Resolve Real Security Threats Fast - ServiceNow · 2020. 7. 27. · Resolve Real Security Threats...
Transcript of Resolve Real Security Threats Fast - ServiceNow · 2020. 7. 27. · Resolve Real Security Threats...
![Page 1: Resolve Real Security Threats Fast - ServiceNow · 2020. 7. 27. · Resolve Real Security Threats Fast DEVON WINKWORTH Advisory Solution Consultant ... Easily prioritize risks and](https://reader034.fdocuments.in/reader034/viewer/2022052021/6035146d42870a63bc160168/html5/thumbnails/1.jpg)
1© 2017 ServiceNow All Rights Reserved© 2017 ServiceNow All Rights Reserved
MYKE LYONSHead of Security Strategy, Security Business Unit
ServiceNow
Resolve Real Security Threats Fast
DEVON WINKWORTHAdvisory Solution Consultant
ServiceNow
![Page 2: Resolve Real Security Threats Fast - ServiceNow · 2020. 7. 27. · Resolve Real Security Threats Fast DEVON WINKWORTH Advisory Solution Consultant ... Easily prioritize risks and](https://reader034.fdocuments.in/reader034/viewer/2022052021/6035146d42870a63bc160168/html5/thumbnails/2.jpg)
2© 2017 ServiceNow All Rights Reserved
Agenda
• The Power of Security Operations
• Trusted Security Circles
• Vendor Risk Management
![Page 3: Resolve Real Security Threats Fast - ServiceNow · 2020. 7. 27. · Resolve Real Security Threats Fast DEVON WINKWORTH Advisory Solution Consultant ... Easily prioritize risks and](https://reader034.fdocuments.in/reader034/viewer/2022052021/6035146d42870a63bc160168/html5/thumbnails/3.jpg)
3© 2017 ServiceNow All Rights Reserved 3© 2017 ServiceNow All Rights Reserved
The Power of Security Operations
![Page 4: Resolve Real Security Threats Fast - ServiceNow · 2020. 7. 27. · Resolve Real Security Threats Fast DEVON WINKWORTH Advisory Solution Consultant ... Easily prioritize risks and](https://reader034.fdocuments.in/reader034/viewer/2022052021/6035146d42870a63bc160168/html5/thumbnails/4.jpg)
4© 2017 ServiceNow All Rights Reserved
Organisations Have Invested in a LOT of Security Products
PROTECT: DETECT: RESPOND:
[NOT SO MUCH]
![Page 5: Resolve Real Security Threats Fast - ServiceNow · 2020. 7. 27. · Resolve Real Security Threats Fast DEVON WINKWORTH Advisory Solution Consultant ... Easily prioritize risks and](https://reader034.fdocuments.in/reader034/viewer/2022052021/6035146d42870a63bc160168/html5/thumbnails/5.jpg)
5© 2017 ServiceNow All Rights Reserved
Organisations Are Struggling to Find and Stop Breaches
Source: Ponemon Institute 2017
On average, it took respondents 191 days to spot a breach caused by a malicious attacker, and 66 days to contain it.
