The [Cyber Security] Blair Witch Project: What Lurks in the Shadows of Your Network

15
The [Cyber Security] Blair Witch Project: What Lurks in the Shadows of Your Network Cyber Security Strategist, Dawn-Marie Hutchinson

Transcript of The [Cyber Security] Blair Witch Project: What Lurks in the Shadows of Your Network

The [Cyber Security] Blair Witch Project:

What Lurks in the Shadows of Your Network

Cyber Security Strategist,

Dawn-Marie Hutchinson

© 2015 Dawn-Marie Hutchinson All Rights Reserved.

Track, classify and

control

Data Inventory

Hardware

Inventory

Application

inventory

User Inventory

Identify

Maximize business

value and

investments by

having the right stuff protecting

the right things.

Protect

Detect

• Anomalies

and events

• Continuous

Monitoring

• Detection

Processes

“I’m afraid to close my eyes. I’m afraid to open them.”

• Clear Objectives

• Mature Processes

• Gumption

• Beyond

Compliance

• Securing Trust

Security Maturity

• Careful analysis increases certainty – Can locate lost/stolen data

– Can account for malware changes, attacking IP’s

– Can run scans across entire network

– Can better account for PII and PHI sources

• Establish Communication Plans

• Understand your backup and recovery strategy

Recover & Recover

© 2015 Dawn-Marie Hutchinson All Rights Reserved.

• Preparedness

• Analysis

• Mitigation

• Incident

Response

© 2015 Dawn-Marie Hutchinson All Rights Reserved.

Dawn-Marie Hutchinson

Cyber Security Strategist Email: [email protected]

Phone: 267-615-8331

Twitter: Ciso_Advantage

Experience in direct oversight and management of Information

Security Operations, Privacy and Governance Risk and Compliance management and initiatives.

• 2015 CRN Women of the Channel Power 50 Award Winner

• 2015 Cyber Security Canon Committee Member

• 2014 Evanta CISO Breakaway Leadership Nominee

11

11

BeyondTrust Overview Alex DaCosta, Retina Product Manager

12

Network Security

Scanning

Enterprise Vulnerability

Management

Dynamic Web

Application Scanning

Cloud-Based

Perimeter Scanning

Privileged Password

Management

Privilege

Management

Auditing &

Protection

Active Directory

Bridging

The BeyondInsight IT Risk Management Platform

EXTENSIVE

REPORTING

CENTRAL DATA

WAREHOUSE

ASSET

DISCOVERY

ASSET

PROFILING

ASSET SMART

GROUPS

USER

MANAGEMENT

WORKFLOW &

NOTIFICATION

THIRD-PARTY

INTEGRATION

Retina Vulnerability Management Solutions

PowerBroker Privileged Account Management Solutions

ADVANCED THREAT

ANALYTICS

NETWORK

INFRASTRUCTURE

MOBILE, VIRTUAL

AND CLOUD

APPLICATIONS &

DATABASES SERVERS & DESKTOPS

ACTIVE DIRECTORY,

EXCHANGE, FILE SYS.

© 2015 BeyondTrust Software

13

13

Live Demo

14

14

Poll Question

15

15

Q&A

Thank you for attending!