                    39
40
!
                         6
    &                            6
,                            &
        &
                     &               &
            !




                41
#3 $


       !"   "       "        #

 %      &
  6 ! 6   3 3           !
  6   6 3       !




                        42

More Related Content

What's hot

Libro deapoyometminjaresme
Libro deapoyometminjaresmeLibro deapoyometminjaresme
Libro deapoyometminjaresmeadriana barba
 
4. alps computerize motor rewind
4. alps computerize motor rewind4. alps computerize motor rewind
4. alps computerize motor rewindalpsmsi
 
Document1
Document1Document1
Document1M3y3aM
 
A Eficiencia Da Hidroterapia Em Paciente Portador De Artrogripose Multipla Co...
A Eficiencia Da Hidroterapia Em Paciente Portador De Artrogripose Multipla Co...A Eficiencia Da Hidroterapia Em Paciente Portador De Artrogripose Multipla Co...
A Eficiencia Da Hidroterapia Em Paciente Portador De Artrogripose Multipla Co...Acquanews
 
How To Trust The Cloud
How To Trust The CloudHow To Trust The Cloud
How To Trust The CloudNeustar, Inc.
 
23ประชาคมอาเซียนมีผลอย่างไรต่อชีวิตของเรา
23ประชาคมอาเซียนมีผลอย่างไรต่อชีวิตของเรา23ประชาคมอาเซียนมีผลอย่างไรต่อชีวิตของเรา
23ประชาคมอาเซียนมีผลอย่างไรต่อชีวิตของเราพัน พัน
 
Six-Core AMD Opteron launched
Six-Core AMD Opteron launchedSix-Core AMD Opteron launched
Six-Core AMD Opteron launchedYING CHIEH YU
 
Farmer's manual eng
Farmer's manual   engFarmer's manual   eng
Farmer's manual engguestc4cf6a1
 
Alumnes, Programari I Materials
Alumnes, Programari I MaterialsAlumnes, Programari I Materials
Alumnes, Programari I Materialstinoserracompany
 
OECD, Higher education workshop, Helsinki, 2007, Finland
OECD, Higher education workshop, Helsinki, 2007, FinlandOECD, Higher education workshop, Helsinki, 2007, Finland
OECD, Higher education workshop, Helsinki, 2007, FinlandIlkka Kakko
 
Data Citation from the perspective of tracking data reuse
Data Citation from the perspective of tracking data reuseData Citation from the perspective of tracking data reuse
Data Citation from the perspective of tracking data reuseHeather Piwowar
 
04 face- nose- palate development
04 face- nose- palate development04 face- nose- palate development
04 face- nose- palate developmentLE HAI TRIEU
 

What's hot (18)

Susceptibilité familiale et éthnique au paludisme
Susceptibilité familiale et éthnique au paludismeSusceptibilité familiale et éthnique au paludisme
Susceptibilité familiale et éthnique au paludisme
 
Libro deapoyometminjaresme
Libro deapoyometminjaresmeLibro deapoyometminjaresme
Libro deapoyometminjaresme
 
4. alps computerize motor rewind
4. alps computerize motor rewind4. alps computerize motor rewind
4. alps computerize motor rewind
 
Document1
Document1Document1
Document1
 
A Eficiencia Da Hidroterapia Em Paciente Portador De Artrogripose Multipla Co...
A Eficiencia Da Hidroterapia Em Paciente Portador De Artrogripose Multipla Co...A Eficiencia Da Hidroterapia Em Paciente Portador De Artrogripose Multipla Co...
A Eficiencia Da Hidroterapia Em Paciente Portador De Artrogripose Multipla Co...
 
