presentation - preventing is protecting

13
Preventing is Protecting Secure Computing 2015 Preventing is Protecting - Secure Computing 2015 ©

Upload: antonio-chan

Post on 22-Jan-2018

259 views

Category:

Documents


2 download

TRANSCRIPT

Preventing is ProtectingSecure Computing 2015

Preventing is Protecting - Secure Computing 2015 ©

Agenda• IT landscape

• Areas• Threats• Solutions

• End Point Security• Patch- & Lifecycle management• End Point Protection

Preventing is Protecting - Secure Computing 2015 ©

IT Landscape - Areas• Cloud• WAN• LAN• Server• Client• Application• Data

Preventing is Protecting - Secure Computing 2015 ©

IT Landscape - Threats• 0-day exploits• Advanced Persistant Threats• “Generic” malware

Preventing is Protecting - Secure Computing 2015 ©

IT Landscape – Solutions• Prevent, Detect and Contain

• Network segregation• Rights management• Application whitelisting• Boundary defense• Monitoring and logging• Anti-exploit & anti-virus• Intrusion prevention• Patch- & Lifecycle management

Preventing is Protecting - Secure Computing 2015 ©

IT Landscape – Solutions (2)• Incident response and recovery

• Backup critical systems and data• Incident response plan• Lessons learned

Preventing is Protecting - Secure Computing 2015 ©

Patch- & Lifecyclemanagement• Operating sytems• Applications• Tools

Preventing is Protecting - Secure Computing 2015 ©

End Point Protection• Segregate networks• Protect and restrict privileges• Applicationcontrol• Limit workstation-to-workstation• Dynamic analysis• Monitoring and logging• Anti-exploitation & anti-virus• Host Intrusion Prevention System

Preventing is Protecting - Secure Computing 2015 ©

Research scope• Monitoring and logging• Data security

Preventing is Protecting - Secure Computing 2015 ©

Reference• Experience• NCSC• NSA

Preventing is Protecting - Secure Computing 2015 ©

Questions?• When?• How?• Impact?• Recovery?• Costs?

Preventing is Protecting - Secure Computing 2015 ©

Preventing is Protecting - Secure Computing 2015 ©

[email protected] is Protecting - Secure Computing 2015 ©