Upload
others
View
3
Download
0
Embed Size (px)
Citation preview
OCTOBER 1 – 4, 2018 | WASHINGTON, D.C.
Beyond Shared ResponsibilityUsing a Next-Gen SIEM to Secure Your Cloud
Martin Holste, Chief Technology Officer, Cloud Security
Challenges for Cloud Customers
©2018 FireEye
The bottom line: How effective is your cloud security?
3
Do you have visibilityacross your
infrastructure?
Can you detect credential abuse and configuration
mismanagement?
Can you centrally manage your cloud
security?
Cloud security requires situational awareness
Attackers are compromising cloud assets through stolen
credentialsAnalysts need security data in one place to be efficient
©2018 FireEye
Cloud Security is Different
4
Endpoint
Additional
Foundational Network
Analytics
©2018 FireEye
Shared Responsibility Model
5
Protecting the Cloud with FireEye Helix
©2018 FireEye
The FireEye Ecosystem
7
©2018 FireEye
8
Cloud Intelligence VPN AccountMonitoring
Geo-InfeasibilityDetection
Credential Misuse
MisconfigurationDetection
Cloud ThreatAnalytics
Corporate Network
FireEye Network Security
FireEye Helix
Securing the Cloud with FireEye
©2018 FireEye
Benefits of FireEye Helix in the Cloud
9
Surface Unseen Threats with Visibility and Intelligence
Prevent Credential Abuse and Cloud Misconfiguration
Track Decentralized Assets
©2018 FireEye
FireEye Helix in Action
10
Collect Match Automate Prioritize Investigate Remediate
FireEye Helix Demo
©2018 FireEye
12
Rich BakerForensic Investigative DirectorOptum Technology
Steve BoothVice President & CISOFireEye
Andrew SmithCybersecurity EngineerSallie Mae
Panelists