How To Trust The Cloud
How To Trust The CloudHow To Trust The Cloud
How To Trust The Cloud
 
How to Trust the Cloud
How to Trust the CloudHow to Trust the Cloud
How to Trust the Cloud
 
23ประชาคมอาเซียนมีผลอย่างไรต่อชีวิตของเรา
23ประชาคมอาเซียนมีผลอย่างไรต่อชีวิตของเรา23ประชาคมอาเซียนมีผลอย่างไรต่อชีวิตของเรา
23ประชาคมอาเซียนมีผลอย่างไรต่อชีวิตของเรา
 
Aesthetics in Software Testing
Aesthetics in Software TestingAesthetics in Software Testing
Aesthetics in Software Testing
 
Six-Core AMD Opteron launched
Six-Core AMD Opteron launchedSix-Core AMD Opteron launched
Six-Core AMD Opteron launched
 
Colegio Nº 1 - Martín de Moussy
Colegio Nº 1 - Martín de MoussyColegio Nº 1 - Martín de Moussy
Colegio Nº 1 - Martín de Moussy
 
Farmer's manual eng
Farmer's manual   engFarmer's manual   eng
Farmer's manual eng
 
Alumnes, Programari I Materials
Alumnes, Programari I MaterialsAlumnes, Programari I Materials
Alumnes, Programari I Materials
 
OECD, Higher education workshop, Helsinki, 2007, Finland
OECD, Higher education workshop, Helsinki, 2007, FinlandOECD, Higher education workshop, Helsinki, 2007, Finland
OECD, Higher education workshop, Helsinki, 2007, Finland
 
Attività didattiche
Attività didatticheAttività didattiche
Attività didattiche
 
Data Citation from the perspective of tracking data reuse
Data Citation from the perspective of tracking data reuseData Citation from the perspective of tracking data reuse
Data Citation from the perspective of tracking data reuse
 
04 face- nose- palate development
04 face- nose- palate development04 face- nose- palate development
04 face- nose- palate development
 
Green grocersppt
Green grocerspptGreen grocersppt
Green grocersppt
 

Viewers also liked

Rothke rsa 2013 - the five habits of highly secure organizations
Rothke   rsa 2013 - the five habits of highly secure organizationsRothke   rsa 2013 - the five habits of highly secure organizations
Rothke rsa 2013 - the five habits of highly secure organizationsBen Rothke
 
Rothke effective data destruction practices
Rothke   effective data destruction practicesRothke   effective data destruction practices
Rothke effective data destruction practicesBen Rothke
 
The Cloud is in the details webinar - Rothke
The Cloud is in the details webinar - RothkeThe Cloud is in the details webinar - Rothke
The Cloud is in the details webinar - RothkeBen Rothke
 
Rothke rsa 2013 - deployment strategies for effective encryption
Rothke   rsa 2013 - deployment strategies for effective encryptionRothke   rsa 2013 - deployment strategies for effective encryption
Rothke rsa 2013 - deployment strategies for effective encryptionBen Rothke
 
Interop 2011 las vegas - session se31 - rothke
Interop 2011   las vegas - session se31 - rothkeInterop 2011   las vegas - session se31 - rothke
Interop 2011 las vegas - session se31 - rothkeBen Rothke
 
E5 rothke - deployment strategies for effective encryption
E5   rothke - deployment strategies for effective encryptionE5   rothke - deployment strategies for effective encryption
E5 rothke - deployment strategies for effective encryptionBen Rothke
 
Rothke rsa 2012 what happens in vegas goes on youtube using social networks...
Rothke rsa 2012   what happens in vegas goes on youtube using social networks...Rothke rsa 2012   what happens in vegas goes on youtube using social networks...
Rothke rsa 2012 what happens in vegas goes on youtube using social networks...Ben Rothke
 
Lessons from ligatt from national cyber security nationalcybersecurity com
Lessons from ligatt   from national cyber security nationalcybersecurity comLessons from ligatt   from national cyber security nationalcybersecurity com
Lessons from ligatt from national cyber security nationalcybersecurity comBen Rothke
 

Viewers also liked (8)

Rothke rsa 2013 - the five habits of highly secure organizations
Rothke   rsa 2013 - the five habits of highly secure organizationsRothke   rsa 2013 - the five habits of highly secure organizations
Rothke rsa 2013 - the five habits of highly secure organizations
 