![Page 6: Resolve Real Security Threats Fast - ServiceNow · 2020. 7. 27. · Resolve Real Security Threats Fast DEVON WINKWORTH Advisory Solution Consultant ... Easily prioritize risks and](https://reader034.fdocuments.in/reader034/viewer/2022052021/6035146d42870a63bc160168/html5/thumbnails/6.jpg)
6© 2017 ServiceNow All Rights Reserved
And the Vulnerability Backlog is Piling Up
• 61% of vulnerabilities are patched within a month
• Leftovers are likely NEVER to be patched
source: Verizon Data Breach Investigations Report 2017
![Page 7: Resolve Real Security Threats Fast - ServiceNow · 2020. 7. 27. · Resolve Real Security Threats Fast DEVON WINKWORTH Advisory Solution Consultant ... Easily prioritize risks and](https://reader034.fdocuments.in/reader034/viewer/2022052021/6035146d42870a63bc160168/html5/thumbnails/7.jpg)
7© 2017 ServiceNow All Rights Reserved
Top 10 Vulnerabilities Exploited in 2015 Were Over a Year OldAnd 48% were five or more years old
source: HPE Cyber Security Report, 2016
![Page 8: Resolve Real Security Threats Fast - ServiceNow · 2020. 7. 27. · Resolve Real Security Threats Fast DEVON WINKWORTH Advisory Solution Consultant ... Easily prioritize risks and](https://reader034.fdocuments.in/reader034/viewer/2022052021/6035146d42870a63bc160168/html5/thumbnails/8.jpg)
8© 2017 ServiceNow All Rights Reserved
The Need: Enterprise Security Response
Security Incident
Response
Vulnerability
ResponseWorkflow
Automation &
Orchestration
Deep IT
Integration
Threat
Intelligence
ENTERPRISE SECURITY RESPONSE
![Page 9: Resolve Real Security Threats Fast - ServiceNow · 2020. 7. 27. · Resolve Real Security Threats Fast DEVON WINKWORTH Advisory Solution Consultant ... Easily prioritize risks and](https://reader034.fdocuments.in/reader034/viewer/2022052021/6035146d42870a63bc160168/html5/thumbnails/9.jpg)
9© 2017 ServiceNow All Rights Reserved 9© 2017 ServiceNow All Rights Reserved Confidential
DEMO
![Page 10: Resolve Real Security Threats Fast - ServiceNow · 2020. 7. 27. · Resolve Real Security Threats Fast DEVON WINKWORTH Advisory Solution Consultant ... Easily prioritize risks and](https://reader034.fdocuments.in/reader034/viewer/2022052021/6035146d42870a63bc160168/html5/thumbnails/10.jpg)
10© 2017 ServiceNow All Rights Reserved 10© 2017 ServiceNow All Rights Reserved
Trusted Security Circles
![Page 11: Resolve Real Security Threats Fast - ServiceNow · 2020. 7. 27. · Resolve Real Security Threats Fast DEVON WINKWORTH Advisory Solution Consultant ... Easily prioritize risks and](https://reader034.fdocuments.in/reader034/viewer/2022052021/6035146d42870a63bc160168/html5/thumbnails/11.jpg)
11© 2017 ServiceNow All Rights Reserved
Threat Intelligence Sharing Improves Orchestration Accuracy
Complete Current Relevant
![Page 12: Resolve Real Security Threats Fast - ServiceNow · 2020. 7. 27. · Resolve Real Security Threats Fast DEVON WINKWORTH Advisory Solution Consultant ... Easily prioritize risks and](https://reader034.fdocuments.in/reader034/viewer/2022052021/6035146d42870a63bc160168/html5/thumbnails/12.jpg)
12© 2017 ServiceNow All Rights Reserved
Make People More Effective
Shared intelligence fills in the skill gaps
![Page 13: Resolve Real Security Threats Fast - ServiceNow · 2020. 7. 27. · Resolve Real Security Threats Fast DEVON WINKWORTH Advisory Solution Consultant ... Easily prioritize risks and](https://reader034.fdocuments.in/reader034/viewer/2022052021/6035146d42870a63bc160168/html5/thumbnails/13.jpg)
13© 2017 ServiceNow All Rights Reserved
Share Intelligence with ServiceNow Trusted Security Circles
• Anonymous sharing
• Automatic sightings searches
• Circles based on commonality
• Sharing stays with your company
• Supports industry standards – STIX, TAXII
• Early warning of potential attacks
![Page 14: Resolve Real Security Threats Fast - ServiceNow · 2020. 7. 27. · Resolve Real Security Threats Fast DEVON WINKWORTH Advisory Solution Consultant ... Easily prioritize risks and](https://reader034.fdocuments.in/reader034/viewer/2022052021/6035146d42870a63bc160168/html5/thumbnails/14.jpg)
14© 2017 ServiceNow All Rights Reserved 14© 2017 ServiceNow All Rights Reserved Confidential
DEMO
![Page 15: Resolve Real Security Threats Fast - ServiceNow · 2020. 7. 27. · Resolve Real Security Threats Fast DEVON WINKWORTH Advisory Solution Consultant ... Easily prioritize risks and](https://reader034.fdocuments.in/reader034/viewer/2022052021/6035146d42870a63bc160168/html5/thumbnails/15.jpg)
15© 2017 ServiceNow All Rights Reserved 15© 2017 ServiceNow All Rights Reserved
Vendor Risk Management
![Page 16: Resolve Real Security Threats Fast - ServiceNow · 2020. 7. 27. · Resolve Real Security Threats Fast DEVON WINKWORTH Advisory Solution Consultant ... Easily prioritize risks and](https://reader034.fdocuments.in/reader034/viewer/2022052021/6035146d42870a63bc160168/html5/thumbnails/16.jpg)
16© 2017 ServiceNow All Rights Reserved
Your Enterprise Doesn’t Exist In Isolation
IT softwarevendors
Outsourcers
Consultants Affiliates
Distributors
Resellers
![Page 17: Resolve Real Security Threats Fast - ServiceNow · 2020. 7. 27. · Resolve Real Security Threats Fast DEVON WINKWORTH Advisory Solution Consultant ... Easily prioritize risks and](https://reader034.fdocuments.in/reader034/viewer/2022052021/6035146d42870a63bc160168/html5/thumbnails/17.jpg)
17© 2017 ServiceNow All Rights Reserved
Today’s Vendor Risk Management Processes & Tools Can’t Keep Up
Manual Processes
Manual and time consuming processes make it difficult to provide adequate coverage for all critical vendors; leaving the enterprise open to loss events and unnecessary risk.
