15
How to reduce business risks by implementing VULNERABILITY MANAGEMENT process? Edvinas Pranculis MM, CISA, CISM Edvinas Pranculis MM, CISA, CISM Regional Account Manager – Eastern Europe & Central Asia

Qualis how+to+reduce+business+risks+by+implementing+vulnerability+management+process+~20100413

Embed Size (px)

DESCRIPTION

Reducing Business Risks By Implementing A Vulnerability Management Process

Citation preview

Page 1: Qualis how+to+reduce+business+risks+by+implementing+vulnerability+management+process+~20100413

How to reduce business risksby implementing VULNERABILITY MANAGEMENT process?

Edvinas Pranculis MM, CISA, CISMEdvinas Pranculis MM, CISA, CISMRegional Account Manager – Eastern Europe & Central Asia

Page 2: Qualis how+to+reduce+business+risks+by+implementing+vulnerability+management+process+~20100413

Agenda

� Risk Management

� Vulnerability Management

� QualysGuard & SaaS Model

� Q&A

Page 3: Qualis how+to+reduce+business+risks+by+implementing+vulnerability+management+process+~20100413

Risk Management ProcessHow to treat risk?

Risk Treatment Techniques

� Risk Transference

� Risk Acceptance / Tolerance� Risk Acceptance / Tolerance

� Risk Mitigation / Reduction

� Risk Avoidance

� Risk Containment* AS/NZS 4360:2004

Page 4: Qualis how+to+reduce+business+risks+by+implementing+vulnerability+management+process+~20100413

Defining Risk & Risk MitigationWhat is most effective way to reduce risk?

Risk Mitigation Techniques

� Reduce Threats

� Reduce Vulnerabilities

EFF

EC

TIV

EN

ESS

Level of Risk = f (BI, LoT, LoV)

� Reduce Vulnerabilities

� Reduce Asset Value

� Detect

� RecoverEFF

EC

TIV

EN

ESS

Page 5: Qualis how+to+reduce+business+risks+by+implementing+vulnerability+management+process+~20100413

Need for Vulnerability Management

� Vulnerabilities on network are GOLD to cyber criminals:

– Provide unauthorized entry to networks

Sources of Vulnerabilities

� Programming errors� Unintentional mistakes� Intentional malware software� Improper system configurations

– Can expose confidential information, fuel stolen identities, violate privacy laws, or paralyze operations

– Exposure is extreme for networks with vulnerable devices connected by IP

� Improper system configurations� Remote users sidestepping

perimeter security� Rising attacks through viewing

popular websites� Flaws in algorithms� etc.

Page 6: Qualis how+to+reduce+business+risks+by+implementing+vulnerability+management+process+~20100413

Key to Security?Fixing problems before bad guys find them…

Hacking Linux Exposed

“… the countermeasure that will protect you, should a hacker scan your machines with a scanner, is to your machines with a scanner, is to scan your own systems first.

Make sure to address any problemsand then a scan by a hacker will give him no edge…”

Page 7: Qualis how+to+reduce+business+risks+by+implementing+vulnerability+management+process+~20100413

Security + Compliance Lifecycle Workflow

Under this new paradigm, a system is deemed out of compliance if it is:

� Vulnerable to attacks� Improperly configured� In violation of internal policies or external regulations

Page 8: Qualis how+to+reduce+business+risks+by+implementing+vulnerability+management+process+~20100413

Security + Compliance Delivered as a Service

Bringing Security and Compliance Audits in a Single Solution,Operationalising it and

Delivering it as a Service

NO SOFTWARE TO INSTALL AND MAINTAIN

Page 9: Qualis how+to+reduce+business+risks+by+implementing+vulnerability+management+process+~20100413

ReportingCommunicate and consult

And Delivering it as a Service

Leveraging CobIT, ISO, ITIL and NIST Security & Compliance Frameworks

The Security + Compliance Conundrum

Page 10: Qualis how+to+reduce+business+risks+by+implementing+vulnerability+management+process+~20100413

QualysGuard Global InfrastructureSecurity + Compliance

� Annual Volume of Scans: 500+ millions IP audit scans with 7,000 scanner appliances in over 85 countries

� The world's largest VM enterprise deployment at a Forbes Global 50 with 220+ scanner appliances deployed in 52 countries scanning ~700 000 IPs

End to End Security

Page 11: Qualis how+to+reduce+business+risks+by+implementing+vulnerability+management+process+~20100413

QualysGuard Adoptionby Industry Verticals Page 2 of 2

Health CareMedia Energy/Utilities Consumer Products

Manufacturing Education Transportation Government

Page 12: Qualis how+to+reduce+business+risks+by+implementing+vulnerability+management+process+~20100413

QualysGuard Adoptionby Industry Verticals Page 1 of 2

Financial Services ChemicalInsurance Financial Services

Portals/Internet Retail Technology Consulting

Page 13: Qualis how+to+reduce+business+risks+by+implementing+vulnerability+management+process+~20100413

Qualys Strategic PartnersGlobal Partner Network

Media

Page 14: Qualis how+to+reduce+business+risks+by+implementing+vulnerability+management+process+~20100413

Benefits of Vulnerability Management

� Vulnerability management gives you control and visibility to manage your networks security effectively and document compliance

� Vulnerability management is PROACTIVE approach � Vulnerability management is PROACTIVE approach to security

Page 15: Qualis how+to+reduce+business+risks+by+implementing+vulnerability+management+process+~20100413

Q&A

Thank [email protected]

Please visit www.qualys.com for a 14-day FREE trial

- NO SOFTWARE TO INSTALL OR MAINTAIN -