Rothke effective data destruction practices
Rothke   effective data destruction practicesRothke   effective data destruction practices
Rothke effective data destruction practices
 
The Cloud is in the details webinar - Rothke
The Cloud is in the details webinar - RothkeThe Cloud is in the details webinar - Rothke
The Cloud is in the details webinar - Rothke
 
Rothke rsa 2013 - deployment strategies for effective encryption
Rothke   rsa 2013 - deployment strategies for effective encryptionRothke   rsa 2013 - deployment strategies for effective encryption
Rothke rsa 2013 - deployment strategies for effective encryption
 
Interop 2011 las vegas - session se31 - rothke
Interop 2011   las vegas - session se31 - rothkeInterop 2011   las vegas - session se31 - rothke
Interop 2011 las vegas - session se31 - rothke
 
E5 rothke - deployment strategies for effective encryption
E5   rothke - deployment strategies for effective encryptionE5   rothke - deployment strategies for effective encryption
E5 rothke - deployment strategies for effective encryption
 
Rothke rsa 2012 what happens in vegas goes on youtube using social networks...
Rothke rsa 2012   what happens in vegas goes on youtube using social networks...Rothke rsa 2012   what happens in vegas goes on youtube using social networks...
Rothke rsa 2012 what happens in vegas goes on youtube using social networks...
 
Lessons from ligatt from national cyber security nationalcybersecurity com
Lessons from ligatt   from national cyber security nationalcybersecurity comLessons from ligatt   from national cyber security nationalcybersecurity com
Lessons from ligatt from national cyber security nationalcybersecurity com
 

Similar to BT for Security: Industry-Leading Resources and Proven Experience

设计的约定
设计的约定设计的约定
设计的约定chen meng
 
Dramatically increase revenue on verio template
Dramatically increase revenue on verio templateDramatically increase revenue on verio template
Dramatically increase revenue on verio templateJanine Soika
 
Developer Tools, Nokia Platforms Santtu Ahonen
Developer Tools, Nokia Platforms Santtu AhonenDeveloper Tools, Nokia Platforms Santtu Ahonen
Developer Tools, Nokia Platforms Santtu AhonenAshley Walker
 
Science Fiction Sensor Networks
Science Fiction Sensor NetworksScience Fiction Sensor Networks
Science Fiction Sensor NetworksDiego Pizzocaro
 
Km Zonalito Feb 2010
Km Zonalito Feb 2010Km Zonalito Feb 2010
Km Zonalito Feb 2010guest69ba7b
 
Investment in the Silicon Valley Mobile Industry
Investment in the Silicon Valley Mobile IndustryInvestment in the Silicon Valley Mobile Industry
Investment in the Silicon Valley Mobile Industrykateimbach
 
Low Carbon Housing for Non-experts
Low Carbon Housing for Non-expertsLow Carbon Housing for Non-experts
Low Carbon Housing for Non-expertsurbed
 
Development Made Simple with no Coding: Developing Reusable Business Components
Development Made Simple with no Coding: Developing Reusable Business ComponentsDevelopment Made Simple with no Coding: Developing Reusable Business Components
Development Made Simple with no Coding: Developing Reusable Business Componentsdsingleterry
 
ApacheCon NA11 - Apache Celix, Universal OSGi?
ApacheCon NA11 - Apache Celix, Universal OSGi?ApacheCon NA11 - Apache Celix, Universal OSGi?
ApacheCon NA11 - Apache Celix, Universal OSGi?abroekhuis
 
OSGI workshop - Become A Certified Bundle Manager
OSGI workshop - Become A Certified Bundle ManagerOSGI workshop - Become A Certified Bundle Manager
OSGI workshop - Become A Certified Bundle ManagerSkills Matter
 
20110611 expanded intro-to_puppet_for_self
20110611 expanded intro-to_puppet_for_self20110611 expanded intro-to_puppet_for_self
20110611 expanded intro-to_puppet_for_selfgarrett honeycutt
 
Архитектура коммутаторов Cisco Catalyst 6500
Архитектура коммутаторов Cisco Catalyst 6500Архитектура коммутаторов Cisco Catalyst 6500
Архитектура коммутаторов Cisco Catalyst 6500Cisco Russia
 
LAMP_TRAINING_SESSION_6
LAMP_TRAINING_SESSION_6LAMP_TRAINING_SESSION_6
LAMP_TRAINING_SESSION_6umapst
 

Similar to BT for Security: Industry-Leading Resources and Proven Experience (20)

Pilot Interim Results
Pilot Interim ResultsPilot Interim Results
Pilot Interim Results
 
设计的约定
设计的约定设计的约定
设计的约定
 
Dramatically increase revenue on verio template
Dramatically increase revenue on verio templateDramatically increase revenue on verio template
Dramatically increase revenue on verio template
 
Developer Tools, Nokia Platforms Santtu Ahonen
Developer Tools, Nokia Platforms Santtu AhonenDeveloper Tools, Nokia Platforms Santtu Ahonen
Developer Tools, Nokia Platforms Santtu Ahonen
 
Lenz Karte
Lenz KarteLenz Karte
Lenz Karte
 
EB-85 A
EB-85 AEB-85 A
EB-85 A
 
Science Fiction Sensor Networks
Science Fiction Sensor NetworksScience Fiction Sensor Networks
Science Fiction Sensor Networks
 
Km Zonalito Feb 2010
Km Zonalito Feb 2010Km Zonalito Feb 2010
Km Zonalito Feb 2010
 
Investment in the Silicon Valley Mobile Industry
Investment in the Silicon Valley Mobile IndustryInvestment in the Silicon Valley Mobile Industry
Investment in the Silicon Valley Mobile Industry
 
Low Carbon Housing for Non-experts
Low Carbon Housing for Non-expertsLow Carbon Housing for Non-experts
Low Carbon Housing for Non-experts
 
Development Made Simple with no Coding: Developing Reusable Business Components
Development Made Simple with no Coding: Developing Reusable Business ComponentsDevelopment Made Simple with no Coding: Developing Reusable Business Components
Development Made Simple with no Coding: Developing Reusable Business Components
 
ApacheCon NA11 - Apache Celix, Universal OSGi?
ApacheCon NA11 - Apache Celix, Universal OSGi?ApacheCon NA11 - Apache Celix, Universal OSGi?
ApacheCon NA11 - Apache Celix, Universal OSGi?
 
Javaee glassfish jcertif2010
Javaee glassfish jcertif2010Javaee glassfish jcertif2010
Javaee glassfish jcertif2010
 
All about Apache ACE
All about Apache ACEAll about Apache ACE
All about Apache ACE
 
OSGI workshop - Become A Certified Bundle Manager
OSGI workshop - Become A Certified Bundle ManagerOSGI workshop - Become A Certified Bundle Manager
OSGI workshop - Become A Certified Bundle Manager
 
Device deployment
Device deploymentDevice deployment
Device deployment
 
20110611 expanded intro-to_puppet_for_self
20110611 expanded intro-to_puppet_for_self20110611 expanded intro-to_puppet_for_self
20110611 expanded intro-to_puppet_for_self
 
Архитектура коммутаторов Cisco Catalyst 6500
Архитектура коммутаторов Cisco Catalyst 6500Архитектура коммутаторов Cisco Catalyst 6500
Архитектура коммутаторов Cisco Catalyst 6500
 
Coanda Effect UAV
Coanda Effect UAVCoanda Effect UAV
Coanda Effect UAV
 
LAMP_TRAINING_SESSION_6
LAMP_TRAINING_SESSION_6LAMP_TRAINING_SESSION_6
LAMP_TRAINING_SESSION_6
 

More from Ben Rothke

Securing your presence at the perimeter
Securing your presence at the perimeterSecuring your presence at the perimeter
Securing your presence at the perimeterBen Rothke
 