PoorVisibility
The inability to see what needs to get done, by when, and who is working on it means we can’t get visibility into program activities and overall risk posture; so we don’t get the type, depth, or timely information we want.
Siloed & Rudimentary
Tools
Siloed and antiquated risk management tools make it difficult to operate effectively within the extended enterprise; making it hard to prioritize and remediate issues.
![Page 18: Resolve Real Security Threats Fast - ServiceNow · 2020. 7. 27. · Resolve Real Security Threats Fast DEVON WINKWORTH Advisory Solution Consultant ... Easily prioritize risks and](https://reader034.fdocuments.in/reader034/viewer/2022052021/6035146d42870a63bc160168/html5/thumbnails/18.jpg)
18© 2017 ServiceNow All Rights Reserved
Introducing ServiceNow Vendor Risk Management
Policy & Compliance Management Risk Management Audit Management Vendor Risk Management
SingleDatabase
ContextualCollaboration
ServiceCatalog
ServicePortal
Subscription & Notification
KnowledgeBase
OrchestrationDeveloperTools
Reports & Dashboards
Workflow
Intelligent Automation Engine
Predictive Modeling
Anomaly Detection
PeerBenchmarks
PerformanceForecasting
Nonstop Cloud
![Page 19: Resolve Real Security Threats Fast - ServiceNow · 2020. 7. 27. · Resolve Real Security Threats Fast DEVON WINKWORTH Advisory Solution Consultant ... Easily prioritize risks and](https://reader034.fdocuments.in/reader034/viewer/2022052021/6035146d42870a63bc160168/html5/thumbnails/19.jpg)
19© 2017 ServiceNow All Rights Reserved
Transform Inefficient Processes into a Unified Vendor Risk Program
AutomateGain
VisibilityUnify and Prioritize
Gain visibility & transparency for you and your vendor into the status of assessments, issues, and tasks; and track changes across your vendor ecosystem.
Easily prioritize risks andeffortlessly drive them to closure when you integrate disparate siloes of information and technology with a user friendly experience across the extended enterprise.
Replace unstructured work patterns with intelligent workflows. Assessments, issues, notifications, and other work items can be automatically generated, assigned, and easily actioned.
![Page 20: Resolve Real Security Threats Fast - ServiceNow · 2020. 7. 27. · Resolve Real Security Threats Fast DEVON WINKWORTH Advisory Solution Consultant ... Easily prioritize risks and](https://reader034.fdocuments.in/reader034/viewer/2022052021/6035146d42870a63bc160168/html5/thumbnails/20.jpg)
20© 2017 ServiceNow All Rights Reserved 20© 2017 ServiceNow All Rights Reserved Confidential
DEMO
![Page 21: Resolve Real Security Threats Fast - ServiceNow · 2020. 7. 27. · Resolve Real Security Threats Fast DEVON WINKWORTH Advisory Solution Consultant ... Easily prioritize risks and](https://reader034.fdocuments.in/reader034/viewer/2022052021/6035146d42870a63bc160168/html5/thumbnails/21.jpg)
21© 2017 ServiceNow All Rights Reserved
1 2 3
Summary
Security Operations can help you build
an Enterprise Security Response
Program
Trusted Security Circles can invert the
threat intelligence model, allowing you to proactively stop
threats
Vendor Risk Management
monitors, prioritizes and automates
response to third-party risk