how to spend your cloud security dollar

26
1 HOW TO SPEND YOUR CLOUD SECURITY DOLLAR Tricia Pattee | HOSTING Product Manager

Upload: hosting

Post on 13-Apr-2017

795 views

Category:

Technology


0 download

TRANSCRIPT

Page 1: How to Spend Your Cloud Security Dollar

1

HOW TO SPEND YOUR CLOUD SECURITY DOLLARTricia Pattee | HOSTING Product Manager

Page 2: How to Spend Your Cloud Security Dollar

• This webinar is being recorded and an on-demand version will be available at the same URL at the conclusion of the webinar

• Please submit questions via the button on the upper left of the viewer• If we don’t get to your question during the

webinar, we will follow up with you via email• Download related resources via the

“Attachments” button above the viewing panel• On Twitter? Join the conversation

@HOSTINGdotcom

2

Housekeeping

Page 3: How to Spend Your Cloud Security Dollar

• Today’s Obstacles• 5 most common security mistakes• Security Risk Management Process• How to determine the right amount to

spend• Security Checklist• Hidden cloud security costs

3

Agenda

Page 4: How to Spend Your Cloud Security Dollar

4

Today’s Obstacles

Key findings from The Global State of Information Security Survey 2015 by PWC

Page 5: How to Spend Your Cloud Security Dollar

5

Key findings from The Global State of Information Security Survey 2015 by PWC

Page 6: How to Spend Your Cloud Security Dollar

6

Key findings from The Global State of Information Security Survey 2015 by PWC

How is security reflected in your overall IT budget?

Page 7: How to Spend Your Cloud Security Dollar

7

Key findings from The Global State of Information Security Survey 2015 by PWC

Security budget

Review roles/responsibilities of security organization

Security policies

Security technologies

Overall security strategy

Review of current security and privacy risks

40%

20%

30%

36%

42%

25%

The Board of Directors remain uninvolved in most organizations

Page 8: How to Spend Your Cloud Security Dollar

1. “We have to achieve 100 percent security.”

8

5 Most Common Security Mistakes That Impact Budgets

Page 9: How to Spend Your Cloud Security Dollar

1. “We have to achieve 100 percent security.”

2. “Our weapons have to be better than those of the hackers.”

9

5 Most Common Security Mistakes That Impact Budgets

Page 10: How to Spend Your Cloud Security Dollar

1. “We have to achieve 100 percent security.”

2. “Our weapons have to be better than those of the hackers.”

3. “Investing in best-of-class technical tools will keep us safe.”

10

5 Most Common Security Mistakes That Impact Budgets

Page 11: How to Spend Your Cloud Security Dollar

1. “We have to achieve 100 percent security.”

2. “Our weapons have to be better than those of the hackers.”

3. “Investing in best-of-class technical tools will keep us safe.”

4. “We are secure because we are compliant.”

11

5 Most Common Security Mistakes That Impact Budgets

Page 12: How to Spend Your Cloud Security Dollar

1. “We have to achieve 100 percent security.”

2. “Our weapons have to be better than those of the hackers.”

3. “Investing in best-of-class technical tools will keep us safe.”

4. “We are secure because we are compliant.”

5. “Defending ourselves requires recruiting the best professionals.”

12

5 Most Common Security Mistakes That Impact Budgets

Page 13: How to Spend Your Cloud Security Dollar

• How big is the risk for your organization and the organizations you do business with?

13

Understanding Your Risk

Page 14: How to Spend Your Cloud Security Dollar

• How big is the risk for your organization and the organizations you do business with?

• Do your processes and culture enable effective risk management?

14

Understanding Your Risk

Page 15: How to Spend Your Cloud Security Dollar

• How big is the risk for your organization and the organizations you do business with?

• Do your processes and culture enable effective risk management?

• How large should your security budget be and how should you spend it? 15

Understanding Your Risk

Page 16: How to Spend Your Cloud Security Dollar

16

Reducing Your Risk

Prevention

Page 17: How to Spend Your Cloud Security Dollar

17

Reducing Your Risk

Detection

Prevention

Page 18: How to Spend Your Cloud Security Dollar

18

Reducing Your Risk

Response

Detection

Prevention

Page 19: How to Spend Your Cloud Security Dollar

19

Where to…

Page 20: How to Spend Your Cloud Security Dollar

20

Top Six Areas of Security Spend

PatchingVulnerabilit

y Manageme

nt

Malware/Antivirus Backups

Threat Detection

Log Monitoring

Page 21: How to Spend Your Cloud Security Dollar

21

Top Six Areas of Security Spend

PatchingVulnerabilit

y Manageme

nt

Malware/Antivirus Backups

Threat Detection

Log Monitoring

Training

People

Process

Page 22: How to Spend Your Cloud Security Dollar

22

Hidden Cloud Security Costs & Risks

• Purchasing a la carte

Page 23: How to Spend Your Cloud Security Dollar

23

Hidden Cloud Security Costs & Risks

• Purchasing a la carte• Security-in-a-box

Page 24: How to Spend Your Cloud Security Dollar

24

Hidden Cloud Security Costs & Risks

• Purchasing a la carte• Security-in-a-box• Investing in tools, not people

and processes

Page 25: How to Spend Your Cloud Security Dollar

25

Hidden Cloud Security Costs & Risks

• Purchasing a la carte• Security-in-a-box• Investing in tools, not people

and processes• Assuming risk responsibility

Page 26: How to Spend Your Cloud Security Dollar

26

Q&ATricia Pattee | HOSTING Product Manager

For more information about threat management solutions by HOSTING, please contact our team at 888.894.4678.