Rothke rsa 2012 building a security operations center (soc)
Rothke rsa 2012  building a security operations center (soc)Rothke rsa 2012  building a security operations center (soc)
Rothke rsa 2012 building a security operations center (soc)Ben Rothke
 
Locking down server and workstation operating systems
Locking down server and workstation operating systemsLocking down server and workstation operating systems
Locking down server and workstation operating systemsBen Rothke
 
Mobile security blunders and what you can do about them
Mobile security blunders and what you can do about themMobile security blunders and what you can do about them
Mobile security blunders and what you can do about themBen Rothke
 
Securing your presence at the perimeter
Securing your presence at the perimeterSecuring your presence at the perimeter
Securing your presence at the perimeterBen Rothke
 
Lessons from ligatt
Lessons from ligattLessons from ligatt
Lessons from ligattBen Rothke
 
Infosecurity Needs Its T.J. Hooper
Infosecurity Needs Its T.J. HooperInfosecurity Needs Its T.J. Hooper
Infosecurity Needs Its T.J. HooperBen Rothke
 
Rothke computer forensics show 2010
Rothke   computer forensics show 2010Rothke   computer forensics show 2010
Rothke computer forensics show 2010Ben Rothke
 
La nécessité de la dlp aujourd’hui un livre blanc clearswift
La nécessité de la dlp aujourd’hui   un livre blanc clearswiftLa nécessité de la dlp aujourd’hui   un livre blanc clearswift
La nécessité de la dlp aujourd’hui un livre blanc clearswiftBen Rothke
 
The Need for DLP now - A Clearswift White Paper
The Need for DLP now - A Clearswift White PaperThe Need for DLP now - A Clearswift White Paper
The Need for DLP now - A Clearswift White PaperBen Rothke
 
Rothke secure360 building a security operations center (soc)
Rothke   secure360 building a security operations center (soc)Rothke   secure360 building a security operations center (soc)
Rothke secure360 building a security operations center (soc)Ben Rothke
 
Infotec 2010 Ben Rothke - social networks and information security
Infotec 2010   Ben Rothke - social networks and information security Infotec 2010   Ben Rothke - social networks and information security
Infotec 2010 Ben Rothke - social networks and information security Ben Rothke
 
Rothke Computer Forensics Show 2010 Deployment Strategies For Effective E...
Rothke   Computer Forensics Show 2010   Deployment Strategies For Effective E...Rothke   Computer Forensics Show 2010   Deployment Strategies For Effective E...
Rothke Computer Forensics Show 2010 Deployment Strategies For Effective E...Ben Rothke
 
Rothke stimulating your career as an information security professional
Rothke  stimulating your career as an information security professionalRothke  stimulating your career as an information security professional
Rothke stimulating your career as an information security professionalBen Rothke
 
Ben Rothke - Effective Data Destruction Practices
Ben Rothke - Effective Data Destruction PracticesBen Rothke - Effective Data Destruction Practices
Ben Rothke - Effective Data Destruction PracticesBen Rothke
 
Virtualization, Cloud Computing And The Pci Dss
Virtualization, Cloud Computing And The Pci DssVirtualization, Cloud Computing And The Pci Dss
Virtualization, Cloud Computing And The Pci DssBen Rothke
 
Ben Rothke RSA PK 2010
Ben Rothke   RSA PK 2010Ben Rothke   RSA PK 2010
Ben Rothke RSA PK 2010Ben Rothke
 
Rothke Using Kazaa To Test Your Security Posture
Rothke   Using Kazaa To Test Your Security PostureRothke   Using Kazaa To Test Your Security Posture
Rothke Using Kazaa To Test Your Security PostureBen Rothke
 
In Sync Network Time Ben Rothke
In Sync Network Time   Ben RothkeIn Sync Network Time   Ben Rothke
In Sync Network Time Ben RothkeBen Rothke
 
