plan for the worst; fight for the best

1
Staying secure in the Evolving Connected World A new study from Hewlett Packard Enterprise Security Services finds that combatting cybercrime requires an integrated security approach, incorporating proactive planning and risk management strategies to lower risk exposure, reduce security-related costs, and gain greater control. Major mobile exploits Know how users in your organization want to use their devices and ensure they understand the security issues. Consider enterprise identity and access gateways to enforce corporate policies while supporting consumer choice. 1 3 5 It’s important organizations understand where they use open source software and identify the significance to their business. This may require a refresh of your policies—on use, implementation, and software updates. 2 4 supply chain Enterprises, like yours, must consider the security governance and compliance policies of their suppliers as a key component of their overarching enterprise security approaches, including annual reviews, enforcement, and reporting. Compromised Industry sector Ensure all defenses that already exist meet your organization’s needs and provide the best brand protection possible. Start with assessing physical and operational security stakeholders. attacks Understand what individual data is held through privacy assessments to ensure you have a robust data loss prevention capability in place. The applications that access and process data will need consistent testing routines. Also, assess and understand your data “crown jewels” —don’t just let compliance drive data protection. Five cyber security predictions to occur through 2016 vulnerabilities Open source Increased privacy pressure Hewlett Packard Enterprise Security focuses on securing future agencies and enterprises in the ever-evolving connected world. We are committed to enhancing defenses against the many evolving cyber threats to governments, individuals, commerce, and critical global infrastructure by developing international standards, policies, and legislation that encourage outcome-based approaches to cyber security. © Copyright 2015 Hewlett Packard Enterprise Development LP. The information contained herein is subject to change without notice. The only warranties for HPE products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. HPE shall not be liable for technical or editorial errors or omissions contained herein. hpe-enterpriseforward.com/fightback/ To learn more about how you can prepare for and prevent future attacks, visit us at:

Upload: hewlett-packard-enterprise-business-value-exchange

Post on 14-Apr-2017

7.314 views

Category:

Business


0 download

TRANSCRIPT

Page 1: Plan for the Worst; Fight for the Best

Staying secure in the

Evolving Connected WorldA new study from Hewlett Packard Enterprise Security Services finds that combatting cybercrime requires an integrated security approach, incorporating proactive planning and risk management strategies to lower risk exposure, reduce security-related costs, and gain greater control.

Major mobile exploitsKnow how users in your organization want to use their devices and ensure they understand the security issues. Consider enterprise identity and access gateways to enforce corporate policies while supporting consumer choice.

1

3

5

It’s important organizations understand where they use open source software and identify the significance to their business. This may require a refresh of your policies—on use, implementation, and software updates.

2

4

supply chain

Enterprises, like yours, must consider the security governance and compliance policies of their suppliers as a key component of their overarching enterprise security approaches, including annual reviews, enforcement, and reporting.

Compromised

Industry sector

Ensure all defenses that already exist meet your organization’s needs and provide the best brand protection possible. Start with assessing physical and operational security stakeholders.

attacks

Understand what individual data is held through privacy assessments to ensure you have a robust data loss prevention capability in place. The applications that access and process data will need consistent testing routines. Also, assess and understand your data “crown jewels” —don’t just let compliance drive data protection.

Five cyber security predictions to occur through 2016

vulnerabilitiesOpen source

Increased

privacy pressure

Hewlett Packard Enterprise Security focuses on securing future agencies and enterprises in the ever-evolving connected world. We are committed to enhancing defenses against the many evolving cyber threats to governments, individuals, commerce, and critical global infrastructure by developing international standards, policies, and legislation that encourage outcome-based approaches to cyber security.

© Copyright 2015 Hewlett Packard Enterprise Development LP. The information contained herein is subject to change without notice. The only warranties for HPE products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. HPE shall not be liable for technical or editorial errors or omissions contained herein.

hpe-enterpriseforward.com/fightback/

To learn more about how you can prepare for and prevent future attacks, visit us at: