This webinar is designed to understand the type of data and its context that these two groups collect and analyze. In many organizations, security operations work in siloes to IT Operations. As a result, security vulnerabilities have to be handled twice: once by the SOC groups or security teams; and secondly by the IT Operations team who could not initially identify the issue. Consequently, you cannot establish any automation for information sharing or event correlation between security vulnerabilities and performance issues. Let us see how some of these automation challenges can be addressed between security and IT Operations. A good starting point is to understand the tools available to manage the data comprehensively from security, risk, compliance, and operations viewpoint, and integrate them with the existing IT operations
The emergence of Enterprise 2.0 with social, mobile, local, and cloud applications within the enterprise have increased IT operational challenges. Other trends such as Bring your own device (BYOD) are adding new dimensions that are challenging for IT Operations due to diversified form, OS, vendors, etc. Your customers and employees are demanding an open platform to facilitate better collaboration. However, your IT operations may not be in position to support Enterprise 2.0 or BYOD due to security challenges or resource constraints. So, how do you align your business requirements and IT resources, while keeping it secure? Cyber-threats have become more sophisticated, persistent, slow, deep, and unpredictable. New research conducted on behalf of HP showed that the volume and complexity of security threats has continued to escalate. More than 50 percent of senior business and technology executives surveyed believe that security breaches within their organizations have increased during the last year.
If you look at those trends, they challenge the traditional notions of enterprise security. The traditional approach in IT security was to establish strong perimeters around the network and around a company’s computers that could keep bad guys out and let good guys in, and then setting strict rules about what people allowed access can do.The bad guys are getting better, but as we change our IT environment we’re giving them more surface area from which to launch these attacksThe Data Breach Investigation Report (DBIR) of 2012 conducted by Verizon, states that 98% of the data breaches come from external agents. 97% of those breaches were avoidable through simple controls .In all of these breaches studied, 92% of them were reported by third parties. This is an embarrassment to organizations that did not even detect a breach in their internal IT systems.
"You can't secure it if you can't see it,In a world where perimeter security is no longer enough, businesses need this holistic approach to securing their networks, applications and sensitive data.