Rothke Securing Your Wireless Access Network
Rothke   Securing Your Wireless Access NetworkRothke   Securing Your Wireless Access Network
Rothke Securing Your Wireless Access NetworkBen Rothke
 

More from Ben Rothke (20)

Securing your presence at the perimeter
Securing your presence at the perimeterSecuring your presence at the perimeter
Securing your presence at the perimeter
 
Rothke rsa 2012 building a security operations center (soc)
Rothke rsa 2012  building a security operations center (soc)Rothke rsa 2012  building a security operations center (soc)
Rothke rsa 2012 building a security operations center (soc)
 
Locking down server and workstation operating systems
Locking down server and workstation operating systemsLocking down server and workstation operating systems
Locking down server and workstation operating systems
 
Mobile security blunders and what you can do about them
Mobile security blunders and what you can do about themMobile security blunders and what you can do about them
Mobile security blunders and what you can do about them
 
Securing your presence at the perimeter
Securing your presence at the perimeterSecuring your presence at the perimeter
Securing your presence at the perimeter
 
Lessons from ligatt
Lessons from ligattLessons from ligatt
Lessons from ligatt
 
Infosecurity Needs Its T.J. Hooper
Infosecurity Needs Its T.J. HooperInfosecurity Needs Its T.J. Hooper
Infosecurity Needs Its T.J. Hooper
 
Rothke computer forensics show 2010
Rothke   computer forensics show 2010Rothke   computer forensics show 2010
Rothke computer forensics show 2010
 
La nécessité de la dlp aujourd’hui un livre blanc clearswift
La nécessité de la dlp aujourd’hui   un livre blanc clearswiftLa nécessité de la dlp aujourd’hui   un livre blanc clearswift
La nécessité de la dlp aujourd’hui un livre blanc clearswift
 
The Need for DLP now - A Clearswift White Paper
The Need for DLP now - A Clearswift White PaperThe Need for DLP now - A Clearswift White Paper
The Need for DLP now - A Clearswift White Paper
 
Rothke secure360 building a security operations center (soc)
Rothke   secure360 building a security operations center (soc)Rothke   secure360 building a security operations center (soc)
Rothke secure360 building a security operations center (soc)
 
Infotec 2010 Ben Rothke - social networks and information security
Infotec 2010   Ben Rothke - social networks and information security Infotec 2010   Ben Rothke - social networks and information security
Infotec 2010 Ben Rothke - social networks and information security
 
Rothke Computer Forensics Show 2010 Deployment Strategies For Effective E...
Rothke   Computer Forensics Show 2010   Deployment Strategies For Effective E...Rothke   Computer Forensics Show 2010   Deployment Strategies For Effective E...
Rothke Computer Forensics Show 2010 Deployment Strategies For Effective E...
 
Rothke stimulating your career as an information security professional
Rothke  stimulating your career as an information security professionalRothke  stimulating your career as an information security professional
Rothke stimulating your career as an information security professional
 
Ben Rothke - Effective Data Destruction Practices
Ben Rothke - Effective Data Destruction PracticesBen Rothke - Effective Data Destruction Practices
Ben Rothke - Effective Data Destruction Practices
 
Virtualization, Cloud Computing And The Pci Dss
Virtualization, Cloud Computing And The Pci DssVirtualization, Cloud Computing And The Pci Dss
Virtualization, Cloud Computing And The Pci Dss
 
Ben Rothke RSA PK 2010
Ben Rothke   RSA PK 2010Ben Rothke   RSA PK 2010
Ben Rothke RSA PK 2010
 
Rothke Using Kazaa To Test Your Security Posture
Rothke   Using Kazaa To Test Your Security PostureRothke   Using Kazaa To Test Your Security Posture
Rothke Using Kazaa To Test Your Security Posture
 
In Sync Network Time Ben Rothke
In Sync Network Time   Ben RothkeIn Sync Network Time   Ben Rothke
In Sync Network Time Ben Rothke
 
Rothke Securing Your Wireless Access Network
Rothke   Securing Your Wireless Access NetworkRothke   Securing Your Wireless Access Network
Rothke Securing Your Wireless Access Network
 

Recently uploaded

Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 

Recently uploaded (20)

Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 

BT for Security: Industry-Leading Resources and Proven Experience

  • 1. !
  • 2. !" # $ % & # ' () )* + , ! ' - '. / 2
  • 3. % 0 ! " # $# % # & # # ' ( ! ( " )** %+ ,! -. / 0) 1 2 ! 0 3 1 44 56 ! ! 768 )96 6 8 9 ! " 5* " ! ) : ! ! )%+; * ! 6 8< ,! " : #
  • 4. Why BT for Security? Industry-leading resources 1,400 global practitioners Comprehensive event Operating 9 world Over 100 registered patents, with over 125 accredited correlation platforms and class SOCs globally 190 security papers and security professionals reporting tools 24/7/365 numerous books in the US With proven experience 6,000 security BT has delivered Monitoring 550 Filters over 75,000 security services to Over 1,500 firewalls networks with data engagements in the viruses from client over 75% of the under management from over 150 countries US since 1994 networks each month Fortune 500 and 335,000 devices Delivering an integrated services portfolio Incorporating industry- From assessment to leading technology & mitigation, on a global services, with Counterpane basis at the core Third party validation Many accreditations, including BS Leadership position in Highest capability 27001/ISO 17799, SAS70-II, FIPS Gartner’s 2007 North American maturity rating 140-2, CERT, FIRST, CLAS, MSSP Magic Quadrant from NSA SANS GIAC and CHECK
  • 5. 1 1 , 2 1 1 ' 3# 4 5
  • 6. 1 1 ! 5 & ' & " % " " " & 6 6 1 6 6
  • 7. 1 ! 77 ) 1 ! - / & " & ! & ! 6 - / & & 6 8 0 7
  • 8. 1 8 0 9& & - / $ ! 6 $ 2 , :' ; 6 $ < -)) = => ; ; ) =(: 7 = = / $ & - / $ ?& " & $ , (6: .@ ( .@ 6A 6 8
  • 9. 18 0 & $ 9 ! 6 $ ! ! 6 9
  • 10. ??? ; ( 7 ) 67 ??? ; ($ ) ! & ??? ;( 7 ) 67 $ ( .@ 6: $ ( ;( 7 ) 67 $ A .@ $ A: ;( 7 ) 67 $ ( .@ 6: $ 77 ;( 7 ) 67 $ ( .@ 6: $ A: ;( 7 ' ) 67 $ (6: A .@ $ B) ) 10
  • 11. ; ( 7& 6 1 '+ ) 67 ; ( 7' ) 67 ??? 1 '+ $ ;( 7 ) 67 1 '+ $ 1 '+ " ' B) ) 18 0 $ 1 '+ ! & 1 '+ $ ? & 1 '+ - 1 / ;( 7 , ) 67 6 11
  • 12. ! & ! < ! ! 5 12
  • 13. 1 $ , $ $ C $ $ ! D 13
  • 14. 1 & !$ ! @ D ! 1 8 0 6 0 6 ! = $ 1 $ + $ & 6 14
  • 15. 1 ?, & & - ? / 1 ! 6 ! , = $ 6 $ 6 $ & 6 E 18 0 6 2 : $ : ' ! F -F/ 6 $ : <6 2 B' ( !- B/ ( $ $ 2 !F - F/ ?& " ? 1 & 15
  • 16. 1 '+ - 1 / 1 1? 6 $ 1 ! ;( 7" ) 67 6 $ 1? D $ ?< G 8 ' =1 (6 1 1 ( ??? ; ( 7 ) 67 1 ' ! H) I $ =3 3 6 6 6 !3 3 & 3)>)3) ()3;B3 ' ' ' 'H ' ) 3 16
  • 17. 1 1 " & ' ! ! 6 $ % & 1? $ % & !- 6 6 1? / $ % & + ' ! 1 1? = $ ;( J ) 67 !- / - / $ ! ! $ @ @ & -F/ $ 17
  • 18. 1 ( & 1 '+ ???D ; ( 7 ) 67 2 "' : !" ! 1 %E & ? -? / $ ? ' $ ? ! ' - ' / ! 18
  • 19. 1? 4 + " 1? B")> 7()6 + " 1? I B")) )(76 19
  • 20. = 1 " ?< ; ( 71 8 0 ) 67 & 6( 7 ? & - ?/ 6 & , ! 18 0 & !6 =3 3 6 6 3 3 K K1 K 6 20
  • 21. ? & $ 4 & 6 $ % 5 ! & 6 $ & " & 6 $ " F 2 " 5 & 6 21
  • 22. # # $ 3 $ ! $ ! ? $ & ' & $ % $ & $ ! & " $ 18 0 $ $ ' & 22
  • 23. 0 !& 6 $ ! 8 0 6 & " ! $ % ! !6 0 & & $ ! " " " 0 6 0 $ " 6 $ & @ 6 23
  • 24. , $ @ & ! !& ! 6 $ @ ? 6 $ @ 6 , ' ! $ , @ & & 6 $ " ?6 $ , & , 6 24
  • 25. 1 ! = $ $ ?6 ! & " ! @ & ?6 ! , ! ?6 25
  • 26. & @ - / 8 0 1 @ D !6 = $ 18 0 ! & $ ! 18 0 ! $ & 6 26
  • 27. 1 9 = $ 9 $ 9 $ - ." % " 6/ $ 3 $ $ 9 ? $ 9 " & " 27
  • 28. !$ , 7 6B 6 6( ! ? $ - / & ?6 F ! $ - / & ?6 28
  • 29. ! , ! " ? 6 & @ ?& ! 6 1 = $ ! ? ! $ ;( 7 ) 67 $ $ , 76 ) 29
  • 30. $ , ( 67 6 67 & ' ! $ "0 " " ! " 6 ? & 6 & & , , 6 30
  • 31. & $ , > 6B 6 67 " & 6 F " " & 6 $ $ ! ! ! & $ 3 $ & 31
  • 32. 7 67$ 1 7 ! % @ $ , $ 3 & 6 F @ , " 3 & 6 3 "& 6 F @ D - , 7 6> 6 ( / $ & @ & 6 32
  • 33. 1 3 $ , 7 6: 6 7 2 3 & ? 6 $ ! ! $ ! ! , 6 E $ 3 6 $ ?< 3 3 & " " & 6 33
  • 34. # $ , 7 67 6 7 % " " ! " , @ 6 2 @ , & $ 7 67% 7 @ , 3 & 6 $ 7 67 F 7 @ , " 3 & 6 $ 7 67 7 3 "& 6 $ 7 67 F 7 @ D - , 7 6> ( / & @ & 6 34
  • 35. ' $ L ! $ $ & 6 ( ) $ . $ , , 6 $ L " = & & 35
  • 36. ! ! $ 8 $ 2 + & + ! $ 9 ;( 7 ) 67 $ ! ! 1 1 & ! & ! ! ! $ 0 $ ? ' < & $ & 36
  • 37. 1 " " !"#" " $ $ 6 $ ! 6 $ ' ! $ D & 37
  • 38. 1 1? 8? $ E ! ! 8? $ 8? " 2 1 1 ( $ 1 ( $ 38
  • 39. 1 % 0 $ 6 6 6 6 1? ! E $ =3 3 !6 6 6! 6 !' - ' / $ 6 ! 6 ' 6 6 % 0 ! $ 6 !6 3 $ & $ 6 6 3 3 K 6 39
  • 40. 40
  • 41. ! 6 & 6 , & & & & ! 41
  • 42. #3 $ !" " " # % & 6 ! 6 3 3 ! 6 6 3 ! 42